SlideShare a Scribd company logo
1 of 32
Download to read offline
CA Single Sign-On (CA SSO),
The Innocent Bystander
Alec Cartwright
Security
BT PLC
Identity Services Architect
SCX14S
#CAWorld
2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
© 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies.
The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type
of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA.
For Informational Purposes Only
Terms of this Presentation
3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Abstract
You may be familiar with the refrain “I can’t
login, it must be my single sign on that’s failed.”
In this presentation I will take a look at BT’s
experience of running a CA Single Sign-On (CA
SSO) infrastructure; what we have done to
reduce the chance of failures and to quickly
diagnose issues to get them to the right people
who can fix them.
Alec
Cartwright
BT
Identity Services
Architect
4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Agenda
WHERE DOES BT USE CA SSO
HOW DO WE STAY CALM
WE CAN ALWAYS GET MORE
SUMMARY
1
2
3
4
5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
BT Overview
Communication Services and Broadcaster
• BT operates in 170 countries
• Revenue 18 bn (£ GBP)
User Identities
• 150,000 employees and partners
• 27M+ online customer
Where does BT use CA SSO
7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Where is CA SSO Used
450+ applications
• Customer facing portals
• Internal applications
50+ federations
• Services behind customer products
• Employee services
Includes many critical to BT’s ability to trade
• Cost BT
• Impact BT’s brand
8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
So When Things Go Wrong…..
It’s easy to blame CA SSO
9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Availability Requirements
Must always be available
• 99.995% availability target
• No scheduled down time
• There are some “very hot” times
Transaction volumes
• 30M transactions per day
• Peaks of 7,000+ TPS
How Do We Stay Calm
(Coping with “I Can’t Login”)
11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
We Needed to…
Architect CA SSO for maximum availability
Know the health of the infrastructure
Have processes that
• Quickly identify issues
• Send details to the people who can fix the problem
Deployed For Resilience
13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Policy Server – Local Resilience
Single build for all policy servers
Cluster of 3 policy servers
Use web agent load balancing
Service still resilient if one is lost
Allows in service upgrades
Application Web Server
Policy Servers
Web Agent Load Balancing
14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Policy Servers – Geographic Resilience
Agent failover across all sites
Be careful – don’t configure failover storms
Site 1 Site 2 Site 3 Site 4 Site 5
Policy Servers
Web Agent Failover
Application Web Server
15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
We Need to Always Take Orders
Split consumer / employee applications
One will always be working
Separate policy stores
16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Other Stuff
Components
• Federation servers
• Policy/Key/Session store database
• Login servers
• Admin servers
• Load balancers and switches
Monitor And Alert Everything
18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Set Thresholds
All is OK
Attention
Its getting critical
ALERT
WARNING
19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Basic Monitoring
CPU Memory
Disk usage Processes
20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Policy Servers
Oneview Monitor
• Server Queue Length
• Priority Queue Length
Log files
• “Connection Dead”
• “Timeout Expired”
• “Failed to connect to
datasource”
• “Unexpected Network Error”
• “Wait Timeout. Code is”
• “Delete of tombstone failed”
Routing Issues To The Right People
22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Test Page
On CA SSO
team’s
infrastructure
Simple policy – a
page protected
for all users
Confirms
infrastructure is
working
Helpdesk can
walk users
though access
23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Know Your Infrastructure
We Can Always Do More
25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Review and Continuous Improvement
26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
More to Do
CA APM being deployed
• Improved level of monitoring
• Identify baseline
• Set alerts
Deploy CA Directory
• Improved policy store resilience
Summary
28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
What We Have Achieved
100%
availability for
the service
We proactively
warn about
developing
issues
CA SSO is seen
as the
“Innocent
Bystander”
29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Leveraging the Experience
30 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Recommended Sessions
SESSION # TITLE DATE/TIME
SCT05S
Roadmap: CA Advanced Authentication and CA Single
Sign-On
11/18/2015 04:30 PM
SCT30S Panel: Securing you in the Cloud 11/19/2015 02:00 PM
31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
Q & A
32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD
For More Information
To learn more, please visit:
http://cainc.to/Nv2VOe
CA World ’15

More Related Content

What's hot

Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...CA Technologies
 
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business ConsumersTech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business ConsumersCA Technologies
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...CA Technologies
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile ApplicationsCA Technologies
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CourseCA Technologies
 
The Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization AdoptionThe Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization AdoptionCA Technologies
 
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...CA Technologies
 
Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...CA Technologies
 
The Advisory Board Company Drives Healthcare Transformation with APIs and Mob...
The Advisory Board Company Drives Healthcare Transformation with APIs and Mob...The Advisory Board Company Drives Healthcare Transformation with APIs and Mob...
The Advisory Board Company Drives Healthcare Transformation with APIs and Mob...CA Technologies
 
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryLocating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryCA Technologies
 
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”CA Technologies
 
Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...CA Technologies
 
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...CA Technologies
 
Tech Talk: Knowledge Management of the Future for ITSM
Tech Talk: Knowledge Management of the Future for ITSMTech Talk: Knowledge Management of the Future for ITSM
Tech Talk: Knowledge Management of the Future for ITSMCA Technologies
 
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...CA Technologies
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServiceCA Technologies
 
Case Study: Amping up customer experience with a business centric approach a...
Case Study: Amping up customer experience witha business centric approach a...Case Study: Amping up customer experience witha business centric approach a...
Case Study: Amping up customer experience with a business centric approach a...CA Technologies
 
CA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Technologies
 
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...CA Technologies
 
Agile in Operations, DevOps and Architecture
Agile in Operations, DevOps and ArchitectureAgile in Operations, DevOps and Architecture
Agile in Operations, DevOps and ArchitectureCA Technologies
 

What's hot (20)

Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
Speed time to value with CA IAM solutions deployed on Docker, Kubernetes, and...
 
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business ConsumersTech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
Tech Talk: Mobile ITSM Technology for IT Analysts and Business Consumers
 
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
Hands-On Lab: Integrate Your Monitoring Tools into an Automated Service Impac...
 
Developing Secure Mobile Applications
Developing Secure Mobile ApplicationsDeveloping Secure Mobile Applications
Developing Secure Mobile Applications
 
Pre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash CoursePre-Con Education: CA Service Operations Insight Power User Crash Course
Pre-Con Education: CA Service Operations Insight Power User Crash Course
 
The Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization AdoptionThe Why, Where and How of Service Virtualization Adoption
The Why, Where and How of Service Virtualization Adoption
 
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
Case Study: Oppenheimer Funds Brings IT to the People with ITSM Self-Service...
 
Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...Simplified Identity Management and Governance from One UI — The CA Identity S...
Simplified Identity Management and Governance from One UI — The CA Identity S...
 
The Advisory Board Company Drives Healthcare Transformation with APIs and Mob...
The Advisory Board Company Drives Healthcare Transformation with APIs and Mob...The Advisory Board Company Drives Healthcare Transformation with APIs and Mob...
The Advisory Board Company Drives Healthcare Transformation with APIs and Mob...
 
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content DiscoveryLocating Unmanaged but Regulated Data on System z: CA Data Content Discovery
Locating Unmanaged but Regulated Data on System z: CA Data Content Discovery
 
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”TechTalk: Extreme Automation Creating Headless Tests “Automagically”
TechTalk: Extreme Automation Creating Headless Tests “Automagically”
 
Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...Achieving a Successful Identity Management and Governance Deployment The Flor...
Achieving a Successful Identity Management and Governance Deployment The Flor...
 
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...
Exploit New Levels of Insight, Orchestration and Governance for Complex Appli...
 
Tech Talk: Knowledge Management of the Future for ITSM
Tech Talk: Knowledge Management of the Future for ITSMTech Talk: Knowledge Management of the Future for ITSM
Tech Talk: Knowledge Management of the Future for ITSM
 
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
Moving to New Processes to Collaborate With You to Deliver Product Enhancemen...
 
Putting Security in Identity-as-a-Service
Putting Security in Identity-as-a-ServicePutting Security in Identity-as-a-Service
Putting Security in Identity-as-a-Service
 
Case Study: Amping up customer experience with a business centric approach a...
Case Study: Amping up customer experience witha business centric approach a...Case Study: Amping up customer experience witha business centric approach a...
Case Study: Amping up customer experience with a business centric approach a...
 
CA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & ForecastingCA Project and Portfolio Management Budgeting & Forecasting
CA Project and Portfolio Management Budgeting & Forecasting
 
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
TechTalk: Accelerate Mobile Development using SDKs and Open APIs With CA API ...
 
Agile in Operations, DevOps and Architecture
Agile in Operations, DevOps and ArchitectureAgile in Operations, DevOps and Architecture
Agile in Operations, DevOps and Architecture
 

Similar to CA Single Sign-On (CA SSO), The Innocent Bystander

Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security CA Technologies
 
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...CA Technologies
 
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...CA Technologies
 
How Railinc Ensures The Links In Our Nation's Supply Chain: CA Spectrum and ...
How Railinc Ensures The Links In Our Nation's Supply Chain: CA Spectrum and ...How Railinc Ensures The Links In Our Nation's Supply Chain: CA Spectrum and ...
How Railinc Ensures The Links In Our Nation's Supply Chain: CA Spectrum and ...CA Technologies
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management CA Technologies
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayCA Technologies
 
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...CA Technologies
 
Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...
Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...
Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...CA Technologies
 
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementPre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementCA Technologies
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...CA Technologies
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...CA Technologies
 
CA Unified Infrastructure Management Network Performance Management Capabili...
 CA Unified Infrastructure Management Network Performance Management Capabili... CA Unified Infrastructure Management Network Performance Management Capabili...
CA Unified Infrastructure Management Network Performance Management Capabili...CA Technologies
 
Pivotal microservices spring_pcf_skillsmatter.pptx
Pivotal microservices spring_pcf_skillsmatter.pptxPivotal microservices spring_pcf_skillsmatter.pptx
Pivotal microservices spring_pcf_skillsmatter.pptxSufyaan Kazi
 
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...CA Technologies
 
How to Test the New Fashioned Way
How to Test the New Fashioned WayHow to Test the New Fashioned Way
How to Test the New Fashioned WayCA Technologies
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Technologies
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...CA Technologies
 
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionPre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionCA Technologies
 
Taking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelTaking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelCA Technologies
 

Similar to CA Single Sign-On (CA SSO), The Innocent Bystander (20)

Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security Ten Things You Should not Forget in Mainframe Security
Ten Things You Should not Forget in Mainframe Security
 
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
Case Study: State of Colorado Takes the Road to ITSM Maturity: Playing the ...
 
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
Stop the Blame Game with Increased Visibility of your Mobile-to-Mainframe IT ...
 
How Railinc Ensures The Links In Our Nation's Supply Chain: CA Spectrum and ...
How Railinc Ensures The Links In Our Nation's Supply Chain: CA Spectrum and ...How Railinc Ensures The Links In Our Nation's Supply Chain: CA Spectrum and ...
How Railinc Ensures The Links In Our Nation's Supply Chain: CA Spectrum and ...
 
Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management Hands-On Labs: Introduction to CA Unified Infrastructure Management
Hands-On Labs: Introduction to CA Unified Infrastructure Management
 
Technology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned WayTechnology Primer: Building Applications the New-Fashioned Way
Technology Primer: Building Applications the New-Fashioned Way
 
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
Case Study: SAIC Provides Full Lifecycle Monitoring Services to the Public Se...
 
Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...
Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...
Case Study: Nordstrom Succeeds in E-Commerce with Innovative Performance Test...
 
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service ManagementPre-Con Education: Building Basic ITSM Workflows in CA Service Management
Pre-Con Education: Building Basic ITSM Workflows in CA Service Management
 
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
Tech Talk: Service Virtualization on Demand—Have Everything, Whenever and Whe...
 
Cassandra and IoT
Cassandra and IoTCassandra and IoT
Cassandra and IoT
 
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
Ready, Set, Shop! The Pressure is on For Your Applications to Perform Flawl...
 
CA Unified Infrastructure Management Network Performance Management Capabili...
 CA Unified Infrastructure Management Network Performance Management Capabili... CA Unified Infrastructure Management Network Performance Management Capabili...
CA Unified Infrastructure Management Network Performance Management Capabili...
 
Pivotal microservices spring_pcf_skillsmatter.pptx
Pivotal microservices spring_pcf_skillsmatter.pptxPivotal microservices spring_pcf_skillsmatter.pptx
Pivotal microservices spring_pcf_skillsmatter.pptx
 
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
New Mainframe IT Analytics: Actionable Insight into Root Cause Analysis of Pe...
 
How to Test the New Fashioned Way
How to Test the New Fashioned WayHow to Test the New Fashioned Way
How to Test the New Fashioned Way
 
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
CA Unified Infrastructure Management for z Systems: Get a Holistic View of Yo...
 
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
Technology Primer: Monitor Microservices, Containers, Cloud Foundry and Node ...
 
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With XtractionPre-Con Education: Advanced and Reporting and Dashboards With Xtraction
Pre-Con Education: Advanced and Reporting and Dashboards With Xtraction
 
Taking IT Analytics to the Next Level
Taking IT Analytics to the Next LevelTaking IT Analytics to the Next Level
Taking IT Analytics to the Next Level
 

More from CA Technologies

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Technologies
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceCA Technologies
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...CA Technologies
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCA Technologies
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...CA Technologies
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...CA Technologies
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCA Technologies
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramCA Technologies
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageCA Technologies
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementCA Technologies
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...CA Technologies
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...CA Technologies
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...CA Technologies
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...CA Technologies
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...CA Technologies
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentCA Technologies
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseCA Technologies
 

More from CA Technologies (20)

CA Mainframe Resource Intelligence
CA Mainframe Resource IntelligenceCA Mainframe Resource Intelligence
CA Mainframe Resource Intelligence
 
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform ExcellenceMainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
Mainframe as a Service: Sample a Buffet of IBM z/OS® Platform Excellence
 
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
Case Study: How CA Went From 40 Days to Three Days Building Crystal-Clear Tes...
 
Case Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software DevelopmentCase Study: How The Home Depot Built Quality Into Software Development
Case Study: How The Home Depot Built Quality Into Software Development
 
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
Pre-Con Ed: Privileged Identity Governance: Are You Certifying Privileged Use...
 
Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
Case Study: How SGN Used Attack Path Mapping to Control Privileged Access in ...
 
Case Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital GovernmentCase Study: Putting Citizens at The Center of Digital Government
Case Study: Putting Citizens at The Center of Digital Government
 
Making Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security ProgramMaking Security Work—Implementing a Transformational Security Program
Making Security Work—Implementing a Transformational Security Program
 
Keynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive AdvantageKeynote: Making Security a Competitive Advantage
Keynote: Making Security a Competitive Advantage
 
Emerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access ManagementEmerging Managed Services Opportunities in Identity and Access Management
Emerging Managed Services Opportunities in Identity and Access Management
 
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
The Unmet Demand for Premium Cloud Monitoring Services—and How Service Provid...
 
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
Leveraging Monitoring Governance: How Service Providers Can Boost Operational...
 
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
The Next Big Service Provider Opportunity—Beyond Infrastructure: Architecting...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...Application Experience Analytics Services: The Strategic Digital Transformati...
Application Experience Analytics Services: The Strategic Digital Transformati...
 
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
Strategic Direction Session: Deliver Next-Gen IT Ops with CA Mainframe Operat...
 
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
 
Blockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of DeploymentBlockchain: Strategies for Moving From Hype to Realities of Deployment
Blockchain: Strategies for Moving From Hype to Realities of Deployment
 
Establish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital EnterpriseEstablish Digital Trust as the Currency of Digital Enterprise
Establish Digital Trust as the Currency of Digital Enterprise
 

Recently uploaded

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 

Recently uploaded (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 

CA Single Sign-On (CA SSO), The Innocent Bystander

  • 1. CA Single Sign-On (CA SSO), The Innocent Bystander Alec Cartwright Security BT PLC Identity Services Architect SCX14S #CAWorld
  • 2. 2 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD © 2015 CA. All rights reserved. All trademarks referenced herein belong to their respective companies. The content provided in this CA World 2015 presentation is intended for informational purposes only and does not form any type of warranty. The information provided by a CA partner and/or CA customer has not been reviewed for accuracy by CA. For Informational Purposes Only Terms of this Presentation
  • 3. 3 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Abstract You may be familiar with the refrain “I can’t login, it must be my single sign on that’s failed.” In this presentation I will take a look at BT’s experience of running a CA Single Sign-On (CA SSO) infrastructure; what we have done to reduce the chance of failures and to quickly diagnose issues to get them to the right people who can fix them. Alec Cartwright BT Identity Services Architect
  • 4. 4 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Agenda WHERE DOES BT USE CA SSO HOW DO WE STAY CALM WE CAN ALWAYS GET MORE SUMMARY 1 2 3 4
  • 5. 5 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD BT Overview Communication Services and Broadcaster • BT operates in 170 countries • Revenue 18 bn (£ GBP) User Identities • 150,000 employees and partners • 27M+ online customer
  • 6. Where does BT use CA SSO
  • 7. 7 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Where is CA SSO Used 450+ applications • Customer facing portals • Internal applications 50+ federations • Services behind customer products • Employee services Includes many critical to BT’s ability to trade • Cost BT • Impact BT’s brand
  • 8. 8 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD So When Things Go Wrong….. It’s easy to blame CA SSO
  • 9. 9 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Availability Requirements Must always be available • 99.995% availability target • No scheduled down time • There are some “very hot” times Transaction volumes • 30M transactions per day • Peaks of 7,000+ TPS
  • 10. How Do We Stay Calm (Coping with “I Can’t Login”)
  • 11. 11 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD We Needed to… Architect CA SSO for maximum availability Know the health of the infrastructure Have processes that • Quickly identify issues • Send details to the people who can fix the problem
  • 13. 13 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Policy Server – Local Resilience Single build for all policy servers Cluster of 3 policy servers Use web agent load balancing Service still resilient if one is lost Allows in service upgrades Application Web Server Policy Servers Web Agent Load Balancing
  • 14. 14 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Policy Servers – Geographic Resilience Agent failover across all sites Be careful – don’t configure failover storms Site 1 Site 2 Site 3 Site 4 Site 5 Policy Servers Web Agent Failover Application Web Server
  • 15. 15 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD We Need to Always Take Orders Split consumer / employee applications One will always be working Separate policy stores
  • 16. 16 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Other Stuff Components • Federation servers • Policy/Key/Session store database • Login servers • Admin servers • Load balancers and switches
  • 17. Monitor And Alert Everything
  • 18. 18 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Set Thresholds All is OK Attention Its getting critical ALERT WARNING
  • 19. 19 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Basic Monitoring CPU Memory Disk usage Processes
  • 20. 20 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Policy Servers Oneview Monitor • Server Queue Length • Priority Queue Length Log files • “Connection Dead” • “Timeout Expired” • “Failed to connect to datasource” • “Unexpected Network Error” • “Wait Timeout. Code is” • “Delete of tombstone failed”
  • 21. Routing Issues To The Right People
  • 22. 22 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Test Page On CA SSO team’s infrastructure Simple policy – a page protected for all users Confirms infrastructure is working Helpdesk can walk users though access
  • 23. 23 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Know Your Infrastructure
  • 24. We Can Always Do More
  • 25. 25 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Review and Continuous Improvement
  • 26. 26 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD More to Do CA APM being deployed • Improved level of monitoring • Identify baseline • Set alerts Deploy CA Directory • Improved policy store resilience
  • 28. 28 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD What We Have Achieved 100% availability for the service We proactively warn about developing issues CA SSO is seen as the “Innocent Bystander”
  • 29. 29 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Leveraging the Experience
  • 30. 30 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Recommended Sessions SESSION # TITLE DATE/TIME SCT05S Roadmap: CA Advanced Authentication and CA Single Sign-On 11/18/2015 04:30 PM SCT30S Panel: Securing you in the Cloud 11/19/2015 02:00 PM
  • 31. 31 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD Q & A
  • 32. 32 © 2015 CA. ALL RIGHTS RESERVED.@CAWORLD #CAWORLD For More Information To learn more, please visit: http://cainc.to/Nv2VOe CA World ’15