Enterprise Online Help for GCCS-J and JC2CUI: An example of Enterprise Software Engineering. 2 April Ross Adjei Mike Nguyen
|
|
- Bernard Powell
- 6 years ago
- Views:
Transcription
1 Enterprise Online Help for GCCS-J and JC2CUI: An example of Enterprise Software Engineering 2 April 2014 Ross Adjei Mike Nguyen
2 Agenda Background Architecture Implementation/Demo Performance Challenges Where are we now? Q & A 2
3 Background
4 Background Online help exists as part of the Defense Information Systems Agency (DISA) Global Command & Control Systems - Joint (GCCS-J) DISA is modernizing GCCS-J systems and capabilities and looking to reduce costs so our team is providing an Enterprise-level deployment of Online Help to meet these goals Alleviates the need for local deployment of a help server for each GCCS-J enclave (54 critical sites) Leverages mature and proven open source software components BaseX, Apache Tomcat, etc. Will support existing GCCS-J systems first Designed to have ZERO impact to developers, MINIMAL impact to content developers Can support Joint Command & Control Common User Interface (JC2CUI) and Agile Client, as well as additional DISA programs that wish to take advantage of EHELP 4
5 Background (cont.) Requirements: Support user online help access via Jobs Tree, Table of Contents, context-sensitive help, or keyword search XML schema provided to developers; schema provides uniform look and feel for content, as well as ability to display data from a number of access points Provide ability to categorize online help in the database by system For example, a CENTCOM GCCS-J system online help can be separated from a PACOM GCCS-J system s online help Done via ehelp Domains Provide system administrator functions, access control Current GCCS-J online help has no access control Allow admins to create domains, upload content, backup/restore data Provide controls for DISA DAA/DIACAP SIPR accreditation ehelp is intended for the SIPR network; however, the content it contains is largely Unclassified 5
6 Architecture
7 Architecture Help Enclave (DECC) Web Server (VM) Accreditation Boundary Apache HTTPD mod-proxy Help Server (VM) Accreditation Boundary Apache Tomcat Enterprise Help System Application BaseX Database Red Hat Enterprise Linux Red Hat Enterprise Linux 7
8 Architecture (cont.) Help Enclave (DECC) Web Server Apache HTTPD mod-proxy SSL Help Server Apache Tomcat Tomcat Enterprise Help System Application Existing JC2CUI Enclave HTTPS Existing GCCS-J Enclave Client Workstation Widget Server I 3 App Server Client Workstation JC2CUI User Apache Tomcat Oracle WebLogic GCCS-J User Web Browser Help Widget HTTPS HTTPS Widget Packages Enterprise- Help-Proxy Existing-App Requiring-Help Enterprise- Help-Proxy HTTPS HTTPS Web Browser Help Web App 8
9 Architecture (cont.) Admin Access Username and Password authentication Admin capabilities Account Management Domain management Archive Management User Access Anonymous access is allowed for users 9
10 Implementation/Demo
11 Performance
12 Performance Number of concurrent users 12 Average response time in seconds
13 Challenges
14 Challenges 14 Meeting strict Information Assurance (IA) controls ASD STIG, DB STIG as guidance OWASP a good resource for implementation guidelines Static code analysis tools (Sonar, Fortify, Coverity) can help Many differences among potential systems using ehelp OS, Web Servers, etc. Different platforms require creative architecture Access/Authorization control GCCS-J not yet using PKI, JC2CUI using PKI ehelp can implement a more stringent (user-based) access control method once the systems are aligned Security controls, restrictions Ports, protocols, communication mechanisms, etc. Schedules Each system (GCCS-J, JC2CUI, even ehelp) following different schedules for development, test, etc.
15 Where are we now?
16 Where are we now? ehelp is about to support GCCS-J test events, for operational release in the fall of 2014 Moving forward Support for Public-Key Infrastructure (PKI) certificates Clustering/Load balancing 16
17 Q & A
18 Backup
19 19 Enterprise Help Admin Login
20 20 Enterprise Help Account Manager
21 21 Create Domain
22 Enterprise Help Domain Domain name and description 22
23 23 Enterprise Help Domain
24 Enterprise Help Domain The list of documents that are uploaded successfully 24
25 Enterprise Help Archive The archive view The documents view 25
26 26 Enterprise Help Archive
27 27 Enterprise Help Archive
28 Enterprise Help Keyword Search User runs a keyword search for Coastal Defense 28
29 29 Enterprise Help Search Results
30 30 Enterprise Help System Index
31 31 Enterprise Help Viewer
32 32 Enterprise Help Training Videos
33 33 Enterprise Help Training Videos
34 Acronyms 34 ASD CENTCOM DAA DB DECC DIACAP DISA DMI DMICL DMISVR DTD EHELP GCCS-J HTTP HTTPD HTTPS IA I3 JC2CUI OWASP PACOM PDF PKI RAM RHEL SIPR SSL STIG VM XML Application Security & Development United States Central Command Designated Approving Authority Database Defense Enterprise Computing Center Defense Information Assurance Certification and Accreditation Process Defense Information Systems Agency Document Management Infrastructure Document Management Infrastructure Client Document Management Infrastructure Server Document Type Definition Enterprise Online Help Global Command & Control System - Joint Hypertext Transfer Protocol Hypertext Transfer Protocol Daemon Hypertext Transfer Protocol Secure Information Assurance Integrated Imagery & Intelligence Joint Command & Control Common User Interface Open Web Application Security Project United States Pacific Command Portable Document Format Public-Key Infrastructure Random-Access Memory Red Hat Enterprise Linux Secret Internet Protocol Router Secure Sockets Layer Security Technical Implementation Guide Virtual Machine Extensible Markup Language
35
36 Q & A
What is milcloud 2.0?
What is milcloud 2.0? Caroline Bean DISA Jeffrey Phelan CSRA April 4, 2018 (DISA). CRSA is providing the milcloud 2.0 services to DoD customers 1 under Contract HC102817D0004. UNCLASSIFIED 1 All forward-looking
More informationComodo Certificate Manager Software Version 5.0
Comodo Certificate Manager Software Version 5.0 Introduction to Auto-Installer Comodo CA Limited, 3rd Floor, 26 Office Village, Exchange Quay, Trafford Road, Salford, Greater Manchester M5 3EQ, United
More informationDefense Information Services Agency (DISA) Training Pre-Approved for CompTIA CEUs
Defense Information Services Agency (DISA) Training Pre-Approved for CompTIA CEUs Note: Approved training courses in this document are subject to change without prior notification. Training submitted based
More informationPresentation Title 11/13/2013
Enable Secure Information Sharing Right Data-Right People-Right Time MILCIS 2013 George Kamis RTCS Chief Technology Officer Kamis@TrustedCS.com +1 703-537-4310 EXIM Approval #IIS2013-268 Copyright 2013
More informationPublic Key Enabling Oracle Weblogic Server
DoD Public Key Enablement (PKE) Reference Guide Public Key Enabling Oracle Weblogic Server Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke URL: http://iase.disa.smil.mil/pki-pke Public Key Enabling
More informationComodo Certificate Manager Version 5.7
Comodo Certificate Manager Version 5.7 Introduction to Auto-Installer Comodo CA Limited, 3rd Floor, 26 Office Village, Exchange Quay, Trafford Road, Salford, Greater Manchester M5 3EQ, United Kingdom.
More informationComodo Certificate Manager Version 5.4
Comodo Certificate Manager Version 5.4 Introduction to Auto-Installer Comodo CA Limited, 3rd Floor, 26 Office Village, Exchange Quay, Trafford Road, Salford, Greater Manchester M5 3EQ, United Kingdom.
More informationCertification Report
Certification Report Standard Edition v2.8.2 RELEASE Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of
More informationReference Manual for the Student and Exchange Visitor Information System Batch Interface
U.S. Immigration & Naturalization Service Reference Manual for the Student and Exchange Visitor Information System Batch Interface September 20, 2002 DRAFT TABLE OF CONTENTS 1. INTRODUCTION... 1 1.1 Purpose...1
More informationAlternative Credentials for SIPRNet Disadvantaged Users Concept of Operations (CONOPS)
Alternative Credentials for SIPRNet Disadvantaged Users Concept of Operations (CONOPS) DEFENSE INFORMATION SYSTEMS AGENCY COMMON USER SERVICES VERSION 1.0 DRAFT 1 JANUARY 2013 Page 1 of 11 Revision History
More informationComodo Certificate Manager
Comodo Certificate Manager Introduction to Auto-Installer Comodo CA Limited, 3rd Floor, 26 Office Village, Exchange Quay, Trafford Road, Salford, Greater Manchester M5 3EQ, United Kingdom. Certificate
More informationOracle Financial Services Regulatory Reporting for De Nederlandsche Bank (OFS AGILE RP DNB)
Oracle Financial Services Regulatory Reporting for De Nederlandsche Bank (OFS AGILE RP DNB) Installation Guide Release 8.0.4.0.0 April 2017 DOCUMENT CONTROL Version Number Revision Date Changes Done 1.0
More informationEnabling Smart Card Logon for Linux Using Centrify Suite
DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Linux Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/
More informationDefense Security Service Industrial Security Field Operations National Industrial Security Program (NISP) Authorization Office (NAO)
Defense Security Service Industrial Security Field Operations National Industrial Security Program (NISP) Authorization Office (NAO) Getting Started with the SCAP Compliance Checker and STIG Viewer Job
More informationRevised: 08/02/ Click the Start button at bottom left, enter Server Manager in the search box, and select it in the list to open it.
Mobile App Windows Authentication & SSL Config Revised: 08/02/2017 Job Aid This Job Aid is intended for agency IT staff and explains how to enable Windows Authentication and SSL for your mobile applications
More informationAzure Marketplace Getting Started Tutorial. Community Edition
Azure Marketplace Getting Started Tutorial Community Edition Introduction NooBaa software provides a distributed storage solution for unstructured data such as analytics data, multi-media, backup, and
More informationOracle Financial Services Regulatory Reporting for European Banking Authority (OFS AGILE RP EBA)
Oracle Financial Services Regulatory Reporting for European Banking Authority (OFS AGILE RP EBA) Installation Guide Release 8.0.5.0.0 December 2017 DOCUMENT CONTROL Version Number Revision Date Changes
More informationUsing the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway
Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest
More informationGetting Started With Intellicus. Version: 7.3
Getting Started With Intellicus Version: 7.3 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not be copied or derived
More informationIntellicus Enterprise Reporting and BI Platform
Getting Started with Intellicus Intellicus Enterprise Reporting and BI Platform Intellicus Technologies info@intellicus.com www.intellicus.com Getting Started with Intellicus i Copyright 2012 Intellicus
More informationGetting Started with Intellicus. Version: 16.0
Getting Started with Intellicus Version: 16.0 Copyright 2016 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not be copied or derived
More informationDIGIPASS Authentication for O2 Succendo
DIGIPASS Authentication for O2 Succendo for IDENTIKEY Authentication Server IDENTIKEY Appliance 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 30 Disclaimer Disclaimer of
More informationArcGIS Server and Portal for ArcGIS An Introduction to Security
ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context
More informationDefense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form
Defense Information Systems Agency (DISA) Department of Defense (DoD) Cloud Service Offering (CSO) Initial Contact Form Page 1 of 5 Submitted to DISA s DoD Cloud Support Office by: Signature (Prefer CAC
More informationReport Exec Dispatch System Specifications
Report Exec Dispatch System Specifications Contents Overview... 2 Technical Support... 2 At a Glance... 2 Report Exec Systems Diagram... 3 Server Specifications... 4 Server OS... 4 Microsoft SQL Server...
More informationAxway Validation Authority Suite
Axway Validation Authority Suite PKI safeguards for secure applications Around the world, banks, healthcare organizations, governments, and defense agencies rely on public key infrastructures (PKIs) to
More informationEnabling Smart Card Logon for Mac OS X Using Centrify Suite
DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Mac OS X Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Port Security Port Security helps to control access to logical and physical ports, protocols, and services. This
More informationApplication Architecture
Application Architecture Compatibility Flexibility Scalability Web Technologies Author: KM Newnham Edited by: SA Jost Last Update Date: 11/28/2016 Tel. 303.741.5711 Email. sales@adginc.net Web. www.adginc.net
More informationUsing ZENworks with Novell Service Desk
www.novell.com/documentation Using ZENworks with Novell Service Desk Novell Service Desk 7.1 April 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or
More informationCNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies
CNIT 129S: Securing Web Applications Ch 3: Web Application Technologies HTTP Hypertext Transfer Protocol (HTTP) Connectionless protocol Client sends an HTTP request to a Web server Gets an HTTP response
More informationZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018
ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk November 2018 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,
More informationAgile Customer Needs Management
Agile Customer Needs Management Implementation Guide Version 1.0 E17325-02 May 2010 Oracle Copyright Copyright 1995, 2010, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationMarkLogic Server. Common Criteria Evaluated Configuration Guide. MarkLogic 9 May, Copyright 2019 MarkLogic Corporation. All rights reserved.
Common Criteria Evaluated Configuration Guide 1 MarkLogic 9 May, 2017 Last Revised:9.0-3, September, 2017 Copyright 2019 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents
More informationTechnical requirements. Yourcegid ORLI Version: 16.0 for Oracle 11gR2
Technical requirements Yourcegid ORLI Version: 16.0 for Oracle 11gR2 PR-Yourcegid ORLI OP - January 30, 2018 Technical requirements Contents 1. PREAMBLE... 4 2. DATABASE SERVER FOR ORACLE DATABASE... 5
More informationArcGIS Online A Security, Privacy, and Compliance Overview. Andrea Rosso Michael Young
ArcGIS Online A Security, Privacy, and Compliance Overview Andrea Rosso Michael Young ArcGIS Online A Multi-Tenant System Portal Portal Portal ArcGIS Online Agenda Online Platform Security Deployment Architecture
More informationPrepare. Model. Operationalize
Prepare Model Operationalize Model Re-Code Validate Deploy How do we operationalize R? Turn R analytics Web services in one line of code; Swagger-based REST APIs, easy to consume, with any programming
More informationPega Co-Browse. Installation Guide 7.4
Pega Co-Browse Installation Guide 7.4 2018 Pegasystems Inc., Cambridge, MA All rights reserved. Trademarks For Pegasystems Inc. trademarks and registered trademarks, all rights reserved. All other trademarks
More informationzentrale Sicherheitsplattform für WS Web Services Manager in Action: Leitender Systemberater Kersten Mebus
Web Services Manager in Action: zentrale Sicherheitsplattform für WS Kersten Mebus Leitender Systemberater Agenda Web Services Security Oracle Web Service Manager Samples OWSM vs
More informationOracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E June 2016
Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E69079-01 June 2016 Copyright 2016, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided
More informationModule 1: Understanding and Installing Internet Information Services
Course Outline Module 1: Understanding and Installing Internet Information Services In this module, you will learn about the infrastructure prerequisites for using Microsoft Internet Information Services
More informationSystem Requirements for ConSol CM Version Architectural Overview
System Requirements for ConSol CM Version 6.11.1 Architectural Overview ConSol CM is built upon a Java EE web architecture, containing the following core components: JEE Application Server running the
More informationLinux Administration
Linux Administration This course will cover all aspects of Linux Certification. At the end of the course delegates will have the skills required to administer a Linux System. It is designed for professionals
More informationApp Gateway Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E App Gateway Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical
More informationQualys Cloud Platform (VM, PC) v8.x Release Notes
Qualys Cloud Platform (VM, PC) v8.x Release Notes Version 8.18.1 April 1, 2019 This new release of the Qualys Cloud Platform (VM, PC) includes improvements to Vulnerability Management and Policy Compliance.
More informationLoad Balancing Nginx Web Servers with OWASP Top 10 WAF in Azure
Load Balancing Nginx Web Servers with OWASP Top 10 WAF in Azure Quick Reference Guide v1.0.2 ABOUT THIS GUIDE This document provides a quick reference guide on how to load balance Nginx Web Servers and
More informationSI PORTAL ONBOARDING GUIDE
SI PORTAL ONBOARDING GUIDE SI Portal 3.0 support@siportal.com Introduction This document was modelled after a discovery done by an MSP to onboard a new customer. All aspects of the infrastructure was documented
More informationAzure Marketplace. Getting Started Tutorial. Community Edition
Azure Marketplace Getting Started Tutorial Community Edition Introduction NooBaa software provides a distributed storage solution for unstructured data such as analytics data, multi-media, backup, and
More informationvcenter Chargeback Manager Installation and Upgrade Guide
vcenter Chargeback Manager Installation and Upgrade Guide vcenter Chargeback Manager 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document
More informationSecuring your Virtualized Datacenter. Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008
Securing your Virtualized Datacenter Charu Chaubal Senior Architect, Technical Marketing 6 November, 2008 Agenda VMware Virtualization Technology How Virtualization Affects Datacenter Security Keys to
More informationAS emas emudhra Authentication Solution
AS emas emudhra Authentication Solution Create your own trusted enterprise network of users, devices, applications! With malware, ransomware and other cyber threats constantly thrown at Enterprises, a
More informationArcGIS for Server: Security
DevSummit DC February 11, 2015 Washington, DC Michael Sarhan Esri msarhan@esri.com Agenda Review Basic Security Workflow - ArcGIS Server Roles and Identity Stores - Authentication - Authorization: Securing
More informationServer Installation Guide
Server Installation Guide Server Installation Guide Legal notice Copyright 2018 LAVASTORM ANALYTICS, INC. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS HEREOF MAY NOT BE REPRODUCED OR DISTRIBUTED IN ANY
More informationDEPLOYING ORACLE ENTERPRISE MANAGER 12C IN A COMPLEX NETWORKING ENVIRONMENT Telstra Corporation Limited. All rights reserved
DEPLOYING ORACLE ENTERPRISE MANAGER 12C IN A COMPLEX NETWORKING ENVIRONMENT TELSTRA TEMPLATE 4X3 BLUE BETA TELPPTV4 EM12C GOALS TO ACHIEVE Deploying agents without burning firewall rules Using corporate
More informationStreamlined FISMA Compliance For Hosted Information Systems
Streamlined FISMA Compliance For Hosted Information Systems Faster Certification and Accreditation at a Reduced Cost IT-CNP, INC. WWW.GOVDATAHOSTING.COM WHITEPAPER :: Executive Summary Federal, State and
More informationDoD Mobility Mobility Product Security Certification Processes
DoD Mobility Mobility Product Security Certification Processes Greg Youst DISA Chief Mobility Engineer 25 May 2017 Agenda DoD Mobility Unclassified Mobility Certification Process Main DoD Approved Product
More informationCisco Prime Service Catalog Virtual Appliance Quick Start Guide 2
Cisco Prime Service Catalog 11.1.1 Virtual Appliance Quick Start Guide Cisco Prime Service Catalog 11.1.1 Virtual Appliance Quick Start Guide 2 Introduction 2 Before You Begin 2 Preparing the Virtual Appliance
More informationepldt Web Builder Security March 2017
epldt Web Builder Security March 2017 TABLE OF CONTENTS Overview... 4 Application Security... 5 Security Elements... 5 User & Role Management... 5 User / Reseller Hierarchy Management... 5 User Authentication
More informationGenesys Interaction Recording Solution Guide. WebDAV Requirements
Genesys Interaction Recording Solution Guide WebDAV Requirements 11/24/2017 Contents 1 WebDAV Requirements 1.1 Deploying the WebDAV Server 1.2 Configuring TLS for the WebDAV Server 1.3 Next Step Genesys
More informationCourse: 2553A Administering Microsoft SharePoint Portal Server 2003
Course: 2553A Administering Microsoft SharePoint Portal Server 2003 Description: This three-day course provides students with the knowledge and skills to deploy and manage a Microsoft SharePoint Portal
More informationGIS Deployment Guide. Introducing GIS
GIS Deployment Guide Introducing GIS 7/13/2018 Contents 1 Introducing GIS 1.1 About the Genesys Integration Server 1.2 GIS Architecture 1.3 System Requirements 1.4 GIS Use-Case Scenario 1.5 Licensing 1.6
More informationLoad Balancing Web Servers with OWASP Top 10 WAF in Azure
Load Balancing Web Servers with OWASP Top 10 WAF in Azure Quick Reference Guide v1.0.3 ABOUT THIS GUIDE This document provides a quick reference guide on how to load balance Web Servers and configure a
More informationSecuring ArcGIS Services
Federal GIS Conference 2014 February 10 11, 2014 Washington DC Securing ArcGIS Services James Cardona Agenda Security in the context of ArcGIS for Server Background concepts Access Securing web services
More informationRisk Management Framework for DoD Medical Devices
Risk Management Framework for DoD Medical Devices Session 136, March 7, 2018 Lt. Col. Alan Hardman, Chief Operations Officer, Cyber Security Division, Office of the DAD IO/J-6 William Martin, Deputy of
More informationUpgrade Guide. SuccessMaker 11
11 Document last updated July 12, 2018 Copyright 2018 Pearson Education, Inc. or one or more of its direct or indirect affiliates. All rights reserved. Pearson and are registered trademarks, in the U.S.
More informationHPE Network Virtualization
HPE Network Virtualization Software Version: 9.10 Installation Guide Document Release Date: June 2016 Software Release Date: June 2016 HPE Network Virtualization Legal Notices Warranty The only warranties
More informationEnabling Fast Recovery of Your Virtual Environments: NetBackup, Backup Exec & VCS for VMware
Enabling Fast Recovery of Your Environments: NetBackup, Backup Exec & VCS for VMware Agenda 1 Symantec and ization 2 NetBackup 6.5 for VMWare 3 Backup Exec & Backup Exec System Recovery for VMWare 4 Veritas
More informationTest & Evaluation of the NR-KPP
Defense Information Systems Agency Test & Evaluation of the NR-KPP Danielle Mackenzie Koester Chief, Engineering and Policy Branch March 15, 2011 2 "The information provided in this briefing is for general
More informationSupported OS, Application Servers, and Databases Guide
Supported OS, Application Servers, and Databases Guide Release V8 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the document version
More informationQuickStart Guide for Mobile Device Management. Version 8.7
QuickStart Guide for Mobile Device Management Version 8.7 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF
More informationCourse: JBoss Training: JBoss AS 7 and JBoss EAP 6 Administration and Clustering Training
Course: JBoss Training: JBoss AS 7 and JBoss EAP 6 Administration and Clustering Training Course Length: Duration; 4 days Course Code: WA 2060 This training course covers both the unsupported open source
More informationArcGIS for Server: Administration and Security. Amr Wahba
ArcGIS for Server: Administration and Security Amr Wahba awahba@esri.com Agenda ArcGIS Server architecture Distributing and scaling components Implementing security Monitoring server logs Automating server
More informationAbout This Document 3. Overview 3. System Requirements 3. Installation & Setup 4
About This Document 3 Overview 3 System Requirements 3 Installation & Setup 4 Step By Step Instructions 5 1. Login to Admin Console 6 2. Show Node Structure 7 3. Create SSO Node 8 4. Create SAML IdP 10
More informationDoD Identity & Access Management (IdAM) Portfolio Overview
DoD Identity & Access Management (IdAM) Portfolio Overview UNCLASSIFIED DISA Enterprise Services Directorate (ESD) 17 July 2013 Overview IdAM Concepts & IdAM Portfolio 7/15/13 UNCLASSIFIED 1 IdAM Overview
More informationTechnologies for Securing the Networked Supply Chain. Alex Deacon Advanced Products and Research Group VeriSign, Inc.
Technologies for Securing the Networked Supply Chain Alex Deacon Advanced Products and Research Group VeriSign, Inc. Agenda Introduction Security challenges Security technologies in use today Applying
More informationDigitized Engineering Notebook
Governors State University OPUS Open Portal to University Scholarship All Capstone Projects Student Capstone Projects Spring 2017 Digitized Engineering Notebook Syed Jalaluddin Governors State University
More informationMB Exam Code: MB Exam Name: Microsoft Dynamics CRM 2016 Customer Service
MB2-714 Number: MB2-714 Passing Score: 800 Time Limit: 120 min File Version: 1.0 Exam Code: MB2-714 Exam Name: Microsoft Dynamics CRM 2016 Customer Service Exam A QUESTION 1 You install Microsoft Dynamics
More informationnew world ERP Server Migration Checklist New World ERP TMS
new world ERP Server Migration Checklist Revised 2/20/17 Table of Contents Overview... 3 Document and Build Environments... 4 Test the New Servers... 7 Cut Over to New Servers... 8 Appendix A: Server Documentation
More informationSENAITE Community VM Version: 1.1 Date: 2018/01/11
SENAITE Community VM Version: 1.1 Date: 2018/01/11 Licensed under the Creative Commons (CC BY-NC): https://creativecommons.org/licenses/by-nc/3.0/legalcode You are free to: Share copy and redistribute
More informationFebruary 2017 Version: 1.0. Xerox App Gallery 4.0 Information Assurance Disclosure
February 2017 Version: 1.0 Xerox App Gallery 4.0 Information Assurance Disclosure 2017 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey and WorkCentre are trademarks of
More informationVSP16. Venafi Security Professional 16 Course 04 April 2016
VSP16 Venafi Security Professional 16 Course 04 April 2016 VSP16 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for: Enterprise Security Officers
More informationJoint System Administrator Checklist Version December 2005
Joint System Administrator Checklist Version 1.1 22 December 2005 Daily Review Audit logs Check application log for warning and error messages for service startup errors, application or database errors
More informationStratusphere. Security Overview
Stratusphere Security Overview Introduction This guide has been authored by experts at Liquidware in order to provide a security overview of Liquidware s Stratusphere product, the leading product for VDI
More informationHow to Configure Guest Access with the Ticketing System
How to Configure Guest Access with the Ticketing System Set up a login or ticketing system to temporarily grant access to guest users. Ticketing admins assign guest tickets to the users. The user credentials
More informationEvaluated Configuration for Oracle Identity and Access Management 10g ( )
Evaluated Configuration for Oracle Identity and Access Management 10g (10.1.4.0.1): Security Evaluations Oracle Corporation 500 Oracle Parkway Redwood Shores, CA 94065 Evaluated Configuration for Oracle
More informationIBM Planning Analytics Workspace Local Distributed Soufiane Azizi. IBM Planning Analytics
IBM Planning Analytics Workspace Local Distributed Soufiane Azizi IBM Planning Analytics IBM Canada - Cognos Ottawa Lab. IBM Planning Analytics Agenda 1. Demo PAW High Availability on a Prebuilt Swarm
More informationTeam Capabilities and Specializations
Team Capabilities and Specializations X-Feds, The Small Business headquartered in San Diego, CA with satellite offices located in Virginia, Indiana, Charleston and the National Capital Region. Established
More informationVIRTUAL GPU LICENSE SERVER VERSION , , AND 5.1.0
VIRTUAL GPU LICENSE SERVER VERSION 2018.10, 2018.06, AND 5.1.0 DU-07754-001 _v7.0 through 7.2 March 2019 User Guide TABLE OF CONTENTS Chapter 1. Introduction to the NVIDIA vgpu Software License Server...
More informationJAMF Software Server Installation and Configuration Guide for Linux. Version 9.31
JAMF Software Server Installation and Configuration Guide for Linux Version 9.31 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this
More informationHow-to Guide: Tenable Nessus for Microsoft Azure. Last Updated: April 03, 2018
How-to Guide: Tenable Nessus for Microsoft Azure Last Updated: April 03, 2018 Table of Contents How-to Guide: Tenable Nessus for Microsoft Azure 1 Introduction 3 Auditing the Microsoft Azure Cloud Environment
More informationXenApp 5 Security Standards and Deployment Scenarios
XenApp 5 Security Standards and Deployment Scenarios 2015-03-04 20:22:07 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents XenApp 5 Security Standards
More informationInstalling the Product Software
CHAPTER 1 The Cisco Configuration Engine is a network management software that acts as a configuration service for automating the deployment, management, and upgrading of network devices and services.
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
More informationInstallation Prerequisites
This chapter includes the following sections: Supported Platforms, page 1 Supported Web Browsers, page 2 Required Ports, page 2 System Requirements, page 5 Important Prerequisites for Installing Cisco
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications
More informationTHE GREEN CHOICE, THE SMART CHOICE.
THE GREEN CHOICE, THE SMART CHOICE. Powered by HyPAS TRACK and control printing charges by users, groups or clients EASY to install and configure to your specific environment RETURN on investment is fast
More informationGroupWise Architecture and Best Practices. WebAccess. Kiran Palagiri Team Lead GroupWise WebAccess
GroupWise Architecture and Best Practices WebAccess Kiran Palagiri Team Lead GroupWise WebAccess kpalagiri@novell.com Ed Hanley Senior Architect ed.hanley@novell.com Agenda Kiran Palagiri Architectural
More informationVSP18 Venafi Security Professional
VSP18 Venafi Security Professional 13 April 2018 2018 Venafi. All Rights Reserved. 1 VSP18 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for:
More informationJBOSS AS 7 AND JBOSS EAP 6 ADMINISTRATION AND CLUSTERING (4 Days)
www.peaklearningllc.com JBOSS AS 7 AND JBOSS EAP 6 ADMINISTRATION AND CLUSTERING (4 Days) This training course covers both the unsupported open source JBoss Application Server and the supported platform
More informationHOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE
HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE HIFIS Development Team May 16, 2014 Contents INTRODUCTION... 2 HIFIS 4 SYSTEM DESIGN... 3
More information