Openam(Opensso) のご紹介

Total Page:16

File Type:pdf, Size:1020Kb

Openam(Opensso) のご紹介 OpenOpen SourceSource SolutionSolution TechnologyTechnology OpenAMOpenAM((OpenSSOOpenSSO)) のご紹介のご紹介 オープンソース・ソリューション・テクノロジ株式会社 2010/12/1 野村 健太郎 Copyright © 2010 Open Source Solution Technology - 1 - 目次 会社紹介 OpenAM(OpenSSO)のご紹介 – 概要、開発の歴史 – シングルサインオン方式 – 認証方式(認証連鎖による多様素認証) – レルムによるユーザー管理 – 冗長化 – 導入事例 OpenAM(OpenSSO)デモ Copyright © 2010 Open Source Solution Technology - 2 - 会社紹介 Copyright © 2010 Open Source Solution Technology - 3 - 会社紹介 オープンソース・ソリューション・テクノロジ株式会社オープンソース・ソリューション・テクノロジ株式会社 OSOSに依存しないに依存しないOSSOSSのソリューションのソリューションを中心に提供を中心に提供 – Windows/Solaris から Linux への移行も支援! OSSOSSを利用した認証基盤構築を利用した認証基盤構築が得意分野が得意分野 – LDAP認証、Windowsドメイン認証、Webアプリケーション認証、 クラウド認証 Samba,OpenLDAP,OpenAM,IDMSamba,OpenLDAP,OpenAM,IDMなどによる認などによる認 証統合証統合//シングルサインオン、シングルサインオン、IDID管理ソリューションを管理ソリューションを 提供提供 – OSSの製品パッケージ・製品サポートを提供 – OSSの改良、バグ修正などコンサルティングにも対応 Copyright © 2010 Open Source Solution Technology - 4 - OSSTechのソリューション領域 システム管理者 ID管理 ID管理 ID管理 Active Directory Google Apps Salesforce ファイルファイルサーバ LDAP Web アプリ クラウド サーバー Windows ドメインログオン ログイン ログイン ユーザー Copyright © 2010 Open Source Solution Technology - 5 - OSSTechのソリューション導入効果 Unicorn IDM ID管理 システム管理者 ID連携 Active Directory Google Apps Salesforce ファイルサーバ Web アプリ ファイル LDAP クラウド サーバー SSO Windows ドメインログオン ログイン ユーザー Copyright © 2010 Open Source Solution Technology - 6 - OpenAM((OpenSSOOpenSSO)) 概要 Copyright © 2010 Open Source Solution Technology - 7 - OpenAMとは Webアプリケーションにおけるシングルサインオンを実 現するためのプラットフォームとなるソフトウェア – シングルサインオン(SSO):一度のログイン操作さえ完了 すれば、複数の Web アプリケーションにログイン操作すること なくログインすることが可能 ユーザー情報を格納するためのユーザーリポジトリ (ユーザーデータストア)として様々な LDAP サーバー 、RDBに対応 – RDBへの対応は OpenAM からサポート開始 SAML、OpenID、OAuth、ID-WSFなどの認証・認 可に関連した複数のプロトコルをサポート Copyright © 2010 Open Source Solution Technology - 8 - OpenAMの歴史 - その1 AOLによる AOLからの 認証連携 オープン 買収 分離 機能の強化 ソース化! 開発 主体 Netscape iPlanet Sun Microsystems 製品名 dsame Identity Server Access Manager OpenSSO Copyright © 2010 Open Source Solution Technology - 9 - OpenAMの歴史 - その2 Oracle OpenSSO は非戦略的な製品 による買収 という位置づけ Sun Oracle OpenSSO Oracle OpenSSO ForgeRock社 Oracleから OpenAM 分離 新プロジェクト OSSTech の開始! との協業 Copyright © 2010 Open Source Solution Technology - 10 - OpenAMのこれから(技術面) OpenAM は OpenSSO の正常進化形 – OpenSSO を担当していたエンジニアが中心になり Forgerock社を設立 – ベースにするソースコードが同じ – 最新の Ver. 9.5 では多量のバグフィックスを適用 – OpenSSOと完全互換 クラウド対応 – Google Apps, Salesforce とのシングルサインオン (SAML)連携機能を強化 – GUI による操作でシングルサインオン設定が可能 機能拡充 – ワンタイムパスワード機能の追加 – ユーザーリポジトリしてRDBをサポート Copyright © 2010 Open Source Solution Technology - 11 - OpenAMのこれから(ビジネス面) ベンダ独自のパッケージングも可能 – 生体認証などの独自認証方式を組み合わせる – ID管理システムと組み合わせる – OSSTech 版 OpenAM の特徴 OpenLDAP 用拡張スキーマを提供 ID管理製品(Unicorn IDM)との組合わせ Google Apps シングルサインオンソリューションを提供 需要 – 日本では多くが新規ユーザー – 企業・大学などの認証基盤として OpenAM を利用 – クラウドにおける認証基盤として OpenAM を利用 – 既存ユーザー(Sun Access Manager、OpenSSO)からの 移行(米国、ヨーロッパ) Copyright © 2010 Open Source Solution Technology - 12 - OpenAMの機能(その1) 多様なシングルサインオン方式 Copyright © 2010 Open Source Solution Technology - 13 - シングルサインオンの方式(1) SAML OpenAM (SAML IdP) ・認証基盤 (1)ログイン Webアプリ (SAML SP) アサーション (認証情報) Web SAML Application ユーザー (2)Webアプリへアクセス WebアプリがSAMLに 対応している必要がある ※この図は、HTTP Redirect Binding/HTTP POST Binding の場合の例です。 Copyright © 2010 Open Source Solution Technology - 14 - シングルサインオンの方式(2) エージェント方式 OpenAM(認証サーバ) (3)Cookieの (1)ログイン 正当性を確認 Webサーバー ユーザ Web Cookie Agent 情報 Application ユーザー (2)Webアプリへアクセス リバースプロキシ方式 リバースプロキシ HTTP Web ヘッダー Application (1)ログイン ユーザー (3)Webアプリへアクセス (2)ユーザー認証 OpenAM (認証サーバ) Copyright © 2010 Open Source Solution Technology - 15 - シングルサインオンの方式(3) 代理認証方式 ID/パスワードを 初回アクセス時のみ 代理で送信する Webアプリ (1)ログイン OpenAM Form認証 ID/パスワード ID PW ユーザー (3)代理認証 (2)ユーザー認証 (4)代理認証後は直接アクセス Copyright © 2010 Open Source Solution Technology - 16 - OpenAMの機能- シングルサインオン SAMLによるシングルサインオン – Secure Assertion Markup Lauguage – 認証、認可、ユーザ属性情報などをXMLで送受信するための フレームワーク – 標準化団体OASISにより策定 – GoogleApps、Salesforceなどが採用 エージェント方式 – SSO対象のWebアプリが動作するサーバー上にアクセス制御 用のモジュールを配置する方式 – サーバーのバージョンに影響を受ける Copyright © 2010 Open Source Solution Technology - 17 - OpenAMの機能 - シングルサインオン リバースプロキシ方式 – リバースプロキシを使用してアクセス制御を行う – ユーザーデータの受け渡しはHTTPヘッダーを利用 – SSO対象Webアプリのバージョンや設定変更の影響が少な い – リバースプロキシが性能上のボトルネックになる可能性がある 代理認証方式 – SSO対象Webアプリの既存ログイン画面に対して、OpenAM がユーザーの代理でログインID/パスワードを送信する – SSO対象Webアプリの改修が不要 – 細かなアクセス制御はできない(ログイン処理の代理実行の み) Copyright © 2010 Open Source Solution Technology - 18 - OpenAMの機能(その2) 認証方式(多様素認証) Copyright © 2010 Open Source Solution Technology - 19 - OpenAMの機能-データストアと認証方式 認証方式 □ワンタイムパスワード □Windows Desktop SSO □クライアント証明書 □外部DB Web □認証連鎖 Application OpenAM ログイン Web ID SSO ログイン PW Application ユーザー Web User Application Data Store ユーザーデータストア (ユーザー情報DB) □Active Directory □OpenLDAP □RDB Copyright © 2010 Open Source Solution Technology - 20 - OpenAMの機能 - 認証方式 基本的には OpenAM のユーザーデータストアに保存 された ID/パスワードにより認証を行なう ユーザー認証時に外部のデータベースを参照すること も可能 – LDAP、Active Directory、RADIUS、RDB(JDBC) よりセキュアな認証方式も使用可能 – ワンタイムパスワード(電子メールを利用) – クライアント証明書による認証 – Windows Desktop SSO(統合Windows認証) 複数の認証方式を組み合わせて使用可能:認証連鎖認証連鎖 Copyright © 2010 Open Source Solution Technology - 21 - OpenAMの機能 - ユーザー情報DB ユーザーデータストア – OpenAMのユーザー情報を格納するLDAPサーバー/データ ベースサーバー Active Directory Open LDAP Sun Directory Server OpenDS(Sun Directory Server のオープンソース版。OpenAMに標 準で組み込まれている) RDB(OpenAMから対応) Copyright © 2010 Open Source Solution Technology - 22 - OpenAMの機能 - 認証連鎖 多様素認証の必要性 – 複数の認証方式を組合わせて認証を行うことにより個々の認 証方式の欠点を補完 認証連鎖認証連鎖 – 複数の認証方式を組み合わせて利用可能 – 認証方式にはそれぞれ適用条件を指定する 必須:失敗したらそこで終了 十分:成功したらそこで終了 必要:成功しても失敗しても次に継続 任意:認証結果には関係しない付随的な処理 認証方式1(必須) 認証方式2(必須) ログイン完了 ID/PW認証 ワンタイムパスワード Copyright © 2010 Open Source Solution Technology - 23 - OpenAMの機能(その3) 「レルム」によるユーザー管理 Copyright © 2010 Open Source Solution Technology - 24 - OpenAMの機能 - レルム 「レルム」:OpenAMの設定を管理するための単位の 以下の設定をレルム単位で管理 – ユーザーデータストア(LDAPベースDN、検索フィルタなども 指定可能) – アクセス制御ポリシー – 認証方式 基本的には、ユーザー情報DB単位でレルムを分ける レルム毎に管理者を置き管理を委任することが可能 Copyright © 2010 Open Source Solution Technology - 25 - OpenAMの機能 - レルム使用の具体例 複数組織(複数の企業など)のシングルサインオン基盤を OpenAM で構築し、組織毎に設定を行なう 組織内に存在する複数の DB を一つのレルムに登録し、全ての ユーザーに同一のシングルサインオン環境を提供する(例B) DB内の特定のユーザーに対してのみ、シングルサイオン可能に する(例C) OpenAM レルムC レルムA レルムB Copyright © 2010 Open Source Solution Technology - 26 - OpenAMの機能(その4) 冗長化 Copyright © 2010 Open Source Solution Technology - 27 - OpenAMの機能 - 冗長化 シングルサーバ構成 OpenAM User Data Store サイト構成 セッション フェールオーバー 構成 Load Balancer Load Balancer OpenAM OpenAM OpenAM OpenAM セッション セッション フォワーディング フォワーディング セッション セッション 情報 情報 User User セッションフェールオーバー Data Data User User Store レプリケーション Store Data Data /マルチマスタ Store レプリケーション Store /マルチマスタ Copyright © 2010 Open Source Solution Technology - 28 - OpenAM(OpenSSO)の 導入事例 Copyright © 2010 Open Source Solution Technology - 29 - 事例紹介 九州工業大学様 – OpenSSO + OpenLDAP を使ったシングルサインオンシステ ムを構築 – シングルサインオン方式 SAML リバースプロキシ その他 Copyright © 2010 Open Source Solution Technology - 30 - OpenAMデモ Copyright © 2010 Open Source Solution Technology - 31 - OpenAM デモ環境 LAN インターネット (ノートPC内に仮想環境を構築) OpenAM (SAML IdP) (SAML SP) Google Apps ログイン Salesforce アサーション (認証情報) ユーザー ※Google Apps の SAML は HTTP Redirect Binding/HTTP POST Binding を採用しています。 Copyright © 2010 Open Source Solution Technology - 32 - OpenAM デモ内容 (1)SAMLによるシングルサインオン – Google Apps と Salesforce にシングルサインオンでアクセ スする (2)認証連鎖 – ワンタイムパスワード認証を追加して二要素認証を行なう Copyright © 2010 Open Source Solution Technology - 33 - まとめ OpenAM(OpenSSO)はシングルサインオンを実現す るための基盤となるソフトウェアです ユーザーの Web アプリへのアクセス時の利便性の向 上・セキュリティの強化に役立ちます OpenAMは長い期間をかけて着実に進化してきました。 今後も開発は継続し、最新の機能が取り込まれていきま す(クラウド対応など) Copyright © 2010 Open Source Solution Technology - 34 - ご清聴ありがとうございました Copyright © 2010 Open Source Solution Technology - 35 - .
Recommended publications
  • Hosting Requirements Smarter Balanced Assessment Consortium – Test Delivery System
    Hosting Requirements Smarter Balanced Assessment Consortium – Test Delivery System American Institutes for Research Revision History Revision Description Author/Modifier Date Initial Release David Lopez de Quintana October 14, 2013 Updated to latest Amazon Web Service instance types and David Lopez de Quintana March 30, 2014 costs Updated concurrent student numbers, RDS IOP Jeff Treuting (Fairway) May 18, 2016 recommendation and AWS instance types Updated for TDS 3.1.0 Release Jeff Johnson (Fairway) July 10, 2017 Hosting Requirements Smarter Balanced Assessment Consortium Test Delivery System Contents Purpose ......................................................................................................................................................... 4 System Overview .......................................................................................................................................... 4 Component Software ................................................................................................................................... 6 Development/Operation Software Packages 6 Software Packages by Component 7 Deployment Assumptions .......................................................................................................................... 10 Deployment Configurations ....................................................................................................................... 10 Test Delivery Unit 11 Elastic Load Balancer 13 Web Server Instance Type 13 AWS ElastiCache – Redis Cluster
    [Show full text]
  • Getting Started with Openam / Openam 13.5
    Getting Started With OpenAM / OpenAM 13.5 Latest update: 13.5.2 Mark Craig Gene Hirayama ForgeRock AS 201 Mission St, Suite 2900 San Francisco, CA 94105, USA +1 415-599-1100 (US) www.forgerock.com Copyright © 2013-2018 ForgeRock AS. Abstract Quick introduction to OpenAM for new users and readers evaluating the product. OpenAM provides open source Authentication, Authorization, Entitlement, and Federation software. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/3.0/ or send a letter to Creative Commons, 444 Castro Street, Suite 900, Mountain View, California, 94041, USA. ForgeRock® and ForgeRock Identity Platform™ are trademarks of ForgeRock Inc. or its subsidiaries in the U.S. and in other countries. Trademarks are the property of their respective owners. UNLESS OTHERWISE MUTUALLY AGREED BY THE PARTIES IN WRITING, LICENSOR OFFERS THE WORK AS-IS AND MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND CONCERNING THE WORK, EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, INCLUDING, WITHOUT LIMITATION, WARRANTIES OF TITLE, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT, OR THE ABSENCE OF LATENT OR OTHER DEFECTS, ACCURACY, OR THE PRESENCE OF ABSENCE OF ERRORS, WHETHER OR NOT DISCOVERABLE. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO SUCH EXCLUSION MAY NOT APPLY TO YOU. EXCEPT TO THE EXTENT REQUIRED BY APPLICABLE LAW, IN NO EVENT WILL LICENSOR BE LIABLE TO YOU ON ANY LEGAL THEORY FOR ANY SPECIAL, INCIDENTAL, CONSEQUENTIAL, PUNITIVE OR EXEMPLARY DAMAGES ARISING OUT OF THIS LICENSE OR THE USE OF THE WORK, EVEN IF LICENSOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • ADFS3 and Openam 12 - Part 5: Centos/Openam Install Overview
    ADFS3 and OpenAM 12 - Part 5: CentOS/OpenAM install Overview This is Part 5 of a series of articles describing how to integrate Open AM v12 and ADFS 3 (2012 R2). See:ADFS 3 (Windows 2012 R2) and OpenAM 12. In order to demonstrate this we need an OpenAM instance that will become a trusted 'Claims Provider' configured in ADFS. If you already have an instance of OpenAM running and configured with SSL, then feel free to skip this part. Otherwise, the steps in this part assume assum e very limited knowledge of CentOS and OpenAM. There are plenty of other articles on this wiki, backstage.forgerock. com and the internet that describe, in more detail, the installation and configuration of CentOS and OpenAM. However, the steps here provide a shortcut to installing the environment for those who just want to prove the integration works. Whilst this part in the series can standalone from the previous parts (as they were all on the Windows machine) you should familiarise yourself with those steps because Part 6 will it all together. The previous parts are ADFS3 and OpenAM 12 - Part 1: Windows/IIS/Sample App, ADFS3 and OpenAM 12 - Part 2: Certificate Services, ADFS3 and OpenAM 12 - Part 3: ADFS Install, and ADFS3 and OpenAM 12 - Part 4: ADFS/WIF/Sample App First, we'll download and install a CentOS image as the 2nd Virtual Machine in VirtualBox, then we'll install and configure an OpenAM instance. In between we'll also install the Java Development Kit, Tomcat (the JEE container we'll use for OpenAM), configure SSL, tweak the 'hosts' file and the CentOS firewall.
    [Show full text]
  • Guide to Open Source Solutions
    White paper ___________________________ Guide to open source solutions “Guide to open source by Smile ” Page 2 PREAMBLE SMILE Smile is a company of engineers specialising in the implementing of open source solutions OM and the integrating of systems relying on open source. Smile is member of APRIL, the C . association for the promotion and defence of free software, Alliance Libre, PLOSS, and PLOSS RA, which are regional cluster associations of free software companies. OSS Smile has 600 throughout the World which makes it the largest company in Europe - specialising in open source. Since approximately 2000, Smile has been actively supervising developments in technology which enables it to discover the most promising open source products, to qualify and assess them so as to offer its clients the most accomplished, robust and sustainable products. SMILE . This approach has led to a range of white papers covering various fields of application: Content management (2004), portals (2005), business intelligence (2006), PHP frameworks (2007), virtualisation (2007), and electronic document management (2008), as well as PGIs/ERPs (2008). Among the works published in 2009, we would also cite “open source VPN’s”, “Firewall open source flow control”, and “Middleware”, within the framework of the WWW “System and Infrastructure” collection. Each of these works presents a selection of best open source solutions for the domain in question, their respective qualities as well as operational feedback. As open source solutions continue to acquire new domains, Smile will be there to help its clients benefit from these in a risk-free way. Smile is present in the European IT landscape as the integration architect of choice to support the largest companies in the adoption of the best open source solutions.
    [Show full text]
  • Protection Des Applications Web Avec Openam
    Protection des Applications Web avec OpenAM Ludovic Poitou RMLL: Rencontres Mondiales du Logiciel Libre - 2011 Wednesday, July 13, 2011 A Propos... Ludovic Poitou • Product Manager @ ForgeRock • OpenDJ : Open Source LDAP Directory Services • Community Manager et Contributeur • Architecte et Community Manager @ Sun Microsystems • Développeur polyglote mais spécialisé en LDAP et Java • Photographe amateur 2 Wednesday, July 13, 2011 Ce qu’il faut en retenir ForgeRock est un éditeur de logiciel FLOSS, spécialisé dans la gestion d’identité et la sécurité OpenAM une solution d’Authentification, Autorisation, Fédération et Gestion des Privileges La Passerelle Universelle permet de faire du Web SSO sans modifier les applications Disponible en logiciel libre : • http://openam.forgerock.org • http://forgerock.com/openam.html 3 Wednesday, July 13, 2011 ForgeRock Editeur de logiciels, 100 % open source ForgeRock.com Enterprise Open Source Software Fondée le 1er Février 2010 Grenoble, ForgeRock ForgeRock ForgeRock ForgeRock ForgeRock Engineering Center Norway USA UK France 35 Employés distribués sur Avril 2011, Acquisition de l’ensemble du globe ApexIdentity Un éco-système de Partenaires Consulting partners Training partners Presence through partners Souscriptions de Support et Formation* 4 4 Wednesday, July 13, 2011 ForgeRock - Identity & Access Management Users/systems Identity Services Managed resources Identity Management Registration & Self-Service Reconciliation Auditing & Compliance Provisioning Portals, applications, webservices Workflow &
    [Show full text]
  • It Is I, SAML
    It is I, SAML Ana Mandić Development Lead @ Five Minutes Ltd About Five Minutes • We design and develop top notch mobile apps for leading mobile platforms • 50 full-time employees • Offices in Zagreb, Osijek and New York • Privately owned, founded in 2007. • Platforms we master: SAML • SAML - Security Assertion Markup Language • SAML addresses the web browser single sign-on (SSO) problem • IdP – Identity provider • SP – Service provider • OpenID protocol The SAML Use Case OpenAM • OpenAM is an open source access management, entitlements and federation server platform History: • OpenSSO - announced by Sun Microsystems in July 2005 • In February 2010 Oracle completed their acquisition of Sun Microsystems and shortly thereafter removed OpenSSO • ForgeRock announced in February 2010 that they would continue to develop and support OpenSSO and renamed the product OpenAM Fedlet • Fedlet is a small web application that can do federation in your service provider application with OpenAM acting as the identity provider • Redirects to OpenAM for single sign on and retrieves SAML assertions • Three ways of integration with Java Web Applications Structure of Fedlet zip • conf/ - folder with configuration files which needs to be copied on your server and added to classpath • fedlet.war – saml2/jsp/ - JSPs to initiate single sign on and single logout, to handle error and for obtaining Fedlet metadata – /WEB-INF/classes/ - set of properties files – /WEB-INF/lib/ - opensso-sharedlib.jar, openfedlib.jar Fedlet integration Steps to include Fedlet inside your
    [Show full text]
  • Download Java Ee Jdk Without Glassfish
    Download java ee jdk without glassfish Is there any way I can install the Java EE SDK without the GlassFish Java because a bundle download package of Netbeans + the JDK exists. What you're asking is "can I get all the EE components" as a single download without GlassFish, NetBeans, etc. Well its helpful to know what. I assume you want the Java EE 6 API jar so you can write EJB applications Without Maven, you can download the jar from the repository. If your JDK installation is tied to the GlassFish application server, you (). Hi all is it possible to download Java EE SDK without GlassFish/GlassFish setup? Please I need a JDK I mean the latest one. The programs in my textbook are no more compiling guess it's kind of old. Please help. “Java Platform, Enterprise Edition 6 SDK Update 4 (with JDK 7u11)” or. java ee jdk without glassfish Download Link ?keyword=java-ee-jdk-without- glassfish&charset=utf-8 =========> java ee jdk without. GlassFish is the Open Source Java EE Reference Implementation; as such, we welcome external contributions. Make sure to read our Pull Request acceptance. Java EE 8 Tutorial Component. NetBeans IDE. Apache You can download JDK software from To Install NetBeans IDE without GlassFish Server. When you. Want all of our free Java training videos? Visit our Learning Library, which features all of our training courses. JDK 8 is required to use JavaFX 8 features in NetBeans IDE This download option also includes GlassFish Server Open Source Edition , from the Java EE download, launch the installer and select the Apache.
    [Show full text]
  • Site Reliability Engineers (SRE) Ensure Our Platform Scales, Handling Operations with a Software Engineering Approach
    Site Reliability Engineers (SRE) ensure our platform scales, handling operations with a software engineering approach. Criteo production systems that run products used by over 11k publishers and 8k e-commerce companies. These products create relevant digital ads in REAL-TIME and cross-devices in 50ms, half a million times per second. The operations platform is one of the largest commercial system in the world - spread across three continents and 8 datacenters with more than 17,000 servers. The Identity Management (IDM) team ensures that all Criteo environments and apps are reachable by the right people or service in a robust and effective manner. The mission is to develop and improve a system that authenticates and authorizes users and services on the worldwide production platform, both at infrastructure and application level, spanning over multiple Data Centers. The mission includes ownership and evolutions of the following components and services: • 3rd party identity management, entitlement and federation services such as Microsoft Identity Manager, Active Directory, OpenDJ and OpenAM • Kerberos everywhere on the infrastructure, including one of the largest Hadoop clusters worldwide • In-house application to handle authorizations at application level • In-house signatures infrastructure to handle service and user authentication Criteo’s significant growth provides you an opportunity to strategically influence the evolution of our production platform, processes, methodologies, technologies and so much more. You will be involved in decision making and in rolling out the changes with your team. Your ability to adapt to a fast moving environment will be a key element to our success. Your technical background and autonomy will help you fit in the IDM team.
    [Show full text]
  • Java Agents 5
    User Guide / Java Agents 5 Latest update: 5.0.1.1 ForgeRock AS 201 Mission St., Suite 2900 San Francisco, CA 94105, USA +1 415-599-1100 (US) www.forgerock.com Copyright © 2011-2017 ForgeRock AS. Abstract Guide to installing and managing ForgeRock® Access Management Java agents. ForgeRock Access Management provides open source authentication, authorization, entitlement, and federation software. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/3.0/ or send a letter to Creative Commons, 444 Castro Street, Suite 900, Mountain View, California, 94041, USA. ForgeRock® and ForgeRock Identity Platform™ are trademarks of ForgeRock Inc. or its subsidiaries in the U.S. and in other countries. Trademarks are the property of their respective owners. UNLESS OTHERWISE MUTUALLY AGREED BY THE PARTIES IN WRITING, LICENSOR OFFERS THE WORK AS-IS AND MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND CONCERNING THE WORK, EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, INCLUDING, WITHOUT LIMITATION, WARRANTIES OF TITLE, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT, OR THE ABSENCE OF LATENT OR OTHER DEFECTS, ACCURACY, OR THE PRESENCE OF ABSENCE OF ERRORS, WHETHER OR NOT DISCOVERABLE. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO SUCH EXCLUSION MAY NOT APPLY TO YOU. EXCEPT TO THE EXTENT REQUIRED BY APPLICABLE LAW, IN NO EVENT WILL LICENSOR BE LIABLE TO YOU ON ANY LEGAL THEORY FOR ANY SPECIAL, INCIDENTAL, CONSEQUENTIAL, PUNITIVE OR EXEMPLARY DAMAGES ARISING OUT OF THIS LICENSE OR THE USE OF THE WORK, EVEN IF LICENSOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Meddream DICOM Viewer Servicing MANUAL (Version 6.1.1)
    UAB Softneta K. Barsausko st. 59, LT 51423 Kaunas, Lithuania [email protected] www.softneta.com MedDream DICOM Viewer Servicing MANUAL (version 6.1.1) © 2017, Softneta UAB, Kaunas All rights reserved in the event of granting of patents or registration as a utility patent. All names of companies and products mentioned in this user’s manual may be trademarks or registered trade- marks. References to products of other manufacturers are for information purposes only. Such references are intended neither as an approval nor a recommendation of these products. Softneta UAB accepts no liability for the performance or use of such products. Other brand names, software and hardware names used in this user’s manual are subject to trademark or patent protection. The quoting of products is for informational purposes only and does not represent a trademark misuse. This Servicing Manual is protected by copyright. Unless expressly authorized in writing, dissemination, duplication or other commercial exploitation of this documentation set or communication of its contents or parts of it is not permitted. In case of infringement, the violator may be liable to pay compensation for damages. Specifications due to technical developments are subject to change. This Servicing Manual is not subject to the revision service. Please contact the manufacturer or authorized dealer to request the latest edition of Servicing Manual. i Table of Contents 1 Introduction 1 2 Minimal server side requirements1 2.1 Minimal hardware requirements.....................................1
    [Show full text]
  • Plantilla Tesis
    Universidad de San Carlos de Guatemala Facultad de Ingeniería Escuela de Ingeniería en Ciencias y Sistemas IMPLEMENTACIÓN DEL SISTEMA CENTRALIZADO DE AUTENTICACIÓN Y AUTORIZACIÓN PARA LAS APLICACIONES WEB DEL CENTRO DE CÁLCULO E INVESTIGACIÓN DE LA FACULTAD DE INGENIERÍA DE LA UNIVERSIDAD DE SAN CARLOS DE GUATEMALA Juan Luis Angel Cano Moreno Asesorado por la Inga. Wendy Lissette Juárez Marroquín Guatemala, noviembre de 2014 UNIVERSIDAD DE SAN CARLOS DE GUATEMALA FACULTAD DE INGENIERÍA IMPLEMENTACIÓN DEL SISTEMA CENTRALIZADO DE AUTENTICACIÓN Y AUTORIZACIÓN PARA LAS APLICACIONES WEB DEL CENTRO DE CÁLCULO E INVESTIGACIÓN DE LA FACULTAD DE INGENIERÍA DE LA UNIVERSIDAD DE SAN CARLOS DE GUATEMALA TRABAJO DE GRADUACIÓN PRESENTADO A JUNTA DIRECTIVA DE LA FACULTAD DE INGENIERÍA POR JUAN LUIS ANGEL CANO MORENO ASESORADO POR LA ING. WENDY LISSETTE JUÁREZ MARROQUÍN AL CONFERÍRSELE EL TÍTULO DE INGENIERO EN CIENCIAS Y SISTEMAS GUATEMALA, NOVIEMBRE DE 2014 UNIVERSIDAD DE SAN CARLOS DE GUATEMALA FACULTAD DE INGENIERÍA NÓMINA DE JUNTA DIRECTIVA DECANO Ing. Murphy Olympo Paiz Recinos VOCAL I Ing. Alfredo Enrique Beber Aceituno VOCAL II Ing. Pedro Antonio Aguilar Polanco VOCAL III Inga. Elvia Miriam Ruballos Samayoa VOCAL IV Br. Narda Lucía Pacay Barrientos VOCAL V Br. Walter Rafael Véliz Muñoz SECRETARIO Ing. Hugo Humberto Rivera Pérez TRIBUNAL QUE PRACTICÓ EL EXAMEN GENERAL PRIVADO DECANO Ing. Murphy Olympo Paiz Recinos EXAMINADOR Ing. Marlon Antonio Perez Türk EXAMINADORA Inga. Floriza Felipa Ávila Pesquera de Medinilla EXAMINADORA Inga. Susán Verónica Gudiel Herrera SECRETARIO Ing. Hugo Humberto Rivera Pérez ACTO QUE DEDICO A: Mis padres Por creer siempre en mí, enseñarme los principios y valores que son fundamentales para alcanzar mis metas, además de su amor y cariño que me brindan día a día.
    [Show full text]
  • Devops Release Notes / Forgerock Identity Platform 6.5
    DevOps Release Notes / ForgeRock Identity Platform 6.5 Latest update: 6.5.2 Gina Cariaga David Goldsmith Shankar Raman ForgeRock AS. 201 Mission St., Suite 2900 San Francisco, CA 94105, USA +1 415-599-1100 (US) www.forgerock.com Copyright © 2018 ForgeRock AS. Abstract Information for deploying ForgeRock Identity Platform™ version 6.5 in DevOps environments. Includes late-breaking news about features, known issues, and using the forgeops repository. This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License. To view a copy of this license, visit https://creativecommons.org/licenses/by-nc-nd/3.0/ or send a letter to Creative Commons, 444 Castro Street, Suite 900, Mountain View, California, 94041, USA. ForgeRock® and ForgeRock Identity Platform™ are trademarks of ForgeRock Inc. or its subsidiaries in the U.S. and in other countries. Trademarks are the property of their respective owners. UNLESS OTHERWISE MUTUALLY AGREED BY THE PARTIES IN WRITING, LICENSOR OFFERS THE WORK AS-IS AND MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND CONCERNING THE WORK, EXPRESS, IMPLIED, STATUTORY OR OTHERWISE, INCLUDING, WITHOUT LIMITATION, WARRANTIES OF TITLE, MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, NONINFRINGEMENT, OR THE ABSENCE OF LATENT OR OTHER DEFECTS, ACCURACY, OR THE PRESENCE OF ABSENCE OF ERRORS, WHETHER OR NOT DISCOVERABLE. SOME JURISDICTIONS DO NOT ALLOW THE EXCLUSION OF IMPLIED WARRANTIES, SO SUCH EXCLUSION MAY NOT APPLY TO YOU. EXCEPT TO THE EXTENT REQUIRED BY APPLICABLE LAW, IN NO EVENT WILL LICENSOR BE LIABLE TO YOU ON ANY LEGAL THEORY FOR ANY SPECIAL, INCIDENTAL, CONSEQUENTIAL, PUNITIVE OR EXEMPLARY DAMAGES ARISING OUT OF THIS LICENSE OR THE USE OF THE WORK, EVEN IF LICENSOR HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]