SlideShare a Scribd company logo
Enabling the P4 Administrator
Via Mobile Device
Xavier Galvez
Senior Engineer
Advanced Micro Devices, Inc.

© 2011
THE PROBLEM




   •  Granting access is a 24/7 operation
THE PROBLEM




   •  Granting access is a 24/7 operation
   •  Engineering teams span across the world
THE PROBLEM




   •  Granting access is a 24/7 operation
   •  Engineering teams span across the world
   •  Access to areas is tightly regulated
THE PROBLEM




   •  Granting access is a 24/7 operation
   •  Engineering teams span across the world
   •  Access to areas is tightly regulated
   •  A single team is authorized to give access
THE PROBLEM




   •  Granting access is a 24/7 operation
   •  Engineering teams span across the world
   •  Access to areas is tightly regulated
   •  A single team is authorized to give access
   •  Be able to perform this task whenever and wherever
THE SOLUTION




   •  Leverage the mobile device
THE SOLUTION




   •  Leverage the mobile device
   •  Create an interface accessible by web browser
THE SOLUTION




   •  Leverage the mobile device
   •  Create an interface accessible by web browser
   •  Use the browser on the mobile device
THE SOLUTION




   •  Leverage the mobile device
   •  Create an interface accessible by web browser
   •  Use the browser on the mobile device
   •  Do it securely
CONTEXT



   This presentation touches on:
   •  Breadth of the organization
   •  Permissions in the protection table
   •  Centralized authorization process
CONTEXT



   This presentation touches on:
   •  Breadth of the organization
   •  Permissions in the protection table
   •  Centralized authorization process

   Then I discuss:
   •  Evolution of the solution
   •  Simplicity
   •  Where to go from here
GLOBAL SCOPE
GLOBAL SCOPE
GLOBAL SCOPE
GLOBAL SCOPE
GLOBAL SCOPE
GLOBAL SCOPE
GLOBAL SCOPE
GLOBAL SCOPE
GLOBAL SCOPE
GLOBAL SCOPE
GLOBAL SCOPE
GLOBAL SCOPE
GLOBAL SCOPE
GLOBAL SCOPE




     grp_northamerica
GLOBAL SCOPE




     grp_northamerica   grp_israel
GLOBAL SCOPE




     grp_northamerica   grp_israel   grp_india
GLOBAL SCOPE




     grp_northamerica   grp_israel   grp_india   grp_shanghai
DEPOT STRUCTURE & PERMISSIONS




                   depot



       stg         main         rel
DEPOT STRUCTURE & PERMISSIONS




                   depot



       stg         main         rel
DEPOT STRUCTURE & PERMISSIONS

r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...
w bm_merc //depot/main/merc/...               depot
r ACC_merc //depot/main/merc/...
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...
w reg_merc //depot/stg/merc/acc.txt
w bm_venus //depot/main/venus/...
                                        stg   main    rel
r ACC_venus //depot/main/venus/...
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
DEPOT STRUCTURE & PERMISSIONS

r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
                                        stg    main   rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...             merc
w bm_merc //depot/main/merc/...
r ACC_merc //depot/main/merc/...
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...
w reg_merc //depot/stg/merc/acc.txt
w bm_venus //depot/main/venus/...
r ACC_venus //depot/main/venus/...
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
DEPOT STRUCTURE & PERMISSIONS

r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
                                        stg     main   rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...             merc
w bm_merc //depot/main/merc/...
r ACC_merc //depot/main/merc/...
                                          src
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...       doc
w reg_merc //depot/stg/merc/acc.txt
w bm_venus //depot/main/venus/...
r ACC_venus //depot/main/venus/...
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
DEPOT STRUCTURE & PERMISSIONS

r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
                                        stg     main    rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...             merc     merc
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
                                          src
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...       doc
w reg_merc //depot/stg/merc/acc.txt
w bm_venus //depot/main/venus/...
r ACC_venus //depot/main/venus/...
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
DEPOT STRUCTURE & PERMISSIONS

r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
                                        stg     main    rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...             merc     merc
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
                                          src
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...       doc
w reg_merc //depot/stg/merc/acc.txt
w bm_venus //depot/main/venus/...
r ACC_venus //depot/main/venus/...      venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...     src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt     doc
s grp_admins //...
DEPOT STRUCTURE & PERMISSIONS

r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
                                        stg     main    rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...             merc     merc
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
                                          src
w ACC_merc //depot/stg/merc/src/...             venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...       doc
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...       venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...     src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt     doc
s grp_admins //...
DEPOT STRUCTURE & PERMISSIONS

r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
                                        stg     main    rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...             merc     merc
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
                                          src
w ACC_merc //depot/stg/merc/src/...             venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...       doc
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...       venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...     src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt     doc
s grp_admins //...
DEPOT STRUCTURE & PERMISSIONS

r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
                                        stg     main    rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...             merc     merc   8.10
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
                                          src            merc
w ACC_merc //depot/stg/merc/src/...             venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...       doc            venus
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...       venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...     src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt     doc
s grp_admins //...
DEPOT STRUCTURE & PERMISSIONS

r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
                                        stg     main    rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...             merc     merc   8.10
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
                                          src            merc
w ACC_merc //depot/stg/merc/src/...             venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...       doc            venus
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...       venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...     src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt     doc
s grp_admins //...
DEPOT STRUCTURE & PERMISSIONS

r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
                                        stg     main    rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...             merc     merc   8.10
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
                                          src            merc
w ACC_merc //depot/stg/merc/src/...             venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...       doc            venus
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...       venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...     src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt     doc
s grp_admins //...
DEPOT STRUCTURE & PERMISSIONS

r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
                                        stg     main    rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...             merc     merc   8.10
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
                                          src            merc
w ACC_merc //depot/stg/merc/src/...             venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...       doc            venus
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...       venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...     src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt     doc
s grp_admins //...
DEPOT STRUCTURE & PERMISSIONS

r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
                                        stg     main    rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...             merc     merc   8.10
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
                                          src            merc
w ACC_merc //depot/stg/merc/src/...             venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...       doc            venus
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...       venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...     src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt     doc
s grp_admins //...
DEPOT STRUCTURE & PERMISSIONS

r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
                                        stg      main    rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...             merc      merc   8.10
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
                                          src             merc
w ACC_merc //depot/stg/merc/src/...              venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...       doc
                                           nda            venus
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...       venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...     src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt     doc
                                           nda
s grp_admins //...
DEPOT STRUCTURE & PERMISSIONS

r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
                                        stg      main    rel
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...             merc      merc   8.10
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
                                          src             merc
w ACC_merc //depot/stg/merc/src/...              venus
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...       doc
                                           nda            venus
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...       venus
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...     src
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt     doc
                                           nda
s grp_admins //...
PERMISSIONS: HIGH-LEVEL TEAMS

r ACC_rel //depot/rel/...
                                          bm_rel
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
r ACC_rel -//depot/rel/*/acc.txt         bm_merc
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...             nda_merc
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...          reg_merc
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...     bm_venus
w nda_merc //depot/stg/merc/nda/...
w reg_merc //depot/stg/merc/acc.txt
                                        nda_venus
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...
w ACC_venus //depot/stg/venus/src/...   reg_venus
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...   grp_admins
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
PERMISSIONS: HIGH-LEVEL TEAM EXAMPLES

r ACC_rel //depot/rel/...
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...     bm_venus
w nda_merc //depot/stg/merc/nda/...
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...   grp_admins
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
PERMISSIONS: ACCESS GROUPS

r ACC_rel //depot/rel/...
                                         ACC_rel
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
r ACC_rel -//depot/rel/*/acc.txt         REG_rel
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...             ACC_main
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...         ACC_merc
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...     ACC_venus
w nda_merc //depot/stg/merc/nda/...
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
PERMISSIONS: ACCESS GROUP EXAMPLE

r ACC_rel //depot/rel/...
                                         ACC_rel
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...             ACC_main
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...         ACC_merc
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...
w nda_merc //depot/stg/merc/nda/...
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...
                                        grp_shanghai
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
PERMISSIONS: ACCESS GROUP EXAMPLE

r ACC_rel //depot/rel/...
                                           ACC_rel
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...               ACC_main
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...           ACC_merc
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...      ACC_venus
w nda_merc //depot/stg/merc/nda/...
w reg_merc //depot/stg/merc/acc.txt
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...
                                        grp_northamerica
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
PERMISSIONS: COMBINATION EXAMPLE

r ACC_rel //depot/rel/...
                                           ACC_rel
w bm_rel //depot/rel/...
w ACC_rel //depot/rel/8.10/...
r ACC_rel -//depot/rel/*/acc.txt
w REG_rel //depot/rel/*/acc.txt
r ACC_main //depot/main/...               ACC_main
r ACC_merc //depot/main/merc/...
w bm_merc //depot/main/merc/...           ACC_merc
w ACC_merc //depot/stg/merc/src/...
w ACC_merc //depot/stg/merc/doc/...      ACC_venus
w nda_merc //depot/stg/merc/nda/...
w reg_merc //depot/stg/merc/acc.txt
                                          bm_venus
r ACC_venus //depot/main/venus/...
w bm_venus //depot/main/venus/...
                                        grp_northamerica
w ACC_venus //depot/stg/venus/src/...
w ACC_venus //depot/stg/venus/doc/...
w nda_venus //depot/stg/venus/nda/...
w reg_venus //depot/stg/venus/acc.txt
s grp_admins //...
CREATING ACCOUNTS VIA P4 USER
CREATING ACCOUNTS VIA P4 USER
CREATING ACCOUNTS VIA NEWUSER.EXE
CREATING ACCOUNTS VIA NEWUSER.EXE
CREATING ACCOUNTS
CREATING ACCOUNTS
CREATING ACCOUNTS
CREATING ACCOUNTS
CREATING ACCOUNTS
PROBLEMS WITH BINARIES




   •  Newer versions need to be recompiled.
PROBLEMS WITH BINARIES




   •  Newer versions need to be recompiled.
   •  Deployment.
CREATING ACCOUNTS
ADVANTAGES WITH WEB APPS




   •  Newer versions available right away.
ADVANTAGES WITH WEB APPS




   •  Newer versions available right away.
   •  Experimental versions can be easily tested.
ADVANTAGES WITH WEB APPS




   •  Newer versions available right away.
   •  Experimental versions can be easily tested.
   •  Real-time validation on inputs.
ADVANTAGES WITH WEB APPS




   •  Newer versions available right away.
   •  Experimental versions can be easily tested.
   •  Real-time validation on inputs.
   •  OS-independent.
LEVERAGE EXISTING RESOURCE #1: WEB SERVER
LEVERAGE EXISTING RESOURCE #1: WEB SERVER
LEVERAGE EXISTING RESOURCE #1: WEB SERVER
CREATING ACCOUNTS VIA WEB APP
CREATING ACCOUNTS VIA WEB APP
CREATING ACCOUNTS VIA WEB APP
CREATING ACCOUNTS VIA WEB APP
CREATING ACCOUNTS VIA WEB APP
CREATING ACCOUNTS VIA WEB APP
CREATING ACCOUNTS VIA WEB APP
LEVERAGE EXISTING RESOURCE #2: BLACKBERRY




                                      internet

                   wireless network




                  BES                   firewall


                                           AMD
LEVERAGE EXISTING RESOURCE #2: BLACKBERRY




                                      internet

                   wireless network




                  BES                   firewall


                                           AMD
LEVERAGE EXISTING RESOURCE #2: BLACKBERRY
LEVERAGE EXISTING RESOURCE #3: iOS




                                      internet

                   wireless network




                  secure                firewall
                   VPN

                                           AMD
LEVERAGE EXISTING RESOURCE #3: iOS
SECURITY


   Wireless Solutions
   •  BlackBerry Enterprise Solution for Blackberries
   •  Secure VPN for iOS devices
SECURITY


   Wireless Solutions
   •  BlackBerry Enterprise Solution for Blackberries
   •  Secure VPN for iOS devices

   HTTP is not secure, use HTTPS!
   •  Encrypts the HTTP message prior to transmission
   •  Decrypts the message upon arrival
   •  Requires the use of CA certificates
SECURITY


   Wireless Solutions
   •  BlackBerry Enterprise Solution for Blackberries
   •  Secure VPN for iOS devices

   HTTP is not secure, use HTTPS!
   •  Encrypts the HTTP message prior to transmission
   •  Decrypts the message upon arrival
   •  Requires the use of CA certificates

   User Authentication and Identification
   •  REMOTE_USER environment variable
REDUCING RISK



   Keep the location of the web page unknown
   •  Only known to Perforce admins
REDUCING RISK



   Keep the location of the web page unknown
   •  Only known to Perforce admins

   Limit what can be done on the web page
   •  Create a new user account
   •  Display information from p4 protects and p4 groups
   •  Add an existing user to currently existing groups
   •  Remove the user from a group
   •  Reset the password of an existing user
WHAT NEXT?



   Server-side APIs
   •  P4Java, P4Perl, P4Ruby, P4Python, P4PHP
   •  ASP.NET with Perforce C/C++ API
WHAT NEXT?



   Server-side APIs
   •  P4Java, P4Perl, P4Ruby, P4Python, P4PHP
   •  ASP.NET with Perforce C/C++ API

   Client-side Technologies
   •  jQuery, jQuery Mobile, HTML5
WHAT NEXT?



   Server-side APIs
   •  P4Java, P4Perl, P4Ruby, P4Python, P4PHP
   •  ASP.NET with Perforce C/C++ API

   Client-side Technologies
   •  jQuery, jQuery Mobile, HTML5

   More Features!
   •  Monitor and restart servers
   •  Most-used commands can be called
CONCLUSION



   The result:
   •  Simple mechanism
   •  Took advantage of existing resources
   •  Latest web technologies were not necessary
   •  Quick development, fast deployment
CONCLUSION



   The result:
   •  Simple mechanism
   •  Took advantage of existing resources
   •  Latest web technologies were not necessary
   •  Quick development, fast deployment

   The advantages:
   •  Web page + mobile device allows rich feature set
   •  Write once, run on all
   •  Feel at home with the same interface
   •  Not just work hard, but work SMART
CHALLENGE
Questions?
Thank you!

xavier.galvez@amd.com
ICON CREDITS




   •  http://www.iconshock.com/
   •  http://fasticon.com/
   •  http://johnfreeborn.com/
   •  http://www.deleket.com/
   •  http://www.customicondesign.com/
   •  http://www.visualpharm.com/
   •  http://www.icons-land.com/
   •  http://3dlb.com/

More Related Content

Viewers also liked

Proyectos tecnológicos.
Proyectos tecnológicos.Proyectos tecnológicos.
Proyectos tecnológicos.Letireyes1992
 
Que es evaluacion
Que es evaluacionQue es evaluacion
Que es evaluacionjakileo36
 
DeMolay Internacional - Documentos sucessão (inglês)
DeMolay Internacional - Documentos sucessão (inglês)DeMolay Internacional - Documentos sucessão (inglês)
DeMolay Internacional - Documentos sucessão (inglês)
DeMolay Brasil
 
Ple 25 de maig: Espais suport educatiu
Ple 25 de maig: Espais suport educatiuPle 25 de maig: Espais suport educatiu
Ple 25 de maig: Espais suport educatiu
Ajuntament de Barcelona
 
Composition and pen techniques
Composition and pen techniquesComposition and pen techniques
Composition and pen techniquesRiverwood HS
 
Pla municipal per a la igualtat d’oportunitats real i efectiva entre dones i ...
Pla municipal per a la igualtat d’oportunitats real i efectiva entre dones i ...Pla municipal per a la igualtat d’oportunitats real i efectiva entre dones i ...
Pla municipal per a la igualtat d’oportunitats real i efectiva entre dones i ...
Ajuntament de Barcelona
 
Negro bembon.coral eufonia de getafe
Negro bembon.coral eufonia de getafeNegro bembon.coral eufonia de getafe
Negro bembon.coral eufonia de getafeJustino Garcia
 
Apache服务器配置全攻略
Apache服务器配置全攻略Apache服务器配置全攻略
Apache服务器配置全攻略Yiwei Ma
 
Nb sep53
Nb sep53Nb sep53
Modelo de calidad acreditacion universitaria
Modelo de calidad acreditacion universitariaModelo de calidad acreditacion universitaria
Modelo de calidad acreditacion universitaria
Mitchell Alarcón Diaz
 
As 12 cidades mais populosas do m
As 12 cidades mais populosas do m As 12 cidades mais populosas do m
As 12 cidades mais populosas do m Aldo Cioffi
 
Porque amamos os animais
Porque amamos os animaisPorque amamos os animais
Porque amamos os animaisAldo Cioffi
 

Viewers also liked (20)

І. Ася Паплаўская “Сучбелліт з Ладай Алейнік: “...Бясконцыя прэтэнзіі ад пісь...
І. Ася Паплаўская “Сучбелліт з Ладай Алейнік: “...Бясконцыя прэтэнзіі ад пісь...І. Ася Паплаўская “Сучбелліт з Ладай Алейнік: “...Бясконцыя прэтэнзіі ад пісь...
І. Ася Паплаўская “Сучбелліт з Ладай Алейнік: “...Бясконцыя прэтэнзіі ад пісь...
 
Jornada ambientalitzacio de les flotes de vehicles - Autogas Repsol
Jornada ambientalitzacio de les flotes de vehicles - Autogas RepsolJornada ambientalitzacio de les flotes de vehicles - Autogas Repsol
Jornada ambientalitzacio de les flotes de vehicles - Autogas Repsol
 
Geralnews 18 abr
Geralnews 18 abrGeralnews 18 abr
Geralnews 18 abr
 
Proyectos tecnológicos.
Proyectos tecnológicos.Proyectos tecnológicos.
Proyectos tecnológicos.
 
Que es evaluacion
Que es evaluacionQue es evaluacion
Que es evaluacion
 
Kronika 29.03.2012
Kronika   29.03.2012Kronika   29.03.2012
Kronika 29.03.2012
 
DeMolay Internacional - Documentos sucessão (inglês)
DeMolay Internacional - Documentos sucessão (inglês)DeMolay Internacional - Documentos sucessão (inglês)
DeMolay Internacional - Documentos sucessão (inglês)
 
Currículum deportivo javi blanco
Currículum deportivo javi blancoCurrículum deportivo javi blanco
Currículum deportivo javi blanco
 
Ple 25 de maig: Espais suport educatiu
Ple 25 de maig: Espais suport educatiuPle 25 de maig: Espais suport educatiu
Ple 25 de maig: Espais suport educatiu
 
Composition and pen techniques
Composition and pen techniquesComposition and pen techniques
Composition and pen techniques
 
Pla municipal per a la igualtat d’oportunitats real i efectiva entre dones i ...
Pla municipal per a la igualtat d’oportunitats real i efectiva entre dones i ...Pla municipal per a la igualtat d’oportunitats real i efectiva entre dones i ...
Pla municipal per a la igualtat d’oportunitats real i efectiva entre dones i ...
 
A mair bronca
A mair broncaA mair bronca
A mair bronca
 
Negro bembon.coral eufonia de getafe
Negro bembon.coral eufonia de getafeNegro bembon.coral eufonia de getafe
Negro bembon.coral eufonia de getafe
 
Desenhos mãe 1.4
Desenhos mãe 1.4 Desenhos mãe 1.4
Desenhos mãe 1.4
 
Apache服务器配置全攻略
Apache服务器配置全攻略Apache服务器配置全攻略
Apache服务器配置全攻略
 
Nb sep53
Nb sep53Nb sep53
Nb sep53
 
O sorriso (s)
O sorriso (s)O sorriso (s)
O sorriso (s)
 
Modelo de calidad acreditacion universitaria
Modelo de calidad acreditacion universitariaModelo de calidad acreditacion universitaria
Modelo de calidad acreditacion universitaria
 
As 12 cidades mais populosas do m
As 12 cidades mais populosas do m As 12 cidades mais populosas do m
As 12 cidades mais populosas do m
 
Porque amamos os animais
Porque amamos os animaisPorque amamos os animais
Porque amamos os animais
 

Similar to Enabling the Perforce Administrator via Mobile Device

Marko Gargenta_Remixing android
Marko Gargenta_Remixing androidMarko Gargenta_Remixing android
Marko Gargenta_Remixing androidDroidcon Berlin
 
clang-intro
clang-introclang-intro
clang-intro
Hajime Morrita
 
DCEU 18: Tips and Tricks of the Docker Captains
DCEU 18: Tips and Tricks of the Docker CaptainsDCEU 18: Tips and Tricks of the Docker Captains
DCEU 18: Tips and Tricks of the Docker Captains
Docker, Inc.
 
Hand-on Resources II: Extending SCMSWeb
Hand-on Resources II: Extending SCMSWebHand-on Resources II: Extending SCMSWeb
Hand-on Resources II: Extending SCMSWeb
Sugree Phatanapherom
 
JDO 2019: Kubernetes logging techniques with a touch of LogSense - Marcin Stożek
JDO 2019: Kubernetes logging techniques with a touch of LogSense - Marcin StożekJDO 2019: Kubernetes logging techniques with a touch of LogSense - Marcin Stożek
JDO 2019: Kubernetes logging techniques with a touch of LogSense - Marcin Stożek
PROIDEA
 
Noah Zoschke at Waza 2013: Heroku Secrets
Noah Zoschke at Waza 2013: Heroku SecretsNoah Zoschke at Waza 2013: Heroku Secrets
Noah Zoschke at Waza 2013: Heroku Secrets
Heroku
 
Deploy Rails Application by Capistrano
Deploy Rails Application by CapistranoDeploy Rails Application by Capistrano
Deploy Rails Application by Capistrano
Tasawr Interactive
 
Dev-Jam 2019 - Container & OpenNMS
Dev-Jam 2019 - Container & OpenNMSDev-Jam 2019 - Container & OpenNMS
Dev-Jam 2019 - Container & OpenNMS
Ronny Trommer
 
Watch Me Install Alfresco
Watch Me Install AlfrescoWatch Me Install Alfresco
Watch Me Install Alfresco
Alfresco Software
 
Optaros Surf Code Camp Walkthrough 2
Optaros Surf Code Camp Walkthrough 2Optaros Surf Code Camp Walkthrough 2
Optaros Surf Code Camp Walkthrough 2
Jeff Potts
 
PuppetConf 2016: The Challenges with Container Configuration – David Lutterko...
PuppetConf 2016: The Challenges with Container Configuration – David Lutterko...PuppetConf 2016: The Challenges with Container Configuration – David Lutterko...
PuppetConf 2016: The Challenges with Container Configuration – David Lutterko...
Puppet
 
Challenges of container configuration
Challenges of container configurationChallenges of container configuration
Challenges of container configuration
lutter
 
Ae backup
Ae backupAe backup
Ae backup
Protect724v2
 
Sankula
SankulaSankula
Sankula
siva sankar
 
DCSF19 Dockerfile Best Practices
DCSF19 Dockerfile Best PracticesDCSF19 Dockerfile Best Practices
DCSF19 Dockerfile Best Practices
Docker, Inc.
 
Securing Prometheus exporters using HashiCorp Vault
Securing Prometheus exporters using HashiCorp VaultSecuring Prometheus exporters using HashiCorp Vault
Securing Prometheus exporters using HashiCorp Vault
Bram Vogelaar
 
Real World Experience of Running Docker in Development and Production
Real World Experience of Running Docker in Development and ProductionReal World Experience of Running Docker in Development and Production
Real World Experience of Running Docker in Development and Production
Ben Hall
 
Lessons Learned in Automating Compliance for Containers
Lessons Learned in Automating Compliance for ContainersLessons Learned in Automating Compliance for Containers
Lessons Learned in Automating Compliance for Containers
All Things Open
 

Similar to Enabling the Perforce Administrator via Mobile Device (20)

Marko Gargenta_Remixing android
Marko Gargenta_Remixing androidMarko Gargenta_Remixing android
Marko Gargenta_Remixing android
 
clang-intro
clang-introclang-intro
clang-intro
 
DCEU 18: Tips and Tricks of the Docker Captains
DCEU 18: Tips and Tricks of the Docker CaptainsDCEU 18: Tips and Tricks of the Docker Captains
DCEU 18: Tips and Tricks of the Docker Captains
 
RESTFul IDEAS
RESTFul IDEASRESTFul IDEAS
RESTFul IDEAS
 
Hand-on Resources II: Extending SCMSWeb
Hand-on Resources II: Extending SCMSWebHand-on Resources II: Extending SCMSWeb
Hand-on Resources II: Extending SCMSWeb
 
JDO 2019: Kubernetes logging techniques with a touch of LogSense - Marcin Stożek
JDO 2019: Kubernetes logging techniques with a touch of LogSense - Marcin StożekJDO 2019: Kubernetes logging techniques with a touch of LogSense - Marcin Stożek
JDO 2019: Kubernetes logging techniques with a touch of LogSense - Marcin Stożek
 
Noah Zoschke at Waza 2013: Heroku Secrets
Noah Zoschke at Waza 2013: Heroku SecretsNoah Zoschke at Waza 2013: Heroku Secrets
Noah Zoschke at Waza 2013: Heroku Secrets
 
Deploy Rails Application by Capistrano
Deploy Rails Application by CapistranoDeploy Rails Application by Capistrano
Deploy Rails Application by Capistrano
 
Cadence flow
Cadence flowCadence flow
Cadence flow
 
Dev-Jam 2019 - Container & OpenNMS
Dev-Jam 2019 - Container & OpenNMSDev-Jam 2019 - Container & OpenNMS
Dev-Jam 2019 - Container & OpenNMS
 
Watch Me Install Alfresco
Watch Me Install AlfrescoWatch Me Install Alfresco
Watch Me Install Alfresco
 
Optaros Surf Code Camp Walkthrough 2
Optaros Surf Code Camp Walkthrough 2Optaros Surf Code Camp Walkthrough 2
Optaros Surf Code Camp Walkthrough 2
 
PuppetConf 2016: The Challenges with Container Configuration – David Lutterko...
PuppetConf 2016: The Challenges with Container Configuration – David Lutterko...PuppetConf 2016: The Challenges with Container Configuration – David Lutterko...
PuppetConf 2016: The Challenges with Container Configuration – David Lutterko...
 
Challenges of container configuration
Challenges of container configurationChallenges of container configuration
Challenges of container configuration
 
Ae backup
Ae backupAe backup
Ae backup
 
Sankula
SankulaSankula
Sankula
 
DCSF19 Dockerfile Best Practices
DCSF19 Dockerfile Best PracticesDCSF19 Dockerfile Best Practices
DCSF19 Dockerfile Best Practices
 
Securing Prometheus exporters using HashiCorp Vault
Securing Prometheus exporters using HashiCorp VaultSecuring Prometheus exporters using HashiCorp Vault
Securing Prometheus exporters using HashiCorp Vault
 
Real World Experience of Running Docker in Development and Production
Real World Experience of Running Docker in Development and ProductionReal World Experience of Running Docker in Development and Production
Real World Experience of Running Docker in Development and Production
 
Lessons Learned in Automating Compliance for Containers
Lessons Learned in Automating Compliance for ContainersLessons Learned in Automating Compliance for Containers
Lessons Learned in Automating Compliance for Containers
 

More from Perforce

How to Organize Game Developers With Different Planning Needs
How to Organize Game Developers With Different Planning NeedsHow to Organize Game Developers With Different Planning Needs
How to Organize Game Developers With Different Planning Needs
Perforce
 
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
Regulatory Traceability:  How to Maintain Compliance, Quality, and Cost Effic...Regulatory Traceability:  How to Maintain Compliance, Quality, and Cost Effic...
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
Perforce
 
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Perforce
 
Understanding Compliant Workflow Enforcement SOPs
Understanding Compliant Workflow Enforcement SOPsUnderstanding Compliant Workflow Enforcement SOPs
Understanding Compliant Workflow Enforcement SOPs
Perforce
 
Branching Out: How To Automate Your Development Process
Branching Out: How To Automate Your Development ProcessBranching Out: How To Automate Your Development Process
Branching Out: How To Automate Your Development Process
Perforce
 
How to Do Code Reviews at Massive Scale For DevOps
How to Do Code Reviews at Massive Scale For DevOpsHow to Do Code Reviews at Massive Scale For DevOps
How to Do Code Reviews at Massive Scale For DevOps
Perforce
 
How to Spark Joy In Your Product Backlog
How to Spark Joy In Your Product Backlog How to Spark Joy In Your Product Backlog
How to Spark Joy In Your Product Backlog
Perforce
 
Going Remote: Build Up Your Game Dev Team
Going Remote: Build Up Your Game Dev Team Going Remote: Build Up Your Game Dev Team
Going Remote: Build Up Your Game Dev Team
Perforce
 
Shift to Remote: How to Manage Your New Workflow
Shift to Remote: How to Manage Your New WorkflowShift to Remote: How to Manage Your New Workflow
Shift to Remote: How to Manage Your New Workflow
Perforce
 
Hybrid Development Methodology in a Regulated World
Hybrid Development Methodology in a Regulated WorldHybrid Development Methodology in a Regulated World
Hybrid Development Methodology in a Regulated World
Perforce
 
Better, Faster, Easier: How to Make Git Really Work in the Enterprise
Better, Faster, Easier: How to Make Git Really Work in the EnterpriseBetter, Faster, Easier: How to Make Git Really Work in the Enterprise
Better, Faster, Easier: How to Make Git Really Work in the Enterprise
Perforce
 
Easier Requirements Management Using Diagrams In Helix ALM
Easier Requirements Management Using Diagrams In Helix ALMEasier Requirements Management Using Diagrams In Helix ALM
Easier Requirements Management Using Diagrams In Helix ALM
Perforce
 
How To Master Your Mega Backlog
How To Master Your Mega Backlog How To Master Your Mega Backlog
How To Master Your Mega Backlog
Perforce
 
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
Perforce
 
How to Scale With Helix Core and Microsoft Azure
How to Scale With Helix Core and Microsoft Azure How to Scale With Helix Core and Microsoft Azure
How to Scale With Helix Core and Microsoft Azure
Perforce
 
Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2
Perforce
 
Should You Break Up With Your Monolith?
Should You Break Up With Your Monolith?Should You Break Up With Your Monolith?
Should You Break Up With Your Monolith?
Perforce
 
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
Perforce
 
What's New in Helix ALM 2019.4
What's New in Helix ALM 2019.4What's New in Helix ALM 2019.4
What's New in Helix ALM 2019.4
Perforce
 
Free Yourself From the MS Office Prison
Free Yourself From the MS Office Prison Free Yourself From the MS Office Prison
Free Yourself From the MS Office Prison
Perforce
 

More from Perforce (20)

How to Organize Game Developers With Different Planning Needs
How to Organize Game Developers With Different Planning NeedsHow to Organize Game Developers With Different Planning Needs
How to Organize Game Developers With Different Planning Needs
 
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
Regulatory Traceability:  How to Maintain Compliance, Quality, and Cost Effic...Regulatory Traceability:  How to Maintain Compliance, Quality, and Cost Effic...
Regulatory Traceability: How to Maintain Compliance, Quality, and Cost Effic...
 
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...Efficient Security Development and Testing Using Dynamic and Static Code Anal...
Efficient Security Development and Testing Using Dynamic and Static Code Anal...
 
Understanding Compliant Workflow Enforcement SOPs
Understanding Compliant Workflow Enforcement SOPsUnderstanding Compliant Workflow Enforcement SOPs
Understanding Compliant Workflow Enforcement SOPs
 
Branching Out: How To Automate Your Development Process
Branching Out: How To Automate Your Development ProcessBranching Out: How To Automate Your Development Process
Branching Out: How To Automate Your Development Process
 
How to Do Code Reviews at Massive Scale For DevOps
How to Do Code Reviews at Massive Scale For DevOpsHow to Do Code Reviews at Massive Scale For DevOps
How to Do Code Reviews at Massive Scale For DevOps
 
How to Spark Joy In Your Product Backlog
How to Spark Joy In Your Product Backlog How to Spark Joy In Your Product Backlog
How to Spark Joy In Your Product Backlog
 
Going Remote: Build Up Your Game Dev Team
Going Remote: Build Up Your Game Dev Team Going Remote: Build Up Your Game Dev Team
Going Remote: Build Up Your Game Dev Team
 
Shift to Remote: How to Manage Your New Workflow
Shift to Remote: How to Manage Your New WorkflowShift to Remote: How to Manage Your New Workflow
Shift to Remote: How to Manage Your New Workflow
 
Hybrid Development Methodology in a Regulated World
Hybrid Development Methodology in a Regulated WorldHybrid Development Methodology in a Regulated World
Hybrid Development Methodology in a Regulated World
 
Better, Faster, Easier: How to Make Git Really Work in the Enterprise
Better, Faster, Easier: How to Make Git Really Work in the EnterpriseBetter, Faster, Easier: How to Make Git Really Work in the Enterprise
Better, Faster, Easier: How to Make Git Really Work in the Enterprise
 
Easier Requirements Management Using Diagrams In Helix ALM
Easier Requirements Management Using Diagrams In Helix ALMEasier Requirements Management Using Diagrams In Helix ALM
Easier Requirements Management Using Diagrams In Helix ALM
 
How To Master Your Mega Backlog
How To Master Your Mega Backlog How To Master Your Mega Backlog
How To Master Your Mega Backlog
 
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
Achieving Software Safety, Security, and Reliability Part 3: What Does the Fu...
 
How to Scale With Helix Core and Microsoft Azure
How to Scale With Helix Core and Microsoft Azure How to Scale With Helix Core and Microsoft Azure
How to Scale With Helix Core and Microsoft Azure
 
Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2Achieving Software Safety, Security, and Reliability Part 2
Achieving Software Safety, Security, and Reliability Part 2
 
Should You Break Up With Your Monolith?
Should You Break Up With Your Monolith?Should You Break Up With Your Monolith?
Should You Break Up With Your Monolith?
 
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
Achieving Software Safety, Security, and Reliability Part 1: Common Industry ...
 
What's New in Helix ALM 2019.4
What's New in Helix ALM 2019.4What's New in Helix ALM 2019.4
What's New in Helix ALM 2019.4
 
Free Yourself From the MS Office Prison
Free Yourself From the MS Office Prison Free Yourself From the MS Office Prison
Free Yourself From the MS Office Prison
 

Recently uploaded

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
Aftab Hussain
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Vladimir Iglovikov, Ph.D.
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
Alex Pruden
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 

Recently uploaded (20)

みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Removing Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software FuzzingRemoving Uninteresting Bytes in Software Fuzzing
Removing Uninteresting Bytes in Software Fuzzing
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIEnchancing adoption of Open Source Libraries. A case study on Albumentations.AI
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AI
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofszkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex Proofs
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 

Enabling the Perforce Administrator via Mobile Device

  • 1. Enabling the P4 Administrator Via Mobile Device Xavier Galvez Senior Engineer Advanced Micro Devices, Inc. © 2011
  • 2. THE PROBLEM •  Granting access is a 24/7 operation
  • 3. THE PROBLEM •  Granting access is a 24/7 operation •  Engineering teams span across the world
  • 4. THE PROBLEM •  Granting access is a 24/7 operation •  Engineering teams span across the world •  Access to areas is tightly regulated
  • 5. THE PROBLEM •  Granting access is a 24/7 operation •  Engineering teams span across the world •  Access to areas is tightly regulated •  A single team is authorized to give access
  • 6. THE PROBLEM •  Granting access is a 24/7 operation •  Engineering teams span across the world •  Access to areas is tightly regulated •  A single team is authorized to give access •  Be able to perform this task whenever and wherever
  • 7. THE SOLUTION •  Leverage the mobile device
  • 8. THE SOLUTION •  Leverage the mobile device •  Create an interface accessible by web browser
  • 9. THE SOLUTION •  Leverage the mobile device •  Create an interface accessible by web browser •  Use the browser on the mobile device
  • 10. THE SOLUTION •  Leverage the mobile device •  Create an interface accessible by web browser •  Use the browser on the mobile device •  Do it securely
  • 11. CONTEXT This presentation touches on: •  Breadth of the organization •  Permissions in the protection table •  Centralized authorization process
  • 12. CONTEXT This presentation touches on: •  Breadth of the organization •  Permissions in the protection table •  Centralized authorization process Then I discuss: •  Evolution of the solution •  Simplicity •  Where to go from here
  • 26. GLOBAL SCOPE grp_northamerica
  • 27. GLOBAL SCOPE grp_northamerica grp_israel
  • 28. GLOBAL SCOPE grp_northamerica grp_israel grp_india
  • 29. GLOBAL SCOPE grp_northamerica grp_israel grp_india grp_shanghai
  • 30. DEPOT STRUCTURE & PERMISSIONS depot stg main rel
  • 31. DEPOT STRUCTURE & PERMISSIONS depot stg main rel
  • 32. DEPOT STRUCTURE & PERMISSIONS r ACC_rel //depot/rel/... w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... w bm_merc //depot/main/merc/... depot r ACC_merc //depot/main/merc/... w ACC_merc //depot/stg/merc/src/... w ACC_merc //depot/stg/merc/doc/... w nda_merc //depot/stg/merc/nda/... w reg_merc //depot/stg/merc/acc.txt w bm_venus //depot/main/venus/... stg main rel r ACC_venus //depot/main/venus/... w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt s grp_admins //...
  • 33. DEPOT STRUCTURE & PERMISSIONS r ACC_rel //depot/rel/... w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... stg main rel r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... merc w bm_merc //depot/main/merc/... r ACC_merc //depot/main/merc/... w ACC_merc //depot/stg/merc/src/... w ACC_merc //depot/stg/merc/doc/... w nda_merc //depot/stg/merc/nda/... w reg_merc //depot/stg/merc/acc.txt w bm_venus //depot/main/venus/... r ACC_venus //depot/main/venus/... w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt s grp_admins //...
  • 34. DEPOT STRUCTURE & PERMISSIONS r ACC_rel //depot/rel/... w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... stg main rel r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... merc w bm_merc //depot/main/merc/... r ACC_merc //depot/main/merc/... src w ACC_merc //depot/stg/merc/src/... w ACC_merc //depot/stg/merc/doc/... w nda_merc //depot/stg/merc/nda/... doc w reg_merc //depot/stg/merc/acc.txt w bm_venus //depot/main/venus/... r ACC_venus //depot/main/venus/... w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt s grp_admins //...
  • 35. DEPOT STRUCTURE & PERMISSIONS r ACC_rel //depot/rel/... w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... stg main rel r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... merc merc r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... src w ACC_merc //depot/stg/merc/src/... w ACC_merc //depot/stg/merc/doc/... w nda_merc //depot/stg/merc/nda/... doc w reg_merc //depot/stg/merc/acc.txt w bm_venus //depot/main/venus/... r ACC_venus //depot/main/venus/... w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt s grp_admins //...
  • 36. DEPOT STRUCTURE & PERMISSIONS r ACC_rel //depot/rel/... w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... stg main rel r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... merc merc r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... src w ACC_merc //depot/stg/merc/src/... w ACC_merc //depot/stg/merc/doc/... w nda_merc //depot/stg/merc/nda/... doc w reg_merc //depot/stg/merc/acc.txt w bm_venus //depot/main/venus/... r ACC_venus //depot/main/venus/... venus w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... src w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt doc s grp_admins //...
  • 37. DEPOT STRUCTURE & PERMISSIONS r ACC_rel //depot/rel/... w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... stg main rel r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... merc merc r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... src w ACC_merc //depot/stg/merc/src/... venus w ACC_merc //depot/stg/merc/doc/... w nda_merc //depot/stg/merc/nda/... doc w reg_merc //depot/stg/merc/acc.txt r ACC_venus //depot/main/venus/... w bm_venus //depot/main/venus/... venus w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... src w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt doc s grp_admins //...
  • 38. DEPOT STRUCTURE & PERMISSIONS r ACC_rel //depot/rel/... w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... stg main rel r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... merc merc r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... src w ACC_merc //depot/stg/merc/src/... venus w ACC_merc //depot/stg/merc/doc/... w nda_merc //depot/stg/merc/nda/... doc w reg_merc //depot/stg/merc/acc.txt r ACC_venus //depot/main/venus/... w bm_venus //depot/main/venus/... venus w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... src w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt doc s grp_admins //...
  • 39. DEPOT STRUCTURE & PERMISSIONS r ACC_rel //depot/rel/... w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... stg main rel r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... merc merc 8.10 r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... src merc w ACC_merc //depot/stg/merc/src/... venus w ACC_merc //depot/stg/merc/doc/... w nda_merc //depot/stg/merc/nda/... doc venus w reg_merc //depot/stg/merc/acc.txt r ACC_venus //depot/main/venus/... w bm_venus //depot/main/venus/... venus w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... src w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt doc s grp_admins //...
  • 40. DEPOT STRUCTURE & PERMISSIONS r ACC_rel //depot/rel/... w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... stg main rel r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... merc merc 8.10 r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... src merc w ACC_merc //depot/stg/merc/src/... venus w ACC_merc //depot/stg/merc/doc/... w nda_merc //depot/stg/merc/nda/... doc venus w reg_merc //depot/stg/merc/acc.txt r ACC_venus //depot/main/venus/... w bm_venus //depot/main/venus/... venus w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... src w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt doc s grp_admins //...
  • 41. DEPOT STRUCTURE & PERMISSIONS r ACC_rel //depot/rel/... w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... stg main rel r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... merc merc 8.10 r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... src merc w ACC_merc //depot/stg/merc/src/... venus w ACC_merc //depot/stg/merc/doc/... w nda_merc //depot/stg/merc/nda/... doc venus w reg_merc //depot/stg/merc/acc.txt r ACC_venus //depot/main/venus/... w bm_venus //depot/main/venus/... venus w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... src w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt doc s grp_admins //...
  • 42. DEPOT STRUCTURE & PERMISSIONS r ACC_rel //depot/rel/... w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... stg main rel r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... merc merc 8.10 r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... src merc w ACC_merc //depot/stg/merc/src/... venus w ACC_merc //depot/stg/merc/doc/... w nda_merc //depot/stg/merc/nda/... doc venus w reg_merc //depot/stg/merc/acc.txt r ACC_venus //depot/main/venus/... w bm_venus //depot/main/venus/... venus w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... src w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt doc s grp_admins //...
  • 43. DEPOT STRUCTURE & PERMISSIONS r ACC_rel //depot/rel/... w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... stg main rel r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... merc merc 8.10 r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... src merc w ACC_merc //depot/stg/merc/src/... venus w ACC_merc //depot/stg/merc/doc/... w nda_merc //depot/stg/merc/nda/... doc venus w reg_merc //depot/stg/merc/acc.txt r ACC_venus //depot/main/venus/... w bm_venus //depot/main/venus/... venus w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... src w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt doc s grp_admins //...
  • 44. DEPOT STRUCTURE & PERMISSIONS r ACC_rel //depot/rel/... w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... stg main rel r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... merc merc 8.10 r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... src merc w ACC_merc //depot/stg/merc/src/... venus w ACC_merc //depot/stg/merc/doc/... w nda_merc //depot/stg/merc/nda/... doc nda venus w reg_merc //depot/stg/merc/acc.txt r ACC_venus //depot/main/venus/... w bm_venus //depot/main/venus/... venus w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... src w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt doc nda s grp_admins //...
  • 45. DEPOT STRUCTURE & PERMISSIONS r ACC_rel //depot/rel/... w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... stg main rel r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... merc merc 8.10 r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... src merc w ACC_merc //depot/stg/merc/src/... venus w ACC_merc //depot/stg/merc/doc/... w nda_merc //depot/stg/merc/nda/... doc nda venus w reg_merc //depot/stg/merc/acc.txt r ACC_venus //depot/main/venus/... w bm_venus //depot/main/venus/... venus w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... src w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt doc nda s grp_admins //...
  • 46. PERMISSIONS: HIGH-LEVEL TEAMS r ACC_rel //depot/rel/... bm_rel w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... r ACC_rel -//depot/rel/*/acc.txt bm_merc w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... nda_merc r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... reg_merc w ACC_merc //depot/stg/merc/src/... w ACC_merc //depot/stg/merc/doc/... bm_venus w nda_merc //depot/stg/merc/nda/... w reg_merc //depot/stg/merc/acc.txt nda_venus r ACC_venus //depot/main/venus/... w bm_venus //depot/main/venus/... w ACC_venus //depot/stg/venus/src/... reg_venus w ACC_venus //depot/stg/venus/doc/... w nda_venus //depot/stg/venus/nda/... grp_admins w reg_venus //depot/stg/venus/acc.txt s grp_admins //...
  • 47. PERMISSIONS: HIGH-LEVEL TEAM EXAMPLES r ACC_rel //depot/rel/... w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... w ACC_merc //depot/stg/merc/src/... w ACC_merc //depot/stg/merc/doc/... bm_venus w nda_merc //depot/stg/merc/nda/... w reg_merc //depot/stg/merc/acc.txt r ACC_venus //depot/main/venus/... w bm_venus //depot/main/venus/... w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... w nda_venus //depot/stg/venus/nda/... grp_admins w reg_venus //depot/stg/venus/acc.txt s grp_admins //...
  • 48. PERMISSIONS: ACCESS GROUPS r ACC_rel //depot/rel/... ACC_rel w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... r ACC_rel -//depot/rel/*/acc.txt REG_rel w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... ACC_main r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... ACC_merc w ACC_merc //depot/stg/merc/src/... w ACC_merc //depot/stg/merc/doc/... ACC_venus w nda_merc //depot/stg/merc/nda/... w reg_merc //depot/stg/merc/acc.txt r ACC_venus //depot/main/venus/... w bm_venus //depot/main/venus/... w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt s grp_admins //...
  • 49. PERMISSIONS: ACCESS GROUP EXAMPLE r ACC_rel //depot/rel/... ACC_rel w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... ACC_main r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... ACC_merc w ACC_merc //depot/stg/merc/src/... w ACC_merc //depot/stg/merc/doc/... w nda_merc //depot/stg/merc/nda/... w reg_merc //depot/stg/merc/acc.txt r ACC_venus //depot/main/venus/... w bm_venus //depot/main/venus/... grp_shanghai w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt s grp_admins //...
  • 50. PERMISSIONS: ACCESS GROUP EXAMPLE r ACC_rel //depot/rel/... ACC_rel w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... ACC_main r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... ACC_merc w ACC_merc //depot/stg/merc/src/... w ACC_merc //depot/stg/merc/doc/... ACC_venus w nda_merc //depot/stg/merc/nda/... w reg_merc //depot/stg/merc/acc.txt r ACC_venus //depot/main/venus/... w bm_venus //depot/main/venus/... grp_northamerica w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt s grp_admins //...
  • 51. PERMISSIONS: COMBINATION EXAMPLE r ACC_rel //depot/rel/... ACC_rel w bm_rel //depot/rel/... w ACC_rel //depot/rel/8.10/... r ACC_rel -//depot/rel/*/acc.txt w REG_rel //depot/rel/*/acc.txt r ACC_main //depot/main/... ACC_main r ACC_merc //depot/main/merc/... w bm_merc //depot/main/merc/... ACC_merc w ACC_merc //depot/stg/merc/src/... w ACC_merc //depot/stg/merc/doc/... ACC_venus w nda_merc //depot/stg/merc/nda/... w reg_merc //depot/stg/merc/acc.txt bm_venus r ACC_venus //depot/main/venus/... w bm_venus //depot/main/venus/... grp_northamerica w ACC_venus //depot/stg/venus/src/... w ACC_venus //depot/stg/venus/doc/... w nda_venus //depot/stg/venus/nda/... w reg_venus //depot/stg/venus/acc.txt s grp_admins //...
  • 54. CREATING ACCOUNTS VIA NEWUSER.EXE
  • 55. CREATING ACCOUNTS VIA NEWUSER.EXE
  • 61. PROBLEMS WITH BINARIES •  Newer versions need to be recompiled.
  • 62. PROBLEMS WITH BINARIES •  Newer versions need to be recompiled. •  Deployment.
  • 64. ADVANTAGES WITH WEB APPS •  Newer versions available right away.
  • 65. ADVANTAGES WITH WEB APPS •  Newer versions available right away. •  Experimental versions can be easily tested.
  • 66. ADVANTAGES WITH WEB APPS •  Newer versions available right away. •  Experimental versions can be easily tested. •  Real-time validation on inputs.
  • 67. ADVANTAGES WITH WEB APPS •  Newer versions available right away. •  Experimental versions can be easily tested. •  Real-time validation on inputs. •  OS-independent.
  • 68. LEVERAGE EXISTING RESOURCE #1: WEB SERVER
  • 69. LEVERAGE EXISTING RESOURCE #1: WEB SERVER
  • 70. LEVERAGE EXISTING RESOURCE #1: WEB SERVER
  • 78. LEVERAGE EXISTING RESOURCE #2: BLACKBERRY internet wireless network BES firewall AMD
  • 79. LEVERAGE EXISTING RESOURCE #2: BLACKBERRY internet wireless network BES firewall AMD
  • 80. LEVERAGE EXISTING RESOURCE #2: BLACKBERRY
  • 81. LEVERAGE EXISTING RESOURCE #3: iOS internet wireless network secure firewall VPN AMD
  • 83. SECURITY Wireless Solutions •  BlackBerry Enterprise Solution for Blackberries •  Secure VPN for iOS devices
  • 84. SECURITY Wireless Solutions •  BlackBerry Enterprise Solution for Blackberries •  Secure VPN for iOS devices HTTP is not secure, use HTTPS! •  Encrypts the HTTP message prior to transmission •  Decrypts the message upon arrival •  Requires the use of CA certificates
  • 85. SECURITY Wireless Solutions •  BlackBerry Enterprise Solution for Blackberries •  Secure VPN for iOS devices HTTP is not secure, use HTTPS! •  Encrypts the HTTP message prior to transmission •  Decrypts the message upon arrival •  Requires the use of CA certificates User Authentication and Identification •  REMOTE_USER environment variable
  • 86. REDUCING RISK Keep the location of the web page unknown •  Only known to Perforce admins
  • 87. REDUCING RISK Keep the location of the web page unknown •  Only known to Perforce admins Limit what can be done on the web page •  Create a new user account •  Display information from p4 protects and p4 groups •  Add an existing user to currently existing groups •  Remove the user from a group •  Reset the password of an existing user
  • 88. WHAT NEXT? Server-side APIs •  P4Java, P4Perl, P4Ruby, P4Python, P4PHP •  ASP.NET with Perforce C/C++ API
  • 89. WHAT NEXT? Server-side APIs •  P4Java, P4Perl, P4Ruby, P4Python, P4PHP •  ASP.NET with Perforce C/C++ API Client-side Technologies •  jQuery, jQuery Mobile, HTML5
  • 90. WHAT NEXT? Server-side APIs •  P4Java, P4Perl, P4Ruby, P4Python, P4PHP •  ASP.NET with Perforce C/C++ API Client-side Technologies •  jQuery, jQuery Mobile, HTML5 More Features! •  Monitor and restart servers •  Most-used commands can be called
  • 91. CONCLUSION The result: •  Simple mechanism •  Took advantage of existing resources •  Latest web technologies were not necessary •  Quick development, fast deployment
  • 92. CONCLUSION The result: •  Simple mechanism •  Took advantage of existing resources •  Latest web technologies were not necessary •  Quick development, fast deployment The advantages: •  Web page + mobile device allows rich feature set •  Write once, run on all •  Feel at home with the same interface •  Not just work hard, but work SMART
  • 96. ICON CREDITS •  http://www.iconshock.com/ •  http://fasticon.com/ •  http://johnfreeborn.com/ •  http://www.deleket.com/ •  http://www.customicondesign.com/ •  http://www.visualpharm.com/ •  http://www.icons-land.com/ •  http://3dlb.com/