Enviar pesquisa
Carregar
Enterprise Security & SSO
•
2 gostaram
•
1,174 visualizações
Ambareesh Kulkarni
Seguir
Tecnologia
Vista de apresentação de diapositivos
Denunciar
Compartilhar
Vista de apresentação de diapositivos
Denunciar
Compartilhar
1 de 18
Recomendados
Security in a Cloudy Architecture
Security in a Cloudy Architecture
Bob Rhubart
Oracle Database Firewall - Pierre Leon
Oracle Database Firewall - Pierre Leon
OracleVolutionSeries
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Bob Rhubart
Oracle a TBIZ2011
Oracle a TBIZ2011
TechnologyBIZ
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Subbu Devulapalli
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Novell
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
Melody Liu
IT Rationalization: Leveraging Service-Oriented Abstraction
IT Rationalization: Leveraging Service-Oriented Abstraction
Bob Rhubart
Recomendados
Security in a Cloudy Architecture
Security in a Cloudy Architecture
Bob Rhubart
Oracle Database Firewall - Pierre Leon
Oracle Database Firewall - Pierre Leon
OracleVolutionSeries
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Rationalization and Defense in Depth - Two Steps Closer to the Cloud
Bob Rhubart
Oracle a TBIZ2011
Oracle a TBIZ2011
TechnologyBIZ
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Fine Grained Authorization: Technical Insights for Using Oracle Entitlements ...
Subbu Devulapalli
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
How to Implement Cloud Security: The Nuts and Bolts of Novell Cloud Security ...
Novell
Ppt dbsec-oow2013-avdf
Ppt dbsec-oow2013-avdf
Melody Liu
IT Rationalization: Leveraging Service-Oriented Abstraction
IT Rationalization: Leveraging Service-Oriented Abstraction
Bob Rhubart
分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景
ITband
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CloudIDSummit
Novell SecureLogin 7 and Your Microsoft Active Directory Setup
Novell SecureLogin 7 and Your Microsoft Active Directory Setup
Novell
Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02
Krystel Hery
Juniper Enterprise Guest Access
Juniper Enterprise Guest Access
Altaware, Inc.
NetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van Lith
vdhendrikse
Whats new in data power
Whats new in data power
sflynn073
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
Microsoft TechNet - Belgium and Luxembourg
Oracle security-formula
Oracle security-formula
OracleIDM
Manpower group idm-platform
Manpower group idm-platform
OracleIDM
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Bob Rhubart
Oracle Enterprise Manager
Oracle Enterprise Manager
Bob Rhubart
IBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway
Sun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-final
Sal Marcus
Introduction To OSGi
Introduction To OSGi
ccustine
03 300364 2
03 300364 2
vigil_ayhon
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
Arun Gupta
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
OracleIDM
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
IntelAPAC
Tablet Access to Business Applications
Tablet Access to Business Applications
Array Networks
Get Your Shift Together: Aligning Everyone to KPIs that Matter
Get Your Shift Together: Aligning Everyone to KPIs that Matter
Julie Holmes
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Technology
Mais conteúdo relacionado
Mais procurados
分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景
ITband
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CloudIDSummit
Novell SecureLogin 7 and Your Microsoft Active Directory Setup
Novell SecureLogin 7 and Your Microsoft Active Directory Setup
Novell
Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02
Krystel Hery
Juniper Enterprise Guest Access
Juniper Enterprise Guest Access
Altaware, Inc.
NetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van Lith
vdhendrikse
Whats new in data power
Whats new in data power
sflynn073
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
Microsoft TechNet - Belgium and Luxembourg
Oracle security-formula
Oracle security-formula
OracleIDM
Manpower group idm-platform
Manpower group idm-platform
OracleIDM
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Bob Rhubart
Oracle Enterprise Manager
Oracle Enterprise Manager
Bob Rhubart
IBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway
Sun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-final
Sal Marcus
Introduction To OSGi
Introduction To OSGi
ccustine
03 300364 2
03 300364 2
vigil_ayhon
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
Arun Gupta
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
OracleIDM
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
IntelAPAC
Tablet Access to Business Applications
Tablet Access to Business Applications
Array Networks
Mais procurados
(20)
分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
Novell SecureLogin 7 and Your Microsoft Active Directory Setup
Novell SecureLogin 7 and Your Microsoft Active Directory Setup
Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02
Juniper Enterprise Guest Access
Juniper Enterprise Guest Access
NetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van Lith
Whats new in data power
Whats new in data power
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
Oracle security-formula
Oracle security-formula
Manpower group idm-platform
Manpower group idm-platform
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Oracle Enterprise Manager
Oracle Enterprise Manager
IBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway appliances feature & virtual edition comparison
Sun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-final
Introduction To OSGi
Introduction To OSGi
03 300364 2
03 300364 2
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
Tablet Access to Business Applications
Tablet Access to Business Applications
Destaque
Get Your Shift Together: Aligning Everyone to KPIs that Matter
Get Your Shift Together: Aligning Everyone to KPIs that Matter
Julie Holmes
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Technology
Sei pronto a passare al continuous delivery?
Sei pronto a passare al continuous delivery?
Accenture Italia
A case study on Accenture
A case study on Accenture
Deeban Babu
Unlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined Networking
accenture
Making the business case for DevOps
Making the business case for DevOps
Martin Croker
Fundamental Review of the Trading Book (FRTB) – Data Challenges
Fundamental Review of the Trading Book (FRTB) – Data Challenges
accenture
The New World of As a Service
The New World of As a Service
accenture
Developing a Roadmap for Digital Transformation
Developing a Roadmap for Digital Transformation
John Sinke
Destaque
(9)
Get Your Shift Together: Aligning Everyone to KPIs that Matter
Get Your Shift Together: Aligning Everyone to KPIs that Matter
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
Sei pronto a passare al continuous delivery?
Sei pronto a passare al continuous delivery?
A case study on Accenture
A case study on Accenture
Unlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined Networking
Making the business case for DevOps
Making the business case for DevOps
Fundamental Review of the Trading Book (FRTB) – Data Challenges
Fundamental Review of the Trading Book (FRTB) – Data Challenges
The New World of As a Service
The New World of As a Service
Developing a Roadmap for Digital Transformation
Developing a Roadmap for Digital Transformation
Semelhante a Enterprise Security & SSO
License Management
License Management
SVPMA
OpenStack Security
OpenStack Security
openstackindia
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
Novell
Real User Experience Insight
Real User Experience Insight
ruiruitang
Real User Experience Insight
Real User Experience Insight
ruiruitang
Real User Experience Insight
Real User Experience Insight
ruiruitang
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
Risk Analysis Consultants, s.r.o.
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
Noam Bunder
License Management Overview
License Management Overview
Dominic Haigh
5 Keys to Delivering Storage-as-a-Service Without Losing Control
5 Keys to Delivering Storage-as-a-Service Without Losing Control
Jeannette Grand
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Control
zayedalji
HyTrust-FISMA Compliance in the Virtual Data Center
HyTrust-FISMA Compliance in the Virtual Data Center
HyTrust
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
Andris Soroka
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
ORACLE USER GROUP ESTONIA
Integrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity Manager
Novell
Cisco Study: State of Web Security
Cisco Study: State of Web Security
Cisco Canada
What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0
Novell
Troubleshooting Novell Access Manager 3.1
Troubleshooting Novell Access Manager 3.1
Novell
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf
DeepakAC3
Eucalyptus-AWS Hybrid Using RightScale myCloud
Eucalyptus-AWS Hybrid Using RightScale myCloud
RightScale
Semelhante a Enterprise Security & SSO
(20)
License Management
License Management
OpenStack Security
OpenStack Security
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
Real User Experience Insight
Real User Experience Insight
Real User Experience Insight
Real User Experience Insight
Real User Experience Insight
Real User Experience Insight
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
License Management Overview
License Management Overview
5 Keys to Delivering Storage-as-a-Service Without Losing Control
5 Keys to Delivering Storage-as-a-Service Without Losing Control
Wallix AdminBastion - Privileged User Management & Access Control
Wallix AdminBastion - Privileged User Management & Access Control
HyTrust-FISMA Compliance in the Virtual Data Center
HyTrust-FISMA Compliance in the Virtual Data Center
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
Integrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity Manager
Cisco Study: State of Web Security
Cisco Study: State of Web Security
What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0
Troubleshooting Novell Access Manager 3.1
Troubleshooting Novell Access Manager 3.1
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf
Eucalyptus-AWS Hybrid Using RightScale myCloud
Eucalyptus-AWS Hybrid Using RightScale myCloud
Mais de Ambareesh Kulkarni
Travel Management Dashboard application
Travel Management Dashboard application
Ambareesh Kulkarni
Carlson Wagonlit: Award winning application
Carlson Wagonlit: Award winning application
Ambareesh Kulkarni
Analyze Optimize Realize - Business Value Analysis
Analyze Optimize Realize - Business Value Analysis
Ambareesh Kulkarni
Evolution of Client Services functions
Evolution of Client Services functions
Ambareesh Kulkarni
Building the Digital Bank
Building the Digital Bank
Ambareesh Kulkarni
Packaged Dashboard Reporting Solution
Packaged Dashboard Reporting Solution
Ambareesh Kulkarni
Actuate Certified Business Solutions for SAP
Actuate Certified Business Solutions for SAP
Ambareesh Kulkarni
Professional Services Project Delivery Methodology
Professional Services Project Delivery Methodology
Ambareesh Kulkarni
Windows 10 Migration
Windows 10 Migration
Ambareesh Kulkarni
Actuate BI implementation for MassMutual's SAP BW
Actuate BI implementation for MassMutual's SAP BW
Ambareesh Kulkarni
Professional Services packaged solutions for SAP
Professional Services packaged solutions for SAP
Ambareesh Kulkarni
SAP R3 SQL Query Builder
SAP R3 SQL Query Builder
Ambareesh Kulkarni
Zero Touch Operating Systems Deployment
Zero Touch Operating Systems Deployment
Ambareesh Kulkarni
Ambareesh Kulkarni, Professional background
Ambareesh Kulkarni, Professional background
Ambareesh Kulkarni
Professional Services Roadmap 2011 and beyond
Professional Services Roadmap 2011 and beyond
Ambareesh Kulkarni
1E and Servicenow integration
1E and Servicenow integration
Ambareesh Kulkarni
Enterprise BI & SOA
Enterprise BI & SOA
Ambareesh Kulkarni
Professional Services Automation
Professional Services Automation
Ambareesh Kulkarni
Storage Provisioning for Enterprise Information Applications
Storage Provisioning for Enterprise Information Applications
Ambareesh Kulkarni
Professional Services Sales Techniques & Methodology
Professional Services Sales Techniques & Methodology
Ambareesh Kulkarni
Mais de Ambareesh Kulkarni
(20)
Travel Management Dashboard application
Travel Management Dashboard application
Carlson Wagonlit: Award winning application
Carlson Wagonlit: Award winning application
Analyze Optimize Realize - Business Value Analysis
Analyze Optimize Realize - Business Value Analysis
Evolution of Client Services functions
Evolution of Client Services functions
Building the Digital Bank
Building the Digital Bank
Packaged Dashboard Reporting Solution
Packaged Dashboard Reporting Solution
Actuate Certified Business Solutions for SAP
Actuate Certified Business Solutions for SAP
Professional Services Project Delivery Methodology
Professional Services Project Delivery Methodology
Windows 10 Migration
Windows 10 Migration
Actuate BI implementation for MassMutual's SAP BW
Actuate BI implementation for MassMutual's SAP BW
Professional Services packaged solutions for SAP
Professional Services packaged solutions for SAP
SAP R3 SQL Query Builder
SAP R3 SQL Query Builder
Zero Touch Operating Systems Deployment
Zero Touch Operating Systems Deployment
Ambareesh Kulkarni, Professional background
Ambareesh Kulkarni, Professional background
Professional Services Roadmap 2011 and beyond
Professional Services Roadmap 2011 and beyond
1E and Servicenow integration
1E and Servicenow integration
Enterprise BI & SOA
Enterprise BI & SOA
Professional Services Automation
Professional Services Automation
Storage Provisioning for Enterprise Information Applications
Storage Provisioning for Enterprise Information Applications
Professional Services Sales Techniques & Methodology
Professional Services Sales Techniques & Methodology
Último
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
Rizwan Syed
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
NavinnSomaal
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
comworks
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Scott Keck-Warren
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Padma Pradeep
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Patryk Bandurski
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
The Digital Insurer
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Safe Software
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
charlottematthew16
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
Alex Barbosa Coqueiro
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
SeasiaInfotech2
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
carlostorres15106
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
BookNet Canada
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Fwdays
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Wonjun Hwang
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Fwdays
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
Florian Wilhelm
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
Fwdays
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Zilliz
Último
(20)
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Enterprise Security & SSO
1.
Actuate Security
Enterprise class, Standards based, Robust and Flexible Ambareesh Kulkarni, Director 1 © Actuate Corporation 2008
2.
Anatomy of an
Actuate Application ` ` ` FW1 FW2 FW3 Application Web Server Server farm Actuate iServer Actuate Farm running Active nodes Encycl. Portal 2 © Actuate Corporation 2008
3.
Features of Actuate
Security AuthN & AuthZ • Authentication -Verify if users are who they claim to be • Authorization -Users can only access what the security policy allows • Role-based access control -Grant access based on the user’s role in the organization • Data privacy -Data integrity & reliability • User Registration -External and Internal • Audit information -Usage and exceptions • Transport Security -Secure delivery of information 3 © Actuate Corporation 2008
4.
Features of Actuate
Security AuthN & AuthZ • Non-repudiation on actions -Important user actions carry proof of execution to prevent denial • Session security -User sessions are uniquely identifiable and not subject to masquerading • Session time-out -Session inactivity leads to session termination • Audit logs -All actions are logged for audit use. • Single sign-on -Usage of multiple systems or services does not require additional credentials. 4 © Actuate Corporation 2008
5.
Features of Actuate
Security AuthN & AuthZ • Robust authentication & authorization capabilities • Supports both Internal and External Authentication • Can use a combination of UserID/Password for authentication • Optionally: • trust credentials passed to it • Extract Userid and/or password from encrypted artifacts such as (e.g. token, logon ticket etc.) • Granular authorization • Fast and easy mapping of business rules to authorization policy • Course, medium and fine-grained authorization • An open, interoperable Java-based architecture with data source flexibility • Plug-n-play integration with Web, application and directory services • Supports LDAP, RDBMS and any custom data sources 5 © Actuate Corporation 2008
6.
External User Registration
and Authentication process flow Business Process 2 Workflow 1 3 Automated Access Approval End Portal Server Users 5 Data Store 4 6 Data Repository Actuate 8 Authentication/Revalidation 7 Services 9 Actuate 6 © Actuate Corporation 2008
7.
Authorization Controls
What can you protect?? • Server Controls • Resource – Universal Resource Indicator… • Applications – group of resources… • Dynamic Content – EJB’s, JSP’s, Servlets… • Method-level Protection – Access, Get, Post • Wild-Card Control – *, /*/, *.* 7 © Actuate Corporation 2008
8.
Authorization & Privilege
Management Levels Limits access at the URL Coarse-grained level to protect machines Coarse and their contents Provides conditional Medium-grained access to Actuate Folders and files based on access control lists and user roles Controls what data users Fine Fine-grained see once they have access to the report (Page Level Security) 8 © Actuate Corporation 2008
9.
Usage Logging
What have you accessed? • Provides records required to meet security policy and compliance requirements Usage logging • Helps pinpoint problem areas against policies • Captures “contextual” Actuate usage log information for better captures ALL diagnosing issues User Activity 9 © Actuate Corporation 2008
10.
Actuate Security
Scalable and Flexible Key Server Dispatcher Enforcement (Agent or Proxy) End Users Authentication Authorization Engine Actuate iServer Centralized Logging Engine Browser-based Web/App Administration Server Entitlements Engine 10 © Actuate Corporation 2008
11.
Security Extensions
iPortal Security Extension (iPSE) • For Single Sign-on Report Server Security Extension (RSSE) • For any external data store including LDAP & Microsoft Active Directory integration 11 © Actuate Corporation 2008
12.
Single Cluster supports
diverse and disparate security systems • Actuate integrates with all major security systems and services providers • RSA, Netegrity, Kerberos, SAP, Tivoli, BMC, SAML, etc. • Leverages investments in enterprise security models • Centralizes the administration of common user information • Supports multiple authentication and authorization sources from a single iServer cluster 12 © Actuate Corporation 2008
13.
Java RSSE Architecture
Interface Implementation (Published by Actuate) iServer Endpoint HTTP request RSSE Endpoint DB Access API Java Interface SOAP 3rd party database HTTP response (e.g. LDAP) iServer RSSE Service 13 © Actuate Corporation 2008
14.
Transport Security
Web Tier J2EE Server Farm(e.g. WebSphere) Report Server Farm SSl Encrypted Web Browser session Internal traffic SOAP/http Optionally Encrypted using Stunnel or IPSEC ` ` ` FW1 FW2 FW3 Application Web Server Server farm Actuate iServer Actuate Farm running Active nodes Encycl. Portal 14 © Actuate Corporation 2008
15.
Microsoft IIS Web
Tier Integration • Reverse HTTP Proxy – using AJP plug-in • Supports IIS forwarding requests to iPortal • AJP plug-in configured with Microsoft IIS Microsoft IIS Oracle Actuate Oracle Containers for AJP 13 HTTP Containers for or iServer Cluster J2EE AJP connector Server J2EE iServer Express 15 © Actuate Corporation 2008
16.
How It Works:
ASP.net Forms Authentication & SSO with Actuate Active Directory 1 Microsoft IIS /ASP.NET 2 RSSE 4 8 3 4. App authentication 5 6 Actuate Oracle Oracle 7 HTTP Containers for AJP connector Server Containers for or iServer Cluster J2EE J2EE iServer Express 1. GET default.aspx HTTP/1.1 7. Submit Actuate URL from ASP page 2. 302 Redirect Location: login.aspx 8. Report Server Security Extension provides external authentication 3. POST default.aspx HTTP/1.1 & registration services <form data containing credentials> 5. 200 OK Set-Cookie: .ASPXAUTH Auth Ticket 6. GET default.aspx HTTP/1.1 16 Cookie: .ASPXAUTH Auth Ticket © Actuate Corporation 2008
17.
Seamless Access to
Actuate 17 © Actuate Corporation 2008
18.
Seamless Access to
Actuate 18 © Actuate Corporation 2008