Web Services Enhancements Webinar 2/23 & 2/26. Agenda AE Application Server/Service Enhancements MS SQL Browser Application Security –Errors many vendors.

Slides:



Advertisements
Similar presentations
Overview of the technology that comprises Attendance Enterprise.
Advertisements

Database Security and Auditing: Protecting Data Integrity and Accessibility Chapter 5 Database Application Security Models.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 1: Introduction to Windows Server 2003.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW  Create and manage file system shares and work.
Chapter 5 Database Application Security Models
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 8 Introduction to Printers in a Windows Server 2008 Network.
Securing Enterprise Applications Rich Cole. Agenda Sample Enterprise Architecture Sample Enterprise Architecture Example of how University Apps uses Defense.
Thin Client vs. Desktop Advantages and Disadvantages of Operating System Environments.
Managing LOB Applications by Using System Center Operations Manager Published: March 2007.
A Technical Overview of Microsoft SQL Server 2005 Melville Thomson IT Pro Evangelist (UK)
Tutorial -01. Objective In this session we will discuss about : 1.What is MVC? 2.Why MVC? 3.Advantages of MVC over ASP.NET 4.ASP.NET development models.
11 SHARING FILE SYSTEM RESOURCES Chapter 9. Chapter 9: SHARING FILE SYSTEM RESOURCES2 CHAPTER OVERVIEW Create and manage file system shares and work with.
May 30 th – 31 st, 2006 Sheraton Ottawa. Microsoft Certificate Lifecycle Manager Saleem Kanji Technology Solutions Professional - Windows Server Microsoft.
Hands-On Microsoft Windows Server 2008 Chapter 1 Introduction to Windows Server 2008.
Product Evaluation ADP E-Time Enterprise Kronos Workforce Central.
PI Data Access via OLE DB/SQL
1998 PI System Users’ Conference PI on the Web: A Primer for PI Users Omicron Consulting 1998 PI System Users’ Conference.
CIS 375—Web App Dev II Microsoft’s.NET. 2 Introduction to.NET Steve Ballmer (January 2000): Steve Ballmer "Delivering an Internet-based platform of Next.
Microsoft Internet Information Services 5.0 (IIS) By: Edik Magardomyan Fozi Abdurhman Bassem Albaiady Vince Serobyan.
9 Chapter Nine Compiled Web Server Programs. 9 Chapter Objectives Learn about Common Gateway Interface (CGI) Create CGI programs that generate dynamic.
Database Application Security Models Database Application Security Models 1.
PI ICE and Web Applications – Gregg Le Blanc PI ICE Gregg Le Blanc PI System Product Manager.
Pulse of the Market Today… One source for everything Don’t want to play the finger pointing game All systems integrated together Best of Breed Why? They.
Attendance Enterprise Capabilities Required by Information Technology.
DEV-5: Introduction to WebSpeed ® Stephen Ferguson Sr. Training Program Manager.
Health South Network Demonstration of Attendance Enterprise.
ABC Manufacturing Demonstration of Attendance Enterprise.
Introduction to ADO Y.-H. Chen International College Ming-Chuan University Fall, 2004.
DC440: Security (Part 2 of 2): Logons, permissions and views - how these systems work and how to manage them Pradeep GanapathyRaj Program Manager Project.
MS IIS Overview and Installation Issues Bing Shi June 3, 2000 COSC 573 Paper presentation.
PS Security By Deviprasad. Agenda Components of PS Security Security Model User Profiles Roles Permission List. Dynamic Roles Static Roles Building Roles/Rules.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
Efficient Deployment & Management of ASP.NET 2.0 Applications on IIS 6.0 Alexis Eller Program Manager Internet Information Services Microsoft Corporation.
ASP.NET The Clock Project. The ASP.NET Clock Project The ASP.NET Clock Project is the topic of Chapter 23. By completing the clock project, you will learn.
What is database?  Any Method for access info into Application from DataBase?  ODBC is standard for Accessing Data.  Problem with ODBC:  Information.
Hands-On Microsoft Windows Server Implementing Microsoft Internet Information Services Microsoft Internet Information Services (IIS) –Software included.
CRM in Education: Raising Standards. Saving Time. Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
1 Chapter Overview Planning to Install SQL Server 2000 Deciding SQL Server 2000 Setup Configuration Options Running the SQL Server 2000 Setup Program Using.
Web Access. Overview  Purpose  Prerequisites  Install Components  Enable Virtual Directories  IIS Configuration & Security  Troubleshooting.
SharePoint in the Education Space Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
Module 5 : Security I Jong S. Bok
Creating and Managing Digital Certificates Chapter Eleven.
1 Chapter Overview What is Microsoft SQL Server 2000? What are the SQL Server 2000 Components? What is the Relational Database Architecture? What is the.
Comprehensive Project Management Solutions with the.NET Server family.
(ITI310) By Eng. BASSEM ALSAID SESSIONS 10: Internet Information Services (IIS)
Using Java, XML and XSLT to create secure internal access to local NOAA Research Science project and budget information Jason E. Fabritz, NOAA/PMEL-JISAO/UW.
Spaso Lazarević Microsoft MVP Nova banka ad Banja Luka Building business application using Visual Studio 2013 LightSwitch.
Active Server Pages v.s. Java Server Pages Presenters: Lan Guo Qunying Fan Pei-Xun Wu Date:
ASP.NET 2.0 Mohammed Abdelhadi Developer.NET Evangelist Microsoft Corporation.
70-293: MCSE Guide to Planning a Microsoft Windows Server 2003 Network, Enhanced Chapter 1: Overview of Planning A Windows Server 2003 Network.
Microsoft BackOffice Applications
Database Systems: Design, Implementation, and Management Tenth Edition
>> Introduction to Web Applications
The Client/Server Database Environment
Introduction to SQL Server 2000 Security
Introduction and Technology of the Attendance Enterprise Suite
Application Deployment
Web App vs Mobile App.
"Uberize" Your Remote Equipment
Database Management System (DBMS)
Web Development Using ASP .NET
Oracle Architecture Overview
Goals Introduce the Windows Server 2003 family of operating systems
IS 4506 Server Configuration (HTTP Server)
Configuring Internet-related services
ASP.NET Module Subtitle.
ONLINE SECURE DATA SERVICE
IIS and .NET Security Application Pools Pamella Smith June 18, 2009.
Presentation transcript:

Web Services Enhancements Webinar 2/23 & 2/26

Agenda AE Application Server/Service Enhancements MS SQL Browser Application Security –Errors many vendors make Controlling ESS Access via IIS

AE Service Components Service Components –AutoTask Running reports, tasks, communications –Background Processes Data processes Timecard calculations –Communication Server Real-Time data collection

Existing Server Layout IIS Servers SQL ServersApplication Server AutoTask Running reports, tasks, communications –Background Processes Data processes Timecard calculations –Communication Server Real-Time data collection

Distributed Processing AutoTask - Running reports, Tasks, Communications Background Processes - Data processes, Timecard calculations Communication Server - Real-Time data collection

Enhanced Server Layout IIS Servers SQL ServersApplication Servers AutoTask Server Communication Server Background Processing Server

Advantages Ultimate in scalability Lower total cost of ownership 100% redundancy = 24/7

MS SQL Security Microsoft Security Holes –Browser app written in.asp Default.ASP page Contains authentication – Connectivity Information ASP is not encrypted Low Isolation NOTE: ASP can utilize obfuscated secrets

ASP Pages

What is Low Isolation? IIS Service / Process ASP Pages ISAPI, DLL’s & ADO MS SQL Server Web Server Low Medium High

Advantages of High Isolation If Server fails, service isn’t affected If Service (AeWebLoader) fails, Server doesn’t shutdown Further removed from IIS process = more security Note: High Isolation does slow down service a little

Controlling ESS Access Internet Information Services

Directory Security

Deny / Grant IP or PC

Summary Distributed Application Server –Ultimate in Scalability –Only supported in Enterprise Edition Microsoft secure development strategy –ISAPI vs. ASP (typical) Securing ESS accessibility