How To Create A Single Sign On For Blackboard

Size: px
Start display at page:

Download "How To Create A Single Sign On For Blackboard"

Transcription

1 1 Overview Single Sign-On Authentication Appendix Blackboard s authentication technology has been identified as a dynamic, adaptable factor to supporting elearning Systems Integration strategy and implementation. Leveraging the feedback of our clients and recognizing market trends, Blackboard has developed customizable interfaces which allow the navigation across the Academic Suite and with other local systems in a secure, seamless environment while increasing ease-of-use by removing the need to re-authenticate at each junction. Blackboard Consulting has developed a proven approach to this by facilitating business requirements, identifying system and user stakeholders, and with a thorough understanding of the leading authentication technology are able to bring this solution to our clients. A key factor in this strategy is the adaptability of the Blackboard Academic Suite, or its components, with the existing technology at our clients, and with as many of our clients systems as possible. While the Blackboard Academic Suite provides for seamless transition between products upon installation, additional Single Sign-On developments have included integration with the following products: uportal SCT Luminus Microsoft Outlook Web Client Citrix Custom-developed local portals and school websites and many more! 1.1 Objectives Simplify current practices and position your institution for future growth and scalability. More specifically, Single Sign-On Authentication is expected to provide the following: Secure method of navigating to external systems using proven technologies. Identify opportunities for institutions to create a personalized single point-of-access regardless of user privileges Minimize potential points of authentication failure by reducing how many times a user has to reenter his/her credentials Transition your institution from a web-enabled center of learning into an innovative learning community transparent across departments, systems, and initiatives Centralize the networked security management into one office using one authoritative system such as LDAP, Kerberos, Shibboleth, etc Page 1 of 9

2 1.2 Authentication Development Approach Through years of experience, Blackboard Consulting has adopted and further enhanced industry-wide software development practices that are utilized for engagements such as this. The methodology is focused on the delivery of a clear scope of work, within a reasonable timeframe, and compliance with universally accepted coding standards. Throughout this development lifecycle, Blackboard Consulting maintains the high quality of project responsibility and client involvement. The approach can be distinguished by five distinct phases outlined below: Requirements Definition Solution Design Development and Testing Certification Deployment Maintenance 1.3 Benefits Blackboard expects its approach to provide several critical benefits. From administrative activities to improving the end-user experience, Single Sign-On Authentication creates opportunities for process improvement, enhanced and centralized network security, and mitigates risk of multiple resource management needs. Examples of our technological benefits include: Increased acceptance through seamless integration and navigation between systems. Blackboard s inherent ease of use then encourages usage promotion by the stakeholders. Minimize manual processes required to support Blackboard system. This reduces the likelihood of security breaches and increases confidence among current and future users. Develop an interest in product and process evolution. Create a paradigm of what if thinking, including: o What if we were able to channel all users through a single gateway into our community? o o What if we are able to reduce system maintenance costs by half because we only need to manage one LDAP? What if we are able to develop new, exciting initiatives that will have higher visibility because we can broadcast its purpose via a single Portal site accessible from a Learning website? 1.4 Qualifications Blackboard Consulting is 120 people strong across the world. In fact, Blackboard Consulting has the ability to truly work around the clock to support your elearning rollout if time is of an essence. As Blackboard Consulting has been implementing and integrating clients around the world since Several key trends have emerged: 1) Blackboard customers that utilized Single Sign-On saw a direct response in instructor and student satisfaction based on enterprise-level usage Page 2 of 9

3 2) Countless initiatives have emerged as a result based upon ease-of-use that focus on enhancing the student and instructor experience due to the ability to centralize the learning and community of the institution into one 3) The Blackboard Academic Suite customers enjoy this service upon installation however the majority has chosen to implement additional Single Sign-On services to streamline their enterprise-level systems on-site into one holistic gateway for all users utilizing our technology and expertise Page 3 of 9

4 2 Conceptual Single Sign-On Work Flow The figure above highlights the Blackboard Consulting solution developed to facilitate a seamless and secure integration with a client s enterprise technical framework Page 4 of 9

5 The implementation plan below describes the activities that the Blackboard Consulting Team and Client project team will participate in to complete the proposed solution. Activities performed have a specific outcome that align with the project for production purposes while also providing knowledge transfer for a level client self sufficiency. 3 Implementation Plan The following activities describe the services engagement in which your organization and the assigned Blackboard team will participate. 3.1 Project Preparation and Initiation Blackboard Consulting team members assigned to your organization s engagement. o Familiarization with your technical and process-based requirements, including the final Statement of Work and knowledge transfer from the Blackboard Sales team o Setup of client centralized communication plan for tracking project activities, progress, issues, and risk o Preparation of materials for the project kick off conference call Conference call kick off with the client team conducted by Blackboard Consulting o Introduction of Blackboard and your team members o Review scope of the engagement as defined in the Statement of Work o Review the project plan at a high level o Describe the various client participants required for each stage of the project engagement, including technical stakeholders and end-users o Determine the project schedule, including scheduling of the onsite sessions After the kick off call, the Blackboard Consulting team prepares and delivers to the client a detailed agenda and supporting documentation for the project s onsite activities. 3.2 Project Management Throughout the engagement, the Blackboard Project Manager will provide expert management of all Blackboard performed activities. He/she will: - Act as the primary point of contact between the client project manager and the Blackboard team for all project-related topics - Define, document and update comprehensive project plans and project schedules - Track and report on progress against the project schedule - Coordinate activities such as testing, deployment, follow-up, and documentation with the client-side project manager - Coordinate team meetings and provide regular updates via conference calls for both Blackboard and client constituents. - Provide regular status reports and bi-monthly budget tracking and project plan updates. - Track and report on any project issues 2005 Page 5 of 9

6 - Summarize and coordinate project planning across all activities and Blackboard groups Consulting, Training, ASP, Quality Assurance, and Product Development. 3.3 Authentication Process Definition Workshops led by Blackboard Consulting at the client s site: o Identification, diagramming, and review of the conceptual solution, designed to isolate specific business processes, workflow rules and processes, specific user roles and privileges, and proper deployment practices Determine the external systems affected by the Blackboard Single Sign-On Solution Align our design with the central authentication system to be used Diagram the stakeholders and the impact the solution will have on each Develop a conceptual flowchart highlighting business-critical processes and dependancies Specify technical specifications passed into and from the Blackboard Single Sign-On Solution o Technical Training specific to the custom solution developed by Blackboard Consulting to achieve the integrated and seamless authentication path requested by the client. Development of installation and maintenance documentation focused on the development effort Scenario-based resolution workshop that instructs administrators on best practices and recommended processes 3.4 Development and Implementation Using the results of the requirements and process workshop, Blackboard consultants define, document and perform the necessary development and configuration activities. Develop the required authentication utilities, including the following: o Identification and customization, if necessary, of the target access point/website o Contingency planning and development of redirection to account for failed authentication into Blackboard or other access points o Development, if necessary, of non-public access for failed authentications into the Central Authentication Server for retrieval of credentials o Flow diagrams and corresponding navigation paths using the Blackboard Single Sign On into external educational or non-academic institutional systems pending valid login o Development of specific channels to deliver/accept valid authentication tokens within the Blackboard Academic Suite and other external systems with the Authentication Server o Identify and create valid log out schematics o Successful exchange of valid URLs and query strings containing authentications, courses, system ID s, etc in a private manner between the institutional network of systems 2005 Page 6 of 9

7 3.5 QA and Functional Testing The Blackboard Consulting team will: Utilize proven test plans for the activities described in the Development and Implementation section above. Coordinate test scripts with the client team Leverage functional testing use cases and storyboards. Execute the steps in the test plan with client system administrators in the client test environment in accordance with the project plan. Provide consulting support for system tests conducted by the client team prior to launch, covering: Points of Failure and remedy Best practices for management of the solution pointing forward Prior experience developing the solution with similar systems and objectives Project Documentation Blackboard Consulting will: Develop and deliver technical documentation and update procedures for each item described in the Development and Implementation section above. Develop and deliver the Project Final Report at the conclusion of the project. This report documents the deployed system 3.6 Project Closure At the conclusion of the project, Blackboard will furnish final documentation to the customer in the form of a project control binder. The activities that Blackboard Consulting will perform to accomplish this are: Business process requirements as expressed during the scope and requirements definition System configuration documentation as affected by the Single Sign-On Solution Network and Security Administrator Certification results reference material Production launch schedule Detailed production launch steps Project Final Report The documentation will include all materials developed throughout the project as well as suggested next steps for your organization Page 7 of 9

8 The schedule below reflects the necessary timelines required to fulfill the appropriate project milestones. Key to staying on schedule is making sure we have the correct client participants. Our objective is to follow the project schedule as closely as possible providing there are no significant scheduling challenges or changes in project scope. 4 Schedule During the term of the project the Blackboard project team will guide the client team through a series of exercises focused on defining, designing and implementing a robust authentication solution specific to your institutions application. The engagement begins with a workshop that outlines the process and captures applicable business rules for Single Sign-On Authentication, including the stakeholders of affected systems. Next, the Blackboard consultants are available to design and develop the necessary authentication components. Finally, they prepare the client team for self sufficiency. 4.1 Project Timeline [Figure1. Solution Project Plan - rough timeline] The project is estimated upon definition of requirements. As with any development lifecycle, it is prudent to estimate a delivery upon measurement of several factors including the resource(s) assigned, complexity of the solution, number of systems affected, usage of the Blackboard Academic Suite, and comprehensiveness of the testing phases. A projected activity flow is diagrammed above. The timeline was designed with the assumption that the development cycle should take place onsite, dedicated entirely to the requirements, design, development, testing, and deployment local on the institution s Blackboard Test Server. A key client responsibility will be to own a Test environment that is reflective of the current Blackboard Production environment. The first week allows for the collection of technical requirements and design, interviews with external system administrators, network administrators, and security administrators. The second week is focused 2005 Page 8 of 9

9 entirely on the development and testing of the solution to prepare the client for production-level deployment following completion. 4.2 Scheduling Requirements Blackboard Consulting s development methodology assumes a certain level of effort from the customer team. For example, those individuals with direct responsibility for the existing tools and processes must be committed during the development lifecycle. Blackboard has found that this participation is necessary to prepare customers for the ongoing demands of an integrated Blackboard system. The following table is intended to aid you in planning for this project: Please note: Blackboard consulting resources are available on a 1 st come first served basis and will be assigned immediately after agreement on proposed work and signature of a Statement of Work 4.3 Client Participants Project Task Roles Required Executive Sponsor System Administrator Process Definition Project Manager Network Administrator IT Representative Academic Computing Network Administrator Solution Implementation Project Manager Security Manager Bb Project Manager Blackboard AS Administrator Certification Workshop Bb Integration Manager System, Network, and/or Security Administrator Production Preparation Client Project Manager Network Administrator Bb Project Manager Security Manager System-level Administrator 5 Conclusion and Blackboard Consulting appreciate your interest in working with our skilled team of technology experts. We believe the aforementioned proposal and estimate will meet the needs of the client by providing the necessary insight and training towards developing systems integration between the Blackboard Academic Suite and your existing systems Page 9 of 9

LDAP Authentication Configuration Appendix

LDAP Authentication Configuration Appendix 1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard

More information

Custom Development Methodology Appendix

Custom Development Methodology Appendix 1 Overview Custom Development Methodology Appendix Blackboard s custom software development methodology incorporates standard software development lifecycles in a way that allows for rapid development

More information

Oracle RAC Services Appendix

Oracle RAC Services Appendix 1 Overview Oracle RAC Services Appendix As usage of the Blackboard Academic Suite grows and the system reaches a mission critical level, customers must evaluate the overall effectiveness, stability and

More information

SCT Event Driven Appendix (LDI Event Integrator)

SCT Event Driven Appendix (LDI Event Integrator) SCT Event Driven Appendix (LDI Event Integrator) 1 Overview SCT event driven integration is provided as an on top of Blackboard s snapshot integration methodology. The event driven technology is part of

More information

Authentication Integration

Authentication Integration Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication

More information

An Overview of Samsung KNOX Active Directory-based Single Sign-On

An Overview of Samsung KNOX Active Directory-based Single Sign-On C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

POLAR IT SERVICES. Business Intelligence Project Methodology

POLAR IT SERVICES. Business Intelligence Project Methodology POLAR IT SERVICES Business Intelligence Project Methodology Table of Contents 1. Overview... 2 2. Visualize... 3 3. Planning and Architecture... 4 3.1 Define Requirements... 4 3.1.1 Define Attributes...

More information

Guide Parchment to Implementation and User Automation: Guide PeopleSoft

Guide Parchment to Implementation and User Automation: Guide PeopleSoft Guide Parchment to Implementation Send K-12 and User Automation: Guide PeopleSoft 2 Contents OVERVIEW 3 PRODUCT OVERVIEW 4 Access 4 Transcript Ordering 4 Request Processing 4 Transcript Request Fulfillment

More information

How To Use Netscaler As An Afs Proxy

How To Use Netscaler As An Afs Proxy Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment

More information

How to Implement Imprivata OneSign Single Sign-On and Authentication Management Successfully

How to Implement Imprivata OneSign Single Sign-On and Authentication Management Successfully How to Implement Imprivata OneSign Single Sign-On and Authentication Management Successfully Table of Contents Introduction 1 The Methodology 1 Project Management 2 Project Phases 2 Certification Training

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

IBX Spend Capture Cloud The Solution

IBX Spend Capture Cloud The Solution Spend Capture Cloud IBX Spend Capture Cloud The Solution What is IBX Spend Capture Cloud? The IBX Spend Capture Cloud is a solution designed to enhance your e-procurement system to capture more spend,

More information

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief

Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief Guide Cisco ASA Adaptive Security Appliance Single Sign-On: Solution Brief October 2012 2012 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public Information. Page 1 of 21 Contents

More information

SEVEN WAYS THAT BUSINESS PROCESS MANAGEMENT CAN IMPROVE YOUR ERP IMPLEMENTATION SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND

SEVEN WAYS THAT BUSINESS PROCESS MANAGEMENT CAN IMPROVE YOUR ERP IMPLEMENTATION SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND SEVEN WAYS THAT BUSINESS PROCESS MANAGEMENT CAN IMPROVE YOUR ERP IMPLEMENTATION SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND CONTENTS INTRODUCTION 3 EFFECTIVELY MANAGE THE SCOPE OF YOUR IMPLEMENTATION

More information

Product. Corillian Business Online Corporate Treasury Management Solution on the Industry s Best Online Banking Platform

Product. Corillian Business Online Corporate Treasury Management Solution on the Industry s Best Online Banking Platform Product Corillian Business Online Corporate Treasury Management Solution on the Industry s Best Online Banking Platform Online Corporate Banking Today Realtime liquidity management and access to relevant

More information

Industrial Rapid Implementation Methodology (InRIM)

Industrial Rapid Implementation Methodology (InRIM) Industrial Rapid Implementation Methodology (InRIM) Introduction The path to improving asset effectiveness and productivity must be based on a firm foundation created from the interaction of three essential

More information

How To Improve Your Business

How To Improve Your Business IT Risk Management Life Cycle and enabling it with GRC Technology 21 March 2013 Overview IT Risk management lifecycle What does technology enablement mean? Industry perspective Business drivers Trends

More information

A Unified Digital Campus:

A Unified Digital Campus: A Unified Digital Campus: Marshall University s Solution Written By Terri L. Tomblin-Byrd Contributions by: Bradley Morgan Gary Weis Copyright Terri L. Tomblin-Byrd 2003. This work is the intellectual

More information

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer

Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer IPSWITCH FILE TRANSFER WHITE PAPER Supporting FISMA and NIST SP 800-53 with Secure Managed File Transfer www.ipswitchft.com Adherence to United States government security standards can be complex to plan

More information

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Leverage Active Directory with Kerberos to Eliminate HTTP Password Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website: www.pistolstar.com

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

Deploying RSA ClearTrust with the FirePass controller

Deploying RSA ClearTrust with the FirePass controller Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you

More information

API-Security Gateway Dirk Krafzig

API-Security Gateway Dirk Krafzig API-Security Gateway Dirk Krafzig Intro Digital transformation accelerates application integration needs Dramatically increasing number of integration points Speed Security Industrial robustness Increasing

More information

KMS Implementation Roadmap

KMS Implementation Roadmap KMS Implementation Roadmap Sample Excerpt Prepared by: The Knowledge Compass, Inc. TABLE OF CONTENTS 1. EXECUTIVE SUMMARY 5 1.1 Overview 5 1.2 Project Goals & Objectives 5 1.3 Implementation Approach 5

More information

Absorb Single Sign-On (SSO) V3.0

Absorb Single Sign-On (SSO) V3.0 Absorb Single Sign-On (SSO) V3.0 Overview Absorb allows single sign-on (SSO) with third-party systems, regardless of the programming language. SSO is made secure by a series of calls (between Absorb and

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Last Updated: July 2011. STATISTICA Enterprise Server Security

Last Updated: July 2011. STATISTICA Enterprise Server Security Last Updated: July 2011 STATISTICA Enterprise Server Security STATISTICA Enterprise Server Security Page 2 of 10 Table of Contents Executive Summary... 3 Introduction to STATISTICA Enterprise Server...

More information

Department of Industry and Science

Department of Industry and Science Services Catalogue Department of Industry and Science Contents 1 Introduction 2 VANguard Services 2 About the VANguard Services Catalogue 2 Contact Details 2 2 VANguard Services 3 User Authentication Service

More information

Customer Timeline - New in Summer 2012. Web Lead Capture - New in Summer 2012. Built-In Dashboards - New in Summer 2012

Customer Timeline - New in Summer 2012. Web Lead Capture - New in Summer 2012. Built-In Dashboards - New in Summer 2012 What s New Maximizer CRM 12 Features New Mobile Access User Interface Enhanced Mobile Access Appointment Management Enhanced Web Access User Interface Improved Web Access Speed & Navigation LinkedIn Integration

More information

Overview. Microsoft Office Enterprise Project Management Solution. In this article

Overview. Microsoft Office Enterprise Project Management Solution. In this article Microsoft Office Enterprise Project Management Solution Overview Applies to: Microsoft Office Project 2007 Project Server 2007 In this article Manage and control all types of work Improve visibility and

More information

Certified Secure Web Application Secure Development Checklist

Certified Secure Web Application Secure Development Checklist www.certifiedsecure.com info@certifiedsecure.com Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands About Certified Secure Checklist Certified Secure exists to encourage and fulfill

More information

LANDesk Professional Services

LANDesk Professional Services LANDesk Professional Services Service Description For G-Cloud Background Drawing upon 25 years of experience, LANDesk today is recognized as a leading provider of systems and endpoint security management,

More information

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust

More information

User-Centric Client Management with System Center 2012 Configuration Manager in Microsoft IT

User-Centric Client Management with System Center 2012 Configuration Manager in Microsoft IT Situation Microsoft IT needed to evolve their Configuration Manager 2007-based environment that used homegrown application distribution services to meet the self-service needs of Microsoft personnel. Solution

More information

Linking an Opioid Treatment Program to a Prescription Drug Monitoring Program: A Pilot Study

Linking an Opioid Treatment Program to a Prescription Drug Monitoring Program: A Pilot Study Page 1 Overview Goal The Evergreen Treatment Services (ETS) Opioid Treatment Program (OTP) pilot demonstrated the value of health IT connectivity by: Improving access to PDMP data by OTP providers Streamlining

More information

HP Software as a Service. Federated SSO Guide

HP Software as a Service. Federated SSO Guide HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying

More information

Wilhelmenia Ravenell IT Manager Eli Lilly and Company

Wilhelmenia Ravenell IT Manager Eli Lilly and Company Wilhelmenia Ravenell IT Manager Eli Lilly and Company Agenda Introductions The Service Management Framework Keys of a successful Service management transformation Why transform? ROI and the customer experience

More information

managing SSO with shared credentials

managing SSO with shared credentials managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout

More information

HP Software as a Service

HP Software as a Service HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty

More information

Enterprise Portal Built by and for Higher Education

Enterprise Portal Built by and for Higher Education www.apereo.org/uportal Enterprise Portal Built by and for Higher Education Now Responsive for All Devices along with Native App Experience There is a growing demand for higher education institutions to

More information

Symantec Consulting Services

Symantec Consulting Services GET MORE FROM YOUR SECURITY SOLUTIONS Symantec Consulting 2015 Symantec Corporation. All rights reserved. Access outstanding talent and expertise with Symantec Consulting Symantec s Security Consultants

More information

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright

More information

DELIVERING EXCEPTIONAL CUSTOMER CARE

DELIVERING EXCEPTIONAL CUSTOMER CARE REAL WORLD SCENARIOS Volume 1 Cases 1-4 DELIVERING EXCEPTIONAL CUSTOMER CARE WINNING THE HEARTS OF YOUR CUSTOMERS BUILDing THE FOUNDATION STREAMLINing SUPPORT CASES GAINing A COMPETITIVE ADVANTAGE knowing

More information

6437A: Designing a Windows Server 2008 Applications Infrastructure (3 Days)

6437A: Designing a Windows Server 2008 Applications Infrastructure (3 Days) www.peaksolutions.com 6437A: Designing a Windows Server 2008 Applications Infrastructure (3 Days) Introduction This course will prepare IT professionals for the role of Enterprise Administrator. Students

More information

CHAPTER - 3 WEB APPLICATION AND SECURITY

CHAPTER - 3 WEB APPLICATION AND SECURITY CHAPTER - 3 WEB APPLICATION AND SECURITY 3.1 Introduction Web application or Wepapp is the general term that is normally used to refer to all distributed web-based applications. According to the more technical

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon

More information

data sheet Ruckus Smart Access Management Service MOVING SMART WI-FI INTO THE CLOUD FEATURES AND BENEFITS

data sheet Ruckus Smart Access Management Service MOVING SMART WI-FI INTO THE CLOUD FEATURES AND BENEFITS data sheet FEATURES AND BENEFITS Carrier-grade cloud Wi-Fi with a payas-you-grow service model Cost effective solution for small deployments to large deployments supporting thousands of clients devices

More information

GSA Services Catalog

GSA Services Catalog INCLUDES CHANGES THROUGH MODIFICATION P00007 immixtechnology, Inc. N00104-08-A-ZF31 GS-35-F-0265X Attachment D GSA Services Catalog Training Services... 2 Introductory Training - WebEx... 4 Level 1 Help

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

Terminology. Enabling Parent Single Sign-On. Server Configuration

Terminology. Enabling Parent Single Sign-On. Server Configuration Parent Single Sign-On offers a number of benefits, including access to multiple students with one sign in, a personalized account for each parent and guardian, and the ability for parents to retrieve their

More information

Parent Single Sign-On Quick Reference Guide

Parent Single Sign-On Quick Reference Guide Parent Single Sign-On Quick Reference Guide Parent Single Sign-On, introduced in PowerSchool 6.2, offers a number of benefits, including access to multiple students with one sign in, a personalized account

More information

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology

Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology UC DAVIS: OFFICE OF THE VICE PROVOST INFORMATION & EDUCATIONAL TECHNOLOGY Enterprise Directory Project Pre-Feasibility Study Information and Educational Technology Background Unprecedented growth and an

More information

Building Your CRM Short List: What You Need to Know Before You Buy

Building Your CRM Short List: What You Need to Know Before You Buy Building Your CRM Short List: What You Need to Know Before You Buy Nov. 28, 2007 Moderator: Matt Villano, senior contributing editor, Campus Technology Introduction Agenda Building your CRM shortlist:

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

MICROSOFT DYNAMICS CRM Roadmap. Release Preview Guide. Q4 2011 Service Update. Updated: August, 2011

MICROSOFT DYNAMICS CRM Roadmap. Release Preview Guide. Q4 2011 Service Update. Updated: August, 2011 MICROSOFT DYNAMICS CRM Roadmap Release Preview Guide Q4 2011 Service Update Updated: August, 2011 EXECUTIVE SUMMARY Microsoft has delivered significant innovation and value in customer relationship management

More information

ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES

ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES THOMSON REUTERS ACCELUS ACCELUS COMPLIANCE MANAGER FOR FINANCIAL SERVICES PROACTIVE. CONNECTED. INFORMED. THOMSON REUTERS ACCELUS Compliance management Solutions Introduction The advent of new and pending

More information

What s New in Interwise Connect V7

What s New in Interwise Connect V7 What s New in Interwise Connect V7 Interwise has been providing leading conferencing and collaboration solutions to enterprises worldwide for 10 years. In that time, a number of world-class, forward-thinking

More information

Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop

Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop Course 8036: Two days; Instructor-led Microsoft Certified Professional Exams No Microsoft Certified Professional

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

data sheet Ruckus Smart Access Management Service moving smart wi-fi into the cloud

data sheet Ruckus Smart Access Management Service moving smart wi-fi into the cloud data sheet FEATURES AND BENEFITS Carrier-grade cloud Wi-Fi with a payas-you-grow service model Cost affective solution for small deployments to large deployments supporting thousands of clients devices

More information

Microsoft Premier Deployment. Office 365 Service Description

Microsoft Premier Deployment. Office 365 Service Description Microsoft Premier Deployment Office 365 Service The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication and

More information

Palo Alto Networks GlobalProtect VPN configuration for SMS PASSCODE SMS PASSCODE 2015

Palo Alto Networks GlobalProtect VPN configuration for SMS PASSCODE SMS PASSCODE 2015 SMS PASSCODE 2015 Guide for implementing SMS PASSCODE protection with Palo Alto Networks. This document outlines the process of configuring a Palo Alto Networks GlobalProtect VPN with SMS PASSCODE RADIUS

More information

What s New Guide: Version 5.6

What s New Guide: Version 5.6 What s New Guide: Version 5.6 A QUEST SOFTWARE COMPANY 1. 8 0 0. 4 2 4. 9 4 1 1 w w w. s c r i p t l o g i c. c o m WHAT S NEW IN ACTIVE ADMINISTRATOR 5.6? Contents...3 Active Administrator Product Overview...3

More information

Statement of Direction

Statement of Direction Mobile First: Taking Mobile CRM to the Next Level 1 January 2013 Mobile First: Taking Mobile CRM to the Next Level Whitepaper Mobile First: Taking Mobile CRM to the Next Level 2 Table of Contents Notes...

More information

OE PROJECT CHARTER TEMPLATE

OE PROJECT CHARTER TEMPLATE PROJECT : BearBuy Implementation PREPARED BY: Vanessa Wong and Jon Conhaim DATE (MM/DD/YYYY): 07/23/2011 PROJECT CHARTER VERSION HISTORY VERSION DATE COMMENTS (DRAFT, SIGNED, REVISED CURRENT STATUS) (MM/DD/YYYY)

More information

Using Microsoft SharePoint for Project Management

Using Microsoft SharePoint for Project Management ASPE IT Training Using Microsoft SharePoint for Project Management A WHITE PAPER PRESENTED BY ASPE www.aspe-it.com 877-800-5221 Using Microsoft SharePoint for Project Management A modern Project Management

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

SINGLE SIGN-ON SETUP T ECHNICAL NOTE

SINGLE SIGN-ON SETUP T ECHNICAL NOTE T ECHNICAL NOTE Product: Create!archive 6.2.1 Last modified: October 5, 2007 12:03 pm Created by: Development SINGLE SIGN-ON SETUP This Technical Note contains the following sections: Summary Create!archive

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and

More information

Microsoft Services Premier Support. Security Services Catalogue

Microsoft Services Premier Support. Security Services Catalogue Microsoft Services Premier Support Security Services Catalogue 2014 Microsoft Services Microsoft Services helps you get the most out of your Microsoft Information Technology (IT) investment with integrated

More information

Strengthen security with intelligent identity and access management

Strengthen security with intelligent identity and access management Strengthen security with intelligent identity and access management IBM Security solutions help safeguard user access, boost compliance and mitigate insider threats Highlights Enable business managers

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

Designing a Windows Server 2008 Applications Infrastructure

Designing a Windows Server 2008 Applications Infrastructure Designing a Windows Server 2008 Applications Infrastructure Course 6437A : Three days; Instructor-Led Introduction This three day course will prepare IT professionals for the role of Enterprise Administrator.

More information

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud

VALUE PROPOSITION FOR SERVICE PROVIDERS. Helping Service Providers accelerate adoption of the cloud VALUE PROPOSITION FOR SERVICE PROVIDERS Helping Service Providers accelerate adoption of the cloud Partnership with Service Providers Enabling Your Cloud Services in Complex Environments Today s challenge

More information

Single Sign On. SSO & ID Management for Web and Mobile Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Royal Roads University_ Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they

More information

Integration Overview. Web Services and Single Sign On

Integration Overview. Web Services and Single Sign On Integration Overview Web Services and Single Sign On Table of Contents Overview...3 Quick Start 1-2-3...4 Single Sign-On...6 Background... 6 Setup... 6 Programming SSO... 7 Web Services API...8 What is

More information

Setting up single signon with Zendesk Remote Authentication

Setting up single signon with Zendesk Remote Authentication Setting up single signon with Zendesk Remote Authentication Zendesk Inc. 2 Zendesk Developer Library Introduction Notice Copyright and trademark notice Copyright 2009 2013 Zendesk, Inc. All rights reserved.

More information

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Approaches to Enterprise Identity Management: Best of Breed vs. Suites Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity

More information

WennSoft Evolution CONNECTED Business. REMARKABLE Field Service.

WennSoft Evolution CONNECTED Business. REMARKABLE Field Service. WennSoft Evolution CONNECTED Business. REMARKABLE Field Service. REMARKABLE FIELD Service TAKE the leading CRM platform. Add WennSoft Evolution, a standardsetting field service solution built for a wide

More information

Genesis Energy delivers IT projects faster with standardised processes and CA Clarity PPM.

Genesis Energy delivers IT projects faster with standardised processes and CA Clarity PPM. CUSTOMER TECHNICAL BRIEF: CREATING A CENTRALISED MATURITY MODEL FOR PROJECT AND RESOURCE MANAGEMENT Genesis Energy delivers IT projects faster with standardised processes and CA Clarity PPM. Table of Contents

More information

Course 6437A: Designing a Windows Server 2008 Applications Infrastructure

Course 6437A: Designing a Windows Server 2008 Applications Infrastructure Course 6437A: Designing a Windows Server 2008 Applications Infrastructure Length: 3 Days Audience(s): IT Professionals Level: 400 Technology: Windows Server 2008 Type: Course Delivery Method: Instructor-led

More information

CA Service Desk Manager

CA Service Desk Manager PRODUCT BRIEF: CA SERVICE DESK MANAGER CA Service Desk Manager CA SERVICE DESK MANAGER IS A VERSATILE, COMPREHENSIVE IT SUPPORT SOLUTION THAT HELPS YOU BUILD SUPERIOR INCIDENT AND PROBLEM MANAGEMENT PROCESSES

More information

Unlock the Value of Your Microsoft and SAP Software Investments

Unlock the Value of Your Microsoft and SAP Software Investments SAP Technical Brief SAP Gateway Objectives Unlock the Value of Your Microsoft and SAP Software Investments Bridging the integration gap between SAP and Microsoft environments Bridging the integration gap

More information

SEVEN WAYS TO AVOID ERP IMPLEMENTATION FAILURE SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND

SEVEN WAYS TO AVOID ERP IMPLEMENTATION FAILURE SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND SEVEN WAYS TO AVOID ERP IMPLEMENTATION FAILURE SPECIAL REPORT SERIES ERP IN 2014 AND BEYOND CONTENTS INTRODUCTION................................ 3 UNDERSTAND YOUR CURRENT SITUATION............ 4 DRAW

More information

Information Technology Services Project Management Office Operations Guide

Information Technology Services Project Management Office Operations Guide Information Technology Services Project Management Office Operations Guide Revised 3/31/2015 Table of Contents ABOUT US... 4 WORKFLOW... 5 PROJECT LIFECYCLE... 6 PROJECT INITIATION... 6 PROJECT PLANNING...

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

SAP Business Objects Security

SAP Business Objects Security SAP Business Objects Security Pal Alagarsamy President Business Intelligence Practice GloWiz Inc 1 GloWiz Inc GloWiz is an IT Staffing and Consulting company since 2005 We focus on Business Intelligence,

More information

Extranet Access Management Web Access Control for New Business Services

Extranet Access Management Web Access Control for New Business Services Extranet Access Management Web Access Control for New Business Services An Evidian White Paper Increase your revenue and the ROI for your Web portals Summary Increase Revenue Secure Web Access Control

More information

Project title (in Chinese) 項 目

Project title (in Chinese) 項 目 II Project Information Project title (in English) Project title (in Chinese) HKCAAVQ IT Infrastructure Development 香 港 學 術 及 職 業 資 歷 評 審 局 資 訊 系 統 基 建 發 展 Project 項 目 Project summary (Please provide an

More information

PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE:

PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE: PROJECT MANAGEMENT PLAN Outline VERSION 0.0 STATUS: OUTLINE DATE: Project Name Project Management Plan Document Information Document Title Version Author Owner Project Management Plan Amendment History

More information

Symantec Enterprise Vault for Microsoft Exchange

Symantec Enterprise Vault for Microsoft Exchange Symantec Enterprise Vault for Microsoft Exchange Store, manage, and discover critical business information Data Sheet: Archiving Trusted and proven email archiving Symantec Enterprise Vault, the industry

More information

Integrating SharePoint Sites within WebSphere Portal

Integrating SharePoint Sites within WebSphere Portal Integrating SharePoint Sites within WebSphere Portal November 2007 Contents Executive Summary 2 Proliferation of SharePoint Sites 2 Silos of Information 2 Security and Compliance 3 Overview: Mainsoft SharePoint

More information

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief

with Managing RSA the Lifecycle of Key Manager RSA Streamlining Security Operations Data Loss Prevention Solutions RSA Solution Brief RSA Solution Brief Streamlining Security Operations with Managing RSA the Lifecycle of Data Loss Prevention and Encryption RSA envision Keys with Solutions RSA Key Manager RSA Solution Brief 1 Who is asking

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Product Datasheet The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Full-featured Enterprise-class IT Solution for Managed File Transfer Organizations today must effectively

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,

More information

HarePoint Workflow Extensions for Office 365. Quick Start Guide

HarePoint Workflow Extensions for Office 365. Quick Start Guide HarePoint Workflow Extensions for Office 365 Quick Start Guide Product version 0.91 November 09, 2015 ( This Page Intentionally Left Blank ) HarePoint.Com Table of Contents 2 Table of Contents Table of

More information

ComplianceSP TM on SharePoint. Complete Document & Process Management for Life Sciences on SharePoint 2010 & 2013

ComplianceSP TM on SharePoint. Complete Document & Process Management for Life Sciences on SharePoint 2010 & 2013 TM ComplianceSP TM on SharePoint Complete Document & Process Management for Life Sciences on SharePoint 2010 & 2013 Overview With increasing pressure on costs and margins across Life Sciences, the industry

More information