Group Policy Guide

Total Page:16

File Type:pdf, Size:1020Kb

Group Policy Guide Centrify Server Suite Group Policy Guide July 2021 (release 2021) Centrify Corporation • • • • • • Legal Notice This document and the software described in this document are furnished under and are subject to the terms of a license agreement or a non-disclosure agreement. Except as expressly set forth in such license agreement or non-disclosure agreement, Centrify Corporation provides this document and the software described in this document “as is” without warranty of any kind, either express or implied, including, but not limited to, the implied warranties of merchantability or fitness for a particular purpose. Some states do not allow disclaimers of express or implied warranties in certain transactions; therefore, this statement may not apply to you. This document and the software described in this document may not be lent, sold, or given away without the prior written permission of Centrify Corporation, except as otherwise permitted by law. Except as expressly set forth in such license agreement or non-disclosure agreement, no part of this document or the software described in this document may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, or otherwise, without the prior written consent of Centrify Corporation. Some companies, names, and data in this document are used for illustration purposes and may not represent real companies, individuals, or data. This document could include technical inaccuracies or typographical errors. Changes are periodically made to the information herein. These changes may be incorporated in new editions of this document. Centrify Corporation may make improvements in or changes to the software described in this document at any time. © 2004-2021 Centrify Corporation. All rights reserved. Portions of Centrify software are derived from third party or open source software. Copyright and legal notices for these sources are listed separately in the Acknowledgements.txt file included with the software. U.S. Government Restricted Rights: If the software and documentation are being acquired by or on behalf of the U.S. Government or by a U.S. Government prime contractor or subcontractor (at any tier), in accordance with 48 C.F.R. 227.7202-4 (for Department of Defense (DOD) acquisitions) and 48 C.F.R. 2.101 and 12.212 (for non-DOD acquisitions), the government’s rights in the software and documentation, including its rights to use, modify, reproduce, release, perform, display or disclose the software or documentation, will be subject in all respects to the commercial license rights and restrictions provided in the license agreement. Centrify, DirectControl, DirectAuthorize, DirectAudit, DirectSecure, DirectControl Express, Centrify for Mobile, Centrify for SaaS, DirectManage, Centrify Express, DirectManage Express, Centrify Suite, Centrify User Suite, Centrify Identity Service, Centrify Privilege Service and Centrify Server Suite are registered trademarks of Centrify Corporation in the United States and other countries. Microsoft, Active Directory, Windows, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and other countries. Centrify software is protected by U.S. Patents 7,591,005; 8,024,360; 8,321,523; 9,015,103; 9,112,846; 9,197,670; 9,442,962 and 9,378,391. The names of any other companies and products mentioned in this document may be the trademarks or registered trademarks of their respective owners. Unless otherwise noted, all of the names used as examples of companies, organizations, domain names, people and events herein are fictitious. No association with any real company, organization, domain name, person, or event is intended or should be inferred. Group Policy Guide 2 • • • • • • Contents About this guide 18 Intended audience 18 Using this guide 18 Documentation conventions 19 Finding more information about Centrify products 20 Product names 20 Contacting Centrify 22 Getting additional support 23 Group policies in Active Directory 24 Configuring computer and user settings 24 How group policies are applied 25 Order in which policies are applied 26 How the resulting policy set is determined 27 Editing a Group Policy Object 29 Selecting computer or user settings 29 Applying policies in nested organizational units 30 Configuring group policies to be refreshed 31 Centrify Server Suite group policy overview 32 Mapping settings to a virtual registry 33 Configuring settings in administrative templates 34 Mapping computer configuration policies 34 Mapping user configuration policies 35 Editing configuration settings manually 36 Updating configuration policies manually 36 Using standard Windows group policies 37 Reporting group policy settings 38 Group Policy Guide 3 • • • • • • Generating a report of Centrify group policies 39 Adding Centrify settings to Group Policies Objects 40 Adding administrative templates to a Group Policy Object 40 Installing Centrify group policy templates 40 Template file formats 41 Selecting a Group Policy Object for Centrify settings 42 Linking a Group Policy Object to an organizational unit 43 Using security filtering for group policies 43 Adding Centrify policies from XML files 45 Adding templates after an upgrade 46 Enabling Centrify policies 46 Centrify policy limitations 47 DirectControl Settings 48 Add centrifydc.conf properties 50 Enable Active Directory PAM Privilege Escalation Feature 50 Maintain DirectControl 2.x compatibility 51 Merge local group membership 51 Prefer authentication credentials source 52 Set LDAP fetch count 52 Set password cache 53 Set user mapping 54 User's initial group ID 54 Use FIPS 140-2 compliance algorithms 55 Basic requirements 55 Enabling the policy 56 Related configuration parameters 57 Account prevalidation 58 Contents 4 • • • • • • Specify allowed groups for prevalidation 58 Specify allowed users for prevalidation 59 Specify denied groups for prevalidation 59 Specify denied users for prevalidation 59 Set prevalidation service name 60 Set prevalidation update interval 61 Adclient settings 62 Add attributes to cached objects 62 Auto Zone group policies 64 Configure /etc/nsswitch.conf (Solaris, HPUX, Linux) 68 Configure /etc/{pam.conf,pam.d} (AIX, Solaris, HPUX, Linux, Mac OS X) 68 Configure /etc/security/user (AIX) 69 Configure /usr/lib/security/methods.cfg (AIX) 69 Configure Directory Services (Apple OS/X) 69 Configure dump core setting 69 Disable multi-factor authentication (MFA) on Centrify-managed computers 70 Disable nscd group and passwd caching (Solaris, Linux) 70 Disable pwgrd (HPUX) 70 Enable core dump cleanup 70 Enable logon hours local enforcement 71 Encrypt adclient cache data 71 Force domains and forests to be one-way trusted 71 Force password salt lookup from KDC 72 Map /home to /User (Mac OS X) 73 Run adclient on all processors 73 Set cache cleanup interval 73 Set the connector refresh interval 73 Set the heartbeat interval (*NIX) 74 Set maximum number of threads 74 Group Policy Guide 5 • • • • • • Set the maximum simultaneous authentication requests allowed 74 Set minimum number of threads 74 Specify low disk space interval 75 Specify low disk space warning level 75 Specify a per machine (random) delay for cache refreshed background tasks76 Use the legal Kerberos type for cache encryption 76 Addns Settings group policies 78 Enable addns invoked by adclient 78 Set command line options used by adclient 78 Set DNS records update interval 79 Set wait response interval for update requests 79 Dzdo settings 80 Always add anchors to regex in dzdo and dzcmds 80 Enable logging of valid command execution in dzdo 80 Enable user command timeout 80 Force dzdo re-authentication when relogin 81 Force dzdo to set HOME environment variable 81 Force dzdo to set HOME environment variable when runs with ‘-s’ option 82 Force per tty authentication in dzdo 82 Prompt error message if command not found by dzdo 82 Replace sudo by dzdo 83 Require dzdo command validation check 83 Require runas user for dzdo 84 Require user is logged in to a real tty to run dzdo 84 Set directory to store user timestamp by dzdo 84 Set dzdo authentication timeout interval 85 Set dzdo password prompt timeout interval 85 Set dzdo validator 86 Set environment variables to be preserved by dzdo 86 Contents 6 • • • • • • Set environment variables to be removed by dzdo 87 Set environment variables to be removed by dzdo with characters % or / 87 Set error message when failed to authenticate in dzdo 88 Set lecture shown by dzdo before password prompt 88 Set password prompt for target user password in dzdo 89 Set paths for command searching in dzdo 89 Set secure paths for command execution in dzdo 90 Show lecture by dzdo before password prompt 91 Use realpath to canonicalize command paths in dzdo 91 Group policy settings 92 Enable user group policy 92 Set machine group policy mapper list 92 Set group policy mapper execution timeout 93 Set user group policy mapper list 93 Set total group policy mappers execution timeout 93 Use user credential to retrieve user policy 94 Kerberos settings 95 Allow PAM to create user Kerberos credential cache 95 Allow weak encryption types for Kerberos authentication 95 Alternative location for credential cache directory 96 Alternative location for user .k5login files 96 Disable Kerberos built-in ccselect plugins 97 Enable Kerberos clients to correct time difference 97 Force Kerberos to only use TCP 97 Generate the forwardable tickets 97 Generate Kerberos version numbers for Windows 2000 98 Manage Kerberos configuration
Recommended publications
  • Knowledge Management Enviroments for High Throughput Biology
    Knowledge Management Enviroments for High Throughput Biology Abhey Shah A Thesis submitted for the degree of MPhil Biology Department University of York September 2007 Abstract With the growing complexity and scale of data sets in computational biology and chemoin- formatics, there is a need for novel knowledge processing tools and platforms. This thesis describes a newly developed knowledge processing platform that is different in its emphasis on architecture, flexibility, builtin facilities for datamining and easy cross platform usage. There exist thousands of bioinformatics and chemoinformatics databases, that are stored in many different forms with different access methods, this is a reflection of the range of data structures that make up complex biological and chemical data. Starting from a theoretical ba- sis, FCA (Formal Concept Analysis) an applied branch of lattice theory, is used in this thesis to develop a file system that automatically structures itself by it’s contents. The procedure of extracting concepts from data sets is examined. The system also finds appropriate labels for the discovered concepts by extracting data from ontological databases. A novel method for scaling non-binary data for use with the system is developed. Finally the future of integrative systems biology is discussed in the context of efficiently closed causal systems. Contents 1 Motivations and goals of the thesis 11 1.1 Conceptual frameworks . 11 1.2 Biological foundations . 12 1.2.1 Gene expression data . 13 1.2.2 Ontology . 14 1.3 Knowledge based computational environments . 15 1.3.1 Interfaces . 16 1.3.2 Databases and the character of biological data .
    [Show full text]
  • Computerized Patient Record System (CPRS) Setup Guide
    Computerized Patient Record System (CPRS) Setup Guide June 2021 Department of Veterans Affairs Health Data Systems Computerized Patient Record System Product Line Revision History Project Technical Date Patch Page Change Manager Writer 6/17/2021 OR*3*0*547 30 Added row to GUI Parameters SHRPE SHRPE Menu Options for OTH: GUI Add/Edit Local Message for OTH Button. Added Subsection for GUI 37-38 Add/Edit Local Message for OTH Button 10/16/2019 OR*3.0*397 All Added Revision dated REDACTED REDACTED 3/25/2019 (see below). Checked for 508 Compliance. Removed extra space between some pages. Removed extra Table of Contents from Pharmacy Packages section (G). 07/31/2019 OR*3.0*510 88 Added two NOTE: REDACTED REDACTED 3/25/2019 OR*3.0*397 21 Added ORSUPPLY Key REDACTED REDACTED 08/20/2018 XU*8.0*679 28 Added note regarding Electronic REDACTED REDACTED Signature Block restrictions. 03/30/2011 OR*3.0*272 5, 77, Changed references from REDACTED REDACTED 79, Duplicate Drug Class to 81, Duplicate Drug Therapy. 82, 93, 01/25/2007 OR*3.0*245 123 – Added information about the REDACTED REDACTED 125 new option, ORCM QUICK ORDERS BY USER 11/27/06 OR*3.0*242 182 Added information about the REDACTED REDACTED new way to edit items for the Nature of Order file. 12/30/04 36 Added new information about REDACTED REDACTED document templates. Computerized Patient Record System (CPRS) ii June 2021 Setup Guide Project Technical Date Patch Page Change Manager Writer 10/14/98 138 Added information about ORMTIME 10/15/98 14 Added explanation of global journaling 10/20/98
    [Show full text]
  • Acme As an Interactive Translation Environment
    Acme as an Interactive Translation Environment Eric Nichols and Yuji Matsumoto {eric-n,matsu} ߞatߞ is.naist.jp Computational Linguistics Laboratory Nara Institute of Science and Technology ABSTRACT Translation is challenging and repetitive work. Computer-aided transla­ tion environments attempt to ease the monotony by automating many tasks for human translators, however, it is difficult to design user inter­ faces that are easy to use but that can also be adapted to a dynamic workflow. This is often a result of a lack of connection between the inter­ face and the tasks that the user wants to carry out. A better correspon­ dence between task and interface can be achieved by simplifying how software tools are named. One way of accomplishing this to embrace text as the interface. By providing a simple and consistent semantics for interpreting text as commands, the Acme text editor [1] makes it possible to build a system with a text-centered interface. In this paper we explore the implications this has for translation aid software. 1. Motivation Translation is an essential and important part of human communication. However, it is a very challenging task, requiring the translator to have a complete understanding of and a deep familiarity with the source and target languages. This difficulty is not eased by the fact that fundamentally it is an inherently repetitive task, consisting of looking up unfamiliar words and doing large amounts of editing to produce a good translation. Given these demands, computers provide a good way to ease this repetitiveness by automating lookup and editing; by converting resources like dictionaries, other transla­ tions, and collections of example sentences to a computer-readable format, lookups can be performed much faster.
    [Show full text]
  • Header Manipulation Rules Resource Guide
    Oracle® Communications Session Border Controller Header Manipulation Rules Resource Guide Release S-CZ8.0 September 2017 Oracle Communications Session Border Controller Header Manipulation Rules Resource Guide, Release S-CZ8.0 Copyright © 2014, 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, shall be subject to license terms and license restrictions applicable to the programs.
    [Show full text]
  • Protected Database Configuration Guide
    Zero Data Loss Recovery Appliance Protected Database Configuration Guide Release 12.2 E88069-06 January 2019 Zero Data Loss Recovery Appliance Protected Database Configuration Guide, Release 12.2 E88069-06 Copyright © 2014, 2019, Oracle and/or its affiliates. All rights reserved. Contributing Authors: Glenn Maxey, Terence Buencamino, Padmaja Potineni Contributors: Andrew Babb, Anand Beldalker, Jin-Jwei Chen, Tim Chien, Sean Connelly, Donna Cooksey, Sam Corso, Steve Fogel, Muthu Olagappan, Jony Safi, Daniel Sears, Lawrence To, Steve Wertheimer This software and related documentation are provided under a license agreement containing restrictions on use and disclosure and are protected by intellectual property laws. Except as expressly permitted in your license agreement or allowed by law, you may not use, copy, reproduce, translate, broadcast, modify, license, transmit, distribute, exhibit, perform, publish, or display any part, in any form, or by any means. Reverse engineering, disassembly, or decompilation of this software, unless required by law for interoperability, is prohibited. The information contained herein is subject to change without notice and is not warranted to be error-free. If you find any errors, please report them to us in writing. If this is software or related documentation that is delivered to the U.S. Government or anyone licensing it on behalf of the U.S. Government, then the following notice is applicable: U.S. GOVERNMENT END USERS: Oracle programs, including any operating system, integrated software, any programs installed on the hardware, and/or documentation, delivered to U.S. Government end users are "commercial computer software" pursuant to the applicable Federal Acquisition Regulation and agency- specific supplemental regulations.
    [Show full text]
  • Oracle CSM-SBC with Broadworks.Pdf
    Oracle Communications Core Session Manager SCZ 7.1.5m1p1 and Oracle Communications Session Border Controller SCZ 7.2.0 with Broadworks Platform R19SP1 Technical Application Note Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material, code, or functionality, and should not be relied upon in making purchasing decisions. The development, release, and timing of any features or functionality described for Oracle’s products remains at the sole discretion of Oracle. 2 Table of Contents INTENDED AUDIENCE ...................................................................................................................................................... 5 DOCUMENT OVERVIEW .................................................................................................................................................. 5 INTRODUCTION ................................................................................................................................................................. 6 AUDIENCE ............................................................................................................................................................................................. 6 REQUIREMENTS ................................................................................................................................................................................... 6 ARCHITECTURE
    [Show full text]
  • Lifetime Support Policy: Oracle and Sun Systems Software
    Oracle and Sun System Software and Operating Systems Oracle Lifetime Support Policy September 21, 2021, 2021 | Version 1.00 Copyright © 2021, Oracle and/or its affiliates TABLE OF CONTENTS This brochure provides lifecycle timeframes for system software that is typically sold Additional Sun software is located in the standalone, but used in conjunction with specific Oracle or Sun products. Product Oracle Fusion Middleware, Oracle areas include server and storage management, Sun third-party, communication and Technology and Oracle Applications collaboration and Sun Ray. Lifetime Support Policy brochures located on www.oracle.com. ORACLE LIFETIME SUPPORT: 2 Please see the Oracle Software Oracle Communications Session Border Controller (Formerly Acme Packet Net-Net) 5 Technical Support Policies document Oracle Communications Tunneled Session Controller (Formerly Acme Packet NetNet) 5 located on www.oracle.com for Oracle Communications Application Session Controller (Formerly Acme Packet Net-Net) 5 additional terms and descriptions. Oracle Communications Unified Session Manager (Formerly Acme Packet Net-Net) 6 Oracle Communications Subscriber Aware Load Balancer (Formerly Acme Packet Net-Net) 6 Oracle Communications Border Gateway (Formerly Acme Packet Net-Net Border Gateway) 6 Oracle Communications Core Session Manager 7 Oracle Communications Session Router (Formerly Acme Packet Net-Net Session Router) 7 Oracle Communications Security Gateway (Formerly Acme Packet Net-Net Security Gateway) 7 Oracle Communications Session Monitor Family of
    [Show full text]
  • Acme: a User Interface for Programmers Rob Pike AT&T Bell Laboratories Murray Hill, New Jersey 07974
    Acme: A User Interface for Programmers Rob Pike AT&T Bell Laboratories Murray Hill, New Jersey 07974 ABSTRACT A hybrid of window system, shell, and editor, Acme gives text-oriented applications a clean, expressive, and consistent style of interaction. Traditional window systems support inter- active client programs and offer libraries of pre-defined operations such as pop-up menus and buttons to promote a consistent user interface among the clients. Acme instead provides its clients with a fixed user interface and simple conventions to encourage its uniform use. Clients access the facilities of Acme through a file system interface; Acme is in part a file server that exports device-like files that may be manipulated to access and control the contents of its win- dows. Written in a concurrent programming language, Acme is structured as a set of communi- cating processes that neatly subdivide the various aspects of its tasks: display management, input, file server, and so on. Acme attaches distinct functions to the three mouse buttons: the left selects text; the mid- dle executes textual commands; and the right combines context search and file opening functions to integrate the various applications and files in the system. Acme works well enough to have developed a community that uses it exclusively. Although Acme discourages the traditional style of interaction based on typescript windows— teletypes—its users find Acme’s other services render typescripts obsolete. History and motivation The usual typescript style of interaction with Unix and its relatives is an old one. The typescript—an inter- mingling of textual commands and their output—originates with the scrolls of paper on teletypes.
    [Show full text]
  • Red Hat Codeready Workspaces 2.4 End-User Guide
    Red Hat CodeReady Workspaces 2.4 End-user Guide Using Red Hat CodeReady Workspaces 2.4 Last Updated: 2020-12-18 Red Hat CodeReady Workspaces 2.4 End-user Guide Using Red Hat CodeReady Workspaces 2.4 Robert Kratky [email protected] Michal Maléř [email protected] Fabrice Flore-Thébault [email protected] Yana Hontyk [email protected] Legal Notice Copyright © 2020 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution–Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at http://creativecommons.org/licenses/by-sa/3.0/ . In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, the Red Hat logo, JBoss, OpenShift, Fedora, the Infinity logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux ® is the registered trademark of Linus Torvalds in the United States and other countries. Java ® is a registered trademark of Oracle and/or its affiliates. XFS ® is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL ® is a registered trademark of MySQL AB in the United States, the European Union and other countries.
    [Show full text]
  • Kqueue: a Generic and Scalable Event Notification Facility
    Kqueue: A generic and scalable event notification facility Jonathan Lemon [email protected] FreeBSD Project Abstract delivered to the application, when a file in the filesystem changes in some fashion, or when a process exits. None Applications running on a UNIX platform need to be no- of these are handled efficiently at the moment; signal de- tified when some activity occurs on a socket or other de- livery is limited and expensive, and the other events listed scriptor, and this is traditionally done with the select() or require an inefficient polling model. In addition, neither poll() system calls. However, it has been shown that the poll() nor select() can be used to collect these events, performance of these calls does not scale well with an in- leading to increased code complexity due to use of mul- creasing number of descriptors. These interfaces are also tiple notification interfaces. limited in the respect that they are unable to handle other This paper presents a new mechanism that allows the potentially interesting activities that an application might application to register its interest in a specific event, and be interested in, these might include signals, file system then efficiently collect the notification of the event at a changes, and AIO completions. This paper presents a later time. The set of events that this mechanism covers generic event delivery mechanism, which allows an ap- is shown to include not only those described above, but plication to select from a wide range of event sources, may also be extended to unforeseen event sources with and be notified of activity on these sources in a scalable no modification to the API.
    [Show full text]
  • Oracle Hardware and Systems Support Policies Details
    Oracle Hardware and Systems Support Policies Effective Date: 03-September-2021 Oracle Hardware and Systems Support Policies: 03-September-2021 Page 1 of 29 TABLE OF CONTENTS 1. Overview 3 2. Support Terms 5 3. Lifetime Support 9 4. Oracle Technical Support Levels For Systems 11 5. Additional Services Available For Purchase 23 6. Web-Based Customer Support Systems 25 7. Tools Used To Perform Technical Support Services 25 8. Global Customer Support Data Protection Practices 26 9. Severity Definitions 27 10. Onsite Response Time Targets For Hardware Support 28 11. Contact Information 29 Oracle Hardware and Systems Support Policies: 03-September-2021 Page 2 of 29 1. OVERVIEW Unless otherwise stated, these Hardware and Systems Support Policies apply to technical support for all Oracle server, storage, networking, and point of sale product lines. "You" and "your" refers to the individual or entity that has ordered technical support from Oracle or an Oracle-authorized distributor. For Oracle operating system software, technical support is provided for issues (including problems you create) that are demonstrable in the currently supported release(s) of the operating system, running unaltered, and on a certified hardware configuration, as specified in your order or program documentation. All patches, bug fixes, and other code received from Oracle as part of the support services shall be provided under the terms of the appropriate license agreement that you accepted upon downloading and/or installing the operating system software program(s). Technical support associated with Oracle Linux and Oracle VM may also include the right to use certain additional software or tools during the support period for which fees for the support services have been paid.
    [Show full text]
  • Evolving Languages (5 Steps to Go) [email protected]
    Evolving Languages (5 Steps to Go) [email protected] This talk didn’t accompany a paper, which makes the slides harder to follow on their own. Although the talk might be available in video form, it might be useful to have something that can just be read. After the talk, I’ve added speaker’s notes to help. The talk was prompted by the 10th anniversary of Go’s public release. Originally it was to be on Limbo, but I thought a talk on a (now) obscure predecessor, though easy to do, might not be all that valuable. Coincidentally I read a section in Kernighan’s History of Unix that put Limbo into a sequence of languages on the way to Go. I had a slightly different view of it, not as a strict historic sequence but as the result of design choices prompted by the systems or environments in which the languages were to be used. After I’d started preparing the talk, I discovered a talk by Rob Pike that does look at the languages as more of an incremental development (see http://go-lang.cat-v.org/talks/slides/emerging-languages-camp-2010.pdf) and that can be read for contrast. History 1985 CSP book “Communicating Sequential Processes”: Hoare (esp Occam) 1985 Squeak (“A Language for Communicating with Mice”): Cardelli & Pike 1992 Alef (Plan 9): Winterbottom 1994 Newsqueak (“A Language for Communicating with Mice”): Pike 1996 Limbo (Inferno): Dorward, Pike & Winterbottom (Lucent); Vita Nuova * 2009 Go: Griesemer, Pike & Thompson (Google) * There were two versions of Hoare’s Communicating Sequential Processes.
    [Show full text]