SlideShare a Scribd company logo
ACCESS	
  ASSURANCE	
  SUITE	
  
TIPS	
  &	
  TRICKS
Lisa	
  Lombardo,	
  Principal	
  Architect	
  of	
  Identity	
  Product	
  
and	
  Technology	
  Solutions
L E A R N M O R E
Lisa	
  Lombardo
Lisa	
  Lombardo,	
  Principal	
  Architect	
  
of	
  Identity	
  Product	
  and	
  Technology	
  
Solutions
AGENDA	
  -­‐ Tips	
  &	
  Tricks
• For	
  Maintenance	
  
• For	
  Functionality	
  
• For	
  the	
  Administration	
  Manager
M A I N T E N A N C E
Maintenance
• Windows	
  services	
  startup
• Windows	
  updates
• Log	
  archiving
• Database	
  maintenance
Maintenance	
  – Windows	
  Services
Subtitle	
  left
• There	
  is	
  a	
  proper	
  order	
  to	
  start	
  the	
  Windows	
  Services	
  of	
  the	
  Access	
  
Assurance	
  Suite
• Knowledge	
  article	
  provides	
  a	
  PowerShell	
  script	
  to	
  stop	
  and	
  start	
  the	
  
services	
  in	
  the	
  proper	
  order
• Especially,	
  the	
  CourCFService before	
  the	
  CourCFMService before	
  the	
  
CourionService
• The	
  CourProfiler service	
  should	
  start	
  first,	
  as	
  it	
  is	
  responsible	
  for	
  logging	
  
done	
  by	
  all	
  other	
  components.
• The	
  CourConfigSvr service	
  should	
  start	
  second,	
  as	
  it	
  is	
  responsible	
  for	
  
reading/writing	
  of	
  configuration	
  data	
  used	
  on	
  initialization
Example
Subtitle	
  left
#	
  Now	
  all	
  the	
  services	
  will	
  be	
  started	
  in	
  a	
  logical	
  order.
#	
  Please	
  put	
  a	
  "#"	
  in	
  the	
  first	
  column	
  of	
  any	
  entry	
  below	
  for	
  services	
  your	
  deployment	
  does	
  not	
  use
funcStartAndWaitCourProfiler 1
FuncStartAndWaitCourConfigSvr 1
funcStartAndWaitCourCFService1
#	
  Increase	
  this	
  wait	
  time	
  if	
  you	
  have	
  a	
  large	
  number	
  of	
  targets
funcStartAndWaitCourCFMService10	
  
#	
  Increase	
  this	
  wait	
  time	
  if	
  you	
  have	
  a	
  large	
  number	
  of	
  targets
funcStartAndWaitCourionPasswordCourier 10
funcStartAndWaitCourProtocolService1
funcStartAndWaitCourGATService1	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  #	
  if	
  using	
  Transparent	
  Synchronization
funcStartAndWaitCourionTSAO1	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  #	
  if	
  using	
  Transparent	
  Synchronization
funcStartAndWaitCourNSLDAPAgent1	
  	
  	
  	
  	
  	
  	
  	
  	
  	
  #	
  if	
  using	
  PMM	
  for	
  Netscape	
  DS
funcStartAndWaitCourATLService1
funcStartAndWaitCourATLAdmin 1
funcStartAndWait"Courion Session	
  Claim	
  Provider"	
  1
funcStartAndWait"Courion Community	
  Claim	
  Provider"	
  1
funcStartAndWait"Courion Eventing Service"	
  1
funcStartAndWait"Courion Macro	
  Engine"	
  1
funcStartAndWait"Courion Identity	
  Mapping	
  Service"	
  1
funcStartAndWait"Courion Notification	
  Service"	
  1
funcStartAndWait"Courion Request	
  Service"	
  1
funcStartAndWait"Courion Scheduler	
  Service"	
  1
Maintenance	
  – Windows	
  
Updates
Proclaiming	
  from	
  the	
  mountain	
  top!!!
“Stop	
  all	
  Access	
  Assurance	
  Suite	
  
Windows	
  services	
  before	
  applying	
  
Windows	
  updates!”
Maintenance	
  – Windows	
  
Updates
• You	
  do	
  not	
  change	
  your	
  oil	
  on	
  your	
  car	
  
while	
  driving	
  down	
  the	
  highway.
• Please	
  do	
  not	
  change	
  the	
  underlying	
  
operating	
  system	
  with	
  the	
  Access	
  
Assurance	
  Suite	
  component	
  running.
• WMI	
  (Windows	
  Management	
  
Instrumentation)	
  layer	
  corruption	
  has	
  
occurred.	
  	
  
• WMI	
  holds	
  some	
  of	
  our	
  configuration	
  
data.	
  
• Uninstall	
  and	
  re-­‐install	
  is	
  needed.
• Use	
  ConfigMover Targets	
  and	
  
ConfigMover Workflows	
  to	
  export	
  
targets	
  and	
  workflows	
  for	
  import,	
  if	
  
needed.
Maintenance	
  – Windows	
  Updates
• While	
  you	
  are	
  stopping	
  the	
  Access	
  Assurance	
  Suite	
  services,	
  regularly	
  
archive	
  your	
  log	
  files	
  to	
  keep	
  them	
  of	
  a	
  manageable	
  size
• If	
  you	
  do	
  not	
  have	
  your	
  own	
  methodology	
  for	
  archiving	
  logs	
  of	
  your	
  
enterprise	
  applications,	
  the	
  PowerShell	
  script	
  provides	
  an	
  option	
  to	
  archive	
  
the	
  logs
• CourProfiler service	
  controls	
  the	
  logs.	
  	
  
• Must	
  be	
  stopped	
  to	
  release	
  the	
  file	
  for	
  move	
  to	
  another	
  location
• New	
  logs	
  automatically	
  re-­‐create
Maintenance	
  – Log	
  Archiving
• Over	
  time	
  the	
  logs	
  can	
  get	
  large	
  and	
  eventually	
  unopenable by	
  common	
  
editors.
• When	
  working	
  a	
  support	
  case	
  the	
  logs	
  are	
  vital	
  to	
  the	
  investigation.
• Regularly	
  archiving	
  the	
  log	
  files	
  when	
  doing	
  other	
  maintenance	
  tasks	
  on	
  
the	
  application	
  server	
  is	
  recommended.
• The	
  Knowledge	
  article	
  with	
  information	
  on	
  stopping	
  and	
  starting	
  services	
  
includes	
  a	
  PowerShell	
  script	
  with	
  log	
  archiving	
  as	
  an	
  option	
  while	
  the	
  
services	
  are	
  stopped
Maintenance	
  – DB	
  Maintenance
• Over	
  time	
  the	
  database	
  can	
  get	
  fragmented	
  and	
  reduce	
  performance.
• Following	
  Microsoft’s	
  recommended	
  maintenance	
  plans	
  for	
  the	
  databases	
  
on	
  database	
  server	
  is	
  recommended.
• We	
  have	
  found	
  large	
  database	
  queries	
  significantly	
  improve	
  by	
  regularly	
  
running	
  the	
  DB	
  server’s	
  sp_updatestats stored	
  proc	
  on	
  the	
  application’s	
  
database.
F U N C T I O N A L I T Y
Functionality
• Performance
• Logs
• Recommendations
Functionality	
  -­‐ Performance
• How	
  well	
  is	
  something	
  functioning	
  or	
  performing	
  and	
  from	
  who’s	
  
perspective?
• Quality	
  vs	
  Quantity	
  (time)
• Tools	
  for	
  measuring	
  performance	
  and	
  to	
  find	
  bottlenecks
• Fiddler	
  or	
  web-­‐browser-­‐based	
  tools	
  like	
  IE	
  Developer	
  Tools
• Wireshark	
  or	
  network	
  capture	
  tool	
  
• Process	
  Monitor	
  /	
  Process	
  Explorer	
  and	
  task	
  manager
• SQL	
  Profiler
• Log	
  files	
  include	
  logs	
  from	
  the	
  suite,	
  IIS	
  logs,	
  Windows	
  logs
Data	
  Flow	
  
XMLAO
IIS
CourATLService
Connection	
  
strings
Courion	
  
Service
CFM CF
DB
AD
RACF
SAP
End	
  User	
  
Workflow
Browser Other	
  
Courion	
  
Windows	
  
Services
AA	
  Portal	
  
apps
MSMQhttp…courion...
http…CourionARMS...
Presentation	
   Application	
   Cnctr/PMM	
  
CF
AD2
Targets	
  Initiation
Event	
  Viewer IIS	
  Logs
CourionService/	
  
CourATL.log
CourionARMS/*
Portal*.log
CourionService/	
  
*.logs
CourionService/	
  
*cnctr.logs target	
  artifacts
Request	
  ßàResponse
• Most	
  activity	
  is	
  request/response	
  based
• Component	
  sends	
  request
• Another	
  component	
  receives	
  request	
  and	
  acts	
  on	
  request
• Sends	
  response	
  to	
  the	
  component	
  that	
  made	
  request
• Follow	
  the	
  “request	
  to”	
  and	
  “response	
  back”	
  path
• Can	
  get	
  complicated
• The	
  component	
  that	
  receives	
  a	
  request	
  may	
  have	
  to	
  issue	
  their	
  own	
  request	
  to	
  another	
  
component	
  and	
  wait	
  for	
  that	
  response	
  before	
  responding	
  to	
  the	
  original	
  request
• Network	
  protocols,	
  firewalls,	
  timeouts,	
  etc are	
  all	
  involved
• Determine	
  what	
  audit	
  trail/logs	
  exist	
  to	
  track	
  the	
  activity	
  at	
  each	
  component
• Network	
  capture	
  tools	
  to	
  track	
  the	
  activity	
  between	
  components
• SQL	
  Profiler	
  to	
  track	
  the	
  activity	
  to	
  the	
  database
Functionality	
  -­‐ Logs
• Logging	
  approach
• All	
  the	
  services	
  have	
  a	
  log	
  file
• CourionService =	
  courion.log
• Courion Request	
  Service	
  =	
  courrequestservice.log	
  
• All	
  the	
  connectors	
  have	
  a	
  log	
  file	
  (*cnctr.log)
• Connector	
  for	
  Microsoft	
  Active	
  Directory	
  =	
  adscnctr.log
• Connector	
  for	
  Microsoft	
  ADO	
  =	
  adocnctr.log
• All	
  the	
  PMMs	
  have	
  a	
  log	
  file	
  (*module.log)
• PMM	
  for	
  Microsoft	
  Active	
  Directory	
  =	
  adsmodule.log
• PMM	
  for	
  Sun	
  Solaris	
  =	
  unixmodule.log
• Changes	
  made	
  in	
  Administration	
  Manager
• Audit.log
Functionality	
  -­‐
Recommendation
• Connector	
  for	
  Courion	
  HTML	
  Email2
• Not	
  Connector	
  for	
  Microsoft	
  CDO	
  
Message
• Check	
  courion.log	
  
• Ticketing
• Notifications
• Triggers	
  
• Export	
  workflows	
  and	
  targets
• Document	
  and	
  securely	
  store	
  pass	
  
phrase
A D M I N I S T R A T I O N 	
  
M A N A G E R 	
   T I P S
Administration	
  Manager	
  Tips
• Provisioning	
  Platform
• Copy	
  and	
  Paste
• Workflow	
  auto-­‐load
• Workflow	
  selection
• Macro	
  caching	
  values
Admin	
  Manager	
  Tips	
  – Copy	
  &	
  Paste
• Administration	
  Manager	
  for	
  Provisioning	
  Platform	
  workflows
• CP=yes
• Enables	
  Copy	
  and	
  paste	
  of	
  configuration	
  from	
  one	
  workflow	
  to	
  another
• Tree	
  view	
  only
• http://localhost/courion/CustMgrs/AccountCourier/Default.asp?cp=yes
• Note:	
  AAS	
  9.0	
  replace	
  “courion”	
  with	
  “core
Example
Admin	
  Manager	
  Tips	
  – Workflow	
  auto-­‐load
• Administration	
  Manager	
  for	
  Provisioning	
  Platform	
  workflows
• Workflow=<WorkflowName>
• Load	
  a	
  specific	
  workflow.	
  	
  Workflow	
  name	
  is	
  case-­‐sensitive.
• http://localhost/courion/CustMgrs/AccountCourier/Default.asp?Workflow=<workflowNam
e>
• Note:	
  AAS	
  9.0	
  replace	
  “courion”	
  with	
  “core”
Example
http://localhost/Core/CustMgrs/AccountCourier/Default.asp?Workflow=A
PITest
http://localhost/Core/CustMgrs/AccountCourier/Default.asp
Admin	
  Manager	
  Tips	
  – Workflow	
  Selection
• Administration	
  Manager	
  for	
  Provisioning	
  Platform	
  workflows
• MW=yes
• On	
  Administration	
  Manager	
  logon	
  page	
  presents	
  list	
  of	
  available	
  workflows	
  for	
  selecting	
  
one	
  workflow	
  to	
  load	
  for	
  quicker	
  initialization	
  of	
  the	
  Admin	
  Manager
• http://localhost/courion/CustMgrs/AccountCourier/Default.asp?mw=yes
• Note:	
  AAS	
  9.0	
  replace	
  “courion”	
  with	
  “core”
Example
Subtitle	
  center
Admin	
  Manager	
  – Macro	
  Cache
• Provisioning	
  Platform	
  workflow	
  
execution
• Macro	
  resolution
• Custom	
  Macro	
  definition
• Cache	
  results	
  – use	
  for	
  data	
  that	
  does	
  
not	
  change	
  during	
  that	
  workflow	
  
execution
• Use	
  optimization	
  – group	
  database	
  
queries	
  that	
  share	
  the	
  same	
  criterion	
  
from	
  the	
  same	
  table	
  	
  	
  “	
  FROM	
  <table>	
  
WHERE	
  <criterion>”	
  
THANK	
  YOU

More Related Content

What's hot

Sync or swim: the challenge of complex offline apps
Sync or swim:  the challenge of complex offline appsSync or swim:  the challenge of complex offline apps
Sync or swim: the challenge of complex offline apps
OutSystems
 
Serena Mainframe VUG: What's new in ChangeMan ZMF 8.1
Serena Mainframe VUG: What's new in ChangeMan ZMF 8.1Serena Mainframe VUG: What's new in ChangeMan ZMF 8.1
Serena Mainframe VUG: What's new in ChangeMan ZMF 8.1
Serena Software
 
The Top 5 Practices of a Highly Successful ChangeMan ZMF Administrator
The Top 5 Practices of a Highly Successful ChangeMan ZMF AdministratorThe Top 5 Practices of a Highly Successful ChangeMan ZMF Administrator
The Top 5 Practices of a Highly Successful ChangeMan ZMF Administrator
Serena Software
 
Upgrading Your System: A Telco User Perspectiv
Upgrading Your System: A Telco User PerspectivUpgrading Your System: A Telco User Perspectiv
Upgrading Your System: A Telco User Perspectiv
OPNFV
 
Internals of concurent managers
Internals of concurent managersInternals of concurent managers
Internals of concurent managers
Maris Elsins
 
Collaborate 2011-tuning-ebusiness-416502
Collaborate 2011-tuning-ebusiness-416502Collaborate 2011-tuning-ebusiness-416502
Collaborate 2011-tuning-ebusiness-416502
kaziul Islam Bulbul
 
RightFax SCOM Management Pack
RightFax SCOM Management PackRightFax SCOM Management Pack
RightFax SCOM Management Pack
Metastore
 
Abap slide lockenqueuedataclustersauthchecks
Abap slide lockenqueuedataclustersauthchecksAbap slide lockenqueuedataclustersauthchecks
Abap slide lockenqueuedataclustersauthchecks
Milind Patil
 
Training Slides: 201 - Intermediate - Tungsten Cluster Maintenance
Training Slides: 201 - Intermediate - Tungsten Cluster MaintenanceTraining Slides: 201 - Intermediate - Tungsten Cluster Maintenance
Training Slides: 201 - Intermediate - Tungsten Cluster Maintenance
Continuent
 
Bpc migration guide
Bpc migration guideBpc migration guide
Bpc migration guide
Rahul Yadav
 
SAP ABAP Lock concept and enqueue
SAP ABAP Lock concept and enqueueSAP ABAP Lock concept and enqueue
SAP ABAP Lock concept and enqueue
Milind Patil
 
Nagios Conference 2014 - Bryan Heden - 10,000 Services Across The State of Ohio
Nagios Conference 2014 - Bryan Heden - 10,000 Services Across The State of OhioNagios Conference 2014 - Bryan Heden - 10,000 Services Across The State of Ohio
Nagios Conference 2014 - Bryan Heden - 10,000 Services Across The State of Ohio
Nagios
 
Serena Release Management approach and solutions
Serena Release Management approach and solutionsSerena Release Management approach and solutions
Serena Release Management approach and solutions
Softmart
 
Training Webinar: Enterprise application performance with distributed caching
Training Webinar: Enterprise application performance with distributed cachingTraining Webinar: Enterprise application performance with distributed caching
Training Webinar: Enterprise application performance with distributed caching
OutSystems
 
Smart Data Frameworks for Database Replication
Smart Data Frameworks for Database ReplicationSmart Data Frameworks for Database Replication
Smart Data Frameworks for Database Replication
Roy Hammett
 
Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery
ManageEngine, Zoho Corporation
 
ADF Performance Monitor
ADF Performance MonitorADF Performance Monitor
Automation use cases_slides_jayendra_saxena
Automation use cases_slides_jayendra_saxenaAutomation use cases_slides_jayendra_saxena
Automation use cases_slides_jayendra_saxena
Jayendra Saxena
 
SAP LVM Post Copy Automation Integration
SAP LVM Post Copy Automation IntegrationSAP LVM Post Copy Automation Integration
SAP LVM Post Copy Automation Integration
Aliter Consulting
 
Analyzing OTM Logs and Troubleshooting
Analyzing OTM Logs and TroubleshootingAnalyzing OTM Logs and Troubleshooting
Analyzing OTM Logs and Troubleshooting
MavenWire
 

What's hot (20)

Sync or swim: the challenge of complex offline apps
Sync or swim:  the challenge of complex offline appsSync or swim:  the challenge of complex offline apps
Sync or swim: the challenge of complex offline apps
 
Serena Mainframe VUG: What's new in ChangeMan ZMF 8.1
Serena Mainframe VUG: What's new in ChangeMan ZMF 8.1Serena Mainframe VUG: What's new in ChangeMan ZMF 8.1
Serena Mainframe VUG: What's new in ChangeMan ZMF 8.1
 
The Top 5 Practices of a Highly Successful ChangeMan ZMF Administrator
The Top 5 Practices of a Highly Successful ChangeMan ZMF AdministratorThe Top 5 Practices of a Highly Successful ChangeMan ZMF Administrator
The Top 5 Practices of a Highly Successful ChangeMan ZMF Administrator
 
Upgrading Your System: A Telco User Perspectiv
Upgrading Your System: A Telco User PerspectivUpgrading Your System: A Telco User Perspectiv
Upgrading Your System: A Telco User Perspectiv
 
Internals of concurent managers
Internals of concurent managersInternals of concurent managers
Internals of concurent managers
 
Collaborate 2011-tuning-ebusiness-416502
Collaborate 2011-tuning-ebusiness-416502Collaborate 2011-tuning-ebusiness-416502
Collaborate 2011-tuning-ebusiness-416502
 
RightFax SCOM Management Pack
RightFax SCOM Management PackRightFax SCOM Management Pack
RightFax SCOM Management Pack
 
Abap slide lockenqueuedataclustersauthchecks
Abap slide lockenqueuedataclustersauthchecksAbap slide lockenqueuedataclustersauthchecks
Abap slide lockenqueuedataclustersauthchecks
 
Training Slides: 201 - Intermediate - Tungsten Cluster Maintenance
Training Slides: 201 - Intermediate - Tungsten Cluster MaintenanceTraining Slides: 201 - Intermediate - Tungsten Cluster Maintenance
Training Slides: 201 - Intermediate - Tungsten Cluster Maintenance
 
Bpc migration guide
Bpc migration guideBpc migration guide
Bpc migration guide
 
SAP ABAP Lock concept and enqueue
SAP ABAP Lock concept and enqueueSAP ABAP Lock concept and enqueue
SAP ABAP Lock concept and enqueue
 
Nagios Conference 2014 - Bryan Heden - 10,000 Services Across The State of Ohio
Nagios Conference 2014 - Bryan Heden - 10,000 Services Across The State of OhioNagios Conference 2014 - Bryan Heden - 10,000 Services Across The State of Ohio
Nagios Conference 2014 - Bryan Heden - 10,000 Services Across The State of Ohio
 
Serena Release Management approach and solutions
Serena Release Management approach and solutionsSerena Release Management approach and solutions
Serena Release Management approach and solutions
 
Training Webinar: Enterprise application performance with distributed caching
Training Webinar: Enterprise application performance with distributed cachingTraining Webinar: Enterprise application performance with distributed caching
Training Webinar: Enterprise application performance with distributed caching
 
Smart Data Frameworks for Database Replication
Smart Data Frameworks for Database ReplicationSmart Data Frameworks for Database Replication
Smart Data Frameworks for Database Replication
 
Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery Free training on NCM - Discovery & Disaster recovery
Free training on NCM - Discovery & Disaster recovery
 
ADF Performance Monitor
ADF Performance MonitorADF Performance Monitor
ADF Performance Monitor
 
Automation use cases_slides_jayendra_saxena
Automation use cases_slides_jayendra_saxenaAutomation use cases_slides_jayendra_saxena
Automation use cases_slides_jayendra_saxena
 
SAP LVM Post Copy Automation Integration
SAP LVM Post Copy Automation IntegrationSAP LVM Post Copy Automation Integration
SAP LVM Post Copy Automation Integration
 
Analyzing OTM Logs and Troubleshooting
Analyzing OTM Logs and TroubleshootingAnalyzing OTM Logs and Troubleshooting
Analyzing OTM Logs and Troubleshooting
 

Similar to Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Identity Products, Core Security

Jeremy Edberg (MinOps ) - How to build a solid infrastructure for a startup t...
Jeremy Edberg (MinOps ) - How to build a solid infrastructure for a startup t...Jeremy Edberg (MinOps ) - How to build a solid infrastructure for a startup t...
Jeremy Edberg (MinOps ) - How to build a solid infrastructure for a startup t...
Startupfest
 
Migrating from a monolith to microservices – is it worth it?
Migrating from a monolith to microservices – is it worth it?Migrating from a monolith to microservices – is it worth it?
Migrating from a monolith to microservices – is it worth it?
Katherine Golovinova
 
Cognos Performance Tuning Tips & Tricks
Cognos Performance Tuning Tips & TricksCognos Performance Tuning Tips & Tricks
Cognos Performance Tuning Tips & Tricks
Senturus
 
Data Stack Summit 2023
Data Stack Summit 2023Data Stack Summit 2023
Data Stack Summit 2023
Manimuthu Ayyannan
 
Flopsar tesacom-technical-introduction v1a-eng
Flopsar tesacom-technical-introduction v1a-engFlopsar tesacom-technical-introduction v1a-eng
Flopsar tesacom-technical-introduction v1a-eng
Marcelo Marinangeli
 
Load testing
Load testingLoad testing
Load testing
Muhammad Faheem
 
IDEAS Global A.I. Conference 2022.pdf
IDEAS Global A.I. Conference 2022.pdfIDEAS Global A.I. Conference 2022.pdf
IDEAS Global A.I. Conference 2022.pdf
Manimuthu Ayyannan
 
CM7_Op_Simplicity_Boston-Chromeleon CDS-Instrumentos, Inteligencia, Informaci...
CM7_Op_Simplicity_Boston-Chromeleon CDS-Instrumentos, Inteligencia, Informaci...CM7_Op_Simplicity_Boston-Chromeleon CDS-Instrumentos, Inteligencia, Informaci...
CM7_Op_Simplicity_Boston-Chromeleon CDS-Instrumentos, Inteligencia, Informaci...
WalterJaramillo7
 
Near real-time anomaly detection at Lyft
Near real-time anomaly detection at LyftNear real-time anomaly detection at Lyft
Near real-time anomaly detection at Lyft
markgrover
 
Closing the door on application performance problems
Closing the door on application performance problemsClosing the door on application performance problems
Closing the door on application performance problems
ManageEngine, Zoho Corporation
 
Defects mining in exchanges - medvedev, klimakov, yamkovi
Defects mining in exchanges - medvedev, klimakov, yamkoviDefects mining in exchanges - medvedev, klimakov, yamkovi
Defects mining in exchanges - medvedev, klimakov, yamkovi
DataFest Tbilisi
 
Power Apps for developers
Power Apps for developersPower Apps for developers
Power Apps for developers
Mohamed Ashiq Faleel
 
The Best of MMS 2013
The Best of MMS 2013The Best of MMS 2013
The Best of MMS 2013
C/D/H Technology Consultants
 
Microsoft Infrastructure Monitoring using OpManager
Microsoft Infrastructure Monitoring using OpManagerMicrosoft Infrastructure Monitoring using OpManager
Microsoft Infrastructure Monitoring using OpManager
ManageEngine
 
Service quality monitoring system architecture
Service quality monitoring system architectureService quality monitoring system architecture
Service quality monitoring system architecture
Matsuo Sawahashi
 
Copy of Silk performer - KT.pptx
Copy of Silk performer - KT.pptxCopy of Silk performer - KT.pptx
Copy of Silk performer - KT.pptx
ssuser20fcbe
 
Fredrik Knalstad - 10 ways to trigger orchestrator runbooks in the it jungle
Fredrik Knalstad - 10 ways to trigger orchestrator runbooks in the it jungleFredrik Knalstad - 10 ways to trigger orchestrator runbooks in the it jungle
Fredrik Knalstad - 10 ways to trigger orchestrator runbooks in the it jungle
Nordic Infrastructure Conference
 
10 ways to trigger runbooks from Orchestrator
10 ways to trigger runbooks from Orchestrator10 ways to trigger runbooks from Orchestrator
10 ways to trigger runbooks from Orchestrator
Fredrik Knalstad
 
Fredrik knalstad 10 ways to trigger orchestrator runbooks in the it jungle
Fredrik knalstad   10 ways to trigger orchestrator runbooks in the it jungleFredrik knalstad   10 ways to trigger orchestrator runbooks in the it jungle
Fredrik knalstad 10 ways to trigger orchestrator runbooks in the it jungle
Per Riis
 
PAC 2019 virtual Bruno Audoux
PAC 2019 virtual Bruno Audoux PAC 2019 virtual Bruno Audoux
PAC 2019 virtual Bruno Audoux
Neotys
 

Similar to Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Identity Products, Core Security (20)

Jeremy Edberg (MinOps ) - How to build a solid infrastructure for a startup t...
Jeremy Edberg (MinOps ) - How to build a solid infrastructure for a startup t...Jeremy Edberg (MinOps ) - How to build a solid infrastructure for a startup t...
Jeremy Edberg (MinOps ) - How to build a solid infrastructure for a startup t...
 
Migrating from a monolith to microservices – is it worth it?
Migrating from a monolith to microservices – is it worth it?Migrating from a monolith to microservices – is it worth it?
Migrating from a monolith to microservices – is it worth it?
 
Cognos Performance Tuning Tips & Tricks
Cognos Performance Tuning Tips & TricksCognos Performance Tuning Tips & Tricks
Cognos Performance Tuning Tips & Tricks
 
Data Stack Summit 2023
Data Stack Summit 2023Data Stack Summit 2023
Data Stack Summit 2023
 
Flopsar tesacom-technical-introduction v1a-eng
Flopsar tesacom-technical-introduction v1a-engFlopsar tesacom-technical-introduction v1a-eng
Flopsar tesacom-technical-introduction v1a-eng
 
Load testing
Load testingLoad testing
Load testing
 
IDEAS Global A.I. Conference 2022.pdf
IDEAS Global A.I. Conference 2022.pdfIDEAS Global A.I. Conference 2022.pdf
IDEAS Global A.I. Conference 2022.pdf
 
CM7_Op_Simplicity_Boston-Chromeleon CDS-Instrumentos, Inteligencia, Informaci...
CM7_Op_Simplicity_Boston-Chromeleon CDS-Instrumentos, Inteligencia, Informaci...CM7_Op_Simplicity_Boston-Chromeleon CDS-Instrumentos, Inteligencia, Informaci...
CM7_Op_Simplicity_Boston-Chromeleon CDS-Instrumentos, Inteligencia, Informaci...
 
Near real-time anomaly detection at Lyft
Near real-time anomaly detection at LyftNear real-time anomaly detection at Lyft
Near real-time anomaly detection at Lyft
 
Closing the door on application performance problems
Closing the door on application performance problemsClosing the door on application performance problems
Closing the door on application performance problems
 
Defects mining in exchanges - medvedev, klimakov, yamkovi
Defects mining in exchanges - medvedev, klimakov, yamkoviDefects mining in exchanges - medvedev, klimakov, yamkovi
Defects mining in exchanges - medvedev, klimakov, yamkovi
 
Power Apps for developers
Power Apps for developersPower Apps for developers
Power Apps for developers
 
The Best of MMS 2013
The Best of MMS 2013The Best of MMS 2013
The Best of MMS 2013
 
Microsoft Infrastructure Monitoring using OpManager
Microsoft Infrastructure Monitoring using OpManagerMicrosoft Infrastructure Monitoring using OpManager
Microsoft Infrastructure Monitoring using OpManager
 
Service quality monitoring system architecture
Service quality monitoring system architectureService quality monitoring system architecture
Service quality monitoring system architecture
 
Copy of Silk performer - KT.pptx
Copy of Silk performer - KT.pptxCopy of Silk performer - KT.pptx
Copy of Silk performer - KT.pptx
 
Fredrik Knalstad - 10 ways to trigger orchestrator runbooks in the it jungle
Fredrik Knalstad - 10 ways to trigger orchestrator runbooks in the it jungleFredrik Knalstad - 10 ways to trigger orchestrator runbooks in the it jungle
Fredrik Knalstad - 10 ways to trigger orchestrator runbooks in the it jungle
 
10 ways to trigger runbooks from Orchestrator
10 ways to trigger runbooks from Orchestrator10 ways to trigger runbooks from Orchestrator
10 ways to trigger runbooks from Orchestrator
 
Fredrik knalstad 10 ways to trigger orchestrator runbooks in the it jungle
Fredrik knalstad   10 ways to trigger orchestrator runbooks in the it jungleFredrik knalstad   10 ways to trigger orchestrator runbooks in the it jungle
Fredrik knalstad 10 ways to trigger orchestrator runbooks in the it jungle
 
PAC 2019 virtual Bruno Audoux
PAC 2019 virtual Bruno Audoux PAC 2019 virtual Bruno Audoux
PAC 2019 virtual Bruno Audoux
 

More from Core Security

How to Solve the Top 3 Struggles with Identity Governance and Administration ...
How to Solve the Top 3 Struggles with Identity Governance and Administration ...How to Solve the Top 3 Struggles with Identity Governance and Administration ...
How to Solve the Top 3 Struggles with Identity Governance and Administration ...
Core Security
 
Lazy Penetration Tester Tricks
Lazy Penetration Tester Tricks Lazy Penetration Tester Tricks
Lazy Penetration Tester Tricks
Core Security
 
Thanks for All the Phish: Introducing Core Impact 18.1
Thanks for All the Phish: Introducing Core Impact 18.1Thanks for All the Phish: Introducing Core Impact 18.1
Thanks for All the Phish: Introducing Core Impact 18.1
Core Security
 
Identity + Security: Welcome to Your New Career
Identity + Security: Welcome to Your New Career Identity + Security: Welcome to Your New Career
Identity + Security: Welcome to Your New Career
Core Security
 
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Core Security
 
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan RowcliffeNo More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
Core Security
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Core Security
 
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Core Security
 
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core SecurityThreat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
Core Security
 
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
Core Security
 
Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...
Core Security
 
Product Vision - Stephen Newman – SecureAuth+Core Security
Product Vision - Stephen Newman  – SecureAuth+Core Security Product Vision - Stephen Newman  – SecureAuth+Core Security
Product Vision - Stephen Newman – SecureAuth+Core Security
Core Security
 
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
Core Security
 
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Core Security
 
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Core Security
 
The Why - Keith Graham, CTO – SecureAuth+Core Security
The Why - Keith Graham, CTO – SecureAuth+Core Security The Why - Keith Graham, CTO – SecureAuth+Core Security
The Why - Keith Graham, CTO – SecureAuth+Core Security
Core Security
 
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core SecurityVulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Core Security
 
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
Core Security
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
Core Security
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
Core Security
 

More from Core Security (20)

How to Solve the Top 3 Struggles with Identity Governance and Administration ...
How to Solve the Top 3 Struggles with Identity Governance and Administration ...How to Solve the Top 3 Struggles with Identity Governance and Administration ...
How to Solve the Top 3 Struggles with Identity Governance and Administration ...
 
Lazy Penetration Tester Tricks
Lazy Penetration Tester Tricks Lazy Penetration Tester Tricks
Lazy Penetration Tester Tricks
 
Thanks for All the Phish: Introducing Core Impact 18.1
Thanks for All the Phish: Introducing Core Impact 18.1Thanks for All the Phish: Introducing Core Impact 18.1
Thanks for All the Phish: Introducing Core Impact 18.1
 
Identity + Security: Welcome to Your New Career
Identity + Security: Welcome to Your New Career Identity + Security: Welcome to Your New Career
Identity + Security: Welcome to Your New Career
 
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
Put Analytics And Automation At The Core Of Security – Joseph Blankenship – S...
 
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan RowcliffeNo More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
No More SIlos: Connected Security - Mike Desai and Ryan Rowcliffe
 
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
Modern Authentication – Turn a Losing Battle into a Winning Strategy, Robert ...
 
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
 
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core SecurityThreat Dissection - Alberto Soliño Testa Research Director, Core Security
Threat Dissection - Alberto Soliño Testa Research Director, Core Security
 
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
How to Defeat the Vulnerability Hydra - Andy Nickel Sales Engineer, Core Secu...
 
Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...Understanding Network Insight Integrations to Automate Containment and Kick S...
Understanding Network Insight Integrations to Automate Containment and Kick S...
 
Product Vision - Stephen Newman – SecureAuth+Core Security
Product Vision - Stephen Newman  – SecureAuth+Core Security Product Vision - Stephen Newman  – SecureAuth+Core Security
Product Vision - Stephen Newman – SecureAuth+Core Security
 
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
The Good, the Bad, and The Not So Bad: Tracking Threat Operators with Our Thr...
 
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
Introducing Core Role Designer - Michael Marks Product Manager - Identity, Co...
 
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
Core Connector API Demo - Michael Marks Product Manager - Identity, Core Secu...
 
The Why - Keith Graham, CTO – SecureAuth+Core Security
The Why - Keith Graham, CTO – SecureAuth+Core Security The Why - Keith Graham, CTO – SecureAuth+Core Security
The Why - Keith Graham, CTO – SecureAuth+Core Security
 
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core SecurityVulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
Vulnerability Insight Tips & Tricks - Magno Gomes SE Manager, Core Security
 
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
Network Insight: How To Assess Findings - Tier 1 SOC Triage - Mark Gilbert ,T...
 
10 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 201610 IT Security Trends to Watch for in 2016
10 IT Security Trends to Watch for in 2016
 
Trending it security threats in the public sector
Trending it security threats in the public sectorTrending it security threats in the public sector
Trending it security threats in the public sector
 

Recently uploaded

LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
lorraineandreiamcidl
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
Deuglo Infosystem Pvt Ltd
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
Peter Muessig
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
Peter Muessig
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
Grant Fritchey
 
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative AnalysisOdoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Envertis Software Solutions
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
Yara Milbes
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
aymanquadri279
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
Peter Muessig
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
Drona Infotech
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
kalichargn70th171
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
Green Software Development
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
SOCRadar
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
Remote DBA Services
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
brainerhub1
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
VALiNTRY360
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
TaghreedAltamimi
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Neo4j
 

Recently uploaded (20)

LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOMLORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
LORRAINE ANDREI_LEQUIGAN_HOW TO USE ZOOM
 
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit ParisNeo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
Neo4j - Product Vision and Knowledge Graphs - GraphSummit Paris
 
Empowering Growth with Best Software Development Company in Noida - Deuglo
Empowering Growth with Best Software  Development Company in Noida - DeugloEmpowering Growth with Best Software  Development Company in Noida - Deuglo
Empowering Growth with Best Software Development Company in Noida - Deuglo
 
UI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design SystemUI5con 2024 - Bring Your Own Design System
UI5con 2024 - Bring Your Own Design System
 
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling ExtensionsUI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
UI5con 2024 - Boost Your Development Experience with UI5 Tooling Extensions
 
Using Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query PerformanceUsing Query Store in Azure PostgreSQL to Understand Query Performance
Using Query Store in Azure PostgreSQL to Understand Query Performance
 
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative AnalysisOdoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
Odoo ERP Vs. Traditional ERP Systems – A Comparative Analysis
 
SMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API ServiceSMS API Integration in Saudi Arabia| Best SMS API Service
SMS API Integration in Saudi Arabia| Best SMS API Service
 
What is Master Data Management by PiLog Group
What is Master Data Management by PiLog GroupWhat is Master Data Management by PiLog Group
What is Master Data Management by PiLog Group
 
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s EcosystemUI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
UI5con 2024 - Keynote: Latest News about UI5 and it’s Ecosystem
 
Mobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona InfotechMobile App Development Company In Noida | Drona Infotech
Mobile App Development Company In Noida | Drona Infotech
 
Vitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdfVitthal Shirke Java Microservices Resume.pdf
Vitthal Shirke Java Microservices Resume.pdf
 
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf8 Best Automated Android App Testing Tool and Framework in 2024.pdf
8 Best Automated Android App Testing Tool and Framework in 2024.pdf
 
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, FactsALGIT - Assembly Line for Green IT - Numbers, Data, Facts
ALGIT - Assembly Line for Green IT - Numbers, Data, Facts
 
socradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdfsocradar-q1-2024-aviation-industry-report.pdf
socradar-q1-2024-aviation-industry-report.pdf
 
Oracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptxOracle 23c New Features For DBAs and Developers.pptx
Oracle 23c New Features For DBAs and Developers.pptx
 
Unveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdfUnveiling the Advantages of Agile Software Development.pdf
Unveiling the Advantages of Agile Software Development.pdf
 
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfTop Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdf
 
Lecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptxLecture 2 - software testing SE 412.pptx
Lecture 2 - software testing SE 412.pptx
 
Atelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissancesAtelier - Innover avec l’IA Générative et les graphes de connaissances
Atelier - Innover avec l’IA Générative et les graphes de connaissances
 

Access Assurance Suite Tips & Tricks - Lisa Lombardo Principal Architect Identity Products, Core Security

  • 1. ACCESS  ASSURANCE  SUITE   TIPS  &  TRICKS Lisa  Lombardo,  Principal  Architect  of  Identity  Product   and  Technology  Solutions
  • 2. L E A R N M O R E Lisa  Lombardo Lisa  Lombardo,  Principal  Architect   of  Identity  Product  and  Technology   Solutions
  • 3. AGENDA  -­‐ Tips  &  Tricks • For  Maintenance   • For  Functionality   • For  the  Administration  Manager
  • 4. M A I N T E N A N C E
  • 5. Maintenance • Windows  services  startup • Windows  updates • Log  archiving • Database  maintenance
  • 6. Maintenance  – Windows  Services Subtitle  left • There  is  a  proper  order  to  start  the  Windows  Services  of  the  Access   Assurance  Suite • Knowledge  article  provides  a  PowerShell  script  to  stop  and  start  the   services  in  the  proper  order • Especially,  the  CourCFService before  the  CourCFMService before  the   CourionService • The  CourProfiler service  should  start  first,  as  it  is  responsible  for  logging   done  by  all  other  components. • The  CourConfigSvr service  should  start  second,  as  it  is  responsible  for   reading/writing  of  configuration  data  used  on  initialization
  • 7. Example Subtitle  left #  Now  all  the  services  will  be  started  in  a  logical  order. #  Please  put  a  "#"  in  the  first  column  of  any  entry  below  for  services  your  deployment  does  not  use funcStartAndWaitCourProfiler 1 FuncStartAndWaitCourConfigSvr 1 funcStartAndWaitCourCFService1 #  Increase  this  wait  time  if  you  have  a  large  number  of  targets funcStartAndWaitCourCFMService10   #  Increase  this  wait  time  if  you  have  a  large  number  of  targets funcStartAndWaitCourionPasswordCourier 10 funcStartAndWaitCourProtocolService1 funcStartAndWaitCourGATService1                                #  if  using  Transparent  Synchronization funcStartAndWaitCourionTSAO1                                          #  if  using  Transparent  Synchronization funcStartAndWaitCourNSLDAPAgent1                    #  if  using  PMM  for  Netscape  DS funcStartAndWaitCourATLService1 funcStartAndWaitCourATLAdmin 1 funcStartAndWait"Courion Session  Claim  Provider"  1 funcStartAndWait"Courion Community  Claim  Provider"  1 funcStartAndWait"Courion Eventing Service"  1 funcStartAndWait"Courion Macro  Engine"  1 funcStartAndWait"Courion Identity  Mapping  Service"  1 funcStartAndWait"Courion Notification  Service"  1 funcStartAndWait"Courion Request  Service"  1 funcStartAndWait"Courion Scheduler  Service"  1
  • 8. Maintenance  – Windows   Updates Proclaiming  from  the  mountain  top!!! “Stop  all  Access  Assurance  Suite   Windows  services  before  applying   Windows  updates!”
  • 9. Maintenance  – Windows   Updates • You  do  not  change  your  oil  on  your  car   while  driving  down  the  highway. • Please  do  not  change  the  underlying   operating  system  with  the  Access   Assurance  Suite  component  running. • WMI  (Windows  Management   Instrumentation)  layer  corruption  has   occurred.     • WMI  holds  some  of  our  configuration   data.   • Uninstall  and  re-­‐install  is  needed. • Use  ConfigMover Targets  and   ConfigMover Workflows  to  export   targets  and  workflows  for  import,  if   needed.
  • 10. Maintenance  – Windows  Updates • While  you  are  stopping  the  Access  Assurance  Suite  services,  regularly   archive  your  log  files  to  keep  them  of  a  manageable  size • If  you  do  not  have  your  own  methodology  for  archiving  logs  of  your   enterprise  applications,  the  PowerShell  script  provides  an  option  to  archive   the  logs • CourProfiler service  controls  the  logs.     • Must  be  stopped  to  release  the  file  for  move  to  another  location • New  logs  automatically  re-­‐create
  • 11. Maintenance  – Log  Archiving • Over  time  the  logs  can  get  large  and  eventually  unopenable by  common   editors. • When  working  a  support  case  the  logs  are  vital  to  the  investigation. • Regularly  archiving  the  log  files  when  doing  other  maintenance  tasks  on   the  application  server  is  recommended. • The  Knowledge  article  with  information  on  stopping  and  starting  services   includes  a  PowerShell  script  with  log  archiving  as  an  option  while  the   services  are  stopped
  • 12. Maintenance  – DB  Maintenance • Over  time  the  database  can  get  fragmented  and  reduce  performance. • Following  Microsoft’s  recommended  maintenance  plans  for  the  databases   on  database  server  is  recommended. • We  have  found  large  database  queries  significantly  improve  by  regularly   running  the  DB  server’s  sp_updatestats stored  proc  on  the  application’s   database.
  • 13. F U N C T I O N A L I T Y
  • 15. Functionality  -­‐ Performance • How  well  is  something  functioning  or  performing  and  from  who’s   perspective? • Quality  vs  Quantity  (time) • Tools  for  measuring  performance  and  to  find  bottlenecks • Fiddler  or  web-­‐browser-­‐based  tools  like  IE  Developer  Tools • Wireshark  or  network  capture  tool   • Process  Monitor  /  Process  Explorer  and  task  manager • SQL  Profiler • Log  files  include  logs  from  the  suite,  IIS  logs,  Windows  logs
  • 16. Data  Flow   XMLAO IIS CourATLService Connection   strings Courion   Service CFM CF DB AD RACF SAP End  User   Workflow Browser Other   Courion   Windows   Services AA  Portal   apps MSMQhttp…courion... http…CourionARMS... Presentation   Application   Cnctr/PMM   CF AD2 Targets  Initiation Event  Viewer IIS  Logs CourionService/   CourATL.log CourionARMS/* Portal*.log CourionService/   *.logs CourionService/   *cnctr.logs target  artifacts
  • 17. Request  ßàResponse • Most  activity  is  request/response  based • Component  sends  request • Another  component  receives  request  and  acts  on  request • Sends  response  to  the  component  that  made  request • Follow  the  “request  to”  and  “response  back”  path • Can  get  complicated • The  component  that  receives  a  request  may  have  to  issue  their  own  request  to  another   component  and  wait  for  that  response  before  responding  to  the  original  request • Network  protocols,  firewalls,  timeouts,  etc are  all  involved • Determine  what  audit  trail/logs  exist  to  track  the  activity  at  each  component • Network  capture  tools  to  track  the  activity  between  components • SQL  Profiler  to  track  the  activity  to  the  database
  • 18. Functionality  -­‐ Logs • Logging  approach • All  the  services  have  a  log  file • CourionService =  courion.log • Courion Request  Service  =  courrequestservice.log   • All  the  connectors  have  a  log  file  (*cnctr.log) • Connector  for  Microsoft  Active  Directory  =  adscnctr.log • Connector  for  Microsoft  ADO  =  adocnctr.log • All  the  PMMs  have  a  log  file  (*module.log) • PMM  for  Microsoft  Active  Directory  =  adsmodule.log • PMM  for  Sun  Solaris  =  unixmodule.log • Changes  made  in  Administration  Manager • Audit.log
  • 19. Functionality  -­‐ Recommendation • Connector  for  Courion  HTML  Email2 • Not  Connector  for  Microsoft  CDO   Message • Check  courion.log   • Ticketing • Notifications • Triggers   • Export  workflows  and  targets • Document  and  securely  store  pass   phrase
  • 20. A D M I N I S T R A T I O N   M A N A G E R   T I P S
  • 21. Administration  Manager  Tips • Provisioning  Platform • Copy  and  Paste • Workflow  auto-­‐load • Workflow  selection • Macro  caching  values
  • 22. Admin  Manager  Tips  – Copy  &  Paste • Administration  Manager  for  Provisioning  Platform  workflows • CP=yes • Enables  Copy  and  paste  of  configuration  from  one  workflow  to  another • Tree  view  only • http://localhost/courion/CustMgrs/AccountCourier/Default.asp?cp=yes • Note:  AAS  9.0  replace  “courion”  with  “core
  • 24. Admin  Manager  Tips  – Workflow  auto-­‐load • Administration  Manager  for  Provisioning  Platform  workflows • Workflow=<WorkflowName> • Load  a  specific  workflow.    Workflow  name  is  case-­‐sensitive. • http://localhost/courion/CustMgrs/AccountCourier/Default.asp?Workflow=<workflowNam e> • Note:  AAS  9.0  replace  “courion”  with  “core”
  • 26. Admin  Manager  Tips  – Workflow  Selection • Administration  Manager  for  Provisioning  Platform  workflows • MW=yes • On  Administration  Manager  logon  page  presents  list  of  available  workflows  for  selecting   one  workflow  to  load  for  quicker  initialization  of  the  Admin  Manager • http://localhost/courion/CustMgrs/AccountCourier/Default.asp?mw=yes • Note:  AAS  9.0  replace  “courion”  with  “core”
  • 28. Admin  Manager  – Macro  Cache • Provisioning  Platform  workflow   execution • Macro  resolution • Custom  Macro  definition • Cache  results  – use  for  data  that  does   not  change  during  that  workflow   execution • Use  optimization  – group  database   queries  that  share  the  same  criterion   from  the  same  table      “  FROM  <table>   WHERE  <criterion>”