KoM WP3 Task3.2 Overview and Next steps. Yuri Demchenko University of Amsterdam

Size: px
Start display at page:

Download "KoM WP3 Task3.2 Overview and Next steps. Yuri Demchenko University of Amsterdam"

Transcription

1 KoM WP3 Task3.2 Overview and Next steps Yuri Demchenko University of Amsterdam

2 Task 3.2 Development of Security and Access Control Mechanisms in a Multi-cloud Federated Environment [M2-M24] Task leader: Yuri Demchenko (UvA) Mechanisms to be developed should allow users to access all federated resources using their home institution account Develop appropriate trust and identity management mechanisms WP3 Task 3.2 Federated Access Control 2

3 Task 3.2 Activity Details (from DoW) Design and implementation of federation mechanisms at the IaaS level that will allow cloud inter-provider federation Usage scenario: Independent private cloud providers (members of a federation) that share the same API can reserve/allocate part of their resources to be used in a communal pool of resources (aka distributed community cloud) that can be used any user belonging to the federation. Actually re-use/re-factor Grid VO model The mechanisms to be developed should enable federated access control and resource management Authentication, authorization and auditing Resource allocation prioritization - Control & signaling? Support lightweight decentralized business models Evaluate brokered federation operation and management Leverage the experience with similar systems, such as the JiT Cloud and OurGrid middleware whose development are led by UFCG WP3 Task 3.2 Federated Access Control 3

4 Task 3.2 interaction with other tasks Task 3.1 Operation and Support of the Production Infrastructure [M1-M24] Task 3.2 Development of Security and Access Control Mechanisms in a Multi-cloud Federated Environment [M2-M24] Task 3.3 Adaptation and Deployment of Cloud Federation Mechanism [M1- M24] Task 3.4 Exploitation of Shared Resources in an Opportunistic Federated Cloud [M1-M24] Task 3.5 Adaptation of CSGrid middleware [M1-M24] Task 3.2 will contribute with the security analysis and taxonomy [M2-M?] Task 3.2 expect to receive from other tasks use cases and scenarios [M?-M?] Task 3.2 jointly with other tasks will specify requirements and define security/access control policy [M?- M?] Security interface definition, to be implemented by applications Security mechanisms developments Security mechanisms integration WP3 Task 3.2 Federated Access Control 4

5 Interaction with other WPs Should be done via general WP3 interaction WP3 <-> WP5 Use cases WP3 Task 3.2 Federated Access Control 5

6 How to enable effective collaboration? Knowing involved people Planning work Interaction Common development platform WP3 Task 3.2 Federated Access Control 6

7 Deliverables and Milestones: Security Issues need to be addressed MS3.1: Infrastructure configured to allow access to users and developers of EUBrazilCC (M3) All application users and system developers with access to a minimal part of the infrastructure that allows them to use it for their needs MS3.2 Deployment of opportunistic private cloud (M12) Prototype able to connect desktops within a LAN to a private cloud in an opportunistic way MS3.3 Deployment of federation mechanisms (M16) Prototype able to connect IaaS providers that share the same API using the Network of Favours incentive mechanism D3.1 Adaptation Requirements for CSGrid Middleware (M6) D3.2 Infrastructure Assessment Report (M12) D3.3 Prototype of the CSGrid Adaptation Mechanisms (M12) D3.4 Implementation of the Mechanisms to Federate Clouds and Exploit Shared Resources Opportunistically (M16) D3.5 Final Infrastructure Assessment Report (M24) WP3 Task 3.2 Federated Access Control 7

8 Initial Steps in Security Development Define what to protect IaaS infrastructure or separate Compute, Storage, Network Cloud applications Collaborating user community Identify/specify used protocols Cloud management protocols: OCCI, CDMI, OVF Grid resources access and management: SE, CE, VOMS, SLCP Legacy security solutions and migration strategy Grid on clouds vs native cloud solutions VO based vs Cloud Identity Federation model Access control models and policy platform/profile RBAC/ABAC, Identity Federation/Delegation, Security Token Service, Trust establishment and delegation WP3 Task 3.2 Federated Access Control 8

9 Federated Identity and Delegation in Clouds Existing federated identity schemes can be used to create consistent authentication between distributed computing resources (specifically cloud infrastructures) and a user/client VOMS and (X509 Proxy Certificate or SAML VOMS credentials) Shibboleth (with SAML assertions) ABFAB and Moonshot project (Federated IdM and Trust Management) CILogon and InCommon Federation (in US) OpenID and similar services Identity Federation in clouds EGI Identity Federation OpenStack KeyStone Identity Broker/gateway AWS Identity and Access Management (IAM) Traditional approach in clouds requires the Cloud Service Provider (CSP) to be involved into federation establishment Need to limit CSP role to an initial Trusted Introducer Avoid CSP role as (identity) broker or (authorisation) gateway WP3 Task 3.2 Federated Access Control 9

10 Federation in Grid and Clouds: Grid VO vs Cloud Virtual Infrastructure Grid federates resources and users by creating Virtual Organisations (VO) VO membership is maintained by assigning VO membership attributes to VO resources and members Resources remain under control of the Grid Resource Centers s remain members of their Home Organisations (HO) AuthN happens at HO or Grid portal To access VO resources, VO members need to obtain VOMS certificate X.509 Proxy Certificate is used to AuthZ users/jobs at Grid resources In clouds, both resources and user accounts are created/provisioned on-demand as virtualised components/entities accounts/identities can be provisioned together with access rights to virtual resources WP3 Task 3.2 Federated Access Control 10

11 Cloud Federation Scaling up and down Scalability is one of the main cloud feature To be considered in the context of hybrid cloud service model Cloud burst and outsourcing enterprise services to cloud Cloud services migration and replication between CSP Scaling up Identities provisioning Populating sessions context Scaling down Identity de-provisioning: Credentials revocation? Sessions invalidation vs restarting Initiated by provider and by user/customer WP3 Task 3.2 Federated Access Control 11

12 Discussion how to proceed Who is involved? Design and development team cooperation WP3 Task 3.2 Federated Access Control 12

13 Supporting material Federated Identity and delegation Approach and tools Multi-tenant Access Control for Cloud Infrastructure Services GAAA-TK (Generic AAA Toolkit) Security context and session management, delegation Policy and attribute profiles Policy management and evaluation Federation in clouds and Intercloud Federation Framework (ICFF) Operational models and components Intercloud Architecture Framework (ICAF) Multilayer Cloud Services Model (CSM) ICCMP, ICFF, ICOMF, ICSF (Intercloud Security Framework) WP3 Task 3.2 Federated Access Control 13

14 Basic Cloud Federation model Combined side federation (a) Enterprise Infrastructure (a) HO or (b) Custmr1 MgntSystem Management (Ops&Sec) Cloud Provider A 2 Xa Direct or Dynamic link Xa Xa.1.3 Cloud IDP-Xa Customer A1 (Running Service Xa) (b) External s (Open Internet) (a) IDP-HO1 (b) 3rd Party IDP Federation relations CSP IDP/ Broker Simple/basic scenario 2: Federating Home Organisation (HO) and Cloud Service Provider (CSP) domains Cloud based services created for external users (e.g. website) and managed by Customer 1 Involved major actors and roles CSP Customer IDP/Broker Cloud accounts A1.1-3 are provisioned for each user 1-3 from HO with 2 options Individual accounts with new ID::pswd Mapped/federated accounts that allows SSO/login with user HO ID::pswd Federated accounts may use Cloud IDP/Broker (e.g. KeyStone) or those IDP-Xa created for Service Xa side Federation IDP-Xa can be implemented as instantiated service of the CSP IDP WP3 Task 3.2 Federated Access Control 14

15 Basic Cloud Federation model Federating CSP s/multi-provider cloud resources HO1 Admin/Mngnt Cloud Provider A Rsr K2 Rsr Ak2 Rsr Kn1 Cloud Provider K HO1.2HO1.1 HO1.3 Cloud Service Xa Rsr Ak1 RsrIDP-K M2 A1.2 Cloud Provider M A1.1 A1.3 Rsr Am1 Rsr M1 IDP-Xa IDP-HO1 side Infrastructure services IDP-M Rsr An1 Inter-provider federation for resources sharing CSP IDP-A Federation&Trust relations Rsr N2 Rsr N1 IDP-N Cloud Provider N WP3 Task 3.2 Federated Access Control Cloud provider side federation for resources sharing Federation and Trust relations are established between CSP s via Identity management services, e.g. Identity Providers (IDP) May be bilateral or via 3rd party/broker service Includes translation or brokering Trust relations Namespaces Attributes semantics Policies Inter-provider federation is transparent to customers/users Provider side Federation 15

16 Authorisation in a Federated Cloud Environment PEP (Policy Enforcement Point) PDP (Policy Decision Point) PAP (Policy Authotity Point) CVS (Credentials Validation Service) WP3 Task 3.2 Federated Access Control 16

17 GAAA Authorisation Framework and GAAA Toolkit (GAAA-TK) WP3 Task 3.2 Federated Access Control 17

18 GEYSERS project Network+IT IaaS infrastructure provisioning Security Infrastructure Logical Infrastructure Composition Layer (LICL) FUSE ESB env, OSGi bundles Packages: AuthN/AuhZ and Dynamic Access Control Infra (DACI) Network Control Plane (NCP+) AuthnSvc&AuthzSvc Web services SecurityGateway library GAAA Toolkit Java Library provides core functionality GAAA-ISOD profile (Infrastructure Services On Demand ) Client VR service CSSI CSSI CSSI/GAAPI Policy Enforcement Point SecurityGateway Library AuthN AuthZ TokenSvc AuthnSv c SecurityGateway AuthzSvc TokenSv c DACI Policy Man. DACI Man. DACI Trust DACI Context DA CS AuthNSvc AuthZSvc TokenSvc DACS instance AAI for LICL (eu.geysers.licl.aai.*) GAAA-ISOD Toolkit AAI Components DACI Integration (via SecurityGateway) WP3 Task 3.2 Federated Access Control 18

19 Dynamic Access Control Infrastructure (DACI) Common Security Service Interface (CSSI) DACS instance[i] SecurityGateway Consolidate a common interface to access security services DACI Management Authentication Authority SAML-XACML Layer Authz-token Svc DACI Configuration DACI Monitoring Attr DB Attribute Authority Identity Management Service PIP (Authz Ctx Hdlr) PDP Obligation Handler PAP Authorization Service Authz-token Authority Authz Token Service DACS Man. Service DACI Policy Management DACI Context Management DACI Trust Management DACS Trust Manager Provisioned on demand security services (DACS) DACI: Dynamic Access Control Infrastructure DACS: Dynamic Access Control Services Update authz-policies upon reconfiguring Virtual Infrastructure Dynamic Trust Establishment: DSA, Bootstrapping WP3 Task 3.2 Federated Access Control 19

20 Security Services Reference Model Common Security Service Interface (CSSI) Common Security Service Layer Dynamic Access Control Infrastructure (DACI) Trust establishment protocol for VI, Dynamic Security Associations (DSA), bootstrapping protocol Authentication & Identity Man. Trust Management (Dynamic trust establishment, Bootstrapping) SLA Management Authorization & Policy Man. Security Context Management Security Service Lifecycle Management (SSLM) Note: Integration with SLA management/negotiation is needed to ensure consistency WP3 Task 3.2 Federated Access Control 20

21 Multi-tenant Access Control for Cloud Infrastructure Services Apply MT-AC in hierarchy A high-level provider is a tenant of the low-level provider Grant permissions -> Delegate granted permissions Security context management using tokens as session credentials P a domain (1) authz request (2) grant token P a Authz Service c ai P a (3) grant token (4) access token P bi Authz Service c ai P b1 P b2 P bk (5) request access token (6)response P bi Resource Service P bi domain P c1 P c2 Exchanging tokens in Intercloud MT-AC in hierarchy Amsterdam, May 21, 21

22 GAAA-TK Implementation for complex infrastructure provisioning (GEYSERS project) End-users AuthzService request response LICL interface Authz Interface PEP Obligation Service (e.g. accounting) Token Authority Information Model service Context Handler PDP TenantMgrSvc interface (provider) Token service Context resolution service Tenant Management Service Tenant s Authz Policy DB Provider s Delegation Policy DB Policy Generator Tenant DB TokenService Context DB Tenant s delegation policy DB TenantAdmin Service ContextService Tenant administration interface (tenant) Amsterdam, May 21, 22

23 InterCloud Architecture Framework (ICAF) Multi-layer Cloud Services Model (CSM) Combines IaaS, PaaS, SaaS into multi-layer model with inter-layer interfaces Including interfaces definition between cloud service layers and virtualisation platform InterCloud Control and Management Plane (ICCMP) Allows signaling, monitoring, dynamic configuration and synchronisation of the distributed heterogeneous clouds Including management interface from applications to network infrastructure and virtualisation platform InterCloud Federation Framework (ICFF) Defines set of protocols and mechanisms to ensure heterogeneous clouds integration at service and business level Addresses Identity Federation, federated network access, etc. InterCloud Operations Framework (ICOF) RORA model: Resource, Ownership, Role, Action RORA model provides basis for business processes definition, SLA and access control Broker and federation operation Intercloud Security Framework (ICSF) Dynamic Security Infrastructure provisioning and protocols WP3 Task 3.2 Federated Access Control 23

24 Operations Support System Management Security Infrastructure Multilayer Cloud Services Model (CSM) /Client Services * Identity services (IDP) * Visualisation /Customer Side Functions and Resources Endpoint Functions 1 Federated Access and * Service Gateway Delivery Infrastructure (FADI) * Portal/Desktop IaaS Cloud Management Software (Generic Functions) Content/Data Services * Data * Content * Sensor * Device Cloud Management Platforms OpenNebula PaaS OpenStack PaaS-IaaS Interface IaaS Virtualisation Platform Interface Other CMS Administration and Management Functions (Client) Inter-cloud Functions * Registry and Discovery * Federation Infrastructure Cloud Services (Infrastructure, Platform, Application, Software) VM SaaS PaaS-IaaS IF VM VPN Layer C6 /Customer side Functions Layer C5 Services Access/Delivery Layer C4 Cloud Services (Infrastructure, Platforms, Applications, Software) Layer C3 Virtual Resources Composition and Control (Orchestration) CSM layers (C6) /Customer side Functions (C5) Intercloud Access and Delivery Infrastructure (C4) Cloud Services (Infrastructure, Platform, Applications) (C3) Virtual Resources Composition and Orchestration (C2) Virtualisation Layer (C1) Hardware platform and dedicated network infrastructure Virtualisation Platform KVM XEN VMware Network Virtualis Layer C2 Virtualisation Storage Resources Proxy (adaptors/containers) - Component Services and Resources Compute Resources Hardware/Physical Resources Network Infrastructure Layer C1 Physical Hardware Platform and Network Control/ Mngnt Links Data Links Contrl&Mngnt Links Data Links WP3 Task 3.2 Federated Access Control Slide_24

25 General use case for infrastructure provisioning: Workflow => Logical (Cloud) Infrastructure Enterprise/Scientific workflow Input Data Storage Data Instrum. Data Data Filtering Special Proc 1 Special Proc 2 Data Archive Visual Present Campus A CE Visualisation Visualisation Campus B CE Group A Resource/ Service Provider VR1 VR2 VR3 VR6 VR4 VR5 Cloud 1 IaaS Cloud 2 PaaS VR7 Enterprise/Project based Intercloud Infrastructure Group B Enterprise/Scientific workflow Is mapped to heterogeneous cloud infrastructure containing IaaS, PaaS components Resource/ Service Provider Cloud IaaS Provider Cloud PaaS Provider WP3 Task 3.2 Federated Access Control 25

26 General use case for infrastructure provisioning: Logical Infrastructure => Network Infrastructure (1) Resource and Cloud Provider Domains Cloud 1 IaaS Cloud 2 PaaS Campus A Infrastructure VR1 VR3 VR5 VR7 Campus B Infrastructure VR2 VR4 VR6 Campus A CE Cloud Carrier Network Infrastructure Visualisation Visualisation Campus B CE Group A Resource/ Service Provider VR1 VR2 VR3 VR6 VR4 VR5 Cloud 1 IaaS Cloud 2 PaaS VR7 Enterprise/Project based Intercloud Infrastructure Group B Distributed heterogeneous cloud infrastructure requires separately provisioned network infrastructure that can be outsourced to Cloud Carrier Resource/ Service Provider Cloud IaaS Provider Cloud PaaS Provider WP3 Task 3.2 Federated Access Control 26

27 General use case for infrastructure provisioning: Logical Infrastructure => Network Infrastructure (2) Resource and Cloud Provider Domains Campus A Infrastructure VR1 VR3 VR5 VR7 Campus B Infrastructure VR2 VR4 VR6 Campus A CE Network Provider 1 Cloud Carrier or Network Provider 2 Federated InterCloud infratsructure Visualisation Visualisation Campus B CE Group A Resource/ Service Provider VR1 VR2 VR3 VR6 VR4 VR5 Cloud 1 IaaS Cloud 2 PaaS VR7 Enterprise/Project based Intercloud Infrastructure Group B Provisioning network infrastructure may involve multiple providers Introducing OCX (Open Cloud exchange) Resource/ Service Provider Cloud IaaS Provider Cloud PaaS Provider WP3 Task 3.2 Federated Access Control 27

28 Intercloud Federation Infrastructure and Open Cloud exchange (OCX) OCX Services Federated Cloud Instance Customer A (University A) Broker Trust Broker Broker Trust Broker Federated Cloud Instance Customer B (University B) Cert Repo (TACAR) FedIDP TTP Trusted Introducer OCX and federated network infrastructure Cloud Service Broker Discovery Directory (RepoSLA) Directory (RepoSLA) Gateway Gateway Gateway Gateway AAA AAA AAA AAA (I/P/S)aaS Provider (I/P/S)aaS Provider (I/P/S)aaS Provider (I/P/S)aaS Provider IDP IDP IDP IDP WP3 Task 3.2 Federated Access Control 28

29 OCX Hierarchical Topology Model CSP GEANT NREN University VR4 VR6 VR7 OCX Visualisation CE DFlow VR3 VR5 IP/L3 L2 L1 VR4 VR6 VR7 OCX Visualisation CE L0 VR3 VR5 WP3 Task 3.2 Federated Access Control 29

Defining InterCloud Architecture Framework (ICAF) for Interoperability and Integration

Defining InterCloud Architecture Framework (ICAF) for Interoperability and Integration Defining InterCloud Architecture Framework (ICAF) for Interoperability and Integration Yuri Demchenko SNE Group, University of Amsterdam CloudComputing2012 22--23 July 2012, Nice, France InterCloud Architecture

More information

Professional Education on Cloud Computing Technology and Services Engineering

Professional Education on Cloud Computing Technology and Services Engineering Professional Education on Cloud Computing Technology and Services Engineering Yuri Demchenko University of Amsterdam CloudCom SCC-Computing Summer Symposium 21 June 2013, UiS, Stavanger Outline Cloud Computing

More information

PoS(ISGC 2011 & OGF 31)115

PoS(ISGC 2011 & OGF 31)115 Defining Generic Architecture for Cloud Infrastructure as a Service Model Yuri Demchenko 1 University of Amsterdam Science Park 904, Amsterdam, The Netherlands E-mail: y.demchenko@uva.nl Cees de Laat University

More information

ISOD BCP Document Discussion and Recommendations

ISOD BCP Document Discussion and Recommendations ISOD BCP Document Discussion and Recommendations OGF 36, October 8-10, 2012, Chicago, USA Yuri Demchenko, UvA Chin Guok, ESnet Outline BCP document overview and suggestions Discussion on remaining issues

More information

INDIGO AAI An overview and status update!

INDIGO AAI An overview and status update! RIA-653549 INDIGO DataCloud INDIGO AAI An overview and status update! Andrea Ceccanti (INFN) on behalf of the INDIGO AAI Task Force! indigo-aai-tf@lists.indigo-datacloud.org INDIGO Datacloud An H2020 project

More information

INDIGO-DataCloud Architectural Overview

INDIGO-DataCloud Architectural Overview INDIGO-DataCloud Architectural Overview RIA-653549 Giacinto Donvito (INFN) INDIGO-DataCloud Technical Director 1 st INDIGO-DataCloud Periodic Review Bologna, 7-8 November 2016 Outline General approach

More information

Deliverable reference number: D.4.1. AAA Architectures for multi-domain optical networking scenario's

Deliverable reference number: D.4.1. AAA Architectures for multi-domain optical networking scenario's 034115 PHOSPHORUS Lambda User Controlled Infrastructure for European Research Integrated Project Strategic objective: Research Networking Testbeds Deliverable reference number: D.4.1 AAA Architectures

More information

Cloud Standardization

Cloud Standardization Cloud Standardization Cloud Strategy Partners, LLC Sponsored by: IEEE Educational Activities and IEEE Cloud Computing Course Presenter s Biography This IEEE Cloud Computing tutorial has been developed

More information

Enhanced Privacy ID (EPID), 156

Enhanced Privacy ID (EPID), 156 Index A Accountability, 148 ActiveDirectory, 153 Amazon AWS EC2, 168 Anonymity, 148 Asset tagging, 96 Attestation definition, 65 dynamic remote attestation techniques, 66 IMA, 67 Intel Trust Attestation

More information

On-Demand Provisioning of Cloud and Grid based Infrastructure Services for Collaborative Projects and Groups

On-Demand Provisioning of Cloud and Grid based Infrastructure Services for Collaborative Projects and Groups On-Demand Provisioning of Cloud and based Infrastructure Services for Collaborative Projects and Groups Yuri Demchenko y.demchenko@uva.nl Cees de Laat delaat@uva.nl Jeroen Van der Ham vdham@uva.nl Mattijs

More information

Attributes used for Authorisation in Network Resource Provisioning

Attributes used for Authorisation in Network Resource Provisioning Attributes used for Authorisation in Network Resource Provisioning (XACML-NRP Authorisation Interoperability Profile for NRP) Yuri Demchenko System and Network Engineering Group University of Amsterdam

More information

Federated Authentication with Web Services Clients

Federated Authentication with Web Services Clients Federated Authentication with Web Services Clients in the context of SAML based AAI federations Thomas Lenggenhager thomas.lenggenhager@switch.ch Mannheim, 8. March 2011 Overview SAML n-tier Delegation

More information

glite Java Authorisation Framework (gjaf) and Authorisation Policy coordination

glite Java Authorisation Framework (gjaf) and Authorisation Policy coordination glite Java Authorisation Framework (gjaf) and Authorisation Policy coordination Yuri Demchenko University of Amsterdam MWSG meeting EGEE 06 Conference, September 27, 2006, Geneve www.eu-egee.org EGEE and

More information

[GSoC Proposal] Securing Airavata API

[GSoC Proposal] Securing Airavata API [GSoC Proposal] Securing Airavata API TITLE: Securing AIRAVATA API ABSTRACT: The goal of this project is to design and implement the solution for securing AIRAVATA API. Particularly, this includes authenticating

More information

Topics of Discussion

Topics of Discussion CPET 581 Cloud Computing: Technologies and Enterprise IT Strategies Lecture on NIST Cloud Computing Definition, Standards & Roadmap, Security & Privacy Guidelines Spring 2013 A Specialty Course for Purdue

More information

Federated access to e-infrastructures worldwide

Federated access to e-infrastructures worldwide Federated access to e-infrastructures worldwide Marco Fargetta, INFN Catania - Italy (marco.fargetta@ct.infn.it) DCIs developed in the last decade 2 Evolution Research organisations are moving to cloud

More information

Intercloud Architecture Framework for Heterogeneous Cloud based Infrastructure Services Provisioning On-Demand

Intercloud Architecture Framework for Heterogeneous Cloud based Infrastructure Services Provisioning On-Demand Intercloud Architecture Framework for Heterogeneous Cloud based Infrastructure Services Provisioning On-Demand Yuri Demchenko, Canh Ngo, Cees de Laat University of Amsterdam, Amsterdam, The Netherlands

More information

Extend your datacenter with the power of Citrix Open Cloud

Extend your datacenter with the power of Citrix Open Cloud Extend your datacenter with the power of Citrix Open Cloud Peter Leimgruber Sr. SE Datacenter & Networking, CE Mikael Lindholm Sr. SE XenServer & Cloud, EMEA Sales Dev Agenda Cloud Expectations and reality

More information

EGI-InSPIRE. GridCertLib Shibboleth authentication for X.509 certificates and Grid proxies. Sergio Maffioletti

EGI-InSPIRE. GridCertLib Shibboleth authentication for X.509 certificates and Grid proxies. Sergio Maffioletti EGI-InSPIRE GridCertLib Shibboleth authentication for X.509 certificates and Grid proxies Sergio Maffioletti Grid Computing Competence Centre, University of Zurich http://www.gc3.uzh.ch/

More information

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1 Inside Symantec O 3 Sergi Isasi Senior Manager, Product Management SR B30 - Inside Symantec O3 1 Agenda 2 Cloud: Opportunity And Challenge Cloud Private Cloud We should embrace the Cloud to respond to

More information

European Grid Infrastructure

European Grid Infrastructure EGI-InSPIRE European Grid Infrastructure A pan-european Research Infrastructure supporting the digital European Research Area Michel Drescher Technical Manager, EGI.eu Michel.Drescher@egi.eu TPDL 2013

More information

Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC)

Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC) Deploying Cloud Network Services Prime Network Services Controller (formerly VNMC) Dedi Shindler - Sr. Manager Product Management Cloud System Management Technology Group Cisco Agenda Trends Influencing

More information

globus online Globus Nexus Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory

globus online Globus Nexus Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory globus online Globus Nexus Steve Tuecke Computation Institute University of Chicago and Argonne National Laboratory Computation Institute (CI) Apply to challenging problems Accelerate by building the research

More information

Sentinet for BizTalk Server SENTINET

Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server SENTINET Sentinet for BizTalk Server 1 Contents Introduction... 2 Sentinet Benefits... 3 SOA and API Repository... 4 Security... 4 Mediation and Virtualization... 5 Authentication

More information

Open Cloud exchange (OCX): Architecture and Functional Components

Open Cloud exchange (OCX): Architecture and Functional Components Open Cloud exchange (OCX): Architecture and Functional Components Yuri Demchenko, Jeroen van der Ham, Canh Ngo, Cees de Laat University of Amsterdam Amsterdam, The Netherlands e-mail: {y.demchenko, jvdh,

More information

EU Phosphorus Project Harmony. (on

EU Phosphorus Project Harmony. (on EU Phosphorus Project Harmony Advance Reservation features for Grids (on behalf of UniBonn, SURFnet, UvA,, CRC, Nortel,, FHG, I2CAT) E2E Workshop Establishing Lightpaths Amsterdam, December 2008 Phosphorus

More information

PERMIS An Application Independent Authorisation Infrastructure. David Chadwick

PERMIS An Application Independent Authorisation Infrastructure. David Chadwick PERMIS An Application Independent Authorisation Infrastructure David Chadwick Role/Attribute Based Access Control Model Hierarchical Role based Access Control (RBAC) Permissions are allocated to roles/attributes

More information

Lightpath AAA Gap Analysis

Lightpath AAA Gap Analysis Lightpath AAA Gap Analysis or Filling the Gap with GAAA-P SURFnet RoN Meeting 17-18 October 2005, Utrecht Yuri Demchenko Advanced Internet Research Group University of Amsterdam

More information

Milestone deliverable reference number M.4.1 (Part 1 of the Deliverable D.4.1)

Milestone deliverable reference number M.4.1 (Part 1 of the Deliverable D.4.1) 034115 PHOSPHORUS Lambda User Controlled Infrastructure for European Research Integrated Project Strategic objective: Research Networking Testbeds Milestone deliverable reference number M.4.1 (Part 1 of

More information

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard In my view, Microsoft Azure is fast becoming the trusted platform of choice for SMB and Enterprise customers.

More information

2. HDF AAI Meeting -- Demo Slides

2. HDF AAI Meeting -- Demo Slides 2. HDF AAI Meeting -- Demo Slides Steinbuch Centre for Computing Marcus Hardt KIT University of the State of Baden-Wuerttemberg and National Research Center of the Helmholtz Association www.kit.edu Introduction

More information

NIST Cloud Computing Security Working Group

NIST Cloud Computing Security Working Group NIST Cloud Computing Security Working Group NIST Cloud Computing Security Reference Architecture NIST Enterprise-Wide Data-Centric Computing Environment February, 2013 Dr. Michaela Iorga, NIST, Computer

More information

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification 3.

More information

Overview of International Standards for Cloud Computing

Overview of International Standards for Cloud Computing ITU Regional Forum on New Technologies for Development, Cairo-Egypt, 23-24 November 2016 Overview of International Standards for Cloud Computing Dr. Jamil Chawki, Orange SG 13 Vice Chairman & SG 13 WP2

More information

Storage Management in INDIGO

Storage Management in INDIGO Storage Management in INDIGO Paul Millar paul.millar@desy.de with contributions from Marcus Hardt, Patrick Fuhrmann, Łukasz Dutka, Giacinto Donvito. INDIGO-DataCloud: cheat sheet A Horizon-2020 project

More information

Cloud Essentials for Architects using OpenStack

Cloud Essentials for Architects using OpenStack Cloud Essentials for Architects using OpenStack Course Overview Start Date 5th March 2015 Duration 2 Days Location Dublin Course Code SS15-13 Programme Overview Cloud Computing is gaining increasing attention

More information

A Holistic View of Telco Clouds

A Holistic View of Telco Clouds A Holistic View of Telco Clouds Cloud Computing in the Telecom environment, bridging the gap Miyazaki, 4 March 2012 (A workshop in conjunction with World Telecom Congress 2012) Authors: Lóránt Németh,

More information

Table of Contents 1.1. Introduction. Overview of vsphere Integrated Containers 1.2

Table of Contents 1.1. Introduction. Overview of vsphere Integrated Containers 1.2 Table of Contents Introduction Overview of vsphere Integrated Containers 1.1 1.2 2 Overview of vsphere Integrated Containers This document provides an overview of VMware vsphere Integrated Containers.

More information

Challenges in Authenticationand Identity Management

Challenges in Authenticationand Identity Management Sep 05 ISEC INFOSECURITY TOUR 2017 05.09.2017, Buenos Aires, Argentina Challenges in Authenticationand Identity Management CAMINANTE NO HAY CAMINO, SE HACE CAMINO AL ANDAR 2016 SecurIT Who is MerStar?

More information

Guidelines on non-browser access

Guidelines on non-browser access Published Date: 13-06-2017 Revision: 1.0 Work Package: Document Code: Document URL: JRA1 AARC-JRA1.4F https://aarc-project.eu/wp-content/uploads/2017/03/aarc-jra1.4f.pdf 1 Table of Contents 1 Introduction

More information

Higher Education external Attribute Authority. Mihály Héder István Tétényi (MTA SZTAKI) 19-May-2015

Higher Education external Attribute Authority. Mihály Héder István Tétényi (MTA SZTAKI) 19-May-2015 Higher Education external Attribute Authority Mihály Héder István Tétényi (MTA SZTAKI) 19-May-2015 Problems in Collaboration Problems in Collaboration Problems in Collaboration Why we need Attribute Authorities?

More information

Security Readiness Assessment

Security Readiness Assessment Security Readiness Assessment Jackson Thomas Senior Manager, Sales Consulting Copyright 2015 Oracle and/or its affiliates. All rights reserved. Cloud Era Requires Identity-Centric Security SaaS PaaS IaaS

More information

Sentinet for Windows Azure VERSION 2.2

Sentinet for Windows Azure VERSION 2.2 Sentinet for Windows Azure VERSION 2.2 Sentinet for Windows Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Isolated Deployment Model... 3 Collocated Deployment Model...

More information

The challenges of (non-)openness:

The challenges of (non-)openness: The challenges of (non-)openness: Trust and Identity in Research and Education. DEI 2018, Zagreb, April 2018 Ann Harding, SWITCH/GEANT @hardingar Who am I? Why am I here? Medieval History, Computer Science

More information

Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010

Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010 Network Implications of Cloud Computing Presentation to Internet2 Meeting November 4, 2010 Lou Topfl Director, New Technology Product Development Engineering AT&T Agenda What is the Cloud? Types of Cloud

More information

SLCS and VASH Service Interoperability of Shibboleth and glite

SLCS and VASH Service Interoperability of Shibboleth and glite SLCS and VASH Service Interoperability of Shibboleth and glite Christoph Witzig, SWITCH (witzig@switch.ch) www.eu-egee.org NREN Grid Workshop Nov 30th, 2007 - Malaga EGEE and glite are registered trademarks

More information

Dynamic Security Context Management in Grid-based Applications

Dynamic Security Context Management in Grid-based Applications Abstract Dynamic Security Context Management in Grid-based Applications Yuri Demchenko #1, Olle Mulmo *2, Leon Gommans #3, Cees de Laat #4, Alfred Wan #5 # System and Network Engineering Group, University

More information

Grid Computing. MCSN - N. Tonellotto - Distributed Enabling Platforms

Grid Computing. MCSN - N. Tonellotto - Distributed Enabling Platforms Grid Computing 1 Resource sharing Elements of Grid Computing - Computers, data, storage, sensors, networks, - Sharing always conditional: issues of trust, policy, negotiation, payment, Coordinated problem

More information

Cloud Customer Architecture for Securing Workloads on Cloud Services

Cloud Customer Architecture for Securing Workloads on Cloud Services Cloud Customer Architecture for Securing Workloads on Cloud Services http://www.cloud-council.org/deliverables/cloud-customer-architecture-for-securing-workloads-on-cloud-services.htm Webinar April 19,

More information

* Inter-Cloud Research: Vision

* Inter-Cloud Research: Vision * Inter-Cloud Research: Vision for 2020 Ana Juan Ferrer, ATOS & Cluster Chair Vendor lock-in for existing adopters Issues: Lack of interoperability, regulatory context, SLAs. Inter-Cloud: Hardly automated,

More information

VMware Hybrid Cloud Solution

VMware Hybrid Cloud Solution VMware Hybrid Cloud Solution Simplifying and Accelerating Your Multi-Cloud Strategy Bunyamin Ozyasar System Engineer Manager 2017 VMware Inc. All rights reserved. Today s Agenda 1 2 3 VMware SDDC Approach

More information

INDIGO-Datacloud Identity and Access Management Service

INDIGO-Datacloud Identity and Access Management Service INDIGO-Datacloud Identity and Access Management Service RIA-653549 Presented by Andrea Ceccanti (INFN) andrea.ceccanti@cnaf.infn.it WLCG AuthZ WG Meeting Dec, 14th 2017 IAM overview INDIGO IAM The Identity

More information

Table of Contents DevOps Administrators

Table of Contents DevOps Administrators DevOps Administrators Table of Contents DevOps Administrators Overview for DevOps Admins Managing Images, Projects, Users Configure a Registry Create Users Assign the Administrator Role Create a Project

More information

Authorisation Policy coordination and glite Java Authorisation Framework (gjaf)

Authorisation Policy coordination and glite Java Authorisation Framework (gjaf) Authorisation Policy coordination and glite Java Authorisation Framework (gjaf) Yuri Demchenko University of Amsterdam JRA1 All Hands meeting, July 10-12, 2006, Pilsen www.eu-egee.org EGEE and glite are

More information

Sentinet for Microsoft Azure SENTINET

Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...

More information

Intercloud Federation using via Semantic Resource Federation API and Dynamic SDN Provisioning

Intercloud Federation using via Semantic Resource Federation API and Dynamic SDN Provisioning Intercloud Federation using via Semantic Resource Federation API and Dynamic SDN Provisioning David Bernstein Deepak Vij Copyright 2013, 2014 IEEE. All rights reserved. Redistribution and use in source

More information

WP JRA1: Architectures for an integrated and interoperable AAI

WP JRA1: Architectures for an integrated and interoperable AAI Authentication and Authorisation for Research and Collaboration WP JRA1: Architectures for an integrated and interoperable AAI Christos Kanellopoulos Agenda Structure and administrative matters Objectives

More information

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia

Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia Adaptacyjny dostęp do aplikacji wszędzie i z każdego urządzenia F5 EMEA Webinar Listopad 2014 Andrzej Kroczek Field Systems Engineer Today s Network and App Access: So Many Variables! LOCATIONS USERS DEVICES

More information

Identität und Autorisierung als Grundlage für sichere Web-Services. Dr. Hannes P. Lubich IT Security Strategist

Identität und Autorisierung als Grundlage für sichere Web-Services. Dr. Hannes P. Lubich IT Security Strategist Identität und Autorisierung als Grundlage für sichere Web-Services Dr. Hannes P. Lubich IT Security Strategist The Web Services Temptation For every $1 spent on software $3 to $5 is spent on integration

More information

1. What is Cloud Computing (CC)? What are the Pros and Cons of CC? Technologies of CC 27

1. What is Cloud Computing (CC)? What are the Pros and Cons of CC? Technologies of CC 27 1. What is Cloud Computing (CC)? 3 1.1. Utility Computing First 3 1.2. The New Features of Cloud Computing (CC) 4 1.3. Cloud Service Provider (CSP) 6 1.3.1 Thin Provisioning 7 1.4. CC via a CSP (not via

More information

Cloud Computing and Service-Oriented Architectures

Cloud Computing and Service-Oriented Architectures Material and some slide content from: - Atif Kahn SERVICES COMPONENTS OBJECTS MODULES Cloud Computing and Service-Oriented Architectures Reid Holmes Lecture 20 - Tuesday November 23 2010. SOA Service-oriented

More information

OpenIAM Identity and Access Manager Technical Architecture Overview

OpenIAM Identity and Access Manager Technical Architecture Overview OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...

More information

Table of Contents 1.1. Overview. Containers, Docker, Registries vsphere Integrated Containers Engine

Table of Contents 1.1. Overview. Containers, Docker, Registries vsphere Integrated Containers Engine Table of Contents Overview Containers, Docker, Registries vsphere Integrated Containers Engine Management Portal Registry Roles and Personas 1.1 1.1.1 1.1.2 1.1.2.1 1.1.2.2 1.1.2.3 1.1.2.4 2 Overview of

More information

An integrated IaaS and PaaS architecture for scientific computing

An integrated IaaS and PaaS architecture for scientific computing An integrated IaaS and PaaS architecture for scientific computing RIA-653549 Giacinto Donvito INFN-Bari On behalf of INDIGO Collaboration INDIGO: The consortium 26 partners from 11 countries The exagon

More information

AAI in EGI Current status

AAI in EGI Current status AAI in EGI Current status Peter Solagna EGI.eu Operations Manager www.egi.eu EGI-Engage is co-funded by the Horizon 2020 Framework Programme of the European Union under grant number 654142 User authentication

More information

The Latest EMC s announcements

The Latest EMC s announcements The Latest EMC s announcements Copyright 2014 EMC Corporation. All rights reserved. 1 TODAY S BUSINESS CHALLENGES Cut Operational Costs & Legacy More Than Ever React Faster To Find New Growth Balance Risk

More information

Chapter 3 Virtualization Model for Cloud Computing Environment

Chapter 3 Virtualization Model for Cloud Computing Environment Chapter 3 Virtualization Model for Cloud Computing Environment This chapter introduces the concept of virtualization in Cloud Computing Environment along with need of virtualization, components and characteristics

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

MCSE Server Infrastructure. This Training Program prepares and enables learners to Pass Microsoft MCSE: Server Infrastructure exams

MCSE Server Infrastructure. This Training Program prepares and enables learners to Pass Microsoft MCSE: Server Infrastructure exams MCSE Server Infrastructure This Training Program prepares and enables learners to Pass Microsoft MCSE: Server Infrastructure exams 1. MCSE: Server Infrastructure / Exam 70-413 (Designing and Implementing

More information

Cloud Standards: Vincent Franceschini CTO Intelligent Data Fabrics, Hitachi Data Systems Chairman Emeritus, SNIA

Cloud Standards: Vincent Franceschini CTO Intelligent Data Fabrics, Hitachi Data Systems Chairman Emeritus, SNIA Cloud Standards: Raising PRESENTATION the bar TITLE of completeness GOES HERE Vincent Franceschini CTO Intelligent Data Fabrics, Hitachi Data Systems Chairman Emeritus, SNIA Opening Thoughts Cloud s no

More information

Customer s journey into the private cloud with Cisco Enterprise Cloud Suite

Customer s journey into the private cloud with Cisco Enterprise Cloud Suite Customer s journey into the private cloud with Cisco Enterprise Cloud Suite Peter Charpentier, Senior Solution Architect, Cisco AS Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker

More information

Identity Management in ESA Grid on-demand Infrastructure

Identity Management in ESA Grid on-demand Infrastructure Identity Management in ESA Grid on-demand Infrastructure OGC TC - Europe Forum 4 December 2008, Valencia Pedro Pereira Gonçalves http://www.terradue.com Slide 1 ESA G-POD Infrastructure! Computing and

More information

Goal. TeraGrid. Challenges. Federated Login to TeraGrid

Goal. TeraGrid. Challenges. Federated Login to TeraGrid Goal Federated Login to Jim Basney Terry Fleury Von Welch Enable researchers to use the authentication method of their home organization for access to Researchers don t need to use -specific credentials

More information

Exam C Foundations of IBM Cloud Reference Architecture V5

Exam C Foundations of IBM Cloud Reference Architecture V5 Exam C5050 287 Foundations of IBM Cloud Reference Architecture V5 1. Which cloud computing scenario would benefit from the inclusion of orchestration? A. A customer has a need to adopt lean principles

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS 03 EXECUTIVE OVERVIEW 05 INTRODUCTION 07 MORE CLOUD DEPLOYMENTS MEANS MORE ACCESS 09 IDENTITY FEDERATION IN

More information

1z0-479 oracle. Number: 1z0-479 Passing Score: 800 Time Limit: 120 min.

1z0-479 oracle. Number: 1z0-479 Passing Score: 800 Time Limit: 120 min. 1z0-479 oracle Number: 1z0-479 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 What is the role of a user data store in Oracle Identity Federation (OIF) 11g when it is configured as an Identity

More information

Introduction to Cloud Computing

Introduction to Cloud Computing You will learn how to: Build and deploy cloud applications and develop an effective implementation strategy Leverage cloud vendors Amazon EC2 and Amazon S3 Exploit Software as a Service (SaaS) to optimize

More information

Single Sign-On for PCF. User's Guide

Single Sign-On for PCF. User's Guide Single Sign-On for PCF Version 1.2 User's Guide 2018 Pivotal Software, Inc. Table of Contents Table of Contents Single Sign-On Overview Installation Getting Started with Single Sign-On Manage Service Plans

More information

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter

Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter White Paper Best Practices in Securing Your Customer Data in Salesforce, Force.com & Chatter Overcoming Security, Privacy & Compliance Concerns 333 W. San Carlos Street San Jose, CA 95110 Table of Contents

More information

EGI-InSPIRE. Cloud Services. Steven Newhouse, EGI.eu Director. 23/05/2011 Cloud Services - ASPIRE - May EGI-InSPIRE RI

EGI-InSPIRE. Cloud Services. Steven Newhouse, EGI.eu Director. 23/05/2011 Cloud Services - ASPIRE - May EGI-InSPIRE RI EGI-InSPIRE Cloud Services Steven Newhouse, EGI.eu Director 23/05/2011 Cloud Services - ASPIRE - May 2011 1 Definition of the cloud Cloud computing is a model for enabling convenient, on-demand network

More information

M2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres

M2M / IoT Security. Eurotech`s Everyware IoT Security Elements Overview. Robert Andres M2M / IoT Security Eurotech`s Everyware IoT Security Elements Overview Robert Andres 23. September 2015 The Eurotech IoT Approach : E2E Overview Application Layer Analytics Mining Enterprise Applications

More information

RCauth.eu / MasterPortal update

RCauth.eu / MasterPortal update RCauth.eu / MasterPortal update Mischa Sallé msalle@nikhef.nl 5 th AARC face-to-face meeting, Aθηνα 21 March 2017 Mischa Sallé (Nikhef) 1 / 11 Reminder of motivation Access to X.509 resources made easy

More information

AWS Integration Guide

AWS Integration Guide AWS Integration Guide Cloud-Native Security www.aporeto.com AWS Integration Guide Aporeto integrates with AWS to help enterprises efficiently deploy, manage, and secure applications at scale and the compute

More information

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing

JAVA IEEE TRANSACTION ON CLOUD COMPUTING. 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing JAVA IEEE TRANSACTION ON CLOUD COMPUTING 1. ITJCC01 Nebula: Distributed Edge Cloud for Data Intensive Computing 2. ITJCC02 A semi-automatic and trustworthy scheme for continuous cloud service certification

More information

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps

Today s workforce is Mobile. Cloud and SaaSbased. are being deployed and used faster than ever. Most applications are Web-based apps Today s workforce is Mobile Most applications are Web-based apps Cloud and SaaSbased applications are being deployed and used faster than ever Hybrid Cloud is the new normal. % plan to migrate >50% of

More information

Przejmij kontrolę nad użytkownikiem, czyli unifikacja dostępu do aplikacji w zróżnicowanym środowisku

Przejmij kontrolę nad użytkownikiem, czyli unifikacja dostępu do aplikacji w zróżnicowanym środowisku Przejmij kontrolę nad użytkownikiem, czyli unifikacja dostępu do aplikacji w zróżnicowanym środowisku Łukasz Knysak Senior System Inżynier w Veracomp SA Back in 1963 JFK ordered that all nuclear warheads

More information

Overview SENTINET 3.1

Overview SENTINET 3.1 Overview SENTINET 3.1 Overview 1 Contents Introduction... 2 Customer Benefits... 3 Development and Test... 3 Production and Operations... 4 Architecture... 5 Technology Stack... 7 Features Summary... 7

More information

CA SSO Cloud-Enabled with SSO/Rest

CA SSO Cloud-Enabled with SSO/Rest CA SSO Cloud-Enabled with SSO/Rest SSO/Rest Solves Many Challenges Applications in the Cloud AJAX / Mobile / Thick Client Application Integration "Agent-less" Infrastructure Server-side Application Integration

More information

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme SAAM1150BU Enabling Simple, Secure Access to Your Horizon and Citrix Virtual Desktops and Apps with Workspace ONE VMworld 2017 Content: Not for publication Greg Armanini & Matt Coppinger #VMWORLD #ADV1591BU

More information

Module Day Topic. 1 Definition of Cloud Computing and its Basics

Module Day Topic. 1 Definition of Cloud Computing and its Basics Module Day Topic 1 Definition of Cloud Computing and its Basics 1 2 3 1. How does cloud computing provides on-demand functionality? 2. What is the difference between scalability and elasticity? 3. What

More information

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018 REVISED 6 NOVEMBER 2018 Table of Contents Architectural Overview Workspace ONE Logical Architecture GUIDE 2 VMware Workspace ONE Cloud-Based Reference Architecture - Architectural Overview Architectural

More information

AARC Blueprint Architecture

AARC Blueprint Architecture AARC Blueprint Architecture Published Date: 18-04-2017 Revision: 1.0 Work Package: Document Code: Document URL: JRA1 AARC-BPA-2017 https://aarc-project.eu/blueprint-architecture AARC Blueprint Architecture

More information

MCSE- Windows Server 2012

MCSE- Windows Server 2012 COURSE CONTENT MCSE- Windows Server 2012 Course 20413C: Designing and Implementing a Server Infrastructure 1. Planning Server Upgrade and Migration Considerations for Upgrades and Migrations Creating a

More information

Cisco Container Platform

Cisco Container Platform Cisco Container Platform Pradnesh Patil Suhail Syed Cisco Spark How Questions? Use Cisco Spark to communicate with the speaker after the session 1. Find this session in the Cisco Live Mobile App 2. Click

More information

Security Models for Cloud

Security Models for Cloud Security Models for Cloud Kurtis E. Minder, CISSP December 03, 2011 Introduction Kurtis E. Minder, Technical Sales Professional Companies: Roles: Security Design Engineer Systems Engineer Sales Engineer

More information

Foundations and Concepts

Foundations and Concepts vrealize Automation 7.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Cisco Cloud Strategy. Uwe Müller. Leader PreSales Cloud & Datacenter Germany

Cisco Cloud Strategy. Uwe Müller. Leader PreSales Cloud & Datacenter Germany Cisco Cloud Strategy Uwe Müller Leader PreSales Cloud & Datacenter Germany 277X Data created by IoE devices v. end-user 30M New devices connected every week 180B Mobile apps downloaded in 2015 78% Workloads

More information

TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003

TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko Outline TechSec WG liaison with CSIRT community! Results and developments

More information

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer

Modelos de Negócio na Era das Clouds. André Rodrigues, Cloud Systems Engineer Modelos de Negócio na Era das Clouds André Rodrigues, Cloud Systems Engineer Agenda Software and Cloud Changed the World Cisco s Cloud Vision&Strategy 5 Phase Cloud Plan Before Now From idea to production:

More information

ISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems

ISACA Silicon Valley. APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems ISACA Silicon Valley APIs The Next Hacker Target or a Business and Security Opportunity? Tim Mather, CISO Cadence Design Systems Why Should You Care About APIs? Because cloud and mobile computing are built

More information