Bring the Umbrella system into production

Slides:



Advertisements
Similar presentations
3SKey 3SKey.
Advertisements

Dynamic Task Assignment Load Index for Geographically Distributed Web Services PhD Research Proposal By: Dhiah Al-Shammary Supervised.
SINGLE SIGN-ON. Definition - SSO Single sign-on (SSO) is a session/user authentication process that permits a user to enter one name and password in order.
ITIL: Service Transition
Adding scalability to legacy PHP web applications Overview Mario A. Valdez-Ramirez.
Submitted by- Mr. Avinash Sadaphule 20 November 2009 Management Trainee, MKCL.
Copyright 2007, Information Builders. Slide 1 Workload Distribution for the Enterprise Mark Nesson, Vashti Ragoonath June, 2008.
Welcome to the Deep Dive into DocuSign Certification Seminar If you would like to ask questions during this session, please: 1.Call into the conference.
May 22, 2002 Joint Operations Group Discussion Overview Describe the UC Davis Security Architecture Describe Authentication Efforts at UC Davis Current.
Definition of terms Definition of terms Explain business conditions driving distributed databases Explain business conditions driving distributed databases.
Database System Development Lifecycle Transparencies
Software System Integration
Source One Network Solutions with Corporate Headquarters based in Fitchburg, Wisconsin specializes in providing multi- location clients, with nationwide.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Basic Concepts of Computer Networks
Microsoft ® Official Course Module 12 Monitoring, Managing, and Recovering AD DS.
Module 1 Introduction to Managing Microsoft® Windows Server® 2008 Environment.
Module 10: Designing an AD RMS Infrastructure in Windows Server 2008.
Abstract Load balancing in the cloud computing environment has an important impact on the performance. Good load balancing makes cloud computing more.
Web Development Process Description
Chapter 9 Database Planning, Design, and Administration Sungchul Hong.
Samuvel Johnson nd MCA B. Contents  Introduction to Real-time systems  Two main types of system  Testing real-time software  Difficulties.
The GPAA RFP to implement Enterprise Data Management 1 GPAA15/2015.
Module 12: Designing an AD LDS Implementation. AD LDS Usage AD LDS is most commonly used as a solution to the following requirements: Providing an LDAP-based.
ABSTRACT Zirous Inc. is a growing company and they need a new way to track who their employees working on various different projects. To solve the issue.
Lise-Meitner-Str Flensburg Germany Tel: +49 (0) COMPANY PROFILE.
EXperimental Infrastructures for the Future Internet Process for Joining Infrastructure Owners Training - Basic.
ITEC 3220M Using and Designing Database Systems
HA-OSCAR Chuka Okoye Himanshu Chhetri. What is HA-OSCAR? “High Availability Open Source Cluster Application Resources”
INSTALLATION HANDS-ON. Page 2 About the Hands-On This hands-on section is structured in a way, that it allows you to work independently, but still giving.
Open Search Office Web Services Database Doc Mgt Sys Pipeline Index Geospatial Analysis Text Search Faceting Caching Query parsing Clustering Synonyms.
SAML 2.1 Building on Success. Outline n Summary of SAML 2.0 n Work done since 2.0 n Objectives of SAML 2.1 n Proposed Task List n Undecided Issues n Invitation.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Quality of System requirements 1 Performance The performance of a Web service and therefore Solution 2 involves the speed that a request can be processed.
Technical Topics for Deployed Campuses: Web SSO Will Norris University of Southern California.
EMIRES Czech. 2 INSPIRE & its requirements Geographic information needed for good governance at all levels should be abundant and widely available under.
Low Impact Urban Design and Development: Getting it into practice A presentation by Viv Heslop, Researcher on the LIUDD project.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
Program Development Cycle
Software Engineering1  Verification: The software should conform to its specification  Validation: The software should do what the user really requires.
1 Software Testing Strategies: Approaches, Issues, Testing Tools.
Configuring, Managing and Maintaining Windows Server® 2008 Servers Course 6419A.
lCerts. lCerts Copyright  GlobalCerts Fast and Secure Services GlobalCerts now offers two.
6 Best Practices for ERP Implementations By Rahul Vyas Believe me; There are Some Requirements Which are Essential for any of the ERP Implementation Project.
1 DEPLOYMENT AND OPERATIONS MODULE 23 ECM SPECIALIST COURSE 1 Copyright AIIM.
The Umbrella Project Authentication The minimum user information possible is stored centrally to avoid Data Protection issues. The Authentication is done.
L’Oreal USA RSA Access Manager and Federated Identity Manager Kick-Off Meeting March 21 st, 2011.
CE Based Membership Verification for L3VPN
ITIL: Service Transition
South African Identity Federation
Implementing Active Directory Domain Services
Umbrella Update Björn Abt.
Jean-François Perrin (ILL) - Umbrella Annual Meeting 2015
CompTIA Security+ Study Guide (SY0-401)
ROUND ROBIN DNS Round robin DNS is usually used for balancing the load of geographically distributed Web servers. For example, a company has one domain.
Cloud Testing Shilpi Chugh.
الدليل التدريبي للتقييم البيئي المتكامل للمنطقة العربية
Software System Integration
EnMS Polska Builds energyBIS on Microsoft Azure to Ensure a Scalable and Secure Energy Efficiency Monitoring and Management System MICROSOFT AZURE ISV.
Mike Becher and Wolfgang Rehm
GENERAL SERVICES DEPARTMENT Facilities Management Division PROOF –NM (Process Reengineering & Optimization of O&M Functions for New Mexico) Phase II.
TEMPLATE NOTES Our datasheet and mini-case study templates are formatted specifically for consistency of branding at Microsoft. Please do not alter font.
Case Study 1 By : Shweta Agarwal Nikhil Walecha Amit Goyal
Building global and highly-available services using Windows Azure
Chapter 11: Integration- and System Testing
A. Götzfried Head of Unit B 5
Servers Options Put all services on one server, or
Code vulnerabilities Vulnerabilities are mistakes, errors or weaknesses in a piece of software’s source code that can be directly used by a hacker to perform.
5.b3 Monitoring & Reporting 2019
GENERAL SERVICES DEPARTMENT Facilities Management Division PROOF –NM (Process Reengineering & Optimization of O&M Functions for New Mexico) Project.
Presentation transcript:

Bring the Umbrella system into production Next steps 1

Productionalize Umbrella Productionalize the Umbrella Following steps need to be implemented to allow productional use of the Umbrella system: Deploy Umbrella on state-of-the-art hardware. A proactive monitoring of the Umbrella system is necessary to find errors or crashes in realtime and to react on them. The user data needs to be backed up and made sure that it can be restored(!). Geographical distribution and clustering of the Umbrella both helps in high- availability and load-balancing. Ideally a DNS based geographic load balancing strategy is used to ensure that endusers will reach the nodes closest to them. Naming conventions for the federation metadata must be established and cultivated. A clear directive on how service providers must be configured must be provided.

Productionalize Umbrella Security Check A professional and independent security check must be conducted to ensure the integrity of the security of the Umbrella: A conceptual check to find flaws in the design A penetration test to find holes in the implementation This security check will deliver a review with found flaws and proposed solutions. A counter measure catalogue must be established and gradually implemented. After implementing counter measures the Umbrella must be tested on these flaws again. Ideally a periodic security check on the Umbrella is conducted to maintain a high level of security to its users.

Productionalize Umbrella Rollout the Umbrella The implementation of a distributed system cannot be done in one step. Following partitioning is planned: Rollout and productionalization of the Identity Provider and all central services Integration of local services and web user offices. The functionalities of the Umbrella system have been modularized. This allows a step-by-step implementation and also skipping steps. Still unclear on the selection of the rollout strategy: Step-by-step facility SP integration All facilities at once SP integration

Productionalize Umbrella Umbrella extensions to implement The optional extensions can be skipped if unwanted but not the User Authentication Umbrella extensions Mandatory extensions User Authentication Optional extensions Attribute Updater Proposal Module Indico Security Token Service ...

Productionalize Umbrella Rollout strategy Step-by-step facility SP integration strategy: 2-3 facilities to start integration with Other facilities can join on demand Extensions can be implemented on demand All facilities at once SP integration: All facilities start at one point and implement at least 'User Authentication' Other extensions can be implemented on demand Pros Cons Step-by-step Resource friendly No timely readiness All facilities Ensure functionality at an early stage Difficult planing of resources

Productionalize Umbrella Thank you for your attention!