SINGLE SIGN-ON FOR WEBINTELLIGENCE

Size: px
Start display at page:

Download "SINGLE SIGN-ON FOR WEBINTELLIGENCE"

Transcription

1 SINGLE SIGN-ON FOR WEBINTELLIGENCE Single sign-on, or simply SSO, is an emerging technology that is widely popular. It has the ability to log in once, and be authenticated to access all the applications and resources of the organization. With a growth in demand for a variety of e-business applications, they are becoming more and more sophisticated, with complex functional and technical requirements. Although new trends in e-business application development have made the development simple, the issues of integrating the applications with other applications or the existing e-business infrastructure are not trivial. The ideal and efficient solution to address these issues is an effective SSO strategy. Single sign-on is imperative to any organization that has a variety of disparate applications and resources. Organizations implementing single sign-on have realized the benefits, in terms of improved user productivity and simplified administration resulting in reduction of administrative costs. Although, a coherent a single sign-on framework has far reaching benefits, it can be difficult, time-consuming and expensive to retrofit to existing applications. Moreover, with security being non-negotiable, the emphasis on a robust single sign-on strategy has increased. WHITE PAPER This white paper describes a single sign-on framework WebIntelligence. The paper addresses the Integration of an e- business application that is built on a tool like WebIntelligence with other applications or the existing e-business infrastructure posing various technical challenges and issues. Although the single sign-on solution discussed in the paper has single signon for WebIntelligence as the central theme, the solution is generic in terms of single sign-on. The paper can serve as a guideline for any SSO implementation. The paper describes the best practices, including the issues and challenges that single sign-on implementation brings to organizations with distributed, diverse applications and technologies. KALAMALLA M BASHA, GOPI VENKAPPA HOMBAL

2 Table of Contents INTRODUCTION... 3 SITEMINDER OVERVIEW... 3 WEBINTELLIGENCE OVERVIEW... 5 J2EE OVERVIEW... 6 USER FRAMEWORK... 7 SECURITY FRAMEWORK... 8 INTERFACE FRAMEWORK... 9 SSO IMPLEMENTATION FOR WEBINTELLIGENCE... 9 SSO WITH WEBINTELLIGENCE AND SITEMINDER WEBINTELLIGENCE OVER INTERNET KNOWN ISSUES FURTHER IMPROVEMENTS CONCLUSION ACRONYMS REFERENCES ABOUT THE AUTHORS ABOUT WIPRO TECHNOLOGIES WIPRO IN DATA WAREHOUSING AND BUSINESS INTELLIGENCE Page: Table of Contents

3 INTRODUCTION There are abundant reasons and advantages for a corporate to choose single sign-on (SSO). This may be to get rid off multiple passwords for different e-business applications, to succeed in saving users and developers from the issues of site membership and to provide increased security. However, the basic reason for implementing SSO is that a single identity serves numerous applications. Applications that lack SSO result in lost productivity and compromised security to the end-users. Efficient SSO can be very complex and a challenging task to implement for vendors and corporates as well. Numerous applications and users form an e-business infrastructure and each application in the e-business infrastructure defines a list of users to access them. The result is a multitude of users, with different roles and responsibilities. Users can range from database administrators to application developers, security officers and database users. The main objective of the paper is to provide a methodology to integrate users in WebIntelligenceâ with users in the e-business infrastructure for the purpose of achieving single sign-on. The integration discussed here is based on the knowledge and experience gained by implementation of SSO for WebIntelligence in a very large enterprise. First, the paper provides an overview of the technology required to integrate WebIntelligence for the purpose of achieving single sign-on. SiteMinderâ is used to create a centrally managed environment that provides a secure and personalized user experience across the e-business infrastructure. J2EE defines the standard for multi-tier enterprise applications. It also discusses certain aspects of WebIntelligence that are pivotal for achieving SSO. Next, the paper attempts to present a framework that can be a starting point for achieving SSO for WebIntelligence. The framework is classified based on the three important facets of any e-business infrastructure, that is, users, security and userinterface. A proper user framework, a robust and reliable security framework, and seamlessly integrated and standardized interface framework is essential for any SSO implementation. Last, the paper discusses various mechanisms for achieving single sign-on for WebIntelligence. The different approaches discussed are based on the complexity of the e-business infrastructure. The first approach, discusses integration of WebIntelligence with another e-business application. The second discusses achievement of single sign-on for WebIntelligence and e-business applications across the enterprise. The last and the most complicated approach is the deployment of WebIntelligence over the Internet. Each of these approaches add more value to the achievement of single sign-on as an enterprise moves from integration of disparate applications to a centrally managed and integrated e-business infrastructure. Also, this paper attempts to bring out certain tool limitations that may lead to potential failure of SSO. It also discusses certain further improvements on the existing approaches that make the SSO more secure and robust. The paper concludes with a discussion on issues and challenges that are to be addressed for successful implementation of single sign-on. SITEMINDER OVERVIEW SiteMinder enables enterprises to manage user identity and entitlement information in a centralized security infrastructure. The SiteMinder platform of shared services is managed through a rules based policy engine, which enables administrators to define policies that the SiteMinder platform will use to deliver services such as single sign-on, authentication management, entitlement management and auditing. Wipro Technologies Page: 03 of 17

4 SiteMinder installation consists of two primary components: 1. The SiteMinder policy server - The policy server is an NT or UNIX-based server that provides the following services: Policy-based user management Secure portal management Authentication services Authorization services User registration services Password services Session management Auditing services The SiteMinder Agent - The agent integrates with Web servers, Web application servers, or custom applications to enforce security and user management functions based on pre-defined policies. SiteMinder supports the following types of Agents: Web agents Application server agents Affiliate agents Custom agents RADIUS devices HR/ Pay Roll Finance Employees Mail Server Users Corporate Web Server SM Web Agent J2EE Application Database LDAP SQL RDBMS NT Domain Sales Customers SM Policy Server Figure 1: A centralized security infrastructure with SiteMinder Wipro Technologies Page: 04 of 17

5 WEBINTELLIGENCE OVERVIEW The WebIntelligence system is the infrastructure on which the Business Objects distributed solution relies. This solution gives business users the ability to access, analyze and share information in intranet, Internet, and e-business environments. From an administration standpoint, it provides IT departments with the tools they need to effectively control and manage enterprisewide user access. WebIntelligence distributed component architecture and light query applets available in either Java or ActiveX, eliminating the need for client-side installation and maintenance of application software and database middleware. WebIntelligence works with the most popular HTTP servers and application servers. WebIntelligence is a CORBA service that can be triggered by different server-side technologies like ASP and JSP. The WebIntelligence architecture consists of three specific areas: The client: The Web browser, which provides the gateway to the WebIntelligence system. The middle tier: Comprises the HTTP server and WebIntelligence system components, linked together by CORBA calls in a distributed CORBA environment. Database components: Comprises the repository and corporate database. This is where much of the data is stored, and where system security is controlled. Client HTTP Web Server DWH Java Container WISDK WebIntelligence BO Repository Figure 2: Stand-alone WebIntelligence system Wipro Technologies Page: 05 of 17

6 J2EE OVERVIEW J2EE defines the standard for developing multi-tier enterprise applications. J2EE specifications provide the frame of reference for components that can be used, extended and combined to deliver robust enterprise application. These applications require access to a set of services. Typical services included transaction processing, database access, corporate mail, messaging service and others. The J2EE architecture unifies such services in its enterprise service APIs. J2EE takes advantage of many features like write once, run anywhere, portability and scalability. Another advantage of the J2EE is that the application model encapsulates the layers of functionality in specific types of components. Business logic is encapsulated in Enterprise JavaBeans (EJB) components. Client interaction is presented through plain HTML Web pages, through Web pages powered by applets, Java Servlets, or JavaServer Pages technology, or through stand-alone Java applications. Components communicate transparently using various standards: HTTP, SSL, RMI, IIOP, and others. HTTP Web Server JNDI API Directory Service HTTP/ HTTPS Web Component JavaMail API Client EJB Component Java Component J2EE Container Application Server JDBC API Mail Server RDBMS Figure 3: J2EE overview Wipro Technologies Page: 06 of 17

7 J2EE application model divides enterprise applications into three fundamental parts: components, containers, and connectors. Components are the key focus of application developers, containers are system vendors specific and connectors conceal complexity and promote portability. Figure 3 illustrates a simple J2EE application accessing different applications. USER FRAMEWORK To understand the intricacies of SSO implementation, it is essential to explore the user framework. Generally, in a corporate, the magnitude of users is normally high, the applications are more distributed and efficient user management is a complex task. Directory services such as LDAP (the Lightweight Directory Access Protocol) address these difficulties. Figure 4 illustrates a simple user framework with a centralized directory service that serves distributed applications. In a distributed environment, a directory service manages a directory of entries in tree structure. An entry can refer to a person, place, service, or any other concrete object or abstract concept. An entry also has attributes associated with one or more values. These attributes describe the entry, and the exact set of attributes depends on the type of the entry. Each entry is uniquely identified by a distinguished name. A distinguished name consists of a name that uniquely identifies the entry at that hierarchical level and a path of names that trace the entry back to the root of the tree. For example, it might be the distinguished name for xyz entry. The schematic hierarchy of a directory service is shown in Figure 5. The user framework is tricky as BO stores user-information in a way different to LDAP. The users in BO are defined within the scope of the application and are stored in a repository installed on RDBMS. Moreover, the users in BO are independent of users in LDAP, to integrate these users into single entities; LDAP offers attributes with value attached to it. These attributes identify the user-role for the WebIntelligence application in LDAP, essentially each user-entity is defined twice once in LDAP and once in BO. The password authentication is not an issue as WebIntelligence in basic authentication mode ignores the BO password and authentication is managed within LDAP. However, later versions of WebIntelligence provide a mechanism to synchronize users in Business Objects with users in LDAP. SAP / PAY Rool Directory Service J2EE Application SiteMinder Policy Server Mail Server Figure 4: Corporate domain Wipro Technologies Page: 07 of 17

8 dn: o=wipro.com dn: ou=people, o=wipro.com dn: ou=groups, o=wipro.com dn: ou=admin, o=wipro.com dn: uid=xyz, ou=people, o=wirpo.com cn: xyz mail: telephone Number: uid:xyz Figure 5: LDAP directory service hierarchy SECURITY FRAMEWORK Once the user roles are set up, the next task is to integrate WebIntelligence in a security framework. WebIntelligence is CORBA (Common Object Request Broker Architecture) service installed along with a HTTP Web server. WebIntelligence in basic authentication scheme has only simple user authentication. This security anomaly has to be addressed in a robust, yet reliable security framework. There are several aspects to the security framework that makes it unique. First factor is to integrate WebIntelligence with protected resources in other realms in a security framework. WebIntelligence interface is created as a web-context in a Web server and in SiteMinder. Policies are created for all the protected resources including WebIntelligence Web-context in SiteMinder policy server. Each request to WebIntelligence is validated in SiteMinder to determine whether or not the user has access to WebIntelligence. A second factor is to provide protected resources with different authentication schemes. Since WebIntelligence is in basic authentication scheme that is different from authentication schemes in other resources, it is necessary to assign different protection levels to different authentication schemes. SM enables administrators to implement this authentication schemes with additional measure of security and flexibility for an SSO environment. In addition, the ability to create and centrally manage models of access control for physical HTTP resources, as well as the ability to create and centrally manage application-specific authorizations on behalf of the user context and the ability to create and centrally manage a N-level model of delegation for LDAP directories are functions of the security framework. Wipro Technologies Page: 08 of 17

9 INTERFACE FRAMEWORK Applications with different user interfaces have become a reality. Although the content of these applications conform to a set of specifications, the user-interfaces are unique to each other. Providing a common user interface to different applications that results in a seamless presentation of the content in its uses, activities, and interactions is an aspect of SSO implementation. There are several factors to a common user-interface. The user experience is an important element of the interface framework; the approach is to provide a common look and feel for user across applications. All applications including WebIntelligence are standardized on a set of user interface guidelines. In addition, interface framework also takes care of the reading input parameters from e-business applications. These parameters are read from HTTP header or a form based request or a query string. SSO IMPLEMENTATION FOR WEBINTELLIGENCE WebIntelligence provides tight security required to protect data. By leveraging the existing Business Objects security infrastructure and using an architecture designed to work with standard authentication methods, the system provides access to corporate data only to users with the appropriate authorization. WebIntelligence provides four different authentication schemes for identifying users and controlling access to them. NT challenge/response (for Windows-only clusters) Basic authentication Business Objects standard No authentication The main characteristics of these methods are summarized in the table below: Method Security Browser Prompt NT Challenge/ Response High Internet Explorer (IE) None Basic authentication Medium IE + Netscape Authentication system User name and password Business Objects standard Medium IE + Netscape Business Objects User name and password No authentication None IE + Netscape None Wipro Technologies Page: 09 of 17

10 Basic authentication is discussed in detail, as it is important for the single sign-on implementation architectures discussed. Basic authentication is a widely used, industry standard method for identifying users. It results in the transmission of passwords over the network without data encryption. This method is preferred over other methods for as other authentication schemes are suitable for stand-alone WebIntelligence system. In Basic authentication scheme, only valid users in the WebIntelligence system are allowed access, and any anonymous user is denied. The various possible approaches to implement Single Sign-On are discussed in detail. SSO for WebIntelligence can be achieved in the following architectures; the classification is based on the infrastructure and the turnaround time for implementation. 1. WebIntelligence without SiteMinder 2. WebIntelligence with SiteMinder 3. WebIntelligence over the Internet In the first architecture, WebIntelligence system is integrated with other e-business applications without the SiteMinder. The architecture consists of WebIntelligence system that is configured in the basic authentication scheme. A centralized directory services where the users of the integrated environment are defined and the e-business intelligence environment to which WebIntelligence system is integrated. This is the simplest SSO implementation for WebIntelligence. In this architecture, all the users are defined in the centralized directory service. The users who need access to WebIntelligence are defined in BO repository. The authentication is managed in the directory service. Any user request to WebIntelligence is first scrutinized in the directory service and the user name is passed to application. WebIntelligence only checks for the existence of the user in BO repository; it assumes that other user related information has already been authorized by the directory service. Figure 6 illustrates WebIntelligence application integrated with J2EE application. The user-interface of WebIntelligence is customized through WebIntelligence SDK. WebIntelligence SDK (Software Development Kit) is an extension of WebIntelligence that enables customization of the look, behavior, and workflow of a WebIntelligence deployment. This customization enables alignment of WebIntelligence with current e-business applications. WebIntelligence is tailored to match the needs of a wide user audience while providing enhanced navigation and finer analysis. This type of customization is imperative for any type of intranet deployment, in which corporate users communicate with entire populations users through the web. This architecture enables seamless integration of WebIntelligence system into the enterprise e-business infrastructure. However, it is not very robust, as WebIntelligence is not tightly coupled with the existing application security. Nevertheless, the SSO can be easily implemented with minimal infrastructure. The effective turn-around time for implementation is significantly less. Wipro Technologies Page: 10 of 17

11 HTTP Web Server HTTP Web Server EJB Module Web Module Java Module Java Container WebIntelligence Client JNDI WISDK JDBC LDAP RDBMS BO Repository DWH Figure 6: WebIntelligence without SiteMinder Wipro Technologies Page: 11 of 17

12 SSO WITH WEBINTELLIGENCE AND SITEMINDER The second architecture is an extension of the first one, with additional security component, i.e., SiteMinder. SiteMinder binds all e-business applications and WebIntelligence into a powerful security framework. SiteMinder Web agent intercepts request to protected resources and determines whether are not the resource is protected by the SiteMinder policy server. This architecture also benefits from SiteMinder security services and technical capabilities. The architecture integrates WebIntelligence and e-business applications to provide an efficient and reliable solution. The user identities are managed in an enterprise-wide logical repository, user information is actually stored in several user directories using a mix of technologies like RDBMS, LDAP. Any access to protected resources is secured using centralized access policies based on user-identities and roles. These policies are defined in the SiteMinder policy server. Policies are defined for group of application based on user identities and roles. For instance, an access policy may state that users must have certain roles in order to be authorized to access an application. Figure 7 illustrates centralized single sign-on system. Client HTTP Web Server Reverse Proxy SM Web Agent SM Web Agent Roles Actions Context SM Policy Server HTTP Web Server J2EE Container HTTP Web Server J2EE Container LDAP RDBMS BO Repository DWH Figure 7: WebIntelligence with SiteMinder Wipro Technologies Page: 12 of 17

13 The SiteMinder policy server has knowledge of both user identities and applications. It interfaces with the enterprise s multiple user directories; information about a single user may be contained in several user stores that need to be queried to extract relevant user data. Security enforcement is provided by agents that intercept requests to any protected resource. Users can be authenticated against a specific user store and authorized against another user store configured with the policy server, thus leveraging existing user information wherever it is available across the architecture. Web Service Containers host Web services on industry specific platforms such as J2EE technology. WebIntelligence and e- business applications are Web service containers, these web services container interfaces with SiteMinder through SiteMinder agents by exchanging user information. The agent authenticates this user information against a site minder policy. Once the authentication is done, access to all the applications in the domain is established. SiteMinder integrates all the applications in an enterprise including WebIntelligence in a secure and reliable framework. SiteMinder enables SSO for WebIntelligence; it also protects WebIntelligence by providing a robust security framework. This architecture can be extended to provide Single sign-on for all applications within the enterprise. WEBINTELLIGENCE OVER INTERNET In the third architecture, the emphasis is on single sign-on for e-business applications deployed over the extranet. Generally e- business applications have evolved over time and have moved from the intranet to the Internet. Integration of these disparate applications is inevitable when deployed over the Internet. Single sign-on for applications has obvious advantages; it makes administration and manageability easy and it provides a single point access to the applications. Single sign-on for an application over the Internet encompasses a wide range of technologies like reverse proxying, firewalls, demilitarized zones (DMZ) and network segments. These technologies are discussed below. The SSO implementation involves providing a multi-layer security framework. The multi-layer differentiation is based on the protection levels. Normally, any network can be classified into an external segment and internal segment, the classification is based on access privileges that have to be provided to the applications. All applications that are accessed over the Internet usually form the external segments. An external segment is any network that operates in a low security zone environment. In other words, any network that connects the enterprises physical environment to another un-trusted network, such as the Internet. Standard HTTP Web servers and network firewalls form the enterprise network s external segment. This Web server is configured as a reverse proxy. Reverse proxy refers to the ability to monitor and respond to request from the Internet on behalf of a Web server. Essentially, the proxy server impersonates the Web server to Internet users. Reverse proxy provides a second layer of security besides the firewall. There is another segment of importance called the demilitarized network segment (DMZ). This segment is mid way between the internal and the external segments. The DMZ hosts and provides Web or application service to other networks which are not trusted. In many cases, this type of network is considered external, since many of those services mapped directly to external segment. SiteMinder policy server, the e-business, ERP system, WebIntelligence, CRM and other Web services form the DMZ. The most secure environment forms the internal segment. This segment provides resources or services that are only for internal use. Most of the enterprises network falls under this category. The internal segment hosts LDAP, RDBMS, user stores, data warehouses and any other resource or service that requires the most comprehensive security. Although the aspects discussed here are not very comprehensive, yet they encompass the architecture that is necessary for Internet deployment in any enterprise. The architecture serves as a guideline; it can be used as a road map for integration of Web services on the Internet. Figure 8 illustrates the WebIntelligence system over Internet. Wipro Technologies Page: 13 of 17

14 HTTP Web Server Internet User Reverse Proxy External Segment Corporate Web Server DMZ Segment Corporate Web Server Employees J2EE Application SM Policy Server WebIntelligence Internal Segment ERP Application LDAP RDBMS DWH BO Repository SAP Figure 8: Internet system KNOWN ISSUES The SSO implementation discussed in the paper is comprehensive, yet there are certain issues that need to be addressed. Single sign-on for WebIntelligence cannot be complete without a proper knowledge of these potential issues and the resolution for them. These issues arise out of certain limitations in WebIntelligence. The first limitation is because of the ActiveX plug-in. ActiveX plug-in is used to view Business Object reports with WebIntelligence. This ActiveX plug-in fails to recognize the request from HTTP Web server when the HTTP Web server is configured in a reverse proxy mode. In reverse proxy, any request to the WebIntelligence server is routed through the HTTP Web server. The request routed through reverse proxy fails the ActiveX plugin, as the ActiveX plug-in expects the request directly from the WebIntelligence Web server. Since the request information is different, the ActiveX plug-in prompts for re-authentication and that leads to failure of SSO. The solution is to provide ActiveX the correct HTTP request information. This can be achieved by system configuration changes. The first change is with WebIntelligence system, by defining the correct default_httpserverurl variable for the ActiveX plug-in. The second change is with reverse proxy server; configure the reverse proxy server to allow the root servlet to run on WebIntelligence system. These configuration changes resolve this potential issue. Wipro Technologies Page: 14 of 17

15 The next issue is with SiteMinder Web-agent that runs on HTTP Web server. On successful authentication the SiteMinder Webagent sets HTTP header variables on the client browser. These HTTP variables are dependent on the operating systems and the client browsers. Because of minor differences in numeric/character codes, header variables can slightly vary from one system to another, this can cause a malformed header variable. In such case, WebIntelligence system fails to authenticate the user. This issue is handled by changes to SiteMinder web agent configuration, by adding a configuration variable called legacy variable. FURTHER IMPROVEMENTS Although the single sign-on is accomplished as discussed earlier, the integration still provides a scope for improvement. In the integration, the underlying WebIntelligence application reads and interprets information from SiteMinder so that the application can login the user. But this integration can leave certain integration issues such as session timeout untouched. The integration can be improved in terms of increased security and better session tracking. The WebIntelligence application fully trusts the information sent to it and does no verification. This is the minimum requirement for SSO. Normally, authentication is done by SiteMinder only once, that is initially when the users logs into the SSO system. Once the authentication is done, the SiteMinder web-agent sets the session information in the client browser. This information is then used by the applications in the SSO system to verify the user credentials that are stored in the applications own repository. The underlying applications cannot actually verify that, the information was sent by SiteMinder or not. In this integration, the point of trust is the HTTP web server that can reside in a DMZ. The security of the integration can be increased, by providing the capability to verify that information sent by SiteMinder is actually sent by SiteMinder. Here, SiteMinder assumes complete responsibility of authentication and authorization for the users. The underlying applications do not rely on the session-information set in the client browser; rather the session-information always comes from SiteMinder. The point of trust is the SiteMinder policy server and the application server where the WebIntelligence is deployed, which does not reside in the DMZ. Another improvement is in terms of the session tracking. SiteMinder provides an ability to associate the WebIntelligence session with SiteMinder session. Once associated, the WebIntelligence session can only be used by that particular SiteMinder session. Attempts by other SiteMinder sessions to use the same WebIntelligence session will be denied. The session timeout is addressed as the inactive period is defined in the SiteMinder. CONCLUSION The underlying reason for providing SSO for WebIntelligence is that the SSO integrates WebIntelligence with other pool of distributed e-business applications. This integration reduces human error and is therefore highly desirable in an e-business infrastructure. Additionally Single sign-on provides enhanced security and better end-user satisfaction for WebIntelligence. The architecture discussed provides a scalable, reliable and robust single sign-on solution for WebIntelligence. Single sign-on for WebIntelligence is achieved irrespective of the number of distributed applications in the e-business infrastructure. With SiteMinder the single sign-on can be extended across all the applications in the enterprise. Additionally reverse proxying and network segmentation provide increased security for single sign-on achieved over the Internet. Although the implementation is limited to SSO implementation for WebIntelligence, the architecture illustrated here can be tailored to achieve single sign-on for other Web-based applications. Wipro Technologies Page: 15 of 17

16 ACRONYMS SSO E-business ASP JSP HTTP HTTPS CORBA J2EE API EJB SSL RMI IIOP JNDI JDBC LDAP SM BO WebI RDBMS DMZ ERP Single Sign-on Enterprise Business Active Server Pages Java Server Pages Hypertext Transfer Protocol Hypertext Transfer Protocol Secure Common Object Request Broker Architecture Java 2 Enterprise Edition Application Program Interface Enterprise Java Beans Secure Server Layer Remote Method Invocation Internet Inter-ORB Protocol Java Naming and Directory Interface Java Database Connectivity Lightweight Directory Access Protocol SiteMinder Business Objects WebIntelligence Relational Database Management System Demilitarized Zones Enterprise Resource Planning REFERENCES 1. WebIntelligence Technical guidance document published by Business Objects 2. Single Sign-on and SiteMinder Technical guidance document published by Netegrity 3. LDAP Technical guidance document published by JavaWorld 4. Consultative paper published by Oracle Magazine ABOUT THE AUTHORS Kalamalla M Basha is an EAI Consultant with Wipro Technologies. Kalamalla has worked in integrating J2EE Technologies for BI tools in positions varying from a programmer to architect. Gopi Venkappa Hombal is a data warehouse and business intelligence Consultant with Wipro Technologies. He has worked in data warehousing and business intelligence solutions in various roles and responsibilities. He holds a Computer Engineering degree from Karnataka Regional Engineering College (KREC), Surathkal. Wipro Technologies Page: 16 of 17

17 ABOUT WIPRO TECHNOLOGIES Wipro is the first PCMM Level 5 and SEI CMMi Level 5 certified IT services company globally. Wipro provides comprehensive IT solutions and services (including systems integration, IS outsourcing, package implementation, software application development and maintenance) and research & development services (hardware and software design, development and implementation) to corporations globally. Wipro s unique value proposition is further delivered through our pioneering Offshore Outsourcing Model and stringent quality processes of SEI and Six Sigma. WIPRO IN DATA WAREHOUSING AND BUSINESS INTELLIGENCE Wipro provides end-to-end Data Warehousing and Business Intelligence services to customers across verticals like Finance, Insurance, Utilities, Telecom, Retail, Logistics, Manufacturing and Healthcare. Wipro has implemented Business Intelligence and Data Warehousing solutions for over 90 customers worldwide including 30 Fortune 1000 clients. Wipro has evolved its Insta Intelligence project management and delivery methodology around leading edge technologies in Data Acquisition, Data Modelling, Data Management, OLAP, Data Mining, and Meta-data Management to deliver innovative, sure-fire solutions to its customers. For further information visit us at: For more whitepapers logon to: Copyright Wipro Technologies. All rights reserved. No part of this document may be reproduced, stored in a retrieval system, transmitted in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without express written permission from Wipro Technologies. Specifications subject to change without notice. All other trademarks mentioned herein are the property of their respective owners. Specifications subject to change without notice. Worldwide HQ Wipro Technologies, Sarjapur Road, Bangalore , India. U.S.A. U.K. France Wipro Technologies Wipro Technologies Wipro Technologies 1300 Crittenden Lane, 137 Euston Road, 91 Rue Du Faubourg, Mountain View, CA London, NW1 2 AA. Saint Honoré, Paris. Germany Japan U.A.E. Wipro Technologies Wipro Technologies Wipro Limited Horn Campus, # 911A, Landmark Tower, Office No. 124, Kaistrasses 101, Minatomirai 2-chome, Building 1, First Floor, Kiel Nishi-ku, Yokohama Dubai Internet City, P.O. Box , Dubai. Wipro Technologies Page: 17 of 17

UNDERSTANDING EVENT CORRELATION AND THE NEED FOR SECURITY INFORMATION MANAGEMENT

UNDERSTANDING EVENT CORRELATION AND THE NEED FOR SECURITY INFORMATION MANAGEMENT UNDERSTANDING EVENT CORRELATION AND THE NEED FOR SECURITY INFORMATION MANAGEMENT Enormous logs are produced by various network devices like IDS or Firewall, Webserver, applications and databases which

More information

Web Intelligence with High Availability A Demand Driven Approach

Web Intelligence with High Availability A Demand Driven Approach Web Intelligence with High Availability A Demand Driven Approach How to build a high available system to provide thin-client tool for query, reporting and analysis. White Paper Zebah Singh Alfred Wipro

More information

What Is the Java TM 2 Platform, Enterprise Edition?

What Is the Java TM 2 Platform, Enterprise Edition? Page 1 de 9 What Is the Java TM 2 Platform, Enterprise Edition? This document provides an introduction to the features and benefits of the Java 2 platform, Enterprise Edition. Overview Enterprises today

More information

Architectural Overview

Architectural Overview Architectural Overview Version 7 Part Number 817-2167-10 March 2003 A Sun ONE Application Server 7 deployment consists of a number of application server instances, an administrative server and, optionally,

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

BUSINESS PROCESS OUTSOURCING FOR TELECOM SERVICE PROVIDERS

BUSINESS PROCESS OUTSOURCING FOR TELECOM SERVICE PROVIDERS BUSINESS PROCESS OUTSOURCING FOR TELECOM SERVICE PROVIDERS Economics of business is leading Telecom Service Providers to find ways to reduce costs, improve productivity, and integrate stubbornly diverse

More information

2012 LABVANTAGE Solutions, Inc. All Rights Reserved.

2012 LABVANTAGE Solutions, Inc. All Rights Reserved. LABVANTAGE Architecture 2012 LABVANTAGE Solutions, Inc. All Rights Reserved. DOCUMENT PURPOSE AND SCOPE This document provides an overview of the LABVANTAGE hardware and software architecture. It is written

More information

CA Single Sign-On Migration Guide

CA Single Sign-On Migration Guide CA Single Sign-On Migration Guide Web access management (WAM) systems have been a part of enterprises for decades. It is critical to control access and audit applications while reducing the friction for

More information

SOX COMPLIANCE - LESSONS FOR EUROPEAN SUPPLY CHAIN ORGANIZATIONS FROM THE US EXPERIENCE

SOX COMPLIANCE - LESSONS FOR EUROPEAN SUPPLY CHAIN ORGANIZATIONS FROM THE US EXPERIENCE SOX COMPLIANCE - LESSONS FOR EUROPEAN SUPPLY CHAIN ORGANIZATIONS FROM THE US EXPERIENCE The Sarbanes Oxley (SOX) Act is an attempt to maintain correctness in financial figures pertaining to the internal

More information

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003

Oracle Identity Management Concepts and Architecture. An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture An Oracle White Paper December 2003 Oracle Identity Management Concepts and Architecture Introduction... 3 Identity management... 3 What is Identity

More information

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright

More information

CA SiteMinder SSO Agents for ERP Systems

CA SiteMinder SSO Agents for ERP Systems PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...

More information

Oracle Identity Analytics Architecture. An Oracle White Paper July 2010

Oracle Identity Analytics Architecture. An Oracle White Paper July 2010 Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may

More information

Single Sign-On Access Management A Technical Framework on Access Management Systems

Single Sign-On Access Management A Technical Framework on Access Management Systems Single Sign-On Access Management A Technical Framework on Access Management Systems Polaris Software Lab Ltd., 766, Anna Salai, Chennai, INDIA 600 006 Single Sign-On Access Management Service This paper

More information

SOA REFERENCE ARCHITECTURE: WEB TIER

SOA REFERENCE ARCHITECTURE: WEB TIER SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible

More information

Safeguarding the Corporate Portal: A Review of Portal Security

Safeguarding the Corporate Portal: A Review of Portal Security Safeguarding the Corporate Portal: A Review of Portal Security by Colin J. White DataBase Associates Version 1, January 2001 Sponsored by Viador Inc. DataBase Associates TABLE OF CONTENTS PORTAL SECURITY:

More information

Enterprise Application Integration

Enterprise Application Integration Enterprise Integration By William Tse MSc Computer Science Enterprise Integration By the end of this lecturer you will learn What is Enterprise Integration (EAI)? Benefits of Enterprise Integration Barrier

More information

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as

More information

An Oracle White Paper October 2009. Frequently Asked Questions for Oracle Forms 11g

An Oracle White Paper October 2009. Frequently Asked Questions for Oracle Forms 11g An Oracle White Paper October 2009 Frequently Asked Questions for Oracle Forms 11g Disclaimer The following is intended to outline our general product direction. It is intended for information purposes

More information

Siteminder Integration Guide

Siteminder Integration Guide Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with

More information

IMPROVING ORDER-TO-CASH CYCLE.

IMPROVING ORDER-TO-CASH CYCLE. IMPROVING ORDER-TO-CASH CYCLE. WHITE PAPER Wipro BPO Ltd. Abstract Order to Cash cycle The sequential steps from acquisition of a customer s order up to the customer s money reaching the operator s bank

More information

Executive Summary. What is Authentication, Authorization, and Accounting? Why should I perform Authentication, Authorization, and Accounting?

Executive Summary. What is Authentication, Authorization, and Accounting? Why should I perform Authentication, Authorization, and Accounting? Executive Summary As the leader in Wide Area Application Delivery, Blue Coat products accelerate and secure applications within your WAN and across the Internet. Blue Coat provides a robust and flexible

More information

How to Build an E-Commerce Application using J2EE. Carol McDonald Code Camp Engineer

How to Build an E-Commerce Application using J2EE. Carol McDonald Code Camp Engineer How to Build an E-Commerce Application using J2EE Carol McDonald Code Camp Engineer Code Camp Agenda J2EE & Blueprints Application Architecture and J2EE Blueprints E-Commerce Application Design Enterprise

More information

Single Sign On In A CORBA-Based

Single Sign On In A CORBA-Based Single Sign On In A CORBA-Based Based Distributed System Igor Balabine IONA Security Architect Outline A standards-based framework approach to the Enterprise application security Security framework example:

More information

SQL Server Master Data Services A Point of View

SQL Server Master Data Services A Point of View SQL Server Master Data Services A Point of View SUBRAHMANYA V SENIOR CONSULTANT SUBRAHMANYA.VENKATAGIRI@WIPRO.COM Abstract Is Microsoft s Master Data Services an answer for low cost MDM solution? Will

More information

Java 2 Platform, Enterprise Edition (J2EE) Bruno Souza Java Technologist, Sun Microsystems, Inc.

Java 2 Platform, Enterprise Edition (J2EE) Bruno Souza Java Technologist, Sun Microsystems, Inc. Java 2 Platform, Enterprise Edition (J2EE) Bruno Souza Java Technologist, Sun Microsystems, Inc. J1-680, Hapner/Shannon 1 Contents The Java 2 Platform, Enterprise Edition (J2EE) J2EE Environment APM and

More information

Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite. Abstract

Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite. Abstract Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite Abstract This white paper outlines the deployment and configuration of a Single Sign-On solution for EMC Documentum

More information

Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.

Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin. Oracle WebLogic Foundation of Oracle Fusion Middleware Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.com/in/lawrence143 History of WebLogic WebLogic Inc started in 1995 was a company

More information

Architecture Guidelines Application Security

Architecture Guidelines Application Security Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation

More information

Perceptive Experience Single Sign-On Solutions

Perceptive Experience Single Sign-On Solutions Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark

More information

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004

Oracle Identity Management: Integration with Windows. An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows An Oracle White Paper December. 2004 Oracle Identity Management: Integration with Windows Introduction... 3 Goals for Windows Integration... 4 Directory

More information

LDAP and Integrated Technologies: A Simple Primer Brian Kowalczyk, Kowal Computer Solutions Inc., IL Richard Kerwin, R.K. Consulting Inc.

LDAP and Integrated Technologies: A Simple Primer Brian Kowalczyk, Kowal Computer Solutions Inc., IL Richard Kerwin, R.K. Consulting Inc. LDAP and Integrated Technologies: A Simple Primer Brian Kowalczyk, Kowal Computer Solutions Inc., IL Richard Kerwin, R.K. Consulting Inc., IL ABSTRACT SAS Integration Technologies and LDAP(Lightweight

More information

Integrating Hitachi ID Suite with WebSSO Systems

Integrating Hitachi ID Suite with WebSSO Systems Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication

More information

Controlling Web Access with BMC Web Access Manager WHITE PAPER

Controlling Web Access with BMC Web Access Manager WHITE PAPER Controlling Web Access with BMC Web Access Manager WHITE PAPER Table of Contents Executive Summary...2 The BMC Identity and Access Management Approach...3 BMC Enforcement Agent Deployment Flexibility...3

More information

Oracle Role Manager. An Oracle White Paper Updated June 2009

Oracle Role Manager. An Oracle White Paper Updated June 2009 Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship

More information

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to

More information

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft 5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft

More information

White paper. IBM WebSphere Application Server architecture

White paper. IBM WebSphere Application Server architecture White paper IBM WebSphere Application Server architecture WebSphere Application Server architecture This IBM WebSphere Application Server white paper was written by: Jeff Reser, WebSphere Product Manager

More information

WebSphere Application Server - Introduction, Monitoring Tools, & Administration

WebSphere Application Server - Introduction, Monitoring Tools, & Administration WebSphere Application Server - Introduction, Monitoring Tools, & Administration presented by: Michael S. Pallos, MBA Senior Solution Architect IBM Certified Systems Expert: WebSphere MQ 5.2 e-business

More information

IT@Intel. Improving Security and Productivity through Federation and Single Sign-on

IT@Intel. Improving Security and Productivity through Federation and Single Sign-on White Paper Intel Information Technology Computer Manufacturing Security Improving Security and Productivity through Federation and Single Sign-on Intel IT has developed a strategy and process for providing

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

Tableau Server Security. Version 8.0

Tableau Server Security. Version 8.0 Version 8.0 Author: Marc Rueter Senior Director, Strategic Solutions, Tableau Software June 2013 p2 Today s enterprise class systems need to provide robust security in order to meet the varied and dynamic

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

Client-Server Architecture & J2EE Platform Technologies Overview Ahmed K. Ezzat

Client-Server Architecture & J2EE Platform Technologies Overview Ahmed K. Ezzat Client-Server Architecture & J2EE Platform Technologies Overview Ahmed K. Ezzat Page 1 of 14 Roadmap Client-Server Architecture Introduction Two-tier Architecture Three-tier Architecture The MVC Architecture

More information

Extranet Access Management Web Access Control for New Business Services

Extranet Access Management Web Access Control for New Business Services Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control

More information

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning.

Federated single sign-on (SSO) and identity management. Secure mobile access. Social identity integration. Automated user provisioning. PingFederate We went with PingFederate because it s based on standards like SAML, which are important for a secure implementation. John Davidson Senior Product Manager, Opower PingFederate is the leading

More information

zen Platform technical white paper

zen Platform technical white paper zen Platform technical white paper The zen Platform as Strategic Business Platform The increasing use of application servers as standard paradigm for the development of business critical applications meant

More information

enterprise^ IBM WebSphere Application Server v7.0 Security "publishing Secure your WebSphere applications with Java EE and JAAS security standards

enterprise^ IBM WebSphere Application Server v7.0 Security publishing Secure your WebSphere applications with Java EE and JAAS security standards IBM WebSphere Application Server v7.0 Security Secure your WebSphere applications with Java EE and JAAS security standards Omar Siliceo "publishing enterprise^ birmingham - mumbai Preface 1 Chapter 1:

More information

Oracle Access Manager. An Oracle White Paper

Oracle Access Manager. An Oracle White Paper Oracle Access Manager An Oracle White Paper NOTE: The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any

More information

Title Page. Hosted Payment Page Guide ACI Commerce Gateway

Title Page. Hosted Payment Page Guide ACI Commerce Gateway Title Page Hosted Payment Page Guide ACI Commerce Gateway Copyright Information 2008 by All rights reserved. All information contained in this documentation, as well as the software described in it, is

More information

SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT. Imaging & Enterprise Content Management

SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT. Imaging & Enterprise Content Management SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT TM OMNIDOCS Imaging & Enterprise Content Management SOLUTIONS FOR BUSINESS PROCESS & ENTERPRISE CONTENT MANAGEMENT O MNIDOCS Enterprise Content

More information

Content Protection in Silverlight. Microsoft Corporation

Content Protection in Silverlight. Microsoft Corporation Content Protection in Silverlight Microsoft Corporation April 2010 Contents Contents...2 Introduction...3 What is Content Protection?... 3 Why Should You Protect Online Content?... 3 Techniques for Protecting

More information

Apache Server Implementation Guide

Apache Server Implementation Guide Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042

More information

SSO Plugin. Release notes. J System Solutions. http://www.javasystemsolutions.com Version 3.6

SSO Plugin. Release notes. J System Solutions. http://www.javasystemsolutions.com Version 3.6 SSO Plugin Release notes J System Solutions Version 3.6 JSS SSO Plugin v3.6 Release notes What's new... 3 Improved Integrated Windows Authentication... 3 BMC ITSM self service... 3 Improved BMC ITSM Incident

More information

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Overview. Edvantage Security

Overview. Edvantage Security Overview West Virginia Department of Education (WVDE) is required by law to collect and store student and educator records, and takes seriously its obligations to secure information systems and protect

More information

IBM Maximo technology for business and IT agility

IBM Maximo technology for business and IT agility IBM Software Tivoli March 2010 IBM Maximo technology for business and IT agility IBM asset and service management solutions 2 IBM Maximo technology for business and IT agility Contents 2 Executive summary

More information

WebNow Single Sign-On Solutions

WebNow Single Sign-On Solutions WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,

More information

White paper December 2008. Addressing single sign-on inside, outside, and between organizations

White paper December 2008. Addressing single sign-on inside, outside, and between organizations White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli

More information

SAP Business Objects Security

SAP Business Objects Security SAP Business Objects Security Pal Alagarsamy President Business Intelligence Practice GloWiz Inc 1 GloWiz Inc GloWiz is an IT Staffing and Consulting company since 2005 We focus on Business Intelligence,

More information

Virtual Credit Card Processing System

Virtual Credit Card Processing System The ITB Journal Volume 3 Issue 2 Article 2 2002 Virtual Credit Card Processing System Geraldine Gray Karen Church Tony Ayres Follow this and additional works at: http://arrow.dit.ie/itbj Part of the E-Commerce

More information

Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal

Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal Guideline Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal Product: IBM Cognos 8 BI Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).

More information

How can Identity and Access Management help me to improve compliance and drive business performance?

How can Identity and Access Management help me to improve compliance and drive business performance? SOLUTION BRIEF: IDENTITY AND ACCESS MANAGEMENT (IAM) How can Identity and Access Management help me to improve compliance and drive business performance? CA Identity and Access Management automates the

More information

OracleAS Identity Management Solving Real World Problems

OracleAS Identity Management Solving Real World Problems OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability

More information

Geac Expense Management: An Architectural Overview

Geac Expense Management: An Architectural Overview Performance Management Geac Expense Management: An Architectural Overview white paper Now more than at any other time in recent history, companies are faced with the need to deploy solutions that enable

More information

BusinessObjects Enterprise XI Release 2 Administrator s Guide

BusinessObjects Enterprise XI Release 2 Administrator s Guide BusinessObjects Enterprise XI Release 2 Administrator s Guide BusinessObjects Enterprise XI Release 2 1 Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents,

More information

PingFederate. SSO Integration Overview

PingFederate. SSO Integration Overview PingFederate SSO Integration Overview 2006-2012 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 6.6 January, 2012 Ping Identity Corporation 1001 17th Street,

More information

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1

Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Enabling Single Sign-On for Oracle Applications Oracle Applications Users Group PAGE 1 Agenda Introduction PAGE 2 Organization Speakers Security Spectrum Information Security Spectrum Oracle Identity Management

More information

Copyright http://support.oracle.com/

Copyright http://support.oracle.com/ Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.

More information

Enterprise Integration Architectures for the Financial Services and Insurance Industries

Enterprise Integration Architectures for the Financial Services and Insurance Industries George Kosmides Dennis Pagano Noospherics Technologies, Inc. gkosmides@noospherics.com Enterprise Integration Architectures for the Financial Services and Insurance Industries Overview Financial Services

More information

JReport Server Deployment Scenarios

JReport Server Deployment Scenarios JReport Server Deployment Scenarios Contents Introduction... 3 JReport Architecture... 4 JReport Server Integrated with a Web Application... 5 Scenario 1: Single Java EE Server with a Single Instance of

More information

Document Management Software Provider Designs for Identity and Access Flexibility

Document Management Software Provider Designs for Identity and Access Flexibility Microsoft Windows Server System Partner Solution Case Study Document Management Software Provider Designs for Identity and Access Flexibility Overview Country or Region: Canada Industry: Professional Services

More information

CA Identity Manager. Glossary. r12.5 SP8

CA Identity Manager. Glossary. r12.5 SP8 CA Identity Manager Glossary r12.5 SP8 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

Securing SAS Web Applications with SiteMinder

Securing SAS Web Applications with SiteMinder Configuration Guide Securing SAS Web Applications with SiteMinder Audience Two application servers that SAS Web applications can run on are IBM WebSphere Application Server and Oracle WebLogic Server.

More information

White paper. Implications of digital certificates on trusted e-business.

White paper. Implications of digital certificates on trusted e-business. White paper Implications of digital certificates on trusted e-business. Abstract: To remain ahead of e-business competition, companies must first transform traditional business processes using security

More information

SharePoint 2013 Logical Architecture

SharePoint 2013 Logical Architecture SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.

More information

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc. Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component

More information

Introduction to Sun ONE Application Server 7

Introduction to Sun ONE Application Server 7 Introduction to Sun ONE Application Server 7 The Sun ONE Application Server 7 provides a high-performance J2EE platform suitable for broad deployment of application services and web services. It offers

More information

Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo

Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence Greg Wcislo Introduction We will not go into detailed how-to, however links to multiple how-to whitepapers will

More information

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication

More information

Control and management of privileged users

Control and management of privileged users Control and management of privileged users The secure solution for monitoring and recording privileged users Visulox The complete Access Management Solution ToolBox Solution GmbH, established in 2003,

More information

Contents. Client-server and multi-tier architectures. The Java 2 Enterprise Edition (J2EE) platform

Contents. Client-server and multi-tier architectures. The Java 2 Enterprise Edition (J2EE) platform Part III: Component Architectures Natividad Martínez Madrid y Simon Pickin Departamento de Ingeniería Telemática Universidad Carlos III de Madrid {nati, spickin}@it.uc3m.es Introduction Contents Client-server

More information

Okta Identity Management for Portals Built on Salesforce.com. An Architecture Review. Okta Inc. 301 Brannan Street San Francisco, CA 94107

Okta Identity Management for Portals Built on Salesforce.com. An Architecture Review. Okta Inc. 301 Brannan Street San Francisco, CA 94107 Okta Identity Management for Portals Built on Salesforce.com An Architecture Review Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 Okta: A Platform for Cloud

More information

E-Business Suite Oracle SOA Suite Integration Options

E-Business Suite Oracle SOA Suite Integration Options Specialized. Recognized. Preferred. The right partner makes all the difference. E-Business Suite Oracle SOA Suite Integration Options By: Abhay Kumar AST Corporation March 17, 2014 Applications Software

More information

ORACLE BUSINESS INTELLIGENCE, ORACLE DATABASE, AND EXADATA INTEGRATION

ORACLE BUSINESS INTELLIGENCE, ORACLE DATABASE, AND EXADATA INTEGRATION ORACLE BUSINESS INTELLIGENCE, ORACLE DATABASE, AND EXADATA INTEGRATION EXECUTIVE SUMMARY Oracle business intelligence solutions are complete, open, and integrated. Key components of Oracle business intelligence

More information

Wealth Management System

Wealth Management System Wealth Management System Clients in the new economy demand straight answers. With ubiquitous information on the Internet and an around-the-clock global financial market accessible by pagers, email, mobile

More information

FAQs for Oracle iplanet Proxy Server 4.0

FAQs for Oracle iplanet Proxy Server 4.0 FAQs for Oracle iplanet Proxy Server 4.0 Get answers to the questions most frequently asked about Oracle iplanet Proxy Server Q: What is Oracle iplanet Proxy Server (Java System Web Proxy Server)? A: Oracle

More information

ABSTRACT INTRODUCTION SOFTWARE DEPLOYMENT MODEL. Paper 341-2009

ABSTRACT INTRODUCTION SOFTWARE DEPLOYMENT MODEL. Paper 341-2009 Paper 341-2009 The Platform for SAS Business Analytics as a Centrally Managed Service Joe Zilka, SAS Institute, Inc., Copley, OH Greg Henderson, SAS Institute Inc., Cary, NC ABSTRACT Organizations that

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion Key Data Product #: 3380 Course #: 6420A Number of Days: 5 Format: Certification Exams: Instructor-Led None This course syllabus should be used to determine whether the course is appropriate for the students,

More information

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001 Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance

More information

How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development

How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development A RapidValue Solutions Whitepaper Contents Executive Summary... 03 Oracle Mobile Application Framework (MAF): The Complete Development

More information

IBM Security & Privacy Services

IBM Security & Privacy Services Enter Click Here The challenge of identity management Today organizations are facing paradoxical demands for greater information access and more stringent information security. You must deliver more data

More information

SAS Information Delivery Portal

SAS Information Delivery Portal SAS Information Delivery Portal Table of Contents Introduction...1 The State of Enterprise Information...1 Information Supply Chain Technologies...2 Making Informed Business Decisions...3 Gathering Business

More information

ORACLE BUSINESS INTELLIGENCE SUITE ENTERPRISE EDITION PLUS

ORACLE BUSINESS INTELLIGENCE SUITE ENTERPRISE EDITION PLUS ORACLE BUSINESS INTELLIGENCE SUITE ENTERPRISE EDITION PLUS PRODUCT FACTS & FEATURES KEY FEATURES Comprehensive, best-of-breed capabilities 100 percent thin client interface Intelligence across multiple

More information

OpenLDAP Oracle Enterprise Gateway Integration Guide

OpenLDAP Oracle Enterprise Gateway Integration Guide An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information

More information

Self-Service Active Directory Group Management

Self-Service Active Directory Group Management Self-Service Active Directory Group Management 2015 Hitachi ID Systems, Inc. All rights reserved. Hitachi ID Group Manager is a self-service group membership request portal. It allows users to request

More information

Active Directory and DirectControl

Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now

More information