Software as a Service Multi-tenant Data Architecture. Frederick Chong Architect DPE Architecture Strategy Microsoft Corporation

Size: px
Start display at page:

Download "Software as a Service Multi-tenant Data Architecture. Frederick Chong Architect DPE Architecture Strategy Microsoft Corporation"

Transcription

1 Software as a Service Multi-tenant Data Architecture Frederick Chong Architect DPE Architecture Strategy Microsoft Corporation

2 Agenda SIMT principles and considerations Database options for storing multi-tenant data Enabling virtual data isolation in a multitenant environment Customizing multi-tenant data model Scaling multi-tenant data

3 The SaaS Architecture Shift Single Instance Multi-tenant Scaleable Configurable Multi-tenant efficient

4 The Share vs. Isolate Continuum SLA per tenant Data Separation Economy of Scale Simpler Management Isolate Share Considerations: Business (Time to market, ROI over time) Technical (Skills, expected tenant size and load) Operation ( can I guarantee my SLA without isolating? ) Regulatory constraints ( data must be physically separate )

5 Where to store the data? Approaches: Separate database per tenant Same database, separate schemas Same database, shared schema Implications on approach for: Securing and isolating data Extending data model Scaling and partitioning data

6 Separate Database per Tenant Approach: Meta data identifies database instance for each tenant Advantages: Easy to implement data model extension Easy to restore tenant data More security isolation Tradeoff: Number of tenants per database server is low Higher management, backup cost and database server infrastructure costs When to use: When tenant has specific database isolation requirements Tenant 1Tenant 2Tenant 3

7 Same Database, Separate Schema Approach: Each tenant gets their own group of tables in the same database. Advantages: Easy to implement data model extension Moderate security isolation Better tenant scale per server Tradeoff: More difficult to restore tenant data When to use: Number of tables for the app is small (100s) Scale per server is important OK to co-locate tenant data in same database Tenant B Tenant A Tenant C

8 Same Database, Same Schema Approach: All tenants use the same set of tables in the same database. Advantages: Better tenant scale per server Cost of management and backup is lower Tradeoff: Difficult to restore tenant data Harder to implement data model extension When to use: Scale per server is important OK to co-mingle tenant data in same database Tenant B Tenant C Tenant A

9 Securing and Isolating Tenant Data

10 Virtual Data Isolation Patterns Filters Permissions Database Table SQL Command View Stored Procedure View Encryption Crypto Key

11 Current Database Access Models Impersonation + Kerberos delegation Connection is established using end user security context No database connection pooling, security vs. performance tradeoff Trusted Subsystem Use application identity to establish database connection Better scale and performance Web Server Business Logic Server SQL Server Alice App ID = Bob Impersonate/Delegate App ID = Charlie Trusted Subsystem Access Access as as Alice Charlie Security Service (e.g. Windows KDC)

12 Multi-tenant database access requires a hybrid model Database access performed using a tenant security context Facilitates locking down database objects at the tenant level Databases, tables, stored procedures, views Facilitates database auditing Enables tenant specific encryption keys Costs: Additional provisioning task for creating and deactivating tenant TS accounts Added complexity in maintaining database connections pools

13 Multi-Tenant Trusted Subsystem Model Create trusted subsystem account for every tenant Application service process starts with a generic application identity Switch to a tenant account when connecting and accessing database: Kerberos SFU, or Security credential service Application Service Request from Acme Corporation Database Service Kerberos protocol transition into Acme account Request and send Acme Kerberos credential ticket Connect as Acme security context Security Credential Service Microsoft KDC

14 Securing Access to Database Separate database connection pool for each tenant Every application server can maintain one or more connection pool Database Access Group Shared DB Dedicated DB

15 Securing Tenant Specific Tables Database access group contains application identities with database access. Create different groups of tables for each new tenant. Create a different database access identity for each new tenant. Grant table access permissions to tenant s database access account. Create database access account for each tenant Database Access Group Grant account permissions to tables Assign account to group

16 Tenant View Filter Pattern Queries and Stored Procedures Tenant- Safe Views Shared Tables TenantCustomers View SELECT * from TenantCustomers WHERE Zipcode = Customers Table CREATE VIEW TenantCustomers AS SELECT * from Customers WHERE Tenant_ID = SUSER_SID()

17 Tenant Encryption Pattern Tenant A s Public/Private Keys Database s Master Key Encrypted Private Keys Tenant B s Public/Private Keys CREATE ASYMMETRIC KEY TenantAAsymmetricKey AUTHORIZATION TenantA WITH ALGORITHM = RSA_2048 CREATE SYMMETRIC KEY TenantASymmetricKey AUTHORIZATION TenantA WITH ALGORITHM = DESX ENCRYPTION BY ASYMMETRIC KEY TenantAAsymmetricKey Encrypted Symmetric Keys OPEN SYMMETRIC KEY TenantASymmetricKey DECRYPTION BY ASYMMETRIC KEY TenantAAsymmetricKey Tenant A s Symmetric Key Encrypted Tenant Data Tenant B s Symmetric Key INSERT INTO CustomersCreditCardView VALUES( 1234, EncryptByKey(Key_GUID(TenantA SymmetricKey), ))

18 Customizing Data Models

19 Data Model Extension Tenant A Tenant B Catalog Item Product ID Description Category ID Catalog Item Product ID Description Classification Code Challenges: Defining custom fields and storing custom data for each tenant. Business logic that can handle custom fields Presentation logic that can handle custom fields Enabling queries on custom fields

20 Defining and Storing Custom Data Fields Requires meta-data/data dictionary Straight forward when storing data in: Separate Database per Tenant Same Database with Separate Schema 2 approaches when storing data in Same Database with Same Schema: Fixed set of extended fields Extensions-value pairs

21 Fixed set of extensions Approach: All tenants data in one database. Pre-defined set of custom fields Advantages: Easy to implement Maximize number of tenants per database server Tradeoff: Tendency to results in sparse table When to use: When data co-mingling is OK Easy to anticipate pre-defined custom fields Tenant ID F1 F2 C1 C2 C3 345 Ted 53 Null paid Null 777 Kay Null Null 784 Mary 45 Null Null Null 345 Ned 21 Null owe Null 438 Pat 26 Null Null yes

22 Metadata for Fixed Extensions Tenant ID C1-Label C1-Datatype C2-Label C2-Datatype C3-Label C3-Datatype 345 Null Null Payment Status ntext Null Null 777 Age tinyint Null Null Null Null 438 Null Null Null Null Paid ntext OR (Space and Time Tradeoff) Tenant ID C1-Label C1-Datatype 777 Age tinyint Tenant ID C3-Label C3-Datatype 438 Paid ntext Tenant ID C2-Label C2-Datatype 345 Payment Status ntext

23 Extension-Value Pairs Approach Offers Unlimited number/option for custom fields Extension-value pairs in separate tables Metadata table keeps track of data labels and data types for extensions Metadata Table Data Tables Tenant ID F1 F2 Record ID 764 Ted $ John $32 Null 783 Sal $ Tenant ID Extension ID Extension Label Datatype Record ID Extension ID Value Status ntext Expire datetime Affiliation ntext Gold Acme

24 Extension-value pairs Advantage Unlimited number/option for custom fields Tradeoff Increase index/query/update complexity and delay When to use OK to co-mingle tenant data Custom fields are high value features Difficult to predict custom fields

25 Scaling Multi-tenant Data

26 2 Level Data Scaling Strategy Multi-Tenant Database Multi-Tenant Database Multi-Tenant Data Scaling Strategy Single Tenant Database Single Tenant Data Scaling Strategy Databases for one tenant

27 Horizontal Tenant Partitioning Too many concurrent users or / and Too many rows Redistribute tenant user load against baseline Redistribute tenant data load against baseline

28 Single Tenant Scaling Architecture Guidance: Scaling Out SQL Server 2005 paper by Roger Wolter Replicated reference data Requires deep application introspection: Revisit data model Study reference, resource and activity data dependency, frequency of change. Identify candidates for horizontal and vertical partitioning, replication, scaleup Replicated reference data Reference data Replicated reference data Some best practices: Replicate reference data Replicated reference data replica Keep related data near replica Write Master replica Less related Use scaleup for data that cannot be partitioned (resource data) replica More related Use single master replication rather than synchronize write

29 Conclusions Single instance, multi-tenancy is hard work Without the architecture patterns, we ll be limited to the isolation option

30

Multi Tenant Data Architecture

Multi Tenant Data Architecture Multi Tenant Data Architecture June 2006 Frederick Chong, Gianpaolo Carraro, and Roger Wolter Microsoft Corporation Applies to: Application Architecture Software as a Service (SaaS) Summary: The second

More information

CIS 6930/4930 Computer and Network Security. Topic 7. Trusted Intermediaries

CIS 6930/4930 Computer and Network Security. Topic 7. Trusted Intermediaries CIS 6930/4930 Computer and Network Security Topic 7. Trusted Intermediaries 1 Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC) Representative

More information

Azure SQL Database. Indika Dalugama. Data platform solution architect Microsoft datalake.lk

Azure SQL Database. Indika Dalugama. Data platform solution architect Microsoft datalake.lk Azure SQL Database Indika Dalugama Data platform solution architect Microsoft indalug@microsoft.com datalake.lk Agenda Overview Azure SQL adapts Azure SQL Instances (single,e-pool and MI) How to Migrate

More information

Javier Villegas. Azure SQL Server Managed Instance

Javier Villegas. Azure SQL Server Managed Instance Javier Villegas Azure SQL Server Managed Instance Javier Villegas DBA Manager at Mediterranean Shipping Company Involved with the Microsoft SQL Server since SQL Server 6.5 Specialization in SQL Server

More information

Trusted Intermediaries

Trusted Intermediaries AIT 682: Network and Systems Security Topic 7. Trusted Intermediaries Instructor: Dr. Kun Sun Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC)

More information

AIT 682: Network and Systems Security

AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 7. Trusted Intermediaries Instructor: Dr. Kun Sun Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC)

More information

Introduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security.

Introduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security. Trusted Intermediaries CSC/ECE 574 Computer and Network Security Topic 7. Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center () Representative solution:

More information

Multi-Tenant SQL. Presented by Eddy Kleinjan. How to handle multi-tenancy in applications. Are you ready to take your application to the next level?

Multi-Tenant SQL. Presented by Eddy Kleinjan. How to handle multi-tenancy in applications. Are you ready to take your application to the next level? Multi-Tenant SQL Presented by Eddy Kleinjan How to handle multi-tenancy in applications. Are you ready to take your application to the next level? SaaS: Software as a Service "Software deployed as a hosted

More information

Consolidate and Prepare for Cloud Efficiencies Oracle Database 12c Oracle Multitenant Option

Consolidate and Prepare for Cloud Efficiencies Oracle Database 12c Oracle Multitenant Option Consolidate and Prepare for Cloud Efficiencies Oracle Database 12c Oracle Multitenant Option Eric Rudie Master Principal Sales Consultant Oracle Public Sector 27 September 2016 Safe Harbor Statement The

More information

The Freedom to Choose

The Freedom to Choose Anat Dror The Freedom to Choose Choosing between SQL Server offerings Anat Dror SQL Server Expert, Quest SQL Server and DB2 domain expert with over 20 years of experience in a long list of IT related roles.

More information

SQL Server Security. Marek

SQL Server Security. Marek SQL Server Security Marek Chmel Lead Database Administrator @ AT&T MVP: Data Platform MCSE: Data Management and Analytics MCT: Regional Lead Certified Ethical Hacker CEHv8 marek.chmel@technet.ms @MarekChmel

More information

Building Multi-tenant Applications with Pervasive PSQL

Building Multi-tenant Applications with Pervasive PSQL Building Multi-tenant Applications with Pervasive PSQL Pervasive PSQL White Paper August 2012 This white paper is the first in a series of three designed to show how easily Pervasive PSQL can provide all

More information

Designing Database Solutions for Microsoft SQL Server (465)

Designing Database Solutions for Microsoft SQL Server (465) Designing Database Solutions for Microsoft SQL Server (465) Design a database structure Design for business requirements Translate business needs to data structures; de-normalize a database by using SQL

More information

Introduction to Multi-tenancy. Gus Bjorklund October 2013

Introduction to Multi-tenancy. Gus Bjorklund October 2013 Introduction to Multi-tenancy Gus Bjorklund October 2013 Introduction The session explores the upcoming inbuilt multi-tenancy capabilities included in the OpenEdge 11 RDBMS. Learn how multi-tenant support

More information

Modernizing Business Intelligence and Analytics

Modernizing Business Intelligence and Analytics Modernizing Business Intelligence and Analytics Justin Erickson Senior Director, Product Management 1 Agenda What benefits can I achieve from modernizing my analytic DB? When and how do I migrate from

More information

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1

Cryptography CS 555. Topic 16: Key Management and The Need for Public Key Cryptography. CS555 Spring 2012/Topic 16 1 Cryptography CS 555 Topic 16: Key Management and The Need for Public Key Cryptography CS555 Spring 2012/Topic 16 1 Outline and Readings Outline Private key management between two parties Key management

More information

SQL Azure. Abhay Parekh Microsoft Corporation

SQL Azure. Abhay Parekh Microsoft Corporation SQL Azure By Abhay Parekh Microsoft Corporation Leverage this Presented by : - Abhay S. Parekh MSP & MSP Voice Program Representative, Microsoft Corporation. Before i begin Demo Let s understand SQL Azure

More information

70-647: Windows Server Enterprise Administration Course 01 Planning for Active Directory

70-647: Windows Server Enterprise Administration Course 01 Planning for Active Directory 70-647: Windows Server Enterprise Administration Course 01 Planning for Active Directory Slide 1 Course 1 Planning for Active Directory Planning the Domains and Forest Structure Planning for Sites and

More information

Distributed Systems. Fall 2017 Exam 3 Review. Paul Krzyzanowski. Rutgers University. Fall 2017

Distributed Systems. Fall 2017 Exam 3 Review. Paul Krzyzanowski. Rutgers University. Fall 2017 Distributed Systems Fall 2017 Exam 3 Review Paul Krzyzanowski Rutgers University Fall 2017 December 11, 2017 CS 417 2017 Paul Krzyzanowski 1 Question 1 The core task of the user s map function within a

More information

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database

MOC 6232A: Implementing a Microsoft SQL Server 2008 Database MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft

More information

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market

MySQL CLOUD SERVICE. Propel Innovation and Time-to-Market MySQL CLOUD SERVICE Propel Innovation and Time-to-Market The #1 open source database in Oracle. Looking to drive digital transformation initiatives and deliver new modern applications? Oracle MySQL Service

More information

70-459: Transition Your MCITP: Database Administrator 2008 or MCITP: Database Developer 2008 to MCSE: Data Platform

70-459: Transition Your MCITP: Database Administrator 2008 or MCITP: Database Developer 2008 to MCSE: Data Platform 70-459: Transition Your MCITP: Database Administrator 2008 or MCITP: Database Developer 2008 to MCSE: Data Platform The following tables show where changes to exam 70-459 have been made to include updates

More information

Microsoft Architecting Microsoft Azure Solutions.

Microsoft Architecting Microsoft Azure Solutions. Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API

More information

Distributed KIDS Labs 1

Distributed KIDS Labs 1 Distributed Databases @ KIDS Labs 1 Distributed Database System A distributed database system consists of loosely coupled sites that share no physical component Appears to user as a single system Database

More information

Designing Database Solutions for Microsoft SQL Server 2012

Designing Database Solutions for Microsoft SQL Server 2012 Designing Database Solutions for Microsoft SQL Server 2012 Course 20465B 5 Days Instructor-led, Hands-on Introduction This course describes how to design and monitor high performance, highly available

More information

Create a DBaaS Catalog in an Hour with a PaaS-Ready Infrastructure

Create a DBaaS Catalog in an Hour with a PaaS-Ready Infrastructure Create a DBaaS Catalog in an Hour with a PaaS-Ready Infrastructure Ken Kutzer, Ramin Maozeni Systems Engineering Systems Division September 30, 2014 CON5748 Moscone South 301 Safe Harbor Statement The

More information

In-Memory Data Management Jens Krueger

In-Memory Data Management Jens Krueger In-Memory Data Management Jens Krueger Enterprise Platform and Integration Concepts Hasso Plattner Intitute OLTP vs. OLAP 2 Online Transaction Processing (OLTP) Organized in rows Online Analytical Processing

More information

Manual Trigger Sql Server 2008 Insert Multiple Rows At Once

Manual Trigger Sql Server 2008 Insert Multiple Rows At Once Manual Trigger Sql Server 2008 Insert Multiple Rows At Once Adding SQL Trigger to update field on INSERT (multiple rows) However, if there are multiple records inserted (as in the user creates several

More information

Kerberos and Public-Key Infrastructure. Key Points. Trust model. Goal of Kerberos

Kerberos and Public-Key Infrastructure. Key Points. Trust model. Goal of Kerberos Kerberos and Public-Key Infrastructure Key Points Kerberos is an authentication service designed for use in a distributed environment. Kerberos makes use of a thrusted third-part authentication service

More information

IBM Compose Managed Platform for Multiple Open Source Databases

IBM Compose Managed Platform for Multiple Open Source Databases IBM Compose Managed Platform for Multiple Source Databases Source for Source for Data Layer Blueprint with Compose Source for Comprehensive Catalogue for Simplified Scoping Scalable Platform for FutureProof

More information

HOW SNOWFLAKE SETS THE STANDARD WHITEPAPER

HOW SNOWFLAKE SETS THE STANDARD WHITEPAPER Cloud Data Warehouse Security HOW SNOWFLAKE SETS THE STANDARD The threat of a data security breach, someone gaining unauthorized access to an organization s data, is what keeps CEOs and CIOs awake at night.

More information

Single Sign-On Showdown

Single Sign-On Showdown Single Sign-On Showdown ADFS vs Pass-Through Authentication Max Fritz Solutions Architect SADA Systems #ITDEVCONNECTIONS Azure AD Identity Sync & Auth Timeline 2009 2012 DirSync becomes Azure AD Sync 2013

More information

On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor

On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor On Demand Cryptographic Resources for Your Virtual Data Center and the Cloud: Introducing SafeNet s Crypto Hypervisor Ugo Piazzalunga SafeNet Italy Technical Manager, IT Security ugo.piazzalunga@safenet-inc.com

More information

Data Protection Everywhere

Data Protection Everywhere Data Protection Everywhere For the modern data center Syed Saleem Advisory Systems Engineer Pillars of the modern data center Protection and trust Security/Governance Encryption Data Protection Services/Support

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Implementing Microsoft Azure Infrastructure Solutions OD20533C; On-Demand, Video-based Course Description This course is intended for IT professionals who are familiar with managing on-premises IT deployments

More information

Welcome to the. Migrating SQL Server Databases to Azure

Welcome to the. Migrating SQL Server Databases to Azure Welcome to the 1 Migrating SQL Server Databases to Azure Migrating SQL Server Databases to Azure Agenda Overview of SQL Server in Microsoft Azure Getting started with SQL Server in an Azure virtual machine

More information

Aurora, RDS, or On-Prem, Which is right for you

Aurora, RDS, or On-Prem, Which is right for you Aurora, RDS, or On-Prem, Which is right for you Kathy Gibbs Database Specialist TAM Katgibbs@amazon.com Santa Clara, California April 23th 25th, 2018 Agenda RDS Aurora EC2 On-Premise Wrap-up/Recommendation

More information

MongoDB Security (Users & Roles) MongoDB User Group 22 March 2017, Madrid

MongoDB Security (Users & Roles) MongoDB User Group 22 March 2017, Madrid MongoDB Security (Users & Roles) MongoDB User Group 22 March 2017, Madrid Who am I Juan Roy Twitter: @juanroycouto Email: juanroycouto@gmail.com MongoDB DBA at Grupo Undanet 2 MongoDB - Characters The

More information

MOC 6421B: Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure

MOC 6421B: Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure MOC 6421B: Configuring and Troubleshooting a Windows Server 2008 Network Infrastructure Course Overview This 5 day course instills students with the knowledge and skills to configure and troubleshoot Windows

More information

SQL Server Course Administering a SQL 2016 Database Infrastructure. Length. Prerequisites. Audience. Course Outline.

SQL Server Course Administering a SQL 2016 Database Infrastructure. Length. Prerequisites. Audience. Course Outline. SQL Server Course - 20764 Administering a SQL 2016 Database Infrastructure Length 5 days Prerequisites Basic knowledge of the Microsoft Windows operating system and its core functionality. Working knowledge

More information

Randy Pagels Sr. Developer Technology Specialist DX US Team AZURE PRIMED

Randy Pagels Sr. Developer Technology Specialist DX US Team AZURE PRIMED Randy Pagels Sr. Developer Technology Specialist DX US Team rpagels@microsoft.com AZURE PRIMED 2016.04.11 Interactive Data Analytics Discover the root cause of any app performance behavior almost instantaneously

More information

Security on AWS(overview) Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance

Security on AWS(overview) Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance Security on AWS(overview) Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance Agenda: Overview AWS Regions Availability Zones Shared Responsibility Security Features Best Practices

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

European General Data Protection Regulation is active in 2018! How to master the challenge of Data Protection and Security?

European General Data Protection Regulation is active in 2018! How to master the challenge of Data Protection and Security? European General Data Protection Regulation is active in 2018! How to master the challenge of Data Protection and Security? Considerations for Your Progress OpenEdge Application Conor Patten, Laurent Kieffer

More information

Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack

Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack Robert Collazo Systems Engineer Rackspace Hosting The Rackspace Vision Agenda Truly a New Era of Computing 70 s 80 s Mainframe Era 90

More information

Native Support of Multi-tenancy in RDBMS for Software as a Service

Native Support of Multi-tenancy in RDBMS for Software as a Service Native Support of Multi-tenancy in RDBMS for Software as a Service Oliver Schiller Benjamin Schiller Andreas Brodt Bernhard Mitschang Applications of Parallel and Distributed Systems Universität Stuttgart

More information

70-742: Identity in Windows Server Course Overview

70-742: Identity in Windows Server Course Overview 70-742: Identity in Windows Server 2016 Course Overview This course provides students with the knowledge and skills to install and configure domain controllers, manage Active Directory objects, secure

More information

Kerberos V5. Raj Jain. Washington University in St. Louis

Kerberos V5. Raj Jain. Washington University in St. Louis Kerberos V5 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/ 11-1

More information

Symantec Reference Architecture for Business Critical Virtualization

Symantec Reference Architecture for Business Critical Virtualization Symantec Reference Architecture for Business Critical Virtualization David Troutt Senior Principal Program Manager 11/6/2012 Symantec Reference Architecture 1 Mission Critical Applications Virtualization

More information

ITS. MySQL for Database Administrators (40 Hours) (Exam code 1z0-883) (OCP My SQL DBA)

ITS. MySQL for Database Administrators (40 Hours) (Exam code 1z0-883) (OCP My SQL DBA) MySQL for Database Administrators (40 Hours) (Exam code 1z0-883) (OCP My SQL DBA) Prerequisites Have some experience with relational databases and SQL What will you learn? The MySQL for Database Administrators

More information

Administering a SQL Database Infrastructure (M20764)

Administering a SQL Database Infrastructure (M20764) Administering a SQL Database Infrastructure (M20764) COURSE OVERVIEW: In this Microsoft online training course, you will learn the skills required to maintain a Microsoft SQL Server 2012 or 2014 database

More information

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. reserved. Insert Information Protection Policy Classification from Slide 8 The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information

INFO-H-415 Project Overview- Security Database and SQL Server

INFO-H-415 Project Overview- Security Database and SQL Server INFO-H-415 Project Overview- Security Database and SQL Server Kirubel Yaekob Yasmine Daoud December 2017 1 Introduction A defense-in-depth strategy, with overlapping layers of security, is the best way

More information

Microsoft Exam Questions and Answers (PDF) Microsoft Exam Questions BrainDumps

Microsoft Exam Questions and Answers (PDF) Microsoft Exam Questions BrainDumps Microsoft 70-535 Dumps with Valid 70-535 Exam Questions PDF [2018] The Microsoft 70-535 Microsoft Architecting Microsoft Azure Solutions Exam exam is an ultimate source for professionals to retain their

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

Planning and Administering SharePoint 2016

Planning and Administering SharePoint 2016 Planning and Administering SharePoint 2016 Course 20339A 5 Days Instructor-led, Hands on Course Information This five-day course will combine the Planning and Administering SharePoint 2016 class with the

More information

SQL Server DBA Course Details

SQL Server DBA Course Details SQL Server DBA Course Details By Besant Technologies Course Name Category Venue SQL Server DBA Database Administration Besant Technologies No.24, Nagendra Nagar, Velachery Main Road, Address Velachery,

More information

Active Directory Attacks and Detection

Active Directory Attacks and Detection Active Directory Attacks and Detection #Whoami Working as an Information Security Executive Blog : www.akijosberryblog.wordpress.com You can follow me on Twitter: @AkiJos This talk is Based on Tim Madin

More information

to know how and when to apply which Microsoft technology. In many cases, you can combine multiple

to know how and when to apply which Microsoft technology. In many cases, you can combine multiple Overview of Microsoft Virtualization Microsoft offers a number of virtualization technologies that administrators and infrastructure architects can use to create and administer a virtual environment. To

More information

Data Source Kerberos / oauth On the Wire Explaining Kerberos Constrained Delegation with Protocol Transition and Oauth for Data Source Single Sign On

Data Source Kerberos / oauth On the Wire Explaining Kerberos Constrained Delegation with Protocol Transition and Oauth for Data Source Single Sign On Welcome 1 8 B I - 11 3 Data Source Kerberos / oauth On the Wire Explaining Kerberos Constrained Delegation with Protocol Transition and Oauth for Data Source Single Sign On John Kew Manager / Connectivity

More information

Designing Database Solutions for Microsoft SQL Server 2012

Designing Database Solutions for Microsoft SQL Server 2012 Designing Database Solutions for Microsoft SQL Server 2012 Course 20465A 5 Days Instructor-led, Hands-on Introduction This course describes how to design and monitor high performance, highly available

More information

SQL Server SQL Server 2008 and 2008 R2. SQL Server SQL Server 2014 Currently supporting all versions July 9, 2019 July 9, 2024

SQL Server SQL Server 2008 and 2008 R2. SQL Server SQL Server 2014 Currently supporting all versions July 9, 2019 July 9, 2024 Current support level End Mainstream End Extended SQL Server 2005 SQL Server 2008 and 2008 R2 SQL Server 2012 SQL Server 2005 SP4 is in extended support, which ends on April 12, 2016 SQL Server 2008 and

More information

Oracle Hyperion Profitability and Cost Management

Oracle Hyperion Profitability and Cost Management Oracle Hyperion Profitability and Cost Management Configuration Guidelines for Detailed Profitability Applications November 2015 Contents About these Guidelines... 1 Setup and Configuration Guidelines...

More information

Keep your fingers off my keys today & tomorrow

Keep your fingers off my keys today & tomorrow SIGS SE February 2017 Keep your fingers off my keys today & tomorrow Marcel Dasen VP Engineering Securosys SA Keys? Encryption keys asymmetric e.g. RSA, ECC public/private key pairs for wrapping symmetric

More information

ANALYSIS OF SaaS MULTI-TENANT DATABASE IN A CLOUD ENVIRONMENT

ANALYSIS OF SaaS MULTI-TENANT DATABASE IN A CLOUD ENVIRONMENT ANALYSIS OF SaaS MULTI-TENANT DATABASE IN A CLOUD ENVIRONMENT Maram Hassan AlAlwan Alalwan.maram@gmail.com Soha S. Zaghloul smekki@ksu.edu.sa College of Computer and Information Science Department of Computer

More information

THE COMPLETE GUIDE COUCHBASE BACKUP & RECOVERY

THE COMPLETE GUIDE COUCHBASE BACKUP & RECOVERY THE COMPLETE GUIDE COUCHBASE BACKUP & RECOVERY INTRODUCTION Driven by the need to remain competitive and differentiate themselves, organizations are undergoing digital transformations and becoming increasingly

More information

Agenda. AWS Database Services Traditional vs AWS Data services model Amazon RDS Redshift DynamoDB ElastiCache

Agenda. AWS Database Services Traditional vs AWS Data services model Amazon RDS Redshift DynamoDB ElastiCache Databases on AWS 2017 Amazon Web Services, Inc. and its affiliates. All rights served. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon Web Services,

More information

COURSE 20462C: ADMINISTERING MICROSOFT SQL SERVER DATABASES

COURSE 20462C: ADMINISTERING MICROSOFT SQL SERVER DATABASES Page 1 of 11 ABOUT THIS COURSE This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2014 database. The course focuses on teaching individuals

More information

Data-intensive Storage Services on Clouds: The VISION Cloud Project Simona Rabinovici-Cohen, Hillel Kolodner IBM Research - Haifa

Data-intensive Storage Services on Clouds: The VISION Cloud Project Simona Rabinovici-Cohen, Hillel Kolodner IBM Research - Haifa Data-intensive Storage Services on Clouds: The VISION Cloud Project Simona Rabinovici-Cohen, Hillel Kolodner IBM Research - Haifa 2011 SNIA Cloud Burst Summit. Insert Your Company Name. All Rights Reserved.

More information

CA ERwin Data Modeler s Role in the Relational Cloud. Nuccio Piscopo.

CA ERwin Data Modeler s Role in the Relational Cloud. Nuccio Piscopo. CA ERwin Data Modeler s Role in the Relational Cloud Nuccio Piscopo Table of Contents Abstract.....3 Introduction........3 Daas requirements through CA ERwin Data Modeler..3 CA ERwin in the Relational

More information

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7

Public-Key Cryptography. Professor Yanmin Gong Week 3: Sep. 7 Public-Key Cryptography Professor Yanmin Gong Week 3: Sep. 7 Outline Key exchange and Diffie-Hellman protocol Mathematical backgrounds for modular arithmetic RSA Digital Signatures Key management Problem:

More information

Maintaining a Microsoft SQL Server 2005 Database Course 2780: Three days; Instructor-Led

Maintaining a Microsoft SQL Server 2005 Database Course 2780: Three days; Instructor-Led Maintaining a Microsoft SQL Server 2005 Database Course 2780: Three days; Instructor-Led Introduction This three-day instructor-led course provides students with product knowledge and skills needed to

More information

2788 : Designing High Availability Database Solutions Using Microsoft SQL Server 2005

2788 : Designing High Availability Database Solutions Using Microsoft SQL Server 2005 2788 : Designing High Availability Database Solutions Using Microsoft SQL Server 2005 Introduction Elements of this syllabus are subject to change. This three-day instructor-led course provides students

More information

Kerberos5 1. Kerberos V5

Kerberos5 1. Kerberos V5 Kerberos5 1 Kerberos V5 Kerberos5 2 ASN.1 data representation language: data structure (ß definition C struct, union), but variable length-arrays, optional elements, labeling,... data representation on

More information

THE COMPLETE GUIDE HADOOP BACKUP & RECOVERY

THE COMPLETE GUIDE HADOOP BACKUP & RECOVERY THE COMPLETE GUIDE HADOOP BACKUP & RECOVERY INTRODUCTION Driven by the need to remain competitive and differentiate themselves, organizations are undergoing digital transformations and becoming increasingly

More information

MS-20462: Administering Microsoft SQL Server Databases

MS-20462: Administering Microsoft SQL Server Databases MS-20462: Administering Microsoft SQL Server Databases Description This five-day instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2014 database.

More information

MongoDB An Overview. 21-Oct Socrates

MongoDB An Overview. 21-Oct Socrates MongoDB An Overview 21-Oct-2016 Socrates Agenda What is NoSQL DB? Types of NoSQL DBs DBMS and MongoDB Comparison Why MongoDB? MongoDB Architecture Storage Engines Data Model Query Language Security Data

More information

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information

Migrating Enterprise Applications to the Cloud Session 672. Leighton L. Nelson

Migrating Enterprise Applications to the Cloud Session 672. Leighton L. Nelson Migrating Enterprise Applications to the Cloud Session 672 Leighton L. Nelson Leighton L. Nelson Instructional Technology Principal Oracle ACE & Oracle Certified Expert Oracle Database Administrator Author/blogger

More information

The Pathway to the Cloud Using Azure SQL Managed Instance

The Pathway to the Cloud Using Azure SQL Managed Instance 1 Sales Order Management Product Manuals 2 Agility Assurance (Security) Efficiency Experience (Apps) Business Growth 3 Catalog Existing application Define criteria for moving to or starting applications

More information

02/11/2015. This is a slide for graphics (It has a white background)

02/11/2015. This is a slide for graphics (It has a white background) This is a slide for graphics (It has a white background) 1 2 Now & Future Password 1 Password 2 Password 3 Password 4 GAfE, AzureAD, onprem AD. ChromeOS, PC, ios. Various web apps. Distributed. Last 10

More information

ORACLE 11gR2 DBA. by Mr. Akal Singh ( Oracle Certified Master ) COURSE CONTENT. INTRODUCTION to ORACLE

ORACLE 11gR2 DBA. by Mr. Akal Singh ( Oracle Certified Master ) COURSE CONTENT. INTRODUCTION to ORACLE ORACLE 11gR2 DBA by Mr. Akal Singh ( Oracle Certified Master ) INTRODUCTION to ORACLE COURSE CONTENT Exploring the Oracle Database Architecture List the major architectural components of Oracle Database

More information

Implementing a Storage Pattern in the OR Mapping Framework

Implementing a Storage Pattern in the OR Mapping Framework , pp.29-38 http://dx.doi.org/10.14257/ijgdc.2013.6.5.03 Implementing a Storage Pattern in the OR Mapping Framework Muhammad Naeem Ahmed Khan, Arsalan Shahid and Sarah Shafqat Shaheed Zulfikar Ali Bhutto

More information

20533B: Implementing Microsoft Azure Infrastructure Solutions

20533B: Implementing Microsoft Azure Infrastructure Solutions 20533B: Implementing Microsoft Azure Infrastructure Solutions Course Details Course Code: Duration: Notes: 20533B 5 days This course syllabus should be used to determine whether the course is appropriate

More information

An Oracle White Paper September Security and the Oracle Database Cloud Service

An Oracle White Paper September Security and the Oracle Database Cloud Service An Oracle White Paper September 2012 Security and the Oracle Database Cloud Service 1 Table of Contents Overview... 3 Security architecture... 4 User areas... 4 Accounts... 4 Identity Domains... 4 Database

More information

This course provides students with the knowledge and skills to administer Windows Server 2012.

This course provides students with the knowledge and skills to administer Windows Server 2012. MOC 20411C: Administering Windows Server 2012 Course Overview This course provides students with the knowledge and skills to administer Windows Server 2012. Course Introduction Course Introduction 6m Module

More information

DBAs can use Oracle Application Express? Why?

DBAs can use Oracle Application Express? Why? DBAs can use Oracle Application Express? Why? 20. Jubilarna HROUG Konferencija October 15, 2015 Joel R. Kallman Director, Software Development Oracle Application Express, Server Technologies Division Copyright

More information

Overview of Authentication Systems

Overview of Authentication Systems Overview of Authentication Systems Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/

More information

GSI Online Credential Retrieval Requirements. Jim Basney

GSI Online Credential Retrieval Requirements. Jim Basney GSI Online Credential Retrieval Requirements Jim Basney jbasney@ncsa.uiuc.edu http://www.ncsa.uiuc.edu/~jbasney/ Online Credential Retrieval Defined Client Server Authenticate Request Credential Verify

More information

File system, 199 file trove-guestagent.conf, 40 flavor-create command, 108 flavor-related APIs list, 280 show details, 281 Flavors, 107

File system, 199 file trove-guestagent.conf, 40 flavor-create command, 108 flavor-related APIs list, 280 show details, 281 Flavors, 107 Index A Amazon AWS, 7, 10 Amazon RDS DBaaS solutions, 10 service vs. platform, 8 single-tenant DBaaS solution, 6 Amazon RedShift DBaaS solutions, 10 single-tenant DBaaS solution, 6 AMD-V, 17 AMQP server

More information

Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge

Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge Oracle Identity Manager 11gR2-PS2 Hands-on Workshop Tech Deep Dive DB Schema, Backup & Restore, Bulkload, Reports, Archival & Purge atul.goyal@oracle.com Principal Product Manager,

More information

Business Technology Briefing: Fear of Flying, And How You Can Overcome It

Business Technology Briefing: Fear of Flying, And How You Can Overcome It Business Technology Briefing: Fear of Flying, And How You Can Overcome It Joseph Tobloski Senior Director for Data & Platforms R&D Accenture Technology Labs Fear of Flying And How You Can Overcome It May

More information

SharePoint Online for Administrators

SharePoint Online for Administrators Course 55238: SharePoint Online for Administrators Page 1 of 6 SharePoint Online for Administrators Course 55238: 2 days; Instructor-Led Introduction This course will introduce the audience to SharePoint

More information

CMB-207-1I Citrix Desktop Virtualization Fast Track

CMB-207-1I Citrix Desktop Virtualization Fast Track Page1 CMB-207-1I Citrix Desktop Virtualization Fast Track This fast-paced course covers select content from training courses CXA-206: Citrix XenApp 6.5 Administration and CXD-202: Citrix XenDesktop 5 Administration

More information

Planning and Administering SharePoint 2016

Planning and Administering SharePoint 2016 Planning and Administering SharePoint 2016 20339-1; 5 Days; Instructor-led Course Description This five-day course will provide you with the knowledge and skills to plan and administer a Microsoft SharePoint

More information

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof Dyadic Enterprise Unbound Key Control For Azure Marketplace The Secure-As-Hardware Software With a Mathematical Proof Unbound Key Control (UKC) is the first software-only key management and key protection

More information

Service Description Managed Applications for SAP

Service Description Managed Applications for SAP Service Description Managed Applications for SAP Table of contents 1 DEFINITIONS... 2 2 PURPOSE OF THE DOCUMENT... 2 3 OVERVIEW OF THE SERVICE... 2 3.1 OVERALL DESCRIPTION... 2 3.2 GEOGRAPHICAL FOOTPRINT...

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud?

DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing WHAT IS CLOUD COMPUTING? 2. Slide 3. Slide 1. Why is it called Cloud? DISTRIBUTED SYSTEMS [COMP9243] Lecture 8a: Cloud Computing Slide 1 Slide 3 ➀ What is Cloud Computing? ➁ X as a Service ➂ Key Challenges ➃ Developing for the Cloud Why is it called Cloud? services provided

More information

Common Database Deployment Gotchas

Common Database Deployment Gotchas Common Database Deployment Gotchas Simon D Morias SQL Server Consultant @ Sabin.io Microsoft Certified Master: SQL Server MCSE: Data Platform & Business Intelligence simon.dmorias@sabin.io Why database

More information

Virtual Machine Encryption Security & Compliance in the Cloud

Virtual Machine Encryption Security & Compliance in the Cloud Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture

More information