IoTivity Provisioning Manager Design Specification v0.1d

Size: px
Start display at page:

Download "IoTivity Provisioning Manager Design Specification v0.1d"

Transcription

1 IoTivity Provisioning Manager Design Specification v0.1d Contributing Authors (alphabetical order): Ashwini Kumar Chul Lee Randeep Singh Sandeep Sharma WooChul Shim 1

2 Table of Contents Background... 3 Terminology... 3 Provisioning Manager (PM) Overview... 4 Ownership Transfer Manager (OTM)... 6 Secure Resource Provider (SRP)... 9 Provision ACL... 9 Provision Credential Revoke ACL Revoke Credential Provisioning Database Manager (PDM) Public Provisioning Manager API C++/Android API Support

3 Revision History Version Date Author(s) Summary 0.1 6/12/2015 Randeep, Initial draft WooChul 0.1a 6/29/2015 Randeep Added Implementation details in Revoke Credentials. 0.1a 7/3/2015 WooChul Added PDM Added abstracted Credential Revocation flows. 0.1b 7/22/2015 Chul Lee Added OTM callback and sequence flow. Added public OC API. 0.1c 9/30/2015 Ashwini, Sandeep Added C++/Android API information 0.1d 10/13/2015 WooChul Added brief for the role of Provisioning Manager Background The reader is assumed to be familiar with the IoTivity Security. Terminology Term Provisioning Credential Access Control List Device ID Ownership Transfer 3

4 Provisioning Manager (PM) Overview Why do we need Provisioning Manager? Figure 1. The Role of Provisioning Manager Provisioning Manager could be act as a security administrator of IoT devices in its IP subnet. When new device is introduced in the IP subnet, Provisioning Manager takes the ownership of the new device and provisions security information such as credential and access control policy to manage new device securely. If PM doesn t take ownership and provide proper security policy to the newly introduced device in its IP subnet, the new device might be under control of unwanted subjects and perform undesirable operations such as turning on the light during midnight and ignoring user s command. Figure 2. Simple illustration of provisioned device and not provisioned device 4

5 Figure 3. Provisioning Manager Module Block Diagram The Provisioning Manager has two major roles: Ownership Transferring, and Security management of owned devices (Credentials, Access Control List of the owned devices). Transferring Ownership When performing this role, PM discovers un-owned devices from the network and tries to transfer ownership of the discovered device to the admin (=provisioning manager application). Ownership Transfer Manager sub-module is in charge of this role. Current version supports following methods of ownership transfer Just-works ownership transfer method Random PIN based ownership transfer method Security management of owned devices 5

6 When performing this role, PM provisions credentials and ACL to the owned devices. Also, PM has a capability to revoke credentials from every owned device in the network and remove ACL on the provisioned device. To support revocation, PM has to keep tracks of provisioned credentials and ACLs. The provisioning database manager keeps provisioned credential history to manage OIC network. Provisioning Database Manager and Secure Resource Provider sub-modules are in charge of this role. Ownership Transfer Manager (OTM) When provisioning manager (PM) application receives supported Ownership transfer methods from the resource server during the ownership transfer process, PM selects the most secure ownership transfer method and continues the remained ownership transfer process. Since provisioning manager has to accept various ownership transfer methods (OxM), OTM should provide proper callbacks to each OxM. The provided callbacks should be implemented by each OxM developer. In order to add new OxM, OxM developer should implement four callbacks below. 1. Function to load secret value used to derive temporal key to establish a DTLS session and save this generated temporal key to /oic/sec/cred. - Callback Name: loadsecretcb - Prototypes: typedef OCStackResult (*OTMLoadSecret)(OTMContext_t* otmctx); 2. Function to establish a temporary DTLS session. In this callback, ciphersuite will not be specified. All enable ciphersuites will be sent. The temporal key generated during step 1 will be used to create secure session. - Callback Name : createsecuresessioncb - Prototypes : typedef OCStackResult (*OTMCreateSecureSession)(OTMContext_t* otmctx); 3. Function generating payload for selecting ownership transfer method. This payload will be sent to the un-owned resource server. - Callback Name : createselectoxmpayloadcb - Prototypes : typedef char* (*OTMCreatePayloadCallback)(OTMContext_t* otmctx); 4. Function generating payload for finalizing ownership transfer method. This payload generally includes status change information such as owned=true. This payload will be sent to un-owned resource server. - Callback Name : createownertransferpayloadcb - Prototypes : typedef char* (*OTMCreatePayloadCallback)(OTMContext_t* otmctx); 6

7 After ownership transfer method callbacks are implemented, provisioning application developer should register these callback functions by invoking OCSetOwnerTransferCallbackData API. OTM will use these callback functions internally to continue ownership transfer according to the selected OxM. Figure2 is a diagram representing the function call sequence of ownership transfer in the provisioning manager application. Figure 4. Ownership transfer sequence diagram OTM supports Just works OxM and PIN based OxM by default. But OCSetOwnerTransferCallbackData should be invoked in the provisioning application side as follows: 7

8 OTMCallbackData_t justworkscbdata = {}; justworkscbdata.createsecuresessioncb = CreateSecureSessionJustWorksCallback; justworkscbdata.createselectoxmpayloadcb = CreateJustWorksSelectOxmPayload; justworkscbdata.createownertransferpayloadcb = CreateJustWorksOwnerTransferPayload; OTMSetOwnershipTransferCallbackData(OIC_JUST_WORKS, &justworkscbdata); OTMCallbackData_t pinbasedcbdata = {}; pinbasedcbdata.loadsecretcb = InputPinCodeCallback; pinbasedcbdata.createsecuresessioncb = CreateSecureSessionRandomPinCallbak; pinbasedcbdata.createselectoxmpayloadcb = CreatePinBasedSelectOxmPayload; pinbasedcbdata.createownertransferpayloadcb = CreatePinBasedOwnerTransferPayload; OTMSetOwnershipTransferCallbackData(OIC_RANDOM_DEVICE_PIN, &pinbasedcbdata); Code 1. Sample code to register the OxM callback In case of Just works OxM, loadsecretcb doesn t have a role to do during the Just works ownership transfer because Just works OxM will use anonymous ciphersuite to establish a temporary DTLS session (TLS_ECDH_anon_WITH_AES_128_CBC_SHA256). Thus, secret value isn t required to establish a DTLS session. In case of PIN based OxM, loadsecretcb ask user to poke the PIN value. This PIN number is used to derive temporal key to establish temporary DTLS session. After the temporary DTLS session is established, remaining proceed of ownership transfer is the same. Figure 3 and figure 4 decribe detailed process of each OxM. Figure 5. Just-works OxM flow 8

9 Figure 6. "Random PIN based" OxM flow Secure Resource Provider (SRP) Secure resource provider (SRP) APIs of provisioning manager are responsible for provisioning secure resources to resource server(s). Secure resources provisioning include ACL provisioning and credentials provisioning. Following are the SRP capabilities - Provisioning of ACL to a specific device. (/oic/sec/acl) - Generating credential resource currently only supports symmetric credential provisioning; Current supported length of key is 128 and 256 bits and provisioning generated credentials. (/oic/sec/cred) - Providing pair-wise credential and ACL between two devices, Single API is capable of provisioning credentials and provisioning ACL, so that two devices can communicate over secure channel. Provision ACL ACL provisioning API of provisioning manager can provisioning ACL resource to resource server. 9

10 User can define ACL according to the need and this API can be used to send generated ACL to resource server over secure channel. In order to provision ACL to proper target resource server, we need to discover devices using owned discovery; owned discovery is provided with provisioning manager as a utility module. Owned discovery returns list of already owned devices. Provision Credential Figure 7. ACL Provisioning sequence diagram Credential provisioning API of provisioning manager is responsible for provisioning credential resource to resource server. Current version supports generation of symmetric key of size 128 bits and 256 bits and generated key will be provisioned to devices. Provision credential APIs always work with a pair of devices which need credential so that communicate over secure channel because current provisioning manager support only symmetric key type credential. In order to use this API we need to use owned discovery to get list of devices and from that list we can choose devices that needs credential provisioning. 10

11 Figure 8. Credential Provisioning sequence diagram Revoke ACL (Future Work) PM should be able to remove inappropriate or invalid ACL resource on the target resource server. Thus, PM should have capability of GET current ACL resources on the target resource server for review of the ACL resources. The OicSecAcl_t in securevirtualresourcetypes.h is used to contain the received ACL resources. After reviewing by an administrator, the admin may remove or update the ACL resource. If the admin wants to remove all ACL, PM can send a DELETE request on /oic/sec/acl of the resource server. If the admin wants update, User can create new ACL by reviewing ACL and then can send DELETE request on /oic/sec/acl to delete the old ACL and then POST new ACL. Example Query for ACL revocation DELETE oic/sec/acl & PUT oic/sec/acl: Query would reset ACL to default state. This is supported now. Partial update with GET and PUT request is not allowed now. Whole update with DELETE and POST is allowed. 11

12 DELETE oic/sec/acl?subjectid=xxx&&rsrc=yyyy. ACE consist of subject, resource, permission and owners to successful search a ACE among the list of ACEs we need to provide pair of subject and resource. Then particular entry of that resource from list can be removed. This query is not supported right now but might be supported later Revoke Credential PM should have capability to remove already provisioned credentials of selected device on every owned device in the network in order to keep valid trust relationships among owned devices. Revocation of the provisioned credential from every provisioned device should be performed whenever one of the provisioned devices is removed from the network for some reason (lost, stolen, resale and etc). To identify which devices are related to the removed device, PM should keep track of credential provisioning history and manage the history by using database. After identifying which devices have the credential which should be revoked, DELETE request to the /oic/sec/cred is sent by PM. Credential revocation flow can be varied according to the credential types. (Symmetric key and certificate will be covered) As credential revocation is multiple request response process, in which Provisioning tool will send request to all the devices which share credential with a device for which credentials are to be deleted. In case during this process some devices are turned off. Then we can t remove credentials from them and their DB would contain stale credential entries. To overcome this problem we can create call to check and update network according to provisioning DB. Every time we send credential revocation request we have to wait for specific time to wait for response. If we didn t get the response back then we can assume that that particular device is stale and currently is unable to respond to request and we have to perform credential revocation again on this device in future. 12

13 Figure 9. Abstracted device revocation sequence diagram Above diagram shows device revocation sequence. Resource server 1, Resource server 2 and Resource server 3 (further referred as RS1, RS2 and RS3) are already provisioned and admin wants to delete RS3 from network so user calls an API to delete the device (RS3). PM first search the Provisioning Database module (PDM) to get information about all the devices which shares pairwise credential with the RS3. DELETE request to delete the credential is sent to devices listed in previous step. 13

14 Figure 10. Abstracted a pairwise credential revocation sequence diagram In case we have two devices which are provisioned with pairwise credential and admin want to revoke those credentials so that those two devices cannot communicate over secure channel. Suppose RS3 and RS2 are provisioned with pairwise credentials and admin wants to revoke it. PM will send delete request to RS3 to delete credential corresponding to RS2 and send delete request to RS2 to delete credential corresponding to RS3. Provisioning Database Manager (PDM) The initial version of PDM will provide APIs for managing credential provisioning history. (We will consider ACL later). Since persistent storage is platform (OS and H/W) specific, the application should provide required functions to the PDM and the PDM provides them to the PM. Open: If we fix the data structure for managing credential provisioning history, there could be a no chance to utilize exist database solution such as SQLite. Otherwise, if we don t fix the data structure, the complexity of application developer is increased dramatically. We should have to think about what level of abstraction is proper for application developer and the management complexity is high enough to use database management system. 14

15 What kinds of data are saved into this Provisioning Database? - Credential provisioning history to maintain network properly, ACL provisioning information to provide useful security information to administrator. In case of certificate based credential management, Certificate Authority s subject name, public/private key, issued history and certificate which is only used to issue device certificate can be stored into the provisioning database. * We can use file or database, the implementation could be varied according to the storage type. Current explanation assumes that we are going to use SQLite DB. Following are the explanation of interfaces exposed by PDM to PM OCStackResult PDMInit(); This function performs the initialization operations like opening DB connection OCStackResult PDMAddDevice(OicUuid_t* UUID); It adds the device UUID information to persistent storage. It will be called after every successful ownership transfer. OCStackResult PDMLinkDevices(OicUuid_t *UUID1, OicUuid_t *UUID2); It saves the link information of two devices in persistent storage, Every time after successful credential provisioning between two devices. This API is called to save the link information. OCStackResult PDMUnlinkDevices(OicUuid_t *UUID1, OicUuid_t *UUID2); It removes the link information from persistent storage. Every time after successful credential revocation between two devices this API is called to remove the link information. OCStackResult PDMDeleteDevice(OicUuid_t *UUID); It removes complete information of device including all the link information and device s owned information from persistent storage. This API is called along device revocation API. OCStackResult PDMGetOwnedDevices(OCUuidList_t** uuidlist, size_t* numofdevices); This API fetches owned device list from persistent storage and provide list to its caller. OCStackResult PDMGetLinkedDevices(OicUuid_t* UUID, OCUuidList_t** UUIDLIST, size_t* numofdevices); This API fetches the information of credential pair links from the persistent storage 15

16 and provides a list of all the devices which are linked to specified device Id. OCStackResult PDMGetToBeUnlinkedDevices(OCPairList** staledevlist, size_t* numofdevices); This API lists all the devices of which credential were supposed to be removed but these devices didn t respond to the revocation call due to some uncontrollable external factors (like power off). OCStackResult PDMIsLinksExists(const OicUuid_t* uuidofdevice1, const OicUuid_t* uuidofdevice2, bool* result); This API is used by provisioning manager to check does the link exists between Two devices or not. OCStackResult PDMSetLinkStale(const OicUuid_t* uuidofdevice1, const OicUuid_t* uuidofdevice2); This method is used by provisioning manager to update linked status as stale. OCStackResult PDMClose(); API to perform tasks like closing of DB connection. Public Provisioning Manager API OCStackResult OCInitPM(const char* dbpath) The function is responsible for initialization of the provisioning manager. It will load provisioning database which have owned device's list and their linked status. (Future work: If there is a device(s) which has not up-to-date credentials, this function will automatically try to update the device(s).) OCStackResult OCDiscoverUnownedDevices(unsigned short waittime, OCProvisionDev_t **pplist) The function is responsible for discovery of device is current subnet. It will list all the device in subnet which are not yet owned. OCStackResult OCDiscoverOwnedDevices(unsigned short timeout, OCProvisionDev_t **pplist) The function is responsible for discovery of owned device is current subnet. It will list all the device in subnet which are owned by calling provisioning client. 16

17 OCStackResult OCDoOwnershipTransfer(void *ctx, OCProvisionDev_t *targetdevice, OCProvisionResultCB resultcallback) API to performing ownership transfer for unowned devices. The device list obtained from OCDiscoverUnownedDevices can be used as first parameter. The Second parameter passed to the result callback function that will be called when ownership transfer is finished. The result callback is invoked only once all the ownership transfer is finished. OCStackResult OCSetOwnerTransferCallbackData(OicSecOxm_t oxm, OTMCallbackData_t *callbackdata) API to register for particuar OxM(ownership transfer method)'s callback function. Implementation of callback function will be provided in resource/csdk/security/provisioning/include/oxm*.h. OCStackResult OCProvisionPairwiseDevices(void *ctx, OicSecCredType_t type, size_t keysize, const OCProvisionDev_t *pdev1, OicSecAcl_t *pdev1acl, const OCProvisionDev_t *pdev2, OicSecAcl_t *pdev2acl, OCProvisionResultCB resultcallback) API to provision credentials between two devices and ACLs for the devices who act as a server. OCStackResult OCProvisionACL(void *ctx, const OCProvisionDev_t *selecteddeviceinfo, OicSecAcl_t *acl, OCProvisionResultCB resultcallback) API to send ACL information to resource. OCStackResult OCProvisionCredentials(void *ctx,oicseccredtype_t type, size_t keysize, const OCProvisionDev_t *pdev1, const OCProvisionDev_t *pdev2, OCProvisionResultCB resultcallback) API to provision credential to devices. void OCDeleteDiscoveredDevices(OCProvisionDev_t *plist) API to delete memory allocated to linked list created by OCDiscover_XXX_Devices API. OCStackResult OCUnlinkDevice(void *ctx, const OCProvisionDev_t* ptargetdev1, const OCProvisionDev_t* ptargetdev2, OCProvisionResultCB resultcallback) This function will remove the credential & relationship between the two devices. 17

18 OCStackResult OCRemoveDevice(void* ctx, unsigned short waittimeforowneddevicediscovery, const OCProvisionDev_t* ptargetdev, OCProvisionResultCB resultcallback) This function will remove credential of target device from all devices in subnet. OCStackResult OCGetDevInfoFromNetwork(unsigned short waittime, OCProvisionDev_t** powneddevlist, OCProvisionDev_t** UnownedDevList) API to get status of all the devices in current subnet. The status includes endpoint information and doxm information which can be extracted during owned and unowned discovery. Along with this information. The API will provide information about devices' status Device can have following states - ON/OFF: Device is switched on or off. OCStackResult OCGetLinkedStatus(const OicUuid_t* uuidofdevice, OCUuidList_t** uuidlist, size_t* numofdevices) This method is used to get linked devices' IDs. void OCDeleteUuidList (OCUuidList_t* plist) API to delete memory allocated to OicUuid_t list. void OCDeleteACLList (OicSecAcl_t* pacl) API to delete memory allocated to ACL data. OCStackResult OCProvisionCRL(void* ctx, const OCProvisionDev_t *selecteddeviceinfo, OicSecCrl_t *crl, OCProvisionResultCB resultcallback) This function sends CRL information to resource. 18

19 C++/Android API Support All public PM APIs support C++ and Android APIs. These are the list of the APIs. C++ APIs: resource/include Android APIs: Android/android_api/base/jni C++ APIs Class : Credential : this is a data type for managing credentials used by the secure virtual resource. OicSecCredType_t getcredentialtype(); API to get the Credential Type used. The types can be 0: no security mode 1: symmetric pair-wise key 2: symmetric group key 4: asymmetric key 8: signed asymmetric key (aka certificate) 16: PIN /password size_t getcredentialkeysize(); API to get the Credential Key size. void setcredentialtype(oicseccredtype_t type); API to set the Credential Type used. The types can be 0: no security mode 1: symmetric pair-wise key 2: symmetric group key 4: asymmetric key 8: signed asymmetric key (aka certificate) 16: PIN /password void setcredentialkeysize(size_t keysize) API to set the Credential s key size. Class : OcSecure : This class is a collection of common functions, which do not operate resource specific static OCStackResult provisioninit(const std::string &dbpath); API to Initialize provisioning Manager by providing the provisioning database file path dbpath. 19

20 static OCStackResult discoverunowneddevices(unsigned short timeout, DeviceList_t &list); API to discover List of all devices in the subnet which are not yet Owned by the user. static OCStackResult discoverowneddevices(unsigned short timeout, DeviceList_t &list); API to discover List of all devices in the subnet which are Owned by the user. static OCStackResult setownertransfercallbackdata(oicsecoxm_t oxm, OTMCallbackData_t* callbackdata, InputPinCallback inputpin); API to set callback methods for ownership transfer for a particular OxmType (Ownership Transfer Method) and Pin Callback method to Input PIN. static OCStackResult getdevinfofromnetwork(unsigned short timeout, DeviceList_t &owneddevlist, DeviceList_t &unowneddevlist); API to get status of all the devices in current subnet. Device status will include information about - ON/OFF: Device is switched on or off. static OCStackResult setdisplaypincb(generatepincallback displaypin); Server API to register a callback to display the PIN for RANDOM_DEVICE_PIN authentication Class : OcSecureResource : This class represents a secure virtual resource and its state. OCStackResult doownershiptransfer(resultcallback resultcallback); API to start Ownership transfer of un-owned OcSecureResource Object, which was obtained by calling discoverunowneddevices. resultcallback will be called asynchronously with result after ownership transfer is complete. OCStackResult provisionpairwisedevices(const Credential &cred, const OicSecAcl_t* acl1, const OCSecureResource &device2, const OicSecAcl_t* acl2, ResultCallBack resultcallback); API to provision credentials and ACLs between two devices who act as a server. First device is the object for which this API is called. OCStackResult provisioncredentials(const Credential &cred, const OCSecureResource &device2, ResultCallBack resultcallback); API to provision credentials to the device. resultcallback will be called asynchronously with result of credential provisioning. OCStackResult provisionacl(const OicSecAcl_t* acl, ResultCallBack resultcallback); API to send ACL to the device. resultcallback will be called asynchronously with result of ACL provisioning. OCStackResult unlinkdevices(const OCSecureResource &device2, ResultCallBack resultcallback); 20

21 API to remove credentials and relationship between two devices. First device is the object for which this API is called. OCStackResult removedevice(unsigned short waittimeforowneddevicediscovery, ResultCallBack resultcallback); API to unlink the device links to each device it is linked with. OCStackResult getlinkeddevices(uuidlist_t &uuidlist); API to get List of all devices it is linked with. std::string getdevaddr(); API to get IP address of the device as a String. std::string getdeviceid(); API to get device ID (UUID) of the device as B64 encoded string. int getdevicestatus(); API to get status of the device. ON or OFF or INVALID bool getownedstatus(); API to get Owned/Unowned status of the device. OWNED or UNOWNED or INVALID Android APIs Class : OcProvisioning : This class is a collection of common functions, which do not operate resource specific public static native void provisioninit(string dbpath) throws OcException; API to Initialize provisioning Manager by providing the provisioning database file path dbpath. public static List<OcSecureResource> discoverunowneddevices(int timeout) throws OcException API to discover List of all devices which are not owned/registered yet in the current subnet. public static List<OcSecureResource> discoverowneddevices(int timeout) throws OcException API to discover List of all devices which are owned/registered by provisioning Client. public static void SetownershipTransferCBdata(OxmType type, PinCallbackListener pincallbacklistener) throws OcException API to set particular OxmType (Ownership Transfer Method) and Pin Callback Listener Interface. Interface will be Implemented by the App developer. public static native void setdisplaypinlistener(displaypinlistener displaypinlistener) throws OcException; 21

22 Server specific API for registering Listener for generated PIN on the server side for displaying on the server screen. public static List<OcSecureResource> getdevicestatuslist(int timeout) throws OcException API to get List of all devices, Owned/registered OR un-owned/un-registered, in the current subnet. Class : OcSecureResource : This class represents a secure virtual resource and its state. public native void doownershiptransfer(doownershiptransferlistener doownershiptransferlistener) throws OcException; API to start Ownership transfer of un-owned/un-registered OcSecureResource Object, which was obtained by calling discoverunowneddevices. doownershiptransferlistener will be Notified un-synchronously with result after ownership transfer. public void provisionpairwisedevices(enumset<credtype> credtypeset, KeySize keysize, Object acl1,object device2, Object acl2, ProvisionPairwiseDevicesListener provisionpairwisedeviceslistener) throws OcException API to provision credentials and ACLs between two devices who act as a server. provisionpairwisedeviceslistener will be notified un-synchronously with results of credential and ACL provisioning between two devices. public void provisioncredentials(enumset<credtype> credtypeset, KeySize keysize, Object device2, ProvisionCredentialsListener provisioncredentialslistener) throws OcException API to provision credentials to the device. provisioncredentialslistener will be notified un-synchronously with result of credential provisioning. public native void provisionacl(object acl, ProvisionAclListener provisionacllistener) throws OcException API to send ACL to the device. provisionacllistener will be notified unsynchronously with result of ACL provisioning. public native void unlinkdevices(object device2, UnlinkDevicesListener unlinkdeviceslistener) throws OcException API to remove credentials and relationship between two devices. unlinkdeviceslistener will be notified un-synchronously with result. public native void removedevice(int timeout, RemoveDeviceListener removedevicelistener) throws OcException; API to unlink the devices to each device it is linked with. removedevicelistener will be notified un-synchronously with result. public native List<String> getlinkeddevices(); API to get List of all devices it is linked with. 22

23 public native String getipaddr(); API to get Stringified IP address. public native String getdeviceid(); API to get device ID of the device. public DeviceStatus getdevicestatus() throws OcException API to get status of the device. ON or OFF or INVALID public OwnedStatus getownedstatus() throws OcException API to get Owned/Unowned status of the device. OWNED or UNOWNED or INVALID 23

Tizen/Artik IoT Lecture Chapter 16. IoTivity Provisioning Manager

Tizen/Artik IoT Lecture Chapter 16. IoTivity Provisioning Manager 1 Tizen/Artik IoT Lecture Chapter. IoTivity Provisioning Manager Sungkyunkwan University Contents Provisioning Manager Roles Architecture Ownership Transfer Method Just Work Discovery and Set Ownership

More information

IoTivity Big Picture. MyeongGi Jeong Software R&D Center

IoTivity Big Picture. MyeongGi Jeong Software R&D Center IoTivity Big Picture MyeongGi Jeong 2016.11.17 Software R&D Center Contents Overview Features Messaging Security Service Q&A Copyright c 2016 SAMSUNG ELECTRONICS. ALL RIGHTS RESERVED Overview IoTivity?

More information

IOTIVITY INTRODUCTION

IOTIVITY INTRODUCTION IOTIVITY INTRODUCTION Martin Hsu Intel Open Source Technology Center 1 Content may contain references, logos, trade or service marks that are the property of their respective owners. Agenda Overview Architecture

More information

OCF for resource-constrained environments

OCF for resource-constrained environments October 11 13, 2016 Berlin, Germany OCF for resource-constrained environments Kishen Maloor, Intel 1 Outline Introduction Brief background in OCF Core Constrained environment charactertics IoTivity-Constrained

More information

OIC SECURITY SPECIFICATION V1.1.1

OIC SECURITY SPECIFICATION V1.1.1 1 2 OIC SECURITY SPECIFICATION V1.1.1 Open Connectivity Foundation (OCF) admin@openconnectivity.org Copyright Open Connectivity Foundation, Inc. 2017. All rights Reserved 0 3 4 5 6 7 8 9 10 11 12 13 14

More information

OCF Security Specification

OCF Security Specification OCF Security Specification VERSION 1.3.0 November 2017 CONTACT admin@openconnectivity.org Copyright Open Connectivity Foundation, Inc. 2016-2017. All Rights Reserved. 1 LEGAL DISCLAIMER 2 3 4 5 6 7 8 9

More information

Salesforce1 Mobile Security White Paper. Revised: April 2014

Salesforce1 Mobile Security White Paper. Revised: April 2014 Salesforce1 Mobile Security White Paper Revised: April 2014 Table of Contents Introduction Salesforce1 Architecture Overview Authorization and Permissions Communication Security Authentication OAuth Pairing

More information

Provisioning IoT with Web NFC. Zoltan Kis Intel

Provisioning IoT with Web NFC. Zoltan Kis Intel Provisioning IoT with Web NFC Zoltan Kis (@zolkis), Intel Background JavaScript APIs for IoTivity, Soletta W3C Web NFC editor Web access to hardware Earlier: Network management (DSL) Mesh radio networks

More information

OCF 2.0 Clarify 10 parts on Section 7 SecWG CR2473. Legal Disclaimer

OCF 2.0 Clarify 10 parts on Section 7 SecWG CR2473. Legal Disclaimer Template version: 1.0 page 1 OCF 2.0 Clarify 10 parts on Section 7 SecWG CR2473 Legal Disclaimer THIS IS A DRAFT SPECIFICATION DOCUMENT ONLY AND HAS NOT BEEN ADOPTED BY THE OPEN CONNECTIVITY FOUNDATION.

More information

OAuth securing the insecure

OAuth securing the insecure Black Hat US 2011 khash kiani khash@thinksec.com OAuth securing the insecure roadmap OAuth flow malicious sample applications mobile OAuth google app web-based OAuth facebook app insecure implementation

More information

Linux Founda+on Collabora+on Summit: OIC Security. Ned Smith Intel

Linux Founda+on Collabora+on Summit: OIC Security. Ned Smith Intel Linux Founda+on Collabora+on Summit: OIC Security Ned Smith Intel 1 IoT A Metaphor for Pelagic Compu+ng What do I mean by pelagic compu;ng? Other Controller Larval slipper lobster riding on salp chain*

More information

Remote Procedure Call (RPC) and Transparency

Remote Procedure Call (RPC) and Transparency Remote Procedure Call (RPC) and Transparency Brad Karp UCL Computer Science CS GZ03 / M030 10 th October 2014 Transparency in Distributed Systems Programmers accustomed to writing code for a single box

More information

Developer manual. (Onvif Client Library) Happytimesoft Technology Co.,LTD

Developer manual. (Onvif Client Library) Happytimesoft Technology Co.,LTD Developer manual (Onvif Client Library) Happytimesoft Technology Co.,LTD Declaration All rights reserved. No part of this publication may be excerpted, reproduced, translated, annotated or edited, in any

More information

Batches and Commands. Overview CHAPTER

Batches and Commands. Overview CHAPTER CHAPTER 4 This chapter provides an overview of batches and the commands contained in the batch. This chapter has the following sections: Overview, page 4-1 Batch Rules, page 4-2 Identifying a Batch, page

More information

Libelium Cloud Hive. Technical Guide

Libelium Cloud Hive. Technical Guide Libelium Cloud Hive Technical Guide Index Document version: v7.0-12/2018 Libelium Comunicaciones Distribuidas S.L. INDEX 1. General and information... 4 1.1. Introduction...4 1.1.1. Overview...4 1.2. Data

More information

Basic DOF Security. Programmer s Guide. Version 7.0

Basic DOF Security. Programmer s Guide. Version 7.0 Basic DOF Security Programmer s Guide Version 7.0 Table of Contents Chapter 1: Introduction 1 How to Read This Guide 1 Security Concepts Overview 1 Roles 2 Chapter 2: Authentication Server Access 3 Installing

More information

Salesforce Mobile App Security Guide

Salesforce Mobile App Security Guide Salesforce Mobile App Security Guide Version 2, 2 @salesforcedocs Last updated: November 2, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,

More information

Single Sign On for Local Devices. Application Programmer Interface (API) Guide

Single Sign On for Local Devices. Application Programmer Interface (API) Guide Single Sign On for Local Devices Application Programmer Interface (API) Guide Issue 1 June 2013 ABSTRACT This document provides the API for the SSO-LD (Single Sign-On for Local Devices) capability, to

More information

Technical Overview. Version March 2018 Author: Vittorio Bertola

Technical Overview. Version March 2018 Author: Vittorio Bertola Technical Overview Version 1.2.3 26 March 2018 Author: Vittorio Bertola vittorio.bertola@open-xchange.com This document is copyrighted by its authors and is released under a CC-BY-ND-3.0 license, which

More information

EUROPEAN MIDDLEWARE INITIATIVE

EUROPEAN MIDDLEWARE INITIATIVE EUROPEAN MIDDLEWARE INITIATIVE COMMON AUTHENTICATION LIBRARY DEVELOPER S GUIDE Document version: 2.1.1 EMI Component Version: 2.x 1/14 This work is co-funded by the European Commission as part of the EMI

More information

Getting Started Guide. Version

Getting Started Guide. Version Getting Started Guide Version 1.15.0.0 2 Introduction Oculus Platform Copyrights and Trademarks 2017 Oculus VR, LLC. All Rights Reserved. OCULUS VR, OCULUS, and RIFT are trademarks of Oculus VR, LLC. (C)

More information

Pulseway Security White Paper

Pulseway Security White Paper Pulseway Security White Paper Table of Contents 1. Introduction 2. Encryption 2.1 Transport Encryption 2.2 Message Encryption 3. Brute-Force Protection 4. DigiCert Code Signing Certificate 5. Datacenter

More information

Opaali Portal Quick guide

Opaali Portal Quick guide Opaali Portal Quick guide Company information Telia Finland Oyj Teollisuuskatu 15, 00510 HELSINKI, FI Registered office: Helsinki Business ID 1475607-9, VAT No. FI14756079 1 (40) Page 2 (40) Copyright

More information

Tutorial: Building the Services Ecosystem

Tutorial: Building the Services Ecosystem Tutorial: Building the Services Ecosystem GlobusWorld 2018 Steve Tuecke tuecke@globus.org What is a services ecosystem? Anybody can build services with secure REST APIs App Globus Transfer Your Service

More information

Integration Service. Admin Console User Guide. On-Premises

Integration Service. Admin Console User Guide. On-Premises Kony MobileFabric TM Integration Service Admin Console User Guide On-Premises Release 7.3 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and

More information

Microsoft Recertification for MCSE: Server Infrastructure. Download Full Version :

Microsoft Recertification for MCSE: Server Infrastructure. Download Full Version : Microsoft Recertification for MCSE: Server Infrastructure Download Full Version : https://killexams.com/pass4sure/exam-detail/ Answer: C QUESTION: 99 Your company has an office in New York. Many users

More information

Google Sync Integration Guide. VMware Workspace ONE UEM 1902

Google Sync Integration Guide. VMware Workspace ONE UEM 1902 Google Sync Integration Guide VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

VSP16. Venafi Security Professional 16 Course 04 April 2016

VSP16. Venafi Security Professional 16 Course 04 April 2016 VSP16 Venafi Security Professional 16 Course 04 April 2016 VSP16 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for: Enterprise Security Officers

More information

Zymkey App Utils: C++

Zymkey App Utils: C++ Zymkey App Utils: C++ Generated by Doxygen 1.8.8 Tue Apr 3 2018 07:21:52 Contents 1 Intro 1 2 Hierarchical Index 5 2.1 Class Hierarchy............................................ 5 3 Class Index 7 3.1

More information

USER MANUAL. SalesPort Salesforce Customer Portal for WordPress (Lightning Mode) TABLE OF CONTENTS. Version: 3.1.0

USER MANUAL. SalesPort Salesforce Customer Portal for WordPress (Lightning Mode) TABLE OF CONTENTS. Version: 3.1.0 USER MANUAL TABLE OF CONTENTS Introduction...1 Benefits of Customer Portal...1 Prerequisites...1 Installation...2 Salesforce App Installation... 2 Salesforce Lightning... 2 WordPress Manual Plug-in installation...

More information

ACCP-V6.2Q&As. Aruba Certified Clearpass Professional v6.2. Pass Aruba ACCP-V6.2 Exam with 100% Guarantee

ACCP-V6.2Q&As. Aruba Certified Clearpass Professional v6.2. Pass Aruba ACCP-V6.2 Exam with 100% Guarantee ACCP-V6.2Q&As Aruba Certified Clearpass Professional v6.2 Pass Aruba ACCP-V6.2 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money Back

More information

USER MANUAL ID PROOFING AND TWO-FACTOR AUTHENTICATION THROUGH FALCON PHYSICIAN TABLE OF CONTENTS

USER MANUAL ID PROOFING AND TWO-FACTOR AUTHENTICATION THROUGH FALCON PHYSICIAN TABLE OF CONTENTS FALCON PHYSICIAN in partnership with SYMANTEC and SURESCRIPTS USER MANUAL ID PROOFING AND TWO-FACTOR AUTHENTICATION THROUGH FALCON PHYSICIAN TABLE OF CONTENTS Quick Overview PG. ii What You ll Need PG.

More information

Administrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration.

Administrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. Administrator Guide Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. The information and content in this document is provided for informational purposes

More information

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

VMware AirWatch Google Sync Integration Guide Securing Your  Infrastructure VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

Programming Guide. WISE-PaaS/RMM 3.2. Wireless IoT Sensing Embedded Agent WISE-Agent Programming Guide

Programming Guide. WISE-PaaS/RMM 3.2. Wireless IoT Sensing Embedded Agent WISE-Agent Programming Guide Programming Guide WISE-PaaS/RMM 3.2 Wireless IoT Sensing Embedded Agent WISE-Agent Programming Guide Change Log: Date Version / Major change 2015/02/21 V0.1 Scott Chang, create draft document 2015/03/08

More information

Zumero for SQL Server: Client API

Zumero for SQL Server: Client API Copyright 2013-2017 Zumero LLC Table of Contents 1. About... 1 2. Basics of zumero_sync()... 1 3. Manipulating Data in SQLite... 3 4. Details for Advanced Users... 4 4.1. Additional Functions in the API...

More information

Dolby Conference Phone. Configuration guide for BT MeetMe with Dolby Voice

Dolby Conference Phone. Configuration guide for BT MeetMe with Dolby Voice Dolby Conference Phone Configuration guide for BT MeetMe with Dolby Voice Version 3.2 17 May 2017 Copyright 2017 Dolby Laboratories. All rights reserved. Dolby Laboratories, Inc. 1275 Market Street San

More information

Instructions 1 Elevation of Privilege Instructions

Instructions 1 Elevation of Privilege Instructions Instructions 1 Elevation of Privilege Instructions Draw a diagram of the system you want to threat model before you deal the cards. Deal the deck to 3-6 players. Play starts with the 3 of Tampering. Play

More information

Troubleshooting Guide

Troubleshooting Guide . All right reserved. For more information about Specops Reset and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Password Reset is a trademark owned by Specops Software.

More information

Managed Access Gateway. User Guide

Managed Access Gateway. User Guide Managed Access Gateway User Guide Version 2.2 Exostar, LLC November 3, 2011 Table of Contents Table of Contents... ii Purpose... 1 Log-in to your MAG Account... 2 Additional MAG Login Options... 2 First

More information

October J. Polycom Cloud Services Portal

October J. Polycom Cloud Services Portal October 2018 3725-42461-001J Polycom Cloud Services Portal Copyright 2018, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format, or

More information

INSTALLATION GUIDE Spring 2017

INSTALLATION GUIDE Spring 2017 INSTALLATION GUIDE Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and

More information

Managed Access Gateway. User Guide

Managed Access Gateway. User Guide Managed Access Gateway User Guide Version 3.0 Exostar, LLC April 20, 2013 Table of Contents Table of Contents...ii Purpose... 1 Log-in to your MAG Account... 2 Additional MAG Login Options... 2 First Time

More information

AWS IAM User Guide for Cohesive Networks Support. Creating an Amazon Identity and Access Management User with "read only" policy

AWS IAM User Guide for Cohesive Networks Support. Creating an Amazon Identity and Access Management User with read only policy AWS IAM User Guide for Cohesive Networks Support Creating an Amazon Identity and Access Management User with "read only" policy 2016 Table of Contents Access the AWS IAM Service via AWS Portal 3 Create

More information

Authenticating SMTP Sessions Using Client Certificates

Authenticating SMTP Sessions Using Client Certificates Authenticating SMTP Sessions Using Client Certificates This chapter contains the following sections: Overview of Certificates and SMTP Authentication, on page 1 Checking the Validity of a Client Certificate,

More information

Regions OnePass USER GUIDE. It s time to expect more. Regions Bank Member FDIC Revised

Regions OnePass USER GUIDE. It s time to expect more. Regions Bank Member FDIC Revised Regions OnePass USER GUIDE It s time to expect more. Regions Bank Member FDIC Revised 051616 User Guide Table of Contents Section I. Regions OnePass Basics 3 What Is Regions OnePass? 3 Minimum Browser

More information

Digital Certificates Demystified

Digital Certificates Demystified Digital Certificates Demystified Ross Cooper, CISSP IBM Corporation RACF/PKI Development Poughkeepsie, NY Email: rdc@us.ibm.com August 9 th, 2012 Session 11622 Agenda Cryptography What are Digital Certificates

More information

About 1. Chapter 1: Getting started with odata 2. Remarks 2. Examples 2. Installation or Setup 2. Odata- The Best way to Rest 2

About 1. Chapter 1: Getting started with odata 2. Remarks 2. Examples 2. Installation or Setup 2. Odata- The Best way to Rest 2 odata #odata Table of Contents About 1 Chapter 1: Getting started with odata 2 Remarks 2 Examples 2 Installation or Setup 2 Odata- The Best way to Rest 2 Chapter 2: Azure AD authentication for Node.js

More information

Advanced ASP.NET Identity. Brock Allen

Advanced ASP.NET Identity. Brock Allen Advanced ASP.NET Identity Brock Allen brockallen@gmail.com http://brockallen.com @BrockLAllen Advanced The complicated bits of ASP.NET Identity Brock Allen brockallen@gmail.com http://brockallen.com @BrockLAllen

More information

Credential Management for Internet of Things Devices

Credential Management for Internet of Things Devices Credential Management for Internet of Things Devices Internet Protocol for Smart Objects (IPSO) Alliance Editors: Hannes Tschofenig, ARM Limited Ned Smith, Intel Contributors: Mark Baugher, Consultant

More information

This Document describes the API provided by the DVB-Multicast-Client library

This Document describes the API provided by the DVB-Multicast-Client library DVB-Multicast-Client API-Specification Date: 17.07.2009 Version: 2.00 Author: Deti Fliegl This Document describes the API provided by the DVB-Multicast-Client library Receiver API Module

More information

Lenovo ThinkAgile XClarity Integrator for Nutanix Installation and User's Guide

Lenovo ThinkAgile XClarity Integrator for Nutanix Installation and User's Guide Lenovo ThinkAgile XClarity Integrator for Nutanix Installation and User's Guide Version 1.0 Note Before using this information and the product it supports, read the information in Appendix A Notices on

More information

Instructions 1. Elevation of Privilege Instructions. Draw a diagram of the system you want to threat model before you deal the cards.

Instructions 1. Elevation of Privilege Instructions. Draw a diagram of the system you want to threat model before you deal the cards. Instructions 1 Elevation of Privilege Instructions Draw a diagram of the system you want to threat model before you deal the cards. Deal the deck to 3 6 players. Play starts with the 3 of Tampering. Play

More information

flask-jwt-simple Documentation

flask-jwt-simple Documentation flask-jwt-simple Documentation Release 0.0.3 vimalloc rlam3 Nov 17, 2018 Contents 1 Installation 3 2 Basic Usage 5 3 Changing JWT Claims 7 4 Changing Default Behaviors 9 5 Configuration Options 11 6 API

More information

Software Release Notes for XSS AD/SQL version 5.1.3

Software Release Notes for XSS AD/SQL version 5.1.3 Software Release Notes for XSS AD/SQL version 5.1.3 Support Information: Ensure Technologies Technical Support is available to provide any needed assistance. Please contact us at (734) 668-8800 or at support@ensuretech.com.

More information

Building the Modern Research Data Portal using the Globus Platform. Rachana Ananthakrishnan GlobusWorld 2017

Building the Modern Research Data Portal using the Globus Platform. Rachana Ananthakrishnan GlobusWorld 2017 Building the Modern Research Data Portal using the Globus Platform Rachana Ananthakrishnan rachana@globus.org GlobusWorld 2017 Platform Questions How do you leverage Globus services in your own applications?

More information

innovi Edge Installation & Configuration Guide

innovi Edge Installation & Configuration Guide innovi Edge 200 - Installation & Configuration Guide Version 1.5, January 2018 Table of Contents 1. Overview... 3 2. Prerequisites and Design Considerations... 4 2.1. Required Equipment... 4 2.2. Networking...

More information

Support Device Access

Support Device Access Personal Devices on a Corporate Network (BYOD), on page 1 Personal Device Portals, on page 2 Support Device Registration Using Native Supplicants, on page 7 Device Portals Configuration Tasks, on page

More information

FortiAuthenticator - Two-Factor Authentication for Web Applications Solution Guide VERSION 1.0

FortiAuthenticator - Two-Factor Authentication for Web Applications Solution Guide VERSION 1.0 FortiAuthenticator - Two-Factor Authentication for Web Applications Solution Guide VERSION 1.0 FORTINET DOCUMENT LIBRARY http://docs.fortinet.com FORTINET VIDEO GUIDE http://video.fortinet.com FORTINET

More information

Getting Into Mobile Without Getting Into Trouble

Getting Into Mobile Without Getting Into Trouble Getting Into Mobile Without Getting Into Trouble Greg Kliewer Senior Solutions Strategist October, 2014 The good old days Network separation No programmatic access from the Public Internet Safety through

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

The Mobile Terminal Security Access System Based on IPSec VPN Di Zhao1,a, Xin He2,b and Yunjun Li1,c*

The Mobile Terminal Security Access System Based on IPSec VPN Di Zhao1,a, Xin He2,b and Yunjun Li1,c* 3rd International Conference on Machinery, Materials and Information Technology Applications (ICMMITA 2015) The Mobile Terminal Security Access System Based on IPSec VPN Di Zhao1,a, Xin He2,b and Yunjun

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

Lustre Client GSS with Linux Keyrings

Lustre Client GSS with Linux Keyrings Lustre Client GSS with Linux Keyrings Eric Mei 2008.07.22 1 Introduction This document describes how Lustre use keyring to populate and manage the client gss context, to replace current

More information

Network Address Translators (NATs) and NAT Traversal

Network Address Translators (NATs) and NAT Traversal Network Address Translators (NATs) and NAT Traversal Ari Keränen ari.keranen@ericsson.com Ericsson Research Finland, NomadicLab Outline Introduction to NATs NAT Behavior UDP TCP NAT Traversal STUN TURN

More information

Integration Service. Admin Console User Guide. On-Premises

Integration Service. Admin Console User Guide. On-Premises Kony Fabric Integration Service Admin Console User Guide On-Premises Release V8 SP1 Document Relevance and Accuracy This document is considered relevant to the Release stated on this title page and the

More information

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT

INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT ESCB-PKI REGISTRATION AUTHORITY APPLICATION MOST COMMON ERRORS VERSION 1.2 ECB-PUBLIC 15-November-2012 ESCB-PKI - Common errors v.1.2.docx Page 2 of 20

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

Software Release Notes for XSS AD/SQL version 5.1.0

Software Release Notes for XSS AD/SQL version 5.1.0 Software Release Notes for XSS AD/SQL version 5.1.0 Support Information: Ensure Technologies Technical Support is available to provide any needed assistance. Please contact us at (734) 668-8800 or at support@ensuretech.com.

More information

Mobile Payment Application Security. Security steps to take while developing Mobile Application s. SISA Webinar.

Mobile Payment Application Security. Security steps to take while developing Mobile Application s. SISA Webinar. Mobile Payment Application Security Security steps to take while developing Mobile Application s About SISA Payment Security Specialists PCI Certification Body (PCI Qualified Security Assessor) Payment

More information

New in Release: Secomea Release 8.0. This document shows the changes from release 7.4 to release 8.0. Version: 1.5, 2018

New in Release: Secomea Release 8.0. This document shows the changes from release 7.4 to release 8.0. Version: 1.5, 2018 New in Release: Secomea Release 8.0 This document shows the changes from release 7.4 to release 8.0. Version: 1.5, 2018 Table of Contents Change log 4 1. Release 8.0 4 Highlights 4 2. General 6 2.1. New

More information

BlackBerry Developer Summit. A02: Rapid Development Leveraging BEMS Services and the AppKinetics Framework

BlackBerry Developer Summit. A02: Rapid Development Leveraging BEMS Services and the AppKinetics Framework BlackBerry Developer Summit A02: Rapid Development Leveraging BEMS Services and the AppKinetics Framework Page 2 of 21 Table of Contents 1. Workbook Scope... 4 2. Compatibility... 4 3. Source code download

More information

CONNECTLED CUSTOMER ADMIN GUIDE

CONNECTLED CUSTOMER ADMIN GUIDE CONNECTLED CUSTOMER ADMIN GUIDE For Customer Admin JUNE 28, 2018 EVLUMA 3600 Lind Ave SW Suite#140 Renton WA 98057, 100432-001 REV A05 Table of Contents 1. Definitions... 3 2. General ConnectLED Account

More information

VMware Horizon Workspace Security Features WHITE PAPER

VMware Horizon Workspace Security Features WHITE PAPER VMware Horizon Workspace WHITE PAPER Table of Contents... Introduction.... 4 Horizon Workspace vapp Security.... 5 Virtual Machine Security Hardening.... 5 Authentication.... 6 Activation.... 6 Horizon

More information

Regions OnePassSM USER GUIDE. It s time to expect more. Regions Bank Member FDIC Revised

Regions OnePassSM USER GUIDE. It s time to expect more. Regions Bank Member FDIC Revised Regions OnePassSM USER GUIDE Regions Bank Member FDIC Revised 110614 It s time to expect more. Regions OnePass User Guide Table of Contents Section I. OnePass Basics 3 What Is OnePass? 3 Minimum Browser

More information

What Is Wireless Setup

What Is Wireless Setup What Is Wireless Setup Wireless Setup provides an easy way to set up wireless flows for 802.1x, guest, and BYOD. It also provides workflows to configure and customize each portal for guest and BYOD, where

More information

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365

WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 WHITE PAPER AIRWATCH SUPPORT FOR OFFICE 365 Airwatch Support for Office 365 One of the most common questions being asked by many customers recently is How does AirWatch support Office 365? Customers often

More information

Pulse Secure Mobile Android Release 6.3.0

Pulse Secure Mobile Android Release 6.3.0 Pulse Secure Mobile Android Release 6.3.0 Pulse Secure Mobile 6.3R1 for Android (build # 6.3.0. r235864.19) Pulse Secure Client Release 6.3R1 Document Revision 1.0 Published: 2017-07-10 2017 by Pulse Secure,

More information

NetDrive2 SDK Reference

NetDrive2 SDK Reference NetDrive2 SDK Reference Bdrive Inc, Copyright Bdrive inc, All Rights Reserved version date e-mail 0.1 2014-4-10 jyyoon@bdrive.com 0.2 2014-5-9 jyyoon@bdrive.com 0.3 2014-6-14 jyyoon@bdrive.com 0.4 2014-7-14

More information

The Multi Domain Administrator account can operate with Domain Administrator privileges on all associated Domain Administrator users.

The Multi Domain Administrator account can operate with Domain Administrator privileges on all associated Domain Administrator users. User Management Libra Esva users can manage and access the system. With Libra Esva you can enable per-user quarantine and the system will create user accounts to enable access to quarantine settings and

More information

Security Philosophy. Humans have difficulty understanding risk

Security Philosophy. Humans have difficulty understanding risk Android Security Security Philosophy Humans have difficulty understanding risk Safer to assume that Most developers do not understand security Most users do not understand security Security philosophy

More information

Cryptographic Protocols 1

Cryptographic Protocols 1 Cryptographic Protocols 1 Luke Anderson luke@lukeanderson.com.au 5 th May 2017 University Of Sydney Overview 1. Crypto-Bulletin 2. Problem with Diffie-Hellman 2.1 Session Hijacking 2.2 Encrypted Key Exchange

More information

Cisco ISE Ports Reference

Cisco ISE Ports Reference Cisco ISE Infrastructure Cisco ISE Infrastructure, on page 1 Cisco ISE Administration Node Ports, on page 2 Cisco ISE Monitoring Node Ports, on page 4 Cisco ISE Policy Service Node Ports, on page 6 Cisco

More information

Outline. Interprocess Communication. Interprocess Communication. Communication Models: Message Passing and shared Memory.

Outline. Interprocess Communication. Interprocess Communication. Communication Models: Message Passing and shared Memory. Eike Ritter 1 Modified: October 29, 2012 Lecture 14: Operating Systems with C/C++ School of Computer Science, University of Birmingham, UK Outline 1 2 3 Shared Memory in POSIX systems 1 Based on material

More information

Network Security Essentials

Network Security Essentials Network Security Essentials Fifth Edition by William Stallings Chapter 4 Key Distribution and User Authentication No Singhalese, whether man or woman, would venture out of the house without a bunch of

More information

Tizen/Artik IoT Lecture Chapter 14. IoTivity Easy Setup Manager

Tizen/Artik IoT Lecture Chapter 14. IoTivity Easy Setup Manager 1 Tizen/Artik IoT Lecture Chapter 14. IoTivity Easy Setup Manager Sungkyunkwan University Contents Easy Setup Use Cases Device Roles Easy Setup Resource Model Provisioning Resource WiFi Resource DevConf

More information

Which compute option is designed for the above scenario? A. OpenWhisk B. Containers C. Virtual Servers D. Cloud Foundry

Which compute option is designed for the above scenario? A. OpenWhisk B. Containers C. Virtual Servers D. Cloud Foundry 1. A developer needs to create support for a workload that is stateless and short-living. The workload can be any one of the following: - API/microservice /web application implementation - Mobile backend

More information

Sponsored by the Alliance for Telecommunications Industry Solutions. CORBA Implementation Profile for Electronic Communications

Sponsored by the Alliance for Telecommunications Industry Solutions. CORBA Implementation Profile for Electronic Communications Sponsored by the Alliance for Telecommunications Industry Solutions CORBA Implementation Profile for Electronic Communications TCIF-98-014 Issue 1 09/16/1999 Copyright Page TCIF Guideline CORBA Implementation

More information

Tableau Server Security in Depth

Tableau Server Security in Depth Welcome # T C 1 8 Tableau Server Security in Depth Kacper Reiter Sr. Software Engineer Server and Cloud Platform Dinç Çiftçi Software Engineer Server and Cloud Platform Agenda General security model

More information

int fnvgetconfig(handle h, UINT32 id, const void *cfg, size_t sz);... 4

int fnvgetconfig(handle h, UINT32 id, const void *cfg, size_t sz);... 4 RP-VL-UTIL-V1 Developer s Guide [ Contents ] 1. Introduction... 1 2. Building Environment... 1 3. Operating Environment... 1 4. Function Explanation... 2 4.1. Common API for Transmitting and Receiving...

More information

MobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents

MobilePASS. Security Features SOFTWARE AUTHENTICATION SOLUTIONS. Contents MobilePASS SOFTWARE AUTHENTICATION SOLUTIONS Security Features Contents Introduction... 2 Technical Features... 2 Security Features... 3 PIN Protection... 3 Seed Protection... 3 Security Mechanisms per

More information

INTRODUCTION FEATURES OVERVIEW. a) Applicant Registration

INTRODUCTION FEATURES OVERVIEW. a) Applicant Registration INTRODUCTION The main objective of Grant Management System is to help Spices Board to distribute subsidy payments to about 300000 farmers distributed all over India through its network of offices. The

More information

Dolby Conference Phone 3.1 configuration guide for West

Dolby Conference Phone 3.1 configuration guide for West Dolby Conference Phone 3.1 configuration guide for West 17 January 2017 Copyright 2017 Dolby Laboratories. All rights reserved. For information, contact: Dolby Laboratories, Inc. 1275 Market Street San

More information

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Nasuni Data API Nasuni Corporation Boston, MA

Nasuni Data API Nasuni Corporation Boston, MA Nasuni Corporation Boston, MA Introduction The Nasuni API has been available in the Nasuni Filer since September 2012 (version 4.0.1) and is in use by hundreds of mobile clients worldwide. Previously,

More information

Web Self Service Administrator Guide. Version 1.1.2

Web Self Service Administrator Guide. Version 1.1.2 Version 1.1.2 Web Self Service Administrator Guide Version 1.1.2 Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance of the End User License Agreement.

More information

Support Device Access

Support Device Access Personal Devices on a Corporate Network (BYOD), on page 1 Personal Device Portals, on page 2 Support Device Registration Using Native Supplicants, on page 8 Device Portals Configuration Tasks, on page

More information

Chapter 9: Key Management

Chapter 9: Key Management Chapter 9: Key Management Session and Interchange Keys Key Exchange Cryptographic Key Infrastructure Storing and Revoking Keys Digital Signatures Slide #9-1 Overview Key exchange Session vs. interchange

More information

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3. Android Mobile Single Sign-On to VMware Workspace ONE SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware

More information

NotifySCM Workspace Security Server Guide

NotifySCM Workspace Security Server Guide NotifySCM Workspace Security Server Guide Version 3.16.0 - October 2017 NotifySCM Workspace: Security Server Guide Table of Contents 1 Overview... 4 Roles... 4 Login... 4 2 Technical Configuration... 6

More information