SlideShare a Scribd company logo
1 of 6
Download to read offline
Internet
Database
Red Hat Linux
App1
Cluster DNS
Windows Servers
External F5 LB
Environment: Created by: (Mike Reams) New Servers: 0
irtual
hysical
LDAP
Cluster
Software
Load
Balancer
Software Module
External Network
Internal Network
Data Call
Load
Balancer
Intranet
Internal NetworkExternal Network
External
Firewall
Windows 2012
Windows 2012 IIS 7.5
Identity Web Services
Linux Red Hat
Linux VM 1
Linux VM 2
Internal LB:
Service Bus
Java Web Service
Linux Red Hat
Linux VM 1
Linux VM 2
Active
Directory
Oracle LDAP
Process
Images into
binary data
File from client
Resizing
Process
Oracle Federation
Oracle Web Gate
OHS Provides Reverse Proxy to internal services
such as the Oracle Identity Services
When a person uploads a file, the screen executes code to
copy it to a Linux server and where it is cropped and resized
to small, medium, and large. This cropping and resizing is
occurring on the Linux server using an optional Linux install
package
Project Name
Architecture for User Flow to secure application data
Revision:
1.0
Drawing #
1.1
Date:
11/29/2015
Size:
Letter
Technical Design
Get and display image to
browser via REST
Oracle Web Gate
The process is to copy the original file from the
down to a Linux directory /psoft/datafiles/
. Run the “convert” command to do the croppy
and resizing, and then load the resulting files
into the tables blob fields. Then delete files
from Linux directory
Write Data to DB
Internal F5 LB
ClientNetworkMid-TierDataLayer
EndStart
Proxy Layer
Middleware
Virtual
Web Server
A User signed-in to their Portal and
invokes an IdP federation link to
federate into a Federated Service
Provider
Identity Authorization Layer
Federation
Web Servers
Web Gate
Access Management Layer
Virtual
Apache
OHS
Reverse Proxy
Web Gate
User’s Session now has
the credentials and will
redirect to RelayState
Service Provider
(HCM)
SecurityUser Flow
Software
Module
Back-end Service
DNS or
IP Range
Security
Module
Access Points
Project Name: Designed By:
Solutions Architect
Revision: 1.3Environment: DR Date: 11/29/2015
HCM
App DB
Virtual
WebLogic
F5 Load Balancer
Apache OHS w/ WebGate
Load Balancer
User’s Session is automatically
redirected by definition of the
“RelayState” (from IdP) after
Credentials/Token is created
External/Internal
DNS Resolution
Internal Facing
Firewall
External
F5 Load Balancer
Listens on port 443
Virtual Directory
Layer
Virtual
Apache
Get
Authorization
for ID
to generate
Token
Data Access
Directory Server 1
Directory Server 2
SQL Server 1
SQL Server 2
Web Gate
Get
Authorization
Get
Authorization
External Firewall
End-User
Load Balancer
Proxy to Authorization Layer
based on NameID in assertion
Federated "Service
Provider"
(aka. SP)
Abstracted Data
Repositories
New Hire Workflow ( Business Process 1.1, 1.2, 1.3 )
ProvisioningHiringProcessResources
Demonstrates an employee becoming a “New Hire” in the Identity Management Environment. This workflow addresses 3 business requirements in a single architecture
Oracle Service Bus sends
data to Queue for data
processing of employee
HR receives the new hire
information and enters
them into HCM
Manager initiates
new hire form
3
HCM instantly sends data
to the Oracle Service Bus
4
5
The Queue sends the XML
message to the
OIM End-Point 6
OIM received data &
processes the new
employee record
7
OIM begins business
logic to determine how
to process the
employee
8
OIM performs
lookup on new
account to see if
it exists
Account
exists?
OIM will provision a new
Active Directory account using
the automatic naming
convention
OIM sends email to Help Desk to
request to create a new naming
convention since one exists or to use
the one it is trying to create
The OIM BPEL process
receives email from
CSC and processes the
employee with the
assigned NOS account
OIM provisions records into Birth-Right Resources, but will
assign the existing account referenced in the email or will
create using a new naming convention specified by Help Desk
10e
OIM provisions employee records
into resources as a normal and
creates new network account
14
OIM BPEL sends
email to manager
that the
provisioning
process is
complete
16
Corporate
employee?
9
OIM provisions new
account in OIM
identity store and
assigns resources
based on role
OIM provisions new
employee records into
downstream resources
10a
10b 13
10c
10d
11
12
Manager initiates
new hire process
from Talent
Management
1a
1b
Manager initiates
badge request form
2
Yes
Yes
No
No
OIM writes email &
phone number to
HCM
15
Integrated SSO into Service Provider
Mid-tierIdPClientBrowserSP&theIdP
Demonstrates a user accessing an SSO provider from Portal as an authenticated/authorized user originating from the IdP
SP authorizes user
from the Header
passed or the SAML
request
Portal
SSO Landing Page
Enter
credentials to
Login Page
3
Successful AuthN
will redirect to
Portal4
Invoke configured Link to
protected URL &
generate Token.
Redirects using the
relaystate parameter
Click link to
SSO Service
6
5
SSO Application
8
Identity Web Services
Oracle Web Gate allows access to
Resource defined in OAM if token is
present
9
Error Trapping will
send to default Error
page if there’s a
session issue
Error Trapping will send to
default Error page if there’s a
session issue
Front-end access point to the Oracle
federation requests, will broker the
SAML request to the vendor’s SP (ACS)
Is session directing
to integrated or
federated
7
Federated
Integrated
Jump Service
Internal or
External?
Internal
Post Credentials
Via Reverse Proxy Rules
Extranet Appliance
Invoke Company
Portal
User
1
External
As a guest, your
directed to a Login
Page2
Troux Application Flow
[Last Updated: 11/29/2015]
Author: mreams
Client Browser Back-End
CompanyACompanyB
User A
User is logged into computer
with companya.com Active
Directory credentials
ADAuthentication
User invokes in IE browser
Portfolio Instance A
The WAFFLE agent runs in front of
the Web Servers as the gateway into
the app. WAFFLE checks the user’s
Windows AD credentials against it’s
configured Troux Roles the person is
or is not assigned to
Waffle
Tomcat
Troux_A
SQL Cluster
ActiveDirectory
User Flow Database
AD Forest
Companya.com
Service Account runs the
Windows service and
brokers againstcoxinc in
order to see if the user is
in AD groups mapped to
Troux Roles
ServiceAccount
AD Forest
Companya.com
Is user
authorized?
User is granted access and
will see designated content
based on role
Yes
User is notin any Troux roles
and will see blank content
on the screen or a message
saying access denied
No
User B
User is logged into computer
with companyb.com Active
Directory credentials
ADAuthentication
User invokes in IE browser
Portfolio Instance B
The WAFFLE agent runs in front of
the Web Servers as the gateway into
the app. WAFFLE checks the user’s
Windows AD credentials against it’s
configured Troux Roles the person is
or is not assigned to
Waffle
Tomcat
Troux_B
SQL Cluster
AD Forest
Companyb.com
Service Account runs the
Windows service and
brokers againstcoxinc in
order to see if the user is
in AD groups mapped to
Troux Roles
ServiceAccount
AD Forest
Companyb.com
User is granted access and
will see designated content
based on role
Yes
User is notin any Troux roles
and will see blank content
on the screen or a message
saying access denied
No
Is user
authorized?
User is granted access
User is granted access
Refresh System Perform backups
Execute Script
Check Disk Space
Check Memory
Check
System Processes
Check Connectivity
Backup Registry
User
Access DB
D:AdministrationDB
Stores info
Check Log Sizes Collect Network Info
Check PageSys size
Check NTFS
permissions
Selectable
Options
Backup IIS Meta DB
Gather Server Info and store
into DB
Create Report
Backup
IISReset
Clear Logs
Truncate SQL Logs
Check Application
Config

More Related Content

What's hot

SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010,Claims-Based Identity, Facebook, and the CloudSharePoint 2010,Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the CloudDanny Jessee
 
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the CloudSharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the CloudDanny Jessee
 
Sample Template for Single Sign-On (SSO)
Sample Template for Single Sign-On (SSO)Sample Template for Single Sign-On (SSO)
Sample Template for Single Sign-On (SSO)Mike Reams
 
Visio Diagram of a user SSO Flow
Visio Diagram of a user SSO FlowVisio Diagram of a user SSO Flow
Visio Diagram of a user SSO FlowMike Reams
 
SharePoint 2010 authentications
SharePoint 2010 authenticationsSharePoint 2010 authentications
SharePoint 2010 authenticationsWyngate Solutions
 
Windows Server 2008 for Developers - Part 1
Windows Server 2008 for Developers - Part 1Windows Server 2008 for Developers - Part 1
Windows Server 2008 for Developers - Part 1ukdpe
 
Design Pattern Logical Model
Design Pattern Logical ModelDesign Pattern Logical Model
Design Pattern Logical ModelMike Reams
 
What's New for Data?
What's New for Data?What's New for Data?
What's New for Data?ukdpe
 
ESM Service Layer Developer's Guide (ESM v6.9.1c)
ESM Service Layer Developer's Guide (ESM v6.9.1c)ESM Service Layer Developer's Guide (ESM v6.9.1c)
ESM Service Layer Developer's Guide (ESM v6.9.1c)Protect724tk
 
Develop iOS and Android apps with SharePoint/Office 365
Develop iOS and Android apps with SharePoint/Office 365Develop iOS and Android apps with SharePoint/Office 365
Develop iOS and Android apps with SharePoint/Office 365Kashif Imran
 
Configuring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicConfiguring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicHarihara sarma
 
EnterpriseView 2.0 REST API Developer's Guide
EnterpriseView 2.0 REST API Developer's GuideEnterpriseView 2.0 REST API Developer's Guide
EnterpriseView 2.0 REST API Developer's GuideProtect724gopi
 
CANARIE - What Do I Need to Connect with eduroam and Shibboleth
CANARIE - What Do I Need to Connect with eduroam and ShibbolethCANARIE - What Do I Need to Connect with eduroam and Shibboleth
CANARIE - What Do I Need to Connect with eduroam and ShibbolethChris Phillips
 
Extending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partnersExtending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partnersCorey Roth
 

What's hot (20)

AD FS Workshop | Part 2 | Deep Dive
AD FS Workshop | Part 2 | Deep DiveAD FS Workshop | Part 2 | Deep Dive
AD FS Workshop | Part 2 | Deep Dive
 
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010,Claims-Based Identity, Facebook, and the CloudSharePoint 2010,Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
 
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the CloudSharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
SharePoint 2010, Claims-Based Identity, Facebook, and the Cloud
 
Sample Template for Single Sign-On (SSO)
Sample Template for Single Sign-On (SSO)Sample Template for Single Sign-On (SSO)
Sample Template for Single Sign-On (SSO)
 
Visio Diagram of a user SSO Flow
Visio Diagram of a user SSO FlowVisio Diagram of a user SSO Flow
Visio Diagram of a user SSO Flow
 
SharePoint 2013 and ADFS
SharePoint 2013 and ADFSSharePoint 2013 and ADFS
SharePoint 2013 and ADFS
 
Ad fs
Ad fsAd fs
Ad fs
 
SharePoint 2010 authentications
SharePoint 2010 authenticationsSharePoint 2010 authentications
SharePoint 2010 authentications
 
Windows Server 2008 for Developers - Part 1
Windows Server 2008 for Developers - Part 1Windows Server 2008 for Developers - Part 1
Windows Server 2008 for Developers - Part 1
 
Design Pattern Logical Model
Design Pattern Logical ModelDesign Pattern Logical Model
Design Pattern Logical Model
 
What's New for Data?
What's New for Data?What's New for Data?
What's New for Data?
 
Siebel Web Service
Siebel Web ServiceSiebel Web Service
Siebel Web Service
 
ESM Service Layer Developer's Guide (ESM v6.9.1c)
ESM Service Layer Developer's Guide (ESM v6.9.1c)ESM Service Layer Developer's Guide (ESM v6.9.1c)
ESM Service Layer Developer's Guide (ESM v6.9.1c)
 
Develop iOS and Android apps with SharePoint/Office 365
Develop iOS and Android apps with SharePoint/Office 365Develop iOS and Android apps with SharePoint/Office 365
Develop iOS and Android apps with SharePoint/Office 365
 
Configuring kerberos based sso in weblogic
Configuring kerberos based sso in weblogicConfiguring kerberos based sso in weblogic
Configuring kerberos based sso in weblogic
 
Microsoft Lync Server 2010 Installation
Microsoft Lync Server 2010 InstallationMicrosoft Lync Server 2010 Installation
Microsoft Lync Server 2010 Installation
 
EnterpriseView 2.0 REST API Developer's Guide
EnterpriseView 2.0 REST API Developer's GuideEnterpriseView 2.0 REST API Developer's Guide
EnterpriseView 2.0 REST API Developer's Guide
 
CANARIE - What Do I Need to Connect with eduroam and Shibboleth
CANARIE - What Do I Need to Connect with eduroam and ShibbolethCANARIE - What Do I Need to Connect with eduroam and Shibboleth
CANARIE - What Do I Need to Connect with eduroam and Shibboleth
 
Extending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partnersExtending SharePoint 2010 to your customers and partners
Extending SharePoint 2010 to your customers and partners
 
Mojemoje
MojemojeMojemoje
Mojemoje
 

Viewers also liked

Ethereum and the $50m Heist
Ethereum and the $50m HeistEthereum and the $50m Heist
Ethereum and the $50m HeistLaurence Kirk
 
JC2763_PopulationBasedSurveys_en
JC2763_PopulationBasedSurveys_enJC2763_PopulationBasedSurveys_en
JC2763_PopulationBasedSurveys_enVelma Lopez
 
Dr. Veronica Motiram Boynton Beach Reviews
Dr. Veronica Motiram Boynton Beach ReviewsDr. Veronica Motiram Boynton Beach Reviews
Dr. Veronica Motiram Boynton Beach ReviewsJeremy Katz
 
Advertise ENG101
Advertise ENG101Advertise ENG101
Advertise ENG101Bonifez
 
Victoria final sobre la muerte
Victoria final sobre la muerteVictoria final sobre la muerte
Victoria final sobre la muerteCoke Neto
 
El valor de una persona
El valor de una personaEl valor de una persona
El valor de una personaCoke Neto
 
BeCommerce X-mas Study 2015
BeCommerce X-mas Study 2015BeCommerce X-mas Study 2015
BeCommerce X-mas Study 2015Carmen Machiels
 
Creativity-based learning [Cbl] workshop
Creativity-based learning [Cbl]   workshop Creativity-based learning [Cbl]   workshop
Creativity-based learning [Cbl] workshop Wiriyah Ruechaipanit
 
Will you be there ( Você vai estar lá )
Will you be there ( Você vai estar lá  )Will you be there ( Você vai estar lá  )
Will you be there ( Você vai estar lá )Irene Aguiar
 
A alegria da viagem
A alegria da viagemA alegria da viagem
A alegria da viagempietra bravo
 

Viewers also liked (15)

Calca de-raspa-soldador
Calca de-raspa-soldadorCalca de-raspa-soldador
Calca de-raspa-soldador
 
Gobierno electronico
Gobierno electronicoGobierno electronico
Gobierno electronico
 
Ethereum and the $50m Heist
Ethereum and the $50m HeistEthereum and the $50m Heist
Ethereum and the $50m Heist
 
JC2763_PopulationBasedSurveys_en
JC2763_PopulationBasedSurveys_enJC2763_PopulationBasedSurveys_en
JC2763_PopulationBasedSurveys_en
 
MainGist - Apresentação Serviços de Comunicação 2016
MainGist - Apresentação Serviços de Comunicação 2016MainGist - Apresentação Serviços de Comunicação 2016
MainGist - Apresentação Serviços de Comunicação 2016
 
ArulPandiyan(2) (1)
ArulPandiyan(2) (1)ArulPandiyan(2) (1)
ArulPandiyan(2) (1)
 
Dr. Veronica Motiram Boynton Beach Reviews
Dr. Veronica Motiram Boynton Beach ReviewsDr. Veronica Motiram Boynton Beach Reviews
Dr. Veronica Motiram Boynton Beach Reviews
 
Advertise ENG101
Advertise ENG101Advertise ENG101
Advertise ENG101
 
Victoria final sobre la muerte
Victoria final sobre la muerteVictoria final sobre la muerte
Victoria final sobre la muerte
 
El valor de una persona
El valor de una personaEl valor de una persona
El valor de una persona
 
BeCommerce X-mas Study 2015
BeCommerce X-mas Study 2015BeCommerce X-mas Study 2015
BeCommerce X-mas Study 2015
 
Creativity-based learning [Cbl] workshop
Creativity-based learning [Cbl]   workshop Creativity-based learning [Cbl]   workshop
Creativity-based learning [Cbl] workshop
 
DEFENCE SLIDE
DEFENCE SLIDEDEFENCE SLIDE
DEFENCE SLIDE
 
Will you be there ( Você vai estar lá )
Will you be there ( Você vai estar lá  )Will you be there ( Você vai estar lá  )
Will you be there ( Você vai estar lá )
 
A alegria da viagem
A alegria da viagemA alegria da viagem
A alegria da viagem
 

Similar to Series of Visual Flow Diagrams

Mobile user single sign on flow
Mobile user single sign on flowMobile user single sign on flow
Mobile user single sign on flowMike Reams
 
SharePoint 2010 - User Profile Store
SharePoint 2010 - User Profile Store SharePoint 2010 - User Profile Store
SharePoint 2010 - User Profile Store Joshua Haebets
 
(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014Amazon Web Services
 
2. Day 2 - Identify and SSO
2. Day 2 -  Identify and SSO2. Day 2 -  Identify and SSO
2. Day 2 - Identify and SSOHuy Pham
 
Introduction to the Client OM in SharePoint 2010
Introduction to the Client OM in SharePoint 2010Introduction to the Client OM in SharePoint 2010
Introduction to the Client OM in SharePoint 2010Ben Robb
 
CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricSpiffy
 
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365Scott Hoag
 
SAP BusinessObject's Webi Rich Client
SAP BusinessObject's Webi Rich ClientSAP BusinessObject's Webi Rich Client
SAP BusinessObject's Webi Rich ClientEric Molner
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3webhostingguy
 
High-level Architecture viewpoint of a Troux Infrastructure
High-level Architecture viewpoint of a Troux InfrastructureHigh-level Architecture viewpoint of a Troux Infrastructure
High-level Architecture viewpoint of a Troux InfrastructureMike Reams
 
Dh2 Apps Training Part2
Dh2   Apps Training Part2Dh2   Apps Training Part2
Dh2 Apps Training Part2jamram82
 
Office 365 introduction and technical overview
Office 365 introduction and technical overviewOffice 365 introduction and technical overview
Office 365 introduction and technical overviewMotty Ben Atia
 
Dave Carroll Application Services Salesforce
Dave Carroll Application Services SalesforceDave Carroll Application Services Salesforce
Dave Carroll Application Services Salesforcedeimos
 
MAX 2008: Build collaborative applications with Flex LCDS and Cairngorm
MAX 2008: Build collaborative applications with Flex LCDS and CairngormMAX 2008: Build collaborative applications with Flex LCDS and Cairngorm
MAX 2008: Build collaborative applications with Flex LCDS and CairngormXavier Agnetti
 
Summer '16 Realease notes
Summer '16 Realease notesSummer '16 Realease notes
Summer '16 Realease notesaggopal1011
 
Azure Mobile Services Workshop
Azure Mobile Services WorkshopAzure Mobile Services Workshop
Azure Mobile Services WorkshopEran Stiller
 
Understanding the Windows Azure Platform - Dec 2010
Understanding the Windows Azure Platform - Dec 2010Understanding the Windows Azure Platform - Dec 2010
Understanding the Windows Azure Platform - Dec 2010DavidGristwood
 

Similar to Series of Visual Flow Diagrams (20)

Office 365 identity
Office 365 identityOffice 365 identity
Office 365 identity
 
Mobile user single sign on flow
Mobile user single sign on flowMobile user single sign on flow
Mobile user single sign on flow
 
SharePoint 2010 - User Profile Store
SharePoint 2010 - User Profile Store SharePoint 2010 - User Profile Store
SharePoint 2010 - User Profile Store
 
(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
(BIZ303) Active Directory in the AWS Cloud | AWS re:Invent 2014
 
2. Day 2 - Identify and SSO
2. Day 2 -  Identify and SSO2. Day 2 -  Identify and SSO
2. Day 2 - Identify and SSO
 
Introduction to the Client OM in SharePoint 2010
Introduction to the Client OM in SharePoint 2010Introduction to the Client OM in SharePoint 2010
Introduction to the Client OM in SharePoint 2010
 
CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App Fabric
 
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
SPIntersection 2016 - MICROSOFT CLOUD IDENTITIES IN AZURE AND OFFICE 365
 
Windows Azure
Windows AzureWindows Azure
Windows Azure
 
SAP BusinessObject's Webi Rich Client
SAP BusinessObject's Webi Rich ClientSAP BusinessObject's Webi Rich Client
SAP BusinessObject's Webi Rich Client
 
Novell® iChain® 2.3
Novell® iChain® 2.3Novell® iChain® 2.3
Novell® iChain® 2.3
 
High-level Architecture viewpoint of a Troux Infrastructure
High-level Architecture viewpoint of a Troux InfrastructureHigh-level Architecture viewpoint of a Troux Infrastructure
High-level Architecture viewpoint of a Troux Infrastructure
 
Dh2 Apps Training Part2
Dh2   Apps Training Part2Dh2   Apps Training Part2
Dh2 Apps Training Part2
 
Office 365 introduction and technical overview
Office 365 introduction and technical overviewOffice 365 introduction and technical overview
Office 365 introduction and technical overview
 
Dave Carroll Application Services Salesforce
Dave Carroll Application Services SalesforceDave Carroll Application Services Salesforce
Dave Carroll Application Services Salesforce
 
MAX 2008: Build collaborative applications with Flex LCDS and Cairngorm
MAX 2008: Build collaborative applications with Flex LCDS and CairngormMAX 2008: Build collaborative applications with Flex LCDS and Cairngorm
MAX 2008: Build collaborative applications with Flex LCDS and Cairngorm
 
Thiramas
ThiramasThiramas
Thiramas
 
Summer '16 Realease notes
Summer '16 Realease notesSummer '16 Realease notes
Summer '16 Realease notes
 
Azure Mobile Services Workshop
Azure Mobile Services WorkshopAzure Mobile Services Workshop
Azure Mobile Services Workshop
 
Understanding the Windows Azure Platform - Dec 2010
Understanding the Windows Azure Platform - Dec 2010Understanding the Windows Azure Platform - Dec 2010
Understanding the Windows Azure Platform - Dec 2010
 

More from Mike Reams

Knowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerKnowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerMike Reams
 
Solution Delivery Calendar
Solution Delivery CalendarSolution Delivery Calendar
Solution Delivery CalendarMike Reams
 
Environment Gap Analysis for Applications
Environment Gap Analysis for ApplicationsEnvironment Gap Analysis for Applications
Environment Gap Analysis for ApplicationsMike Reams
 
Design Pattern for Federated Single Sign-On Access
Design Pattern for Federated Single Sign-On AccessDesign Pattern for Federated Single Sign-On Access
Design Pattern for Federated Single Sign-On AccessMike Reams
 
Perimeter Protected Access Design Pattern
Perimeter Protected Access Design PatternPerimeter Protected Access Design Pattern
Perimeter Protected Access Design PatternMike Reams
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningMike Reams
 
Retiree Data Flow Diagram
Retiree Data Flow DiagramRetiree Data Flow Diagram
Retiree Data Flow DiagramMike Reams
 
Visio Diagram Scripting and Server Management flow
Visio Diagram Scripting and Server Management flowVisio Diagram Scripting and Server Management flow
Visio Diagram Scripting and Server Management flowMike Reams
 
Visio Diagram for Configuration Management
Visio Diagram for Configuration ManagementVisio Diagram for Configuration Management
Visio Diagram for Configuration ManagementMike Reams
 
User Flow swim-lane Diagram for New Hire
User Flow swim-lane Diagram for New Hire User Flow swim-lane Diagram for New Hire
User Flow swim-lane Diagram for New Hire Mike Reams
 
Architecture Design Presentation for OIM
Architecture Design Presentation for OIMArchitecture Design Presentation for OIM
Architecture Design Presentation for OIMMike Reams
 
Visual representation as an architectural artifact
Visual representation as an architectural artifactVisual representation as an architectural artifact
Visual representation as an architectural artifactMike Reams
 

More from Mike Reams (12)

Knowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerKnowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
 
Solution Delivery Calendar
Solution Delivery CalendarSolution Delivery Calendar
Solution Delivery Calendar
 
Environment Gap Analysis for Applications
Environment Gap Analysis for ApplicationsEnvironment Gap Analysis for Applications
Environment Gap Analysis for Applications
 
Design Pattern for Federated Single Sign-On Access
Design Pattern for Federated Single Sign-On AccessDesign Pattern for Federated Single Sign-On Access
Design Pattern for Federated Single Sign-On Access
 
Perimeter Protected Access Design Pattern
Perimeter Protected Access Design PatternPerimeter Protected Access Design Pattern
Perimeter Protected Access Design Pattern
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity Provisioning
 
Retiree Data Flow Diagram
Retiree Data Flow DiagramRetiree Data Flow Diagram
Retiree Data Flow Diagram
 
Visio Diagram Scripting and Server Management flow
Visio Diagram Scripting and Server Management flowVisio Diagram Scripting and Server Management flow
Visio Diagram Scripting and Server Management flow
 
Visio Diagram for Configuration Management
Visio Diagram for Configuration ManagementVisio Diagram for Configuration Management
Visio Diagram for Configuration Management
 
User Flow swim-lane Diagram for New Hire
User Flow swim-lane Diagram for New Hire User Flow swim-lane Diagram for New Hire
User Flow swim-lane Diagram for New Hire
 
Architecture Design Presentation for OIM
Architecture Design Presentation for OIMArchitecture Design Presentation for OIM
Architecture Design Presentation for OIM
 
Visual representation as an architectural artifact
Visual representation as an architectural artifactVisual representation as an architectural artifact
Visual representation as an architectural artifact
 

Recently uploaded

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 

Recently uploaded (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 

Series of Visual Flow Diagrams

  • 1. Internet Database Red Hat Linux App1 Cluster DNS Windows Servers External F5 LB Environment: Created by: (Mike Reams) New Servers: 0 irtual hysical LDAP Cluster Software Load Balancer Software Module External Network Internal Network Data Call Load Balancer Intranet Internal NetworkExternal Network External Firewall Windows 2012 Windows 2012 IIS 7.5 Identity Web Services Linux Red Hat Linux VM 1 Linux VM 2 Internal LB: Service Bus Java Web Service Linux Red Hat Linux VM 1 Linux VM 2 Active Directory Oracle LDAP Process Images into binary data File from client Resizing Process Oracle Federation Oracle Web Gate OHS Provides Reverse Proxy to internal services such as the Oracle Identity Services When a person uploads a file, the screen executes code to copy it to a Linux server and where it is cropped and resized to small, medium, and large. This cropping and resizing is occurring on the Linux server using an optional Linux install package Project Name Architecture for User Flow to secure application data Revision: 1.0 Drawing # 1.1 Date: 11/29/2015 Size: Letter Technical Design Get and display image to browser via REST Oracle Web Gate The process is to copy the original file from the down to a Linux directory /psoft/datafiles/ . Run the “convert” command to do the croppy and resizing, and then load the resulting files into the tables blob fields. Then delete files from Linux directory Write Data to DB Internal F5 LB
  • 2. ClientNetworkMid-TierDataLayer EndStart Proxy Layer Middleware Virtual Web Server A User signed-in to their Portal and invokes an IdP federation link to federate into a Federated Service Provider Identity Authorization Layer Federation Web Servers Web Gate Access Management Layer Virtual Apache OHS Reverse Proxy Web Gate User’s Session now has the credentials and will redirect to RelayState Service Provider (HCM) SecurityUser Flow Software Module Back-end Service DNS or IP Range Security Module Access Points Project Name: Designed By: Solutions Architect Revision: 1.3Environment: DR Date: 11/29/2015 HCM App DB Virtual WebLogic F5 Load Balancer Apache OHS w/ WebGate Load Balancer User’s Session is automatically redirected by definition of the “RelayState” (from IdP) after Credentials/Token is created External/Internal DNS Resolution Internal Facing Firewall External F5 Load Balancer Listens on port 443 Virtual Directory Layer Virtual Apache Get Authorization for ID to generate Token Data Access Directory Server 1 Directory Server 2 SQL Server 1 SQL Server 2 Web Gate Get Authorization Get Authorization External Firewall End-User Load Balancer Proxy to Authorization Layer based on NameID in assertion Federated "Service Provider" (aka. SP) Abstracted Data Repositories
  • 3. New Hire Workflow ( Business Process 1.1, 1.2, 1.3 ) ProvisioningHiringProcessResources Demonstrates an employee becoming a “New Hire” in the Identity Management Environment. This workflow addresses 3 business requirements in a single architecture Oracle Service Bus sends data to Queue for data processing of employee HR receives the new hire information and enters them into HCM Manager initiates new hire form 3 HCM instantly sends data to the Oracle Service Bus 4 5 The Queue sends the XML message to the OIM End-Point 6 OIM received data & processes the new employee record 7 OIM begins business logic to determine how to process the employee 8 OIM performs lookup on new account to see if it exists Account exists? OIM will provision a new Active Directory account using the automatic naming convention OIM sends email to Help Desk to request to create a new naming convention since one exists or to use the one it is trying to create The OIM BPEL process receives email from CSC and processes the employee with the assigned NOS account OIM provisions records into Birth-Right Resources, but will assign the existing account referenced in the email or will create using a new naming convention specified by Help Desk 10e OIM provisions employee records into resources as a normal and creates new network account 14 OIM BPEL sends email to manager that the provisioning process is complete 16 Corporate employee? 9 OIM provisions new account in OIM identity store and assigns resources based on role OIM provisions new employee records into downstream resources 10a 10b 13 10c 10d 11 12 Manager initiates new hire process from Talent Management 1a 1b Manager initiates badge request form 2 Yes Yes No No OIM writes email & phone number to HCM 15
  • 4. Integrated SSO into Service Provider Mid-tierIdPClientBrowserSP&theIdP Demonstrates a user accessing an SSO provider from Portal as an authenticated/authorized user originating from the IdP SP authorizes user from the Header passed or the SAML request Portal SSO Landing Page Enter credentials to Login Page 3 Successful AuthN will redirect to Portal4 Invoke configured Link to protected URL & generate Token. Redirects using the relaystate parameter Click link to SSO Service 6 5 SSO Application 8 Identity Web Services Oracle Web Gate allows access to Resource defined in OAM if token is present 9 Error Trapping will send to default Error page if there’s a session issue Error Trapping will send to default Error page if there’s a session issue Front-end access point to the Oracle federation requests, will broker the SAML request to the vendor’s SP (ACS) Is session directing to integrated or federated 7 Federated Integrated Jump Service Internal or External? Internal Post Credentials Via Reverse Proxy Rules Extranet Appliance Invoke Company Portal User 1 External As a guest, your directed to a Login Page2
  • 5. Troux Application Flow [Last Updated: 11/29/2015] Author: mreams Client Browser Back-End CompanyACompanyB User A User is logged into computer with companya.com Active Directory credentials ADAuthentication User invokes in IE browser Portfolio Instance A The WAFFLE agent runs in front of the Web Servers as the gateway into the app. WAFFLE checks the user’s Windows AD credentials against it’s configured Troux Roles the person is or is not assigned to Waffle Tomcat Troux_A SQL Cluster ActiveDirectory User Flow Database AD Forest Companya.com Service Account runs the Windows service and brokers againstcoxinc in order to see if the user is in AD groups mapped to Troux Roles ServiceAccount AD Forest Companya.com Is user authorized? User is granted access and will see designated content based on role Yes User is notin any Troux roles and will see blank content on the screen or a message saying access denied No User B User is logged into computer with companyb.com Active Directory credentials ADAuthentication User invokes in IE browser Portfolio Instance B The WAFFLE agent runs in front of the Web Servers as the gateway into the app. WAFFLE checks the user’s Windows AD credentials against it’s configured Troux Roles the person is or is not assigned to Waffle Tomcat Troux_B SQL Cluster AD Forest Companyb.com Service Account runs the Windows service and brokers againstcoxinc in order to see if the user is in AD groups mapped to Troux Roles ServiceAccount AD Forest Companyb.com User is granted access and will see designated content based on role Yes User is notin any Troux roles and will see blank content on the screen or a message saying access denied No Is user authorized? User is granted access User is granted access
  • 6. Refresh System Perform backups Execute Script Check Disk Space Check Memory Check System Processes Check Connectivity Backup Registry User Access DB D:AdministrationDB Stores info Check Log Sizes Collect Network Info Check PageSys size Check NTFS permissions Selectable Options Backup IIS Meta DB Gather Server Info and store into DB Create Report Backup IISReset Clear Logs Truncate SQL Logs Check Application Config