A MORE FLEXIBLE MULTI-TENANT SOA FOR SAAS
|
|
|
- June Day
- 10 years ago
- Views:
Transcription
1 A MORE FLEXIBLE MULTI-TENANT SOA FOR SAAS Eric H. Nielsen, Ph.D. VP Platform Architecture CA Technologies For IEEE Software Technology Conference STC 2014 April 3, 2014 Long Beach, CA USA
2 Abstract Like many vendors, CA has multiple existing products with stand alone value. What does the road to SaaS look like for these apps? How do we make them work together as a suite? Applications may be sourced from multiple suppliers, deployed from multiple PaaS, or incorporate different generations of architecture. Before enabling functional integration among heterogeneous applications, we need to determine how tenancy will work. A typical multi-tenant SaaS application scales horizontally as a single composite app. with controlled integration APIs. The SaaS application is single-sourced, and tenancy is wired into the application. Most enterprise apps aren t built to be deployed this way; it is more than building for scale and integration APIs, it is a matter of how each application adapts to deal with tenancy. Unlike the prototypical SaaS application, this problem demands loose coupling between the logical service layer and the physical resource layer. And to be business rational, traditional applications have the additional challenge of merging current software and business practices incrementally into SaaS technology. To do this we had to rethink tenancy in terms of customers and environments, and how these environments are represented at the service request layer and kept external to each application. Environments provide walls for access, content, and SLAs. This presentation summarizes resulting architecture is based on our experience creating a multi-tenant environment service layer to deliver IT management applications as a SaaS suite, as well as proposes specific areas where standards are recommended to ensure open implementation.
3 built for MultiTenancy? Source:
4 Thrive! Embrace multi-tenancy! Source:
5 My Background building multi-tenant SaaS Apps for 14 years. building multi-tenant SaaS that spans suites of single and multi-tenant Apps for 4 years. defined software tenancy to meet business needs.
6 Tenancy is hierarchical complicated 2014 Genpro
7 Tenancy is needs hierarchical to be simple complicated Companies rent space everywhere from everybody Who is responsible for the contents? IT: All locations are behind the same virtual firewall for ease of integration. Companies employ people My company governs my employee identity no matter where I go. IT: My login gives me access governed by my terms of employment. Companies contract third parties for services Non-employees access the facilities on a regular basis to fulfill obligations/ IT: A single representative can serve multiple companies. Companies have retail, office, and other resources Locations varies in cost, use, and nature of the content. IT: Sandbox resources replicate production, but are backed up and used differently than production resources to reduce cost.
8 Tenancy Definitions Google AppEngine: Multitenancy is the name given to a software architecture in which one instance of an application, running on a remote server, serves many client organizations (also known as tenants). WSO2 (Chris Haddad): Tenancy dimensions. consider whether the SaaS application will be personalized across people (e.g. organization, team, or individual), projects (e.g. joint venture, marketing campaign, benefits enrollment), or IT artifacts (e.g. application, API, service, or machine). Wikipedia: Multitenancy refers to a principle in software architecture where a single instance of the software runs on a server, serving multiple client organizations (tenants).
9 Expand tenancy to include the customer perspective! Tenancy at each level should be decoupled from other levels This presentation is exclusively about the tenancy at the service layer From:
10 Tenancy Use Cases that are hard Converting a Customer from a trial to production Recreating integrated sandbox environments. Customer reorganization and changing purchasing silos. Data ownership and tracking external to applications. Simplicity of integration, workflows and custom solutions within an environment. Users using or administering multiple environments. Operationally tracking data and enforcing legal limitations.
11 Flexible MultiTenant SOA: Technical Behaviors Discoverable APIs and automatic integration. Environment Replication without conflict. Custom configuration of a single solution.. Resources referenced independent of source and Auth. Solution: model tenancy in terms of customer and environment Use API URIs that make environments explicit Migration implement atop existing APIs.
12 Tenant = 1 Customer with 1 N Environments Customer Environments at the Service Layer move copies of data between environments, do not mix results among environments. have different service requirements by environment backup, audit, recovery, costs PROD
13 Tenant Refactored: One Customer, Multiple Environments customer user membership app instance services multiple environments environment service resource data Customer Centric Model User Identities are owned by the customer. Customer contracts services for zero or more environments. Users are members of multiple environments Environments serve different business purposes. may have own service level, legal restrictions Data owned by customer, walled by environment Data/Config is copyable between environments.
14 Environment Oriented Tenancy Multiple Environments per Customer UI includes environment selector Web UI Same Origin Entry Common Admin, AuthN plus routing by environment & service Ops Config Production Environment Ops Config Test Environment Ops Config Preview Environment Persistence Data Config. Persistence Data Config. Persistence Data Config.
15 Tenants Refactored: Customers are Hierarchical and Flexible cust ome customer r environment user Customer hierarchy represents business relationships Hierarchy represents who is visible to whom, who can administer whom, licensing, etc. Customers can be split, merged, and moved with no functional effect on environments
16 Environments map to Operational Characteristics Environment SLA Maint. Window Data Backup Data Resiliency* Disaster Recovery National Boundary Production 99.95% no Daily point in time Guaranteed EU only Devel. 99% yes OnDemand recoverable no EU Only Test 99% yes OnDemand recoverable no EU Only * Consistent backup across an environment is non-trivial
17 Tenancy Refactored: Apps provide services by tenant environment Apps manage data access apps environment service resource data user For app developers customer environment is indistinguishable from tenant Apps can discover other resources and services within their environment. Each Environment provisions app instances to match operational requirements such as availability, backup, data residency. Longer term: Each environment can create and manage its own, custom solution UI
18 Environments enable and limit integration Pixar / Marvel Comics An Unfortunate Integration! Make integration among intraenvironment resources simple. Discovery and store intra-environment resource references. Environment UI navigating among multiple app resources. Systematically ensure that Mistakes of Omission do not expose data to another environment From: worth1000.com Advanced: User perform actions in multiple environments simultaneously
19 Multi-Environment SOA Architecture requires enhanced request routing from outside and between apps Web UI Authentication & SSL termination Request Dispatch Tenantagnostic App as a Svc MultiTenant Application as a Service MultiTenant Application as a Service object store as a svc Shared Data Services
20 Standard URIs From wikipedia: URIs can be classified as locators (URLs), as names (URNs), or as both. A uniform resource name (URN) functions like a person's name, while a uniform resource locator (URL) resembles that person's street address. In other words: the URN defines an item's identity, while the URL provides a method for finding it. Format: <scheme>://<authority><path>?<query> From: RFC 2396 Request includes 3 things 1. Location of resource; 2. Authentication of user; and 3. Resource being accessed. + optional payload (payload resources have environment in URL)
21 What do we need in a multi-environment URI? Resource references are globally unique URI does not include implicit context. Does not contain requester authentication information Service Routing for federated services in an environment Each resource type may be implemented by more than one service, such as resource types user or ticket Different Environments may be services by a different app instance Therefore need to route using environment & service type info. Standards and Conventions: RFC 2396 <scheme>://<authority><path>?<query> HATEOAS Avoid URI rewrites Hostname: trusted location of service router
22 Request Authentication To determine Authorization, every request needs: 1) The requesting User; and 2) The Environment governing request Authentication AuthN distinct from resource Extract AuthN User and Environment from request header when proxied from trusted router, *or* App validate tokens in each request with a security service.
23 Implementing a Flexible MultiTenant SOA One solution for the URI <scheme>://<authority><service path><resource path>?<query> Details: RFC2396 <path> <scheme>://<authority> e.g., <service path> /<proto>/<service id>/<version>/<env. id > <proto> identifies the routing mechanism <service id> identifies the service type <version> identifies the interface version of the service <env.id> identifies the environment specific resource service <resource path> /<resource type>[/<resource id>[ ]]
24 Implementing a Flexible MultiTenant SOA URN uniqueness = no relying on hostname! <service path> /<proto>/<service id>/<version>/<env. id > Why a <service path>? Multiple independent services can implement the same resource type Resource references stored/compared independent of <authority> Everything in an environment accessible through a single origin. Now the SaaS infrastructure can : Can replicate data wholesale between environments safely Can access data from multiple environments with a single service. Can federate single, multi-tenant applications, and tenant-agnostic apps Can route requests based on service type and environment id.
25 Implementing a Flexible MultiTenant SOA AuthN solution for the URI All access controls require environment information Every Request has headers containing: AuthN User ID apps must use this for AuthZ [may require UserID string mapping] AuthN Environment ID apps must use this for AuthZ [salesforce.com example: see the LoginScopeHeader ] When does AuthN Env. in the header resource Env. in the URI? When viewing resources from multiple environments Legacy: Multi-tenant apps assume user belongs to one environment. Treated as a provisioning limitation.
26 Summary: Use Cases Converting a Customer from a trial to production Recreating integrated sandbox environments. Customer reorganization and changing purchasing silos. Data ownership and tracking external to applications. Authentication & SSL termination Simplicity of integration, workflows & custom solutions within an environment. Users using or administering multiple environments. Operationally tracking data and enforcing legal limitations. Web UI Request Dispatch Tenantagnostic App as a Svc MultiTenant Application as a Service MultiTenant Application as a Service object store as a svc Shared Data Services
27 Summary: Modeling Tenancy Flexibly customer user membership environment service resource data MultiCustomer is critical for any successful SaaS application. MultiEnvironment management is critical to your customer s experience. A Customer hierarchy together with MultiEnvironment management simplifies and scales delivery of diverse SaaS applications and deployments.
28 Summary: Standardizing the Service Request Need broad recognition that every request may have: One Environment ID that governs Authorization of a request A second (occasionally different) Environment ID that Owns the Resources referred to in a request. and to standardize: Incorporating the owning Tenant-Environment ID in every resource request URI for routing. Incorporating an Authenticated Tenant-Environment ID header to govern authorization policies applied to a request.
Three Ways to Integrate Active Directory with Your SaaS Applications OKTA WHITE PAPER. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107
OKTA WHITE PAPER Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107 [email protected] 1-888-722-7871 wp-3waysad-113012 Table
journey to a hybrid cloud
journey to a hybrid cloud Virtualization and Automation VI015SN journey to a hybrid cloud Jim Sweeney, CTO GTSI about the speaker Jim Sweeney GTSI, Chief Technology Officer 35 years of engineering experience
White paper Contents
Three Ways to Integrate Active Directory with Your SaaS Applications Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 User Management Challenges of Software
Migrating SaaS Applications to Windows Azure
Migrating SaaS Applications to Windows Azure Lessons Learned 04.04.2012 Speaker Introduction Deepthi Raju Marketing Technology Services Deepthi joined Smartbridge in 2005 and has over twenty years of technology
Building a SaaS Application. ReddyRaja Annareddy CTO and Founder
Building a SaaS Application ReddyRaja Annareddy CTO and Founder Introduction As cloud becomes more and more prevalent, many ISV s and enterprise are looking forward to move their services and offerings
Enterprise Access Control Patterns For REST and Web APIs
Enterprise Access Control Patterns For REST and Web APIs Francois Lascelles Layer 7 Technologies Session ID: STAR-402 Session Classification: intermediate Today s enterprise API drivers IAAS/PAAS distributed
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
SaaS A Product Perspective
SaaS A Product Perspective Software-as-a-Service (SaaS) is quickly gaining credibility and market share against traditional packaged software. This presents new opportunities for product groups and also
Software-Defined Networks Powered by VellOS
WHITE PAPER Software-Defined Networks Powered by VellOS Agile, Flexible Networking for Distributed Applications Vello s SDN enables a low-latency, programmable solution resulting in a faster and more flexible
Service-Oriented Architecture and Software Engineering
-Oriented Architecture and Software Engineering T-86.5165 Seminar on Enterprise Information Systems (2008) 1.4.2008 Characteristics of SOA The software resources in a SOA are represented as services based
Ensuring High Service Levels for Public Cloud Deployments Keys to Effective Service Management
Ensuring High Service Levels for Public Cloud Deployments Keys to Effective Service Management Table of Contents Executive Summary... 3 Introduction: Cloud Deployment Models... 3 Private Clouds...3 Public
White Paper. Cloud Native Advantage: Multi-Tenant, Shared Container PaaS. http://wso2.com Version 1.1 (June 19, 2012)
Cloud Native Advantage: Multi-Tenant, Shared Container PaaS Version 1.1 (June 19, 2012) Table of Contents PaaS Container Partitioning Strategies... 03 Container Tenancy... 04 Multi-tenant Shared Container...
Network Virtualization Solutions - A Practical Solution
SOLUTION GUIDE Deploying Advanced Firewalls in Dynamic Virtual Networks Enterprise-Ready Security for Network Virtualization 1 This solution guide describes how to simplify deploying virtualization security
Cisco Secure Network Container: Multi-Tenant Cloud Computing
Cisco Secure Network Container: Multi-Tenant Cloud Computing What You Will Learn Cloud services are forecast to grow dramatically in the next 5 years, providing a range of features and cost benefits for
Cloud Platforms, Challenges & Hadoop. Aditee Rele Karpagam Venkataraman Janani Ravi
Cloud Platforms, Challenges & Hadoop Aditee Rele Karpagam Venkataraman Janani Ravi Cloud Platform Models Aditee Rele Microsoft Corporation Dec 8, 2010 IT CAPACITY Provisioning IT Capacity Under-supply
CHAPTER 8 CLOUD COMPUTING
CHAPTER 8 CLOUD COMPUTING SE 458 SERVICE ORIENTED ARCHITECTURE Assist. Prof. Dr. Volkan TUNALI Faculty of Engineering and Natural Sciences / Maltepe University Topics 2 Cloud Computing Essential Characteristics
Optimizing Service Levels in Public Cloud Deployments
WHITE PAPER OCTOBER 2014 Optimizing Service Levels in Public Cloud Deployments Keys to Effective Service Management 2 WHITE PAPER: OPTIMIZING SERVICE LEVELS IN PUBLIC CLOUD DEPLOYMENTS ca.com Table of
Cloud Computing; What is it, How long has it been here, and Where is it going?
Cloud Computing; What is it, How long has it been here, and Where is it going? David Losacco, CPA, CIA, CISA Principal January 10, 2013 Agenda The Cloud WHAT IS THE CLOUD? How long has it been here? Where
FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications
FUJITSU Software Interstage Business Operations Platform: A Foundation for Smart Process Applications Keith Swenson VP R&D, Chief Architect Fujitsu America, Inc. May 30, 2013 We are a software company
Copyright Pivotal Software Inc, 2013-2015 1 of 10
Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10
Security & Trust in the Cloud
Security & Trust in the Cloud Ray Trygstad Director of Information Technology, IIT School of Applied Technology Associate Director, Information Technology & Management Degree Programs Cloud Computing Primer
CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS. Review Business and Technology Series www.cumulux.com
` CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS Review Business and Technology Series www.cumulux.com Table of Contents Cloud Computing Model...2 Impact on IT Management and
Data Management in an International Data Grid Project. Timur Chabuk 04/09/2007
Data Management in an International Data Grid Project Timur Chabuk 04/09/2007 Intro LHC opened in 2005 several Petabytes of data per year data created at CERN distributed to Regional Centers all over the
Top Ten Reasons to Transition Your IT Sandbox Environments to the Cloud
Top Ten Reasons to Transition Your IT Sandbox Environments to the Cloud WHITE PAPER BROUGHT TO YOU BY SKYTAP 2 Top Ten Reasons to Transition Your IT Sandbox Environments to the Cloud Contents Executive
SharePoint 2013 Logical Architecture
SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
A Gentle Introduction to Cloud Computing
A Gentle Introduction to Cloud Computing Source: Wikipedia Platform Computing, Inc. Platform Clusters, Grids, Clouds, Whatever Computing The leader in managing large scale shared environments o 18 years
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
Cloud Computing Security Issues
Copyright Marchany 2010 Cloud Computing Security Issues Randy Marchany, VA Tech IT Security, [email protected] Something Old, Something New New: Cloud describes the use of a collection of services, applications,
Secure Multi Tenancy In the Cloud. Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected]
Secure Multi Tenancy In the Cloud Boris Strongin VP Engineering and Co-founder, Hytrust Inc. [email protected] At-a-Glance Trends Do MORE with LESS Increased Insider Threat Increasing IT spend on cloud
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Figure 1 Cloud Computing. 1.What is Cloud: Clouds are of specific commercial interest not just on the acquiring tendency to outsource IT
An Overview Of Future Impact Of Cloud Computing Shiva Chaudhry COMPUTER SCIENCE DEPARTMENT IFTM UNIVERSITY MORADABAD Abstraction: The concept of cloud computing has broadcast quickly by the information
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING. Carlos de Alfonso Andrés García Vicente Hernández
DESIGN OF A PLATFORM OF VIRTUAL SERVICE CONTAINERS FOR SERVICE ORIENTED CLOUD COMPUTING Carlos de Alfonso Andrés García Vicente Hernández 2 INDEX Introduction Our approach Platform design Storage Security
Tomáš Müller IT Architekt 21/04/2010 ČVUT FEL: SOA & Enterprise Service Bus. 2010 IBM Corporation
Tomáš Müller IT Architekt 21/04/2010 ČVUT FEL: SOA & Enterprise Service Bus Agenda BPM Follow-up SOA and ESB Introduction Key SOA Terms SOA Traps ESB Core functions Products and Standards Mediation Modules
JOURNAL OF OBJECT TECHNOLOGY
JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering JOT, 2008 Vol. 7, No. 8, November-December 2008 What s Your Information Agenda? Mahesh H. Dodani,
OPENIAM ACCESS MANAGER. Web Access Management made Easy
OPENIAM ACCESS MANAGER Web Access Management made Easy TABLE OF CONTENTS Introduction... 3 OpenIAM Access Manager Overview... 4 Access Gateway... 4 Authentication... 5 Authorization... 5 Role Based Access
SOA + BPM = Agile Integrated Tax Systems. Hemant Sharma CTO, State and Local Government
SOA + BPM = Agile Integrated Tax Systems Hemant Sharma CTO, State and Local Government Nothing Endures But Change 2 Defining Agility It is the ability of an organization to recognize change and respond
CA Service Desk Manager - Mobile Enabler 2.0
This Document is aimed at providing information about the (CA SDM) Mobile Enabler and mobile capabilities that is typically not available in the product documentation. This is a living document and will
Cloud Courses Description
Courses Description 101: Fundamental Computing and Architecture Computing Concepts and Models. Data center architecture. Fundamental Architecture. Virtualization Basics. platforms: IaaS, PaaS, SaaS. deployment
Open Source Sales Force Automation (SFA) in the Cloud SaaS
Open Source Sales Force Automation (SFA) in the Cloud SaaS Service Overview Our open source Sales Force Automation (SFA) in the cloud service allows customers to perform marketing automation through multi
AquaLogic Service Bus
AquaLogic Bus Wolfgang Weigend Principal Systems Engineer BEA Systems 1 What to consider when looking at ESB? Number of planned business access points Reuse across organization Reduced cost of ownership
THOUGHT LEADERSHIP. Journey to Cloud 9. Navigating a path to secure cloud computing. Alastair Broom Solutions Director, Integralis
Journey to Cloud 9 Navigating a path to secure cloud computing Alastair Broom Solutions Director, Integralis March 2012 Navigating a path to secure cloud computing 2 Living on Cloud 9 Cloud computing represents
A Look at the New Converged Data Center
Organizations around the world are choosing to move from traditional physical data centers to virtual infrastructure, affecting every layer in the data center stack. This change will not only yield a scalable
Vistara Lifecycle Management
Vistara Lifecycle Management Solution Brief Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid
Service Models. Chapter Three
Service Models Chapter Three Cloud Services Can align with deployment mode, ajapublic, private, and hybrid. Can also align with service model, in which each level of service abstraction is associated with
vcloud Air Platform Programmer's Guide
vcloud Air Platform Programmer's Guide vcloud Air OnDemand 5.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
Configuration Worksheets for Oracle WebCenter Ensemble 10.3
Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
SOA, case Google. Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901.
Faculty of technology management 07.12.2009 Information Technology Service Oriented Communications CT30A8901 SOA, case Google Written by: Sampo Syrjäläinen, 0337918 Jukka Hilvonen, 0337840 1 Contents 1.
Secure Bridge to the Cloud
Secure Bridge to the Cloud Jaushin Lee, Ph.D. September 2013 1 Table of Contents The promise for enterprise hybrid cloud computing... 3 Reality facing enterprise today... 3 Connecting the dots... 6 Secure
Virtualization - Adoption
Virtualization - Adoption Virtualization - Hypervisors Multiple Hypervisors within data center Virtualization Challenges 1. Application performance 2. Security 3. VM sprawl 4. Licensing costs 5. Stuck
Time to Value: Successful Cloud Software Implementation
Time to Value: Successful Cloud Software Implementation Cloud & Data Security 2015 Client Conference About the Presenter Scott Schimberg, CPA, CMA Partner, Consulting, Armanino Scott became a Certified
Amit Sheth & Ajith Ranabahu, 2010. Presented by Mohammad Hossein Danesh
Amit Sheth & Ajith Ranabahu, 2010 Presented by Mohammad Hossein Danesh 1 Agenda Introduction to Cloud Computing Research Motivation Semantic Modeling Can Help Use of DSLs Solution Conclusion 2 3 Motivation
Getting Started with Multitenancy SAP BI 4.1
September 9 11, 2013 Anaheim, California Getting Started with Multitenancy SAP BI 4.1 Christina Obry, SAP Learning Points Learn how to successfully implement the SAP BusinessObjects BI platform in a multitenant
Cloud computing - Architecting in the cloud
Cloud computing - Architecting in the cloud [email protected] 1 Outline Cloud computing What is? Levels of cloud computing: IaaS, PaaS, SaaS Moving to the cloud? Architecting in the cloud Best practices
SaaS the new normal. Service-now.com, Terry Brown
SaaS the new normal Service-now.com, Terry Brown Discussion Points Undeniable evolution What is SaaS? How can you benefit from SaaS Creating an ITSM solution at John Maneely Company Business drivers affecting
The Elephant in the Room: What s the Buzz Around Cloud Computing?
The Elephant in the Room: What s the Buzz Around Cloud Computing? Warren W. Stippich, Jr. Partner and National Governance, Risk and Compliance Solution Leader Business Advisory Services Grant Thornton
Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010
Oracle Platform Security Services & Authorization Policy Manager Vinay Shukla July 2010 The following is intended to outline our general product direction. It is intended for information purposes only,
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
Moving beyond Virtualization as you make your Cloud journey. David Angradi
Moving beyond Virtualization as you make your Cloud journey David Angradi Today, there is a six (6) week SLA for VM provisioning it s easy to provision a VM, the other elements change storage, network
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Kaseya White Paper Proactive Service Level Monitoring: A Must Have for Advanced MSPs
Kaseya White Paper Proactive Service Level Monitoring: A Must Have for Advanced MSPs Providers of IT services, such as systems integrators, are expanding rapidly into the managed services arena, and becoming
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Feature Guide Elastic Path Cortex. Version 6.5.1
Feature Guide Elastic Path Cortex Version 6.5.1 1.800.942.5282 (toll-free within North America) +1.604.408.8078 (outside North America) www.elasticpath.com API-centric commerce that s scalable, secure,
Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About?
Keeping up with the World of Cloud Computing: What Should Internal Audit be Thinking About? IIA San Francisco Chapter October 11, 2011 Agenda Introductions Cloud computing overview Risks and audit strategies
The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing
Your Platform of Choice The Cloud is Not Enough Why Hybrid Infrastructure is Shaping the Future of Cloud Computing Mark Cravotta EVP Sales and Service SingleHop LLC Talk About Confusing? Where do I start?
Remote Voting Conference
Remote Voting Conference Logical Architecture Connectivity Central IT Infra NIST Best reachability in India for R-Voting Initiative 200+ Physical MPLS POPs across India 5 Regional Data Centre at Pune,
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
Cloud Security considerations for business adoption. Ricci IEONG CSA-HK&M Chapter
Cloud Security considerations for business adoption Ricci IEONG CSA-HK&M Chapter What is Cloud Computing? Slide 2 What is Cloud Computing? My Cloud @ Internet Pogoplug What is Cloud Computing? Compute
Architecting the Cloud
Architecting the Cloud Sumanth Tarigopula Director, India Center, Best Shore Applications Services 2011Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Expert Reference Series of White Papers. Understanding NIST s Cloud Computing Reference Architecture: Part II
Expert Reference Series of White Papers Understanding NIST s Cloud Computing Reference Architecture: Part II [email protected] www.globalknowledge.net Understanding NIST s Cloud Computing Reference
WHITE PAPER. Understanding Transporter Concepts
WHITE PAPER Understanding Transporter Concepts Contents Introduction... 3 Definition of Terms... 4 Organization... 4 Administrator... 4 Organization User... 4 Guest User... 4 Folder Hierarchies... 5 Traditional
A.Prof. Dr. Markus Hagenbuchner [email protected]. CSCI319 A Brief Introduction to Cloud Computing. CSCI319 Page: 1
A.Prof. Dr. Markus Hagenbuchner [email protected] CSCI319 A Brief Introduction to Cloud Computing CSCI319 Page: 1 Content and Objectives 1. Introduce to cloud computing 2. Develop and understanding to
The deployment of OHMS TM. in private cloud
Healthcare activities from anywhere anytime The deployment of OHMS TM in private cloud 1.0 Overview:.OHMS TM is software as a service (SaaS) platform that enables the multiple users to login from anywhere
Cloud Computing for Architects
Cloud Computing for Architects This four day, hands-on boot camp begins with an examination of the Cloud Computing concept, the structure and key characteristics of Clouds, and takes a look under the hood
GE Healthcare. Centricity 360. Case Exchange service. Unleash the power of cloud to bring your distributed care teams together.
GE Healthcare Centricity 360 Case Exchange service Unleash the power of cloud to bring your distributed care teams together. Centricity 360 Case Exchange streamlines clinical collaboration with unaffiliated
Manage all your Office365 users and licenses
Manage all your Office365 users and licenses Delegate 365 White Paper Authors: Toni Pohl, Martina Grom Version: 1.2 of December 2014 atwork information technology gmbh. All rights reserved. For information
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Advanced Solutions of Microsoft SharePoint Server 2013 (20332) H6C76S
HP Education Services course data sheet Advanced Solutions of Microsoft SharePoint Server 2013 (20332) H6C76S Course Description In this class, you will learn how to design, configure, and manage a SharePoint
Roadmap from On-Premise to Cloud based Integration solutions from SAP
Roadmap from On-Premise to Cloud based Integration solutions from SAP Sindhu Gangadharan, Chief Product Owner SAP NetWeaver PI and SAP HANA Cloud Integration Agenda SAP NetWeaver Process Integration today
Blog: http://blogs.microsoft.co.il/blogs/applisec/
Blog: http://blogs.microsoft.co.il/blogs/applisec/ Copyright SELA software & Education Labs Ltd. 14-18 Baruch Hirsch St.Bnei Brak 51202 Israel www.sela.co.il The idea behind the cloud Basic Concepts Type
The Need for Service Catalog Design in Cloud Services Development
The Need for Service Catalog Design in Cloud Services Development The purpose of this document: Provide an overview of the cloud service catalog and show how the service catalog design is an fundamental
About the VM-Series Firewall
About the VM-Series Firewall Palo Alto Networks VM-Series Deployment Guide PAN-OS 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016
Is your mainframe less secure than your file server? Malcolm Trigg Solutions Consultant 24 th February 2016 The World s Changed What is my account balance? The World s Changed Internal Security Standards
owncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
Junos Space for Android: Manage Your Network on the Go
Junos Space for Android: Manage Your Network on the Go Combining the power of Junos Space and Android SDKs to build powerful and smart applications for network administrators Challenge It is important
Bridging the Gap between On-Premise BizTalk ESB and Windows Azure platform AppFabric
SERVICE BUS and ACCESS CONTROL Bridging the Gap between On-Premise BizTalk ESB and Windows Azure platform AppFabric Brian Loesgen Principal SOA Architect Microsoft Corporation San Diego.NET User Group,
