Bootstrap your APEX authentication & authorisation. a presentation by

Size: px
Start display at page:

Download "Bootstrap your APEX authentication & authorisation. a presentation by"

Transcription

1 Bootstrap your APEX authentication & authorisation a presentation by

2 Who am I? Richard Martens independant Consultant since 2012 smart4apex founding member (2010) oracle since 2002 (Oracle 8i) PL/SQL, Apex, HTML(5), CSS(3), Javascript, XML, XSLT special interest in UI oracle ace since 2015 RIMA on Oracle Forums trainer at

3 Bootstrap your APEX authentication & authorisation a presentation by

4

5

6 This is what we re talking about

7

8 Agenda Introducing: APEX SSO components Not "single" but better "second" sign on. Once signed in, it acts like "single" Conditions, Assumptions and Prerequisites The Authentication Process The Authorization Process

9 Conditions, Assumptions & Prerequisites We need a central login application Central user and roles administration Optionally use 3rd party sign-on (Google Authentication etc.) We login using several workspaces and servers Once logged in we should be logged in in all applications Once logged out we must log out from all applications and workspaces Easily extendable to more workspaces, servers and applications

10 The Authentication Process user is not yet logged in 1. User requests a page from the application 2. Application detects that the user is not logged in 3. Application sends user to login application 4. Login application authenticates the user 5. Login application sends user to originating applications callback procedure 6. Callback procedure makes a REST request to the login server to get the users roles 7. When roles are received, the user is authenticated

11 The Authentication Process user is al ready logged in (another suite application) 1. User requests a page from the application 2. Application detects that the user is logged in 3. Application makes REST request to the login server to get the users roles 4. When roles are received, the user is authenticated 5. When no roles received, the user is not authenticated Landing-page: You are not authorized Login-application

12 Remember Google Authentication scheme?

13 Remember Google Authentication scheme? 1. apex redirects end-user to google login-page 2. after successful login into google, google redirects the end-user back to a redirect URL on your server (this is a pl/sql stored procedure) 3. when the pl/sql procedure runs it: a. requests google for an exchange token (using RESTFUL web services) b. reads a token from the google response c. requests further info ( -address, name etc.) d. creates a session for the end-user e. stores the token in an application-item and in an apex-collection f. redirects the user to the home-page 4. apex is now equipped with a token to do further requests to the google API s

14 Better well stolen than badly invented Fresh Login your app suite login user requests page user is redirected to login app user authenticates to login app apex login app user is authenticated user is redirected to Suite app call-back procedure call-back procedure requests for authorisation roles authorisation roles are sent by web service suite authe engine suite autho web service Using token for security Your app

15 Better well stolen than badly invented Second login your app user requests page Application detects cookie User is technically authenticated Applications Sentry function detects no roles suite login apex login app suite authe engine user is authenticated Sentry function requests roles authorisation roles are sent by web service suite autho web service Using token for security Your app

16 So what do we need? Client App Set Cookie name Mainly for same workspace authentication

17 So what do we need? Client App Set the session not valid URL Allows APEX to use pl/sql to redirect to login application #OWNER#.s4s_authentication_pck.redirect_to_login?p_goto_workspace=&WORKSPACE_ID. &p_goto_app=&app_alias. &p_goto_session=&app_session.

18 So what do we need? Client App Set Sentry, Invalid Session and Post logout procedures

19 So what do we need? Inlog App

20 So what do we need? Recap Inlog App Sentry function Client app Sentry function Authentication function Post logout procedure Session Not Valid = Login page Post Authentication procedure Post logout procedure Session Not Valid URL Cookie Name Cookie Name

21 So what do we need? Recap Foremost we must allow our callback procedure to be run from outside of APEX Runs from ORDS:

22 Another view at the system Sentry function detects no session P 101 after submit: authentication function Callback procedure: Creates APEX session Post authentication procedure Webservice returning JSON roles Sentry function detects cookie (session) Page gets displayed

23 Sentry function client app Sentry function detects no session P 101 after submit: authentication function The Sentry function defines a valid session: Is this session valid? Callback procedure: Creates APEX session Post authentication procedure Webservice returning JSON roles Session is valid when a valid cookie is found Sentry function detects cookie (session) Cookies are bound to each server / domain Page gets displayed Sentry is to check the session. In our case however we must create an APEX session when one is not there, but the cookie is valid. <pseudocode> 1. Get cookie data 2. If no cookie found: return false (making the app revert to login app) 3. If cookie found: is the APEX session available? 1. Yes: check / create autho collection and return true 2. No: create apex session and use cookie data to check (or create) autho collection, then return true </pseudocode>

24 Session not valid URL client app Sentry function detects no session P 101 after submit: authentication function redirect_to_login with URL parameters for setting page-item values Callback procedure: Creates APEX session <code> owa_util.redirect_url ( curl => g_login_base_uri 'f?p=' g_login_app -- app ':' g_login_page_alias -- page ':' -- session ':' -- request ':YES' -- debug ':' -- clearcache ':P101_GOTO_WORKSPACE,P101_GOTO_APP,P101_GOTO_SESSION' -- itemnames ':' l_goto_workspace -- itemvalues ',' l_goto_app ',' l_goto_session ); </code> Sentry function detects cookie (session) Page gets displayed Post authentication procedure Webservice returning JSON roles

25 Authentication function login-app Sentry function detects no session P 101 after submit: authentication function Takes only 2 parameters: username and password Callback procedure: Creates APEX session Post authentication procedure Webservice returning JSON roles We need 5! username, password, workspace, app_alias, session Sentry function detects cookie (session) On page 101: after-submit combine password + workspace + app_alias + session into :P101_PASSWORD item, within the authentication function we will unwrap this again <pseudocode> 1. unwrap the password to obtain password, workspace, app_alias and session 2. hash the password and check for username, hash, app_alias combination 3. return true when a record is found </pseudocode> Page gets displayed

26 Post authentication login-app Sentry function detects no session P 101 after submit: authentication function Responsible for sending the user to the client-app s callback function Callback procedure: Creates APEX session Post authentication procedure Webservice returning JSON roles Generate token for security Sentry function detects cookie (session) Clear session state for pw, goto_worksp, goto_app and goto_session on login-server Page gets displayed <pseudocode> 1. define clients ip-number and create token 2. get goto-app callback url 3. reset password, goto_workspace, goto_app and goto_session in session-state 4. Redirect user to application </pseudocode>

27 Callback procedure client app Sentry function detects no session P 101 after submit: authentication function Set client app cookie Create or use APEX Session Get roles from authorisation webservice and store in collection Callback procedure: Creates APEX session Sentry function detects cookie (session) Page gets displayed Post authentication procedure Webservice returning JSON roles <pseudocode> 1. Set SSO Cookie 2. Get Application info 3. If no error: 1. Set security group (workspace) 2. Set Flow ID (application-id) 3. Set Session Info (session) 4. Define user session (session) 5. Get JSON from webservice and store in collection 6. Log the user into APEX (sets APP_USERNAME") 1. This uses the p_app_page parameter to send the user to a page inside the app </pseudocode>

28 Post logout procedure client app Sentry function detects no session P 101 after submit: authentication function Expire the cookie Callback procedure: Creates APEX session Post authentication procedure Webservice returning JSON roles or Sentry function detects cookie (session) Page gets displayed Remove the cookie

29 DEMO TIME

30

31 Authorisation Create authorisation scheme: PL/SQL function returning boolean: return s4s_authorisation_pck.has_role(p_role_name => ROLENAME ); function has_role ( p_role_id in s4s_roles_vw.grup_id%type ) return boolean is cursor c_roles is from select count(1) s4s_roles_vw r where r.grup_id = p_role_id; l_reccount pls_integer; begin open c_roles; fetch c_roles into l_reccount; close c_roles; return l_reccount > 0; end has_role;

Using RESTfull services and remote SQL

Using RESTfull services and remote SQL Using RESTfull services and remote SQL from APEX Apex 18.15.2 EA2EA1 Agenda What is REST Using REST within APEX Web Source Modules Legacy Web Service References Build a Restful API for MySQL with NodeJS

More information

Oracle APEX 18.1 New Features

Oracle APEX 18.1 New Features Oracle APEX 18.1 New Features May, 2018 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

MyClinic. Password Reset Guide

MyClinic. Password Reset Guide MyClinic Password Reset Guide Content Retrieving your username Retrieving your password using security question Retrieving your password without remembering login credentials Retrieving your password using

More information

Integration of the platform. Technical specifications

Integration of the platform. Technical specifications Introduction This document is meant as a reference and specification guide to carry out the integration between Gamelearn s platform and the different Learning Management System platforms of the client,

More information

Oracle Forms and Oracle APEX The Odd Couple

Oracle Forms and Oracle APEX The Odd Couple Oracle Forms and Oracle APEX The Odd Couple About me 2 Francis Mignault CTO and Co-founder, Insum Solutions 30+ years with Oracle DB, 14+ years with APEX. (Forms 2.3 / Oracle 5) Books: Expert Oracle Application

More information

WELCOME. APEX Security Primer. About Enkitec. About the Presenter. ! Oracle Platinum Partner! Established in 2004

WELCOME. APEX Security Primer. About Enkitec. About the Presenter. ! Oracle Platinum Partner! Established in 2004 WELCOME APEX Security Primer Scott Spendolini Executive Director!1!2 About the Presenter About Enkitec! Scott Spendolini! Oracle Platinum Partner! scott.spendolini@enkitec.com! Established in 2004! @sspendol!

More information

& ( ); INSERT INTO ( ) SELECT

& ( ); INSERT INTO ( ) SELECT Oracle apex array Craig is a Development Consultant at Explorer. Craig has an MSc in Computing Science and is an experienced software engineer, utilising development tools such as PL/SQL and APEX to provide

More information

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation Enhancing cloud applications by using external authentication services After you complete this section, you should understand: Terminology such as authentication, identity, and ID token The benefits of

More information

I, J, K. Lightweight directory access protocol (LDAP), 162

I, J, K. Lightweight directory access protocol (LDAP), 162 Index A Access Control, 183 Administration console, 17 home page, 17 managing instances, 19 managing requests, 18 managing workspaces, 19 monitoring activity, 19 Advanced security option (ASO), 58, 262

More information

Apex 5.1 Interactive Grid and Other New features

Apex 5.1 Interactive Grid and Other New features Apex 5.1 Interactive Grid and Other New features Presented by: John Jay King Download this paper from: 1 Session Objectives Become familiar with the new features of APEX 5.1 Learn how the Interactive Grid

More information

Advanced ASP.NET Identity. Brock Allen

Advanced ASP.NET Identity. Brock Allen Advanced ASP.NET Identity Brock Allen brockallen@gmail.com http://brockallen.com @BrockLAllen Advanced The complicated bits of ASP.NET Identity Brock Allen brockallen@gmail.com http://brockallen.com @BrockLAllen

More information

This topic discusses what's required of SAML IdPs in general and provides a step-by-step procedure for setting up a OneLogin IdP.

This topic discusses what's required of SAML IdPs in general and provides a step-by-step procedure for setting up a OneLogin IdP. Adding a SAML identity provider This topic discusses what's required of SAML IdPs in general and provides a step-by-step procedure for setting up a OneLogin IdP. About adding a SAML identity provider DC/OS

More information

AuraPlayer Server Manager User Guide

AuraPlayer Server Manager User Guide AuraPlayer Server Manager User Guide AuraPlayer Support Team Version 2 2/7/2011 This document is the sole property of AuraPlayer Ltd., it cannot be communicated to third parties and/or reproduced without

More information

Oracle Application Express 5 New Features

Oracle Application Express 5 New Features Oracle Application Express 5 New Features 20th HrOUG conference October 16, 2015 Vladislav Uvarov Software Development Manager Database Server Technologies Division Copyright 2015, Oracle and/or its affiliates.

More information

Setting up Enterprise Reporting in PowerSchool 10.0

Setting up Enterprise Reporting in PowerSchool 10.0 Setting up Enterprise Reporting in PowerSchool 10.0 Document prepared by: Dean B. Zaharis Cape Elizabeth School Department dzaharis@capeelizabethschools.org The following was hashed out at the August workshop

More information

Best Practices: Authentication & Authorization Infrastructure. Massimo Benini HPCAC - April,

Best Practices: Authentication & Authorization Infrastructure. Massimo Benini HPCAC - April, Best Practices: Authentication & Authorization Infrastructure Massimo Benini HPCAC - April, 03 2019 Agenda - Common Vocabulary - Keycloak Overview - OAUTH2 and OIDC - Microservices Auth/Authz techniques

More information

BIDMC Multi-Factor Authentication Enrollment Guide Table of Contents

BIDMC Multi-Factor Authentication Enrollment Guide Table of Contents BIDMC Multi-Factor Authentication Enrollment Guide Table of Contents Definitions... 2 Summary... 2 BIDMC Multi-Factor Authentication Enrollment... 3 Common Multi-Factor Authentication Enrollment Issues...

More information

Black Box DCX3000 / DCX1000 Using the API

Black Box DCX3000 / DCX1000 Using the API Black Box DCX3000 / DCX1000 Using the API updated 2/22/2017 This document will give you a brief overview of how to access the DCX3000 / DCX1000 API and how you can interact with it using an online tool.

More information

All about SAML End-to-end Tableau and OKTA integration

All about SAML End-to-end Tableau and OKTA integration Welcome # T C 1 8 All about SAML End-to-end Tableau and OKTA integration Abhishek Singh Senior Manager, Regional Delivery Tableau Abhishek Singh Senior Manager Regional Delivery asingh@tableau.com Agenda

More information

Using VMware Identity Manager Apps Portal

Using VMware Identity Manager Apps Portal Using VMware Identity Manager Apps Portal VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

WEB API. Nuki Home Solutions GmbH. Münzgrabenstraße 92/ Graz Austria F

WEB API. Nuki Home Solutions GmbH. Münzgrabenstraße 92/ Graz Austria F WEB API v 1. 1 0 8. 0 5. 2 0 1 8 1. Introduction 2. Calling URL 3. Swagger Interface Example API call through Swagger 4. Authentication API Tokens OAuth 2 Code Flow OAuth2 Authentication Example 1. Authorization

More information

Central Authentication Service Integration 2.0 Administration Guide May 2014

Central Authentication Service Integration 2.0 Administration Guide May 2014 Central Authentication Service Integration 2.0 Administration Guide May 2014 Contents Purpose of this document About CAS Compatibility New features in this release Copyright 2014 Desire2Learn Incorporated.

More information

1 Copyright 2013, Oracle and/or its affiliates. All rights reserved.

1 Copyright 2013, Oracle and/or its affiliates. All rights reserved. 1 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Oracle Application Express 2 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Fully supported no-cost feature of Oracle

More information

NIELSEN API PORTAL USER REGISTRATION GUIDE

NIELSEN API PORTAL USER REGISTRATION GUIDE NIELSEN API PORTAL USER REGISTRATION GUIDE 1 INTRODUCTION In order to access the Nielsen API Portal services, there are three steps that need to be followed sequentially by the user: 1. User Registration

More information

Attributes for Apps How mobile Apps can use SAML Authentication and Attributes

Attributes for Apps How mobile Apps can use SAML Authentication and Attributes Attributes for Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle lukas.haemmerle@switch.ch TNC 2013, Maastricht Introduction App by University of St. Gallen Universities offer

More information

ORACLE APPLICATION EXPRESS, ORACLE REST DATA SERVICES, & WEBLOGIC 12C AUTHOR: BRAD GIBSON SENIOR SOLUTIONS ARCHITECT ADVIZEX

ORACLE APPLICATION EXPRESS, ORACLE REST DATA SERVICES, & WEBLOGIC 12C AUTHOR: BRAD GIBSON SENIOR SOLUTIONS ARCHITECT ADVIZEX ORACLE APPLICATION EXPRESS, ORACLE REST DATA SERVICES, & WEBLOGIC 12C AUTHOR: BRAD GIBSON SENIOR SOLUTIONS ARCHITECT ADVIZEX AdvizeX Technologies - A Rolta Company 6/12/2015 1 AGENDA Introductions Test

More information

LEMONLDAP::NG 2.0. FOSDEM 2019

LEMONLDAP::NG 2.0. FOSDEM 2019 LEMONLDAP::NG 2.0 FOSDEM 2019 info@worteks.com LemonLDAP::NG Software 2 SSO Workfow 2. Authentication 1. First access 3. Send SSO Token 4. Validate SSO token Authentication Portal Trust link Application

More information

13241 Woodland Park Road, Suite 400 Herndon, VA USA A U T H O R : E X O S T A R D ATE: M A R C H V E R S I O N : 3.

13241 Woodland Park Road, Suite 400 Herndon, VA USA A U T H O R : E X O S T A R D ATE: M A R C H V E R S I O N : 3. SECURE ACCESS MAN AG E R FIRST TIME LOGIN GUIDE A U T H O R : E X O S T A R D ATE: M A R C H 2 0 1 5 V E R S I O N : 3.0 1 S E C U R E A CCESS M A N A G E R SECURE ACCESS MANAGER OVERVIEW... 3 SUMMARY...

More information

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) You can find the most up-to-date technical documentation

More information

Connect-2-Everything SAML SSO (client documentation)

Connect-2-Everything SAML SSO (client documentation) Connect-2-Everything SAML SSO (client documentation) Table of Contents Summary Overview Refined tags Summary The Connect-2-Everything landing page by Refined Data allows Adobe Connect account holders to

More information

Google SSO Intergration with KWL Digital

Google SSO Intergration with KWL Digital Google SSO Intergration with Digital Name Organisation Author Manager SSO Integration with Digital James Goold House Publications Saifee Ratlamwala Pat Sully Date Created Wednesday, 26 April 2017 Date

More information

COPYRIGHTED MATERIAL. Acknowledgments...v Introduction... xxi

COPYRIGHTED MATERIAL. Acknowledgments...v Introduction... xxi Acknowledgments...v Introduction... xxi Part I: Getting Started with Joomla!.....................1 Chapter 1: Introducing the Joomla! Content Management System...3 Chapter 2: Obtaining and Installing Joomla!...15

More information

A Guide to Understand, Install and Use Pie Register WordPress Registration Plugin

A Guide to Understand, Install and Use Pie Register WordPress Registration Plugin A Guide to Understand, Install and Use Pie Register WordPress Registration Plugin 1 P a g e Contents 1. Introduction... 5 2. Who is it for?... 6 3. Community v/s PRO Version... 7 3.1. Which version is

More information

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies CNIT 129S: Securing Web Applications Ch 3: Web Application Technologies HTTP Hypertext Transfer Protocol (HTTP) Connectionless protocol Client sends an HTTP request to a Web server Gets an HTTP response

More information

Documentation for the new Self Admin

Documentation for the new Self Admin Documentation for the new Self Admin The following documentation describes the structure of the new Self Admin site along with the purpose of each site section. The improvements that have been made to

More information

Device Recognition Best Practices Guide

Device Recognition Best Practices Guide Copyright Information 2017. SecureAuth is a copyright of SecureAuth Corporation. SecureAuth s IdP software, appliances, and other products and solutions, are copyrighted products of SecureAuth Corporation.

More information

Authentication in the Cloud. Stefan Seelmann

Authentication in the Cloud. Stefan Seelmann Authentication in the Cloud Stefan Seelmann Agenda Use Cases View Points Existing Solutions Upcoming Solutions Use Cases End user needs login to a site or service End user wants to share access to resources

More information

Using Twitter & Facebook API. INF5750/ Lecture 10 (Part II)

Using Twitter & Facebook API. INF5750/ Lecture 10 (Part II) Using Twitter & Facebook API INF5750/9750 - Lecture 10 (Part II) Lecture contents Connecting to popular social APIs Authentication Authorization Common calls Privacy and understanding data storage Social

More information

PassKey Manager Guide

PassKey Manager Guide PassKey Manager Guide Blackboard Web Community Manager Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and logos

More information

EBS goes social - The Triumvirate Liferay, Application Express and EBS

EBS goes social - The Triumvirate Liferay, Application Express and EBS EBS goes social - The Triumvirate Liferay, Application Express and EBS Michael Pergande, PROMATIS software GmbH DOAG 2011 Applications, Berlin, May 3rd, 2011 1 Agenda Introduction Motivation, Scenarios

More information

User Guide Using AuraPlayer

User Guide Using AuraPlayer User Guide Using AuraPlayer AuraPlayer Support Team Version 2 2/7/2011 This document is the sole property of AuraPlayer Ltd., it cannot be communicated to third parties and/or reproduced without the written

More information

User Authentication APIs

User Authentication APIs Introduction, page 1 signin, page 1 signout, page 5 Introduction MediaSense enables third-party developers to configure application users that allow third party applications to authenticate themselves.

More information

ClickToCall SkypeTest Documentation

ClickToCall SkypeTest Documentation ClickToCall SkypeTest Documentation Release 0.0.1 Andrea Mucci August 04, 2015 Contents 1 Requirements 3 2 Installation 5 3 Database Installation 7 4 Usage 9 5 Contents 11 5.1 REST API................................................

More information

Administering Jive Mobile Apps for ios and Android

Administering Jive Mobile Apps for ios and Android Administering Jive Mobile Apps for ios and Android TOC 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios...3 Custom App Wrapping for ios...3 Authentication with Mobile

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 1z1-349 Title : Oracle Eloqua Marketing Cloud Service 2017 Implementation Essentials Vendor : Oracle

More information

Information Security CS 526 Topic 8

Information Security CS 526 Topic 8 Information Security CS 526 Topic 8 Web Security Part 1 1 Readings for This Lecture Wikipedia HTTP Cookie Same Origin Policy Cross Site Scripting Cross Site Request Forgery 2 Background Many sensitive

More information

Department of Computer Science and Engineering The University of Texas at Arlington. Team: TimeKeepers. Project: Volunteer Tracking System

Department of Computer Science and Engineering The University of Texas at Arlington. Team: TimeKeepers. Project: Volunteer Tracking System Department of Computer Science and Engineering The University of Texas at Arlington Team: TimeKeepers Project: Team Members: Dineth Hettiarachchi Damber Khadka Devkishen Sisodia Samir Shrestha Tasneem

More information

Webthority can provide single sign-on to web applications using one of the following authentication methods:

Webthority can provide single sign-on to web applications using one of the following authentication methods: Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,

More information

ForgeRock Access Management Customization and APIs

ForgeRock Access Management Customization and APIs training@forgerock.com ForgeRock Access Management Customization and APIs Description AM-421 Course Description Revision B This course provides a hands-on technical introduction to ForgeRock Access Management

More information

Security Measures in FLEXCUBE Private Banking

Security Measures in FLEXCUBE Private Banking Security Measures in FLEXCUBE Private Banking Document Version Control Document Name Organization Security measures - FLEXCUBE Private Banking Oracle Financial Services and Software Ltd. Version Number

More information

Mobile Iron Core - Setup Guide 1

Mobile Iron Core - Setup Guide 1 Mobile Iron Core - Setup Guide Mobile Iron Core - Setup Guide 1 Prerequisites 2 App Availability 2 Device Compatibility 2 Reachable KDC 2 Add Hypergate to Mobile Iron Apps 3 Enable Android Enterprise Support

More information

Release Notes Tripolis Dialogue

Release Notes Tripolis Dialogue Release Notes Tripolis Dialogue Version 3.23 September 2016 1 TABLE OF CONTENTS Improvements and features 3 REST API API 3.0 3 TImezone support for campaigns 4 Campaign node details in preview 5 Changes

More information

Web Application Security. Philippe Bogaerts

Web Application Security. Philippe Bogaerts Web Application Security Philippe Bogaerts OWASP TOP 10 3 Aim of the OWASP Top 10 educate developers, designers, architects and organizations about the consequences of the most common web application security

More information

Yellowfin SAML Bridge Web Application

Yellowfin SAML Bridge Web Application Yellowfin SAML Bridge Web Application 2017 2 Introduction The Yellowfin SAML Bridge is a Java web application that allows for interfacing between a SAML Identity Provider, and Yellowfin. This allows for

More information

WeCode. Brought to you by CitrixNChill

WeCode. Brought to you by CitrixNChill WeCode Brought to you by CitrixNChill Authors: David Acevedo, Jessica Huang, Zhansaya Abdikarimova, Felicia Truong, Weimin Ouyang Team: CitrixNChill Revision History: 11/25: Added test cases, updated appendix,

More information

How to social login with Aruba controller. Bo Nielsen, CCIE #53075 (Sec) December 2016, V1.00

How to social login with Aruba controller. Bo Nielsen, CCIE #53075 (Sec) December 2016, V1.00 Bo Nielsen, CCIE #53075 (Sec) December 2016, V1.00 Overview This short document describes the basic setup for social login using Aruba ClearPass and Aruba wireless LAN controller. Aruba ClearPass, version

More information

Volante NACHA ISO20022 Validator AMI User Guide

Volante NACHA ISO20022 Validator AMI User Guide Volante NACHA ISO20022 Validator AMI User Guide 1. About Volante NACHA ISO20022 Validator AMI User Guide This document is referenced in the REST Services Deployment Guide. This outlines the available REST

More information

RESTFUL WEB SERVICES - INTERVIEW QUESTIONS

RESTFUL WEB SERVICES - INTERVIEW QUESTIONS RESTFUL WEB SERVICES - INTERVIEW QUESTIONS http://www.tutorialspoint.com/restful/restful_interview_questions.htm Copyright tutorialspoint.com Dear readers, these RESTful Web services Interview Questions

More information

Google Apps Integration

Google Apps Integration Google Apps Integration Contents 1 Using Swivel for Google Apps Authentication 2 Prerequisites 3 Google SSO 4 Swivel and Google Apps 5 User Experience 6 Install the Swivel Google software 7 Create private

More information

Sign-in with UM CaneID

Sign-in with UM CaneID Sign-in with UM CaneID Section 1.1: Overview When you need to sign in with your CaneID to access application such as Workday, CaneLink, Box, and many others, you will be authenticated by the UM Single

More information

Single Sign-On for PCF. User's Guide

Single Sign-On for PCF. User's Guide Single Sign-On for PCF Version 1.2 User's Guide 2018 Pivotal Software, Inc. Table of Contents Table of Contents Single Sign-On Overview Installation Getting Started with Single Sign-On Manage Service Plans

More information

How to Login, Logout and Manage Password (QRG)

How to Login, Logout and Manage Password (QRG) How to Login, Logout and Manage Password (QRG) This Quick Reference Guide covers the following topics: 1. How to login in to the DCC. How to change (reset) your password 3. What to do if you have forgotten

More information

Integrate HEAT Software with Bomgar Remote Support

Integrate HEAT Software with Bomgar Remote Support Integrate HEAT Software with Bomgar Remote Support 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the

More information

Using Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure. Deployment Guide

Using Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure. Deployment Guide Using Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure Deployment Guide v1.0 May 2018 Introduction This document describes how to set up Pulse Connect Secure for SP-initiated

More information

vfire Officer App User Guide Version 1.3

vfire Officer App User Guide Version 1.3 vfire Officer App User Guide TOC Version Details 4 Online Support 4 Copyright 4 About this Document 6 Intended Audience 6 Standards and Conventions 6 About the vfire Officer App 7 Installing the vfire

More information

User Directories. Overview, Pros and Cons

User Directories. Overview, Pros and Cons User Directories Overview, Pros and Cons Overview Secure ISMS can operate with one or more of the following user directories. Secure ISMS Users (ISMS) Internal users local to the Secure ISMS application

More information

External HTTPS Trigger AXIS Camera Station 5.06 and above

External HTTPS Trigger AXIS Camera Station 5.06 and above HOW TO External HTTPS Trigger AXIS Camera Station 5.06 and above Created: October 17, 2016 Last updated: November 19, 2016 Rev: 1.2 1 Please note that AXIS does not take any responsibility for how this

More information

MeetMe Planner Design description. Version 2.2

MeetMe Planner Design description. Version 2.2 Design description Version 2.2 Revision History Date Version Description Author 2015-07-11 1.0 First version Danijel Sokač Francesco Giarola 2015-14-11 1.1 Mockups update and new use case handling Danijel

More information

Michigan State University Team MSUFCU Banking with Amazon s Alexa and Apple s Siri Project Plan Spring 2017

Michigan State University Team MSUFCU Banking with Amazon s Alexa and Apple s Siri Project Plan Spring 2017 1 Michigan State University Team MSUFCU Banking with Amazon s Alexa and Apple s Siri Project Plan Spring 2017 MSUFCU Contacts: Emily Fesler Collin Lochinski Judy Lynch Benjamin Maxim Andy Wardell Michigan

More information

HEAT Software Integration with Remote Support

HEAT Software Integration with Remote Support HEAT Software Integration with Remote Support 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of their

More information

Entrust PartnerLink Login Instructions

Entrust PartnerLink Login Instructions Entrust PartnerLink Login Instructions Contents Introduction... 4 Purpose 4 Overview 4 Prerequisites 4 Instructions... 5 Entrust is a registered trademark of Entrust, Inc. in the United States and certain

More information

The Authorized Contact User Guide

The Authorized Contact User Guide The Authorized Contact User Guide Produced by APP Design 1/3/2012 Table of Contents Gaining Access... 3 Logging In... 3 Main Menu... 4 Components of Authorized Contact Feature... 5 Home Page... 5 Group

More information

Salesforce Mobile App Security Guide

Salesforce Mobile App Security Guide Salesforce Mobile App Security Guide Version 3, 0 @salesforcedocs Last updated: October 11, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

Open standards: Open authentication and Identity Management tool

Open standards: Open authentication and Identity Management tool Open standards: Open authentication and Identity Management tool Decentralised Citizens ENgagement Technologies Specific Targeted Research Project Collective Awareness Platforms Creative Commons Attribution-NonCommercial-

More information

User Guide Version 1.0

User Guide Version 1.0 vfire Mobile App User Guide Table of Contents Version Details 4 Online Support 4 Copyright 4 About this Document 5 Intended Audience 5 Standards and Conventions 5 About the vfire Mobile App 6 Installing

More information

Topic 15: Authentication

Topic 15: Authentication Topic 15: Authentication CITS3403 Agile Web Development Getting MEAN with Mongo, Express, Angular and Node, Chapter 11 Semester 1, 2018 Secure web apps Security is a primary concern for anyone developing

More information

SmartFocus Cloud Service APIs

SmartFocus Cloud Service APIs SmartFocus Cloud Service APIs Document name SmartFocus User Guide Service Campaign management for managing email campaigns Protocol SOAP & REST over HTTP Version 11.8 Last updated on June 22, 2015 Table

More information

Serverless Single Page Web Apps, Part Four. CSCI 5828: Foundations of Software Engineering Lecture 24 11/10/2016

Serverless Single Page Web Apps, Part Four. CSCI 5828: Foundations of Software Engineering Lecture 24 11/10/2016 Serverless Single Page Web Apps, Part Four CSCI 5828: Foundations of Software Engineering Lecture 24 11/10/2016 1 Goals Cover Chapter 4 of Serverless Single Page Web Apps by Ben Rady Present the issues

More information

Create an account in Salesforce using the Web Services consumer functionality

Create an account in Salesforce using the Web Services consumer functionality Name of Solution: Mapping : Salesforce ACCOUNT using Web Services Business Requirement: Create an account in Salesforce using the Web Services consumer functionality Description: SalesForce provides a

More information

ICE CLEAR EUROPE DMS GLOBAL ID CREATION USER GUIDE VERSION 1.0

ICE CLEAR EUROPE DMS GLOBAL ID CREATION USER GUIDE VERSION 1.0 ICE CLEAR EUROPE DMS GLOBAL ID CREATION USER GUIDE VERSION 1.0 August 2017 Date Version Description August 2017 1.0 Initial Draft 1. Single Sign On... 2 2. To register for SSO on the Global ID webpage...

More information

Andowson Chang

Andowson Chang Andowson Chang http://www.andowson.com/ All JForum templates are stored in the directory templates, where each subdirectory is a template name, being the default template name callled default. There you

More information

Manipulating Database Objects

Manipulating Database Objects Manipulating Database Objects Purpose This tutorial shows you how to manipulate database objects using Oracle Application Express. Time to Complete Approximately 30 minutes. Topics This tutorial covers

More information

Create-A-Page Design Documentation

Create-A-Page Design Documentation Create-A-Page Design Documentation Group 9 C r e a t e - A - P a g e This document contains a description of all development tools utilized by Create-A-Page, as well as sequence diagrams, the entity-relationship

More information

Cloudessa API Documentation Guide. Cloudessa, Inc East Bayshore Road, Suite 200 Palo Alto, CA, 94303

Cloudessa API Documentation Guide. Cloudessa, Inc East Bayshore Road, Suite 200 Palo Alto, CA, 94303 Cloudessa API Documentation Guide Cloudessa, Inc. 2225 East Bayshore Road, Suite 200 Palo Alto, CA, 94303 July, 2013 Cloudessa RADIUS API Cloudessa offers a powerful Application Program Interface (API)

More information

Common Resources v1.0

Common Resources v1.0 Common Resources v1.0 Copyright Riverbed Technology Inc. 2018 Created Aug 10, 2018 at 0:08 PM Contents Contents Resource: auth_info auth_info: get Resource: info info: get Resource: ping ping: get Resource:

More information

OAuth2 Autoconfig. Copyright

OAuth2 Autoconfig. Copyright Copyright Table of Contents... iii 1. Downloading... 1 1.1. Source... 1 1.2. Maven... 1 1.3. Gradle... 2 2. Authorization Server... 3 3. Resource Server... 4 I. Token Type in User Info... 5 II. Customizing

More information

Creating and Working with JSON in Oracle Database

Creating and Working with JSON in Oracle Database Creating and Working with JSON in Oracle Database Dan McGhan Oracle Developer Advocate JavaScript & HTML5 January, 2016 Safe Harbor Statement The following is intended to outline our general product direction.

More information

Real Application Security Administration

Real Application Security Administration Oracle Database Real Application Security Administration Console (RASADM) User s Guide 12c Release 2 (12.2) E85615-01 June 2017 Real Application Security Administration Oracle Database Real Application

More information

CNIT 129S: Securing Web Applications. Ch 4: Mapping the Application

CNIT 129S: Securing Web Applications. Ch 4: Mapping the Application CNIT 129S: Securing Web Applications Ch 4: Mapping the Application Mapping Enumerate application's content and functionality Some is hidden, requiring guesswork and luck to discover Examine every aspect

More information

Contents. xvii xix xxiil. xxvii

Contents. xvii xix xxiil. xxvii Contents FOREWORD INTRODUCTION INDUSTRY ANALYSIS PREFACE ACKNOWLEDGMENTS BIOGRAPHY XV xvii xix xxiil XXV xxvii PART I CHAPTER 1 INTRODUCTION TO MOBILE SECURITY DEVELOPMENT Understanding Secure Web Development

More information

Identity and Data Access: OpenID & OAuth

Identity and Data Access: OpenID & OAuth Feedback: http://goo.gl/dpubh #io2011 #TechTalk Identity and Data Access: OpenID & OAuth Ryan Boyd @ryguyrg https://profiles.google.com/ryanboyd May 11th 2011 Agenda Feedback: http://goo.gl/dpubh #io2011

More information

f5-icontrol-rest Documentation

f5-icontrol-rest Documentation f5-icontrol-rest Documentation Release 1.3.10 F5 Networks Aug 04, 2018 Contents 1 Overview 1 2 Installation 3 2.1 Using Pip................................................. 3 2.2 GitHub..................................................

More information

VMware End User Computing Global Demo Environment Walkthrough Guide

VMware End User Computing Global Demo Environment Walkthrough Guide VMware End User Computing Global Demo Environment Walkthrough Guide Summary This VMware SmartGuide has been created to give a quick start walkthrough of accessing and operating the VMware End User Computing

More information

Practic Pr al actic Dynamic Actions Intro Jorge Rimblas 1. 1

Practic Pr al actic Dynamic Actions Intro Jorge Rimblas 1. 1 Practical Dynamic Actions Intro Jorge Rimblas 1.1 Jorge Rimblas Senior APEX Consultant @rimblas rimblas.com/blog Contributor to "Expert Oracle Application Express, 2nd Edition" with "Themes & Templates"

More information

Introduction to application management

Introduction to application management Introduction to application management To deploy web and mobile applications, add the application from the Centrify App Catalog, modify the application settings, and assign roles to the application to

More information

BOCI Securities Limited Security Token User Guide (for Securities Account) Content

BOCI Securities Limited Security Token User Guide (for Securities Account) Content BOCI Securities Limited Security Token User Guide (for Securities Account) Content I. Activating your BOCI Security Token (P.2-6) II. Login your Online Securities Account with BOCI Security Token (P.7-8)

More information

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University Identity Management and Federated ID (Liberty Alliance) ISA 767, Secure Electronic Commerce Xinwen Zhang, xzhang6@gmu.edu George Mason University Identity Identity is the fundamental concept of uniquely

More information

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1 Administering Workspace ONE in VMware Identity Manager Services with AirWatch VMware AirWatch 9.1.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Extract from the ARC & RVRC Operational & Administrative Procedures

Extract from the ARC & RVRC Operational & Administrative Procedures 2.2 Configuring MASmobile 2.2.1 Configuring MASmobile settings (iphone) 2.2.2 Configuring MASmobile settings (Android) 2.2.3 Main Menu 2.2.4 Logging In 2.2.5 Managing Accounts 2.2.6 Searching for Systems

More information

Advanced API Security

Advanced API Security Advanced API Security ITANA Group Nuwan Dias Architect 22/06/2017 Agenda 2 HTTP Basic Authentication Authorization: Basic QWxhZGRpbjpPcGVuU2VzYW1l 3 API Security is about controlling Access Delegation

More information