Softlink International Liberty Security

Size: px
Start display at page:

Download "Softlink International Liberty Security"

Transcription

1 Softlink International Liberty Security

2 The Product: Liberty Liberty is Softlink s flagship product for Special, Academic, Government and Public libraries used by hundreds of academics, information specialists, professionals and library staff daily to manage, access and share information resources to facilitate organisational goals. Built specifically for web deployment and to deliver flexibility, reliability and scalability for users, Liberty has been the focus of intense development and design at Softlink to facilitate a web-based library solution that meets the needs of today and tomorrow s library users, researchers and professionals. Selected by a prestigious range of libraries, consortia and multinational organisations in Australia and overseas, Liberty integrates leading technology, 25 years information management technology experience and established library standards to continue to benefit all members of the library and business communities. Network Configuration Liberty is architected as a three-tier application which inherently enables both horizontal and vertical scalability. Each deployed element of Liberty is both vertically and horizontally scalable as follows: Liberty is built in a multi-tier architecture to facilitate scaling to an enterprise-level deployment. This consists of: Web & Application Server Database Server Reporting Server By separating the different tiers of the application, greater security and performance is provided. In addition to security and performance benefits, users also benefit from increases in scalability and more flexible deployment options. The configuration is comprised of: 1. Web Server. The Web Server maintains and controls end-user connections. The Web Server runs the Apache Web Server application and can also act as a load-balancer for the deployment. 2. Application Server. The Application Server contains the application. The system runs within the JBoss Application server within the JEE framework. All business logic is maintained within the application server. 3. Reporting Server. The Reporting Server runs MS SQL Reporting Services and is the reporting framework used within the system. A separate server is recommended to maximise performance and security of the SQL database. 4. Database Server. The database server stores all user data and runs MS SQL Server. P a g e 2

3 Deploying the software in a 3 tier architecture provides benefits in terms of security. In most usage scenarios however, a two tier architecture whereby the web and application servers are combined simplifies the deployment without adding significant negatives. This 2 tier deployment model is recommended for the majority of sites both enterprise and otherwise. Server Communications As an Enterprise deployment disperses the Liberty application across several different servers, it is important to understand how each of the servers communicates to each other. All inter-server communication is performed over the http protocol. The default configuration is to use port 8080 for http communication, however this is completely configurable. Secure communication is also supported using the https protocol with the default port of 443. The Application Server communicates with the SQL server using socket based communication over TCP/IP. The default port for this is 1433 but is fully customisable. This allows the firewalls between the different network zones to be fully secured allowing communication on set protocols and ports from defined sources to set destinations. The application server will also communicate with the report server via port 80. Security Requirements There are two types of security requirements when it comes to Liberty Enterprise: 1. User security 2. Application security User Security User security settings are easily maintained within the Liberty application by an administrator and work at a number of levels: Each user is added to a User Role. The User Role defines what User Privileges the user role has, and what Security Groups the user belongs to. These privileges define what actions the user can perform (View, Add, Edit etc) and what modules the user can access (OPAC, Cataloguing, Acquisitions etc) according to your organisational structure and user roles. P a g e 3

4 Resources within Liberty can also be assigned a Security Group. This means that only users that belong to that Security Group can view and access the record in the OPAC. In addition to this, Security Groups can also be used to exclude users. Individual User Roles can be assigned to Security Groups. User Roles, User Privileges and Security Groups are fully customisable within Liberty and definable by the library staff via the application interface. Users can be authenticated into Liberty through a number of different mechanisms: 1. Direct authentication with Liberty 2. LDAP Authentication 3. Single-Sign-On using a SSO mechanism supported by Liberty Direct Authentication with Liberty means the user enters their username and password and the details are authenticated by Liberty using the information stored within Liberty. LDAP Authentication is similar to Direct Authentication except the username and password information is queried against an Access Directory (Active Directory) on the network with the authentication status returned to Liberty. This mechanism uses the LDAP protocol. All user roles and privileges are maintained within Liberty. Single-Sign-On allows the user to sign on once to the network or intranet and be automatically authenticated into other applications on the network. Single-Sign-on can use either Integrated Authentication (provided by Microsoft) or a third-party SSO web portal. To use Integrated Authentication the servers must all be on the same network and domain as the end user and using Active Directory and LDAP. Softlink currently supports the SAFE and SAML protocols. User Role and User Privilege configurations are maintained within Liberty. Within Liberty, the only difference between a Liberty Staff Member and an End User is the User Role granted to the user and the associated User Privileges allocated to the different roles. Application Security Minimal network security requirements exist for Liberty to work correctly; these requirements largely relate to reporting. For example, the user account running the Application Server (Service Account of JBoss) must have the right to run as a service, access to any network paths used by the application and read and write access to the Reporting Services Database. Access to the main SQL Database on the Database Server is configured within the application. The application prefers to use an SQL user to access the library data, while Reporting Services requires a network user account. Framework Liberty is built on the Java Enterprise Edition framework designed for building large-scale, multi-tiered, scalable, reliable, and secure network applications. P a g e 4

5 Performance testing and tuning Softlink conducts performance tests at the IBM Test Centre on Liberty to validate current benchmarks and identify any areas requiring improvement. In order to leverage enhanced frameworks for improved performance, Liberty has been upgraded to provide support for Wildfly which has a lighter footprint than the currently supported version of the JBoss application server. The version of Java running on the application server has also been upgraded, to Java 7. Adoption of international standards. Softlink seeks to adopt those standards that are most needed by clients as a result of legislative requirements, widespread acceptance, or those that have the potential to offer end user value. Liberty is compliant with a wide range of industry standards that relate to library data, including the following: MARC21 EDI Z39.50 SIP2 RDA AACR2 P a g e 5

Factsheet of Public Services Infrastructure (PSi) Updated on: 1st Sep 03

Factsheet of Public Services Infrastructure (PSi) Updated on: 1st Sep 03 Factsheet of Public Services Infrastructure (PSi) Updated on: 1st Sep 03 1 Objective of Paper 1.1 This document provides an overview of the Public Services Infrastructure (PSi). 2 Overview of PSi 2.1 PSi

More information

OpenIAM Identity and Access Manager Technical Architecture Overview

OpenIAM Identity and Access Manager Technical Architecture Overview OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...

More information

PowerApps Security Features

PowerApps Security Features TABLE OF CONTENTS 1 Introduction 2 Security features PowerApps offers the ability to deploy a secure HR system globally and remain worry-free about losing control of your critical HR data. INTRODUCTION

More information

ArcGIS for Server: Administration and Security. Amr Wahba

ArcGIS for Server: Administration and Security. Amr Wahba ArcGIS for Server: Administration and Security Amr Wahba awahba@esri.com Agenda ArcGIS Server architecture Distributing and scaling components Implementing security Monitoring server logs Automating server

More information

Novell Access Manager 3.1

Novell Access Manager 3.1 Technical White Paper IDENTITY AND SECURITY www.novell.com Novell Access Manager 3.1 Access Control, Policy Management and Compliance Assurance Novell Access Manager 3.1 Table of Contents: 2..... Complete

More information

Microsoft Implementing Desktop Application Environments

Microsoft Implementing Desktop Application Environments 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20416 - Implementing Desktop Application Environments Length 5 days Price $4290.00 (inc GST) Version B Overview This five-day course provides students with

More information

Course: JBoss Training: JBoss AS 7 and JBoss EAP 6 Administration and Clustering Training

Course: JBoss Training: JBoss AS 7 and JBoss EAP 6 Administration and Clustering Training Course: JBoss Training: JBoss AS 7 and JBoss EAP 6 Administration and Clustering Training Course Length: Duration; 4 days Course Code: WA 2060 This training course covers both the unsupported open source

More information

University of Ulster Standard Cover Sheet

University of Ulster Standard Cover Sheet University of Ulster Standard Cover Sheet Document Title AUTHENTICATION STANDARD 2.0 Custodian Approving Committee ISD Heads ISD Committee Policy approved date 2011 10 13 Policy effective from date 2011

More information

Microsoft Core Solutions of Microsoft SharePoint Server 2013

Microsoft Core Solutions of Microsoft SharePoint Server 2013 1800 ULEARN (853 276) www.ddls.com.au Microsoft 20331 - Core Solutions of Microsoft SharePoint Server 2013 Length 5 days Price $4290.00 (inc GST) Version B Overview This course will provide you with the

More information

Oracle Hospitality Simphony Cloud Services Post-Installation or Upgrade Guide Release 2.10 E July 2018

Oracle Hospitality Simphony Cloud Services Post-Installation or Upgrade Guide Release 2.10 E July 2018 Oracle Hospitality Simphony Cloud Services Post-Installation or Upgrade Guide Release 2.10 E89810-04 July 2018 Copyright 2010, 2018, Oracle and/or its affiliates. All rights reserved. This software and

More information

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed. Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple

More information

Cisco Prime Service Catalog Compatibility Matrix

Cisco Prime Service Catalog Compatibility Matrix Cisco Prime Service Catalog Compatibility Matrix Revised: September 2015 This document describes the version of the third-party software products that have been certified with Cisco Prime Service Catalog.

More information

JBOSS AS 7 AND JBOSS EAP 6 ADMINISTRATION AND CLUSTERING (4 Days)

JBOSS AS 7 AND JBOSS EAP 6 ADMINISTRATION AND CLUSTERING (4 Days) www.peaklearningllc.com JBOSS AS 7 AND JBOSS EAP 6 ADMINISTRATION AND CLUSTERING (4 Days) This training course covers both the unsupported open source JBoss Application Server and the supported platform

More information

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard

Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard Why Microsoft Azure is the right choice for your Public Cloud, a Consultants view by Simon Conyard In my view, Microsoft Azure is fast becoming the trusted platform of choice for SMB and Enterprise customers.

More information

Oracle Hospitality Cruise AffairWhere Security Guide Release E April 2017

Oracle Hospitality Cruise AffairWhere Security Guide Release E April 2017 Oracle Hospitality Cruise AffairWhere Security Guide Release 2.2.5 E85968-01 April 2017 Copyright 2006, 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

Oracle WebLogic Server 12c: Administration I

Oracle WebLogic Server 12c: Administration I Oracle WebLogic Server 12c: Administration I Duration 5 Days What you will learn This Oracle WebLogic Server 12c: Administration I training teaches you how to install and configure Oracle WebLogic Server

More information

HOW TO SETUP CFS POLICIES WITH LDAP AND SSO TO RESTRICT INTERNET ACCESS ON CFS 3.0

HOW TO SETUP CFS POLICIES WITH LDAP AND SSO TO RESTRICT INTERNET ACCESS ON CFS 3.0 HOW TO SETUP CFS POLICIES WITH LDAP AND SSO TO RESTRICT INTERNET ACCESS ON CFS 3.0 DESCRIPTION This article explains about how to integrate Premium Content Filtering Service with LDAP (With Single Sign

More information

Oracle Cloud What's New for Oracle WebCenter Portal Cloud Service

Oracle Cloud What's New for Oracle WebCenter Portal Cloud Service Oracle Cloud What's New for Oracle WebCenter Portal Cloud Service E80293-09 April 2018 Oracle Cloud What's New for Oracle WebCenter Portal Cloud Service, E80293-09 Copyright 2017, 2018, Oracle and/or its

More information

Oracle WebCenter Interaction

Oracle WebCenter Interaction Oracle WebCenter Interaction Deployment Overview Guide 10g Release 3 (10.3) November 2008 Oracle WebCenter Interaction Deployment Overview Guide, 10g Release 3 (10.3) Copyright 2008, Oracle and/or its

More information

Architecture & Deployment

Architecture & Deployment Architecture & Deployment IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes 2014 IBM Corporation Agenda IBM Connections lications Prerequisite Software Deployment

More information

John Heimann Director, Security Product Management Oracle Corporation

John Heimann Director, Security Product Management Oracle Corporation John Heimann Director, Security Product Management Oracle Corporation Oracle9i Application Server v2 Security What s an Application Server? Development and deployment environment Web(HTML,XML,SOAP) J2EE

More information

ForgeRock Access Management Core Concepts AM-400 Course Description. Revision B

ForgeRock Access Management Core Concepts AM-400 Course Description. Revision B ForgeRock Access Management Core Concepts AM-400 Course Description Revision B ForgeRock Access Management Core Concepts AM-400 Description This structured course comprises a mix of instructor-led lessons

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

Data Security at Smart Assessor

Data Security at Smart Assessor Data Security at Smart Assessor Page 1 Contents Data Security...3 Hardware...3 Software...4 Data Backups...4 Personnel...5 Web Application Security...5 Encryption of web application traffic...5 User authentication...5

More information

MySQL for Database Administrators Ed 4

MySQL for Database Administrators Ed 4 Oracle University Contact Us: (09) 5494 1551 MySQL for Database Administrators Ed 4 Duration: 5 Days What you will learn The MySQL for Database Administrators course teaches DBAs and other database professionals

More information

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation Enhancing cloud applications by using external authentication services After you complete this section, you should understand: Terminology such as authentication, identity, and ID token The benefits of

More information

Security Overview. Technical Whitepaper. Secure by design. End to end security. N-tier Application Architecture. Data encryption. User authentication

Security Overview. Technical Whitepaper. Secure by design. End to end security. N-tier Application Architecture. Data encryption. User authentication Technical Whitepaper Security Overview As a team, we have a long history of developing and delivering HR software solutions to customers worldwide, including many of the world s most-demanding organisations.

More information

Trusted Login Connector (Hosted SSO)

Trusted Login Connector (Hosted SSO) Trusted Login Connector (Hosted SSO) Table of Contents Summary... 3 Frequently Asked Questions... 3 Architecture... 5 Installation/configuration... 5 2 Summary New functionality allows SelectHR users to

More information

Excel4apps Wands 5 Architecture Excel4apps Inc.

Excel4apps Wands 5 Architecture Excel4apps Inc. Excel4apps Wands 5 Architecture 2014 Excel4apps Inc. Table of Contents 1 Introduction... 3 2 Overview... 3 3 Client... 3 4 Server... 3 4.1 Java Servlet... 4 4.2 OAF Page... 4 4.3 Menu and Function... 4

More information

IBM Tivoli Access Manager for e-business V6.1.1 Implementation

IBM Tivoli Access Manager for e-business V6.1.1 Implementation 000-039 IBM Tivoli Access Manager for e-business V6.1.1 Implementation Version 14.23 Topic 1, Volume A QUESTION NO: 1 What is included in the high level configuration document when WebSEAL clustering must

More information

EnterSpace Data Sheet

EnterSpace Data Sheet EnterSpace 7.0.4.3 Data Sheet ENTERSPACE BUNDLE COMPONENTS Policy Engine The policy engine is the heart of EnterSpace. It evaluates digital access control policies and makes dynamic, real-time decisions

More information

Qlik Sense Enterprise architecture and scalability

Qlik Sense Enterprise architecture and scalability White Paper Qlik Sense Enterprise architecture and scalability June, 2017 qlik.com Platform Qlik Sense is an analytics platform powered by an associative, in-memory analytics engine. Based on users selections,

More information

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing

More information

App Gateway Deployment Guide

App Gateway Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E App Gateway Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical

More information

What's new in IBM Rational Build Forge Version 7.1

What's new in IBM Rational Build Forge Version 7.1 What's new in IBM Rational Build Forge Version 7.1 Features and support that help you automate or streamline software development tasks Skill Level: Intermediate Rational Staff, IBM Corporation 13 Jan

More information

Mobility best practice. Tiered Access at Google

Mobility best practice. Tiered Access at Google Mobility best practice Tiered Access at Google How can IT leaders enable the productivity of employees while also protecting and securing corporate data? IT environments today pose many challenges - more

More information

BeBanjo Infrastructure and Security Overview

BeBanjo Infrastructure and Security Overview BeBanjo Infrastructure and Security Overview Can you trust Software-as-a-Service (SaaS) to run your business? Is your data safe in the cloud? At BeBanjo, we firmly believe that SaaS delivers great benefits

More information

Scaling for the Enterprise

Scaling for the Enterprise White Paper Solutions Business Manager Scaling for the Enterprise by Pete Dohner and Jeremy Vorndam June 2, 2017 Table of Contents Who Should Read This Paper?... 1 Introduction... 1 N-Tier Architecture...

More information

Oracle Communications Services Gatekeeper

Oracle Communications Services Gatekeeper Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or

More information

Designing Windows Server 2008 Network and Applications Infrastructure

Designing Windows Server 2008 Network and Applications Infrastructure Designing Windows Server 2008 Network and Applications Infrastructure Course No. 6435B - 5 Days Instructor-led, Hands-on Introduction This five-day course will provide students with an understanding of

More information

The Shibboleth-enabled WebDAV server used in ESUP-Portail and ORI-OAI projects

The Shibboleth-enabled WebDAV server used in ESUP-Portail and ORI-OAI projects The Shibboleth-enabled WebDAV server used in ESUP-Portail and ORI-OAI projects Raymond Bourges TERENA EuroCAMP 14-15 November 2007 Dubrovnik, Croatia Shibboleth-enabled WebDAV server 1) Context Demo (if

More information

SSO Plugin. Release notes. J System Solutions. Version 4.0

SSO Plugin. Release notes. J System Solutions.  Version 4.0 SSO Plugin Release notes J System Solutions Version 4.0 JSS SSO Plugin v4.0 Release notes What's new... 3 Java support... 3 Improved user interface... 3 Hostname based integrations... 3 Client IP and hostname

More information

Oracle Hospitality Cruise Fine Dining System Security Guide Release E

Oracle Hospitality Cruise Fine Dining System Security Guide Release E Oracle Hospitality Cruise Fine Dining System Security Guide Release 9.0.2.29 E99054-01 August 2018 Copyright 2015, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

IZO MANAGED CLOUD FOR AZURE

IZO MANAGED CLOUD FOR AZURE USE CASE - HYBRID CLOUD IZO MANAGED CLOUD FOR AZURE 1. LET S UNDERSTAND THE MARKET DYNAMICS In this era of digitisation, the cloud debate is over-enterprises have already moved a sizeable portion of their

More information

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT

ROYAL INSTITUTE OF INFORMATION & MANAGEMENT ROYAL INSTITUTE OF INFORMATION & MANAGEMENT MCSE SYLLABUS Course Contents : Exam 70-290 : Managing and Maintaining a Microsoft Windows Server 2003: Managing Users, Computers and Groups. Configure access

More information

Security Correlation Server System Deployment and Planning Guide

Security Correlation Server System Deployment and Planning Guide CorreLog Security Correlation Server System Deployment and Planning Guide The CorreLog Server provides a method of collecting security information contained in log messages generated by network devices

More information

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE

BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE BEYOND AUTHENTICATION IDENTITY AND ACCESS MANAGEMENT FOR THE MODERN ENTERPRISE OUR ORGANISATION AND SPECIALIST SKILLS Focused on delivery, integration and managed services around Identity and Access Management.

More information

Microsoft Configuring and Troubleshooting Windows Server 2008 Application Infrastructure

Microsoft Configuring and Troubleshooting Windows Server 2008 Application Infrastructure 1800 ULEARN (853 276) www.ddls.com.au Microsoft 6439 - Configuring and Troubleshooting Windows Server 2008 Application Infrastructure Length 5 days Price $4290.00 (inc GST) Overview This course introduces

More information

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018

VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 Table of Contents Introduction to Horizon Cloud with Manager.... 3 Benefits of Integration.... 3 Single Sign-On....3

More information

2017/11/10 10:40 1/2 Setup. Be aware of the updating procedure of VISUAL PLANNING, see UPDATE VISUAL PLANNING

2017/11/10 10:40 1/2 Setup. Be aware of the updating procedure of VISUAL PLANNING, see UPDATE VISUAL PLANNING 2017/11/10 10:40 1/2 Setup Setup INTRODUCTION The setup procedure for VISUAL PLANNING 5.3 depends on the version: VISUAL PLANNING ONE VISUAL PLANNING ESSENTIAL VISUAL PLANNING ENTERPRISE Be aware of the

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Proficy* Workflow. Powered by Proficy SOA GETTING STARTED

Proficy* Workflow. Powered by Proficy SOA GETTING STARTED Proficy* Workflow Powered by Proficy SOA GETTING STARTED Version 1.5 SP4 February 2012 All rights reserved. No part of this publication may be reproduced in any form or by any electronic or mechanical

More information

Oracle Hospitality Simphony Post-Installation or Upgrade Guide. Release 18.2

Oracle Hospitality Simphony Post-Installation or Upgrade Guide. Release 18.2 Oracle Hospitality Simphony Post-Installation or Upgrade Guide Release 18.2 F12086-01 December 2018 Oracle Hospitality Simphony Post-Installation or Upgrade Guide, Release 18.2 F12086-01 Copyright Oracle

More information

Liferay Security Features Overview. How Liferay Approaches Security

Liferay Security Features Overview. How Liferay Approaches Security Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................

More information

Syncplicity Panorama with Isilon Storage. Technote

Syncplicity Panorama with Isilon Storage. Technote Syncplicity Panorama with Isilon Storage Technote Copyright 2014 EMC Corporation. All rights reserved. Published in USA. Published November, 2014 EMC believes the information in this publication is accurate

More information

Microsoft Installation and Deployment in Microsoft Dynamics CRM 2013

Microsoft Installation and Deployment in Microsoft Dynamics CRM 2013 1800 ULEARN (853 276) www.ddls.com.au Microsoft 80539 - Installation and Deployment in Microsoft Dynamics CRM 2013 Length 2 days Price $1870.00 (inc GST) Overview This two-day training course provides

More information

Delivers cost savings, high definition display, and supercharged sharing

Delivers cost savings, high definition display, and supercharged sharing TM OpenText TM Exceed TurboX Delivers cost savings, high definition display, and supercharged sharing OpenText Exceed TurboX is an advanced solution for desktop virtualization and remote access to enterprise

More information

Apparo Fast Edit. Installation Guide 3.1.1

Apparo Fast Edit. Installation Guide 3.1.1 Apparo Fast Edit Installation Guide 3.1.1 For Windows Server / Standalone version [1] 1 Prior to Installation 4 1.1 Hardware requirements... 4 1.2 Supported operating systems... 4 1.3 Supported Web Server...

More information

AS emas emudhra Authentication Solution

AS emas emudhra Authentication Solution AS emas emudhra Authentication Solution Create your own trusted enterprise network of users, devices, applications! With malware, ransomware and other cyber threats constantly thrown at Enterprises, a

More information

Developing Enterprise Cloud Solutions with Azure

Developing Enterprise Cloud Solutions with Azure Developing Enterprise Cloud Solutions with Azure Java Focused 5 Day Course AUDIENCE FORMAT Developers and Software Architects Instructor-led with hands-on labs LEVEL 300 COURSE DESCRIPTION This course

More information

Technology Note. ER/Studio: Upgrading from Repository (v ) to Team Server 17.x

Technology Note. ER/Studio: Upgrading from Repository (v ) to Team Server 17.x Technology Note ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 17.x Updated 07/09/2018 ER/Studio: Upgrading from Repository (v6.5-7.0) to Team Server 17.x With the release of ER/Studio

More information

Microsoft Architecting Microsoft Azure Solutions.

Microsoft Architecting Microsoft Azure Solutions. Microsoft 70-535 Architecting Microsoft Azure Solutions https://killexams.com/pass4sure/exam-detail/70-535 QUESTION: 106 Your organization has developed and deployed several Azure App Service Web and API

More information

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University Identity Management and Federated ID (Liberty Alliance) ISA 767, Secure Electronic Commerce Xinwen Zhang, xzhang6@gmu.edu George Mason University Identity Identity is the fundamental concept of uniquely

More information

That Set the Foundation for the Private Cloud

That Set the Foundation for the Private Cloud for Choosing Virtualization Solutions That Set the Foundation for the Private Cloud solutions from work together to harmoniously manage physical and virtual environments, enabling the use of multiple hypervisors

More information

Oracle XML Publisher Enterprise. An Oracle White Paper May 2006

Oracle XML Publisher Enterprise. An Oracle White Paper May 2006 Oracle XML Publisher Enterprise An Oracle White Paper May 2006 Oracle XML Publisher Enterprise BI Style Reports Financial Reports Checks Government Forms (W2) EXECUTIVE OVERVIEW Oracle XML Publisher Enterprise

More information

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM)

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...

More information

ER/Studio Team Server XE7 Quick Start Guide

ER/Studio Team Server XE7 Quick Start Guide Product Documentation ER/Studio Team Server XE7 Quick Start Guide Version 4.0.8 Published March 27, 2015 2015 Embarcadero Technologies, Inc. Embarcadero, the Embarcadero Technologies logos, and all other

More information

DEPLOYING MULTI-TIER APPLICATIONS ACROSS MULTIPLE SECURITY DOMAINS

DEPLOYING MULTI-TIER APPLICATIONS ACROSS MULTIPLE SECURITY DOMAINS DEPLOYING MULTI-TIER APPLICATIONS ACROSS MULTIPLE SECURITY DOMAINS Igor Balabine, Arne Koschel IONA Technologies, PLC 2350 Mission College Blvd #1200 Santa Clara, CA 95054 USA {igor.balabine, arne.koschel}

More information

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway

Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest

More information

A guide for assembling your Jira Data Center team

A guide for assembling your Jira Data Center team A guide for assembling your Jira Data Center team Contents 01 Getting started 02 Helpful roles for your Jira Data Center team 03 Helpful expertise for your Jira Data Center team 04 Pro tips & best practices

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

Oracle Business Intelligence Discoverer

Oracle Business Intelligence Discoverer Oracle Business Intelligence Discoverer Configuration Guide 10g Release 2 (10.1.2.0.0) Part No. B13918-01 September 2004 Oracle Business Intelligence Discoverer Configuration Guide, 10g Release 2 (10.1.2.0.0)

More information

Challenges in Authenticationand Identity Management

Challenges in Authenticationand Identity Management Sep 05 ISEC INFOSECURITY TOUR 2017 05.09.2017, Buenos Aires, Argentina Challenges in Authenticationand Identity Management CAMINANTE NO HAY CAMINO, SE HACE CAMINO AL ANDAR 2016 SecurIT Who is MerStar?

More information

A Journey Towards Digital Learning Environment

A Journey Towards Digital Learning Environment A Journey Towards Digital Learning Environment Gerrit Bahlman, Ricky Cheong, David Chiu The Hong Kong Polytechnic University 1937 1947 1972 1994 Government Trade School Hong Kong Technical College The

More information

SECURITY DOCUMENT. 550archi

SECURITY DOCUMENT. 550archi SECURITY DOCUMENT 550archi Documentation for XTM Version 10.3 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of this publication may be reproduced or

More information

Business White Paper IDENTITY AND SECURITY. Access Manager. Novell. Comprehensive Access Management for the Enterprise

Business White Paper IDENTITY AND SECURITY.  Access Manager. Novell. Comprehensive Access Management for the Enterprise Business White Paper IDENTITY AND SECURITY Novell Access Manager Comprehensive Access Management for the Enterprise Simple, Secure Access to Network Resources Business Driver 1: Cost Novell Access Manager

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

Server Installation Guide

Server Installation Guide Server Installation Guide Server Installation Guide Legal notice Copyright 2018 LAVASTORM ANALYTICS, INC. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS HEREOF MAY NOT BE REPRODUCED OR DISTRIBUTED IN ANY

More information

Telstra IP Telephony Customer Group Administrator Checklist

Telstra IP Telephony Customer Group Administrator Checklist Telstra IP Telephony Customer Group Administrator Checklist Version 4.5 Telstra Corporation Limited 2001 This work is copyright. Apart from any use as permitted under the Copyright Act 1968, no part may

More information

Samsung SDS Enterprise Cloud

Samsung SDS Enterprise Cloud Samsung SDS Enterprise Cloud Middleware JBoss EAP/WS WildFly Apache Tomcat JEUS WebLogic Enterprise Cloud Middleware JBoss EAP/WS Open source-based, enterprise-class Java web application server JBoss EAP

More information

Installing VMware vsphere 5.1 Components

Installing VMware vsphere 5.1 Components Installing VMware vsphere 5.1 Components Module 14 You Are Here Course Introduction Introduction to Virtualization Creating Virtual Machines VMware vcenter Server Configuring and Managing Virtual Networks

More information

PRISM - FHF The Fred Hollows Foundation

PRISM - FHF The Fred Hollows Foundation PRISM - FHF The Fred Hollows Foundation MY WORKSPACE USER MANUAL Version 1.2 TABLE OF CONTENTS INTRODUCTION... 4 OVERVIEW... 4 THE FHF-PRISM LOGIN SCREEN... 6 LOGGING INTO THE FHF-PRISM... 6 RECOVERING

More information

Netwrix Auditor for Active Directory

Netwrix Auditor for Active Directory Netwrix Auditor for Active Directory Quick-Start Guide Version: 8.0 4/22/2016 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Perceptive Matching Engine

Perceptive Matching Engine Perceptive Matching Engine Installation and Setup Guide Version: 1.0.x Written by: Product Development, R&D Date: March 2018 2018 Hyland Software, Inc. and its affiliates. Table of Contents Overview...

More information

Sentinet for Microsoft Azure SENTINET

Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure SENTINET Sentinet for Microsoft Azure 1 Contents Introduction... 2 Customer Benefits... 2 Deployment Topologies... 3 Cloud Deployment Model... 3 Hybrid Deployment Model...

More information

IBM Lotus Domino Product Roadmap

IBM Lotus Domino Product Roadmap IBM Lotus Domino Product Roadmap Your Name Your Title Today s agenda Domino Strategy What s coming in Domino 8? What s planned beyond Domino 8? Lotus Domino Strategy The integrated messaging & collaboration

More information

Network Security Policy

Network Security Policy Network Security Policy Date: January 2016 Policy Title Network Security Policy Policy Number: POL 030 Version 3.0 Policy Sponsor Policy Owner Committee Director of Business Support Head of ICU / ICT Business

More information

WebNow. product white paper. Perceptive Software, Inc.

WebNow. product white paper. Perceptive Software, Inc. Perceptive Software, Inc. WebNow Introduction What is WebNow? Proven Business Cases Key Design Objectives WebNow Visual Experience Carefully Tailored Functionality Security in WebNow A Solid Architecture

More information

Office 365 and Azure Active Directory Identities In-depth

Office 365 and Azure Active Directory Identities In-depth Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication

More information

Prerequisites for Using Enterprise Manager with Your Primavera Applications

Prerequisites for Using Enterprise Manager with Your Primavera Applications Oracle Enterprise Manager For Oracle Construction and Engineering Configuration Guide for On Premises Version 18 August 2018 Contents Introduction... 5 Prerequisites for Using Enterprise Manager with

More information

StorageIM 1.0 Installation and Administration

StorageIM 1.0 Installation and Administration StorageIM 1.0 Installation and Administration Table of Contents Manual Installation... 2 MANUAL INSTALLATION STEPS... 6 MySQL Installation and Configuration... 6 Apache Tomcat 6.x Installation and Configuration...

More information

Customizing a Packaged Application for a J2EE Environment: A Case Study. Leslie Tierstein TopTier Consulting, Inc.

Customizing a Packaged Application for a J2EE Environment: A Case Study. Leslie Tierstein TopTier Consulting, Inc. Customizing a Packaged Application for a J2EE Environment: A Case Study Leslie Tierstein TopTier Consulting, Inc. 1 Overview (1) Learning experiences in a J2EE Environment The environment Deployment of

More information

A. ORA addresses all four (Business, Application, Information, and Technical) equally.

A. ORA addresses all four (Business, Application, Information, and Technical) equally. Volume: 176 Questions Question No : 1 Enterprise Architecture consists of Business Architecture, Application Architecture, Information, Architecture and Technical Architecture (BAIT). Which statement best

More information

ArcGIS Server and Portal for ArcGIS An Introduction to Security

ArcGIS Server and Portal for ArcGIS An Introduction to Security ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context

More information

Web Serving Architectures

Web Serving Architectures Web Serving Architectures Paul Dantzig IBM Global Services 2000 without the express written consent of the IBM Corporation is prohibited Contents Defining the Problem e-business Solutions e-business Architectures

More information

Manage SAML Single Sign-On

Manage SAML Single Sign-On SAML Single Sign-On Overview, page 1 Opt-In Control for Certificate-Based SSO Authentication for Cisco Jabber on ios, page 1 SAML Single Sign-On Prerequisites, page 2, page 3 SAML Single Sign-On Overview

More information

ArcGIS for Server: Security

ArcGIS for Server: Security DevSummit DC February 11, 2015 Washington, DC Michael Sarhan Esri msarhan@esri.com Agenda Review Basic Security Workflow - ArcGIS Server Roles and Identity Stores - Authentication - Authorization: Securing

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

DDS Identity Federation Service

DDS Identity Federation Service DDS Identity Federation Service Sharing Identity across Organisational Boundaries Executive Overview for UK Government Company Profile Daemon Directory Services Ltd. (DDS) is an application service provider

More information

Microsoft SharePoint Server 2013 Plan, Configure & Manage

Microsoft SharePoint Server 2013 Plan, Configure & Manage Microsoft SharePoint Server 2013 Plan, Configure & Manage Course 20331-20332B 5 Days Instructor-led, Hands on Course Information This five day instructor-led course omits the overlap and redundancy that

More information