Linux Password Vault by Ali Can Oğul. Codefellas2 Developer: Ali Can Oğul Sponsor: Özgür Yazılım A. Ş.

Slides:



Advertisements
Similar presentations
Implementing Tableau Server in an Enterprise Environment
Advertisements

Omni eControl. New Features in Version 2.x - Manage Mixed Networks: eDirectory, Active Directory, GroupWise, Exchange eControl Version 2.0 New Features.
Chapter 20 Oracle Secure Backup.
15.1 © 2004 Pearson Education, Inc. Exam Managing and Maintaining a Microsoft® Windows® Server 2003 Environment Lesson 15: Configuring a Windows.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
Introduction to MySQL Administration.  Server startup and shutdown ◦ How to manually start and stop it from the command line ◦ How to arrange an automated.
Software Frameworks for Acquisition and Control European PhD – 2009 Horácio Fernandes.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
Introduction To Windows NT ® Server And Internet Information Server.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Discovering SQL all rights reserved (c) 2010 agilitator.com INSTALLING MySQL 5.1 Community Server.
SSL From Your Smartphone Support for Android Smartphones /
Amazon EC2 Quick Start adapted from EC2_GetStarted.html.
Designing Security In Web Applications Andrew Tomkowiak 10/8/2013 UW-Platteville Software Engineering Department
ERP – Enterprise Resource Planning ERP integrates management of business as a whole. Types: –SAP –BAAN –JD EDWARDS –ORACLE FINANCIALS –SIEBEL –PEOPLESOFT.
Security SIG August 19, 2010 Justin C. Klein Keane
TOPIC 1 – SERVER SIDE APPLICATIONS IFS 234 – SERVER SIDE APPLICATION DEVELOPMENT.
(ITI310) SESSIONS : Active Directory By Eng. BASSEM ALSAID.
Introduction to SQL Server 2000 Security Dave Watts CTO, Fig Leaf Software
True or False? Programming languages can be used to update databases and communicate with other systems. True.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
70-411: Administering Windows Server 2012
Database Application Security Models Database Application Security Models 1.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
© 2001 by Carnegie Mellon University SS5 -1 OCTAVE SM Process 5 Background on Vulnerability Evaluations Software Engineering Institute Carnegie Mellon.
Dale Smith COSC 4010 Computer Security Authentication & Security in the.NET environment.
Database Architectures Database System Architectures Considerations – Data storage: Where do the data and DBMS reside? – Processing: Where.
Windows 2000 Server Active Directory Groups User Accounts Frank Schneemann.
VirtuaGrades A Web-Based Gradebook Application Don Tinsley CS 470 Project.
Secure Systems Research Group - FAU SW Development methodology using patterns and model checking 8/13/2009 Maha B Abbey PhD Candidate.
© FPT SOFTWARE – TRAINING MATERIAL – Internal use 04e-BM/NS/HDCV/FSOFT v2/3 The SqlConnection Object ADO.NET - Lesson 02  Training time: 10 minutes 
Core 3: Communication Systems. Network software includes the Network Operating Software (NOS) and also network based applications such as those running.
National Computational Science National Center for Supercomputing Applications National Computational Science GSI Online Credential Retrieval Requirements.
User Manager Pro Suite continued… All-in-One Security, Management & Reporting.
1 AHM -2-4 Sept 2003 e-Science Centre Running SRB Ananta Manandhar.
WEB SERVER SOFTWARE FEATURE SETS
Security SIG August 19, 2010 Justin C. Klein Keane
® IBM Software Group ©IBM Corporation IBM Information Server Architecture Overview.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
The Hierarchical Trust Model. PGP Certificate Server details Fast, efficient key repository –LDAP, HTTP interfaces Secure remote administration –“Pending”
Copyright 2007, Information Builders. Slide 1 iWay Web Services and WebFOCUS Consumption Michael Florkowski Information Builders.
Active Directory Domain Services (AD DS). Identity and Access (IDA) – An IDA infrastructure should: Store information about users, groups, computers and.
IT 5433 LM1. Learning Objectives Understand key terms in database Explain file processing systems List parts of a database environment Explain types of.
Encryption and Security Tools for IA Management Nick Hornick COSC 481 Spring 2007.
DBMS Programs MS SQL Server & MySQL
Windows interoperability with Unix/Linux
Manuel Brugnoli, Elisa Heymann UAB
What are they? The Package Repository Client is a set of Tcl scripts that are capable of locating, downloading, and installing packages for both Tcl and.
Chapter 5 : Designing Windows Server-Level Security Processes
Chapter 5 Linux Services
Server Concepts Dr. Charles W. Kann.
Sarang Nazari California State University, Los Angeles
Introduction to SQL Server 2000 Security
SUBMITTED BY: NAIMISHYA ATRI(7TH SEM) IT BRANCH
THE STEPS TO MANAGE THE GRID
How to Check if a site's connection is secure ?
Web-based Console for Controlling a Wireless Sensor Network (WeConWSN)
A Web-based Integrated Console for Controlling a Set of Networks
Goals Introduce the Windows Server 2003 family of operating systems
Proposal Presentation
Web Servers / Deployment
Linux and TCP/IP Networking
Encrypted Database Final Presentation
Unit 8 Network Security.
IBM Tivoli Storage Manager
INTRODUCTION A Database system is basically a computer based record keeping system. The collection of data, usually referred to as the database, contains.
We Need To Talk Security
Presentation transcript:

Linux Password Vault by Ali Can Oğul

Codefellas2 Developer: Ali Can Oğul Sponsor: Özgür Yazılım A. Ş.

Linux Password Vault This project aims to create a corporate password repository where all corporate passwords can be stored securely, accessed by the authorized personnel only on a need-to-know basis.

Linux Password Vault The project consists of two main components: Server and Client. The server is a service daemon running in the background on a Unix/Linux system. The client will be a console based application which connects to the server and serves as a command line interface. The client is always in communication with server.

Linux Password Vault Linux Password Vault also uses a database management system to store corporate passwords as well as user credentials. It supports multiple users and groups It supports limiting access to configured user / password group pairs Passwords are encrypted for storage and while retrieving them they get decrypted.

Linux Password Vault Uses PGP for encryption. Uses SSL certification for authorization.

Linux Password Vault Lets administrators to manage individual accounts Passwords are encrypted and safe regardless of the users schema Multiple level access layers provide multiple level security layers

Difference Between Other Similar Products There are no public domain software projects providing this functionality. Most free software password managers run on a single-user environment. Most of the softwares don't provide a Linux console client, which is the primary work environment of Linux system administrators over slow connections

Technologies That Are Used Programming Language: Ruby Database Management System: MySQL Encryption: PGP Certification: SSL

Thank You!