POSTGRESQL, A PLATFORM FOR MULTIPLE SOURCES DATA RETRIEVAL
|
|
|
- Abel Gallagher
- 10 years ago
- Views:
Transcription
1 POSTGRESQL, A PLATFORM FOR MULTIPLE SOURCES DATA RETRIEVAL Abdul Yadi CV Datatrans Infromatika, Indonesia ABSTRACT: A software application transforms raw data into information. Data may come from various sources in different protocols and geographical locations. For example, XML data from SOAP/XML web service, JSON data from REST API service, data from various database servers and data from Lightweight Directory Access Protocol server. In software development project, it incurs complexities in logical aspect as well as network configuration to provide communication link in three-tier architecture perspective between presentation and multiple data services. A platform is needed to implement an abstraction layer to avoid such complexities. PostgreSQL is an open source database management system. In addition to store data securely and serve data retrieval correctly, its functionality can be extended by integrating server side shared library written in multiple languages such as C, Tcl, Perl, Python, PLSQL. The database server has defined development framework to wrap the external library into SQL new data type or function. This feature is essential to develop a platform for multiple sources data retrieval. An approach to the solution and its implementation in industry is explained. Keywords: PostgreSQL Extension Code, Heterogeneous Data Sources, SOAP XML, Lightweight Directory Access Protocol, Implementation in Industry 1. INTRODUCTION An important role of a software application is its capability to transform raw data into information which typically takes three steps. The application collects raw data from various sources. It converts the raw data into clear and concise information. It presents the information to users in intuitive and observable objects (tables or charts, for example). The concept can be implemented in three-tier architecture which breaks down a system into three layers: 1) presentation tier, 2) logic tier and 3) data tier. Presentation tier provides user interface to input data and present report. Logic tier task is to collect raw data and transform them into meaningful information. Data tier is responsible to store and retrieve raw data. A complex software development project requires data retrieval from multiple sources with different protocol, data format and network segment address. Smart Card for Frequent Traveler project in Batam [1] requires the system to verify any traveler data passing Immigration checkpoint against 2 references: 1) smart card subscription overdue provided by local database server and 2) travel ban provided by Indonesian Immigration authority via SOAP/XML service. Fig.1 Three-Tier Architecture A manufacturing control system requires to compose data taken from three services: 1) product dimension measurement data stored in Microsoft SQL server, 2) work order data stored in PostgreSQL server and 3) text to 2D bar code image transformer. A company needs to integrate all application in a single sign on access control. It was decided that Faculty of Engineering, Universitas Negeri Padang 1
2 all application should verify user authentication against security data provided by Lightweight Directory Access Protocol server. In such cases, Logic Tier has a complex task to interact with different data sources. An approach to solve the complexities is to develop abstraction layer so the Logic Tier only needs to interact with single data point with simple data retrieval commands. This paper is organized as following. Section 2 describes the multiple data sources complexities in more detail. The proposed abstraction layer is presented in Section 3. Section 4 explains PostgreSQL capability as software development platform. Section 5 describes abstraction layer implementation in PostgreSQL database server. Section 6 discusses case studies where the concept has been implemented. Summary and future work is wrapped up in Section ABSTRACTION LAYER To overcome the complexity, an abstraction layer is needed to provide simple data collection point. Web-based and desktop-based Logic tiers only need to interact with the single abstraction layer with simple data retrieval command. As shown in Fig.3, abstraction layer hides data sources access complexity away from Logic Tier. It leads to simpler system implementation. 2. MULTIPLE DATA SOURCES COMPLEXITIES Interaction between a Logic Tier and multiple data sources is shown in Fig.2. Fig.3 Data Sources Abstraction Layer (Presentation Tier Is Hidden for Simplicity) Fig.2 Multiple Data Sources Complexity By considering that a software application has two versions web-based and desktop-based application there are two sets of Presentation and Logic tier consuming the same data sources. Data flow for web-based and desktop-based version is drawn in blue and red lines, respectively. The complexity is raised by two factors. Logic tier needs different client library to interact with different data sources. The client libraries are potentially platform dependent. Network connection should be configured so that each Logic tier can communicate with data sources which potentially located at different network segment addresses. Logic tier can collect data from multiple data sources with simple command provided by abstraction layer. Different client libraries to access different data sources only need to be installed in single platform implementing the abstraction layer. Network with multiple segment addresses only need to be configured at the single platform. Over many options to implement the concept, I promote PostgreSQL database server as a platform to embody the abstraction layer. 4. POSTGRESQL AS A PLATFORM PostgreSQL [2] is an open source database management system. One of my customers is a company using the database management system for its accounting system, manufacturing tracking system and human resources management system. PostgreSQL has been database management system for international companies. Skype part of Microsoft company providing text, voice and video call uses PostgreSQL as their back end database. Faculty of Engineering, Universitas Negeri Padang 2
3 Openbravo is a company providing business management solution for midsize to large organizations. It supports PostgreSQL as well as Oracle, Apache Derby, MySQL and HSQLDB. An advantage of PostgreSQL is its extensibility to have custom data type, indexing type, aggregate function and user defined function in different programming languages: C, Perl, Python, TCL and PLSQL. Since majority of software libraries are written in C, they can be integrated to extend PostgreSQL functionality. Through clearly defined framework, those extended functions can be invoked via regular SQL command. With those capabilities, PostgreSQL can be utilized as software development platform. 5. POSTGRESQL AS ABSTRACTION LAYER The ability to integrate software libraries is the main idea to develop abstraction layer on top of PostgreSQL database server. gsoap [7] to interact with SOAP/XML web service. OpenLDAP [8] to interact with OpenLDAP server. 6. CASE STUDY 6.1. SOAP/XML WEB SERVICE In 2012 and 2013, I have developed Smart Card for Frequent Traveller application. The service offers usage of smart card for travellers passing through Riau Islands Immigration checkpoint to exit from or enter Indonesia territory. He or she then does not need to queue for showing passport pages to immigration officer at check point. Instead, he or she passes through unattended automatic gate with smart card verification. Each traveller with the smart card passing through immigration check point is subject to automatic verification steps. Subscription overdue: the application verifies smart card subscription overdue based on membership record at local PostgreSQL database server. Travel ban and travel recording: traveler's personal data is sent to immigration authority web service for travel ban verification and travel recording. Local travel recording: the application stores the travel record in local PostgreSQL database server. Ordinarily, the system is implemented as shown in Fig.5. Client computers directly interact with local database servers and SOAP/XML servers. Those servers are located at different network segment addresses. Client library and network address should be configured on each client computer. Fig.4 PostgreSQL As Abstraction Layer By assuming that PostgreSQL abstraction layer is deployed on Linux based platform, the client libraries integrated into the database server is as follows. A PostgreSQL additional supplied module, namely dblink. It is a shared library which supports connections to other PostgreSQL databases from within a PostgreSQL database session. DBI Link [3] and unixodbc [4] to interact with MS SQL database server. PostgreSQL version 9.1 or later provides Foreign Data Wrapper for the same functionality with easier administration. iec16022 [5] for text to 2D bar code transformation and ImageMagick [6] for image scaling. Fig.5 Client Directly Interact with Database and SOAP/XML Server Faculty of Engineering, Universitas Negeri Padang 3
4 The interaction is simplified by introducing PostgreSQL as abstraction layer as shown in Fig.6. Client libraries are installed once as PostgreSQL extension. Network configuration is simpler because client computers only need to interact with local database server. Fig.6 Simple Client to Servers Interaction with PostgreSQL Abstraction Layer Abstraction layer implementation for the steps is shown in Fig.7. Fig.7 Abstraction Layer for SOAP/XML Web Service As stated before, PostgreSQL supports user defined function in C programming language. The function should be packaged in dynamically linked library module (.DLL in Windows and.so in Linux). The critical development task is to integrate gsoap statically linked library into the module. Please find more detail example in my work [9]. SOAP/XML web service receives data from and sends response to client in XML format. Following is XML structure for travel ban verification data exchange. Some portions are removed for simplicity and confidentiality. XML data sent to SOAP/XML web service: POST /services/checkalert HTTP/1.1 Host:...:1800 User-Agent: gsoap/2.8 Content-Type: text/xml; charset=utf-8 Content-Length: 2140 Connection: close SOAPAction: " <?xml version="1.0" encoding="utf-8"?> <SOAP-ENV:Envelope xmlns...> <SOAP-ENV:Header> <wsse:security...> <wsse:usernametoken wsu:id="user"> <wsse:username>...</wsse:username> <wsse:password >...</wsse:password> <wsse:nonce>...</wsse:nonce> <wsu:created>...</wsu:created> </wsse:usernametoken> </wsse:security> </SOAP-ENV:Header> <SOAP-ENV:Body> <ns1:searchalerts> <ns1:request> <ns2:id>... <ns2:applicationname>... <ns2:locationname>... <ns2:requestsent>... <ns2:documentalertsearchcriteria> <ns2:documentnumber>... <ns2:documenttype>... <ns2:issuingstatecode>... </ns2:documentalertsearchcriteria> <ns2:numberresults>... <ns2:personalertsearchcriteria> <ns2:dateofbirth>... <ns2:direction>... <ns2:familyname>... <ns2:gender>... <ns2:givennames>... </ns2:personalertsearchcriteria> <ns2:scorethreshold>... <ns2:searchtype>... </ns1:searchalerts> </SOAP-ENV:Body> </SOAP-ENV:Envelope> XML data received from SOAP/XML web service: HTTP/ OK Date: Sat, 26 Sep :30:58 WIT Server: Mule Core/2.2.3-SNAPSHOT Expires: Sat, 26 Sep :30:58 WIT MULE_REPLYTO_STOP: true Content-Type: text/xml http.method: POST Transfer-Encoding: chunked Connection: close <soap:envelope xmlns...> <soap:body> <SearchAlertsResponse xmlns...> <SearchAlertsResult xmlns...> <a:id>... <a:requestdate>... <a:responsesent>... <a:servicerequestid>... <a:servicetoken>... <a:resultlist> <a:alertsearchresult> <a:id>... <a:alerttypecode>... <a:documentinfo>... <a:personinfo>... <a:score>... </a:alertsearchresult> </a:resultlist> </SearchAlertsResult> </SearchAlertsResponse> </soap:body> </soap:envelope> The abstraction layer hides complexity of XML data construction and parsing as well as HTTP Faculty of Engineering, Universitas Negeri Padang 4
5 transport protocol when dealing with SOAP/XML web service. Logic tier retrieves data using regular SQL command (function name and arguments and fields data are altered due to confidentiality). SELECT alertreason, givenanmes FROM system.travelban_verify(, ); alertreason givennames PIUTANG NEGARA YYY RRRRR JJJJJJJ DAFTAR PENCARIAN ORANG BBBBBB YQYQYQ DAFTAR PENCARIAN ORANG RRRRR DAFTAR PENCARIAN ORANG RORORO JUJUJ SASAS 6.2. MS SQL DATABASE SERVER AND TEXT TO 2D BAR CODE TRANSFORMER In a manufacturing control project in 2014, I have developed abstraction layer to integrate data retrieved from PostgreSQL, MS SQL database server and 2D bar code transformer. The product identity is stored in PostgreSQL record. Its physical dimension is measured using an automatic measurement tool. Data is stored in MS SQL database server. Its part number is transformed to 2D bar code. A simple SQL command is needed to join product's part number, physical measurement data and 2D bar code. The configuration is shown in Fig.8. Fig.8 Manufacturing Product Data Integration Interaction with MS SQL Database Server PostgreSQL functionality can be extended to interact with other database server. DBI Link is an extension library written in PERL programming language to perform SQL access to external database server from PostgreSQL. Supported external data sources are Oracle, MS-SQL, MySQL and PostgreSQL itself. (PostgreSQL version 9.1 and above provides Foreign Data Wrapper as a feature for the same purpose with broader external data sources and easier administration [10]). Once configured properly, DBI Link creates local views as proxies to external data sources tables. SQL SELECT/INSERT/UPDATE/DELETE action to the view will be intercepted by TRIGGER/RULE mechanism and routed to external data sources. So, external data coming from remote MS SQL Server can be retrieved by issuing SQL command in local database connection. SELECT partnumber, outerdiameter FROM remote.measurement WHERE partnumber='123456' ORDER BY meastime DESC LIMIT 1; partnumber outerdiameter Note that remote.measurement is a view created by DBI Link as a proxy to a table with the same name at remote MS SQL Server. The table stores outer diameter for each product identified by partnumber D Bar Code Generator By project specification, it is required to generate 2D bar code as defined in ISO/IEC 16022:2006. The generation takes two phases: 1) bar code generation and 2) image scaling. The first library to be integrated into PostgreSQL is iec It is a software library in C programming language originally written by Andrews & Arnold Ltd. provides capability to transform text to 2D bar code image also known as datamatrix in PNG (Portable Network Graphics) format. The second library is ImageMagick. It is a software suite to create, edit, compose, or convert bitmap images. It provides application programming interface in various languages, for example Ada, Java, Lisp, Perl, C++ and C. MagickCore is one of its interface in C Language chosen for integration with PostgreSQL. In this project, it is needed for PNG to BMP (Bitmap Image File) format conversion and image scaling. The two libraries are linked dynamically to build an SQL function taking two arguments: 1) text for conversion, 2) height of image and producing an image in byte array type. To generate 2D bar code, a Logic tier simply invokes an SQL command: SELECT image.barcode('123456', 50); bytea (image) Faculty of Engineering, Universitas Negeri Padang 5
6 Data Integration Query Having the two modules ready for remote MS SQL query and bar code generation, it is easy to compose SQL command to integrate them with product part number already stored in native PostgreSQL table (factory.product). SELECT t1.partnumber AS pn, t2.outerdiameter AS od, image.barcode(t1.partnumber, 50) AS datamatrix FROM factory.product t1 LEFT JOIN remote.measurement t2 ON t1.partnumber=t2.partnumber WHERE t1.productdate=current_date ORDER BY t1.timestamplog LIMIT 3; pn od datamatrix (image) (image) (image) It is more efficient for Logic tier to call the SQL command than retrieve the three data sources separately OPEN LIGHTWEIGHT DIRECTORY ACCESS PROTOCOL (OPENLDAP) SERVER In 2015, I have developed abstraction layer in a project called Single Sign On. A company already has 4 systems: 1) Mail Server, 2) Manufacturing Control System, 3) Online Purchasing System and 4) Human Resource Management System. Each of them has different user authentication method. Mail server uses OpenLDAP while the others use PostgreSQL authentication system. To raise security level, it was decided to integrate the systems into single user authentication method with strict password maintenance rule. A user password should use combination of number, lowercase and uppercase letter. The password length must be at least 8 characters long. A user must update his or her password after maximum of 90 days. A user may not reuse password in 7 consecutive histories. OpenLDAP of Mail Server is chosen as a reference for user authentication of all other systems. So other application with PostgreSQL database server should interact with the reference for login and access privilege verification. OpenLDAP is an open source implementation of Lightweight Directory Access Protocol (LDAP). LDAP represents data in hierarchy of objects, each of which is called an entry. The resulting tree structure is called a Directory Information Tree. The top of the tree is commonly called the root, base or suffix [11]. The LDAP Directory Information Tree of the company is as shown in Fig.9. Fig.9 LDAP Directory Information Tree In this case, an abstraction layer is required for following actions: Connect to OpenLDAP server and do user authentication. Enforce strict password maintenance rule. Record new password into history. By default, PostgreSQL provides option to validate user name/password using OpenLDAP server. But, it raised two difficulties: Each user should be both registered in OpenLDAP and PostgreSQL. It is not practical to keep both entries synchronously since mail administrator may register or update user entry without informing database administrator. PostgreSQL does not provide built in implementation for strict password maintenance rule as formerly discussed. OpenLDAP provides libldap Application Programming Interface in C language. It is a client library used to provide programmatic access to LDAP protocol. It can be integrated into a custom PostgreSQL shared library to solve the problem. Fig.10 OpenLDAP Abstraction Layer By wrapping OpenLDAP logic in SQL function, the customized library hides complexity of dealing with OpenLDAP server and strict password maintenance rule. Logic tier simply invokes them in SQL SELECT statement. Example of the SQL command usage is as follows. Faculty of Engineering, Universitas Negeri Padang 6
7 Login Name and Password Verification User login name and password can be verified using SQL select statement as follows. FROM ldap.user_auth('test','a b'); errno errdesc 0 User with login name test (just for example) and password a b has been successfully verified. Error message is raised whenever wrong login name or password is supplied. FROM ldap.user_auth('test','b a'); errno errdesc 49 bind: Invalid credentials Strict Password Maintenance Rule Any password update should obey strict password maintenance rule. FROM ldap.chg_pass('test','abcdefgh'); ERROR: password must contain uppercase letter FROM ldap.chg_pass('test','abcdefgh'); ERROR: password must contain uppercase letter FROM ldap.chg_pass('test','a12bcd'); ERROR: minimum 8 length User Attribute Query Attribute value of a user entry can be queried as follows. SELECT t_value FROM ldap.attr_get('test', 'objectclass'); t_value organizationalperson zimbraaccount amavisaccount inetorgperson 7. SUMMARY AND FUTURE WORK I proposed PostgreSQL as development platform for building abstraction layer required to hide complexities dealing with multiple data sources. My proposal utilizes extensibility of PostgreSQL user defined functions. All external data sources are retrieved using SQL compatible function so that they can be joined in SQL SELECT statement. This leads to efficient programming code for Logic Tier in Three-tier Architecture perspective. My work on software development projects demonstrates that the concept is successfully implemented. My future work is to adopt Foreign Data Wrapper framework as it has been emerging since PostgreSQL version 9.1 onwards. The aim is to comply with SQL/MED (Management of External Data), a standardized way of handling access to remote objects in SQL databases. 8. ACKNOWLEDGMENTS I thank Heri Samuel Kurniawan for providing open source development project infrastructure. I would like to show gratitude to Qwantes Simatupang and Agus Widodo for their support on system implementation. 9. REFERENCES [1] AICTA 2013 Winners, [2] PostgreSQL, [3] DBI Link, [4] The unixodbc Project home page, Accessed: [5] DataMatrix 2D barcode generator, [6] ImageMagick, [7] The gsoap Toolkit for SOAP and REST Web Services and XML-Based Applications, [8] OpenLDAP, [9] Consume SOAP Web Service From PostgreSQL User Defined Function in C, sume-soap-web-service-from-postgresql-userdefined-function-in-c. [10] Foreign Data Wrappers, appers. [11] LDAP Concepts & Overview, Faculty of Engineering, Universitas Negeri Padang 7
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
Microsoft Active Directory Oracle Enterprise Gateway Integration Guide
An Oracle White Paper May 2011 Microsoft Active Directory Oracle Enterprise Gateway Integration Guide 1/33 Disclaimer The following is intended to outline our general product direction. It is intended
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
ORACLE DATABASE SECURITY. Keywords: data security, password administration, Oracle HTTP Server, OracleAS, access control.
ORACLE DATABASE SECURITY Cristina-Maria Titrade 1 Abstract This paper presents some security issues, namely security database system level, data level security, user-level security, user management, resource
Active Directory Management. Agent Deployment Guide
Active Directory Management Agent Deployment Guide Document Revision Date: June 12, 2014 Active Directory Management Deployment Guide i Contents System Requirements...1 Hardware Requirements...1 Installation...3
DEPLOYMENT ROADMAP March 2015
DEPLOYMENT ROADMAP March 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may
Jitterbit Technical Overview : Microsoft Dynamics CRM
Jitterbit allows you to easily integrate Microsoft Dynamics CRM with any cloud, mobile or on premise application. Jitterbit s intuitive Studio delivers the easiest way of designing and running modern integrations
LSC @ LDAPCON. 2011. Sébastien Bahloul
LSC @ LDAPCON. 2011 Sébastien Bahloul About me Developer and software architect 10 years experience in IAM Recently hired as product manager by a French security editor, Dictao, providing : personal and
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
File Transfer Service (Batch SOAP) User Guide. A Guide to Submitting batches through emedny FTS
File Transfer Service (Batch SOAP) User Guide A Guide to Submitting batches through emedny FTS June 1, 2013 TABLE OF CONTENTS TABLE OF CONTENTS 1 Introduction... 4 2 Requirements... 5 2.1 Exchange mailboxes...
IBM Cloud Manager with OpenStack
IBM Cloud Manager with OpenStack Download Trial Guide Cloud Solutions Team: Cloud Solutions Beta [email protected] Page 1 Table of Contents Chapter 1: Introduction...3 Development cycle release scope...3
redcoal EmailSMS for MS Outlook and Lotus Notes
redcoal EmailSMS for MS Outlook and Lotus Notes Technical Support: [email protected] Or visit http://www.redcoal.com/ All Documents prepared or furnished by redcoal Pty Ltd remains the property of redcoal
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Sisense. Product Highlights. www.sisense.com
Sisense Product Highlights Introduction Sisense is a business intelligence solution that simplifies analytics for complex data by offering an end-to-end platform that lets users easily prepare and analyze
Open-Xchange Hosted Edition Directory Integration
OPEN-XCHANGE Whitepaper Open-Xchange Hosted Edition Directory Integration Concept to integrate Open-Xchange Hosted Edition into Company Directory Services v1.00 Author: Editors: Layout: Manuel Kraft Manuel
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
CA SOA Security Manager
CA SOA Security Manager Implementation Guide r12.1 Second Edition This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
Technical. Overview. ~ a ~ irods version 4.x
Technical Overview ~ a ~ irods version 4.x The integrated Ru e-oriented DATA System irods is open-source, data management software that lets users: access, manage, and share data across any type or number
Password Management Guide
www.novell.com/documentation Management Guide Identity Manager 4.0.2 June 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
GenericServ, a Generic Server for Web Application Development
EurAsia-ICT 2002, Shiraz-Iran, 29-31 Oct. GenericServ, a Generic Server for Web Application Development Samar TAWBI PHD student [email protected] Bilal CHEBARO Assistant professor [email protected] Abstract
About This Document 3. Integration and Automation Capabilities 4. Command-Line Interface (CLI) 8. API RPC Protocol 9.
Parallels Panel Contents About This Document 3 Integration and Automation Capabilities 4 Command-Line Interface (CLI) 8 API RPC Protocol 9 Event Handlers 11 Panel Notifications 13 APS Packages 14 C H A
MD Link Integration. 2013 2015 MDI Solutions Limited
MD Link Integration 2013 2015 MDI Solutions Limited Table of Contents THE MD LINK INTEGRATION STRATEGY...3 JAVA TECHNOLOGY FOR PORTABILITY, COMPATIBILITY AND SECURITY...3 LEVERAGE XML TECHNOLOGY FOR INDUSTRY
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
Best Practices: Extending Enterprise Applications to Mobile Devices
Best Practices: Extending Enterprise Applications to Mobile Devices by Kulathumani Hariharan Summary: Extending enterprise applications to mobile devices is increasingly becoming a priority for organizations
Usage of Evaluate Client Certificate with SSL support in Mediator and CentraSite
Usage of Evaluate Client Certificate with SSL support in Mediator and CentraSite Introduction Pre-requisite Configuration Configure keystore and truststore Asset Creation and Deployment Troubleshooting
Database Management System Choices. Introduction To Database Systems CSE 373 Spring 2013
Database Management System Choices Introduction To Database Systems CSE 373 Spring 2013 Outline Introduction PostgreSQL MySQL Microsoft SQL Server Choosing A DBMS NoSQL Introduction There a lot of options
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
Fundamentals of Web Programming a
Fundamentals of Web Programming a Universal Description, Discovery, and Integration Teodor Rus [email protected] The University of Iowa, Department of Computer Science a Copyright 2009 Teodor Rus. These
AXL Troubleshooting. Overview. Architecture
AXL Troubleshooting This chapter contains the following topics: Overview, page 35 Architecture, page 35 Postinstallation Checklist, page 36 Troubleshooting Tools, page 39 Error Codes, page 43 Overview
HP OO 10.X - SiteScope Monitoring Templates
HP OO Community Guides HP OO 10.X - SiteScope Monitoring Templates As with any application continuous automated monitoring is key. Monitoring is important in order to quickly identify potential issues,
The Security Framework 4.1 Programming and Design
Tel: (301) 587-3000 Fax: (301) 587-7877 E-mail: [email protected] Web: www.setecs.com Security Architecture for Development and Run Time Support of Secure Network Applications Sead Muftic, President/CEO
XML Processing and Web Services. Chapter 17
XML Processing and Web Services Chapter 17 Textbook to be published by Pearson Ed 2015 in early Pearson 2014 Fundamentals of http://www.funwebdev.com Web Development Objectives 1 XML Overview 2 XML Processing
Penetration Testing Corporate Collaboration Portals. Giorgio Fedon, Co-Founder at Minded Security
Penetration Testing Corporate Collaboration Portals Giorgio Fedon, Co-Founder at Minded Security Something About Me Security Researcher Owasp Italy Member Web Application Security and Malware Research
User Identification (User-ID) Tips and Best Practices
User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using
User Management Resource Administrator. Managing LDAP directory services with UMRA
User Management Resource Administrator Managing LDAP directory services with UMRA Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted
Getting started with API testing
Technical white paper Getting started with API testing Test all layers of your composite applications, not just the GUI Table of contents Executive summary... 3 Introduction... 3 Who should read this document?...
HP Device Manager 4.7
Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...
Software Architecture Document
Software Architecture Document Project Management Cell 1.0 1 of 16 Abstract: This is a software architecture document for Project Management(PM ) cell. It identifies and explains important architectural
Sophos Mobile Control Technical guide
Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
Middleware- Driven Mobile Applications
Middleware- Driven Mobile Applications A motwin White Paper When Launching New Mobile Services, Middleware Offers the Fastest, Most Flexible Development Path for Sophisticated Apps 1 Executive Summary
CA Identity Manager. Glossary. r12.5 SP8
CA Identity Manager Glossary r12.5 SP8 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational
CA SiteMinder. Implementation Guide. r12.0 SP2
CA SiteMinder Implementation Guide r12.0 SP2 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only
Architecture and Mode of Operation
Software- und Organisations-Service Open Source Scheduler Architecture and Mode of Operation Software- und Organisations-Service GmbH www.sos-berlin.com Scheduler worldwide Open Source Users and Commercial
Installation Guide NetIQ AppManager
Installation Guide NetIQ AppManager April 2016 www.netiq.com/documentation Legal Notice NetIQ AppManager is covered by United States Patent No(s): 05829001, 05986653, 05999178, 06078324, 06397359, 06408335.
Division of IT Security Best Practices for Database Management Systems
Division of IT Security Best Practices for Database Management Systems 1. Protect Sensitive Data 1.1. Label objects containing or having dedicated access to sensitive data. 1.1.1. All new SCHEMA/DATABASES
multiple placeholders bound to one definition, 158 page approval not match author/editor rights, 157 problems with, 156 troubleshooting, 156 158
Index A Active Directory Active Directory nested groups, 96 creating user accounts, 67 custom authentication, 66 group members cannot log on, 153 mapping certificates, 65 mapping user to Active Directory
Writing Scripts with PHP s PEAR DB Module
Writing Scripts with PHP s PEAR DB Module Paul DuBois [email protected] Document revision: 1.02 Last update: 2005-12-30 As a web programming language, one of PHP s strengths traditionally has been to make
Client/server is a network architecture that divides functions into client and server
Page 1 A. Title Client/Server Technology B. Introduction Client/server is a network architecture that divides functions into client and server subsystems, with standard communication methods to facilitate
Apache Syncope OpenSource IdM
Apache Syncope OpenSource IdM Managing Identities in Enterprise Environments Version 1.3 / 2012-07-26 Apache Syncope OpenSource IdM by http://syncope.tirasa.net/ is licensed under a Creative Commons Attribution
Contents. 2 Alfresco API Version 1.0
The Alfresco API Contents The Alfresco API... 3 How does an application do work on behalf of a user?... 4 Registering your application... 4 Authorization... 4 Refreshing an access token...7 Alfresco CMIS
Copyright 2014 http://itfreetraining.com
This video will look the different versions of Active Directory Federation Services. This includes which features are available in each one and which operating system you need in order to use these features.
Controlling Web Access with BMC Web Access Manager WHITE PAPER
Controlling Web Access with BMC Web Access Manager WHITE PAPER Table of Contents Executive Summary...2 The BMC Identity and Access Management Approach...3 BMC Enforcement Agent Deployment Flexibility...3
End User Guide The guide for email/ftp account owner
End User Guide The guide for email/ftp account owner ServerDirector Version 3.7 Table Of Contents Introduction...1 Logging In...1 Logging Out...3 Installing SSL License...3 System Requirements...4 Navigating...4
Jet Data Manager 2012 User Guide
Jet Data Manager 2012 User Guide Welcome This documentation provides descriptions of the concepts and features of the Jet Data Manager and how to use with them. With the Jet Data Manager you can transform
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
CRM On Demand. Oracle CRM On Demand CTI Developer s Guide
CRM On Demand Oracle CRM On Demand CTI Developer s Guide Release 19 September 2011 Copyright 2005, 2011 Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided
SQL Injection Protection by Variable Normalization of SQL Statement
Page 1 of 9 SQL Injection Protection by Variable Normalization of SQL Statement by: Sam M.S. NG, 0 http://www.securitydocs.com/library/3388 "Make everything as simple as possible, but not simpler." --
Analyses on functional capabilities of BizTalk Server, Oracle BPEL Process Manger and WebSphere Process Server for applications in Grid middleware
Analyses on functional capabilities of BizTalk Server, Oracle BPEL Process Manger and WebSphere Process Server for applications in Grid middleware R. Goranova University of Sofia St. Kliment Ohridski,
Configuring and Using the TMM with LDAP / Active Directory
Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring
Hybrid for SharePoint Server 2013. Search Reference Architecture
Hybrid for SharePoint Server 2013 Search Reference Architecture 2014 Microsoft Corporation. All rights reserved. This document is provided as-is. Information and views expressed in this document, including
Apigee Gateway Specifications
Apigee Gateway Specifications Logging and Auditing Data Selection Request/response messages HTTP headers Simple Object Access Protocol (SOAP) headers Custom fragment selection via XPath Data Handling Encryption
Optus EmailSMS for MS Outlook and Lotus Notes
Optus EmailSMS for MS Outlook and Lotus Notes Service Description, August 2005. OVERVIEW This document provides an overview of the Optus EmailSMS service delivered jointly by Optus and redcoal. It highlights
2.3 - Installing the moveon management module - SQL version
2.3 - Installing the moveon management module - SQL version The moveon management module consists of two elements: the moveon client and the moveon database. The moveon client contains all the program
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
Research and Implementation of Single Sign-On Mechanism for ASP Pattern *
Research and Implementation of Single Sign-On Mechanism for ASP Pattern * Bo Li, Sheng Ge, Tian-yu Wo, and Dian-fu Ma Computer Institute, BeiHang University, PO Box 9-32 Beijing 100083 Abstract Software
CERN Single Sign On. http://cern.ch/login. Emmanuel Ormancey CERN IT/IS. CERN IT Department CH-1211 Genève 23 Switzerland www.cern.
CERN Single Sign On http://cern.ch/login Emmanuel Ormancey CERN IT/IS Agenda History CERN Authentication Main goals Authentication methods Demo overview Technical background Identity provider Service providers
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
Installation & Configuration Guide
Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
Avatier Identity Management Suite
Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:
Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7. Product Application Guide October 8, 2012
Monitoring Windows Servers and Applications with GroundWork Monitor Enterprise 6.7 Product Application Guide October 8, 2012 Table of Contents Introduction...3 Definitions and Abbreviations...3 GroundWork
Integrating CRM On Demand with the E-Business Suite to Supercharge your Sales Team
Integrating CRM On Demand with the E-Business Suite to Supercharge your Sales Team Presented by: Tom Connolly, Jason Lieberman Company: BizTech Session ID: #10351 Overview Introductions Background Web
Dynamic Decision-Making Web Services Using SAS Stored Processes and SAS Business Rules Manager
Paper SAS1787-2015 Dynamic Decision-Making Web Services Using SAS Stored Processes and SAS Business Rules Manager Chris Upton and Lori Small, SAS Institute Inc. ABSTRACT With the latest release of SAS
Introduction to Testing Webservices
Introduction to Testing Webservices Author: Vinod R Patil Abstract Internet revolutionized the way information/data is made available to general public or business partners. Web services complement this
Business Application Services Testing
Business Application Services Testing Curriculum Structure Course name Duration(days) Express 2 Testing Concept and methodologies 3 Introduction to Performance Testing 3 Web Testing 2 QTP 5 SQL 5 Load
Cisco TelePresence Manager
Cisco TelePresence Manager 1.3 Simplifying the Experience: Meeting Scheduling and Management Cisco TelePresence Manager is an integral part of the Cisco TelePresence experience that creates the feeling
owncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Novell Identity Manager
Password Management Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 3.6.1 June 05, 2009 www.novell.com Identity Manager 3.6.1 Password Management Guide Legal Notices Novell, Inc. makes no representations
Cloud Services ADM. Agent Deployment Guide
Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
NetIQ Identity Manager Setup Guide
NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems
Integration of Hotel Property Management Systems (HPMS) with Global Internet Reservation Systems If company want to be competitive on global market nowadays, it have to be persistent on Internet. If we
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
The syslog-ng Premium Edition 5F2
The syslog-ng Premium Edition 5F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,
Open Source Identity Management
Open Source Management OpenAlt 2015 Radovan Semančík November 2015 Ing. Radovan Semančík, PhD. Software architect Co-owner of Evolveum (open source company) Architect of midpoint project Apache committer
CERTIFIED MULESOFT DEVELOPER EXAM. Preparation Guide
CERTIFIED MULESOFT DEVELOPER EXAM Preparation Guide v. November, 2014 2 TABLE OF CONTENTS Table of Contents... 3 Preparation Guide Overview... 5 Guide Purpose... 5 General Preparation Recommendations...
NetIQ Identity Manager
NetIQ Identity Manager Management Guide October 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A
