• Like
  • Save
Whada #yapcasia 2011
Upcoming SlideShare
Loading in...5
×
 

Whada #yapcasia 2011

on

  • 2,245 views

 

Statistics

Views

Total Views
2,245
Views on SlideShare
1,808
Embed Views
437

Actions

Likes
0
Downloads
2
Comments
0

11 Embeds 437

http://d.hatena.ne.jp 381
http://yapcasia.org 26
http://infra.rrdtool.net 10
http://paper.li 7
http://hatenatunnel.appspot.com 4
http://a0.twimg.com 3
http://translate.googleusercontent.com 2
http://jp.hanrss.com 1
http://www.slideshare.net 1
http://tweetedtimes.com 1
http://webcache.googleusercontent.com 1
More...

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    Whada #yapcasia 2011 Whada #yapcasia 2011 Presentation Transcript

    • whada YAPC::Asia 2011 2011/10/15 tagomoris2011 10 15
    • 2010/08 livedoor System Administration Group Develop Support Group2011 10 15
    • 2011 10 15
    • whats WADA ?2011 10 15
    • WADA Pass ( )2011 10 15
    • whats whada ?2011 10 15
    • whada Whada Hits on the Advanced Dominant Authentication. Multi-Protocol Authentication/Authorization Tool2011 10 15
    • whada Multi-Protocol Authentication/Authorization Tool (Now, LDAP only... )2011 10 15
    • Why whada ? (1) Many internal web services requires authentication/authorization. Authentication per services: chaos management worry poor UI2011 10 15
    • Why whada ? (2) Password dictionary is very sensitive and dangerous: new commers retired employees password changes2011 10 15
    • Why NOT ActiveDirectory ? Managed by personnel department... We cannot : change data structures add attirubutes normalize values (!) add ACL rule (!)2011 10 15
    • Why whada ? (3) We want to: add/drop new privilege definitions add/drop permission to/from anyone at anytime ignore password management use web centric authentication protocols2011 10 15
    • whada authorization data source: by whada privilege store authentication data source: external data source (ex: LDAP) client access protocol: LDAP (OpenID/OAuth comming soon!) https://github.com/tagomoris/whada2011 10 15
    • whada data Account: Account Name Privilege: Label for Authorization (ex: WHADA, BLOG, BLOG+ADMIN, ...)2011 10 15
    • 2011 10 15
    • slapd perl backend Backend module runs in OpenLDAP Server (slapd) process specified Perl Module. database perl suffix "dc=wada,dc=intranet" perlModulePath /root/whada/lib perlModule Whada::SlapdBackendHandler2011 10 15
    • 2011 10 15
    • What i should do next ? OpenID / OAuth Improved Admin UI Other password data source? (NIS? RDBMS?) Performance?2011 10 15
    • Thank you!2011 10 15