Architecture & Integration: CP v3.1. 3.x Platforms: Windows NT sp5(6a)/Solaris 2.8 iWS Client(s) Netscape/IE 4.0+ Java Servlet Engine (Java Servlet API)

Slides:



Advertisements
Similar presentations
Welcome to Middleware Joseph Amrithraj
Advertisements

Kerberized Credential Translation Olga Kornievskaia Peter Honeyman Bill Doster Kevin Coffman Center for Information Technology Integration University of.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
1 Oracle Financial System Mary Ann Carr September 14, 2000.
Web Application Security SSE USTC Qing Ding. Agenda General security issues Web-tier security requirements and schemes HTTP basic authentication based.
Web Security CS-431. HTTP Authentication Protect web content from those who don’t have a “need to know” Require users to authenticate using a userid/password.
Key Provisioning Use Cases and Requirements 67 th IETF KeyProv BOF – San Diego Mingliang Pei 11/09/2006.
University of Houston Portal Committee Presentation October 19, 2001.
1 Dec The Hong Kong Institute of Education Library Integrating Innopac with HKIEd “Portal” Environment Ivan Chan The Hong Kong Institute of Education.
UPortal and the Yale Central Authentication Service Drew Mazurek ITS Technology & Planning Yale University JA-SIG Summer Conference ‘04 Denver, CO June.
Report Distribution Report Distribution in PeopleTools 8.4 Doug Ostler & Eric Knapp 7264.
Alcatel Identity Server Alcatel SEL AG. Alcatel Identity Server — 2 All rights reserved © 2004, Alcatel What is an Identity Provider?  
Web Programming Language Dr. Ken Cosh Week 1 (Introduction)
Quick Tour of the Web Technologies: The BIG picture LECTURE A bird’s eye view of the different web technologies that we shall explore and study.
Objectives Understand what a portal is and why we need one Understand what MoCoMotion is Learn the benefits of MoCoMotion Understand the security issues.
“This presentation is for informational purposes only and may not be incorporated into a contract or agreement.”
Copyright 2007, Information Builders. Slide 1 WebFOCUS Authentication Mark Nesson, Vashti Ragoonath Information Builders Summit 2008 User Conference June.
Product Evaluation ADP E-Time Enterprise Kronos Workforce Central.
Session 11: Security with ASP.NET
The Central Authentication Service (CAS) Shawn Bayern Research programmer, Yale University Author, JSTL in Action, Web Development with JavaServer Pages.
Access Gateway Operation
System Architecture.  Windows Phone 7  Mobile Phone Application  User – End Perspective  Google App Engine  Administration Console  Handles authentication,
HTTP client wide area network (Internet) HTTP proxy HTTP server HTTP gateway firewall HTTP tunnel Copyright Springer Verlag Berlin Heidelberg 2004.
CS 493/693: Distributed Systems Programming V. “Juggy” Jagannathan CSEE, West Virginia University March 21, 2005.
jpasswd A common password change client for Unix and NT Marty Wise Jefferson Lab October, 2000.
TNC2004 Rhodes 1 Authentication and access control in Sympa mailing list manager Serge Aumont & Olivier Salaün May 2004.
Extending Vista The PowerLinks WebServices SDK John Hallett Senior Product Manager WebCT, Inc
Key Management with the Voltage Data Protection Server Luther Martin IEEE P May 7, 2007.
PostalOne! / FAST Data Exchange - Vision 02/15/05.
SSL, Single Sign On, and External Authentication Presented By Jeff Kelley April 12, 2005.
Simplify and Strengthen Security with Oracle Application Server Allan L Haensgen Senior Principal Instructor Oracle Corporation Session id:
TWSd - Security Workshop Part I of III T302 Tuesday, 4/20/2010 TWS Distributed & Mainframe User Education April 18-21, 2010  Carefree Resort  Carefree,
Building Secure, Flexible and Scalable Environments using LDAP - SANS Orlando Sacha Faust PricewaterhouseCoopers
® Gradient Technologies, Inc. Extending the Value of DCE Open Group Members Meeting Sand Diego, CA USA April 1998 Brian Breton.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
Module 11: Securing a Microsoft ASP.NET Web Application.
Zdenek Nejedly, Campus Services Rasim Duric, Lelio Fulgenzi, Deborah MacDougall, Networking Services Computing & Communications Services University of.
Securing Data in Transit and Storage Sanjay Beri Co-Founder & Senior Director of Product Management Ingrian Networks.
ISeries Access for Web Monday, November 16, 2015.
Integrating and Troubleshooting Citrix Access Gateway.
GOAL User Interactive Web Interface Update Pages by Club Officers Two Level of Authentication.
UMBC’s WebAuth Robert Banz – UMBC
ICalendar Compatible Collaborative Calendar- Server (CCS) Web Services Ahmet Fatih Mustacoglu Indiana University Computer Science Department Community.
Access control 2/18/2009. TOMCAT Security Model Declarative Security:  the expression of application security external to the application, and it allows.
Securing Angular Apps Brian Noyes
Developing SQL Server 2000 Reporting Services Applications Brian Welcker Group Program Manager SQL Server Reporting Services Microsoft Corporation.
1 Distributed System using J2EE. 2 What is J2EE?  J2EE (Java2 Enterprise Edition) offers a suite of software specification to design, develop, assemble.
Meeting Scheduling System Capstone Project - Team#5 Fall2007.
15 Copyright © 2004, Oracle. All rights reserved. Adding JAAS Security to the Client.
Application of the Internet 1998/12/09 KEIO University, JAPAN Mikiyo
Securing Web Applications Lesson 4B / Slide 1 of 34 J2EE Web Components Pre-assessment Questions 1. Identify the correct return type returned by the doStartTag()
ASP.NET 2.0 Security Alex Mackman CM Group Ltd
Interstage BPM v11.2 1Copyright © 2010 FUJITSU LIMITED INTERSTAGE BPM ARCHITECTURE BPMS.
Application Integration for the Web
© PITSS America LLC By: Gavin Woods, Technical Manager, PITSS America LLC Building Hybrid Oracle Forms and ADF Applications.
1 Example security systems n Kerberos n Secure shell.
October 2014 HYBRIS ARCHITECTURE & TECHNOLOGY 01 OVERVIEW.
Alain Bethuyne Web Security Architect BNPParibas Fortis
Web Programming Language
Consulting Services JobScheduler Architecture Decision Template
Running a Forms Developer Application
Federation made simple
Jim Fawcett CSE686 – Internet Programming Summer 2005
Radius, LDAP, Radius used in Authenticating Users
Server Concepts Dr. Charles W. Kann.
iSeries Access for Web Thursday, August 30, 2018
WI / XA Integration with NetScaler Gateway: How it works
Encrypted Database Final Presentation
Management Application for all segments
Unit 8 Network Security.
Presentation transcript:

Architecture & Integration: CP v3.1

3.x Platforms: Windows NT sp5(6a)/Solaris 2.8 iWS Client(s) Netscape/IE 4.0+ Java Servlet Engine (Java Servlet API) HTTP ‘packets’ CP objects Java (JRE 1.3) IIOP Java Method Calls C O R B A iDS (LDAP) - User/Group - ACL - Auth. - ‘hashed’EAS credentials OS File System [DocTemplate System] Call Methods Include Statements PSS Example User Secrets: External credentials CPIP credentials * Encrypted using login password credentials 128-bit encryption RC4 Algorithm MYSQL 3.22 Http.1 Multi-threading SSL accelerators

Identification and Authentication Services (IAS) External Authentication Services (EAS) Message Protection Services (MPS) Access Control Services (ACS) Core Cryptographic Services (CCS) Campus Pipeline Security

Campus Pipeline Integration

Campus Pipeline iPlanet Calendar Server WCAP Berkley DB WCAP LDAP HTTP XSL/XML Users Subscriptions associations Calendars Events Campus Pipeline Calendar Integration

Integration

Client HTTP SCT Event Service HTTP LDAPLDAP Event ‘listener’ Client Events XML Batch Initializes LDAP Data Repository Event interface: JMS or CORBA/IDL Integration Protocol Data Integration with SCT

Campus Pipeline Integration Protocol 1. User clicks link (containing external system destination URL) to the CPIP servlet. 5. The external system establishes its user session, and redirects the browser to the original destination URL. The external system’s content is framed under the CP toolbar. 3. External system authenticates (and creates the user if necessary) and sends a pickup URL in the login response, which will help establish a session between the browser and the external system. 4. CPIP extracts the pickup URL from the login response, and redirects the browser to the pickup URL, to establish the session. The pickup URL contains the original destination URL. 2. CPIP makes authentication (& create user if necessary) requests to external system, using the supplied* authentication URL or create URL.

Open, standard platform with proven infrastructure Proven Integration with Administrative Databases Proven Integration Protocol for single sign-on, session management and UI integration for all existing and future systems and applications Centralized data and system administration via web based console and distributed access controls World class technical services and consulting Summary of Technical Benefits