Leveraging the Security of AWS's Own APIs for Your App. Brian Wagner Solutions Architect Serverless Web Day June 23, 2016

Size: px
Start display at page:

Download "Leveraging the Security of AWS's Own APIs for Your App. Brian Wagner Solutions Architect Serverless Web Day June 23, 2016"

Transcription

1 Leveraging the Security of AWS's Own APIs for Your App Brian Wagner Solutions Architect Serverless Web Day June 23, 2016

2 AWS API Requests

3 Access Key and Secret Key (access key and secret key have been modified for the purpose of this presentation)

4 Access Key and Secret Key [default] aws_access_key_id = AKIAIGQIO52K3ASNZCDA aws_secret_access_key = hackrohczd1yzkaa1rwc1sr3boc0covwmzjpskdh

5 Access Key and Secret Key [default] aws_access_key_id = AKIAIGQIO52K3ASNZCDA aws_secret_access_key = hackrohczd1yzkaa1rwc1sr3boc0covwmzjpskdh

6 Access Key and Secret Key [default] aws_access_key_id = AKIAIGQIO52K3ASNZCDA aws_secret_access_key = hackrohczd1yzkaa1rwc1sr3boc0covwmzjpskdh

7 WHY

8 Signing AWS API Requests >_

9 Why Requests Are Signed Verify the identity of the requestor Protect data in transit Protect against potential replay attacks

10 Verify the identity of the requestor unique

11 Protect data in transit GET HTTP/1.1 Authorization: AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/ /us-east- 1/iam/aws4_request, SignedHeaders=content-type;host;x-amz-date, Signature=5d672d79c15b13162d9279b0855cfba6789a8edb4c82c400e06b5924a6f2b5d7 content-type: application/x-www-form-urlencoded; charset=utf-8 host: iam.amazonaws.com x-amz-date: T123600Z

12 Protect data in transit GET HTTP/1.1 Authorization: AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/ /us-east- 1/iam/aws4_request, SignedHeaders=content-type;host;x-amz-date, Signature=5d672d79c15b13162d9279b0855cfba6789a8edb4c82c400e06b5924a6f2b5d7 content-type: application/x-www-form-urlencoded; charset=utf-8 host: iam.amazonaws.com x-amz-date: T123600Z

13 Protect against potential replay attacks 5 minutes

14 What about your API?

15 Benefits of signing requests Verify the identity of the requestor Protect data in transit Protect against potential replay attacks

16 Benefits of signing requests Verify the identity of the requestor Protect data in transit Protect against potential replay attacks Use IAM and access policies to authorize access to your APIs

17 Authorization: AWS_IAM

18 IAM and access policies to authorize access to your APIs { } "Effect": "Allow", "Action": "execute-api:invoke", "Resource": [ arn:aws:execute-api:us-east-1: :myapi/* ]

19 IAM and access policies to authorize access to your APIs { }, { } "Effect": "Allow", "Action": "execute-api:invoke", "Resource": [ arn:aws:execute-api:us-east-1: :myapi/* ] "Effect": "Deny", "Action": "execute-api:invoke", "Resource": [ arn:aws:execute-api:us-east-1: :myapi/admin/* ]

20 Securing your API

21

22

23

24

25

26

27

28

29

30

31

32

33

34 IAM and access policies to authorize access to your APIs { } "Version": " ", "Statement": [ { "Sid": "Stmt ", "Effect": "Allow", Action": "execute-api:invoke", "Resource": [ "arn:aws:execute-api:us-east-1: :4kp2myvxmf/*/get/pets" ] } ]

35 Access Key and Secret Key (access key and secret key have been modified for the purpose of this presentation)

36

37

38 How do my apps sign requests?

39 Cognito User and Federated Identities Cognito User Identities (Your User Pool) 1 Sign-in 3 2 Returns Access and ID Tokens Get AWS scoped credentials Cognito Federated Identities (Identity Pool) User 4 Access to your API API Gateway DynamoDB S3

40 Amazon Cognito Identity and Sync Amazon Cognito Identity Amazon Cognito Sync Your User Pool Federated Identities Data Synchronization k/v data Your own auth Guest Add sign-up and sign-in with a fully managed user directory Manage authenticated and guest users access to your AWS resources Synchronize user s data across devices and platforms via the cloud

41 API Gateway and IAM: Best Friends Forever Verify the identity of the requestor Protect data in transit Protect against potential replay attacks Use IAM and access policies to authorize access to your APIs +

42 Leveraging the Security of AWS's Own APIs for Your App Brian Wagner Solutions Architect Serverless Web Day June 23, 2016

Beyond Virtual Machines: Tapping into the AWS Universe from FileMaker

Beyond Virtual Machines: Tapping into the AWS Universe from FileMaker Beyond Virtual Machines: Tapping into the AWS Universe from FileMaker ITG06 Jesse Barnum President, 360Works FILEMAKER DEVCON 2018 AUGUST 6-9 GRAPEVINE, TX Jesse founded 360Works in 1996 Primary or original

More information

AWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect

AWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect AWS IoT Overview July 2016 Thomas Jones, Partner Solutions Architect AWS customers are connecting physical things to the cloud in every industry imaginable. Healthcare and Life Sciences Municipal Infrastructure

More information

4) An organization needs a data store to handle the following data types and access patterns:

4) An organization needs a data store to handle the following data types and access patterns: 1) A company needs to deploy a data lake solution for their data scientists in which all company data is accessible and stored in a central S3 bucket. The company segregates the data by business unit,

More information

Building Games with AWS Mobile Services

Building Games with AWS Mobile Services Building Games with AWS Mobile Services Ozkan Can Solutions Architect, AWS @_ozkancan How Do You Build a Mobile Game Today? AWS LAMBDA COMPUTE SERVICE EVENT DRIVEN Run code without thinking about servers

More information

AWS Security Overview. Bill Shinn Principal Security Solutions Architect

AWS Security Overview. Bill Shinn Principal Security Solutions Architect AWS Security Overview Bill Shinn Principal Security Solutions Architect Accelerating Security with AWS AWS Overview / Risk Management / Compliance Overview Identity / Privilege Isolation Roles for EC2

More information

Zombie Apocalypse Workshop

Zombie Apocalypse Workshop Zombie Apocalypse Workshop Building Serverless Microservices Danilo Poccia @danilop Paolo Latella @LatellaPaolo September 22 nd, 2016 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

More information

Securing Serverless Architectures

Securing Serverless Architectures Securing Serverless Architectures Dave Walker, Specialist Solutions Architect, Security and Compliance Berlin 12/04/16 2016, Web Services, Inc. or its Affiliates. All rights reserved. With Thanks To: Agenda

More information

How to use or not use the AWS API Gateway for Microservices

How to use or not use the AWS API Gateway for Microservices How to use or not use the AWS API Gateway for Microservices Presented by Dr. Martin Merck Wednesday 26 September 2018 What is an API Gateway Traits AWS API Gateway Features of API gateway OAuth2.0 Agenda

More information

Serverless Computing. Redefining the Cloud. Roger S. Barga, Ph.D. General Manager Amazon Web Services

Serverless Computing. Redefining the Cloud. Roger S. Barga, Ph.D. General Manager Amazon Web Services Serverless Computing Redefining the Cloud Roger S. Barga, Ph.D. General Manager Amazon Web Services Technology Triggers Highly Recommended http://a16z.com/2016/12/16/the-end-of-cloud-computing/ Serverless

More information

Going Serverless. Building Production Applications Without Managing Infrastructure

Going Serverless. Building Production Applications Without Managing Infrastructure Going Serverless Building Production Applications Without Managing Infrastructure Objectives of this talk Outline what serverless means Discuss AWS Lambda and its considerations Delve into common application

More information

Title: Planning AWS Platform Security Assessment?

Title: Planning AWS Platform Security Assessment? Title: Planning AWS Platform Security Assessment? Name: Rajib Das IOU: Cyber Security Practices TCS Emp ID: 231462 Introduction Now-a-days most of the customers are working in AWS platform or planning

More information

Security Aspekts on Services for Serverless Architectures. Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance

Security Aspekts on Services for Serverless Architectures. Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance Security Aspekts on Services for Serverless Architectures Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance Agenda: Security in General Services in Scope Aspects of Services for

More information

The Orion Papers. AWS Solutions Architect (Associate) Exam Course Manual. Enter

The Orion Papers. AWS Solutions Architect (Associate) Exam Course Manual. Enter AWS Solutions Architect (Associate) Exam Course Manual Enter Linux Academy Keller, Texas United States of America March 31, 2017 To All Linux Academy Students: Welcome to Linux Academy's AWS Certified

More information

Red Team View: Gaps in the Serverless Attack Surface.

Red Team View: Gaps in the Serverless Attack Surface. SESSION ID: CSV-W12 Red Team View: Gaps in the Serverless Attack Surface. Mike Cotton SVP Research & Development Digital Defense Inc. Overview Shift in Technology -> Shift in Tactics Serverless Another

More information

Advanced Usage of the AWS CLI. Brian Wagner, Solutions Architect

Advanced Usage of the AWS CLI. Brian Wagner, Solutions Architect Berlin Advanced Usage of the AWS CLI Brian Wagner, Solutions Architect Crash Course Intro to the AWS CLI Foundation Exploring Key Functionality Advanced Scenarios Looking at Advanced CLI Features Crash

More information

SAMPLE CHAPTER. Event-driven serverless applications. Danilo Poccia. FOREWORD BY James Governor MANNING

SAMPLE CHAPTER. Event-driven serverless applications. Danilo Poccia. FOREWORD BY James Governor MANNING SAMPLE CHAPTER Event-driven serverless applications Danilo Poccia FOREWORD BY James Governor MANNING AWS Lambda in Action by Danilo Poccia Chapter 8 Copyright 2017 Manning Publications brief contents PART

More information

Shine and Security. Our app is playful and encourages sharing, but we take keeping this information secure very seriously.

Shine and Security. Our app is playful and encourages sharing, but we take keeping this information secure very seriously. Shine and Security Shine and Security Shine users entrust us with keeping track of the everyday actions they take to help them better themselves, their community and our planet. Putting our users first

More information

Quick start guide for Infscape UrBackup Appliance on Amazon Web Services

Quick start guide for Infscape UrBackup Appliance on Amazon Web Services Quick start guide for Infscape UrBackup Appliance on Amazon Web Services Purpose of this document This document will give detailed step-by-step instructions on how to get Infscape UrBackup Appliance running

More information

2016 Infoblox Inc. All rights reserved. Implementing AWS Route 53 Synchronization Infoblox-DG January 2016 Page 1 of 8

2016 Infoblox Inc. All rights reserved. Implementing AWS Route 53 Synchronization Infoblox-DG January 2016 Page 1 of 8 2016 Infoblox Inc. All rights reserved. Implementing AWS Route 53 Synchronization Infoblox-DG-0136-00 January 2016 Page 1 of 8 Contents Introduction... 3 Infoblox and Route 53 Synchronization... 3 Prerequisites...

More information

8/3/17. Encryption and Decryption centralized Single point of contact First line of defense. Bishop

8/3/17. Encryption and Decryption centralized Single point of contact First line of defense. Bishop Bishop Encryption and Decryption centralized Single point of contact First line of defense If working with VPC Creation and management of security groups Provides additional networking and security options

More information

IoT Device Simulator

IoT Device Simulator IoT Device Simulator AWS Implementation Guide Sean Senior May 2018 Copyright (c) 2018 by Amazon.com, Inc. or its affiliates. IoT Device Simulator is licensed under the terms of the Amazon Software License

More information

Advanced API Security

Advanced API Security Advanced API Security ITANA Group Nuwan Dias Architect 22/06/2017 Agenda 2 HTTP Basic Authentication Authorization: Basic QWxhZGRpbjpPcGVuU2VzYW1l 3 API Security is about controlling Access Delegation

More information

Building Secure and Scalable Mobile Apps on AWS

Building Secure and Scalable Mobile Apps on AWS Building Secure and Scalable Mobile Apps on AWS Dennis Hills Mobile Developer Advocate, Amazon Web Services April 20, 2017 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Agenda

More information

Amazon Mobile Analytics. User Guide

Amazon Mobile Analytics. User Guide Amazon Mobile Analytics User Guide Amazon Mobile Analytics: User Guide Copyright 2018 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be

More information

Cloud Catastrophes. and how to avoid them

Cloud Catastrophes. and how to avoid them Cloud Catastrophes and how to avoid them Who? Mike Haworth Nope Works for: Insomnia Security Bio: Extensive biographical information Extensive biographical information Extensive biographical information

More information

Using OAuth 2.0 to Access ionbiz APIs

Using OAuth 2.0 to Access ionbiz APIs Using OAuth 2.0 to Access ionbiz APIs ionbiz APIs use the OAuth 2.0 protocol for authentication and authorization. ionbiz supports common OAuth 2.0 scenarios such as those for web server, installed, and

More information

Administrator Guide Administrator Guide

Administrator Guide Administrator Guide AutobotAI account setup process with AWS account linking In order to provide AWS account access to autobotai skill, It has to be configured in https://autobot.live portal. Currently only one account can

More information

Datto Disaster Tracking

Datto Disaster Tracking Datto Disaster Tracking Design/Architecture Document Masters of Disaster Nsama Chipalo, Brandon Cole, Aaron Damrau, Jhossue Jimenez, Jacob Peterson Last Updated May 11th, 2015 Table of Contents Table of

More information

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK

EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS 03 EXECUTIVE OVERVIEW 05 INTRODUCTION 07 MORE CLOUD DEPLOYMENTS MEANS MORE ACCESS 09 IDENTITY FEDERATION IN

More information

Amazon Web Services. Block 402, 4 th Floor, Saptagiri Towers, Above Pantaloons, Begumpet Main Road, Hyderabad Telangana India

Amazon Web Services. Block 402, 4 th Floor, Saptagiri Towers, Above Pantaloons, Begumpet Main Road, Hyderabad Telangana India (AWS) Overview: AWS is a cloud service from Amazon, which provides services in the form of building blocks, these building blocks can be used to create and deploy various types of application in the cloud.

More information

BERLIN. 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved

BERLIN. 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved BERLIN 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved Building Multi-Region Applications Jan Metzner, Solutions Architect Brian Wagner, Solutions Architect 2015, Amazon Web Services,

More information

AWS Mobile Hub. Build, Test, and Monitor Your Mobile Apps. Daniel Geske, Solutions Architect 31 May 2017

AWS Mobile Hub. Build, Test, and Monitor Your Mobile Apps. Daniel Geske, Solutions Architect 31 May 2017 AWS Mobile Hub Build, Test, and Monitor Your Mobile Apps Daniel Geske, Solutions Architect 31 May 2017 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What to Expect from the Session

More information

Develop and test your Mobile App faster on AWS

Develop and test your Mobile App faster on AWS Develop and test your Mobile App faster on AWS Carlos Sanchiz, Solutions Architect @xcarlosx26 #AWSSummit 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. The best mobile apps are

More information

Overview of AWS Security - Database Services

Overview of AWS Security - Database Services Overview of AWS Security - Database Services June 2016 (Please consult http://aws.amazon.com/security/ for the latest version of this paper) 2016, Amazon Web Services, Inc. or its affiliates. All rights

More information

AWS SDK for Node.js. Getting Started Guide Version pre.1 (developer preview)

AWS SDK for Node.js. Getting Started Guide Version pre.1 (developer preview) AWS SDK for Node.js Getting Started Guide Amazon Web Services AWS SDK for Node.js: Getting Started Guide Amazon Web Services Copyright 2012 Amazon Web Services LLC or its affiliates. All rights reserved.

More information

Authorization and Authentication

Authorization and Authentication CHAPTER 2 Cisco WebEx Social API requests must come through an authorized API consumer and be issued by an authenticated Cisco WebEx Social user. The Cisco WebEx Social API uses the Open Authorization

More information

Package aws.transcribe

Package aws.transcribe Type Package Title Client for 'AWS Transcribe' Version 0.1.2 Date 2018-04-09 Package aws.transcribe April 9, 2018 Client for 'AWS Transcribe' , a cloud

More information

Best Practices for Cloud Security at Scale. Phil Rodrigues Security Solutions Architect Amazon Web Services, ANZ

Best Practices for Cloud Security at Scale. Phil Rodrigues Security Solutions Architect Amazon Web Services, ANZ Best Practices for Cloud Security at Scale Phil Rodrigues Security Solutions Architect Web Services, ANZ www.cloudsec.com #CLOUDSEC Best Practices for Security at Scale Best of the Best tips for Security

More information

Lab 2 Third Party API Integration, Cloud Deployment & Benchmarking

Lab 2 Third Party API Integration, Cloud Deployment & Benchmarking Lab 2 Third Party API Integration, Cloud Deployment & Benchmarking In lab 1, you have setup the web framework and the crawler. In this lab, you will complete the deployment flow for launching a web application

More information

Amazon Cognito Sync. API Reference API Version

Amazon Cognito Sync. API Reference API Version Amazon Cognito Sync API Reference Amazon Cognito Sync: API Reference Copyright 2014 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following are trademarks of Amazon Web Services,

More information

Securing Microservices Containerized Security in AWS

Securing Microservices Containerized Security in AWS Securing Microservices Containerized Security in AWS Mike Gillespie, Solutions Architect, Amazon Web Services Splitting Monoliths Ten Years Ago Splitting Monoliths Ten Years Ago XML & SOAP Splitting Monoliths

More information

MOBILE APP FOR ACME INC. by Sean Hull - Cloud Solutions Architect -

MOBILE APP FOR ACME INC. by Sean Hull - Cloud Solutions Architect - MOBILE APP FOR ACME INC. by Sean Hull - Cloud Solutions Architect - sean@iheavy.com ABOUT SEAN HULL +1-917-442-3939 sean@iheavy.com iheavy.com/blog about.me/hullsean github.com/hullsean NEWSLETTER - SIGNUP!

More information

Microservices without the Servers: AWS Lambda in Action

Microservices without the Servers: AWS Lambda in Action Microservices without the Servers: AWS Lambda in Action Dr. Tim Wagner, General Manager AWS Lambda August 19, 2015 Seattle, WA 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved Two

More information

High School Technology Services myhsts.org Certification Courses

High School Technology Services myhsts.org Certification Courses AWS Associate certification training Last updated on June 2017 a- AWS Certified Solutions Architect (40 hours) Amazon Web Services (AWS) Certification is fast becoming the must have certificates for any

More information

Serverless Single Page Web Apps, Part Four. CSCI 5828: Foundations of Software Engineering Lecture 24 11/10/2016

Serverless Single Page Web Apps, Part Four. CSCI 5828: Foundations of Software Engineering Lecture 24 11/10/2016 Serverless Single Page Web Apps, Part Four CSCI 5828: Foundations of Software Engineering Lecture 24 11/10/2016 1 Goals Cover Chapter 4 of Serverless Single Page Web Apps by Ben Rady Present the issues

More information

AWS Mobile Services 7/7/2014. Marco Argenti, Vice President

AWS Mobile Services 7/7/2014. Marco Argenti, Vice President AWS Mobile Services 7/7/2014 Marco Argenti, Vice President Agenda AWS Overview AWS Mobile Services Overview Amazon Cognito Amazon Mobile Analytics Amazon SNS Pricing/Availability Q&A 7/7/2014 Slides not

More information

Getting Started with AWS IoT

Getting Started with AWS IoT Getting Started with AWS IoT Denis V. Batalov, PhD @dbatalov Sr. Solutions Architect, AWS EMEA 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Things are becoming connected Source:

More information

Amazon WorkDocs. Developer Guide

Amazon WorkDocs. Developer Guide Amazon WorkDocs Developer Guide Amazon WorkDocs: Developer Guide Copyright 2017 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used

More information

Container-Native Applications

Container-Native Applications Container-Native Applications Security, Logging, Tracing Matthias Fuchs, @hias222 DOAG 2018 Exa & Middleware Days, 2018/06/19 Microservice Example Flow Oracle Cloud Details Logging Security, OAuth, TLS

More information

Crypto-Options on AWS. Bertram Dorn Specialized Solutions Architect Security/Compliance Network/Databases Amazon Web Services Germany GmbH

Crypto-Options on AWS. Bertram Dorn Specialized Solutions Architect Security/Compliance Network/Databases Amazon Web Services Germany GmbH Crypto-Options on AWS Bertram Dorn Specialized Solutions Architect Security/Compliance Network/Databases Amazon Web Services Germany GmbH Amazon.com, Inc. and its affiliates. All rights reserved. Agenda

More information

How to ensure OpenStack Swift & Amazon S3 Conformance for storage products & services supporting multiple Object APIs

How to ensure OpenStack Swift & Amazon S3 Conformance for storage products & services supporting multiple Object APIs How to ensure OpenStack Swift & Amazon S3 Conformance for storage products & services supporting multiple Object APIs Ankit Agrawal Tata Consultancy Services Ltd. 30 May 2017 1 Copyright 2017 Tata Consultancy

More information

Qualys Cloud Platform (VM, PC) v8.x Release Notes

Qualys Cloud Platform (VM, PC) v8.x Release Notes Qualys Cloud Platform (VM, PC) v8.x Release Notes Version 8.18.1 April 1, 2019 This new release of the Qualys Cloud Platform (VM, PC) includes improvements to Vulnerability Management and Policy Compliance.

More information

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting

More information

At Course Completion Prepares you as per certification requirements for AWS Developer Associate.

At Course Completion Prepares you as per certification requirements for AWS Developer Associate. [AWS-DAW]: AWS Cloud Developer Associate Workshop Length Delivery Method : 4 days : Instructor-led (Classroom) At Course Completion Prepares you as per certification requirements for AWS Developer Associate.

More information

TestkingPass. Reliable test dumps & stable pass king & valid test questions

TestkingPass.   Reliable test dumps & stable pass king & valid test questions TestkingPass http://www.testkingpass.com Reliable test dumps & stable pass king & valid test questions Exam : AWS-Solutions-Architect- Associate Title : AWS Certified Solutions Architect - Associate Vendor

More information

Managing Protected and Controlled Data with Globus. Vas Vasiliadis

Managing Protected and Controlled Data with Globus. Vas Vasiliadis Managing Protected and Controlled Data with Globus Vas Vasiliadis vas@uchicago.edu Globus SaaS: Research data lifecycle Instrument 1 Researcher initiates transfer request; or requested automatically by

More information

Single Sign-On Showdown

Single Sign-On Showdown Single Sign-On Showdown ADFS vs Pass-Through Authentication Max Fritz Solutions Architect SADA Systems #ITDEVCONNECTIONS Azure AD Identity Sync & Auth Timeline 2009 2012 DirSync becomes Azure AD Sync 2013

More information

PowerExchange for Facebook: How to Configure Open Authentication using the OAuth Utility

PowerExchange for Facebook: How to Configure Open Authentication using the OAuth Utility PowerExchange for Facebook: How to Configure Open Authentication using the OAuth Utility 2013 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means

More information

Certificate of Registration

Certificate of Registration Certificate of Registration THIS IS TO CERTIFY THAT 2001 8th Ave, Seattle, WA 98121 USA operates AWS using IaaS model (Amazon CloudFront, Amazon Elastic Block Store (EBS), Amazon Elastic Compute Cloud

More information

Security on AWS(overview) Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance

Security on AWS(overview) Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance Security on AWS(overview) Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance Agenda: Overview AWS Regions Availability Zones Shared Responsibility Security Features Best Practices

More information

Jan Metzner. Solutions Architect Mobile/IoT EMEA, Amazon Web Services. 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

Jan Metzner. Solutions Architect Mobile/IoT EMEA, Amazon Web Services. 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Jan Metzner Solutions Architect Mobile/IoT EMEA, Amazon Web Services 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Welche Themen werden wir in diesem Webinar behandeln? Authentifizierung

More information

Office 365 and Azure Active Directory Identities In-depth

Office 365 and Azure Active Directory Identities In-depth Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication

More information

Leveraging the Globus Platform in your Web Applications. GlobusWorld April 26, 2018 Greg Nawrocki

Leveraging the Globus Platform in your Web Applications. GlobusWorld April 26, 2018 Greg Nawrocki Leveraging the Globus Platform in your Web Applications GlobusWorld April 26, 2018 Greg Nawrocki greg@globus.org Topics and Goals Platform Overview Why expose the APIs A quick touch of the Globus Auth

More information

How to Route Internet Traffic between A Mobile Application and IoT Device?

How to Route Internet Traffic between A Mobile Application and IoT Device? Whitepaper How to Route Internet Traffic between A Mobile Application and IoT Device? Website: www.mobodexter.com www.paasmer.co 1 Table of Contents 1. Introduction 3 2. Approach: 1 Uses AWS IoT Setup

More information

Integration Guide. SafeNet Authentication Service (SAS)

Integration Guide. SafeNet Authentication Service (SAS) Integration Guide SafeNet Authentication Service (SAS) Revised: 10 June 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating

More information

AWS Connected Vehicle Cloud

AWS Connected Vehicle Cloud AWS Connected Vehicle Cloud AWS Implementation Guide Sean Senior Chris Rec Hitendra Nishar Tom Horton November 2017 Copyright (c) 2017 by Amazon.com, Inc. or its affiliates. The AWS Connected Vehicle Cloud

More information

Serverless Architecture Hochskalierbare Anwendungen ohne Server. Sascha Möllering, Solutions Architect

Serverless Architecture Hochskalierbare Anwendungen ohne Server. Sascha Möllering, Solutions Architect Serverless Architecture Hochskalierbare Anwendungen ohne Server Sascha Möllering, Solutions Architect Agenda Serverless Architecture AWS Lambda Amazon API Gateway Amazon DynamoDB Amazon S3 Serverless Framework

More information

ViGo Architecture and Principles. Mobile Voice Biometrics as-a-service

ViGo Architecture and Principles. Mobile Voice Biometrics as-a-service ViGo Architecture and Principles Mobile Voice Biometrics as-a-service Part number: VV/VIGO/DOC/183/C Copyright 2015 VoiceVault Inc. All rights reserved. This document may not be copied, reproduced, transmitted

More information

Digital Democracy Video Manager

Digital Democracy Video Manager Digital Democracy Video Manager by Scott Lam Computer Science Department College of Engineering California Polytechnic State University 2016 Date Submitted: March 18, 2016 Advisor: Alex Dekhtyar Table

More information

AWS IAM User Guide for Cohesive Networks Support. Creating an Amazon Identity and Access Management User with "read only" policy

AWS IAM User Guide for Cohesive Networks Support. Creating an Amazon Identity and Access Management User with read only policy AWS IAM User Guide for Cohesive Networks Support Creating an Amazon Identity and Access Management User with "read only" policy 2016 Table of Contents Access the AWS IAM Service via AWS Portal 3 Create

More information

Sophos Mobile Control Network Access Control interface guide. Product version: 7

Sophos Mobile Control Network Access Control interface guide. Product version: 7 Sophos Mobile Control Network Access Control interface guide Product version: 7 Document date: January 2017 Contents 1 About this guide...3 2 About Sophos Mobile Control...4 3 Sophos Mobile Control NAC

More information

Thomson Reuters Graph Feed & Amazon Neptune

Thomson Reuters Graph Feed & Amazon Neptune Thomson Reuters Graph Feed & Amazon Neptune Tutorial on how to use Amazon Neptune as a graph-database alternative to explore Thomson Reuters Graph Feed. Pratik Pandey Jan 24th, 2018 End of November last

More information

Exam Questions AWS-Certified- Developer-Associate

Exam Questions AWS-Certified- Developer-Associate Exam Questions AWS-Certified- Developer-Associate Amazon AWS Certified Developer Associate https://www.2passeasy.com/dumps/aws-certified- Developer-Associate/ 1. When using Amazon SQS how much data can

More information

Amazon AWS-Solutions-Architect-Professional Exam

Amazon AWS-Solutions-Architect-Professional Exam Volume: 392 Questions Question: 1 By default, Amazon Cognito maintains the last-written version of the data. You can override this behavior and resolve data conflicts programmatically. In addition, push

More information

Level Up Your CF Apps with Amazon Web Services

Level Up Your CF Apps with Amazon Web Services Level Up Your CF Apps with Amazon Web Services Brian Klaas bklaas@jhu.edu @brian_klaas Level Up Your CF Apps with Amazon Web Services Brian Klaas bklaas@jhu.edu @brian_klaas Hello Hello Hello Hello Hello

More information

20537A: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack

20537A: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack 20537A: Configuring and Operating a Hybrid Cloud with Course Details Course Code: Duration: Notes: 20537A 5 days Elements of this syllabus are subject to change. About this course This five-day course

More information

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3 ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic

More information

Installation and Configuration Guide Simba Technologies Inc.

Installation and Configuration Guide Simba Technologies Inc. Simba Athena ODBC Driver with SQL Connector Installation and Configuration Guide Simba Technologies Inc. Version 1.0.2 December 11, 2017 Copyright 2017 Simba Technologies Inc. All Rights Reserved. Information

More information

SAMPLE CHAPTER. Event-driven serverless applications. Danilo Poccia. FOREWORD BY James Governor MANNING

SAMPLE CHAPTER. Event-driven serverless applications. Danilo Poccia. FOREWORD BY James Governor MANNING SAMPLE CHAPTER Event-driven serverless applications Danilo Poccia FOREWORD BY James Governor MANNING in Action by Danilo Poccia Chapter 1 Copyright 2017 Manning Publications brief contents PART 1 FIRST

More information

Serverless The Future of the Cloud?!

Serverless The Future of the Cloud?! DEV4867 Serverless The Future of the Cloud?! by Bert Ertman Those who stand for nothing, fall for anything - Alexander Hamilton @BertErtman Fellow, Director of Technology Outreach at Luminis Background

More information

Are You Sure Your AWS Cloud Is Secure? Alan Williamson Solution Architect at TriNimbus

Are You Sure Your AWS Cloud Is Secure? Alan Williamson Solution Architect at TriNimbus Are You Sure Your AWS Cloud Is Secure? Alan Williamson Solution Architect at TriNimbus 1 60 Second AWS Security Review 2 AWS Terminology Identity and Access Management (IAM) - AWS Security Service to manage

More information

Containers or Serverless? Mike Gillespie Solutions Architect, AWS Solutions Architecture

Containers or Serverless? Mike Gillespie Solutions Architect, AWS Solutions Architecture Containers or Serverless? Mike Gillespie Solutions Architect, AWS Solutions Architecture A Typical Application with Microservices Client Webapp Webapp Webapp Greeting Greeting Greeting Name Name Name Microservice

More information

Simple Security for Startups. Mark Bate, AWS Solutions Architect

Simple Security for Startups. Mark Bate, AWS Solutions Architect BERLIN Simple Security for Startups Mark Bate, AWS Solutions Architect Agenda Our Security Compliance Your Security Account Management (the keys to the kingdom) Service Isolation Visibility and Auditing

More information

Amazon WorkDocs. Administration Guide

Amazon WorkDocs. Administration Guide Amazon WorkDocs Administration Guide Amazon WorkDocs: Administration Guide Copyright 2018 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not

More information

Question: 1 Which three methods can you use to manage Oracle Cloud Infrastructure services? (Choose three.)

Question: 1 Which three methods can you use to manage Oracle Cloud Infrastructure services? (Choose three.) Volume: 91 Questions Question: 1 Which three methods can you use to manage Oracle Cloud Infrastructure services? (Choose three.) A. Oracle Cloud Infrastructure Desktop Client B. Oracle Cloud Infrastructure

More information

Unified Secure Access Beyond VPN

Unified Secure Access Beyond VPN Unified Secure Access Beyond VPN Luboš Klokner F5 Systems Engineer lubos@f5.com +421 908 755152 @lklokner Humans v. Technology F5 Networks, Inc Agenda Introduction General APM Use-Cases APM Use-Cases from

More information

Nasuni Data API Nasuni Corporation Boston, MA

Nasuni Data API Nasuni Corporation Boston, MA Nasuni Corporation Boston, MA Introduction The Nasuni API has been available in the Nasuni Filer since September 2012 (version 4.0.1) and is in use by hundreds of mobile clients worldwide. Previously,

More information

OAuth2lib. implementation

OAuth2lib.   implementation OAuth2lib http://tools.ietf.org/html/ietf-oauth-v2-08 implementation 24 Junio 2010 Índice de contenido Oauth2lib v05...1 Introduction...3 Documentation...4 OAuth2 Assertion Flow...4 Authorization Flow...4

More information

WHITEPAPER. Security overview. podio.com

WHITEPAPER. Security overview. podio.com WHITEPAPER Security overview Podio security White Paper 2 Podio, a cloud service brought to you by Citrix, provides a secure collaborative work platform for team and project management. Podio features

More information

Installation and Configuration Guide Simba Technologies Inc.

Installation and Configuration Guide Simba Technologies Inc. Simba Athena ODBC Driver with SQL Connector Installation and Configuration Guide Simba Technologies Inc. Version 1.0.4 November 14, 2018 Copyright 2018 Simba Technologies Inc. All Rights Reserved. Information

More information

70-487: Developing Windows Azure and Web Services

70-487: Developing Windows Azure and Web Services 70-487: Developing Windows Azure and Web Services Candidates for this certification are professional developers that use Visual Studio 2015112017 11 and the Microsoft.NET Core Framework 4.5 to design and

More information

Developing Microsoft Azure Solutions (70-532) Syllabus

Developing Microsoft Azure Solutions (70-532) Syllabus Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages

More information

Testbed-12 TEAM Engine Virtualization User Guide

Testbed-12 TEAM Engine Virtualization User Guide Testbed-12 TEAM Engine Virtualization User Guide Table of Contents 1. Introduction............................................................................. 3 2. VirtualBox...............................................................................

More information

RSA NetWitness Platform

RSA NetWitness Platform RSA NetWitness Platform AWS CloudTrail Last Modified: Tuesday, May 1, 2018 Event Source Product Information: Vendor: Amazon Web Services Event Source: AWS CloudTrail Versions: all RSA Product Information:

More information

MxVision WeatherSentry Web Services REST Programming Guide

MxVision WeatherSentry Web Services REST Programming Guide MxVision WeatherSentry Web Services REST Programming Guide DTN 11400 Rupp Drive Minneapolis, MN 55337 00.1.952.890.0609 This document and the software it describes are copyrighted with all rights reserved.

More information

AWS Storage Gateway. Not your father s hybrid storage. University of Arizona IT Summit October 23, Jay Vagalatos, AWS Solutions Architect

AWS Storage Gateway. Not your father s hybrid storage. University of Arizona IT Summit October 23, Jay Vagalatos, AWS Solutions Architect AWS Storage Gateway Not your father s hybrid storage University of Arizona IT Summit 2017 Jay Vagalatos, AWS Solutions Architect October 23, 2017 The AWS Storage Portfolio Amazon EBS (persistent) Block

More information

Cloud Gaming Architectures

Cloud Gaming Architectures Cloud Gaming Architectures From Social to Mobile to MMO Mark Bate, AWS Solutions Architect 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Gratuitous logo slide Scale to what you

More information

flask-dynamo Documentation

flask-dynamo Documentation flask-dynamo Documentation Release 0.1.2 Randall Degges January 22, 2018 Contents 1 User s Guide 3 1.1 Quickstart................................................ 3 1.2 Getting Help...............................................

More information

Course Overview This five-day course will provide participants with the key knowledge required to deploy and configure Microsoft Azure Stack.

Course Overview This five-day course will provide participants with the key knowledge required to deploy and configure Microsoft Azure Stack. [MS20537]: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Length : 5 Days Audience(s) : IT Professionals Level : 300 Technology : Azure Delivery Method : Instructor-led (Classroom)

More information

VULNERABILITY ADVISORY

VULNERABILITY ADVISORY VULNERABILITY ADVISORY Title ManageEngine OpManager Multiple Authenticated RCE Vulnerabilities Date Released 19/06/2018 Author Vendor Website Affected Software Denis Andzakovic https://www.manageengine.com/network-monitoring/

More information