MuseKnowledge Proxy Source Profiling
|
|
- Erin Rose
- 6 years ago
- Views:
Transcription
1 MuseKnowledge Proxy Source Profiling MuseGlobal, Inc. One Embarcadero Suite 500 San Francisco, CA MuseGlobal S.A Calea Bucuresti Bl. 27B, Sc. 1, Ap. 10 Craiova, România EduLib, S.R.L. Calea Bucuresti Bl. 27B, Sc. 1, Ap. 2 Craiova, România Version: 1.0 Date: 22nd June 2016 Author: EduLib, S.R.L.
2 MuseKnowledge Proxy Highly customizable multi-platform proxy server Gateway to authenticated restricted content; Rewriting web server; Web Access Management (WAM); Multi tenant hosting for all customers; MuseKnowledge Proxy Applications: Fully configurable interfaces allowing administrators to setup remote or local Data Sources ("Sources"); End users enjoy a single sign-on for all of the subscribed data; The number of MuseKnowledge Proxy Applications and sources installed in an application are controlled by the license; More than 10 years within the Muse Federated Search Platform to manage the authentication to resources and the navigation to full text. PAGE 2
3 MuseKnowledge Proxy MuseKnowledge Proxy Terminology Source content provider resource (platform, website); MuseKnowledge Proxy Source profile XML file with the configuration options for a specific resource; MuseKnowledge Proxy files location on disk: ${MUSE_HOME}/proxy Where ${MUSE_HOME} is default %ProgramFiles%/muse on Windows Operating Systems and /opt/muse on Linux Operating Systems. MuseKnowledge Proxy Application location on disk: ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID Where Application_ID is the ID of the MuseKnowledge Proxy Application. Source profiles location on disk: ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/sources/ Assumptions for adding a new MuseKnowledge Proxy Source profile A MuseKnowledge Proxy Application already exists; The MuseKnowledge Proxy Application is accessible; The Source Groups are defined; The Source is defined and placed within at least one Source Group. PAGE 3
4 MuseKnowledge Proxy Software used for profiling Web browser: Google Chrome, Mozilla Firefox, Internet Explorer; Network sniffer: Fiddler, Browser Developer Tools; XML Editor (optional). XML files can be edited with any text editor (like Notepad for example) however it is good to verify the XML is well formed by loading it into a browser. Skills for MuseKnowledge Proxy Admin Good networking knowledge; Good understanding of HTTP; Good understanding of HTML; Good knowledge of the MuseKnowledge Proxy and its structure. PAGE 4
5 Source Configuration Source Profile XML file: ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/sources/S ourceid.xml Where Application_ID is the MuseKnowledge Proxy Application identifier and SourceID.xml is the XML configuration file associated with that resource. Sources index file: ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/Sources.x ml It contains the list of sources present in the MuseKnowledge Proxy Application. Sample entry: <SOURCE> <IDENTIFIER code="0">forensicnetbase</identifier> <NAME>FORENSICnetBASE</NAME> <DESCRIPTION>Featuring works by esteemed criminologists and forensic practitioners, this unparalleled e-library boasts an ever-growing number of essential references in crisis management and negotiation methods, arson and homicide investigation, expert witnessing, and forensic pathology. This versatile invaluable product is well-suited to the needs of the smallest of sheriff's departments to large governmental law enforcement agencies, such as the CIA, DEA, and FBI. </DESCRIPTION> </SOURCE> <MODULE> </MODULE> <CLASS>com.edulib.muse.proxy.application.sources.modules.impl.HttpModule</CLASS> <CONFIGURATION_FILE>${WEB_CONTEXT_HOME}/profiles/sources/FORENSICnetBASE.xml</CONFIGURATION_FILE> More PAGE 5
6 Source Configuration Sources Groups definitions: ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/SourcesGr oups.xml It contains the groups definitions. Sample entry: <SOURCES_GROUP> <IDENTIFIER>1</IDENTIFIER> <NAME>Default Sources</NAME> <SOURCES> </SOURCES> <IDENTIFIER>FORENSICnetBASE</IDENTIFIER> <IDENTIFIER>ProjectMuse</IDENTIFIER> </SOURCES_GROUP> 3 steps for enabling a MuseKnowledge Proxy source 1. Make sure the source XML profile exists, if not, create it by copying an existing one or download it from our EduLib web repository : ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/sources/SourceID.xml 2. Add a new entry in the sources index file, e.g. in the file: ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/Sources.xml 3. Add a new entry in the sources groups file, e.g. in the file: ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/SourcesGroups.xml PAGE 6
7 Basic Source Settings <URL> The URL of the target site service accessed by the source. Example: <URL> <NAME> The name of the source. Example: <NAME>IEEE Xplore Digital Library</NAME> <DESCRIPTION> A description of the source. Example: <DESCRIPTION>The IEEE Xplore digital library is a powerful resource for discovery and access to scientific and technical content published by the IEEE (Institute of Electrical and Electronics Engineers) and its publishing partners.</description> <REWRITING_PATTERNS> The URLs rewriting patterns. In the target site service pages only the URLs matching these patterns will be rewritten. Values: [include: PATTERNS], [exclude: PATTERNS] where PATTERNS = semicolon-delimited list of regular expressions matching the site's domain[:port][/url_file]. Example: <REWRITING_PATTERNS>*.ieee.org;*/*.js*;</REWRITING_PATTERNS> PAGE 7
8 Advanced Source Settings <TRANSPARENT_CONTENT_PATTERNS> URLs matching these patterns are rewritten to follow-up links if they match the REWRITING_PATTERNS, so they will be proxied, but their response content is not processed for rewrite. This is necessary because some resources needs to be requested from the same origin but should remain un-touched. Example: <TRANSPARENT_CONTENT_PATTERNS>*/*.js*;ieeexplore.ieee.org/xpl/mostPopular*.ajax*;ieeexplore.ieee.org/xpl/mostRecent*.ajax*;</T RANSPARENT_CONTENT_PATTERNS> <REWRITE_BY_HOST> true or false. This option states if the type of the follow-up links is Rewrite by Host. When set to true the follow-up links will contain the Muse Proxy marker values as part of the proxy host name subdomain. Wildcard DNS is required to have the Rewrite by Host functional. Example of a follow-up link when using rewrite by host: <ENCODING> The encoding of the site (e.g. UTF-8). <REFERER> The referer for the source. It is required to be filled for the sources that authenticate only from an explicit referer. Can be also used if it is required to have a custom referer in order for the target source provider to easily track the request coming from this module. <CUSTOM_HTTP_HEADERS> Custom HTTP headers to be sent when performing the request. Structure: <CUSTOM_HTTP_HEADER> The custom HTTP header. <NAME> The custom HTTP header name. </NAME> <VALUE> The custom HTTP header value. </VALUE> </CUSTOM_HTTP_HEADER> More PAGE 8
9 Advanced Source Settings <REPLACE_HOST>The value to be used for replacing the host from the URL obtained after the source authentication in order to be redirected to another page from the target site. Example: <REPLACE_HOST>es.mysite.com</REPLACE_HOST> <REPLACE_PATH> The value to be used for replacing the path from the URL obtained after the source authentication in order to be redirected to another page from the target site. Example: <REPLACE_PATH>/search/searchForm.html</REPLACE_PATH> <SSL_CERTIFICATES> The SSL certificates full path to be used for the source in order to obtain HTTPS authentication to the target source. <SSL_TRUST_ALL> If set to true it will accept all certificates from the remote source. <FILTER> Configurable filter to be applied on the content for this source. This rewriting filter is a general configurable Find and Replace filter which can rewrite/unrewrite or do other replacements based on JDK regular expressions and/or Muse Proxy specific Token Rule expressions. There can be multiple FILTER elements and also multiple find and replace rules and Token rules inside a FILTER element. Example: <FILTER> <PATTERNS> <FIND scope="first"> <REPLACE rewrite="0">$0</replace> </FILTER> PAGE 9
10 Additional Source Configuration Settings <EXTRACTOR>, <URL>, <POST_PARAMETERS> Extract and Navigate. Example: <URL> <EXTRACTOR ref="nexturl"><![cdata[<a class="ul" href="([^"]+)"\s*onmouseover="popup\('ihs Standards]]></EXTRACTOR> <URL>${nextURL_1}</URL> Processing options with refprocess attribute: "urlencode", "urldecode", "xmlescape", "xmlunescape. Example: <URL> <EXTRACTOR ref="eventtarget" refprocess="urlencode">type="hidden"\sname=" EVENTTARGET"\sid=" EVENTTARGET"\svalue="([^"]*?)"</EXTRACTOR> <EXTRACTOR ref="eventargument" refprocess="urlencode">type="hidden"\sname=" EVENTARGUMENT"\sid=" EVENTARGUMENT"\svalue="([^"]*?)"</EXTRACTOR> <EXTRACTOR ref="viewstate" refprocess="urlencode">type="hidden"\sname=" VIEWSTATE"\sid=" VIEWSTATE"\svalue="([^"]+?)"</EXTRACTOR> <EXTRACTOR ref="eventvalidation" refprocess="urlencode">type="hidden"\sname=" EVENTVALIDATION"\sid=" EVENTVALIDATION"\svalue="([^"]+?)"</EXTRACTOR> <URL> <POST_PARAMETERS><![CDATA[ EVENTTARGET=${eventtarget_1}& EVENTARGUMENT=${eventargument_1}& VIEWSTATE=${views tate_1}& EVENTVALIDATION=${eventvalidation_1}&_ctl0%3AphContent%3AtxUserName=${userName}&_ctl0%3AphContent%3AtxPass word=${userpassword}&_ctl0%3aphcontent%3abtnlogin=login]]></post_parameters> Define own JavaScript functions to be referred in the refprocess attribute: <DEF><![CDATA[ function jsonjoin(input) { //JS code here } ]]></DEF> <EXTRACTOR ref="sectek" refprocess="jsonjoin">(^.*+$)</extractor> More PAGE 10
11 Additional Source Configuration Settings <SHOW_GET_PARAMETERS> Show the URL details in the follow-up link. Example: <SHOW_GET_PARAMETERS>true</SHOW_GET_PARAMETERS> <CONNECT_TIMEOUT>, <READ_TIMEOUT> Connection time-outs. Example: <CONNECT_TIMEOUT>60000</CONNECT_TIMEOUT> <READ_TIMEOUT>60000</READ_TIMEOUT> <PROXY_USED>, <PROXY_HOST>, <PROXY_PORT>, <PROXY_PAC>, <PROXY_AUTHORIZATION_USER_NAME>, <PROXY_AUTHORIZATION_USER_PASSWORD>, <PROXY_AUTHORIZATION_SCHEME> Proxy Chaining configuration elements. Example: <PROXY_USED>SOURCE_LEVEL</PROXY_USED> <PROXY_HOST> </PROXY_HOST> <PROXY_PORT>3128</PROXY_PORT> <PROXY_AUTHORIZATION_USER_NAME>univ</PROXY_AUTHORIZATION_USER_NAME> <PROXY_AUTHORIZATION_USER_PASSWORD>fadwadOrp0</PROXY_AUTHORIZATION_USER_PASSWORD> <PROXY_AUTHORIZATION_SCHEME>Basic</PROXY_AUTHORIZATION_SCHEME> <LINK_OUT> Link out to other source profiles. Example: <LINK_OUT>true</LINK_OUT> <COOKIES> Specify cookies to be sent. Example: <COOKIES> <COOKIE>persistentSession=hl1k61cn32ecu1iu979cr5rbk2; path=/; domain=mydomain.com;</cookie> </COOKIES> More PAGE 11
12 Additional Source Configuration Settings <X_FORWARDED_FOR> Reveal the IP of the end-user to the Target Source. Example: <X_FORWARDED_FOR>true</X_FORWARDED_FOR> <FOLLOW_REDIRECTS> Automatic HTTP Redirects. Example: <FOLLOW_REDIRECTS>true</FOLLOW_REDIRECTS> <REDIRECT> Redirecting to Remote Source, e.g. drop out of rewriting. Example: <REDIRECT>true</REDIRECT> <CLIENT_KEYSTORE> Client Side SSL Authentication. Example: <CLIENT_KEYSTORE password="changeit">${web_context_home}/certificates/seap.jks</client_keystore> <PARAMETERS> General use definition of parameters. Example: <PARAMETERS> <PARAMETER> <NAME> </NAME><VALUE>MY_ </VALUE> </PARAMETER> <PARAMETER> <NAME>password</NAME><VALUE>MY_PASSWORD</VALUE> </PARAMETER> </PARAMETERS> <AUTHENTICATION_TYPE>, <LAST_UPDATED> Informational elements. Example: <AUTHENTICATION_TYPE>IP</AUTHENTICATION_TYPE> <LAST_UPDATED> </LAST_UPDATED> More PAGE 12
13 Recap: Adding a new Source Edit Edit Copy an existing ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/Sources.xml ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/SourcesGroups.xml source profile under Duplicate an existing entry and change accordingly the values of IDENTIFIER, NAME and Duplicate a new filename, for CONFIGURATION_FILE. an existing entry and change accordingly the values of IDENTIFIER. example NewSource. Edit the NewSource.xml file and: 1) Change the URL value with the one of your new source. 2) Change the values for the NAME and DESCRIPTION fields accordingly. 3) Change accordingly the values for REWRITING_PATTERNS. PAGE 13
14 Username/Password Controlled Resource Use a network sniffer or browser developer tools to see the request made when submitting the username/password; URL value: POST_PARAMETERS value: <POST_PARAMETERS>autho=${userName}&password=${userPassword}&language=en&next=html%2Fhome.html&bad=error%2Fbadlo gin_en.html&entityjavascript=true&entityscreensize=large</post_parameters> PARAMETERS values: <PARAMETERS> <PARAMETER><NAME>userName</NAME><VALUE> </VALUE> </PARAMETER> <PARAMETER><NAME>userPassword</NAME><VALUE>test%26Password</VALUE> </PARAMETER> </PARAMETERS> PAGE 14
15 Use Case 1: How to correct unrewritten links Sniff communication and search for the unrewritten URL. Once found identify the URL pattern of the request and create a filter. PAGE 15
16 Use Case 2: A Complex Username/Password Authentication Scenario Second most popular authentication type after IP authentication. IPs shortage is becoming an issue; Make use of Extract and Navigate features: EXTRACTOR, URL and POST_PARAMETERS; Applicable where providing the Username/Password values in a single request is not working; More PAGE 16
17 Use Case 2: A Complex Username/Password Authentication Scenario <URL> <POST_PARAMETERS></POST_PARAMETERS> First request to the logon page. From the logon page extract the dynamic hidden fields. <EXTRACTOR ref="eventtarget" refprocess="urlencode">type="hidden"\sname=" EVENTTARGET"\sid=" EVENTTARGET"\svalue="([^"]*?)"</EXTRACTOR> <EXTRACTOR ref="eventargument" refprocess="urlencode">type="hidden"\sname=" EVENTARGUMENT"\sid=" EVENTARGUMENT"\svalue="([^"]*?)"</EXTRACTOR> <EXTRACTOR ref="viewstate" refprocess="urlencode">type="hidden"\sname=" VIEWSTATE"\sid=" VIEWSTATE"\svalue="([^"]+?)"</EXTRACTOR> <EXTRACTOR ref="viewstategenerator" refprocess="urlencode">type="hidden"\sname=" VIEWSTATEGENERATOR"\sid=" VIEWSTATEGENERATOR"\svalue="([^"]+?)"</EXTRACTOR> <EXTRACTOR ref="eventvalidation" refprocess="urlencode">type="hidden"\sname=" EVENTVALIDATION"\sid=" EVENTVALIDATION"\svalue="([^"]+?)"</EXTRACTOR> More PAGE 17
18 Use Case 2: A Complex Username/Password Authentication Scenario <URL> <POST_PARAMETERS><![CDATA[ EVENTTARGET=${eventtarget_1}& EVENTARGUMENT=${eventargument_1}& VIEWSTATE=${viewstate_1}& VIEWSTATEGENERATOR=${viewstategenerator_1}& EVENTVALIDATION=${eventvalidation_1}& ctl00%24maincontent%24userlogin%24username=${username}&ctl00%24maincontent%24userlogin%24password=${userpassword}& ctl00%24maincontent%24userlogin%24button1=giri%c5%9f]]></post_parameters> <PARAMETERS> <PARAMETER><NAME>userName</NAME><VALUE>YYY</VALUE> </PARAMETER> <PARAMETER><NAME>userPassword</NAME><VALUE>ZZZ</VALUE> </PARAMETER> </PARAMETERS> Second request to submit the login details using the values extracted previously. Complete configuration source profile can be downloaded from here. PAGE 18
19 Use Case 3: Transparent Navigation Scenario Perform actions transparently to the end-user: authenticate with username/password, change the default language, land on the desired page. And reach to the desired landing page. Logon page Landing page after logon from where change the language to English. In the new page click on UK United Kingdom and then on Contract notice More PAGE 19
20 Use Case 3: Transparent Navigation Scenario <URL> <EXTRACTOR ref="step1" refprocess="xmlunescape"><![cdata[<a href="( loginrequestid=[^"]+?)"\sclass="main_domain external_hover"\stitle="external"><span class="external"></span>]]></extractor> <URL>${step1_1}</URL> <EXTRACTOR ref="posturl">id="loginform"\sname="strongloginform"\saccept-charset="utf-8"\saction="([^"]+?)"</extractor> <EXTRACTOR ref="txid">type="hidden"\sname="txid"\svalue="([^"]+?)"</extractor> <EXTRACTOR ref="lt">type="hidden"\sname="lt"\svalue="([^"]+?)"</extractor> <EXTRACTOR ref="loginrequestid">type="hidden"\sname="loginrequestid"\svalue="([^"]+?)"</extractor> <URL>${postURL_1}</URL> <POST_PARAMETERS><![CDATA[TxId=${TxId_1}<=${lt_1}&domain=external&loginRequestId=${loginRequestId_1}&useDefaultStrength=true& timezone=gmt%2b03%3a00&selfhost=webgate.ec.europa.eu&username=${username}&zpassword=&password=${userpassword}&submit=login%21]]> </POST_PARAMETERS> <EXTRACTOR ref="lasturl"><![cdata[<a\sid="fallbacklink"\shref="( <URL>${lastURL_1}</URL> <URL> <URL> <POST_PARAMETERS><![CDATA[action=cl&lgId=en]]></POST_PARAMETERS> Perform authentication to the site s authentication service and go to the home page. Change the language to English. <URL> Click on the UK United Kingdom link. <URL> <POST_PARAMETERS><![CDATA[action=selectFacet&quickSearchCriteria=&searchScope=LAST_EDITION]]></POST_PARAMETERS> Complete configuration source profile can be downloaded from here. Click on the Contract notice link. PAGE 20
21 MuseKnowledge Proxy Source Profiling
SEAMLESS AND SECURE REMOTE ACCESS TO RESOURCES
SEAMLESS AND SECURE REMOTE ACCESS TO RESOURCES VERSION 1.4 19 MARCH 2018 EDULIB, S.R.L. MUSE KNOWLEDGE HEADQUARTERS Calea Bucuresti, Bl. 27B, Sc. 1, Ap. 10, Craiova 200675, România phone +40 251 413 496
More informationMuseKnowledge Hybrid Search
MuseKnowledge Hybrid Search MuseGlobal, Inc. One Embarcadero Suite 500 San Francisco, CA 94111 415 896-6873 www.museglobal.com MuseGlobal S.A Calea Bucuresti Bl. 27B, Sc. 1, Ap. 10 Craiova, România 40
More informationMuseKnowledge Source Package Building
MuseKnowledge Source Package Building MuseGlobal, Inc. One Embarcadero Suite 500 San Francisco, CA 94111 415 896-6873 www.museglobal.com MuseGlobal S.A Calea Bucuresti Bl. 27B, Sc. 1, Ap. 10 Craiova, România
More informationSmart Federated Search for Egyptian Knowledge Bank
Smart Federated Search for Egyptian Knowledge Bank MuseGlobal, Inc. 421 Fayetteville Street Suite 1100 Raleigh, NC 27601 U.S.A. www.museglobal.com MuseGlobal S.A Calea Bucuresti Bl. 27B, Sc. 1, Ap. 10
More informationHow to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT
How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT Ta Table of Contents Table of Contents TA TABLE OF CONTENTS 1 TABLE OF CONTENTS 1 BACKGROUND 2 CONFIGURATION STEPS 2 Create a SSL
More informationBIG-IP Access Policy Manager : Portal Access. Version 12.1
BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7
More informationSMART CONNECTOR TECHNOLOGY FOR FEDERATED SEARCH
SMART CONNECTOR TECHNOLOGY FOR FEDERATED SEARCH VERSION 1.4 27 March 2018 EDULIB, S.R.L. MUSE KNOWLEDGE HEADQUARTERS Calea Bucuresti, Bl. 27B, Sc. 1, Ap. 10, Craiova 200675, România phone +40 251 413 496
More informationBIG-IP Access Policy Manager : Portal Access. Version 13.0
BIG-IP Access Policy Manager : Portal Access Version 13.0 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...
More informationLotus Notes Domino 6/ 6.5 Developing Web Applications.
Lotus 190-612 Notes Domino 6/ 6.5 Developing Web Applications http://killexams.com/exam-detail/190-612 QUESTION: 81 Rob uses Macromedia Dreamweaver MX to create HTML files, style sheets and JavaScript
More informationForgeRock Access Management Customization and APIs
training@forgerock.com ForgeRock Access Management Customization and APIs Description AM-421 Course Description Revision B This course provides a hands-on technical introduction to ForgeRock Access Management
More informationThis Readme describes the NetIQ Access Manager 3.1 SP5 release.
NetIQ Access Manager 3.1 SP5 Readme January 2013 This Readme describes the NetIQ Access Manager 3.1 SP5 release. Section 1, What s New, on page 1 Section 2, Upgrading or Migrating to Access Manager 3.1
More informationSAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
More informationOracle Eloqua Legacy Authenticated Microsites and Contact Users. Configuration Guide
Oracle Eloqua Legacy Authenticated Microsites and Contact Users Configuration Guide 2019 Oracle Corporation. All rights reserved 04-Jan-2019 Contents 1 Authenticated microsites 3 2 Creating authenticated
More informationAccess Manager 3.2 Service Pack 2 IR1 resolves several previous issues.
Access Manager 3.2 Service Pack 2 IR1 Readme September 2013 Access Manager 3.2 Service Pack 2 IR1 resolves several previous issues. Many of these improvements were made in direct response to suggestions
More informationConfigure the IM and Presence Service to Integrate with the Microsoft Exchange Server
Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure a Presence Gateway for Microsoft Exchange Integration, page 1 SAN and Wildcard Certificate Support, page
More informationVMware Identity Manager Connector Installation and Configuration (Legacy Mode)
VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until
More informationIntegration Documentation. Automated User Provisioning Common Logon, Single Sign On or Federated Identity Local File Repository Space Pinger
Integration Documentation Automated User Provisioning Common Logon, Single Sign On or Federated Identity Local File Repository Space Pinger Revision History Version No. Release Date Author(s) Description
More informationMicrosoft Exchange Server 2013 and 2016 Deployment
Microsoft Exchange Server 2013 and 2016 Deployment Barracuda Networks has conducted interoperability tests using the Barracuda Load Balancer ADC and Microsoft Exchange Server 2013 and Microsoft Exchange
More informationEmbedded WAYF A slightly new approach to the discovery problem. Lukas Hämmerle
Embedded WAYF A slightly new approach to the discovery problem Lukas Hämmerle lukas.haemmerle@switch.ch The Problem In a federated environment, the user has to declare where he wants to authenticate. The
More informationMitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE. Release 9.2
Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE Release 9.2 NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel
More informationMicrosoft MB2-711 Exam
Volume: 96 Questions Question No: 1 You are the primary technical resource for an enterprise deployment of Microsoft Dynamics CRM 2016 on premises that has 300 seats. You are asked about hardware requirements
More informationNew in Release: Secomea Release 8.0. This document shows the changes from release 7.4 to release 8.0. Version: 1.5, 2018
New in Release: Secomea Release 8.0 This document shows the changes from release 7.4 to release 8.0. Version: 1.5, 2018 Table of Contents Change log 4 1. Release 8.0 4 Highlights 4 2. General 6 2.1. New
More informationCA SiteMinder Federation
CA SiteMinder Federation Legacy Federation Guide 12.52 SP1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationChesar 3.4 Desktop (standalone) installation manual
Chesar 3.4 Desktop (standalone) installation manual 2 Chesar 3.4 Desktop (standalone) installation manual Changes to this document Date Modification 23/05/2017 First version. 14/11/2017 Section 8 on establishing
More informationVMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2
VMware Identity Manager Administration MAY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationAndroid Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.
Android Mobile Single Sign-On to VMware Workspace ONE SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware
More informationAuthor: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0
Author: Tonny Rabjerg Version: 20150730 Company Presentation WSF 4.0 WSF 4.0 Cybercrime is a growth industry. The returns are great, and the risks are low. We estimate that the likely annual cost to the
More informationWork with Forms in Joomla (Visforms and SAS Invite System)
Work with Forms in Joomla (Visforms and SAS Invite System) Instructor for this Workshop Laura Gordon Web Development School of Arts and Sciences TABLE OF CONTENTS Welcome... 3 What is Joomla?... 3 What
More informationWeb Applications Installation. version
version 2017.1 Disclaimer This document is for informational purposes only and is subject to change without notice. This document and its contents, including the viewpoints, dates and functional content
More informationNIELSEN API PORTAL USER REGISTRATION GUIDE
NIELSEN API PORTAL USER REGISTRATION GUIDE 1 INTRODUCTION In order to access the Nielsen API Portal services, there are three steps that need to be followed sequentially by the user: 1. User Registration
More informationGuide to Deploying NetScaler as an Active Directory Federation Services Proxy
Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment
More informationVMware Identity Manager Administration
VMware Identity Manager Administration VMware AirWatch 9.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationCan HTTP Strict Transport Security Meaningfully Help Secure the Web? nicolle neulist June 2, 2012 Security B-Sides Detroit
Can HTTP Strict Transport Security Meaningfully Help Secure the Web? nicolle neulist June 2, 2012 Security B-Sides Detroit 1 2 o hai. 3 Why Think About HTTP Strict Transport Security? Roadmap what is HSTS?
More informationEarly Data Analyzer Web User Guide
Early Data Analyzer Web User Guide Early Data Analyzer, Version 1.4 About Early Data Analyzer Web Getting Started Installing Early Data Analyzer Web Opening a Case About the Case Dashboard Filtering Tagging
More informationXCONNECT 2018 GATEWAY USER MANUAL
XCONNECT 2018 GATEWAY USER MANUAL V1.0 This guide will assist in the installation and configuration of the xconnect 2018 Gateway. Version 1.0 of the xconnect Gateway web portal includes the necessary functionality
More informationDetects Potential Problems. Customizable Data Columns. Support for International Characters
Home Buy Download Support Company Blog Features Home Features HttpWatch Home Overview Features Compare Editions New in Version 9.x Awards and Reviews Download Pricing Our Customers Who is using it? What
More informationVMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager
VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The
More informationVMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager
VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationGetting Started with. Management Portal. Version
Getting Started with Management Portal Version 10.1.0.0 Copyright RES Software Development B.V. All rights reserved. Commercial Computer Software documentation/data Restricted Rights. RES and RES ONE are
More informationMAGLOCLEN MOCIC NESPIN RMIN ROCIC WSIN Newtown, PA Springfield, MO Franklin, MA Phoenix, AZ Nashville, TN Sacramento, CA
Regional Information Sharing Systems RISS Technology Support Center RISSNET Logon Procedure May 4, 2012 Introduction The purpose of this document is to provide instructions to users of the Regional Information
More informationPenetration Testing. James Walden Northern Kentucky University
Penetration Testing James Walden Northern Kentucky University Topics 1. What is Penetration Testing? 2. Rules of Engagement 3. Penetration Testing Process 4. Map the Application 5. Analyze the Application
More informationWeb Applications Installation. version
version 2017.1 Disclaimer This document is for informational purposes only and is subject to change without notice. This document and its contents, including the viewpoints, dates and functional content
More informationComposer Help. Web Request Common Block
Composer Help Web Request Common Block 7/4/2018 Web Request Common Block Contents 1 Web Request Common Block 1.1 Name Property 1.2 Block Notes Property 1.3 Exceptions Property 1.4 Request Method Property
More informationSMKI Code of Connection
SMKI Code of Connection DCC Public Page 1 of 12 Contents 1 Connection Mechanism... 4 1.1 Browser Policy... 4 2 SMKI Services interfaces... 5 2.1 SMKI Services interfaces via DCC Gateway Connection... 5
More informationCreating an IBM API Management Version 2.0 environment
Understand the tasks required to create an IBM API Management environment June 2013 Creating an IBM API Management Version 2.0 environment IBM API Management Version 2.0 Information Center 1 Table of Contents
More informationWebthority can provide single sign-on to web applications using one of the following authentication methods:
Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,
More informationThe following topics provide more information on user identity. Establishing User Identity Through Passive Authentication
You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user
More informationLotus IBM Lotus Notes Domino 8 Developing Web Applications. Download Full Version :
Lotus 190-836 IBM Lotus Notes Domino 8 Developing Web Applications Download Full Version : http://killexams.com/pass4sure/exam-detail/190-836 A. Create a WebQuerySave agent that writes the message to the
More informationSecure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
More informationWeb Applications Installation. version 12.17
version 12.17 Disclaimer This document is for informational purposes only and is subject to change without notice. This document and its contents, including the viewpoints, dates and functional content
More informationCA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5
CA SiteMinder Federation Manager Guide: Legacy Federation r12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationCertified Secure Web Application Secure Development Checklist
www.certifiedsecure.com info@certifiedsecure.com Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands About Certified Secure Checklist Certified Secure exists to encourage and fulfill
More informationER/Studio Enterprise Portal 1.1 New Features Guide
ER/Studio Enterprise Portal 1.1 New Features Guide 2nd Edition, April 16/2009 Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco,
More informationCloud Access Manager Overview
Cloud Access Manager 8.1.3 Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationBrowser Support Internet Explorer
Browser Support Internet Explorer Consumers Online Banking offers you more enhanced features than ever before! To use the improved online banking, you may need to change certain settings on your device
More informationWHY CSRF WORKS. Implicit authentication by Web browsers
WHY CSRF WORKS To explain the root causes of, and solutions to CSRF attacks, I need to share with you the two broad types of authentication mechanisms used by Web applications: 1. Implicit authentication
More informationCONFIGURATION MANUAL. English version
CONFIGURATION MANUAL English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the
More informationIMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS. VMware Identity Manager.
IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS VMware Identity Manager February 2017 V1 1 2 Table of Contents Overview... 5 Benefits of BIG-IP APM and Identity
More informationSecure Access Troubleshooting Rewrite related issues (Core/Web Based Access)
Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Published June 2015 Why do certain web-based applications have issues through the rewrite engine compared to accessing the resource
More informationHow to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity
How to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity This article explains how to configure your Sophos UTM to allow access Microsoft s Lync Web Services (the
More informationPageScope Net Care Device Manager Ver. 2.0 User s Guide
PageScope Net Care Device Manager Ver..0 User s Guide Net Care Device Manager Contents 1 Summary 1.1 Introduction...1-1 1.1.1 About Device Manager...1-1 Basic and extended functions... 1-1 Configuration
More informationHow to Configure Fiori Launchpad and Web Dispatcher to Support SAML2 Using SAP Identity Provider Step-by-Step
How to Configure Fiori Launchpad and Web Dispatcher to Support SAML2 Using SAP Identity Provider Step-by-Step SAP NetWeaver or S4H Gateway Ali Chalhoub 2016 SAP AG. All rights reserved. SAP, R/3, SAP NetWeaver,
More informationMicrosoft ADFS Configuration
Microsoft ADFS Configuration Side 1 af 12 1 Information 1.1 ADFS KMD Secure ISMS supports ADFS for integration with Microsoft Active Directory by implementing WS-Federation and SAML 2. The integration
More informationCross-Site Request Forgery in Cisco SG220 series
Cross-Site Request Forgery in Cisco SG220 series Security advisory 12/09/2016 Renaud Dubourguais Nicolas Collignon www.synacktiv.com 5 rue Sextius Michel 75015 Paris Vulnerability description The Cisco
More informationPublic. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2
Atos Trustcenter Server Certificates + Codesigning Certificates Version 1.2 20.11.2015 Content 1 Introduction... 3 2 The Atos Trustcenter Portfolio... 3 3 TrustedRoot PKI... 4 3.1 TrustedRoot Hierarchy...
More informationBIG-IP Access Policy Manager : Visual Policy Editor. Version 12.1
BIG-IP Access Policy Manager : Visual Policy Editor Version 12.1 Table of Contents Table of Contents Visual Policy Editor...7 About the visual policy editor...7 Visual policy editor conventions...7 About
More informationIntroduction to application management
Introduction to application management To deploy web and mobile applications, add the application from the Centrify App Catalog, modify the application settings, and assign roles to the application to
More informationAPM Proxy with Workspace One
INTEGRATION GUIDE APM Proxy with Workspace One 1 Version History Date Version Author Description Compatible Versions Mar 2018 1.0 Matt Mabis Initial Document VMware Identity Manager 3.2.x and Above (1)
More informationRemote Access System for STAM-2 Monitoring Station STAM-VIEW
Remote Access System for STAM-2 Monitoring Station STAM-VIEW Installation Manual stam-view_i_en 10/11 SATEL sp. z o.o. ul. Schuberta 79 80-172 Gdańsk POLAND tel. + 48 58 320 94 00 info@satel.pl www.satel.eu
More informationWebsite SEO Checklist
Website SEO Checklist Main points to have a flawless start for your new website. Domain Optimization Meta Data Up-to-Date Content Optimization SEO & Analytics Social Markup Markup Accessibility Browser
More informationWatchGuard AP - Remote Code Execution
WatchGuard AP - Remote Code Execution Security Advisory Date 1/05/2018 Version: 1.0 Table of Contents 1. Document Control... 2 1.1. Document Information... 2 1.2. Revision Control... 2 2. Background...
More information4.2. Authenticating to REST Services. Q u i c k R e f e r e n c e G u i d e. 1. IdentityX 4.2 Updates
4.2 Authenticating to REST Services Q u i c k R e f e r e n c e G u i d e In IdentityX 4.1, REST services have an authentication and signing requirement that is handled by the IdentityX REST SDKs. In order
More informationGuide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1
Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationApp Orchestration 2.6
Configuring NetScaler 10.5 Load Balancing with StoreFront 3.0 and NetScaler Gateway for Last Updated: June 04, 2015 Contents Introduction... 3 Configure the NetScaler load balancer certificates... 3 To
More informationHigh -Tech Bridge s Web Server Security Service API Developer Documentation Version v1.3 February 13 th 2018
HTB_WEBSECDOCS_v1.3.pdf Page 1 of 29 High -Tech Bridge s Web Server Security Service API Developer Documentation Version v1.3 February 13 th 2018 General Overview... 2 Meta-information... 4 HTTP Additional
More informationPlateSpin Transformation Manager Appliance Guide. June 2018
PlateSpin Transformation Manager Appliance Guide June 2018 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,
More informationUser s Guide: Applied Functions
User s Guide: Applied Functions Table of contents 1 Using Web Connection 1.1 Web Connection... 1-2 Web Connection...1-2 Operating environment...1-2 1.2 Operations required to use this function... 1-2 1.2.1
More informationOn-demand target, up and running
On-demand target, up and running ii On-demand target, up and running Contents Chapter 1. Assumptions........ 1 Chapter 2. Overview......... 3 Chapter 3. Component purpose.... 5 Chapter 5. Starting a session
More informationDeltek Touch T&E Startup Guide
Deltek Touch T&E Startup Guide https://dte.unisys.com 2015 Unisys Corporation. All rights reserved. FOR INTERNAL USE ONLY. 1 Mobile Device Pre-requisites Make sure your mobile browser allows cookies from
More informationVMware AirWatch Content Gateway Guide for Windows
VMware AirWatch Content Gateway Guide for Windows AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationThe HTTP protocol. Fulvio Corno, Dario Bonino. 08/10/09 http 1
The HTTP protocol Fulvio Corno, Dario Bonino 08/10/09 http 1 What is HTTP? HTTP stands for Hypertext Transfer Protocol It is the network protocol used to delivery virtually all data over the WWW: Images
More informationSupport Visit mysupport.mcafee.com to find product documentation, announcements, and support.
Release Notes McAfee Web Gateway version 7.1.0.6 This document provides information about the McAfee Web Gateway version 7.1.0.6 appliance software. You can find more information at the following locations:
More informationProphet 21 Middleware Installation Guide. version 12.16
version 12.16 Disclaimer This document is for informational purposes only and is subject to change without notice. This document and its contents, including the viewpoints, dates and functional content
More informationVMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway
VMware AirWatch Content Gateway for Windows VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationEucalyptus User Console Guide
Eucalyptus 3.4.1 User Console Guide 2013-12-11 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...5 Install the Eucalyptus User Console...6 Install on Centos / RHEL 6.3...6 Configure
More informationSOMA2 Gateway to Grid Enabled Molecular Modelling Workflows in WWW-Browser. EGI User Forum Dr. Tapani Kinnunen
SOMA2 Gateway to Grid Enabled Molecular Modelling Workflows in WWW-Browser EGI User Forum 2011 Dr. Tapani Kinnunen CSC IT Center for Science Ltd., Espoo, Finland CSC at a Glance Founded in 1971 as a technical
More informationConfigure Unsanctioned Device Access Control
Configure Unsanctioned Device Access Control paloaltonetworks.com/documentation Contact Information Corporate Headquarters: Palo Alto Networks 3000 Tannery Way Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-support
More informationVMware AirWatch Content Gateway Guide for Windows
VMware AirWatch Content Gateway Guide for Windows AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationSystem Setup. Accessing the Administration Interface CHAPTER
CHAPTER 3 The system can be configured through the web interface to provide the networking configuration for the appliance and other system settings that are important such as time and SSL certificate.
More informationBIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0
BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web
More informationBarracuda Firewall Release Notes 6.6.X
Please Read Before Upgrading Before installing the new firmware version, back up your configuration and read all of the release notes that apply to the versions that are more current than the version that
More informationUsing vrealize Operations Tenant App as a Service Provider
Using vrealize Operations Tenant App as a Service Provider Using vrealize Operations Tenant App as a Service Provider You can find the most up-to-date technical documentation on the VMware Web site at:
More informationVMware AirWatch Content Gateway Guide for Windows
VMware AirWatch Content Gateway Guide for Windows Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationBI Office. Web Authentication Model Guide Version 6
Web Authentication Model Guide Version 6 Copyright Pyramid Analytics 2010-2016 Contents 1. Web Authentication Model Overview... 3 A. Basic Authentication Models... 3 B. Windows Authentication Models...
More informationGuide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1
Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware
More informationEmbedded Discovery Service Or how to save some clicks during AAI authentication. Lukas Hämmerle
Embedded Discovery Service Or how to save some clicks during AAI authentication. Lukas Hämmerle lukas.haemmerle@switch.ch Zurich, 5. May 2009 Raider is now Twix and WAYF is now DS = WAYF = DS Where Are
More informationAbusing Windows Opener to Bypass CSRF Protection (Never Relay On Client Side)
Abusing Windows Opener to Bypass CSRF Protection (Never Relay On Client Side) Narendra Bhati @NarendraBhatiB http://websecgeeks.com Abusing Windows Opener To Bypass CSRF Protection Narendra Bhati Page
More informationSAML Authentication with Pulse Connect Secure and Pulse Secure Virtual Traffic Manager
SAML Authentication with Pulse Connect Secure and Pulse Secure Virtual Traffic Manager Deployment Guide Published 14 December, 2017 Document Version 1.0 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San
More informationHow to social login with Aruba controller. Bo Nielsen, CCIE #53075 (Sec) December 2016, V1.00
Bo Nielsen, CCIE #53075 (Sec) December 2016, V1.00 Overview This short document describes the basic setup for social login using Aruba ClearPass and Aruba wireless LAN controller. Aruba ClearPass, version
More informationVMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More information