Client / Server Correlation Values

Slides:



Advertisements
Similar presentations
An IMS testbed for SIP applications
Advertisements

Recall Advanced Telephony Applications Recall by Jusan is a family of call recording systems, part of the Streamline CTI range Today, all.
Metering and Licensing of Resources: Kala ’ s General Purpose Approach by Sergiu S. Simmel and Ivan Godard Review by Seung Jun Lee ABSTRACT “ This paper.
Building an Encrypted and Searchable Audit Log Brent Waters Dirk Balfanz Glenn Durfee D.K. Smetters.
Offline Untrusted Storage with Immediate Detection of Forking and Replay Attacks Marten van Dijk, Jonathan Rhodes, Luis Sarmenta Srini Devadas MIT Computer.
© 2009 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice KMIP Key Naming for Removable Media.
Ubiquitous Computing Definitions Ubiquitous computing is the method of enhancing computer use by making many computers available throughout the physical.
Rest Hours Monitoring and Planning. About RHMP RHMP is a system that provides A check on the compliance of an employees work / rest schedule within a.
Website Development Registering Users – Introducing Cookies.
Background Background Problem domain Current situation Proposed solution System architecture Functional requirements Non-functional requirements Major.
1 Remote Monitoring System EIN Systems Environmental Intelligence Network Systems Remote Monitoring System - Requirements Specification - Welcome Mr. Ken.
Writing CBT Proposals Needs Analysis and Solutions By R. L. Jorczak.
Client Solution Secure collaboration with partners on customer initiatives and transactions Internal users push content to site without multiple authentication.
Usability Test by Knowing User’s Every Move - Bharat chaitanya.
SACMAT02-1 Security Prototype Defining a Signature Constraint.
Brian Dwyer – CITA370. Introduction  Network Device Security  Identity Management AAA Process Model ○ Authentication ○ Authorization ○ Accounting (Sometimes.
Security Guidelines and Management
Tracking Services for ANY websites and web applications Zhu Xiong CSE 403 LCO.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Windows 2000 Active Directory Service COSC 513 Yongquan Cai 03/10/2001.
KMIP - Hardware Security Modules Meta-Data-Only (MDO) Keys Saikat Saha & Denis Pochuev Feb 2012.
Health Care Information Systems Research in CERCS Doug Blough.
Slide 1 © 2004 Reactivity The Gap Between Reliability and Security Eric Gravengaard Reactivity.
Preventing Automated Use of STMP Reservation System Using CAPTCHA.
® IBM Software Group © 2007 IBM Corporation Best Practices for Session Management
.  A multi layer architecture powered by Spring Framework, ExtJS, Spring Security and Hibernate.  Taken advantage of Spring’s multi layer injection.
Case Study.  Client needed to build data collection agents for various mobile platform  This needs to be integrated with the existing J2ee server 
BEST Guard – Information Logging. bEST Guard Records all actions executed on an MFP Produkt type: Server based application (software only) Development.
What is a proposal?. Proposal Informative and persuasive writing Educate and convince reader to do something.
Apple Inc ISO. Organisation chosen Apple Store The company designs, manufactures and markets personal computers, portable digital.
11 Restricting key use with XACML* for access control * Zack’-a-mul.
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
Desktop Integration Rhidian Bramley PACS & Teleradiology Group Meeting November 2005.
SACRED REQUIREMENTS DOCUMENT Stephen Farrell, Baltimore Alfred Arsenault, Diversinet.
Introduction to Distributed Databases Yiwei Wu. Introduction A distributed database is a database in which portions of the database are stored on multiple.
KMIP Compliance Redefining Server and Client requirements to claim compliance Presented by: Bob Lockhart.
1 Active Directory Service in Windows 2000 Li Yang SID: November 2000.
EMPLOYEE MANAGEMENT SCHEDULING SYSTEM Rockstar Solutions.
Meta-Data-Only (MDO) Keys KMIP 1.2 Proposal Oct Denis Pochuev, SafeNet John Leiseboer, QuintessenceLabs.
Partial Notifications IETF 56 SIMPLE WG draft-lonnfors-simple-presinfo-deliv-reqs-00 draft-lonnfors-simple-partial-notify-00 Mikko Lönnfors
Locate By Value Anthony Berglas. Basic Idea To extend Locate so that it queries managed object’s values (KeyBlock) in the same way that it can now be.
Interaction classes Record context Custom lookups.
RAPT RFID based Asset and Personnel Tracker Team 24.
KMIP Compliance Redefining Server and Client requirements to claim compliance Presented by: Bob Lockhart.
JavaScript Invented 1995 Steve, Tony & Sharon. A Scripting Language (A scripting language is a lightweight programming language that supports the writing.
Take an Analytics-Driven Approach to Container Performance Marc Chéné, Principal Product Manager Den Gladkikh (aka outcoldman), Principal Dev Engineer.
Cookies Tutorial Cavisson Systems Inc..
MQTT-255 Support alternate authenticaion mechanisms
Considering issues regarding handling token
Client / Server Correlation Values
Best Webdav Server Windows
Comparison of LAN, MAN, WAN
Wavestore Integrates…
Wavestore Integrates… Paxton Net2 Access Control
Wavestore Integrates…
Wavestore Integrates…
KMIP Entity Object and Client Registration
Network Media, models and number systems
Re-provision Credentials
Fundamentals of Databases
Re-provision Credentials
Building an Encrypted and Searchable Audit Log
Encounters: Forensic Evaluations Training Slideshow
Edge Recorder Client
ConText By: Team Flirt.
Right Object Groups February, 2019.
Query Defaults for Object Groups
Default Constraints February, 2019.
Test Case Items February, 2019.
Your computer is the client
Presentation transcript:

Client / Server Correlation Values Anthony Berglas

Customer Requirement Need to be able to include client context in server logs E.g. Which storage device is being processed? Need to be able to store server context in client logs So can ask server administrator “What went wrong with request s739c983nf?” Good logging is essential for security and usability

Proposed Solution Add Client Correlation as a simple string in request header Add Server Correlation as a simple string in response header Server should log Client Correlation value Server should be able to identify log record using Server Correlation value

Example Request <RequestMessage> <RequestHeader> <ProtocolVersion> … <ProtocolVersion> <BatchCount type="Integer" value="1"/> <ClientCorrelation type=“TextString” value=“sid=s348sa3d”/> </RequestHeader> …

Example Response <ResponseMessage> <ResponseHeader> <ProtocolVersion> … </ProtocolVersion> <TimeStamp type="DateTime" value="2012-04-27T08:14:42+00:00"/> <BatchCount type="Integer" value="1"/> <ServerCorrelation type=“TextString” value=“s34:d8a8g7fd900a9d”/> </ResponseHeader> …

Conclusion Very simple additions Enhance logging and analysis capabilities Important information for forensic analysis Very helpful information for diagnosing issues