3A01:.Net Framework Security
|
|
- Arabella Morris
- 5 years ago
- Views:
Transcription
1 3A01:.Net Framework Security Wolfgang Werner HP Decus Bonn Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Agenda Introduction to the Common Language Runtime Windows Security and Code Access Security Security Policy Evidence, Membership Conditions, Permission Sets, Code Groups, Policy Levels Misc. 1
2 Common Language Runtime (CLR) Core of the.net platform Runtime execution environment Uses the Intermediate Language Code that requires the CLR is called managed code Uses garbage collection Common Language Runtime (CLR) The runtime loads and runs code written in any CLR-aware programming language Compilers translates code into Intermediate Language (IL) When the code is executed it is compiled into native code 2
3 Assemblies The logical unit that contains IL code Can de stored across multiple files Same structure is used for executable code and libraries Contain metadata that describe the assembly (manifest) ILDASM can be used to inspect the content and the metadata Assemblies The assembly manifest contains Name, version Identity information Name, version, culture, public key Exported types Dependencies to other assemblies... 3
4 Assemblies Agenda Introduction to the Common Language Runtime Windows Security and Code Access Security Security Policy Evidence, Membership Conditions, Permission Sets, Code Groups, Policy Levels Misc. 4
5 Windows Security Based on user identity Authentication for a particular user Authorization to access resources based on user credentials All code will run with the same access rights Windows Security It is ok for an admin to add new users, but <OBJECT CODETYPE="application/x-oleobject" CLASSID= "clsid:f935dc22-1cf0-11d0-adb9-00c04fd58a0b WIDTH=1 HEIGHT=1 ID="WShell"> </OBJECT> <!-- Initialize and script ActiveX controls not marked as safe must be enabled --> <SCRIPT LANGUAGE="Javascript"> runcmd="net user newuser /add"; WShell.Run(runcmd); </SCRIPT> 5
6 Code Access Security (CAS) Applies to the Common Language Runtime Managed code only Based on code identity Code running on behalf of a specific user is not considered equal Code "authentication" is based on the origin of code (evidence) Code Access Security (CAS) Authenticate assemblies By collecting evidence Authorize assemblies By granting a set of permissions Enforce authorization decisions By checking ALL assemblies have the appropriate permissions 6
7 Code Access Security (CAS) CAS complements Windows security CAS settings will NOT supercede Windows access restrictions Agenda Introduction to the Common Language Runtime Windows Security and Code Access Security Security Policy Evidence, Membership Conditions, Permission Sets, Code Groups, Policy Levels Misc. 7
8 Security Policy Code Access Security maps evidence to resource access permissions based on security policy settings A security policy consists of Membership conditions Code groups Policy levels Security Policy Default Security Policy All assemblies running in the My Computer zone have access to all resources Assemblies from the intranet zone are allowed to read some environment variables, do unlimited user interface intercation, have no access to the registry, All assemblies from then internet zone are prevented from running by default 8
9 Security Policy: Evidence Information about the origin of an assembly Authentication in CAS Applies only to running code Not precomputed or cached Independend of the user With exceptions Code Access Security: Evidence The CLR uses evidence to Determine which code groups the code belongs Evaluate enterprise, machine, and user policy membership condition Return the set of permissions to grant to the assembly or application domain 9
10 Code Access Security: Evidence Evidence is provided by By the loader (CLR) Application domain hosts that start the CLR Application domain host Browser host (Internet Explorer) HREF to managed EXE <object > refers to a managed type Server host (ASP.NET) Shell host (Explorer) Security Policy: Evidence Assembly provided evidence An assembly is permitted to provide evidence about itself Cannot overwrite evidence provided by a host Per default, assembly provided evidence is ignored by the CLR Implement custom membership conditions 10
11 Security Policy: Evidence ApplicationDirectory Directory that contains the primary executing code All assemblies in the application's root and child directories C:\appdir => file://c:\appdir\test.dll Security Policy: Evidence Hash Hash (MD5, SHA1) Multifile assemblies: hash of the assembly that contains the manifest Publisher Authenticode signatures (certificates) 11
12 Security Policy: Evidence Site Origination from a specified site URL URL including final wildcard ftp://ftp.microsoft.com/pub/* Security Policy: Evidence Zone The zone where the assembly originates My Computer, Intranet, Internet, Trusted Zones, Untrusted Zones Same as in Internet Explorer security zones Evidence may be different to different users 12
13 Security Policy: Evidence If an assembly is downloaded from a site/url/zone and run locally the original information is lost Security Policy: Evidence Strong Name Adds public key encryption to make sure code has not been altered Strongly-named assemblies contain the signer's public key and a signature embedded in the assembly Also used to distinguish similarly named assemblies from different publishers (shared assemblies only) 13
14 Security Policy: Evidence Computing a strong name Verifying a strong name Assembly Assembly Hash + Private Key Hash =? Org. Hash Signature Signature Signature + Public Key Security Policy: Evidence Strong Name Tool SN.EXE Generate private/public key pairs SN k tst.snk Sign assemblies with strong names Custom attributes, command line switches, 14
15 Security Policy: Evidence using System; using System.IO; [assembly: System.Reflection.AssemblyKeyFile("tst.snk")] namespace myassembly.fkr.cpqcorp.net { class myassembly { static void Main(String [] args) { StreamReader stream= File.OpenText(args[0]); String str; while ((str=stream.readline())!= null) Console.WriteLine(str); } } } Security Policy: Membership Condition Membership conditions Match evidence against specified criteria Are closely linked to evidence Are extensible (IMembershipCondition) 15
16 Security Policy: Membership Condition Default membership conditions All Code Application Directory Hash Publisher Strong Name Site URL Zone Security Policy: Permission Sets Permission sets are comprised of zero or more permissions FileIOPermission, SocketPermission, RegistryPermission Predefined Permission Sets Full Trust LocalIntranet Internet,.. 16
17 Security Policy: Code Groups Code Groups define bindings between membership conditions and permission sets If code matches the membership condition it is included in the group and is granted a permission set If code matches more than one code groups the permissions are combined in a union Security Policy: Code Groups Code Groups are arranged in hierarchies Code Group: All Code Permission Set: Nothing Membership Condition: AllCode Code Group: Internet Permission Set: Internet Membership Condition: Zone Code Group: My Computer Permission: Full Trust Membership Condition: Zone... Code Group: Microsoft Permission: FullTrust Membership Condition: Publisher 17
18 Security Policy: Code Groups Security Policy: Policy Levels A policy level has three pieces Permission set list Code group hierarchy A list of policy assemblies To implement custom security objects (custom permissions, membership conditions,..) To address the need of different parties multiple policy levels are defined 18
19 Security Policy: Policy Levels Administrators configure security policy by managing code groups and their associated permission sets in different policy levels Each policy level contains its own hierarchy of code groups and permission sets Policy levels are a hierarchy Lower policy levels cannot increase permissions granted at a higher levels Security Policy: Policy Levels Four security policy levels are provided Enterprise Controlled by the domain administrator Anything restricted here will define the total default restrictions Machine Controlled by the machine administrator User Controlled by the user Application Domain Controlled by the application developer 19
20 Security Policy: Policy Levels Enterprise Policy Machine1 Policy User1 Policy AppDom1 Policy User2 Policy AppDom3 Policy Machine2 Policy User3 Policy AppDom5 Policy User4 Policy AppDom7 Policy AppDom2 Policy AppDom4 Policy AppDom6 Policy Security Policy: Policy Levels Enterprise Applies to all managed code in an enterprise where an enterprise configuration file is distributed %windir%\microsoft.net\framework\<version>\config\ enterprisesec.config Machine Applies to all managed code on the computer %windir%\microsoft.net\framework\<version>\config\ security.config 20
21 Security Policy: Policy Levels User Applies to all managed Code in all the processes user %userprofile%\application Data\Microsoft\ CLR Security Config\<version>\security.config Application domain Specified by application domain host code Application domain level cannot be administratively configured, but can be programmatically set Security Policy: Policy Levels To compute the allowed permission set for the application domain or assembly: For each policy level the matching code groups are determined using evidence The permissions of the matching code groups are combined in a union The permission sets for each policy level are intersected 21
22 Agenda Introduction to the Common Language Runtime Windows Security and Code Access Security Security Policy Evidence, Membership Conditions, Permission Sets, Code Groups, Policy Levels Misc. Misc. Disable/enable.NET Framework security C:\> caspol security off C:\> caspol security on 22
23 Misc..NET Framework Configuration Snap-in (mscorcfg.msc) Windows Server 2003: Start -> Programs -> Administrative Tools Windows 2000: available in the.net Framework SDK Misc. Increase Assembly Trust Use the Trust Wizard to increase the the level of trust for a specific assembly quickly Example: an assembly installed on the intranet requires access to the local file system (prohibited by the default security policy) 23
24 Misc. Evaluate Assembly Wizard to test What permissions are granted to a specific assembly What code groups apply to a specific assembly Code Access Security: Deployment Security policy are deployed in a Windows Installer (.msi) files Run from local disk or from a share. Using Group Policy Using SMS Right-click the Runtime Security Policy node and click Create a Deployment Package 24
25 Isolated Storage Keep persisting state on client machines no access to the file system Isolated by user context Written to the user profile %userprofile%\application Data Cannot be shared between users Isolated Storage List the content of the Isolated Storage Storeadm (/Roaming) /List Storeadm.exe:.Net Framework SDK Removing the content of isolated storage Storeadm (/Roaming) /Remove All data displayed is particular to the user context storeadm is run Other tasks: Isolated Storage API 25
26 Agenda Introduction to the Common Language Runtime Windows Security and Code Access Security Security Policy Evidence, Membership Conditions, Permission Sets, Code Groups, Policy Levels Misc. Further Reading 26
Security and the.net Framework
Security and the.net Framework Code Access Security Enforces security policy on code Regardless of user running the code Regardless of whether the code is in the same application with other code Other
More informationSecurity and the.net Framework
Security and the.net Framework Code Access Security Enforces security policy on code Regardless of user running the code Regardless of whether the code is in the same application with other code Other
More informationS/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: November 10, 2011
S/MIME on Good for Enterprise MS Online Certificate Status Protocol Installation and Configuration Notes Updated: November 10, 2011 Installing the Online Responder service... 1 Preparing the environment...
More information.NET FRAMEWORK SECURITY CHECKLIST Version 1, Release February 2009
.NET FRAMEWORK SECURITY CHECKLIST Version 1, Release 2.3 18 February 2009 Developed by DISA for the DOD UNCLASSIFIED This page is intentionally left blank. ii UNCLASSIFIED TABLE OF CONTENTS 1. INTRODUCTION...
More informationIdentity-based Access Control
Identity-based Access Control The kind of access control familiar from operating systems like Unix or Windows based on user identities This model originated in closed organisations ( enterprises ) like
More information5.1 Configuring Authentication, Authorization, and Impersonation. 5.2 Configuring Projects, Solutions, and Reference Assemblies
LESSON 5 5.1 Configuring Authentication, Authorization, and Impersonation 5.2 Configuring Projects, Solutions, and Reference Assemblies 5.3 Publish Web Applications 5.4 Understand Application Pools MTA
More informationMastering VB.NET using Visual Studio 2010 Course Length: 5 days Price: $2,500
Mastering VB.NET using Visual Studio 2010 Course Length: 5 days Price: $2,500 Summary Each day there will be a combination of presentations, code walk-throughs, and handson projects. The final project
More informationF Fat clients, 3 fdsvc.exe, 266 File extensions.cer, deploy, 48, exe.manifest, Index 291
Index A ACLs (Access Control Lists), 222 ActivationUri property, ApplicationDeployment class, 127 Add or Remove Programs ClickOnce deployment and, 12 13, 15, 35 initial deployment, 75 76 Install Mode,
More informationForensics Challenges. Windows Encrypted Content John Howie CISA CISM CISSP Director, Security Community, Microsoft Corporation
Forensics Challenges Windows Encrypted Content John Howie CISA CISM CISSP Director, Security Community, Microsoft Corporation Introduction Encrypted content is a challenge for investigators Makes it difficult
More informationMOC 6232A: Implementing a Microsoft SQL Server 2008 Database
MOC 6232A: Implementing a Microsoft SQL Server 2008 Database Course Number: 6232A Course Length: 5 Days Course Overview This course provides students with the knowledge and skills to implement a Microsoft
More informationCOPYRIGHTED MATERIAL. Part I The C# Ecosystem. ChapTEr 1: The C# Environment. ChapTEr 2: Writing a First Program
Part I The C# Ecosystem ChapTEr 1: The C# Environment ChapTEr 2: Writing a First Program ChapTEr 3: Program and Code File Structure COPYRIGHTED MATERIAL 1The C# Environment What s in This ChapTEr IL and
More informationMarch 2011
Oracle Enterprise Single Sign-on Logon Manager Best Practices: Configuring the ESSO-LM Agent Release 11.1.1.5.0 21004-01 March 2011 Oracle Enterprise Single Sign-on Logon Manager Best Practices: Configuring
More informationAssemblies. necessary and sufficient to make that file self describing. This unit is called Assembly.
Assemblies Any.NET application written by a developer may be a component that is designed to provide some service to other applications or itself a main application. In both cases when that.net application
More informationChapter 12 Microsoft Assemblies. Software Architecture Microsoft Assemblies 1
Chapter 12 Microsoft Assemblies 1 Process Phases Discussed in This Chapter Requirements Analysis Design Framework Architecture Detailed Design Key: x = main emphasis x = secondary emphasis Implementation
More informationAuthoring Installations for Microsoft s.net Framework
Authoring Installations for Microsoft s.net Framework using Wise for Windows Installer Vanessa Wasko Wise Solutions, Inc. Abstract This paper provides an overview of creating an installation for an application
More informationCookbook for using SQL Server DTS 2000 with.net
Cookbook for using SQL Server DTS 2000 with.net Version: 1.0 revision 15 Last updated: Tuesday, July 23, 2002 Author: Gert E.R. Drapers (GertD@SQLDev.Net) All rights reserved. No part of the contents of
More informationHPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide
HPE Security Fortify WebInspect Enterprise Software Version: 17.10 Windows operating systems Installation and Implementation Guide Document Release Date: May 2017 Software Release Date: April 2017 Legal
More information.NET. Inf 5040, Outline. Gyrd Brændeland, Sharath Babu Musunoori, Åshild Grønstad Solheim
.NET Inf 5040, 02.11.04 Gyrd Brændeland, Sharath Babu Musunoori, Åshild Grønstad Solheim Outline Introduction An overview of.net framework architecture More focus on.net core components.net features Web
More informationManaging Certificates
CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer
More informationC# 6.0 in a nutshell / Joseph Albahari & Ben Albahari. 6th ed. Beijin [etc.], cop Spis treści
C# 6.0 in a nutshell / Joseph Albahari & Ben Albahari. 6th ed. Beijin [etc.], cop. 2016 Spis treści Preface xi 1. Introducing C# and the.net Framework 1 Object Orientation 1 Type Safety 2 Memory Management
More informationMigrating vrealize Automation 6.2 to 7.2
Migrating vrealize Automation 6.2 to 7.2 vrealize Automation 7.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationUsing the Bluemix CLI IBM Corporation
Using the Bluemix CLI After you complete this section, you should understand: How to use the bx Bluemix command-line interface (CLI) to manage applications bx commands help you do tasks such as: Log in
More informationFUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry.
FUSION REGISTRY COMMUNITY EDITION VERSION 9 Setup Guide This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE Fusion Registry: 9.2.x Document
More informationSecurity context. Technology. Solution highlights
Code42 CrashPlan Security Code42 CrashPlan provides continuous, automatic desktop and laptop backup. Our layered approach to security exceeds industry best practices and fulfills the enterprise need for
More informationModule 2: Introduction to a Managed Execution Environment
Module 2: Introduction to a Managed Execution Environment Contents Overview 1 Writing a.net Application 2 Compiling and Running a.net Application 11 Lab 2: Building a Simple.NET Application 29 Review 32
More informationINTERNAL ASSESSMENT TEST 1 ANSWER KEY
INTERNAL ASSESSMENT TEST 1 ANSWER KEY Subject & Code: C# Programming and.net-101s761 Name of the faculty: Ms. Pragya Q.No Questions 1 a) What is an assembly? Explain each component of an assembly. Answers:-
More informationHP StorageWorks SmartStart EVA Storage 3.2 Release Notes
HP StorageWorks SmartStart EVA Storage 3.2 Release Notes Part Number: T5505-96034 Second edition: June 2010 Legal and notice information Copyright 2010 Hewlett-Packard Development Company, L.P. Microsoft
More informationSingle Sign-On for PCF. User's Guide
Single Sign-On for PCF Version 1.2 User's Guide 2018 Pivotal Software, Inc. Table of Contents Table of Contents Single Sign-On Overview Installation Getting Started with Single Sign-On Manage Service Plans
More informationPolicy Manager for IBM WebSphere DataPower 7.2: Configuration Guide
Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide Policy Manager for IBM WebSphere DataPower Configuration Guide SOAPMDP_Config_7.2.0 Copyright Copyright 2015 SOA Software, Inc. All rights
More informationConfiguring Windows 7 VPN (Agile) Client for authentication to McAfee Firewall Enterprise v8. David LePage - Enterprise Solutions Architect, Firewalls
Configuring Windows 7 VPN (Agile) Client for authentication to McAfee Firewall Enterprise v8 David LePage - Enterprise Solutions Architect, Firewalls Overview: Microsoft Windows version 7 introduced a
More informationIntegrating VMware Workspace ONE with Okta. VMware Workspace ONE
Integrating VMware Workspace ONE with Okta VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this
More informationPRODUCT DESCRIPTIONS AND METRICS
PRODUCT DESCRIPTIONS AND METRICS Adobe PDM - Adobe LiveCycle Managed Services (2013v3) The Services described in this PDM are Managed Services and are governed by the terms of the General Terms, the Exhibit
More informationesignlive SAML Administrator's Guide Product Release: 6.5 Date: July 05, 2018 esignlive 8200 Decarie Blvd, Suite 300 Montreal, Quebec H4P 2P5
esignlive SAML Administrator's Guide Product Release: 6.5 Date: July 05, 2018 esignlive 8200 Decarie Blvd, Suite 300 Montreal, Quebec H4P 2P5 Phone: 1-855-MYESIGN Fax: (514) 337-5258 Web: www.esignlive.com
More informationThe security mechanisms of Java
The security mechanisms of Java Carlo U. Nicola, SGI FHNW With extracts from publications of : Sun developers' center documentation; David A. Wheeler, UC Berkeley; Klaus Ostermann, TH-Darmstadt. Topics
More informationDeployment guide for Duet Enterprise for Microsoft SharePoint and SAP Server 2.0
Deployment guide for Duet Enterprise for Microsoft SharePoint and SAP Server 2.0 Microsoft Corporation Published: October 2012 Author: Microsoft Office System and Servers Team (itspdocs@microsoft.com)
More informationSOLUTION BRIEF CA API MANAGEMENT. Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management
SOLUTION BRIEF CA API MANAGEMENT Enable and Protect Your Web Applications From OWASP Top Ten With CA API Management 2 SOLUTION BRIEF ENABLE AND PROTECT YOUR WEB APPLICATIONS WITH CA API MANAGEMENT ca.com
More informationBlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide
BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server
More informationScout Enterprise Dashboard
Scout Enterprise Dashboard Administrator s Guide Date 2017-07-25 0. Legal Information 2 1. Introduction 3 2. Installation 4 2.1. System requirements 4 2.2. Installing Scout Enterprise Dashboard 6 2.3.
More informationINSTALLING LYNC SERVER 2013 EE POOL ON WINDOWS SERVER 2012
INSTALLING LYNC SERVER 2013 EE POOL ON WINDOWS SERVER 2012 Installing an Enterprise Pool that consists of two Front-End Servers. Server Environment: DC-01.chahla.local (Domain Controller, Certificate Authority)
More informationSECURED PROGRAMMING IN.NET DETAILED TRAINING CONTENT INDUSTRIAL TRAINING PROGRAM ( )
SECURED PROGRAMMING IN.NET DETAILED TRAINING CONTENT INDUSTRIAL TRAINING PROGRAM (2013-2014) MODULE: C# PROGRAMMING CHAPTER 1: INTRODUCING.NET AND C# 1.1 INTRODUCTION TO LANGUAGES C++ C# DIFFERENCES BETWEEN
More informationHP Instant Support Enterprise Edition (ISEE) Security overview
HP Instant Support Enterprise Edition (ISEE) Security overview Advanced Configuration A.03.50 Mike Brandon Interex 03 / 30, 2004 2003 Hewlett-Packard Development Company, L.P. The information contained
More informationAvePoint Cloud Governance. Release Notes
AvePoint Cloud Governance Release Notes January 2018 New Features and Improvements AvePoint Cloud Governance now includes a My Groups report, which shows users a list of Office 365 groups they own or are
More informationCloud Access Manager Configuration Guide
Cloud Access Manager 8.1.3 Configuration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationGuide to Microsoft.NET Framework 2.0 Security
Report Number: I731-008R-2006 Guide to Microsoft.NET Framework 2.0 Security Systems and Network Attack Center Updated: December 21, 2006 National Security Agency 9800 Savage Road Ft. George G. Meade, MD
More informationCA IdentityMinder. Glossary
CA IdentityMinder Glossary 12.6.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational
More informationbbc Migrating and Sharing Secuity Settings: Using Security Settings Import/Export and FDF Files Acrobat and Adobe Reader PDF Creation Date:
bbc PDF Creation Date: September 5, 2008 Migrating and Sharing Secuity Settings: Using Security Settings Import/Export and FDF Files Acrobat and Adobe Reader Version 9.0 2008 Adobe Systems Incorporated.
More informationMarkLogic Server. Information Studio Developer s Guide. MarkLogic 8 February, Copyright 2015 MarkLogic Corporation. All rights reserved.
Information Studio Developer s Guide 1 MarkLogic 8 February, 2015 Last Revised: 8.0-1, February, 2015 Copyright 2015 MarkLogic Corporation. All rights reserved. Table of Contents Table of Contents Information
More informationHPE Intelligent Management Center
HPE Intelligent Management Center EAD Security Policy Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with the TAM
More informationConfiguration of Windows 2000 operational consoles and accounts for the CERN accelerator control rooms
EUROPEAN ORGANIZATION FOR NUCLEAR RESEARCH CERN AB DIVISION CERN-AB-2003-105 (CO) Configuration of Windows 2000 operational consoles and accounts for the CERN accelerator control rooms M. Albert, G. Crockford,
More informationMobile MOUSe.NET SECURITY FOR DEVELOPERS PART 2 ONLINE COURSE OUTLINE
Mobile MOUSe.NET SECURITY FOR DEVELOPERS PART 2 ONLINE COURSE OUTLINE COURSE TITLE.NET SECURITY FOR DEVELOPERS PART 2 COURSE DURATION 15 Hour(s) of Self-Paced Interactive Training COURSE OVERVIEW In the.net
More informationXIA Links. Administrator's Guide. Version: 3.0. Copyright 2017, CENTREL Solutions
Administrator's Guide Version: 3.0 Copyright 2017, CENTREL Solutions Table of contents About... 4 Installation... 6 Installation Requirements (Server)... 7 Prerequisites (Windows Server 2016)... 9 Prerequisites
More informationConfiguration Guide. Installation and. BlackBerry Enterprise Server for Novell GroupWise. Version: 5.0 Service Pack: 4
BlackBerry Enterprise Server for Novell GroupWise Version: 5.0 Service Pack: 4 Installation and Configuration Guide Published: 2014-01-14 SWD-20140114171550404 Contents 1 Overview: BlackBerry Enterprise
More informationStatus Web Evaluator s Guide Software Pursuits, Inc.
Status Web Evaluator s Guide 2018 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 2 Installing Microsoft IIS... 2 Verifying Microsoft IIS Features... 9 Installing the
More informationA Foxit Software Company White Paper
A Foxit Software Company White Paper www.foxitsoftware.com Foxit Software Company, LLC. June 2009 TABLE OF CONTENTS Abstract... 3 Introduction... 4 The Need for Data Security Policies... 4 PDF in the Enterprise...
More informationUsing the Terminal Services Gateway Lesson 10
Using the Terminal Services Gateway Lesson 10 Skills Matrix Technology Skill Objective Domain Objective # Deploying a TS Gateway Server Configure Terminal Services Gateway 2.2 Terminal Services (TS) Web
More informationTable of Contents 1.1. Overview. Containers, Docker, Registries vsphere Integrated Containers Engine
Table of Contents Overview Containers, Docker, Registries vsphere Integrated Containers Engine Management Portal Registry Roles and Personas 1.1 1.1.1 1.1.2 1.1.2.1 1.1.2.2 1.1.2.3 1.1.2.4 2 Overview of
More informationEkran System v.6.1 Deployment Guide
Ekran System v.6.1 Deployment Guide Table of Contents About... 6 System Requirements... 7 Program Structure... 10 Deployment Process... 12 Server and Database... 13 About... 13 Database Types Comparison...
More information.Net Interview Questions
.Net Interview Questions 1.What is.net? NET is an integral part of many applications running on Windows and provides common functionality for those applications to run. This download is for people who
More informationIntroduction to.net Deployment. Brian Noyes IDesign, Inc. (
Introduction to.net Deployment Brian Noyes IDesign, Inc. (www.idesign.net) brian.noyes@idesign.net About Brian Principal Software Architect, IDesign Inc. (www.idesign.net) Microsoft MVP in ASP.NET Writing
More informationUser Manual. Admin Report Kit for IIS 7 (ARKIIS)
User Manual Admin Report Kit for IIS 7 (ARKIIS) Table of Contents 1 Admin Report Kit for IIS 7... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements... 2 1.4 Technical Support...
More informationModule Overview. works Identify NAP enforcement options Identify scenarios for NAP usage
Module 6: Network Policies and Access Protection Module Overview Describe how Network Policies Access Protection (NAP) works Identify NAP enforcement options Identify scenarios for NAP usage Describe Routing
More informationWhen Java technology burst onto the Internet scene in 1995,
MOBILE CODE SECURITY SECURE JAVA CLASS LOADING The class loading mechanism, LI GONG Sun Microsystems central to Java, plays a key role in JDK 1.2 by enabling When Java technology burst onto the Internet
More informationSaikat Banerjee Page 1
1.What is.net? NET is an integral part of many applications running on Windows and provides common functionality for those applications to run. This download is for people who need.net to run an application
More informationTable of Contents 1.1. Introduction. Overview of vsphere Integrated Containers 1.2
Table of Contents Introduction Overview of vsphere Integrated Containers 1.1 1.2 2 Overview of vsphere Integrated Containers This document provides an overview of VMware vsphere Integrated Containers.
More informationVersion Installation Guide. 1 Bocada Installation Guide
Version 19.4 Installation Guide 1 Bocada Installation Guide Copyright 2019 Bocada LLC. All Rights Reserved. Bocada and BackupReport are registered trademarks of Bocada LLC. Vision, Prism, vpconnect, and
More informationOrgPublisher 8.1 PluginX Implementation Guide
OrgPublisher 8.1 PluginX Implementation Guide Introduction Table of Contents Introduction... 3 OrgPublisher Architecture Overview... 4 OrgPublisher Architecture Components... 4 Data Source... 5 Org Chart
More informationFive9 Plus Adapter for Agent Desktop Toolkit
Cloud Contact Center Software Five9 Plus Adapter for Agent Desktop Toolkit Administrator s Guide September 2017 The Five9 Plus Adapter for Agent Desktop Toolkit integrates the Five9 Cloud Contact Center
More informationNimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]
Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document
More informationEntrust. Discovery 2.4. Administration Guide. Document issue: 3.0. Date of issue: June 2014
Entrust Discovery 2.4 Administration Guide Document issue: 3.0 Date of issue: June 2014 Copyright 2010-2014 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of Entrust, Inc.
More information81225 &SSWSSS Call Us SharePoint 2010 S:
81225 &SSWSSS Call Us SharePoint 2010 S: +91 93925 63949 Course Objectives At the end of the course, students will be able to:! Understand IIS Web Server and hosting websites in IIS.! Install and configure
More informationHOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE
HOMELESS INDIVIDUALS AND FAMILIES INFORMATION SYSTEM HIFIS 4.0 TECHNICAL ARCHITECTURE AND DEPLOYMENT REFERENCE HIFIS Development Team May 16, 2014 Contents INTRODUCTION... 2 HIFIS 4 SYSTEM DESIGN... 3
More informationIntroduction to application management
Introduction to application management To deploy web and mobile applications, add the application from the Centrify App Catalog, modify the application settings, and assign roles to the application to
More informationANIXIS Password Reset
ANIXIS Password Reset Evaluator s Guide V3.22 Copyright 2003-2018 ANIXIS. All rights reserved. ANIXIS, ANIXIS Password Reset, Password Policy Enforcer, PPE/Web, Password Policy Client, Password Policy
More informationSalesforce1 Mobile Security White Paper. Revised: April 2014
Salesforce1 Mobile Security White Paper Revised: April 2014 Table of Contents Introduction Salesforce1 Architecture Overview Authorization and Permissions Communication Security Authentication OAuth Pairing
More informationTechnical Brief Distributed Trusted Computing
Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,
More informationCoveo Platform 7.0. Microsoft SharePoint Legacy Connector Guide
Coveo Platform 7.0 Microsoft SharePoint Legacy Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds
More informationDeveloping and Deploying vsphere Solutions, vservices, and ESX Agents. 17 APR 2018 vsphere Web Services SDK 6.7 vcenter Server 6.7 VMware ESXi 6.
Developing and Deploying vsphere Solutions, vservices, and ESX Agents 17 APR 2018 vsphere Web Services SDK 6.7 vcenter Server 6.7 VMware ESXi 6.7 You can find the most up-to-date technical documentation
More informationOASYS OASYS WORKSTATION INSTALLATION GUIDE
OASYS OASYS WORKSTATION INSTALLATION GUIDE VERSION 8.0 DECEMBER 21, 2017 Copyright 2017 DTCC. All rights reserved. This work (including, without limitation, all text, images, logos, compilation and design)
More informationModule 9. Configuring IPsec. Contents:
Configuring IPsec 9-1 Module 9 Configuring IPsec Contents: Lesson 1: Overview of IPsec 9-3 Lesson 2: Configuring Connection Security Rules 9-11 Lesson 3: Configuring IPsec NAP Enforcement 9-21 Lab: Configuring
More informationCoveo Platform 6.5. Microsoft SharePoint Connector Guide
Coveo Platform 6.5 Microsoft SharePoint Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing
More informationfor Unclassified Systems
DoD Public Key Enablement (PKE) Reference Guide InstallRoot 5.0 User Guide Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke InstallRoot 5.0 User Guide for Unclassified Systems 7 December 2015
More informationHP Storage Provisioning Manager (SPM) Version 1.3 User Guide
HP Storage Provisioning Manager (SPM) Version 1.3 User Guide Abstract This guide provides information to successfully install, configure, and manage the HP Storage Provisioning Manager (SPM). It is intended
More informationVMware Identity Manager Connector Installation and Configuration (Legacy Mode)
VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until
More informationFedLine Web Customer Certificate Contingency Procedures
FedLine Web Customer Certificate Contingency Procedures Version 2.0 Contents FedLine Web Certificate Contingency Procedures... 2 Certificate Export Procedures... 2 Certificate Import Procedures... 10 Installing
More informationDeploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs)
Deploying Windows Server 2003 Internet Authentication Service (IAS) with Virtual Local Area Networks (VLANs) Microsoft Corporation Published: June 2004 Abstract This white paper describes how to configure
More informationSharing Secrets using Encryption Facility - Handson
Sharing Secrets using Encryption Facility - Handson Lab Steven R. Hart IBM March 12, 2014 Session Number 14963 Encryption Facility for z/os Encryption Facility for z/os is a host based software solution
More informationRoomWizard Exchange Connector. Complete Implementation/Upgrade Guide Microsoft Exchange On-Premises Microsoft Office 365
RoomWizard Exchange Connector Complete Implementation/Upgrade Guide Microsoft Exchange On-Premises Microsoft Office 365 Table of Contents RoomWizard Exchange Connector... 1 Getting Started... 4 Before
More informationStorageGRID Webscale 11.0 Tenant Administrator Guide
StorageGRID Webscale 11.0 Tenant Administrator Guide January 2018 215-12403_B0 doccomments@netapp.com Table of Contents 3 Contents Administering a StorageGRID Webscale tenant account... 5 Understanding
More informationTzunami Deployer Lotus Notes Exporter Guide
Tzunami Deployer Lotus Notes Exporter Guide Version 2.5 Copyright 2010. Tzunami Inc. All rights reserved. All intellectual property rights in this publication are owned by Tzunami, Inc. and protected by
More informationZumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents
Zumobi Brand Integration(Zbi) Platform Architecture Whitepaper Table of Contents Introduction... 2 High-Level Platform Architecture Diagram... 3 Zbi Production Environment... 4 Zbi Publishing Engine...
More informationCopyright and Trademarks
Copyright and Trademarks Specops Password Reset is a trademark owned by Specops Software. All other trademarks used and mentioned in this document belong to their respective owners. 2 Contents Key Components
More informationSecurity Philosophy. Humans have difficulty understanding risk
Android Security Security Philosophy Humans have difficulty understanding risk Safer to assume that Most developers do not understand security Most users do not understand security Security philosophy
More informationMission Guide: Office 365 OneDrive
Mission Guide: Office 365 OneDrive Your Mission: Use F-Response to collect Office365 Onedrive data Using F-Response to connect to Office365 Onedrive and collect its contents Important Note Disclaimer:
More informationSOA Software Policy Manager Agent v6.1 for WebSphere Application Server Installation Guide
SOA Software Policy Manager Agent v6.1 for WebSphere Application Server Installation Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software,
More informationIBM Client Security Software Deployment Guide Version Updated: January 7, 2005
IBM Client Security Software Deployment Guide Version 5.41 Updated: January 7, 2005 Fifth Edition (January 2005) Copyright International Business Machines Corporation 2005. All rights reserved. US Government
More informationGetting Started with Visual Studio.NET
V37 Getting Started with Visual Studio.NET Whil Hentzen Hentzenwerke Corp. Who Am I? Hentzenwerke Corp. (17 yrs) Editor, FoxTalk Author (6 books) Publisher, The Essentials for Visual FoxPro Ask me about
More informationV1.0 Nonkoliseko Ntshebe October 2015 V1.1 Nonkoliseko Ntshebe March 2018
SAPO Trust Centre - Generating a SSL CSR for IIS with SAN V1.0 Nonkoliseko Ntshebe October 2015 V1.1 Nonkoliseko Ntshebe March 2018 1. Open Certificate MMC snap in for your computer 2. Click on Start >
More informationGetting Started with VMware View View 3.1
Technical Note Getting Started with VMware View View 3.1 This guide provides an overview of how to install View Manager components and provision virtual desktops. Additional View Manager documentation
More informationReference manual Integrated database authentication
BUSINESS SOFTWARE Reference manual Integrated database authentication Installation and configuration ii This document is intended for Agresso Business World Consultants and customer Super Users, and thus
More informationSAP Vora - AWS Marketplace Production Edition Reference Guide
SAP Vora - AWS Marketplace Production Edition Reference Guide 1. Introduction 2 1.1. SAP Vora 2 1.2. SAP Vora Production Edition in Amazon Web Services 2 1.2.1. Vora Cluster Composition 3 1.2.2. Ambari
More information