SlideShare uma empresa Scribd logo
1 de 8
Cloud Collaboration & Communication XPG Collaboration Guus Disselkoen
Google Apps: Overview Google Apps Engine Applications Atos Origin developed in Java 3 rd  party BPM (Cordys) Project Management … Secure Data Connector
Secure Data Connector Acces your corporate data in the browser SDC Lets you access your data from within Google Gadgets, Google App Engine and Google Spreadsheets. SDC provides an agent to connect your Google Apps domain to your behind-the-firewall data sources. Control the use of your data SDC lets you restrict which users and applications can make requests to your internal services. You can use Google Partners or your own internal authentication systems to validate and authorize those requests. Build custom apps for your business SDC lets you extend your enterprise systems into Google Apps. You can easily build gadgets or Google Apps Engine applications that make use of both private and public data Connect data from behind your firewall to Google Apps http://code.google.com/intl/nl/securedataconnector/docs/1.0/overview.html
SDC Architectuur Google Apps forwards authorized data requests from users who are within the Google Apps domain to the Google tunnel protocol servers. The service validates the signed request, checks the credentials, and if the user is authorized, returns the data. The tunnel servers validate that a user is authorized to make the request to the specified resource. Google tunnel servers are connected by an encrypted tunnel to SDC, which runs within a company's internal network. The tunnel protocol allows SDC to connect to a Google tunnel server, authenticate, and encrypt the data that flows across the Internet. SDC uses resource rules to validate if a user is authorized to make a request to a specified resource. An optional intranet firewall can be used to provide extra network security.  SDC performs a network request to the specified resource or services.
Demo http://code.google.com/intl/nl/securedataconnector/docs/1.0/tutorials/spreadsheets.html
Another Demo http://code.google.com/intl/nl/securedataconnector/docs/1.0/tutorials/visualizations.html
 
Google Apps Engine ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Demystifying OAuth 2.0
Demystifying OAuth 2.0Demystifying OAuth 2.0
Demystifying OAuth 2.0
 
8 Steps to Start Blockchain Development and Get Ready Your App
8 Steps to Start Blockchain Development and Get Ready Your App8 Steps to Start Blockchain Development and Get Ready Your App
8 Steps to Start Blockchain Development and Get Ready Your App
 
Technology Focus before investing on Multiscreen content delivery
Technology Focus before investing on Multiscreen content deliveryTechnology Focus before investing on Multiscreen content delivery
Technology Focus before investing on Multiscreen content delivery
 
OAuth2 Protocol with Grails Spring Security
OAuth2 Protocol with Grails Spring SecurityOAuth2 Protocol with Grails Spring Security
OAuth2 Protocol with Grails Spring Security
 
e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)e-SUAP - Security - Windows azure access control list (english version)
e-SUAP - Security - Windows azure access control list (english version)
 
Security
SecuritySecurity
Security
 
Building systems with rest
Building systems with restBuilding systems with rest
Building systems with rest
 
Introduction to OAuth2.0
Introduction to OAuth2.0Introduction to OAuth2.0
Introduction to OAuth2.0
 
Dynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud dataDynamic and public auditing with fair arbitration for cloud data
Dynamic and public auditing with fair arbitration for cloud data
 
OAuth2 primer
OAuth2 primerOAuth2 primer
OAuth2 primer
 
FIWARE Complex Event Processing
FIWARE Complex Event ProcessingFIWARE Complex Event Processing
FIWARE Complex Event Processing
 
AAA server
AAA serverAAA server
AAA server
 
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
FI-WARE OAUTH-XACML-based API Access Control - Overview (Part 1)
 
Gravitee.io
Gravitee.ioGravitee.io
Gravitee.io
 
Blockchain for healthcare 2018
Blockchain for healthcare 2018Blockchain for healthcare 2018
Blockchain for healthcare 2018
 
Silicon Valley Code Camp 2009: OAuth: What, Why and How
Silicon Valley Code Camp 2009: OAuth: What, Why and HowSilicon Valley Code Camp 2009: OAuth: What, Why and How
Silicon Valley Code Camp 2009: OAuth: What, Why and How
 
Managing enterprise applications, permissions, and consent in Azure Active Di...
Managing enterprise applications, permissions, and consent in Azure Active Di...Managing enterprise applications, permissions, and consent in Azure Active Di...
Managing enterprise applications, permissions, and consent in Azure Active Di...
 
On the security of a public auditing mechanism for shared cloud data service
On the security of a public auditing mechanism for shared cloud data serviceOn the security of a public auditing mechanism for shared cloud data service
On the security of a public auditing mechanism for shared cloud data service
 
A A A
A A AA A A
A A A
 
APIdays Zurich 2019 - Blockchain APIs for the enterprise Stefano Tempesta
APIdays Zurich 2019 - Blockchain APIs for the enterprise Stefano TempestaAPIdays Zurich 2019 - Blockchain APIs for the enterprise Stefano Tempesta
APIdays Zurich 2019 - Blockchain APIs for the enterprise Stefano Tempesta
 

Destaque

Destaque (9)

Omni Find Bij Uz Gent
Omni Find Bij Uz GentOmni Find Bij Uz Gent
Omni Find Bij Uz Gent
 
2010 5 xpg collaboration
2010 5 xpg collaboration2010 5 xpg collaboration
2010 5 xpg collaboration
 
Workplace Services Express
Workplace Services ExpressWorkplace Services Express
Workplace Services Express
 
2010 3 Xpg Collaboration
2010 3 Xpg Collaboration2010 3 Xpg Collaboration
2010 3 Xpg Collaboration
 
Atos Origin
Atos OriginAtos Origin
Atos Origin
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Migratie exchange google apps
Migratie exchange google appsMigratie exchange google apps
Migratie exchange google apps
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 
Hype vs. Reality: The AI Explainer
Hype vs. Reality: The AI ExplainerHype vs. Reality: The AI Explainer
Hype vs. Reality: The AI Explainer
 

Semelhante a Google Apps Secure Data Connector

Azure from scratch part 2 By Girish Kalamati
Azure from scratch part 2 By Girish KalamatiAzure from scratch part 2 By Girish Kalamati
Azure from scratch part 2 By Girish Kalamati
Girish Kalamati
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
uberbaum
 
1. Google Cloud Platform Load BalancingIntroductionGoog.docx
1. Google Cloud Platform Load BalancingIntroductionGoog.docx1. Google Cloud Platform Load BalancingIntroductionGoog.docx
1. Google Cloud Platform Load BalancingIntroductionGoog.docx
blondellchancy
 
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and IntegrationsCloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
paulfallon
 
Windows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPWindows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIP
Paulo Freitas
 

Semelhante a Google Apps Secure Data Connector (20)

AZ-204 A Top-Notch Exam Of Developing Solutions for Microsoft Azure.pdf
AZ-204 A Top-Notch Exam Of Developing Solutions for Microsoft Azure.pdfAZ-204 A Top-Notch Exam Of Developing Solutions for Microsoft Azure.pdf
AZ-204 A Top-Notch Exam Of Developing Solutions for Microsoft Azure.pdf
 
Azure from scratch part 2 By Girish Kalamati
Azure from scratch part 2 By Girish KalamatiAzure from scratch part 2 By Girish Kalamati
Azure from scratch part 2 By Girish Kalamati
 
GCCP Session.pptx
GCCP Session.pptxGCCP Session.pptx
GCCP Session.pptx
 
What's new in Azure Active Directory and what's coming new ?
What's new in Azure Active Directory and what's coming new ?What's new in Azure Active Directory and what's coming new ?
What's new in Azure Active Directory and what's coming new ?
 
JAM23-24_ppt.pptx
JAM23-24_ppt.pptxJAM23-24_ppt.pptx
JAM23-24_ppt.pptx
 
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVEDEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
DEVELOPING APPLICATION FOR CLOUD – A PROGRAMMER’S PERSPECTIVE
 
Google Cloud Platform (GCP) At a Glance
Google Cloud Platform (GCP)  At a GlanceGoogle Cloud Platform (GCP)  At a Glance
Google Cloud Platform (GCP) At a Glance
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
 
GCCP-Session 2
GCCP-Session 2GCCP-Session 2
GCCP-Session 2
 
1. Google Cloud Platform Load BalancingIntroductionGoog.docx
1. Google Cloud Platform Load BalancingIntroductionGoog.docx1. Google Cloud Platform Load BalancingIntroductionGoog.docx
1. Google Cloud Platform Load BalancingIntroductionGoog.docx
 
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and IntegrationsCloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
Cloud Circle Talk - Enterprise Architecture, Cloud Computing and Integrations
 
Windows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIPWindows Server 2012 R2 Jump Start - AIP
Windows Server 2012 R2 Jump Start - AIP
 
GCCP Session 2.pptx
GCCP Session 2.pptxGCCP Session 2.pptx
GCCP Session 2.pptx
 
GDSC Study Jam Session 1
GDSC Study Jam Session 1GDSC Study Jam Session 1
GDSC Study Jam Session 1
 
Data & Analytics ReInvent Recap [AWS Basel Meetup - Jan 2023].pdf
Data & Analytics ReInvent Recap [AWS Basel Meetup - Jan 2023].pdfData & Analytics ReInvent Recap [AWS Basel Meetup - Jan 2023].pdf
Data & Analytics ReInvent Recap [AWS Basel Meetup - Jan 2023].pdf
 
Data Governance
Data GovernanceData Governance
Data Governance
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
2022 Update Google Professional Cloud Security Engineer Exam Questions
2022 Update Google Professional Cloud Security Engineer Exam Questions2022 Update Google Professional Cloud Security Engineer Exam Questions
2022 Update Google Professional Cloud Security Engineer Exam Questions
 
services offered by Google Cloud Platform.pdf
services offered by  Google Cloud Platform.pdfservices offered by  Google Cloud Platform.pdf
services offered by Google Cloud Platform.pdf
 
Identity and o365 on Azure
Identity and o365 on AzureIdentity and o365 on Azure
Identity and o365 on Azure
 

Último

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
FIDO Alliance
 

Último (20)

TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider  Progress from Awareness to Implementation.pptxTales from a Passkey Provider  Progress from Awareness to Implementation.pptx
Tales from a Passkey Provider Progress from Awareness to Implementation.pptx
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Intro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptxIntro to Passkeys and the State of Passwordless.pptx
Intro to Passkeys and the State of Passwordless.pptx
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024WebRTC and SIP not just audio and video @ OpenSIPS 2024
WebRTC and SIP not just audio and video @ OpenSIPS 2024
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 

Google Apps Secure Data Connector

  • 1. Cloud Collaboration & Communication XPG Collaboration Guus Disselkoen
  • 2. Google Apps: Overview Google Apps Engine Applications Atos Origin developed in Java 3 rd party BPM (Cordys) Project Management … Secure Data Connector
  • 3. Secure Data Connector Acces your corporate data in the browser SDC Lets you access your data from within Google Gadgets, Google App Engine and Google Spreadsheets. SDC provides an agent to connect your Google Apps domain to your behind-the-firewall data sources. Control the use of your data SDC lets you restrict which users and applications can make requests to your internal services. You can use Google Partners or your own internal authentication systems to validate and authorize those requests. Build custom apps for your business SDC lets you extend your enterprise systems into Google Apps. You can easily build gadgets or Google Apps Engine applications that make use of both private and public data Connect data from behind your firewall to Google Apps http://code.google.com/intl/nl/securedataconnector/docs/1.0/overview.html
  • 4. SDC Architectuur Google Apps forwards authorized data requests from users who are within the Google Apps domain to the Google tunnel protocol servers. The service validates the signed request, checks the credentials, and if the user is authorized, returns the data. The tunnel servers validate that a user is authorized to make the request to the specified resource. Google tunnel servers are connected by an encrypted tunnel to SDC, which runs within a company's internal network. The tunnel protocol allows SDC to connect to a Google tunnel server, authenticate, and encrypt the data that flows across the Internet. SDC uses resource rules to validate if a user is authorized to make a request to a specified resource. An optional intranet firewall can be used to provide extra network security. SDC performs a network request to the specified resource or services.
  • 7.  
  • 8.

Notas do Editor

  1. Java (JRE 6 with limitations, standard APIs like JDO, JPA, JavaMail) Python (2.5.2, standard library)