This session consists of two parts. The first part of the session will introduce you to i4Trust IAM components in detail while the second will introduce i4Trust Marketplace Services. Technical session for Local Experts in Data Sharing (LEBDs)
Session 4 - Bringing the pieces together - Detailed review of a reference ex...FIWARE
This session will explain how everything comes together under i4Trust using a reference example and then explain that example in detail. It will bringing the pieces together: Detailed technical review of a reference example: the prerequisites, creating an offering, acquiring rights / activation , & consumption. And setup of components of the i4Trust experimentation framework. Technical session for Local Experts in Data Sharing (LEBDs)
Session 1 - Introduction to i4Trust Data Spaces, building blocks, and roles |...FIWARE
This session will elaborate on the i4Trust overall mission and vision and introduce you to data spaces: how they enable the development of innovative services and what building blocks are required to build data spaces. It will elaborate on what i4Trust is aiming at beyond building blocks which is the creation of a vibrant community. In addition, there will be an introduction to the role of DIHs and to i4Trust open calls. The session for Local Experts in Data Sharing (LEBDs) & Ambassadors
Session 2 - NGSI-LD primer & Smart Data Models | Train the Trainers ProgramFIWARE
This session consists of two parts. In the first part you will get introduced to NGSI-LD: the basic model/concept behind and basic operations allowing you to start developing applications with the API. In the second part, you will get introduced to the Smart Data Models initiative. Technical Session for Local Experts in Data Sharing (LEBDs)
This document provides information about NGSI-LD (Next Generation SI Services for Linked Data) including:
- NGSI-LD specific headers used in requests and responses
- Supported content types and best practices for JSON-LD payloads
- Examples of retrieving entity data and temporal data using NGSI-LD endpoints
- Options for normalizing, pagination and filtering temporal data
- Using geojson and language maps for location and multilingual attributes
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project. The core part of this virtual training camp (21-24 June 2021) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using linked data concepts - JSON-LD and NGSI-LD and combines these with common smart data models for the sharing and augmentation of context data.
In addition, it covers the supplementary FIWARE technologies used to implement the common functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historical big data.
This 12-hour online training course can be used to obtain a good understanding of FIWARE and NGSI Interfaces and form the basis of studying for the FIWARE expert certification.
Extending this core part, the virtual training camp adds introductory and deep-dive sessions on how FIWARE and iSHARE technologies, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for the creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the creation of innovative services based on data sharing. In addition, SMEs and Digital Innovation Hubs (DIHs) that go through this complete training and are located in countries eligible under Horizon 2020 will be equipped with the necessary know-how to apply to the recently launched i4Trust Open Call.
This document provides an overview of advanced operations in NGSI-LD (Next Generation SI-LD), including:
- Specific headers used in NGSI-LD requests
- Supported content types and best practices for JSON-LD payloads
- Examples of temporal queries, geoqueries, and language maps
- Details on pagination, time limiting queries, and supported response formats
FIWARE Global Summit - NGSI-LD - NGSI with Linked DataFIWARE
Presentation by Martin Bauer
Senior Researcher, NEC Labs Europe
José Manuel Cantera
Senior Standardization Expert, FIWARE Foundation
FIWARE Global Summit
27-28 November 2018
Malaga, Spain
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project. The core part of this virtual training camp (21-24 June 2021) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using linked data concepts - JSON-LD and NGSI-LD and combines these with common smart data models for the sharing and augmentation of context data.
In addition, it covers the supplementary FIWARE technologies used to implement the common functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historical big data.
This 12-hour online training course can be used to obtain a good understanding of FIWARE and NGSI Interfaces and form the basis of studying for the FIWARE expert certification.
Extending this core part, the virtual training camp adds introductory and deep-dive sessions on how FIWARE and iSHARE technologies, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for the creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the creation of innovative services based on data sharing. In addition, SMEs and Digital Innovation Hubs (DIHs) that go through this complete training and are located in countries eligible under Horizon 2020 will be equipped with the necessary know-how to apply to the recently launched i4Trust Open Call.
Session 4 - Bringing the pieces together - Detailed review of a reference ex...FIWARE
This session will explain how everything comes together under i4Trust using a reference example and then explain that example in detail. It will bringing the pieces together: Detailed technical review of a reference example: the prerequisites, creating an offering, acquiring rights / activation , & consumption. And setup of components of the i4Trust experimentation framework. Technical session for Local Experts in Data Sharing (LEBDs)
Session 1 - Introduction to i4Trust Data Spaces, building blocks, and roles |...FIWARE
This session will elaborate on the i4Trust overall mission and vision and introduce you to data spaces: how they enable the development of innovative services and what building blocks are required to build data spaces. It will elaborate on what i4Trust is aiming at beyond building blocks which is the creation of a vibrant community. In addition, there will be an introduction to the role of DIHs and to i4Trust open calls. The session for Local Experts in Data Sharing (LEBDs) & Ambassadors
Session 2 - NGSI-LD primer & Smart Data Models | Train the Trainers ProgramFIWARE
This session consists of two parts. In the first part you will get introduced to NGSI-LD: the basic model/concept behind and basic operations allowing you to start developing applications with the API. In the second part, you will get introduced to the Smart Data Models initiative. Technical Session for Local Experts in Data Sharing (LEBDs)
This document provides information about NGSI-LD (Next Generation SI Services for Linked Data) including:
- NGSI-LD specific headers used in requests and responses
- Supported content types and best practices for JSON-LD payloads
- Examples of retrieving entity data and temporal data using NGSI-LD endpoints
- Options for normalizing, pagination and filtering temporal data
- Using geojson and language maps for location and multilingual attributes
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project. The core part of this virtual training camp (21-24 June 2021) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using linked data concepts - JSON-LD and NGSI-LD and combines these with common smart data models for the sharing and augmentation of context data.
In addition, it covers the supplementary FIWARE technologies used to implement the common functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historical big data.
This 12-hour online training course can be used to obtain a good understanding of FIWARE and NGSI Interfaces and form the basis of studying for the FIWARE expert certification.
Extending this core part, the virtual training camp adds introductory and deep-dive sessions on how FIWARE and iSHARE technologies, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for the creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the creation of innovative services based on data sharing. In addition, SMEs and Digital Innovation Hubs (DIHs) that go through this complete training and are located in countries eligible under Horizon 2020 will be equipped with the necessary know-how to apply to the recently launched i4Trust Open Call.
This document provides an overview of advanced operations in NGSI-LD (Next Generation SI-LD), including:
- Specific headers used in NGSI-LD requests
- Supported content types and best practices for JSON-LD payloads
- Examples of temporal queries, geoqueries, and language maps
- Details on pagination, time limiting queries, and supported response formats
FIWARE Global Summit - NGSI-LD - NGSI with Linked DataFIWARE
Presentation by Martin Bauer
Senior Researcher, NEC Labs Europe
José Manuel Cantera
Senior Standardization Expert, FIWARE Foundation
FIWARE Global Summit
27-28 November 2018
Malaga, Spain
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project. The core part of this virtual training camp (21-24 June 2021) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using linked data concepts - JSON-LD and NGSI-LD and combines these with common smart data models for the sharing and augmentation of context data.
In addition, it covers the supplementary FIWARE technologies used to implement the common functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historical big data.
This 12-hour online training course can be used to obtain a good understanding of FIWARE and NGSI Interfaces and form the basis of studying for the FIWARE expert certification.
Extending this core part, the virtual training camp adds introductory and deep-dive sessions on how FIWARE and iSHARE technologies, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for the creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the creation of innovative services based on data sharing. In addition, SMEs and Digital Innovation Hubs (DIHs) that go through this complete training and are located in countries eligible under Horizon 2020 will be equipped with the necessary know-how to apply to the recently launched i4Trust Open Call.
Session 8 - Creating Data Processing Services | Train the Trainers ProgramFIWARE
This technical session for Local Experts in Data Sharing (LEBDs), this session will explain how to create data processing services that are key to i4Trust.
Kong, Keyrock, Keycloak, i4Trust - Options to Secure FIWARE in ProductionFIWARE
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
FIWARE Wednesday Webinars - How to Secure IoT DevicesFIWARE
FIWARE Wednesday Webinar - How to Secure IoT Devices (22nd April 2020)
Corresponding webinar recording: https://youtu.be/_87IZhrYo3U
Live coding session and commentary, demonstrating various techniques and methods for securing the interactions between Devices, IoT Agents and the Context Broker
Chapter: Security
Difficulty: 3
Audience: Any Technical
Presenter: Jason Fox (Senior Technical Evangelist, FIWARE Foundation)
This document provides instructions for setting up and integrating the FIWARE components Orion Context Broker, Keyrock Identity Manager, and Wilma PEP Proxy on a single machine. It describes how to install and test each component individually using Docker containers or VirtualBox images. It then explains how to configure the components to work together by setting up authentication in Keyrock and passing tokens through Wilma to authorize requests to Orion.
FIWARE Wednesday Webinars - Introduction to NGSI-LDFIWARE
Introduction to NGSI-LD Webinar - 27th May 2020
Corresponding webinar recording: https://youtu.be/rZ13IyLpAtA
A data-model driven and linked data first introduction for developers to NGSI-LD and JSON-LD.
Chapter: Core
Difficulty: 3
Audience: Any Technical
Presenter: Jason Fox (Senior Technical Evangelist, FIWARE Foundation)
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project. The core part of this virtual training camp (21-24 June 2021) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using linked data concepts - JSON-LD and NGSI-LD and combines these with common smart data models for the sharing and augmentation of context data.
In addition, it covers the supplementary FIWARE technologies used to implement the common functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historical big data.
This 12-hour online training course can be used to obtain a good understanding of FIWARE and NGSI Interfaces and form the basis of studying for the FIWARE expert certification.
Extending this core part, the virtual training camp adds introductory and deep-dive sessions on how FIWARE and iSHARE technologies, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for the creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the creation of innovative services based on data sharing. In addition, SMEs and Digital Innovation Hubs (DIHs) that go through this complete training and are located in countries eligible under Horizon 2020 will be equipped with the necessary know-how to apply to the recently launched i4Trust Open Call.
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project. The core part of this virtual training camp (21-24 June 2021) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using linked data concepts - JSON-LD and NGSI-LD and combines these with common smart data models for the sharing and augmentation of context data.
In addition, it covers the supplementary FIWARE technologies used to implement the common functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historical big data.
This 12-hour online training course can be used to obtain a good understanding of FIWARE and NGSI Interfaces and form the basis of studying for the FIWARE expert certification.
Extending this core part, the virtual training camp adds introductory and deep-dive sessions on how FIWARE and iSHARE technologies, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for the creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the creation of innovative services based on data sharing. In addition, SMEs and Digital Innovation Hubs (DIHs) that go through this complete training and are located in countries eligible under Horizon 2020 will be equipped with the necessary know-how to apply to the recently launched i4Trust Open Call.
FIWARE provides an open standard for managing context and digital twin data to enable the development of smart solutions across multiple sectors. The FIWARE context broker uses NGSI APIs to integrate data from different sources and build a digital twin representation of the real world. Smart data models define common data models for different domains to increase interoperability and reduce development costs when building smart applications. The smart data models initiative is led by several organizations and aims to create a community for defining and maintaining open data models using an agile process.
Creating a Context-Aware solution, Complex Event Processing with FIWARE PerseoFernando Lopez Aguilar
Introduction to Complex Event Processing (CEP). How FIWARE deals with CEP through FIWARE Perseo. How to connect FIWARE Perseo with FIWARE Orion Context Broker. How can we define an event with Event Processing Language (EPL) and what are the predefined actions to include in FIWARE Perseo.
Introduction to Big Data and how FIWARE manage it through the different approaches. What are the differences between Apache Flink and Spark approaches. Introduction to FIWARE Connectors to manage NGSI context information. Brief introduction to Machine Learning with FIWARE technology
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
FIWARE Training: Identity Management and Access ControlFIWARE
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project and IShare Foundation. The core part of this virtual training camp (27 Jun - 01 Jul 2022) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using NGSI-LD (the simple yet powerful open standard API enabling to publish and access digital twin data) combined with common smart data models
In addition, it covers the supplementary FIWARE technologies used to implement the rest of functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data, and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historic big data.
Extending this core part, the training camp also cover how you can easily integrate FIWARE systems with blockchain networks to create audit-proof logs of processes and ensure transparency.
This document discusses KeyRock and Wilma, which provide identity management and authorization in FIWARE. KeyRock is based on OpenStack's Horizon and Keystone and provides user registration, authentication, and authorization. Wilma acts as a PEP proxy, enforcing access policies defined in AuthZForce. Together, they allow secure authentication of users and authorization of access to FIWARE services and applications.
FIWARE Wednesday Webinars - Integrating FIWARE with Blockchain/DLTsFIWARE
Integrating FIWARE with Blockchain/DLTs - 1 July 2020
Corresponding webinar recording: https://youtu.be/ITSxtlCmNhQ
This webinar will be an introduction to Blockchain and how FIWARE can be integrated with Blockchain/DLTs with a demo. In addition, it will also explain upcoming DLT components in the FIWARE ecosystem and an idea/state of art to leverage DLTs in 'Powered by FIWARE' systems.
Chapter: Blockchain
Difficulty: 3
Audience: Technical Domain Specific
Speaker: Har Preet Singh (Technical Expert and Evangelist, FIWARE Foundation)
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
Implementing WebAuthn & FAPI supports on KeycloakYuichi Nakamura
Keycloak supports WebAuthn and FAPI by implementing their features and passing conformance tests. Hitachi contributed WebAuthn support and worked with NRI to add FAPI compliance, addressing issues like supporting newer signature algorithms and the PKCE protocol. Further contributions are welcomed to resolve remaining FAPI test issues.
Exploring Advanced Authentication Methods in Novell Access ManagerNovell
Novell Access Manager provides many different levels of authentication beyond a simple user name and password. In this session, you will learn about its more advanced methods of authentication—from emerging standard like OpenID and CardSpace to tokens and certificates. Attendees will also see a demonstration of FreeRADIUS and the Vasco Digipass with Novell eDirectory, the Vasco NMAS method and an Access Manager plug-in that provides SSO to Web applications that expect a static password.
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...APIsecure_ Official
APIsecure - April 6 & 7, 2022
APIsecure is the world’s first conference dedicated to API threat management; bringing together breakers, defenders, and solutions in API security.
Why Assertion-based Access Token is preferred to a Handle-based one?
Yoshiyuki Tabata, Software Engineer at Hitachi
Session 8 - Creating Data Processing Services | Train the Trainers ProgramFIWARE
This technical session for Local Experts in Data Sharing (LEBDs), this session will explain how to create data processing services that are key to i4Trust.
Kong, Keyrock, Keycloak, i4Trust - Options to Secure FIWARE in ProductionFIWARE
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
FIWARE Wednesday Webinars - How to Secure IoT DevicesFIWARE
FIWARE Wednesday Webinar - How to Secure IoT Devices (22nd April 2020)
Corresponding webinar recording: https://youtu.be/_87IZhrYo3U
Live coding session and commentary, demonstrating various techniques and methods for securing the interactions between Devices, IoT Agents and the Context Broker
Chapter: Security
Difficulty: 3
Audience: Any Technical
Presenter: Jason Fox (Senior Technical Evangelist, FIWARE Foundation)
This document provides instructions for setting up and integrating the FIWARE components Orion Context Broker, Keyrock Identity Manager, and Wilma PEP Proxy on a single machine. It describes how to install and test each component individually using Docker containers or VirtualBox images. It then explains how to configure the components to work together by setting up authentication in Keyrock and passing tokens through Wilma to authorize requests to Orion.
FIWARE Wednesday Webinars - Introduction to NGSI-LDFIWARE
Introduction to NGSI-LD Webinar - 27th May 2020
Corresponding webinar recording: https://youtu.be/rZ13IyLpAtA
A data-model driven and linked data first introduction for developers to NGSI-LD and JSON-LD.
Chapter: Core
Difficulty: 3
Audience: Any Technical
Presenter: Jason Fox (Senior Technical Evangelist, FIWARE Foundation)
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project. The core part of this virtual training camp (21-24 June 2021) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using linked data concepts - JSON-LD and NGSI-LD and combines these with common smart data models for the sharing and augmentation of context data.
In addition, it covers the supplementary FIWARE technologies used to implement the common functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historical big data.
This 12-hour online training course can be used to obtain a good understanding of FIWARE and NGSI Interfaces and form the basis of studying for the FIWARE expert certification.
Extending this core part, the virtual training camp adds introductory and deep-dive sessions on how FIWARE and iSHARE technologies, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for the creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the creation of innovative services based on data sharing. In addition, SMEs and Digital Innovation Hubs (DIHs) that go through this complete training and are located in countries eligible under Horizon 2020 will be equipped with the necessary know-how to apply to the recently launched i4Trust Open Call.
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project. The core part of this virtual training camp (21-24 June 2021) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using linked data concepts - JSON-LD and NGSI-LD and combines these with common smart data models for the sharing and augmentation of context data.
In addition, it covers the supplementary FIWARE technologies used to implement the common functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historical big data.
This 12-hour online training course can be used to obtain a good understanding of FIWARE and NGSI Interfaces and form the basis of studying for the FIWARE expert certification.
Extending this core part, the virtual training camp adds introductory and deep-dive sessions on how FIWARE and iSHARE technologies, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for the creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the creation of innovative services based on data sharing. In addition, SMEs and Digital Innovation Hubs (DIHs) that go through this complete training and are located in countries eligible under Horizon 2020 will be equipped with the necessary know-how to apply to the recently launched i4Trust Open Call.
FIWARE provides an open standard for managing context and digital twin data to enable the development of smart solutions across multiple sectors. The FIWARE context broker uses NGSI APIs to integrate data from different sources and build a digital twin representation of the real world. Smart data models define common data models for different domains to increase interoperability and reduce development costs when building smart applications. The smart data models initiative is led by several organizations and aims to create a community for defining and maintaining open data models using an agile process.
Creating a Context-Aware solution, Complex Event Processing with FIWARE PerseoFernando Lopez Aguilar
Introduction to Complex Event Processing (CEP). How FIWARE deals with CEP through FIWARE Perseo. How to connect FIWARE Perseo with FIWARE Orion Context Broker. How can we define an event with Event Processing Language (EPL) and what are the predefined actions to include in FIWARE Perseo.
Introduction to Big Data and how FIWARE manage it through the different approaches. What are the differences between Apache Flink and Spark approaches. Introduction to FIWARE Connectors to manage NGSI context information. Brief introduction to Machine Learning with FIWARE technology
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
FIWARE Training: Identity Management and Access ControlFIWARE
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project and IShare Foundation. The core part of this virtual training camp (27 Jun - 01 Jul 2022) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using NGSI-LD (the simple yet powerful open standard API enabling to publish and access digital twin data) combined with common smart data models
In addition, it covers the supplementary FIWARE technologies used to implement the rest of functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data, and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historic big data.
Extending this core part, the training camp also cover how you can easily integrate FIWARE systems with blockchain networks to create audit-proof logs of processes and ensure transparency.
This document discusses KeyRock and Wilma, which provide identity management and authorization in FIWARE. KeyRock is based on OpenStack's Horizon and Keystone and provides user registration, authentication, and authorization. Wilma acts as a PEP proxy, enforcing access policies defined in AuthZForce. Together, they allow secure authentication of users and authorization of access to FIWARE services and applications.
FIWARE Wednesday Webinars - Integrating FIWARE with Blockchain/DLTsFIWARE
Integrating FIWARE with Blockchain/DLTs - 1 July 2020
Corresponding webinar recording: https://youtu.be/ITSxtlCmNhQ
This webinar will be an introduction to Blockchain and how FIWARE can be integrated with Blockchain/DLTs with a demo. In addition, it will also explain upcoming DLT components in the FIWARE ecosystem and an idea/state of art to leverage DLTs in 'Powered by FIWARE' systems.
Chapter: Blockchain
Difficulty: 3
Audience: Technical Domain Specific
Speaker: Har Preet Singh (Technical Expert and Evangelist, FIWARE Foundation)
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
Implementing WebAuthn & FAPI supports on KeycloakYuichi Nakamura
Keycloak supports WebAuthn and FAPI by implementing their features and passing conformance tests. Hitachi contributed WebAuthn support and worked with NRI to add FAPI compliance, addressing issues like supporting newer signature algorithms and the PKCE protocol. Further contributions are welcomed to resolve remaining FAPI test issues.
Exploring Advanced Authentication Methods in Novell Access ManagerNovell
Novell Access Manager provides many different levels of authentication beyond a simple user name and password. In this session, you will learn about its more advanced methods of authentication—from emerging standard like OpenID and CardSpace to tokens and certificates. Attendees will also see a demonstration of FreeRADIUS and the Vasco Digipass with Novell eDirectory, the Vasco NMAS method and an Access Manager plug-in that provides SSO to Web applications that expect a static password.
2022 APIsecure_Why Assertion-based Access Token is preferred to Handle-based ...APIsecure_ Official
APIsecure - April 6 & 7, 2022
APIsecure is the world’s first conference dedicated to API threat management; bringing together breakers, defenders, and solutions in API security.
Why Assertion-based Access Token is preferred to a Handle-based one?
Yoshiyuki Tabata, Software Engineer at Hitachi
This document discusses the differences between assertion-based access tokens and handle-based access tokens in OAuth 2.0. Assertion-based tokens are parsable tokens like JWTs that contain user and client information, while handle-based tokens are opaque references. Assertion-based tokens have advantages for performance and scalability but require cryptographic protection, while handle-based tokens require validation through the authorization server. The document then examines scenarios where handle-based tokens could cause problems, such as with multiple authorization servers, and outlines secure validation steps for assertion-based tokens.
Distributed architectures make security difficult. JWT, OAuth2 and OIDC are standards that help in securing microservices. Microservices are deployed as containers. So container security too is critical to secure microservices. Learn how to holistically secure microservices.
This document provides an introduction to APIs, including an overview of REST, authentication, authorization, and OpenAPI specifications. It discusses how REST uses HTTP verbs like GET, POST, PUT, and DELETE to represent actions on resources. URLs represent endpoints and collections in a hierarchical structure. JSON is commonly used as the data format. Authentication uses access tokens obtained from API keys or credentials. Authorization verifies access to resources using scopes and user levels. OpenAPI documentation specifies how to interact with an API.
This document provides guidance on configuring two-factor authentication for the IBM Security SiteProtector system using various plug-ins, including RADIUS, certificates/smart cards, LDAP, and default passwords. It includes code examples for setting up authentication using a RADIUS token protocol or smart card with user principal name mapping. Requirements and considerations are discussed for smart card usage, certificate validation, and property encryption.
WSO2Con EU 2015: API Management Strategies and Best PracticesWSO2
This document provides information on APIs and API management. It defines what an API and managed API are. It describes the roles of API creator, publisher, and consumer. It also discusses API design, the Richardson maturity model, hypermedia controls, API definition with Swagger, API versioning, security with OAuth 2.0 and JWT tokens, access control with scopes, analytics, throttling, deployment, clustering, caching, and integration.
The document discusses single sign-on (SSO) and identity management features of an SSO application. It describes various SSO scenarios for corporate login to cloud or internal applications. It also covers key features of the SSO manager including support for multiple protocols, security token services, adaptive authentication workflows, and a claims provider for applications like SharePoint. The document is a marketing piece that aims to outline the capabilities of an SSO application.
This document provides an overview of federated identity management for the ARCHIVER project. It discusses key concepts like identity providers, service providers and protocols. It recommends that ARCHIVER select a service provider proxy, research institutes ensure they have SAML identity providers, and services support SAML or OIDC. Next steps include deciding on a service provider proxy, ensuring identity providers and services support federated protocols, and complying with policies to encourage attribute sharing. Testing tools and further help are also referenced.
Into the Fluffs: Security Comliance and Audit in the CloudPouria Ghatrenabi
With the Cloud migration waves in almost all types of organizations, audit and compliance programs have to jump into the world of cloud. Cloud platforms provide unique capabilities and challenges for audit and compliance professionals.
Demystifying AuthN/AuthZ Using OIDC & OAuth2NGINX, Inc.
API Security - For the most its an aftermath thought after they develop APIs. Apparently, choosing the right AuthN and AuthZ options for your business need is critical as ever before as most of the companies started or starting to do business digitally. API has clearly emerged as a enabler for digital business and businesses are should consider API Security as first class citizen before designing APIs.
Join Rajesh Bavanantham as he explains the uses cases and appropriate API security pattern using OIDC/OAUTH2. Both of these frameworks offer multiple ways of securing, it is important to understand where to use the right pattern from OIDC/OAUTH2. Rajesh will also dwell in to different type of authorisation (fine/finer/finest) to protect your business resources. Come and learn the nuances of token based authorization and how to get prepared to protect your API economy.
https://www.nginx.com/resources/webinars/authn-authz-using-oidc-oauth2/
This document provides an overview and agenda for a session on deploying Cisco products using Smart Licensing. It will cover Smart Licensing concepts, the Smart Account structure, communication methods for Smart Licensing, and deploying Smart License enabled products. Attendees will learn about the various scenarios for deploying products in connected and mediated networks, including using the Cisco Smart Software satellite for mediated networks. The goal is to help participants understand how to transition from traditional licensing to the new Smart Licensing model.
The document discusses the Aerohive Personalized Engagement Platform which provides a flexible and secure Wi-Fi network that addresses PCI 3.0 compliance requirements for retailers. It includes features like strong encryption, authentication, intrusion detection and a firewall to isolate cardholder data. The platform also offers PCI compliance reporting through HiveManager to identify issues and vulnerabilities. Maintaining PCI compliance is important as wireless networks become critical for retail customer engagement and sales.
Webinar: Extend The Power of The ForgeRock Identity Platform Through ScriptingForgeRock
Scripting extends ForgeRock products in a powerful way, both for deployers as well as developers. For OpenAM, deployers can embed the ssoadm command line utility in comprehensive shells scripts for ultra fast deployments and configurations. Developers can use scripts for client-side and server-side authentication, policy conditions, and handling OpenID Connect claims. In OpenIDM, scripting allows you to customize various aspects of OpenIDM functionality, by providing custom logic between source and target mappings, defining correlation rules, filters, triggers, and more.
Webinar Highlights:
Scripting
The ForgeRock Platform
Q&A
Join Anders Askåsen, Senior Technical Product Manager, and Javed Shah, Senior Sales Engineer, as they highlight the concepts and show examples and best practices for scripting with the ForgeRock Identity Platform.
CyberArk Interview Questions and Answers for 2022.pdfInfosec Train
The CyberArk Certification is for Cybersecurity experts who
want to enhance their learning skills in the critical identity and
access management layer of security. CyberArk is a privileged
access management company that provides the most comprehensive
security solution for any identity, human or machine, across business apps,
remote workforces, hybrid cloud workloads, and the DevOps lifecycle.
CyberArk Interview Questions and Answers for 2023.pdfinfosec train
The CyberArk training develops your skills and provides the expertise needed to build, deploy, and configure the Privileged Account Security Solution. CyberArk course provides a variety of options to choose from.
https://www.infosectrain.com/courses/cyberark-training/
CyberArk Interview Questions and Answers for 2022.pdfinfosec train
CyberArk offers several training options to help individuals gain the knowledge and skills required to implement and administer CyberArk's privileged access security solutions. The CyberArk training develops your skills and provides the expertise needed to build, deploy, and configure the Privileged Account Security Solution. CyberArk course provides a variety of options to choose from.
https://www.infosectrain.com/courses/cyberark-training/
Two Aspect Endorsement Access Control for web Based Cloud Computing IRJET Journal
This document proposes a two-factor authentication access control system for web-based cloud computing. The system uses attribute-based access management enforced with both a user's secret key and a lightweight security device. This enhances security by requiring both factors for access. Attribute-based management also allows the cloud server to limit access based on user attributes while preserving privacy, as the server only knows if a user satisfies an access predicate, not their identity. The paper introduces an object-sensitive role-based access control model called ORBAC that can parameterize roles based on object properties. It also aims to formally validate programs against ORBAC policies using a dependent type system for Java.
Cloud Foundry UAA as an Identity GatewayVMware Tanzu
SpringOne Platform 2017
Sree Tummidi, Pivotal
"In this session we will cover the capabilities of Cloud Foundry’s UAA which make it apt to be used as an identity gateway for both ingress and egress security patterns.
We will take a closer look at how UAA’s multi-tenancy can be leveraged to expose it as an Identity Service using the Cloud Foundry service broker pattern. This greatly reduces the burden on the developers looking to secure their apps & microservices running on Cloud Foundry.
Finally we will provide an identity vision which includes the use of side-cars like Spring Cloud Gateway and Envoy as lightweight identity proxies, reducing the burden on the App Developers in terms of enabling client side support for identity protocols like OAuth, OpenID Connect and SAML."
Similar to Session 3 - i4Trust components for Identity Management and Access Control i4Trust Marketplace| Train the Trainers Program (20)
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist. Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist. Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Christoph Mertens_IDSA_Introduction to Data Spaces.pptxFIWARE
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Lukas Künzel Smart City Operating System.pptxFIWARE
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Pierre Golz Der Transformationsprozess im Konzern Stadt.pptxFIWARE
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Dennis Wendland_The i4Trust Collaboration Programme.pptxFIWARE
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das FIWARE Netzwerktreffen für den deutschsprachigen Raum finden nun bereits das dritte Mal statt. Das nächste Treffen wird in Wien stattfinden - einer der lebenswertesten und resilientesten Städte der Welt. Diese Veranstaltung ist Teil des FIWARE Global Summit After Program, das von der Stadt Wien und der Wirtschaftsagentur Wien ausgerichtet wird.
Ziel der Netzwerkveranstaltung ist es, Schlüsselakteure des deutschsprachigen Marktes zu versammeln und zu vernetzen, um dann eine selbsttragende, wachsende und wirkungsvolle Gemeinschaft von FIWARE-Anwendern und interessierten Gleichgesinnten aufzubauen. An diesen Veranstaltungen teilen Sie Ihr Fachwissen, lernen Sie voneinander und erhalten Impulse und Neuigkeiten von den Keynote-Speakern.
Wir werden aktuelle Themen mit höchster Relevanz für die deutschsprachige Community wie Open Source, digitale Zwillinge, Smart Cities Index, nachhaltige Entwicklung, anstehende Förderprojekte usw. behandeln.
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
Boris Otto_FGS2023_Opening- EU Innovations from Data_PUB_V1_BOt.pptxFIWARE
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
Bjoern de Vidts_FGS23_Opening_athumi - bjord de vidts - personal data spaces....FIWARE
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
FGS2023_Opening_Red Hat Keynote Andrea Battaglia.pdfFIWARE
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
Das FIWARE Netzwerktreffen für den deutschsprachigen Raum finden nun bereits das dritte Mal statt. Das nächste Treffen wird in Wien stattfinden - einer der lebenswertesten und resilientesten Städte der Welt. Diese Veranstaltung ist Teil des FIWARE Global Summit After Program, das von der Stadt Wien und der Wirtschaftsagentur Wien ausgerichtet wird.
Ziel der Netzwerkveranstaltung ist es, Schlüsselakteure des deutschsprachigen Marktes zu versammeln und zu vernetzen, um dann eine selbsttragende, wachsende und wirkungsvolle Gemeinschaft von FIWARE-Anwendern und interessierten Gleichgesinnten aufzubauen. An diesen Veranstaltungen teilen Sie Ihr Fachwissen, lernen Sie voneinander und erhalten Impulse und Neuigkeiten von den Keynote-Speakern.
Wir werden aktuelle Themen mit höchster Relevanz für die deutschsprachige Community wie Open Source, digitale Zwillinge, Smart Cities Index, nachhaltige Entwicklung, anstehende Förderprojekte usw. behandeln.
Das FIWARE Netzwerktreffen für den deutschsprachigen Raum finden nun bereits das dritte Mal statt. Das nächste Treffen wird in Wien stattfinden - einer der lebenswertesten und resilientesten Städte der Welt. Diese Veranstaltung ist Teil des FIWARE Global Summit After Program, das von der Stadt Wien und der Wirtschaftsagentur Wien ausgerichtet wird.
Ziel der Netzwerkveranstaltung ist es, Schlüsselakteure des deutschsprachigen Marktes zu versammeln und zu vernetzen, um dann eine selbsttragende, wachsende und wirkungsvolle Gemeinschaft von FIWARE-Anwendern und interessierten Gleichgesinnten aufzubauen. An diesen Veranstaltungen teilen Sie Ihr Fachwissen, lernen Sie voneinander und erhalten Impulse und Neuigkeiten von den Keynote-Speakern.
Wir werden aktuelle Themen mit höchster Relevanz für die deutschsprachige Community wie Open Source, digitale Zwillinge, Smart Cities Index, nachhaltige Entwicklung, anstehende Förderprojekte usw. behandeln.
Das FIWARE Netzwerktreffen für den deutschsprachigen Raum finden nun bereits das dritte Mal statt. Das nächste Treffen wird in Wien stattfinden - einer der lebenswertesten und resilientesten Städte der Welt. Diese Veranstaltung ist Teil des FIWARE Global Summit After Program, das von der Stadt Wien und der Wirtschaftsagentur Wien ausgerichtet wird.
Ziel der Netzwerkveranstaltung ist es, Schlüsselakteure des deutschsprachigen Marktes zu versammeln und zu vernetzen, um dann eine selbsttragende, wachsende und wirkungsvolle Gemeinschaft von FIWARE-Anwendern und interessierten Gleichgesinnten aufzubauen. An diesen Veranstaltungen teilen Sie Ihr Fachwissen, lernen Sie voneinander und erhalten Impulse und Neuigkeiten von den Keynote-Speakern.
Wir werden aktuelle Themen mit höchster Relevanz für die deutschsprachige Community wie Open Source, digitale Zwillinge, Smart Cities Index, nachhaltige Entwicklung, anstehende Förderprojekte usw. behandeln.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
20 Comprehensive Checklist of Designing and Developing a WebsitePixlogix Infotech
Dive into the world of Website Designing and Developing with Pixlogix! Looking to create a stunning online presence? Look no further! Our comprehensive checklist covers everything you need to know to craft a website that stands out. From user-friendly design to seamless functionality, we've got you covered. Don't miss out on this invaluable resource! Check out our checklist now at Pixlogix and start your journey towards a captivating online presence today.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc
How does your privacy program stack up against your peers? What challenges are privacy teams tackling and prioritizing in 2024?
In the fifth annual Global Privacy Benchmarks Survey, we asked over 1,800 global privacy professionals and business executives to share their perspectives on the current state of privacy inside and outside of their organizations. This year’s report focused on emerging areas of importance for privacy and compliance professionals, including considerations and implications of Artificial Intelligence (AI) technologies, building brand trust, and different approaches for achieving higher privacy competence scores.
See how organizational priorities and strategic approaches to data security and privacy are evolving around the globe.
This webinar will review:
- The top 10 privacy insights from the fifth annual Global Privacy Benchmarks Survey
- The top challenges for privacy leaders, practitioners, and organizations in 2024
- Key themes to consider in developing and maintaining your privacy program
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Session 3 - i4Trust components for Identity Management and Access Control i4Trust Marketplace| Train the Trainers Program
1. i4Trust Website
i4Trust Community
i4Trust components for
Identity Management and
Access Control
Speakers:
Rajiv Rajani - CTO iSHARE Foundation
Álvaro Arranz - CEO FICODES
Francisco de la Vega - CTO FICODES
2. i4Trust Identity and Access Management (IAM)
■ About:
■ This part of the session will introduce you to i4Trust IAM components in detail.
■ This session will:
■ Explain iSHARE Identity and Access Management concepts in detail
■ Explain the FIWARE components which comply with iSHARE specifications in detail
■ How to deploy them
■ How to use them
■ Goals:
■ After this session you will be able to implement a service using i4Trust IAM components
■ Target Audience:
■ LEBDs
4. Data Space
Recap: Roles in a Data Space
Data Consumer Data Provider Data Owner
Identity Provider Authorisations
Provider
Marketplace
Trust Provider
4
5. Recap: iSHARE role model
5
Data Space or Domain
International Legal Framework governed by iSHARE Foundation
6. What is iSHARE Satellite?
■ iSHARE satellite is a federated certified role
■ It essentially does:
■ Onboard and maintain list of participants and its statues
■ Enables multilateral trust when participants signup
■ Provide APIs for participants to get detailed information along with statues of other participants
with whom they want to interact or are interacting
■ Plays the facilitator role for common agreements like, but not limited to business agreements,
operational agreements, etc.
■ Is federated part of the governing body of data spaces that interoperate
7. Identity Provider role is designed for users to reuse their
existing identity provider at various service/data providers
Identity Provider
• The Identity Provider role deals with the human identities
with varying level of assurances, as defined in eIDAS
framework, to support various use cases
• It is based on OpenID Connect as standard, however, with
slight adjustment to make it better suitable for B2B, B2G,
G2G and of course B2C and G2C
• Depending on the criticality of the data, appropriate level of
assurance for an identity can be requested
• iSHARE specifications are designed such that service/data
provider does not necessarily need to pre-register an
identity provider as it can verify if it is an iSHARE certified
provider from iSHARE satellite
7
11. Interaction Machine-to-Machine (M2M)
Communication between machines,
without interference by a human
Human-to-Machine (H2M)
Communication between a human and (a)
machine(s). Requires a user interface
Facilitate Flexible authorizations
• Coarse-grained: broad authorization
• Fine-grained: specific authorization
• Flexibility on where to store
authorizations
Portable identities
Identities can be spread out and recognised, i.e.
portable, across multiple, independent systems
Enable Delegations
Functions as evidence that a party is
directly or indirectly operating on
behalf of a known party
Customer in control
parties are allowed to modify or withdraw access
rights to their data or services, whenever they wish
Trustworthy Identification, Authentication and
Authorisations
11
20. In iSHARE, client assertions are JWTs with iSHARE
specific Header and Payload
21. In iSHARE, client assertions are JWTs with iSHARE
specific Header and Payload
22. An iSHARE party uses the client_assertion to get an access
token from another iSHARE Party
23. An iSHARE party uses the client_assertion to get an access
token from another iSHARE Party
24. An iSHARE party uses the client_assertion to get an access
token from another iSHARE Party
25. Fictional use case
Case:
■ ABC Trucking wants to access container
data at the terminal on behalf of Banana &
Co.
■ Banana & Co needs to register at
AskMeAnything Authorization Registry that
they delegate access rights to ABC
Trucking
■ When ABC Trucking requests the data at
the Service Provider, Warehouse 13, it
checks with AskMeAnything for delegation
evidence
■ If AskMeAnything returns valid delegation
evidence, Warehouse 13 can exchange
data with ABC Trucking
All calls are iSHARE calls, except if noted otherwise.
These exceptions are marked with a RED arrow.
26. Participants of the fictional use case
Case:
■ ABC Trucking wants to access container data at the terminal on behalf of Banana & Co.
77. Further reading and useful links
■ iSHARE framework covering all aspects - https://scheme.ishareworks.org
■ iSHARE developer portal - https://dev.ishareworks.org
■ Postman collections for fictional use case - https://dev.ishareworks.org/demo-and-
testing/postman.html#postman-collections
■ Dummy participants in various roles for testing purposes - https://dev.ishareworks.org/demo-and-
testing/test-participants.html
■ JSON Web Tokens (JWT) reference and libraries - https://jwt.io
■ OAuth specifications and other materials - https://oauth.net/2/
■ OpenID Connect specifications and other materials - https://openid.net/connect/
■ eIDAS regulation
■ PKI wikipedia - https://en.wikipedia.org/wiki/Public_key_infrastructure
79. iSHARE Architecture using FIWARE
● Keyrock is the FIWARE component responsible for identity management.
○ It supports, among others, the OAuth2, Open ID Connect and eIDAS standards
○ It is being extended to support the iSHARE specifications
○ Plays the role of the identity provider
○ In a near future, it will also provide the authorization registry features.
● API Umbrella is an open source API management platform for exposing and securing web
service APIs.
○ It acts as a proxy that provides access control, rate limiting, analytics, … to API services. We will
use it to protect our context broker instances.
○ It is being extended to comply with iSHARE specifications.
● Until officially released, release candidate docker images should be used. At the moment:
○ fiware/idm:i4trust-rc2 for Keyrock
○ And fiware/api-umbrella:i4trust-rc3 for API Umbrella
81. Requirements to deploy
● To be registered as a iSHARE party. This means to have a certificate signed by a trusted
CA (e.g. a CA from eIDAS or from a test CA) with the associated private key. Also means
to have access credentials to the iSHARE Satellite and Authorization Registry instance to
be used.
● Please, contact Rajiv for requesting testing credentials and access to those services.
82. Setting up Keyrock: i4Trust related environment variables
■ IDM_PR_URL:
■ URL of the iSHARE Satellite instance to use (e.g. https://scheme.isharetest.net)
■ This setting also is the one that enables i4Trust support on Keyrock
■ IDM_PR_CLIENT_ID:
■ party identifier (EORI) associated with this Keyrock instance
■ IDM_PR_CLIENT_KEY_FILE:
■ path to the private key file (PEM format)
■ IDM_PR_CLIENT_CRT_FILE:
■ path to the certificate chain (PEM format)
■ IDM_AR_URL:
■ URL of Authorization Registry instance to use (e.g. https://ar.isharetest.net)
■ IDM_AR_IDENTIFIER:
■ Party identifier (EORI) associated with the Authorization Registry instance
84. Setting up API umbrella: i4Trust related configuration
…
jws:
identifier: EU.EORI.NLHAPPYPETS
root_ca: |
-----BEGIN CERTIFICATE-----
...
-----END CERTIFICATE-----
private_key: |
-----BEGIN PRIVATE KEY-----
MIIEvAIBADANBgkqhkiG9w0BAQEFAASCBKYwggSiAgEAAoIBAQC8yeRuxDI2/vyJ
…
-----END PRIVATE KEY-----
x5c:
- MIIE...Uw==
- MIIF...vic=
- MIIF...AQ==
authorisation_registry:
host: https://ar.isharetest.net
identifier: EU.EORI.NL000000004
token_endpoint: https://ar.isharetest.net/token
delegation_endpoint: https://ar.isharetest.net/delegation
In this case, configuration
is provided through the
api-umbrella.yml file.
85. API Management with API Umbrella
■ It support two types of entries:
■ API Backends (this is the one we are interested in)
■ And Website Backends
■ Changes are not automatically applied. Once you
have created/updated/deleted the API Backend
configuration, you have to publish them.
86. Basic API Backend configuration
You can configure a list of backend
services. In this case there is only one
backend server (http://orion.local:1026).
“Frontend Host” is the DNS that will be
associated with this API backend
(Umbrella can be associated with
multiple DNS names). The “Backend
Host” setting allows you to pass a
different “Host” header to the backend
server (usually not required).
Also, it is possible to transform path
prefixes.
87. Enabling i4Trust support
API Umbrella is able to
automatically analyse the
incoming NGSI-LD request
and to determine the
necessary policy required for
each request. This is achieved
by setting the “Authorization
Mode” to “Context Broker
attribute based - iSHARE
compliant (automatically)” in
the Global Request Settings
section.
88. Context Broker policy
example
This policy is telling that
EU.EORI.NLPACKETDEL is allowing
EU.EORI.NLNOCHEAPER to issue GET
requests to read DELIVERYORDER
entities, including any of their attributes.
{
"delegationEvidence": {
"notBefore": 1541058939,
"notOnOrAfter": 2147483647,
"policyIssuer": "EU.EORI.NLPACKETDEL",
"target": {
"accessSubject": "EU.EORI.NLNOCHEAPER"
},
"policySets": [
{
"maxDelegationDepth": 1,
"target": {
"environment": {
"licenses": ["ISHARE.0001"]
}
},
"policies": [
{
"target": {
"resource": {
"type": "DELIVERYORDER",
"identifiers": ["*"],
"attributes": ["*"]
},
"actions": ["GET"]
},
"rules": [
{
"effect": "Permit"
}
]
}
]
}
]
}
}
}
89. Login (step 1)
First, generate an iSHARE
JWT signed using the JSON
Web Signature standard
(JWS)
> Headers
{
"alg": "RS256",
"typ": "JWT",
"x5c": [ // Complete certificate chain of the party
"MIIEhjCC….Zy9w==",
...
]
}
> Payload
{
"jti": "99ab5bca41bb45b78d242a46f0157b7d", // Unique JWT ID
"iss": "EU.EORI.NLMARKETPLA",
"sub": "EU.EORI.NLMARKETPLA",
"aud": "EU.EORI.NLHAPPYPETS", // ID (EORI) of the IDP to be accessed
"iat": "1540827435",
"nbf": "1540827435",
"exp": "1540827435", // 30 seconds after iat
"response_type": "code",
"client_id": "EU.EORI.NLMARKETPLA",
"scope": "openid iSHARE profile email",
"redirect_uri": "https://www.marketplace.com/openid_connect1.0/return",
"state": "af0ifjsldkj",
"nonce": "c428224ca5a",
"acr_values": "urn:http://eidas.europa.eu/LoA/NotNotified/high",
"language": "en"
}
90. Login (step 2)
Make a POST request to the
/authorize endpoint, so the
target Identity Provider (in this
case a Keyrock instance) can
validate we are a trusted
iSHARE party.
The JWT generated in step 1
has to be provided in the
request parameter.
> Content-Type: application/x-www-form-urlencoded
POST https://idp-pdc.i4trust.fiware.io/authorize
response_type=code&
client_id=EU.EORI.NLMARKETPLA&
scope=iSHARE openid&
request=eyJ0eXA…YkNKOQ
Keyrock with validate the JWT and will contact the iSHARE Satellite to check that the client is a
valid iSHARE participant. If everything goes well, a 204 status code will be returned along with a
Location header.
91. Redirect user’s browser to the
URL provided on the Location
headers. This way, the user
can provide his credentials
and consent through the login
page of Keyrock.
If everything goes well,
Keyrock will return an
authorization code using the
provided redirect URI.
Login (step 3)
< Location: https://marketplace.i4trust.fiware.io/openid_connect1.0/return?
code=Dmn-TbSj7OcKl5ym1j5xZsgkabzVP8dMugC81nzmeW4&
state=ZqVQm4zHaEDyBhzpm1ZRH7fsxy703lq2
92. A new request to the /token
endpoint of the Identity
Provider has to be made to
retrieve the final access token.
The signed JWT created in
step 1 has to be provided in
the client_assertion parameter
of the request.
The authorization code
obtained in step 3 is provided
within the code parameter.
Login (step 4)
> Content-Type: application/x-www-form-urlencoded
POST https://idp-pdc.i4trust.fiware.io/token
grant_type=authorization_code&
client_id=EU.EORI.NLMARKETPLA&
client_assertion_type=urn:ietf:params:oauth:client-assertion-type:jwt-bearer&
client_assertion=eyJ0eXA…YkNKOQ&
redirect_uri=https://marketplace.i4trust.fiware.io/openid_connect1.0/return&
code=Dmn-TbSj7OcKl5ym1j5xZsgkabzVP8dMugC81nzmeW4
93. Finally, Keyrock will provide an
access token that can be used
to access services.
In addition, an iSHARE JWT
compliant id_token is also
returned which is associated
with the authenticated session.
Login (step 5)
< Content-Type: application/json
< Cache-Control: no-store
< Pragma: no-cache
{
"id_token": "eyJhb...V2jA",
"access_token": "aW2ys...LIOw",
"expires_in": 3600,
"token_type": "Bearer"
}
Decoded id_token parameter
{
"iss": "EU.EORI.NLPACKETDEL",
"sub": "419404e1-07ce-4d80-9e8a-eca94vde0003de",
"aud": "EU.EORI.NLMARKETPLA",
"jti": "378a47c4-2822-4ca5-a49a-7e5a1cc7ea59",
"iat": 1504683445,
"exp": 1504683475,
"auth_time": 1504683435,
"nonce": "c428224ca5a",
"acr": "urn:http://eidas.europa.eu/LoA/NotNotified/low",
"azp": "EU.EORI.NLMARKETPLA",
}
94. Further reading and useful links
■ Official Keyrock Documentation - https://fiware-idm.readthedocs.io/
■ Tutorials and descriptions on how to setup the components within an i4Trust data space
■ https://github.com/i4Trust/tutorials/tree/main/Data-Service-Provider
■ Example Keyrock Theme - https://github.com/i4Trust/keyrock-theme-pdc
■ Helm Charts (kubernetes) to deploy i4Trust IAM components:
■ https://github.com/FIWARE/helm-charts/tree/i4trust
■ Passport strategy for authentication with FIWARE Keyrock using iShare JWT:
■ https://github.com/Ficodes/passport-i4trust
■ iSHARE framework covering all aspects - https://scheme.ishareworks.org
■ iSHARE developer portal - https://dev.ishareworks.org
98. Business API Ecosystem (1 of 6)
■ Supports the creation of digital
marketplaces for the monetization of digital
assets
■ Manages the lifecycle of products offers,
from product creation to monetization,
billing, payment and revenue sharing
■ Integrated with Identity Management and
Data Usage Policy Management
frameworks
■ Relying on TM Forum Business Ecosystem
Open APIs
99. Business API Ecosystem (2 of 6)
■ Customizable
■ Branding and theming support
■ Multiple identity providers supported,
including FIWARE Keyrock, Keycloak and
GitHub
100. Business API Ecosystem (3 of 6)
■ Support for digital asset monetization,
including (but not limited to) data
■ Even regarding data, multiple types:
■ Files
■ Right-time NGSI queries
■ Data streams
■ Media streams
■ ...
101. Business API Ecosystem (4 of 6)
■ Multiple Price models:
■ Open / Free
■ One time payments
■ Subscriptions
■ Pay-per-use
■ Advanced models:
■ Fees
■ Discounts
■ Dynamic pricing
102. Business API Ecosystem (5 of 6)
■ Support for usage terms and conditions and
data-specific licenses
■ Support for specifying SLAs
105. Catalog Elements
■ Catalog Models taken from TMForum Catalog Management API v14.5
■ Product classification
■ Category: Created by a system administrator, can be used by providers to categorize offers.
Categories can be nested to create a tree
■ Catalog: Created by providers to group their own offers. All offers of the system need to be part of a
Catalog.
106. Catalog Elements
■ Catalog Models taken from TMForum Catalog Management API v14.5
■ Product creation
■ Asset: Real digital product registered in the system (the data, file, service, etc).
■ Product Specification: Definition of product-related information linked to the asset in the system. It
incorporates asset link, product characteristics, and attachments.
■ Product Offering: Definition of the business-related information linked to the product. It includes link
to the catalog, product specification, licence, SLAs, pricing models and revenue sharing models.
107. Ordering Elements
■ Ordering Models taken from TMForum Ordering and Inventory Management API v14.5
■ Models:
■ Order: Defines the acquisition of a couple of product offering, including customer, billing profile,
provider and acquired offerings, .
■ Product: Defines an acquired product. It includes, the chosen pricing model, the chosen
characteristics, and the list of charges made by the customer
108. Usage Elements
■ Usage Models taken from TMForum Usage Management API v14.5
■ Models:
■ Usage Specification: Defines the kind of usage information expected for a given product offering,
including the units and metrics.
■ Usage Document: Includes an actual usage made of a product specification asset during a period of
time. It includes also its associated price and whether it has been charged or not.
109. Revenue Sharing
■ Models:
■ Revenue Sharing Model: It establishes how the incomes generated by a set of offers has to be
distributed among the different stakeholders involved. It includes, the platform percentage, the
provider percentage and the stakeholders percentage.
■ Transaction: A payment made by a customers linked to a particular revenue sharing model.
■ Revenue Sharing Report: Result of applying the a revenue sharing model to its linked
transactions. It include the amount to be paid to the different stakeholders.
111. iSHARE Integration
■ i4Trust Marketplace is a global instance
offered to all participant organization.
■ It supports multiple IDPs thanks to iShare
protocol, so providers and customers can
sign in using its own IDP.
■ Each data provider organization is owning
its own IDP, API Umbrella and Context
Broker
■ iShare JWT are used to authenticate the
Marketplace in the different IDPs and
retrieve user profiles.
113. iSHARE Integration
■ The user selects its IDP in the list the
Marketplace has in its system
■ Once the user selects its IDP, the
Marketplace builds its iShare JWT and
submits it to the IDP to authenticate itself.
114. iSHARE Integration
■ The selected IDP validates and decodes the
Marketplace JWT.
■ the selected IDP build its own JWT and
validates the Marketplace as a participant in
the iShare Satellite.
115. iSHARE Integration
■ The IDP returns to the Marketplace the login
endpoint
■ The Marketplace redirects user browser to
the login endpoint so the user can
authenticate itself in its own IDP.
■ Once the user is authenticated, OIDC is
used to get a user access token and user
profile in the Marketplace.
116. i4Trust plugin
■ A new asset plugin has been developed for
registering data offered by a participant
Context Broker.
■ It allows to provide metadata representing
the policy that is going to be applied to
customers.
■ Context Broker URL
■ Entity to be monetized
■ Attributes that can be GET
■ Attributes that can be POST
■ Attributes that can be PATCH
■ Attributes that can be DELETED
■ Duration of the policy
117. i4Trust plugin
■ When a new product is created:
■ Provided metadata is validated
■ Relevant info is attached as product
characteristics
■ When the offering is acquired
■ The Marketplace builds an iShare JWT and
authenticates itself using client_credentials
grant to get an access token for data owner
organization Authorization Registry.
■ The Marketplace creates a new policy
(delegationEvidence) using the metadata of
the product and the identity of the buyer
organization.
■ The Marketplace submits the policy to the
AR of the data owner using its access token.
119. Step by Step
■ Access to the Marketplace
■ The sign in option allows to select the IDP between the registered in the Marketplace.
■ Select your IDP and click on Sign in, you will be prompted to your IDP login page.
120. Step by Step
■ Access My Stock section
■ Create a new Catalog providing a name and a description.
■ Catalogs are created in Active state, to make the catalog available to customers
its status needs to be changed to Launched.
121. Step by Step
■ Access to Product Specification section
■ Click on New to open Product Spec. Form
■ Fill basic product information including
name and description.
■ In Asset section, select the kind of asset you
are creating and fill the requested metadata.
■ In attachment section provide the image for
the product and any optional attachment,
such as documentation.
■ Product Specs. are created in Active state,
to make them available change the state to
Launched.
122. Step by Step
■ Access to Product Offerings section.
■ Click on new to open Product Offering form.
■ Fill basic offering information including the
name and the description.
■ Select the catalog where the offering is
going to be published and select the
categories.
■ Provide licence, and SLAs
■ Provide pricing model and revenue sharing
model.
■ Create the offering. Offerings are created in
Active state, to make them available change
the state to Launched.
123. Thank you!
i4Trust has received funding from the European Union’s Horizon 2020 research
and innovation programme under the Grant Agreement no 951975.