Overcoming Barriers to Federation and Making IdPs Easier
|
|
- Janis Craig
- 8 years ago
- Views:
Transcription
1 Overcoming Barriers to Federation and Making IdPs Easier Paul Caskey, Internet2 Janemarie Duh, Lafayette College Chris Phillips, CANARIE David Walker, Internet2
2 Overview Barriers to Deploying an IdP and the InCommon Alternative IdPs Working Group IdP Installer: An Approach to Overcoming the Barriers Discussion
3 Barriers to Deploying Shibboleth Enterprise IT environment Lack of a Java platform Expertise not available Java and Linux Discomfort editing xml files directly Keystores Lack of staff resources Strategy for insourcing vs. outsourcing May affect flexibility and resource availability
4 Barriers to Deploying Shibboleth Other barriers, real and perceived Lack of business case/value statement Lack of resources (e.g., other higher priorities) Existing IAM infrastructure (technical and policy) not suitable Shibboleth and federation are hard
5 The Alternative IdPs Working Group Identity Provider Strategies for Common Campus Environments Final report examines alternative IdP strategies to running Shibboleth in-house While a locally- operated Shibboleth Identity Provider (IdP) continues to provide the greatest capability and flexibility for an institution s current and future federation needs, there are alternatives that may be better suited to a specific institution s: computing environment (e.g., Java, LAMP, Active Directory) available resources and expertise, and strategy with respect to insourcing or outsourcing of IT infrastructure.
6 Alternatives Assessed In-house Shibboleth SimpleSAMLphp ADFS Outsourced Shibboleth Vendor proprietary CAS with outsourced IdP Google Apps gateway Vendor supported on insourced infrastructure Hub and spoke
7 Assessment Criteria Technical InCommon s recommended technical basics Attribute release Entity categories AuthN contexts (MFA and assurance) ECP User consent Operational Expertise required Resources required Care and feeding required Applicable environments Pros Cons
8 Selecting a Strategy Choice of IdP software depends largely on your supported IT environment Java: Shibboleth LAMP: SimpleSAMLphp Active Directory: ADFS Carefully consider current and future needs Institutional preference for in-house or outsourced solutions
9 Selecting a Strategy However Shibboleth tends to be the most capable ADFS, particularly, is missing functionality for higher education Its focus is bilateral federation, as opposed to multilateral, so federation partners tend to require individual configuration crafting May want to consider outsourced support for AD environments
10 Prerequisites for Any Strategy Managing the service and/or vendor Operating an IAMS Developing and maintaining IdM policy IdM governance and alignment with institutional goals
11 Recommendations to Facilitate Deployment of IdPs in Higher Ed In the report are a number of recommendations for InCommon, TIER, and the community Create appliances for insourced operation including CANARIE/SWAMID IdP Installer tool with configurations pre-built for InCommon Conduct outreach to those institutions that are not engaged in federation and would not know that alternatives for an IdP exist
12 Recommendations to Facilitate Deployment of IdPs in Higher Ed Develop criteria for assessing service vendors and identify then assess them Author a cookbook, in collaboration with other federations, on deploying IdP strategies Develop a mentor program Identify and facilitate ways for members to get consultant help without administrative overhead
13 Easier Federated Identity: the CANARIE Perspective Chris Phillips Internet2 Technology Exchange October 6, 2015
14 What federated identity problems are we targeting? > Barriers to adoption > Operation complexity 14
15 The Approach > Enable sites to install a reference IdP implementation Quickly Low ongoing effort > Features: A tested set of software components The right aggregates for trust in the federation Support for multiple back-end authentication methods Appropriate base set of attribute mappings Base attribute release policies 15
16 IdP Installer > What does it do? Software that auto-installs and configures IdP server components Easier connection to identity servers Supports eduroam and Shibboleth > Benefits Shibboleth Identity Provider Software Servlet Container JDK eduroam FreeRADIUS software Operating System Fewer steps Hides technical complexity from operator IdP Installer 16
17 IdP Installer: Why this blend of tools? > Latest reference components > Simplifies everything: documentation, configuration, diagnosis, support IdP Installer V AuthN: LDAP, AD, CAS Client eduroam V V V. 1.8 V. 7 V LTS 17
18 Usual Deployment Profile > CANARIE recommends 2 servers: Test/pre-production Production > Sites usually deploy one service per server (eduroam, Shibboleth) Test/pre-production, then use this to go live Create test server and operate as needed > Installer also supports the Federation Operator Easier to ensure success for community - fewer install errors Fewer support calls One smarter tool supporting our services rather than multiple tools 18
19 IdP Server Update Options Are you running an up-to-date OS? Yes Upgrade. > Use Shibboleth tools No Clean Install. > Use CANARIE tools > Fastest method 19
20 Installation Process 1. Download installer 2. Plan & prepare installation 4. Postinstallation tailoring 3. Install 5. Local acceptance testing 6. Contact CANARIE to complete registration > Benefits: Fewer Steps Federation Preconfigured Rapidly Deployed Proven Interop Hides Complexity 20
21 Automation makes things faster. Baseline 2. Plan & prepare installation 1. Download installer 4. Postinstallation tailoring 3. Install 5. Local acceptance testing 6. Contact CANARIE to complete registration Planning ~ ½ to 1 person day effort Post installation: ~ ¼ to 2 person effort 1st time through installation (testing) Testing: ~ ½ to 2 person day effort Influencing factors: Complexity of customizations (i.e.more than a logo?) Readiness of resources (e.g. vm, firewall settings) Full time and attention or not nd 2 & subsequent times through installation (production) Produces portable configuration file Time reduction re-uses portable configuration Can run headless for automated install 21
22 Interview Style Configuration Builder Pick and choose components Branded interface Imports previous settings 1-click headless install Embedded context help Color cues for required fields 22
23 IdP Installer Uptake > 10+ production sites in first 90 days of availability > Helped key collaboration project bootstrap 4 sites in a few weeks > To be integral part of Shib v3 migration tools 23
24 Opportunities for Collaboration > Help enhance current iteration for Shibboleth v3.x > Help implement the incommon build 24
25
26 Detailed Software Matrix (Reference) Orange indicates change from previous Offers reference component combination Evolves as community evolves 26
27 In Closing... Everything s going to be wonderful. Image source: 27
Multi-Factor Authentication, Assurance, and the Multi-Context Broker
Multi-Factor Authentication, Assurance, and the Multi-Context Broker IAM Online April 30, 2014 Keith Wessel, University of Illinois, Urbana-Champaign David Langenberg, University of Chicago David Walker,
More informationTRUST AND IDENTITY EXCHANGE TALK
TRUST AND IDENTITY EXCHANGE TALK Ken Klingenstein, Internet2 2015 Internet2 Trust and Identity Why It Matters An Identity Layer for the Internet Benefits for the Rest of the Stack What It Is Technologies
More informationNew InCommon Working Groups
New InCommon Working Groups IAM Online August 13, 2014 Steve Carmody, Brown University Paul Caskey, University of Texas System Janemarie Duh, Lafayette College Keith Hazelton, University of Wisconsin Madison
More informationEasy as 1-2-3: The Steps to XE. Mark Hoye Services Portfolio Consultant
Easy as 1-2-3: The Steps to XE Mark Hoye Services Portfolio Consultant September 25, 2015 Objective / Agenda Objective Provide relevant information about Banner XE Provide a framework for understanding
More informationAuthentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
More informationFederated Identity: Leveraging Shibboleth to Access On and Off Campus Resources
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Paul Riddle University of Maryland Baltimore County EDUCAUSE Mid-Atlantic Regional Conference January 16, 2008 Copyright
More informationFoundations for your. portable cloud
Foundations for your portable cloud Start Today Red Hat s cloud vision is unlike that of any other IT vendor. We recognize that IT infrastructure is and will continue to be composed of pieces from many
More informationMulti-Factor Authentication: All in This Together
Multi-Factor Authentication: All in This Together Host: Tom Barton, University of Chicago Speakers: IAM Online September 11, 2013 Eric Goodman, University of California Office of the President Mike Grady,
More informationSD Departmental Meeting November 28 th, 2006. Ale de Vries Product Manager ScienceDirect Elsevier
ש בולת SD Departmental Meeting November 28 th, 2006 Ale de Vries Product Manager ScienceDirect Elsevier Shi... whát? : Shibboleth ש בולת [...] "stream, torrent". It derives from a story in the Hebrew Bible,
More informationProvisioning and Deprovisioning 1 Provisioning/De-provisiong replacement 1
Item Count Provisioning/Deprovisioning Automated Deprovisioning 1 Automated on/off boarding from an authoritative source AUTOMATED [DE-]PROVISIONING 1 Removal of resources at the appropriate time 1 Timeliness
More informationUsing Shibboleth for Single Sign- On
Using Shibboleth for Single Sign- On One Logon to Rule them all.. Kirk Yaros Director, Enterprise Services Mott Community College 1 Agenda Overview of Mott Overview of Shibboleth and Mott s Project Review
More informationSecure WiFi Access in Schools and Educational Institutions. WPA2 / 802.1X and Captive Portal based Access Security
Secure WiFi Access in Schools and Educational Institutions WPA2 / 802.1X and Captive Portal based Access Security Cloudessa, Inc. Palo Alto, CA July 2013 Overview The accelerated use of technology in the
More informationRFP BOR-1511 Federated Identity Services - Response to Questions / Answers
Q # 1 RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Under Technical Requirements the following requirement is listed: 2. The solution is cloud-based softwareas-a-service, requiring
More informationHP Server Automation Standard
Data sheet HP Server Automation Standard Lower-cost edition of HP Server Automation software Benefits Time to value: Instant time to value especially for small-medium deployments Lower initial investment:
More informationIdentity and Access Management for Federated Resource Sharing: Shibboleth Stories
Identity and Access Management for Federated Resource Sharing: Shibboleth Stories http://arch.doit.wisc.edu/keith/apan/ apanshib-060122-01.ppt Keith Hazelton (hazelton@doit.wisc.edu) Sr. IT Architect,
More informationBuild A private PaaS. www.redhat.com
Build A private PaaS WITH Red Hat CloudForms and JBoss Enterprise Middleware www.redhat.com Introduction Platform-as-a-service (PaaS) is a cloud service model that provides consumers 1 with services for
More informationIntegrating Multi-Factor Authentication into Your Campus Identity Management System
Integrating Multi-Factor Authentication into Your Campus Identity Management System Mike Grady, Unicon David Walker, Internet2 (both associated with the Internet2 Scalable Privacy Project) Agenda Multi-Context
More informationTips and Best Practices for Managing a Private Cloud
Deploying and Managing Private Clouds The Essentials Series Tips and Best Practices for Managing a Private Cloud sponsored by Tip s and Best Practices for Managing a Private Cloud... 1 Es tablishing Policies
More informationBilling and Payment with the Elastic Path Ecommerce Platform
Billing and Payment with the Elastic Path Ecommerce Platform The Elastic Path Ecommerce Platform As the industry s most open and flexible ecommerce platform, Elastic Path is the right solution for large
More informationAuthentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
More informationРазработка программного обеспечения промежуточного слоя. TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet
Разработка программного обеспечения промежуточного слоя TERENA BASNET Workshop, 16-17 November 2009 Joost van Dijk - SURFnet Contents - SURFnet Middleware Services department: - eduroam, SURFfederatie,
More informationADT Plugin for Eclipse
ADT Plugin for Eclipse Android Development Tools (ADT) is a plugin for the Eclipse IDE that is designed to give you a powerful, integrated environment in which to build Android applications. ADT extends
More informationSAML SSO Configuration
SAML SSO Configuration Overview of Single Sign-, page 1 Benefits of Single Sign-, page 2 Overview of Setting Up SAML 2.0 Single Sign-, page 3 SAML 2.0 Single Sign- Differences Between Cloud-Based Meeting
More informationFederation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015
Federation At Fermilab Al Lilianstrom National Laboratories Information Technology Summit May 2015 About Fermilab Since 1967, Fermilab has worked to answer fundamental questions and enhance our understanding
More information10.04 LTS Server Edition
10.04 LTS Server Edition The secret s out Ubuntu used to be the data centre s best kept secret. But now everybody s talking about it. WETA Digital, Qualcomm, Wikipedia, Agora Games, The French Police
More informationSUSE Manager. A Comprehensive Linux Server Management the Linux Way. Name. Title Email
SUSE Manager A Comprehensive Linux Server Management the Linux Way Name Title Email Agenda 2 Product Overview Features and Functionality Management Module Provisioning Module Monitoring Roadmap Pricing
More informationAre Passwords Passé?
Are Passwords Passé? Deployment Strategies for Multifactor Authentication IAM Online December 10, 2014 Mike Grady, Scalable Privacy Project David Walker, Scalable Privacy Project Thank you to InCommon
More informationQuickStart Guide for Managing Mobile Devices. Version 9.2
QuickStart Guide for Managing Mobile Devices Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF
More informationUW System Identity & Access Management (IAM) Recommended Strategic Roadmap
UW System Identity & Access Management (IAM) Recommended Strategic Roadmap Fall 2015 ITMC (Rev 1/11) Our challenge CIOs charged IAM-TAG with recommending an IAM strategy that would: Establish an identity
More informationCisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments
Cisco Integrated Video Surveillance Solution: Expand the Capabilities and Value of Physical Security Investments What You Will Learn In many enterprises, physical security departments are making a notable
More informationFederated Identity Management and Shibboleth. Noreen Hogan Asst. Director Enterprise Admin. Applications
Federated Identity Management and Shibboleth Noreen Hogan Asst. Director Enterprise Admin. Applications Federated Identity Management Management of digital identity/credentials (username/password) Access
More informationA Shibboleth View of Federated Identity. Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR
A Shibboleth View of Federated Identity Steven Carmody Brown Univ./Internet2 March 6, 2007 Giornata AA - GARR Short Section Title Agenda Assumptions and Trends Identity Management and Shibboleth Shibboleth
More informationLandscape Design and Integration. SAP Mobile Platform 3.0 SP02
Landscape Design and Integration SAP Mobile Platform 3.0 SP02 DOCUMENT ID: DC01916-01-0302-01 LAST REVISED: February 2014 Copyright 2014 by SAP AG or an SAP affiliate company. All rights reserved. No part
More informationG Cloud 6 CDG Service Definition for Forgerock Software Services
G Cloud 6 CDG Service Definition for Forgerock Software Services Author: CDG Date: October 2015 Table of Contents Table of Contents 2 1.0 Service Definition 3 1.0 Service Definition Forgerock as a Platform
More information<Insert Picture Here> PaaS is the Remedy for VM Hangover
PaaS is the Remedy for VM Hangover Girish Venkat CISSP Solutions Specialist Manager, Oracle Public Sector The following is intended to outline our general product direction. It is
More information<Insert Picture Here> Oracle VM and Cloud Computing
Oracle VM and Cloud Computing Paulo Bosco Otto Sales Consultant paulo.bosco.otto@oracle.com The following is intended to outline our general product direction. It is intended for
More informationCisco Data Preparation
Data Sheet Cisco Data Preparation Unleash your business analysts to develop the insights that drive better business outcomes, sooner, from all your data. As self-service business intelligence (BI) and
More informationIntroduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
More informationAccenture Field Force Transformation
Accenture Field Force Transformation What holds your field service workers back? Overcoming Frequent Field Force Challenges Many organizations have invested in office-based workforce management systems
More informationIzenda & SQL Server Reporting Services
Izenda & SQL Server Reporting Services Comparing an IT-Centric Reporting Tool and a Self-Service Embedded BI Platform vv Izenda & SQL Server Reporting Services The reporting tools that come with the relational
More informationJAMF Software Server Installation and Configuration Guide for OS X. Version 9.0
JAMF Software Server Installation and Configuration Guide for OS X Version 9.0 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
More informationInvest in your business with Ubuntu Advantage.
Invest in your business with Ubuntu Advantage. Expert advice. Specialist tools. Dedicated support. Introducing Ubuntu Advantage Contents 02 Introducing Ubuntu Advantage 03 Ubuntu Advantage 04 - Landscape
More informationRayManageSoft. infinity. The new generation of Application Lifecycle Management
The new generation of Application Lifecycle Management RayManageSoft Appliance The new solution for small and medium businesses IT administrators today face many challenges in their desktop and security
More informationAn Oracle White Paper August 2011. Oracle VM 3: Application-Driven Virtualization
An Oracle White Paper August 2011 Oracle VM 3: Application-Driven Virtualization Introduction Virtualization has experienced tremendous growth in the datacenter over the past few years. Recent Gartner
More informationBuild Modern Apps with Today s BPM
Build Modern Apps Build Modern Apps with Today s BPM What makes the top organisations stand out? If you study those that consistently excel, you ll find a mastery of their business processes and often
More informationWe apologize for the confusion and any inconvenience.
We inadvertently missed some questions regarding the Website Design RF. Those missed questions have been addressed and are on the next page with the original post of uestions and nswers immediately following.
More informationHard Partitioning and Virtualization with Oracle Virtual Machine. An approach toward cost saving with Oracle Database licenses
Hard Partitioning and Virtualization with Oracle Virtual Machine An approach toward cost saving with Oracle Database licenses JANUARY 2013 Contents Introduction... 2 Hard Partitioning Concepts... 2 Oracle
More informationFeatures & Benefits Summary. The Ulitmate Platform for Business Process Customization
SuiteFlex the NetSuite Application Development Platform: Application Customization Creation of New Third Party Vertical Applications Business Process Management SuiteFlex includes: SuiteScript Programming
More informationOracle Fusion Middleware 11g Release 1 IDM Suite
Oracle Fusion Middleware 11g Release 1 IDM Suite Rodger King Senior Principal Support Engineer The following is intended to outline our general product direction. It is intended for information purposes
More informationGuideline on Implementing Cloud Identity and Access Management
CMSGu2013-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Implementing Cloud Identity and Access Management National
More informationOnly Athena provides complete command over these common enterprise mobility needs.
Mobile devices offer great potential for making your enterprise run faster, smarter, and more profitably. However, mobile devices can create considerable challenges for your IT organization, since they
More informationEllucian CRM: platform overview
Ellucian CRM: platform overview Enterprise-class, higher education-specific Built for higher education Ellucian CRM is designed for colleges and universities and provides higher education-specific business
More informationowncloud Architecture Overview
owncloud Architecture Overview Time to get control back Employees are using cloud-based services to share sensitive company data with vendors, customers, partners and each other. They are syncing data
More informationJAMF Software Server Installation and Configuration Guide for Linux. Version 9.2
JAMF Software Server Installation and Configuration Guide for Linux Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
More informationAD Integration options for Linux Systems
AD Integration options for Linux Systems Overview Dmitri Pal Developer Conference. Brno. 2013 Agenda Problem statement Aspects of integration Options Questions Problem Statement For most companies AD is
More informationUsing Managed Services As A Software Delivery Model In Canadian Health Care
Using Managed Services As A Software Delivery Model In Canadian Health Care September 9, 2005 Authors: Darren Jones Darcy Matras INTRODUCTION... 3 MANAGED SERVICES DEFINED... 4 MANAGED SERVICES OVERVIEW...
More informationJAMF Software Server Installation and Configuration Guide for Windows. Version 9.3
JAMF Software Server Installation and Configuration Guide for Windows Version 9.3 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this
More informationJAMF Software Server Installation and Configuration Guide for OS X. Version 9.2
JAMF Software Server Installation and Configuration Guide for OS X Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
More informationFederated Identity Management and Shibboleth: Policy and Technology for Collaboration
Federated Identity Management and Shibboleth: Policy and Technology for Collaboration Marianne Colgrove, Deputy CTO, Reed Joel Cooper, Director of Information Technology Services, Carleton John O Keefe,
More informationJitterbit Technical Overview : Microsoft Dynamics CRM
Jitterbit allows you to easily integrate Microsoft Dynamics CRM with any cloud, mobile or on premise application. Jitterbit s intuitive Studio delivers the easiest way of designing and running modern integrations
More informationJAVA WEB START OVERVIEW
JAVA WEB START OVERVIEW White Paper May 2005 Sun Microsystems, Inc. Table of Contents Table of Contents 1 Introduction................................................................. 1 2 A Java Web Start
More informationPingFederate. Identity Menu Builder. User Guide. Version 1.0
Identity Menu Builder Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Identity Menu Builder User Guide Version 1.0 April, 2011 Ping Identity Corporation 1099 18th Street, Suite
More informationInCommon Partnership Models and Trust Fabrics. Mark Johnson Mark Scheible Ann West John Krienke David Walker
InCommon Partnership Models and Trust Fabrics Mark Johnson Mark Scheible Ann West John Krienke David Walker Overview and Motivation Accelerate development of a business model that supports CAIs MCNC offered
More informationOracle Policy Automation A Modern Enterprise Policy Automation Solution
Oracle Policy Automation A Modern Enterprise Policy Automation Solution Features and Benefits February 2015 Copyright 2014 Oracle and/or its affiliates. All rights reserved. Program Agenda 1 2 3 Overview
More informationEasy Wireframing with
Easy Wireframing with Simplifying design streamlining development Pidoco is a cost-effective and time-saving solution for developing successful software applications without the usual project risks. Developing
More informationEnterprise Portal Built by and for Higher Education
www.apereo.org/uportal Enterprise Portal Built by and for Higher Education Now Responsive for All Devices along with Native App Experience There is a growing demand for higher education institutions to
More informationMonitoring Experience Redefined
Key Benefits of Aqualogic Monitoring System Aqualogic Monitoring System Monitoring Experience Redefined Agent less monitoring saves time and ensures system availability Avoid additional time and cost on
More informationIntroduction to SAML
Introduction to THE LEADER IN API AND CLOUD GATEWAY TECHNOLOGY Introduction to Introduction In today s world of rapidly expanding and growing software development; organizations, enterprises and governments
More informationUbuntu and Hadoop: the perfect match
WHITE PAPER Ubuntu and Hadoop: the perfect match February 2012 Copyright Canonical 2012 www.canonical.com Executive introduction In many fields of IT, there are always stand-out technologies. This is definitely
More informationIs Your Mobile Application Ready For Business?
Is Your Mobile Application Ready For Business? It is clear that mobile technologies will transform the enterprise. The simple math is that if information and communications are available at any place and
More information<Insert Picture Here> Infrastructure as a Service (IaaS) Cloud Computing for Enterprises
Infrastructure as a Service (IaaS) Cloud Computing for Enterprises Speaker Title The following is intended to outline our general product direction. It is intended for information
More informationIdentity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
More informationTransforming Control System to a Virtualized Platform, including On Process Migration. Anneke Vemer ExxonMobil
Transforming Control System to a Virtualized Platform, including On Process Migration Anneke Vemer ExxonMobil ARC conference, Antwerp, 5-Mar-2013 Cleared ExxonMobil External Technical Publication 2013.1104
More informationOracle Platform Security Services & Authorization Policy Manager. Vinay Shukla July 2010
Oracle Platform Security Services & Authorization Policy Manager Vinay Shukla July 2010 The following is intended to outline our general product direction. It is intended for information purposes only,
More informationMitigating Risks and Monitoring Activity for Database Security
The Essentials Series: Role of Database Activity Monitoring in Database Security Mitigating Risks and Monitoring Activity for Database Security sponsored by by Dan Sullivan Mi tigating Risks and Monitoring
More informationowncloud Architecture Overview
owncloud Architecture Overview owncloud, Inc. 57 Bedford Street, Suite 102 Lexington, MA 02420 United States phone: +1 (877) 394-2030 www.owncloud.com/contact owncloud GmbH Schloßäckerstraße 26a 90443
More informationIDENTITY & ACCESS MANAGEMENT IN THE CLOUD
IDENTITY & ACCESS MANAGEMENT IN THE CLOUD www.wipro.com Niraj Kumar Shukla Table of Contents 3... 1. Introduction 3... 2. IAM Approach 4... 2.1. Phase I - Plan 4...2.1.1. Understanding the Environment
More informationSOA REFERENCE ARCHITECTURE: WEB TIER
SOA REFERENCE ARCHITECTURE: WEB TIER SOA Blueprint A structured blog by Yogish Pai Web Application Tier The primary requirement for this tier is that all the business systems and solutions be accessible
More informationMore than 90% of small- and mediumsize
NOT BIG ENOUGH FOR? THINK AGAIN! Survey shows SMBs reap the same benefits as the enterprise, including reduced costs, improved reliability and disaster recovery, and a measurable ROI. More than 90% of
More informationp@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you
Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?
More informationInformation Technology Services
Information Technology Services The purpose of an Information Technology Standard is to specify requirements for compliance with Old Dominion University Information Technology policies, other University
More informationVirtualization, SDN and NFV
Virtualization, SDN and NFV HOW DO THEY FIT TOGETHER? Traditional networks lack the flexibility to keep pace with dynamic computing and storage needs of today s data centers. In order to implement changes,
More informationglobus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory
globus online Integrating with Globus Online Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory Types of integration Resource integration Connect campus, project,
More informationAvaya Aura Orchestration Designer
Avaya Aura Orchestration Designer Avaya Aura Orchestration Designer is a unified service creation environment for faster, lower cost design and deployment of voice and multimedia applications and agent
More informationHitting Your Numbers. Creating Sales Excellence with Commercial Open Source CRM BREAK AWAY
Hitting Your Numbers Creating Sales Excellence with Commercial Open Source CRM BREAK AWAY It is already a given that a CRM system can help drive sales performance. So the decision to be made now is which
More informationWhite Pages Managed Service Solution Rapid Global Directory Implementation. White Paper
White Pages Managed Service Solution Rapid Global Directory Implementation White Paper December 2014 Author: Tom Eggleston Version: 1.0 Status: FINAL Reference: DA-WP01 Creation Date: 03/12/14 Revision
More informationAn Oracle White Paper October 2009. Frequently Asked Questions for Oracle Forms 11g
An Oracle White Paper October 2009 Frequently Asked Questions for Oracle Forms 11g Disclaimer The following is intended to outline our general product direction. It is intended for information purposes
More informationAvanade Whitepaper. Rethink application possibilities and align to desired business outcomes
Avanade Whitepaper Rethink application possibilities and align to desired business outcomes December 2013 Table of contents 03 Executive summary 04 Scope of research and methodology 05 Summary of key findings
More informationHosted, Installed, or Hybrid: Emergency Notification Deployment - Cost Benefit Analysis
Technical Whitepaper Hosted, Installed, or Hybrid: Emergency Notification Deployment - Cost Benefit Analysis Table of Contents Intelligent Notification in the Enterprise...1 Hosted Service vs. Deliverable
More informationTech Titans: Lock it down, securing your Costpoint 7 deployments. Drew Roman, IT Solutions Director WJ Technologies L.L.C. GC-518
Tech Titans: Lock it down, securing your Costpoint 7 deployments Drew Roman, IT Solutions Director WJ Technologies L.L.C. GC-518 Agenda Agenda Overview The Basics of Secure Deployment Database Application
More informationMichigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2005 Recognition Awards Enterprise Architecture Category Executive
More informationBROCADE PERFORMANCE MANAGEMENT SOLUTIONS
Data Sheet BROCADE PERFORMANCE MANAGEMENT SOLUTIONS SOLUTIONS Managing and Optimizing the Performance of Mainframe Storage Environments HIGHLIGHTs Manage and optimize mainframe storage performance, while
More informationvsphere Upgrade vsphere 6.0 EN-001721-03
vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
More informationMichigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police
Michigan Criminal Justice Information Network (MiCJIN) State of Michigan Department of Information Technology & Michigan State Police NASCIO 2006 Recognition Awards Enterprise Architecture Category Executive
More informationIBM WebSphere application integration software: A faster way to respond to new business-driven opportunities.
Application integration solutions To support your IT objectives IBM WebSphere application integration software: A faster way to respond to new business-driven opportunities. Market conditions and business
More informationFederations 101. An Introduction to Federated Identity Management. Peter Gietz, Martin Haase
Authentication and Authorisation for Research and Collaboration Federations 101 An Introduction to Federated Identity Management Peter Gietz, Martin Haase AARC NA2 Task 2 - Outreach and Dissemination DAASI
More informationDavid Corriveau, CEO Radix Technologies. Copyright 2011 Radix Technologies
Infrastructure Management and Cloud David Corriveau, CEO Radix Technologies Infrastructure Management and Cloud IaaS Cloud Infrastructure Services Private Cloud Reduce Cost of Infrastructure How does IaaSReduce
More informationRESEARCH NOTE THE EVOLVING BUSINESS CASE FOR TIER-1 ERP IN MIDSIZE COMPANIES
RESEARCH NOTE THE EVOLVING BUSINESS CASE FOR TIER-1 ERP IN MIDSIZE COMPANIES THE BOTTOM LINE Today, usability improvements and rapid implementation tools that simplify deployments make enterprise applications
More informationSecure the Web: OpenSSO
Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based
More informationSAP Mobile Platform rapid-deployment solution
SAP Mobile Platform rapid-deployment solution V6.30 Customer Contents Overview Scope Deployment of SAP Mobile Platform Network, Security and Push of SAP Mobile Platform Operational Maintenance of SAP Mobile
More information