LIGO Authentication and Authorization 2.0
|
|
|
- Lorin Whitehead
- 10 years ago
- Views:
Transcription
1 LIGO Authentication and Authorization 2.0 CILogon Fall 2009 Workshop Urbana, IL Sep 29, 2009 Scott Koranda & Warren Anderson University of Wisconsin Milwaukee LIGO G
2 Who we are LIGO Laboratory» CIT, MIT, LIGO detector sites in Hanford, WA and Livingston, LA» ~ 250 people LIGO Scientific Collaboration» 47+ institutions, groups, or organizations» Intersects with the LIGO Laboratory» Some organizations have subgroups GEO project is German/English collaboration with subgroups» ~ 660 people Virgo collaborators» Sister project» Some use LIGO computing resources» ~ 224 given LIGO.ORG Kerberos principal External collaborators» Radio astronomers, numerical relativists, neutrino scientists,...» Just beginning to need to solve authorization issues LIGO G
3 Where We Were How to not scale in thousands of easy steps Systems evolved rather than being planned Coordination minimal or non existant between services/sites/admins Membership in LIGO Scientific Collaboration not tracked Independent management of services and users:» Works OK for ~100 users on ~10 services» Does not scale to ~1000 users on ~100 services LIGO G
4 Where We Were The Mess We Made on the Web Web servers stood up by individuals and groups with private data» Each admin/scientist/application uses their own AuthN/Z scheme» Each admin administers AuthN/Z info independently of others» Usernames/passwords not coordinated between sites ~ 10 wiki like applications with many instances each, including homespun ilog» Each has an internal accounting system which is not shared ~ 3 problem tracking systems with many instances each Shared well known password used by all scientists for many sites» Found written down on whiteboards» Distributed in open s» Posted on unprotected web pages by accident LIGO G
5 Where We Were The Mess We Made on the Grid/Shell LIGO Data Grid (LDG)» We use slightly modified VDT for client/server distribution» Users get X.509 certificates for authentication. Most use DOEGrids PI of group at each university/institute provides verbal verification for chain of trust, which sometimes takes weeks/months Cert request/retrieve/renew scripts have problems on some platforms Users make mistakes some make many mistakes in a row» Users request LDG account Successful account requests added into grid map file at each LDG site Grid map files maintained at each site independently by site admin No mechanism for removing/updating accounts automatically General computing and critical systems» Only at laboratory sites at LHO, LLO, CIT, MIT» Not coordinated between sites» Use shared accounts for some critical systems LIGO G
6 Where We Are Going Requirements Easy for users» Single sign on across as many services as possible» Minimize user management of credentials Easy for admins» Centralized management of user accounts» Hardened protocols/tools, widely used and well integrated into clients» Automate as much maintenance as possible Easy for collaboration management» Centralized management of personnel» High availability network outages do not prevent work from happening at observatories or compute centers» Quick turn around users can be added or removed everywhere in minutes LIGO G
7 Where We Are Going Pieces of the Puzzle my.ligo.org» user database (mysql) with PHP front end (in house development) to collect, manage and report personnel data LIGO.ORG Kerberos realm» Authentication service» One KDC per compute site for robustness LDAP» Stores account and authorization information (user attributes)» No secrets in the LDAP!» One LDAP per compute site Grouper (I2)» Create and manage groups for authorization, pushed to LDAP Sympa» Mailing list engine to notify users/admins/managers of pending actions draws mailing lists from groups in LDAP LIGO G
8 Where We Are Going More Pieces of the Puzzle MyProxy (NCSA/Globus)» Exchange Kerberos ticket for short lived X.509 credential/proxy» Embedded certificate authority (LIGO CA most likely)» One MyProxy server per compute site for robustness Shibboleth (I2)» Authentication via Kerberos (IdP)» Authorization via LDAP (IdP)» Web single sign on GridShib (NCSA/Globus)?» Ideally we would leverage a tool like GridShib for authorization to LDG services» But no Java services on LDG!» More on this later... LIGO G
9 Where We Are Going The puzzle LIGO G
10 Where We Are Going A day in the life morning New member joins UWM LSC group» Fills out myligo application with her information» myligo notifies UWM group managers via Sympa» UWM group manager approves application Kerberos credential created for user by myligo LDAP entry added for user by myligo User added to LSC members group Grid map files get updated with user certificate DN» User downloads and executes ligo logon script User gets Kerberos ticket and short lived X.509/proxy» User opens browser and goes to portal site to find where instructions and pipeline for running a pulsar search reside Shibboleth IdP authenticates her Portal site SP authorizes her because she is in LIGO members group LIGO G
11 Where We Are Going A day in the life afternoon User goes to pulsar pipeline page» Pulsar pipeline page SP checks if she is member of pulsar analysis group» She is not, so access is politely denied with instructions to mail pulsar analysis group managers Sympa list to ask for access User mails pulsar analysis group managers and asks» Pulsar group manager goes to Grouper page, searches for her in Grouper/LDAP, adds her to pulsar analysis group, and s to inform her User goes to pulsar pipeline page again, gets access, downloads pulsar pipeline and reads instructions User runs pipeline, which uses short lived credential/proxy to launch job on CIT cluster User has gone from zero to hero in one day LIGO G
12 Where We Are What have you done for me lately? my.ligo.org is deployed» Basic operations supported, development is ongoing Kerberos realm is operational» Static web pages» moin wikis, twikis, media wikis» online document control system» mod_auth_kerb used right now Git software repository» Anonymous read via git protocol» Write access tunneled through OpenSSH Kerberos (directly with ticket or via PAM) GSI enabled OpenSSH (grid mapfile managed by hand!) LIGO G
13 Where We Are What have you done for me lately? LDAP is operational» Twiki mapping from Kerberos principal to TwikiName via LDAP» Twiki authorization is done directly using LDAP Grouper 1.4 deployed» Back end to myligo, maintains all group membership» Only basic collaboration memberships supported» Still need to support most working groups LIGO G
14 Where We Are What have you done for me lately? Sympa deployed» No management interface supported yet, but in use for some groups» Group membership pulled from LDAP» addresses pulled from LDAP» LDAP group membership managed by Grouper Shibboleth, MyProxy, GridShib still on horizon» Shibboleth testbed operational» MyProxy thoroughly tested but not deployed» No work on GridShib so far (more later...) LIGO G
15 Where We Are Project Arc Our project is following the usual arc we ve reached panel 7 Project Contributors: Stuart Anderson, Warren Anderson, Phil Ehrens, Sam Finn, Jonathan Hanks, Scott Koranda, Diego Menéndez,Tom Nash, Shannon Roddy, Abe Singer,Hannah Williams (CIT, LHO, LLO, PSU, UWM) LIGO G
16 What we need: GSI OpenSSH A critical tool for LIGO» No substitute for logging into a cluster to debug» The Grid vision should not prevent... Adoption by major Linux distributions» CentOS 5.3 and Debian Lenny are LIGO reference OS» Go vote now!» If primary OpenSSH developers won't adopt patch, should pursue Linux porters and/or specific Linux distributions? Specific logging for GSI authorizations» Can this already be done with syslog( ng)? Attribute based authorization ala' GridShib» eg. only members of LIGO pulsar group can login» Note that OpenSSH is not coded in Java! LIGO G
17 What we need: MyProxy Major functionality is all present and tested» Used primarily to deliver short lived credentials from embedded CA Attribute based authorization and policy would be nice» eg. can obtain a short lived credential with a 72 hour lifetime because he is member of group Communities:LVC:LSC:LSCAdminGroup Short lived credential refresh» Condor jobs that cache a short lived credential/proxy should be able to use it to refresh and obtain a new short lived credential/proxy» Not uncommon for some LIGO jobs to run for a week» Need to authenticate to publish results Can we cross the web grid boundary?» SPNEGO helps when going grid to web...» If user authenticates first to IdP can we deliver grid credential? LIGO G
18 What we need: GridShib Support for services NOT coded in Java! LIGO needs support for C and Python» GSI enabled OpenSSH C» globus gridftp server C» Globus Replica Location Service (RLS) C» LIGO Data Replicator (LDR) Python under Apache httpd» LIGO Archival System (LARS) Python under Apache httpd» Gravitational wave candidate event database (GraCEDb) Python under Apache httpd Would like attribute based authorization via GridShib for all of these LIGO G
19 What we need: all Regular and timely releases» Prefer not tied to large Globus Toolkit releases Support for native packaging» LIGO quickly moving to using only native packaging» RPM/Yum for CentOS and Debian packages Transparent testing» Prefer transparent nightly build tests on 64 bit CentOS 5.3 and Debian Lenny LIGO G
20 What we offer Small but dedicated team with which to collaborate» Use LIGO/Condor and LIGO/Globus interactions as model» Bi weekly (Condor) or monthly (Globus/CDIGS) calls» Responsible (we hope!) bug reporting and testing We prefer to consume rather than build our own» We don't do not invented here for computing infrastructure» If we can get what we need externally we will leverage it Production environment» We have lots of data» We have lots of scientists that need to analyze the data» This is not a drill! LIGO G
Identity and Access Management for LIGO: International Challenges
Identity and Access Management for LIGO: International Challenges Scott Koranda for LIGO and CTSC University of Wisconsin-Milwaukee November 14, 2012 LIGO-XXXXXXXX-v1 1 / 26 LIGO Science Mission LIGO,
LIGO Mailing List Group Configuration
LASER INTERFEROMETER GRAVITATIONAL WAVE OBSERVA- TORY LIGO Laboratory / LIGO Scientific Collaboration LIGO-T1200490-v2 LIGO Wednesday, October 31, 2012 LIGO Mailing List Group Configuration Warren G. Anderson
LIGO Cybersecurity Status
LIGO Cybersecurity Status Albert Lazzarini NSF Annual Review of LIGO LIGO Hanford Observatory October 23-25, 2006 1 Outline Recommendations from last review Overview of cybersecurity within LIGO Laboratory
Cloud Computing. Lecture 5 Grid Case Studies 2014-2015
Cloud Computing Lecture 5 Grid Case Studies 2014-2015 Up until now Introduction. Definition of Cloud Computing. Grid Computing: Schedulers Globus Toolkit Summary Grid Case Studies: Monitoring: TeraGRID
External and Federated Identities on the Web
External and Federated Identities on the Web Jan Pazdziora Sr. Principal Software Engineer Identity Management Special Projects, Red Hat 1 st October 2015 Scope and problem statement Applications get deployed
SSO Questions. Request for 10 minute overview/demo on Grouper software package set-up (IT-oriented)
SSO Questions Request for 10 minute overview/demo on Grouper software package set-up (IT-oriented) I can demo production LIGO Grouper (1.6.3) I can demo sandbox Grouper (2.1.3) Grouper has 4 main components
Enabling LIGO Applications on Scientific Grids
Enabling LIGO Applications on Scientific Grids Junwei Cao, MIT/LIGO [email protected] For the LIGO Scientific Collaboration OSG Consortium Meeting Milwaukee, Wisconsin July 20-22 2005 Data Monitoring Toolkit
CAC AND KERBEROS FROM VISION TO REALITY
CAC AND KERBEROS FROM VISION TO REALITY Mil OSS Conference 2011 Dmitri Pal Sr. Engineering Manager Red Hat Inc. Aug 31, 2011 Outline Setting up context... Card authentication now Open issues Pieces of
Authorization Strategies for Virtualized Environments in Grid Computing Systems
Authorization Strategies for Virtualized Environments in Grid Computing Systems Xinming Ou Anna Squicciarini Sebastien Goasguen Elisa Bertino Purdue University Abstract The development of adequate security
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization
Single sign-on websites with Apache httpd: Integrating with Active Directory for authentication and authorization Michael Heldebrant Solutions Architect, Red Hat Outline Authentication overview Basic LDAP
Using the MyProxy Online Credential Repository
Using the MyProxy Online Credential Repository Jim Basney National Center for Supercomputing Applications University of Illinois [email protected] What is MyProxy? Independent Globus Toolkit add-on
LinuxCon North America
LinuxCon North America Enterprise Identity Management with Open Source Tools Dmitri Pal Sr. Engineering Manager Red Hat, Inc. 09.16.2013 Context What is identity management? 2 LinuxCon North America Context
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
Development and deployment of integrated attribute based access control for collaboration
Development and deployment of integrated attribute based access control for collaboration Collaborations and Virtual Organizations IdM is a critical dimension of collaboration, crossing many applications
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
Mac OS X Directory Services
Mac OS X Directory Services Agenda Open Directory Mac OS X client access Directory services in Mac OS X Server Redundancy and replication Mac OS X access to other directory services Active Directory support
Kerberos and Single Sign On with HTTP
Kerberos and Single Sign On with HTTP Joe Orton Senior Software Engineer, Red Hat Overview Introduction The Problem Current Solutions Future Solutions Conclusion Introduction WebDAV: common complaint of
XSEDE Service Provider Software and Services Baseline. September 24, 2015 Version 1.2
XSEDE Service Provider Software and Services Baseline September 24, 2015 Version 1.2 i TABLE OF CONTENTS XSEDE Production Baseline: Service Provider Software and Services... i A. Document History... A-
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015
Federation At Fermilab Al Lilianstrom National Laboratories Information Technology Summit May 2015 About Fermilab Since 1967, Fermilab has worked to answer fundamental questions and enhance our understanding
Cross-Realm Trust Interoperability, MIT Kerberos and AD
Cross-Realm Trust Interoperability, MIT Kerberos and AD Dmitri Pal Sr. Engineering Manager Red Hat Inc. 10/27/2010 1 INTERNAL ONLY PRESENTER NAME What is our focus? Traditional view on Kerberos interoperability
globus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory
globus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory Types of integration Resource integration Connect campus, project,
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Linux VPS with cpanel. Getting Started Guide
Linux VPS with cpanel Getting Started Guide First Edition October 2010 Table of Contents Introduction...1 cpanel Documentation...1 Accessing your Server...2 cpanel Users...2 WHM Interface...3 cpanel Interface...3
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
THE CCLRC DATA PORTAL
THE CCLRC DATA PORTAL Glen Drinkwater, Shoaib Sufi CCLRC Daresbury Laboratory, Daresbury, Warrington, Cheshire, WA4 4AD, UK. E-mail: [email protected], [email protected] Abstract: The project aims
Leverage Active Directory with Kerberos to Eliminate HTTP Password
Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website: www.pistolstar.com
18.2 user guide No Magic, Inc. 2015
18.2 user guide No Magic, Inc. 2015 All material contained here in is considered proprietary information owned by No Magic, Inc. and is not to be shared, copied, or reproduced by any means. All information
Okta Identity Management for Portals Built on Salesforce.com. An Architecture Review. Okta Inc. 301 Brannan Street San Francisco, CA 94107
Okta Identity Management for Portals Built on Salesforce.com An Architecture Review Okta Inc. 301 Brannan Street San Francisco, CA 94107 [email protected] 1-888-722-7871 Contents 1 Okta: A Platform for Cloud
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
Configuring User Identification via Active Directory
Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] User Identification Overview User Identification allows you to create security policies based
Web app AAI Integration How to integrate web applications with AAI in general?
Web app AAI Integration How to integrate web applications with AAI in general? Lukas Hämmerle [email protected] Zurich, 8. February 2009 6 Goal of this presentation 1. List the general requirements
Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific
Q: Is the challenge required or can pass through authentication be used with regard to automatic login after you login to your corporate domain? A: You can configure the system to pass on the challenge
SSO Plugin. Release notes. J System Solutions. http://www.javasystemsolutions.com Version 3.6
SSO Plugin Release notes J System Solutions Version 3.6 JSS SSO Plugin v3.6 Release notes What's new... 3 Improved Integrated Windows Authentication... 3 BMC ITSM self service... 3 Improved BMC ITSM Incident
Middleware integration in the Sympa mailing list software. Olivier Salaün - CRU
Middleware integration in the Sympa mailing list software Olivier Salaün - CRU 1. Sympa, its middleware connectors 2. Sympa web authentication 3. CAS authentication 4. Shibboleth authentication 5. Sympa
BMC Software Webinars 2013 Atrium Single Sign On (Atrium SSO)
BMC Software Webinars 2013 Atrium Single Sign On (Atrium SSO) An introduction Vincent Lasfargues Atrium Customer Engineering Contributors: John Stamps, Murali Balijepally, Karl Miller, Rahul Vedak, Volodymyr
MIGRATING DESKTOP AND ROAMING ACCESS. Migrating Desktop and Roaming Access Whitepaper
Migrating Desktop and Roaming Access Whitepaper Poznan Supercomputing and Networking Center Noskowskiego 12/14 61-704 Poznan, POLAND 2004, April white-paper-md-ras.doc 1/11 1 Product overview In this whitepaper
Big Data Operations Guide for Cloudera Manager v5.x Hadoop
Big Data Operations Guide for Cloudera Manager v5.x Hadoop Logging into the Enterprise Cloudera Manager 1. On the server where you have installed 'Cloudera Manager', make sure that the server is running,
External Identity and Authentication Providers For Apache HTTP Server
External Identity and Authentication Providers For Apache HTTP Server Jan Pazdziora Principal Software Engineer Identity Management Engineering, Red Hat 17 th November 2014 Basic Authentication The only
Overview. Edvantage Security
Overview West Virginia Department of Education (WVDE) is required by law to collect and store student and educator records, and takes seriously its obligations to secure information systems and protect
SMART Vantage. Installation guide
SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the
Integration with Active Directory. Jeremy Allison Samba Team
Integration with Active Directory Jeremy Allison Samba Team Benefits of using Active Directory Unlike the earlier Microsoft Windows NT 4.x Domain directory service which used proprietary DCE/RPC calls,
Smart Card Authentication. Administrator's Guide
Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5
Managed Servers ASA Extract FY14
Managed Servers ASA Extract FY14 1.0 Service Summary 1.1 Name Managed Servers 1.7 Mission/Vision UW IT currently manages over 900 managed servers for various owners and functions. There are 2 primary types
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected]
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected] Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen, Germany CLARIN AAI Hands On Workshop, 25.02.2009, Oxford
The GENIUS Grid Portal
The GENIUS Grid Portal (*) work in collaboration with A. Falzone and A. Rodolico EGEE NA4 Workshop, Paris, 18.12.2003 CHEP 2000, 10.02.2000 Outline Introduction Grid portal architecture and requirements
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Drupal
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Red Hat Enterprise ipa
Red Hat Enterprise ipa Introduction Red Hat Enterprise IPA enables your organization to comply with regulations, reduce risk, and become more efficient. Simply and centrally manage your Linux/Unix users
CERN Single Sign On solution
CERN Single Sign On solution Emmanuel Ormancey System Architect, CERN IT/IS CERN, Route de Meyrin, CH-1211 Geneva 23, Switzerland E-mail: [email protected] Abstract. The need for Single Sign On
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
NETWRIX IDENTITY MANAGEMENT SUITE
NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies
Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright
Web Hosting. E-Mail Hosting. Cloud File Hosting. The Genio Group (214) 732-7411 [email protected] www.thegeniogroup.com
Web Hosting E-Mail Hosting Cloud File Hosting Genio Hosting Servers All of Genio s Hosting Servers run on Apple hardware running Mac OS X Server. Mac OS X Server leverages the computing power of 64-bit
SUSE Manager 1.2.x ADS Authentication
Best Practice www.suse.com SUSE Manager 1.2.x ADS Authentication How to use MS-ADS authentiction (Version 0.7 / March 2 nd 2012) P r e f a c e This paper should help to integrate SUSE Manager to an existing
How Reflection Software Facilitates PCI DSS Compliance
Reflection How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance How Reflection Software Facilitates PCI DSS Compliance In 2004, the major credit
Google Apps and Open Directory. Randy Saeks Twitter: @rsaeks http://www.techrecess.com
Google Apps and Open Directory Randy Saeks Twitter: @rsaeks http://www.techrecess.com Agenda Quick Google Apps Overview Structure Setup Preparing OD Configuration Q&A&S Resources http://techrecess.com/technical-papers/gapps/
StreamServe Persuasion SP5 Control Center
StreamServe Persuasion SP5 Control Center User Guide Rev C StreamServe Persuasion SP5 Control Center User Guide Rev C OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other international patents
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210
WiNG5 CAPTIVE PORTAL DESIGN GUIDE
WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
Office 365 deployment checklists
Chapter 128 Office 365 deployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of issues.
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
Identity Management. Manager, Identity Management. Academic Technology Services. Michigan State University Board of Trustees
Identity Management and Shibboleth h at MSU Jim Green Manager, Identity Management Michigan State t University it Academic Technology Services Identity Management Definition: Identity management is the
CS 356 Lecture 28 Internet Authentication. Spring 2013
CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
MySQL Enterprise Monitor
MySQL Enterprise Monitor Lynn Ferrante Principal Sales Consultant 1 Program Agenda MySQL Enterprise Monitor Overview Architecture Roles Demo 2 Overview 3 MySQL Enterprise Edition Highest Levels of Security,
Oracle Mobile Security Suite Workshop. Installation
Oracle Mobile Security Suite Workshop Installation The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any
Use of UniDesk Code of Practice
Use of UniDesk Code of Practice Introduction This code of practice outlines the support mechanisms in place for the security of the UniDesk service. References are made to Exchange, EASE, Shibboleth, Identity
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
The Lattice Project: A Multi-Model Grid Computing System. Center for Bioinformatics and Computational Biology University of Maryland
The Lattice Project: A Multi-Model Grid Computing System Center for Bioinformatics and Computational Biology University of Maryland Parallel Computing PARALLEL COMPUTING a form of computation in which
Single Sign-On for the UQ Web
Single Sign-On for the UQ Web David Gwynne Infrastructure Architect, ITIG, EAIT Taxonomy Authentication - Verification that someone is who they claim to be - ie, only the relevant user
MDSplus Automated Build and Distribution System
PSFC/JA-13-23 MDSplus Automated Build and Distribution System Fredian T.W., Stillerman J.A.*, Manduchi G.** * Plasma Science and Fusion Center, MIT ** Consorzio RFX, Euratom-ENEA Association, Padova,Italy
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations
APIS CARM NG Quick Start Guide for MS Windows
APIS CARM NG Quick Start Guide for MS Windows The information contained in this document may be changed without advance notice and represents no obligation on the part of the manufacturer. The software
Red Hat Enterprise Identity (IPA) Centralized Management of Identities & Authentication
Red Hat Enterprise Identity (IPA) Centralized of Identities & Authentication Dmitri Pal Sr. Engineering Manager, Red Hat Inc. Robert Crittenden Sr. Engineer, Red Hat Inc. 05/06/11 Agenda What is IPA? Main
Roberto Barbera. Centralized bookkeeping and monitoring in ALICE
Centralized bookkeeping and monitoring in ALICE CHEP INFN 2000, GRID 10.02.2000 WP6, 24.07.2001 Roberto 1 Barbera ALICE and the GRID Phase I: AliRoot production The GRID Powered by ROOT 2 How did we get
Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management
Security Comparison Critical Issues with Lotus Notes and Domino 8.5 Password Authentication, Security and Management PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309
