XACML in real-world applications Doron Grinstein, CEO BiTKOO +1-818-985-4700 888-4-BiTKOO

Slides:



Advertisements
Similar presentations
C6 Databases.
Advertisements

Edoclite and Managing Client Engagements What is Edoclite? How is it used at IU? Development Process?
Brian Alderman | MCT, CEO / Founder of MicroTechPoint Pete Harris | Microsoft Senior Content Publisher.
UNIT-e Research & Development Microsoft Technology Day Stephen Cain (System Architect)
XACML 2.0 and Earlier Hal Lockhart, Oracle. What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation.
Lecture Microsoft Access and Relational Database Basics.
MI807: Database Systems for Managers Introduction –Course Goals & Schedule –Logistics –Syllabus Review Relational DBMS Basics –RDBMS Role in Applications.
500 Customers 2,000 Customers 4,000 Customers 7,000 Customers 8,500 Customers 10,500 Customers BizTalk Server 2000 Messaging XML tools XLang BizTalk.
Getting Started (Excerpts) Chapter One DAVID M. KROENKE’S DATABASE CONCEPTS, 2 nd Edition.
ISYS 512 Business Application Design and Development with.Net David Chao.
Course Map The Java Programming Language Basics Object-Oriented Programming Exception Handling Graphical User Interfaces and Applets Multithreading Communications.
J2EE Java 2 Enterprise Edition. Relevant Topics in The Java Tutorial Topic Web Page JDBC orial/jdbc
Access to Azure EXTENDING OFFICE 365 INTO THE CLOUD George Young Dawson Butte Software SHAREPOINT SATURDAY DENVER 2015 – JANUARY.
Getting Started Chapter One DATABASE CONCEPTS, 7th Edition
Building and Deploying a Simple Web Application. Tomcat and JSP Tomcat is an application server, commonly used to host JSP applications Applications are.
PHP Scripting Language. Introduction “PHP” is an acronym for “PHP: Hypertext Preprocessor.” It is an interpreted, server-side scripting language. Originally.
Charlie Crocker Vice President Farallon Geographics, Inc. An Overview of Internet Mapping Technology.
Access Web Apps – OK, Now What? EXTENDING ACCESS WEB APPS George Young Dawson Butte Software ACCESS DAY – OCTOBER DENVER,
ORACLE DATABASE SECURITY
Mobile Agents for Integrating Cloud-Based Business Processes with On-Premises Systems and Devices Janis Grundspenkis Antons Mislēvičs Department of Systems.
Any host All components deployed to SharePoint Client side code App Web created for app Wrapper deployed to SharePoint Components deployed to.
Combining KMIP and XACML. What is XACML? XML language for access control Coarse or fine-grained Extremely powerful evaluation logic Ability to use any.
1 © Talend 2014 XACML Authorization Training Slides 2014 Jan Bernhardt Zsolt Beothy-Elo
XACML Briefing for PMRM TC Hal Lockhart July 8, 2014.
“This presentation is for informational purposes only and may not be incorporated into a contract or agreement.”
Content Management Systems Equals Distributed Web Site Maintenance Robert Gulick, EdD DBA / Technology Trainer Carmi Gulick.
A Close Look Inside the SharePoint Engine Randy Williams, MVP MOSS Synergy Corporate Technologies
Database System Concepts and Architecture Lecture # 3 22 June 2012 National University of Computer and Emerging Sciences.
5.1 © 2007 by Prentice Hall 5 Chapter Foundations of Business Intelligence: Databases and Information Management.
SednaSpace A software development platform for all delivers SOA and BPM.
Oracle Application Express 3.0 Joel R. Kallman Software Development Manager.
1 Web Server Administration Chapter 1 The Basics of Server and Web Server Administration.
Enticy GROUP THE A Framework for Web and WinForms (Client-Server) Applications “Enterprise Software Architecture”
Rich Internet Applications for the Enterprise Creating RIA from your Oracle database using TURBO Enterprise Web 2.0 Presented By: John Krahulec Bizwhazee.
SednaSpace A software development tool for all delivers SOA and BPM.
Tom Castiglia Hershey Technologies
Microsoft SharePoint Server 2010 for the Microsoft ASP.NET Developer Yaroslav Pentsarskyy
ApplicationXtender Quickly capture, organize, and deliver fixed-content images, documents, reports, and other business-critical information.
Are you getting the benefits from ASP.NET and AJAX? Introduction to the CTC ASP.NET Webforms Generator.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
Slide 1 ASP Authentication There are basically three authentication modes Windows Passport Forms There are others through WCF You choose an authentication.
JISC Middleware Security Workshop 20/10/05© 2005 University of Kent.1 The PERMIS Authorisation Infrastructure David Chadwick
Windows Role-Based Access Control Longhorn Update
Electives autumn 2009 Courses in the 4th semester –Systems development (continued) –2 elective courses N subjects are provided Each of you have to choose.
Jim Janson. Agenda Evolution of software architectures 3-tier User interfaces Application servers Databases.
CRM in Education: Raising Standards. Saving Time. Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
THE NEW WAY TO WORK TOGETHER Share Find the perfect balance between compliance and collaboration Efficiently manage infrastructure while maximizing.
Rich Web Applications for the Enterprise... Creating RWA from Your Oracle Database Presented By: John Krahulec Bizwhazee SEOUC Charlotte February 2009.
11 Restricting key use with XACML* for access control * Zack’-a-mul.
February, TRANSCEND SHIRO-CAS INTEGRATION ANALYSIS.
Class 4 Agenda Database Management Systems Database Management Systems Chapter 4: Moore’s Law Chapter 4: Moore’s Law Midterm Case Midterm Case.
XACML Showcase RSA Conference What is XACML? n XML language for access control n Coarse or fine-grained n Extremely powerful evaluation logic n.
noun ; Software Defined Enterprise/SDE/ The enterprise who leverages software to flank their traditional business offerings, or to create entirely new.
Google Code Libraries Dima Ionut Daniel. Contents What is Google Code? LDAPBeans Object-ldap-mapping Ldap-ODM Bug4j jOOR Rapa jongo Conclusion Bibliography.
Introduction to SQL Server 2000 Reporting Services Jeff Dumas Technical Specialist Microsoft Corporation
Introduction to Core Database Concepts Getting started with Databases and Structure Query Language (SQL)
Interstage BPM v11.2 1Copyright © 2010 FUJITSU LIMITED INTERSTAGE BPM ARCHITECTURE BPMS.
Spaso Lazarević Microsoft MVP Nova banka ad Banja Luka Building business application using Visual Studio 2013 LightSwitch.
1 LM 6 Database Applications Dr. Lei Li. Learning Objectives Explain three components of a client-server system Describe differences between a 2-tiered.
THE NEW WAY TO WORK TOGETHER Share Find the perfect balance between compliance and collaboration Efficiently manage infrastructure while maximizing.
Azure Active Directory Uday Hegde 2016 Redmond Summit | Identity Without Boundaries May 26, 2016 Group Program Manager, Azure AD
Introducing the Microsoft® .NET Framework
Business System Development
What is WWW? The term WWW refers to the World Wide Web or simply the Web. The World Wide Web consists of all the public Web sites connected to the Internet.
JSP (Java Server Page) JSP is server side technology which is used to create dynamic web pages just like Servlet technology. This is mainly used for implementing.
Platform as a Service.
CERN-Russia Collaboration in CASTOR Development
LitwareHR v2: an S+S reference application
Presentation transcript:

XACML in real-world applications Doron Grinstein, CEO BiTKOO BiTKOO

You can apply security consistently Java Applications JSP, JSF, CXF Java Applications JSP, JSF, CXF.NET Applications ASP.Net, Silverlight, WCF, WPF.NET Applications ASP.Net, Silverlight, WCF, WPF SharePoint 2010 SQL Server Rows, columns, and cells in databases SQL Server Rows, columns, and cells in databases Apache Hosted Applications IIS Hosted Apps DB-2 Oracle Databases Networks MySQL Business processes, new applications, services…

XACML Allows Security Consolidation “Data on client XYZ should be available in SharePoint to all non-legal staff only if the current date is after the gag order is lifted. Legal staff require full access, but we need to audit their activity to ensure data isn’t leaked.” Traditionally Multiple user interfacesIT had to be involved in policy changes Limitations on each application based on pre-defined model of security Code changes required to adapt to new security concepts XACML Use of a single interface to manage policies for all applications The business is empowered to make policy changes Express any security policy or rule Develop new security concepts without modifying existing applications

XACML scales! XACML done right performs and scales to the cloud Attribute caching Decision caching Compiling policy to intermediate language XACML is stateless so it scales horizontally PDPs can be deployed with PEPs Combined with federation

Business Users Should not see XML Some users might accept editing this But policies are typically more complex This code is used to express specific login times on a single server Products exist that help business users manage XACML by providing A graphical user interface (GUI) Simple API Web service API Command-line interface Domain-specific languages More to come..

Leverage RBAC and ABAC “Data on client XYZ should be available in SharePoint to all non-legal staff only if the current date is after the gag order is lifted. Legal staff require full access, but we need to audit their activity to ensure data isn’t leaked. John Doe is the only non-legal exception, and must also have access.” “Exceptions” group defined in Active Directory John Doe Attribute definition of legal staff spans directories In Active Directory, Department = “Legal” AND in LDAP 3 DeptNum = 46 Gag order release date is defined in a custom-built legal application HushDate in custom SQL Database = ‘ :00:00.000’

THANK YOU! Visit us on the web at