A Role-Based Access Control (RBAC) Schema for REAP
|
|
|
- Egbert Matthews
- 10 years ago
- Views:
Transcription
1 ORNL/TM-2013/45085 A Role-Based Access Control (RBAC) Schema for REAP September 2013 Prepared by H.B. Klasky, P.T. Williams, S.K. Tadinada, B.R. Bass ORNL
2 DOCUMENT AVAILABILITY Reports produced after January 1, 1996, are generally available free via the U.S. Department of Energy (DOE) Information Bridge. Web site Reports produced before January 1, 1996, may be purchased by members of the public from the following source. National Technical Information Service 5285 Port Royal Road Springfield, VA Telephone ( ) TDD Fax Web site Reports are available to DOE employees, DOE contractors, Energy Technology Data Exchange (ETDE) representatives, and International Nuclear Information System (INIS) representatives from the following source. Office of Scientific and Technical Information P.O. Box 62 Oak Ridge, TN Telephone Fax Web site This report was prepared as an account of work sponsored by an agency of the United States Government. Neither the United States Government nor any agency thereof, nor any of their employees, makes any warranty, express or implied, or assumes any legal liability or responsibility for the accuracy, completeness, or usefulness of any information, apparatus, product, or process disclosed, or represents that its use would not infringe privately owned rights. Reference herein to any specific commercial product, process, or service by trade name, trademark, manufacturer, or otherwise, does not necessarily constitute or imply its endorsement, recommendation, or favoring by the United States Government or any agency thereof. The views and opinions of authors expressed herein do not necessarily state or reflect those of the United States Government or any agency thereof.
3 ORNL/TM-2013/45085 Computational Sciences and Engineering Division A ROLE-BASED ACCESS CONTROL SCHEMA FOR REAP Author(s) H.B. Klasky P.T. Williams S.K. Tadinada B.R. Bass Date Published: September 2013 Prepared by OAK RIDGE NATIONAL LABORATORY Oak Ridge, Tennessee Managed by UT-BATTELLE, LLC for the U.S. DEPARTMENT OF ENERGY under contract DE-AC05-00OR22725
4
5 CONTENTS CONTENTS... iii LIST OF FIGURES... v LIST OF TABLES... vii abstract INTRODUCTION BACKGROUND BASICS OF WEB APPLICATION SECURITY Access Control data security requirements for reap web application ACTION LIST Actions on the Embrittlement Database Generic Actions ROLES PERMISSIONS SPECIFIC REQUIREMENTS current design DESCRIPTION OF EXISTING APPROACH FOR REAP'S SECURITY Databases Handling permissions to actions / viewing information LIMITATIONS OF EXISTING DESIGN AND NEED FOR A BETTER ONE? Types of available access control frameworks compatible with ASP.NET AUTHENTICATION Windows Authentication [6] Forms Authentication Passport Authentication Custom Authentication: JOSSO Framework Authentication Selection AUTHORIZATION Implementation the windows authentication framework on reap AUTHORIZATION EXAMPLE: CUSTOM ACCESS EXAMPLE: CUSTOM VIEW CONCLUSION FUTURE WORK REFERENCES Page iii
6
7 LIST OF FIGURES Figure Page Figure 1 Effects of Neutron Embrittlement in Ferritic Steels... 9 Figure 2 Data Flow in REAP Web Application Figure 3 Role-based Access Control Versus Traditional Access Control (Courtesy: Ref. 5) Figure 4 REAP Database Model Design Figure 5 Screenshot of the security tab of the ASP.NET website administration tool Figure 6 Screenshot of the role management page in the ASP.NET website administration tool Figure 7 An example screenshot depicting customizable view in the authorization framework v
8
9 LIST OF TABLES Table Page Table 1 Descriptions of various database tables in REAP Table 2 Permissions of each user-role to perform a specified action vii
10
11 ABSTRACT This document discusses various issues in implementing a robust access control schema to secure the Reactor Embrittlement Archive Project (REAP) web application. REAP application has been designed to allow different types of users. Consequently, it is vital to ensure that REAP website has a robust security framework in order to prevent intrusion, to protect data and resources from misuse, and protect data from malicious or unintentional modification by users. Various possible alternatives for authentication frameworks in ASP.NET - Windows, Forms, Passport and custom (JOSSO) authentication frameworks are evaluated. It is concluded that Windows Authentication is apt for REAP. Various elements of implementation are discussed with examples. 1. INTRODUCTION 1.1 BACKGROUND Exposure to neutrons in the beltline region of the reactor pressure vessel surrounding the reactor core degrades the fracture toughness of RPV steels and results in the increase of a ductile-to-brittle transition temperature (DBTT) that marks the transition between low toughness brittle and high toughness ductile fracture regimes, see Figure 1. Figure 1 Effects of Neutron Embrittlement in Ferritic Steels It is well recognized that neutron irradiation embrittlement of ferritic steels in pressure-retaining components of reactor coolant pressure boundary in light water nuclear power reactors could sometimes limit the service life of a nuclear power plant. Within the U.S. nuclear regulatory framework, Title 10 of the Code of Federal Regulations Part 50, "Domestic Licensing of Production and Utilization Facilities,", Appendix H, "Reactor Vessel Material Surveillance Program Requirements" stipulates a material surveillance program required to monitor changes in the fracture toughness properties of ferritic materials in the reactor vessel beltline region of light water nuclear power reactors which result from exposure of these materials to neutron
12 irradiation and the thermal environment. Under the program, fracture toughness tests are performed on material specimens exposed in surveillance capsules which are withdrawn periodically from the reactor vessel. The fracture toughness test data is compared against the fracture toughness requirements described in Section IV of Appendix G to Part 50 in Title 10 CFR in order to ascertain if the adequate margins of safety are provided during any normal operation, including anticipated operational occurrences and system hydrostatic tests, to which the pressure boundary may be subjected over its service lifetime. These surveillance reports and data form crucial elements in development of predictive models of Neutron Irradiation Embrittlement for light water reactor (LWR) RPVs. The Reactor Embrittlement Archive Project (REAP) [10] conducted by the Oak Ridge National Laboratory (ORNL) under funding from the United States Nuclear Regulatory Commission s (NRC) Office of Nuclear Regulatory Research, aims to provide a web-based archival source of information concerning the effects of neutron radiation on the properties of reactor pressure vessel steels. The REAP website is designed to provide access to information in two forms: 1. A Document Archive, which provides access to files in PDF format of original source documents (e.g., technical reports), and 2. A Data Archive, which provides access, in a relational database format, to information extracted from the document archive. The initial release of REAP focuses on data collected as part of surveillance programs for lightwater, moderated, nuclear power reactor vessels operated in the United States. This includes data on Charpy V-notch energy, tensile properties, composition, exposure temperature, flux, and fluence. Additionally, REAP contains some data from surveillance programs conducted in other countries. REAP application hosts archives of data from multiple sources and it is expected that the web application will allow several types of users work concurrently. Consequently, it is vital to ensure that REAP website has a robust security framework in order to prevent intrusion, to protect data and resources from misuse, and protect files from malicious or unintentional modification by users. This document details a proposal of security features for the REAP web application. Various possible alternatives for authentication frameworks in ASP.NET - Windows, Forms, Passport and custom (JOSSO) authentication frameworks are evaluated. It is concluded that Windows Authentication is apt for REAP. Various elements of implementation are discussed with examples. 1.2 BASICS OF WEB APPLICATION SECURITY Security is a critical part of any web-application in order to ensure that it performs reliably in all user-environments and is not susceptible to malicious attacks that may result in loss of important information. Web applications allow users access to a central resource the Web server and through it, to others such as database servers. Figure 2 presents a schematic representation of the REAP web-application's data flow. The three basic standards for information security of any web application are sometimes referred to as the C-I-A triad [1,2] : 1. Confidentiality (C) - prevent the disclosure of information to unauthorized individuals/systems 2. Integrity (I) - protect data from modification or deletion by unauthorized parties 3. Availability (A) - ensure reliable functioning of systems, access channels, and authentication mechanisms so that the information they provide and protect is available when needed.
13 Figure 2 Data Flow in REAP Web Application Of the many aspects of security like authentication, authorization, data privacy, data integrity etc., the fundamental security concepts are: Authentication is the process of identifying and verifying a client seeking to use the application. It confirms that users are who they say they are. Authorization is the process of determining if a particular client is cleared against accessing specific information on the server Access Control A security model that implements the Authentication and Authorization policy is called an Access Control model. There are various access control models [3]: a. Discretionary Access Control b. Mandatory Access Control c. Role-based Access Control Of the three access control models, the most widely adopted access control for commercial and non-military web applications is the Role-based Access control model [4]. Figure 3 delineates the difference between the traditional and the role-based access control models [5].
14 Figure 3 Role-based Access Control Versus Traditional Access Control (Courtesy: Ref. 5) For complex web-applications with a large number of anticipated users, it is unwieldy to use traditional methods of access control, which require defining a large number of individual access policies or rules for each specific user. Instead, the Role Based Access Control (RBAC) model works by grouping similar kind of users into various "user roles". And the "permission" to access specific information is assigned to the designated user-roles. This introduction of "Roles" and "Permissions" facilitates easy description of complex access control policies while reducing administrative errors and costs. Based on the discussion above, it can be seen that the Role-Based Access Control model is a flexible, scalable and appropriate security model and is therefore adopted for the REAP web application as well. 2. DATA SECURITY REQUIREMENTS FOR REAP WEB APPLICATION In order to implement the Role-Based Access Control (RBAC) schema for the REAP application, we need to first do the following: (1) Identify all possible actions over the archival data in the embrittlement database (2) Categorize expected users into user roles (3) Assign permissions for each action in (1) for each user role defined in (2). 2.1 ACTION LIST Actions on the Embrittlement Database The embrittlement data on REAP is stored as a relational database organized as a collection of the following data-tables:
15 Table 1 Descriptions of various database tables in REAP Citation Plant Capsule Material TABLE Chemistry Heat Treatment Charpy Specimens Tensile Specimens DESCRIPTION References to the surveillance reports Power reactor nuclear plants The containment vessel within a nuclear power plant Information about the material of which a plant s capsule is made Information about the chemical composition of a material Information about the process of subjecting a material to a cycle of heating and cooling to change the metallurgy of the material. Information about a Charpy test that is performed on a material Information about a tensile test that is performed on a material The REAP database model design is reproduced from Ref. [10] in Figure 4: Figure 4 REAP Database Model Design The various possible actions on these data-tables include the CRUD [11] and are listed below: 1. Create (C) 2. Delete (D) 3. Edit (E) 4. Read (R) 5. Use (U) All users may be allowed some or none of the above actions on each of the data-tables.
16 2.1.2 Generic Actions Additionally, the following generic / system-level actions may be possible: 1. Login 2. Logout 3. Registering 4. Searching through the website 5. Reporting 2.2 ROLES Based on the list of all possible actions listed in Section 2.1, users on the REAP application may be grouped into three user-roles : 1. Admin Embrittlement Web Application Administrator 2. Checker Data checker 3. Viewer 2.3 PERMISSIONS Having defined clearly the set of possible actions and the user roles, we can now proceed to assign the permissions of each user role to perform a particular action. This activity is presented in Table 2.
17 Table 2 Permissions of each user-role to perform a specified action Actions on the REAP Database Tables Roles Admin Checker Viewer Citations X CER U Plant/ plant_alias X CER U Capsules X CER U Materials X CER U Specimens (Charpy/Tensile) X CER U Heat Treatment X CER U Chemistry X CER U Generic Actions Roles -> Admin Checker Viewer Login U U U Logout U U U Registering U U N Searching U U U Reporting U U U Legend Privileges: ALL CREATE EDIT READ USE NONE X C E R U N 2.4 SPECIFIC REQUIREMENTS Having defined the basic requirements for implementing the RBAC schema, the specific requirements of the REAP application are summarized as follows: The identity of every user on REAP must be authenticated on the ORNL server upon verifying the credentials supplied through the XCAMS/UCAMS login page. Upon successful login, a session is created and the authenticated user is designated his prespecified user-role. The website shall always render views and display only those links as applicable to the userrole of the authenticated user. The web application shall accept only authorized HTTP requests as applicable to the user-role of the authenticated user. The web application shall allow only authorized users to perform allowable actions on the data such as Create, Read, Use, Delete and Edit in the various sections of the embrittlement database
18 Masking proprietary data to the degree required by the contributor (that is, in some cases just obscuring the reactor that the data came from, or in other cases, obscuring the entire data record) The website shall automatically end the user s session and log out the user if inactivity is detected for more than a stipulated time (say 30 minutes). 3. CURRENT DESIGN 3.1 DESCRIPTION OF EXISTING APPROACH FOR REAP'S SECURITY Databases Currently three tables in the REAP database are used to store the various information regarding authentication and authorized roles for each user: (i) xcams_person: A list of all the authenticated users and their information including user names first name, last name, , affiliation, address, phone etc. (ii) user_role: A list of all user roles. Currently, there are three roles: admin, checker, viewer1 (iii) role: This table maps each user in xcams_person to all the roles in user_role that he or she is authorized for Handling permissions to actions / viewing information. When a user tries to execute a particular action by calling on a function or tries to access some information on the server, the first step is to make sure that he is allowed to do so. REAP does this by querying the database first and obtaining the current role for the user: public class XYZController : DefaultController { private NRC_PREDBEntities db = new NRC_PREDBEntities(); public ActionResult someaction() { ViewBag.role = (string)tempdata.peek("user_role"); } return View(); The (string)tempdata.peek("user_role") peeks into the database and returns the role of the user. The view() for the action uses the ViewBag variable ViewBag.role to display the appropriate content on the browser. For (ViewBag.role == "checker" (ViewBag.role == "admin")) { <li style="font-size: 0.80em;">@Html.ActionLink("How to Upload Citations", "HowToUploadCitations", "UserGuides", null, new { title = "Get help on how to upload citations." })</li> } <li style="font-size: 0.80em;">@Html.ActionLink("How to Mine Data", "HowToMineData", "UserGuides", null, new { title = "Get help on how to upload data." })</li>
19 In the above example, using a IF control statement (ViewBag.role == "checker" (ViewBag.role == "admin")), the view() checks first if the user is either a "checker" or an "admin" and only then, proceeds to display the content. 3.2 LIMITATIONS OF EXISTING DESIGN AND NEED FOR A BETTER ONE? As we have seen, while REAP implements a fairly intuitive and easily implementable approach to assign roles and permissions, there exists two important limitations for this design: Simple, straight-forward querying through the database to obtain the role of the current user may be inefficient and may have increased processing time especially if the database is large. Also currently, every action method independently queries the database each time a user decides to perform a function on REAP. This leads to duplication of the same query a large number of times in the same session and can slow down the efficiency of the application. In view of these limitations, we now try to explore a more robust access control schema that addresses the above limitations. 4. TYPES OF AVAILABLE ACCESS CONTROL FRAMEWORKS COMPATIBLE WITH ASP.NET 4.1 AUTHENTICATION REAP hosting a database with specialized information is not deemed for open public access and thus cannot allow anonymous visitors. Every user visiting the REAP must be authenticated i.e. the application must first recognize and identify each user trying to access information on the website. Authenticating a user requires evidence, also known as credentials. An important consideration in authentication is to decide what kind of credentials to accept. For example, credentials may be in form of a password, thumbprints etc. REAP is built using the ASP.NET MVC web application framework. The various authentication modes supported by ASP.NET include: 1. Windows Authentication 2. Forms Authentication 3. Passport Authentication 4. Custom Authentication like JOSSO etc. We now present the details of an initial evaluation conducted to compare various authentication modes in order to decide an efficient authentication mechanism for REAP application Windows Authentication [6] Can be coupled with IIS authentication so that you don't have to write any custom code. The username and password are never sent over the network - they are held by the browser and used to answer challenges from the remote web server. No firewall issues is user accounts are maintained by a Microsoft Windows NT domain controller or within Microsoft Windows Active Directory
20 4.1.2 Forms Authentication Requires additional coding for implementing a detailed AccountsController to specify functions like: - Logon - Register - Password retrieval/modify etc. Requires attention to firewall issues Ensuring the integrity and privacy of data as it flows across public and internal networks Passport Authentication Passport authentication relies on a centralized service provided by Microsoft. Passport authentication identifies a user with using his or her address and a password and a single Passport account can be used with many different Web sites. Passport authentication is primarily used for public Web sites with thousands of users. Since REAP is a stand-alone web application, this type of authentication is not optimal Custom Authentication: JOSSO JOSSO, or Java Open Single Sign-On, is an open source Internet SSO solution for rapid and standards-based Internet-scale Single Sign-On implementations, allowing secure Internet access to the Web-based applications or services of customers, suppliers, and business partners [7]. Extremely useful when the same user must be granted access to multiple applications and services that are related (but independent) with a Single Sign On (SSO) rather than multiple authentications Requires extensive implementation of custom controllers pertaining to managing user accounts, secured flow of data between client, application and the SSO service. Requires attention to firewall issues Ensuring the integrity and privacy of data as it flows across public and internal networks Framework Authentication Selection Based on this preliminary evaluation, it can be seen that the compared to other authentication mechanisms, Windows authentication does not pass the user credentials over the wire, requires no custom code for coupling with IIS authentication. Moreover, REAP is hosted at an ORNL-based server which requires the user by default to register for a XCAMS/UCAMS account for accessing any of the web pages on ORNL's intranet. This means that implementing the Microsoft Windows Authentication is not only easy but also effects a seamless transition to the new authentication framework. 4.2 AUTHORIZATION Authorization verifies if a user is allowed to do what he wants to do with respect to the website. It is not desirable that not every authenticated user be allowed unlimited access to all the data on the REAP application. We may want certain clients to have full access allowing them to create or modify data on the server, others may only be allowed to access a subset of the data, and others may have read-only access while some other clients may be granted only a "read-only" access to data. These permissions are typically managed by defining various user-roles. A "user-role" determines the access controls for all authenticated users belonging to this "user-role".
21 ASP.NET s System.Web.Security namespace provides simple, direct methods pertaining to role management in order to manage authorization easily and allow us to specify resources that users of a web-application are allowed to access. Adopting the role management classes provided with the ASP.NET framework for the REAP application is deemed to be efficient and requires less effort. More details on role management in ASP.NET applications may be found in references [8,9]. 5. IMPLEMENTATION THE WINDOWS AUTHENTICATION FRAMEWORK ON REAP Implementing the windows authentication mode on REAP is very simple. Since the Log On with Windows Authentication is handled outside of the web application, there is no need to implement a separate controller to manage user accounts/logins as in Forms or Custom type authentication modes. To configure Windows Authentication, the following line must be included in web.config [6]: <authentication mode="windows" /> This can be performed from the security tab of the ASP.NET website administration tool provided along with the Microsoft Visual Studio (See Figure 5): Figure 5 Screenshot of the security tab of the ASP.NET website administration tool
22 5.1 AUTHORIZATION Authorization verifies if a user is allowed to do what he wants to do with respect to the website. It is not desirable that not every authenticated user be allowed unlimited access to all the data on the REAP application. We may want certain clients to have full access allowing them to create or modify data on the server, others may only be allowed to access a subset of the data, and others may have read-only access while some other clients may be granted only a "read-only" access to data. These permissions are typically managed by defining various user-roles. A "user-role" determines the access controls for all authenticated users belonging to this "user-role". In REAP, once a user's identity is authenticated through the XCAMS/UCAMS on the REAP server, he is authorized under any one of the three user-roles: admin, checker, viewer1. These roles can be created and managed using the ASP.NET website administration tool (See Fig. 6) Figure 6 Screenshot of the role management page in the ASP.NET website administration tool Having defined user-roles, the access permissions can be configured for specifying: a) Custom access b) Custom views 5.2 EXAMPLE: CUSTOM ACCESS Authentication and authorization in ASP.NET are built on top of the Role and Membership classes found in the System.Web.Security namespace. For example, if want a specific page to
23 be accessible only by a user in the user-role "checker", we can use the "Authorize" attribute to limit access to the page checkersecrets by: [Authorize(Roles = "Checker")] public ActionResult checkersecrets() { ViewBag.Message = "CHECKER'S SECRET. YOU CAN WATCH THIS ONLY IF YOU ARE AN CHECKER"; return View(); } 5.3 EXAMPLE: CUSTOM VIEW In this case, the text " I am an admin" is displayed on a page if the user is in user-role "admin". This can be executed by modifying the view page by (Roles.IsUserInRole("admin")) { <li> <h3> I am an admin </h3> </li> } Figure 7 An example screenshot depicting customizable view in the authorization framework 6. CONCLUSION The goal of this exercise is to implement a robust security framework for authentication and authorization of clients using the REAP web application. This section presented: A brief preliminary evaluation of various modes of authentication in ASP.NET Implementing the features of Windows Authentication mode to REAP application
24 Defining Authorization roles and permissions in the REAP application o 3 user-role types were defined : admin, checker, viewer1 Examples to demonstrate using the authorization attributes to control access depending on the specified user-role 6.1 FUTURE WORK Preliminary testing of the features based on Windows Authentication framework are presented thus far. In order to migrate the security framework for the REAP application to Windows Authentication Framework, the following future tasks are proposed: Review user roles and permissions table. Map permissions to REAP screen actions. Identify lines of code to modify to include Windows Authentication Framework calls Implementation and testing Implement a mechanism to log out users when the session times out. 7. REFERENCES Rajput, S. and Cherukuri, R., "Role-Based Access Control Models", Available at Klasky, H.B., Bass B.R., Williams, P.T., Phillips, R.D., Erickson, M., Kirk, M.T., Stevens, G.L., Radiation Embrittlement Archive Project, Transactions, SMiRT-22, San Francisco, California, USA, Heller, M., "REST and CRUD: the Impedance Mismatch". Developer World. InfoWorld, 29 January Available at:
25
NEAMS Software Licensing, Release, and Distribution: Implications for FY2013 Work Package Planning
ORNL/TM-2012/246 NEAMS Software Licensing, Release, and Distribution: Implications for FY2013 Work Package Planning Preliminary Report (NEAMS Milestone M4MS-12OR0608113) Version 1.0 (June 2012) David E.
Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems
PNNL-19266 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Second Line of Defense Virtual Private Network Guidance for Deployed and New CAS Systems SV Singh AI Thronas January
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
This document was prepared in conjunction with work accomplished under Contract No. DE-AC09-96SR18500 with the U. S. Department of Energy.
This document was prepared in conjunction with work accomplished under Contract No. DE-AC09-96SR18500 with the U. S. Department of Energy. DISCLAIMER This report was prepared as an account of work sponsored
How To Configure A Microsoft Virtual Server 2005 2005 On A Microsoul.Com (Windows) 2005 (Windows 2005) (Windows Vvirtual) (Powerpoint) (Msof) (Evil) (Microsoul) (Amd
Configuring and Monitoring Virtual Server 2005 eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
Drupal Automated Testing: Using Behat and Gherkin
PNNL-23798 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Drupal Automated Testing: Using Behat and Gherkin Thomas Williams [email protected] Carolyn Wolkenhauer [email protected]
Copyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
Dell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
WET BULB GLOBE TEMPERATURE MEASUREMENT AT THE Y-12 NATIONAL SECURITY COMPLEX
WET BULB GLOBE TEMPERATURE MEASUREMENT AT THE Y-12 NATIONAL SECURITY COMPLEX Thomas E. Bellinger, CCM Y-12 National Security Complex Oak Ridge, Tennessee 1. INTRODUCTION To better serve the needs of the
CA Technologies SiteMinder
CA Technologies SiteMinder Agent for Microsoft SharePoint r12.0 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to
Dionseq Uatummy Odolorem Vel Layered Security Approach
A P P L I C A T I O N B R I E F Aciduisismodo Hitachi Content Dolore Platform Eolore Dionseq Uatummy Odolorem Vel Layered Security Approach Highly Scalable, Cloud-enabled Platform Ensures Data Safety with
Penetration Testing of Industrial Control Systems
SF-1075-SUR (8-2005) SANDIA REPORT SAND2005-2846P Unlimited Release Printed March, 2005 Penetration Testing of Industrial Control Systems David P. Duggan Prepared by Sandia National Laboratories Albuquerque,
CA APM Cloud Monitor. Scripting Guide. Release 8.2
CA APM Cloud Monitor Scripting Guide Release 8.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
IDC Reengineering Phase 2 & 3 US Industry Standard Cost Estimate Summary
SANDIA REPORT SAND2015-20815X Unlimited Release January 2015 IDC Reengineering Phase 2 & 3 US Industry Standard Cost Estimate Summary Version 1.0 James Mark Harris, Robert M. Huelskamp Prepared by Sandia
A Systems Approach to HVAC Contractor Security
LLNL-JRNL-653695 A Systems Approach to HVAC Contractor Security K. M. Masica April 24, 2014 A Systems Approach to HVAC Contractor Security Disclaimer This document was prepared as an account of work sponsored
Strong Authentication for Microsoft TS Web / RD Web
Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
SB 1386 / AB 1298 California State Senate Bill 1386 / Assembly Bill 1298
California State Senate Bill 1386 / Assembly Bill 1298 InterSect Alliance International Pty Ltd Page 1 of 8 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty
Strong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
Secret Server Qualys Integration Guide
Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server
Version 9. Active Directory Integration in Progeny 9
Version 9 Active Directory Integration in Progeny 9 1 Active Directory Integration in Progeny 9 Directory-based authentication via LDAP protocols Copyright Limit of Liability Trademarks Customer Support
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients
EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients A Detailed Review EMC Information Infrastructure Solutions Abstract This white
Administration Guide. Novell Storage Manager 3.1.1 for Active Directory. Novell Storage Manager 3.1.1 for Active Directory Administration Guide
Novell Storage Manager 3.1.1 for Active Directory Administration Guide www.novell.com/documentation Administration Guide Novell Storage Manager 3.1.1 for Active Directory October 17, 2013 Legal Notices
PC-Duo Web Console Installation Guide
PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
WatchDox SharePoint Beta Guide. Application Version 1.0.0
Application Version 1.0.0 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Laser Safety Audit and Inventory System Database
SAND REPORT SAND2003-1144 Unlimited Release Printed May 2003 Laser Safety Audit and Inventory System Database Arnold L. Augustoni Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185
Dynamic Vulnerability Assessment
SANDIA REPORT SAND2004-4712 Unlimited Release Printed September 2004 Dynamic Vulnerability Assessment Cynthia L. Nelson Prepared by Sandia National Laboratories Albuquerque, New Mexico 87185 and Livermore,
Configuring and Monitoring SNMP Generic Servers. eg Enterprise v5.6
Configuring and Monitoring SNMP Generic Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual
TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
User Guide QAD Security and Controls
QAD Enterprise Applications Enterprise Edition User Guide QAD Security and Controls Introduction to Security and Controls Security Overview Setting Up Security Control Setting Up Users and Roles Segregation
Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server.
LEPIDE SOFTWARE Configuration Guide for SQL Server This document explains the steps to configure LepideAuditor Suite to add and audit SQL Server. LepideAuditor Suite Lepide Software Private Limited, All
Mashup Sites for SharePoint 2007 Authentication Guide. Version 3.1.1
Mashup Sites for SharePoint 2007 Authentication Guide Version 3.1.1 Copyright Copyright 2010-2011, JackBe Corp. and its affiliates. All rights reserved. Terms of Use This documentation may be printed and
Active Directory Extension User Guide. Version 1.0
Active Directory Extension User Guide Version 1.0 Copyright 2015 PTC Inc. and/or Its Subsidiary Companies. All Rights Reserved. User and training guides and related documentation from PTC Inc. and its
BlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
ADO and SQL Server Security
ADO and SQL Server Security Security is a growing concern in the Internet/intranet development community. It is a constant trade off between access to services and data, and protection of those services
Agent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
Mixed Authentication Setup
Mixed Authentication Setup Version 8.2 January 1, 2016 For the most recent version of this document, visit our documentation website. Table of Contents 1 Overview 3 2 IIS installed components 3 2.1 Creating
eg Enterprise v5.2 Clariion SAN storage system eg Enterprise v5.6
EMC Configuring Clariion and SAN and Monitoring Monitoring storage an system EMC an eg Enterprise v5.2 Clariion SAN storage system eg Enterprise v5.6 Restricted Rights Legend The information contained
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
Configuring and Monitoring Citrix Access Gateway-Linux Servers. eg Enterprise v5.6
Configuring and Monitoring Citrix Access Gateway-Linux Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice.
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
Configuring IBM Cognos Controller 8 to use Single Sign- On
Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright
Enterprise Knowledge Platform
Enterprise Knowledge Platform Single Sign-On Integration with Windows Document Information Document ID: EN136 Document title: EKP Single Sign-On Integration with Windows Version: 1.3 Document date: 19
HP Device Manager 4.7
Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...
Technical Proposition. Security
Technical Proposition ADAM Software NV The global provider of media workflow and marketing technology software ADAM Software NV adamsoftware.net [email protected] Why Read this Technical Proposition?
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
Polar Help Desk Installation Guide
Polar Help Desk Installation Guide Copyright (legal information) Copyright Polar 1995-2005. All rights reserved. The information contained in this document is proprietary to Polar and may not be used or
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
Role-Based Security and its Implementation
Role-Based Security and its Implementation This Dell Technical White Paper describes how OpenManage Essentials supports and implements role-based access control at its operational level. Author(s) R Rajiv
Measurement of BET Surface Area on Silica Nanosprings
PNNL-17648 Prepared for the U.S. Department of Energy under Contract DE-AC05-76RL01830 Measurement of BET Surface Area on Silica Nanosprings AJ Karkamkar September 2008 DISCLAIMER This report was prepared
Portal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
Remote Access Platform. Architecture and Security Overview
Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards
Last Updated: July 2011. STATISTICA Enterprise Server Security
Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...
Revolution R Enterprise DeployR 7.1 Enterprise Security Guide. Authentication, Authorization, and Access Controls
Revolution R Enterprise DeployR 7.1 Enterprise Security Guide Authentication, Authorization, and Access Controls The correct bibliographic citation for this manual is as follows: Revolution Analytics,
SINGLE SIGN-ON SETUP T ECHNICAL NOTE
T ECHNICAL NOTE Product: Create!archive 6.2.1 Last modified: October 5, 2007 12:03 pm Created by: Development SINGLE SIGN-ON SETUP This Technical Note contains the following sections: Summary Create!archive
INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace
INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
CA Unified Infrastructure Management
CA Unified Infrastructure Management Probe Guide for IIS Server Monitoring iis v1.7 series Copyright Notice This online help system (the "System") is for your informational purposes only and is subject
Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
CA Spectrum and CA Embedded Entitlements Manager
CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically
ISSUE TRACK FOR WINDOWS INSTALLATION GUIDE VERSION 4.0.0.XX
ISSUE TRACK FOR WINDOWS INSTALLATION GUIDE VERSION 4.0.0.XX Contents CONTENTS Chapter 1 Introduction 1-1 Welcome to Issue Track for Windows 1-1 About this Guide 1-1 Product Name 1-1 Documentation Roadmap
AGILEXRM REFERENCE ARCHITECTURE
AGILEXRM REFERENCE ARCHITECTURE 2012 AgilePoint, Inc. Table of Contents 1. Introduction 4 1.1 Disclaimer of warranty 4 1.2 AgileXRM components 5 1.3 Access from PES to AgileXRM Process Engine Database
BlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
An Oracle White Paper December 2010. Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance
An Oracle White Paper December 2010 Leveraging Oracle Enterprise Single Sign-On Suite Plus to Achieve HIPAA Compliance Executive Overview... 1 Health Information Portability and Accountability Act Security
Y-12 EMBOS Medical Lab Interface Batch Loader
DOE-FIU SCIENCE & TECHNOLOGY WORKFORCE DEVELOPMENT PROGRAM STUDENT SUMMER INTERNSHIP TECHNICAL REPORT June 4, 2012 to August 10, 2012 Y-12 EMBOS Medical Lab Interface Batch Loader Principal Investigators:
Rebasoft Auditor Quick Start Guide
Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered
CA SiteMinder SSO Agents for ERP Systems
PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.
Enabling Integrated Windows Authentication For CitectSCADA Web Client Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.xx Summary: What is the difference between Basic Authentication and Windows
BES10 Self-Service. Version: 10.2. User Guide
BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create
Netwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015
Netwrix Auditor Administrator's Guide Version: 7.1 10/30/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation
Active Directory Requirements and Setup
Active Directory Requirements and Setup The information contained in this document has been written for use by Soutron staff, clients, and prospective clients. Soutron reserves the right to change the
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Caché License Management
Caché License Management Version 5.0.17 30 June 2005 InterSystems Corporation 1 Memorial Drive Cambridge MA 02142 www.intersystems.com Caché License Management InterSystems Version 5.0.17 30 June 2005
Installation and Configuration Guide. NetIQ Security and Compliance Dashboard
Installation and Configuration Guide NetIQ Security and Compliance Dashboard June 2011 Legal Notice NetIQ Secure Configuration Manager is covered by United States Patent No(s): 5829001, 7093251. THIS DOCUMENT
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
FileMaker Server 13. Getting Started Guide
FileMaker Server 13 Getting Started Guide 2007 2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and Bento are trademarks of FileMaker,
W. C. Reinig. Savannah River Laboratory E. I. du Pent de Nemours and Company Aiken, South Carolina 298o1
.*. *.-a /dp73j/3~ DP-MS-68-48 calforn1um-252: A NEW SOTOPC SOUR(!EFOR NEUTRON RADOGRAPHY by W. C. Reinig Savannah River Laboratory E.. du Pent de Nemours and Company Aiken, South Carolina 298o1. SRL7
Module 1: Introduction to Designing Security
Module 1: Introduction to Designing Security Table of Contents Module Overview 1-1 Lesson 1: Overview of Designing Security for Microsoft Networks 1-2 Lesson 2: Introducing Contoso Pharmaceuticals: A Case
ORNL/TM-2004/44 ARN-Atucha-I Reactor Pressure-Vessel Embrittlement March 2004 Jy-An Wang
Prepared by DOCUMENT AVAILABILITY Reports produced after January 1, 1996, are generally available free via the U.S. Department of Energy (DOE) Information Bridge: Web site: http://www.osti.gov/bridge Reports
Symantec Database Security and Audit 3100 Series Appliance. Getting Started Guide
Symantec Database Security and Audit 3100 Series Appliance Getting Started Guide Symantec Database Security and Audit 3100 Series Getting Started Guide The software described in this book is furnished
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Early Fuel Cell Market Deployments: ARRA and Combined (IAA, DLA, ARRA)
Technical Report NREL/TP-56-588 January 3 Early Fuel Cell Market Deployments: ARRA and Combined (IAA, DLA, ARRA) Quarter 3 Composite Data Products Jennifer Kurtz, Keith Wipke, Sam Sprik, Todd Ramsden,
How To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
7.0 Self Service Guide
7.0 Self Service Guide Copyright 2010 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated, microfilmed,
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
NGNP Risk Management Database: A Model for Managing Risk
INL/EXT-09-16778 Revision 1 NGNP Risk Management Database: A Model for Managing Risk John M. Beck November 2011 DISCLAIMER This information was prepared as an account of work sponsored by an agency of
