SlideShare a Scribd company logo
1 of 14
Equion Consulting Confluence/IDOL/Active Directory Security Connector John McGuire 19th April 2011
Background International law firm 1 Confidential documents and information 2 Employees search for and only have access to content which they have authorisation 3 A great deal of documentation and information not available due to access restrictions 4
Systems Integrated Active Directory – Enterprise Wide Authentication Autonomy (IDOL) – Enterprise Search Engine  Confluence – Enterprise Collaboration Platform
Content to be searched by IDOL ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Security Issues   IDOL search restricted to “public”, non confidential information and documents within Confluence  Restricted content in Confluence was not indexed by IDOL and therefore not available through enterprise search
Access Control   ,[object Object],[object Object]
Technical Challenges Develop solution initially for Confluence 2.7.2 and then 3.x  Resolve the issues which existed within Active Directory implementation To take the hierarchical permissions structure from Confluence and apply it to each specific item indexed in IDOL Ensure high performance
Technical Challenges ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Custom Confluence Plug-in Maintains the correct access rights Sends content to be indexed by IDOL in real-time i.e. whenever content is created, edited or deleted Extracts all indexable content within Confluence Delivers high performance
Business Benefits Authorised content available  – All authorised content can be searched and made available. Correct access rights are maintained. An individual only able to see the content which they are authorised to see. Business productivity  – Greatly improved productivity. Able to find documents and information quickly using enterprise search.  Real time  -  New content indexed in real time. Available immediately with the correct access rights  Automated process  – No manual intervention, unless a full re-index of content is required to be carried out.
What we did ,[object Object],[object Object],[object Object],[object Object]
Current status ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Greenhopper – Project management The project tools employed: Jira – Project and issue tracking Bamboo – Continuous integration Fisheye – Code changes Crucible – Code review Can strongly recommend the Atlassian project toolset Project Integration Tools  Clover – Testing
Further Information? Contact John McGuire 020 7288 4312 [email_address] www.equionconsulting.com

More Related Content

Viewers also liked

Material modulo02 asf6501(6425-b_01)
Material   modulo02 asf6501(6425-b_01)Material   modulo02 asf6501(6425-b_01)
Material modulo02 asf6501(6425-b_01)
JSantanderQ
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDS
Harsh Sethi
 
Confluence use by OCS
Confluence use by OCSConfluence use by OCS
Confluence use by OCS
London APE
 
Sony migrate to Confluence
Sony migrate to ConfluenceSony migrate to Confluence
Sony migrate to Confluence
London APE
 
Structure Plugin by ALM Works
Structure Plugin by ALM WorksStructure Plugin by ALM Works
Structure Plugin by ALM Works
London APE
 
WWF's Confluence Intranet Journey
WWF's Confluence Intranet JourneyWWF's Confluence Intranet Journey
WWF's Confluence Intranet Journey
London APE
 
Scrum of scrums with JIRA and Greenhopper
Scrum of scrums with JIRA and GreenhopperScrum of scrums with JIRA and Greenhopper
Scrum of scrums with JIRA and Greenhopper
London APE
 
Chapter14 Windows Server 2003 Security Features
Chapter14      Windows  Server 2003  Security  FeaturesChapter14      Windows  Server 2003  Security  Features
Chapter14 Windows Server 2003 Security Features
Raja Waseem Akhtar
 
UserLock 9 Technical Presentation
UserLock 9 Technical PresentationUserLock 9 Technical Presentation
UserLock 9 Technical Presentation
IS Decisions
 

Viewers also liked (20)

Material modulo02 asf6501(6425-b_01)
Material   modulo02 asf6501(6425-b_01)Material   modulo02 asf6501(6425-b_01)
Material modulo02 asf6501(6425-b_01)
 
HMSC_AD Event V3
HMSC_AD Event V3HMSC_AD Event V3
HMSC_AD Event V3
 
70 271 Stu Chap03
70 271 Stu Chap0370 271 Stu Chap03
70 271 Stu Chap03
 
Introduction_of_ADDS
Introduction_of_ADDSIntroduction_of_ADDS
Introduction_of_ADDS
 
Confluence use by OCS
Confluence use by OCSConfluence use by OCS
Confluence use by OCS
 
Sony migrate to Confluence
Sony migrate to ConfluenceSony migrate to Confluence
Sony migrate to Confluence
 
Structure Plugin by ALM Works
Structure Plugin by ALM WorksStructure Plugin by ALM Works
Structure Plugin by ALM Works
 
WWF's Confluence Intranet Journey
WWF's Confluence Intranet JourneyWWF's Confluence Intranet Journey
WWF's Confluence Intranet Journey
 
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
Microsoft, Active Directory, Security Management Tools and Where ManageEngine...
 
Practical AD Security: How to Secure Your Active Directory Network Without Br...
Practical AD Security: How to Secure Your Active Directory Network Without Br...Practical AD Security: How to Secure Your Active Directory Network Without Br...
Practical AD Security: How to Secure Your Active Directory Network Without Br...
 
Scrum of scrums with JIRA and Greenhopper
Scrum of scrums with JIRA and GreenhopperScrum of scrums with JIRA and Greenhopper
Scrum of scrums with JIRA and Greenhopper
 
Chapter14 Windows Server 2003 Security Features
Chapter14      Windows  Server 2003  Security  FeaturesChapter14      Windows  Server 2003  Security  Features
Chapter14 Windows Server 2003 Security Features
 
200308 Active Directory Security
200308 Active Directory Security200308 Active Directory Security
200308 Active Directory Security
 
UserLock 9 Technical Presentation
UserLock 9 Technical PresentationUserLock 9 Technical Presentation
UserLock 9 Technical Presentation
 
Windows Active Directory Security with IS Decisions
Windows Active Directory Security with IS DecisionsWindows Active Directory Security with IS Decisions
Windows Active Directory Security with IS Decisions
 
OneDrive For Business - What's new for IT Administrators and End-users
OneDrive For Business - What's new for IT Administrators and End-usersOneDrive For Business - What's new for IT Administrators and End-users
OneDrive For Business - What's new for IT Administrators and End-users
 
What's Next in Growth? 2016
What's Next in Growth? 2016What's Next in Growth? 2016
What's Next in Growth? 2016
 
The Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post FormatsThe Six Highest Performing B2B Blog Post Formats
The Six Highest Performing B2B Blog Post Formats
 
The Outcome Economy
The Outcome EconomyThe Outcome Economy
The Outcome Economy
 
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business32 Ways a Digital Marketing Consultant Can Help Grow Your Business
32 Ways a Digital Marketing Consultant Can Help Grow Your Business
 

Similar to Confluence/IDOL/Active Directory Security Connector

CESSI Digital Library Case Study Eng
CESSI Digital Library Case Study EngCESSI Digital Library Case Study Eng
CESSI Digital Library Case Study Eng
atolomei
 
Monica Crocker Implementing Ecm Aiim 2009
Monica Crocker   Implementing Ecm Aiim 2009Monica Crocker   Implementing Ecm Aiim 2009
Monica Crocker Implementing Ecm Aiim 2009
AIIM Minnesota
 
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...
BlueFish
 

Similar to Confluence/IDOL/Active Directory Security Connector (20)

Leverage DSpace for an enterprise, mission critical platform
Leverage DSpace for an enterprise, mission critical platformLeverage DSpace for an enterprise, mission critical platform
Leverage DSpace for an enterprise, mission critical platform
 
Zia Fresh Project demo
Zia   Fresh Project demoZia   Fresh Project demo
Zia Fresh Project demo
 
Overview Clearvale - The Social Business Cloud
Overview Clearvale - The Social Business CloudOverview Clearvale - The Social Business Cloud
Overview Clearvale - The Social Business Cloud
 
CESSI Digital Library Case Study Eng
CESSI Digital Library Case Study EngCESSI Digital Library Case Study Eng
CESSI Digital Library Case Study Eng
 
124 sidman
124 sidman124 sidman
124 sidman
 
Monica Crocker Implementing Ecm Aiim 2009
Monica Crocker   Implementing Ecm Aiim 2009Monica Crocker   Implementing Ecm Aiim 2009
Monica Crocker Implementing Ecm Aiim 2009
 
Alfresco Webinar: Jive Toolkit
Alfresco Webinar: Jive ToolkitAlfresco Webinar: Jive Toolkit
Alfresco Webinar: Jive Toolkit
 
Agile Executive Briefing - Situational Assessment + 50k Ft View
Agile Executive Briefing - Situational Assessment + 50k Ft ViewAgile Executive Briefing - Situational Assessment + 50k Ft View
Agile Executive Briefing - Situational Assessment + 50k Ft View
 
Software Lifecycle Collaboration The Wiki Way
Software Lifecycle Collaboration The Wiki WaySoftware Lifecycle Collaboration The Wiki Way
Software Lifecycle Collaboration The Wiki Way
 
Fishbowl Solutions LinkSecurity for Windchill 9.x
Fishbowl Solutions LinkSecurity for Windchill 9.xFishbowl Solutions LinkSecurity for Windchill 9.x
Fishbowl Solutions LinkSecurity for Windchill 9.x
 
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...
Power to the People- Enabling Ever US Citizen to Participate in Federal Rule ...
 
Infoaxon extended enterprise
Infoaxon extended enterpriseInfoaxon extended enterprise
Infoaxon extended enterprise
 
ConfluentMinds - Auto-creating logic execution hierarchy from source code and...
ConfluentMinds - Auto-creating logic execution hierarchy from source code and...ConfluentMinds - Auto-creating logic execution hierarchy from source code and...
ConfluentMinds - Auto-creating logic execution hierarchy from source code and...
 
The Race To 50 Million Page Views
The Race To 50 Million Page ViewsThe Race To 50 Million Page Views
The Race To 50 Million Page Views
 
CCLA Oracle WebCenter Portal Spaces Case Study
CCLA Oracle WebCenter Portal Spaces Case StudyCCLA Oracle WebCenter Portal Spaces Case Study
CCLA Oracle WebCenter Portal Spaces Case Study
 
Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)Cloudciti Enterprise File Share (EFS)
Cloudciti Enterprise File Share (EFS)
 
2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil2011 NASA Open Source Summit - Forge.mil
2011 NASA Open Source Summit - Forge.mil
 
Federating Subversion and Git
Federating Subversion and GitFederating Subversion and Git
Federating Subversion and Git
 
Rundeck Office Hours: Best Practices for Access Control Policies
Rundeck Office Hours:  Best Practices for Access Control PoliciesRundeck Office Hours:  Best Practices for Access Control Policies
Rundeck Office Hours: Best Practices for Access Control Policies
 
Rundeck Office Hours: Best Practices Access Control Policies
Rundeck Office Hours:  Best Practices Access Control PoliciesRundeck Office Hours:  Best Practices Access Control Policies
Rundeck Office Hours: Best Practices Access Control Policies
 

More from London APE (9)

Social Media Adoption and Change Management
Social Media Adoption and Change ManagementSocial Media Adoption and Change Management
Social Media Adoption and Change Management
 
Ambassadors go forth...
Ambassadors go forth...Ambassadors go forth...
Ambassadors go forth...
 
Charting a Course Towards Intranet 3.0
Charting a Course Towards Intranet 3.0Charting a Course Towards Intranet 3.0
Charting a Course Towards Intranet 3.0
 
Integrating Atlassian Products
Integrating Atlassian ProductsIntegrating Atlassian Products
Integrating Atlassian Products
 
Worldwide Online Community - A Confluence Case Study
Worldwide Online Community - A Confluence Case StudyWorldwide Online Community - A Confluence Case Study
Worldwide Online Community - A Confluence Case Study
 
RefinedWiki
RefinedWikiRefinedWiki
RefinedWiki
 
JIRA Studio at VisualDNA
JIRA Studio at VisualDNAJIRA Studio at VisualDNA
JIRA Studio at VisualDNA
 
Confluence 3.5, JIRA 4.3 and beyond
Confluence 3.5, JIRA 4.3 and beyondConfluence 3.5, JIRA 4.3 and beyond
Confluence 3.5, JIRA 4.3 and beyond
 
Implementing Confluence in to a global SME
Implementing Confluence in to a global SMEImplementing Confluence in to a global SME
Implementing Confluence in to a global SME
 

Recently uploaded

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Recently uploaded (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Confluence/IDOL/Active Directory Security Connector

  • 1. Equion Consulting Confluence/IDOL/Active Directory Security Connector John McGuire 19th April 2011
  • 2. Background International law firm 1 Confidential documents and information 2 Employees search for and only have access to content which they have authorisation 3 A great deal of documentation and information not available due to access restrictions 4
  • 3. Systems Integrated Active Directory – Enterprise Wide Authentication Autonomy (IDOL) – Enterprise Search Engine Confluence – Enterprise Collaboration Platform
  • 4.
  • 5. Security Issues IDOL search restricted to “public”, non confidential information and documents within Confluence Restricted content in Confluence was not indexed by IDOL and therefore not available through enterprise search
  • 6.
  • 7. Technical Challenges Develop solution initially for Confluence 2.7.2 and then 3.x Resolve the issues which existed within Active Directory implementation To take the hierarchical permissions structure from Confluence and apply it to each specific item indexed in IDOL Ensure high performance
  • 8.
  • 9. Custom Confluence Plug-in Maintains the correct access rights Sends content to be indexed by IDOL in real-time i.e. whenever content is created, edited or deleted Extracts all indexable content within Confluence Delivers high performance
  • 10. Business Benefits Authorised content available – All authorised content can be searched and made available. Correct access rights are maintained. An individual only able to see the content which they are authorised to see. Business productivity – Greatly improved productivity. Able to find documents and information quickly using enterprise search. Real time - New content indexed in real time. Available immediately with the correct access rights Automated process – No manual intervention, unless a full re-index of content is required to be carried out.
  • 11.
  • 12.
  • 13. Greenhopper – Project management The project tools employed: Jira – Project and issue tracking Bamboo – Continuous integration Fisheye – Code changes Crucible – Code review Can strongly recommend the Atlassian project toolset Project Integration Tools Clover – Testing
  • 14. Further Information? Contact John McGuire 020 7288 4312 [email_address] www.equionconsulting.com