Bootstrap your APEX authentication & authorisation. a presentation by
|
|
- Douglas Collins
- 5 years ago
- Views:
Transcription
1 Bootstrap your APEX authentication & authorisation a presentation by
2 Who am I? Richard Martens independant Consultant since 2012 smart4apex founding member (2010) oracle since 2002 (Oracle 8i) PL/SQL, Apex, HTML(5), CSS(3), Javascript, XML, XSLT special interest in UI oracle ace since 2015 RIMA on Oracle Forums trainer at
3 Bootstrap your APEX authentication & authorisation a presentation by
4
5
6 This is what we re talking about
7
8 Agenda Introducing: APEX SSO components Not "single" but better "second" sign on. Once signed in, it acts like "single" Conditions, Assumptions and Prerequisites The Authentication Process The Authorization Process
9 Conditions, Assumptions & Prerequisites We need a central login application Central user and roles administration Optionally use 3rd party sign-on (Google Authentication etc.) We login using several workspaces and servers Once logged in we should be logged in in all applications Once logged out we must log out from all applications and workspaces Easily extendable to more workspaces, servers and applications
10 The Authentication Process user is not yet logged in 1. User requests a page from the application 2. Application detects that the user is not logged in 3. Application sends user to login application 4. Login application authenticates the user 5. Login application sends user to originating applications callback procedure 6. Callback procedure makes a REST request to the login server to get the users roles 7. When roles are received, the user is authenticated
11 The Authentication Process user is al ready logged in (another suite application) 1. User requests a page from the application 2. Application detects that the user is logged in 3. Application makes REST request to the login server to get the users roles 4. When roles are received, the user is authenticated 5. When no roles received, the user is not authenticated Landing-page: You are not authorized Login-application
12 Remember Google Authentication scheme?
13 Remember Google Authentication scheme? 1. apex redirects end-user to google login-page 2. after successful login into google, google redirects the end-user back to a redirect URL on your server (this is a pl/sql stored procedure) 3. when the pl/sql procedure runs it: a. requests google for an exchange token (using RESTFUL web services) b. reads a token from the google response c. requests further info ( -address, name etc.) d. creates a session for the end-user e. stores the token in an application-item and in an apex-collection f. redirects the user to the home-page 4. apex is now equipped with a token to do further requests to the google API s
14 Better well stolen than badly invented Fresh Login your app suite login user requests page user is redirected to login app user authenticates to login app apex login app user is authenticated user is redirected to Suite app call-back procedure call-back procedure requests for authorisation roles authorisation roles are sent by web service suite authe engine suite autho web service Using token for security Your app
15 Better well stolen than badly invented Second login your app user requests page Application detects cookie User is technically authenticated Applications Sentry function detects no roles suite login apex login app suite authe engine user is authenticated Sentry function requests roles authorisation roles are sent by web service suite autho web service Using token for security Your app
16 So what do we need? Client App Set Cookie name Mainly for same workspace authentication
17 So what do we need? Client App Set the session not valid URL Allows APEX to use pl/sql to redirect to login application #OWNER#.s4s_authentication_pck.redirect_to_login?p_goto_workspace=&WORKSPACE_ID. &p_goto_app=&app_alias. &p_goto_session=&app_session.
18 So what do we need? Client App Set Sentry, Invalid Session and Post logout procedures
19 So what do we need? Inlog App
20 So what do we need? Recap Inlog App Sentry function Client app Sentry function Authentication function Post logout procedure Session Not Valid = Login page Post Authentication procedure Post logout procedure Session Not Valid URL Cookie Name Cookie Name
21 So what do we need? Recap Foremost we must allow our callback procedure to be run from outside of APEX Runs from ORDS:
22 Another view at the system Sentry function detects no session P 101 after submit: authentication function Callback procedure: Creates APEX session Post authentication procedure Webservice returning JSON roles Sentry function detects cookie (session) Page gets displayed
23 Sentry function client app Sentry function detects no session P 101 after submit: authentication function The Sentry function defines a valid session: Is this session valid? Callback procedure: Creates APEX session Post authentication procedure Webservice returning JSON roles Session is valid when a valid cookie is found Sentry function detects cookie (session) Cookies are bound to each server / domain Page gets displayed Sentry is to check the session. In our case however we must create an APEX session when one is not there, but the cookie is valid. <pseudocode> 1. Get cookie data 2. If no cookie found: return false (making the app revert to login app) 3. If cookie found: is the APEX session available? 1. Yes: check / create autho collection and return true 2. No: create apex session and use cookie data to check (or create) autho collection, then return true </pseudocode>
24 Session not valid URL client app Sentry function detects no session P 101 after submit: authentication function redirect_to_login with URL parameters for setting page-item values Callback procedure: Creates APEX session <code> owa_util.redirect_url ( curl => g_login_base_uri 'f?p=' g_login_app -- app ':' g_login_page_alias -- page ':' -- session ':' -- request ':YES' -- debug ':' -- clearcache ':P101_GOTO_WORKSPACE,P101_GOTO_APP,P101_GOTO_SESSION' -- itemnames ':' l_goto_workspace -- itemvalues ',' l_goto_app ',' l_goto_session ); </code> Sentry function detects cookie (session) Page gets displayed Post authentication procedure Webservice returning JSON roles
25 Authentication function login-app Sentry function detects no session P 101 after submit: authentication function Takes only 2 parameters: username and password Callback procedure: Creates APEX session Post authentication procedure Webservice returning JSON roles We need 5! username, password, workspace, app_alias, session Sentry function detects cookie (session) On page 101: after-submit combine password + workspace + app_alias + session into :P101_PASSWORD item, within the authentication function we will unwrap this again <pseudocode> 1. unwrap the password to obtain password, workspace, app_alias and session 2. hash the password and check for username, hash, app_alias combination 3. return true when a record is found </pseudocode> Page gets displayed
26 Post authentication login-app Sentry function detects no session P 101 after submit: authentication function Responsible for sending the user to the client-app s callback function Callback procedure: Creates APEX session Post authentication procedure Webservice returning JSON roles Generate token for security Sentry function detects cookie (session) Clear session state for pw, goto_worksp, goto_app and goto_session on login-server Page gets displayed <pseudocode> 1. define clients ip-number and create token 2. get goto-app callback url 3. reset password, goto_workspace, goto_app and goto_session in session-state 4. Redirect user to application </pseudocode>
27 Callback procedure client app Sentry function detects no session P 101 after submit: authentication function Set client app cookie Create or use APEX Session Get roles from authorisation webservice and store in collection Callback procedure: Creates APEX session Sentry function detects cookie (session) Page gets displayed Post authentication procedure Webservice returning JSON roles <pseudocode> 1. Set SSO Cookie 2. Get Application info 3. If no error: 1. Set security group (workspace) 2. Set Flow ID (application-id) 3. Set Session Info (session) 4. Define user session (session) 5. Get JSON from webservice and store in collection 6. Log the user into APEX (sets APP_USERNAME") 1. This uses the p_app_page parameter to send the user to a page inside the app </pseudocode>
28 Post logout procedure client app Sentry function detects no session P 101 after submit: authentication function Expire the cookie Callback procedure: Creates APEX session Post authentication procedure Webservice returning JSON roles or Sentry function detects cookie (session) Page gets displayed Remove the cookie
29 DEMO TIME
30
31 Authorisation Create authorisation scheme: PL/SQL function returning boolean: return s4s_authorisation_pck.has_role(p_role_name => ROLENAME ); function has_role ( p_role_id in s4s_roles_vw.grup_id%type ) return boolean is cursor c_roles is from select count(1) s4s_roles_vw r where r.grup_id = p_role_id; l_reccount pls_integer; begin open c_roles; fetch c_roles into l_reccount; close c_roles; return l_reccount > 0; end has_role;
Using RESTfull services and remote SQL
Using RESTfull services and remote SQL from APEX Apex 18.15.2 EA2EA1 Agenda What is REST Using REST within APEX Web Source Modules Legacy Web Service References Build a Restful API for MySQL with NodeJS
More informationOracle APEX 18.1 New Features
Oracle APEX 18.1 New Features May, 2018 Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated
More informationMyClinic. Password Reset Guide
MyClinic Password Reset Guide Content Retrieving your username Retrieving your password using security question Retrieving your password without remembering login credentials Retrieving your password using
More informationIntegration of the platform. Technical specifications
Introduction This document is meant as a reference and specification guide to carry out the integration between Gamelearn s platform and the different Learning Management System platforms of the client,
More informationOracle Forms and Oracle APEX The Odd Couple
Oracle Forms and Oracle APEX The Odd Couple About me 2 Francis Mignault CTO and Co-founder, Insum Solutions 30+ years with Oracle DB, 14+ years with APEX. (Forms 2.3 / Oracle 5) Books: Expert Oracle Application
More informationWELCOME. APEX Security Primer. About Enkitec. About the Presenter. ! Oracle Platinum Partner! Established in 2004
WELCOME APEX Security Primer Scott Spendolini Executive Director!1!2 About the Presenter About Enkitec! Scott Spendolini! Oracle Platinum Partner! scott.spendolini@enkitec.com! Established in 2004! @sspendol!
More information& ( ); INSERT INTO ( ) SELECT
Oracle apex array Craig is a Development Consultant at Explorer. Craig has an MSc in Computing Science and is an experienced software engineer, utilising development tools such as PL/SQL and APEX to provide
More informationEnhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation
Enhancing cloud applications by using external authentication services After you complete this section, you should understand: Terminology such as authentication, identity, and ID token The benefits of
More informationI, J, K. Lightweight directory access protocol (LDAP), 162
Index A Access Control, 183 Administration console, 17 home page, 17 managing instances, 19 managing requests, 18 managing workspaces, 19 monitoring activity, 19 Advanced security option (ASO), 58, 262
More informationApex 5.1 Interactive Grid and Other New features
Apex 5.1 Interactive Grid and Other New features Presented by: John Jay King Download this paper from: 1 Session Objectives Become familiar with the new features of APEX 5.1 Learn how the Interactive Grid
More informationAdvanced ASP.NET Identity. Brock Allen
Advanced ASP.NET Identity Brock Allen brockallen@gmail.com http://brockallen.com @BrockLAllen Advanced The complicated bits of ASP.NET Identity Brock Allen brockallen@gmail.com http://brockallen.com @BrockLAllen
More informationThis topic discusses what's required of SAML IdPs in general and provides a step-by-step procedure for setting up a OneLogin IdP.
Adding a SAML identity provider This topic discusses what's required of SAML IdPs in general and provides a step-by-step procedure for setting up a OneLogin IdP. About adding a SAML identity provider DC/OS
More informationAuraPlayer Server Manager User Guide
AuraPlayer Server Manager User Guide AuraPlayer Support Team Version 2 2/7/2011 This document is the sole property of AuraPlayer Ltd., it cannot be communicated to third parties and/or reproduced without
More informationOracle Application Express 5 New Features
Oracle Application Express 5 New Features 20th HrOUG conference October 16, 2015 Vladislav Uvarov Software Development Manager Database Server Technologies Division Copyright 2015, Oracle and/or its affiliates.
More informationSetting up Enterprise Reporting in PowerSchool 10.0
Setting up Enterprise Reporting in PowerSchool 10.0 Document prepared by: Dean B. Zaharis Cape Elizabeth School Department dzaharis@capeelizabethschools.org The following was hashed out at the August workshop
More informationBest Practices: Authentication & Authorization Infrastructure. Massimo Benini HPCAC - April,
Best Practices: Authentication & Authorization Infrastructure Massimo Benini HPCAC - April, 03 2019 Agenda - Common Vocabulary - Keycloak Overview - OAUTH2 and OIDC - Microservices Auth/Authz techniques
More informationBIDMC Multi-Factor Authentication Enrollment Guide Table of Contents
BIDMC Multi-Factor Authentication Enrollment Guide Table of Contents Definitions... 2 Summary... 2 BIDMC Multi-Factor Authentication Enrollment... 3 Common Multi-Factor Authentication Enrollment Issues...
More informationBlack Box DCX3000 / DCX1000 Using the API
Black Box DCX3000 / DCX1000 Using the API updated 2/22/2017 This document will give you a brief overview of how to access the DCX3000 / DCX1000 API and how you can interact with it using an online tool.
More informationAll about SAML End-to-end Tableau and OKTA integration
Welcome # T C 1 8 All about SAML End-to-end Tableau and OKTA integration Abhishek Singh Senior Manager, Regional Delivery Tableau Abhishek Singh Senior Manager Regional Delivery asingh@tableau.com Agenda
More informationUsing VMware Identity Manager Apps Portal
Using VMware Identity Manager Apps Portal VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationWEB API. Nuki Home Solutions GmbH. Münzgrabenstraße 92/ Graz Austria F
WEB API v 1. 1 0 8. 0 5. 2 0 1 8 1. Introduction 2. Calling URL 3. Swagger Interface Example API call through Swagger 4. Authentication API Tokens OAuth 2 Code Flow OAuth2 Authentication Example 1. Authorization
More informationCentral Authentication Service Integration 2.0 Administration Guide May 2014
Central Authentication Service Integration 2.0 Administration Guide May 2014 Contents Purpose of this document About CAS Compatibility New features in this release Copyright 2014 Desire2Learn Incorporated.
More information1 Copyright 2013, Oracle and/or its affiliates. All rights reserved.
1 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Oracle Application Express 2 Copyright 2013, Oracle and/or its affiliates. All rights reserved. Fully supported no-cost feature of Oracle
More informationNIELSEN API PORTAL USER REGISTRATION GUIDE
NIELSEN API PORTAL USER REGISTRATION GUIDE 1 INTRODUCTION In order to access the Nielsen API Portal services, there are three steps that need to be followed sequentially by the user: 1. User Registration
More informationAttributes for Apps How mobile Apps can use SAML Authentication and Attributes
Attributes for Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle lukas.haemmerle@switch.ch TNC 2013, Maastricht Introduction App by University of St. Gallen Universities offer
More informationORACLE APPLICATION EXPRESS, ORACLE REST DATA SERVICES, & WEBLOGIC 12C AUTHOR: BRAD GIBSON SENIOR SOLUTIONS ARCHITECT ADVIZEX
ORACLE APPLICATION EXPRESS, ORACLE REST DATA SERVICES, & WEBLOGIC 12C AUTHOR: BRAD GIBSON SENIOR SOLUTIONS ARCHITECT ADVIZEX AdvizeX Technologies - A Rolta Company 6/12/2015 1 AGENDA Introductions Test
More informationLEMONLDAP::NG 2.0. FOSDEM 2019
LEMONLDAP::NG 2.0 FOSDEM 2019 info@worteks.com LemonLDAP::NG Software 2 SSO Workfow 2. Authentication 1. First access 3. Send SSO Token 4. Validate SSO token Authentication Portal Trust link Application
More information13241 Woodland Park Road, Suite 400 Herndon, VA USA A U T H O R : E X O S T A R D ATE: M A R C H V E R S I O N : 3.
SECURE ACCESS MAN AG E R FIRST TIME LOGIN GUIDE A U T H O R : E X O S T A R D ATE: M A R C H 2 0 1 5 V E R S I O N : 3.0 1 S E C U R E A CCESS M A N A G E R SECURE ACCESS MANAGER OVERVIEW... 3 SUMMARY...
More informationSetting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager
Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) You can find the most up-to-date technical documentation
More informationConnect-2-Everything SAML SSO (client documentation)
Connect-2-Everything SAML SSO (client documentation) Table of Contents Summary Overview Refined tags Summary The Connect-2-Everything landing page by Refined Data allows Adobe Connect account holders to
More informationGoogle SSO Intergration with KWL Digital
Google SSO Intergration with Digital Name Organisation Author Manager SSO Integration with Digital James Goold House Publications Saifee Ratlamwala Pat Sully Date Created Wednesday, 26 April 2017 Date
More informationCOPYRIGHTED MATERIAL. Acknowledgments...v Introduction... xxi
Acknowledgments...v Introduction... xxi Part I: Getting Started with Joomla!.....................1 Chapter 1: Introducing the Joomla! Content Management System...3 Chapter 2: Obtaining and Installing Joomla!...15
More informationA Guide to Understand, Install and Use Pie Register WordPress Registration Plugin
A Guide to Understand, Install and Use Pie Register WordPress Registration Plugin 1 P a g e Contents 1. Introduction... 5 2. Who is it for?... 6 3. Community v/s PRO Version... 7 3.1. Which version is
More informationCNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies
CNIT 129S: Securing Web Applications Ch 3: Web Application Technologies HTTP Hypertext Transfer Protocol (HTTP) Connectionless protocol Client sends an HTTP request to a Web server Gets an HTTP response
More informationDocumentation for the new Self Admin
Documentation for the new Self Admin The following documentation describes the structure of the new Self Admin site along with the purpose of each site section. The improvements that have been made to
More informationDevice Recognition Best Practices Guide
Copyright Information 2017. SecureAuth is a copyright of SecureAuth Corporation. SecureAuth s IdP software, appliances, and other products and solutions, are copyrighted products of SecureAuth Corporation.
More informationAuthentication in the Cloud. Stefan Seelmann
Authentication in the Cloud Stefan Seelmann Agenda Use Cases View Points Existing Solutions Upcoming Solutions Use Cases End user needs login to a site or service End user wants to share access to resources
More informationUsing Twitter & Facebook API. INF5750/ Lecture 10 (Part II)
Using Twitter & Facebook API INF5750/9750 - Lecture 10 (Part II) Lecture contents Connecting to popular social APIs Authentication Authorization Common calls Privacy and understanding data storage Social
More informationPassKey Manager Guide
PassKey Manager Guide Blackboard Web Community Manager Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and logos
More informationEBS goes social - The Triumvirate Liferay, Application Express and EBS
EBS goes social - The Triumvirate Liferay, Application Express and EBS Michael Pergande, PROMATIS software GmbH DOAG 2011 Applications, Berlin, May 3rd, 2011 1 Agenda Introduction Motivation, Scenarios
More informationUser Guide Using AuraPlayer
User Guide Using AuraPlayer AuraPlayer Support Team Version 2 2/7/2011 This document is the sole property of AuraPlayer Ltd., it cannot be communicated to third parties and/or reproduced without the written
More informationUser Authentication APIs
Introduction, page 1 signin, page 1 signout, page 5 Introduction MediaSense enables third-party developers to configure application users that allow third party applications to authenticate themselves.
More informationClickToCall SkypeTest Documentation
ClickToCall SkypeTest Documentation Release 0.0.1 Andrea Mucci August 04, 2015 Contents 1 Requirements 3 2 Installation 5 3 Database Installation 7 4 Usage 9 5 Contents 11 5.1 REST API................................................
More informationAdministering Jive Mobile Apps for ios and Android
Administering Jive Mobile Apps for ios and Android TOC 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios...3 Custom App Wrapping for ios...3 Authentication with Mobile
More informationActual4Test. Actual4test - actual test exam dumps-pass for IT exams
Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 1z1-349 Title : Oracle Eloqua Marketing Cloud Service 2017 Implementation Essentials Vendor : Oracle
More informationInformation Security CS 526 Topic 8
Information Security CS 526 Topic 8 Web Security Part 1 1 Readings for This Lecture Wikipedia HTTP Cookie Same Origin Policy Cross Site Scripting Cross Site Request Forgery 2 Background Many sensitive
More informationDepartment of Computer Science and Engineering The University of Texas at Arlington. Team: TimeKeepers. Project: Volunteer Tracking System
Department of Computer Science and Engineering The University of Texas at Arlington Team: TimeKeepers Project: Team Members: Dineth Hettiarachchi Damber Khadka Devkishen Sisodia Samir Shrestha Tasneem
More informationWebthority can provide single sign-on to web applications using one of the following authentication methods:
Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,
More informationForgeRock Access Management Customization and APIs
training@forgerock.com ForgeRock Access Management Customization and APIs Description AM-421 Course Description Revision B This course provides a hands-on technical introduction to ForgeRock Access Management
More informationSecurity Measures in FLEXCUBE Private Banking
Security Measures in FLEXCUBE Private Banking Document Version Control Document Name Organization Security measures - FLEXCUBE Private Banking Oracle Financial Services and Software Ltd. Version Number
More informationMobile Iron Core - Setup Guide 1
Mobile Iron Core - Setup Guide Mobile Iron Core - Setup Guide 1 Prerequisites 2 App Availability 2 Device Compatibility 2 Reachable KDC 2 Add Hypergate to Mobile Iron Apps 3 Enable Android Enterprise Support
More informationRelease Notes Tripolis Dialogue
Release Notes Tripolis Dialogue Version 3.23 September 2016 1 TABLE OF CONTENTS Improvements and features 3 REST API API 3.0 3 TImezone support for campaigns 4 Campaign node details in preview 5 Changes
More informationWeb Application Security. Philippe Bogaerts
Web Application Security Philippe Bogaerts OWASP TOP 10 3 Aim of the OWASP Top 10 educate developers, designers, architects and organizations about the consequences of the most common web application security
More informationYellowfin SAML Bridge Web Application
Yellowfin SAML Bridge Web Application 2017 2 Introduction The Yellowfin SAML Bridge is a Java web application that allows for interfacing between a SAML Identity Provider, and Yellowfin. This allows for
More informationWeCode. Brought to you by CitrixNChill
WeCode Brought to you by CitrixNChill Authors: David Acevedo, Jessica Huang, Zhansaya Abdikarimova, Felicia Truong, Weimin Ouyang Team: CitrixNChill Revision History: 11/25: Added test cases, updated appendix,
More informationHow to social login with Aruba controller. Bo Nielsen, CCIE #53075 (Sec) December 2016, V1.00
Bo Nielsen, CCIE #53075 (Sec) December 2016, V1.00 Overview This short document describes the basic setup for social login using Aruba ClearPass and Aruba wireless LAN controller. Aruba ClearPass, version
More informationVolante NACHA ISO20022 Validator AMI User Guide
Volante NACHA ISO20022 Validator AMI User Guide 1. About Volante NACHA ISO20022 Validator AMI User Guide This document is referenced in the REST Services Deployment Guide. This outlines the available REST
More informationRESTFUL WEB SERVICES - INTERVIEW QUESTIONS
RESTFUL WEB SERVICES - INTERVIEW QUESTIONS http://www.tutorialspoint.com/restful/restful_interview_questions.htm Copyright tutorialspoint.com Dear readers, these RESTful Web services Interview Questions
More informationGoogle Apps Integration
Google Apps Integration Contents 1 Using Swivel for Google Apps Authentication 2 Prerequisites 3 Google SSO 4 Swivel and Google Apps 5 User Experience 6 Install the Swivel Google software 7 Create private
More informationSign-in with UM CaneID
Sign-in with UM CaneID Section 1.1: Overview When you need to sign in with your CaneID to access application such as Workday, CaneLink, Box, and many others, you will be authenticated by the UM Single
More informationSingle Sign-On for PCF. User's Guide
Single Sign-On for PCF Version 1.2 User's Guide 2018 Pivotal Software, Inc. Table of Contents Table of Contents Single Sign-On Overview Installation Getting Started with Single Sign-On Manage Service Plans
More informationHow to Login, Logout and Manage Password (QRG)
How to Login, Logout and Manage Password (QRG) This Quick Reference Guide covers the following topics: 1. How to login in to the DCC. How to change (reset) your password 3. What to do if you have forgotten
More informationIntegrate HEAT Software with Bomgar Remote Support
Integrate HEAT Software with Bomgar Remote Support 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the
More informationUsing Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure. Deployment Guide
Using Microsoft Azure Active Directory MFA as SAML IdP with Pulse Connect Secure Deployment Guide v1.0 May 2018 Introduction This document describes how to set up Pulse Connect Secure for SP-initiated
More informationvfire Officer App User Guide Version 1.3
vfire Officer App User Guide TOC Version Details 4 Online Support 4 Copyright 4 About this Document 6 Intended Audience 6 Standards and Conventions 6 About the vfire Officer App 7 Installing the vfire
More informationUser Directories. Overview, Pros and Cons
User Directories Overview, Pros and Cons Overview Secure ISMS can operate with one or more of the following user directories. Secure ISMS Users (ISMS) Internal users local to the Secure ISMS application
More informationExternal HTTPS Trigger AXIS Camera Station 5.06 and above
HOW TO External HTTPS Trigger AXIS Camera Station 5.06 and above Created: October 17, 2016 Last updated: November 19, 2016 Rev: 1.2 1 Please note that AXIS does not take any responsibility for how this
More informationMeetMe Planner Design description. Version 2.2
Design description Version 2.2 Revision History Date Version Description Author 2015-07-11 1.0 First version Danijel Sokač Francesco Giarola 2015-14-11 1.1 Mockups update and new use case handling Danijel
More informationMichigan State University Team MSUFCU Banking with Amazon s Alexa and Apple s Siri Project Plan Spring 2017
1 Michigan State University Team MSUFCU Banking with Amazon s Alexa and Apple s Siri Project Plan Spring 2017 MSUFCU Contacts: Emily Fesler Collin Lochinski Judy Lynch Benjamin Maxim Andy Wardell Michigan
More informationHEAT Software Integration with Remote Support
HEAT Software Integration with Remote Support 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of their
More informationEntrust PartnerLink Login Instructions
Entrust PartnerLink Login Instructions Contents Introduction... 4 Purpose 4 Overview 4 Prerequisites 4 Instructions... 5 Entrust is a registered trademark of Entrust, Inc. in the United States and certain
More informationThe Authorized Contact User Guide
The Authorized Contact User Guide Produced by APP Design 1/3/2012 Table of Contents Gaining Access... 3 Logging In... 3 Main Menu... 4 Components of Authorized Contact Feature... 5 Home Page... 5 Group
More informationSalesforce Mobile App Security Guide
Salesforce Mobile App Security Guide Version 3, 0 @salesforcedocs Last updated: October 11, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
More informationOpen standards: Open authentication and Identity Management tool
Open standards: Open authentication and Identity Management tool Decentralised Citizens ENgagement Technologies Specific Targeted Research Project Collective Awareness Platforms Creative Commons Attribution-NonCommercial-
More informationUser Guide Version 1.0
vfire Mobile App User Guide Table of Contents Version Details 4 Online Support 4 Copyright 4 About this Document 5 Intended Audience 5 Standards and Conventions 5 About the vfire Mobile App 6 Installing
More informationTopic 15: Authentication
Topic 15: Authentication CITS3403 Agile Web Development Getting MEAN with Mongo, Express, Angular and Node, Chapter 11 Semester 1, 2018 Secure web apps Security is a primary concern for anyone developing
More informationSmartFocus Cloud Service APIs
SmartFocus Cloud Service APIs Document name SmartFocus User Guide Service Campaign management for managing email campaigns Protocol SOAP & REST over HTTP Version 11.8 Last updated on June 22, 2015 Table
More informationServerless Single Page Web Apps, Part Four. CSCI 5828: Foundations of Software Engineering Lecture 24 11/10/2016
Serverless Single Page Web Apps, Part Four CSCI 5828: Foundations of Software Engineering Lecture 24 11/10/2016 1 Goals Cover Chapter 4 of Serverless Single Page Web Apps by Ben Rady Present the issues
More informationCreate an account in Salesforce using the Web Services consumer functionality
Name of Solution: Mapping : Salesforce ACCOUNT using Web Services Business Requirement: Create an account in Salesforce using the Web Services consumer functionality Description: SalesForce provides a
More informationICE CLEAR EUROPE DMS GLOBAL ID CREATION USER GUIDE VERSION 1.0
ICE CLEAR EUROPE DMS GLOBAL ID CREATION USER GUIDE VERSION 1.0 August 2017 Date Version Description August 2017 1.0 Initial Draft 1. Single Sign On... 2 2. To register for SSO on the Global ID webpage...
More informationAndowson Chang
Andowson Chang http://www.andowson.com/ All JForum templates are stored in the directory templates, where each subdirectory is a template name, being the default template name callled default. There you
More informationManipulating Database Objects
Manipulating Database Objects Purpose This tutorial shows you how to manipulate database objects using Oracle Application Express. Time to Complete Approximately 30 minutes. Topics This tutorial covers
More informationCreate-A-Page Design Documentation
Create-A-Page Design Documentation Group 9 C r e a t e - A - P a g e This document contains a description of all development tools utilized by Create-A-Page, as well as sequence diagrams, the entity-relationship
More informationCloudessa API Documentation Guide. Cloudessa, Inc East Bayshore Road, Suite 200 Palo Alto, CA, 94303
Cloudessa API Documentation Guide Cloudessa, Inc. 2225 East Bayshore Road, Suite 200 Palo Alto, CA, 94303 July, 2013 Cloudessa RADIUS API Cloudessa offers a powerful Application Program Interface (API)
More informationCommon Resources v1.0
Common Resources v1.0 Copyright Riverbed Technology Inc. 2018 Created Aug 10, 2018 at 0:08 PM Contents Contents Resource: auth_info auth_info: get Resource: info info: get Resource: ping ping: get Resource:
More informationOAuth2 Autoconfig. Copyright
Copyright Table of Contents... iii 1. Downloading... 1 1.1. Source... 1 1.2. Maven... 1 1.3. Gradle... 2 2. Authorization Server... 3 3. Resource Server... 4 I. Token Type in User Info... 5 II. Customizing
More informationCreating and Working with JSON in Oracle Database
Creating and Working with JSON in Oracle Database Dan McGhan Oracle Developer Advocate JavaScript & HTML5 January, 2016 Safe Harbor Statement The following is intended to outline our general product direction.
More informationReal Application Security Administration
Oracle Database Real Application Security Administration Console (RASADM) User s Guide 12c Release 2 (12.2) E85615-01 June 2017 Real Application Security Administration Oracle Database Real Application
More informationCNIT 129S: Securing Web Applications. Ch 4: Mapping the Application
CNIT 129S: Securing Web Applications Ch 4: Mapping the Application Mapping Enumerate application's content and functionality Some is hidden, requiring guesswork and luck to discover Examine every aspect
More informationContents. xvii xix xxiil. xxvii
Contents FOREWORD INTRODUCTION INDUSTRY ANALYSIS PREFACE ACKNOWLEDGMENTS BIOGRAPHY XV xvii xix xxiil XXV xxvii PART I CHAPTER 1 INTRODUCTION TO MOBILE SECURITY DEVELOPMENT Understanding Secure Web Development
More informationIdentity and Data Access: OpenID & OAuth
Feedback: http://goo.gl/dpubh #io2011 #TechTalk Identity and Data Access: OpenID & OAuth Ryan Boyd @ryguyrg https://profiles.google.com/ryanboyd May 11th 2011 Agenda Feedback: http://goo.gl/dpubh #io2011
More informationf5-icontrol-rest Documentation
f5-icontrol-rest Documentation Release 1.3.10 F5 Networks Aug 04, 2018 Contents 1 Overview 1 2 Installation 3 2.1 Using Pip................................................. 3 2.2 GitHub..................................................
More informationVMware End User Computing Global Demo Environment Walkthrough Guide
VMware End User Computing Global Demo Environment Walkthrough Guide Summary This VMware SmartGuide has been created to give a quick start walkthrough of accessing and operating the VMware End User Computing
More informationPractic Pr al actic Dynamic Actions Intro Jorge Rimblas 1. 1
Practical Dynamic Actions Intro Jorge Rimblas 1.1 Jorge Rimblas Senior APEX Consultant @rimblas rimblas.com/blog Contributor to "Expert Oracle Application Express, 2nd Edition" with "Themes & Templates"
More informationIntroduction to application management
Introduction to application management To deploy web and mobile applications, add the application from the Centrify App Catalog, modify the application settings, and assign roles to the application to
More informationBOCI Securities Limited Security Token User Guide (for Securities Account) Content
BOCI Securities Limited Security Token User Guide (for Securities Account) Content I. Activating your BOCI Security Token (P.2-6) II. Login your Online Securities Account with BOCI Security Token (P.7-8)
More informationISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University
Identity Management and Federated ID (Liberty Alliance) ISA 767, Secure Electronic Commerce Xinwen Zhang, xzhang6@gmu.edu George Mason University Identity Identity is the fundamental concept of uniquely
More informationAdministering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1
Administering Workspace ONE in VMware Identity Manager Services with AirWatch VMware AirWatch 9.1.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationExtract from the ARC & RVRC Operational & Administrative Procedures
2.2 Configuring MASmobile 2.2.1 Configuring MASmobile settings (iphone) 2.2.2 Configuring MASmobile settings (Android) 2.2.3 Main Menu 2.2.4 Logging In 2.2.5 Managing Accounts 2.2.6 Searching for Systems
More informationAdvanced API Security
Advanced API Security ITANA Group Nuwan Dias Architect 22/06/2017 Agenda 2 HTTP Basic Authentication Authorization: Basic QWxhZGRpbjpPcGVuU2VzYW1l 3 API Security is about controlling Access Delegation
More information