Fit/Gap Analysis of LDAP Services for the myufl Portal

Size: px
Start display at page:

Download "Fit/Gap Analysis of LDAP Services for the myufl Portal"

Transcription

1 Fit/Gap Analysis of LDAP Services for the myufl Portal The purpose of this document is to document the LDAP requirements of the myufl portal; provide a fit/gap analysis of the current system; and to make recommendations on ways to fulfill the requirement shortfalls. MyUFL Portal LDAP Requirements The myufl portal was quietly launched on March 31 st, Since the launch, there have been several occasions where the portal became unstable due to problems with the LDAP server that were primarily caused by excessive load on the primary LDAP server. Other issues have also existed where the role-based security privileges for a user were incorrect due to the lack of processes to keep the role information updated in the LDAP server. On October 6 th, 2003, a significant publicity campaign will be launched advertising the myufl portal and usage is expected to increase substantially. It is important that the UF constituents using the portal have a positive experience in terms of functionality, reliability and security. To ensure that the LDAP services can properly meet the demands of the myufl portal, the services must: Functionality 1. Provide current and accurate information to authentication and basic authorization requests by the myufl Portal 2. Provide current and accurate information to role-based authorization requests by the myufl Portal 3. Provide current and accurate information for user attributes including UFID, preferred address and full name Reliability 4. Be available on a continual basis without unplanned downtime and with minimal planned maintenance 5. Respond to myufl requests quickly and efficiently Security 6. Assure that communication with the myufl server is secure Fit/Gap Analysis Requirement Analysis 1. The myufl portal must be able to authenticate users dynamically against the LDAP server when they sign on to the portal. The user s GatorLink authentication credentials should be accurate and up-to-date in the LDAP server so that a user does not needlessly receive a sign on error message. The LDAP server is currently updated with user information every 15 minutes while the Kerberos server used to store the user s password is updated in real-time when the

2 password is changed. Based on the validation of the user s credentials, the myufl portal automatically assigns a base level of authorization. Fit: The 15 minute update timeframe of the user s information used for authentication and basic authorization is acceptable. The myufl requirement is met. 2. In addition to the basic authorization that is assigned when a user provides current GatorLink credentials, the myufl portal needs to provide additional authorization based on a user s role. This role can be one or more of the following three: Faculty, Staff and Student. The portal assigns these roles and the associated security authorizations dynamically to users when they sign on to the portal based on the dynamic role lists maintained by the portal. There is one list for each of the three roles and this information is updated via requests to the LDAP server. Each list has a matching group in the LDAP server and this group is downloaded into the portal (replacing the current list) via a manually initiated process. The groups in the LDAP server are also updated from the contents of the UF Registry database via a manually initiated process. The manual update of the groups in the LDAP is currently in two parts. The first part of the update gets the new group information from the database and takes 4-6 hours. The second part assembles the information and loads it into the secondary LDAP server (taking another four hours). The final step is replacing the database of the production LDAP server with a copy from the secondary server. This step can only be performed manually the primary LDAP server is not updated directly due to load issues. Gap: The portal authorization information should be updated at least on a daily basis. This process should occur nightly so that any changes to the Registry during the previous day will be active at the start of business the following day. The manual processes on the portal and the LDAP server do not lend themselves to providing consistent information and need to be automated. The LDAP process should occur first, followed by the portal process, in order to ensure that the role lists are properly updated with the most current information. Allen Rout mentioned that it may be possible to update the with only changes that have occurred since the last update. This should greatly reduce the load on the LDAP server, shorten the time required for the update and allow an automated update of the primary LDAP server to occur. 3. The myufl portal must be able to assign and update key user attributes dynamically against the LDAP server when they sign on to the portal. These attributes currently include the user s UFID, preferred address and full name. The LDAP server is currently updated with user information every 15 minutes. Fit: The 15 minute update timeframe of the user s information used for updating user attributes is acceptable. The myufl requirement is met. 4. The myufl portal is expected to meet a goal of 99.9% uptime on a 24/7 basis and includes planned maintenance windows. As a critical element in all user sessions, the LDAP server must be available on a 24/7, 365 days per year, with minimal planned maintenance windows and will thus be required to operate at a level substantially better than 99.9% uptime. The portal includes a capability to

3 make requests to a backup LDAP server in the event that the primary server is unavailable. This has been implemented and a second LDAP server is in production; however, this only works for a complete failure of the LDAP server. If the primary server is acknowledging requests but not providing results to the requests, then the portal will not switch over to the secondary LDAP server and authentication requests will fail. For development and testing to occur, the secondary LDAP server must be taken offline and used. There are no formal testing processes or roll-out plans in place. Gap: The built-in failover capability of the portal is inadequate. Another mechanism must be implemented that will switch the portal to the secondary LDAP server under any circumstances where the primary LDAP server is unable to fulfill requests. An appropriate testing process/environment and roll-out plan should be in place to help assure that potential bugs are identified and that maintenance windows are minimized. 5. In addition to the LDAP servers being available for requests, they must also be able to respond to requests in a reasonable timeframe. The two types of requests made by the portal are user authentication requests (includes basic authorization and attribute updating) and role-based authorization requests. The authentication requests occur in real time during the sign on process. A user must be able to sign on to the portal in less than 15 seconds which would require the LDAP server to respond in a fraction of that time. The role-based authorization requests occur in a batch process that can be scheduled to occur during off-peak hours. It is critical that the server be available but the batch process can be much more tolerant of latency in requests. The LDAP server is normally able to fulfill real-time authentication requests in under a second while the batch role update process typically takes less than a minute. When the LDAP server is under conditions of heavy load, these times can grow substantially, with the real-time authentication times exceeding 15 seconds in some cases. Generally, these load conditions are not due to daily, interactive requests but rather due to batch updates of the LDAP database. The primary server currently serves all requests until it completely fails, at which time the secondary server would be engaged through the portal s built-in LDAP redundancy. Gap: The LDAP servers should be effectively load balanced. The load balancing should be based on the ability to service authentication requests in less than 5 seconds. The servers should be sized appropriately so they can manage the anticipated daily, interactive load. Batch jobs to update the server databases should be scheduled during off-peak hours where possible and at alternate times on each server if during peak hours. Load testing should be applied to validate sizing and load balancing settings. Allen Rout also mentioned that the structure of the LDAP database could be redone to substantially improve performance. 6. The communication between the LDAP servers and the myufl portal should be secure so that a user s credentials and other attributes cannot be accessed by unauthorized individuals. Both the LDAP servers and the myufl portal reside at the CNS datacenter and are connected by a network that maintains the traffic inside the datacenter. The data passed between the portal and the LDAP servers

4 is not currently encrypted. Fit: Although the network traffic should be encrypted at some future point, it is currently acceptable for the connection to exist on the controlled network in the datacenter. Fit/Gap Recommended Actions Processes must be put in place to automatically update the portal with role-based authentication information on a nightly basis The primary and secondary LDAP servers should be setup so they can achieve fault-tolerance and load balancing Performance enhancing changes should be applied to the update process so it can be fully automated A testing process and environment should be in place for patches and development work; load testing should be included in addition to functional testing A roll-out plan should be developed as an outline for production LDAP changes (optional) The LDAP database should be re-architected to deliver improved performance (optional) The portal/ldap communication should be encrypted with SSL Proposed Solutions Immediate/Short-term Solution Resources: man hours IBM 615 Server (or equivalent) 2) Modify the group update process so that only changed records are moved into the 3) Automate and schedule the update processes to occur nightly in both the portal Recommended/Long-term Solution Resources: man hours IBM 615 Server (or equivalent ~$15k)

5 2) Add new server that will be used as a development and test platform but can also function as at hot spare during migrations into production Long-term Variation #1 Resources: man hours Server ($2-3k) 2) Add new server that will be used as a development and test platform ONLY it will not be appropriate for load testing Long-term Variation #2 Resources: man hours 2) Use the existing secondary server for development; replace in production when finished

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations

Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Can SaaS be your strategic advantage in building software? Presented by: Paul Gatty, Director of World Wide Operations Topics What is SaaS? How does SaaS differ from managed hosting? Advantages of SaaS

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Mediasite EX server deployment guide

Mediasite EX server deployment guide Mediasite EX server deployment guide 2008 Sonic Foundry, Inc. All rights reserved. No part of this document may be copied and/or redistributed without the consent of Sonic Foundry, Inc. Additional copies

More information

RL Solutions Hosting Service Level Agreement

RL Solutions Hosting Service Level Agreement RL Solutions Hosting Service Level Agreement April 2012 Table of Contents I. Context and Scope... 1 II. Defined Terms... 1 III. RL Solutions Responsibilities... 2 IV. Client Responsibilities... 4 V. The

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview

Woodcock-Johnson and Woodcock-Muñoz Language Survey Revised Normative Update Technical and Data Security Overview Houghton Mifflin Harcourt - Riverside (HMH - Riverside) is pleased to offer online scoring and reporting for Woodcock-Johnson IV (WJ IV) and Woodcock-Muñoz Language Survey Revised Normative Update (WMLS-R

More information

Frequently Asked Questions

Frequently Asked Questions Frequently Asked Questions Page 1 Instsanda FAQs v1.2 Instanda FAQs Contents Hosting, Security, Monitoring and Management... 3 Where is Instanda hosted?... 3 What is the hosting datacentre compliance?...

More information

Secure Hosting Solutions For SAGE Energy Management

Secure Hosting Solutions For SAGE Energy Management Secure Hosting Environment Partnerships In order to provide advanced levels of infrastructure security, Armstrong has partnered with two entities. Logicalis Inc. is recognized as a Channel Company s 2015

More information

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan

SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan SysAid IT On-Demand Architecture Including Security and Disaster Recovery Plan This document covers three aspects of SysAid IT On-Demand: Architecture Security Business Continuity and Disaster Recovery

More information

How SITEFORUM provides you with main components to build and run an innovative cloud computing service for an industry or special interest group

How SITEFORUM provides you with main components to build and run an innovative cloud computing service for an industry or special interest group Status: June 2011 How SITEFORUM provides you with main components to build and run an innovative cloud computing service for an industry or special interest group tags: software, social business, online

More information

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive.

This document and the information contained herein are the property of Bowman Systems L.L.C. and should be considered business sensitive. SERVICEPOINT SECURING CLIENT DATA This document and the information contained herein are the property of and should be considered business sensitive. Copyright 2006 333 Texas Street Suite 300 Shreveport,

More information

The Bomgar Appliance in the Network

The Bomgar Appliance in the Network The Bomgar Appliance in the Network The architecture of the Bomgar application environment relies on the Bomgar Appliance as a centralized routing point for all communications between application components.

More information

Remote MasterMind for Mobility. Mobile Device Management Software

Remote MasterMind for Mobility. Mobile Device Management Software Remote MasterMind for Mobility Mobile Device Management Software Remote MasterMind for Mobility You have mobility devices in locations all across the area, state, or country. They are constantly on the

More information

Tips and Best Practices for Managing a Private Cloud

Tips and Best Practices for Managing a Private Cloud Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies

More information

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0

Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies Effective Date: October 1, 2015 Version 1.0 Unless otherwise stated, these Oracle Maps Cloud Service Enterprise Hosting and Delivery Policies

More information

AVLOR SERVER CLOUD RECOVERY

AVLOR SERVER CLOUD RECOVERY AVLOR SERVER CLOUD RECOVERY WHITE PAPER 1 Table of Contents Abstract... 2 1. Introduction... 3 2. Server Cloud Recovery... 3 3. Amazon AWS Cloud... 4 a. What it is... 4 b. Why Use AWS?... 5 4. Difficulties

More information

Legalesign Service Definition Electronic signature and contract management service

Legalesign Service Definition Electronic signature and contract management service Legalesign Service Definition Electronic signature and contract management service Legalesign Limited UN House, 4 Hunter Square, Edinburgh, EH1 1QW Tel: 0131 463 9099 Email: email@legalesign.com Overview

More information

Remote MasterMind for Mobility 2.5. Mobile Device Management Software

Remote MasterMind for Mobility 2.5. Mobile Device Management Software Remote MasterMind for Mobility 2.5 Mobile Device Management Software Remote MasterMind for Mobility 2.5 You have mobility devices in locations all across the area, state, or country. They are constantly

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Establishing Environmental Best Practices. Brendan Law Blaw@td.com.au @FlamerNZ Flamer.co.nz/spag/

Establishing Environmental Best Practices. Brendan Law Blaw@td.com.au @FlamerNZ Flamer.co.nz/spag/ Establishing Environmental Best Practices Brendan Law Blaw@td.com.au @FlamerNZ Flamer.co.nz/spag/ Agenda Active Directory Service Accounts Database Platform Windows Platform Data Storage Planning Virtualisation

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

Cloud Management. Overview. Cloud Managed Networks

Cloud Management. Overview. Cloud Managed Networks Datasheet Cloud Management Cloud Management Overview Meraki s cloud based management provides centralized visibility & control over Meraki s wired & wireless networking hardware, without the cost and complexity

More information

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99%

Collaborate on your projects in a secure environment. Physical security. World-class datacenters. Uptime over 99% Security overview Collaborate on your projects in a secure environment Thousands of businesses, including Fortune 500 corporations, trust Wrike for managing their projects through collaboration in the

More information

Where-to-Web-to-Print? Hosted versus On-Site

Where-to-Web-to-Print? Hosted versus On-Site Where-to-Web-to-Print? Hosted versus On-Site Overview Where-to-Web-to-Print? Web-to-Print has crossed the chasm. This concept was introduced by Geoffrey A. Moore in his book Crossing The Chasm. Moore

More information

Agilisys G-Cloud Service V

Agilisys G-Cloud Service V Agilisys G-Cloud Service V Service Definition Endpoint Management Lot 1 Infrastructure as a Service (IaaS) April 2014 At Agilisys we deliver success through innovation working with our clients to transform

More information

Why Email Fails MessageOne Survey of Email Outages

Why Email Fails MessageOne Survey of Email Outages Why Email Fails MessageOne Survey of Email Outages White Paper MessageOne, Inc. 11044 Research Blvd. Building C, Fifth Floor Austin, TX 78759 Toll-Free: 888.367.0777 Telephone: 512.652.4500 Fax: 512.652.4504

More information

User Manual. (updated December 15, 2014) Information in this document is subject to change without notice.

User Manual. (updated December 15, 2014) Information in this document is subject to change without notice. User Manual (updated December 15, 2014) Information in this document is subject to change without notice. Copyright 2013-2014, Exacq Technologies, Inc. All rights reserved. Exacq Technologies is a trademark

More information

How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2

How To Install Powerpoint 6 On A Windows Server With A Powerpoint 2.5 (Powerpoint) And Powerpoint 3.5.5 On A Microsoft Powerpoint 4.5 Powerpoint (Powerpoints) And A Powerpoints 2 DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...

More information

WhatsUpGold. v3.0. WhatsConnected User Guide

WhatsUpGold. v3.0. WhatsConnected User Guide WhatsUpGold v3.0 WhatsConnected User Guide Contents CHAPTER 1 Welcome to WhatsConnected Finding more information and updates... 2 Sending feedback... 3 CHAPTER 2 Installing and Configuring WhatsConnected

More information

Autodesk PLM 360 Security Whitepaper

Autodesk PLM 360 Security Whitepaper Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure

More information

SQL Server Mirroring. Introduction. Setting up the databases for Mirroring

SQL Server Mirroring. Introduction. Setting up the databases for Mirroring SQL Server Mirroring The purpose of this document is to describe in detail the process of configuring Secret Server and SQL Server 2008 for a high-availability environment using Mirroring. The contents

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table December 2011 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module

Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module Migration and Building of Data Centers in IBM SoftLayer with the RackWare Management Module June, 2015 WHITE PAPER Contents Advantages of IBM SoftLayer and RackWare Together... 4 Relationship between

More information

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)?

Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? SaaS vs. COTS Why SaaS (Software as a Service) and not COTS (Commercial Off The Shelf software)? Unlike COTS solutions, SIMCO s CERDAAC is software that is offered as a service (SaaS). This offers several

More information

Troux Hosting Options

Troux Hosting Options Troux Hosting Options Introducing Troux Hosting Options Benefits of a Hosted Troux Environment...3 Convenience...3 Time-to-Value...3 Reduced Cost of Ownership...3 Scalability and Flexibility...3 Security...4

More information

Service Level Program for Ariba cloud Services. Service Accessibility Warranty Security Miscellaneous

Service Level Program for Ariba cloud Services. Service Accessibility Warranty Security Miscellaneous Service Level Program for Ariba cloud Services Service Accessibility Warranty Security Miscellaneous 1. Service Accessibility Warranty a. Applicability. The Service Accessibility Warranty applies to the

More information

Executive Brief Infor Cloverleaf High Availability. Downtime is not an option

Executive Brief Infor Cloverleaf High Availability. Downtime is not an option Executive Brief Infor Cloverleaf High Availability Downtime is not an option Gain value from Infor by: Delivering continuous access to mission-critical systems and data Providing uninterrupted continuity

More information

Privileged Access Management Upgrade Guide

Privileged Access Management Upgrade Guide Privileged Access Management Upgrade Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

ReadyNAS Remote White Paper. NETGEAR May 2010

ReadyNAS Remote White Paper. NETGEAR May 2010 ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that

More information

Centrify Cloud Connector Deployment Guide

Centrify Cloud Connector Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as

More information

CompTIA Cloud+ 9318; 5 Days, Instructor-led

CompTIA Cloud+ 9318; 5 Days, Instructor-led CompTIA Cloud+ 9318; 5 Days, Instructor-led Course Description The CompTIA Cloud+ certification validates the knowledge and best practices required of IT practitioners working in cloud computing environments,

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! http://www.pass4test.com We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way! http://www.pass4test.com We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : C5050-280 Title : IBM Cloud Computing Infrastructure Architect V1 Vendors

More information

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend:

CompTIA Cloud+ Course Content. Length: 5 Days. Who Should Attend: CompTIA Cloud+ Length: 5 Days Who Should Attend: Project manager, cloud computing services Cloud engineer Manager, data center SAN Business analyst, cloud computing Summary: The CompTIA Cloud+ certification

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

A. Hot-Standby mode and Active-Standby mode in High Availability

A. Hot-Standby mode and Active-Standby mode in High Availability High Availability (HA) is the feature that ensures the business continuity for your organization. IT staff can take HA as a simple solution for the disaster recovery. DrayTek utilizes the Common Address

More information

Azeus Convene Paperless Board and EXECUTIVE Meetings

Azeus Convene Paperless Board and EXECUTIVE Meetings Service Definition Azeus Convene Paperless Board and EXECUTIVE Meetings 1. An Overview of the G- Cloud Service (functional, non functional) Azeus Convene replaces meeting papers with a user-friendly mobile

More information

WEAVEonline: Technical FAQs

WEAVEonline: Technical FAQs WEAVEonline: Technical FAQs 1. What is WEAVEonline? WEAVEonline is our core product, a powerful software application that addresses the need to develop and maintain continuous improvement processes for

More information

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows

Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Advantage Cloud sm Software Installation, Configuration, and Performance Guide for Windows Compulink Business Systems, Inc. 2645 Townsgate Road, Suite 200 Westlake Village, CA 91361 2013 Compulink

More information

000-280. IBM Cloud Computing Infrastructure Architect V1. Version: Demo. Page <<1/9>>

000-280. IBM Cloud Computing Infrastructure Architect V1. Version: Demo. Page <<1/9>> 000-280 IBM Cloud Computing Infrastructure Architect V1 Version: Demo Page 1.Cloud architectures designed for service delivery and availability of services are extremely important. How is software

More information

Cloud Computing project Report

Cloud Computing project Report Name: Trasily Krishnan Shanmugham Cloud Computing project Report An online business can use load balancing and auto-scaling to support unexpected usage peaks and save money when usage is lower. Amazon

More information

TIBCO Spotfire Platform IT Brief

TIBCO Spotfire Platform IT Brief Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily

More information

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD)

Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Appendix E to DIR Contract Number DIR-TSO-2736 CLOUD SERVICES CONTENT (ENTERPRISE CLOUD & PRIVATE CLOUD) Enterprise Cloud Resource Pool Services Features Sungard AS will provide the following in connection

More information

High Availability White Paper

High Availability White Paper High Availability White Paper This document provides an overview of high availability best practices for mission critical applications. Author: George Quinlan, Senior Consultant Background - High Availability

More information

Creating A Highly Available Database Solution

Creating A Highly Available Database Solution WHITE PAPER Creating A Highly Available Database Solution Advantage Database Server and High Availability TABLE OF CONTENTS 1 Introduction 1 High Availability 2 High Availability Hardware Requirements

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

HP Remote Monitoring. How do I acquire it? What types of remote monitoring tools are in use? What is HP Remote Monitoring?

HP Remote Monitoring. How do I acquire it? What types of remote monitoring tools are in use? What is HP Remote Monitoring? HP Remote Monitoring HP Remote Monitoring is an efficient, secure means of collecting and reporting usage data from your printing and imaging output environment. What is HP Remote Monitoring? HP Remote

More information

Table of Contents. CSC CloudCompute Service Description Summary CSC 1

Table of Contents. CSC CloudCompute Service Description Summary CSC 1 Table of Contents Overview... 2 CSC CloudCompute Infrastructure... 2 Virtual Environment... 2 Compute Capacity... 2 Networks... 3 CSC Cloud Store Overview... 3 Service Tier Choices... 3 CloudCompute Storage...

More information

How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On

How To Backup Your Computer With A Remote Drive Client On A Pc Or Macbook Or Macintosh (For Macintosh) On A Macbook (For Pc Or Ipa) On An Uniden (For Ipa Or Mac Macbook) On Remote Drive PC Client software User Guide -Page 1 of 27- PRIVACY, SECURITY AND PROPRIETARY RIGHTS NOTICE: The Remote Drive PC Client software is third party software that you can use to upload your files

More information

Remote MasterMind 3.0. Mobile Device & Bar Code Scanner Management Solution

Remote MasterMind 3.0. Mobile Device & Bar Code Scanner Management Solution 3.0 Mobile Device & Bar Code Scanner Management Solution is Honeywell s 3.0 You have mobility and bar code scanning devices in locations all across your enterprise. They are constantly on the move or situated

More information

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES

TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES TECHNICAL AND ORGANIZATIONAL DATA SECURITY MEASURES Contents Introduction... 3 The Technical and Organizational Data Security Measures... 3 Access Control of Processing Areas (Physical)... 3 Access Control

More information

SaaS Service Level Agreement (SLA)

SaaS Service Level Agreement (SLA) SaaS Service Level Agreement (SLA) The purpose of this document is to define the Service Level Agreement (SLA) for the maintenance and support of the Hosting Service ( Service ). Service Level Agreements

More information

SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX

SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX SPRINT MANAGED SECURITY SERVICES PRODUCT ANNEX The following terms and conditions, together with the Sprint Master or Custom Services Agreement or Domestic Sprint Services Sales Application Form ("Agreement"),

More information

PROMAPP TECHNICAL INFORMATION

PROMAPP TECHNICAL INFORMATION Promapp Software Architecture Promapp is designed in accordance with Microsoft best practices, developed with the Microsoft.net framework and uses a Microsoft SQL database. The software architecture is

More information

Configuring MDaemon for High Availability

Configuring MDaemon for High Availability Configuring MDaemon for High Availability This document is intended to provide a general outline of the steps that are required to configure MDaemon for high availability. Modifications may be required

More information

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room MAXIMUM DATA SECURITY with ideals TM Virtual Data Room WWW.IDEALSCORP.COM ISO 27001 Certified Account Settings and Controls Administrators control users settings and can easily configure privileges for

More information

System Requirement Specifications (SRS)

System Requirement Specifications (SRS) (SRS) Assignment 1 Sample Solution 1 Table of Contents 1 Table of Contents... 1 2 Problem Statement... 2 3 Overview... 2 3.1 Background... 2 3.2 Overall Description... 2 4 Investigation & Analysis Methodology...

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

Reconfiguring VMware vsphere Update Manager

Reconfiguring VMware vsphere Update Manager Reconfiguring VMware vsphere Update Manager vsphere Update Manager 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

REMOTE BACKUP-WHY SO VITAL?

REMOTE BACKUP-WHY SO VITAL? REMOTE BACKUP-WHY SO VITAL? Any time your company s data or applications become unavailable due to system failure or other disaster, this can quickly translate into lost revenue for your business. Remote

More information

Activ Absence Control Continuity Plan.docx

Activ Absence Control Continuity Plan.docx Activ Absence Control Continuity Plan Ver1.2 Contents 1 Server Infrastructure... 2 2 Backups... 3 3 Server Agility... 3 4 Physical Location... 4 5 Server Monitoring... 4 Page 1 of 1 1 Server Infrastructure

More information

Overview... 1 Requirements... 1. Installing Roles and Features... 3. Creating SQL Server Database... 9 Setting Security Logins...

Overview... 1 Requirements... 1. Installing Roles and Features... 3. Creating SQL Server Database... 9 Setting Security Logins... Contents CHAPTER 1 IMail Server using Failover Clustering Overview... 1 Requirements... 1 CHAPTER 2 IIS Installing Roles and Features... 3 CHAPTER 3 Configuring Storage Area Network Requirements... 5 Connecting

More information

How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication

How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

How to Connect to Anonyproz OpenVPN Servers in Failover and Switcher Modes

How to Connect to Anonyproz OpenVPN Servers in Failover and Switcher Modes How to Connect to Anonyproz OpenVPN Servers in Failover and Switcher Modes Anonyproz provides a powerful and feature-packed customized open source OpenVPN GUI client. The latest GUI offers our subscribers

More information

Information Technology General Controls (ITGCs) 101

Information Technology General Controls (ITGCs) 101 Information Technology General Controls (ITGCs) 101 Presented by Sugako Amasaki (Principal Auditor) University of California, San Francisco December 3, 2015 Internal Audit Webinar Series Webinar Agenda

More information

Security and Managed Services

Security and Managed Services iconnect Cloud Archive System Overview Security and Managed Services iconnect Cloud Archive (formerly known as Merge Honeycomb ) iconnect Cloud Archive offers cloud-based storage for medical images. Images

More information

Software Application: CampusCruiser Portal Interface

Software Application: CampusCruiser Portal Interface Software Application: CampusCruiser Portal Interface The technology landscape for the 21 st century college and university is transforming at lightning speed. In order to keep pace with new technology

More information

HA / DR Jargon Buster High Availability / Disaster Recovery

HA / DR Jargon Buster High Availability / Disaster Recovery HA / DR Jargon Buster High Availability / Disaster Recovery Welcome to Maxava s Jargon Buster. Your quick reference guide to Maxava HA and industry technical terms related to High Availability and Disaster

More information

Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email

Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email Reducing the Cost and Complexity of Business Continuity and Disaster Recovery for Email Harnessing the Power of Virtualization with an Integrated Solution Based on VMware vsphere and VMware Zimbra WHITE

More information

Five keys to a more secure data environment

Five keys to a more secure data environment Five keys to a more secure data environment A holistic approach to data infrastructure security Compliance professionals know better than anyone how compromised data can lead to financial and reputational

More information

OMNITURE MONITORING. Ensuring the Security and Availability of Customer Data. June 16, 2008 Version 2.0

OMNITURE MONITORING. Ensuring the Security and Availability of Customer Data. June 16, 2008 Version 2.0 Ensuring the Security and Availability of Customer Data June 16, 2008 Version 2.0 CHAPTER 1 1 Omniture Monitoring The Omniture Network Operations (NetOps) team has built a highly customized monitoring

More information

Is Cloud-Based WMS an Option for Complex Distribution Centers?

Is Cloud-Based WMS an Option for Complex Distribution Centers? Welcome to Session 233 Is Cloud-Based WMS an Option for Complex Distribution Centers? Presented by: Sponsored by: Chuck Fuerst 2012 Material Handling Industry. Copyright claimed as to audiovisual works

More information

Hosted Exchange Service

Hosted Exchange Service Hosted Exchange Service Contents Contents... 1 Overview Hosted Exchange... 3 Hosted Exchange Features... 3 Technical Features... 3 Hosted Exchange - MailBox... 4 Hosted Exchange - Key Points... 4 Cloud

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property

More information

How Reflection Software Facilitates PCI DSS Compliance

How Reflection Software Facilitates PCI DSS Compliance Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit

More information

Using WhatsUp IP Address Manager 1.0

Using WhatsUp IP Address Manager 1.0 Using WhatsUp IP Address Manager 1.0 Contents Table of Contents Welcome to WhatsUp IP Address Manager Finding more information and updates... 1 Sending feedback... 2 Installing and Licensing IP Address

More information

Net-Safe Pro Cloud Backup Installation Guide

Net-Safe Pro Cloud Backup Installation Guide Net-Safe Pro Cloud Backup Installation Guide INTRODUCTION The Backup Manager is designed to provide a safe and secure IP backup for business and consumer customers. Our software is now more efficient with

More information

Business process efficiency is improved with task management, alerts, notifications and automated process workflows.

Business process efficiency is improved with task management, alerts, notifications and automated process workflows. UNCLASSIFIED 23/02/2015 v3.3 Cobweb Hosted SharePoint 3.0 Service Description Cobweb Hosted SharePoint is a web-based document collaboration tool that helps you maximise productivity in a truly flexible,

More information

Online Storage Replacement Strategy/Solution

Online Storage Replacement Strategy/Solution I. Current Storage Environment Online Storage Replacement Strategy/Solution ISS currently maintains a substantial online storage infrastructure that provides centralized network-accessible storage for

More information

How To Install An Aneka Cloud On A Windows 7 Computer (For Free)

How To Install An Aneka Cloud On A Windows 7 Computer (For Free) MANJRASOFT PTY LTD Aneka 3.0 Manjrasoft 5/13/2013 This document describes in detail the steps involved in installing and configuring an Aneka Cloud. It covers the prerequisites for the installation, the

More information

Oracle Platform as a Service and Infrastructure as a Service Public Cloud Service Descriptions-Metered & Non-Metered.

Oracle Platform as a Service and Infrastructure as a Service Public Cloud Service Descriptions-Metered & Non-Metered. Oracle Platform as a Service and Infrastructure as a Service Public Cloud Service Descriptions-Metered & Non-Metered August 24, 2015 Contents GLOSSARY PUBLIC CLOUD SERVICES-NON-METERED... 4 ORACLE PLATFORM

More information

Secure, Remote Access for IT Infrastructure Management

Secure, Remote Access for IT Infrastructure Management Infrastructure Management & Monitoring for Business-Critical Continuity TM Secure, Remote Access for IT Infrastructure Management ACS Advanced Console Server Secure, Remote Access for IT Infrastructure

More information

SUNY Learning Network Service Level Agreement Blackboard Learn Application and Hosting Services

SUNY Learning Network Service Level Agreement Blackboard Learn Application and Hosting Services SUNY Learning Network Service Level Agreement Blackboard Learn Application and Hosting Services Scope The SUNY Learning Network (SLN) offers SUNY campuses a managed hosting environment for the Blackboard

More information

General Computer Controls

General Computer Controls 1 General Computer Controls Governmental Unit: University of Mississippi Financial Statement Date: June 30, 2007 Prepared by: Robin Miller and Kathy Gates Date: 6/29/2007 Description of computer systems

More information

AUTOMATED DISASTER RECOVERY SOLUTION USING AZURE SITE RECOVERY FOR FILE SHARES HOSTED ON STORSIMPLE

AUTOMATED DISASTER RECOVERY SOLUTION USING AZURE SITE RECOVERY FOR FILE SHARES HOSTED ON STORSIMPLE AUTOMATED DISASTER RECOVERY SOLUTION USING AZURE SITE RECOVERY FOR FILE SHARES HOSTED ON STORSIMPLE Copyright This document is provided "as-is." Information and views expressed in this document, including

More information

Netop Remote Control Security Server

Netop Remote Control Security Server A d m i n i s t r a t i o n Netop Remote Control Security Server Product Whitepaper ABSTRACT Security is an important factor when choosing a remote support solution for any enterprise. Gone are the days

More information

Ocean Park IT Cloud Solution

Ocean Park IT Cloud Solution Ocean Park IT Cloud Solution Request for Expressions of Interest for Design, Implementation and Maintenance of Ocean Park IT Cloud Solution The Ocean Park Corporation (the Corporation) invites expressions

More information

The Promise of Virtualization for Availability, High Availability, and Disaster Recovery - Myth or Reality?

The Promise of Virtualization for Availability, High Availability, and Disaster Recovery - Myth or Reality? B.Jostmeyer Tivoli System Automation bjost@de.ibm.com The Promise of Virtualization for Availability, High Availability, and Disaster Recovery - Myth or Reality? IBM Systems Management, Virtualisierung

More information

SERVER CLOUD DISASTER RECOVERY. User Manual

SERVER CLOUD DISASTER RECOVERY. User Manual SERVER CLOUD DISASTER RECOVERY User Manual 1 Table of Contents 1. INTRODUCTION... 3 2. ACCOUNT SETUP OVERVIEW... 3 3. GETTING STARTED... 6 3.1 Sign up... 6 4. ACCOUNT SETUP... 8 4.1 AWS Cloud Formation

More information