Open SSO Management. Joint Session Desktop + Security + Distributed System Management

Size: px
Start display at page:

Download "Open SSO Management. Joint Session Desktop + Security + Distributed System Management"

Transcription

1 Open SSO Management Joint Session Desktop + Security + Distributed System Management

2 LDAP Contents TOG LDAP Project Overview Other LDAP-Related Work SSO Management Recap SSO Requirements Review of General Approach Program Responsibilities and Liaisons Timeline and Actions Schema Review

3 LDAP Lightweight Directory Access Protocol

4 LDAP Developed at the University of Michigan Taken up by Netscape and others Standardized in IETF LDAP v2 widely implemented LDAP v3 = v2 + (referrals + i18n +schema + extensibility + security) Proposed Standard (RFC 2251)

5 IT Dial LDAP Tone (TM)

6 What We Are Doing Test Suite SERVER profiles of IETF RFCs for Read Only Read-Write Internet White Pages Certificates Certification Program

7 Profile Specification Working Group One meeting (last November) 5 TOG-member system vendors (Fujitsu, Hitachi, IBM, SNI, Sun) 5 other major companies (AT&T, GTE, Microsoft, Netscape, Novell) 4 other companies (CAI, Isocor, MBI, Xcert) Eurosinet Liaison

8 Branding Options Stand-alone LDAP Brand Part of other Brands Web Server SSO...

9 Milestones Group formed last November Base documents agreed in principle Branding Plan end January Read-Only and Read-Write profiles end February Other profiles end April

10 LDAP Project - Key Points Opportunity for TOG to provide practical valueadd to industry LDAP work Certification program leverages off existing TOG test suite / brand structures Participation of principal players Strong ties with IETF WGs Focused effort for early deliverables Self-funding

11 Other Related LDAP Work IETF Microsoft/Cisco Initiative Device Protocol Media Application User New PKIX Work-item...

12 SSO Requirements Coordinated login Secure SSO Consolidated account management

13 SSO - Starting point Auth DB Auth DB Access Control Access Control

14 SSO - Consoldiated Login Sign -on Auth DB Access Control Auth DB Access Control

15 SSO - Secured Sign -on Sec Services SSL, S/MIME IPSEC etc Sec Services Access Control Sec Services DCE, CORBA, Activex etc Sec Services Access Control

16 SSO - Consolidated Management Consolidated Account Management Sign -on Sec Services SSL, CORBA S/MIME, DCE, etc Sec Services Access Control Sec Services Sec Services Access Control

17 Security Management Multi-vendor requirements APIs LDAP POSIX Vendor APIs Protocols SNMP V3 LDAP Vendors products

18 LDAP-related Work IETF schema registration white pages schema LDAP V3 (security, replication etc) LDAP API Complementary TOG Work LDAP/DCE Profile Definition / Certification System security schemas

19 Focus Following Boston Mtg Account Management Options TOG endorse existing vendor solution <=== no enthusiasm for that at SEP97 meeting TOG contribute to standard-based security management <=== agreed at SEP97 meeting Short-term LDAP Schemas Review Proposal Future Directions Initial implementations, Brand, Extensions...

20 Open SSO Management Feedback on general approach

21 LDAP Program Responsibilities general schema definition test suite definition ASID Liaison Management Review/comment Complementary APIs Security system security schema definitions/adoption PKIX Liaison

22 Timeline Management Program Review and comment Potentially produce user management commands Security Program Sec PG vendor inputs by 13FEB SSO Profiles D1 SSO Profile D2 Input to Company Review 1Q98 20FEB 2Q98 22MAY 3Q98 23JAN 28FEB 30APR 14AUG LDAP Program LDAP Profiles including SSO Framework r/o & r/w LDAP Profiles IWP / cert / SSO Framework LDAP Profiles Approved SSO Profile DRAFTS FINAL FINAL

23 Open SSO Management Schema review

Stakeholder consultation process and online consultation platform

Stakeholder consultation process and online consultation platform Stakeholder consultation process and online consultation platform Grant agreement no.: 633107 Deliverable No. D6.2 Stakeholder consultation process and online consultation platform Status: Final Dissemination

More information

North American Portability Management, LLC Transition Oversight Manager. TOEP Webcast November 7, 2017

North American Portability Management, LLC Transition Oversight Manager. TOEP Webcast November 7, 2017 North American Portability Management, LLC Transition Oversight Manager TOEP Webcast November 7, 2017 Welcome to today s webcast Submit Questions for Q&A Webcast Issues Click the Q&A widget at the bottom

More information

BusinessObjects Enterprise XI

BusinessObjects Enterprise XI Overview Contents This document contains information on LDAP authentication and how to configure with this type of authentication. INTRODUCTION... 2 What Is LDAP?...2 LDAP platforms supported by...3 LDAP

More information

OHIO. [white paper] Understanding the Web-to-Host Application Programming Interface. Jacinthe Paradis. Eugène Aresteanu. eicon technology corporation

OHIO. [white paper] Understanding the Web-to-Host Application Programming Interface. Jacinthe Paradis. Eugène Aresteanu. eicon technology corporation eicon technology corporation Understanding the Web-to-Host Application Programming Interface November 1999 Jacinthe Paradis Senior Program Manager, SNA Access Business Unit Eugène Aresteanu Senior Architect,SNA

More information

IBM KeyWorks Accelerate Development of your Secure e-business Solutions Sekar Chandersekaran IBM

IBM KeyWorks Accelerate Development of your Secure e-business Solutions Sekar Chandersekaran IBM IBM KeyWorks Accelerate Development of your Secure e-business Solutions Sekar Chandersekaran IBM chanders@us.ibm.com IBM KeyWorks Market Needs History KeyWorks KeyWorks KeyWorks KeyWorks KeyWorks Suite

More information

by Amy E. Smith, ShiuFun Poon, and John Wray

by Amy E. Smith, ShiuFun Poon, and John Wray Level: Intermediate Works with: Domino 6 Updated: 01-Oct-2002 by Amy E. Smith, ShiuFun Poon, and John Wray Domino 4.6 introduced the certificate authority (CA), a trusted server-based administration tool

More information

PASS4TEST. IT Certification Guaranteed, The Easy Way! We offer free update service for one year

PASS4TEST. IT Certification Guaranteed, The Easy Way!  We offer free update service for one year PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : 070-220 Title : Designing Security for a Microsoft Windows 2000 Network

More information

Network Device Provisioning

Network Device Provisioning Network Device Provisioning Spring Internet2 Meeting April 23, 2013 Jim Jokl University of Virginia 1 The Problem Set Enable the use of strong authentication Passwords are painful and phishing is easy

More information

Data Sheet NCP Secure Enterprise Management

Data Sheet NCP Secure Enterprise Management Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Administration and license management system for NCP Exclusive Remote Access Clients Enables easy rollout and

More information

North American Portability Management, LLC Transition Oversight Manager. TOEP Webcast December 12, 2017

North American Portability Management, LLC Transition Oversight Manager. TOEP Webcast December 12, 2017 North American Portability Management, LLC Transition Oversight Manager TOEP Webcast December 12, 2017 Welcome to today s webcast Submit Questions for Q&A Webcast Issues Click the Q&A widget at the bottom

More information

Identity Management Technology

Identity Management Technology Identity Management Technology Version 1.0 Dr. Horst Walther, Software Integration GmbH, 2004-10-20 Lefkosia / Cyprus Technology Evolution how did we get here? Directory services Metadirectory services

More information

Inventions on using LDAP for different purposes- Part-1

Inventions on using LDAP for different purposes- Part-1 From the SelectedWorks of Umakant Mishra September, 2006 Inventions on using LDAP for different purposes- Part-1 Umakant Mishra Available at: https://works.bepress.com/umakant_mishra/62/ Inventions on

More information

NCP Exclusive Remote Access Management

NCP Exclusive Remote Access Management Centrally Managed VPN Fully Automatic Operation of a Remote Access VPN via a Single Console Administration and license management system for NCP Exclusive Remote Access Clients Enables easy rollout and

More information

NCP Secure Enterprise Management for Windows Release Notes

NCP Secure Enterprise Management for Windows Release Notes Service Release: 4.05 r35843 Date: June 2017 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows Server 2016 64 Bit Windows Server

More information

LDAP Directory Services

LDAP Directory Services ATTENTION LDAP Directory Services THE MATERIAL PROVIDED IN THIS DOCUMENT IS FOR INFORMATION PURPOSES ONLY. IT IS NOT INTENDED TO BE ADVICE. YOU SHOULD NOT ACT OR ABSTAIN FROM ACTING BASED UPON SUCH INFORMATION

More information

Single Sign-On Architectures. Jan De Clercq Senior Member of Technical Staff Technology Leadership Group Hewlett-Packard

Single Sign-On Architectures. Jan De Clercq Senior Member of Technical Staff Technology Leadership Group Hewlett-Packard Single Sign-On Architectures Jan De Clercq Senior Member of Technical Staff Technology Leadership Group Hewlett-Packard Agenda Trusted Security Infrastructures SSO: What and Why? SSO Architectures Extending

More information

Westinghouse UK AP1000 GENERIC DESIGN ASSESSMENT. Criticality control in SFP. Radwaste and Decommissioning

Westinghouse UK AP1000 GENERIC DESIGN ASSESSMENT. Criticality control in SFP. Radwaste and Decommissioning Westinghouse UK AP1000 GENERIC DESIGN ASSESSMENT Criticality control in SFP MAIN ASSESSMENT AREA Radiation Protection RELATED ASSESSMENT AREA(S) Fault Studies Radwaste and Decommissioning RESOLUTION PLAN

More information

Next Steps for WHOIS Accuracy Global Domains Division. ICANN June 2015

Next Steps for WHOIS Accuracy Global Domains Division. ICANN June 2015 Next Steps for WHOIS Accuracy Global Domains Division ICANN 53 24 June 2015 Agenda: Next Steps for WHOIS Accuracy Reporting System 1 2 3 Introduction and Implementation Approach Pilot Project and Lessons

More information

Internet Engineering Task Force (IETF) Request for Comments: 8000 Category: Standards Track. November 2016

Internet Engineering Task Force (IETF) Request for Comments: 8000 Category: Standards Track. November 2016 Internet Engineering Task Force (IETF) Request for Comments: 8000 Category: Standards Track ISSN: 2070-1721 W. Adamson NetApp N. Williams Cryptonector November 2016 Requirements for NFSv4 Multi-Domain

More information

IT Updates. Maryland Health Benefit Exchange Board Meeting April 15, Presented by: Isabel FitzGerald Secretary, DoIT

IT Updates. Maryland Health Benefit Exchange Board Meeting April 15, Presented by: Isabel FitzGerald Secretary, DoIT IT Updates Maryland Health Benefit Exchange Board Meeting April 15, 2014 Presented by: Isabel FitzGerald Secretary, DoIT A service of Maryland Health Benefit Exchange Agenda Overview of process for CT

More information

NCP Secure Enterprise Management for Linux Release Notes

NCP Secure Enterprise Management for Linux Release Notes Major Release: 4.01 r32851 Date: November 2016 Prerequisites The following x64 operating systems and databases with corresponding ODBC driver have been tested and released: Linux Distribution Database

More information

Previous Intranet Initial intranet created in 2002 Created solely by Information Systems Very utilitarian i Created to permit people to access forms r

Previous Intranet Initial intranet created in 2002 Created solely by Information Systems Very utilitarian i Created to permit people to access forms r ACHIEVA Cafe Steve McDonell Previous Intranet Initial intranet created in 2002 Created solely by Information Systems Very utilitarian i Created to permit people to access forms remotely Not much content

More information

Security Training Seminars An integral part of The Open Group Security Programme

Security Training Seminars An integral part of The Open Group Security Programme Security Training Seminars An integral part of The Open Group Security Programme Dean Adams Director, Security & Electronic Commerce Agenda Check! M Brief Overview of Security Program Key Projects Introduction

More information

NCP Secure Enterprise Management (Win) Release Notes

NCP Secure Enterprise Management (Win) Release Notes Service Release: 4.01 r32851 Datum: November 2016 Prerequisites Operating System Support The following Microsoft Operating Systems are supported with this release: Windows Server 2008 R2 64 Bit Windows

More information

Council, 8 February 2017 Information Technology Report Executive summary and recommendations

Council, 8 February 2017 Information Technology Report Executive summary and recommendations Council, 8 February 2017 Information Technology Report Executive summary and recommendations Introduction This report provides the Council with an update into the work of the Information Technology Directorate

More information

TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003

TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 TechSec WG: Related activities overview Information and discussion TechSec WG, RIPE-45 May 14, 2003 Yuri Demchenko Outline TechSec WG liaison with CSIRT community! Results and developments

More information

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION

ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION ISO STANDARD IMPLEMENTATION AND TECHNOLOGY CONSOLIDATION Cathy Bates Senior Consultant, Vantage Technology Consulting Group January 30, 2018 Campus Orientation Initiative and Project Orientation Project

More information

Status Update February 2007

Status Update February 2007 Austin Group Status Update February 2007 http://www.opengroup.org/austin/ UNIX is a registered trademark of The Open Group POSIX is a registered trademark o f The IEEE Summary The Austin Group JDOCS Procedures

More information

Public Key Infrastructure

Public Key Infrastructure Public Key Infrastructure Ed Crowley Summer 11 1 Topics Public Key Infrastructure Defined PKI Overview PKI Architecture Trust Models Components X.509 Certificates X.500 LDAP 2 Public Key Infrastructure

More information

No domain left behind:

No domain left behind: No domain left behind: is Let s Encrypt democratizing encryption? Maarten Aertsen 1, Maciej Korczyński 2, Giovane C. M. Moura 3, Samaneh Tajalizadehkhoob 2, Jan van den Berg 2 1 National Cyber Security

More information

Undergraduate Admission File

Undergraduate Admission File Undergraduate Admission File June 13, 2007 Information Resources and Communications Office of the President University of California Overview Population The Undergraduate Admission File contains data on

More information

ETSI All rights reserved

ETSI All rights reserved ETSI NFV POCS AND PLUGTESTS AS OPPORTUNITIES FOR COLLABORATION WHILE FOSTERING NFV INTEROPERABILITY Presented by Silvia Almagia ETSI (CTI) ETSI (NFV) meets OpenStack, Denver, September 2017 ABOUT CTI ETSI

More information

NFS Version 4 Security Update

NFS Version 4 Security Update NFS Version 4 Security Update Mike Eisler Sun Microsystems, Inc. mre@eng.sun.com 45th IETF Oslo July 11-16, 1999 NFS V4 Security 1 of 9 1999-07-08 Contents NFS V2/V3 security draft update Summary of issues

More information

CIMA Asia. Interactive Timetable Live Online

CIMA Asia. Interactive Timetable Live Online CIMA Asia Interactive Timetable 2017 2018 Live Online Version 1 Information last updated 09 October 2017 Please note: Information and dates in this timetable are subject to change. CIMA Cert BA Course

More information

IEEE 802 EC ITU standing committee

IEEE 802 EC ITU standing committee 1 IEEE 802 EC ITU standing committee Glenn Parsons - Ericsson glenn.parsons@ericsson.com +1 613 963 8141 March 2017 2 Agenda for March meeting Role of this standing committee IEEE membership in ITU IEEE-SA

More information

CIMA Certificate BA Interactive Timetable

CIMA Certificate BA Interactive Timetable CIMA Certificate BA Interactive Timetable 2018 Nottingham & Leicester Version 3.2 Information last updated 09/03/18 Please note: Information and dates in this timetable are subject to change. Introduction

More information

SME License Order Working Group Update - Webinar #3 Call in number:

SME License Order Working Group Update - Webinar #3 Call in number: SME License Order Working Group Update - Webinar #3 Call in number: Canada Local: +1-416-915-8942 Canada Toll Free: +1-855-244-8680 Event Number: 662 298 966 Attendee ID: check your WebEx session under

More information

RADIUS Grows Up. Identity Management for Networks Secure IT Sean Convery Identity Engines

RADIUS Grows Up. Identity Management for Networks Secure IT Sean Convery Identity Engines Network Access with Precision through Identity RADIUS Grows Up Identity Management for Networks Secure IT 2007 Sean Convery Identity Engines 2007 Identity Engines, Inc. All Rights Reserved. www.idengines.com

More information

An Application Developers Guide Proposal and Feedback Session. Phil Holmes. How to with CDSA

An Application Developers Guide Proposal and Feedback Session. Phil Holmes. How to with CDSA 1 "How-to" with CDSA An Application Developers Guide Proposal and Feedback Session Phil Holmes How to with CSDA - Agenda 2 Overall Objectives The conventional approach Collaboration - How to Book & CD-ROM

More information

MODIFYING LDAP TO SUPPORT PKI

MODIFYING LDAP TO SUPPORT PKI MODIFYING LDAP TO SUPPORT PKI D.W.Chadwick, E. Ball, M.V. Sahalayev University of Salford Abstract: Key words: One of the impediments to a successful roll out of public key infrastructures (PKIs), is that

More information

Member Impacting Project Overview PR Two-Factor Authentication V3

Member Impacting Project Overview PR Two-Factor Authentication V3 Member Impacting Project Overview PR20160003 Two-Factor Authentication V3 06/19/2016 Page 1 Table of Contents Table of Contents... 2 Version Control... 2 Executive Summary... 3 Business Impact... 3 Users

More information

ArcGIS Server and Portal for ArcGIS An Introduction to Security

ArcGIS Server and Portal for ArcGIS An Introduction to Security ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context

More information

Member Impacting Project Overview PR Two-Factor Authentication V3

Member Impacting Project Overview PR Two-Factor Authentication V3 Member Impacting Project Overview PR20160003 Two-Factor Authentication V3 0406/198/2016 Page 1 Table of Contents Table of Contents... 2 Version Control... 2 Executive Summary... 3 Business Impact... 3

More information

RPS Work Item: Beta Testing of Message Standard

RPS Work Item: Beta Testing of Message Standard RPS Work Item: Beta Testing of Message Standard IMDRF Stakeholder Forum San Francisco March 26, 2014 Nancy Shadeed Health Canada Recap Beta Testing Objective (Phase 1): Assess RPS Standard fitness for

More information

IBM Tivoli Directory Server

IBM Tivoli Directory Server Build a powerful, security-rich data foundation for enterprise identity management IBM Tivoli Directory Server Highlights Support hundreds of millions of entries by leveraging advanced reliability and

More information

Agenda. 1. The LoU between EC-CEF and OpenPEPPOL about transition and migration to AS4 - Niels

Agenda. 1. The LoU between EC-CEF and OpenPEPPOL about transition and migration to AS4 - Niels www.peppol.eu OpenPEPPOL CC F2F meetings Vienna May 9 th and 10 th, 2017. AS4 Transition. Joint TICC/PoCC session Niels Pagh-Rasmussen, Executive architect IBM and member of OpenPEPPOL MC. Sander Fieten,

More information

AUTHORIZED DOCUMENTATION

AUTHORIZED DOCUMENTATION Administration Guide AUTHORIZED DOCUMENTATION Novell SecureLogin 6.1 SP1 June, 2009 www.novell.com Novell SecureLogin 6.1 SP1 Administration Guide Legal Notices Novell, Inc. makes no representations or

More information

W3C CASE STUDY. Teamwork on Open Standards Development Speeds Industry Adoption

W3C CASE STUDY. Teamwork on Open Standards Development Speeds Industry Adoption January 2017 W3C CASE STUDY Teamwork on Open Standards Development Speeds Industry Adoption Like driving a long stretch of open road alone, standards development work can be a lonely endeavor. But with

More information

When you start the Authentication Servers application, the LDAP, the RADIUS, and the ACE tabs are displayed.

When you start the Authentication Servers application, the LDAP, the RADIUS, and the ACE tabs are displayed. Getting Started Getting Started The Authentication Servers application enables you to create, modify, and delete authentication servers in OmniVista. An authentication server could be an LDAP server, RADIUS

More information

Introduction to the DANE Protocol

Introduction to the DANE Protocol Introduction to the DANE Protocol ICANN 46 April 10, 2013 Internet Society Deploy360 Programme Providing real-world deployment info for IPv6, DNSSEC and other Internet technologies: Case Studies Tutorials

More information

ITdumpsFree. Get free valid exam dumps and pass your exam test with confidence

ITdumpsFree.  Get free valid exam dumps and pass your exam test with confidence ITdumpsFree http://www.itdumpsfree.com Get free valid exam dumps and pass your exam test with confidence Exam : 70-220 Title : Designing Security for a Microsoft Windows 2000 Network Vendors : Microsoft

More information

Internet Engineering Task Force (IETF) Request for Comments: 5917 Category: Informational June 2010 ISSN:

Internet Engineering Task Force (IETF) Request for Comments: 5917 Category: Informational June 2010 ISSN: Internet Engineering Task Force (IETF) S. Turner Request for Comments: 5917 IECA Category: Informational June 2010 ISSN: 2070-1721 Abstract Clearance Sponsor Attribute This document defines the clearance

More information

Inventions on Extending LDAP functionality- A TRIZ based Analysis

Inventions on Extending LDAP functionality- A TRIZ based Analysis From the SelectedWorks of Umakant Mishra August, 2006 Inventions on Extending LDAP functionality- A TRIZ based Analysis Umakant Mishra Available at: https://works.bepress.com/umakant_mishra/60/ Inventions

More information

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL

PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL Q&A PROTECTED EXTENSIBLE AUTHENTICATION PROTOCOL This document answers questions about Protected Extensible Authentication Protocol. OVERVIEW Q. What is Protected Extensible Authentication Protocol? A.

More information

Meeting Minutes of Jakarta EE Steering Committee Meeting on September 4 Attendees:

Meeting Minutes of Jakarta EE Steering Committee Meeting on September 4 Attendees: Meeting Minutes of Jakarta EE Steering Committee Meeting on September 4 Attendees: Fujitsu: Kenji Kazumura, Mike Denicola IBM: Dan Bandera Oracle: Will Lyons Payara: Steve Millidge Red Hat: Mark Little

More information

Purpose of this Document

Purpose of this Document Active Data Calendar Directions for ORA Cert Program Participants Calendar URL: http://training.umd.edu Purpose of this Document This document provides information on the Training@Maryland site in regards

More information

Axway Validation Authority Suite

Axway Validation Authority Suite Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to

More information

UNIX is a registered trademark of The Open Group

UNIX is a registered trademark of The Open Group UNIX is a registered trademark of 1/11/05 1 UNIX 03 A Status Update From http://www.unix.org UNIX is a registered Trademark of 1/11/05 2 Agenda The Single UNIX Specification New features of UNIX 03 UNIX

More information

Federated Namespace BOF: Applications and Protocols

Federated Namespace BOF: Applications and Protocols Federated Namespace BOF: Applications and Protocols James Lentini Advanced Technology Group NetApp, Inc. jlentini@netapp.com USENIX FAST 2010 OVERVIEW USENIX FAST 2010 2 What is FedFS? FedFS is a set of

More information

CIMA Asia. Interactive Timetable Live Online

CIMA Asia. Interactive Timetable Live Online CIMA Asia Interactive Timetable 2018 Live Online Information version 8 last updated 04/05/18 Please note information and dates are subject to change. Premium Learning Partner 2018 CIMA Cert BA Course Overview

More information

ACTIVE MICROSOFT CERTIFICATIONS:

ACTIVE MICROSOFT CERTIFICATIONS: Last Activity Recorded : August 03, 2017 Microsoft Certification ID : 2069071 JESSE WIMBERLEY 5421 33RD CT SE LACEY, Washington 98503 US jesse.wimberley@gmail.com ACTIVE MICROSOFT CERTIFICATIONS: Microsoft

More information

ACS 5.x: LDAP Server Configuration Example

ACS 5.x: LDAP Server Configuration Example ACS 5.x: LDAP Server Configuration Example Document ID: 113473 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Directory Service Authentication Using

More information

AppScaler SSO Active Directory Guide

AppScaler SSO Active Directory Guide Version: 1.0.3 Update: April 2018 XPoint Network Notice To Users Information in this guide is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless

More information

Software Updates for Internet of Things (SUIT) WG. IETF 101, Monday, March 19, 2018 Chairs: Dave Thaler David Waltermire Russ Housley

Software Updates for Internet of Things (SUIT) WG. IETF 101, Monday, March 19, 2018 Chairs: Dave Thaler David Waltermire Russ Housley Software Updates for Internet of Things (SUIT) WG IETF 101, Monday, March 19, 2018 Chairs: Dave Thaler David Waltermire Russ Housley 1 Note Well This is a reminder of IETF policies in effect on various

More information

CDSA Technology. Intel Corporation Denise Ecklund July 1998

CDSA Technology. Intel Corporation Denise Ecklund July 1998 CDSA Technology Intel Corporation Denise Ecklund July 1998 Agenda Problem of Protecting Applications The CDSA Solution What is CDSA? Intel s Technology Role CDSA Today CDSA Tomorrow 2 Protecting an Application

More information

Vendor: Norte. Exam Code: Exam Name: Callpilot RIS.5.0 System Administrator. Version: Demo

Vendor: Norte. Exam Code: Exam Name: Callpilot RIS.5.0 System Administrator. Version: Demo Vendor: Norte Exam Code: 920-183 Exam Name: Callpilot RIS.5.0 System Administrator Version: Demo Question: 1 After installing CallPilot Desktop Messaging, an end user needs to retrieve the messages from

More information

Configuring LDAP. Finding Feature Information

Configuring LDAP. Finding Feature Information This chapter describes how to configure the Lightweight Directory Access Protocol (LDAP) on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information

More information

Coding & Information Theory Lab.

Coding & Information Theory Lab. 통합인증시스템설계및구현 연세대학교전기 전자공학과정연식, 송홍엽 Coding & Information Theory Lab. Introduction Previous Works Contents Design and Implementation of Public-Key Infrastructure Design and Implementation of Single Sign-On

More information

Grid Code Planner EU Code Modifications GC0100/101/102/104

Grid Code Planner EU Code Modifications GC0100/101/102/104 Grid Code Planner EU Code Modifications GC0100/101/102/104 Place your chosen image here. The four corners must just cover the arrow tips. For covers, the three pictures should be the same size and in a

More information

review of the potential methods

review of the potential methods Mandatory iscsi Security review of the potential methods IPS Interim Meeting Nashua NH, May 01 2001 Ofer Biran Thanks to: IBM Research Lab in Haifa Bernard Aboba, David Black, Julian Satran, Steve Senum

More information

GRID MODERNIZATION INITIATIVE PEER REVIEW

GRID MODERNIZATION INITIATIVE PEER REVIEW GRID MODERNIZATION INITIATIVE PEER REVIEW GMLC 1.3.5 DER Siting and Optimization tool for JOHN GROSH & GONÇALO CARDOSO April 18-20, 2017 Sheraton Pentagon City Arlington, VA Planning and Design Tools 4/4/17

More information

Cross-Operator Identity Services. 13. January 2012, Telekom Innovation Laboratories

Cross-Operator Identity Services. 13. January 2012, Telekom Innovation Laboratories Cross-Operator Identity Services. Ingo.Friese@telekom.de 13. January 2012, Introduction. Successful Telco Identity needs joint R&D. We believe that IdM is one of the most important application enabler,

More information

Using the MyProxy Online Credential Repository

Using the MyProxy Online Credential Repository Using the MyProxy Online Credential Repository Jim Basney National Center for Supercomputing Applications University of Illinois jbasney@ncsa.uiuc.edu What is MyProxy? Independent Globus Toolkit add-on

More information

WHOIS Accuracy Reporting System (ARS): Phase 2 Cycle 1 Results Webinar 12 January ICANN GDD Operations NORC at the University of Chicago

WHOIS Accuracy Reporting System (ARS): Phase 2 Cycle 1 Results Webinar 12 January ICANN GDD Operations NORC at the University of Chicago WHOIS Accuracy Reporting System (ARS): Phase 2 Cycle 1 Results Webinar 12 January 2016 ICANN GDD Operations NORC at the University of Chicago Webinar Agenda 1 2 3 WHOIS ARS Background Phase 2 Cycle 1:

More information

Standards: An Overview Of the Single UNIX Specification Version 3

Standards: An Overview Of the Single UNIX Specification Version 3 Standards: An Overview Of the Single UNIX Specification Version 3 UNIX is a registered trademark of The Open Group Linux is a registered trademark of Linus Torvalds Andrew Josey Director of Certification

More information

Getting Started With Authentication Servers

Getting Started With Authentication Servers Getting Started With Authentication Servers The Authentication Servers application enables you to create, modify, and delete authentication servers in OmniVista. An authentication server could be an LDAP,

More information

Blueprinting Questionnaire Sample

Blueprinting Questionnaire Sample Manish Chaitanya Blueprinting Questionnaire Sample from The Complete Guide to SAP NetWeaver Portal Bonn Boston ch11_a_online_6124.indd 1 1/12/12 2:58:16 PM A Blueprinting Questionnaire Sample In Chapter

More information

Webinar and Virtual Classrooms. Feature Comparison Chart

Webinar and Virtual Classrooms. Feature Comparison Chart Webinar and Virtual Classrooms Feature Comparison Chart Competitive Product Features Reference Client Support Browser Requirements Accept ActiveX controls, JavaScript and Cookies. Microsoft IE 7.x, Firefox

More information

Whitepapers. LDAP and X.500. First Published in Messaging Magazine, September What is Common to X.500 and LDAP

Whitepapers. LDAP and X.500. First Published in Messaging Magazine, September What is Common to X.500 and LDAP Page 1 of 6 Whitepapers Isode's email and directory server products are used around the world by ISPs, Multinational Corporations, Governments, and Universities. LDAP and X.500 First Published in Messaging

More information

CORE Voluntary Certification: Certification from the Testing Vendor s Perspective. February 18, :00 3:00pm ET

CORE Voluntary Certification: Certification from the Testing Vendor s Perspective. February 18, :00 3:00pm ET CORE Voluntary Certification: Certification from the Testing Vendor s Perspective February 18, 2015 2:00 3:00pm ET Participating in Today s Session Download a copy of today s presentation on the CAQH.org

More information

Recommendations for DNS Privacy Service Operators

Recommendations for DNS Privacy Service Operators Recommendations for DNS Privacy Service Operators Presenter: Sara Dickinson sara@sinodun.com Co-authors: Roland van Rijswijk-Deij, Allison Mankin, Benno Overeinder 1 Brief history of DNS Privacy Date 2

More information

Inventions on using LDAP for Different Purposes (Part-2) - A TRIZ Based Analysis of US Patents

Inventions on using LDAP for Different Purposes (Part-2) - A TRIZ Based Analysis of US Patents From the SelectedWorks of Umakant Mishra August, 2006 Inventions on using LDAP for Different Purposes (Part-2) - A TRIZ Based Analysis of US Patents Umakant Mishra Available at: https://works.bepress.com/umakant_mishra/63/

More information

Support for the HIPAA Security Rule

Support for the HIPAA Security Rule white paper Support for the HIPAA Security Rule PowerScribe 360 Reporting v1.1 healthcare 2 Summary This white paper is intended to assist Nuance customers who are evaluating the security aspects of PowerScribe

More information

Allegany County, MD Request for website: Responsive website redesign and CMS rebuild. ADDENDUM ONE 10/27/2018

Allegany County, MD Request for website: Responsive website redesign and CMS rebuild. ADDENDUM ONE 10/27/2018 Allegany County, MD Request for website: Responsive website redesign and CMS rebuild. ADDENDUM ONE 10/27/2018 These questions and answers are hereby incorporated into and are considered to be an integral

More information

S-101. The New ENC Product Specification. Julia Powell S-100 Working Group Chair

S-101. The New ENC Product Specification. Julia Powell S-100 Working Group Chair S-101 The New ENC Product Specification Julia Powell S-100 Working Group Chair S-101 Major step forward in product specifications for Electronic Navigational Charts Improved Modeling Greater Flexibility

More information

Hitachi-GE Nuclear Energy, Ltd. UK ABWR GENERIC DESIGN ASSESSMENT Resolution Plan for RO-ABWR-0028 Safety System Logic & Control (SSLC) Class 1 HMI

Hitachi-GE Nuclear Energy, Ltd. UK ABWR GENERIC DESIGN ASSESSMENT Resolution Plan for RO-ABWR-0028 Safety System Logic & Control (SSLC) Class 1 HMI Hitachi-GE Nuclear Energy, Ltd. UK ABWR GENERIC DESIGN ASSESSMENT Resolution Plan for RO-ABWR-0028 Safety System Logic & Control (SSLC) Class 1 HMI RO TITLE: Safety System Logic & Control (SSLC) Class

More information

Enterprise Directories and Security Management: Merging Technologies for More Control

Enterprise Directories and Security Management: Merging Technologies for More Control Enterprise Directories and Security Management: Merging Technologies for More Control Contents Introduction...3 Directory Services...3 A brief history of LDAP...3 LDAP today...4 Free and commercially available

More information

ICANN Internet Assigned Numbers Authority Monthly Report February 15, For the Reporting Period of January 1, 2013 January 31, 2013

ICANN Internet Assigned Numbers Authority Monthly Report February 15, For the Reporting Period of January 1, 2013 January 31, 2013 ICANN Internet Assigned Numbers Authority Monthly Report February 15, 2013 For the Reporting Period of January 1, 2013 January 31, 2013 Prepared By: Amanda Baber amanda.baber@icann.org Table of Contents

More information

Pulse of The Industry Periodicals Volume PAG Initiatives. Incentives & Promotions. Open Discussion. Agenda

Pulse of The Industry Periodicals Volume PAG Initiatives. Incentives & Promotions. Open Discussion. Agenda November 19, 2014 Agenda Pulse of The Industry Periodicals Volume PAG Initiatives Incentives & Promotions 2014 Promotions Saturation & High Density Incentive Every Door Direct Mail Alternate Postage Proposed

More information

A NEW MODEL FOR AUTHENTICATION

A NEW MODEL FOR AUTHENTICATION All Rights Reserved. FIDO Alliance. Copyright 2016. A NEW MODEL FOR AUTHENTICATION ENABLING MORE EFFICIENT DIGITAL SERVICE DELIVERY Jeremy Grant jeremy.grant@chertoffgroup.com Confidential 5 The world

More information

Key Items: - Customer Premises Cabling - 1 ISO/IEC SC25/WG3 Meeting Milan: Sep 2015

Key Items: - Customer Premises Cabling - 1 ISO/IEC SC25/WG3 Meeting Milan: Sep 2015 1 ISO/IEC SC25/WG3 Meeting Milan: 07-10 Sep 2015 - Customer Premises Cabling - Key Items: 1. ISO/IEC 11801 Ed.3 major revision - 1 st CD has had a thorough review & has been re-issued as 2 nd CD 2. ISO/IEC

More information

Port Usage Information for the IM and Presence Service

Port Usage Information for the IM and Presence Service Port Usage Information for the Service Port usage overview, page 1 Information collated in table, page 1 service port list, page 2 Port usage overview This document provides a list of the and ports that

More information

WoT IG and WG Next Steps. WoT IG/WG F2F Meeting Santa Clara, February, 2017

WoT IG and WG Next Steps. WoT IG/WG F2F Meeting Santa Clara, February, 2017 WoT IG and WG Next Steps WoT IG/WG F2F Meeting Santa Clara, February, 2017 WoT Task Forces WG Architecture Thing Description Type System (JSON Schema Extensions) Hypermedia (Actions, error handling, )

More information

IGO/INGO Identifiers Protection Policy Implementation. Meeting with the IRT 9 March 2016

IGO/INGO Identifiers Protection Policy Implementation. Meeting with the IRT 9 March 2016 IGO/INGO Identifiers Protection Policy Implementation Meeting with the IRT 9 March 2016 Agenda 1 2 3 Background on Policy and Current ICANN Work on IGO/INGO Protections Discussion of Implementation Deliverables

More information

Council, 26 March Information Technology Report. Executive summary and recommendations. Introduction

Council, 26 March Information Technology Report. Executive summary and recommendations. Introduction Council, 26 March 2014 Information Technology Report Executive summary and recommendations Introduction This report sets out the main activities of the Information Technology Department since the last

More information

Microsoft Privacy Protected Network Access: Virtual Private Networking and Intranet Security

Microsoft Privacy Protected Network Access: Virtual Private Networking and Intranet Security Operating System Microsoft Privacy Protected Network Access: Virtual Private Networking and Intranet Security White Paper Abstract The Microsoft Windows operating system includes technology to secure communications

More information

Pennington County Government Justice Center. Schematic Design - October 27, 2015

Pennington County Government Justice Center. Schematic Design - October 27, 2015 Government Schematic Design - October 27, 2015 N Architecture 2 Proposed - Site Plan Proposed Jail / LEC Addition Proposed Addition 3 County Board Room Public Entrance County Attorney Proposed - Ground

More information

FIDO AND PAYMENTS AUTHENTICATION. Philip Andreae Vice President Oberthur Technologies

FIDO AND PAYMENTS AUTHENTICATION. Philip Andreae Vice President Oberthur Technologies FIDO AND PAYMENTS AUTHENTICATION Philip Andreae Vice President Oberthur Technologies The Problem The Solution The Alliance Updates Data Breaches 781 data breaches in 2015 170 million records in 2015 (up

More information

Draft Thick RDDS (Whois) Consensus Policy and Implementation Notes

Draft Thick RDDS (Whois) Consensus Policy and Implementation Notes Draft Thick RDDS (Whois) Consensus Policy and Implementation Notes Version 2.1 25 November 2015 Table of Contents Thick RDDS (Whois) Consensus Policy... 3 1. Consensus Policy... 3 2. Phased Implementation...

More information

Information Technology Services. Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017

Information Technology Services. Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017 Information Technology Services Informational Report for the Board of Trustees October 11, 2017 Prepared effective August 31, 2017 Information Technology Services TABLE OF CONTENTS UPDATE ON PROJECTS &

More information