The document discusses the core attributes that identity providers and service providers need to agree on when using federated access management with Shibboleth. It outlines some of the challenges identity providers face in balancing the needs of service providers with privacy and legal responsibilities. The document then provides guidance on technical implementation of core attributes like eduPersonScopedAffiliation, eduPersonTargetedID, and eduPersonEntitlement. It emphasizes finding a balance that satisfies requirements for many situations while protecting users' personal information.
The document discusses Domain Driven Design (DDD). It covers key concepts in DDD including focusing on the domain, using a ubiquitous language, layered architecture with separate domains, application and infrastructure layers, using entities and value objects to represent concepts in the domain, implementing domain logic using stateless services, organizing the domain model into modules and aggregates, and using factories and repositories for object creation and retrieval. The document also discusses domain specific languages and ensuring the domain model code is readable to both developers and business analysts.
The document discusses various techniques for discovery in federated identity management systems using Shibboleth, including traditional centralized discovery using WAYF services, decentralized approaches like service provider-centric and identity provider-centric discovery, and futuristic client-centric discovery. It focuses on contributions from the Shibboleth Development and Support Services project, including an improved WAYF implementation and support for identity provider-centric discovery through the use of session initiators in Shibboleth service providers.
This short document repeats the phrase "Managers are Managers" multiple times without providing any additional context or information. It does not have a clear topic, message, or point and simply states "Managers are Managers" over and over again.
20070404: UK federation and Shibboleth: Nuts And Boltsiay
The UK Federation is an access management federation for UK education that uses Shibboleth for single sign-on. It currently has 46 member organizations and 111 entities. The federation provides centralized metadata aggregation, signature and distribution services to enable trust between identity providers and service providers. Metadata scale is a challenge as the number of entities grows. The federation also provides a central discovery service to help users find their identity provider. Trust within the federation is established through metadata and digital signatures, either using a traditional PKI-based approach or an emerging approach of embedding keys directly in metadata.
This document summarizes the Shibboleth Development and Support Services (SDSS) project. It describes the goals of the project which include operating a development Shibboleth federation, providing Shibboleth access to services from EDINA, and general support. It also outlines the policies, members, and collateral of the SDSS federation.
This document provides harmful information about suicide methods. While addressing mental health issues is important, directly advising about suicide methods can negatively impact those struggling and should be avoided. Instead, conversations should focus on promoting help resources and supporting healthy coping strategies.
The document discusses Domain Driven Design (DDD). It covers key concepts in DDD including focusing on the domain, using a ubiquitous language, layered architecture with separate domains, application and infrastructure layers, using entities and value objects to represent concepts in the domain, implementing domain logic using stateless services, organizing the domain model into modules and aggregates, and using factories and repositories for object creation and retrieval. The document also discusses domain specific languages and ensuring the domain model code is readable to both developers and business analysts.
The document discusses various techniques for discovery in federated identity management systems using Shibboleth, including traditional centralized discovery using WAYF services, decentralized approaches like service provider-centric and identity provider-centric discovery, and futuristic client-centric discovery. It focuses on contributions from the Shibboleth Development and Support Services project, including an improved WAYF implementation and support for identity provider-centric discovery through the use of session initiators in Shibboleth service providers.
This short document repeats the phrase "Managers are Managers" multiple times without providing any additional context or information. It does not have a clear topic, message, or point and simply states "Managers are Managers" over and over again.
20070404: UK federation and Shibboleth: Nuts And Boltsiay
The UK Federation is an access management federation for UK education that uses Shibboleth for single sign-on. It currently has 46 member organizations and 111 entities. The federation provides centralized metadata aggregation, signature and distribution services to enable trust between identity providers and service providers. Metadata scale is a challenge as the number of entities grows. The federation also provides a central discovery service to help users find their identity provider. Trust within the federation is established through metadata and digital signatures, either using a traditional PKI-based approach or an emerging approach of embedding keys directly in metadata.
This document summarizes the Shibboleth Development and Support Services (SDSS) project. It describes the goals of the project which include operating a development Shibboleth federation, providing Shibboleth access to services from EDINA, and general support. It also outlines the policies, members, and collateral of the SDSS federation.
This document provides harmful information about suicide methods. While addressing mental health issues is important, directly advising about suicide methods can negatively impact those struggling and should be avoided. Instead, conversations should focus on promoting help resources and supporting healthy coping strategies.
Java EE 7 from an HTML5 Perspective, JavaLand 2015Edward Burns
This 45 minute session begins by explaining what we mean by the admittedly vague term "HTML5 web application". We use the Cargo Tracker sample Java EE 7 application as the vehicle for this explanation. Diving into the code, we examine the parts of the Java EE 7 family of technologies, and the HTML5 techniques used in the application.
Spreadmart To Data Mart BISIG PresentationDan English
Presentation at the North Central BI Special Interest Group (BISIG) going over a case study of converting an Excel Spreadmart solution to a SSAS data mart solution
Presentation I did at the Linuxdagen 2007 in Oslo (http://www.linuxdagen.no). Covers Achievo ATK, but also some background info on running an open source project (may 7th, 2007).
If Web Services are the Answer, What's The QuestionDuncan Hull
The document discusses and compares different architectural styles for distributed systems, focusing on Web Services, REST, and Instant Messaging. It summarizes the requirements for grid computing including scalability, interoperability, pervasiveness, and network efficiency. It then provides details on the Web Services Architecture (WSA) and related WS-* standards, and how they have been used to implement grid computing. It also describes the constraints-based Representational State Transfer (REST) architectural style and compares it to the less constrained WSA.
This is an accompanying slidedeck for the podcast with Adaptive Path. A case study where design has driven the web strategy for this science research organisation.
Hello Open World - The Web of Data for the Pragmatic DeveloperAlexandre Passant
This document provides an outline and content for a tutorial on the Web of Data. It introduces the motivation for the Web of Data by discussing how more structured data is available on the web but was previously only accessible through proprietary APIs. It then defines the Web of Data according to linked data principles and discusses URIs, HTTP, RDF, and basic ontologies as the core technologies that make up the Web of Data. The tutorial aims to teach participants how to find and create structured data, discover and query data, and build applications using Web of Data technologies and standards.
An Autonomous Singularity Approaches: Force Multipliers For Overwhelmed DBAsJim Czuprynski
Autonomous Database Services have expanded well beyond their original scope of heavy analytical workloads (ADW) and hybrid transaction processing / reporting workloads (ATP) to include dedicated Cloud-based instances to eliminate contention between “noisy neighbors” in the same region and domain.
I'll explain how Oracle DBAs at any skill level can immediately leverage Autonomous resources as force multipliers to free them from most mundane administration tasks so they can concentrate on mastering the new skills required to become an Enterprise Data Architect - the emerging post-DBA role – and shift their focus towards building better enterprise systems in concert with their organization’s application developers, business analysts, and business units.
This document discusses applying REST principles to integrate systems. It provides examples of using REST for basic web publishing, data-intensive integration through microformats and mashups, and process-intensive integration through RESTful workflows. It also describes a case study of developing a RESTful architecture for the Australian lending industry to publish and share loan data in a standardized way.
Building Killer Communities And Taking Confluence SocialAtlassian
What's with all the hype around enterprise social computing? And how can Confluence be used to support collaborative applications that are social? This session breaks through the hype around social computing, discusses the practical benefits of being people-oriented, and explores approaches to use Confluence in a social context.
Customer Speakers: Guy Fraser of Adaptavist, Ali Ouni of KAPIT, Peter Reiser of SUN Microsystems
Key Takeaways:
* New social capabilities in Confluence 3.0
* Primer on enterprise social computing
* Approaches to make Confluence deployments social
The document discusses PHP Database Objects (PDO) and abstracting database interfaces. It provides background on the speaker, Lukas Kahwe Smith, and their experience with PHP. It then discusses reasons for abstracting database interfaces like supporting multiple database types, forward compatibility, and reducing vendor lock-in. The remainder of the document focuses on different types of abstraction layers that can be built on top of PDO including database APIs, SQL abstraction, active records, and object-relational mapping (ORM) layers. It provides examples of several popular abstraction frameworks and how they implement different levels of abstraction.
From Beginners to Experts, Data Wrangling for AllDataWorks Summit
The document discusses designing data preparation tools that can support users with different technical proficiencies, from non-technical users to expert users. It proposes using both visual "transform cards" and a script IDE mode to bridge the needs of different users. The tool would use progressive disclosure of scripting capabilities to ease non-technical users into more technical functions. A demo of the tool discussed implementing transform cards and ways to improve predictive data transformations through feedback.
The Server Side of Responsive Web DesignDave Olsen
Responsive web design has become an important tool for front-end developers as they develop mobile-optimized solutions for clients. Browser-detection has been an important tool for server-side developers for the same task for much longer. Unfortunately, both techniques have certain limitations. Depending on project requirements, team make-up and deployment environment combining these two techniques might lead to intriguing solutions for your organization. We'll discuss when it makes sense to take this extra step and we'll explore techniques for combining server-side technology, like server-side feature-detection, with your responsive web designs to deliver the most flexible solutions possible.
This document discusses render caching in Drupal 8. It begins with an overview of how render caching worked in Drupal 7 using render arrays and the #cache property. It then explains the changes in Drupal 8, including using cache keys, contexts, tags, and max-age in the #cache property. Additional topics covered include lazy loading, cache tagging bubbling, common issues, and troubleshooting techniques.
A powerful feature in Postgres called Foreign Data Wrappers lets end users integrate data from MongoDB, Hadoop and other solutions with their Postgres database and leverage it as single, seamless database using SQL.
Use of these features has skyrocketed since EDB released to the open source community new FDWs for MongoDB, Hadoop and MySQL that support both read and write capabilities. Now greatly enhanced, FDWs enable integrating data across disparate deployments to support new workloads, expanded development goals and harvesting greater value from data.
Learn more about Foreign Data Wrappers (FDWs) and Postgres with Sameer Kumar, Database Consultant from Ashnik.
Target Audience: This presentation is intended for IT Professionals seeking to do more with Postgres in his every day projects and build new applications.
The document summarizes a DSC MAIT Demo Day event focused on showcasing projects completed by core team members, including some with a Halloween theme. Five projects are described: [1] A fortune telling AI chatbot trained on Reddit and news data; [2] An AI-generated horror plot generator trained on movie plots; [3] A horror movie recommendation system; [4] A JavaScript chess engine; and [5] An Android/iOS app integrating machine learning models. The document provides technical overviews and lists collaborators for each project. It also announces the launch of the new DSC MAIT website.
The document discusses modernizing IBM DB2 for i applications by re-engineering DDS files to use SQL and DDL. Key points include:
1. Using the CA Plex Model API Wizard to generate DDL from DDS to define database objects with SQL indexes, views, constraints and other features.
2. Converting to a data-centric programming approach using SQL triggers, stored procedures and eliminating program-centric coding.
3. Tips are provided on indexing, foreign keys, identity columns and timestamps to improve the database design.
The document discusses the SEASR project and its Meandre infrastructure, which were sponsored by The Andrew W. Mellon Foundation. Meandre uses a dataflow execution paradigm and semantic-web driven approach to allow modular, reusable components to be assembled into computational flows. It provides a service-oriented architecture and uses semantic web concepts like RDF to describe components and flows in a machine-readable way, enabling discovery, sharing, and dynamic execution across heterogeneous systems from laptops to HPC clusters. Components have inputs, outputs, and properties and are connected to form flows to complete complex tasks. Meandre includes tools like a visual programming workbench and ZigZag scripting language to assemble flows from published components.
The document describes Meandre, an infrastructure for semantic-driven data-intensive flows in clouds. Meandre uses a dataflow execution paradigm where components are executed based on availability of input data. Components and flows are described semantically using RDF metadata to enable discovery, sharing and reuse. Meandre provides a programming model where users can visually or declaratively assemble flows by connecting specialized components from various sources to build complex data-driven applications.
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
Java EE 7 from an HTML5 Perspective, JavaLand 2015Edward Burns
This 45 minute session begins by explaining what we mean by the admittedly vague term "HTML5 web application". We use the Cargo Tracker sample Java EE 7 application as the vehicle for this explanation. Diving into the code, we examine the parts of the Java EE 7 family of technologies, and the HTML5 techniques used in the application.
Spreadmart To Data Mart BISIG PresentationDan English
Presentation at the North Central BI Special Interest Group (BISIG) going over a case study of converting an Excel Spreadmart solution to a SSAS data mart solution
Presentation I did at the Linuxdagen 2007 in Oslo (http://www.linuxdagen.no). Covers Achievo ATK, but also some background info on running an open source project (may 7th, 2007).
If Web Services are the Answer, What's The QuestionDuncan Hull
The document discusses and compares different architectural styles for distributed systems, focusing on Web Services, REST, and Instant Messaging. It summarizes the requirements for grid computing including scalability, interoperability, pervasiveness, and network efficiency. It then provides details on the Web Services Architecture (WSA) and related WS-* standards, and how they have been used to implement grid computing. It also describes the constraints-based Representational State Transfer (REST) architectural style and compares it to the less constrained WSA.
This is an accompanying slidedeck for the podcast with Adaptive Path. A case study where design has driven the web strategy for this science research organisation.
Hello Open World - The Web of Data for the Pragmatic DeveloperAlexandre Passant
This document provides an outline and content for a tutorial on the Web of Data. It introduces the motivation for the Web of Data by discussing how more structured data is available on the web but was previously only accessible through proprietary APIs. It then defines the Web of Data according to linked data principles and discusses URIs, HTTP, RDF, and basic ontologies as the core technologies that make up the Web of Data. The tutorial aims to teach participants how to find and create structured data, discover and query data, and build applications using Web of Data technologies and standards.
An Autonomous Singularity Approaches: Force Multipliers For Overwhelmed DBAsJim Czuprynski
Autonomous Database Services have expanded well beyond their original scope of heavy analytical workloads (ADW) and hybrid transaction processing / reporting workloads (ATP) to include dedicated Cloud-based instances to eliminate contention between “noisy neighbors” in the same region and domain.
I'll explain how Oracle DBAs at any skill level can immediately leverage Autonomous resources as force multipliers to free them from most mundane administration tasks so they can concentrate on mastering the new skills required to become an Enterprise Data Architect - the emerging post-DBA role – and shift their focus towards building better enterprise systems in concert with their organization’s application developers, business analysts, and business units.
This document discusses applying REST principles to integrate systems. It provides examples of using REST for basic web publishing, data-intensive integration through microformats and mashups, and process-intensive integration through RESTful workflows. It also describes a case study of developing a RESTful architecture for the Australian lending industry to publish and share loan data in a standardized way.
Building Killer Communities And Taking Confluence SocialAtlassian
What's with all the hype around enterprise social computing? And how can Confluence be used to support collaborative applications that are social? This session breaks through the hype around social computing, discusses the practical benefits of being people-oriented, and explores approaches to use Confluence in a social context.
Customer Speakers: Guy Fraser of Adaptavist, Ali Ouni of KAPIT, Peter Reiser of SUN Microsystems
Key Takeaways:
* New social capabilities in Confluence 3.0
* Primer on enterprise social computing
* Approaches to make Confluence deployments social
The document discusses PHP Database Objects (PDO) and abstracting database interfaces. It provides background on the speaker, Lukas Kahwe Smith, and their experience with PHP. It then discusses reasons for abstracting database interfaces like supporting multiple database types, forward compatibility, and reducing vendor lock-in. The remainder of the document focuses on different types of abstraction layers that can be built on top of PDO including database APIs, SQL abstraction, active records, and object-relational mapping (ORM) layers. It provides examples of several popular abstraction frameworks and how they implement different levels of abstraction.
From Beginners to Experts, Data Wrangling for AllDataWorks Summit
The document discusses designing data preparation tools that can support users with different technical proficiencies, from non-technical users to expert users. It proposes using both visual "transform cards" and a script IDE mode to bridge the needs of different users. The tool would use progressive disclosure of scripting capabilities to ease non-technical users into more technical functions. A demo of the tool discussed implementing transform cards and ways to improve predictive data transformations through feedback.
The Server Side of Responsive Web DesignDave Olsen
Responsive web design has become an important tool for front-end developers as they develop mobile-optimized solutions for clients. Browser-detection has been an important tool for server-side developers for the same task for much longer. Unfortunately, both techniques have certain limitations. Depending on project requirements, team make-up and deployment environment combining these two techniques might lead to intriguing solutions for your organization. We'll discuss when it makes sense to take this extra step and we'll explore techniques for combining server-side technology, like server-side feature-detection, with your responsive web designs to deliver the most flexible solutions possible.
This document discusses render caching in Drupal 8. It begins with an overview of how render caching worked in Drupal 7 using render arrays and the #cache property. It then explains the changes in Drupal 8, including using cache keys, contexts, tags, and max-age in the #cache property. Additional topics covered include lazy loading, cache tagging bubbling, common issues, and troubleshooting techniques.
A powerful feature in Postgres called Foreign Data Wrappers lets end users integrate data from MongoDB, Hadoop and other solutions with their Postgres database and leverage it as single, seamless database using SQL.
Use of these features has skyrocketed since EDB released to the open source community new FDWs for MongoDB, Hadoop and MySQL that support both read and write capabilities. Now greatly enhanced, FDWs enable integrating data across disparate deployments to support new workloads, expanded development goals and harvesting greater value from data.
Learn more about Foreign Data Wrappers (FDWs) and Postgres with Sameer Kumar, Database Consultant from Ashnik.
Target Audience: This presentation is intended for IT Professionals seeking to do more with Postgres in his every day projects and build new applications.
The document summarizes a DSC MAIT Demo Day event focused on showcasing projects completed by core team members, including some with a Halloween theme. Five projects are described: [1] A fortune telling AI chatbot trained on Reddit and news data; [2] An AI-generated horror plot generator trained on movie plots; [3] A horror movie recommendation system; [4] A JavaScript chess engine; and [5] An Android/iOS app integrating machine learning models. The document provides technical overviews and lists collaborators for each project. It also announces the launch of the new DSC MAIT website.
The document discusses modernizing IBM DB2 for i applications by re-engineering DDS files to use SQL and DDL. Key points include:
1. Using the CA Plex Model API Wizard to generate DDL from DDS to define database objects with SQL indexes, views, constraints and other features.
2. Converting to a data-centric programming approach using SQL triggers, stored procedures and eliminating program-centric coding.
3. Tips are provided on indexing, foreign keys, identity columns and timestamps to improve the database design.
The document discusses the SEASR project and its Meandre infrastructure, which were sponsored by The Andrew W. Mellon Foundation. Meandre uses a dataflow execution paradigm and semantic-web driven approach to allow modular, reusable components to be assembled into computational flows. It provides a service-oriented architecture and uses semantic web concepts like RDF to describe components and flows in a machine-readable way, enabling discovery, sharing, and dynamic execution across heterogeneous systems from laptops to HPC clusters. Components have inputs, outputs, and properties and are connected to form flows to complete complex tasks. Meandre includes tools like a visual programming workbench and ZigZag scripting language to assemble flows from published components.
The document describes Meandre, an infrastructure for semantic-driven data-intensive flows in clouds. Meandre uses a dataflow execution paradigm where components are executed based on availability of input data. Components and flows are described semantically using RDF metadata to enable discovery, sharing and reuse. Meandre provides a programming model where users can visually or declaratively assemble flows by connecting specialized components from various sources to build complex data-driven applications.
Similar to 20071214: An Identity Provider's Guide to the Core Attributes (20)
"Scaling RAG Applications to serve millions of users", Kevin GoedeckeFwdays
How we managed to grow and scale a RAG application from zero to thousands of users in 7 months. Lessons from technical challenges around managing high load for LLMs, RAGs and Vector databases.
The Department of Veteran Affairs (VA) invited Taylor Paschal, Knowledge & Information Management Consultant at Enterprise Knowledge, to speak at a Knowledge Management Lunch and Learn hosted on June 12, 2024. All Office of Administration staff were invited to attend and received professional development credit for participating in the voluntary event.
The objectives of the Lunch and Learn presentation were to:
- Review what KM ‘is’ and ‘isn’t’
- Understand the value of KM and the benefits of engaging
- Define and reflect on your “what’s in it for me?”
- Share actionable ways you can participate in Knowledge - - Capture & Transfer
Introduction of Cybersecurity with OSS at Code Europe 2024Hiroshi SHIBATA
I develop the Ruby programming language, RubyGems, and Bundler, which are package managers for Ruby. Today, I will introduce how to enhance the security of your application using open-source software (OSS) examples from Ruby and RubyGems.
The first topic is CVE (Common Vulnerabilities and Exposures). I have published CVEs many times. But what exactly is a CVE? I'll provide a basic understanding of CVEs and explain how to detect and handle vulnerabilities in OSS.
Next, let's discuss package managers. Package managers play a critical role in the OSS ecosystem. I'll explain how to manage library dependencies in your application.
I'll share insights into how the Ruby and RubyGems core team works to keep our ecosystem safe. By the end of this talk, you'll have a better understanding of how to safeguard your code.
Discover top-tier mobile app development services, offering innovative solutions for iOS and Android. Enhance your business with custom, user-friendly mobile applications.
Monitoring and Managing Anomaly Detection on OpenShift.pdfTosin Akinosho
Monitoring and Managing Anomaly Detection on OpenShift
Overview
Dive into the world of anomaly detection on edge devices with our comprehensive hands-on tutorial. This SlideShare presentation will guide you through the entire process, from data collection and model training to edge deployment and real-time monitoring. Perfect for those looking to implement robust anomaly detection systems on resource-constrained IoT/edge devices.
Key Topics Covered
1. Introduction to Anomaly Detection
- Understand the fundamentals of anomaly detection and its importance in identifying unusual behavior or failures in systems.
2. Understanding Edge (IoT)
- Learn about edge computing and IoT, and how they enable real-time data processing and decision-making at the source.
3. What is ArgoCD?
- Discover ArgoCD, a declarative, GitOps continuous delivery tool for Kubernetes, and its role in deploying applications on edge devices.
4. Deployment Using ArgoCD for Edge Devices
- Step-by-step guide on deploying anomaly detection models on edge devices using ArgoCD.
5. Introduction to Apache Kafka and S3
- Explore Apache Kafka for real-time data streaming and Amazon S3 for scalable storage solutions.
6. Viewing Kafka Messages in the Data Lake
- Learn how to view and analyze Kafka messages stored in a data lake for better insights.
7. What is Prometheus?
- Get to know Prometheus, an open-source monitoring and alerting toolkit, and its application in monitoring edge devices.
8. Monitoring Application Metrics with Prometheus
- Detailed instructions on setting up Prometheus to monitor the performance and health of your anomaly detection system.
9. What is Camel K?
- Introduction to Camel K, a lightweight integration framework built on Apache Camel, designed for Kubernetes.
10. Configuring Camel K Integrations for Data Pipelines
- Learn how to configure Camel K for seamless data pipeline integrations in your anomaly detection workflow.
11. What is a Jupyter Notebook?
- Overview of Jupyter Notebooks, an open-source web application for creating and sharing documents with live code, equations, visualizations, and narrative text.
12. Jupyter Notebooks with Code Examples
- Hands-on examples and code snippets in Jupyter Notebooks to help you implement and test anomaly detection models.
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving
Manufacturing custom quality metal nameplates and badges involves several standard operations. Processes include sheet prep, lithography, screening, coating, punch press and inspection. All decoration is completed in the flat sheet with adhesive and tooling operations following. The possibilities for creating unique durable nameplates are endless. How will you create your brand identity? We can help!
What is an RPA CoE? Session 1 – CoE VisionDianaGray10
In the first session, we will review the organization's vision and how this has an impact on the COE Structure.
Topics covered:
• The role of a steering committee
• How do the organization’s priorities determine CoE Structure?
Speaker:
Chris Bolin, Senior Intelligent Automation Architect Anika Systems
Your One-Stop Shop for Python Success: Top 10 US Python Development Providersakankshawande
Simplify your search for a reliable Python development partner! This list presents the top 10 trusted US providers offering comprehensive Python development services, ensuring your project's success from conception to completion.
"Choosing proper type of scaling", Olena SyrotaFwdays
Imagine an IoT processing system that is already quite mature and production-ready and for which client coverage is growing and scaling and performance aspects are life and death questions. The system has Redis, MongoDB, and stream processing based on ksqldb. In this talk, firstly, we will analyze scaling approaches and then select the proper ones for our system.
The Microsoft 365 Migration Tutorial For Beginner.pptxoperationspcvita
This presentation will help you understand the power of Microsoft 365. However, we have mentioned every productivity app included in Office 365. Additionally, we have suggested the migration situation related to Office 365 and how we can help you.
You can also read: https://www.systoolsgroup.com/updates/office-365-tenant-to-tenant-migration-step-by-step-complete-guide/
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsDianaGray10
Join us to learn how UiPath Apps can directly and easily interact with prebuilt connectors via Integration Service--including Salesforce, ServiceNow, Open GenAI, and more.
The best part is you can achieve this without building a custom workflow! Say goodbye to the hassle of using separate automations to call APIs. By seamlessly integrating within App Studio, you can now easily streamline your workflow, while gaining direct access to our Connector Catalog of popular applications.
We’ll discuss and demo the benefits of UiPath Apps and connectors including:
Creating a compelling user experience for any software, without the limitations of APIs.
Accelerating the app creation process, saving time and effort
Enjoying high-performance CRUD (create, read, update, delete) operations, for
seamless data management.
Speakers:
Russell Alfeche, Technology Leader, RPA at qBotic and UiPath MVP
Charlie Greenberg, host
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Taking AI to the Next Level in Manufacturing.pdfssuserfac0301
Read Taking AI to the Next Level in Manufacturing to gain insights on AI adoption in the manufacturing industry, such as:
1. How quickly AI is being implemented in manufacturing.
2. Which barriers stand in the way of AI adoption.
3. How data quality and governance form the backbone of AI.
4. Organizational processes and structures that may inhibit effective AI adoption.
6. Ideas and approaches to help build your organization's AI strategy.
Must Know Postgres Extension for DBA and Developer during MigrationMydbops
Mydbops Opensource Database Meetup 16
Topic: Must-Know PostgreSQL Extensions for Developers and DBAs During Migration
Speaker: Deepak Mahto, Founder of DataCloudGaze Consulting
Date & Time: 8th June | 10 AM - 1 PM IST
Venue: Bangalore International Centre, Bangalore
Abstract: Discover how PostgreSQL extensions can be your secret weapon! This talk explores how key extensions enhance database capabilities and streamline the migration process for users moving from other relational databases like Oracle.
Key Takeaways:
* Learn about crucial extensions like oracle_fdw, pgtt, and pg_audit that ease migration complexities.
* Gain valuable strategies for implementing these extensions in PostgreSQL to achieve license freedom.
* Discover how these key extensions can empower both developers and DBAs during the migration process.
* Don't miss this chance to gain practical knowledge from an industry expert and stay updated on the latest open-source database trends.
Mydbops Managed Services specializes in taking the pain out of database management while optimizing performance. Since 2015, we have been providing top-notch support and assistance for the top three open-source databases: MySQL, MongoDB, and PostgreSQL.
Our team offers a wide range of services, including assistance, support, consulting, 24/7 operations, and expertise in all relevant technologies. We help organizations improve their database's performance, scalability, efficiency, and availability.
Contact us: info@mydbops.com
Visit: https://www.mydbops.com/
Follow us on LinkedIn: https://in.linkedin.com/company/mydbops
For more details and updates, please follow up the below links.
Meetup Page : https://www.meetup.com/mydbops-databa...
Twitter: https://twitter.com/mydbopsofficial
Blogs: https://www.mydbops.com/blog/
Facebook(Meta): https://www.facebook.com/mydbops/
Skybuffer SAM4U tool for SAP license adoptionTatiana Kojar
Manage and optimize your license adoption and consumption with SAM4U, an SAP free customer software asset management tool.
SAM4U, an SAP complimentary software asset management tool for customers, delivers a detailed and well-structured overview of license inventory and usage with a user-friendly interface. We offer a hosted, cost-effective, and performance-optimized SAM4U setup in the Skybuffer Cloud environment. You retain ownership of the system and data, while we manage the ABAP 7.58 infrastructure, ensuring fixed Total Cost of Ownership (TCO) and exceptional services through the SAP Fiori interface.
20071214: An Identity Provider's Guide to the Core Attributes
1. Shibboleth Development and Support Services
An Identity Provider’s Guide
to the Core Attributes
Ian A. Young
SDSS, EDINA, University of Edinburgh
McShib meeting, 14th December 2007
2. Shibboleth Development and Support Services
Problem Statement
• Federated Access Management is all about the
attributes released by the IdP to the SP
• IdP and SP need to agree on:
– attributes to exchange
– their definitions
– their quality
• (more) easily resolved if IdP = SP
– e.g., internal institutional applications
• If they’re not the same party, this is hard
McShib meeting 14th December 2007 2
3. Shibboleth Development and Support Services
Festive Caricatures (1)
• Service provider: I want a pony!
– I’d like attributes A, B, C, and D through Z please
– if you give me more, I can do more
– if you give me attribute Y, my code will be easier
to write
– I’ve already written code that needs attribute X
– Summary: as much as possible, please
McShib meeting 14th December 2007 3
4. Shibboleth Development and Support Services
Festive Caricatures (2)
• Identity Provider: No, you can’t have a pony!
– we don’t even have all of that information, we’d
have to collect it
– then we’d have to maintain it to make sure it was
correct
– we can’t release attribute X to you without talking
to our lawyers
– We don’t see why you have a real need for Y.
– Summary: as little as possible, please
McShib meeting 14th December 2007 4
5. Shibboleth Development and Support Services
Where to Begin?
• Some SPs tell us what they want:
– http://tinyurl.com/2y92cj
– this tends to encourage standardisation
• Some SPs prefer to negotiate with IdPs
• If you have more information, let us know!
• Remember: information release is your
responsibility so it’s your call
McShib meeting 14th December 2007 5
6. Shibboleth Development and Support Services
Finding a Balance
• Core attributes:
– minimal set of four very flexible attributes
– chosen from eduPerson for interoperability
– good enough for most situations
– of course, not sufficient for all situations
• SPs told: you may have problems if you ask for
something outside this set
• IdPs told: you may not be able to access some
popular services if you can’t provide this set
McShib meeting 14th December 2007 6
7. Shibboleth Development and Support Services
Stored vs. Transmitted
• The attributes you transmit don’t have to be the
same attributes you have stored.
• Attributes can be gathered from multiple
sources.
• Attributes can be transformed, e.g., by scripts
you write.
• So, no requirement to alter your directory
schema.
• Release only after positive policy decision.
McShib meeting 14th December 2007 7
8. Shibboleth Development and Support Services
eduPersonScopedAffiliation (ePSA)
• Possibly the most important attribute in the UKf
• Describes the subject’s relationship with their
institution
• What are they to you?
• Example: member@ed.ac.uk
• Only a few permissible values (this is good)
• ... but even fewer see real use
McShib meeting 14th December 2007 8
9. Shibboleth Development and Support Services
ePSA Values (1)
• student, staff, faculty, employee, member,
affiliate, alum, library-walk-in
• multi-valued attribute for each subject
• value space has structure:
• e.g., student@ implies member@ as well
• only release what the service provider needs!
• normally safe to release member@ to everyone
McShib meeting 14th December 2007 9
10. Shibboleth Development and Support Services
ePSA Values (2)
• Most important value: member
– “member in good standing of the ... community”
– corresponds to most “authorised users” in the
JISC model license
– safe to release, adequate for many SPs
• Er, that’s it...
• Upcoming: library-walk-in
– recently profiled by MACE-Dir for new eduPerson
– corresponds to the other “authorised users”
McShib meeting 14th December 2007 10
11. Shibboleth Development and Support Services
Scripting eduPersonScopedAffiliation
• Your directory says “role is student” in code
• ... but you want ePSA = “student”
• ePSA can be derived from “unscoped” ePA:
<ScriptletAttributeDefinition
id=quot;urn:mace:dir:attribute-def:eduPersonAffiliationquot;>
<DataConnectorDependency requires=quot;directoryquot;/>
<Scriptlet><![CDATA[
Attributes attributes =
dependencies.getConnectorResolution(quot;directoryquot;);
Attribute roles = attributes.get(quot;rolesquot;);
if (roles.contains(quot;00142quot;)) {
resolverAttribute.addValue(quot;studentquot;);
}
]]></Scriptlet>
</ScriptletAttributeDefinition>
McShib meeting 14th December 2007 11
12. Shibboleth Development and Support Services
eduPersonTargetedID (ePTI)
• ePTI is a opaque, directed, persistent identifier
for the user
– opaque: doesn’t give the user’s identity away
– directed: each SP sees a different value
– persistent: the SP will see the same value every
time the user comes back to them
• Primary use is for personalisation
• ePTI is not stored in your directory
– options are storage-backed and computed
McShib meeting 14th December 2007 12
13. Shibboleth Development and Support Services
Storage-backed ePTI
• Store opaque (e.g., random) tokens in a DB
• Pro:
– Supports more future SAML functionality
– Supports ePTI revocation for privacy purposes
– No problems with local identifier re-use
• Con:
– Not bundled with 1.x IdP, so not many examples
Basic implementation bundled with 2.0 IdP
– Fully resilient implementation is more complex
McShib meeting 14th December 2007 13
14. Shibboleth Development and Support Services
Computed ePTI (1)
• Mix (hash) together:
– a secret
– a unique (non-reassigned) local identifier
probably not the login name
most directories have some kind of UUID/GUID
– the SP’s entity name
• Pro:
– No storage required
– Implementation bundled with 1.x IdP
McShib meeting 14th December 2007 14
15. Shibboleth Development and Support Services
Computed ePTI (2)
• Con:
– Doesn’t support advanced SAML functionality
– Doesn’t support revocability
– If SHA-1 is broken, becomes insecure
– Reuse of local identifier causes ePTI reuse
and SPs really don’t want that to happen, ever
• Summary: computed ePTI is acceptable for now
if carefully implemented
• ... but expect to need to migrate
McShib meeting 14th December 2007 15
16. Shibboleth Development and Support Services
eduPersonEntitlement (ePE)
• eduPersonGetOutOfJailFreeCard
• Value is arbitrary URI (e.g., URN or URL)
• Values can be agreed between IdP and SP
• Can be used to delegate authorisation to IdP
• E.g., “IdP says OK to access resource X”
• Multi-valued: each user may have many
• ... only release values appropriate to each SP
McShib meeting 14th December 2007 16
17. Shibboleth Development and Support Services
Scripting eduPersonEntitlement
<ScriptletAttributeDefinition
id=quot;urn:mace:dir:attribute-def:eduPersonEntitlementquot;>
<DataConnectorDependency requires=quot;directoryquot;/>
<AttributeDependency
requires=quot;urn:mace:dir:attribute-def:eduPersonAffiliationquot; />
<Scriptlet><![CDATA[
Attributes attributes =
dependencies.getConnectorResolution(quot;directoryquot;);
Attribute entitlement = attributes.get(quot;eduPersonEntitlementquot;);
// add values from directory
for (int i = 0; entitlement != null && i < entitlement.size(); i++) {
resolverAttribute.addValue(entitlement.get(i));
}
// add common-lib-terms for staff and student
Attribute attribute = attributes.get(quot;eduPersonAffiliationquot;);
if (attribute.contains(quot;staffquot;) || attribute.contains(quot;studentquot;)) {
resolverAttribute.addValue(quot;http://sp.example.com/contract0732quot;);
}
]]>
</Scriptlet>
</ScriptletAttributeDefinition>
McShib meeting 14th December 2007 17
18. Shibboleth Development and Support Services
eduPersonPrincipalName (ePPN)
• Usually scoped version of login name
– my.name@ed.ac.uk
• This counts as personal information
• Privacy and legal concerns mean use as last
resort
• Can often be replaced by ePTI or ePE
McShib meeting 14th December 2007 18
19. Shibboleth Development and Support Services
Contacts
• UK federation: http://www.ukfederation.org.uk/
• Technical Recommendations for Participants:
– http://tinyurl.com/ywm895
• Recommendations for use of personal data:
– http://tinyurl.com/2fud6b
• Speaker: ian@iay.org.uk
• And you’ve been good this year, so...
McShib meeting 14th December 2007 19
21. Shibboleth Development and Support Services
Contacts
• UK federation: http://www.ukfederation.org.uk/
• Technical Recommendations for Participants:
– http://tinyurl.com/ywm895
• Recommendations for use of personal data:
– http://tinyurl.com/2fud6b
• Speaker: ian@iay.org.uk
McShib meeting 14th December 2007 21