Fit/Gap Analysis of LDAP Services for the myufl Portal
|
|
- Paula Casey
- 8 years ago
- Views:
Transcription
1 Fit/Gap Analysis of LDAP Services for the myufl Portal The purpose of this document is to document the LDAP requirements of the myufl portal; provide a fit/gap analysis of the current system; and to make recommendations on ways to fulfill the requirement shortfalls. MyUFL Portal LDAP Requirements The myufl portal was quietly launched on March 31 st, Since the launch, there have been several occasions where the portal became unstable due to problems with the LDAP server that were primarily caused by excessive load on the primary LDAP server. Other issues have also existed where the role-based security privileges for a user were incorrect due to the lack of processes to keep the role information updated in the LDAP server. On October 6 th, 2003, a significant publicity campaign will be launched advertising the myufl portal and usage is expected to increase substantially. It is important that the UF constituents using the portal have a positive experience in terms of functionality, reliability and security. To ensure that the LDAP services can properly meet the demands of the myufl portal, the services must: Functionality 1. Provide current and accurate information to authentication and basic authorization requests by the myufl Portal 2. Provide current and accurate information to role-based authorization requests by the myufl Portal 3. Provide current and accurate information for user attributes including UFID, preferred address and full name Reliability 4. Be available on a continual basis without unplanned downtime and with minimal planned maintenance 5. Respond to myufl requests quickly and efficiently Security 6. Assure that communication with the myufl server is secure Fit/Gap Analysis Requirement Analysis 1. The myufl portal must be able to authenticate users dynamically against the LDAP server when they sign on to the portal. The user s GatorLink authentication credentials should be accurate and up-to-date in the LDAP server so that a user does not needlessly receive a sign on error message. The LDAP server is currently updated with user information every 15 minutes while the Kerberos server used to store the user s password is updated in real-time when the
2 password is changed. Based on the validation of the user s credentials, the myufl portal automatically assigns a base level of authorization. Fit: The 15 minute update timeframe of the user s information used for authentication and basic authorization is acceptable. The myufl requirement is met. 2. In addition to the basic authorization that is assigned when a user provides current GatorLink credentials, the myufl portal needs to provide additional authorization based on a user s role. This role can be one or more of the following three: Faculty, Staff and Student. The portal assigns these roles and the associated security authorizations dynamically to users when they sign on to the portal based on the dynamic role lists maintained by the portal. There is one list for each of the three roles and this information is updated via requests to the LDAP server. Each list has a matching group in the LDAP server and this group is downloaded into the portal (replacing the current list) via a manually initiated process. The groups in the LDAP server are also updated from the contents of the UF Registry database via a manually initiated process. The manual update of the groups in the LDAP is currently in two parts. The first part of the update gets the new group information from the database and takes 4-6 hours. The second part assembles the information and loads it into the secondary LDAP server (taking another four hours). The final step is replacing the database of the production LDAP server with a copy from the secondary server. This step can only be performed manually the primary LDAP server is not updated directly due to load issues. Gap: The portal authorization information should be updated at least on a daily basis. This process should occur nightly so that any changes to the Registry during the previous day will be active at the start of business the following day. The manual processes on the portal and the LDAP server do not lend themselves to providing consistent information and need to be automated. The LDAP process should occur first, followed by the portal process, in order to ensure that the role lists are properly updated with the most current information. Allen Rout mentioned that it may be possible to update the with only changes that have occurred since the last update. This should greatly reduce the load on the LDAP server, shorten the time required for the update and allow an automated update of the primary LDAP server to occur. 3. The myufl portal must be able to assign and update key user attributes dynamically against the LDAP server when they sign on to the portal. These attributes currently include the user s UFID, preferred address and full name. The LDAP server is currently updated with user information every 15 minutes. Fit: The 15 minute update timeframe of the user s information used for updating user attributes is acceptable. The myufl requirement is met. 4. The myufl portal is expected to meet a goal of 99.9% uptime on a 24/7 basis and includes planned maintenance windows. As a critical element in all user sessions, the LDAP server must be available on a 24/7, 365 days per year, with minimal planned maintenance windows and will thus be required to operate at a level substantially better than 99.9% uptime. The portal includes a capability to
3 make requests to a backup LDAP server in the event that the primary server is unavailable. This has been implemented and a second LDAP server is in production; however, this only works for a complete failure of the LDAP server. If the primary server is acknowledging requests but not providing results to the requests, then the portal will not switch over to the secondary LDAP server and authentication requests will fail. For development and testing to occur, the secondary LDAP server must be taken offline and used. There are no formal testing processes or roll-out plans in place. Gap: The built-in failover capability of the portal is inadequate. Another mechanism must be implemented that will switch the portal to the secondary LDAP server under any circumstances where the primary LDAP server is unable to fulfill requests. An appropriate testing process/environment and roll-out plan should be in place to help assure that potential bugs are identified and that maintenance windows are minimized. 5. In addition to the LDAP servers being available for requests, they must also be able to respond to requests in a reasonable timeframe. The two types of requests made by the portal are user authentication requests (includes basic authorization and attribute updating) and role-based authorization requests. The authentication requests occur in real time during the sign on process. A user must be able to sign on to the portal in less than 15 seconds which would require the LDAP server to respond in a fraction of that time. The role-based authorization requests occur in a batch process that can be scheduled to occur during off-peak hours. It is critical that the server be available but the batch process can be much more tolerant of latency in requests. The LDAP server is normally able to fulfill real-time authentication requests in under a second while the batch role update process typically takes less than a minute. When the LDAP server is under conditions of heavy load, these times can grow substantially, with the real-time authentication times exceeding 15 seconds in some cases. Generally, these load conditions are not due to daily, interactive requests but rather due to batch updates of the LDAP database. The primary server currently serves all requests until it completely fails, at which time the secondary server would be engaged through the portal s built-in LDAP redundancy. Gap: The LDAP servers should be effectively load balanced. The load balancing should be based on the ability to service authentication requests in less than 5 seconds. The servers should be sized appropriately so they can manage the anticipated daily, interactive load. Batch jobs to update the server databases should be scheduled during off-peak hours where possible and at alternate times on each server if during peak hours. Load testing should be applied to validate sizing and load balancing settings. Allen Rout also mentioned that the structure of the LDAP database could be redone to substantially improve performance. 6. The communication between the LDAP servers and the myufl portal should be secure so that a user s credentials and other attributes cannot be accessed by unauthorized individuals. Both the LDAP servers and the myufl portal reside at the CNS datacenter and are connected by a network that maintains the traffic inside the datacenter. The data passed between the portal and the LDAP servers
4 is not currently encrypted. Fit: Although the network traffic should be encrypted at some future point, it is currently acceptable for the connection to exist on the controlled network in the datacenter. Fit/Gap Recommended Actions Processes must be put in place to automatically update the portal with role-based authentication information on a nightly basis The primary and secondary LDAP servers should be setup so they can achieve fault-tolerance and load balancing Performance enhancing changes should be applied to the update process so it can be fully automated A testing process and environment should be in place for patches and development work; load testing should be included in addition to functional testing A roll-out plan should be developed as an outline for production LDAP changes (optional) The LDAP database should be re-architected to deliver improved performance (optional) The portal/ldap communication should be encrypted with SSL Proposed Solutions Immediate/Short-term Solution Resources: man hours IBM 615 Server (or equivalent) 2) Modify the group update process so that only changed records are moved into the 3) Automate and schedule the update processes to occur nightly in both the portal Recommended/Long-term Solution Resources: man hours IBM 615 Server (or equivalent ~$15k)
5 2) Add new server that will be used as a development and test platform but can also function as at hot spare during migrations into production Long-term Variation #1 Resources: man hours Server ($2-3k) 2) Add new server that will be used as a development and test platform ONLY it will not be appropriate for load testing Long-term Variation #2 Resources: man hours 2) Use the existing secondary server for development; replace in production when finished
Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations
Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Topics What is SaaS? How does SaaS differ from managed hosting? Advantages of SaaS
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationMediasite EX server deployment guide
Mediasite EX server deployment guide 2008 Sonic Foundry, Inc. All rights reserved. No part of this document may be copied and/or redistributed without the consent of Sonic Foundry, Inc. Additional copies
More informationRL Solutions Hosting Service Level Agreement
RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The
More informationRemote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
More informationWoodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview
Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R
More informationFrequently Asked Questions
Frequently Asked Questions Page 1 Instsanda FAQs v1.2 Instanda FAQs Contents Hosting, Security, Monitoring and Management... 3 Where is Instanda hosted?... 3 What is the hosting datacentre compliance?...
More informationSecure Hosting Solutions For SAGE Energy Management
Secure Hosting Environment Partnerships In order to provide advanced levels of infrastructure security, Armstrong has partnered with two entities. Logicalis Inc. is recognized as a Channel Company s 2015
More informationSysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan
SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid IT On-Demand: Architecture Security Business Continuity and Disaster Recovery
More informationHow SITEFORUM provides you with main components to build and run an innovative cloud computing service for an industry or special interest group
Status: June 2011 How SITEFORUM provides you with main components to build and run an innovative cloud computing service for an industry or special interest group tags: software, social business, online
More informationThis document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.
SERVICEPOINT SECURING CLIENT DATA This document and the information contained herein are the property of and should be considered business sensitive. Copyright 2006 333 Texas Street Suite 300 Shreveport,
More informationThe Bomgar Appliance in the Network
The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.
More informationRemote MasterMind for Mobility. Mobile Device Management Software
Remote MasterMind for Mobility Mobile Device Management Software Remote MasterMind for Mobility You have mobility devices in locations all across the area, state, or country. They are constantly on the
More informationTips and Best Practices for Managing a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies
More informationOracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0
Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies
More informationAVLOR SERVER CLOUD RECOVERY
AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties
More informationLegalesign Service Definition Electronic signature and contract management service
Legalesign Service Definition Electronic signature and contract management service Legalesign Limited UN House, 4 Hunter Square, Edinburgh, EH1 1QW Tel: 0131 463 9099 Email: email@legalesign.com Overview
More informationRemote MasterMind for Mobility 2.5. Mobile Device Management Software
Remote MasterMind for Mobility 2.5 Mobile Device Management Software Remote MasterMind for Mobility 2.5 You have mobility devices in locations all across the area, state, or country. They are constantly
More informationPCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
More informationEstablishing Environmental Best Practices. Brendan Law Blaw@td.com.au @FlamerNZ Flamer.co.nz/spag/
Establishing Environmental Best Practices Brendan Law Blaw@td.com.au @FlamerNZ Flamer.co.nz/spag/ Agenda Active Directory Service Accounts Database Platform Windows Platform Data Storage Planning Virtualisation
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationCloud Management. Overview. Cloud Managed Networks
Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity
More informationCollaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%
Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the
More informationWhere-to-Web-to-Print? Hosted versus On-Site
Where-to-Web-to-Print? Hosted versus On-Site Overview Where-to-Web-to-Print? Web-to-Print has crossed the chasm. This concept was introduced by Geoffrey A. Moore in his book Crossing The Chasm. Moore
More informationAgilisys G-Cloud Service V
Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform
More informationWhy Email Fails MessageOne Survey of Email Outages
Why Email Fails MessageOne Survey of Email Outages White Paper MessageOne, Inc. 11044 Research Blvd. Building C, Fifth Floor Austin, TX 78759 Toll-Free: 888.367.0777 Telephone: 512.652.4500 Fax: 512.652.4504
More informationUser Manual. (updated December 15, 2014) Information in this document is subject to change without notice.
User Manual (updated December 15, 2014) Information in this document is subject to change without notice. Copyright 2013-2014, Exacq Technologies, Inc. All rights reserved. Exacq Technologies is a trademark
More informationHow To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2
DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...
More informationWhatsUpGold. v3.0. WhatsConnected User Guide
WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected
More informationAutodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
More informationSQL Server Mirroring. Introduction. Setting up the databases for Mirroring
SQL Server Mirroring The purpose of this document is to describe in detail the process of configuring Secret Server and SQL Server 2008 for a high-availability environment using Mirroring. The contents
More informationPCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
More informationMigration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module
Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between
More informationWhy SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?
SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several
More informationTroux Hosting Options
Troux Hosting Options Introducing Troux Hosting Options Benefits of a Hosted Troux Environment...3 Convenience...3 Time-to-Value...3 Reduced Cost of Ownership...3 Scalability and Flexibility...3 Security...4
More informationService Level Program for Ariba cloud Services. Service Accessibility Warranty Security Miscellaneous
Service Level Program for Ariba cloud Services Service Accessibility Warranty Security Miscellaneous 1. Service Accessibility Warranty a. Applicability. The Service Accessibility Warranty applies to the
More informationExecutive Brief Infor Cloverleaf High Availability. Downtime is not an option
Executive Brief Infor Cloverleaf High Availability Downtime is not an option Gain value from Infor by: Delivering continuous access to mission-critical systems and data Providing uninterrupted continuity
More informationPrivileged Access Management Upgrade Guide
Privileged Access Management Upgrade Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
More informationReadyNAS Remote White Paper. NETGEAR May 2010
ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that
More informationCentrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
More informationCompTIA Cloud+ 9318; 5 Days, Instructor-led
CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,
More informationPASS4TEST. IT Certification Guaranteed, The Easy Way! http://www.pass4test.com We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : C5050-280 Title : IBM Cloud Computing Infrastructure Architect V1 Vendors
More informationCompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:
CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification
More informationRSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
More informationA. Hot-Standby mode and Active-Standby mode in High Availability
High Availability (HA) is the feature that ensures the business continuity for your organization. IT staff can take HA as a simple solution for the disaster recovery. DrayTek utilizes the Common Address
More informationAzeus Convene Paperless Board and EXECUTIVE Meetings
Service Definition Azeus Convene Paperless Board and EXECUTIVE Meetings 1. An Overview of the G- Cloud Service (functional, non functional) Azeus Convene replaces meeting papers with a user-friendly mobile
More informationWEAVEonline: Technical FAQs
WEAVEonline: Technical FAQs 1. What is WEAVEonline? WEAVEonline is our core product, a powerful software application that addresses the need to develop and maintain continuous improvement processes for
More informationCompulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows
Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Business Systems, Inc. 2645 Townsgate Road, Suite 200 Westlake Village, CA 91361 2013 Compulink
More information000-280. IBM Cloud Computing Infrastructure Architect V1. Version: Demo. Page <<1/9>>
000-280 IBM Cloud Computing Infrastructure Architect V1 Version: Demo Page 1.Cloud architectures designed for service delivery and availability of services are extremely important. How is software
More informationCloud Computing project Report
Name: Trasily Krishnan Shanmugham Cloud Computing project Report An online business can use load balancing and auto-scaling to support unexpected usage peaks and save money when usage is lower. Amazon
More informationTIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
More informationAppendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)
Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Enterprise Cloud Resource Pool Services Features Sungard AS will provide the following in connection
More informationHigh Availability White Paper
High Availability White Paper This document provides an overview of high availability best practices for mission critical applications. Author: George Quinlan, Senior Consultant Background - High Availability
More informationCreating A Highly Available Database Solution
WHITE PAPER Creating A Highly Available Database Solution Advantage Database Server and High Availability TABLE OF CONTENTS 1 Introduction 1 High Availability 2 High Availability Hardware Requirements
More informationNETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
More informationHP Remote Monitoring. How do I acquire it? What types of remote monitoring tools are in use? What is HP Remote Monitoring?
HP Remote Monitoring HP Remote Monitoring is an efficient, secure means of collecting and reporting usage data from your printing and imaging output environment. What is HP Remote Monitoring? HP Remote
More informationTable of Contents. CSC CloudCompute Service Description Summary CSC 1
Table of Contents Overview... 2 CSC CloudCompute Infrastructure... 2 Virtual Environment... 2 Compute Capacity... 2 Networks... 3 CSC Cloud Store Overview... 3 Service Tier Choices... 3 CloudCompute Storage...
More informationHow To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On
Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files
More informationRemote MasterMind 3.0. Mobile Device & Bar Code Scanner Management Solution
3.0 Mobile Device & Bar Code Scanner Management Solution is Honeywell s 3.0 You have mobility and bar code scanning devices in locations all across your enterprise. They are constantly on the move or situated
More informationTECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES
TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control
More informationSaaS Service Level Agreement (SLA)
SaaS Service Level Agreement (SLA) The purpose of this document is to define the Service Level Agreement (SLA) for the maintenance and support of the Hosting Service ( Service ). Service Level Agreements
More informationSPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX
SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX The following terms and conditions, together with the Sprint Master or Custom Services Agreement or Domestic Sprint Services Sales Application Form ("Agreement"),
More informationPROMAPP TECHNICAL INFORMATION
Promapp Software Architecture Promapp is designed in accordance with Microsoft best practices, developed with the Microsoft.net framework and uses a Microsoft SQL database. The software architecture is
More informationConfiguring MDaemon for High Availability
Configuring MDaemon for High Availability This document is intended to provide a general outline of the steps that are required to configure MDaemon for high availability. Modifications may be required
More informationMAXIMUM DATA SECURITY with ideals TM Virtual Data Room
MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for
More informationSystem Requirement Specifications (SRS)
(SRS) Assignment 1 Sample Solution 1 Table of Contents 1 Table of Contents... 1 2 Problem Statement... 2 3 Overview... 2 3.1 Background... 2 3.2 Overall Description... 2 4 Investigation & Analysis Methodology...
More informationSHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
More informationReconfiguring VMware vsphere Update Manager
Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
More informationREMOTE BACKUP-WHY SO VITAL?
REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote
More informationActiv Absence Control Continuity Plan.docx
Activ Absence Control Continuity Plan Ver1.2 Contents 1 Server Infrastructure... 2 2 Backups... 3 3 Server Agility... 3 4 Physical Location... 4 5 Server Monitoring... 4 Page 1 of 1 1 Server Infrastructure
More informationOverview... 1 Requirements... 1. Installing Roles and Features... 3. Creating SQL Server Database... 9 Setting Security Logins...
Contents CHAPTER 1 IMail Server using Failover Clustering Overview... 1 Requirements... 1 CHAPTER 2 IIS Installing Roles and Features... 3 CHAPTER 3 Configuring Storage Area Network Requirements... 5 Connecting
More informationHow To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
More informationHow to Connect to Anonyproz OpenVPN Servers in Failover and Switcher Modes
How to Connect to Anonyproz OpenVPN Servers in Failover and Switcher Modes Anonyproz provides a powerful and feature-packed customized open source OpenVPN GUI client. The latest GUI offers our subscribers
More informationInformation Technology General Controls (ITGCs) 101
Information Technology General Controls (ITGCs) 101 Presented by Sugako Amasaki (Principal Auditor) University of California, San Francisco December 3, 2015 Internal Audit Webinar Series Webinar Agenda
More informationSecurity and Managed Services
iconnect Cloud Archive System Overview Security and Managed Services iconnect Cloud Archive (formerly known as Merge Honeycomb ) iconnect Cloud Archive offers cloud-based storage for medical images. Images
More informationSoftware Application: CampusCruiser Portal Interface
Software Application: CampusCruiser Portal Interface The technology landscape for the 21 st century college and university is transforming at lightning speed. In order to keep pace with new technology
More informationHA / DR Jargon Buster High Availability / Disaster Recovery
HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster
More informationReducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email
Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email Harnessing the Power of Virtualization with an Integrated Solution Based on VMware vsphere and VMware Zimbra WHITE
More informationFive keys to a more secure data environment
Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational
More informationOMNITURE MONITORING. Ensuring the Security and Availability of Customer Data. June 16, 2008 Version 2.0
Ensuring the Security and Availability of Customer Data June 16, 2008 Version 2.0 CHAPTER 1 1 Omniture Monitoring The Omniture Network Operations (NetOps) team has built a highly customized monitoring
More informationIs Cloud-Based WMS an Option for Complex Distribution Centers?
Welcome to Session 233 Is Cloud-Based WMS an Option for Complex Distribution Centers? Presented by: Sponsored by: Chuck Fuerst 2012 Material Handling Industry. Copyright claimed as to audiovisual works
More informationHosted Exchange Service
Hosted Exchange Service Contents Contents... 1 Overview Hosted Exchange... 3 Hosted Exchange Features... 3 Technical Features... 3 Hosted Exchange - MailBox... 4 Hosted Exchange - Key Points... 4 Cloud
More informationSynchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
More informationHow Reflection Software Facilitates PCI DSS Compliance
Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit
More informationUsing WhatsUp IP Address Manager 1.0
Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address
More informationNet-Safe Pro Cloud Backup Installation Guide
Net-Safe Pro Cloud Backup Installation Guide INTRODUCTION The Backup Manager is designed to provide a safe and secure IP backup for business and consumer customers. Our software is now more efficient with
More informationBusiness process efficiency is improved with task management, alerts, notifications and automated process workflows.
UNCLASSIFIED 23/02/2015 v3.3 Cobweb Hosted SharePoint 3.0 Service Description Cobweb Hosted SharePoint is a web-based document collaboration tool that helps you maximise productivity in a truly flexible,
More informationOnline Storage Replacement Strategy/Solution
I. Current Storage Environment Online Storage Replacement Strategy/Solution ISS currently maintains a substantial online storage infrastructure that provides centralized network-accessible storage for
More informationHow To Install An Aneka Cloud On A Windows 7 Computer (For Free)
MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the
More informationOracle Platform as a Service and Infrastructure as a Service Public Cloud Service Descriptions-Metered & Non-Metered.
Oracle Platform as a Service and Infrastructure as a Service Public Cloud Service Descriptions-Metered & Non-Metered August 24, 2015 Contents GLOSSARY PUBLIC CLOUD SERVICES-NON-METERED... 4 ORACLE PLATFORM
More informationSecure, Remote Access for IT Infrastructure Management
Infrastructure Management & Monitoring for Business-Critical Continuity TM Secure, Remote Access for IT Infrastructure Management ACS Advanced Console Server Secure, Remote Access for IT Infrastructure
More informationSUNY Learning Network Service Level Agreement Blackboard Learn Application and Hosting Services
SUNY Learning Network Service Level Agreement Blackboard Learn Application and Hosting Services Scope The SUNY Learning Network (SLN) offers SUNY campuses a managed hosting environment for the Blackboard
More informationGeneral Computer Controls
1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems
More informationAUTOMATED DISASTER RECOVERY SOLUTION USING AZURE SITE RECOVERY FOR FILE SHARES HOSTED ON STORSIMPLE
AUTOMATED DISASTER RECOVERY SOLUTION USING AZURE SITE RECOVERY FOR FILE SHARES HOSTED ON STORSIMPLE Copyright This document is provided "as-is." Information and views expressed in this document, including
More informationNetop Remote Control Security Server
A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days
More informationOcean Park IT Cloud Solution
Ocean Park IT Cloud Solution Request for Expressions of Interest for Design, Implementation and Maintenance of Ocean Park IT Cloud Solution The Ocean Park Corporation (the Corporation) invites expressions
More informationThe Promise of Virtualization for Availability, High Availability, and Disaster Recovery - Myth or Reality?
B.Jostmeyer Tivoli System Automation bjost@de.ibm.com The Promise of Virtualization for Availability, High Availability, and Disaster Recovery - Myth or Reality? IBM Systems Management, Virtualisierung
More informationSERVER CLOUD DISASTER RECOVERY. User Manual
SERVER CLOUD DISASTER RECOVERY User Manual 1 Table of Contents 1. INTRODUCTION... 3 2. ACCOUNT SETUP OVERVIEW... 3 3. GETTING STARTED... 6 3.1 Sign up... 6 4. ACCOUNT SETUP... 8 4.1 AWS Cloud Formation
More information