Softlink International Liberty Security
|
|
- Valentine Douglas
- 5 years ago
- Views:
Transcription
1 Softlink International Liberty Security
2 The Product: Liberty Liberty is Softlink s flagship product for Special, Academic, Government and Public libraries used by hundreds of academics, information specialists, professionals and library staff daily to manage, access and share information resources to facilitate organisational goals. Built specifically for web deployment and to deliver flexibility, reliability and scalability for users, Liberty has been the focus of intense development and design at Softlink to facilitate a web-based library solution that meets the needs of today and tomorrow s library users, researchers and professionals. Selected by a prestigious range of libraries, consortia and multinational organisations in Australia and overseas, Liberty integrates leading technology, 25 years information management technology experience and established library standards to continue to benefit all members of the library and business communities. Network Configuration Liberty is architected as a three-tier application which inherently enables both horizontal and vertical scalability. Each deployed element of Liberty is both vertically and horizontally scalable as follows: Liberty is built in a multi-tier architecture to facilitate scaling to an enterprise-level deployment. This consists of: Web & Application Server Database Server Reporting Server By separating the different tiers of the application, greater security and performance is provided. In addition to security and performance benefits, users also benefit from increases in scalability and more flexible deployment options. The configuration is comprised of: 1. Web Server. The Web Server maintains and controls end-user connections. The Web Server runs the Apache Web Server application and can also act as a load-balancer for the deployment. 2. Application Server. The Application Server contains the application. The system runs within the JBoss Application server within the JEE framework. All business logic is maintained within the application server. 3. Reporting Server. The Reporting Server runs MS SQL Reporting Services and is the reporting framework used within the system. A separate server is recommended to maximise performance and security of the SQL database. 4. Database Server. The database server stores all user data and runs MS SQL Server. P a g e 2
3 Deploying the software in a 3 tier architecture provides benefits in terms of security. In most usage scenarios however, a two tier architecture whereby the web and application servers are combined simplifies the deployment without adding significant negatives. This 2 tier deployment model is recommended for the majority of sites both enterprise and otherwise. Server Communications As an Enterprise deployment disperses the Liberty application across several different servers, it is important to understand how each of the servers communicates to each other. All inter-server communication is performed over the http protocol. The default configuration is to use port 8080 for http communication, however this is completely configurable. Secure communication is also supported using the https protocol with the default port of 443. The Application Server communicates with the SQL server using socket based communication over TCP/IP. The default port for this is 1433 but is fully customisable. This allows the firewalls between the different network zones to be fully secured allowing communication on set protocols and ports from defined sources to set destinations. The application server will also communicate with the report server via port 80. Security Requirements There are two types of security requirements when it comes to Liberty Enterprise: 1. User security 2. Application security User Security User security settings are easily maintained within the Liberty application by an administrator and work at a number of levels: Each user is added to a User Role. The User Role defines what User Privileges the user role has, and what Security Groups the user belongs to. These privileges define what actions the user can perform (View, Add, Edit etc) and what modules the user can access (OPAC, Cataloguing, Acquisitions etc) according to your organisational structure and user roles. P a g e 3
4 Resources within Liberty can also be assigned a Security Group. This means that only users that belong to that Security Group can view and access the record in the OPAC. In addition to this, Security Groups can also be used to exclude users. Individual User Roles can be assigned to Security Groups. User Roles, User Privileges and Security Groups are fully customisable within Liberty and definable by the library staff via the application interface. Users can be authenticated into Liberty through a number of different mechanisms: 1. Direct authentication with Liberty 2. LDAP Authentication 3. Single-Sign-On using a SSO mechanism supported by Liberty Direct Authentication with Liberty means the user enters their username and password and the details are authenticated by Liberty using the information stored within Liberty. LDAP Authentication is similar to Direct Authentication except the username and password information is queried against an Access Directory (Active Directory) on the network with the authentication status returned to Liberty. This mechanism uses the LDAP protocol. All user roles and privileges are maintained within Liberty. Single-Sign-On allows the user to sign on once to the network or intranet and be automatically authenticated into other applications on the network. Single-Sign-on can use either Integrated Authentication (provided by Microsoft) or a third-party SSO web portal. To use Integrated Authentication the servers must all be on the same network and domain as the end user and using Active Directory and LDAP. Softlink currently supports the SAFE and SAML protocols. User Role and User Privilege configurations are maintained within Liberty. Within Liberty, the only difference between a Liberty Staff Member and an End User is the User Role granted to the user and the associated User Privileges allocated to the different roles. Application Security Minimal network security requirements exist for Liberty to work correctly; these requirements largely relate to reporting. For example, the user account running the Application Server (Service Account of JBoss) must have the right to run as a service, access to any network paths used by the application and read and write access to the Reporting Services Database. Access to the main SQL Database on the Database Server is configured within the application. The application prefers to use an SQL user to access the library data, while Reporting Services requires a network user account. Framework Liberty is built on the Java Enterprise Edition framework designed for building large-scale, multi-tiered, scalable, reliable, and secure network applications. P a g e 4
5 Performance testing and tuning Softlink conducts performance tests at the IBM Test Centre on Liberty to validate current benchmarks and identify any areas requiring improvement. In order to leverage enhanced frameworks for improved performance, Liberty has been upgraded to provide support for Wildfly which has a lighter footprint than the currently supported version of the JBoss application server. The version of Java running on the application server has also been upgraded, to Java 7. Adoption of international standards. Softlink seeks to adopt those standards that are most needed by clients as a result of legislative requirements, widespread acceptance, or those that have the potential to offer end user value. Liberty is compliant with a wide range of industry standards that relate to library data, including the following: MARC21 EDI Z39.50 SIP2 RDA AACR2 P a g e 5
Factsheet of Public Services Infrastructure (PSi) Updated on: 1st Sep 03
Factsheet of Public Services Infrastructure (PSi) Updated on: 1st Sep 03 1 Objective of Paper 1.1 This document provides an overview of the Public Services Infrastructure (PSi). 2 Overview of PSi 2.1 PSi
More informationOpenIAM Identity and Access Manager Technical Architecture Overview
OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...
More informationPowerApps Security Features
TABLE OF CONTENTS 1 Introduction 2 Security features PowerApps offers the ability to deploy a secure HR system globally and remain worry-free about losing control of your critical HR data. INTRODUCTION
More informationArcGIS for Server: Administration and Security. Amr Wahba
ArcGIS for Server: Administration and Security Amr Wahba awahba@esri.com Agenda ArcGIS Server architecture Distributing and scaling components Implementing security Monitoring server logs Automating server
More informationNovell Access Manager 3.1
Technical White Paper IDENTITY AND SECURITY www.novell.com Novell Access Manager 3.1 Access Control, Policy Management and Compliance Assurance Novell Access Manager 3.1 Table of Contents: 2..... Complete
More informationMicrosoft Implementing Desktop Application Environments
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20416 - Implementing Desktop Application Environments Length 5 days Price $4290.00 (inc GST) Version B Overview This five-day course provides students with
More informationCourse: JBoss Training: JBoss AS 7 and JBoss EAP 6 Administration and Clustering Training
Course: JBoss Training: JBoss AS 7 and JBoss EAP 6 Administration and Clustering Training Course Length: Duration; 4 days Course Code: WA 2060 This training course covers both the unsupported open source
More informationUniversity of Ulster Standard Cover Sheet
University of Ulster Standard Cover Sheet Document Title AUTHENTICATION STANDARD 2.0 Custodian Approving Committee ISD Heads ISD Committee Policy approved date 2011 10 13 Policy effective from date 2011
More informationMicrosoft Core Solutions of Microsoft SharePoint Server 2013
1800 ULEARN (853 276) www.ddls.com.au Microsoft 20331 - Core Solutions of Microsoft SharePoint Server 2013 Length 5 days Price $4290.00 (inc GST) Version B Overview This course will provide you with the
More informationOracle Hospitality Simphony Cloud Services Post-Installation or Upgrade Guide Release 2.10 E July 2018
Oracle Hospitality Simphony Cloud Services Post-Installation or Upgrade Guide Release 2.10 E89810-04 July 2018 Copyright 2010, 2018, Oracle and/or its affiliates. All rights reserved. This software and
More informationTechnical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.
Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple
More informationCisco Prime Service Catalog Compatibility Matrix
Cisco Prime Service Catalog Compatibility Matrix Revised: September 2015 This document describes the version of the third-party software products that have been certified with Cisco Prime Service Catalog.
More informationJBOSS AS 7 AND JBOSS EAP 6 ADMINISTRATION AND CLUSTERING (4 Days)
www.peaklearningllc.com JBOSS AS 7 AND JBOSS EAP 6 ADMINISTRATION AND CLUSTERING (4 Days) This training course covers both the unsupported open source JBoss Application Server and the supported platform
More informationWhy Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard
Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard In my view, Microsoft Azure is fast becoming the trusted platform of choice for SMB and Enterprise customers.
More informationOracle Hospitality Cruise AffairWhere Security Guide Release E April 2017
Oracle Hospitality Cruise AffairWhere Security Guide Release 2.2.5 E85968-01 April 2017 Copyright 2006, 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationOracle WebLogic Server 12c: Administration I
Oracle WebLogic Server 12c: Administration I Duration 5 Days What you will learn This Oracle WebLogic Server 12c: Administration I training teaches you how to install and configure Oracle WebLogic Server
More informationHOW TO SETUP CFS POLICIES WITH LDAP AND SSO TO RESTRICT INTERNET ACCESS ON CFS 3.0
HOW TO SETUP CFS POLICIES WITH LDAP AND SSO TO RESTRICT INTERNET ACCESS ON CFS 3.0 DESCRIPTION This article explains about how to integrate Premium Content Filtering Service with LDAP (With Single Sign
More informationOracle Cloud What's New for Oracle WebCenter Portal Cloud Service
Oracle Cloud What's New for Oracle WebCenter Portal Cloud Service E80293-09 April 2018 Oracle Cloud What's New for Oracle WebCenter Portal Cloud Service, E80293-09 Copyright 2017, 2018, Oracle and/or its
More informationOracle WebCenter Interaction
Oracle WebCenter Interaction Deployment Overview Guide 10g Release 3 (10.3) November 2008 Oracle WebCenter Interaction Deployment Overview Guide, 10g Release 3 (10.3) Copyright 2008, Oracle and/or its
More informationArchitecture & Deployment
Architecture & Deployment IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes 2014 IBM Corporation Agenda IBM Connections lications Prerequisite Software Deployment
More informationJohn Heimann Director, Security Product Management Oracle Corporation
John Heimann Director, Security Product Management Oracle Corporation Oracle9i Application Server v2 Security What s an Application Server? Development and deployment environment Web(HTML,XML,SOAP) J2EE
More informationForgeRock Access Management Core Concepts AM-400 Course Description. Revision B
ForgeRock Access Management Core Concepts AM-400 Course Description Revision B ForgeRock Access Management Core Concepts AM-400 Description This structured course comprises a mix of instructor-led lessons
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications
More informationData Security at Smart Assessor
Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5
More informationMySQL for Database Administrators Ed 4
Oracle University Contact Us: (09) 5494 1551 MySQL for Database Administrators Ed 4 Duration: 5 Days What you will learn The MySQL for Database Administrators course teaches DBAs and other database professionals
More informationEnhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation
Enhancing cloud applications by using external authentication services After you complete this section, you should understand: Terminology such as authentication, identity, and ID token The benefits of
More informationSecurity Overview. Technical Whitepaper. Secure by design. End to end security. N-tier Application Architecture. Data encryption. User authentication
Technical Whitepaper Security Overview As a team, we have a long history of developing and delivering HR software solutions to customers worldwide, including many of the world s most-demanding organisations.
More informationTrusted Login Connector (Hosted SSO)
Trusted Login Connector (Hosted SSO) Table of Contents Summary... 3 Frequently Asked Questions... 3 Architecture... 5 Installation/configuration... 5 2 Summary New functionality allows SelectHR users to
More informationExcel4apps Wands 5 Architecture Excel4apps Inc.
Excel4apps Wands 5 Architecture 2014 Excel4apps Inc. Table of Contents 1 Introduction... 3 2 Overview... 3 3 Client... 3 4 Server... 3 4.1 Java Servlet... 4 4.2 OAF Page... 4 4.3 Menu and Function... 4
More informationIBM Tivoli Access Manager for e-business V6.1.1 Implementation
000-039 IBM Tivoli Access Manager for e-business V6.1.1 Implementation Version 14.23 Topic 1, Volume A QUESTION NO: 1 What is included in the high level configuration document when WebSEAL clustering must
More informationEnterSpace Data Sheet
EnterSpace 7.0.4.3 Data Sheet ENTERSPACE BUNDLE COMPONENTS Policy Engine The policy engine is the heart of EnterSpace. It evaluates digital access control policies and makes dynamic, real-time decisions
More informationQlik Sense Enterprise architecture and scalability
White Paper Qlik Sense Enterprise architecture and scalability June, 2017 qlik.com Platform Qlik Sense is an analytics platform powered by an associative, in-memory analytics engine. Based on users selections,
More informationIBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights
IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing
More informationApp Gateway Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E App Gateway Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical
More informationWhat's new in IBM Rational Build Forge Version 7.1
What's new in IBM Rational Build Forge Version 7.1 Features and support that help you automate or streamline software development tasks Skill Level: Intermediate Rational Staff, IBM Corporation 13 Jan
More informationMobility best practice. Tiered Access at Google
Mobility best practice Tiered Access at Google How can IT leaders enable the productivity of employees while also protecting and securing corporate data? IT environments today pose many challenges - more
More informationBeBanjo Infrastructure and Security Overview
BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits
More informationScaling for the Enterprise
White Paper Solutions Business Manager Scaling for the Enterprise by Pete Dohner and Jeremy Vorndam June 2, 2017 Table of Contents Who Should Read This Paper?... 1 Introduction... 1 N-Tier Architecture...
More informationOracle Communications Services Gatekeeper
Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or
More informationDesigning Windows Server 2008 Network and Applications Infrastructure
Designing Windows Server 2008 Network and Applications Infrastructure Course No. 6435B - 5 Days Instructor-led, Hands-on Introduction This five-day course will provide students with an understanding of
More informationThe Shibboleth-enabled WebDAV server used in ESUP-Portail and ORI-OAI projects
The Shibboleth-enabled WebDAV server used in ESUP-Portail and ORI-OAI projects Raymond Bourges TERENA EuroCAMP 14-15 November 2007 Dubrovnik, Croatia Shibboleth-enabled WebDAV server 1) Context Demo (if
More informationSSO Plugin. Release notes. J System Solutions. Version 4.0
SSO Plugin Release notes J System Solutions Version 4.0 JSS SSO Plugin v4.0 Release notes What's new... 3 Java support... 3 Improved user interface... 3 Hostname based integrations... 3 Client IP and hostname
More informationOracle Hospitality Cruise Fine Dining System Security Guide Release E
Oracle Hospitality Cruise Fine Dining System Security Guide Release 9.0.2.29 E99054-01 August 2018 Copyright 2015, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationIZO MANAGED CLOUD FOR AZURE
USE CASE - HYBRID CLOUD IZO MANAGED CLOUD FOR AZURE 1. LET S UNDERSTAND THE MARKET DYNAMICS In this era of digitisation, the cloud debate is over-enterprises have already moved a sizeable portion of their
More informationROYAL INSTITUTE OF INFORMATION & MANAGEMENT
ROYAL INSTITUTE OF INFORMATION & MANAGEMENT MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access
More informationSecurity Correlation Server System Deployment and Planning Guide
CorreLog Security Correlation Server System Deployment and Planning Guide The CorreLog Server provides a method of collecting security information contained in log messages generated by network devices
More informationBEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE
BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.
More informationMicrosoft Configuring and Troubleshooting Windows Server 2008 Application Infrastructure
1800 ULEARN (853 276) www.ddls.com.au Microsoft 6439 - Configuring and Troubleshooting Windows Server 2008 Application Infrastructure Length 5 days Price $4290.00 (inc GST) Overview This course introduces
More informationVMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018
VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 Table of Contents Introduction to Horizon Cloud with Manager.... 3 Benefits of Integration.... 3 Single Sign-On....3
More information2017/11/10 10:40 1/2 Setup. Be aware of the updating procedure of VISUAL PLANNING, see UPDATE VISUAL PLANNING
2017/11/10 10:40 1/2 Setup Setup INTRODUCTION The setup procedure for VISUAL PLANNING 5.3 depends on the version: VISUAL PLANNING ONE VISUAL PLANNING ESSENTIAL VISUAL PLANNING ENTERPRISE Be aware of the
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
More informationProficy* Workflow. Powered by Proficy SOA GETTING STARTED
Proficy* Workflow Powered by Proficy SOA GETTING STARTED Version 1.5 SP4 February 2012 All rights reserved. No part of this publication may be reproduced in any form or by any electronic or mechanical
More informationOracle Hospitality Simphony Post-Installation or Upgrade Guide. Release 18.2
Oracle Hospitality Simphony Post-Installation or Upgrade Guide Release 18.2 F12086-01 December 2018 Oracle Hospitality Simphony Post-Installation or Upgrade Guide, Release 18.2 F12086-01 Copyright Oracle
More informationLiferay Security Features Overview. How Liferay Approaches Security
Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................
More informationSyncplicity Panorama with Isilon Storage. Technote
Syncplicity Panorama with Isilon Storage Technote Copyright 2014 EMC Corporation. All rights reserved. Published in USA. Published November, 2014 EMC believes the information in this publication is accurate
More informationMicrosoft Installation and Deployment in Microsoft Dynamics CRM 2013
1800 ULEARN (853 276) www.ddls.com.au Microsoft 80539 - Installation and Deployment in Microsoft Dynamics CRM 2013 Length 2 days Price $1870.00 (inc GST) Overview This two-day training course provides
More informationDelivers cost savings, high definition display, and supercharged sharing
TM OpenText TM Exceed TurboX Delivers cost savings, high definition display, and supercharged sharing OpenText Exceed TurboX is an advanced solution for desktop virtualization and remote access to enterprise
More informationApparo Fast Edit. Installation Guide 3.1.1
Apparo Fast Edit Installation Guide 3.1.1 For Windows Server / Standalone version [1] 1 Prior to Installation 4 1.1 Hardware requirements... 4 1.2 Supported operating systems... 4 1.3 Supported Web Server...
More informationAS emas emudhra Authentication Solution
AS emas emudhra Authentication Solution Create your own trusted enterprise network of users, devices, applications! With malware, ransomware and other cyber threats constantly thrown at Enterprises, a
More informationDeveloping Enterprise Cloud Solutions with Azure
Developing Enterprise Cloud Solutions with Azure Java Focused 5 Day Course AUDIENCE FORMAT Developers and Software Architects Instructor-led with hands-on labs LEVEL 300 COURSE DESCRIPTION This course
More informationTechnology Note. ER/Studio: Upgrading from Repository (v ) to Team Server 17.x
Technology Note ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 17.x Updated 07/09/2018 ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 17.x With the release of ER/Studio
More informationMicrosoft Architecting Microsoft Azure Solutions.
Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API
More informationISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University
Identity Management and Federated ID (Liberty Alliance) ISA 767, Secure Electronic Commerce Xinwen Zhang, xzhang6@gmu.edu George Mason University Identity Identity is the fundamental concept of uniquely
More informationThat Set the Foundation for the Private Cloud
for Choosing Virtualization Solutions That Set the Foundation for the Private Cloud solutions from work together to harmoniously manage physical and virtual environments, enabling the use of multiple hypervisors
More informationOracle XML Publisher Enterprise. An Oracle White Paper May 2006
Oracle XML Publisher Enterprise An Oracle White Paper May 2006 Oracle XML Publisher Enterprise BI Style Reports Financial Reports Checks Government Forms (W2) EXECUTIVE OVERVIEW Oracle XML Publisher Enterprise
More informationEkran System v.6.0 Privileged User Accounts and Sessions (PASM)
Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...
More informationER/Studio Team Server XE7 Quick Start Guide
Product Documentation ER/Studio Team Server XE7 Quick Start Guide Version 4.0.8 Published March 27, 2015 2015 Embarcadero Technologies, Inc. Embarcadero, the Embarcadero Technologies logos, and all other
More informationDEPLOYING MULTI-TIER APPLICATIONS ACROSS MULTIPLE SECURITY DOMAINS
DEPLOYING MULTI-TIER APPLICATIONS ACROSS MULTIPLE SECURITY DOMAINS Igor Balabine, Arne Koschel IONA Technologies, PLC 2350 Mission College Blvd #1200 Santa Clara, CA 95054 USA {igor.balabine, arne.koschel}
More informationUsing the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway
Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest
More informationA guide for assembling your Jira Data Center team
A guide for assembling your Jira Data Center team Contents 01 Getting started 02 Helpful roles for your Jira Data Center team 03 Helpful expertise for your Jira Data Center team 04 Pro tips & best practices
More informationRealms and Identity Policies
The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page
More informationOracle Business Intelligence Discoverer
Oracle Business Intelligence Discoverer Configuration Guide 10g Release 2 (10.1.2.0.0) Part No. B13918-01 September 2004 Oracle Business Intelligence Discoverer Configuration Guide, 10g Release 2 (10.1.2.0.0)
More informationChallenges in Authenticationand Identity Management
Sep 05 ISEC INFOSECURITY TOUR 2017 05.09.2017, Buenos Aires, Argentina Challenges in Authenticationand Identity Management CAMINANTE NO HAY CAMINO, SE HACE CAMINO AL ANDAR 2016 SecurIT Who is MerStar?
More informationA Journey Towards Digital Learning Environment
A Journey Towards Digital Learning Environment Gerrit Bahlman, Ricky Cheong, David Chiu The Hong Kong Polytechnic University 1937 1947 1972 1994 Government Trade School Hong Kong Technical College The
More informationSECURITY DOCUMENT. 550archi
SECURITY DOCUMENT 550archi Documentation for XTM Version 10.3 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of this publication may be reproduced or
More informationBusiness White Paper IDENTITY AND SECURITY. Access Manager. Novell. Comprehensive Access Management for the Enterprise
Business White Paper IDENTITY AND SECURITY Novell Access Manager Comprehensive Access Management for the Enterprise Simple, Secure Access to Network Resources Business Driver 1: Cost Novell Access Manager
More informationDreamFactory Security Guide
DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit
More informationServer Installation Guide
Server Installation Guide Server Installation Guide Legal notice Copyright 2018 LAVASTORM ANALYTICS, INC. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS HEREOF MAY NOT BE REPRODUCED OR DISTRIBUTED IN ANY
More informationTelstra IP Telephony Customer Group Administrator Checklist
Telstra IP Telephony Customer Group Administrator Checklist Version 4.5 Telstra Corporation Limited 2001 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may
More informationSamsung SDS Enterprise Cloud
Samsung SDS Enterprise Cloud Middleware JBoss EAP/WS WildFly Apache Tomcat JEUS WebLogic Enterprise Cloud Middleware JBoss EAP/WS Open source-based, enterprise-class Java web application server JBoss EAP
More informationInstalling VMware vsphere 5.1 Components
Installing VMware vsphere 5.1 Components Module 14 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks
More informationPRISM - FHF The Fred Hollows Foundation
PRISM - FHF The Fred Hollows Foundation MY WORKSPACE USER MANUAL Version 1.2 TABLE OF CONTENTS INTRODUCTION... 4 OVERVIEW... 4 THE FHF-PRISM LOGIN SCREEN... 6 LOGGING INTO THE FHF-PRISM... 6 RECOVERING
More informationNetwrix Auditor for Active Directory
Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
More informationPerceptive Matching Engine
Perceptive Matching Engine Installation and Setup Guide Version: 1.0.x Written by: Product Development, R&D Date: March 2018 2018 Hyland Software, Inc. and its affiliates. Table of Contents Overview...
More informationSentinet for Microsoft Azure SENTINET
Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...
More informationIBM Lotus Domino Product Roadmap
IBM Lotus Domino Product Roadmap Your Name Your Title Today s agenda Domino Strategy What s coming in Domino 8? What s planned beyond Domino 8? Lotus Domino Strategy The integrated messaging & collaboration
More informationNetwork Security Policy
Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business
More informationWebNow. product white paper. Perceptive Software, Inc.
Perceptive Software, Inc. WebNow Introduction What is WebNow? Proven Business Cases Key Design Objectives WebNow Visual Experience Carefully Tailored Functionality Security in WebNow A Solid Architecture
More informationOffice 365 and Azure Active Directory Identities In-depth
Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication
More informationPrerequisites for Using Enterprise Manager with Your Primavera Applications
Oracle Enterprise Manager For Oracle Construction and Engineering Configuration Guide for On Premises Version 18 August 2018 Contents Introduction... 5 Prerequisites for Using Enterprise Manager with
More informationStorageIM 1.0 Installation and Administration
StorageIM 1.0 Installation and Administration Table of Contents Manual Installation... 2 MANUAL INSTALLATION STEPS... 6 MySQL Installation and Configuration... 6 Apache Tomcat 6.x Installation and Configuration...
More informationCustomizing a Packaged Application for a J2EE Environment: A Case Study. Leslie Tierstein TopTier Consulting, Inc.
Customizing a Packaged Application for a J2EE Environment: A Case Study Leslie Tierstein TopTier Consulting, Inc. 1 Overview (1) Learning experiences in a J2EE Environment The environment Deployment of
More informationA. ORA addresses all four (Business, Application, Information, and Technical) equally.
Volume: 176 Questions Question No : 1 Enterprise Architecture consists of Business Architecture, Application Architecture, Information, Architecture and Technical Architecture (BAIT). Which statement best
More informationArcGIS Server and Portal for ArcGIS An Introduction to Security
ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context
More informationWeb Serving Architectures
Web Serving Architectures Paul Dantzig IBM Global Services 2000 without the express written consent of the IBM Corporation is prohibited Contents Defining the Problem e-business Solutions e-business Architectures
More informationManage SAML Single Sign-On
SAML Single Sign-On Overview, page 1 Opt-In Control for Certificate-Based SSO Authentication for Cisco Jabber on ios, page 1 SAML Single Sign-On Prerequisites, page 2, page 3 SAML Single Sign-On Overview
More informationArcGIS for Server: Security
DevSummit DC February 11, 2015 Washington, DC Michael Sarhan Esri msarhan@esri.com Agenda Review Basic Security Workflow - ArcGIS Server Roles and Identity Stores - Authentication - Authorization: Securing
More informationConfiguring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.
Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure
More informationDDS Identity Federation Service
DDS Identity Federation Service Sharing Identity across Organisational Boundaries Executive Overview for UK Government Company Profile Daemon Directory Services Ltd. (DDS) is an application service provider
More informationMicrosoft SharePoint Server 2013 Plan, Configure & Manage
Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that
More information