Three Campus Case Studies: Managing Access with Grouper
|
|
|
- Samantha Cooper
- 10 years ago
- Views:
Transcription
1 Three Campus Case Studies: Managing Access with Grouper IAM Online March 13, 2013 Speakers: Paul Donahue and Keith Hazelton, University of Wisconsin-Madison Sébastien Gagné, University of Montreal Rahul Doshi and Michael Gettes, Carnegie Mellon University Moderator: Tom Barton, University of Chicago Thank you to InCommon Affiliates for helping to make IAM Online possible. IAM Online is brought to you by Internet2 s InCommon in cooperation with! the EDUCAUSE Identity and Access Management Working Group
2 Value of access management The more information gathered in a central system that s relevant to access policies, the lower the cost and time to deliver a new service more useful to people with delegated authority The more services integrated with a central system, the more consistent is user access across services simpler is user access management easier to know who can access what These are easier to achieve with a central system that is highly integrative supports delegation 2
3 Do these values really play out? Three Universities using Grouper One not yet in production One with initial use case recently in production One has a good start, now looking at next push Case study framework Problem being addressed Functional or technical requirements: can Grouper meet them? Specifics: sizes/metrics, naming, operational architecture Questions for you whose answers might help them 3
4 Carnegie Mellon University Rahul Doshi & Michael Gettes March, 2013
5 Table of Contents 1. Why grouper 2. Grouper deployment statistics 3. Grouper UI changes 4. Grouper use cases 5. Naming and other challenges 6. Future plans 5 rd
6 Why CMU Chose Grouper Replacement for homegrown legacy system insufficient for future of CMU Grouper benefits Actively supported Grouper Web Services API Also supports roles and permission mgmt along with managing institutional and personal groups (future) Great flexibility designing solutions for Apps (composite, nested, group permissions) Easy to customize UI 6 rd
7 Grouper deployment Went in production Feb 2013 Memberships: 668,242 Groups: 2,342 Distinct Userids: 35,402 Folders: 206 Operational design Two servers behind load-balancer MySQL cluster with master-slave replication Scheduling of grouper-loader daemon and grouper loader jobs Essential Monitoring rd
8 UI Customization Stock Grouper UI Less is more! No Grouper Icon: Not one small enough and higher resolution 8 rd
9 UI Customization (2) Stock Grouper UI Can search with a list: user1,user2,user3 9 rd
10 Grouper Use Case Example: Google apps provisioning with Google Apps Directory Sync tool We use grouper to manage user provisioning with GADS Composite of includes minus excludes GA team controls the includes and excludes Static group used to carefully manage de-prov Groups used to control sub-orgs services ismemberof is key to making GADS work CMU has complex migration plans to GA Grouper s flexibility made the job much easier 10 mg
11 Grouper deployment Grouper Stem Hierarchy Apps : GoogleApps : andrew.cmu.edu Apps:Network, Apps:Windows, Apps:ServerAccess Campus : Physical Locations : bycollection Campus:Pittsburgh:ComputingServices Campus:Qatar:byBuilding:Building1 Community : Logical Org : bycollection Community:Department:ComputingServices Community:Students:byClass:{Freshman,Soph, } People : userid : personalgroups Courses : {cmu course structure} Access control rules are extremely conservative 11 mg
12 Future plans Grouper integration with person reg (CPR) OIM (11) Integration, via ActiveMQ ActiveMQ integration for app notification Active Directory (multiple Domains) Groups to Ext. Apps (Box, Google, etc) When Groups Solved Permissions Challenges Real-time prov to ldap for large groups (PSP) Need to integrate Zenoss / Google Analytics 12 mg
13 UNIVERSITY OF MONTREAL GROUPER CASE STUDY MARCH 13, 2013
14 Who am I Sébastien Gagné, IT analyst, main Grouper developer Background in software engineering and Java development 14
15 Grouper: First Contact UofM is replacing its legacy systems PeopleSoft was selected for HR and academics management Oracle Identity Manager (OIM) was selected for managing user accounts Grouper was suggested to manage groups 15
16 Why Grouper instead of OIM? Lifecycle management While OIM can create and delete group with connectors, managing the lifecycle is more complicated Quick and simple to deploy OIM is complicated to deploy and customize, while Grouper would give results faster Grouper was in production 6 months after initial testing Easier access to required data sources Long term plan to provide a dedicated group management tool Active development and community with similar fields (see the Grouper mailing lists at : It s open source It worked 16
17 Initial Grouper deployment Deployed in December 2012 Automated course and program group Automatically created and populated with students based on their enrollments ; Custom group loader using the Grouper API; Provisioned to the central Active Directory repository; Managed by delegated administrator, if required. 17
18 Deployement diagram 18
19 Deployement highlights Linux virtual servers 4 Gb of RAM (could use a little more) 4 Gb used disk space (applications only) Oracle databases groups, memberships 16 Gb of data High availability Physical load balancers Active-active where possible (Grouper UI) Active-passive otherwise (Grouper Daemon, AcadLoader job) 19
20 Logical data flows 20
21 Data flows - description AcadLoader: custom java application that uses the standard Grouper Java API. Creates and maintain the base folder structure Configures the delegation rules Static groups in Grouper are used for delegation privileges and to contain configuration attributes PSP (Provisioning Service Provider): Grouper made module for real-time and bulk provisioning Existing applications and policies are already using AD for group membership so they keep doing so 21
22 Results in Grouper Root folder Department folder Admin group Courses Programs Others Configuration group 22
23 Delegation model Rule based Applied to the folder Defined in the custom loader Department admins can : Update members in Courses and Programs Create and admin groups in Others Update members in admins Everyone can view groups 23
24 Impressions The good Active and responsive community It s open source Simple to deploy The bad Grouper UI Integration of the new attribute framework in the UI Learning curve 24
25 Future development In development Mail-enabling groups with Exchange Coming soon Provisioning in multiple directories Integration with OIM 25
26
27 Manifest the Service Application Manifest is our new service, with Grouper as its logic engine, to manage populations which are known to us and those which will be new to us. Manifest will enable administrators to provide service entitlements to groups.
28 Why Grouper?
29 Grouper: selection criteria Number of requirements 129 Keith 92/71% Unicon 100/78% Most of the contrary responses have to do with worknlow requirements and reporting requirements. Grouper does not provide worknlow. Grouper provides access to its data logs for an external reporting agent external reporting agent.
30 Grouper: problem addressed Grouper will house the business rules, replacing views and code Exposing that logic in a simpler manner will help Middleware manage the complexity Campus consumers will get a better idea of what they are getting and how their data might be better tuned Campus consumers will become more engaged in the data that they receive The same goes for providing campus services to groups formed within Grouper
31 Manifest roadmap
32 Release 1.0 (Announced December 2012) Create a group Manage a group Add members to a group who have NetID, by invitation or by directly entering their NetID into the application Add a SAML2 Entity ID to a group, enabling the group to control access to web applications using the NetID Login Service
33 Release 1.1 (Announced March 2013) Ability for authorized groups to invite someone to join the group and make them eligible for a NetID if they don't already have one.
34 Release 2.0 (Expected Release late Spring 2013) Ability to place start and end dates on group memberships Enables shared enterprise services to register their service in Manifest Enables administrators to browse a menu of registered services/groups Provides a process for requesting a group s access to a service WorkNlow has been uploaded to the wiki here +of+wisconsin+- +Madison+Grouper+Project+Page
35 Future 1/2 A user interface that allows the management of service entitlements Ability to use federated or social identity in lieu of NetID while being a member of a group Composite groups, involving group math that uses Data Driven Groups (e.g., the entire student population or all classinied staff) that have been loaded into Manifest from the campus Person Hub (a database that houses information about people, populated from various source systems on campus) Reports and audits
36 Future 2/2 Attestation (auditing of account data to remove inactive or invalid users) Ability to use Manifest group data to provision campus applications Direct connection to departmental databases that contain person data Use Manifest to determine whether an authenticated user should have access to non- web applications/systems Self- service account linking (linking non- NetID accounts to a user s NetID) For application developers: supplemental attribute delivery for display, application authorization, just in time provisioning, etc.
37 The Infrastructure
38 package MsnIAM [ Manifest Component Wiring 15-August-2012 ] «component» SpecPop Invitation APIs (JDBC) «component» GroupSvcApp Attribute WS methods (SOAP) Membership WS methods Person APIs (JDBC) Group WS methods Privilege WS methods «component» Grouper 2.x Subject API (?) PersonHub APIs (JDBC) Resolve Subjects Grouper Loader «component» PersonHub Data-driven Groups Populate group info into Person Hub «component» Shib 2 IdP PHExport (JDBC) Attribute Resolver MagicDraw UML, 1-1 /Users/keith/_notesPlus/GAMS/GAMS.mdzip Manifest Component Wiring 15-August-2012 Dec 17, :21:27 AM
39 Hosts 2 instances of Grouper, load balanced Virtualized Oracle database
40 Name space Visit madison+stem+and+group+naming+standards
41 Usage (March 8) Grouper daily report OVERALL: memberships: 2,622 groups: 219 members: 620 folders: 60 unresolvable subjects: 0 bad memberships: 0 WITHIN LAST DAY: new memberships: 20 new groups: 3 updated groups: 0 new folders: 0
42 Challenges Onboarding campus services so that they receive eligibility information from one place Loading Data Driven Groups into Grouper and maintaining that data Design and development of a User Interface that satisnies worknlow requirements and invitations
43 Best practices Enroll in lists Participate in wiki community+contributions Engage governance bodies (WARG / IVG) For project health use tools like Jira and Wiki, with PM practices
44 Evaluation Please complete the evaluation of today s IAM Online: Next IAM Online April 10, 2013 (3 pm ET) Aligning Identity and Access Management with Your Information Security Program IAM Online Announcement List [email protected] with the subject: subscribe iamonline 44
45 Thank you to InCommon Affiliates for helping to make IAM Online possible. Brought to you by Internet2 s InCommon, in cooperation with the EDUCAUSE Identity and Access Management Working Group 45
Three Case Studies in Access Management
Three Case Studies in Access Management IAM Online June 10, 2015-2 pm EDT Andy Morgan, Oregon State University Mandeep Saini, GÉANT Albert Wu, UCLA Moderator: Tom Barton, University of Chicago Fit for
Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis
Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that
The New Grouper: Its New User Interface and More
The New Grouper: Its New User Interface and More IAM Online September 10, 2014 Grouper Project Team Chris Hyzer, University of Pennsylvania Shilen Patel, Duke University Dave Langenberg, University of
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions
How to leverage SAP NetWeaver Identity Management and SAP Access Control combined solutions Introduction This paper provides an overview of the integrated solution and a summary of implementation options
Using Grouper: Newcastle University case studies. Richard James Caleb Racey
Using Grouper: Newcastle University case studies Richard James Caleb Racey Context: Newcastle University UK University Over 5000 staff members Over 20,000 students Research focused Centralised IT service
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
midpoint Overview Radovan Semančík December 2015
midpoint Overview Radovan Semančík December 2015 Agenda Identity Management Introduction midpoint Introduction midpoint Architecture Conclusion Identity Management Introduction Identity Management System
IDENTITY MANAGEMENT AND WEB SECURITY. A Customer s Pragmatic Approach
IDENTITY MANAGEMENT AND WEB SECURITY A Customer s Pragmatic Approach AGENDA What is Identity Management (IDM) or Identity and Access Management (IAM)? Benefits of IDM IDM Best Practices Challenges to Implement
Key New Capabilities Complete, Open, Integrated. Oracle Identity Analytics 11g: Identity Intelligence and Governance
Key New Capabilities Complete, Open, Integrated Oracle Analytics 11g: Intelligence and Governance Paola Marino Principal Sales Consultant, Management Agenda Drivers Oracle Analytics
<Insert Picture Here> Oracle Identity And Access Management
Oracle Identity And Access Management Gautam Gopal, MSIST, CISSP Senior Security Sales Consultant Oracle Public Sector The following is intended to outline our general product direction.
1 Building an Identity Management Business Case. 2 Agenda. 3 Business Challenges
1 Building an Identity Management Business Case Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Justifying investment in identity management automation. 2 Agenda Business challenges
Protect Everything: Networks, Applications and Cloud Services
Protect Everything: Networks, Applications and Cloud Services Tokens & Users Cloud Applications Private Networks Corporate Network API LDAP / Active Directory SAML RADIUS Corporate Network LDAP / Active
DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.5 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
Using Shibboleth for Single Sign- On
Using Shibboleth for Single Sign- On One Logon to Rule them all.. Kirk Yaros Director, Enterprise Services Mott Community College 1 Agenda Overview of Mott Overview of Shibboleth and Mott s Project Review
Oracle Privileged Account Manager 11gR2. Karsten Müller-Corbach [email protected]
R2 Oracle Privileged Account Manager 11gR2 Karsten Müller-Corbach [email protected] The following is intended to outline our general product direction. It is intended for information purposes
Trust but Verify: Best Practices for Monitoring Privileged Users
Trust but Verify: Best Practices for Monitoring Privileged Users Olaf Stullich, Product Manager ([email protected]) Arun Theebaprakasam, Development Manager Chirag Andani, Vice President, Identity
DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
WHITE PAPER. Understanding Transporter Concepts
WHITE PAPER Understanding Transporter Concepts Contents Introduction... 3 Definition of Terms... 4 Organization... 4 Administrator... 4 Organization User... 4 Guest User... 4 Folder Hierarchies... 5 Traditional
Oracle Identity Manager, Oracle Internet Directory
Oracle Identity Manager (OIM) is a user provisioning system. It defines properties for how users and groups get authorized to access compute and content resources across the enterprise. Identity Management
Enterprise Identity Management Reference Architecture
Enterprise Identity Management Reference Architecture Umut Ceyhan Principal Sales Consultant, IDM SEE Agenda Introduction Virtualization Access Management Provisioning Demo Architecture
Kenneth Hee Director, Business Development Security & Identity Management. Oracle Identity Management 11g R2 Securing The New Digital Experience
Kenneth Hee Director, Business Development Security & Identity Management Oracle Identity Management 11g R2 Securing The New Digital Experience This document is for informational purposes. It is not a
JAMF Software Server Installation and Configuration Guide for OS X. Version 9.2
JAMF Software Server Installation and Configuration Guide for OS X Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
Novell to Microsoft Conversion: Identity Management Design & Plan
Novell to Microsoft Conversion: Identity Management Design & Plan Presented To: 3/2/2011 1215 Hamilton Lane, Suite 200 Naperville, IL 60540 www.morantechnology.com Voice & Fax: 877-212-6379 Version History
Oracle Reference Architecture and Oracle Cloud
Oracle Reference Architecture and Oracle Cloud Anbu Krishnaswamy Anbarasu Enterprise Architect Social. Mobile. Complete. Global Enterprise Architecture Program Safe Harbor Statement The following is intended
OracleAS Identity Management Solving Real World Problems
OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability
Oracle Role Manager. An Oracle White Paper Updated June 2009
Oracle Role Manager An Oracle White Paper Updated June 2009 Oracle Role Manager Introduction... 3 Key Benefits... 3 Features... 5 Enterprise Role Lifecycle Management... 5 Organization and Relationship
Stephen Hess. Jim Livingston. Program Name. IAM Executive Sponsors. Identity & Access Management Program Charter Dated 3 Jun 15
Program Name Identity and Access Management (IAM) Implementation IAM Executive Sponsors Jim Livingston Stephen Hess 1 P age Project Scope Project Description The goal of this project is to implement an
How To Make A Multi-Tenant Platform Secure And Secure
Authentication As A Service Why new Cloud based Authentication solutions will be adopted by about 50% of the companies by 2017? Jason Hart CISSP CISM VP Cloud Solutions What a great world Today's World
Take Control of Identities & Data Loss. Vipul Kumra
Take Control of Identities & Data Loss Vipul Kumra Security Risks - Results Whom you should fear the most when it comes to securing your environment? 4. 3. 2. 1. Hackers / script kiddies Insiders Ex-employees
Securing your business
Securing your business Anders Askåsen Product Manager for OpenIDM * World Wide Coverage ForgeRock.com Enterprise Open Source Software ForgeRock Norway ForgeRock USA ForgeRock UK ForgeRock France Consulting
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2
JAMF Software Server Installation and Configuration Guide for Linux Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
Administering Google Apps & Chromebooks for Education
Administering Google Apps & Chromebooks for Education February 4, 2016 Edward Doan @edwardd / google.com/+edwarddoan customer quotes and snippets It s almost this easy. also highlight customer map? Google
Identity Management with midpoint. Radovan Semančík FOSDEM, January 2016
Management with midpoint Radovan Semančík FOSDEM, January 2016 Radovan Semančík Current: Software Architect at Evolveum Architect of Evolveum midpoint Contributor to ConnId and Apache Directory API Past:
Encore Software Solutions (V3) Identity Lifecycle Management and Federated Security Suite (ILM/FSS) Overview and Technical Requirements
Encore Software Solutions (V3) Identity Lifecycle Management and Federated Security Suite (ILM/FSS) Overview and Technical Requirements Encore Software Solutions (V3) provides a holistic Identity Lifecycle
Self-Service Active Directory Group Management
Self-Service Active Directory Group Management 2015 Hitachi ID Systems, Inc. All rights reserved. Hitachi ID Group Manager is a self-service group membership request portal. It allows users to request
UW System Identity & Access Management (IAM) Recommended Strategic Roadmap
UW System Identity & Access Management (IAM) Recommended Strategic Roadmap Fall 2015 ITMC (Rev 1/11) Our challenge CIOs charged IAM-TAG with recommending an IAM strategy that would: Establish an identity
University of Maine System Active Directory Services - RFP# 2016-027 ADDENDUM #01
QUESTIONS 1. On page 12 of the RFP, it mentions the use of a Custom Identity Management (IdM) solution. Could you please share with us the platform and nature of the IdM System or any other relevant details,
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
PCVITA Express Migrator for SharePoint(Exchange Public Folder) 2011. Table of Contents
Table of Contents Chapter-1 ------------------------------------------------------------- Page No (2) What is Express Migrator for Exchange Public Folder to SharePoint? Migration Supported The Prominent
Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees
Identity Management and Shibboleth h at MSU Jim Green Manager, Identity Management Michigan State t University it Academic Technology Services Identity Management Definition: Identity management is the
Dropbox for Business. Secure file sharing, collaboration and cloud storage. G-Cloud Service Description
Dropbox for Business Secure file sharing, collaboration and cloud storage G-Cloud Service Description Table of contents Introduction to Dropbox for Business 3 Security 7 Infrastructure 7 Getting Started
HP OO 10.X - SiteScope Monitoring Templates
HP OO Community Guides HP OO 10.X - SiteScope Monitoring Templates As with any application continuous automated monitoring is key. Monitoring is important in order to quickly identify potential issues,
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
Open Source Identity Management
Open Source Management OpenAlt 2015 Radovan Semančík November 2015 Ing. Radovan Semančík, PhD. Software architect Co-owner of Evolveum (open source company) Architect of midpoint project Apache committer
Data Classification Technical Assessment
Data Classification Update: February 13th, 2015 Statement of Confidentiality This Confidential Information is being provided to Customer ABC as a deliverable of this consulting engagement. The sole purpose
MySQL Enterprise Monitor
MySQL Enterprise Monitor Lynn Ferrante Principal Sales Consultant 1 Program Agenda MySQL Enterprise Monitor Overview Architecture Roles Demo 2 Overview 3 MySQL Enterprise Edition Highest Levels of Security,
Role Based Access Control: How-to Tips and Lessons Learned from IT Peers
Role Based Access Control: How-to Tips and Lessons Learned from IT Peers Wisegate community members discuss key considerations and practical tips for managing a successful RBAC program WISEGATE COMMUNITY
QuickStart Guide for Mobile Device Management
QuickStart Guide for Mobile Device Management Version 8.5 Inventory Configuration Security Management Distribution JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made
G Cloud 6 CDG Service Definition for Forgerock Software Services
G Cloud 6 CDG Service Definition for Forgerock Software Services Author: CDG Date: October 2015 Table of Contents Table of Contents 2 1.0 Service Definition 3 1.0 Service Definition Forgerock as a Platform
APIS CARM NG Quick Start Guide for MS Windows
APIS CARM NG Quick Start Guide for MS Windows The information contained in this document may be changed without advance notice and represents no obligation on the part of the manufacturer. The software
Managed Servers ASA Extract FY14
Managed Servers ASA Extract FY14 1.0 Service Summary 1.1 Name Managed Servers 1.7 Mission/Vision UW IT currently manages over 900 managed servers for various owners and functions. There are 2 primary types
PCVITA Express Migrator for SharePoint (File System) 2011. Table of Contents
Table of Contents Chapter-1 ---------------------------------------------------------------------------- Page No (2) What is PCVITA Express Migrator for SharePoint (File System)? Migration Supported The
Case Study. Web Application for Financial & Economic Data Analysis. www.brainvire.com 2013 Brainvire Infotech Pvt. Ltd Page 1 of 1
Case Study Web Application for Financial & Economic Data Analysis www.brainvire.com 2013 Brainvire Infotech Pvt. Ltd Page 1 of 1 Client Requirement This is a highly customized application for financial
Apache Sentry. Prasad Mujumdar [email protected] [email protected]
Apache Sentry Prasad Mujumdar [email protected] [email protected] Agenda Various aspects of data security Apache Sentry for authorization Key concepts of Apache Sentry Sentry features Sentry architecture
Centralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan [email protected] Principal Security Consultant Kevin Moulton [email protected] Senior Manager,
Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific
Q: Is the challenge required or can pass through authentication be used with regard to automatic login after you login to your corporate domain? A: You can configure the system to pass on the challenge
JAMF Software Server Installation and Configuration Guide for OS X. Version 9.0
JAMF Software Server Installation and Configuration Guide for OS X Version 9.0 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
BES12 Frequently Asked Questions. BEs12. questions. FAQs
1 BEs12 Frequently asked questions FAQs 2 Contents Overview... 3 Pricing... 4 Technical: Upgrade, Migration & Installation... 5 Additional Migration Questions... 10 Installation... 11 System... 12 BES5
The Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
TG Web. Technical FAQ
TG Web Technical FAQ About this FAQ We encourage you to contact us if. You can't find the information you're looking for. You would like to discuss your specific testing requirements in more detail. You
QuickStart Guide for Mobile Device Management. Version 8.6
QuickStart Guide for Mobile Device Management Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF
Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1
Item Count Provisioning/Deprovisioning Automated Deprovisioning 1 Automated on/off boarding from an authoritative source AUTOMATED [DE-]PROVISIONING 1 Removal of resources at the appropriate time 1 Timeliness
NS DISCOVER 4.0 ADMINISTRATOR S GUIDE. July, 2015. Version 4.0
NS DISCOVER 4.0 ADMINISTRATOR S GUIDE July, 2015 Version 4.0 TABLE OF CONTENTS 1 General Information... 4 1.1 Objective... 4 1.2 New 4.0 Features Improvements... 4 1.3 Migrating from 3.x to 4.x... 5 2
Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst
ESG Lab Test Drive Transporter from Connected Data Date: February 2015 Author: Kerry Dolan, Lab Analyst and Vinny Choinski, Sr. Lab Analyst Abstract: This report documents the results of an ESG Lab Test
SAP Crystal Reports & SAP HANA: Integration & Roadmap Kenneth Li SAP SESSION CODE: 0401
SAP Crystal Reports & SAP HANA: Integration & Roadmap Kenneth Li SAP SESSION CODE: 0401 LEARNING POINTS Learn about Crystal Reports for HANA Glance at the road map for the product Overview of deploying
Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
System Center Configuration Manager Overview
System Center Configuration Manager Overview This document provides some background information on the Microsoft Systems Center Configuration Manager (SCCM) system, which has been selected for use as an
Casper Suite. Security Overview
Casper Suite Security Overview JAMF Software, LLC 2015 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave S Suite
Administrator s User Manual for OrangeHRM Version 3.0
Administrator s User Manual for OrangeHRM Version 3.0 All Rights Reserved. Published in the United States of America. This publication is protected by copyright, and permission must be obtained from the
Integrating Peoplesoft Enterprise Campus Solutions with Sakai
Integrating Peoplesoft Enterprise Campus Solutions with Sakai Cris J. Holdorph Unicon, Inc. Michael Feldstein Oracle, Corp. 2008 JA-SIG Conference April 27 30, 2008 Copyright Unicon, Inc., 2008. This work
Cloudwork Dashboard User Manual
STUDENTNET Cloudwork Dashboard User Manual Make the Cloud Yours! Studentnet Technical Support 10/28/2015 User manual for the Cloudwork Dashboard introduced in January 2015 and updated in October 2015 with
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
Getting Started Guide: Getting the most out of your Windows Intune cloud
Getting Started Guide: Getting the most out of your Windows Intune cloud service Contents Overview... 3 Which Configuration is Right for You?... 3 To Sign up or Sign in?... 4 Getting Started with the Windows
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Use of Exchange Mail and Diary Service Code of Practice
Use of Exchange Mail and Diary Service Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the Exchange mail and diary service. References are
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
tibbr Now, the Information Finds You.
tibbr Now, the Information Finds You. - tibbr Integration 1 tibbr Integration: Get More from Your Existing Enterprise Systems and Improve Business Process tibbr empowers IT to integrate the enterprise
Install MSU Google Drive on your Computer
416 Agriculture Hall Michigan State University 517-355-3776 http://support.anr.msu.edu [email protected] Install MSU Google Drive on your Computer Document # - 168 Creation/Revision Date 4/2013 Revision
SOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
SAP Identity Management Overview
Identity Management Overview October 2014 Public Agenda Introduction to Identity Management Role Management and Workflows Business-Driven Identity Management Compliant Identity Management Reporting Password
Oracle Human Capital Management Cloud Securing Oracle HCM Cloud. Release 10
Oracle Human Capital Management Cloud Release 10 Oracle Human Capital Management Cloud Part Number E61339-03 Copyright 2011-2015, Oracle and/or its affiliates. All rights reserved. Authors: Suzanne Kinkead,
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development
How Oracle MAF & Oracle Mobile Cloud can Accelerate Mobile App Development A RapidValue Solutions Whitepaper Contents Executive Summary... 03 Oracle Mobile Application Framework (MAF): The Complete Development
Identity Governance Evolution
Identity Governance Evolution Paola Marino Principal Sales Consultant Agenda Oracle Identity Governance Innovation Cloud Scenarios enabled by Oracle Identity Platform Agenda Oracle
Red Hat Identity Management
Red Hat Identity Management Overview Thorsten Scherf Senior Consultant Red Hat Global Professional Services Agenda What is Red Hat Identity Management? Main values Architecture Features Active Directory
Migrate from Exchange Public Folders to Business Productivity Online Standard Suite
Migrate from Exchange Public Folders to Business Productivity Online Standard Suite White Paper Microsoft Corporation Published: July 2009 Information in this document, including URL and other Internet
Oracle Identity Analytics Architecture. An Oracle White Paper July 2010
Oracle Identity Analytics Architecture An Oracle White Paper July 2010 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may
Roadmap from On-Premise to Cloud based Integration solutions from SAP
Roadmap from On-Premise to Cloud based Integration solutions from SAP Sindhu Gangadharan, Chief Product Owner SAP NetWeaver PI and SAP HANA Cloud Integration Agenda SAP NetWeaver Process Integration today
StreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
Storgrid EFS Access all of your business information securely from any device
Datasheet Storgrid EFS Access all of your business information securely from any device September 2014 2014 STORGRID International Holding BV. This document is created with the utmost care. To prevent
