SlideShare a Scribd company logo
1 of 14
Download to read offline
Secure real-time
collaboration with
SecurePass                                               and
Etherpad
Giuseppe Paterno', IT Security Architect and CTO, GARL
Luca Oldano, Senior Network and Security Engineer, Moresi.com
What is a "Pad"
A "Pad" is an on-line web-based collaborative
real-time editor, allowing authors to
simultaneously edit a text document, and see all
of  the participants' edits in real-time, with the
ability to display each  author's text in their own
color.
Anyone can create a new collaborative
document, known as a "pad". Each pad has its
own URL and anyone who knows this URL can
edit the pad and participate in the  associated
chats. Password-protected pads are also
possible. Each participant is identified by a color
and a name.
The software auto-saves the document at regular,
short intervals, but  participants can permanently
save specific versions (checkpoints) at  any
time. A "time machine" feature allows anyone to
explore the history of the pad, going back in the
past release. The major "milestones" can also be
tagged (or "stared"). 
A great feature of some pads is that document
can be imported and exported in plain text,
HTML, Open Document, Microsoft Word, or PDF
format.


Secure real-time collaboration with                   and Etherpad
Working with "Pads"
          Working with pads is business going social:  social networks get us used to be always
          updated and connected to our community anytime and anywhere.  A pad follow that
          mindset and enables you with a simple tool to collaborate with your colleagues and
          partners while ensuring the right level of privacy online.

          Consider a pad like a clear whiteboard, open a new one and simply start writing an
          idea or a challenge. Invite your team, your partners, your external collaborators -no
          matter where they are- to share your ideas at the same time.

          Let  the pad grow with the contribution and the experience of trusted  people, every
          projects has the right team that are ready to contribute.  Review and compare the text
          with preview versions, until you'll find the answer and achieve your goal.

          Then export it, in your favourite format and share it. For example, write project
          documentations with your team through a pad and deliver it in a professional way
          using your favorite tool such as Microsoft Word.




Secure real-time collaboration with               and Etherpad
Secure real-time
collaboration
Innovate, experiment, engage your customers in an easy and
secure way. With a shared pad in a protected enviroment, it's easy focus
on core facts and forget about your information being accessed from
unauthorized users. All you have to do is following the speed of business. 

Secure cooperation with employees and partners is now possible on the
cloud with the protection of SecurePass.

Access to a pad is as easy as sharing the web adress of your pad, SecurePass
will ensure that access to information is allowed only to authorized users. 

By integrating a pad with SecurePass you will be able to:


‣identify your employees and partners in a proper way
‣limit access to your company and/or your partners (with Apache module)
‣cooperate from anywhere, also through tablets and smartphones, without
fear of loosing precious company information


 Secure real-time collaboration with                   and Etherpad
Architecture




Secure real-time collaboration with   and Etherpad
Etherpad
 Etherpad is probably the most famous
 pad server implementation: it was born
 in 2008 by some Google employees.

 Etherpad itself is implemented in
 JavaScript, through the Node,js
 application environment.

 Etherpad was the first web application
 of its kind to achieve true real-time
 performance, 

 The home page is on: http://etherpad.org




Secure real-time collaboration with         and Etherpad
Apache HTTPd
Apache will be handling all data comunication from the external world, playing an important role for securing
communication. In particular, the Apache web server will be performing the following roles:



       SSL termination


      Reverse proxy to the Etherpad web server on Node.js


       Authenticating the user using the SecurePass Web Single Sing-On feature


      Limitation of the SecurePass domains/realm for using the pad only within your company or allowing external partners

       Translating the user identity into something that Etherpad is able to understand


  We will not go in details on how to create a virtual server with the SSL feature.
  The configuration has been tested with CentOS 6.




  Secure real-time collaboration with                  and Etherpad
Apache configuration
for SecurePass
Follow the instructions on this website:
http://support.secure-pass.net/wiki/index.php/Apache
and ensure you have these values set:



 CASCookiePath /var/cache/mod_auth_cas/
 CASValidateServer Off
 CASLoginURL https://login.secure-pass.net/cas/login
 CASValidateURL https://login.secure-pass.net/cas/serviceValidate
 CASAllowWildcardCert On


In CentOS you have to create the path
 
/var/cache/mod_auth_cas/




 Secure real-time collaboration with                     and Etherpad
Apache Reverse Proxy
The following statement has to be copied
in the Apache virtual host and will reverse
proxy all the requests to the Etherpad
service, with the exception of the
administrative interface of Etherpad.


 ProxyVia On
 ProxyRequests Off
 ProxyPass /admin !
 ProxyPass / http://127.0.0.1:9001/ retry=0
 ProxyPassReverse / http://127.0.0.1:9001/
 ProxyPreserveHost on
 <Proxy *>
   Options FollowSymLinks MultiViews
   AllowOverride All
   Order allow,deny
   allow from all
 </Proxy>




 Secure real-time collaboration with          and Etherpad
Install SecurePass
Apache module
This module will introduce the feature of limiting the access
to the Etherpad to your company or the partners/companies
you wish to cooperate with.

Please download from the following site:

https://github.com/AlessandroLorenzi/mod_authz_securepass

and follow the instructions in the INSTALL file




  Secure real-time collaboration with                 and Etherpad
Configure authentication
in Apache
The following statement has to be copied in the                             <Location />
Apache virtual host and will enable:                                         AuthType CAS
                                                                              Require sprealm mycompany.com partner.net
1.       Authentication with SecurePass                                     RewriteEngine On

2.       Limit the access to the realms listed in "Require                  RewriteCond %{REMOTE_USER} (.+)
         sprealm" directive (modify as appropriate)                         RewriteRule . - [E=RU:%1]
                                                                            RequestHeader add X-Forwarded-User %{RU}e
3.       Pass the REMOTE_USER variable as the
         X-Forwarded-User header                                            Header Set Cache-Control "max-age=0, no-store"

                                                                            </Location>




     Secure real-time collaboration with                     and Etherpad
Install and Integration
Etherpad
To install Etherpad in your system, please                  Install the plugin sotauth to be able to
follow the instructions in the web site:                    identify the user via the X-Forwarded-
                                                            user HTTP header:

https://help.ubuntu.com/community/                          https://github.com/wtsi-hgi/ep_sotauth
Etherpad-liteInstallation

Note that in the website there is also an
upstart configuration file that will work                     In the Etherpad configuration file
also on CentOS 6.                                           "settings.json" enable
                                                            "requireAuthentication" and
In our installation we also used MySQL to                   "requireAuthorization"
have a more production-ready database.




  Secure real-time collaboration with        and Etherpad
Conclusions
A lot of organisations are now
adopting a collaboration tool
to improve efficiency: the easy
model of Etherpad with the
trusted protection of
SecurePass let the cloud be the
right tool to save your time and
money. 

Once the secure pad tool has
been implemented and become a
part of everyday business,
your business could rely on a new
fast way to engage with partners,
customers and your team.




  Secure real-time collaboration with   and Etherpad
Your daily
                     secure
                   business
                     online




Sponsored by



www.secure-pass.net            www.moresi.com

More Related Content

What's hot

JavaOne India 2011 - Running your Java EE 6 Apps in the Cloud
JavaOne India 2011 - Running your Java EE 6 Apps in the CloudJavaOne India 2011 - Running your Java EE 6 Apps in the Cloud
JavaOne India 2011 - Running your Java EE 6 Apps in the CloudArun Gupta
 
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...Jan Löffler
 
Stups.io - an Open Source Cloud Framework for AWS
Stups.io - an Open Source Cloud Framework for AWSStups.io - an Open Source Cloud Framework for AWS
Stups.io - an Open Source Cloud Framework for AWSJan Löffler
 
Az 104 session 2 implement and manage azure webapps and container
Az 104 session 2 implement and manage azure webapps and containerAz 104 session 2 implement and manage azure webapps and container
Az 104 session 2 implement and manage azure webapps and containerAzureEzy1
 
AZ-204 : Implement Azure security
AZ-204 : Implement Azure securityAZ-204 : Implement Azure security
AZ-204 : Implement Azure securityAzureEzy1
 
Az 900 session 2-core azure services
Az 900 session 2-core azure servicesAz 900 session 2-core azure services
Az 900 session 2-core azure servicesAzureEzy1
 
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?Louis Göhl
 
AZ-400: Define and implement continuous integration – Part 2
AZ-400: Define and implement continuous integration – Part 2AZ-400: Define and implement continuous integration – Part 2
AZ-400: Define and implement continuous integration – Part 2AzureEzy1
 
Az 104 session 3 azure compute
Az 104 session 3 azure compute Az 104 session 3 azure compute
Az 104 session 3 azure compute AzureEzy1
 

What's hot (10)

JavaOne India 2011 - Running your Java EE 6 Apps in the Cloud
JavaOne India 2011 - Running your Java EE 6 Apps in the CloudJavaOne India 2011 - Running your Java EE 6 Apps in the Cloud
JavaOne India 2011 - Running your Java EE 6 Apps in the Cloud
 
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
 
Stups.io - an Open Source Cloud Framework for AWS
Stups.io - an Open Source Cloud Framework for AWSStups.io - an Open Source Cloud Framework for AWS
Stups.io - an Open Source Cloud Framework for AWS
 
Az 104 session 2 implement and manage azure webapps and container
Az 104 session 2 implement and manage azure webapps and containerAz 104 session 2 implement and manage azure webapps and container
Az 104 session 2 implement and manage azure webapps and container
 
AZ-204 : Implement Azure security
AZ-204 : Implement Azure securityAZ-204 : Implement Azure security
AZ-204 : Implement Azure security
 
Informology - Introduction to juju
Informology - Introduction to jujuInformology - Introduction to juju
Informology - Introduction to juju
 
Az 900 session 2-core azure services
Az 900 session 2-core azure servicesAz 900 session 2-core azure services
Az 900 session 2-core azure services
 
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
 
AZ-400: Define and implement continuous integration – Part 2
AZ-400: Define and implement continuous integration – Part 2AZ-400: Define and implement continuous integration – Part 2
AZ-400: Define and implement continuous integration – Part 2
 
Az 104 session 3 azure compute
Az 104 session 3 azure compute Az 104 session 3 azure compute
Az 104 session 3 azure compute
 

Similar to Secure real-time collaboration with SecurePass and Etherpad

Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutionsNick Owen
 
Tame Your Build And Deployment Process With Hudson, PHPUnit, and SSH
Tame Your Build And Deployment Process With Hudson, PHPUnit, and SSHTame Your Build And Deployment Process With Hudson, PHPUnit, and SSH
Tame Your Build And Deployment Process With Hudson, PHPUnit, and SSHDavid Stockton
 
Single Sign-On for APEX applications based on Kerberos (Important: latest ver...
Single Sign-On for APEX applications based on Kerberos (Important: latest ver...Single Sign-On for APEX applications based on Kerberos (Important: latest ver...
Single Sign-On for APEX applications based on Kerberos (Important: latest ver...Niels de Bruijn
 
Building APIs with NodeJS on Microsoft Azure Websites - Redmond
Building APIs with NodeJS on Microsoft Azure Websites - RedmondBuilding APIs with NodeJS on Microsoft Azure Websites - Redmond
Building APIs with NodeJS on Microsoft Azure Websites - RedmondRick G. Garibay
 
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the ProxyCloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the ProxyMaki Toshio
 
PVS-Studio: analyzing pull requests in Azure DevOps using self-hosted agents
PVS-Studio: analyzing pull requests in Azure DevOps using self-hosted agentsPVS-Studio: analyzing pull requests in Azure DevOps using self-hosted agents
PVS-Studio: analyzing pull requests in Azure DevOps using self-hosted agentsAndrey Karpov
 
Automation in Digital Cloud Labs
Automation in Digital Cloud LabsAutomation in Digital Cloud Labs
Automation in Digital Cloud LabsRapidValue
 
Magento security best practices magento's approach to pci compliance
Magento security best practices  magento's approach to pci complianceMagento security best practices  magento's approach to pci compliance
Magento security best practices magento's approach to pci complianceRitwik Das
 
ArcMC for Azure 2.2 Setup Guide
ArcMC for Azure 2.2 Setup GuideArcMC for Azure 2.2 Setup Guide
ArcMC for Azure 2.2 Setup GuideProtect724mouni
 
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...Patrick Chanezon
 
Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...
Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...
Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...Docker, Inc.
 
Using aphace-as-proxy-server
Using aphace-as-proxy-serverUsing aphace-as-proxy-server
Using aphace-as-proxy-serverHARRY CHAN PUTRA
 
presentation @ docker meetup
presentation @ docker meetuppresentation @ docker meetup
presentation @ docker meetupDaniël van Gils
 
Week 4 lecture material cc (1)
Week 4 lecture material cc (1)Week 4 lecture material cc (1)
Week 4 lecture material cc (1)Ankit Gupta
 
Industrialization, be fast be furious!
Industrialization, be fast be furious!Industrialization, be fast be furious!
Industrialization, be fast be furious!Patrick Morin
 
Cloud Foundry a Developer's Perspective
Cloud Foundry a Developer's PerspectiveCloud Foundry a Developer's Perspective
Cloud Foundry a Developer's PerspectiveDave McCrory
 

Similar to Secure real-time collaboration with SecurePass and Etherpad (20)

Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutions
 
Tame Your Build And Deployment Process With Hudson, PHPUnit, and SSH
Tame Your Build And Deployment Process With Hudson, PHPUnit, and SSHTame Your Build And Deployment Process With Hudson, PHPUnit, and SSH
Tame Your Build And Deployment Process With Hudson, PHPUnit, and SSH
 
Single Sign-On for APEX applications based on Kerberos (Important: latest ver...
Single Sign-On for APEX applications based on Kerberos (Important: latest ver...Single Sign-On for APEX applications based on Kerberos (Important: latest ver...
Single Sign-On for APEX applications based on Kerberos (Important: latest ver...
 
Building APIs with NodeJS on Microsoft Azure Websites - Redmond
Building APIs with NodeJS on Microsoft Azure Websites - RedmondBuilding APIs with NodeJS on Microsoft Azure Websites - Redmond
Building APIs with NodeJS on Microsoft Azure Websites - Redmond
 
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the ProxyCloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
 
PVS-Studio: analyzing pull requests in Azure DevOps using self-hosted agents
PVS-Studio: analyzing pull requests in Azure DevOps using self-hosted agentsPVS-Studio: analyzing pull requests in Azure DevOps using self-hosted agents
PVS-Studio: analyzing pull requests in Azure DevOps using self-hosted agents
 
Automation in Digital Cloud Labs
Automation in Digital Cloud LabsAutomation in Digital Cloud Labs
Automation in Digital Cloud Labs
 
Windows azure overview for SharePoint Pros
Windows azure overview for SharePoint Pros Windows azure overview for SharePoint Pros
Windows azure overview for SharePoint Pros
 
Magento security best practices magento's approach to pci compliance
Magento security best practices  magento's approach to pci complianceMagento security best practices  magento's approach to pci compliance
Magento security best practices magento's approach to pci compliance
 
ArcMC for Azure 2.2 Setup Guide
ArcMC for Azure 2.2 Setup GuideArcMC for Azure 2.2 Setup Guide
ArcMC for Azure 2.2 Setup Guide
 
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...
 
Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...
Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...
Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...
 
Using aphace-as-proxy-server
Using aphace-as-proxy-serverUsing aphace-as-proxy-server
Using aphace-as-proxy-server
 
Security Testing Using Infrastructure-As-Code
Security Testing Using Infrastructure-As-CodeSecurity Testing Using Infrastructure-As-Code
Security Testing Using Infrastructure-As-Code
 
presentation @ docker meetup
presentation @ docker meetuppresentation @ docker meetup
presentation @ docker meetup
 
Week 4 lecture material cc (1)
Week 4 lecture material cc (1)Week 4 lecture material cc (1)
Week 4 lecture material cc (1)
 
Industrialization, be fast be furious!
Industrialization, be fast be furious!Industrialization, be fast be furious!
Industrialization, be fast be furious!
 
docker.docx
docker.docxdocker.docx
docker.docx
 
Cloud Foundry a Developer's Perspective
Cloud Foundry a Developer's PerspectiveCloud Foundry a Developer's Perspective
Cloud Foundry a Developer's Perspective
 
Pyramid patterns
Pyramid patternsPyramid patterns
Pyramid patterns
 

More from Giuseppe Paterno'

OpenStack e le nuove Infrastrutture IT
OpenStack e le nuove Infrastrutture ITOpenStack e le nuove Infrastrutture IT
OpenStack e le nuove Infrastrutture ITGiuseppe Paterno'
 
OpenStack Explained: Learn OpenStack architecture and the secret of a success...
OpenStack Explained: Learn OpenStack architecture and the secret of a success...OpenStack Explained: Learn OpenStack architecture and the secret of a success...
OpenStack Explained: Learn OpenStack architecture and the secret of a success...Giuseppe Paterno'
 
Let's sleep better: programming techniques to face new security attacks in cloud
Let's sleep better: programming techniques to face new security attacks in cloudLet's sleep better: programming techniques to face new security attacks in cloud
Let's sleep better: programming techniques to face new security attacks in cloudGiuseppe Paterno'
 
OpenStack: Security Beyond Firewalls
OpenStack: Security Beyond FirewallsOpenStack: Security Beyond Firewalls
OpenStack: Security Beyond FirewallsGiuseppe Paterno'
 
Remote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise LinuxRemote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise LinuxGiuseppe Paterno'
 
Il problema dei furti di identità nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identità nelle infrastrutture Cloud e possibili rimediIl problema dei furti di identità nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identità nelle infrastrutture Cloud e possibili rimediGiuseppe Paterno'
 
How the Post-PC era changed IT Ubuntu for next gen datacenters
How the Post-PC era changed IT Ubuntu for next gen datacentersHow the Post-PC era changed IT Ubuntu for next gen datacenters
How the Post-PC era changed IT Ubuntu for next gen datacentersGiuseppe Paterno'
 
Filesystem Comparison: NFS vs GFS2 vs OCFS2
Filesystem Comparison: NFS vs GFS2 vs OCFS2Filesystem Comparison: NFS vs GFS2 vs OCFS2
Filesystem Comparison: NFS vs GFS2 vs OCFS2Giuseppe Paterno'
 
Creating OTP with free software
Creating OTP with free softwareCreating OTP with free software
Creating OTP with free softwareGiuseppe Paterno'
 
Protecting confidential files using SE-Linux
Protecting confidential files using SE-LinuxProtecting confidential files using SE-Linux
Protecting confidential files using SE-LinuxGiuseppe Paterno'
 
Comparing IaaS: VMware vs OpenStack vs Google’s Ganeti
Comparing IaaS: VMware vs OpenStack vs Google’s GanetiComparing IaaS: VMware vs OpenStack vs Google’s Ganeti
Comparing IaaS: VMware vs OpenStack vs Google’s GanetiGiuseppe Paterno'
 
La gestione delle identità per il controllo delle frodi bancarie
La gestione delle identità per il controllo delle frodi bancarieLa gestione delle identità per il controllo delle frodi bancarie
La gestione delle identità per il controllo delle frodi bancarieGiuseppe Paterno'
 
Identity theft in the Cloud and remedies
Identity theft in the Cloud and remediesIdentity theft in the Cloud and remedies
Identity theft in the Cloud and remediesGiuseppe Paterno'
 
Il problema dei furti di identita' nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identita' nelle infrastrutture Cloud e possibili rimediIl problema dei furti di identita' nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identita' nelle infrastrutture Cloud e possibili rimediGiuseppe Paterno'
 

More from Giuseppe Paterno' (15)

OpenStack e le nuove Infrastrutture IT
OpenStack e le nuove Infrastrutture ITOpenStack e le nuove Infrastrutture IT
OpenStack e le nuove Infrastrutture IT
 
OpenStack Explained: Learn OpenStack architecture and the secret of a success...
OpenStack Explained: Learn OpenStack architecture and the secret of a success...OpenStack Explained: Learn OpenStack architecture and the secret of a success...
OpenStack Explained: Learn OpenStack architecture and the secret of a success...
 
Let's sleep better: programming techniques to face new security attacks in cloud
Let's sleep better: programming techniques to face new security attacks in cloudLet's sleep better: programming techniques to face new security attacks in cloud
Let's sleep better: programming techniques to face new security attacks in cloud
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
OpenStack: Security Beyond Firewalls
OpenStack: Security Beyond FirewallsOpenStack: Security Beyond Firewalls
OpenStack: Security Beyond Firewalls
 
Remote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise LinuxRemote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise Linux
 
Il problema dei furti di identità nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identità nelle infrastrutture Cloud e possibili rimediIl problema dei furti di identità nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identità nelle infrastrutture Cloud e possibili rimedi
 
How the Post-PC era changed IT Ubuntu for next gen datacenters
How the Post-PC era changed IT Ubuntu for next gen datacentersHow the Post-PC era changed IT Ubuntu for next gen datacenters
How the Post-PC era changed IT Ubuntu for next gen datacenters
 
Filesystem Comparison: NFS vs GFS2 vs OCFS2
Filesystem Comparison: NFS vs GFS2 vs OCFS2Filesystem Comparison: NFS vs GFS2 vs OCFS2
Filesystem Comparison: NFS vs GFS2 vs OCFS2
 
Creating OTP with free software
Creating OTP with free softwareCreating OTP with free software
Creating OTP with free software
 
Protecting confidential files using SE-Linux
Protecting confidential files using SE-LinuxProtecting confidential files using SE-Linux
Protecting confidential files using SE-Linux
 
Comparing IaaS: VMware vs OpenStack vs Google’s Ganeti
Comparing IaaS: VMware vs OpenStack vs Google’s GanetiComparing IaaS: VMware vs OpenStack vs Google’s Ganeti
Comparing IaaS: VMware vs OpenStack vs Google’s Ganeti
 
La gestione delle identità per il controllo delle frodi bancarie
La gestione delle identità per il controllo delle frodi bancarieLa gestione delle identità per il controllo delle frodi bancarie
La gestione delle identità per il controllo delle frodi bancarie
 
Identity theft in the Cloud and remedies
Identity theft in the Cloud and remediesIdentity theft in the Cloud and remedies
Identity theft in the Cloud and remedies
 
Il problema dei furti di identita' nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identita' nelle infrastrutture Cloud e possibili rimediIl problema dei furti di identita' nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identita' nelle infrastrutture Cloud e possibili rimedi
 

Recently uploaded

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 

Recently uploaded (20)

SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 

Secure real-time collaboration with SecurePass and Etherpad

  • 1. Secure real-time collaboration with SecurePass and Etherpad Giuseppe Paterno', IT Security Architect and CTO, GARL Luca Oldano, Senior Network and Security Engineer, Moresi.com
  • 2. What is a "Pad" A "Pad" is an on-line web-based collaborative real-time editor, allowing authors to simultaneously edit a text document, and see all of  the participants' edits in real-time, with the ability to display each  author's text in their own color. Anyone can create a new collaborative document, known as a "pad". Each pad has its own URL and anyone who knows this URL can edit the pad and participate in the  associated chats. Password-protected pads are also possible. Each participant is identified by a color and a name. The software auto-saves the document at regular, short intervals, but  participants can permanently save specific versions (checkpoints) at  any time. A "time machine" feature allows anyone to explore the history of the pad, going back in the past release. The major "milestones" can also be tagged (or "stared").  A great feature of some pads is that document can be imported and exported in plain text, HTML, Open Document, Microsoft Word, or PDF format. Secure real-time collaboration with and Etherpad
  • 3. Working with "Pads" Working with pads is business going social:  social networks get us used to be always updated and connected to our community anytime and anywhere.  A pad follow that mindset and enables you with a simple tool to collaborate with your colleagues and partners while ensuring the right level of privacy online. Consider a pad like a clear whiteboard, open a new one and simply start writing an idea or a challenge. Invite your team, your partners, your external collaborators -no matter where they are- to share your ideas at the same time. Let  the pad grow with the contribution and the experience of trusted  people, every projects has the right team that are ready to contribute.  Review and compare the text with preview versions, until you'll find the answer and achieve your goal. Then export it, in your favourite format and share it. For example, write project documentations with your team through a pad and deliver it in a professional way using your favorite tool such as Microsoft Word. Secure real-time collaboration with and Etherpad
  • 4. Secure real-time collaboration Innovate, experiment, engage your customers in an easy and secure way. With a shared pad in a protected enviroment, it's easy focus on core facts and forget about your information being accessed from unauthorized users. All you have to do is following the speed of business.  Secure cooperation with employees and partners is now possible on the cloud with the protection of SecurePass. Access to a pad is as easy as sharing the web adress of your pad, SecurePass will ensure that access to information is allowed only to authorized users.  By integrating a pad with SecurePass you will be able to: ‣identify your employees and partners in a proper way ‣limit access to your company and/or your partners (with Apache module) ‣cooperate from anywhere, also through tablets and smartphones, without fear of loosing precious company information Secure real-time collaboration with and Etherpad
  • 6. Etherpad Etherpad is probably the most famous pad server implementation: it was born in 2008 by some Google employees. Etherpad itself is implemented in JavaScript, through the Node,js application environment. Etherpad was the first web application of its kind to achieve true real-time performance,  The home page is on: http://etherpad.org Secure real-time collaboration with and Etherpad
  • 7. Apache HTTPd Apache will be handling all data comunication from the external world, playing an important role for securing communication. In particular, the Apache web server will be performing the following roles: SSL termination Reverse proxy to the Etherpad web server on Node.js Authenticating the user using the SecurePass Web Single Sing-On feature Limitation of the SecurePass domains/realm for using the pad only within your company or allowing external partners Translating the user identity into something that Etherpad is able to understand We will not go in details on how to create a virtual server with the SSL feature. The configuration has been tested with CentOS 6. Secure real-time collaboration with and Etherpad
  • 8. Apache configuration for SecurePass Follow the instructions on this website: http://support.secure-pass.net/wiki/index.php/Apache and ensure you have these values set: CASCookiePath /var/cache/mod_auth_cas/ CASValidateServer Off CASLoginURL https://login.secure-pass.net/cas/login CASValidateURL https://login.secure-pass.net/cas/serviceValidate CASAllowWildcardCert On In CentOS you have to create the path   /var/cache/mod_auth_cas/ Secure real-time collaboration with and Etherpad
  • 9. Apache Reverse Proxy The following statement has to be copied in the Apache virtual host and will reverse proxy all the requests to the Etherpad service, with the exception of the administrative interface of Etherpad. ProxyVia On ProxyRequests Off ProxyPass /admin ! ProxyPass / http://127.0.0.1:9001/ retry=0 ProxyPassReverse / http://127.0.0.1:9001/ ProxyPreserveHost on <Proxy *> Options FollowSymLinks MultiViews AllowOverride All Order allow,deny allow from all </Proxy> Secure real-time collaboration with and Etherpad
  • 10. Install SecurePass Apache module This module will introduce the feature of limiting the access to the Etherpad to your company or the partners/companies you wish to cooperate with. Please download from the following site: https://github.com/AlessandroLorenzi/mod_authz_securepass and follow the instructions in the INSTALL file Secure real-time collaboration with and Etherpad
  • 11. Configure authentication in Apache The following statement has to be copied in the <Location /> Apache virtual host and will enable: AuthType CAS Require sprealm mycompany.com partner.net 1. Authentication with SecurePass RewriteEngine On 2. Limit the access to the realms listed in "Require RewriteCond %{REMOTE_USER} (.+) sprealm" directive (modify as appropriate) RewriteRule . - [E=RU:%1] RequestHeader add X-Forwarded-User %{RU}e 3. Pass the REMOTE_USER variable as the X-Forwarded-User header Header Set Cache-Control "max-age=0, no-store" </Location> Secure real-time collaboration with and Etherpad
  • 12. Install and Integration Etherpad To install Etherpad in your system, please Install the plugin sotauth to be able to follow the instructions in the web site: identify the user via the X-Forwarded- user HTTP header: https://help.ubuntu.com/community/ https://github.com/wtsi-hgi/ep_sotauth Etherpad-liteInstallation Note that in the website there is also an upstart configuration file that will work In the Etherpad configuration file also on CentOS 6. "settings.json" enable "requireAuthentication" and In our installation we also used MySQL to "requireAuthorization" have a more production-ready database. Secure real-time collaboration with and Etherpad
  • 13. Conclusions A lot of organisations are now adopting a collaboration tool to improve efficiency: the easy model of Etherpad with the trusted protection of SecurePass let the cloud be the right tool to save your time and money.  Once the secure pad tool has been implemented and become a part of everyday business, your business could rely on a new fast way to engage with partners, customers and your team. Secure real-time collaboration with and Etherpad
  • 14. Your daily secure business online Sponsored by www.secure-pass.net www.moresi.com