Grid Security & IGCA. C-DAC Knowledge Park
|
|
- Blake Barrett
- 6 years ago
- Views:
Transcription
1 Grid Security & IGCA Shikha Mehrotra C-DAC Knowledge Park Bangalore
2 Why security a major concern? Because both customer data and program are residing in resource Provider Premises. One of the biggest security concerns about cloud/grid computing is that when you move your information into the cloud/grid, you lose control of it. The service gives you access to the data, but you have no way of ensuring no one else has access to the data.
3 Some important terms What is authentication? An system is how you identify yourself to the computer. The goal behind an authentication system is to verify that the user is actually who they say they are. What is authorization? Authorization checks that authentic user have proper permission or not to access that particular services.
4 What is the role of CERTIFICATES in grid? What is the role of CERTIFICATES in grid?
5 Some important terms Certificate: A certificate is a digital document that certifies that a certain public key is owned by a particular user. This document is signed by Certificate Authority (CA). Certificate/Certification Authority (CA) Certification authority (CA) is an entity that issues digital certificates for use by other parties. Revoked Certificate An certificate is said to be invalid once it is revoked.
6 Registration Authority (RA) A Registration Authority (RA) is an authority in a network that verifies user request for a digital certificate and tells the Certificate Authority (CA) to issue certificate. Verifies applicant & photo identity in Face to Face meeting Approve/Reject the application.
7 So, who will issue the grid certificate?
8
9 IGCA Indian Grid Certification Authority located at C- DAC, Knowledge Park, Bangalore, India. IGCA is the accredited member of APGridPMA. Issues X.509 Certificates t to support tthe secure environment in Grid. (for GARUDA, institutes that t do research in grid from India and foreign institutes that collaborates with GARUDA).
10 IGCA Registration Process Communication ca.garudaindia.in Web Repository R A IGCA Manager 5 Verifies RA signature To ensure it is not 2 Online CSR generation CSR Ser rial No. Face to face meeting 3 4 Mail/Fax the application form with the photo id igca@cdac.in tempered 6 Files the application i form & Hands over to CAO user 1 CAO 7 Fill application form for certificate request Mail to download certificate 8 Issues the certificate
11 How long my certificate t is valid?
12 Walkthrough Homepage di i / User Certificate Request process di i /i d h / ifi / ifi / Host Certificate Request process di i /i d h / tifi t /h t tifi t t process/ RA enrollment process Video Tutorials IGCA contact igca@cdac.in
13 Few examples.
14 What is Grid Proxy? Short Lived Certificate. Derived from public & private keys.
15 Garuda SLCS
16 Garuda SLCS Website: The purpose of GARUDA SLCS is to provide grid users with an instant access to GARUDA grid for a trial period of 30days. The fully automated process of SLCS will help users such as beginners and workshop participants to get a quick access and experience of GARUDA before using the operational grid.
17 Highlights: Get an access in less than 5mins. Service over the internet. Targeted for beginners to get the feel of GARUDA
18 Virtual Organization Definition : A virtual organization or company is one whose members are geographically apart, usually working by computer while appearing to others to be a single, unified organization with a real physical location. For e.g. a set of bioinformaticians at the University of Oxford may be working closely with a group at Harvard and they wish to share their computational resources, services and/or applications.
19 VOMS VOMS Virtual Organization Management/Membership Service VOMS is a system to classify users that are part of a Virtual Organization (VO) on the Set of attributes that will be granted to them upon request. include that information inside Globus-compatible proxy certificates
20 VO Registration
21 VO Registration
22 VO Registration
23
24 Thank You
25 List of support queues in Garuda Sl. No. Project Name Support queue 1 Any grid related problem GDeployment grid-help@cdac.in 2 GidP Grid Portal tl Portal 3 Service Oriented Architecture SOA rt-soa@cdac.in 4 GARUDAVOMS Voms voms@cdac.in 5 Grid IDE Tool GridIDE rt-gide@cdac.in 6 OSDD OSDD rt-osdd@cdac.in d 7 Garuda Network Related Netops netops@cdac.in 8 GARUDA SRM GDS rt-gds@cdac gds@cdac.in 9 Not sure about the queue Other rt@cdac.in 25
26 Phone support Grid Support: Network Support: Grid Portal: GSRM:
27 Grid Support To log your support request Go to Login with your GARUDA Account. Raise ticket in appropriate queue. To raise a problem ticket Select the queue Click new ticket Support request can also be sent via
28 Garuda RT (Request Tracker) Login page Raising a ticket
29 List of support queues in Garuda Sl. No. Project Name Support queue 1 Any grid related problem GDeployment grid-help@cdac.in 2 GidP Grid Portal tl Portal 3 Service Oriented Architecture SOA rt-soa@cdac.in 4 GARUDAVOMS Voms voms@cdac.in 5 Grid IDE Tool GridIDE rt-gide@cdac.in 6 OSDD OSDD rt-osdd@cdac.in d 7 Garuda Network Related Netops netops@cdac.in 8 GARUDA SRM GDS rt-gds@cdac gds@cdac.in 9 Not sure about the queue Other rt@cdac.in
30 Garuda Resource List Institution Location Resources Space Application Centre Ahmedabad VSAT Terminal - 2 Nos. Indian Institute of Science Bangalore 64 cpu; POWER5; Linux Raman Research Institute Bangalore 32 cpu; Opteron; Linux Institute of Mathematical Sciences Chennai 24 cpu; Opteron cluster (Cray XD1) Madras Institute of Technology Chennai 16 cpu; P4; Linux Indian Institute of Technology Delhi 32 cpu; Opteron; Linux Jawaharlal Nehru University Delhi cpu; Opteron, Opteron, Itanium; Linux Institute of Genomics and Integrative Biology Delhi 48 cpu; Xeon; Linux Indian Institute of Technology Guwahati 128 cpu; Opteron; Linux University of Hyderabad Hyderabad 32 way SMP; POWER4, AIX Indian Institute of Technology Kharagapur gp cpu; Power PC2, Xeon; AIX, Linux Physical Research Laboratory Ahmedabad 32cpus; 64bit AMD Institute of Microbial Technology Chandigarh - University of Pune Pune -
31 GARUDA Partners
32 Virtual User Community in Garuda Group Name Bioinformatics ClimateModelling OSDD Description application of statistics and computer science to the molecular biology Deals with the dynamics of the climate system. Community dedicated to develop drugs for tropical infectious diseases like malaria, tuberculosis GeoPhysis CAE Study related to physics of the Earth and its environment in space usage of computer software to solve engineering problems IndianHeritage Focused on technology products for preserving & processing Heritage texts HealthInformatics Focused on utilizing compute power for health informatics MaterialScience Euindia interdisciplinary i field applying the properties of matter to science and engineering i The vision of a worldwide Grid for Research by both Europe and India ToolsDeveloper Forum to communicate and collaborate on developing Garuda Tools
33 What is CRIN Pin mail? What will I do with it? CRIN pin (Certificate Revocation Number) is mailed to user (encrypted with user public key) during his/her certificate creation time. Used for requesting certificate revocation. CRIN pin can be viewed only by decrypting with user private key, so only user can request for revocation. 33
34 CP/CPS Certificate, CRL Profile Security Controls Certificate Issuance,Rekey Revoke Procedural Controls Other business & legal matters OID : IA C- IGCACP/CPSVer. NA DA C Auditing, Logging Procedures 34
35 IGTF The International Grid Trust Federation (IGTF) is a body to establish common policies and guidelines between its Policy Management Authorities (PMAs) members. 35
36 APGridPMA The APGridPMA ( is the international organization to coordinate the trust fabric for e-science in Asia-Pacific, working in close collaboration -- via the International Grid Trust Federation (IGTF) -- with the other regional peers: EuGridPMA; the Americas Grid PMA 36
37 IGCA Roles - RA A Registration Authority (RA) is an authority in a network that verifies user request for a digital certificate and tells the Certificate Authority (CA) to issue certificate. Verifies applicant & photo identity i in Face to Face meeting Approve/Reject the application. Records events in the RA record form. Insist users to protect his/her private key Report IGCA about changes in subscribers information Request for revocation when end entity leaves organization Intimate IGCA, when RA leaves the organization. 37
38 IGCA Roles IGCA Manager Assist User/RA regarding the IGCA Operations Accepts the application forms & verifies RA signature. Files application form & hands over to CAO Communicates with RA securely. 38
39 IGCA Roles - CAO Setup & maintenance of the IGCA. Updates the CP/CPS, Operational Manual, Security document. Issue/Revoke/Re-key certificates & publish in web repository Issue CRL & Publish in web repository 39
40 RA A Registration Authority y( (RA) is an authority in a network that verifies user request for a digital certificate and tells the Certificate t Authority (CA) to issue certificate. t Verifies applicant & photo identity i in Face to Face meeting Approve/Reject the application. Insist st users s to protect his/her private key Report IGCA about changes in subscribers information Request for revocation when end entity leaves organization Intimate t IGCA, when RAleaves the organization. 40
Garuda : The National Grid Computing Initiative - the platform for collaboration and innovation
Garuda : The National Grid Computing Initiative - the platform for collaboration and innovation Subrata Chattopadhyay CDAC Knowledge Park, Bangalore subratac@cdac.in Outline Introduction on Garuda NKN
More informationGaruda : The National Grid Computing Initiative Of India. Natraj A.C, CDAC Knowledge Park, Bangalore.
Garuda : The National Grid Computing Initiative Of India Natraj A.C, CDAC Knowledge Park, Bangalore. natraj@cdacb.ernet.in 1 Agenda About CDAC Garuda grid highlights Garuda Foundation Phase EU-India grid
More informationGARUDA - The National Grid Computing Initiative of India
GARUDA - The National Grid Computing Initiative of India Subrata Chattopadhyay C-DAC, Bangalore, India subratac@cdac.in Outline GARUDA Overview Communication Fabric Resources Partners Applications & User
More informationSeasonal forecast modeling application on the GARUDA Grid infrastructure
Seasonal forecast modeling application on the GARUDA Grid infrastructure 1, S. Janakiraman, Mohit Ved and B. B. Prahlada Rao Centre for Development of Advanced Computing CDAC Knowledge Park, Byappanahalli,
More informationGARUDA USER MANUAL. Version 2.0. SOA Group Centre for Development of Advanced Computing Knowledge Park, Bangalore (C-DAC KP)
GARUDA USER MANUAL Version 2.0 Compiled & authored by Reviewed by : Sukeshini & SOA team : R.Sridharan SOA Group Centre for Development of Advanced Computing Knowledge Park, Bangalore (C-DAC KP) PREFACE
More informationUnderstanding HTTPS CRL and OCSP
Understanding HTTPS CRL and OCSP Santhosh J PKI Body of Knowledge: Development & Dissemination Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying
More informationSLCS and VASH Service Interoperability of Shibboleth and glite
SLCS and VASH Service Interoperability of Shibboleth and glite Christoph Witzig, SWITCH (witzig@switch.ch) www.eu-egee.org NREN Grid Workshop Nov 30th, 2007 - Malaga EGEE and glite are registered trademarks
More informationOutline 18/12/2014. Accessing GROMACS on a Science Gateway. GROMACS in a nutshell. GROMACS users in India. GROMACS on GARUDA
Outline Co-ordination & Harmonisation of Advanced e-infrastructures for Research and Education Data Sharing Accessing GROMACS on a Dr. Giuseppe La Rocca, INFN Catania 6 th CHAIN-REDS Workshop, Guwahati
More informationKISTI Grid CA Status Report
KISTI Grid CA Status Report 2st APGrid PMA Meeting Oct. 15. 2006 Osaka University Convention Center, Osaka, Japan KISTI Supercomputing Center Grid Technology Research Team Sangwan Kim (sangwan@kisti.re.kr)
More informationSecurity and Certificates
Encryption, page 1 Voice and Video Encryption, page 6 Federal Information Processing Standards, page 6 Certificate Validation, page 6 Required Certificates for On-Premises Servers, page 7 Certificate Requirements
More informationCertification Authority
Certification Authority Overview Identifying CA Hierarchy Design Requirements Common CA Hierarchy Designs Documenting Legal Requirements Analyzing Design Requirements Designing a Hierarchy Structure Identifying
More informationNew open source CA development as Grid research platform.
New open source CA development as Grid research platform. National Research Grid Initiative in Japan Takuto Okuno. 1 About NAREGI PKI Group (WP5) 2 NAREGI Authentication Service Perspective To develop
More informationGoal. TeraGrid. Challenges. Federated Login to TeraGrid
Goal Federated Login to Jim Basney Terry Fleury Von Welch Enable researchers to use the authentication method of their home organization for access to Researchers don t need to use -specific credentials
More informationPKI Services. Text PKI Definition. PKI Definition #1. Public Key Infrastructure. What Does A PKI Do? Public Key Infrastructures
Public Key Infrastructures Public Key Infrastructure Definition and Description Functions Components Certificates 1 2 PKI Services Security Between Strangers Encryption Integrity Non-repudiation Key establishment
More informationAUDIT PROCEDURES. for REGISTRATION AUTHORITY OFFICE
AUDIT PROCEDURES for REGISTRATION AUTHORITY OFFICE (Operating under IDRBT CA Office) INF/PKI/06.03/261/30.0 COPYRIGHT 2002-2015, IDRBT CA IDRBT, Castle Hills, Road 1 Masab Tank, Hyderabad, Andhra Pradesh
More informationHardware Tokens in META Centre
MWSG meeting, CERN, September 15, 2005 Hardware Tokens in META Centre Daniel Kouřil kouril@ics.muni.cz CESNET Project META Centre One of the basic activities of CESNET (Czech NREN operator); started in
More informationSigne Certification Authority. Certification Policy Degree Certificates
Signe Certification Authority Certification Policy Degree Certificates Versión 1.0 Fecha: 2/11/2010 Table of contents 1 FOREWORD 1.1 GENERAL DESCRIPTION 1.2 DOCUMENT NAME AND IDENTIFICATION 2 PARTICIPATING
More informationDeploying the TeraGrid PKI
Deploying the TeraGrid PKI Grid Forum Korea Winter Workshop December 1, 2003 Jim Basney Senior Research Scientist National Center for Supercomputing Applications University of Illinois jbasney@ncsa.uiuc.edu
More informationFPKIPA CPWG Antecedent, In-Person Task Group
FBCA Supplementary Antecedent, In-Person Definition This supplement provides clarification on the trust relationship between the Trusted Agent and the applicant, which is based on an in-person antecedent
More informatione-sign and TimeStamping
e-sign and TimeStamping Dr. Balaji Rajendran Centre for Development of Advanced Computing (C-DAC) Bangalore Under the Aegis of Controller of Certifying Authorities (CCA) Government of India 1 Recent Developments:
More informationTATA CONSULTANCY SERVICES LIMITED CERTIFYING AUTHORITY REQUEST FORM FOR CLASS-2 CERTIFICATE FOR FOREIGN DIRECTORS.
TATA CONSULTANCY SERVICES LIMITED CERTIFYING AUTHORITY REQUEST FORM FOR CLASS-2 CERTIFICATE FOR FOREIGN DIRECTORS. USER TYPE INDIVIDUAL Instructions: 1. Please fill the form in BLOCK LETTERS 2. Items marked
More informationPittsburgh Supercomputing Center MyProxy Certificate Authority Short Lived Credential Service (PSC MyProxy CA)
Pittsburgh Supercomputing Center MyProxy Certificate Authority Short Lived Credential Service (PSC MyProxy CA) Certificate Policy and Certification Practice Statement Version 1.6 Pittsburgh Supercomputing
More information(1) Jisc (Company Registration Number ) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and
SUB-LRA AGREEMENT BETWEEN: (1) Jisc (Company Registration Number 05747339) whose registered office is at One Castlepark, Tower Hill, Bristol, BS2 0JA ( JISC ); and (2) You, the Organisation using the Jisc
More informationODYSSEY. cryptic by intent. Odyssey Certrix FAQs. Odyssey Technologies Ltd
Odyssey Certrix FAQs 1. What is Certrix? Odyssey Certrix suite of products provides a comprehensive solution that enables any organization or Trusted Third Party to run their own Certification Authority.
More informationcrypto ca authenticate through crypto ca trustpoint
crypto ca authenticate through crypto ca trustpoint crypto ca authenticate, page 2 crypto ca enroll, page 4 crypto ca trustpoint, page 7 1 crypto ca authenticate crypto ca authenticate through crypto ca
More informationEU Policy Management Authority for Grid Authentication in e-science Charter Version 1.1. EU Grid PMA Charter
EU Grid PMA Charter This charter defines the policies, practices, and bylaws of the European Policy Management Authority for Grid Authentication in e-science. 1 Introduction The European Policy Management
More informationCredential Management in the Grid Security Infrastructure. GlobusWorld Security Workshop January 16, 2003
Credential Management in the Grid Security Infrastructure GlobusWorld Security Workshop January 16, 2003 Jim Basney jbasney@ncsa.uiuc.edu http://www.ncsa.uiuc.edu/~jbasney/ Credential Management Enrollment:
More informationThis help covers the ordering, download and installation procedure for Odette Digital Certificates.
This help covers the ordering, download and installation procedure for Odette Digital Certificates. Answers to Frequently Asked Questions are available online CONTENTS Preparation for Ordering an Odette
More informationKerberos and Public-Key Infrastructure. Key Points. Trust model. Goal of Kerberos
Kerberos and Public-Key Infrastructure Key Points Kerberos is an authentication service designed for use in a distributed environment. Kerberos makes use of a thrusted third-part authentication service
More informationThe IRISGrid Infrastructure Seamless Support for VOs. JRES2005, Marseille
The IRISGrid Infrastructure Seamless Support for VOs Virtual Organisations Why a support infrastructure s own and require resources Shared Collective Resource Resource Resource Resource Resource Resource
More informationEXPERIENCE WITH PKI IN A LARGE-SCALE DISTRIBUTED ENVIRONMENT
EXPERIENCE WITH PKI IN A LARGE-SCALE DISTRIBUTED ENVIRONMENT Daniel Kouřil, Michal Procházka, Luděk Matyska CESNET z. s. p. o., Zikova 4, 160 00 Praha 6, Czech Republic, and Masaryk University, Botanická
More informationJOB SUBMISSION ON GRID
arxiv:physics/0701101v2 [physics.comp-ph] 12 Jan 2007 JOB SUBMISSION ON GRID An Users Introduction Rudra Banerjee ADVANCED COMPUTING LAB. Dept. of Physics, University of Pune March 13, 2018 Contents preface
More informationIntroduction to Grid Infrastructures
Introduction to Grid Infrastructures Stefano Cozzini 1 and Alessandro Costantini 2 1 CNR-INFM DEMOCRITOS National Simulation Center, Trieste, Italy 2 Department of Chemistry, Università di Perugia, Perugia,
More informationDigital Certificate Operation in a Complex Environment PKI ARCHITECTURE QUESTIONNAIRE
Digital Certificate Operation in a Complex Environment A project within the Joint Information Systems Committee s Authentication, Authorisation and Accounting middleware programme PKI ARCHITECTURE QUESTIONNAIRE
More informationAAI in EGI Current status
AAI in EGI Current status Peter Solagna EGI.eu Operations Manager www.egi.eu EGI-Engage is co-funded by the Horizon 2020 Framework Programme of the European Union under grant number 654142 User authentication
More informationCreating a Secure Distribution Cross-Portlet system for Sharing Electronic Documents
JISC OneVRE Project: "Creating a Secure Distribution Cross-Portlet system for Sharing Electronic Documents" JISC VRE (Virtual Research Environment) Programme Creating a Secure Distribution Cross-Portlet
More informationPKI-An Operational Perspective. NANOG 38 ARIN XVIII October 10, 2006
PKI-An Operational Perspective NANOG 38 ARIN XVIII October 10, 2006 Briefing Contents PKI Usage Benefits Constituency Acceptance Specific Discussion of Requirements Certificate Policy Certificate Policy
More informationOdette CA Help File and User Manual
How to Order and Install Odette Certificates For a German version of this file please follow this link. Odette CA Help File and User Manual 1 Release date 31.05.2016 Contents Preparation for Ordering an
More informationSymantec Managed PKI. Integration Guide for AirWatch MDM Solution
Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement
More informationCertDigital Certification Services Policy
CertDigital Certification Services Policy Page: 2 ISSUED BY : DEPARTAMENT NAME DATE ELECTRONIC SERVICES COMPARTMENT COMPARTMENT CHIEF 19.03.2011 APPROVED BY : DEPARTMENT NAME DATE MANAGEMENT OF POLICIES
More informationPAA PKI Mutual Recognition Framework. Copyright PAA, All Rights Reserved 1
PAA PKI Mutual Recognition Framework Copyright PAA, 2009. All Rights Reserved 1 Agenda Overview of the Framework Components of the Framework How It Works Other Considerations Questions and Answers Copyright
More informationGÉANT: Supporting R&E Collaboration
GÉANT: Supporting R&E Collaboration Thomas Fryer, Senior International Relations Officer, GÉANT Association NKN Annual Workshop Guwahati, Assam, India Monday, 15 th December 2014 TERENA and DANTE have
More informationPublic. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2
Atos Trustcenter Server Certificates + Codesigning Certificates Version 1.2 20.11.2015 Content 1 Introduction... 3 2 The Atos Trustcenter Portfolio... 3 3 TrustedRoot PKI... 4 3.1 TrustedRoot Hierarchy...
More informationThe CHAIN-REDS Project
Co-ordination & Harmonisation of Advanced e-infrastructures for Research and Education Data Sharing The CHAIN-REDS Project Federico Ruggieri INFN ISGC 2013 Taipei 18 March 2013 Research Infrastructures
More informationSONERA MOBILE ID CERTIFICATE
Sonera Mobile ID Certificate CPS v2.1 1 (56) SONERA MOBILE ID CERTIFICATE CERTIFICATION PRACTICE STATEMENT (Translation from official Finnish version) Version 2.1 Valid from, domicile: Helsinki, Teollisuuskatu
More informationPlease the completed POL to the following address:
Hello [Customer], Symantec is unable to verify the order details you have provided in our currently available public resources. To continue processing your code signing certificate for [Organization],
More informationParticipant User Guide, Version 2.6
Developers Integration Lab (DIL) Participant User Guide, Version 2.6 3/17/2013 REVISION HISTORY Author Date Description of Change 0.1 Laura Edens Mario Hyland 9/19/2011 Initial Release 1.0 Michael Brown
More informationCERTIFICATE POLICY CIGNA PKI Certificates
CERTIFICATE POLICY CIGNA PKI Certificates Version: 1.1 Effective Date: August 7, 2001 a Copyright 2001 CIGNA 1. Introduction...3 1.1 Important Note for Relying Parties... 3 1.2 Policy Identification...
More informationHow to complete your Accessibility Compliance Report. A guide for designated public sector organizations
How to complete your Accessibility Compliance Report A guide for designated public sector organizations Accessibility reporting If your organization is part of the designated public sector, you must complete
More informationApple Inc. Certification Authority Certification Practice Statement
Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.3 Effective
More information1 Motivation Frontend Fine-Tuning Parameters Location On Windows On Linux... 5
Inhalt 1 Motivation... 4 2 Frontend Fine-Tuning Parameters... 5 2.1 Location... 5 2.1.1 On Windows... 5 2.1.2 On Linux... 5 2.2 Configurable Parameters... 5 2.2.1 kms.configuration.dashboardreloadperiod...
More informationTELIA MOBILE ID CERTIFICATE
Telia Mobile ID Certificate CPS v2.3 1 (56) TELIA MOBILE ID CERTIFICATE CERTIFICATION PRACTICE STATEMENT (Translation from official Finnish version) Version 2.3 Valid from June 30, 2017 Telia Mobile ID
More informationTechnical Trust Policy
Technical Trust Policy Version 1.2 Last Updated: May 20, 2016 Introduction Carequality creates a community of trusted exchange partners who rely on each organization s adherence to the terms of the Carequality
More informationCisco Collaborative Knowledge
Cisco Collaborative Knowledge Product Overview. Your workforce needs knowledge, speed and flexibility to solve real-world business challenges in today s fast moving digital economy. Cisco Collaborative
More informationdataedge CA Certificate Issuance Policy
Classification of Digital Certificate Digital Certificates are classified upon the purpose for which each class is used and the verification methods underlying the issuance of the certificate. Classification
More informationMavenir Systems Inc. SSX-3000 Security Gateway
Secured by RSA Implementation Guide for 3rd Party PKI Applications Partner Information Last Modified: June 16, 2015 Product Information Partner Name Web Site Product Name Version & Platform Product Description
More informationGlobalSign Integration Guide. GlobalSign Enterprise PKI (EPKI) and VMware Workspace ONE UEM (AirWatch)
GlobalSign Integration Guide GlobalSign Enterprise PKI (EPKI) and VMware Workspace ONE UEM (AirWatch) 1 Table of Contents Table of Contents... 2 Introduction... 3 GlobalSign Enterprise PKI (EPKI)... 3
More informationCILogon Project
CILogon Project GlobusWORLD 2010 Jim Basney jbasney@illinois.edu National Center for Supercomputing Applications University of Illinois at Urbana-Champaign This material is based upon work supported by
More informationIntegrating Federations in the International Grid Trust Fabric
Integrating Federations in the International Grid Trust Fabric David Groep Nikhef Dutch national institute for sub-atomic physics Grids, Eduroam, Federations Different terms, same issues How to provide
More informatione-authentication guidelines for esign- Online Electronic Signature Service
e-authentication guidelines for esign- Online Electronic Signature Service (Issued under Electronic Signature or Electronic Authentication Technique and Procedure Rules, 2015) Version 1.3 April 2017 Controller
More informationMAGNUM-SDVN Security Administration Manual
MAGNUM-SDVN Security Administration Manual Revision 19: November 21, 2017 Contents Overview... 3 Administrative Access... 4 Logging Into Terminal Locally... 4 Logging Out Of Local Terminal... 4 Logging
More informationNetwork Security Essentials
Network Security Essentials Fifth Edition by William Stallings Chapter 4 Key Distribution and User Authentication No Singhalese, whether man or woman, would venture out of the house without a bunch of
More informationSet Up Certificate Validation
About Certificate Validation, on page 1 About Certificate Validation On-Premises Servers Cisco Jabber uses certificate validation to establish secure connections with servers. When attempting to establish
More informationCERN Certification Authority
CERN Certification Authority Emmanuel Ormancey (IT/IS) What are Certificates? What are Certificates? Digital certificates are electronic credentials that are used to certify the identities of individuals,
More informationGrids and Security. Ian Neilson Grid Deployment Group CERN. TF-CSIRT London 27 Jan
Grids and Security Ian Neilson Grid Deployment Group CERN TF-CSIRT London 27 Jan 2004-1 TOC Background Grids Grid Projects Some Technical Aspects The three or four A s Some Operational Aspects Security
More informationPROJECT: NEW JERSEY WATER QUALITY DATA EXCHANGE WQX REPORTER USER S GUIDE. Prepared for New Jersey Department of Environmental Protection
PROJECT: NEW JERSEY WATER QUALITY DATA EXCHANGE WQX REPORTER USER S GUIDE Prepared for New Jersey Department of Environmental Protection January 29, 2009 11 Princess Road, Unit A Lawrenceville, New Jersey
More informationEnterprise Certificate Console. Simplified Control for Digital Certificates from the Cloud
Enterprise Certificate Console Simplified Control for Digital Certificates from the Cloud HydrantID Enterprise Management Console HydrantID s HydrantSSL Enterprise service and HydrantCloud Managed PKI
More informationThe University of Oxford campus grid, expansion and integrating new partners. Dr. David Wallom Technical Manager
The University of Oxford campus grid, expansion and integrating new partners Dr. David Wallom Technical Manager Outline Overview of OxGrid Self designed components Users Resources, adding new local or
More informationesign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5,
esign - Evolving Opportunities and Applications C E N T R E F O R D E V ELOPMENT O F A D VANCED C O MPUTING N O V E M B E R 1 5, 2 0 1 7 Presentation Outline e-sign Architecture Interesting Challenges
More informationConfiguring Certificate Authorities and Digital Certificates
CHAPTER 43 Configuring Certificate Authorities and Digital Certificates Public Key Infrastructure (PKI) support provides the means for the Cisco MDS 9000 Family switches to obtain and use digital certificates
More informationApple Inc. Certification Authority Certification Practice Statement
Apple Inc. Certification Authority Certification Practice Statement Apple Application Integration Sub-CA Apple Application Integration 2 Sub-CA Apple Application Integration - G3 Sub-CA Version 6.2 Effective
More informationCertification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure
Certification Practice Statement of the Federal Reserve Banks Services Public Key Infrastructure 1.0 INTRODUCTION 1.1 Overview The Federal Reserve Banks operate a public key infrastructure (PKI) that manages
More informationSSL Certificates Certificate Policy (CP)
SSL Certificates Last Revision Date: February 26, 2015 Version 1.0 Revisions Version Date Description of changes Author s Name Draft 17 Jan 2011 Initial Release (Draft) Ivo Vitorino 1.0 26 Feb 2015 Full
More informationSingle Secure Credential to Access Facilities and IT Resources
Single Secure Credential to Access Facilities and IT Resources HID PIV Solutions Securing access to premises, applications and networks Organizational Challenges Organizations that want to secure access
More informationDirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure
DirectTrust Governmental Trust Anchor Bundle Standard Operating Procedure Change Control Date Version Description of changes 15-December- 2016 1-December- 2016 17-March- 2016 4-February- 2016 3-February-
More informationThe safe share project John Chapman, Deputy head, information security, Jisc
John Chapman, Deputy head, information security, Jisc What: a pilot project enabling the secure exchange of data collected by Government and the NHS using an encrypted overlay over the Janet network to
More informationSMKI Code of Connection
SMKI Code of Connection DCC Public Page 1 of 12 Contents 1 Connection Mechanism... 4 1.1 Browser Policy... 4 2 SMKI Services interfaces... 5 2.1 SMKI Services interfaces via DCC Gateway Connection... 5
More informationConfiguring Secure Socket Layer HTTP
This feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS software. SSL provides server authentication, encryption, and message integrity
More informationHong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS)
Hong Kong Access Federation (HKAF) Identity Management Practice Statement (IMPS) This document (IMPS) facilitates an organization to provide relevant information to describe how it fulfils the normative
More informationACCP-V6.2Q&As. Aruba Certified Clearpass Professional v6.2. Pass Aruba ACCP-V6.2 Exam with 100% Guarantee
ACCP-V6.2Q&As Aruba Certified Clearpass Professional v6.2 Pass Aruba ACCP-V6.2 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back
More informationPublic-key Infrastructure Options and choices
Public-key Infrastructure Options and choices Tim Moses Director, Advanced Security Technology April 98 1997 Entrust Technologies Overview General-purpose and Dedicated PKIs Trust models Two-key architecture
More informationConfiguring Secure Socket Layer HTTP
This feature provides Secure Socket Layer (SSL) version 3.0 support for the HTTP 1.1 server and HTTP 1.1 client within Cisco IOS software. SSL provides server authentication, encryption, and message integrity
More informationUser Authentication Principles and Methods
User Authentication Principles and Methods David Groep, NIKHEF User Authentication - Principles and Methods 1 Principles and Methods Authorization factors Cryptographic methods Authentication for login
More informationby Cisco Intercloud Fabric and the Cisco
Expand Your Data Search and Analysis Capability Across a Hybrid Cloud Solution Brief June 2015 Highlights Extend Your Data Center and Cloud Build a hybrid cloud from your IT resources and public and providerhosted
More informationConfiguring SSL CHAPTER
7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section
More informationA GUIDE FOR ADMINISTRATORS
A GUIDE FOR ADMINISTRATORS OBJECTIVE CONNECT WORK SECURELY WITH ANYONE OBJECTIVE CONNECT A secure, private workspace, so you can work with anyone outside of your organisation. Key Features: Secure, Private
More informationPublic Key Infrastructure PKI. National Digital Certification Center Information Technology Authority Sultanate of Oman
Public Key Infrastructure PKI National Digital Certification Center Information Technology Authority Sultanate of Oman Agenda Objectives PKI Features etrust Components Government eservices Oman National
More informationHPC Solution. Technology for a New Era in Computing
HPC Solution Technology for a New Era in Computing TEL IN HPC & Storage.. 20 years of changing with Technology Complete Solution Integrators for Select Verticals Mechanical Design & Engineering High Performance
More informationSecurity Digital Certificate Manager
System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure
More informationCertAgent. Certificate Authority Guide
CertAgent Certificate Authority Guide Version 6.0.0 December 12, 2013 Information in this document is subject to change without notice and does not represent a commitment on the part of Information Security
More informationUniversity Health Network (UHN)
University Health Network (UHN) RESOURCE MATCHING AND REFERRAL (RM&R) AND ONLINE REFERRAL BUSINESS INTELLIGENCE TOOL (ORBIT) Policy Governing User Account Management Version: 4.0 Date: Last modified on
More informationIndeed Card Management Smart card lifecycle management system
Indeed Card Management Smart card lifecycle management system Introduction User digital signature, strong authentication and data encryption have become quite common for most of the modern companies. These
More informationIntegration of Agilent UV-Visible ChemStation with OpenLAB ECM
Integration of Agilent UV-Visible ChemStation with OpenLAB ECM Compliance with Introduction in Title 21 of the Code of Federal Regulations includes the US Federal guidelines for storing and protecting
More informationIBM. Security Digital Certificate Manager. IBM i 7.1
IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in
More informationCHAPTER VII IMPLEMENTATION DETAILS OF THE PROPOSED MODELS AND AN ANALYTICAL CASE STUDY
CHAPTER VII IMPLEMENTATION DETAILS OF THE PROPOSED MODELS AND AN ANALYTICAL CASE STUDY 7.1 Introduction In the previous chapters, we presented various architectures and models for solving grid security
More informationInternational Grid Trust Federation
International Grid Trust Federation towards worldwide interoperability in identity management UK Presidency 2005 e-irg Meeting David L. Groep, IGTF and EUGridPMA Chair, 2005-12-13 Outline Grid Security
More informationLAWtrust AeSign CA Certification Practice Statement (LAWtrust AeSign CA CPS)
INFORMATION SECURITY POLICY ISSUE SPECIFIC POLICY VERSION: V003 2017-05-11 EFFECTIVE DATE: 2017-05-11 LAWtrust AeSign CA Certification Practice Statement (LAWtrust AeSign CA CPS) Law Trusted Third Party
More informationECA Trusted Agent Handbook
Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for
More informationQuality Austria Central Asia
Quality Austria Central Asia Quality Austria Central Asia Private Limited 52B, Okhla Industrial Area, Phase III, New Delhi - 110020 Tel.: (+91 11) 46465100; Fax: (+91 11) 46465101 ABOUT US WHO WE ARE?
More informationHigher Education PKI Initiatives
Higher Education PKI Initiatives (Scott Rea) Securing the ecampus - Hanover NH July 28, 2009 Overview What are the drivers for PKI in Higher Education? Stronger authentication to resources and services
More information