Online Data Services. Security Guidelines. Online Data Services by Esri UK. Security Best Practice
|
|
|
- William Oliver
- 10 years ago
- Views:
Transcription
1 Online Data Services Security Guidelines Online Data Services by Esri UK Security Best Practice 28 November 2014
2 Contents Contents Introduction Data Service Accounts, Security and Fair Usage Account Credentials Protecting Account Credentials Communication Technology Using the Online Services Secure Intranet Web Application (Active Directory) Secure Internet Web Application Public Internet Web Application Intranet Desktop GIS ArcGIS Online Organisational Account Summary Appendix A: Token Based Security Short Lived (Dynamic) Tokens Long Lived (Static) Tokens Proxy Page Token Based Security with ArcGIS Web APIs November
3 1. Introduction The online data services provided by Esri UK can be integrated into a wide range of applications. These include public facing websites, internal line of business websites and applications, and GIS software applications (such as ArcGIS for Desktop). Esri UK s online data services have been designed to make this integration easy and straightforward. The purpose of this guide is to explain how the services have been secured, and how to securely use the services in different deployment scenarios. The document has been divided into two main sections: 2. A high level overview of the services and how they are secured. 3. An examination of different deployment scenarios, and how they can be secured effectively. 28 November
4 2. Data Service Accounts, Security and Fair Usage The online services provided by Esri UK, are made accessible using standard internet technologies. The services can be accessed using a browser and can be integrated into any application which can communicate with the internet. Whilst the services are accessible online, an account is required before the services can be accessed. One or more accounts are used to manage access to both the free and premium services and to ensure fair usage of the services. Please see the fair use policy for more information: Account Credentials Access to all of Esri UK s online data services require an Account ID and Access Code. Upon registration, one or more accounts are created which grant access to the selected services. Organisations who register for the Premium online data services receive two user accounts; one giving access to only the Free services, the other giving access to the Free and Premium services combined. By providing access to the Free and Premium services within separate, secure user accounts, you can treat the Premium data, which is used under the terms of your own agreement with the Ordnance Survey, in a more secure manner. For example, if one group of your application users only need to see the Free data services, we recommend that their applications connect via the Free account. This enables the Premium account to be reserved for those who require access to the Premium services. In some organisations this may result in the Free account being used for public facing websites and the Premium account being used for internal applications. 2.2 Protecting Account Credentials The account credentials are the main protection for your organisation s Esri UK online account. How the Access Key and Code is shared and used in an organisation or by an individual is critical to ensuring that only authorised use of the service is conducted. When accessing the services within ArcGIS for Desktop, the user will be asked to provide their account details. ArcMap will then list the services available to that account. When accessing the services in a web based application, it will be necessary to generate a token from the user account and access code, using an online form or web API. A token is a sequence of characters which have been cryptographically created by the online service. The token contains data which is used by the online services to ensure the validity of the requests. Token based security is described in more detail in Appendix A, as there are many different ways tokens can be generated and used. See section 3; Using the Online Services, for strategies for managing credentials Service Monitoring and Alerts To ensure quality of service and maximum availability of the service, Esri UK monitor every request to the online data service. If an organisation s account is exceeding expected levels of usage or is 28 November
5 displaying unusual patterns of activity, Esri UK may contact the organisation to verify that this usage is valid. 2.3 Communication Technology The online services can be accessed using SOAP and REST based protocols/styles of communication. SOAP and REST are widely used mechanisms for connecting and integrating computer systems. The sections below describe the specific services published by Esri UK; to view the data at these services, you will need to enter your account credentials REST Interfaces Further information about the REST interfaces can be found at: The REST API Using the Javascript API (with REST): SOAP Interfaces Further information about the SOAP interfaces can be found at: In addition, the services can be accessed using SSL (HTTPS). Note: All token generating requests must be issued using SSL. This is to protect the User Account and Access Key being used by other unauthorised parties. 28 November
6 3. Using the Online Services The Esri UK online data services have been fully secured and it is your responsibility to ensure that the data is used appropriately and within the terms of the licence agreement. The following sections describe some of the common secure application deployment topologies in which the online data services can be incorporated. Each represents a different security architecture and approach. 3.1 Secure Intranet Web Application (Active Directory) This is a very common scenario, where a web based application is rolled out to users within an organisation. The application can only be used by specific individuals, based on their network credentials. The application server authenticates and authorises each user. This happens without the user entering credentials, as they authenticated themselves when they logged onto the terminal. The recommended approach to using online services within this type of application is to use a proxy page within the web application itself. The proxy page will reside within the web application on the server. This means that it should adopt the same authentication and authorisation as the rest of the web application. The proxy page will have the security information required to relay requests as token authenticated web requests against the online services. There are many different technologies used to build browser based applications (.NET, Java/JSP, PHP, etc). There are a number of proxy pages implementations which can be downloaded and adapted for use in these applications (e.g. see The advantage of this approach is that the security credentials of the service (access key and code) only reside on the application server. The clients do not see any security information about the service they are using. Furthermore, only the application itself can use the services (through this proxy), as it shares the same security as the application itself. The diagram below depicts this scenario: Client Browser Application Server Online Service Firefox, IE, Chrome, Safari (Open URL) /getmap?extent= Application Authentication and Authorisation Application Web Pages Proxy Page (Part of Application) Secure Web Application /getmap?token=187sddks&extent= Service A Service B Service n 28 November
7 3.2 Secure Internet Web Application In this scenario, a secure web application exists which is publicly accessible on the internet. However, to gain access to the application, the user must be authenticated by some application derived mechanism. This could be a login page or other security technique. Once authenticated, the user can access the application functions. This scenario is really a variation of the previous one. The only difference is that the authentication mechanism of the web application has been changed to one suitable for a public website and not necessarily tied to particular network credentials. The recommended approach to providing access to the secured online services is to use a proxy page, using the same approach as the Secure Intranet Web Application scenario. This is the most secure way of using the services and has the lowest risk of unsolicited access to the online services. The main security vulnerability with this approach is that it is dependent on the security of the hosting web application. If the host application has a weak security model, then this will limit the effectiveness of your proxy page accordingly. 3.3 Public Internet Web Application This scenario is based on providing an open internet web application which incorporates mapping from the online services. This is a more complex scenario to secure, as effectively the web application is open and hence the data it contains is susceptible to unwarranted use by third parties. There are technical approaches referred to below which provide a level of protection. However, you must also ensure that your application presents appropriate copyright statements, watermarks where required, and only uses the data service to support use that you are licensed for. We support the following different strategies to make this type of application available: Embed a Long Lived Token with URL Referrer As discussed in the appendix, a long lived token can be used for up to 365 days. It can only be used by web applications which are hosted on a specific web address. Use an Open Proxy page This has its own application specific monitoring and authorisation logic. Please note, it is important to put logic into the proxy page, otherwise it effectively provides open access to the map services under your account. This approach allows the application itself to detect suspicious activity. A custom proxy page should ensure that all requests for maps have been made by clients which in the last hour have visited several links in the application. Alternatively, the application could leave cookies on the client which can be checked before requests are forwarded. The mechanisms implemented in the proxy will very much depend on the web application itself. Note: When using any of the above approaches to secure a web application or other application accessible by multiple users, please contact Esri UK to obtain a separate User Account and Access Code for the application. These credentials will provide access only to the map services needed by your application, meaning that if it becomes compromised, a new set of credentials can be issued with minimum disruption to other internal users of the services. 28 November
8 3.4 Intranet Desktop GIS For Intranet desktop GIS users to use the online services, they must have a user account and access code. They can then connect in ArcGIS for Desktop to the services, using the built in Add Layer commands, or the Add-In provided by Esri UK. Users can obtain their own user account and access code by registering with Esri UK. Alternatively, the same user account and access code can be shared by all users. If the account is shared there may be disruption for users if the account s access code is changed and/or the account is disabled. If this occurs, all users would need to enter the new credentials. 3.5 ArcGIS Online Organisational Account This is based on using the secure Esri UK online services within your ArcGIS Online organizational account to provide base mapping for use in web maps and applications for your organisation or the public. There are several methods available to secure your content, which are explained fully in the How to Use the Map and Gazetteer Services guide. Free Services When using the free Esri UK online data services, any of the options outlined in the How To guide are acceptable. However, storing the logon credentials and using a token provides the best user experience, especially for public-facing applications. The option of including a long-lived token as part of the URL is the most secure, but it carries an additional overhead of maintaining the token, and some functionality may be restricted. Premium Services When using premium services, any of the options are acceptable when the items or webmaps are shared only within your organization. If you plan on using the services in public applications, you should use the option to store your credentials against the item and limit it s usage to a specific set of referrer URLs. This will tie the use of the service to applications published through your ArcGIS Online account, and will prevent the item being listed in public searches for ArcGIS Online. You may also want to consider combining the service with a watermark, Esri UK provide a free application through the ArcGIS Marketplace called Markr that will aid you in adding a watermark to your maps. 28 November
9 4. Summary The online services provided by Esri UK are designed to be a dependable, high performance set of GIS resources which will help make it easier to solve real world problems with geography. Security should always be considered as a key goal during the rollout of any internet or intranet application. As such, consideration should be given to how to secure the use of the embedded online services, so that unauthorized users cannot gain access to your account. Esri UK can provide technical guidance and advice on security, application architecture, and deployment of GIS based applications. 28 November
10 5. Appendix A: Token Based Security Token based security is a widely used mechanism for authenticating and restricting access to internet based resources. A token is a small string of seemingly random characters which is added to every request against an online service. The token contains information which uniquely identifies the user who is making the request, along with other information. The token itself does not contain any password information. The token is used by the server to decide if the request should be allowed. The token is created either by completing an online form to be get a token, or programmatically through a web request. In either case, the user name and access code of the account is required to generate the token. Once generated, a token is valid for a specified period of time only. The token provides access to the online services/resource, and as such can be used by third parties to gain unauthorized access to the services. To prevent this, there are different types of token which can be used for various application deployment topologies. It is important to choose an appropriate type of token and architecture for preventing its unauthorized exploitation. The following sections explain which types of tokens and security approaches to use in various topologies. Also see this article for further information on how ArcGIS tokens can be incorporated into applications: Short Lived (Dynamic) Tokens A short lived token can be created with just an Account name and access code. The token will only work for 10 minutes, before it is necessary to generate a new token. The advantage of a short lived token is that if it is compromised (i.e. used by unauthorized parties) it will only work for 10 minutes before a new token is required. 5.2 Long Lived (Static) Tokens A long lived token can be created which will last for up to one year. Once generated, the token will continue to work, irrespective of whether the user has changed their password. If the access key is 28 November
11 deleted, the token will cease to work. Similarly, if the datasets a user is allowed to access change, this will also take effect irrespective of when the token was generated. Long lived tokens are potentially a significant security vulnerability, as they have such a long shelf life. For this reason, there are two methods of securing them: IP Address A long lived token can be generated against a particular IP address. This means that only requests which originate from a particular machine/network address can successfully make the request. This is useful in scenarios where all requests will be coming from a particular machine. URL Referrer This type of token is designed to be used in browser based applications. The application will have this token embedded into the web page. However, the web requests will only be accepted by the service when they are seen to be coming from a particular website. All modern browsers send a URL referrer header in the http requests they make. The URL referrer is the web address of the hosting web page. It is this header which is checked before requests are returned. It is important to state that a URL referrer can be spoofed by non-browser based applications. It should therefore not be relied upon as an overarching security strategy. 5.3 Proxy Page A common architectural pattern, which is used in conjunction with token based security, is the use of a proxy page/service. A proxy service acts as a relay which forwards requests to the online service. The proxy page has the logic for generating and using tokens against particular services. This means that applications can be connected to a proxy, without the need for having a token in the client tier. The proxy generates the token and forwards the request to the online service and then forwards the result to the client. The proxy pattern is based on the requirement that the proxy page is secured by the custom application. It allows the security to be decided by the application developer and not the service provider. However, if the proxy page is not secured, it is effectively an open door to the online resources. Internet or Customer Domain Client Customer Domain Application Server ESRI UK Domain Online Services Client App /getmap?extent= Application Authentication and Authorisation Proxy Page /getmap?token=187sddks&extent= Service A 28 November
12 5.4 Token Based Security with ArcGIS Web APIs The matrix below summarises how to use static and dynamic tokens with each of the ESRI ArcGIS web APIs. JavaScript API Static Token Append a token parameter to the URL of a map service, e.g. /MapServer?token=your_static_token Dynamic Token Requires a proxy page or other server-side code (e.g. PHP, Java,.NET) to generate a token and load a map service dynamically Dynamic tokens cannot be generated client-side in JavaScript Flex API Add a token attribute to a map layer, e.g. <esri:arcgistiledmapservicelayer> Use an HTTPService object or other HTTP client to generate a token and load a map service dynamically Flex Viewer Set the token attribute of a <layer> element in <basemaps> and <operationallayers> Requires a proxy page or a widget to generate a token and load a map service dynamically (see Flex API) Silverlight API Add a token attribute to a map layer, e.g. <esri:arcgistiledmapservicelayer> Not supported on Firefox Due to an issue in Firefox that stops HTTP referrers being sent from Silverlight, a Silverlight web app using static tokens will not be able to access the online map services from the Firefox web browser Other web browsers are supported Use a WebClient object or other HTTP client to generate a token and load a map service dynamically Unlike static tokens, dynamic tokens are fully supported in Silverlight on Firefox 28 November
13 Silverlight Viewer (beta) After deploying an app from the Application Builder, open your deployed application s Config/Map.xml file and set the Token property on a map layer, e.g. <esri:arcgistiledmapservicelayer> Not supported on Firefox (see Silverlight API) Requires a proxy page or an add-in to generate a token and load a map service dynamically (see Silverlight API) 28 November
Portal for ArcGIS. Satish Sankaran Robert Kircher
Portal for ArcGIS Satish Sankaran Robert Kircher ArcGIS A Complete GIS Data Management Planning & Analysis Field Mobility Operational Awareness Constituent Engagement End to End Integration Collect, Organize,
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
ArcGIS Web Mapping. Sam Berg, esri [email protected]
ArcGIS Web Mapping Sam Berg, esri [email protected] Agenda ArcGIS and WebMaps The APIs ArcGIS for Flex Viewer ArcGIS for Silverlight Builder ArcGIS for Sharepoint ArcGIS Application Templates ArcGIS Runtime
SHARPCLOUD SECURITY STATEMENT
SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud
XIA Configuration Server
XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration
CMP3002 Advanced Web Technology
CMP3002 Advanced Web Technology Assignment 1: Web Security Audit A web security audit on a proposed eshop website By Adam Wright Table of Contents Table of Contents... 2 Table of Tables... 2 Introduction...
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
Webmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
Security and ArcGIS Web Development. Heather Gonzago and Jeremy Bartley
Security and ArcGIS Web Development Heather Gonzago and Jeremy Bartley Agenda Types of apps Traditional token-based authentication OAuth2 authentication User login authentication Application authentication
ArcGIS 10.1 Web Apps and APIs. John Hasthorpe & Kai Hübner
ArcGIS 10.1 Web Apps and APIs John Hasthorpe & Kai Hübner Overview Options for leveraging ArcGIS Server using Esri s Web APIs Alternatives to the Web ADF application builder (Gone in 10.1) When and how
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
Securing ArcGIS Server Services: First Steps
Federal GIS Conference February 9 10, 2015 Washington, DC Securing ArcGIS Server Services: First Steps Michael Sarhan Esri [email protected] Agenda Review Basic Security Workflow ArcGIS Server Roles and
Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard
Christchurch Polytechnic Institute of Technology Information Systems Acquisition, Development and Maintenance Security Standard Corporate Policies & Procedures Section 1: General Administration Document
Portal Recipient Guide
Portal Recipient Guide Lindenhouse Software Limited 2015 Contents 1 Introduction... 4 2 Account Activation... 4 3 Forgotten Password... 9 4 Document signing... 12 5 Authenticating your Device & Browser...
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS
BASELINE SECURITY TEST PLAN FOR EDUCATIONAL WEB AND MOBILE APPLICATIONS Published by Tony Porterfield Feb 1, 2015. Overview The intent of this test plan is to evaluate a baseline set of data security practices
Internet Banking System Web Application Penetration Test Report
Internet Banking System Web Application Penetration Test Report Kiev - 2014 1. Executive Summary This report represents the results of the Bank (hereinafter the Client) Internet Banking Web Application
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
Scott Moore, Esri April 4, 2016 2016 Intermountain, Great Falls, MT
Create Great Web Apps No Coding Required Scott Moore, Esri April 4, 2016 2016 Intermountain, Great Falls, MT Agenda Product overview Web AppBuilder for ArcGIS tour What s New November 2015 ArcGIS Online
Tableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
What is Web Security? Motivation
[email protected] http://www.brucker.ch/ Information Security ETH Zürich Zürich, Switzerland Information Security Fundamentals March 23, 2004 The End Users View The Server Providers View What is Web
Web Application Security Assessment and Vulnerability Mitigation Tests
White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software
SchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
Intro to Web App Builder. Mark Scott, Solutions Engineer, Esri County Government Team [email protected]
Intro to Web App Builder Mark Scott, Solutions Engineer, Esri County Government Team [email protected] The ArcGIS Platform enables Web GIS Enabling GIS Everywhere Desktop Web Device Simple Integrated Open
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Forwarded-For support to Forward and Reverse Proxy TMG Servers Published: May 2010 Applies to: Winfrasoft X-Forwarded-For
Remote Access End User Reference Guide for SHC Portal Access
Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Chapter 1: Introduction to ArcGIS Server
Chapter 1: Introduction to ArcGIS Server At a high level you can think of ArcGIS Server as software that helps you take your geographic information and make it available to others. This data can be distributed
ArcGIS for Server Deployment Scenarios An ArcGIS Server s architecture tour
ArcGIS for Server Deployment Scenarios An Arc s architecture tour Ismael Chivite Product Manager at Esri Concepts Single Machine Configurations Basic Basic with Proxy Fail-Over Load Balanced or Siloed
Installation and configuration guide
Installation and Configuration Guide Installation and configuration guide Adding X-Username support to Forward and Reverse Proxy TMG Servers Published: December 2010 Applies to: Winfrasoft X-Username for
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security
Is Drupal secure? A high-level perspective on web vulnerabilities, Drupal s solutions, and how to maintain site security Presented 2009-05-29 by David Strauss Thinking Securely Security is a process, not
An identity management solution. TELUS AD Sync
An identity management solution TELUS AD Sync June 2013 Introduction An important historic challenge faced by small and mid-sized businesses when opting for the TELUS Business E-mail Service is the requirement
ArcGIS Viewer for Silverlight An Introduction
Esri International User Conference San Diego, California Technical Workshops July 26, 2012 ArcGIS Viewer for Silverlight An Introduction Rich Zwaap Agenda Background Product overview Getting started and
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Startup guide for Zimonitor
Page 1 of 5 Startup guide for Zimonitor This is a short introduction to get you started using Zimonitor. Start by logging in to your version of Zimonitor using the URL and username + password sent to you.
Gateway Apps - Security Summary SECURITY SUMMARY
Gateway Apps - Security Summary SECURITY SUMMARY 27/02/2015 Document Status Title Harmony Security summary Author(s) Yabing Li Version V1.0 Status draft Change Record Date Author Version Change reference
Tableau Server Security. Version 8.0
Version 8.0 Author: Marc Rueter Senior Director, Strategic Solutions, Tableau Software June 2013 p2 Today s enterprise class systems need to provide robust security in order to meet the varied and dynamic
Quick Start Guide to. ArcGISSM. Online
Quick Start Guide to ArcGISSM Online ArcGIS Online Quick Start Guide ArcGIS SM Online is a cloud-based mapping platform for organizations. Users get access to dynamic, authoritative content to create,
Web Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
Rational AppScan & Ounce Products
IBM Software Group Rational AppScan & Ounce Products Presenters Tony Sisson and Frank Sassano 2007 IBM Corporation IBM Software Group The Alarming Truth CheckFree warns 5 million customers after hack http://infosecurity.us/?p=5168
RemotelyAnywhere Getting Started Guide
April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...
SECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified
Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI
Connected Data. Connected Data requirements for SSO
Chapter 40 Configuring Connected Data The following is an overview of the steps required to configure the Connected Data Web application for single sign-on (SSO) via SAML. Connected Data offers both IdP-initiated
Install and End User Reference Guide for Direct Access to Citrix Applications
Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a
ShoreTel Advanced Applications Web Utilities
INSTALLATION & USER GUIDE ShoreTel Advanced Applications Web Utilities ShoreTel Advanced Applications Introduction The ShoreTel Advanced Application Web Utilities provides ShoreTel User authentication
Using Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Chapter 1 Web Application (In)security 1
Introduction xxiii Chapter 1 Web Application (In)security 1 The Evolution of Web Applications 2 Common Web Application Functions 4 Benefits of Web Applications 5 Web Application Security 6 "This Site Is
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Sitefinity Security and Best Practices
Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management
Flexible Identity Federation
Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Criteria for web application security check. Version 2015.1
Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-
Portal. from the trenches!
from the trenches! Deployment Patterns Scaling and High Availability Reference Implementations Common Challenges Extending Engagement patterns Esri UC 2014 Technical Workshop for ArcGIS Technology Transfer
Penetration Test Report
Penetration Test Report Acme Test Company ACMEIT System 26 th November 2010 Executive Summary Info-Assure Ltd was engaged by Acme Test Company to perform an IT Health Check (ITHC) on the ACMEIT System
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Fairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
Payment Card Industry Data Security Standard Payment Card Industry Data Security Standard (PCI / DSS)
Payment Card Industry Data Security Standard (PCI / DSS) InterSect Alliance International Pty Ltd Page 1 of 12 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
File Share Navigator Online 1
File Share Navigator Online 1 User Guide Service Pack 3 Issued November 2015 Table of Contents What s New in this Guide... 4 About File Share Navigator Online... 5 Components of File Share Navigator Online...
FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE
Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security
ArcGIS Business Analyst Premium* ~ Help Guide ~ Revised October 3, 2012
ArcGIS Business Analyst Premium* ~ Help Guide ~ Revised October 3, 2012 ArcGIS Business Analyst Premium is an Esri software package that combines GIS analysis and visualization with data to provide a better
Addressing Mobile Load Testing Challenges. A Neotys White Paper
Addressing Mobile Load Testing Challenges A Neotys White Paper Contents Introduction... 3 Mobile load testing basics... 3 Recording mobile load testing scenarios... 4 Recording tests for native apps...
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
BlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Technical specifications
Technical specifications PhD Manager is built on the Haplo open source platform. The Haplo platform provides a flexible database tailored to storing information about the activities in complex organisations.
API documentation - 1 -
API documentation - 1 - Table of Contents 1. Introduction 1.1. What is an API 2. API Functions 2.1. Purge list of files 2.1.1 Description 2.1.2 Implementation 2.2. Purge of whole cache (all files on all
Web Security School Final Exam
Web Security School Final Exam By Michael Cobb 1.) Which of the following services is not required to run a Windows server solely configured to run IIS and publish a Web site on the Internet? a. IIS Admin
Live Guide System Architecture and Security TECHNICAL ARTICLE
Live Guide System Architecture and Security TECHNICAL ARTICLE Contents 1. Introduction... 2 2. Hosting Environment... 2 2.1. Standards - Compliancy... 3 2.2. Business Continuity Management... 3 2.3. Network
Introduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required
SAS Agent for Outlook Web Access
SAS Agent for Outlook Web Access CUSTOMER RELEASE NOTES Version: 1.06 Build: 1.06.27725 Issue Date: 4 February 2015 Document Part Number: 007-012888-001, Rev. D Contents Product Description... 2 Release
How To Protect A Web Application From Attack From A Trusted Environment
Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls
Creating a generic user-password application profile
Chapter 4 Creating a generic user-password application profile Overview If you d like to add applications that aren t in our Samsung KNOX EMM App Catalog, you can create custom application profiles using
REMOTE ACCESS USER GUIDE
REMOTE ACCESS USER GUIDE Document Released by the IT Department [21/11/2013] Content Summary 1. Remote Access User Guide Cover Page 2. Content Summary 3. Website/Portal Accessing 4. Method of Accessing
The Top Web Application Attacks: Are you vulnerable?
QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding
DEPLOYMENT GUIDE. Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services
DEPLOYMENT GUIDE Deploying the BIG-IP LTM v9.x with Microsoft Windows Server 2008 Terminal Services Deploying the BIG-IP LTM system and Microsoft Windows Server 2008 Terminal Services Welcome to the BIG-IP
ADFS for. LogMeIn and join.me authentication
ADFS for LogMeIn and join.me authentication ADFS for join.me authentication This step-by-step guide walks you through the process of configuring ADFS for join.me authentication. Set-up Overview 1) Prerequisite:
join.me architecture whitepaper
join.me architecture whitepaper 2 join.me architecture whitepaper Table of Contents Introduction 3 Architecture Overview 3 Data Security 6 Session and Website Security 7 Hosting Overview 8 Conclusion 8
RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2
RSA Authentication Manager 8.1 Setup and Configuration Guide Revision 2 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm
ICE Trade Vault. Public User & Technology Guide June 6, 2014
ICE Trade Vault Public User & Technology Guide June 6, 2014 This material may not be reproduced or redistributed in whole or in part without the express, prior written consent of IntercontinentalExchange,
LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely
LIVE CHAT CLOUD SECURITY Everything you need to know about live chat and communicating with your customers securely LIVE CHAT CLOUD SECURITY Introduction Security is a top priority online it is vital that
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
FileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
Petroleum Web Applications to Support your Business. David Jacob & Vanessa Ramirez Esri Natural Resources Team
Petroleum Web Applications to Support your Business David Jacob & Vanessa Ramirez Esri Natural Resources Team Agenda Petroleum Web Apps to Support your Business The ArcGIS Location Platform Introduction
CA Mobile Device Management 2014 Q1 Getting Started
CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Introduction to Web AppBuilder for ArcGIS: JavaScript Apps Made Easy
Introduction to Web AppBuilder for ArcGIS: JavaScript Apps Made Easy OKSCAUG Pamela Kersh September 22, 2015 The ArcGIS Platform enables Web GIS Enabling GIS Everywhere Desktop Web Device Simple Integrated
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Interwise Connect. Working with Reverse Proxy Version 7.x
Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web
Secure Access Portal. Getting Started Guide for using the Secure Access Portal. August 2011. Information Services
Secure Access Portal Getting Started Guide for using the Secure Access Portal Information Services 1. Introduction The Secure Access Portal enables the authority to provide simple but secure remote access
An Insight into Cookie Security
An Insight into Cookie Security Today most websites and web based applications use cookies. Cookies are primarily used by the web server to track an authenticated user or other user specific details. This
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
IBM Cloud Manager with OpenStack
IBM Cloud Manager with OpenStack Download Trial Guide Cloud Solutions Team: Cloud Solutions Beta [email protected] Page 1 Table of Contents Chapter 1: Introduction...3 Development cycle release scope...3
