Software Design Document Securing Web Service with Proxy

Size: px
Start display at page:

Download "Software Design Document Securing Web Service with Proxy"

Transcription

1 Software Design Document Securing Web Service with Proxy Federated Access Manager 8.0 Version 0.3 Please send comments to: This document is subject to the following license: COMMON DEVELOPMENT AND DISTRIBUTION LICENSE (CDDL) Version 1.0

2

3 Contents 1 Introduction Document Status Revision History Summary Scope Context Glossary References Overview Design Considerations Assumptions and Dependencies Goals and Guidelines Development Method Architectural Strategies Limitations System Architecture Detailed System Architecture Performance Installation Appendices Appendix-A: AMConfig.properties template...16 Copyright 2007 Sun Microsystems, Inc. All rights reserved. iii

4

5 1 Introduction 1.1 Document Status Project Name Federated Access Manager 8.0 Document Title Securing Web Service with Proxy Date of Issue 07/11/07 Current Version 0.3 Author Dennis Seah Issuing Organization Sun Microsystems, Inc. Feedback 1.2 Revision History Date Version Author Comments 07/11/ Dennis Seah Initial Draft 07/20/ Dennis Seah Incorporated Feedback from Mrudul add more information of configuration of WS Proxy add limitations of WS Proxy as compared to container specific WSS Providers 07/25/ Dennis Seah Incorporated Feedback from FAM-WSS team members add more information on how performance figures are gathered add information on how to handle agent profile from sub realm. alter section on Configuration to handle AMConfig.properties the same way as other WSS plugin setups. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 1

6 Securing Web Service with Proxy, Version Introduction 1.3 Summary This document describes the design details of securing web service with a web proxy which uses Federated Access Manager's Web Service Security APIs. 1.4 Scope This document is limited to the design aspects of web proxy which is to secure web service. It does not include information on Federated Access Manager's Web Service Security Core API implementations. It also do not contain information on how tosecure the communication channels between WSC/WSP and proxy. 1.5 Context This document is written for architects, OpenSSO developers and QA engineers. Readers should understand the Web-Tier on Java Enterprise Edition (JavaEE) specification; and familiar with the Federated Access Manager's Web Service Security Core APIs. 1.6 Glossary API FAM JAX-RPC JAX-WS JavaEE OpenSSO SOAP STS WSDL WS WSC Application Programming Interface Federated Access Manager Java API for XML-Based RPC Java API for XML-Based Web Services Java Enterprise Edition Open Source - Single Sign On. An open source project funded by Sun Microsystems Inc to provide secure single sign on solutions Simple Object Access Protocol Security Token Service Web Service Definition Language Web Service Web Service Client 2 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

7 Introduction Securing Web Service with Proxy, Version 0.3 WSP WSS Web Service Provider Web Service Security 1.7 References [1] Web Service Security Software Requirement Specification by Mrudul Uchil [2] WSS framework & SWS on Glassfish Software Design Document by Mrudul Uchil [3] Security Token Service Software Design Document by Mrudul Uchil [4] Web Service Security for Weblogic Software Design Document by Malla Simhachalam and Hua Cui Copyright 2007 Sun Microsystems, Inc. All rights reserved. 3

8

9 2 Overview Web Service is widely used to integrate web based applications. SOAP is used to transfer request and response between WSC and WSP. This document describes a way to secure the WS request and response when we do not have control over the WSC's and/or WSP's deployment environment. And/Or, when there are no common WS-Security mechanisms between WSC and WSP (in cases when STS cannot be used). This way of securing web security shall work for both JAX-RPC and JAX-WS. Essentially, we introduce a web application (into the WS deployment environment) which acts as proxy to secure WS messages. Followings are the possible setup. 1. WSC and WSP rely on proxy to secure WS messages. Figure 1: WSC Proxy and WSP Proxy 2. WSC relies on proxy to secure WS request and validate WS response. WSP already has the ability to validate WS request and secure WS response. Figure 2: WSC with Proxy 3. WSC already has the ability to secure WS request and validate WS response. WSP relies on proxy to validate WS request and secure WS response. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 5

10 Securing Web Service with Proxy, Version Overview Figure 3: WSP with Proxy 6 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

11 Design Considerations Securing Web Service with Proxy, Version Design Considerations 3.1 Assumptions and Dependencies Some application servers do not provide security mechanisms for securing WS request and response. Or if they do, WSC and WSP may not have any common security mechanisms. The WS-Security Proxy is dependent on FAM s Web Service Security APIs and also FAM s IdRepo API (for fetching WSC and WSP profiles). 3.2 Goals and Guidelines The goal is to secure WS request and response that works on all application servers in a least intrusive manner. The benefits of this approach are 1. Works for all application servers 2. Do not require change on WSP deployment. 3. Minimum changes to WSC s WSDL. 3.3 Development Method We are adopting OpenSSO Development Method. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 7

12 Securing Web Service with Proxy, Version Architectural Strategies 4 Architectural Strategies The WS-Security Proxy uses FAM s Web Service Security APIs for securing WS request and response; and to validate them. And, it also uses FAM s remote IdRepo API to read WSC Agent s and WSP Agent s profile to obtain the WSP End point. The strategy is to route the WS SOAP messages (request and response) through the WS-Security Proxy; and have the proxy to secure and validate the messages. Since proxy does not share the same JVM space with the WSC and WSP; and it is agnostic to the type of messages (can be JAX-RPC or JAX-WS) that it is operating on, WS-Security Proxy provides a least intrusive way to secure WS messages. 4.1 Limitations There are some limitations to this WS-Security Proxy approach and they are 1. One has to make sure that the communication channel between and WSC and WSC s Proxy; and WSP s Proxy and WSP are secured. 2. WS Proxy would be not be able take advantage of "Subject" that is being set within the container: WSC Proxy would not be able set the security token based on the "Subject" WSP Proxy would not be able to set the "Subject" 8 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

13 System Architecture Securing Web Service with Proxy, Version System Architecture Below are the high level architecture diagram and event sequence diagram. Figure 4: High Level Architecture Diagram Figure 5: Event Sequence Diagram [1] WSC makes a WS request through its WS-Security Proxy. [2] WSC s Proxy makes a FAM s remote IdRepo call to get the WSP s WS end point (in this case, it is the WS-Security Proxy on the WSP end). [3] WSC s Proxy calls the FAM s WS-Security API to secure the WS Request and then send (with HttpURLConnection) the secured message to the WSP s Proxy. [4] WSP s Proxy makes a FAM s remote IdRepo call to get the WSP s WS end point. [5] WSP s Proxy validates the secured WS Request before sending the WS Request (with HttpURLConnection) to the WSP. [6] WSP processes the request and return the WS Response to WSP s Proxy. [7] WSP s Proxy calls the FAM s WS-Security API to secure the WS Response and then send (with HttpURLConnection) the secured message to the WSC s Proxy. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 9

14 Securing Web Service with Proxy, Version System Architecture [8] WSC s Proxy validates the secured WS Response before returning it to the WSC. 10 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

15 Detailed System Architecture Securing Web Service with Proxy, Version Detailed System Architecture Followings are the main components in the system. 1. Web Service Client, WSC WSC is the component that request for a service from the WSP using JAX-RPC or JAX-WS protocol. In this WS-Security Proxy approach, WSC contacts the WSC s Proxy to get the WSP s WSDL (instead of contacting WSP directly). The diagram below illustrates this. Figure 6: Sequence Diagram for fetching WSDL [1] WSC contacts WSC s Proxy for WSP s WSDL e.g. [2] WSC s Proxy contacts FAM to get the WSP s endpoint (in the case, it is the WSP s Proxy). The last token of the URL is used to determine the WS-Security agent Id. In this case, it is wsc. [3] WSC s Proxy contacts WSP s Proxy for WSDL e.g. [4] WSP s Proxy contacts FAM to get the WSP s endpoint. The last token of the URL is used to determine the WS-Security agent Id. In this case, it is wsp. [5] WSP s Proxy contacts WSP for WSDL [6] WSP provides the WSDL [7] WSP s Proxy alters the soap-address in the WSDL to its URL. e.g. returning it to WSC s proxy. [8] WSC s Proxy alters the soap-address in the WSDL to its URL. e.g. before returning it to WSC. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 11

16 Securing Web Service with Proxy, Version Detailed System Architecture Note that the WSDL is altered in the manner that WS Request will be routed to WSC s Proxy automatically. 2. Web Service Provider, WSP WSP is the component that provide services to WSC using JAX-RPC or JAX-WS protocol. In this proxy approach, WSP needs not be altered. 3. Web Service Client Proxy, WSC s Proxy In Figure 5, we illustrated how WSC s Proxy secures WS request and validate WS response. And, in Figure 6, we illustrated how it fetches WSDL. 4. Web Service Provider Proxy, WSC s Proxy In Figure 5, we illustrated how WSP s Proxy secures WS response and validate WS request. And, in Figure 6, we illustrated how it fetches WSDL. 5. FAM Federated Access Manager provides the WS-Security API for securing WS request and response; and validate them. And, provides remote IdRepo API for accessing WS-Security agent profiles. Up to this point, we have provided a succinct view of how WS-Security Proxy. With this as the baseline, we shall further describes the WS-Security Proxy in details. WS-Security Proxy is an Java EE web application. It comprises of these major objects. 1. WEB-INF/web.xml 2. WEB-INF/classes/AMConfig.properties 3. WEB-INF/classes/com/sun/identity/w s/proxy/securityproxy.class 4. WEB-INF/lib/amclientsdk.jar 5. WEB-INF/lib/fmclientsdk.jar 6. WEB-INF/lib/ldapjdk.jar This is how the web.xml looks like 12 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

17 Detailed System Architecture Securing Web Service with Proxy, Version 0.3 <?xml version="1.0" encoding="utf-8"?> <web-app version="2.4" xmlns=" xmlns:xsi=" xsi:schemalocation=" <servlet> <servlet-name>securityproxy</servlet-name> <servlet-class>com.sun.identity.wss.proxy.securityproxy</servlet-class> </servlet> <servlet-mapping> <servlet-name>securityproxy</servlet-name> <url-pattern>/securityproxy</url-pattern> </servlet-mapping> <welcome-file-list> <welcome-file> index.jsp </welcome-file> </welcome-file-list> </web-app> AMConfig.properties contains configuration information on how to communicate with FAM. SecurityProxy.class is the implementation of the WS-Security Proxy. It is a servlet. Followings are the pseudo code for the main method in SecurityProxy.class //doget and dopost calls the processrequest method void processrequest { String contenttype = request.getcontenttype(); String wsdl = request.getparameter("wsdl"); if (wsdl!= null) { processwsdlrequest } else if ((contenttype!= null) && (contenttype.indexof("text/xml")!= -1) ) { processwsrequest } else { Copyright 2007 Sun Microsystems, Inc. All rights reserved. 13

18 Securing Web Service with Proxy, Version Detailed System Architecture } } printsevletdescription void processwsdlrequest { getwspendpointwithagentid (AgentId is derived from URL. e.g. /wsc from open URLConnection and fetch WSDL alter the soap-address to servlet URL write the WSDL back to the response. } void processwsrequest { getwspendpointwithagentid getsoapmessage from request object. getagentprofile to determine if this proxy is a WSC's Proxy or WSP's. if (WSC's proxy) securerequest else validaterequest open URLConnection with WSPEndPoint and post the SOAP Message get the result from the Post if (WSC's proxy) validateresponse else secureresponse write the resulting SOAP message back to the original response. } 6.1 Performance Performance is an issue with this WS-Security Proxy approach because there is an extra XML parsing involved in the process of securing the message. From our prototype, here is the result that we have gotten. 14 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

19 Detailed System Architecture Securing Web Service with Proxy, Version 0.3 Machine Configuration: Sun-Blade 2500 (1.6-GHz UltraSPARC IIIi processors) Running Solaris 10 Running Glassfish (Sun Java System Application Server 9.1 (build b41d-beta2)) Running Access Manager 7.1 Sequence 100 web service calls. Results are shown in seconds. WSS Setup/Sec. Mech. Anonymous SAML HolderOfKey User Token X509Token G-WSC + G-WSP G-WSC + WSP-Proxy WSC-Proxy + G-WSP WSC-Proxy + WSP-Proxy G-WSC: Glassfish WSS Provider on WSC end G-WSP: Glassfish WSS Provider on WSP end 6.2 Installation Followings are the steps to configure WS-Security Proxy. 1. Create AMConfig.properties and include it in WEB-INF/classes directory of the WS-Security Proxy war fie. See Appendix-A for AMConfig.properties template. The following values need to be obtained from user to tag swap this template. This will be done consistently with other WS- Security plugins that are shipped with FAM. 2. Deploy the WAR. 3. Create WSC and WSP profiles 4. For existing WSC, alter the WSDL s soap-address in WSC s WSDL to point to the WS-Security Proxy. For new WSC, use WS-Security to query for WSP s WSDL. Copyright 2007 Sun Microsystems, Inc. All rights reserved. 15

20 Securing Web Service with Proxy, Version Appendices 7 Appendices 7.1 Appendix-A: AMConfig.properties template The following keys are used to configure the Debug service. * Possible values for the key 'level' are: off error warning message. * The key 'directory' specifies the output directory where the debug files * will be created. * Trailing spaces are significant. * Windows: Use forward slashes "/" separate directories, not backslash "\". * Windows: Spaces in the file name are allowed for Windows. com.iplanet.services.debug.level=error com.iplanet.services.debug.directory=@debug_dir@ * Naming URL com.iplanet.am.naming.url=@naming_url@ * Notification URL com.iplanet.am.notification.url= * Security Credentails to read the configuration data com.sun.identity.agents.app.username=urlaccessagent com.iplanet.am.service.password=@application_passwd@ com.iplanet.am.service.secret=@encoded_application_password@ * Encryption key that will be used to encrypt and decypt * data to communicate with the server. * This key is needed to decrypt passwords stored * in the SMS configuration. am.encryption.pwd=@encryption_key@ * Encryption key that will be used to encrypt and decypt * data used locally within the client. com.sun.identity.client.encryptionkey=@encryption_key_local@ * Encryption: The key "com.iplanet.security.encryptor" specifies * the encrypting class implementation. * Available classes are: * com.iplanet.services.util.jceencryption * com.iplanet.services.util.jssencryption 16 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

21 Appendices Securing Web Service with Proxy, Version 0.3 com.iplanet.security.encryptor=com.iplanet.services.util.jceencryption * Property to enable/disable the notifications for am.sdk and IdRepo Caches. * If set to "true" notifications are enabled and disabled if set to "false". com.sun.identity.idm.remote.notification.enabled=true * Cache update time (in minutes) for am.sdk & IdRepo Caches * if notification URL is not provided or if notifications are disabled. * Note: * 1. This property is applicable only if 'com.iplanet.am.notification.url' * is not provided or if 'com.sun.identity.idm.remote.notification.enabled' * is set to 'false'. * 2. If the polling time is set as 0, then polling is disabled. com.iplanet.am.sdk.remote.pollingtime=1 * Property to enable/disable the notifications for service management caches. * If set to "true" notifications are enabled and disabled if set to "false". com.sun.identity.sm.notification.enabled=true * Cache update time (in minutes) for service configuration data, * if notification URL is not provided or if notifications are disabled. * Note: * 1. This property is applicable only if 'com.iplanet.am.notification.url' * is not provided or if 'com.sun.identity.sm.notification.enabled' is * set to 'false'. * 2. If the cache time is set as 0, then no cache updates will occur. com.sun.identity.sm.cachetime=1 * Server protocol, host and port to be used by Authentication Service com.iplanet.am.server.protocol=@server_protocol@ com.iplanet.am.server.host=@server_host@ com.iplanet.am.server.port=@server_port@ com.iplanet.am.cookie.name=iplanetdirectorypro * Session related properties. com.iplanet.am.session.client.polling.enable=true com.iplanet.am.session.client.polling.period=180 * Supported SOAP actors. Each actor must be seperated by ' ' com.sun.identity.liberty.ws.soap.supportedactors= Copyright 2007 Sun Microsystems, Inc. All rights reserved. 17

22 Securing Web Service with Proxy, Version Appendices 18 Copyright 2007 Sun Microsystems, Inc. All rights reserved.

Software Requirement Specification Web Services Security

Software Requirement Specification Web Services Security Software Requirement Specification Web Services Security Federation Manager 7.5 Version 0.3 (Draft) Please send comments to: dev@opensso.dev.java.net This document is subject to the following license:

More information

Copyright 2012, Oracle and/or its affiliates. All rights reserved.

Copyright 2012, Oracle and/or its affiliates. All rights reserved. 1 OTM and SOA Mark Hagan Principal Software Engineer Oracle Product Development Content What is SOA? What is Web Services Security? Web Services Security in OTM Futures 3 PARADIGM 4 Content What is SOA?

More information

Web Service Development Using CXF. - Praveen Kumar Jayaram

Web Service Development Using CXF. - Praveen Kumar Jayaram Web Service Development Using CXF - Praveen Kumar Jayaram Introduction to WS Web Service define a standard way of integrating systems using XML, SOAP, WSDL and UDDI open standards over an internet protocol

More information

Module 13 Implementing Java EE Web Services with JAX-WS

Module 13 Implementing Java EE Web Services with JAX-WS Module 13 Implementing Java EE Web Services with JAX-WS Objectives Describe endpoints supported by Java EE 5 Describe the requirements of the JAX-WS servlet endpoints Describe the requirements of JAX-WS

More information

Introduction to Oracle WebLogic. Presented by: Fatna Belqasmi, PhD, Researcher at Ericsson

Introduction to Oracle WebLogic. Presented by: Fatna Belqasmi, PhD, Researcher at Ericsson Introduction to Oracle WebLogic Presented by: Fatna Belqasmi, PhD, Researcher at Ericsson Agenda Overview Download and installation A concrete scenario using the real product Hints for the project Overview

More information

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.

Web Services Security: OpenSSO and Access Management for SOA. Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion. Web Services Security: OpenSSO and Access Management for SOA Sang Shin Java Technology Evangelist Sun Microsystems, Inc. javapassion.com 1 Agenda Need for Identity-based Web services security Single Sign-On

More information

Software Design Document SAMLv2 IDP Proxying

Software Design Document SAMLv2 IDP Proxying Software Design Document SAMLv2 IDP Proxying Federation Manager 7.5 Version 0.2 Please send comments to: dev@opensso.dev.java.net This document is subject to the following license: COMMON DEVELOPMENT AND

More information

JBoss SOAP Web Services User Guide. Version: 3.3.0.M5

JBoss SOAP Web Services User Guide. Version: 3.3.0.M5 JBoss SOAP Web Services User Guide Version: 3.3.0.M5 1. JBoss SOAP Web Services Runtime and Tools support Overview... 1 1.1. Key Features of JBossWS... 1 2. Creating a Simple Web Service... 3 2.1. Generation...

More information

A Java proxy for MS SQL Server Reporting Services

A Java proxy for MS SQL Server Reporting Services 1 of 5 1/10/2005 9:37 PM Advertisement: Support JavaWorld, click here! January 2005 HOME FEATURED TUTORIALS COLUMNS NEWS & REVIEWS FORUM JW RESOURCES ABOUT JW A Java proxy for MS SQL Server Reporting Services

More information

JVA-561. Developing SOAP Web Services in Java

JVA-561. Developing SOAP Web Services in Java JVA-561. Developing SOAP Web Services in Java Version 2.2 A comprehensive look at the state of the art in developing interoperable web services on the Java EE 6 platform. Students learn the key standards

More information

WEB SERVICES. Revised 9/29/2015

WEB SERVICES. Revised 9/29/2015 WEB SERVICES Revised 9/29/2015 This Page Intentionally Left Blank Table of Contents Web Services using WebLogic... 1 Developing Web Services on WebSphere... 2 Developing RESTful Services in Java v1.1...

More information

WebService Security. A guide to set up highly secured client-server communications using WS-Security extensions to the SOAP protocol

WebService Security. A guide to set up highly secured client-server communications using WS-Security extensions to the SOAP protocol WebService Security A guide to set up highly secured client-server communications using WS-Security extensions to the SOAP protocol Jam Hamidi Senior Technical Analyst BCcampus, Victoria, British Columbia,

More information

Securing Web Services From Encryption to a Web Service Security Infrastructure

Securing Web Services From Encryption to a Web Service Security Infrastructure Securing Web Services From Encryption to a Web Service Security Infrastructure Kerberos WS-Security X.509 TLS Gateway OWSM WS-Policy Peter Lorenzen WS-Addressing Agent SAML Policy Manager Technology Manager

More information

White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems

White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems White Paper March 1, 2005 Integrating AR System with Single Sign-On (SSO) authentication systems Copyright 2005 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service

More information

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices

More information

StreamServe Persuasion SP5 StreamStudio

StreamServe Persuasion SP5 StreamStudio StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other

More information

Configure a SOAScheduler for a composite in SOA Suite 11g. By Robert Baumgartner, Senior Solution Architect ORACLE

Configure a SOAScheduler for a composite in SOA Suite 11g. By Robert Baumgartner, Senior Solution Architect ORACLE Configure a SOAScheduler for a composite in SOA Suite 11g By Robert Baumgartner, Senior Solution Architect ORACLE November 2010 Scheduler for the Oracle SOA Suite 11g: SOAScheduler Page 1 Prerequisite

More information

JAVA API FOR XML WEB SERVICES (JAX-WS)

JAVA API FOR XML WEB SERVICES (JAX-WS) JAVA API FOR XML WEB SERVICES (JAX-WS) INTRODUCTION AND PURPOSE The Java API for XML Web Services (JAX-WS) is a Java programming language API for creating web services. JAX-WS 2.0 replaced the JAX-RPC

More information

Session Service Architecture

Session Service Architecture Session Service Architecture Open Web Single Sign-On Version 1.0 Please send comments to: opensso@sun.com Author Alan Chu (alan.chu@sun.com) Session Service Architecture, Version 1.0 This document is subject

More information

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact

Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Secure Identity Propagation Using WS- Trust, SAML2, and WS-Security 12 Apr 2011 IBM Impact Robert C. Broeckelmann Jr., Enterprise Middleware Architect Ryan Triplett, Middleware Security Architect Requirements

More information

Integrating CRM On Demand with the E-Business Suite to Supercharge your Sales Team

Integrating CRM On Demand with the E-Business Suite to Supercharge your Sales Team Integrating CRM On Demand with the E-Business Suite to Supercharge your Sales Team Presented by: Tom Connolly, Jason Lieberman Company: BizTech Session ID: #10351 Overview Introductions Background Web

More information

Configuring BEA WebLogic Server for Web Authentication with SAS 9.2 Web Applications

Configuring BEA WebLogic Server for Web Authentication with SAS 9.2 Web Applications Configuration Guide Configuring BEA WebLogic Server for Web Authentication with SAS 9.2 Web Applications This document describes how to configure Web authentication with BEA WebLogic for the SAS Web applications.

More information

Towards an Open Identity Infrastructure with OpenSSO. RMLL Nantes July 10 2009. Fulup Ar Foll Master Architect fulup@sun.com

Towards an Open Identity Infrastructure with OpenSSO. RMLL Nantes July 10 2009. Fulup Ar Foll Master Architect fulup@sun.com Towards an Open Identity Infrastructure with OpenSSO RMLL Nantes July 10 2009 Fulup Ar Foll Master Architect fulup@sun.com 1 Towards an Open Identity Infrastructure with OpenSSO OpenSSO Overview > Integration

More information

How To Configure The Jasig Casa Single Sign On On A Workstation On Ahtml.Org On A Server On A Microsoft Server On An Ubuntu 7.5.3 (Windows) On A Linux Computer On A Raspberry V

How To Configure The Jasig Casa Single Sign On On A Workstation On Ahtml.Org On A Server On A Microsoft Server On An Ubuntu 7.5.3 (Windows) On A Linux Computer On A Raspberry V Configuring CAS-based SSO with ActiveVOS on Apache Tomcat Technical Note Version: 1.3 Dated: August 2013 2013 Informatica Corporation ActiveVOS is a trademark of Informatica, Inc. All other company and

More information

GlassFish Security. open source community experience distilled. security measures. Secure your GlassFish installation, Web applications,

GlassFish Security. open source community experience distilled. security measures. Secure your GlassFish installation, Web applications, GlassFish Security Secure your GlassFish installation, Web applications, EJB applications, application client module, and Web Services using Java EE and GlassFish security measures Masoud Kalali PUBLISHING

More information

Web Application Architecture (based J2EE 1.4 Tutorial)

Web Application Architecture (based J2EE 1.4 Tutorial) Web Application Architecture (based J2EE 1.4 Tutorial) 1 Disclaimer & Acknowledgments Even though Sang Shin is a full-time employee of Sun Microsystems, the contents here are created as his own personal

More information

Developing Java Web Services

Developing Java Web Services Page 1 of 5 Developing Java Web Services Hands On 35 Hours Online 5 Days In-Classroom A comprehensive look at the state of the art in developing interoperable web services on the Java EE platform. Students

More information

Securing a Web Service

Securing a Web Service 1 Securing a Web Service HTTP Basic Authentication and HTTPS/SSL Authentication and Encryption - Read Chaper 32 of the J2EE Tutorial - protected session, described later in this chapter, which ensur content

More information

Using mobile phones to access Web Services in a secure way. Dan Marinescu

Using mobile phones to access Web Services in a secure way. Dan Marinescu Using mobile phones to access Web Services in a secure way Dan Marinescu March 7, 2007 Abstract Web Services is a technology that has gained in acceptance and popularity over the past years. The promise

More information

Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.

Oracle WebLogic Foundation of Oracle Fusion Middleware. Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin. Oracle WebLogic Foundation of Oracle Fusion Middleware Lawrence Manickam Toyork Systems Inc www.toyork.com http://ca.linkedin.com/in/lawrence143 History of WebLogic WebLogic Inc started in 1995 was a company

More information

2sms SMS API Overview

2sms SMS API Overview 2sms SMS API Overview Do you, or your customers, use any of the following software solutions in your business? If the answer is Yes, then 2sms provides the extensive SMS API Library that gives your software

More information

Migrating to vcloud Automation Center 6.1

Migrating to vcloud Automation Center 6.1 Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Workshop for WebLogic introduces new tools in support of Java EE 5.0 standards. The support for Java EE5 includes the following technologies:

Workshop for WebLogic introduces new tools in support of Java EE 5.0 standards. The support for Java EE5 includes the following technologies: Oracle Workshop for WebLogic 10g R3 Hands on Labs Workshop for WebLogic extends Eclipse and Web Tools Platform for development of Web Services, Java, JavaEE, Object Relational Mapping, Spring, Beehive,

More information

Connecting Custom Services to the YAWL Engine. Beta 7 Release

Connecting Custom Services to the YAWL Engine. Beta 7 Release Connecting Custom Services to the YAWL Engine Beta 7 Release Document Control Date Author Version Change 25 Feb 2005 Marlon Dumas, 0.1 Initial Draft Tore Fjellheim, Lachlan Aldred 3 March 2006 Lachlan

More information

ObserveIT Service Desk Integration Guide

ObserveIT Service Desk Integration Guide ObserveIT Service Desk Integration Guide Contents 1 Purpose of this Document... 2 2 Overview and Architecture... 2 3 Web Services Integration... 3 4 Customizing a New Service Desk System... 4 5 Appendix:

More information

Clustering with Tomcat. Introduction. O'Reilly Network: Clustering with Tomcat. by Shyam Kumar Doddavula 07/17/2002

Clustering with Tomcat. Introduction. O'Reilly Network: Clustering with Tomcat. by Shyam Kumar Doddavula 07/17/2002 Page 1 of 9 Published on The O'Reilly Network (http://www.oreillynet.com/) http://www.oreillynet.com/pub/a/onjava/2002/07/17/tomcluster.html See this if you're having trouble printing code examples Clustering

More information

ObserveIT Ticketing Integration Guide

ObserveIT Ticketing Integration Guide ObserveIT Ticketing Integration Guide Contents 1 Purpose of this Document... 2 2 Overview and Architecture... 2 3 Web Services Integration... 3 4 Customizing a New Ticketing System... 4 5 Appendix: Web

More information

EMC Documentum Content Management Interoperability Services

EMC Documentum Content Management Interoperability Services EMC Documentum Content Management Interoperability Services Version 6.7 Deployment Guide EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com EMC believes the information

More information

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service

An Oracle White Paper Dec 2013. Oracle Access Management Security Token Service An Oracle White Paper Dec 2013 Oracle Access Management Security Token Service Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only,

More information

KonyOne Server Prerequisites _ MS SQL Server

KonyOne Server Prerequisites _ MS SQL Server KonyOne Server Prerequisites _ MS SQL Server KonyOne Platform Release 5.0 Copyright 2012-2013 Kony Solutions, Inc. All Rights Reserved. Page 1 of 13 Copyright 2012-2013 by Kony Solutions, Inc. All rights

More information

ITS. Java WebService. ITS Data-Solutions Pvt Ltd BENEFITS OF ATTENDANCE:

ITS. Java WebService. ITS Data-Solutions Pvt Ltd BENEFITS OF ATTENDANCE: Java WebService BENEFITS OF ATTENDANCE: PREREQUISITES: Upon completion of this course, students will be able to: Describe the interoperable web services architecture, including the roles of SOAP and WSDL.

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Single Sign-On Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: November 4, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Secure the Web: OpenSSO

Secure the Web: OpenSSO Secure the Web: OpenSSO Sang Shin, Technology Architect Sun Microsystems, Inc. javapassion.com Pat Patterson, Principal Engineer Sun Microsystems, Inc. blogs.sun.com/superpat 1 Agenda Need for identity-based

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Single Sign-On Implementation Guide Salesforce, Summer 15 @salesforcedocs Last updated: July 1, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of

More information

Authentication and Single Sign On

Authentication and Single Sign On Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication

More information

Architectural Overview

Architectural Overview Architectural Overview Version 7 Part Number 817-2167-10 March 2003 A Sun ONE Application Server 7 deployment consists of a number of application server instances, an administrative server and, optionally,

More information

Web Container Components Servlet JSP Tag Libraries

Web Container Components Servlet JSP Tag Libraries Web Application Development, Best Practices by Jeff Zhuk, JavaSchool.com ITS, Inc. dean@javaschool.com Web Container Components Servlet JSP Tag Libraries Servlet Standard Java class to handle an HTTP request

More information

Choose an IBM WebSphere Application Server configuration to suit your business needs

Choose an IBM WebSphere Application Server configuration to suit your business needs IBM is the industry s market leading foundation for building, deploying, reusing, integrating and managing applications and services Choose an IBM configuration to suit your business needs Highlights Unparalleled

More information

[1]Oracle Communications Billing and Revenue Management Web Services Manager Release 7.5 E16724-11

[1]Oracle Communications Billing and Revenue Management Web Services Manager Release 7.5 E16724-11 [1]Oracle Communications Billing and Revenue Management Web Services Manager Release 7.5 E16724-11 December 2015 Oracle Communications Billing and Revenue Management Web Services Manager, Release 7.5 E16724-11

More information

Creating Web Services in NetBeans

Creating Web Services in NetBeans Creating Web Services in NetBeans Fulvio Frati fulvio.frati@unimi.it Sesar Lab http://ra.crema.unimi.it 1 Outline Web Services Overview Creation of a Web Services Server Creation of different Web Services

More information

OpenSSO Monitoring Euro User Groups Winter 2010

OpenSSO Monitoring Euro User Groups Winter 2010 OpenSSO Monitoring Euro User Groups Winter 2010 Victor Ake Identity Architect ForgeRock.com Agenda What is new in OpenSSO Express 9 Monitoring OpenSSO Express 9 What is new in OpenSSO Expresss 9 Web container

More information

Oracle Application Server 10g Web Services Frequently Asked Questions Oct, 2006

Oracle Application Server 10g Web Services Frequently Asked Questions Oct, 2006 Oracle Application Server 10g Web Services Frequently Asked Questions Oct, 2006 This FAQ addresses frequently asked questions relating to Oracle Application Server 10g Release 3 (10.1.3.1) Web Services

More information

IBM Rational Rapid Developer Components & Web Services

IBM Rational Rapid Developer Components & Web Services A Technical How-to Guide for Creating Components and Web Services in Rational Rapid Developer June, 2003 Rev. 1.00 IBM Rational Rapid Developer Glenn A. Webster Staff Technical Writer Executive Summary

More information

Server based signature service. Overview

Server based signature service. Overview 1(11) Server based signature service Overview Based on federated identity Swedish e-identification infrastructure 2(11) Table of contents 1 INTRODUCTION... 3 2 FUNCTIONAL... 4 3 SIGN SUPPORT SERVICE...

More information

Controlling Web Application Behavior

Controlling Web Application Behavior 2006 Marty Hall Controlling Web Application Behavior The Deployment Descriptor: web.xml JSP, Servlet, Struts, JSF, AJAX, & Java 5 Training: http://courses.coreservlets.com J2EE Books from Sun Press: http://www.coreservlets.com

More information

Microsoft Active Directory Oracle Enterprise Gateway Integration Guide

Microsoft Active Directory Oracle Enterprise Gateway Integration Guide An Oracle White Paper May 2011 Microsoft Active Directory Oracle Enterprise Gateway Integration Guide 1/33 Disclaimer The following is intended to outline our general product direction. It is intended

More information

Custom Encryption in Siebel & Siebel Web Service Security Test Guide 1.0

Custom Encryption in Siebel & Siebel Web Service Security Test Guide 1.0 Custom Encryption in Siebel & Siebel Web Security Test Guide 1.0 Muralidhar Reddy Introduction Siebel (7.5 onwards and upto 8.1) natively supports 2 Types of Inbound web Security 1. WS Security UserName

More information

Digital Signature Web Service Interface

Digital Signature Web Service Interface 1 2 Digital Signature Web Service Interface 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 1 Introduction This document describes an RPC interface for a centralized

More information

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines

Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...

More information

NetBeans IDE Field Guide

NetBeans IDE Field Guide NetBeans IDE Field Guide Copyright 2005 Sun Microsystems, Inc. All rights reserved. Table of Contents Introduction to J2EE Development in NetBeans IDE...1 Configuring the IDE for J2EE Development...2 Getting

More information

TIBCO ActiveMatrix BPM SOA Development Tutorials

TIBCO ActiveMatrix BPM SOA Development Tutorials TIBCO ActiveMatrix BPM SOA Development Tutorials Software Release 3.0 May 2014 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Mutual Fund Web Service Developer Guide

Mutual Fund Web Service Developer Guide Mutual Fund Web Service Developer Guide Version 1.0 1 Table of Contents 1 Introduction 3 1.1 Summary 3 1.2 Audience 3 1.3 Terminology 3 1.4 What Kind of a Partner Site Am I? 3 1.4.1 Affiliate site 3 1.4.2

More information

This training is targeted at System Administrators and developers wanting to understand more about administering a WebLogic instance.

This training is targeted at System Administrators and developers wanting to understand more about administering a WebLogic instance. This course teaches system/application administrators to setup, configure and manage an Oracle WebLogic Application Server, its resources and environment and the Java EE Applications running on it. This

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Configure Outbound Web Services 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject

More information

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1 PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity

More information

CS 356 Lecture 28 Internet Authentication. Spring 2013

CS 356 Lecture 28 Internet Authentication. Spring 2013 CS 356 Lecture 28 Internet Authentication Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists

More information

Web Services Advanced Topics

Web Services Advanced Topics Web Services Advanced Topics Where things are now and where they are going Version 9 Web Services Advanced Topics WSAdvanced-2 Enterprise Web Services Industry trends and organizations Security and Reliability

More information

000-284. Easy CramBible Lab DEMO ONLY VERSION 000-284. Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0

000-284. Easy CramBible Lab DEMO ONLY VERSION 000-284. Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0 Easy CramBible Lab 000-284 Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0 ** Single-user License ** This copy can be only used by yourself for educational purposes Web: http://www.crambible.com/

More information

Using SAML for Single Sign-On in the SOA Software Platform

Using SAML for Single Sign-On in the SOA Software Platform Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software

More information

Single Sign-On Implementation Guide

Single Sign-On Implementation Guide Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,

More information

Java Web Services Training

Java Web Services Training Java Web Services Training Duration: 5 days Class Overview A comprehensive look at the state of the art in developing interoperable web services on the Java EE 6 platform. Students learn the key standards

More information

NGASI AppServer Manager SaaS/ASP Hosting Automation for Cloud Computing Administrator and User Guide

NGASI AppServer Manager SaaS/ASP Hosting Automation for Cloud Computing Administrator and User Guide NGASI AppServer Manager SaaS/ASP Hosting Automation for Cloud Computing Administrator and User Guide NGASI SaaS Hosting Automation is a JAVA SaaS Enablement infrastructure that enables web hosting services

More information

Project SailFin: Building and Hosting Your Own Communication Server.

Project SailFin: Building and Hosting Your Own Communication Server. FSFS Conference: Dec 9-11, Thiruvananthapuram Project SailFin: Building and Hosting Your Own Communication Server. Binod PG Senior Staff Engineer Sun Microsystems, Inc. 1 Agenda SailFin: Open Source Java

More information

SAML Security Option White Paper

SAML Security Option White Paper Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions

More information

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license

More information

THE CHALLENGE OF ADMINISTERING WEBSITES OR APPLICATIONS THAT REQUIRE 24/7 ACCESSIBILITY

THE CHALLENGE OF ADMINISTERING WEBSITES OR APPLICATIONS THAT REQUIRE 24/7 ACCESSIBILITY THE CHALLENGE OF ADMINISTERING WEBSITES OR APPLICATIONS THAT REQUIRE 24/7 ACCESSIBILITY As the constantly growing demands of businesses and organizations operating in a global economy cause an increased

More information

Funambol Exchange Connector v6.5 Installation Guide

Funambol Exchange Connector v6.5 Installation Guide Funambol Exchange Connector v6.5 Installation Guide Last modified: May 7, 2008 Table of Contents 1.Introduction...3 1.1. Prerequisites...3 1.2. Related documents...3 2.Funambol Exchange Synchronization

More information

Metro Web Services, NetBeans, GlassFish and OpenSSO in Action with Amazon WS, Azure, and Office

Metro Web Services, NetBeans, GlassFish and OpenSSO in Action with Amazon WS, Azure, and Office Metro Web Services, NetBeans, GlassFish and OpenSSO in Action with Amazon WS, Azure, and Office S305138 Harold Carr Metro Architect, Sun Microsystems, Inc. Learn how to use Metro-based web services and

More information

PUR1311/19. Request for Information (RFI) Provision of an Enterprise Service Bus. to the. European Bank for Reconstruction and Development

PUR1311/19. Request for Information (RFI) Provision of an Enterprise Service Bus. to the. European Bank for Reconstruction and Development PUR1311/19 Request for Information (RFI) Provision of an Enterprise Service Bus to the European Bank for Reconstruction and Development 0. Definitions Bank means the European Bank for Reconstruction and

More information

Installing GroupWise Monitor

Installing GroupWise Monitor Installing GroupWise Monitor ZENWORKS The new GroupWise Monitor in the GroupWise 5.5 Enhancement Pack provides significant new functionality, including a browser-based interface, a separate server component,

More information

JAX-WS Developer's Guide

JAX-WS Developer's Guide JAX-WS Developer's Guide JOnAS Team ( ) - March 2009 - Copyright OW2 Consortium 2009 This work is licensed under the Creative Commons Attribution-ShareAlike License. To view a copy of this license,visit

More information

Web Services Development In a Java Environment

Web Services Development In a Java Environment Web Services Development In a Java Environment SWE 642, Spring 2008 Nick Duan April 16, 2008 1 Overview Services Process Architecture XML-based info processing model Extending the Java EE Platform Interface-driven

More information

OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT

OFFICIAL SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT SECURITY CHARACTERISTIC MOBILE DEVICE MANAGEMENT Version 1.3 Crown Copyright 2015 All Rights Reserved 49358431 Page 1 of 12 About this document This document describes the features, testing and deployment

More information

Glassfish, JAVA EE, Servlets, JSP, EJB

Glassfish, JAVA EE, Servlets, JSP, EJB Glassfish, JAVA EE, Servlets, JSP, EJB Java platform A Java platform comprises the JVM together with supporting class libraries. Java 2 Standard Edition (J2SE) (1999) provides core libraries for data structures,

More information

CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS

CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS CHAPTER 1 - JAVA EE OVERVIEW FOR ADMINISTRATORS Java EE Components Java EE Vendor Specifications Containers Java EE Blueprint Services JDBC Data Sources Java Naming and Directory Interface Java Message

More information

1 What Are Web Services?

1 What Are Web Services? Oracle Fusion Middleware Introducing Web Services 11g Release 1 (11.1.1.6) E14294-06 November 2011 This document provides an overview of Web services in Oracle Fusion Middleware 11g. Sections include:

More information

HP Process Automation v6 Architecture/Technologies

HP Process Automation v6 Architecture/Technologies HP Process Automation v6 Architecture/Technologies OVERVIEW... 3 Components... 3 1. STORAGE... 4 1.1. Static Elements... 4 1.2. Dynamic Elements... 7 2. COMMUNICATION... 9 2.1. Client-Tier Web Server

More information

NetBeans IDE Field Guide

NetBeans IDE Field Guide NetBeans IDE Field Guide Copyright 2005 Sun Microsystems, Inc. All rights reserved. Table of Contents Extending J2EE Applications with Web Services...1 Consuming Existing Web Services...2 Implementing

More information

BANNER FLEXIBLE REGISTRATION ADMINISTRATION GUIDE. Release 8.5.3 November 2011

BANNER FLEXIBLE REGISTRATION ADMINISTRATION GUIDE. Release 8.5.3 November 2011 BANNER FLEXIBLE REGISTRATION ADMINISTRATION GUIDE Release 8.5.3 November 2011 Trademark, Publishing Statement and Copyright Notice SunGard Data Systems and/or its subsidiaries in the U.S.A. and other countries

More information

OpenESB standalone edition Version 3.0 OpenESB set up in a multiple environments context. Application configurations and variables

OpenESB standalone edition Version 3.0 OpenESB set up in a multiple environments context. Application configurations and variables OpenESB standalone edition Version 3.0 OpenESB set up in a multiple environments context. Application configurations and variables Copyright Pymma Services 2015. All Rights Reserved. Page 1 of 28 Document

More information

REST and SOAP Services with Apache CXF

REST and SOAP Services with Apache CXF REST and SOAP Services with Apache CXF Andrei Shakirin, Talend ashakirin@talend.com ashakirin.blogspot.com/ Agenda Introduction in Apache CXF New CXF features Project using Apache CXF How CXF community

More information

24 BETTER SOFTWARE MARCH 2008 www.stickyminds.com

24 BETTER SOFTWARE MARCH 2008 www.stickyminds.com veer images 24 BETTER SOFTWARE MARCH 2008 www.stickyminds.com Web services the foundation of today s service-oriented architecture (SOA) are self-contained, modular applications that can be described,

More information

The presentation explains how to create and access the web services using the user interface. WebServices.ppt. Page 1 of 14

The presentation explains how to create and access the web services using the user interface. WebServices.ppt. Page 1 of 14 The presentation explains how to create and access the web services using the user interface. Page 1 of 14 The aim of this presentation is to familiarize you with the processes of creating and accessing

More information

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services 1 HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

Author: Gennaro Frazzingaro Universidad Rey Juan Carlos campus de Mostòles (Madrid) GIA Grupo de Inteligencia Artificial

Author: Gennaro Frazzingaro Universidad Rey Juan Carlos campus de Mostòles (Madrid) GIA Grupo de Inteligencia Artificial Simple Implementation of a WebService using Eclipse Author: Gennaro Frazzingaro Universidad Rey Juan Carlos campus de Mostòles (Madrid) GIA Grupo de Inteligencia Artificial Contents Web Services introduction

More information

Apigee Gateway Specifications

Apigee Gateway Specifications Apigee Gateway Specifications Logging and Auditing Data Selection Request/response messages HTTP headers Simple Object Access Protocol (SOAP) headers Custom fragment selection via XPath Data Handling Encryption

More information

PROGRESS Portal Access Whitepaper

PROGRESS Portal Access Whitepaper PROGRESS Portal Access Whitepaper Maciej Bogdanski, Michał Kosiedowski, Cezary Mazurek, Marzena Rabiega, Malgorzata Wolniewicz Poznan Supercomputing and Networking Center April 15, 2004 1 Introduction

More information

Use Enterprise SSO as the Credential Server for Protected Sites

Use Enterprise SSO as the Credential Server for Protected Sites Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured

More information

Evaluation of different Open Source Identity management Systems

Evaluation of different Open Source Identity management Systems Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems

More information

OpenSSO: Cross Domain Single Sign On

OpenSSO: Cross Domain Single Sign On OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2

More information