Brno University of Technology Active
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Zentyal, El Servidor Linux Para Pymes
Zentyal, el servidor Linux para PYMEs Olvide las tareas complejas y repetiti- Zentyal es un servidor Linux para PYMEs, la alternativa en software libre a Windows Small vas para el manejo Business Server. Basado en Ubuntu, Zentyal permite administrar todos los servicios de una red informática, tales como el acceso a Internet, la seguridad y la infraestructura de la red, los de su red informática recursos compartidos o las comunicaciones, a través de una única plataforma. Todas estas funcionalidades están estrechamente integradas, automatizando la mayoría de las tareas y ahorrando tiempo en la administración de sistemas. El código abierto está ampliamente difundido Características clave Zentyal es un software de código abierto, el cual se puede descargar libremente de Internet. Gestiona fácilmente toda la infraestructura TIC de una Actualmente, existen decenas de miles de implantaciones en todo el mundo, superando las PYME 30.000 descargas mensuales y con una comunidad de unos 2.500 colaboradores activos. Igualmente, Zentyal (antes conocido como eBox Platform) es parte integral de la distribución Acceso al correo de la empresa Ubuntu desde 2008, lo que ayuda a aumentar su difusión y credibilidad como producto tec- desde el celular, el portátil o la nológico. Su uso está extendido a prácticamente todos los países del globo, siendo Estados web independientemente de su Unidos, Alemania, España, Italia y Brasil los países que cuentan con más instalaciones. Zentyal ubicación se usa principalmente en PYMEs, pero también en otros entornos como -
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme
National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme Common Criteria Evaluation and Validation Scheme Validation Report Nexor MMHS Security Report Number: CCEVS-VR-05-0095 Dated: 14 March 2005 National Institute of Standards and Technology National Security Agency Information Technology Laboratory Information Assurance Directorate 100 Bureau Drive 9800 Savage Road STE 6740 Gaithersburg, MD 20899 Fort George G. Meade, MD 20755-6740 Nexor MMHS Security Validation Report ACKNOWLEDGEMENTS Validation Team Dr. Jerome Myers The Aerospace Corporation Columbia, Maryland Common Criteria Testing Laboratory Science Applications International Corporation Common Criteria Testing Laboratory 7125 Columbia Gateway Drive, Suite 300 Columbia, Maryland 21046 2 Nexor MMHS Security Validation Report Table of Contents 1 EXECUTIVE SUMMARY____________________________________________ 4 2 Identification ______________________________________________________ 5 3 Security Policy _____________________________________________________ 7 3.1 Communications Policy _______________________________________________ 7 3.2 User Data Protection Policy ____________________________________________ 7 3.3 Identification and Authentication Policy _________________________________ 8 3.4 Management Policy___________________________________________________ 8 4 Assumptions and Clarification of Scope_________________________________ 9 4.1 Usage Assumptions ___________________________________________________ 9 4.2 Clarification of Scope _________________________________________________ -
Guida a Ubuntu Server
Capitolo 6. Amministrazione remota Ci sono diversi modi per amministrare un server Linux da remoto; questa sezione illustra due dei metodi più comuni, come OpenSSH e Puppet. 81 Amministrazione remota 1. Server OpenSSH 1.1. Introduzione Questa sezione della Guida a Ubuntu server introduce una serie di potenti strumenti per il controllo remoto di computer e per il trasferimento di dati tra i computer in rete chiamata OpenSSH. Vengono spiegate alcune delle possibili impostazioni dell'applicazione server OpenSSH e come modificarne la configurazione in Ubuntu. OpenSSH è una versione libera della famiglia di protocolli e strumenti SSH (Secure SHell) per il controllo remoto di un computer o per il trasferimento di file tra computer. Gli strumenti tradizionali usati per svolgere queste funzioni, come telnet o rcp, sono insicuri e quando utilizzati trasmettono la password dell'utente in chiaro. OpenSSH fornisce un demone server e degli strumenti lato client per facilitare operazioni di controllo remoto e trasferimento di file in sicurezza e con crittografia, sostituendo in modo completo gli strumenti tradizionali. Il componente server di OpenSSH, sshd, è in ascolto continuo per le connessioni in arrivo dei client, qualunque sia lo strumento usato sui client. Quando avviene una richiesta di connessione, per mezzo di sshd viene impostata la corretta connessione in base allo strumento utilizzato dal client. Per esempio, se il computer remoto sta effettuando una connessione con l'applicazione client ssh, il server OpenSSH imposta, dopo l'autenticazione, una sessione di controllo remoto. Se un utente remoto si connette a un server OpenSSH con scp, il demone server OpenSSH inizializza, dopo l'autenticazione, una procedura di copia sicura di file tra il server e il client. -
Ubuntu Server Guide Ubuntu Server Guide Copyright © 2016 Contributors to the Document
Ubuntu Server Guide Ubuntu Server Guide Copyright © 2016 Contributors to the document Abstract Welcome to the Ubuntu Server Guide! It contains information on how to install and configure various server applications on your Ubuntu system to fit your needs. It is a step-by-step, task-oriented guide for configuring and customizing your system. Credits and License This document is maintained by the Ubuntu documentation team (https://wiki.ubuntu.com/DocumentationTeam). A list of contributors is below. This document is made available under the Creative Commons ShareAlike 3.0 License (CC-BY-SA). You are free to modify, extend, and improve the Ubuntu documentation source code under the terms of this license. All derivative works must be released under this license. This documentation is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE AS DESCRIBED IN THE DISCLAIMER. A copy of the license is available here: Creative Commons ShareAlike License1. Contributors to this document are: • Members of the Ubuntu Documentation Project2 • Members of the Ubuntu Server Team3 • Contributors to the Community Help Wiki4 • Other contributors can be found in the revision history of the serverguide5 and ubuntu-docs6 bzr branches available on Launchpad. 1 https://creativecommons.org/licenses/by-sa/3.0/ 2 https://launchpad.net/~ubuntu-core-doc 3 https://launchpad.net/~ubuntu-server 4 https://help.ubuntu.com/community/ 5 https://bazaar.launchpad.net/~ubuntu-core-doc/serverguide/trunk/changes 6 https://bazaar.launchpad.net/~ubuntu-core-doc/ubuntu-docs/trunk/changes Table of Contents 1. -
Windows 2000 Kerberos Authentication
Operating System Windows 2000 Kerberos Authentication White Paper Abstract The next generation of the Microsoft® Windows® operating system will adopt Kerberos as the default protocol for network authentication. An emerging standard, Kerberos provides a foundation for interoperability while enhancing the security of enterprise-wide network authentication. Windows 2000 implements Kerberos version 5 with extensions for public key authentication. The Kerberos client is implemented as a security provider through the Security Support Provider Interface. Initial authentication is integrated with the Winlogon single sign-on architecture. The Kerberos Key Distribution Center (KDC) is integrated with other Windows 2000 security services running on the domain controller and uses the domain’s Active Directory as its security account database. This white paper examines components of the protocol and provides detail on its implementation. © 1999 Microsoft Corporation. All rights reserved. The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the date of publication. Because Microsoft must respond to changing market conditions, it should not be interpreted to be a commitment on the part of Microsoft, and Microsoft cannot guarantee the accuracy of any information presented after the date of publication. This white paper is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Microsoft, Active Desktop, BackOffice, the BackOffice logo, -
MS-ADSO]: Active Directory System Overview
[MS-ADSO]: Active Directory System Overview Intellectual Property Rights Notice for Open Specifications Documentation . Technical Documentation. Microsoft publishes Open Specifications documentation for protocols, file formats, languages, standards as well as overviews of the interaction among each of these technologies. Copyrights. This documentation is covered by Microsoft copyrights. Regardless of any other terms that are contained in the terms of use for the Microsoft website that hosts this documentation, you may make copies of it in order to develop implementations of the technologies described in the Open Specifications and may distribute portions of it in your implementations using these technologies or your documentation as necessary to properly document the implementation. You may also distribute in your implementation, with or without modification, any schema, IDL’s, or code samples that are included in the documentation. This permission also applies to any documents that are referenced in the Open Specifications. No Trade Secrets. Microsoft does not claim any trade secret rights in this documentation. Patents. Microsoft has patents that may cover your implementations of the technologies described in the Open Specifications. Neither this notice nor Microsoft's delivery of the documentation grants any licenses under those or any other Microsoft patents. However, a given Open Specification may be covered by Microsoft Open Specification Promise or the Community Promise. If you would prefer a written license, or if the technologies described in the Open Specifications are not covered by the Open Specifications Promise or Community Promise, as applicable, patent licenses are available by contacting [email protected]. Trademarks. The names of companies and products contained in this documentation may be covered by trademarks or similar intellectual property rights. -
Ingeniero En Sistemas Informáticos Tema: Virtual
UNIVERSIDAD TECNOLÓGICA ISRAEL TRABAJO DE TITULACIÓN EN OPCIÓN AL GRADO DE: INGENIERO EN SISTEMAS INFORMÁTICOS TEMA: VIRTUALIZACIÓN DE LOS SERVICIOS TECNOLÓGICOS CON SOFTWARE LIBRE EN EL HOSPITAL GERIÁTRICO DR. BOLÍVAR ARGUELLO PROAÑO DE LA CIUDAD DE RIOBAMBA (“HGBA”). AUTORES: SILVA PILLAJO RICHARD JESÚS GALLARDO DELGADO FELIPE ESTEBAN TUTOR: MG. IVÁN FERNANDO ANDOCILLA OLEAS QUITO, ECUADOR 2018 DECLARACIÓN DE AUTORÍA El documento de tesis con título: “VIRTUALIZACIÓN DE LOS SERVICIOS TECNOLÓGICOS CON SOFTWARE LIBRE EN EL HOSPITAL GERIÁTRICO DR. BOLÍVAR ARGUELLO PROAÑO DE LA CIUDAD DE RIOBAMBA (“HGBA”)”, ha sido desarrollado por los señores GALLARDO DELGADO FELIPE ESTEBAN y SILVA PILLAJO RICHARD JESÚS con C.C. No. 1725483349 y C.C. No 1712161106 respectivamente, personas que poseen los derechos de autoría y responsabilidad, restringiéndose la copia o utilización de la información de esta tesis sin previa autorización. ________________ FELIPE ESTEBAN GALLARDO DELGADO ________________ RICHARD JESÚS SILVA PILLAJO i UNIVERSIDAD TECNOLÓGICA ISRAEL APROBACIÓN DEL TUTOR En mi calidad de tutor del trabajo de titulación certifico: Que el trabajo de titulación VIRTUALIZACIÓN DE LOS SERVICIOS TECNOLÓGICOS CON SOFTWARE LIBRE EN EL HOSPITAL GERIÁTRICO DR. BOLÍVAR ARGUELLO PROAÑO DE LA CIUDAD DE RIOBAMBA (“HGBA”). Presentado por los señores: GALLARDO DELGADO FELIPE ESTEBAN, SILVA PILLAJO RICHARD JESÚS estudiantes de la carrera de Sistemas de Información, reúnen los requisitos y méritos suficientes para ser sometidos a la evaluación del Tribunal de Grado, que se designe, para su correspondiente estudio y calificación. Quito D.M. Junio del 2018 TUTOR ……………………………. Ing. Iván Andocilla ii DEDICATORIA En cada una de las letras de este proyecto va dedicado a nuestros padres quienes nos apoyaron para seguir adelante en la vida, y a los profesores de la Universidad Tecnológica Israel quienes en todo este tiempo nos supieron instruir en valores y conocimientos. -
IBM Tivoli Monitoring: Active Directory Agent: User™S Guide
® Tivoli Monitoring: Active Directory Agent Version 6.2.0 User’s Guide SC32-9444-01 ® Tivoli Monitoring: Active Directory Agent Version 6.2.0 User’s Guide SC32-9444-01 Note Before using this information and the product it supports, read the information in “Notices” on page 121. This edition applies to version 6.2 of IBM Tivoli Monitoring: Active Directory Agent (product number 5724-C71) and to all subsequent releases and modifications until otherwise indicated in new editions. © Copyright International Business Machines Corporation 2005, 2007. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. © Copyright International Business Machines Corporation 2007. All rights reserved. US Government Users Restricted Rights – Use, duplication or disclosure restricted by GSA ADP Schedule Contract with IBM Corp. Contents Tables . .v Chapter 5. Attributes reference . .21 About attributes . .21 Chapter 1. Overview of the Monitoring More information about attributes . .21 Attribute groups and attributes for the Monitoring Agent for Active Directory . .1 Agent for Active Directory . .21 IBM Tivoli Monitoring overview . .1 Address Book attributes . .22 Features of the Monitoring Agent for Active DHCP attributes . .23 Directory . .1 Directory Services attributes . .24 New in this release . .2 DNS_ADIntegrated attributes . .26 Monitoring Agent for Active Directory components .3 DNS attributes . .27 User interface options . .3 Domain Controller Availability attributes . .29 Domain Controller Performance attributes . .31 Chapter 2. Requirements for the Exchange Directory Services attributes . .32 monitoring agent . .5 File Replication Service attributes . .33 Running as a non-Administrator user . .7 Group Policy Object attributes . .34 Ping variables . -
Zentyal Server Offers Native Microsoft® Exchange and Active Directory® Protocols on Linux
Zentyal Server Zentyal Server offers native Microsoft® Exchange and Active Directory® protocols on Linux. Zentyal Mail Native interoperability with Microsoft® Exchange Server Protocols and Microsoft Active Directory® means your Outlook® just works. It makes integration easy and saves you money. + Native compatibility with Microsoft® Exchange Server Protocols. + Native compatibility with Microsoft Active Directory®. + Multiple Virtual Mail Domains. + Email, Calendars & Contacts. + Native Microsoft Outlook® Support. + Support for Mobile Devices. Zentyal Directory Includes Native compatibility with Microsoft Active Directory®. You can control your IT infrastructure from a single point of user management, regardless of the different offices and locations your business has. + Native compatibility with Microsoft Active Directory®. + Central Management of Users & Groups. + Native Support for Windows® hosts. Request your trial at www.zentyal.com/trial Zentyal Server www.zentyal.com | [email protected] Technical Specifications Zentyal Mail Zentyal Directory Native compatibility with Microsoft® Exchange Server Protocols Native compatibility with Microsoft Active Directory® Software integrated: OpenChange®, Postfix, Dovecot, Sieve, Fetchmail Central domain directory management Native compatibility with Microsoft Active Directory® Users, Security Groups, Distribution Lists, Contacts Single Sign-On (SSO) authentication Multiple Organizational Units (OUs) & Group Policy Objects (GPOs) Administration through Zentyal or Microsoft Active Directory® NETLOGON -
Active Directory Replication Model Works - Directory Services: Windows
How the Active Directory Replication Model Works - Directory Services: Windows ... Pagina 1 di 25 How the Active Directory Replication Model Works In this section Active Directory Replication Model Architecture Active Directory Replication Model Physical Structure Active Directory Data Updates Domain Controller Notification of Changes Identifying and Locating Replication Partners Urgent Replication Network Ports Used by Active Directory Replication Related Information Active Directory data takes the form of objects that have properties, or attributes. Each object is an instance of an object class, and object classes and their respective attributes are defined in the Active Directory schema. The values of the attributes define the object, and a change to a value of an attribute must be transferred from the domain controller on which it occurs to every other domain controller that stores a replica of that object. Thus, Active Directory replicates directory data updates at the attribute level. In addition, updates from the same directory partition are replicated as a unit to the corresponding replica on the destination domain controller over the same connection to optimize network usage. The information in this section applies to organizations that are designing, deploying, or operating an Active Directory infrastructure that satisfies the following requirements: A Domain Name System (DNS) infrastructure is in place that manages the name resolution for domain controllers in the forest. Active Directory-integrated DNS is assumed, wherein DNS zone data is stored in Active Directory and is replicated to all domain controllers that are DNS servers. All Active Directory sites have local area network (LAN) connectivity. IP connectivity is available between all datacenter locations and branch sites. -
Activesync Compatibility (Z-Push)
Zarafa Mobile Compatibility – September 2013 BlackBerry Enterprise Server (BES) ActiveSync compatibility (Z-Push) Delft | Hannover | Stuttgart | Belo Horizonte Elektronicaweg 20, 2628 XG Delft | T: +31 15 2517715 | www.zarafa.com | [email protected] Zarafa Mobile Compatibility – September 2013 Introduction Zarafa enables end users to work with mobile devices using different technologies. Our main focus is to provide the best mobile experience and integration of ActiveSync compatible devices over Z-Push (http://z-push.sf.org ) for push mail, calendars tasks and notes. BlackBerry BlackBerry has enabled Activesync support in their latest series with the BlackBerry 10 operating system. Z-Push development followed this move and provides full support of this device class. Zarafa equally adjusted to the changed strategy and will not support BES for these newer series. Older BlackBerry devices can be integrated over RIM infrastructure using the BlackBerry Enterprise Server (BES) version 4 and 5, BlackBerry Professional Software (BPS) version 4 and BlackBerry Enterprise Server Express. See a brief overview of the supported versions below. Other informations and additional informations about the BlackBerry integration can be found in the Zarafa wiki . Please check the supported BES version list before installation: Supported versions 4.1.0 to 4.1.3 Unknown 4.1.4 to 4.1.6 Known to work 4.1.7 Does not work 5.0.1 to 5.0.2 Working with ZCP 6.30.15+, 6.40.x and 7.0 5.0.3 Working with ZCP 6.40.10+, 7.0.1+ and 7.1.x Later versions Not supported anymore. Please use Z-Push synchronization. -
CEPH, Zarafa, Samba & Co
Flexible IT in mittelständischen Unternehmen durch Open-Source: CEPH, Zarafa, Samba & Co Tobias Doerffel 27.01.15 | 17.30 Uhr | Altes Heizhaus | TU Chemnitz Überblick ● Firmenvorstellung ● Rückblick ● Storage ● Virtualisierung ● Infrastrukturmanagement und -dienste ● AD und CIFS mit Samba ● E-Mail und Groupwaredienste ● Weitere Dienste ● Ausblick 2 Firmenvorstellung ● Gründung 2008 als Startup aus der TU Chemnitz heraus ● Entwicklung, Fertigung und Verkauf von kunden- und anwendungsspezifischen diskreten und integrierten elektronischen Lösungen ➔ ASICs ➔ Steuerungs- und Automatisierungstechnik ➔ Leistungselektronik ➔ Softwaresysteme für Microcontroller und Eingebettete Systeme (ARM) ● Heute: ca. 30 Mitarbeiter sowie 5 Studenten ● Neues Firmengebäude auf dem Technologie-Campus seit 2013 3 Rückblick I ● Die Anfangszeiten im TCC: ● einfaches Consumer-NAS für Projekt- und Homelaufwerke ● einfacher Plastikrouter für DNS/DHCP ● Webseite, E-Mail etc. bei Hostinganbieter ● 1 Jahr später im startup-Gebäude: ● Dedizierte Workstation mit HW-RAID5 und einfachen Samba-Freigaben ohne ACLs ● E-Box als Managementoberfläche für Nutzer, Freigaben, DNS usw. ● Bare-Metal-Installation ● Erste Virtualisierungsversuche mit KVM und einfachen Verwaltungsscripts: Linux- Terminalserver für ASIC-Entwicklung 4 Rückblick II ● 2010 – ca. 10 Mitarbeiter ● Gewachsene Anforderungen an Terminalserver: weiterer Server (HW-RAID5), jetzt mit Proxmox als KVM-Frontend ● VM-Plattenimages als Dateien im Host-Dateisystem ● 2011 ● Mit der ASIC-Abteilung wächst auch der Bedarf an