Perun Modern Approach for User and Service Management
|
|
|
- Douglas Wheeler
- 10 years ago
- Views:
Transcription
1 IST-Africa 2014 Conference Proceedings Paul Cunningham and Miriam Cunningham (Eds) IIMC International Information Management Corporation, 2014 ISBN: Perun Modern Approach for User and Service Management Michal PROCHÁZKA 1, Slávek LICEHAMMER 2, Luděk MATYSKA 3 CESNET, Zikova 4, Prague, , Czech Republic 1 Tel: , Fax: , [email protected] 2 Tel: , Fax: , [email protected] 3 Tel: , Fax: , [email protected] Abstract: In this paper we are introducing the identity and access management system called Perun. The system provides functionality which covers management of the whole user life cycle in nowadays e-infrastructures, from user enrolment into the e-infrastructure to user expiration. The Perun system supports management of virtual organizations, rights delegation, group management and enrolment management for making flexible user management easy to use. In comparison to ordinary identity management systems Perun also provides service and access management. Perun is a complex tool which eases management of research communities or users and services within the organizations. Perun system is used in production on national and international level; selected real deployments are described in this paper too. Keywords: identity management, identities consolidation, access management, authorization 1. Introduction An increasing number of services used by researchers require some kind of authentication and authorization. The motivation is quite straightforward, services cost money, represent unique devices or cannot be used indiscriminately, and service providers must know who exactly is accessing the service even if the service is provided free of charge. Therefore proper identification of users must be in place in order to make authentication and authorization doable. Generally user identification is made by Identity Management System (IdM) and is usually done at the user s home institution or by the third party like social networks. However this is not cure for all situations, because all the service providers would have to believe the users identity issuers (e.g. home institutions or social networks) doing identity vetting well. Such trust network is obviously not feasible due to the complexity of peer to peer trust and privacy issues. In this paper we are introducing an identity and access management system called Perun [1] which addresses problems of identity and access rights management. The system was originally developed for managing users and services in highly distributed environments like computational and storage grids [2]. As IT in general moves towards distributed environments and clouds, Perun started to be useful also for organizations and research groups which facilitate IT services (e-infrastructures). Perun covers the whole user life cycle in e-infrastructures from user enrolment, through management of access rights to the expiration of user account. Perun does not work just with users identities; it is able to store additional information about the users, organizing them into groups and virtual organizations. Last but not least, groups can be assigned to the services which mean members of the group have a right to use the service. This is the main difference from classical IdM systems, as Perun thus also provides capabilities to manage access control lists at the services. Generally Perun manages users and access rights to services. Copyright 2014 The authors Page 1 of 11
2 Perun is a general tool, but its particular deployment does not require extensive configuration to be done. Perun by default supports several types of deployment with defined set of functionality. It is well suited for organizations or research groups which want to manage access to its services and do not have any identity management system in place or have several heterogeneous identity management systems and they want to consolidate user identities from all of them. Perun can support even more complicated deployments, like sharing a running instance between several institutions, reducing thus the operation costs while providing full functionality. Up to now we have several successful deployments of the Perun. Current experiences show that Perun helps with managing users and services for small projects within the organization. It is also used for managing virtual organizations in EGI [3] infrastructure and also provides support for real institutions like universities. This paper is organized as follows. The first chapter describes the whole concept of Perun system. Next two chapters explain how Perun does the identity and groups management. Third chapter is dedicated to the resource and services management. The paper is finished with the chapter describing real deployments of the Perun. 2. System Concept Initial motivation for developing Perun was to create a system which will be able to manage users and services of the Czech National Grid Infrastructure (MetaCentrum [4]) which has computational and storage resources spread around the country where the users, administrators and user support are from different organizations based in different locations. MetaCentrum provides its services (nearly CPU cores and 3.5 PB of data storage) to around 700 users from academic area. There are other challenges, for example how to create user accounts on all the machines and services, this obviously cannot be done manually. Also users account expiration and suspension must be done automatically in such environment. During the deployment we have discovered that the Perun system can ease user and service management also for other projects and institutions, what has been proved in practise. In most cases institution or research group has some existing user management and resource management system, but it does not fulfil all the requirements put on modern systems, it does not scale well, it is not robust, it does not provide programmable interfaces and usually it lacks friendly user interfaces. Perun is designed to be placed into the existing infrastructures in order to deliver robust and scalable solution which consolidate existing data about the users and resources and provide management interfaces for users who are formally in responsible for the entities. Data consolidation is done by integrated import plugins which are able to get information from various sources. On the other hand Perun can export all stored information using different export plugins, so the integration can be done step by step. Rights delegation is crucial when we do not want to be dependent on system administrators while doing basic operations with users and resources. Therefore Perun can assign management roles to selected users. In Perun two proven concepts are combined together in order to deliver reliable, robust and scalable solution. First concept known from the grid environment is Virtual Organizations (VO) where they are used for several years with success. VO is simply nothing else than a group of users with defined manager and set of rules which define who can be member of the VO. The benefit of having VO manager can be seen in situations when members of the VO want to use some services. Every user does not need to negotiate an agreement with the service provider; simply VO manager does the job for all the VO members as their representative. Perun can manage unlimited number of VOs of different sizes from few to thousands of members and services. Concept of the VO in Perun is Copyright 2014 The authors Page 2 of 11
3 analogous to the VO in a grid environment, it contains members, groups and resources used by VO members. In Perun we use term resource which describes service used by the users. The second concept implemented in Perun is the push mechanism used for delivering configurations to the end services. New configuration is sent to the service only if there is some change, also the service stores its configuration locally, so interruption of the Perun service does not affect managed services. Perun is built from several building blocks which have clearly defined and narrow functionality. The main blocks are core, RPC, registrar and dispatcher with engine. Perun core takes care of data and operations with users, virtual organizations, groups, resources, facilities and services. Perun RPC component is the main programmable interface of the Perun. Other components or external systems can communicate with Perun through the RPC. RPC exports all the functions from the core via HTTPS interface using JSON as a data container. On the top of the Perun RPC there are two user interfaces, command line tools and web based GUI, see Figure 1. Perun registrar is a component dedicated to the user enrolment and registration form management. Dispatcher and engine are responsible for distributing the access control lists and configurations to the managed end services. For the purpose of this paper we will discuss only those Perun components which are directly dedicated to the identity and resource management. 3. Identity Management 3.1 User life cycle Figure 1: Perun web GUI screenshot - VO overview We have to look at the user account in the identity management system from the wider perspective. The user life cycle is a set of operations with the user s data. The operations cover all the steps from the user admission into the (virtual) organization till the purge of Copyright 2014 The authors Page 3 of 11
4 the data about the user. User usually goes through the steps mentioned below (some of them are depicted in Figure 2): 1. User fills the application form. 2. User somehow proves that data filled in application form are credible. 3. Identity management system creates an user account. 4. User can be enlisted in the groups. 5. User account expires. 6. User can ask for extension of the membership. 7. User account is deleted. From the organization s manager point of view having all the steps mentioned above in one system is crucial, because state of the user account is consistent in every moment. Having group, enrolment and user management systems separated causes problems with synchronization and keeping data consistent. 3.2 Enrolment management Figure 2: Enrolment, VO and propagation management schema In order to get users into a VO, they have to provide information required by the policy of such VO. Usually some contacts and personal information are required. For this purpose Perun is equipped with the Registrar component used to support whole enrolment management. Registrar can be used for creating custom application form to the VO and for Copyright 2014 The authors Page 4 of 11
5 managing the users applications. VO manager can define arbitrary fields on the application form. Based on the optional authentication system guarding the application form (e.g. federated login, social networks login, digital certificate) some fields can be filled by values gathered from the authentication system. Applications can be approved/denied automatically or manually by the VO managers. VO manager can also define extension application form which is used for VO members who want to extend theirs membership. Extension registration form usually shows the information about the users stored in Perun and user is required to verify or update the information. 3.3 External systems In the case where an organization has some existing IdM system Perun can import or periodically synchronize user identities or groups between each other. Perun provides two types of import. We can define external source which is recipe how to get data about the user from existing IdM system. VO manager then can search users in Perun web interface using the external source. The second type is used for group synchronization. VO manager can create group within the VO and set up synchronization of the group with the users from external system. Based on the defined period, Perun synchronizes users with the external source. 4. Group Management Users are enrolled into the virtual organizations in which they can be additionally organized into the groups and subgroups. Each group can have defined manager who consequently manages memberships in the group. Also it is possible to create an application form, in the same fashion as for the VO, for membership in the group. That allows end users to apply for the group membership by themselves without need of any action from the group manager. In this case the group manager only needs to approve submitted applications or even further he can set the application to be approved automatically. Goal of Perun is not to overstress users in any role. Hence there is always a possibility to delegate part of work, from VO manager to group manager or to end users themselves. Groups play crucial role in resource management. By assigning group to resource all the members from the group gain rights to utilize the resource. Because of that it is strongly recommend having a group for each purpose or role in the VO. Usually users tend to create group for each resource or for set or resources with very close purpose, e.g. "group of users with administrator privilege on machine X". Solution suggested and supported by the Perun is to create groups based on real roles, e.g. "group of administrators" and then assign these groups to appropriate resources, for example to resource representing administrator access on the machine X. Using such approach users management becomes easier because when the new user comes into VO, she is put into group according to her role in the VO and she immediately gets an access to all the resources which she needs for work. Moreover if she needs some more resources then with high probability all members within the same group (with the same role) need these resources too. In such situation VO manager simply assigns additional resources to this group. This workflow has strong requirements for establishing purposeful roles within the VO, which can be unaccustomed for VO managers at first. It usually requires paradigm shift in way how users are managed so far, but it will definitely pay up at the end. Therefore Perun is trying to support this workflow as much as possible and not only in Perun itself but also in documentation and tutorials. On the other hand the described workflow is not enforced by any component in Perun. Anyone can pick any suitable solution for her use-case or customize Perun in any possible Copyright 2014 The authors Page 5 of 11
6 way. To sum it up, Perun is not only provided as a tool, but also as well-established workflow for managing users and resources. 5. Resources Management To make resource management efficient, requirements of both involved parties, the services providers and the managers of virtual organizations have to be considered. Services providers need to have an easy way to make their services (resource) available to the VO. Moreover they wants to do none or only minimal changes to theirs service in order to support users from the VO and full control of the whole configuration process. On the other hand VO managers only need to enable their users to utilize the resources. We used so called facility as a basic unit for resource management in Perun. The facility is configurationally homogeneous entity which provides the services. The facility can represent host, cluster, storage element, wiki page and so on. The only condition for the facility is that the setting is the same for whole facility. When the facility configuration is finished the services provider can make an agreement with any VO, particularly with the VO managers. The agreement should cover conditions under which VO members can use the service. The service provider than can create a resource for these VOs. Resource defines technical conditions and restrictions on usage of the facility by the VO. Consequently the VO manager can decide which users from the VO can use the resource or delegate this right to any group manager. Described behaviour is the key feature of resource management in Perun because service providers do not want to take care of each individual user. The whole resource management is reduced only to the initial settings which really make overall configuration process as easy as possible. 5.1 Services In the context of Perun we need to distinguish between the Perun service and the service which is consumed by the users. The Perun service is used for preparing and delivering the configuration for the consumed services. Each Perun service has a set of required attributes which are necessary for the Perun service to run properly. Each attribute has its concrete name and well defined purpose, e.g. attribute represents name of the user or an of the user. Attributes can be assigned to each individual entity and also to the relationship of the entities. Data stored in attributes are strictly validated in accordance to service requirements. Therefore Perun never propagate faulty or incomplete configuration to the service. The services which receive configuration from the Perun do not need to do any validation and integration checks of the data. 5.2 Propagations We can assume that Perun holds desired state of all services configurations. Goal is to project this state to target services. To achieve that Perun provides two modes of configuration transport: pull and push model, see Figure 2 bottom grey box. The pull mode is represented by an integrated LDAP server. Perun exports data useful for service configurations to the LDAP server hence the services can pull them from it. In this case Perun prepares data for each service in a suitable format and then sends the data via selected communication channel. Configurations can be sent using simple file copy or , jabber or any other standard system for exchanging data. The most common way is to send the configuration over the SSH which provides reliable authentication of each party. When the configuration end up at the target service, optionally so called slave script is executed and additional configuration tweaks are done. Using slave script the service Copyright 2014 The authors Page 6 of 11
7 administrator can merge local configurations with the ones from the Perun or can instrument the service to reload the new configuration. Slave scripts are managed completely by the administrator of the service. Therefore the administrator can control very precisely how the data from Perun affects configuration of the service. Push mechanism is the preferred one, because when unpredictable outage of the Perun occurs, the services are not affected, because they do not do any online queries to Perun. The only disadvantage is that the service runs the last known configuration before the outage. At the end of the outage Perun will immediately send the up-to-date configuration (if changed). 6. Rights delegation Perun was designed to support more than one group/vo/research community; therefore there was a strong emphasis on rights delegation. The operator of the Perun system is not needed for the management of VOs and users or resources. Perun has three basic roles and several derived roles. Main roles represent VO manager, group manager and facility manager. Managers have full rights to operate with theirs entities. The VO manager can introduce new members into the VO, define the registration form and assign VO groups to the resources. Obviously she can create groups and assign VO members as group managers. The group manager can only add or remove users from the groups where she is a manager. The facility manager is responsible for the services which are provided to the VO. The facility manager has full privileges over her services. The role of the administrator of the Perun is just creating the VO and then passing the rights to the VO managers, the rest of the work is done by the users. Therefore Perun can be deployed also on national or even on higher level. 7. Examples of real deployments Perun is an open source project, so source codes can be downloaded from GitHub [5]. CESNET provides Perun also in two modes. Perun as a Software as a Services (SaaS) and a virtual appliance. SaaS is suitable only for deployments with very reliable network connection to the CESNET servers. Virtual appliance is well suited for cloud deployments and also for local installation. Thus Perun instance can run directly on a hardware owned by the institution and serves nearby users. This also solves potential privacy problems, when the personal data of the users cannot move outside a perimeter of the institution or the country (common legal requirements). The Perun instance which runs at CESNET currently manages 89 national and international virtual organizations with 720 groups, over 2800 users and 1700 services. It is provided as SaaS. The main benefit for the users is that they have only one user account registered at Perun and they can request membership in any VO or group managed by this Perun instance. Users who participate in national and international projects appreciate such approach, they do not need to create user account per project. Moreover they can update personal information or settings (like address) in one place and this change will be consequently automatically propagated to end services. In the next subsections selected real deployments are briefly described. We have selected one big project MetaCentrum, one small research project and one project associated with EGI cloud infrastructure. 7.1 MetaCentrum MetaCentrum is the Czech National Grid Infrastructure providing thousands CPUs and petabytes of storage capacity to the users coming from academic environment all around Copyright 2014 The authors Page 7 of 11
8 the country. MetaCentrum also utilizes resources from other national e-infrastructure project called CERIT-SC [6], which provides comparable computational and storage capacity. Both MetaCentrum and CERIT-SC solves similar challenges. As far as user management is concerned, Perun manages around 1400 users accounts on all machines in MetaCentrum and CERIT-SC infrastructure. Managing user accounts means that Perun has to prepare configuration for Linux machines and instrument them to create the UNIX accounts, configure storages, prepare user s home directories with proper quotas set. Users are also put into several mailing lists, have an access to the wiki pages and request tracker system. From the VO manager point of view, Perun takes care of users enrolments into the MetaCentrum virtual organization. Also it can switch users accounts to expired state and notify user in advance before it happens. MetaCentrum provides various software which requires user to accept the license. With the Perun this process is fully automated using automatically approved application forms for groups which represent individual software. The text of the licence is part of the group application form and the form cannot be submitted without an agreement of the licence. 7.2 C4E C4E is a research project running at Masaryk University. It is a typical project with a two year lifetime. Members of the project are not only from Masaryk University but also from other academic institutions and private companies. Perun provides basic identity management, so all the members of the C4E project are listed in one place. For all the members basic services are provided like access to the restricted wiki pages, project management system and membership in mailing lists. For selected users a UNIX accounts on computers located in cloud are created. 7.3 Fedcloud Fedcloud is an EGI initiative which provides an abstract layer on top of the various cloud providers. User can utilize cloud resources in the same way as grid resources. Perun is responsible for managing the user accounts at different cloud infrastructures, e.g. OpenStack or OpenNebula. Therefore it can be easily deployed on each Fedcloud site regardless of backend they use. Different types of cloud infrastructures use different authentication mechanisms. Perun assures that each backend gets information about users' credentials which the particular backend requires. Moreover if the backend can provide several authentication mechanisms then Perun can provide required data for each of them, therefore the user can decide which authentication mechanism she wants to use to access the service. To sum it up Perun is useful for Fedcloud mainly for its flexibility and ability to adjust itself to be compatible with existing widely heterogeneous infrastructures. 8. Possible deployments in developing countries In the previous section we have described existing real Perun deployments. This section will introduce possible deployments advisable in developing countries which are limitations in relation to well-trained IT staff, IT resources and last but not least problems with power supply and network outages. Perun has been designed to overcome such limitations. Power or network outage affecting Perun system does not interrupt services which are configured using push mechanism. The Perun system is available as a pre-installed virtual appliance therefore installation is reduced only to configuration options specific for the particular deployment. Most of the administration in Perun is spread among defined roles resulting in low demands on persons who are interacting with Perun. Copyright 2014 The authors Page 8 of 11
9 The next subsections briefly describe two services which plays major role in delivering valuable services and strengthen collaboration among researchers. 8.1 eduroam eduroam [7] is currently the largest production federated service in academia. It allows academic users to connect to the network using credentials issued by their home organization. Researches can easily roam among institutions not only within one country but also around the world and stay connected to the network. Currently eduroam is available in 67 countries. eduroam infrastructure requires authentication server located at the organization and connected to the identity management system of the organization. If an organization wants to participate in the eduroam project, it must deploy a database of the users, prepare a user registration process for identity vetting, provide user authentication service and run a radius server. All of these components except radius server are built-in in Perun, however radius can be easily connected to the Perun database. Deploying Perun is well suited for organizations with missing identity management system, built-in enrolment, group, user and resource management components provide all necessary functionality needed to setup and feed radius server for eduroam. Moreover the organization can use other Perun components which help with controlling access to the other IT services within the organization. 8.2 Identity federation The concept of identity federations is quite old and nowadays it is used by all big players on the Internet, for example Google and Facebook provide their authentication system to be used by third party. Users can simply use their Google or Facebook login to access other services. In academia users federated identity is connected with student or researcher account at theirs home organization in order to allow them to consume services available only for academic users. During the past years nearly 30 national academic identity federations have been established [9]. There is a similarity in concept with eduroam, users can use services located in other countries or institutions using theirs home organization s credentials. Basic building blocks of the identity federation are identity provider (IdP) and service provider (SP). IdP act as a component which authenticates users and is located at the user s home institution. SP is the component providing services for the authenticated users. The number of services and resources available using identity federations is still growing. Latest statistics show more than 5000 service providers are available within academic identity federations. Most of the digital content providers support federated login, also services proposed by the CHAIN-REDS [8] project are available using federated identity. Therefore it is advisable to provide federated identity for all the researchers and students by theirs home organization (university, academies of sciences, research communities). The requirements are similar as for eduroam infrastructure. Every user has to have an account at the identity management operated by her home institution. Identity federation does not provide only authentication of the user, but also transferring additional information about the user in order to provide data for authorization decision. User's identity in Perun can have assigned various attributes therefore Perun can act as a backend for the IdP. Deployment is done just by installing Perun instance and identity provider software, all the required processes are ready to use in Perun. IdP can be then connected to the Grid Identity Poll (GrIDP) federation and users will have immediately access to the Science Gateways [10]. Services which have been available only within the organization and have potential to be useful also for users from other organizations can be Copyright 2014 The authors Page 9 of 11
10 integrated into the federation, what is much easier to achieve than configure access for every user separately. 9. Economic benefits Collaboration is essential for the research especially for researches from a developing country who want to share theirs results and ideas with researches from developed countries. IT services are well suited for enabling such collaboration across the world even in a real time. In order to personalize collaboration tools or to restrict access to the content within the collaboration platform proper identification of the users must be in place. Identification process heavily depends on proper identity management of the users and also selection of the particular technology used for user authentication with the services used for collaboration. All of this puts non trivial requirements on management of users and their credentials. Perun is delivering a whole ecosystem around the user and resource management, therefore when the organization or research community deploy Perun they can manage theirs users, group, users enrolments and resources without need to buy or maintain several separated pieces of software. Based on our experiences from national grid infrastructure we do not need to use any other software except Perun for managing whole ecosystem for shared resources provided for the researches. All examples of real deployments mentioned in section 7 run on a single instance of Perun which significantly reduces costs on the maintenance and management. 10. Conclusion In this paper we have described Perun, a user and resource management system which is able to do the access management. The Perun system targets mainly distributed environments and also geographically spread user communities. Easy deployment and wide range of functions covering users enrolment, identity consolidation, group management and services configurations predestine Perun as a tool which eases adoption of technologies like eduroam, PKI, identity federations and shared resources. Using Perun research communities from within the organization or even from different parts of the world can access shared resources in an easy and secure way. Perun lowers the bar which is needed for managing access to the IT services, especially in developing countries where there is lack of IT specialists and resources. Research communities can focus on theirs research and they do not need to spend time setting up and configuring access to the services like wikis, mailing lists, network, etc. Even more the Perun deployment at a NREN level can act as Software as a Service for all connected institutions and therefore significantly reduce demands on human and IT resources. Acknowledgment Perun development has been supported by CESNET under "Projects of Large Infrastructure for Research, Development, and Innovations" (LM ) and programme Center CERIT Scientific Cloud, part of the Operational Program Research and Development for Innovations, reg. no. CZ. 1.05/3.2.00/ Promotion of the Perun in the developing countries is made under the CHAIN-REDS project umbrella. References [1] [2] KŘENEK, Aleš a Zora SEBESTIANOVÁ. Perun -- Fault-Tolerant Management of Grid Resources. In Krakow Grid Workshop Krakow: Academic Computer Centre CYFRONET AGH, s , 8 s. ISBN [3] [4] Copyright 2014 The authors Page 10 of 11
11 [5] [6] [7] [8] [9] [10] Copyright 2014 The authors Page 11 of 11
Security in Federated e-infrastructure
Security in Federated e-infrastructure and Identity Management Boris Parák 2 Slávek Licehammer 1,2 1 Masaryk University 2 CESNET May 18, 2015 www.egi.eu EGI-Engage is co-funded by the Horizon 2020 Framework
IGI Portal architecture and interaction with a CA- online
IGI Portal architecture and interaction with a CA- online Abstract In the framework of the Italian Grid Infrastructure, we are designing a web portal for the grid and cloud services provisioning. In following
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
When your users take devices outside the corporate environment, these web security policies and defenses within your network no longer work.
Deployment Guide Revision C McAfee Web Protection Hybrid Introduction Web Protection provides the licenses and software for you to deploy Web Gateway, SaaS Web Protection, or a hybrid deployment using
PoS(ISGC 2013)018. 3.5 Million Smartmeters in the Cloud. Petr Holub. Vlastimil Holer. Daniel Kouřil. Filip Procházka. Zdenek Hejna.
3.5 Million Smartmeters in the Cloud Aleš Křenek E-mail: [email protected] Petr Holub Masaryk University Vlastimil Holer Masaryk University Daniel Kouřil Masaryk University Filip Procházka Mycroft Mind
LDAP Authentication Configuration Appendix
1 Overview LDAP Authentication Configuration Appendix Blackboard s authentication technology is considered a focal point in the company s ability to provide true enterprise software. Natively, the Blackboard
Aurora Hosted Services Hosted AD, Identity Management & ADFS
22/09/2013 Aurora Hosted Services Hosted AD, Identity Management & ADFS 1 Service Overview - Hosted Identity Management Core provides a fully managed solution hosted in Azure and connected directly to
Secure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
Virtual Clusters as a New Service of MetaCentrum, the Czech NGI
Virtual Clusters as a New Service of MetaCentrum, the Czech NGI M. Ruda, Z. Sustr, J. Sitera, D. Antos, L. Hejtmanek, P. Holub Cesnet Czech Republic Krakow, 2009 M. Ruda (Cesnet) Virtual clusters Krakow,
vsphere Upgrade vsphere 6.0 EN-001721-03
vsphere 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
Scyld Cloud Manager User Guide
Scyld Cloud Manager User Guide Preface This guide describes how to use the Scyld Cloud Manager (SCM) web portal application. Contacting Penguin Computing 45800 Northport Loop West Fremont, CA 94538 1-888-PENGUIN
Private vs. Public Cloud Solutions
Private vs. Public Cloud Solutions Selecting the right cloud technology to fit your organization Introduction As cloud storage evolves, different cloud solutions have emerged. Our first cloud whitepaper
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
Technical. Overview. ~ a ~ irods version 4.x
Technical Overview ~ a ~ irods version 4.x The integrated Ru e-oriented DATA System irods is open-source, data management software that lets users: access, manage, and share data across any type or number
Centrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
Blackbaud Sphere & The Raiser s Edge Integration Guide
Blackbaud Sphere & The Raiser s Edge Integration Guide 101311 Blackbaud Sphere 2011 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any means,
DataNet Flexible Metadata Overlay over File Resources
1 DataNet Flexible Metadata Overlay over File Resources Daniel Harężlak 1, Marek Kasztelnik 1, Maciej Pawlik 1, Bartosz Wilk 1, Marian Bubak 1,2 1 ACC Cyfronet AGH, 2 AGH University of Science and Technology,
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Pipeline Orchestration for Test Automation using Extended Buildbot Architecture
Pipeline Orchestration for Test Automation using Extended Buildbot Architecture Sushant G.Gaikwad Department of Computer Science and engineering, Walchand College of Engineering, Sangli, India. M.A.Shah
Burst Technology bt-loganalyzer SE
Burst Technology bt-loganalyzer SE Burst Technology Inc. 9240 Bonita Beach Rd, Bonita Springs, FL 34135 CONTENTS WELCOME... 3 1 SOFTWARE AND HARDWARE REQUIREMENTS... 3 2 SQL DESIGN... 3 3 INSTALLING BT-LOGANALYZER...
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
Licensing for BarTender s Automation Editions
The World's Leading Software for Label, Barcode, RFID & Card Printing White Paper Licensing for BarTender s Automation Editions Understanding Printer-Based Licensing and How to Configure Seagull License
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Alice. Software as a Service(SaaS) Delivery Platform. innovation is simplicity
Ekartha, Inc. 63 Cutter Mill Road Great Neck, N.Y. 11021 Tel.: (516) 773-3533 Ekartha India Pvt. Ltd. 814/B Law College Road Demech House, 4th Floor Erandwane, Pune, India Email: [email protected] Web:
What s New in VMware vsphere 5.1 VMware vcenter Server
What s New in VMware vsphere 5.1 VMware vsphere 5.1 TECHNICAL MARKETING DOCUMENTATION V 1.0/UPDATED JULY 2012 Table of Contents Introduction... 3 Key Components... 3 vcenter Single Sign-On Server.... 3
An Introduction to Cloud Computing Concepts
Software Engineering Competence Center TUTORIAL An Introduction to Cloud Computing Concepts Practical Steps for Using Amazon EC2 IaaS Technology Ahmed Mohamed Gamaleldin Senior R&D Engineer-SECC [email protected]
HDFS Users Guide. Table of contents
Table of contents 1 Purpose...2 2 Overview...2 3 Prerequisites...3 4 Web Interface...3 5 Shell Commands... 3 5.1 DFSAdmin Command...4 6 Secondary NameNode...4 7 Checkpoint Node...5 8 Backup Node...6 9
API Architecture. for the Data Interoperability at OSU initiative
API Architecture for the Data Interoperability at OSU initiative Introduction Principles and Standards OSU s current approach to data interoperability consists of low level access and custom data models
Deployment of Cisco Extension Mobility in Enterprises White Paper
Deployment of Cisco Extension Mobility in Enterprises White Paper Z E R O T O U C H A U T O M A T E D P R O V I S I O N I N G Sync to Active Directory Automated System to sync Cisco Extension Mobility
Installing and Administering VMware vsphere Update Manager
Installing and Administering VMware vsphere Update Manager Update 1 vsphere Update Manager 5.1 This document supports the version of each product listed and supports all subsequent versions until the document
Mobile Cloud Computing T-110.5121 Open Source IaaS
Mobile Cloud Computing T-110.5121 Open Source IaaS Tommi Mäkelä, Otaniemi Evolution Mainframe Centralized computation and storage, thin clients Dedicated hardware, software, experienced staff High capital
p@$5w0rd??_ 300% increase 280 MILLION 65% re-use passwords $22 per helpdesk call Passwords can no longer protect you
Freja is an innovative solution to one of the biggest problems in the Internet era: How do you securely manage identities, access and credentials for a large number of users without costs going haywire?
Virtual Machine daloradius Administrator Guide Version 0.9-9
Virtual Machine daloradius Administrator Guide Version 0.9-9 May 2011 Liran Tal of Enginx Contact Email: daloradius Website: Enginx website: [email protected] http://www.daloradius.com http://www.enginx.com
Introduction to Endpoint Security
Chapter Introduction to Endpoint Security 1 This chapter provides an overview of Endpoint Security features and concepts. Planning security policies is covered based on enterprise requirements and user
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Bitrix Site Manager ASP.NET. Installation Guide
Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary
vrealize Air Compliance OVA Installation and Deployment Guide
vrealize Air Compliance OVA Installation and Deployment Guide 14 July 2015 vrealize Air Compliance This document supports the version of each product listed and supports all subsequent versions until the
Using HP Systems Insight Manager to achieve high availability for Microsoft Team Foundation Server
Using HP Systems Insight Manager to achieve high availability for Microsoft Team Foundation Server Executive summary... 2 Audience... 2 Architecture... 3 Prerequisite... 4 Deploying AT servers... 5 Configuring
One step login. Solutions:
Many Lotus customers use Lotus messaging and/or applications on Windows and manage Microsoft server/client environment via Microsoft Active Directory. There are two important business requirements in this
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
Enterprise SSO Manager (E-SSO-M)
Enterprise SSO Manager (E-SSO-M) Many resources, such as internet applications, internal network applications and Operating Systems, require the end user to log in several times before they are empowered
/ Preparing to Manage a VMware Environment Page 1
Configuring Security for a Managed VMWare Enviroment in VMM Preparing to Manage a VMware Environment... 2 Decide Whether to Manage Your VMware Environment in Secure Mode... 2 Create a Dedicated Account
Enabling Large-Scale Testing of IaaS Cloud Platforms on the Grid 5000 Testbed
Enabling Large-Scale Testing of IaaS Cloud Platforms on the Grid 5000 Testbed Sébastien Badia, Alexandra Carpen-Amarie, Adrien Lèbre, Lucas Nussbaum Grid 5000 S. Badia, A. Carpen-Amarie, A. Lèbre, L. Nussbaum
SOFTNIX LOGGER Centralized Logs Management
SOFTNIX LOGGER Centralized Logs Management STANDARD, RELIABLE, SECURITY Softnix Logger Our goal is not only regulate data follow by cyber law but also focus on the most significant such as to storage data
What s New in Centrify DirectAudit 2.0
CENTRIFY DATASHEET What s New in Centrify DirectAudit 2.0 Introduction Centrify DirectAudit s detailed, real-time auditing of privileged user sessions on Windows, UNIX and Linux systems provides a full
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Guide to the LBaaS plugin ver. 1.0.2 for Fuel
Guide to the LBaaS plugin ver. 1.0.2 for Fuel Load Balancing plugin for Fuel LBaaS (Load Balancing as a Service) is currently an advanced service of Neutron that provides load balancing for Neutron multi
AVG Business SSO Partner Getting Started Guide
AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016. Integration Guide IBM
IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3 April 8, 2016 Integration Guide IBM Note Before using this information and the product it supports, read the information
GlobalSign Enterprise PKI Support. GlobalSign Enterprise Solution EPKI Administrator Guide v2.4
GlobalSignEnterprisePKISupport GlobalSignEnterpriseSolutionEPKIAdministratorGuidev2.4 1 TABLE OF CONTENTS GETTING STARTED... 3 ESTABLISHING EPKI SERVICE... 3 EPKI ADMINISTRATOR/USER CERTIFICATE... 4 ESTABLISHING
2) Xen Hypervisor 3) UEC
5. Implementation Implementation of the trust model requires first preparing a test bed. It is a cloud computing environment that is required as the first step towards the implementation. Various tools
Deploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
McAfee SMC Installation Guide 5.7. Security Management Center
McAfee SMC Installation Guide 5.7 Security Management Center Legal Information The use of the products described in these materials is subject to the then current end-user license agreement, which can
Genius SIS. Document number: 2009102001 Version: 3.0 Release Genius Date: 08/11/2011 SIS Overview
Genius SIS Overview Document number: 2009102001 Version: 3.0 Release Genius Date: 08/11/2011 SIS Overview DISCLAIMER This Overview document, as well as the software described in it, is furnished under
Evoko Room Manager. System Administrator s Guide and Manual
Evoko Room Manager System Administrator s Guide and Manual 1 1. Contents 1. Contents... 2 2. Read this first! Introduction to this Guide... 6 3. User Guide... 6 4. System Architecture Overview... 8 ----
Cisco Application Networking Manager Version 2.0
Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment
insync Installation Guide
insync Installation Guide 5.2 Private Cloud Druva Software June 21, 13 Copyright 2007-2013 Druva Inc. All Rights Reserved. Table of Contents Deploying insync Private Cloud... 4 Installing insync Private
Symantec Enterprise Vault.cloud Overview
Fact Sheet: Archiving and ediscovery Introduction The data explosion that has burdened corporations and governments across the globe for the past decade has become increasingly expensive and difficult
Dell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
MEGA Web Application Architecture Overview MEGA 2009 SP4
Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.
Migrating to vcloud Automation Center 6.1
Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
LISTSERV LDAP Documentation
LISTSERV LDAP Documentation L Soft Sweden AB 2007 28 November 2007 Overview LISTSERV version 15.5 can interface to LDAP servers to authenticate user logins, to insert LDAP attributes in mail merge distributions
Guide to the MySQL Workbench Migration Wizard: From Microsoft SQL Server to MySQL
Guide to the MySQL Workbench Migration Wizard: From Microsoft SQL Server to MySQL A Technical White Paper Table of Contents Introduction...3 MySQL & LAMP...3 MySQL Reduces Database TCO by over 90%... 4
MONITORING RED HAT GLUSTER SERVER DEPLOYMENTS With the Nagios IT infrastructure monitoring tool
TECHNOLOGY DETAIL MONITORING RED HAT GLUSTER SERVER DEPLOYMENTS With the Nagios IT infrastructure monitoring tool INTRODUCTION Storage system monitoring is a fundamental task for a storage administrator.
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
Panda Perimeter Management Console. Guide for Partners
Panda Perimeter Management Console Guide for Partners Copyright notice Panda Security 2014. All rights reserved. Neither the documents nor the programs that you may access may be copied, reproduced, translated
Easy configuration of NETCONF devices
Easy configuration of NETCONF devices David Alexa 1 Tomas Cejka 2 FIT, CTU in Prague CESNET, a.l.e. Czech Republic Czech Republic [email protected] [email protected] Abstract. It is necessary for developers
Overview. Timeline Cloud Features and Technology
Overview Timeline Cloud is a backup software that creates continuous real time backups of your system and data to provide your company with a scalable, reliable and secure backup solution. Storage servers
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
Cloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
BES10 Cloud architecture and data flows
BES10 Cloud architecture and data flows Architecture: BES10 Cloud solution Component APNs BlackBerry Cloud Connector BES10 Cloud BlackBerry Infrastructure Company directory Devices GCM Other third-party
Citrix Systems, Inc.
Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change
Installation and Configuration Guide
Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
Windows Web Based VPN Connectivity Details & Instructions
VPN Client Overview UMDNJ s Web based VPN utilizes an SSL (Secure Socket Layer) Based Cisco Application that provides VPN functionality without having to install a full client for end users running Microsoft
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
White paper. The Big Data Security Gap: Protecting the Hadoop Cluster
The Big Data Security Gap: Protecting the Hadoop Cluster Introduction While the open source framework has enabled the footprint of Hadoop to logically expand, enterprise organizations face deployment and
ABFAB and OpenStack(in the Cloud)
ABFAB and OpenStack(in the Cloud) David W Chadwick University of Kent 1 Authentication in OpenStack Keystone User Trust Relationship Swift/Glance etc. 2 Federated Authnwith External IdPs External IdP User
U-LITE Network Infrastructure
U-LITE: a proposal for scientific computing at LNGS S. Parlati, P. Spinnato, S. Stalio LNGS 13 Sep. 2011 20 years of Scientific Computing at LNGS Early 90s: highly centralized structure based on VMS cluster
SUSE Cloud Installation: Best Practices Using an Existing SMT and KVM Environment
Best Practices Guide www.suse.com SUSE Cloud Installation: Best Practices Using an Existing SMT and KVM Environment Written by B1 Systems GmbH Table of Contents Introduction...3 Use Case Overview...3 Hardware
Deploying SwiftStack Object Storage for OpenStack Glance and Cinder Backups
Deploying SwiftStack Object Storage for OpenStack Glance and Cinder Backups February 2015 Page 1 Table of Contents Table of Contents Introduction What is Swift and SwiftStack? Where do I use it? Preparation
Business and enterprise cloud sync, backup and sharing solutions
Business and enterprise cloud sync, backup and sharing solutions Private Cloud Synchronization Collaboration Backup / Versioning Web Access Mobile Access LDAP / Active Directory Federated RADIUS Single
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
SharePoint 2013 Logical Architecture
SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing
VOLUME 1, NUMBER 1, JUNE 2014 OPEN JOURNAL OF INFORMATION SECURITY AND APPLICATIONS Enabling Public Accountability and Data Sharing for Storage Security in Cloud Computing K. Mohammed Aaqib Ameen, A. Anny
White Paper. Simplify SSL Certificate Management Across the Enterprise
WHITE PAPER: SIMPLIFY SSL CERTIFICATE MANAGEMENT ACROSS THE ENTERPRISE White Paper Simplify SSL Certificate Management Across the Enterprise Simplify SSL Certificate Management Across the Enterprise Contents
