PlayReady App Creation Tutorial

Size: px
Start display at page:

Download "PlayReady App Creation Tutorial"

Transcription

1 Version 0.93 Samsung Smart TV 1

2 1. OVERVIEW INTRODUCTION DEVELOPMENT ENVIRONMENT FILES NEEDED FOR A PLAYREADY VIDEO APPLICATION SAMSUNG TV PLAYREADY SPECIFICATION PLAYREADY AND WMDRM 10 FOR PORTABLE DEVICES DIRECT LICENSE ACQUISITION (DLA) SILENT LICENSE ACQUISITION WITH USER CUSTOM DATA Set Cookie in HTTP Header Set User Custom Data POST-DELIVERY AND PRE-DELIVERY LICENSE ACQUISITION WEB INITIATORS DOMAIN JOIN AND LEAVE EMBEDDED LICENSE SECURITY VERSION / CLIENT VERSION / USER-AGENT SECURITY LEVEL DELETE LICENSE API GUIDELINE PLAYREADY URL FORMAT SET COOKIE IN HTTP HEADER SET USER CUSTOM DATA CHANGING LICENSE SERVER URL PROCESS WEB INITIATORS JOIN DOMAIN LEAVE DOMAIN DELETE LICENSE

3 Preface Purpose of Document. This document is a tutorial that is aimed at application developers for Samsung Smart TVwho plan to use PlayReady Technology for protecting their streaming content. This document focuses on the features supported by Samsung TV and does not provide a detailed description about PlayReady Technology itself. For more information about the technology, please refer to the official Microsoft Web Site ( It is recommended that you read Application Development Guide for Samsung Smart TV(hereinafter referred to as "the Guide") first. This document provides references to the Guide for your understanding. Target Readers. This document is aimed at programmers who have used web development languages such as HTML, CSS and JavaScript, and will be even more helpful for those who have web development experience. This document has been written on the assumption that readers have a background in Microsoft DRM and have already read the Guide. 3

4 1. Overview This document will go step by step through the development of an application that features a PlayReady video playback. The PlayReady features of Samsung TV are described in section 3 and how to implement those features using Samsung TV Apps SDK is described in section Introduction PlayReady is a content access and protection technology that is the successor to WMDRM. It provides new advanced and frequently-requested features, such as domain control, embedded licenses, and the ability to protect a wide range of content types and formats. Also, it provides backward compatibility with WMDRM. Samsung TV released in 2011 supports PlayReady Technology, whereas the previous product only supports WMDRM. Since PlayReady provides backward compatibility with WMDRM, Samsung TV can acquire content from both existing WMDRM-based services and new PlayReady-based services. In order to develop the PlayReady video Application, developers are required to have background knowledge such as HTML, JavaScript and CSS. There will be no explanation about HTML, JavaScript or CSS provided in this document. Developing applications suited for TVs is different from developing applications on PCs in several aspects. You can get more information on this from the Guide. This document explains each development stage with the source code and analyzes how each code is completed. But please note that the code snippets provided is indicative and detailed source code is not provided in the document Development environment The application uses Samsung TV Apps SDK made by Samsung to create the application. With use of the emulator provided with the SDK, you can operate your application before actually putting it in your TV, note that the actual PlayReady playback is not supported in the SDK as per the current version of SDK, this can only be tested on TV. It is possible to run the application on a real Internet@TV device (for example, a TV) using the "User Application" features. For details of this process please see the document "User Application". Before porting the application on real target, ensure that the target is capable of playing a PlayReady video. 4

5 2.2. Files needed for a PlayReady Video Application You will be provided with the basic source code for the PlayReady video application. Unzip the files, and refer to section 3.3 to locate them in the appropriate places. Please note that this tutorial does not supply any video files for playback for copyright reasons. 3. Samsung TV PlayReady Specification This section briefly explains the PlayReady features supported by Samsung TV PlayReady and WMDRM 10 for Portable Devices Samsung TVs launched in 2011 support Microsoft PlayReady Technology. Microsoft PlayReady provides backward compatibility with Windows Media DRM, therefore Samsung device can acquire content from both existing WMDRM 10 for Portable Devices and new Microsoft PlayReady-based services Direct License Acquisition (DLA) o Direct License Acquisition ( DLA ) means the ability to acquire license directly from a license server over an IP network rather than through a proxy client. o Indirect License Acquisition ( ILA ) means the ability to acquire license indirectly through a proxy client such as a personal computer by using Media Transfer Protocol over a USB connection. Since Samsung TV can acquire a license directly from a license server, we only support DLA mode Silent License Acquisition with User Custom Data In silent license acquisition, whenever a license challenge is received by a license server, the license server responds by sending a license response to the device. There are some instances where the license server may need additional information from the user before issuing a license. These instances are called non-silent license acquisition scenarios; for example, a user's identity is not authenticated and therefore needs to enter a user name and password. We don t support any intermediate step asking for user input during license acquisition process. 5

6 Instead, you can add any custom data generated in authentication or payment stage to the license challenge message. If your service is based on WMDRM10, you can set your custom data using cookie property as described in If your service is based on PlayReady, you can set the custom data in the cookie of HTTP Header as described in or set the data in challenge message as described in The data is used when calling Drm_LicenseAcq_GenerateChallenge function. Please refer to the PlayReady Specification for more information Set Cookie in HTTP Header You can set a string which should be contained in HTTP Header of license challenge message using SetPlayerProperty function. Please refer to section 4 for the detailed API usage. Here is an example of HTTP Header of the license challenge message with cookie. POST /Janus/testcases/9TC1.asp HTTP/1.0 Host: wmtap.smdisp.net User-Agent: PlayReadyClient Content-Type: application/x-www-form-urlencoded Pragma: no-cache Cookie :MyCookie Content-Length: Set User Custom Data This feature is only available in PlayReady-based service. You can set a custom data which should be contained in challenge message using SetPlayerProperty function. Please refer to section 4 for the detailed API usage. Here is an example of license challenge message with user custom data. 6

7 <?xml version="1.0" encoding="utf-8"?> <soap:envelope xmlns:xsi=" xmlns:xsd=" xmlns:soap=" <soap:body><acquirelicense xmlns=" <challenge> <Challenge xmlns=" <LA xmlns=" Id="SignedData" xml:space="preserve"> <Version>1</Version> <ContentHeader><WRMHEADER xmlns= version=" ">. </WRMHEADER> </ContentHeader> <ClientInfo> </ClientInfo> <CustomData>MyCustomData</CustomData> 3.4. Post-delivery and Pre-delivery License Acquisition The most common pattern of acquiring a license is to download a piece of content and acquire a license based on the data contained within the header of the content. This approach is called post-delivery. An alternative approach is license pre-delivery. Here, the license is acquired for the content before the content available to the client. Post-delivery : Samsung TV invokes License Acquisition when the media file is played. After the header of the media file is processed, it acquires a license based on the data contained within the header of the file. o By default, Samsung TV uses license acquisition URL parsed from the header. But, you can modify or replace the URL by using SetPlayerProperty function. Please refer to section 4 for the detailed API usage. Pre-delivery: If you want to acquire a license before the media file is available, you can use License Acquisition Web Initiator in PlayReady-based Service. 7

8 3.5. Web Initiators This feature is only available in PlayReady-based service. Web initiators are XML document which are sent from the portal to the device to initiate a DRM protocol between client and service. Web Initiators can be sent to initiate a license acquisition, metering, a join domain or a leave domain protocol. Samsung TV supports all defined PlayReady Web Initiators. You can use ProcessInitiatorsFromXml or ProcessInitiatorsFromUrl to initiate a DRM protocol. Please refer to section 4 for the detailed API usage Domain Join and Leave This feature is only available in PlayReady-based service. PlayReady allows a group of devices that are members of a domain to play back all content that binds to the same domain. Previously, only device-bound licenses could be issued for content. Only one client in a domain needs to acquire a license for a given piece of content, and then the license can be embedded into the content. The content can then be shared and played among all members of the domain. Samsung TV can join a specific domain by JoinDomain function or leave the domain by LeaveDomain function. Please refer to section 4 for the detailed API usage Embedded License This feature is only available in PlayReady-based service. PlayReady allows an application to store the license for a DRM-protected content file in the PlayReady object of the content file itself. Because the license is stored (or embedded ) in the content file, it is immediately available, enabling a player application to decrypt and begin playing the content without first needing to complete the license acquisition process or check the HDS store. Samsung TV is able to parse and playback PlayReady media file which has Embedded License Security Version / Client Version / User-Agent If your license server checks the values of Security Version, Client Version, or User-Agent in the 8

9 license challenge request message before issuing license, you should add the following values in your accept list for Samsung TVs Products 2011 Products < SECURITYVERSION> < CLIENTVERSION> User-Agent WMDRM_DLA Windows-Media-DRM/ PlayReadyClient Note that the requirement of minimum security version is not necessary for devices. <SECURITYVERSION> corresponds to the robustness version of the PC client black box, and it is only meaningful when the client is PC application. Enforcing a minimum security version on PCs (includes Silverlight clients) is to ensure that in case of a PC breach only patched PC receive the content. For devices the value is not meaningful because in case of a breach the device certificate itself would have been revoked and the server will just not deliver a license Security Level Samsung Devices use Security Level 2000 certificates Delete License After acquiring a valid license from a license server, Samsung TVs store the license in the permanent storage in order not to perform the license acquisition process during the validity period. But, if you want to delete a license after playing a content using the license, you can use the SetPlayerProperty function. The license is deleted when the play is stopped. Please refer to section 4 for the detailed API usage. 9

10 4. API Guideline <object id="pluginplayer" border=0 classid="clsid:samsung-infolink-player"></object> <object id="pluginsefplayready" border=0 classid="clsid:samsung-infolink-sef"></object> The two objects shall be defined in HTML file for using pluginplayer and PluginSefPlayReady Products 2011 Products WMDRM10 WMDRM10 PlayReady Set Cookie SetPlayerProperty (1) O * O O Set User Custom Data SetPlayerProperty (3) X X O Changing License Server URL SetPlayerProperty (4) X O O Process Web Initiator ProcessInitiatorsFromUrl X X O ProcessInitiatorsFromXml Join/Leave Domain JoinDomain X X O LeaveDomain Delete License SetPlayerProperty (6) X O ** O ** * Supported after T-INFOLINK ** Supported after T-INFOLINK

11 4.1. PlayReady URL Format If you want to play PlayReady/WMDRM protected content, you should add predefined postfix COMPONENT=WMDRM to your original URL. var url = var playerplugin = document.getelementbyid("pluginplayer"); playerplugin.initplayer(url COMPONENT=WMDRM); playerplugin.startplayback(); 4.2. Set Cookie in HTTP Header You can use SetPlayerProperty before calling StartPlayback() function. playerplugin.initplayer(url COMPONENT=WMDRM); playerplugin.setplayerproperty (1, document.cookie, document.cookie.length); playerplugin.startplayback(); You can change the second and third parameters of SetPlayerProperty function to your custom data like DUID or tokens which is not an actual cookie set by Server. But, note that your license server finds the value in the cookie property in HTTP Header of license challenge message Set User Custom Data You can use SetPlayerProperty before calling StartPlayback() function. playerplugin.initplayer(url COMPONENT=WMDRM); playerplugin.setplayerproperty (3, customdata, customdata.length); playerplugin.startplayback(); 4.4. Changing License Server URL You can use SetPlayerProperty before calling StartPlayback() function. playerplugin.initplayer(url COMPONENT=WMDRM); playerplugin.setplayerproperty (4, serverurl, serverurl.length); playerplugin.startplayback(); 11

12 4.5. Process Web Initiators You can use ProcessInitiatorsFromUrl to pass the Web Initiator URL. Samsung TV sends HTTP GET Request to the url and parse the result. var url = ; SefPluginPlayReady = document.getelementbyid('pluginsefplayready'); SefPluginPlayReady.Open("PlayReadyDrm", "1.000", "PlayReadyDrm"); SefPluginPlayReady.Execute ( ProcessInitiatorsFromUrl, url); SefPluginPlayReady.Close (); Or, you can use ProcessInitiatorsFromXml to pass the xml string which complies with the XML Schema defined by PlayReady Technology. var xml = <?xml version=\ 1.0\ ; SefPluginPlayReady = document.getelementbyid('pluginsefplayready'); SefPluginPlayReady.Open("PlayReadyDrm", "1.000", "PlayReadyDrm"); SefPluginPlayReady.Execute ( ProcessInitiatorsFromXml, xml, xml.length); SefPluginPlayReady.Close (); 4.6. Join Domain You can use JoinDomain to join a specific domain. SefPluginPlayReady = document.getelementbyid('pluginsefplayready'); var certserver = " ; var serviceid = "{xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}"; var accountid = "{xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}"; var customdata = customdata ; SefPluginPlayReady = document.getelementbyid('pluginsefplayready'); SefPluginPlayReady.Open("PlayReadyDrm", "1.000", "PlayReadyDrm"); SefPluginPlayReady.Execute("JoinDomain", certserver, serviced, accounted, customdata, customdata.length); SefPluginPlayReady.Close (); 12

13 4.7. Leave Domain You can use LeaveDomain to leave a specific domain. SefPluginPlayReady = document.getelementbyid('pluginsefplayready'); var certserver = " ; var serviceid = "{xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}"; var accountid = "{xxxxxxxx-xxxx-xxxx-xxxx-xxxxxxxxxxxx}"; var customdata = customdata ; SefPluginPlayReady = document.getelementbyid('pluginsefplayready'); SefPluginPlayReady.Open("PlayReadyDrm", "1.000", "PlayReadyDrm"); SefPluginPlayReady.Execute("LeaveDomain", certserver, serviced, accounted, customdata, customdata.length); SefPluginPlayReady.Close (); 4.8. Delete License You can use SetPlayerProperty before calling StartPlayback() function. playerplugin.initplayer(url COMPONENT=WMDRM); playerplugin.setplayerproperty (6, NULL, 1); playerplugin.startplayback(); 13

Developing PlayReady Clients

Developing PlayReady Clients April 2015 Abstract Microsoft PlayReady is the premier platform for protection and distribution of digital content. This white paper provides an overview of the PlayReady product suite and discusses PlayReady

More information

Content Protection in Silverlight. Microsoft Corporation

Content Protection in Silverlight. Microsoft Corporation Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting

More information

SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com

SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com SmartTV User Interface Development for SmartTV using Web technology and CEA2014. George Sarosi george.sarosi@twcable.com Abstract Time Warner Cable is the second largest Cable TV operator in North America

More information

Getting Started Guide for Developing tibbr Apps

Getting Started Guide for Developing tibbr Apps Getting Started Guide for Developing tibbr Apps TABLE OF CONTENTS Understanding the tibbr Marketplace... 2 Integrating Apps With tibbr... 2 Developing Apps for tibbr... 2 First Steps... 3 Tutorial 1: Registering

More information

Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3

Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3 Open-Xchange Authentication & Session Handling Table of Contents 1.Introduction...3 2.System overview/implementation...4 2.1.Overview... 4 2.1.1.Access to IMAP back end services...4 2.1.2.Basic Implementation

More information

Using SAML for Single Sign-On in the SOA Software Platform

Using SAML for Single Sign-On in the SOA Software Platform Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software

More information

Usage of Evaluate Client Certificate with SSL support in Mediator and CentraSite

Usage of Evaluate Client Certificate with SSL support in Mediator and CentraSite Usage of Evaluate Client Certificate with SSL support in Mediator and CentraSite Introduction Pre-requisite Configuration Configure keystore and truststore Asset Creation and Deployment Troubleshooting

More information

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław

Computer Networks. Lecture 7: Application layer: FTP and HTTP. Marcin Bieńkowski. Institute of Computer Science University of Wrocław Computer Networks Lecture 7: Application layer: FTP and Marcin Bieńkowski Institute of Computer Science University of Wrocław Computer networks (II UWr) Lecture 7 1 / 23 Reminder: Internet reference model

More information

Network Technologies

Network Technologies Network Technologies Glenn Strong Department of Computer Science School of Computer Science and Statistics Trinity College, Dublin January 28, 2014 What Happens When Browser Contacts Server I Top view:

More information

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT)

Internet Technologies. World Wide Web (WWW) Proxy Server Network Address Translator (NAT) Internet Technologies World Wide Web (WWW) Proxy Server Network Address Translator (NAT) What is WWW? System of interlinked Hypertext documents Text, Images, Videos, and other multimedia documents navigate

More information

The HTTP Plug-in. Table of contents

The HTTP Plug-in. Table of contents Table of contents 1 What's it for?... 2 2 Controlling the HTTPPlugin... 2 2.1 Levels of Control... 2 2.2 Importing the HTTPPluginControl...3 2.3 Setting HTTPClient Authorization Module... 3 2.4 Setting

More information

A Java proxy for MS SQL Server Reporting Services

A Java proxy for MS SQL Server Reporting Services 1 of 5 1/10/2005 9:37 PM Advertisement: Support JavaWorld, click here! January 2005 HOME FEATURED TUTORIALS COLUMNS NEWS & REVIEWS FORUM JW RESOURCES ABOUT JW A Java proxy for MS SQL Server Reporting Services

More information

Adaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011

Adaptive HTTP streaming and HTML5. 1 Introduction. 1.1 Netflix background. 1.2 The need for standards. W3C Web and TV Workshop, 8-9 February 2011 W3C Web and TV Workshop, 8-9 February 2011 Adaptive HTTP streaming and HTML5 Mark Watson, Netflix Inc. 1 Introduction 1.1 Netflix background Netflix is a leading provider of streaming video services in

More information

Protecting Premium Live TV Services with PlayReady

Protecting Premium Live TV Services with PlayReady Protecting Premium Live TV Services with PlayReady April 2015 Abstract Microsoft PlayReady is the premier platform for the protection and distribution of digital content. This white paper discusses PlayReady

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

Fairsail REST API: Guide for Developers

Fairsail REST API: Guide for Developers Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,

More information

T-BOX MY MEDIA WINDOWS 7 QUICK START GUIDE

T-BOX MY MEDIA WINDOWS 7 QUICK START GUIDE T-BOX MY MEDIA WINDOWS 7 QUICK START GUIDE ABOUT MY MEDIA My Media allows you to play music, watch videos and view photos on a TV connected to your T-Box. Accessing your media files can be done in two

More information

ZODIANET API (ZAPI2)

ZODIANET API (ZAPI2) ZODIANET API (ZAPI2) ZODIANET API ZAPI 2 Description of information exchange between the Zodianet platform and third-parties Document : specification Source: ZODIANET Mail: support@zodianet.com Revision:

More information

DNS Update API November 15, 2006 Version 2.0.3

DNS Update API November 15, 2006 Version 2.0.3 DNS Update API November 15, 2006 Version 2.0.3 Dynamic Network Services, Inc. phone: +1-603-668-4998 1230 Elm Street, Fifth Floor fax: +1-603-668-6474 Manchester, NH 03101 www.dyndns.com Table of Contents

More information

CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2. Author: Foster Moore Date: 20 September 2011 Document Version: 1.7

CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2. Author: Foster Moore Date: 20 September 2011 Document Version: 1.7 CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2 Author: Foster Moore Date: 20 September 2011 Document Version: 1.7 Level 6, Durham House, 22 Durham Street West PO Box 106857, Auckland City Post Shop, Auckland

More information

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided

More information

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001 Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance

More information

HireDesk API V1.0 Developer s Guide

HireDesk API V1.0 Developer s Guide HireDesk API V1.0 Developer s Guide Revision 1.4 Talent Technology Corporation Page 1 Audience This document is intended for anyone who wants to understand, and use the Hiredesk API. If you just want to

More information

vcloud Air Platform Programmer's Guide

vcloud Air Platform Programmer's Guide vcloud Air Platform Programmer's Guide vcloud Air OnDemand 5.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Title page. Alcatel-Lucent 5620 SERVICE AWARE MANAGER 13.0 R7

Title page. Alcatel-Lucent 5620 SERVICE AWARE MANAGER 13.0 R7 Title page Alcatel-Lucent 5620 SERVICE AWARE MANAGER 13.0 R7 APPLICATION API DEVELOPER GUIDE 3HE-10590-AAAA-TQZZA Issue 1 December 2015 Legal notice Legal notice Alcatel, Lucent, Alcatel-Lucent and the

More information

Using SQL-server as database engine

Using SQL-server as database engine This tutorial explains on a step by step base how to configure YDOC-Insights for usage with a SQL-server database. (How to manage SQL-server itself is not part of this tutorial) CONTENTS CONTENTS 1 1.

More information

Microsoft Smooth Streaming

Microsoft Smooth Streaming Microsoft Smooth Streaming for SelenioFlex Ingest August 2015 for SelenioFlex Ingest Publication Information 2015 Imagine Communications Corp. Proprietary and Confidential. Imagine Communications considers

More information

Abusing the Internet of Things. BLACKOUTS. FREAKOUTS. AND STAKEOUTS. @nitesh_dhanjani

Abusing the Internet of Things. BLACKOUTS. FREAKOUTS. AND STAKEOUTS. @nitesh_dhanjani 2014 Abusing the Internet of Things. BLACKOUTS. FREAKOUTS. AND STAKEOUTS. @nitesh_dhanjani We are going to depend on IoT devices for our privacy and physical security at work and at home. Vulnerabilities

More information

Building WebRTC Solutions with the Avaya WebRTC Collaboration Environment Snap-in. Joel Ezell Lead Architect, Collaboration Environment R&D

Building WebRTC Solutions with the Avaya WebRTC Collaboration Environment Snap-in. Joel Ezell Lead Architect, Collaboration Environment R&D Building WebRTC Solutions with the WebRTC Collaboration Environment Snap-in Joel Ezell Lead Architect, Collaboration Environment R&D Use Cases for Collaboration Environment 3.0 WebRTC Outbound only Click

More information

2015-11-30. Web Based Single Sign-On and Access Control

2015-11-30. Web Based Single Sign-On and Access Control 0--0 Web Based Single Sign-On and Access Control Different username and password for each website Typically, passwords will be reused will be weak will be written down Many websites to attack when looking

More information

VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE. Summary. Distribution and Installation

VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE. Summary. Distribution and Installation VISA SECURITY ALERT December 2015 KUHOOK POINT OF SALE MALWARE Distribution: Merchants, Acquirers Who should read this: Information security, incident response, cyber intelligence staff Summary Kuhook

More information

Centrify Mobile Authentication Services

Centrify Mobile Authentication Services Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

Portals and Hosted Files

Portals and Hosted Files 12 Portals and Hosted Files This chapter introduces Progress Rollbase Portals, portal pages, portal visitors setup and management, portal access control and login/authentication and recommended guidelines

More information

Online Data Services. Security Guidelines. Online Data Services by Esri UK. Security Best Practice

Online Data Services. Security Guidelines. Online Data Services by Esri UK. Security Best Practice Online Data Services Security Guidelines Online Data Services by Esri UK Security Best Practice 28 November 2014 Contents Contents... 1 1. Introduction... 2 2. Data Service Accounts, Security and Fair

More information

Qualys API Limits. July 10, 2014. Overview. API Control Settings. Implementation

Qualys API Limits. July 10, 2014. Overview. API Control Settings. Implementation Qualys API Limits July 10, 2014 Overview The Qualys API enforces limits on the API calls a customer can make based on their subscription settings, starting with Qualys version 6.5. The limits apply to

More information

App Orchestration 2.0

App Orchestration 2.0 App Orchestration 2.0 Configuring NetScaler Load Balancing and NetScaler Gateway for App Orchestration Prepared by: Christian Paez Version: 1.0 Last Updated: December 13, 2013 2013 Citrix Systems, Inc.

More information

Crowbar: New generation web application brute force attack tool

Crowbar: New generation web application brute force attack tool Crowbar: New generation web application brute force attack tool 1 Tables of contents Introduction... 3 Challenges with brute force attacks... 3 Crowbar a fresh approach... 3 Other applications of crowbar...

More information

Objective. Page 1 Xcontrol Mobile Entertainment Content Protection

Objective. Page 1 Xcontrol Mobile Entertainment Content Protection Xcontrol Mobile Entertainment Content Protection Objective The mobile entertainment solution distributes written content, video and audio over a wireless infrastructure. The targeted devices are brought

More information

How To Use Cmk On An Ipa (Intralinks) On A Pc Or Mac Mac (Apple) On An Iphone Or Ipa On A Mac Or Ipad (Apple Mac) On Pc Or Ipat (Apple

How To Use Cmk On An Ipa (Intralinks) On A Pc Or Mac Mac (Apple) On An Iphone Or Ipa On A Mac Or Ipad (Apple Mac) On Pc Or Ipat (Apple Intralinks Customer Managed Keys Technical Overview Version 2.0 October 2014 Copyright 2014 Intralinks, Inc. 1 Intralinks Customer Managed Keys, Technical Overview January 5, 2015 About This Document...

More information

DJIGZO EMAIL ENCRYPTION. Djigzo white paper

DJIGZO EMAIL ENCRYPTION. Djigzo white paper DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or

More information

Chapter 6 Virtual Private Networking Using SSL Connections

Chapter 6 Virtual Private Networking Using SSL Connections Chapter 6 Virtual Private Networking Using SSL Connections The FVS336G ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN provides a hardwarebased SSL VPN solution designed specifically to provide

More information

for Java developers Building Mobile Applications Introduction 1 Building Mobile Applications

for Java developers Building Mobile Applications Introduction 1 Building Mobile Applications Introduction Building Mobile Applications for Java developers Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted,

More information

Protected PDF Common Installation Issues

Protected PDF Common Installation Issues Protected PDF Common Installation Issues July 14, 2011 Version 1.1 TABLE OF CONTENTS Basic Instructions for Readers ------------------------------------------------------------------------- 2 Common Questions

More information

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.

Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache. JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming

More information

Certified Secure Web Application Secure Development Checklist

Certified Secure Web Application Secure Development Checklist www.certifiedsecure.com info@certifiedsecure.com Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands About Certified Secure Checklist Certified Secure exists to encourage and fulfill

More information

AIRTEL INDIA OPEN API. Application Developer Guide for OAuth2 Authentication and Authorization. Document Version 1.1

AIRTEL INDIA OPEN API. Application Developer Guide for OAuth2 Authentication and Authorization. Document Version 1.1 AIRTEL INDIA OPEN API Application Developer Guide for OAuth2 Authentication and Authorization Document Version 1.1 This Application Developer Guide has been prepared for Airtel India. Copyright Intel Corporation

More information

JASPERREPORTS SERVER WEB SERVICES GUIDE

JASPERREPORTS SERVER WEB SERVICES GUIDE JASPERREPORTS SERVER WEB SERVICES GUIDE RELEASE 5.0 http://www.jaspersoft.com JasperReports Server Web Services Guide Copyright 2012 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft,

More information

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices

More information

Kaltura s Digital Rights Management (DRM) Service with Widevine Setup and Workflow Guide. Version: Gemini

Kaltura s Digital Rights Management (DRM) Service with Widevine Setup and Workflow Guide. Version: Gemini Kaltura s Digital Rights Management (DRM) Service with Widevine Setup and Workflow Guide Version: Gemini Kaltura Business Headquarters 5 Union Square West, Suite 602, New York, NY, 10003, USA Tel.: +1

More information

June 29, 2015. Subject: Class 3

June 29, 2015. Subject: Class 3 Ms. Jacqueline Charlesworth General Counsel and Associate Register of Copyrights U.S. Copyright Office Library of Congress 101 Independence Ave., SE Washington, DC 20559 Re: June 29, 2015 Docket No. 2014-7

More information

Fragmented MPEG-4 Technology Overview

Fragmented MPEG-4 Technology Overview Fragmented MPEG-4 Technology Overview www.mobitv.com 6425 Christie Ave., 5 th Floor Emeryville, CA 94607 510.GET.MOBI HIGHLIGHTS Mobile video traffic is increasing exponentially. Video-capable tablets

More information

Acrobat Connect. Using Connect Enterprise Web Services

Acrobat Connect. Using Connect Enterprise Web Services Acrobat Connect Using Connect Enterprise Web Services 2007 Adobe Systems Incorporated. All rights reserved. Using Adobe Connect Enterprise Web Services If this guide is distributed with software that includes

More information

Lecture Notes for Advanced Web Security 2015

Lecture Notes for Advanced Web Security 2015 Lecture Notes for Advanced Web Security 2015 Part 6 Web Based Single Sign-On and Access Control Martin Hell 1 Introduction Letting users use information from one website on another website can in many

More information

Cisco Unified Workforce Optimization

Cisco Unified Workforce Optimization Cisco Unified Workforce Optimization Desktop Requirements Guide Version 10.5 First Published: June 18, 2014 Last Updated: March 6, 2015 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS

More information

CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper

CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in

More information

Adobe Access April 2014. Version 4.0. Overview

Adobe Access April 2014. Version 4.0. Overview Adobe Access April 2014 Version 4.0 Overview Copyright 2012-2014 Adobe Systems Incorporated. All rights reserved. This guide is protected under copyright law, furnished for informational use only, is subject

More information

BarTender Integration Methods. Integrating BarTender s Printing and Design Functionality with Your Custom Application WHITE PAPER

BarTender Integration Methods. Integrating BarTender s Printing and Design Functionality with Your Custom Application WHITE PAPER BarTender Integration Methods Integrating BarTender s Printing and Design Functionality with Your Custom Application WHITE PAPER Contents Introduction 3 Integrating with External Data 4 Importing Data

More information

OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900

OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4

More information

Chapter 5 Configuring the Remote Access Web Portal

Chapter 5 Configuring the Remote Access Web Portal Chapter 5 Configuring the Remote Access Web Portal This chapter explains how to create multiple Web portals for different users and how to customize the appearance of a portal. It describes: Portal Layouts

More information

Creating a generic user-password application profile

Creating a generic user-password application profile Chapter 4 Creating a generic user-password application profile Overview If you d like to add applications that aren t in our Samsung KNOX EMM App Catalog, you can create custom application profiles using

More information

Connected Data. Connected Data requirements for SSO

Connected Data. Connected Data requirements for SSO Chapter 40 Configuring Connected Data The following is an overview of the steps required to configure the Connected Data Web application for single sign-on (SSO) via SAML. Connected Data offers both IdP-initiated

More information

CA APM Cloud Monitor. Scripting Guide. Release 8.2

CA APM Cloud Monitor. Scripting Guide. Release 8.2 CA APM Cloud Monitor Scripting Guide Release 8.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for

More information

Secure XML API Integration Guide. (with FraudGuard add in)

Secure XML API Integration Guide. (with FraudGuard add in) Secure XML API Integration Guide (with FraudGuard add in) Document Control This is a control document DESCRIPTION Secure XML API Integration Guide (with FraudGuard add in) CREATION DATE 02/04/2007 CREATED

More information

2X HTML5 Gateway v10.6

2X HTML5 Gateway v10.6 2X HTML5 Gateway v10.6 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords

Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password

More information

Using ADOBE CONNECT 8 Web Services

Using ADOBE CONNECT 8 Web Services Using ADOBE CONNECT 8 Web Services Copyright 2010 Adobe Systems Incorporated. All rights reserved. Using Adobe Connect 8 Web Services This user guide is protected under copyright law, furnished for informational

More information

000-284. Easy CramBible Lab DEMO ONLY VERSION 000-284. Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0

000-284. Easy CramBible Lab DEMO ONLY VERSION 000-284. Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0 Easy CramBible Lab 000-284 Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0 ** Single-user License ** This copy can be only used by yourself for educational purposes Web: http://www.crambible.com/

More information

Riverbed Cascade Shark Common REST API v1.0

Riverbed Cascade Shark Common REST API v1.0 Riverbed Cascade Shark Common REST API v1.0 Copyright Riverbed Technology Inc. 2015 Created Feb 1, 2015 at 04:02 PM Contents Contents Overview Data Encoding Resources information: ping information: list

More information

THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6

THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6 The Proxy Server THE PROXY SERVER 1 1 PURPOSE 3 2 USAGE EXAMPLES 4 3 STARTING THE PROXY SERVER 5 4 READING THE LOG 6 2 1 Purpose The proxy server acts as an intermediate server that relays requests between

More information

CONTENT PROTECTION DEVELOPER GUIDE

CONTENT PROTECTION DEVELOPER GUIDE CONTENT PROTECTION DEVELOPER GUIDE CONTENTS CONTENT PROTECTION OVERVIEW 5 Protecting Your Content 5 Gauging The Necessary Protection 5 Survey of Content Protection Technology 6 Protected Streams 7 Playback

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Multimedia Playback & Streaming

Multimedia Playback & Streaming Multimedia Playback & Streaming Shadab Rashid Jam 16 September 28 th, 2012 What are you interested in? Making multimedia apps for Consuming Audio/Video Dealing with content providers, looking for An application/client

More information

Developer Guide: REST API Applications. SAP Mobile Platform 2.3 SP03

Developer Guide: REST API Applications. SAP Mobile Platform 2.3 SP03 Developer Guide: REST API Applications SAP Mobile Platform 2.3 SP03 DOCUMENT ID: DC01926-01-0233-01 LAST REVISED: September 2013 Copyright 2013 by Sybase, Inc. All rights reserved. This publication pertains

More information

How to Integrate Camera Live View into Web Application?

How to Integrate Camera Live View into Web Application? ACTi Knowledge Base Category: Installation & Configuration Note Sub-category: Integration Model: All Firmware: N/A Software: N/A Author: Published: 2009/12/30 Reviewed: 2011/11/30 How to Integrate Camera

More information

IBM WebSphere Application Server

IBM WebSphere Application Server IBM WebSphere Application Server OAuth 2.0 service provider and TAI 2012 IBM Corporation This presentation describes support for OAuth 2.0 included in IBM WebSphere Application Server V7.0.0.25. WASV70025_OAuth20.ppt

More information

InternetVista Web scenario documentation

InternetVista Web scenario documentation InternetVista Web scenario documentation Version 1.2 1 Contents 1. Change History... 3 2. Introduction to Web Scenario... 4 3. XML scenario description... 5 3.1. General scenario structure... 5 3.2. Steps

More information

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview

Protocolo HTTP. Web and HTTP. HTTP overview. HTTP overview Web and HTTP Protocolo HTTP Web page consists of objects Object can be HTML file, JPEG image, Java applet, audio file, Web page consists of base HTML-file which includes several referenced objects Each

More information

DualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited

DualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited DualShield for Implementation Guide (Version 5.2) Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks DualShield Unified Authentication, MobileID,

More information

ICE Futures Europe. AFTS Technical Guide for Large Position Reporting V1.0

ICE Futures Europe. AFTS Technical Guide for Large Position Reporting V1.0 ICE Futures Europe AFTS Technical Guide for Large Position Reporting V1.0 ICE FUTURES EUROPE Page 1 of 7 Contents 1. Introduction... 3 2. Online access to Clearing Systems... 4 3. Uploading Data... 5 4.

More information

API documentation - 1 -

API documentation - 1 - API documentation - 1 - Table of Contents 1. Introduction 1.1. What is an API 2. API Functions 2.1. Purge list of files 2.1.1 Description 2.1.2 Implementation 2.2. Purge of whole cache (all files on all

More information

XML Processing and Web Services. Chapter 17

XML Processing and Web Services. Chapter 17 XML Processing and Web Services Chapter 17 Textbook to be published by Pearson Ed 2015 in early Pearson 2014 Fundamentals of http://www.funwebdev.com Web Development Objectives 1 XML Overview 2 XML Processing

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright

More information

Safexpert Installation instructions MS SQL Server 2008 R2

Safexpert Installation instructions MS SQL Server 2008 R2 Safexpert Installation instructions MS SQL Server 2008 R2 Version: 22.06.2012 IBF-Automatisierungs-und Sicherheitstechnik GmbH A-6682 Vils Bahnhofstraße 8 Tel.: +43 (0) 5677 5353 0 E-mail: office@ibf.at

More information

Installing BankID Security Application in corporate environments

Installing BankID Security Application in corporate environments Installing BankID Security Application in corporate environments 2015-06-16 Installing BankID Security Application in corporate environments Version: 2.5 Date: 2015-06-16 Installing BankID Security Application

More information

HTTP Protocol. Bartosz Walter <Bartek.Walter@man.poznan.pl>

HTTP Protocol. Bartosz Walter <Bartek.Walter@man.poznan.pl> HTTP Protocol Bartosz Walter Agenda Basics Methods Headers Response Codes Cookies Authentication Advanced Features of HTTP 1.1 Internationalization HTTP Basics defined in

More information

FastPass Password Manager

FastPass Password Manager FastPass Password Manager Version 3.4 FastPass in Thin Clients environments Document Title FastPass in Thin Clients environments Document Classification Public Document Revision B Document Status Final

More information

Load testing with. WAPT Cloud. Quick Start Guide

Load testing with. WAPT Cloud. Quick Start Guide Load testing with WAPT Cloud Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. 2007-2015 SoftLogica

More information

Getting Started with the icontact API

Getting Started with the icontact API Getting Started with the icontact API Contents - Introduction -... 2 - URIs, URLs, Resources, and Supported Actions -... 3 Contacts Category... 3 Messages Category... 4 Track Category... 4 GET... 5 POST...

More information

Centrify Mobile Authentication Services for Samsung KNOX

Centrify Mobile Authentication Services for Samsung KNOX Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under

More information

Fundamentals of Web Programming a

Fundamentals of Web Programming a Fundamentals of Web Programming a Universal Description, Discovery, and Integration Teodor Rus rus@cs.uiowa.edu The University of Iowa, Department of Computer Science a Copyright 2009 Teodor Rus. These

More information

DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES

DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES DNS REBINDING DENIS BARANOV, POSITIVE TECHNOLOGIES TABLE OF CONTENTS 1 Bypassing The Restrictions 3 2 Putting It into Practice 5 3 Actual Load 7 4 Detection Of The Application Version 5 Guessing A/The

More information

The Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server:

The Web: some jargon. User agent for Web is called a browser: Web page: Most Web pages consist of: Server for Web is called Web server: The Web: some jargon Web page: consists of objects addressed by a URL Most Web pages consist of: base HTML page, and several referenced objects. URL has two components: host name and path name: User agent

More information

Development Techniques for Native/Hybrid Tizen Apps. Presenter Matti Pakarinen

Development Techniques for Native/Hybrid Tizen Apps. Presenter Matti Pakarinen Development Techniques for Native/Hybrid Tizen Apps Presenter Matti Pakarinen 1 Content Symphony Teleca in Brief Introduction to Native/Hybrid Apps Key experiences Case Studies 2 Who we are Symphony Teleca

More information

Wowza Media Systems provides all the pieces in the streaming puzzle, from capture to delivery, taking the complexity out of streaming live events.

Wowza Media Systems provides all the pieces in the streaming puzzle, from capture to delivery, taking the complexity out of streaming live events. Deciding what event you want to stream live that s the easy part. Figuring out how to stream it? That s a different question, one with as many answers as there are options. Cameras? Encoders? Origin and

More information

Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2

Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2 Alcatel-Lucent Multiscreen Video Platform RELEASE 2.2 Enrich the user experience and build more valuable customer relationships by delivering personal, seamless and social multiscreen video services Embrace

More information

HP Business Process Monitor

HP Business Process Monitor HP Business Process Monitor For the Windows operating system Software Version: 9.23 BPM Monitoring Solutions Best Practices Document Release Date: December 2013 Software Release Date: December 2013 Legal

More information

AccountView. Single Sign-On Guide

AccountView. Single Sign-On Guide AccountView Single Sign-On Guide 2014 Morningstar. All Rights Reserved. AccountView Version: 1.4 Document Version: 2 Document Issue Date: March 09, 2013 Technical Support: (866) 856-4951 Telephone: (781)

More information