SlideShare uma empresa Scribd logo
1 de 18
Actuate Security
                             Enterprise class, Standards based,
                                    Robust and Flexible

                                  Ambareesh Kulkarni, Director



1
© Actuate Corporation 2008
Anatomy of an Actuate Application




            `

                `

                    `        FW1                FW2               FW3




                                                   Application
                                   Web Server     Server farm       Actuate iServer   Actuate
                                     Farm        running Active         nodes         Encycl.
                                                     Portal




2
© Actuate Corporation 2008
Features of Actuate Security
     AuthN & AuthZ

           • Authentication -Verify if users are who they claim to
             be
           • Authorization -Users can only access what the
             security policy allows
           • Role-based access control -Grant access based on
             the user’s role in the organization
           • Data privacy -Data integrity & reliability
           • User Registration -External and Internal
           • Audit information -Usage and exceptions
           • Transport Security -Secure delivery of information


3
© Actuate Corporation 2008
Features of Actuate Security
     AuthN & AuthZ

         • Non-repudiation on actions -Important user
           actions carry proof of execution to prevent
           denial
         • Session security -User sessions are uniquely
           identifiable and not subject to masquerading
         • Session time-out -Session inactivity leads to
           session termination
         • Audit logs -All actions are logged for audit
           use.
         • Single sign-on -Usage of multiple systems or
           services does not require additional
           credentials.


4
© Actuate Corporation 2008
Features of Actuate Security
     AuthN & AuthZ

            • Robust authentication & authorization capabilities
                     • Supports both Internal and External Authentication
                     • Can use a combination of UserID/Password for authentication
                     • Optionally:
                             • trust credentials passed to it
                             • Extract Userid and/or password from encrypted artifacts such as
                               (e.g. token, logon ticket etc.)
            • Granular authorization
                     • Fast and easy mapping of business rules to authorization policy
                     • Course, medium and fine-grained authorization
            • An open, interoperable Java-based architecture with data
              source flexibility
                     • Plug-n-play integration with Web, application and directory
                       services
                     • Supports LDAP, RDBMS and any custom data sources

5
© Actuate Corporation 2008
External User Registration and Authentication
     process flow
                                                  Business Process
                                              2   Workflow

      1

                                                            3
                                                                
                                                                Automated Access Approval



   End
                                 Portal            Server
   Users
                                          5                          Data Store


                             4                6               Data
                                                            Repository

                                                                               Actuate  8
                                                                               Authentication/Revalidation
                                              7                                Services


                                                            9            Actuate


6
© Actuate Corporation 2008
Authorization Controls
     What can you protect??


  • Server Controls
            • Resource –
              Universal
              Resource
              Indicator…
            • Applications –
              group of
              resources…
            • Dynamic Content –
              EJB’s, JSP’s,
              Servlets…
            • Method-level
              Protection –
              Access, Get, Post
            • Wild-Card Control
              – *, /*/, *.*

7
© Actuate Corporation 2008
Authorization & Privilege Management Levels


                                              Limits access at the URL
                             Coarse-grained
                                              level to protect machines
      Coarse
                                              and their contents

                                              Provides conditional
                             Medium-grained   access to Actuate Folders
                                              and files based on access
                                              control lists and user roles

                                              Controls what data users
          Fine               Fine-grained     see once they have access
                                              to the report (Page Level
                                              Security)

8
© Actuate Corporation 2008
Usage Logging
     What have you accessed?
                                             • Provides records required to
                                               meet security policy and
                                               compliance requirements
                             Usage logging   • Helps pinpoint problem areas
                                               against policies
                                             • Captures “contextual”
      Actuate usage log                        information for better
        captures ALL                           diagnosing issues
         User Activity




9
© Actuate Corporation 2008
Actuate Security
     Scalable and Flexible



                             Key Server Dispatcher     Enforcement
                                                     (Agent or Proxy)
                                                                           End
                                                                           Users


                                 Authentication
                              Authorization Engine




    Actuate iServer              Centralized
                               Logging Engine




                                                                        Browser-based
                                                      Web/App
                                                                        Administration
                                                       Server
                              Entitlements Engine
10
© Actuate Corporation 2008
Security Extensions

         iPortal Security Extension (iPSE)
           • For Single Sign-on
         Report Server Security Extension
         (RSSE)
           • For any external data store
             including LDAP & Microsoft Active
             Directory integration




11
© Actuate Corporation 2008
Single Cluster supports diverse and disparate
     security systems

      • Actuate integrates with
        all major security
        systems and services
        providers
               • RSA, Netegrity,
                     Kerberos, SAP,
                     Tivoli, BMC, SAML,
                     etc.
      • Leverages
        investments in
        enterprise security
        models
               • Centralizes the
                 administration of
                 common user
                 information
      • Supports multiple
        authentication and
        authorization sources
        from a single iServer
        cluster


12
© Actuate Corporation 2008
Java RSSE Architecture




                                                                                                                     Interface Implementation
                                                                                            (Published by Actuate)
                                       iServer Endpoint   HTTP request




                                                                          RSSE Endpoint
                                                                                                                                                DB Access API




                                                                                                Java Interface
                                                              SOAP                                                                                                3rd party
                                                                                                                                                                 database
                                                          HTTP response                                                                                         (e.g. LDAP)


                             iServer


                                                                                          RSSE Service




13
© Actuate Corporation 2008
Transport Security


                                                 Web Tier                      J2EE Server Farm(e.g. WebSphere)                   Report Server Farm



             SSl Encrypted Web Browser session              Internal traffic                                SOAP/http
                                                                                                     Optionally Encrypted using
                                                                                                         Stunnel or IPSEC




                `

                    `

                        `    FW1                                 FW2                                           FW3




                                                                                       Application
                                            Web Server                                Server farm                             Actuate iServer          Actuate
                                              Farm                                   running Active                               nodes                Encycl.
                                                                                         Portal




14
© Actuate Corporation 2008
Microsoft IIS Web Tier Integration

            • Reverse HTTP Proxy – using AJP plug-in
                     • Supports IIS forwarding requests to iPortal
                     • AJP plug-in configured with Microsoft IIS




                  Microsoft
                     IIS                                      Oracle
                                          Actuate              Oracle
                                                          Containers for
                                AJP 13
                                           HTTP            Containers for or
                                                            iServer Cluster
                                                               J2EE
               AJP connector               Server               J2EE
                                                             iServer Express




15
© Actuate Corporation 2008
How It Works: ASP.net Forms Authentication & SSO
     with Actuate
                                                                                      Active Directory

                         1                   Microsoft
                                           IIS /ASP.NET
                          2                                                                                 RSSE
                                                                     4                   8

                         3                                    4. App authentication

                         5

                         6

                                                                                      Actuate               Oracle
                                                                                                             Oracle
                                                                     7                 HTTP              Containers for
                                          AJP connector                                Server
                                                                                                          Containers for or
                                                                                                          iServer Cluster
                                                                                                             J2EE
                                                                                                              J2EE
                                                                                                           iServer Express



    1. GET default.aspx HTTP/1.1                    7. Submit Actuate URL from ASP
                                                         page
    2. 302 Redirect
         Location: login.aspx                       8. Report Server Security Extension
                                                         provides external authentication
    3. POST default.aspx HTTP/1.1
                                                         & registration services
         <form data containing credentials>

    5. 200 OK
         Set-Cookie: .ASPXAUTH Auth Ticket

    6. GET default.aspx HTTP/1.1
16           Cookie: .ASPXAUTH
                            Auth Ticket
© Actuate Corporation 2008
Seamless Access to Actuate




17
© Actuate Corporation 2008
Seamless Access to Actuate




18
© Actuate Corporation 2008

Mais conteúdo relacionado

Mais procurados

分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景ITband
 
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CloudIDSummit
 
Novell SecureLogin 7 and Your Microsoft Active Directory Setup
Novell SecureLogin 7 and Your Microsoft Active Directory SetupNovell SecureLogin 7 and Your Microsoft Active Directory Setup
Novell SecureLogin 7 and Your Microsoft Active Directory SetupNovell
 
Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02Krystel Hery
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest AccessAltaware, Inc.
 
NetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van LithNetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van Lithvdhendrikse
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data powersflynn073
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formulaOracleIDM
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platformOracleIDM
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsBob Rhubart
 
Oracle Enterprise Manager
Oracle Enterprise ManagerOracle Enterprise Manager
Oracle Enterprise ManagerBob Rhubart
 
IBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway appliances feature & virtual edition comparisonIBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway appliances feature & virtual edition comparisonIBM DataPower Gateway
 
Sun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-finalSun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-finalSal Marcus
 
Introduction To OSGi
Introduction To OSGiIntroduction To OSGi
Introduction To OSGiccustine
 
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012Arun Gupta
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2OracleIDM
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications Array Networks
 

Mais procurados (20)

分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景分会场九Altiris终端管理套件和服务器管理套件现在及远景
分会场九Altiris终端管理套件和服务器管理套件现在及远景
 
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
CIS13: Managing the Keys to the Kingdom: Next-Gen Role-based Access Control a...
 
Novell SecureLogin 7 and Your Microsoft Active Directory Setup
Novell SecureLogin 7 and Your Microsoft Active Directory SetupNovell SecureLogin 7 and Your Microsoft Active Directory Setup
Novell SecureLogin 7 and Your Microsoft Active Directory Setup
 
Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02Datapowercommonusecases 130509114200-phpapp02
Datapowercommonusecases 130509114200-phpapp02
 
Juniper Enterprise Guest Access
Juniper Enterprise Guest AccessJuniper Enterprise Guest Access
Juniper Enterprise Guest Access
 
NetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van LithNetIQ sessie Boudewijn van Lith
NetIQ sessie Boudewijn van Lith
 
Whats new in data power
Whats new in data powerWhats new in data power
Whats new in data power
 
Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise Managing Windows RT devices in the Enterprise
Managing Windows RT devices in the Enterprise
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
Manpower group idm-platform
Manpower group idm-platformManpower group idm-platform
Manpower group idm-platform
 
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the CloudsRationalization and Defense in Depth - Two Steps Closer to the Clouds
Rationalization and Defense in Depth - Two Steps Closer to the Clouds
 
Oracle Enterprise Manager
Oracle Enterprise ManagerOracle Enterprise Manager
Oracle Enterprise Manager
 
IBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway appliances feature & virtual edition comparisonIBM DataPower Gateway appliances feature & virtual edition comparison
IBM DataPower Gateway appliances feature & virtual edition comparison
 
Sun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-finalSun java-access-manager-siebel-80-final
Sun java-access-manager-siebel-80-final
 
Introduction To OSGi
Introduction To OSGiIntroduction To OSGi
Introduction To OSGi
 
03 300364 2
03 300364 203 300364 2
03 300364 2
 
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
WebLogic 12c Developer Deep Dive at Oracle Develop India 2012
 
Identity management11gr2launch finalv2
Identity management11gr2launch finalv2Identity management11gr2launch finalv2
Identity management11gr2launch finalv2
 
Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Tablet Access to Business Applications
Tablet Access to Business ApplicationsTablet Access to Business Applications
Tablet Access to Business Applications
 

Destaque

Get Your Shift Together: Aligning Everyone to KPIs that Matter
Get Your Shift Together: Aligning Everyone to KPIs that MatterGet Your Shift Together: Aligning Everyone to KPIs that Matter
Get Your Shift Together: Aligning Everyone to KPIs that MatterJulie Holmes
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Technology
 
Sei pronto a passare al continuous delivery?
Sei pronto a passare al continuous delivery?Sei pronto a passare al continuous delivery?
Sei pronto a passare al continuous delivery?Accenture Italia
 
A case study on Accenture
A case study on AccentureA case study on Accenture
A case study on AccentureDeeban Babu
 
Unlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined NetworkingUnlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined Networkingaccenture
 
Making the business case for DevOps
Making the business case for DevOpsMaking the business case for DevOps
Making the business case for DevOpsMartin Croker
 
Fundamental Review of the Trading Book (FRTB) – Data Challenges
Fundamental Review of the Trading Book (FRTB) – Data ChallengesFundamental Review of the Trading Book (FRTB) – Data Challenges
Fundamental Review of the Trading Book (FRTB) – Data Challengesaccenture
 
The New World of As a Service
The New World of As a ServiceThe New World of As a Service
The New World of As a Serviceaccenture
 
Developing a Roadmap for Digital Transformation
Developing a Roadmap for Digital TransformationDeveloping a Roadmap for Digital Transformation
Developing a Roadmap for Digital TransformationJohn Sinke
 

Destaque (9)

Get Your Shift Together: Aligning Everyone to KPIs that Matter
Get Your Shift Together: Aligning Everyone to KPIs that MatterGet Your Shift Together: Aligning Everyone to KPIs that Matter
Get Your Shift Together: Aligning Everyone to KPIs that Matter
 
Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...Accenture Security Services: Defending and empowering the resilient digital b...
Accenture Security Services: Defending and empowering the resilient digital b...
 
Sei pronto a passare al continuous delivery?
Sei pronto a passare al continuous delivery?Sei pronto a passare al continuous delivery?
Sei pronto a passare al continuous delivery?
 
A case study on Accenture
A case study on AccentureA case study on Accenture
A case study on Accenture
 
Unlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined NetworkingUnlocking the True Benefit of Software Defined Networking
Unlocking the True Benefit of Software Defined Networking
 
Making the business case for DevOps
Making the business case for DevOpsMaking the business case for DevOps
Making the business case for DevOps
 
Fundamental Review of the Trading Book (FRTB) – Data Challenges
Fundamental Review of the Trading Book (FRTB) – Data ChallengesFundamental Review of the Trading Book (FRTB) – Data Challenges
Fundamental Review of the Trading Book (FRTB) – Data Challenges
 
The New World of As a Service
The New World of As a ServiceThe New World of As a Service
The New World of As a Service
 
Developing a Roadmap for Digital Transformation
Developing a Roadmap for Digital TransformationDeveloping a Roadmap for Digital Transformation
Developing a Roadmap for Digital Transformation
 

Semelhante a Enterprise Security & SSO

License Management
License ManagementLicense Management
License ManagementSVPMA
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineNovell
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insightruiruitang
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementNoam Bunder
 
License Management Overview
License Management OverviewLicense Management Overview
License Management OverviewDominic Haigh
 
5 Keys to Delivering Storage-as-a-Service Without Losing Control
5 Keys to Delivering Storage-as-a-Service Without Losing Control5 Keys to Delivering Storage-as-a-Service Without Losing Control
5 Keys to Delivering Storage-as-a-Service Without Losing ControlJeannette Grand
 
Wallix AdminBastion - Privileged User Management &amp; Access Control
Wallix AdminBastion - Privileged User Management &amp; Access ControlWallix AdminBastion - Privileged User Management &amp; Access Control
Wallix AdminBastion - Privileged User Management &amp; Access Controlzayedalji
 
HyTrust-FISMA Compliance in the Virtual Data Center
HyTrust-FISMA Compliance in the Virtual Data CenterHyTrust-FISMA Compliance in the Virtual Data Center
HyTrust-FISMA Compliance in the Virtual Data CenterHyTrust
 
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...Andris Soroka
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraORACLE USER GROUP ESTONIA
 
Integrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerIntegrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerNovell
 
Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Canada
 
What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0Novell
 
Troubleshooting Novell Access Manager 3.1
Troubleshooting Novell Access Manager 3.1Troubleshooting Novell Access Manager 3.1
Troubleshooting Novell Access Manager 3.1Novell
 
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdfDeepakAC3
 
Eucalyptus-AWS Hybrid Using RightScale myCloud
Eucalyptus-AWS Hybrid Using RightScale myCloudEucalyptus-AWS Hybrid Using RightScale myCloud
Eucalyptus-AWS Hybrid Using RightScale myCloudRightScale
 

Semelhante a Enterprise Security & SSO (20)

License Management
License ManagementLicense Management
License Management
 
OpenStack Security
OpenStack SecurityOpenStack Security
OpenStack Security
 
Overview of Identity and Access Management Product Line
Overview of Identity and Access Management Product LineOverview of Identity and Access Management Product Line
Overview of Identity and Access Management Product Line
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
Real User Experience Insight
Real User Experience InsightReal User Experience Insight
Real User Experience Insight
 
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for QualysQualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
QualysGuard InfoDay 2012 - Secure Digital Vault for Qualys
 
Compliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement ManagementCompliance and Governance Through Complex Entitlement Management
Compliance and Governance Through Complex Entitlement Management
 
License Management Overview
License Management OverviewLicense Management Overview
License Management Overview
 
5 Keys to Delivering Storage-as-a-Service Without Losing Control
5 Keys to Delivering Storage-as-a-Service Without Losing Control5 Keys to Delivering Storage-as-a-Service Without Losing Control
5 Keys to Delivering Storage-as-a-Service Without Losing Control
 
Wallix AdminBastion - Privileged User Management &amp; Access Control
Wallix AdminBastion - Privileged User Management &amp; Access ControlWallix AdminBastion - Privileged User Management &amp; Access Control
Wallix AdminBastion - Privileged User Management &amp; Access Control
 
HyTrust-FISMA Compliance in the Virtual Data Center
HyTrust-FISMA Compliance in the Virtual Data CenterHyTrust-FISMA Compliance in the Virtual Data Center
HyTrust-FISMA Compliance in the Virtual Data Center
 
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
DSS - ITSEC conf - Centrify - Identity Control and Access Management - Riga N...
 
Tänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi TaraTänased võimalused turvalahendustes - Tarvi Tara
Tänased võimalused turvalahendustes - Tarvi Tara
 
Integrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity ManagerIntegrating Novell Access Governance Suite with Novell Identity Manager
Integrating Novell Access Governance Suite with Novell Identity Manager
 
Cisco Study: State of Web Security
Cisco Study: State of Web Security Cisco Study: State of Web Security
Cisco Study: State of Web Security
 
What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0What's New in Novell Identity Manager 4.0
What's New in Novell Identity Manager 4.0
 
Troubleshooting Novell Access Manager 3.1
Troubleshooting Novell Access Manager 3.1Troubleshooting Novell Access Manager 3.1
Troubleshooting Novell Access Manager 3.1
 
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf
 
Eucalyptus-AWS Hybrid Using RightScale myCloud
Eucalyptus-AWS Hybrid Using RightScale myCloudEucalyptus-AWS Hybrid Using RightScale myCloud
Eucalyptus-AWS Hybrid Using RightScale myCloud
 

Mais de Ambareesh Kulkarni

Travel Management Dashboard application
Travel Management Dashboard applicationTravel Management Dashboard application
Travel Management Dashboard applicationAmbareesh Kulkarni
 
Carlson Wagonlit: Award winning application
Carlson Wagonlit: Award winning applicationCarlson Wagonlit: Award winning application
Carlson Wagonlit: Award winning applicationAmbareesh Kulkarni
 
Analyze Optimize Realize - Business Value Analysis
Analyze Optimize Realize - Business Value AnalysisAnalyze Optimize Realize - Business Value Analysis
Analyze Optimize Realize - Business Value AnalysisAmbareesh Kulkarni
 
Evolution of Client Services functions
Evolution of Client Services functionsEvolution of Client Services functions
Evolution of Client Services functionsAmbareesh Kulkarni
 
Packaged Dashboard Reporting Solution
Packaged Dashboard Reporting Solution Packaged Dashboard Reporting Solution
Packaged Dashboard Reporting Solution Ambareesh Kulkarni
 
Actuate Certified Business Solutions for SAP
Actuate Certified Business Solutions for SAPActuate Certified Business Solutions for SAP
Actuate Certified Business Solutions for SAPAmbareesh Kulkarni
 
Professional Services Project Delivery Methodology
Professional Services Project Delivery MethodologyProfessional Services Project Delivery Methodology
Professional Services Project Delivery MethodologyAmbareesh Kulkarni
 
Actuate BI implementation for MassMutual's SAP BW
Actuate BI implementation for MassMutual's SAP BW Actuate BI implementation for MassMutual's SAP BW
Actuate BI implementation for MassMutual's SAP BW Ambareesh Kulkarni
 
Professional Services packaged solutions for SAP
Professional Services packaged solutions for SAPProfessional Services packaged solutions for SAP
Professional Services packaged solutions for SAPAmbareesh Kulkarni
 
Zero Touch Operating Systems Deployment
Zero Touch Operating Systems DeploymentZero Touch Operating Systems Deployment
Zero Touch Operating Systems DeploymentAmbareesh Kulkarni
 
Ambareesh Kulkarni, Professional background
Ambareesh Kulkarni, Professional backgroundAmbareesh Kulkarni, Professional background
Ambareesh Kulkarni, Professional backgroundAmbareesh Kulkarni
 
Professional Services Roadmap 2011 and beyond
Professional Services Roadmap 2011 and beyondProfessional Services Roadmap 2011 and beyond
Professional Services Roadmap 2011 and beyondAmbareesh Kulkarni
 
Professional Services Automation
Professional Services AutomationProfessional Services Automation
Professional Services AutomationAmbareesh Kulkarni
 
Storage Provisioning for Enterprise Information Applications
Storage Provisioning for Enterprise Information ApplicationsStorage Provisioning for Enterprise Information Applications
Storage Provisioning for Enterprise Information ApplicationsAmbareesh Kulkarni
 
Professional Services Sales Techniques & Methodology
Professional Services Sales Techniques & MethodologyProfessional Services Sales Techniques & Methodology
Professional Services Sales Techniques & MethodologyAmbareesh Kulkarni
 

Mais de Ambareesh Kulkarni (20)

Travel Management Dashboard application
Travel Management Dashboard applicationTravel Management Dashboard application
Travel Management Dashboard application
 
Carlson Wagonlit: Award winning application
Carlson Wagonlit: Award winning applicationCarlson Wagonlit: Award winning application
Carlson Wagonlit: Award winning application
 
Analyze Optimize Realize - Business Value Analysis
Analyze Optimize Realize - Business Value AnalysisAnalyze Optimize Realize - Business Value Analysis
Analyze Optimize Realize - Business Value Analysis
 
Evolution of Client Services functions
Evolution of Client Services functionsEvolution of Client Services functions
Evolution of Client Services functions
 
Building the Digital Bank
Building the Digital BankBuilding the Digital Bank
Building the Digital Bank
 
Packaged Dashboard Reporting Solution
Packaged Dashboard Reporting Solution Packaged Dashboard Reporting Solution
Packaged Dashboard Reporting Solution
 
Actuate Certified Business Solutions for SAP
Actuate Certified Business Solutions for SAPActuate Certified Business Solutions for SAP
Actuate Certified Business Solutions for SAP
 
Professional Services Project Delivery Methodology
Professional Services Project Delivery MethodologyProfessional Services Project Delivery Methodology
Professional Services Project Delivery Methodology
 
Windows 10 Migration
Windows 10 MigrationWindows 10 Migration
Windows 10 Migration
 
Actuate BI implementation for MassMutual's SAP BW
Actuate BI implementation for MassMutual's SAP BW Actuate BI implementation for MassMutual's SAP BW
Actuate BI implementation for MassMutual's SAP BW
 
Professional Services packaged solutions for SAP
Professional Services packaged solutions for SAPProfessional Services packaged solutions for SAP
Professional Services packaged solutions for SAP
 
SAP R3 SQL Query Builder
SAP R3 SQL Query BuilderSAP R3 SQL Query Builder
SAP R3 SQL Query Builder
 
Zero Touch Operating Systems Deployment
Zero Touch Operating Systems DeploymentZero Touch Operating Systems Deployment
Zero Touch Operating Systems Deployment
 
Ambareesh Kulkarni, Professional background
Ambareesh Kulkarni, Professional backgroundAmbareesh Kulkarni, Professional background
Ambareesh Kulkarni, Professional background
 
Professional Services Roadmap 2011 and beyond
Professional Services Roadmap 2011 and beyondProfessional Services Roadmap 2011 and beyond
Professional Services Roadmap 2011 and beyond
 
1E and Servicenow integration
1E and Servicenow integration1E and Servicenow integration
1E and Servicenow integration
 
Enterprise BI & SOA
Enterprise BI & SOAEnterprise BI & SOA
Enterprise BI & SOA
 
Professional Services Automation
Professional Services AutomationProfessional Services Automation
Professional Services Automation
 
Storage Provisioning for Enterprise Information Applications
Storage Provisioning for Enterprise Information ApplicationsStorage Provisioning for Enterprise Information Applications
Storage Provisioning for Enterprise Information Applications
 
Professional Services Sales Techniques & Methodology
Professional Services Sales Techniques & MethodologyProfessional Services Sales Techniques & Methodology
Professional Services Sales Techniques & Methodology
 

Último

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 

Último (20)

Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 

Enterprise Security & SSO

  • 1. Actuate Security Enterprise class, Standards based, Robust and Flexible Ambareesh Kulkarni, Director 1 © Actuate Corporation 2008
  • 2. Anatomy of an Actuate Application ` ` ` FW1 FW2 FW3 Application Web Server Server farm Actuate iServer Actuate Farm running Active nodes Encycl. Portal 2 © Actuate Corporation 2008
  • 3. Features of Actuate Security AuthN & AuthZ • Authentication -Verify if users are who they claim to be • Authorization -Users can only access what the security policy allows • Role-based access control -Grant access based on the user’s role in the organization • Data privacy -Data integrity & reliability • User Registration -External and Internal • Audit information -Usage and exceptions • Transport Security -Secure delivery of information 3 © Actuate Corporation 2008
  • 4. Features of Actuate Security AuthN & AuthZ • Non-repudiation on actions -Important user actions carry proof of execution to prevent denial • Session security -User sessions are uniquely identifiable and not subject to masquerading • Session time-out -Session inactivity leads to session termination • Audit logs -All actions are logged for audit use. • Single sign-on -Usage of multiple systems or services does not require additional credentials. 4 © Actuate Corporation 2008
  • 5. Features of Actuate Security AuthN & AuthZ • Robust authentication & authorization capabilities • Supports both Internal and External Authentication • Can use a combination of UserID/Password for authentication • Optionally: • trust credentials passed to it • Extract Userid and/or password from encrypted artifacts such as (e.g. token, logon ticket etc.) • Granular authorization • Fast and easy mapping of business rules to authorization policy • Course, medium and fine-grained authorization • An open, interoperable Java-based architecture with data source flexibility • Plug-n-play integration with Web, application and directory services • Supports LDAP, RDBMS and any custom data sources 5 © Actuate Corporation 2008
  • 6. External User Registration and Authentication process flow Business Process 2 Workflow 1 3  Automated Access Approval End Portal Server Users 5 Data Store 4 6 Data Repository Actuate 8 Authentication/Revalidation 7 Services 9 Actuate 6 © Actuate Corporation 2008
  • 7. Authorization Controls What can you protect?? • Server Controls • Resource – Universal Resource Indicator… • Applications – group of resources… • Dynamic Content – EJB’s, JSP’s, Servlets… • Method-level Protection – Access, Get, Post • Wild-Card Control – *, /*/, *.* 7 © Actuate Corporation 2008
  • 8. Authorization & Privilege Management Levels Limits access at the URL Coarse-grained level to protect machines Coarse and their contents Provides conditional Medium-grained access to Actuate Folders and files based on access control lists and user roles Controls what data users Fine Fine-grained see once they have access to the report (Page Level Security) 8 © Actuate Corporation 2008
  • 9. Usage Logging What have you accessed? • Provides records required to meet security policy and compliance requirements Usage logging • Helps pinpoint problem areas against policies • Captures “contextual” Actuate usage log information for better captures ALL diagnosing issues User Activity 9 © Actuate Corporation 2008
  • 10. Actuate Security Scalable and Flexible Key Server Dispatcher Enforcement (Agent or Proxy) End Users Authentication Authorization Engine Actuate iServer Centralized Logging Engine Browser-based Web/App Administration Server Entitlements Engine 10 © Actuate Corporation 2008
  • 11. Security Extensions iPortal Security Extension (iPSE) • For Single Sign-on Report Server Security Extension (RSSE) • For any external data store including LDAP & Microsoft Active Directory integration 11 © Actuate Corporation 2008
  • 12. Single Cluster supports diverse and disparate security systems • Actuate integrates with all major security systems and services providers • RSA, Netegrity, Kerberos, SAP, Tivoli, BMC, SAML, etc. • Leverages investments in enterprise security models • Centralizes the administration of common user information • Supports multiple authentication and authorization sources from a single iServer cluster 12 © Actuate Corporation 2008
  • 13. Java RSSE Architecture Interface Implementation (Published by Actuate) iServer Endpoint HTTP request RSSE Endpoint DB Access API Java Interface SOAP 3rd party database HTTP response (e.g. LDAP) iServer RSSE Service 13 © Actuate Corporation 2008
  • 14. Transport Security Web Tier J2EE Server Farm(e.g. WebSphere) Report Server Farm SSl Encrypted Web Browser session Internal traffic SOAP/http Optionally Encrypted using Stunnel or IPSEC ` ` ` FW1 FW2 FW3 Application Web Server Server farm Actuate iServer Actuate Farm running Active nodes Encycl. Portal 14 © Actuate Corporation 2008
  • 15. Microsoft IIS Web Tier Integration • Reverse HTTP Proxy – using AJP plug-in • Supports IIS forwarding requests to iPortal • AJP plug-in configured with Microsoft IIS Microsoft IIS Oracle Actuate Oracle Containers for AJP 13 HTTP Containers for or iServer Cluster J2EE AJP connector Server J2EE iServer Express 15 © Actuate Corporation 2008
  • 16. How It Works: ASP.net Forms Authentication & SSO with Actuate Active Directory 1 Microsoft IIS /ASP.NET 2 RSSE 4 8 3 4. App authentication 5 6 Actuate Oracle Oracle 7 HTTP Containers for AJP connector Server Containers for or iServer Cluster J2EE J2EE iServer Express 1. GET default.aspx HTTP/1.1 7. Submit Actuate URL from ASP page 2. 302 Redirect Location: login.aspx 8. Report Server Security Extension provides external authentication 3. POST default.aspx HTTP/1.1 & registration services <form data containing credentials> 5. 200 OK Set-Cookie: .ASPXAUTH Auth Ticket 6. GET default.aspx HTTP/1.1 16 Cookie: .ASPXAUTH Auth Ticket © Actuate Corporation 2008
  • 17. Seamless Access to Actuate 17 © Actuate Corporation 2008
  • 18. Seamless Access to Actuate 18 © Actuate Corporation 2008