Exchange Network Node Help Desk NOLA Conference Feb 9-10, 2004.

Slides:



Advertisements
Similar presentations
EVERY CONNECTION has a starting point. EVERY CONNECTION has a starting point. WorldCat Navigator - Authentication Library Hosted Navigator EZproxy and.
Advertisements

5/30/2012. Provides a method for finding services/data on the Exchange Network – discover data. Supports User Friendly Tools Can automatically collect.
The Electronic Office Some supplementary information Corporate websites Office automation Company intranet.
OWASP Secure Coding Practices Quick Reference Guide
Demystifying the Protocol and Specification v1.1 Prepared for the Node Mentoring Meeting by: Rob Willis, Ross & Associates February.
A Public Web Services Security Framework Based on Current and Future Usage Scenarios J.Thelin, Chief Architect PJ.Murray, Product Manager Cape Clear Software.
Certification Authority. Overview  Identifying CA Hierarchy Design Requirements  Common CA Hierarchy Designs  Documenting Legal Requirements  Analyzing.
Environmental Council of States Network Authentication and Authorization Services The Shared Security Component February 28, 2005.
Exchange Network Key Management Services A Security Component February 28, 2005 The Exchange Network Node Mentoring Workshop.
1 June 1, 2015 Secure access to project budget information for OAR Principal Investigators Eugene F Burger Sylvia Scott Tracey Nakamura John L Forbes PMEL.
Whad’ya Node ? Mentoring Conference New Orleans, LA March 1, 2005 Node Building 101.
Network Shared Services. Shared Services –Network Authentication and Authorization Services –Exchange Network Discovery Service –Universal Description.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Effort in hours Duration Over Weeks Or Months Inception Launch Web Lifecycle Methodology Maintenance Phases Copyright Wonderlane Studios.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
TLS/SSL Review. Transport Layer Security A 30-second history Secure Sockets Layer was developed by Netscape in 1994 as a protocol which permitted persistent.
National STORET Users Conference Environmental Information Exchange Network Andrew T. Battin, Director Information Exchange & Services Division Office.
JVM Tehnologic Company profile & core business Founded: February 1992; –Core business: design and implementation of large software applications mainly.
Managing Client Access
Clinic Security and Policy Enforcement in Windows Server 2008.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
SWIS Digital Inspections Project (SWIS DIP) Chris Allen, Information Management Branch California Integrated Waste Management Board November 5, 2008 The.
MCSE Guide to Microsoft Exchange Server 2003 Administration Chapter Four Configuring Outlook and Outlook Web Access.
©Kwan Sai Kit, All Rights Reserved Windows Small Business Server 2003 Features.
C Copyright © 2009, Oracle. All rights reserved. Appendix C: Service-Oriented Architectures.
EPA Exchange Network SDWIS Data Flow Maine SDWIS/State system using FedRep XML output files.
Beaches Data Flow Getting Notification Data Into PRAWNS Dennis Murphy Delaware DNREC (302)
Facility Registry System and the Exchange Network Pat Garvey OEI/OIC May 2000.
Node Mentoring Workshop “Sharing What We Node” Middleware Breakout Session.NET New Orleans, Louisiana February 9-10, 2004.
Web Services An introduction for eWiSACWIS May 2008.
Brent Mosher Senior Sales Consultant Applications Technology Oracle Corporation.
1 Environmental Information Exchange Network - Principles and Components Molly O’Neill, State Director, Network Steering Board Pat Garvey, EPA Director,
 What is intranet What is intranet  FeaturesFeatures  ArchitectureArchitecture  MeritsMerits  applicationsapplications  What is ExtranetWhat is.
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
OEI’s Services Portfolio December 13, 2007 Draft / Working Concepts.
U.S. Department of Agriculture eGovernment Program July 15, 2003 eAuthentication Initiative Pre-Implementation Status eGovernment Program.
1 Exchange Network Node 2.0 Flow Migration Open Conference Call August 27, 2008.
Exchange Network and Node Overview Prepared for the Exchange Network Knowledge Transfer Meetings Philadelphia, Pennsylvania - April 16, 2003 Chicago, Illinois.
Module 9: Fundamentals of Securing Network Communication.
Node and Flow Configuration (NFC) Node Mentoring Workshop 2/9/2004.
February 8, 2005IHE Europe Educational Event 1 Integrating the Healthcare Enterprise Basic Security Robert Horn Agfa Healthcare.
Going from Node to Flow Presented by Guy Outred. Introducing… Sponsored by Mentoring States and ECOS Based on input from States of varying geography,
The Exchange Network Node Mentoring Workshop Universal Description, Discovery, and Integration Registry David Dundua February 28, 2005.
Using Encryption with Microsoft SQL Server 2000 Kevin McDonnell Technical Lead SQL Server Support Microsoft Corporation.
Data Encryption using SSL Topic 5, Chapter 15 Network Programming Kansas State University at Salina.
Challenge Grant Update: Linking the Network of Natural Heritage Biodiversity Data to the Environmental Information Exchange Network.
Exchange Network Conference San Francisco, CA April 18, 2006 Network and Node 101.
A Brave NEtWork World Rob Willis, Ross & Associates Node Mentoring Workshop New Orleans, LA February 28, 2005.
Electronic Exchange of Drinking Water Lab Data Presented by: Mike Matsko NJDEP Exchange Network Users Meeting April 18, 2006.
Data Exchange through XML Environmental Information Exchange Network May 21, 2003 Louis Sweeny.
RCRAInfo May 6, RCRAInfo: What is it? The national (mission critical) information system that supports the RCRA Subtitle C program. A national.
1 Data Exchange Design and Implementation Best Practices Critical Factors for the Development of Successful Information Exchange Systems within the Network.
Node Mentoring Workshop “Sharing What We Node” CDX Test to Production Flow Steps New Orleans, Louisiana February 9-10, 2004.
HP OpenView eCare is a fast, efficient way to access always- on, interactive technical support tools needed to manage your business and ensure uptime.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the OWASP License. The OWASP.
Basic Security Cor Loef Philips Medical Systems Co-Chair IHE Radiology Technical Committee.
The Exchange Network Node Mentoring Workshop User Management on the Exchange Network Joe Carioti February 28, 2005.
Automate Blue Button Initiative Pull Workgroup Meeting December 13, 2012.
6/13/2016 U.S. Environmental Protection Agency 1 Starting a Facilities Flow Lee David
Introduction to the Exchange Network May 30th, 2012.
INFORMATION TECHNOLOGY NEW USER ORIENTATION
To the ETS – Accounts Setup and Preferences Online Training Course
NAAS 2.0 Features and Enhancements
INFORMATION TECHNOLOGY NEW USER ORIENTATION
INFORMATION TECHNOLOGY NEW USER ORIENTATION
To the ETS – Accounts Setup and Preferences Online Training Course
“Real World” METEOR Implementation Issues
Scott Miller TSM Team Lead Ray Mah Architect, Foundation
Scott Miller TSM Team Lead Ray Mah Architect, Foundation
Presentation transcript:

Exchange Network Node Help Desk NOLA Conference Feb 9-10, 2004

Outline  Node Building Resources Review ECOS Node Help Desk, Docs, FAQs, DNCs  Amplified Help Desk Support Procedures Getting started on your Node development effort A High Level Review of EN-CDX Security Moving to Test and Production

Resources for Node Builders  Exchange Network Node Help Desk  Guidance and Technical Documents  FAQs  Node Mentoring Group  Exchange Network Discussion Board  Demonstrated Node Configurations (DNCs)  Testing Tools On-line resources:

Exchange Network Node Help Desk Mission: The Exchange Network Node Help Desk is available for any Network or Node building question. The focus however is on technical, and account management. Time permitting, some procedural mentoring may be available. By Telephone: Call our toll-free line between the hours of 8:00 am and 6:00 pm (Eastern) M-F at (Select Option 2). By Send support requests to Note: The Network Node Help Desk is closed on Federal holidays

Exchange Node Help Desk Structure  Help Desk ‘Tier 1’ Staff are Software Development Engineers Tarun Verma and Sergey Nikhinson Supplement CDX Node and Web Development Teams  Backed By the CDX Node Development and Operations Teams  Closely Coordinated with: CDX-Web Help Desk Outreach

Guidance and Technical Documents  Network Node Functional Specification v1.1  Network Exchange Protocol v1.1  Node Implementation Guide v1.0  Flow Configuration Document Template v1.0*  Node, Flow, and Client Definitions and Implementation Statuses * Available Mid-Late February 2004   Administrator’s Guide to Network Security*   Network Security Policy Document v1.0*   Network Security Specifications   Network Security Guidelines   Network Security White Paper   Core Reference Model   XML Schema Design Rules

FAQs  Most Frequently Asked Questions from Exchange Node Help Desk files Exchange Network General Questions Security Implementation Dataflow Support  Initial Draft in Review 02/06/2004 Publicly available on Network Exchange website very soon  View at:  A Living Document

FAQs Exchange Network Examples  What is the Exchange Network?  What are the benefits of the Exchange Network?  How do I participate in the Exchange Network?  How do I connect my Agency and its data to the Network?  What tools and resources are available to simplify my node development project?  What is the Node Test Tool?  What is a DNC (Demonstrated Node Configuration)?  Where can I find and download a DNC?  What Different Clients are available and how do I get one?  My question is not answered anywhere in the Exchange Network FAQ. Who can help Me?  What is the Exchange Network Mentoring Group? What can they do for me? How do I contact them?  What is the Mentoring Group Message Board?

FAQs Security Implementation Examples  What is the Network Authentication Authorization Service (NAAS)?  Why should I use NAAS? How does my node benefit from it?  Can I use my security model in conjunction with NAAS?  How does the NAAS Authentication Service work? What are the possible scenarios?  How does Authorization work? What do I need to do to take advantage of Authorization?  How do I get a userId?  How do I get an administrator account?  I need to get a Secure Sockets Layer (SSL) certificate for my Node. Which one should I get? Where can I get one?

FAQs DataFlow Support Examples  What is a dataflow?  Which dataflows are currently supported by the EPA CDX Node?  What steps do I take to put a flow into production?  What is the NFC Group ?  What is an FCD ?  What FRS service requests are supported?  Which FRS exchange scenarios are supported ?  What are the FRS file naming conventions ?  Which e-DMR service requests are supported ?  Which e-DMR exchange scenarios are supported ?  What are the e-DMR file naming conventions ?

Version 1.1 DNCs  Java-based (Integrated Client and Server DNC) Apache Axis 1.1 – DNC can be used with any Java-Based middleware, (e.g., WebLogic, WebSphere, XAware, Oracle 9i)  Microsoft.NET DNCs DNC for server side using Microsoft.NET C#. DNC for server side using Microsoft.NET VB Sample client for.NET Also available is a C# client library (.zip file). This allows you to change the requestor library above. If you don't want to change the API, you should download the.NET Sample Client. Requires the.NET Framework 1.X and 1sp1.C# client library  All Tools available on the Exchange Network Website “Tool Box” Section

The Flow Configuration Document The Flow Configuration Document (FCD) Template identifies the universe of information Network Partners should consider when documenting and implementing a Flow or a Common Data Service. A Flow Configuration Document may include, by reference, information from many other documents (Schema, system code lists, or procedures).

Getting Started  Strong support for key Node technologies Web Services Data Integration using XML When using DNCs (highly recommended), expertise in a supported paradigm (Java,.Net C#,.Net VB)  Exchange Network Architecture Security, EN v1.1 Protocol / Services  Leverage Node Mentoring States, Docs, Node Help Desk  Consider Contractor Support EPA can provide a list of known Node implementers  Establish Test accounts and SSL support up front

Moving From Test to Production  Testing complete Administrative and User / Operator Test accounts Integration Testing: Node passes all automated tests Client Testing on Test CDX passes Services connectivity verified by Help Desk Data validated by appropriate Program Flow areas  SSL available 128 bit encryption  Production NAAS accounts Administrative and User / Operator Production accounts Help Desk authorizes submissions to Production Node

EN Security Authentication and Authorization For Web Services

Establishing NAAS Accounts  Types of NAAS Accounts Node Administrator Accounts User and Operator Accounts Test and Production  Node Administrator accounts established by calling the Network Help Desk  Network User accounts managed by the appropriate Node Administrator

NAAS Test Accounts  Test accounts can be established to assist during Node implementation and testing.  All interactions with the NAAS must use SSL (128-bit encryption)  Test NAAS and Node are separate and distinct from the Production NAAS and Node Different URLs and Accounts

Node Administrators  Node administrator account established by calling the Network Help Desk Administrator key information required and verified Administrator accounts are associated with a specific node Each administrator controls Network users entitlements to their specific Node, and no others

Network Node Users and Operators  Network Node user and operator accounts are managed by the Node administrator  Authorization permissions are set by the Node administrator  User – Operator, what’s the difference ? User: No permissions on local or remote nodes at creation time Operator: Full permissions on local node at creation time (but still non on remote nodes until remote Node administrator provides entitlements)  Consider use of ‘Firewall’ Node Policies for simplification Minimum Node level policies applied to all users and operators

Questions?