RAPTOR. Retrieval Analysis, and Presentation Toolkit for usage of Online Resources. Deliverable 5.1: Reporting Options

Size: px
Start display at page:

Download "RAPTOR. Retrieval Analysis, and Presentation Toolkit for usage of Online Resources. Deliverable 5.1: Reporting Options"

Transcription

1 RAPTOR Retrieval Analysis, and Presentation Toolkit for usage of Online Resources Deliverable 5.1: Reporting Options Information Services Cardiff University Start Date of Project: January 2010 Duration: 15 Months Version 1.0 Version History Version Date Author 0.1 7th May P.Smart th May P.Smart th May P.Smart th May P.Smart th May P.Smart th June P.Smart th July R.Smith, P.Smart 1

2 Table of Contents Executive Summary Introduction Authentication and Usage Information Authentication Information Usage Information and Reports COUNTER-Complaint Statistics Statistics Harvesting Engines and Protocols Parsing Engines Protocols Usage Collector and Reporting Engines Resource Management Systems Authentication Statistics Reporting Systems Usage Statistics Reporting Systems General Log File Reporting Systems Reporting Options Conclusions Raptor Features Conclusions References Appendix A - Log File Parser Screenshots

3 Executive Summary Federated access management technology is becomining more widespread in educational, governmental and commercial organisations. It allows users the convenience of using only one username and password to access any number of electronic resources. Another popular way of enabling access to electronic resources for users working outside of the organisation s premesis is through the use of a proxy system, which tricks the resource into thinking the user is accessing their information from an authorised machine inside the organisation. However, the existing state-of-the art in FAM and proxy technology do not provide automated tools for the detailed analysis and reporting of what users are accessing and when they are accessing them, instead only providing raw textual output of the software process, often through log files. Without significant manual effort, this reporting gap handicaps an organisation when making key decisions about the value for money of each electronic resource. The RAPTOR project aims to help overcome this shortfall by providing the necessary tools to allow automated analysis and reporting. In this deliverable we discuss the reporting options of the RAPTOR project by investigating the current raw information captured by existing FAM and Proxy technologies (as well as other existing resource usage reports), surveying existing tools for capturing and processing this information, and then finally highlighting how these tools display this information for human consumption. The deliverable is concluded by an enumeration of both the mandatory and desirable reporting options that will be supported by software produced by the RAPTOR project. 3

4 1. Introduction The RAPTOR project aims to present statistical accounting information from an organisation s Federated Authentication and Authorisation Infrastructure; particularly its Shibboleth Identity Provider service. It is similar in goal to [5]. Shibboleth is a widely deployed technology in the academic context, and is a part of the wider Federated Identity Management paradigm that is currently being realised across the world s educational, governmental and commercial sectors. This allows the interfacing of existing user identity management systems within and across organisational boundaries [8], enabling Single Sign On (a user only generally has to authenticate once). In addition to authorising access to general web systems via federated technologies, access to such systems can be authorised solely on a device level without knowledge of user credentials e.g. by a unique identification number, or IP address. This is particularly common in the case of managing access to library e-resources. Device dependant resource authorisation information is generally not logged at the user s organisation unless accessed through an on-campus proxy service or on and offcampus URL rewriting proxy service (e.g. EZproxy 1 ), which will by default store harvestable logs detailing each discrete transaction. Lastly, in addition to authentication and access requests for services, integrating COUNTER-complaint statistics generated by publishers can capture e-resource usage statistics at the journal, book and database level. By auditing these different sources of statistics, service authentication and e-resource usages; reports can be gathered and presented to resource managers. For example, e-resource usage can be reported on per user, resource or organisation over daily, monthly or yearly time periods. RAPTOR aims to generate statistics within individual federation member institutions. These statistics can then be aggregated to form higher-level reports in a hierarchical monitoring framework. Different views of the hierarchy can be established based on organisation divisions, geographical divisions, or others. RAPTOR will deliver statistics in a graphical and textual form that is suitable for non-technical users, where further breakdown and access to raw statistics will also cater for the needs of technical users. Such statistics will facilitate, where possible, evidence-based managerial decisions to be made on the economical feasibility of subscribing to particular e-resources; the identification of individual users and/or groups of users requirements; and finally, any resource misuse that may be occurring undetected. This report discusses the possible statistics harvesting and reporting options available to the RAPTOR project. We begin by identifying the key sources of raw authentication and usage information available. We then examine the different harvesting methods capable of understanding and retrieving these raw statistics. This is followed by a survey of existing software platforms that can aggregate and generate reports over such information. We conclude by summarising the statistics gathering and reporting lifecycle, and discuss reporting options within the first version of the RAPTOR software package

5 2. Authentication and Usage Information There are two distinct categories of raw information that can be used by the RAPTOR software to create statistical usage summaries: authentication information and usage information. Authentication information essentially details transactional authentications that occur (i.e. an entry for every time a user logs into a service). Usage information shows much finer grained detail about how individual resources are being used (e.g. every single web page retrieved on a service). Authentication information can be harvested from the log files of authentication systems such as Shibboleth or OpenAthens. Usage information can be gathered by consuming existing usage reports produced by information providers (e.g. journal publishers or resource database providers) or by analyzing the log files of proxy software such as EZproxy. Initially, RAPTOR will focus around reporting authentication information, however, both types are described here, as later versions may also include usage information Authentication Information Shibboleth IdP Logs Shibboleth is a federated access management (FAM) technology started in 2000 and developed by Internet2. Shibboleth, as well as other FAM technologies, is born out of the requirements of users that now want the convenience of having to remember only one username and password to access resources and services across more than one domain - a single lifelong identity. A federation is a coalition of organisations that have an established agreement of trust, which includes a global understanding of the policies and rules with which to govern. Users whose organisation is part of a federation can then share resources within that federation or across multiple federations they share agreements with. Key to this is the concept of single sign-on (SSO), which allows users to log into cross-domain resources using a single username and password that only has to be entered once per session (even if multiple resources / services are accessed). At the heart of the Shibboleth FAM architecture is the service provider (SP), the discovery service (DS) and the identity provider (IdP). A SP provides resources that users can access. An IdP is responsible for authenticating a user against a local identity vault e.g. a directory or database, and releasing attributes about that user back to a SP. A DS is responsible for contacting the correct identity provider for a given user. Authorisation to a resource for a given SP is then obtained by matching user attributes released by an IdP with those authorised by the SP. Attribute release is governed by policies and rules on the IdP. In practice Shibboleth is an implementation of the standardized Security Assertion Markup Language (SAML) protocol for exchanging authentication and authorization requests the basis of many access management implementations. In comparison to the popular OpenAthens FAM system, Shibboleth is not a complete identity and access management solution [3], instead delegating identity management to each federation members internal identity management system e.g. a directory services implementation. 5

6 FAM technology is useful in the following ways. SPs do not need to maintain list of authorised users, instead only requiring policies and rules on which attributes of users they should allow. Users only need one username and password, which can be used once per session. Users can access all resources within or across federations without having to explicitly register with them. Single usernames and passwords are easier to manage and maintain. In general, log files contain a sequence of lines containing ASCII characters. A line is either a directive or an entry. A directive contains meta information about the logging process, for example, the version of the log file or the fields recorded in each entry line. An entry records concrete information about each log file entry e.g. HTTP request, separated into fields as defined in a directive line. Fields in entries can be separated by a delimiter, for example a white space, tab or comma character. Within RAPTOR we aim to harvest both Shibboleth 1.3 and 2.x log files to analyse authentication statistics for individual SPs (resources) to allow a better gauging of their impact factor within organisations. Although Shibboleth supports log files on both the IdP and the SP, a realistic use case in many organisations is that one can only guarantee access to their own IdP. Consequently, only authentication information from the IdP can be harvested, and not authorisation information from the SP 2. The Tables below shows what information is retrievable from Shibboleth 1.3 shibaccess.log file and the Shibboleth 2.0 idp-access.log and idp-audit.log log files. Of note, the shib-access log file is not easily machine parseable i.e. it requires some natural language processing to interpret, whereas the idp-access and idp-audit logs are field delimited and are easier to interpret. shib-access.log :53:30,156 Attribute assertion issued to provider ( on behalf of principal (wxxxx1). Field Request Date/Time Assertion Type Provider On behalf of Name Identifier / Named Identifier format Description The time at which the request was made, which takes the format yyyy-mm-dd hh:mm:ss Either an authentication assertion, or an attribute release assertion The name of the requesting SP, e.g. ( The login name used, can be a number of different attributes as taken from the underlying identity datasource, for example username. Akin to the principal name in the Shibboleth 2 logs. A unique identifier for the session and the format it takes e.g. urn:mace:shibboleth:1.0:nameidentifier. Links the request and requester for future reference. 2 Although even if the SP logs are available, authorisation is often not controlled by the SP, but by the host resource 6

7 Idp-access.log Records access information for the IdP. For example: T230021Z idp1.cf.ac.uk:80 /profile/status Field requesttime Description The time at which the request was made e.g T230021Z. Which takes the format: yyyymmdd timezone remotehost The IP address of the requesting host e.g serverhost requestpath The hostname and port number of the IdP server dealing with the request e.g. idp1.cf.ac.uk:80 The relative address path of the profile handler used to deal the request e.g. profile/status or /profile/saml1/soap/attributequery, where the absolute URL then maps an endpoint URL to the correct handler e.g. the status handler idp-audit.log Logs responses sent to the SP. For example: T230321Z urn:mace:shibboleth:1.0:profiles:authnrequest m/shibboleth urn:mace:shibboleth:2.0:profiles:saml1:sso ur n:oasis:names:tc:saml:1.0:profiles:browserpost _df5c91aa575ecbab1e42be125203c071 wxxxxxl urn:oasis:names:tc:saml:2.0:ac:classe s:passwordprotectedtransport _277b59e49a0fcd c _d1929bd d 8f620c023da1181a, Field auditeventtime requestbinding Description The time of attribute release to the SP. Taking the format yyyymmdd timezone e.g T230321Z The type of binding used for communication from the SP to the IdP e.g. SOAP, HTTP-Redirect, HTTP-POST. requestid A unique identifier of the request from the SP e.g. _ relyingpartyid messageprofileid responsebinding The hostname of the relying party where the relying party is the SP that requests a shibboleth login. For example an outside SP directly or an internal request in Cardiff States which profile, either shibboleth 1 or shibboleth 2, is being used e.g. urn:mace:shibboleth:2.0:profiles:shib1:sso or urn:mace:shibboleth:2.0:profiles:saml2:sso respectively. The type of binding used for communication from the IdP to the SP e.g. SOAP, HTTP-Redirect, HTTP-POST. responseid A unique identifier of the response from the IdP e.g. _d6a7394afdf67642bc02921f9c principalname The login name used, can be a number of different attributes as taken from the underlying identity datasource, for example username. authnmethod The name of the login handler used 7

8 urn:oasis:names:tic:saml:2.0:ac:classes:passwordprotectedtransport.. releasedattribute 1,, releasedattributed n nameidentifier assertion 1 ID,, assertion n ID A comma separated list of the attributes released from the IdP to the SP e.g. edupersonscopedaffiliation,edupersonentitlement,edupersontargetedi D.old,transientId,eduPersonTargetedID,eduPersonAffiliation Used to identify the person that the IdP has issued an assertion about. This is chosen per IdP and could be username, address or other attribute. Unique identifiers of each attribute assertion e.g. _277b59e49a0fcd c OpenAthens Athens is a complete Access Management System (AMS) developed in 1994 by Eduserv for access web-based subscription to e-resources and services. Athens was later developed into a wider access and identity management (AIM) platform under its current name OpenAthens. OpenAthens, like Shibboleth, is a federated access management solution that offers Single Sign On (SSO) to users. However, unlike Shibboleth, it can also be a complete identity management system similar to OpenID 3 and Microsoft s Cardspace 4. OpenAthens incorporates the idea of trust (using digital signatures) across federations (meta-organisations), is operating system agnostic, and tries not to compromise a users privacy during attribute release. To achieve this, OpenAthens is meta-aim software framework that works across and brings together services, resources and access management systems, and supports the following: Single Sign On including user provisioning, administration and policy management. Attribute transformations. The management of attribute release policies. Establish standards for communicating between identity providers and service providers e.g. using SAML. The integration of different discovery services and access management systems e.g. CardSpace and Shibboleth could both operate within the OpenAthens framework. OpenAthens includes three distinct components, namely; OpenAthensMD, OpenAthensLA and OpenAthensSP. OpenAthensMD provides central access (held by Eduserv) to organisations user identifier and attributes, whereas OpenAthensLA provides local authentication of organisations user identifiers and attributes similar to a Shibboleth IdP. OpenAthensSP allows service providers to connect to the OpenAthens framework similar to the Shibboleth SP. OpenAthens statistics show authentication and access information per resource per user. OpenAthens statistics can be produced on request, or by the publisher on a

9 regular basis. The period for reporting can also be customized, for example monthly, yearly or for a given time period. Once generated in either PDF, HTML or CSV format, reports can be downloaded from their website or sent to a client via . The CSV OpenAthens output format used by Cardiff University includes the following information. OpenAthens Report (CSV) Field Description Username / UID Administrator Name Total Access Resource 1, Resource n The username of the The Athens username of the administrator Total access for all resources Access count for that user per resource (1 to n) 2.2. Usage Information and Reports EZproxy Logs EZproxy is a middleware proxy referral server, which allows off campus access to web resources that have host based (IP) authentication mechanisms. Off campus access to resources for users with IP address ranges not authorised by the resource is achieved by delegating access to, and passing information through, a proxy - in this case EZproxy - that exists on a server which sits within the authorised IP address range. EZproxy automatically re-writes all URLs of a website so all hyperlinks are directed back through the organisation s EZproxy server. The EZproxy server logs all resource access requests; in this way information about off campus resource authentications and access to e-resources can be harvested and used in RAPTOR. The EZproxy log structure conforms to the Common Log Format, which is a recognised standard and is described further in the section to follow. The Table below shows what information can be retrieved from the EZproxy log file. 9

10 EZproxy.log 5 Records each URL rewrite request from a client. For example: onjnvgpybaisvty [email protected] [07/Mar/2010:11:43: ] "GET HTTP/1.1" Field Description IPAddress Header EZproxy identifier Username Date/Time Request StatusOfRequest NumberOfBytesTransferred The IP address of the host routed through EZProxy Header from the browser request e.g. referrer Identifier for the user s current session The username of the user accessing EZProxy The date and time of the current request. The URL of the request including hostname, port number and the HTTP request method e.g. POST or GET The HTTP numeric status returned from the target website The number of bytes transferred for this URL request. Common Log Format (CLF) logs The common log format [1] developed in 1995, is a standardized ASCII text file format typically used by web servers for logging user access. The vast majority of log file parsing software systems can parse the CLF. CLF conformance assumes the following attributes exist in the logfile. Field IPAddress Identity User Description The IP address of the client machine making a request to the server The RFC 1413 identity of the client machine (although this information is know to be unreliable 6 ) The unique identifier of the requesting user Date/Time The date and time of the request, with the format day/month/year:hour:minute:second zone Request Status Bytes The URL of the request including hostname, port number and the HTTP request method e.g. POST or GET The RFC 2616 HTTP status code the server sends back to the client The size in bytes of the document sent back to the client 5 See also 6 For example the HTTP Apache Server does not log this information by default and so is left blank 10

11 The CLF standard was extended in 1996 to handle arbitrary fields of information. The new format, denoted the Extended Log File Format, has the following features [6]: 1. Permit control over the data recorded. 2. Support needs of proxies, clients and servers in a common format 3. Provide robust handling of character escaping issues 4. Allow exchange of demographic data. 5. Allow summary data to be expressed. Fields are defined at the top (headers) of the file separated by white spaces. Values for entries are then populated in subsequent lines consistent with these headers. The ELFF is widely used in practice, for example it is the default format for Microsoft s web server and application set, the Internet Information Service (IIS) COUNTER-Complaint Statistics In this section we detail the Counting Online Usage Networked Electronic Resources (COUNTER 7 ) usage reports, which could become an input to RAPTOR for generating, where possible, fine grained resource usage statistics per organisation at the journal and database level. Counter, introduced in 2002, allows for the measurement of electronic resource usage data from the perspective of the information producer e.g. journal publishers or vendors. Statistics generated are sent (typically monthly) to the resource manager of information consumers e.g. a university librarian, where eresource usage can be monitored and renewals and purchase decisions made. Counter is essentially 'a set of agreed standards and protocols for the recording and exchange of online usage data'. COUNTERcompliance from vendors means conformance to the set of standards and protocols defined by the Counter initiative. COUNTER has a number of different report types to show the access statistics for journals, databases, and books and reference works. Each different report type is now described. Journal Reports Report Type Fields Criteria JR1 Number of successful full-text article requests by month and journal JR1a - Number of successful Full-Text articles Requests from an Archive by Month and Journal Full journal name, publisher, print ISSN and online ISSN, full text requests per month including HTML or PDF breakdown Full journal name, publisher, print ISSN and online ISSN, full text requests per month including HTML or PDF If full text article requests per month is 0, then this report should be used If using report 1a, you must still provide JR1. If vendors provide a separately acquirable journal archive stats as per this report but can not provide JR1a, they

12 breakdown must provide JR5 JR2 - Turnaways by Month and Journal JR5 - Number of Successful Full-Text Article Requests by Year and Journal Journal Name, publisher, print SSN, online ISSN, page type, turnaways per month, total turnaways to date Journal Name, Publisher, Platform, print ISSN, online ISSN, full text requests per month Database Reports This report is the converse to JR1a. If this report cannot be used, replace with JRa. This separates total usage from JR1 with per acquired archives similar to JR1a Report Type Fields Criteria DB1 - Total Searches and Sessions by Month and Database DB2 - Turnaways by Month and Database DB3 - Total Searches and Sessions by Month and Service Database name, publisher, platform, then for each database: total searches run, searches federated and automated, total sessions, sessions-federated and automated per month and total to date Database name, publisher, platform, page type, turnaways per month, total turnaways to date Service name, platform, then for each service: total searches run, searches federated and automated, total sessions, sessions-federated and automated per month and total to date Books and Reference Works Report Type Fields Criteria BR1 - Number of successful title Requests by Month and Title BR2 - Number of successful Section Requests by Month and Title BR3 - Turnaway by month and title BR4 - Turnaways by Month and Service Title name, publisher, platform, ISBN, ISSN, requests per month, and to date total Title name, publisher, platform, ISBN, ISSN, selection requests per month and total to date Title, publisher, platform, ISBN, ISSN, turnaways per month, turnaways to date Title, publisher, platform, turnaways per month, total turnaways to date Only supplied for titles for which BR2 cannot be provided If number of section request per month is 0, then this report should be used unless an aggregator or gateway is responsible only to be used for titles where turnaways are at the title level, in most cases they are at the level of the service, in which case BR4 applies 12

13 BR5 - Total searches and sessions by Month and Title BR6 - Total searches and sessions by Month and Service Title, publisher, platform, ISBN, ISSN, then per title: sessions run, sessions per month and total to date Title, publisher, platform, then per title: searches run and sessions per month and total to date only supplied for those titles where searches and sessions can be counted at the title level, in most cases these are by the service level and so BR6 should be used COUNTER also defines two report types that present aggregated statistics per consortium member. These are listed in the table below. Consortium Reports Report Type Fields Criteria CR1 - Number of successful full-text journal article or book chapter requests by month CR2 - Total searches by month and database full text usage for every online journal and book by individual consortium members search and sessions counts for each database by individual consortium members This report is an aggregation of JR1, JR2 and BR1 and BR2 per consortium member. This report is an aggregation of DB1 per consortium member Of note from the tables above, a federated search is a search engine with pre-caching, Internet robots, or automated search agents, e.g. agents that access a vendor s XML gateway, or automated HTML screen scraping agents. Access statistics from these sources are (and must be) listed separately in the database search reports. COUNTER reports are exported and sent to the resource managers of organisations in a variety of different formats, for example Microsoft Excel or a Comma Separated Variable text file. However, an XML output based on a standardized schema format also exists, developed NISO as part of the Standardized Usage Statistics Harvesting Initiative (SUSHI) [2], as described in a later section. 13

14 3. Statistics Harvesting Engines and Protocols In this section we survey log file parsing engines and communication protocols, with the aim of identifying software libraries capable of reading the raw statistics presented in the previous section Parsing Engines Log Parser v2.1 (from Microsoft) 8 Microsoft s Log Parser is capable of running SQL style queries over log files and record results into an SQL database. It is part of Microsoft s IIS recourse toolkit, and supports a number of different formats e.g. IIS, NCSA and W3C log files, as well as the windows event log, CSV and directory information. An SQL style query language provides a generalised way of querying arbitrary log files, an example of which is shown below for returning the IP address, date time and URI from all query logs that have an ex prefix. SELECT ip, date, time, uri FROM ex*.log It has a Component Object Model (COM) interface for application interaction. Such tool would be of great benefit to provide a single unified query language for easy access to log file information. However, it does require an input context to be defined in order to understand different log file formats, is not free, and is a.net project and hence requires a Microsoft Windows environment - which is not the chosen OS on a large number of Shibboleth IdP and EZproxy server configurations. Java XML Log Analyzer (JXLA) 9 JXLA is a Java library for parsing XML based log files. Arbitrary log file formats can be parsed providing the user specifies its format using their developed Regex language. However despite the ease of which it is possible to define parseable log file formats, this approach is little more than a convenience wrapper to a custom regular expression parser. Log Factor 5 Log Factor 5 is a Java Swing interface for Apache Log4J log file inspection. Log4J is a Java logging library that can, amongst others, output to a file handler. Such log files 8 As part of the ISS toolkit A71A-4C73-B628-ADE629C89499&displaylang=en

15 are then loaded and displayed in Log Factor 5. Its interface provides a hierarchical view of log file entries, where entries can be filtered based on certain attributes and criteria. In order for Log Factor 5 to function, Log4J configurations is required on the host, based on their own standard output format. An example screenshot of Log Factor 5 is shown in Appendix A. Figure 3. Chainsaw 10 v2 (Apache 2006) Chainsaw is another Log4J log file parser inspired by Log Factor 5, created by Apache, and written in Java. It is capable of reading all Log4J files in XML format or from a database (through the Java Database Connectivity driver). It is a complete parsing application with a Java Swing GUI. Dynamic filtering of log files is catered for using custom filter expressions. Of interest, it can receive events from local or remote logging sources through a Log4J Socket Appender and socket receiver on the client. The remote receiver needs to be configured in the output Log4J configuration file which then sends logging information through a socket Appender rather than the standard console or file appender. This allows the application to work in real-time, processing logs entries as they are output by the client program. The parser uses the Log4J configuration itself to understand the log file format. Chainsaw is only compatible with acknowledgeable Log4J parser configurations set up with a socket appender. It requires an XML rather than plain text output and, despite presenting a view of the log file, does not have an analysis option. Chainsaw does come with libraries that could be used with Raptor to achieve backend parsing functionality. Regular Expression based parsers Many parsing approaches use the regular expression capabilities of programming languages such as Perl, Java and PHP etc. Such approaches are applicable to plain text log files, where the exact format and semantics of log entries need to be understood in order to manually construct appropriate regular expression. A custom regular expression approach may not be robust to subtle changes in the logging format, and would need to be set up for each different log format Protocols SUSHI The Standardised Usage Statistics Harvesting Initiative (SUSI) developed a protocol [2] that allows the automatic retrieval of COUNTER-complaint usage statistics in XML format over a SOAP request response web service implementation (on the publisher side). This eliminates the manual effort in acquiring, importing and aggregating Counter statistics, and should improve development of electronic

16 resource management software. The program has a well defined data model and data interface through XML Schema and the Web Service Description Language respectively. SUSHI is currently being used within digital resource management systems to help automate the auditing of e-resources as described in the section to follow. 16

17 4. Usage Collector and Reporting Engines In this section we survey a number of existing software systems that either provide full resource management lifecycle solutions e.g. Resource Management Systems, or those that report on service authentication and general usage statistics e.g. OpenAthens authentication statistics or tools for reporting information contained within log files. This survey should provide an insight into the types of reporting options currently available in existing software platforms which could form part of, where applicable, the base Raptor reporting tool. In addition to this, it should highlight any obvious reporting gaps that can be filled by the Raptor reporting tool Resource Management Systems Electronic Resource Management Systems (ERMS) have become important tools for librarians since their advent in the early 2000 s [4]. An NISO initiative helped standardize ERMS in 2004 [Digital Library Foundation published the Electronic Resource Management Report of DLF and ERM initiative], where an ERMS should support centralised resource auditing and management with the following features: the storage and listing of subscribed e-journals and e-books etc. per resource, management of the e-resource order and renewal lifecycle, and the reporting of issues from publishers. In this section we overview the key features of three example ERMS tools, namely; SEMPERTOOL 11, Murphy Library s ERMes 12, and EBSCONET ERM Essentials 13. This serves to highlight key information and report types that could be used within the Raptor reporting framework. SEMPERTOOL Generated Reports Reports per time period e.g. monthly Report based on a simple usage filters Renewals Notes Monthly, daily or arbitrary time interval Usage filters on different attributes e.g. product name, provider, product type, original price, price in local currency, organization name. List subscriptions that need renewing within a given time frame

18 Resource Listings Cancelled subscriptions Licensed subscriptions Products per resource Resources Resource Lifecycle Management Trial products from a resource Renew subscription Cancel subscription Create, Edit and Replace resources Software Features Open source Web based user interface Customisation Can be listed in a hierarchical-tree view by subject title, publisher etc. ERMes Generated Reports Renewals Year to year price comparisons Access to Counter generated statistics Database usage by fiscal year Vendors Databases Problem logs Resource Listings Resource Lifecycle Management No automatic life order or renewal lifecycle, only subscription reports For a given date range Display of a wide range of Counter statistics as described in Section 2.2. Although manual input required, and no aggregation of statistics. Including licensing terms, subscription status Including subscription terms Access problems 18

19 Software Features Is built as a Microsoft access DB Counter statistics integration Basic level support, manual integration into Access from excel based Counter reports Generated Reports EBSCONET ERM Essentials Reports on e-collection development Includes full Counter statistics and integration with standard ERM Resource Listings Publisher and license details Views by filter Resource Lifecycle Management Full order tracking Helps make and manage development decisions Manages access and registration details Software Features Full Counter access through the SUSHI protocol Full visual reporting Web based solution Manages e-journals and e-package orders Aggregates statistics, reports usage by Counter attributes, augments with cost information from the ERM Filter on attributes to generate views. Including trials, evaluations, orders and renewals Including access models and restrictions Graphs to assist analysis 4.2. Authentication Statistics Reporting Systems MyAthens and Monteverde The MyAthens user portal supports the OpenAthens FAM system, allowing users to manage subscriptions and view user access statistics through a web-based application. However, despite the portal s ability to generate simple access statistics, the OpenAthens project has identified the need to provide a complete in-depth statisticsreporting platform within the UK federation. Consequently, in 2010, project 19

20 Monteverde was started [3]. Project Monteverde is an OpenAthens usage statistics collector, which includes live reporting directly within the OpenAthens LA (as of version 2.1). Project Monteverde strives to provide accurate statistics, operating under the belief that log file parsing is an approximate, interim solution however they have yet to define a long-term solution to the problem of statistic acquisition. Monteverde will include the following features (taken and adapted from [3]): Login events, success and failures SSO Events to different SPs e.g. ScienceDirect, Oxford English Dictionary. Diagnostics: using access logs and erroneous login events. Graphical and or textual report options Long term trends Takes inputs from both identity and service providers to give finer grained knowledge on both user authentication and authorization. Integration with existing management tools An open API (Restful [ref-fielding]) for integration into existing projects. Monteverde only considers resource authentication statistics from the OpenAthens framework, and does not attempt to aggregate such information with other sources of statistics e.g. COUNTER statistics which can be used with fiscal information (like those used by an ERM) to make informed decisions on resource subscriptions. AMMAIS the Accounting and Monitoring of Authentication and Authorization Infrastructure The SWITCH AMMAIS project [5], much like the Monteverde OpenAthens project, hopes to fill the accounting and monitoring gap of the Shibboleth FAM technology. More specifically, they are trying to collect, process and visualise authentication and authorisations requests in Shibboleth. This is an extension of their early work [5] which did not provide a general monitoring solution to the problem. They utilise both the Shibboleth IdP, SP and DS log files for harvesting user authentications, and user authorisations. Using this information, they attempt to monitor 1) user authentication on the IdP, 2) user authorisation on the SP, 3) attribute release from the IdP to the SP, 4) DS interactions (which was already implemented in [5]). AMMAIS is a usage collection framework that places individual usage collectors on each Shibboleth IdP, SP or DS (denoted meters in their framework) within an organisation. These collectors are then aggregated within or across organisations by an accounting server, and exposed to the user by a suitable interface e.g. a web interface. This framework enables both federation level monitoring as well as a more fine-grained federation member level monitoring. Currently the AMMAIS project is in its early stages, a general architecture for monitoring has been agreed, and the protocol and interface for communicating between the resource collectors and resource aggregators is under development. 20

21 4.3. Usage Statistics Reporting Systems PIRUS2 Publisher and Institutional Repository 2 14 (PIRUS2) is a JISC sponsored project to collect and analyse usage statistics. The project is lead by the University of Manchester, and started in October 2009 running until the end of December PIRUS2 is a practical implementation of the more theoretical PIRUS project [7], and aims to develop a suite of open source programs, including a web portal, to consolidate and report COUNTER usage statistics at the article level where currently, COUNTER statistics are only recorded at the level of individual journals, databases or books. Finer grained analyses on the access of individual articles is said to be required for a number of reasons 15. In overview, the last decade has seen an increase in the number of electronic journal articles that a digital repository hosts, where authors and funding agencies require access statistics at the article level in order to distinguish individual items applicable to them. However, no standard for measuring global article usage currently exists. PIRUS2 are developing a set of open source software services to support this goal based on newly developed COUNTER report types (for article access), which can be exposed using the SUSHI protocol. Of note, how to monitor article level access is still an open question, with initial implementations based around detecting an articles distinct digital object identifier (DOI). PIRUS2 is a COUNTER only usage collector, and does not integrate with statistics collected with federated access management technologies such as OpenAthens or Shibboleth. JISC s Online Usage Statistics Portal JISC, in collaboration with MIMAS, Cranfield University, and Birmingham University, are developing a Web Portal to provide usage statistics for online journal content. Like the Raptor project, JISC recognized the need to better understand the impact and increase in availability of online journal content 16. Where in the current state, this information is not presented to librarians or resource managers in an easily accessible 17 and digestible format. Consequently, the JISC online usage portal will present a unified view of journal usage information through a single web site. In broad, the portal aggregates COUNTER-complaint publisher statistics at the Journal (JR1 and JR1A) level, all of which are access and compiled together autonomously, and presented to the user either in graphical or textual e.g. tabled, format see for an exhaustive list Access is often through local authentication and authorisation methods, using one-off passwords. 21

22 IF-MAP In 2008 the Trusted Network Connection (TNC) started development on IF-MAP (the Interface to Metadata Access Points), a reporting component and protocol to fit within their existing Network Access Control architecture (NAC). IF-MAP was developed to monitor the dynamic state of network infrastructure, helping to diagnose problems and report on usage. IF-MAP defines a client-server architecture, where clients (or sensors) can be any type of network hardware e.g. a DHCP server, and are responsible for collating and publishing events to the IF-MAP server over a secure (e.g. TLS secured) connection using the SOAP protocol. The server specification then supports the mediation, aggregation and retrieval of metadata from a variety of different subscribed clients e.g. linking an IP address with its MAC address from DHCP, and further linking this with username from a radius server and hostname from DNS. The server stores metadata from clients in the Metadata Access Point (MAP) database. IF- MAP logs security events in real-time where TNC note existing management protocols such as SNMP and Syslog are static. Although different in purpose to Raptor (reporting on network access as opposed to general resources usage), the client-server reporting architecture is of interest, as well as the IF-MAP v1.1 protocol developed for sending and receiving information over TLS using SOAP. Such protocol defines semantically overlapping metadata types with those required by Raptor e.g. a datatype for logical endpoint access-requests and its associated access-request-ip, and a datatype for representing the authenticated-by hostname or IP address. Consequently, the IF-MAP protocol could either provide a complete implementation from which to work off, or provide a sound base from which to work from. Despite uptake from a number of commercial company s, for example Juniper Networks have IF-MAP publishing client and server implementation as part of their Unified Access Control software, open source alternatives are rare, with omapd 18 being in a relatively early (beta) stage of development General Log File Reporting Systems XpoLog 19 XpoLog is a commercial software platform for hybrid (servers, applications, security etc) log management. It supports the complete reporting lifecycle from log file parsing to monitoring and reporting. It is principally used for automatic application problem monitoring and analyses. More specifically, the software tries to automatically detected problems from application testing cycles (based on production

23 logs). It supports a wide number of input log formats e.g. Log4J, IIS, Syslog. Access Log, but does not provide a public log parsing library Sawmill 20 Sawmill is a paid for, real time universal log file analysis and reporting web application that generates hierarchical, easy to navigate database driven live reporting and graphing views of log files. It s a complete product covering the full lifecycle of monitoring and reporting. It converts log file data into database relations, which is then used to generate reports e.g. on page views, page hits and sessions. Filtering can be done intrinsically to the web application over the database, or extrinsically using a log filter (using a built in scripting language). There are no API Hooks, the information is not presentable to an external interface. An example screenshot of Sawmill is shown in Appendix A. Figure 1. AWStats 21 AWStats is a free (under the GNU general public license) web based system for viewing log files in real time. It has a large list of input formats it can handle, including: Apache HTTP logs, FTP Logs, mail server logs. A variety of graphical and textual reports (as listed in the table below) can be generated for log files over hourly, daily or monthly time periods. Report Type Requests per country Number of authenticated users Requests per file type (e.g. PDF, HTML) Requests per browser Report Type Requests per Host Duration of visit (for web site access) Requests per operating system HTTP Status Codes Other types of reports are supported for different log file types. For example folders visited and the number and type of file downloads for FTP servers. However AWStats is geared primarily to display web site access statistics. Interestingly, the GeoIP [ref] is used to geocode IP address, allowing the creation of per country statistics however, typically this is only accurate at a fairly course level of spatial granularity e.g. by Country. An example screenshot from the AWStat is shown in Appendix A. Figure

24 5. Reporting Options Conclusions In this section we will discuss the statistics gathering and reporting lifecycle that will be supported in Raptor, based on the raw input stats and reporting features of existing solutions identified in this document. Raw statistics: As reported in this deliverable, Raptor will have access to four different sources of usage information. The first three provide authentication and access information through the Shibboleth IdP and EZproxy logs and OpenAthens statistisc. The last, COUNTER statistics are provided by publishers and show individual journal, book, and database usage per institution. Both Shibboleth and OpenAthens present FAM authentication statistics, EZproxy presents e-resource access statistics, and COUNTER presents e-resource usage statistics. Consequently, both Shibboleth and OpenAthens can report statistics on the authentications and access to services, be it a library e-resource, project management web site, or virtual learning platforms like Blackboard 22. EZproxy and COUNTER on the other hand are tailored to reporting the usage of library e-resources. The Shibboleth IdP has two log files that store access and response information. Access logs record authentication requests to the IdP and contains Shibboleth specific information about the profile handler used on which IdP server, as well as general information about the IP of the requesting host and the time of request. In Raptor we aim to harvest both types of information and, as Raptor is a FAM authentication accounting framework first and foremost, will produce reports on both types. The response logs show Shibboleth specific information about the release of attributes back to the SP. Response logs will also be parsed by Raptor and augmented with the access logs to provide a holistic view of the Shibboleth authentication and attribute release lifecycle. OpenAthens access statistics are pre-processed and output by Eduserv, and can provide individual e-resource usage statistics per user or per service provider if requested. Such statistics are comparable to those provided Shibboleth, which compared to COUNTER-complaint publisher statistics, report at a resource level as opposed to at the individual journal, book or database level. EZproxy logs record off-campus e-resource requests per user for each unique Get or Post request. Consequently, these logs are a good source of user resource access information. However, post processing is needed to distinguish each distinct resource request. For example, in the log fragment below, the user A0001H visited publisher_custom.js shortly followed by publisher_custom_leader.js from the publisher testpub. [email protected]"GET HTTP/1.1" [email protected]"GET HTTP/1.1" COUNTER statistics are pre-processed and formatted by the publisher before they are

25 delivered to an organisation. COUNTER provides fine grained usage statistics, showing the frequency of access to individual e-journals, e-books, or e-databases per month and year. However, compared to either EZProxy, OpenAthens or Shibboleth, COUNTER statistics have a low level of granularity at the requester level, showing usage statistics per organisation rather than per user. Combining these statistics within the general framework of Raptor allows a holistic view of e-resource usage in HE or FE institutions. However, resources that provide COUNTER statistics in addition to OpenAthens or Shibboleth IdP and EZproxy information, will overlap. More specifically, a user that signs-on to a publisher through Shibboleth will first be recorded by the Shibboleth IdP then, if that user accesses, for example, and e-journal from that publisher, this usage will also be included in the aggregated COUNTER statistics. Furthermore, Shibboleth can be used to provide authentication to the EZProxy service, in which case from a Shibboleth perspective, this is a reportable service sign-on, but if these logs are combined with EZproxy, such requests should be ignored as the actual resource authentication is taken care of by EZproxy. Such overlap will need to be investigated in depth if useful aggregated statistics are to be generated from the combination authentication and usage information sources. Consequently, the initial stage of Raptor will focus on authentication statistics from the Shibboleth and OpenAthens FAM systems, with an intermediate stage to include EZProxy statistics and a later stage to include COUNTER statistics. Furthermore, in early prototypes of Raptor, even if more than one type of statistics is included they will be reported on separately, leaving their aggregation to the final stages of development. Understanding and reading raw statistics: Numerous log file parsers exist for plain text output files, some e.g. Chainsaw, not only parse, but also display log file entries, and allow live reporting from local and remote systems by integrating with Java s Log4J logging utility. All are capable of reading, in their entirety; the types and formats of Shibboleth and EZproxy log files. COUNTER-complaint statistics are best automatically retrieved through a SUSHI SOAP interface. Thus eliminating the manual effort required to load and aggregate e-journal, e-book and e-database statistics although a fall back manual loading option should be supported through the correct parsing of CSV or Microsoft Excel files. OpenAthens CSV files are also easily parsable. Decisions on implementation libraries are left until the RAPTOR architecture has been defined, and so will not be discussed any further here. Suffice to say that machine processing the four different raw statistic types identified in this document is possible with current technologies. Reporting options: General reporting tools do not understand the specific semantics of the raw access and usage information used by RAPTOR. Consequently, only certain statistics can be reliably generated for with these tools e.g. often just basic frequencies. Furthermore, they are not capable of aggregating different information types, where aggregation must understand the statistical implications of overlapping data sources e.g. access information from COUNTER will often be a superset of the access information that can be obtained from OpenAthens, Shibboleth or EZproxy. 25

26 That said, general tools do highlight a number of key report types that should also be included in Raptor, which are listed in the table below: Report Type Access requests per individual user Description The number of access request to each resource a user has made (frequency count) Access requests per thematic division Split access requests into different thematic divisions e.g. spatial or organisational divisions Access problems Custom report with attribute filter Access request for different time periods The number of access requests that have been denied. As with other tools, allows inference of troubled resources automatically. Using attribute filters to build custom report types e.g. number of web site access for a given set of users. Generate each of the above reports over different time periods In addition, the following software features would also be beneficial to include in Raptor: Feature Live reporting where possible Description As opposed to scheduling the polling of log files, interfacing directly into the Java logging capabilities of the Shibboleth IdP. Enabling a form of push logging. Electronic resource management software have been designed to deal specifically with the e-resource order and renewal lifecycle. As a result, information about per user access is not, instead only reporting on the organizational level resource usage. The table below shows those reporting features of an ERM at the resource subscription level that are of interest to Raptor: Report Type Listings of different publishers and resources Listings of subscriptions Year to Year price comparisons Description Views of the different resources and publishers that are currently being accessed. Would need integration with additional sources of information to obtain subscription information. Would require integration of additional 26

27 resources and COUNTER-Complaint statistics in order to gauge the value for money resources e-journal, e-book and e-database statistics Generate statistics at this level. Would require COUNTER integration. Aggregated statistics General frequency statistics as per table?, combined with e-resource usage statistics show in this table In addition, the following ERM software features would also be beneficial to include in Raptor: Feature SUSHI SOAP integration Visual reporting Web based reporting system Description For automatic retrieval of COUNTER statistics from SUSHI compatible publishers. Graphical reports for easy consumption as opposed to just textual reports The MyAthens user portal, OpenAthens Monteverde statistics collectors and SWITCH accounting framework are an examples of FAM authentication and access reporting tools that are most similar to the initial goals of Raptor, in that they report user resource access statistics. The MyAthens portal is limited with respect to reporting aggregated statistics at the organisation level, instead only reporting individual subscriptions and access information one user at a time. Although Monteverde is in development, its scope and outline highlight the following report types that are of interest to include within Raptor: Report Type Login events SSO events per SP Long term trends Description Including success and failures. Similar to problem reporting as mentioned previously. How many sign on events per service provider In addition, Monteverde has a Restful OpenAPI that allows integration into existing projects. Such API may also be beneficial in Raptor, where external services could be allowed access to aggregated statistics. 27

28 Feature An OpenAPI Fully integrated into the OpenAthensLA Web based reporting system Description SOAP or Restful API that allows integration into other systems. Statistics can be generated for each Local Authority. Such scenario would be similar to Raptor integrating into a Shibboleth IdP Of note, Monteverde does not aggregate statistics from other sources e.g. EZproxy or COUNTER, instead only considering OpenAthens statistics. Furthermore, statistics are collected and reported on the OpenAthens LA, consequently from this constraint, it remains to be seen whether Monteverde can be used to aggregate statistics from multiple LAs. PIRUS2 is an interesting project that aims to enable the finest, per article, level of resource access statistics. If the project were successful, its integration into Raptor (through the SUSHI protocol) would add value to the reporting framework. However, adoption of this standard by publishers needs to happen in the short term, before it would be considered. The AMMAIS project is in an early development stage, hence exact reporting options have yet to be defined. That said, the goals of the project are of interest, and are closely related to those of Raptor, these are: to provide a web interface to authentication and authorisation statistics, collect usage statistics from the federation member level up to the federation level, monitor authentications on the IdP, monitor authorisations on the SP, and monitor any DS interactions. The development of the JISC Usage Statistics Portal complements the development of Raptor, where a usage and authentication synergy can be established by integrating both statistic types. The Raptor software should therefore provide an Open API, using compatible standards were possible, so as to make it available as an information source to the JISC portal. Lastly, as noted previously, Raptor can drawn inspiration from the IF-MAP reporting architecture and components, as well as the IF-Map v1.1 protocol used (defined in XSD and passed through SOAP) for communicating between the various components of the architecture. 28

29 5.1. Raptor Features From the conclusions drawn in the previous section, the following mandatory reporting features will be incorporated into the Raptor framework: Textual views of statistical information Graphical views of statistical information Integration of Shibboleth 1.3 and 2.x IdP logs Integration of OpenAthens IdP usage statistics Report on (for custom time periods): o Authentication events per SP and per user (or principalname for Shibboleth) o Authentications per IP address, geocoding where possible to obtain location specific information. o Login events success and failures o Shibboleth specific statistics: IdP servers used Authentication methods used Message profiles used Response bindings used Type of attributes released, but not actual values for privacy reasons Shibboleth profiles handlers used o Access problems on the SP A web based interface that can present information for technical users (all raw and processed statistics), and present a subset of processed statistics for nontechnical users. Again from the conclusions drawn in the previous section, the following desirable reporting features will be included, where possible, into the Raptor reporting framework: Integration of usage statistics from COUNTER-complaint resources o Including use of the SUSHI protocol o Reporting on: E-journal, e-database and e-book usage per resource Integration of EZproxy logs Aggregation of: o Authentication information from Shibboleth and OpenAthens o Authentication information from Shibboleth, OpenAthens and EZproxy o All sources of authentication information with usage information from COUNTER An OpenAPI so other software can access Raptor statistics Live reporting from suitably enable sources e.g. using a socket appender in Log4J for the Shibboleth IdP. 29

30 6. Conclusions In this deliverable we documented the reporting options of the Raptor project. Firstly we identified the raw information and statistics that serve as input to the Raptor collection framework. Next, we overviewed existing tools and protocols for harvesting usage information. This was followed by a survey of existing reporting frameworks, which reported on general usage information through to FAM specific usage information. Finally, we concluded on each section, suggesting aspects of existing protocols and tools that would fit within the Raptor reporting framework. References [1] A. Luotonen, The Common Logfile Format, 1995, available in 2010 at [2] Adam Chandler and Tim Jewel, Key Issue: The Standardized Usage Statistics Harvesting Initiative (SUSHI), Serials, 2006, 19:1, [3] David Orrell, OpenAthens roadmap to 2011, presentation, available in 2010 at [4] Jewell, Tim, et al. Electronic Resource Management: Report of the DLF ERM Initiative. (2004). Digital Library Federation. Retrieved [5] Patrik Schnellmann and Andre Redard, SWITCH, The Swiss Education & Research Network, Accounting for the Authentication and Authorization Infrastructure (AAI), Pilot Study, available on January 2006, [6] Phillip M. Hallam-Baker and Brian Behlendorf, Extended Log File Format, World Wide Web Consortium, Working Draft, March 1996, [7] Peter Shepherd et al., Publisher and Institutional Repository Usage Statistics, Project Report, January 2009, available at [8] Shibboleth: an Internet 2 Project. Shibboleth in Use, June Available at: Visited on: Jun

31 Appendix A - Log File Parser Screenshots Figure 1 - Sawmill 31

32 Figure 2 - Chainsaw Figure 3 - Log Factor 5 32

33 Figure 4 - AWStat 33

The PIRUS Code of Practice for recording and reporting usage at the individual article level

The PIRUS Code of Practice for recording and reporting usage at the individual article level PIRUS A COUNTER Standard The PIRUS Code of Practice for recording and reporting usage at the individual article level (Note: this draft is for public consultation only and is not yet ready for full implementation)

More information

EDINBURGH UNIVERSITY PRESS LIBRARIAN ADMINISTRATION USER GUIDE http://www.euppublishing.com

EDINBURGH UNIVERSITY PRESS LIBRARIAN ADMINISTRATION USER GUIDE http://www.euppublishing.com EDINBURGH UNIVERSITY PRESS LIBRARIAN ADMINISTRATION USER GUIDE http://www.euppublishing.com Journal Subscription Activation... 1 1. Register as an Individual User... 1 2. Subscription Confirmation Email...

More information

About This Document 3. Integration and Automation Capabilities 4. Command-Line Interface (CLI) 8. API RPC Protocol 9.

About This Document 3. Integration and Automation Capabilities 4. Command-Line Interface (CLI) 8. API RPC Protocol 9. Parallels Panel Contents About This Document 3 Integration and Automation Capabilities 4 Command-Line Interface (CLI) 8 API RPC Protocol 9 Event Handlers 11 Panel Notifications 13 APS Packages 14 C H A

More information

XpoLog Center Suite Data Sheet

XpoLog Center Suite Data Sheet XpoLog Center Suite Data Sheet General XpoLog is a data analysis and management platform for Applications IT data. Business applications rely on a dynamic heterogeneous applications infrastructure, such

More information

Crawl Proxy Installation and Configuration Guide

Crawl Proxy Installation and Configuration Guide Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

SAP Cloud Identity Service Document Version: 1.0 2014-09-01. SAP Cloud Identity Service

SAP Cloud Identity Service Document Version: 1.0 2014-09-01. SAP Cloud Identity Service Document Version: 1.0 2014-09-01 Content 1....4 1.1 Release s....4 1.2 Product Overview....8 Product Details.... 9 Supported Browser Versions....10 Supported Languages....12 1.3 Getting Started....13 1.4

More information

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)...

Enterprise Solution for Remote Desktop Services... 2. System Administration... 3. Server Management... 4. Server Management (Continued)... CONTENTS Enterprise Solution for Remote Desktop Services... 2 System Administration... 3 Server Management... 4 Server Management (Continued)... 5 Application Management... 6 Application Management (Continued)...

More information

SAML Authentication Quick Start Guide

SAML Authentication Quick Start Guide SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.

More information

SOA Software API Gateway Appliance 7.1.x Administration Guide

SOA Software API Gateway Appliance 7.1.x Administration Guide SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,

More information

000-284. Easy CramBible Lab DEMO ONLY VERSION 000-284. Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0

000-284. Easy CramBible Lab DEMO ONLY VERSION 000-284. Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0 Easy CramBible Lab 000-284 Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0 ** Single-user License ** This copy can be only used by yourself for educational purposes Web: http://www.crambible.com/

More information

Audit Management Reference

Audit Management Reference www.novell.com/documentation Audit Management Reference ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Librarian s Guide to vlex

Librarian s Guide to vlex Librarian s Guide to vlex Table of Contents Purpose and Audience 3 Giving access to vlex.com to your Users 4 IP Authentication 4 IP Authentication with Personal Accounts 4 HTTP Proxy Access 5 EZProxy User

More information

PROPALMS TSE 6.0 March 2008

PROPALMS TSE 6.0 March 2008 PROPALMS March 2008 An Analysis of and Terminal Services: Contents System Administration... 2 Server Management... 3 Application Management... 5 Security... 7 End User Experience... 8 Monitoring and Reporting...

More information

View from the Coalface: experiences of digital collection management

View from the Coalface: experiences of digital collection management Academic & Special Libraries Section Annual Seminar View from the Coalface: experiences of digital collection management Arlene Healy Sub-Librarian, Electronic Resources Trinity College Library Dublin

More information

An Analysis of Propalms TSE and Microsoft Remote Desktop Services

An Analysis of Propalms TSE and Microsoft Remote Desktop Services An Analysis of TSE and Remote Desktop Services JULY 2010 This document illustrates how TSE can extend your Remote Desktop Services environment providing you with the simplified and consolidated management

More information

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access

More information

http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm

http://alice.teaparty.wonderland.com:23054/dormouse/bio.htm Client/Server paradigm As we know, the World Wide Web is accessed thru the use of a Web Browser, more technically known as a Web Client. 1 A Web Client makes requests of a Web Server 2, which is software

More information

Configuration Worksheets for Oracle WebCenter Ensemble 10.3

Configuration Worksheets for Oracle WebCenter Ensemble 10.3 Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the

More information

Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO

Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Scope... 2 Prerequisites Tasks... 2 Procedure... 2 Step 1: Configure EPM s WebLogic domain for SP Federation Services... 2 Step 2:

More information

Federated Access to an HTTP Web Service Using Apache (WSTIERIA Project Technical Note 1)

Federated Access to an HTTP Web Service Using Apache (WSTIERIA Project Technical Note 1) (WSTIERIA Project Technical Note 1) 1 Background 12/04/2010, Version 0 One of the outputs of the SEE-GEO project was façade code to sit in front of an HTTP web service, intercept client requests, and check

More information

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO

FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO FEATURE COMPARISON BETWEEN WINDOWS SERVER UPDATE SERVICES AND SHAVLIK HFNETCHKPRO Copyright 2005 Shavlik Technologies. All rights reserved. No part of this document may be reproduced or retransmitted in

More information

friendly (technical) guide to COUNTER

friendly (technical) guide to COUNTER contents friendly (technical) guide to COUNTER This guide is a non-intimidating manual for publishers and vendors implementing COUNTER-compliant usage statistics for the first time, or for more experienced

More information

nexus Hybrid Access Gateway

nexus Hybrid Access Gateway Product Sheet nexus Hybrid Access Gateway nexus Hybrid Access Gateway nexus Hybrid Access Gateway uses the inherent simplicity of virtual appliances to create matchless security, even beyond the boundaries

More information

W3Perl A free logfile analyzer

W3Perl A free logfile analyzer W3Perl A free logfile analyzer Features Works on Unix / Windows / Mac View last entries based on Perl scripts Web / FTP / Squid / Email servers Session tracking Others log format can be added easily Detailed

More information

Tracking Network Changes Using Change Audit

Tracking Network Changes Using Change Audit CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and

More information

Course Scheduling Support System

Course Scheduling Support System Course Scheduling Support System Roy Levow, Jawad Khan, and Sam Hsu Department of Computer Science and Engineering, Florida Atlantic University Boca Raton, FL 33431 {levow, jkhan, samh}@fau.edu Abstract

More information

Oracle Service Bus Examples and Tutorials

Oracle Service Bus Examples and Tutorials March 2011 Contents 1 Oracle Service Bus Examples... 2 2 Introduction to the Oracle Service Bus Tutorials... 5 3 Getting Started with the Oracle Service Bus Tutorials... 12 4 Tutorial 1. Routing a Loan

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

ManageEngine Exchange Reporter Plus :: Help Documentation WELCOME TO EXCHANGE REPORTER PLUS... 4 GETTING STARTED... 7 DASHBOARD VIEW...

ManageEngine Exchange Reporter Plus :: Help Documentation WELCOME TO EXCHANGE REPORTER PLUS... 4 GETTING STARTED... 7 DASHBOARD VIEW... TABLE OF CONTENTS WELCOME TO EXCHANGE REPORTER PLUS... 4 CONTACT ZOHO CORP.... 5 GETTING STARTED... 7 SYSTEM REQUIREMENTS... 8 INSTALLATION OF EXCHANGE REPORTER PLUS... 9 HOW EXCHANGE REPORTER PLUS WORKS...

More information

Federated Identity Management Solutions

Federated Identity Management Solutions Federated Identity Management Solutions Jyri Kallela Helsinki University of Technology [email protected] Abstract Federated identity management allows users to access multiple services based on a single

More information

How To Use Saml 2.0 Single Sign On With Qualysguard

How To Use Saml 2.0 Single Sign On With Qualysguard QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,

More information

Guide to the GALILEO Reporting Tool

Guide to the GALILEO Reporting Tool Guide to the GALILEO Reporting Tool October 2010 Table of Contents Overview Old and New Reporting Tools Data Repository: What Data Is or Is Not Available How Data is Collected Description of New Reporting

More information

DiskPulse DISK CHANGE MONITOR

DiskPulse DISK CHANGE MONITOR DiskPulse DISK CHANGE MONITOR User Manual Version 7.9 Oct 2015 www.diskpulse.com [email protected] 1 1 DiskPulse Overview...3 2 DiskPulse Product Versions...5 3 Using Desktop Product Version...6 3.1 Product

More information

Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining

Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining Analyzing the Different Attributes of Web Log Files To Have An Effective Web Mining Jaswinder Kaur #1, Dr. Kanwal Garg #2 #1 Ph.D. Scholar, Department of Computer Science & Applications Kurukshetra University,

More information

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Copyright Pivotal Software Inc, 2013-2015 1 of 10

Copyright Pivotal Software Inc, 2013-2015 1 of 10 Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10

More information

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence

Web Development. Owen Sacco. ICS2205/ICS2230 Web Intelligence Web Development Owen Sacco ICS2205/ICS2230 Web Intelligence Brief Course Overview An introduction to Web development Server-side Scripting Web Servers PHP Client-side Scripting HTML & CSS JavaScript &

More information

Authentication and Single Sign On

Authentication and Single Sign On Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication

More information

v6.1 Websense Enterprise Reporting Administrator s Guide

v6.1 Websense Enterprise Reporting Administrator s Guide v6.1 Websense Enterprise Reporting Administrator s Guide Websense Enterprise Reporting Administrator s Guide 1996 2005, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121,

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is

More information

Policy Management: The Avenda Approach To An Essential Network Service

Policy Management: The Avenda Approach To An Essential Network Service End-to-End Trust and Identity Platform White Paper Policy Management: The Avenda Approach To An Essential Network Service http://www.avendasys.com email: [email protected] email: [email protected] Avenda

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment

Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based

More information

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...

More information

Axway API Gateway. Version 7.4.1

Axway API Gateway. Version 7.4.1 O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

PortWise Access Management Suite

PortWise Access Management Suite Create secure virtual access for your employees, partners and customers from any location and any device. With todays global and homogenous economy, the accuracy and responsiveness of an organization s

More information

How To Authenticate With Ezproxy On A University Campus (For A Non Profit)

How To Authenticate With Ezproxy On A University Campus (For A Non Profit) EZproxy Hosted Frequently Asked Questions Q: What firewall ports would have to be opened to accommodate hosted EZproxy? A: It mostly depends on how you plan to authenticate. For example if you want to

More information

Secure Messaging Server Console... 2

Secure Messaging Server Console... 2 Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating

More information

Managing Qualys Scanners

Managing Qualys Scanners Q1 Labs Help Build 7.0 Maintenance Release 3 [email protected] Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access

More information

SAML Security Option White Paper

SAML Security Option White Paper Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions

More information

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007

DEPLOYMENT GUIDE Version 1.2. Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 DEPLOYMENT GUIDE Version 1.2 Deploying the BIG-IP system v10 with Microsoft Exchange Outlook Web Access 2007 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Microsoft Outlook Web

More information

DFG form 12.181 03/15 page 1 of 8. for the Purchase of Licences funded by the DFG

DFG form 12.181 03/15 page 1 of 8. for the Purchase of Licences funded by the DFG form 12.181 03/15 page 1 of 8 Guidelines for the Purchase of Licences funded by the Within the framework of the Alliance Digital Information Initiative, licences for journals, databases and e-books are

More information

SOA REFERENCE ARCHITECTURE: WEB TIER

SOA REFERENCE ARCHITECTURE: WEB TIER SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible

More information

Client Center Quick Guide:

Client Center Quick Guide: Client Center Quick Guide: Overview: The Client Center What is the Client Center? The Client Center is the administrative tool that powers all of your Serials Solutions services. By reporting your subscription

More information

The COUNTER Code of Practice

The COUNTER Code of Practice Counting Online Usage of NeTworked Electronic Resources Journals and Databases: Release 3 Published August 2008 Abstract The COUNTER Code of Practice COUNTER provides a set of international, extendible

More information

TANDBERG MANAGEMENT SUITE 10.0

TANDBERG MANAGEMENT SUITE 10.0 TANDBERG MANAGEMENT SUITE 10.0 Installation Manual Getting Started D12786 Rev.16 This document is not to be reproduced in whole or in part without permission in writing from: Contents INTRODUCTION 3 REQUIREMENTS

More information

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents

More information

ICE Trade Vault. Public User & Technology Guide June 6, 2014

ICE Trade Vault. Public User & Technology Guide June 6, 2014 ICE Trade Vault Public User & Technology Guide June 6, 2014 This material may not be reproduced or redistributed in whole or in part without the express, prior written consent of IntercontinentalExchange,

More information

Kaseya 2. Installation guide. Version 7.0. English

Kaseya 2. Installation guide. Version 7.0. English Kaseya 2 Kaseya Server Setup Installation guide Version 7.0 English September 4, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept

More information

PARTNER INTEGRATION GUIDE. Edition 1.0

PARTNER INTEGRATION GUIDE. Edition 1.0 PARTNER INTEGRATION GUIDE Edition 1.0 Last Revised December 11, 2014 Overview This document provides standards and guidance for USAA partners when considering integration with USAA. It is an overview of

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

BlackBerry Enterprise Server Resource Kit

BlackBerry Enterprise Server Resource Kit BlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 3 Administration Guide Published: 2011-06-20 SWD-1701690-0620052958-001 Contents

More information

Monitoring System Status

Monitoring System Status CHAPTER 14 This chapter describes how to monitor the health and activities of the system. It covers these topics: About Logged Information, page 14-121 Event Logging, page 14-122 Monitoring Performance,

More information

SOSFTP Managed File Transfer

SOSFTP Managed File Transfer Open Source File Transfer SOSFTP Managed File Transfer http://sosftp.sourceforge.net Table of Contents n Introduction to Managed File Transfer n Gaps n Solutions n Architecture and Components n SOSFTP

More information

OpenLDAP Oracle Enterprise Gateway Integration Guide

OpenLDAP Oracle Enterprise Gateway Integration Guide An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information

More information

T320 E-business technologies: foundations and practice

T320 E-business technologies: foundations and practice T320 E-business technologies: foundations and practice Block 3 Part 2 Activity 2: Generating a client from WSDL Prepared for the course team by Neil Simpkins Introduction 1 WSDL for client access 2 Static

More information

Authentication and access control in Sympa mailing list server

Authentication and access control in Sympa mailing list server Authentication and access control in Sympa mailing list server February 2004 Serge Aumont & Olivier Salaün Comité Réseau des Universités http://www.cru.fr Campus de Beaulieu, Rennes France 1 Introduction

More information

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain

Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Title: A Client Middleware for Token-Based Unified Single Sign On to edugain Sascha Neinert Computing Centre University of Stuttgart, Allmandring 30a, 70550 Stuttgart, Germany e-mail: [email protected]

More information

SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support

SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support SonicWALL SSL VPN 3.0 HTTP(S) Reverse Proxy Support Document Scope This document describes the implementation of reverse proxy to provide HTTP and HTTPS access to Microsoft Outlook Web Access (OWA) Premium

More information

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server

More information

Configuration Information

Configuration Information This chapter describes some basic Email Security Gateway configuration settings, some of which can be set in the first-time Configuration Wizard. Other topics covered include Email Security interface navigation,

More information

Authentication Integration

Authentication Integration Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway

Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...

More information

multiple placeholders bound to one definition, 158 page approval not match author/editor rights, 157 problems with, 156 troubleshooting, 156 158

multiple placeholders bound to one definition, 158 page approval not match author/editor rights, 157 problems with, 156 troubleshooting, 156 158 Index A Active Directory Active Directory nested groups, 96 creating user accounts, 67 custom authentication, 66 group members cannot log on, 153 mapping certificates, 65 mapping user to Active Directory

More information

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.

SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.

More information

Introducing Shibboleth

Introducing Shibboleth workshop Introducing Shibboleth MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 MPG-AAI MPG-AAI a MPG-wide Authentication & Authorization Infrastructure for access control to web-based resources

More information

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them. This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and

More information

About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack

About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer

More information

Service Provider Interface Study

Service Provider Interface Study Service Provider Interface Study Prepared by: Rhys Smith ([email protected]) Information Services, Cardiff University Page 1 of 45 Executive Summary A wide variety of access methods exist to establish

More information

Single Sign On for ShareFile with NetScaler. Deployment Guide

Single Sign On for ShareFile with NetScaler. Deployment Guide Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents

More information

Advanced Configuration Administration Guide

Advanced Configuration Administration Guide Advanced Configuration Administration Guide Active Learning Platform October 2015 Table of Contents Configuring Authentication... 1 PingOne... 1 LMS... 2 Configuring PingOne Authentication... 3 Before

More information

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip

How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

Figure 1. perfsonar architecture. 1 This work was supported by the EC IST-EMANICS Network of Excellence (#26854).

Figure 1. perfsonar architecture. 1 This work was supported by the EC IST-EMANICS Network of Excellence (#26854). 1 perfsonar tools evaluation 1 The goal of this PSNC activity was to evaluate perfsonar NetFlow tools for flow collection solution and assess its applicability to easily subscribe and request different

More information