Overcoming Barriers to Federation and Making IdPs Easier

Size: px
Start display at page:

Download "Overcoming Barriers to Federation and Making IdPs Easier"

Transcription

1 Overcoming Barriers to Federation and Making IdPs Easier Paul Caskey, Internet2 Janemarie Duh, Lafayette College Chris Phillips, CANARIE David Walker, Internet2

2 Overview Barriers to Deploying an IdP and the InCommon Alternative IdPs Working Group IdP Installer: An Approach to Overcoming the Barriers Discussion

3 Barriers to Deploying Shibboleth Enterprise IT environment Lack of a Java platform Expertise not available Java and Linux Discomfort editing xml files directly Keystores Lack of staff resources Strategy for insourcing vs. outsourcing May affect flexibility and resource availability

4 Barriers to Deploying Shibboleth Other barriers, real and perceived Lack of business case/value statement Lack of resources (e.g., other higher priorities) Existing IAM infrastructure (technical and policy) not suitable Shibboleth and federation are hard

5 The Alternative IdPs Working Group Identity Provider Strategies for Common Campus Environments Final report examines alternative IdP strategies to running Shibboleth in-house While a locally- operated Shibboleth Identity Provider (IdP) continues to provide the greatest capability and flexibility for an institution s current and future federation needs, there are alternatives that may be better suited to a specific institution s: computing environment (e.g., Java, LAMP, Active Directory) available resources and expertise, and strategy with respect to insourcing or outsourcing of IT infrastructure.

6 Alternatives Assessed In-house Shibboleth SimpleSAMLphp ADFS Outsourced Shibboleth Vendor proprietary CAS with outsourced IdP Google Apps gateway Vendor supported on insourced infrastructure Hub and spoke

7 Assessment Criteria Technical InCommon s recommended technical basics Attribute release Entity categories AuthN contexts (MFA and assurance) ECP User consent Operational Expertise required Resources required Care and feeding required Applicable environments Pros Cons

8 Selecting a Strategy Choice of IdP software depends largely on your supported IT environment Java: Shibboleth LAMP: SimpleSAMLphp Active Directory: ADFS Carefully consider current and future needs Institutional preference for in-house or outsourced solutions

9 Selecting a Strategy However Shibboleth tends to be the most capable ADFS, particularly, is missing functionality for higher education Its focus is bilateral federation, as opposed to multilateral, so federation partners tend to require individual configuration crafting May want to consider outsourced support for AD environments

10 Prerequisites for Any Strategy Managing the service and/or vendor Operating an IAMS Developing and maintaining IdM policy IdM governance and alignment with institutional goals

11 Recommendations to Facilitate Deployment of IdPs in Higher Ed In the report are a number of recommendations for InCommon, TIER, and the community Create appliances for insourced operation including CANARIE/SWAMID IdP Installer tool with configurations pre-built for InCommon Conduct outreach to those institutions that are not engaged in federation and would not know that alternatives for an IdP exist

12 Recommendations to Facilitate Deployment of IdPs in Higher Ed Develop criteria for assessing service vendors and identify then assess them Author a cookbook, in collaboration with other federations, on deploying IdP strategies Develop a mentor program Identify and facilitate ways for members to get consultant help without administrative overhead

13 Easier Federated Identity: the CANARIE Perspective Chris Phillips Internet2 Technology Exchange October 6, 2015

14 What federated identity problems are we targeting? > Barriers to adoption > Operation complexity 14

15 The Approach > Enable sites to install a reference IdP implementation Quickly Low ongoing effort > Features: A tested set of software components The right aggregates for trust in the federation Support for multiple back-end authentication methods Appropriate base set of attribute mappings Base attribute release policies 15

16 IdP Installer > What does it do? Software that auto-installs and configures IdP server components Easier connection to identity servers Supports eduroam and Shibboleth > Benefits Shibboleth Identity Provider Software Servlet Container JDK eduroam FreeRADIUS software Operating System Fewer steps Hides technical complexity from operator IdP Installer 16

17 IdP Installer: Why this blend of tools? > Latest reference components > Simplifies everything: documentation, configuration, diagnosis, support IdP Installer V AuthN: LDAP, AD, CAS Client eduroam V V V. 1.8 V. 7 V LTS 17

18 Usual Deployment Profile > CANARIE recommends 2 servers: Test/pre-production Production > Sites usually deploy one service per server (eduroam, Shibboleth) Test/pre-production, then use this to go live Create test server and operate as needed > Installer also supports the Federation Operator Easier to ensure success for community - fewer install errors Fewer support calls One smarter tool supporting our services rather than multiple tools 18

19 IdP Server Update Options Are you running an up-to-date OS? Yes Upgrade. > Use Shibboleth tools No Clean Install. > Use CANARIE tools > Fastest method 19

20 Installation Process 1. Download installer 2. Plan & prepare installation 4. Postinstallation tailoring 3. Install 5. Local acceptance testing 6. Contact CANARIE to complete registration > Benefits: Fewer Steps Federation Preconfigured Rapidly Deployed Proven Interop Hides Complexity 20

21 Automation makes things faster. Baseline 2. Plan & prepare installation 1. Download installer 4. Postinstallation tailoring 3. Install 5. Local acceptance testing 6. Contact CANARIE to complete registration Planning ~ ½ to 1 person day effort Post installation: ~ ¼ to 2 person effort 1st time through installation (testing) Testing: ~ ½ to 2 person day effort Influencing factors: Complexity of customizations (i.e.more than a logo?) Readiness of resources (e.g. vm, firewall settings) Full time and attention or not nd 2 & subsequent times through installation (production) Produces portable configuration file Time reduction re-uses portable configuration Can run headless for automated install 21

22 Interview Style Configuration Builder Pick and choose components Branded interface Imports previous settings 1-click headless install Embedded context help Color cues for required fields 22

23 IdP Installer Uptake > 10+ production sites in first 90 days of availability > Helped key collaboration project bootstrap 4 sites in a few weeks > To be integral part of Shib v3 migration tools 23

24 Opportunities for Collaboration > Help enhance current iteration for Shibboleth v3.x > Help implement the incommon build 24

25

26 Detailed Software Matrix (Reference) Orange indicates change from previous Offers reference component combination Evolves as community evolves 26

27 In Closing... Everything s going to be wonderful. Image source: 27

Multi-Factor Authentication, Assurance, and the Multi-Context Broker

Multi-Factor Authentication, Assurance, and the Multi-Context Broker Multi-Factor Authentication, Assurance, and the Multi-Context Broker IAM Online April 30, 2014 Keith Wessel, University of Illinois, Urbana-Champaign David Langenberg, University of Chicago David Walker,

More information

TRUST AND IDENTITY EXCHANGE TALK

TRUST AND IDENTITY EXCHANGE TALK TRUST AND IDENTITY EXCHANGE TALK Ken Klingenstein, Internet2 2015 Internet2 Trust and Identity Why It Matters An Identity Layer for the Internet Benefits for the Rest of the Stack What It Is Technologies

More information

New InCommon Working Groups

New InCommon Working Groups New InCommon Working Groups IAM Online August 13, 2014 Steve Carmody, Brown University Paul Caskey, University of Texas System Janemarie Duh, Lafayette College Keith Hazelton, University of Wisconsin Madison

More information

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant

Easy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources

Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Paul Riddle University of Maryland Baltimore County EDUCAUSE Mid-Atlantic Regional Conference January 16, 2008 Copyright

More information

Foundations for your. portable cloud

Foundations for your. portable cloud Foundations for your portable cloud Start Today Red Hat s cloud vision is unlike that of any other IT vendor. We recognize that IT infrastructure is and will continue to be composed of pieces from many

More information

Multi-Factor Authentication: All in This Together

Multi-Factor Authentication: All in This Together Multi-Factor Authentication: All in This Together Host: Tom Barton, University of Chicago Speakers: IAM Online September 11, 2013 Eric Goodman, University of California Office of the President Mike Grady,

More information

SD Departmental Meeting November 28 th, 2006. Ale de Vries Product Manager ScienceDirect Elsevier

SD Departmental Meeting November 28 th, 2006. Ale de Vries Product Manager ScienceDirect Elsevier ש בולת SD Departmental Meeting November 28 th, 2006 Ale de Vries Product Manager ScienceDirect Elsevier Shi... whát? : Shibboleth ש בולת [...] "stream, torrent". It derives from a story in the Hebrew Bible,

More information

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1

Provisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1 Item Count Provisioning/Deprovisioning Automated Deprovisioning 1 Automated on/off boarding from an authoritative source AUTOMATED [DE-]PROVISIONING 1 Removal of resources at the appropriate time 1 Timeliness

More information

Using Shibboleth for Single Sign- On

Using Shibboleth for Single Sign- On Using Shibboleth for Single Sign- On One Logon to Rule them all.. Kirk Yaros Director, Enterprise Services Mott Community College 1 Agenda Overview of Mott Overview of Shibboleth and Mott s Project Review

More information

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security

Secure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security Secure WiFi Access in Schools and Educational Institutions WPA2 / 802.1X and Captive Portal based Access Security Cloudessa, Inc. Palo Alto, CA July 2013 Overview The accelerated use of technology in the

More information

RFP BOR-1511 Federated Identity Services - Response to Questions / Answers

RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Q # 1 RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Under Technical Requirements the following requirement is listed: 2. The solution is cloud-based softwareas-a-service, requiring

More information

HP Server Automation Standard

HP Server Automation Standard Data sheet HP Server Automation Standard Lower-cost edition of HP Server Automation software Benefits Time to value: Instant time to value especially for small-medium deployments Lower initial investment:

More information

Identity and Access Management for Federated Resource Sharing: Shibboleth Stories

Identity and Access Management for Federated Resource Sharing: Shibboleth Stories Identity and Access Management for Federated Resource Sharing: Shibboleth Stories http://arch.doit.wisc.edu/keith/apan/ apanshib-060122-01.ppt Keith Hazelton (hazelton@doit.wisc.edu) Sr. IT Architect,

More information

Build A private PaaS. www.redhat.com

Build A private PaaS. www.redhat.com Build A private PaaS WITH Red Hat CloudForms and JBoss Enterprise Middleware www.redhat.com Introduction Platform-as-a-service (PaaS) is a cloud service model that provides consumers 1 with services for

More information

Integrating Multi-Factor Authentication into Your Campus Identity Management System

Integrating Multi-Factor Authentication into Your Campus Identity Management System Integrating Multi-Factor Authentication into Your Campus Identity Management System Mike Grady, Unicon David Walker, Internet2 (both associated with the Internet2 Scalable Privacy Project) Agenda Multi-Context

More information

Tips and Best Practices for Managing a Private Cloud

Tips and Best Practices for Managing a Private Cloud Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies

More information

Billing and Payment with the Elastic Path Ecommerce Platform

Billing and Payment with the Elastic Path Ecommerce Platform Billing and Payment with the Elastic Path Ecommerce Platform The Elastic Path Ecommerce Platform As the industry s most open and flexible ecommerce platform, Elastic Path is the right solution for large

More information

Authentication Integration

Authentication Integration Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication

More information

Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet

Разработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet Разработка программного обеспечения промежуточного слоя TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet Contents - SURFnet Middleware Services department: - eduroam, SURFfederatie,

More information

ADT Plugin for Eclipse

ADT Plugin for Eclipse ADT Plugin for Eclipse Android Development Tools (ADT) is a plugin for the Eclipse IDE that is designed to give you a powerful, integrated environment in which to build Android applications. ADT extends

More information

SAML SSO Configuration

SAML SSO Configuration SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting

More information

Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015

Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015 Federation At Fermilab Al Lilianstrom National Laboratories Information Technology Summit May 2015 About Fermilab Since 1967, Fermilab has worked to answer fundamental questions and enhance our understanding

More information

10.04 LTS Server Edition

10.04 LTS Server Edition 10.04 LTS Server Edition The secret s out Ubuntu used to be the data centre s best kept secret. But now everybody s talking about it. WETA Digital, Qualcomm, Wikipedia, Agora Games, The French Police

More information

SUSE Manager. A Comprehensive Linux Server Management the Linux Way. Name. Title Email

SUSE Manager. A Comprehensive Linux Server Management the Linux Way. Name. Title Email SUSE Manager A Comprehensive Linux Server Management the Linux Way Name Title Email Agenda 2 Product Overview Features and Functionality Management Module Provisioning Module Monitoring Roadmap Pricing

More information

Are Passwords Passé?

Are Passwords Passé? Are Passwords Passé? Deployment Strategies for Multifactor Authentication IAM Online December 10, 2014 Mike Grady, Scalable Privacy Project David Walker, Scalable Privacy Project Thank you to InCommon

More information

QuickStart Guide for Managing Mobile Devices. Version 9.2

QuickStart Guide for Managing Mobile Devices. Version 9.2 QuickStart Guide for Managing Mobile Devices Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF

More information

UW System Identity & Access Management (IAM) Recommended Strategic Roadmap

UW System Identity & Access Management (IAM) Recommended Strategic Roadmap UW System Identity & Access Management (IAM) Recommended Strategic Roadmap Fall 2015 ITMC (Rev 1/11) Our challenge CIOs charged IAM-TAG with recommending an IAM strategy that would: Establish an identity

More information

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments

Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable

More information

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications

Federated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management and Shibboleth Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management Management of digital identity/credentials (username/password) Access

More information

A Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR

A Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR A Shibboleth View of Federated Identity Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR Short Section Title Agenda Assumptions and Trends Identity Management and Shibboleth Shibboleth

More information

Landscape Design and Integration. SAP Mobile Platform 3.0 SP02

Landscape Design and Integration. SAP Mobile Platform 3.0 SP02 Landscape Design and Integration SAP Mobile Platform 3.0 SP02 DOCUMENT ID: DC01916-01-0302-01 LAST REVISED: February 2014 Copyright 2014 by SAP AG or an SAP affiliate company. All rights reserved. No part

More information

G Cloud 6 CDG Service Definition for Forgerock Software Services

G Cloud 6 CDG Service Definition for Forgerock Software Services G Cloud 6 CDG Service Definition for Forgerock Software Services Author: CDG Date: October 2015 Table of Contents Table of Contents 2 1.0 Service Definition 3 1.0 Service Definition Forgerock as a Platform

More information

<Insert Picture Here> PaaS is the Remedy for VM Hangover

<Insert Picture Here> PaaS is the Remedy for VM Hangover PaaS is the Remedy for VM Hangover Girish Venkat CISSP Solutions Specialist Manager, Oracle Public Sector The following is intended to outline our general product direction. It is

More information

<Insert Picture Here> Oracle VM and Cloud Computing

<Insert Picture Here> Oracle VM and Cloud Computing Oracle VM and Cloud Computing Paulo Bosco Otto Sales Consultant paulo.bosco.otto@oracle.com The following is intended to outline our general product direction. It is intended for

More information

Cisco Data Preparation

Cisco Data Preparation Data Sheet Cisco Data Preparation Unleash your business analysts to develop the insights that drive better business outcomes, sooner, from all your data. As self-service business intelligence (BI) and

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

Accenture Field Force Transformation

Accenture Field Force Transformation Accenture Field Force Transformation What holds your field service workers back? Overcoming Frequent Field Force Challenges Many organizations have invested in office-based workforce management systems

More information

Izenda & SQL Server Reporting Services

Izenda & SQL Server Reporting Services Izenda & SQL Server Reporting Services Comparing an IT-Centric Reporting Tool and a Self-Service Embedded BI Platform vv Izenda & SQL Server Reporting Services The reporting tools that come with the relational

More information

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.0

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.0 JAMF Software Server Installation and Configuration Guide for OS X Version 9.0 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide

More information

Invest in your business with Ubuntu Advantage.

Invest in your business with Ubuntu Advantage. Invest in your business with Ubuntu Advantage. Expert advice. Specialist tools. Dedicated support. Introducing Ubuntu Advantage Contents 02 Introducing Ubuntu Advantage 03 Ubuntu Advantage 04 - Landscape

More information

RayManageSoft. infinity. The new generation of Application Lifecycle Management

RayManageSoft. infinity. The new generation of Application Lifecycle Management The new generation of Application Lifecycle Management RayManageSoft Appliance The new solution for small and medium businesses IT administrators today face many challenges in their desktop and security

More information

An Oracle White Paper August 2011. Oracle VM 3: Application-Driven Virtualization

An Oracle White Paper August 2011. Oracle VM 3: Application-Driven Virtualization An Oracle White Paper August 2011 Oracle VM 3: Application-Driven Virtualization Introduction Virtualization has experienced tremendous growth in the datacenter over the past few years. Recent Gartner

More information

Build Modern Apps with Today s BPM

Build Modern Apps with Today s BPM Build Modern Apps Build Modern Apps with Today s BPM What makes the top organisations stand out? If you study those that consistently excel, you ll find a mastery of their business processes and often

More information

We apologize for the confusion and any inconvenience.

We apologize for the confusion and any inconvenience. We inadvertently missed some questions regarding the Website Design RF. Those missed questions have been addressed and are on the next page with the original post of uestions and nswers immediately following.

More information

Hard Partitioning and Virtualization with Oracle Virtual Machine. An approach toward cost saving with Oracle Database licenses

Hard Partitioning and Virtualization with Oracle Virtual Machine. An approach toward cost saving with Oracle Database licenses Hard Partitioning and Virtualization with Oracle Virtual Machine An approach toward cost saving with Oracle Database licenses JANUARY 2013 Contents Introduction... 2 Hard Partitioning Concepts... 2 Oracle

More information

Features & Benefits Summary. The Ulitmate Platform for Business Process Customization

Features & Benefits Summary. The Ulitmate Platform for Business Process Customization SuiteFlex the NetSuite Application Development Platform: Application Customization Creation of New Third Party Vertical Applications Business Process Management SuiteFlex includes: SuiteScript Programming

More information

Oracle Fusion Middleware 11g Release 1 IDM Suite

Oracle Fusion Middleware 11g Release 1 IDM Suite Oracle Fusion Middleware 11g Release 1 IDM Suite Rodger King Senior Principal Support Engineer The following is intended to outline our general product direction. It is intended for information purposes

More information

Guideline on Implementing Cloud Identity and Access Management

Guideline on Implementing Cloud Identity and Access Management CMSGu2013-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Implementing Cloud Identity and Access Management National

More information

Only Athena provides complete command over these common enterprise mobility needs.

Only Athena provides complete command over these common enterprise mobility needs. Mobile devices offer great potential for making your enterprise run faster, smarter, and more profitably. However, mobile devices can create considerable challenges for your IT organization, since they

More information

Ellucian CRM: platform overview

Ellucian CRM: platform overview Ellucian CRM: platform overview Enterprise-class, higher education-specific Built for higher education Ellucian CRM is designed for colleges and universities and provides higher education-specific business

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data

More information

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2 JAMF Software Server Installation and Configuration Guide for Linux Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide

More information

AD Integration options for Linux Systems

AD Integration options for Linux Systems AD Integration options for Linux Systems Overview Dmitri Pal Developer Conference. Brno. 2013 Agenda Problem statement Aspects of integration Options Questions Problem Statement For most companies AD is

More information

Using Managed Services As A Software Delivery Model In Canadian Health Care

Using Managed Services As A Software Delivery Model In Canadian Health Care Using Managed Services As A Software Delivery Model In Canadian Health Care September 9, 2005 Authors: Darren Jones Darcy Matras INTRODUCTION... 3 MANAGED SERVICES DEFINED... 4 MANAGED SERVICES OVERVIEW...

More information

JAMF Software Server Installation and Configuration Guide for Windows. Version 9.3

JAMF Software Server Installation and Configuration Guide for Windows. Version 9.3 JAMF Software Server Installation and Configuration Guide for Windows Version 9.3 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this

More information

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.2

JAMF Software Server Installation and Configuration Guide for OS X. Version 9.2 JAMF Software Server Installation and Configuration Guide for OS X Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide

More information

Federated Identity Management and Shibboleth: Policy and Technology for Collaboration

Federated Identity Management and Shibboleth: Policy and Technology for Collaboration Federated Identity Management and Shibboleth: Policy and Technology for Collaboration Marianne Colgrove, Deputy CTO, Reed Joel Cooper, Director of Information Technology Services, Carleton John O Keefe,

More information

Jitterbit Technical Overview : Microsoft Dynamics CRM

Jitterbit Technical Overview : Microsoft Dynamics CRM Jitterbit allows you to easily integrate Microsoft Dynamics CRM with any cloud, mobile or on premise application. Jitterbit s intuitive Studio delivers the easiest way of designing and running modern integrations

More information

JAVA WEB START OVERVIEW

JAVA WEB START OVERVIEW JAVA WEB START OVERVIEW White Paper May 2005 Sun Microsystems, Inc. Table of Contents Table of Contents 1 Introduction................................................................. 1 2 A Java Web Start

More information

PingFederate. Identity Menu Builder. User Guide. Version 1.0

PingFederate. Identity Menu Builder. User Guide. Version 1.0 Identity Menu Builder Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Identity Menu Builder User Guide Version 1.0 April, 2011 Ping Identity Corporation 1099 18th Street, Suite

More information

InCommon Partnership Models and Trust Fabrics. Mark Johnson Mark Scheible Ann West John Krienke David Walker

InCommon Partnership Models and Trust Fabrics. Mark Johnson Mark Scheible Ann West John Krienke David Walker InCommon Partnership Models and Trust Fabrics Mark Johnson Mark Scheible Ann West John Krienke David Walker Overview and Motivation Accelerate development of a business model that supports CAIs MCNC offered

More information

Oracle Policy Automation A Modern Enterprise Policy Automation Solution

Oracle Policy Automation A Modern Enterprise Policy Automation Solution Oracle Policy Automation A Modern Enterprise Policy Automation Solution Features and Benefits February 2015 Copyright 2014 Oracle and/or its affiliates. All rights reserved. Program Agenda 1 2 3 Overview

More information

Easy Wireframing with

Easy Wireframing with Easy Wireframing with Simplifying design streamlining development Pidoco is a cost-effective and time-saving solution for developing successful software applications without the usual project risks. Developing

More information

Enterprise Portal Built by and for Higher Education

Enterprise Portal Built by and for Higher Education www.apereo.org/uportal Enterprise Portal Built by and for Higher Education Now Responsive for All Devices along with Native App Experience There is a growing demand for higher education institutions to

More information

Monitoring Experience Redefined

Monitoring Experience Redefined Key Benefits of Aqualogic Monitoring System Aqualogic Monitoring System Monitoring Experience Redefined Agent less monitoring saves time and ensures system availability Avoid additional time and cost on

More information

Introduction to SAML

Introduction to SAML Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments

More information

Ubuntu and Hadoop: the perfect match

Ubuntu and Hadoop: the perfect match WHITE PAPER Ubuntu and Hadoop: the perfect match February 2012 Copyright Canonical 2012 www.canonical.com Executive introduction In many fields of IT, there are always stand-out technologies. This is definitely

More information

Is Your Mobile Application Ready For Business?

Is Your Mobile Application Ready For Business? Is Your Mobile Application Ready For Business? It is clear that mobile technologies will transform the enterprise. The simple math is that if information and communications are available at any place and

More information

<Insert Picture Here> Infrastructure as a Service (IaaS) Cloud Computing for Enterprises

<Insert Picture Here> Infrastructure as a Service (IaaS) Cloud Computing for Enterprises Infrastructure as a Service (IaaS) Cloud Computing for Enterprises Speaker Title The following is intended to outline our general product direction. It is intended for information

More information

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication

More information

Transforming Control System to a Virtualized Platform, including On Process Migration. Anneke Vemer ExxonMobil

Transforming Control System to a Virtualized Platform, including On Process Migration. Anneke Vemer ExxonMobil Transforming Control System to a Virtualized Platform, including On Process Migration Anneke Vemer ExxonMobil ARC conference, Antwerp, 5-Mar-2013 Cleared ExxonMobil External Technical Publication 2013.1104

More information

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010

Oracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010 Oracle Platform Security Services & Authorization Policy Manager Vinay Shukla July 2010 The following is intended to outline our general product direction. It is intended for information purposes only,

More information

Mitigating Risks and Monitoring Activity for Database Security

Mitigating Risks and Monitoring Activity for Database Security The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring

More information

owncloud Architecture Overview

owncloud Architecture Overview owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443

More information

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD

IDENTITY & ACCESS MANAGEMENT IN THE CLOUD IDENTITY & ACCESS MANAGEMENT IN THE CLOUD www.wipro.com Niraj Kumar Shukla Table of Contents 3... 1. Introduction 3... 2. IAM Approach 4... 2.1. Phase I - Plan 4...2.1.1. Understanding the Environment

More information

SOA REFERENCE ARCHITECTURE: WEB TIER

SOA REFERENCE ARCHITECTURE: WEB TIER SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible

More information

More than 90% of small- and mediumsize

More than 90% of small- and mediumsize NOT BIG ENOUGH FOR? THINK AGAIN! Survey shows SMBs reap the same benefits as the enterprise, including reduced costs, improved reliability and disaster recovery, and a measurable ROI. More than 90% of

More information

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you

p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?

More information

Information Technology Services

Information Technology Services Information Technology Services The purpose of an Information Technology Standard is to specify requirements for compliance with Old Dominion University Information Technology policies, other University

More information

Virtualization, SDN and NFV

Virtualization, SDN and NFV Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,

More information

globus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory

globus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory globus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory Types of integration Resource integration Connect campus, project,

More information

Avaya Aura Orchestration Designer

Avaya Aura Orchestration Designer Avaya Aura Orchestration Designer Avaya Aura Orchestration Designer is a unified service creation environment for faster, lower cost design and deployment of voice and multimedia applications and agent

More information

Hitting Your Numbers. Creating Sales Excellence with Commercial Open Source CRM BREAK AWAY

Hitting Your Numbers. Creating Sales Excellence with Commercial Open Source CRM BREAK AWAY Hitting Your Numbers Creating Sales Excellence with Commercial Open Source CRM BREAK AWAY It is already a given that a CRM system can help drive sales performance. So the decision to be made now is which

More information

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper

White Pages Managed Service Solution Rapid Global Directory Implementation. White Paper White Pages Managed Service Solution Rapid Global Directory Implementation White Paper December 2014 Author: Tom Eggleston Version: 1.0 Status: FINAL Reference: DA-WP01 Creation Date: 03/12/14 Revision

More information

An Oracle White Paper October 2009. Frequently Asked Questions for Oracle Forms 11g

An Oracle White Paper October 2009. Frequently Asked Questions for Oracle Forms 11g An Oracle White Paper October 2009 Frequently Asked Questions for Oracle Forms 11g Disclaimer The following is intended to outline our general product direction. It is intended for information purposes

More information

Avanade Whitepaper. Rethink application possibilities and align to desired business outcomes

Avanade Whitepaper. Rethink application possibilities and align to desired business outcomes Avanade Whitepaper Rethink application possibilities and align to desired business outcomes December 2013 Table of contents 03 Executive summary 04 Scope of research and methodology 05 Summary of key findings

More information

Hosted, Installed, or Hybrid: Emergency Notification Deployment - Cost Benefit Analysis

Hosted, Installed, or Hybrid: Emergency Notification Deployment - Cost Benefit Analysis Technical Whitepaper Hosted, Installed, or Hybrid: Emergency Notification Deployment - Cost Benefit Analysis Table of Contents Intelligent Notification in the Enterprise...1 Hosted Service vs. Deliverable

More information

Tech Titans: Lock it down, securing your Costpoint 7 deployments. Drew Roman, IT Solutions Director WJ Technologies L.L.C. GC-518

Tech Titans: Lock it down, securing your Costpoint 7 deployments. Drew Roman, IT Solutions Director WJ Technologies L.L.C. GC-518 Tech Titans: Lock it down, securing your Costpoint 7 deployments Drew Roman, IT Solutions Director WJ Technologies L.L.C. GC-518 Agenda Agenda Overview The Basics of Secure Deployment Database Application

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2005 Recognition Awards Enterprise Architecture Category Executive

More information

BROCADE PERFORMANCE MANAGEMENT SOLUTIONS

BROCADE PERFORMANCE MANAGEMENT SOLUTIONS Data Sheet BROCADE PERFORMANCE MANAGEMENT SOLUTIONS SOLUTIONS Managing and Optimizing the Performance of Mainframe Storage Environments HIGHLIGHTs Manage and optimize mainframe storage performance, while

More information

vsphere Upgrade vsphere 6.0 EN-001721-03

vsphere Upgrade vsphere 6.0 EN-001721-03 vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police

Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive

More information

IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities.

IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities. Application integration solutions To support your IT objectives IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities. Market conditions and business

More information

Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase

Federations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase Authentication and Authorisation for Research and Collaboration Federations 101 An Introduction to Federated Identity Management Peter Gietz, Martin Haase AARC NA2 Task 2 - Outreach and Dissemination DAASI

More information

David Corriveau, CEO Radix Technologies. Copyright 2011 Radix Technologies

David Corriveau, CEO Radix Technologies. Copyright 2011 Radix Technologies Infrastructure Management and Cloud David Corriveau, CEO Radix Technologies Infrastructure Management and Cloud IaaS Cloud Infrastructure Services Private Cloud Reduce Cost of Infrastructure How does IaaSReduce

More information

RESEARCH NOTE THE EVOLVING BUSINESS CASE FOR TIER-1 ERP IN MIDSIZE COMPANIES

RESEARCH NOTE THE EVOLVING BUSINESS CASE FOR TIER-1 ERP IN MIDSIZE COMPANIES RESEARCH NOTE THE EVOLVING BUSINESS CASE FOR TIER-1 ERP IN MIDSIZE COMPANIES THE BOTTOM LINE Today, usability improvements and rapid implementation tools that simplify deployments make enterprise applications

More information

Secure the Web: OpenSSO

Secure the Web: OpenSSO Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based

More information

SAP Mobile Platform rapid-deployment solution

SAP Mobile Platform rapid-deployment solution SAP Mobile Platform rapid-deployment solution V6.30 Customer Contents Overview Scope Deployment of SAP Mobile Platform Network, Security and Push of SAP Mobile Platform Operational Maintenance of SAP Mobile

More information