UMA is a profile and application of OAuth that defines how resource owners can control resource access by clients operated by arbitrary requesting parties, where the resources reside on any number of resource servers, and where a centralized authorization server governs access based on resource owner policy. Recent investigations have shown promise for applying UMA to Internet of Things authorization use cases.
This is a presentation by Eve Maler for the IETF ACE working group.
How to authenticate users in your apps using FI-WARE Account - IntroductionJavier Cerviño
In this course you will learn to:
Use FI-WARE Account to create users, organizations and register your Applications.
Authenticate users in your apps with their credentials on FI-WARE using OAuth 2.0.
They’ll securely access resources thanks to authorization in FI-WARE Account.
AE - Dir - Authorized Entities Directory by Michael StröderNETWAYS
This talk will present a real-world implementation of a privileged identity and access management system (IAM/PAM) based on OpenLDAP used together with OATH-LDAP for secure two-factor authentication. Æ-DIR and OATH-LDAP are both free software projects. The main goal of Æ-DIR is to follow the delegation, need-to-know and least-privilege principles as strictly as possible. The visibility of users, groups, sudoers, etc. is limited by OpenLDAP’s ACLs. All systems and services, no exception(!), have to individually authenticate to be authorized to access Æ-DIR. Especially the consequent delegation allows to almost completely abandon slow approval workflows which nicely fits the need for agile system management processes. Furthermore OATH-LDAP is presented, a two-factor authentication system, which directly uses the OpenLDAP server as a backend. It is built into Æ-DIR but can also be used separately. A highly secure enrollment process (no QR code displayed!) for two-factor HOTP authentication with yubikey tokens is shown. Finally the architecture of a SSH gateway is explained which uses the very same access control data to authorize SSH connections passing through the gateway.
UMA is a profile and application of OAuth that defines how resource owners can control resource access by clients operated by arbitrary requesting parties, where the resources reside on any number of resource servers, and where a centralized authorization server governs access based on resource owner policy. Recent investigations have shown promise for applying UMA to Internet of Things authorization use cases.
This is a presentation by Eve Maler for the IETF ACE working group.
How to authenticate users in your apps using FI-WARE Account - IntroductionJavier Cerviño
In this course you will learn to:
Use FI-WARE Account to create users, organizations and register your Applications.
Authenticate users in your apps with their credentials on FI-WARE using OAuth 2.0.
They’ll securely access resources thanks to authorization in FI-WARE Account.
AE - Dir - Authorized Entities Directory by Michael StröderNETWAYS
This talk will present a real-world implementation of a privileged identity and access management system (IAM/PAM) based on OpenLDAP used together with OATH-LDAP for secure two-factor authentication. Æ-DIR and OATH-LDAP are both free software projects. The main goal of Æ-DIR is to follow the delegation, need-to-know and least-privilege principles as strictly as possible. The visibility of users, groups, sudoers, etc. is limited by OpenLDAP’s ACLs. All systems and services, no exception(!), have to individually authenticate to be authorized to access Æ-DIR. Especially the consequent delegation allows to almost completely abandon slow approval workflows which nicely fits the need for agile system management processes. Furthermore OATH-LDAP is presented, a two-factor authentication system, which directly uses the OpenLDAP server as a backend. It is built into Æ-DIR but can also be used separately. A highly secure enrollment process (no QR code displayed!) for two-factor HOTP authentication with yubikey tokens is shown. Finally the architecture of a SSH gateway is explained which uses the very same access control data to authorize SSH connections passing through the gateway.
Securing your APIs with OAuth, OpenID, and OpenID ConnectManish Pandit
As products and companies move towards IoT model, users and machines alike need to interact with various APIs. Securing these APIs in a connected world can be a challenge faced by many. Fortunately, there are open standards addressing even the most complex of use cases - OAuth, OpenID and OpenID Connect happen to be widely adopted and have a growing support across many API and Identity Providers. In this session I'll talk about these standards, and walk through common use cases/flows from an API Provider as well as consumer's side. We will explore how these standards come together to not only secure the APIs, but also manage identity.
FIWARE Academy Courses
Identity Management - Keyrock GE
Lesson 3. Applications. How to create OAuth2 tokens.
https://edu.fiware.org/course/view.php?id=79
Álvaro Alonso
UPM-DIT. Security Chapter
FIWARE Academy
https://edu.fiware.org
http://fiware.org
Securing Your Deployment with MongoDB and Red Hat's Identity Management in Re...MongoDB
MongoDB and Red Hat have collaborated to deliver an integrated solution for securing MongoDB deployments. Red Hat's proven security infrastructure adds extra protection to MongoDB with standards-based identity management featuring centralization of user, password, and certificate information. MongoDB and Red Hat team members present what you need to know to secure your systems, including an overview of Red Hat's Identity Management in Red Hat Enterprise Linux and MongoDB-RHEL security architecture.
As part of MobiliYa Spread Knowledge Initiative Presentation Series.
Agenda
1.Intro -Auth-Authentication & Authorization & SSO
2.OAuth2 in Depth
3.Where does JWT fit in ?
4.How to do stateless Authorization using OAUTH2 & JWT ?
5.Some Sample Code ? How easy is it to implement ?
Short intro to the following techniques :
HoneyHash - Fake Memory Credentials
Kerberoasting Service Accounts Honey Tokens
Honey Files
For Red Team – Detecting Honey-*
Adding Identity Management and Access Control to your AppFIWARE
Adding Identity Management and Access Control to your App presentation, by Alvaro Alonso & Cyril Dangerville.
Security Chapter. 1st FIWARE Summit, Málaga Dec. 13-15, 2016.
FIWARE Training: Identity Management and Access ControlFIWARE
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project and IShare Foundation. The core part of this virtual training camp (27 Jun - 01 Jul 2022) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using NGSI-LD (the simple yet powerful open standard API enabling to publish and access digital twin data) combined with common smart data models
In addition, it covers the supplementary FIWARE technologies used to implement the rest of functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data, and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historic big data.
Extending this core part, the training camp also cover how you can easily integrate FIWARE systems with blockchain networks to create audit-proof logs of processes and ensure transparency.
Securing your APIs with OAuth, OpenID, and OpenID ConnectManish Pandit
As products and companies move towards IoT model, users and machines alike need to interact with various APIs. Securing these APIs in a connected world can be a challenge faced by many. Fortunately, there are open standards addressing even the most complex of use cases - OAuth, OpenID and OpenID Connect happen to be widely adopted and have a growing support across many API and Identity Providers. In this session I'll talk about these standards, and walk through common use cases/flows from an API Provider as well as consumer's side. We will explore how these standards come together to not only secure the APIs, but also manage identity.
FIWARE Academy Courses
Identity Management - Keyrock GE
Lesson 3. Applications. How to create OAuth2 tokens.
https://edu.fiware.org/course/view.php?id=79
Álvaro Alonso
UPM-DIT. Security Chapter
FIWARE Academy
https://edu.fiware.org
http://fiware.org
Securing Your Deployment with MongoDB and Red Hat's Identity Management in Re...MongoDB
MongoDB and Red Hat have collaborated to deliver an integrated solution for securing MongoDB deployments. Red Hat's proven security infrastructure adds extra protection to MongoDB with standards-based identity management featuring centralization of user, password, and certificate information. MongoDB and Red Hat team members present what you need to know to secure your systems, including an overview of Red Hat's Identity Management in Red Hat Enterprise Linux and MongoDB-RHEL security architecture.
As part of MobiliYa Spread Knowledge Initiative Presentation Series.
Agenda
1.Intro -Auth-Authentication & Authorization & SSO
2.OAuth2 in Depth
3.Where does JWT fit in ?
4.How to do stateless Authorization using OAUTH2 & JWT ?
5.Some Sample Code ? How easy is it to implement ?
Short intro to the following techniques :
HoneyHash - Fake Memory Credentials
Kerberoasting Service Accounts Honey Tokens
Honey Files
For Red Team – Detecting Honey-*
Adding Identity Management and Access Control to your AppFIWARE
Adding Identity Management and Access Control to your App presentation, by Alvaro Alonso & Cyril Dangerville.
Security Chapter. 1st FIWARE Summit, Málaga Dec. 13-15, 2016.
FIWARE Training: Identity Management and Access ControlFIWARE
An online training course run by the FIWARE Foundation in conjunction with the i4Trust project and IShare Foundation. The core part of this virtual training camp (27 Jun - 01 Jul 2022) covered all the necessary skills to develop smart solutions powered by FIWARE. It introduces the basis of Digital Twin programming using NGSI-LD (the simple yet powerful open standard API enabling to publish and access digital twin data) combined with common smart data models
In addition, it covers the supplementary FIWARE technologies used to implement the rest of functions typically required when architecting a complete smart solution: Identity and Access Management (IAM) functions to secure access to digital twin data, and functions enabling the interface with IoT and 3rd systems, or the connection with different tools for processing and monitoring current and historic big data.
Extending this core part, the training camp also cover how you can easily integrate FIWARE systems with blockchain networks to create audit-proof logs of processes and ensure transparency.
FIWARE Identity Management and Access ControlFIWARE
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
This training camp teaches you how FIWARE technologies and iSHARE, brought together under the umbrella of the i4Trust initiative, can be combined to provide the means for creation of data spaces in which multiple organizations can exchange digital twin data in a trusted and efficient manner, collaborating in the development of innovative services based on data sharing and creating value out of the data they share. SMEs and Digital Innovation Hubs (DIHs) will be equipped with the necessary know-how to use the i4Trust framework for creating data spaces!
Traditional security models no longer suffice in the new digital and API driven economy. APIs expose corporate data in very deliberate and thoughtful ways, but, as with any technology that involves enterprise data, security should always be a prime concern. How do you keep your customers' digital experiences as secure as your backend data and services?
OAuth is an API authorization protocol that enables apps to access information on behalf of users without requiring them to divulge their usernames and passwords.
The slides from the talk I gave in Java.IL's Apr 2019 session.
These slides describe Keycloak, OAuth 2.0, OpenID and SparkBeyond's integration with Keycloak
APIs are now the standard entry point to the majority of newly created ‘back-end’ functionality. These APIs exist to provide not only a standardized, structured way to access the required features or functions, but also to act as ‘gatekeepers’, ensuring appropriate security, auditing, accounting etc. Security is always underpinned by identity and as such, APIs need to know if not who is accessing them, what is the context in which they are being accessed.
Adding Identity Management and Access Control to your Application, AuthorizationFernando Lopez Aguilar
Adding Identity Management and Access Control to your Application, Authorization using the FIWARE components: Identity Management, PEP Proxy, Access Control (PDP/PAP).
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist. Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist. Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Christoph Mertens_IDSA_Introduction to Data Spaces.pptxFIWARE
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Lukas Künzel Smart City Operating System.pptxFIWARE
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Pierre Golz Der Transformationsprozess im Konzern Stadt.pptxFIWARE
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Dennis Wendland_The i4Trust Collaboration Programme.pptxFIWARE
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das D-A-CH Meeting bringt deutschsprachige FIWARE-Enthusiasten zu hochkarätigen Vorträgen und wertvollen Networking-Möglichkeiten zusammen. Ein besonderer Fokus liegt auf dem FIWARE iHubs Programm, das Beratung und Peers-Diskussionen für diejenigen bietet, die an der Gründung eines FIWARE iHubs interessiert sind. Aber das ist noch nicht alles! Wir haben noch weitere Highlights auf Lager, darunter die faszinierende Ausstellung "SMART WORLD by FIWARE", die komplett aus Legosteinen gebaut ist.
Außerdem lassen wir viel Zeit zum Netzwerken und Business Talks bei Snacks und Getränken mit der Stadt Herne, NRW und ihren Spielern und mit Vertretern aus Österreich und der Stadt Wien im Speziellen. Aus DACH und darüber hinaus werden einige iHubs vertreten sein, auch das in Kürze entstehende iHub in Wien.
Das FIWARE Netzwerktreffen für den deutschsprachigen Raum finden nun bereits das dritte Mal statt. Das nächste Treffen wird in Wien stattfinden - einer der lebenswertesten und resilientesten Städte der Welt. Diese Veranstaltung ist Teil des FIWARE Global Summit After Program, das von der Stadt Wien und der Wirtschaftsagentur Wien ausgerichtet wird.
Ziel der Netzwerkveranstaltung ist es, Schlüsselakteure des deutschsprachigen Marktes zu versammeln und zu vernetzen, um dann eine selbsttragende, wachsende und wirkungsvolle Gemeinschaft von FIWARE-Anwendern und interessierten Gleichgesinnten aufzubauen. An diesen Veranstaltungen teilen Sie Ihr Fachwissen, lernen Sie voneinander und erhalten Impulse und Neuigkeiten von den Keynote-Speakern.
Wir werden aktuelle Themen mit höchster Relevanz für die deutschsprachige Community wie Open Source, digitale Zwillinge, Smart Cities Index, nachhaltige Entwicklung, anstehende Förderprojekte usw. behandeln.
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
Boris Otto_FGS2023_Opening- EU Innovations from Data_PUB_V1_BOt.pptxFIWARE
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
Bjoern de Vidts_FGS23_Opening_athumi - bjord de vidts - personal data spaces....FIWARE
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
FGS2023_Opening_Red Hat Keynote Andrea Battaglia.pdfFIWARE
Join our 9th FIWARE Global Summit (#FIWARESummit23) in Austria's capital of Vienna in the stunning Vienna City Hall being one of the most splendid amongst the numerous monumental buildings along Vienna's amazing palaces and buildings. FIWARE Global Summit (FGS) is one of the leading Open Source and Open Standards conferences for entrepreneurs, public administrations, academia, developers, start-ups, and technologists worldwide.
Get ready for two days of world-class innovation, collaboration, and networking - and a rich side program.
Open to all FIWARE enthusiasts and newbies, members and partners, from startups to global players, public admins and academia, from developers to strategists, from project managers to CEOs.
Technology is changing the way we live, work, and engage with one another. FIWARE provides a helping hand to those who want to change the world, foretell the future, and transform markets for the better, based on recognized Open Source and Open Standards technology.
From startups and SMEs to global enterprises, FIWARE helps today's disruptors fully grasp what tomorrow has in store and how they can be part of this transformation journey.
You can also play a key role in this journey. Looking into joining the FIWARE community, our global ecosystem, or just interested in the impact and opportunities with Open Source technology? Then this Summit is made for you!
Das FIWARE Netzwerktreffen für den deutschsprachigen Raum finden nun bereits das dritte Mal statt. Das nächste Treffen wird in Wien stattfinden - einer der lebenswertesten und resilientesten Städte der Welt. Diese Veranstaltung ist Teil des FIWARE Global Summit After Program, das von der Stadt Wien und der Wirtschaftsagentur Wien ausgerichtet wird.
Ziel der Netzwerkveranstaltung ist es, Schlüsselakteure des deutschsprachigen Marktes zu versammeln und zu vernetzen, um dann eine selbsttragende, wachsende und wirkungsvolle Gemeinschaft von FIWARE-Anwendern und interessierten Gleichgesinnten aufzubauen. An diesen Veranstaltungen teilen Sie Ihr Fachwissen, lernen Sie voneinander und erhalten Impulse und Neuigkeiten von den Keynote-Speakern.
Wir werden aktuelle Themen mit höchster Relevanz für die deutschsprachige Community wie Open Source, digitale Zwillinge, Smart Cities Index, nachhaltige Entwicklung, anstehende Förderprojekte usw. behandeln.
Das FIWARE Netzwerktreffen für den deutschsprachigen Raum finden nun bereits das dritte Mal statt. Das nächste Treffen wird in Wien stattfinden - einer der lebenswertesten und resilientesten Städte der Welt. Diese Veranstaltung ist Teil des FIWARE Global Summit After Program, das von der Stadt Wien und der Wirtschaftsagentur Wien ausgerichtet wird.
Ziel der Netzwerkveranstaltung ist es, Schlüsselakteure des deutschsprachigen Marktes zu versammeln und zu vernetzen, um dann eine selbsttragende, wachsende und wirkungsvolle Gemeinschaft von FIWARE-Anwendern und interessierten Gleichgesinnten aufzubauen. An diesen Veranstaltungen teilen Sie Ihr Fachwissen, lernen Sie voneinander und erhalten Impulse und Neuigkeiten von den Keynote-Speakern.
Wir werden aktuelle Themen mit höchster Relevanz für die deutschsprachige Community wie Open Source, digitale Zwillinge, Smart Cities Index, nachhaltige Entwicklung, anstehende Förderprojekte usw. behandeln.
Das FIWARE Netzwerktreffen für den deutschsprachigen Raum finden nun bereits das dritte Mal statt. Das nächste Treffen wird in Wien stattfinden - einer der lebenswertesten und resilientesten Städte der Welt. Diese Veranstaltung ist Teil des FIWARE Global Summit After Program, das von der Stadt Wien und der Wirtschaftsagentur Wien ausgerichtet wird.
Ziel der Netzwerkveranstaltung ist es, Schlüsselakteure des deutschsprachigen Marktes zu versammeln und zu vernetzen, um dann eine selbsttragende, wachsende und wirkungsvolle Gemeinschaft von FIWARE-Anwendern und interessierten Gleichgesinnten aufzubauen. An diesen Veranstaltungen teilen Sie Ihr Fachwissen, lernen Sie voneinander und erhalten Impulse und Neuigkeiten von den Keynote-Speakern.
Wir werden aktuelle Themen mit höchster Relevanz für die deutschsprachige Community wie Open Source, digitale Zwillinge, Smart Cities Index, nachhaltige Entwicklung, anstehende Förderprojekte usw. behandeln.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
UiPath Test Automation using UiPath Test Suite series, part 4DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 4. In this session, we will cover Test Manager overview along with SAP heatmap.
The UiPath Test Manager overview with SAP heatmap webinar offers a concise yet comprehensive exploration of the role of a Test Manager within SAP environments, coupled with the utilization of heatmaps for effective testing strategies.
Participants will gain insights into the responsibilities, challenges, and best practices associated with test management in SAP projects. Additionally, the webinar delves into the significance of heatmaps as a visual aid for identifying testing priorities, areas of risk, and resource allocation within SAP landscapes. Through this session, attendees can expect to enhance their understanding of test management principles while learning practical approaches to optimize testing processes in SAP environments using heatmap visualization techniques
What will you get from this session?
1. Insights into SAP testing best practices
2. Heatmap utilization for testing
3. Optimization of testing processes
4. Demo
Topics covered:
Execution from the test manager
Orchestrator execution result
Defect reporting
SAP heatmap example with demo
Speaker:
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfPeter Spielvogel
Building better applications for business users with SAP Fiori.
• What is SAP Fiori and why it matters to you
• How a better user experience drives measurable business benefits
• How to get started with SAP Fiori today
• How SAP Fiori elements accelerates application development
• How SAP Build Code includes SAP Fiori tools and other generative artificial intelligence capabilities
• How SAP Fiori paves the way for using AI in SAP apps
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Welcome to the first live UiPath Community Day Dubai! Join us for this unique occasion to meet our local and global UiPath Community and leaders. You will get a full view of the MEA region's automation landscape and the AI Powered automation technology capabilities of UiPath. Also, hosted by our local partners Marc Ellis, you will enjoy a half-day packed with industry insights and automation peers networking.
📕 Curious on our agenda? Wait no more!
10:00 Welcome note - UiPath Community in Dubai
Lovely Sinha, UiPath Community Chapter Leader, UiPath MVPx3, Hyper-automation Consultant, First Abu Dhabi Bank
10:20 A UiPath cross-region MEA overview
Ashraf El Zarka, VP and Managing Director MEA, UiPath
10:35: Customer Success Journey
Deepthi Deepak, Head of Intelligent Automation CoE, First Abu Dhabi Bank
11:15 The UiPath approach to GenAI with our three principles: improve accuracy, supercharge productivity, and automate more
Boris Krumrey, Global VP, Automation Innovation, UiPath
12:15 To discover how Marc Ellis leverages tech-driven solutions in recruitment and managed services.
Brendan Lingam, Director of Sales and Business Development, Marc Ellis
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Free Complete Python - A step towards Data Science
FIWARE Global Summit - Adding Identity Management, Access Control and API Management in Your System
1. Adding Identity Management, Access Control and
API Management in your system
A complete framework for Identity, Access Control and API
Management
Álvaro Alonso
FIWARE Security Chapter
6. OAuth 2.0
▪ Mechanism to provide applications access to restricted resources
without sharing credentials.
• Applications use access tokens, issued by OAuth providers (e.g.
FIWARE), to access resources.
• OAuth 2.0 specification is designed for use with HTTP.
▪ Roles:
• Resource Owner: Entity capable of granting access to a protected
resource (e.g. end-user)
• Resource Server: Server hosting protected resources.
• Client: Application making protected resource requests on behalf of
the resource owner.
• Authorization Server: The server issuing access tokens to the client.
7. OAuth 2.0
▪ Authorization Code Grant
▪ Implicit Grant
▪ Resource Owner Password Credentials Grant
▪ Client Credentials Grant
14. Getting protected user info
14
Web App Account
OAuth2 requests flow
access-token
OAuthLibrary
Request user info using access-token
GET /user?access_token={token}
15. Web Applications and GEs
15
Generic Enabler
Account
Request +
access-token Oauth2 flows
access-token
OK + user info (roles)
Web App
OAuth Library
access_token
GET https://GE_URL HTTP/1.1
Host: GE_hostname
X-Auth-Token: access_token
18. Securing your back-end
▪ Level 1: Authentication
• Check if a user has a FIWARE account
▪ Level 2: Basic Authorization
• Checks if a user has permissions to access a resource
• HTTP verb + resource path
▪ Level 3: Advanced Authorization
• Custom XACML policies
20. Level 2: Basic Authorization
20
Back-end
Apps
Account
Request +
access-token
Web App
Oauth Library
PEP Proxy
access-token
OK + user info
Oauth2 flows
access_token
Authz PDP
GE
XACML <Request>:
roles + verb + path
OK
Basic RBAC policies in
XACML
(simple role permissions)
24. APInf & PEP Proxy
Back-end
Request +
API Key
Web App
Back-end Back-end Back-end
25. APInf & PEP Proxy
Back
end
App
Account
Request +
access-token
Web App
Oauth Library
PEP Proxy
access-token
OK + user info (roles)
Oauth2 flows
access_token
Back
end
App
Back
end
App
Back
end
App
26. IoT Authentication
▪ Context Broker
• IoT Management
• Publish / subscribe model
□ Context producers
□ Context consumers
▪ Sensors Authentication
• Sensor registration in IdM applications
• Each sensor has its own account
□ Token creation and validation
29. Industrial Data Space
FIWARE Security ready
Industrial Data Space
Infrastructure
IdP PAP
Policies DB
PDP
Industrial Data Space
Context Consumer
Connector
Industrial Data Space
Context Producer
Connector
PEP
30. Security GEs
▪ Identity Management – Keyrock
▪ Authorization PDP – AuthZForce
▪ PEP Proxy – Wilma
▪ Get your own infrastructure!!!
• Follow Security GEs
Installation and Configuration Guides
32. New Keyrock release
▪ Support for custom themes.
▪ Improved OAuth 2.0 refresh tokens support.
▪ Application permissions can be now edited and removed.
▪ Driver for external database authentication.
▪ Support for configuring available Grant Types in registered applications.
▪ Improved organizations management.
▪ Clean up with regard Cloud dependencies.
▪ Support to PostgreSQL.
32
33. Security GEs – PEP Proxy - Wilma
▪ Policy Enforcement Point
▪ Compatible with OAuth2 and Keystone tokens
▪ Source code:
• https://github.com/ging/fi-ware-pep-proxy
▪ Documentation
• http://catalogue.fiware.org/enablers/pep-proxy-wilma
▪ Global instance
33
34. Security GEs – Authorization PDP – AuthZForce (1/2)
▪ Single Open Spec (Authorization PDP GE) & Open Source
implementation (GEri Authzforce) of 100% XACML-3.0 standard-
compliant and cloud-ready RESTful ABAC framework with XML
optimization
▪ Multi-tenant REST API for PDP(s)/PAP(s)
▪ Standards:
• OASIS: XACML 3.0 + Profiles (REST, RBAC, Multiple Decision)
• ISO: Fast Infoset
▪ Extensible: attribute providers (PIP), functions, etc.
▪ PDP clustering
34
By 2020, the majority of enterprises will use ABAC as the dominant mechanism
to protect critical assets, up from less than five percent today. (Gartner, 2013)
IBAC
ABAC
RBAC