SlideShare a Scribd company logo
Secure real-time
collaboration with
SecurePass                                               and
Etherpad
Giuseppe Paterno', IT Security Architect and CTO, GARL
Luca Oldano, Senior Network and Security Engineer, Moresi.com
What is a "Pad"
A "Pad" is an on-line web-based collaborative
real-time editor, allowing authors to
simultaneously edit a text document, and see all
of  the participants' edits in real-time, with the
ability to display each  author's text in their own
color.
Anyone can create a new collaborative
document, known as a "pad". Each pad has its
own URL and anyone who knows this URL can
edit the pad and participate in the  associated
chats. Password-protected pads are also
possible. Each participant is identified by a color
and a name.
The software auto-saves the document at regular,
short intervals, but  participants can permanently
save specific versions (checkpoints) at  any
time. A "time machine" feature allows anyone to
explore the history of the pad, going back in the
past release. The major "milestones" can also be
tagged (or "stared"). 
A great feature of some pads is that document
can be imported and exported in plain text,
HTML, Open Document, Microsoft Word, or PDF
format.


Secure real-time collaboration with                   and Etherpad
Working with "Pads"
          Working with pads is business going social:  social networks get us used to be always
          updated and connected to our community anytime and anywhere.  A pad follow that
          mindset and enables you with a simple tool to collaborate with your colleagues and
          partners while ensuring the right level of privacy online.

          Consider a pad like a clear whiteboard, open a new one and simply start writing an
          idea or a challenge. Invite your team, your partners, your external collaborators -no
          matter where they are- to share your ideas at the same time.

          Let  the pad grow with the contribution and the experience of trusted  people, every
          projects has the right team that are ready to contribute.  Review and compare the text
          with preview versions, until you'll find the answer and achieve your goal.

          Then export it, in your favourite format and share it. For example, write project
          documentations with your team through a pad and deliver it in a professional way
          using your favorite tool such as Microsoft Word.




Secure real-time collaboration with               and Etherpad
Secure real-time
collaboration
Innovate, experiment, engage your customers in an easy and
secure way. With a shared pad in a protected enviroment, it's easy focus
on core facts and forget about your information being accessed from
unauthorized users. All you have to do is following the speed of business. 

Secure cooperation with employees and partners is now possible on the
cloud with the protection of SecurePass.

Access to a pad is as easy as sharing the web adress of your pad, SecurePass
will ensure that access to information is allowed only to authorized users. 

By integrating a pad with SecurePass you will be able to:


‣identify your employees and partners in a proper way
‣limit access to your company and/or your partners (with Apache module)
‣cooperate from anywhere, also through tablets and smartphones, without
fear of loosing precious company information


 Secure real-time collaboration with                   and Etherpad
Architecture




Secure real-time collaboration with   and Etherpad
Etherpad
 Etherpad is probably the most famous
 pad server implementation: it was born
 in 2008 by some Google employees.

 Etherpad itself is implemented in
 JavaScript, through the Node,js
 application environment.

 Etherpad was the first web application
 of its kind to achieve true real-time
 performance, 

 The home page is on: http://etherpad.org




Secure real-time collaboration with         and Etherpad
Apache HTTPd
Apache will be handling all data comunication from the external world, playing an important role for securing
communication. In particular, the Apache web server will be performing the following roles:



       SSL termination


      Reverse proxy to the Etherpad web server on Node.js


       Authenticating the user using the SecurePass Web Single Sing-On feature


      Limitation of the SecurePass domains/realm for using the pad only within your company or allowing external partners

       Translating the user identity into something that Etherpad is able to understand


  We will not go in details on how to create a virtual server with the SSL feature.
  The configuration has been tested with CentOS 6.




  Secure real-time collaboration with                  and Etherpad
Apache configuration
for SecurePass
Follow the instructions on this website:
http://support.secure-pass.net/wiki/index.php/Apache
and ensure you have these values set:



 CASCookiePath /var/cache/mod_auth_cas/
 CASValidateServer Off
 CASLoginURL https://login.secure-pass.net/cas/login
 CASValidateURL https://login.secure-pass.net/cas/serviceValidate
 CASAllowWildcardCert On


In CentOS you have to create the path
 
/var/cache/mod_auth_cas/




 Secure real-time collaboration with                     and Etherpad
Apache Reverse Proxy
The following statement has to be copied
in the Apache virtual host and will reverse
proxy all the requests to the Etherpad
service, with the exception of the
administrative interface of Etherpad.


 ProxyVia On
 ProxyRequests Off
 ProxyPass /admin !
 ProxyPass / http://127.0.0.1:9001/ retry=0
 ProxyPassReverse / http://127.0.0.1:9001/
 ProxyPreserveHost on
 <Proxy *>
   Options FollowSymLinks MultiViews
   AllowOverride All
   Order allow,deny
   allow from all
 </Proxy>




 Secure real-time collaboration with          and Etherpad
Install SecurePass
Apache module
This module will introduce the feature of limiting the access
to the Etherpad to your company or the partners/companies
you wish to cooperate with.

Please download from the following site:

https://github.com/AlessandroLorenzi/mod_authz_securepass

and follow the instructions in the INSTALL file




  Secure real-time collaboration with                 and Etherpad
Configure authentication
in Apache
The following statement has to be copied in the                             <Location />
Apache virtual host and will enable:                                         AuthType CAS
                                                                              Require sprealm mycompany.com partner.net
1.       Authentication with SecurePass                                     RewriteEngine On

2.       Limit the access to the realms listed in "Require                  RewriteCond %{REMOTE_USER} (.+)
         sprealm" directive (modify as appropriate)                         RewriteRule . - [E=RU:%1]
                                                                            RequestHeader add X-Forwarded-User %{RU}e
3.       Pass the REMOTE_USER variable as the
         X-Forwarded-User header                                            Header Set Cache-Control "max-age=0, no-store"

                                                                            </Location>




     Secure real-time collaboration with                     and Etherpad
Install and Integration
Etherpad
To install Etherpad in your system, please                  Install the plugin sotauth to be able to
follow the instructions in the web site:                    identify the user via the X-Forwarded-
                                                            user HTTP header:

https://help.ubuntu.com/community/                          https://github.com/wtsi-hgi/ep_sotauth
Etherpad-liteInstallation

Note that in the website there is also an
upstart configuration file that will work                     In the Etherpad configuration file
also on CentOS 6.                                           "settings.json" enable
                                                            "requireAuthentication" and
In our installation we also used MySQL to                   "requireAuthorization"
have a more production-ready database.




  Secure real-time collaboration with        and Etherpad
Conclusions
A lot of organisations are now
adopting a collaboration tool
to improve efficiency: the easy
model of Etherpad with the
trusted protection of
SecurePass let the cloud be the
right tool to save your time and
money. 

Once the secure pad tool has
been implemented and become a
part of everyday business,
your business could rely on a new
fast way to engage with partners,
customers and your team.




  Secure real-time collaboration with   and Etherpad
Your daily
                     secure
                   business
                     online




Sponsored by



www.secure-pass.net            www.moresi.com

More Related Content

What's hot

JavaOne India 2011 - Running your Java EE 6 Apps in the Cloud
JavaOne India 2011 - Running your Java EE 6 Apps in the CloudJavaOne India 2011 - Running your Java EE 6 Apps in the Cloud
JavaOne India 2011 - Running your Java EE 6 Apps in the Cloud
Arun Gupta
 
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
Jan Löffler
 
Stups.io - an Open Source Cloud Framework for AWS
Stups.io - an Open Source Cloud Framework for AWSStups.io - an Open Source Cloud Framework for AWS
Stups.io - an Open Source Cloud Framework for AWS
Jan Löffler
 
Az 104 session 2 implement and manage azure webapps and container
Az 104 session 2 implement and manage azure webapps and containerAz 104 session 2 implement and manage azure webapps and container
Az 104 session 2 implement and manage azure webapps and container
AzureEzy1
 
AZ-204 : Implement Azure security
AZ-204 : Implement Azure securityAZ-204 : Implement Azure security
AZ-204 : Implement Azure security
AzureEzy1
 
Informology - Introduction to juju
Informology - Introduction to jujuInformology - Introduction to juju
Informology - Introduction to juju
Khairul Aizat Kamarudzzaman
 
Az 900 session 2-core azure services
Az 900 session 2-core azure servicesAz 900 session 2-core azure services
Az 900 session 2-core azure services
AzureEzy1
 
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
Louis Göhl
 
AZ-400: Define and implement continuous integration – Part 2
AZ-400: Define and implement continuous integration – Part 2AZ-400: Define and implement continuous integration – Part 2
AZ-400: Define and implement continuous integration – Part 2
AzureEzy1
 
Az 104 session 3 azure compute
Az 104 session 3 azure compute Az 104 session 3 azure compute
Az 104 session 3 azure compute
AzureEzy1
 

What's hot (10)

JavaOne India 2011 - Running your Java EE 6 Apps in the Cloud
JavaOne India 2011 - Running your Java EE 6 Apps in the CloudJavaOne India 2011 - Running your Java EE 6 Apps in the Cloud
JavaOne India 2011 - Running your Java EE 6 Apps in the Cloud
 
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
GOTO Copenhagen - Radical Agility with Autonomous Teams and Microservices in ...
 
Stups.io - an Open Source Cloud Framework for AWS
Stups.io - an Open Source Cloud Framework for AWSStups.io - an Open Source Cloud Framework for AWS
Stups.io - an Open Source Cloud Framework for AWS
 
Az 104 session 2 implement and manage azure webapps and container
Az 104 session 2 implement and manage azure webapps and containerAz 104 session 2 implement and manage azure webapps and container
Az 104 session 2 implement and manage azure webapps and container
 
AZ-204 : Implement Azure security
AZ-204 : Implement Azure securityAZ-204 : Implement Azure security
AZ-204 : Implement Azure security
 
Informology - Introduction to juju
Informology - Introduction to jujuInformology - Introduction to juju
Informology - Introduction to juju
 
Az 900 session 2-core azure services
Az 900 session 2-core azure servicesAz 900 session 2-core azure services
Az 900 session 2-core azure services
 
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
SIA319 What's Windows Server 2008 R2 Going to Do for Your Active Directory?
 
AZ-400: Define and implement continuous integration – Part 2
AZ-400: Define and implement continuous integration – Part 2AZ-400: Define and implement continuous integration – Part 2
AZ-400: Define and implement continuous integration – Part 2
 
Az 104 session 3 azure compute
Az 104 session 3 azure compute Az 104 session 3 azure compute
Az 104 session 3 azure compute
 

Similar to Secure real-time collaboration with SecurePass and Etherpad

Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutions
Nick Owen
 
Tame Your Build And Deployment Process With Hudson, PHPUnit, and SSH
Tame Your Build And Deployment Process With Hudson, PHPUnit, and SSHTame Your Build And Deployment Process With Hudson, PHPUnit, and SSH
Tame Your Build And Deployment Process With Hudson, PHPUnit, and SSH
David Stockton
 
Single Sign-On for APEX applications based on Kerberos (Important: latest ver...
Single Sign-On for APEX applications based on Kerberos (Important: latest ver...Single Sign-On for APEX applications based on Kerberos (Important: latest ver...
Single Sign-On for APEX applications based on Kerberos (Important: latest ver...
Niels de Bruijn
 
Building APIs with NodeJS on Microsoft Azure Websites - Redmond
Building APIs with NodeJS on Microsoft Azure Websites - RedmondBuilding APIs with NodeJS on Microsoft Azure Websites - Redmond
Building APIs with NodeJS on Microsoft Azure Websites - Redmond
Rick G. Garibay
 
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the ProxyCloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Maki Toshio
 
PVS-Studio: analyzing pull requests in Azure DevOps using self-hosted agents
PVS-Studio: analyzing pull requests in Azure DevOps using self-hosted agentsPVS-Studio: analyzing pull requests in Azure DevOps using self-hosted agents
PVS-Studio: analyzing pull requests in Azure DevOps using self-hosted agents
Andrey Karpov
 
Automation in Digital Cloud Labs
Automation in Digital Cloud LabsAutomation in Digital Cloud Labs
Automation in Digital Cloud Labs
RapidValue
 
Windows azure overview for SharePoint Pros
Windows azure overview for SharePoint Pros Windows azure overview for SharePoint Pros
Windows azure overview for SharePoint Pros
Usama Wahab Khan Cloud, Data and AI
 
Magento security best practices magento's approach to pci compliance
Magento security best practices  magento's approach to pci complianceMagento security best practices  magento's approach to pci compliance
Magento security best practices magento's approach to pci compliance
Ritwik Das
 
ArcMC for Azure 2.2 Setup Guide
ArcMC for Azure 2.2 Setup GuideArcMC for Azure 2.2 Setup Guide
ArcMC for Azure 2.2 Setup Guide
Protect724mouni
 
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...
Patrick Chanezon
 
Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...
Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...
Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...
Docker, Inc.
 
Using aphace-as-proxy-server
Using aphace-as-proxy-serverUsing aphace-as-proxy-server
Using aphace-as-proxy-server
HARRY CHAN PUTRA
 
Security Testing Using Infrastructure-As-Code
Security Testing Using Infrastructure-As-CodeSecurity Testing Using Infrastructure-As-Code
Security Testing Using Infrastructure-As-Code
Vision Concepts Infrastructure Services Solution
 
presentation @ docker meetup
presentation @ docker meetuppresentation @ docker meetup
presentation @ docker meetup
Daniël van Gils
 
Week 4 lecture material cc (1)
Week 4 lecture material cc (1)Week 4 lecture material cc (1)
Week 4 lecture material cc (1)
Ankit Gupta
 
week 4_watermark.pdfffffffffffffffffffff
week 4_watermark.pdfffffffffffffffffffffweek 4_watermark.pdfffffffffffffffffffff
week 4_watermark.pdfffffffffffffffffffff
anushka2002ece
 
Industrialization, be fast be furious!
Industrialization, be fast be furious!Industrialization, be fast be furious!
Industrialization, be fast be furious!
Patrick Morin
 
docker.docx
docker.docxdocker.docx
docker.docx
ssuser97943d
 
Cloud Foundry a Developer's Perspective
Cloud Foundry a Developer's PerspectiveCloud Foundry a Developer's Perspective
Cloud Foundry a Developer's Perspective
Dave McCrory
 

Similar to Secure real-time collaboration with SecurePass and Etherpad (20)

Securing Network Access with Open Source solutions
Securing Network Access with Open Source solutionsSecuring Network Access with Open Source solutions
Securing Network Access with Open Source solutions
 
Tame Your Build And Deployment Process With Hudson, PHPUnit, and SSH
Tame Your Build And Deployment Process With Hudson, PHPUnit, and SSHTame Your Build And Deployment Process With Hudson, PHPUnit, and SSH
Tame Your Build And Deployment Process With Hudson, PHPUnit, and SSH
 
Single Sign-On for APEX applications based on Kerberos (Important: latest ver...
Single Sign-On for APEX applications based on Kerberos (Important: latest ver...Single Sign-On for APEX applications based on Kerberos (Important: latest ver...
Single Sign-On for APEX applications based on Kerberos (Important: latest ver...
 
Building APIs with NodeJS on Microsoft Azure Websites - Redmond
Building APIs with NodeJS on Microsoft Azure Websites - RedmondBuilding APIs with NodeJS on Microsoft Azure Websites - Redmond
Building APIs with NodeJS on Microsoft Azure Websites - Redmond
 
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the ProxyCloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
Cloud Foundry Day in Tokyo Lightning Talk - Cloud Foundry over the Proxy
 
PVS-Studio: analyzing pull requests in Azure DevOps using self-hosted agents
PVS-Studio: analyzing pull requests in Azure DevOps using self-hosted agentsPVS-Studio: analyzing pull requests in Azure DevOps using self-hosted agents
PVS-Studio: analyzing pull requests in Azure DevOps using self-hosted agents
 
Automation in Digital Cloud Labs
Automation in Digital Cloud LabsAutomation in Digital Cloud Labs
Automation in Digital Cloud Labs
 
Windows azure overview for SharePoint Pros
Windows azure overview for SharePoint Pros Windows azure overview for SharePoint Pros
Windows azure overview for SharePoint Pros
 
Magento security best practices magento's approach to pci compliance
Magento security best practices  magento's approach to pci complianceMagento security best practices  magento's approach to pci compliance
Magento security best practices magento's approach to pci compliance
 
ArcMC for Azure 2.2 Setup Guide
ArcMC for Azure 2.2 Setup GuideArcMC for Azure 2.2 Setup Guide
ArcMC for Azure 2.2 Setup Guide
 
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...
Docker Azure Friday OSS March 2017 - Developing and deploying Java & Linux on...
 
Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...
Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...
Overseeing Ship's Surveys and Surveyors Globally Using IoT and Docker by Jay ...
 
Using aphace-as-proxy-server
Using aphace-as-proxy-serverUsing aphace-as-proxy-server
Using aphace-as-proxy-server
 
Security Testing Using Infrastructure-As-Code
Security Testing Using Infrastructure-As-CodeSecurity Testing Using Infrastructure-As-Code
Security Testing Using Infrastructure-As-Code
 
presentation @ docker meetup
presentation @ docker meetuppresentation @ docker meetup
presentation @ docker meetup
 
Week 4 lecture material cc (1)
Week 4 lecture material cc (1)Week 4 lecture material cc (1)
Week 4 lecture material cc (1)
 
week 4_watermark.pdfffffffffffffffffffff
week 4_watermark.pdfffffffffffffffffffffweek 4_watermark.pdfffffffffffffffffffff
week 4_watermark.pdfffffffffffffffffffff
 
Industrialization, be fast be furious!
Industrialization, be fast be furious!Industrialization, be fast be furious!
Industrialization, be fast be furious!
 
docker.docx
docker.docxdocker.docx
docker.docx
 
Cloud Foundry a Developer's Perspective
Cloud Foundry a Developer's PerspectiveCloud Foundry a Developer's Perspective
Cloud Foundry a Developer's Perspective
 

More from Giuseppe Paterno'

OpenStack e le nuove Infrastrutture IT
OpenStack e le nuove Infrastrutture ITOpenStack e le nuove Infrastrutture IT
OpenStack e le nuove Infrastrutture IT
Giuseppe Paterno'
 
OpenStack Explained: Learn OpenStack architecture and the secret of a success...
OpenStack Explained: Learn OpenStack architecture and the secret of a success...OpenStack Explained: Learn OpenStack architecture and the secret of a success...
OpenStack Explained: Learn OpenStack architecture and the secret of a success...
Giuseppe Paterno'
 
Let's sleep better: programming techniques to face new security attacks in cloud
Let's sleep better: programming techniques to face new security attacks in cloudLet's sleep better: programming techniques to face new security attacks in cloud
Let's sleep better: programming techniques to face new security attacks in cloudGiuseppe Paterno'
 
OpenStack: Security Beyond Firewalls
OpenStack: Security Beyond FirewallsOpenStack: Security Beyond Firewalls
OpenStack: Security Beyond Firewalls
Giuseppe Paterno'
 
Remote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise LinuxRemote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise LinuxGiuseppe Paterno'
 
Il problema dei furti di identità nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identità nelle infrastrutture Cloud e possibili rimediIl problema dei furti di identità nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identità nelle infrastrutture Cloud e possibili rimediGiuseppe Paterno'
 
How the Post-PC era changed IT Ubuntu for next gen datacenters
How the Post-PC era changed IT Ubuntu for next gen datacentersHow the Post-PC era changed IT Ubuntu for next gen datacenters
How the Post-PC era changed IT Ubuntu for next gen datacentersGiuseppe Paterno'
 
Filesystem Comparison: NFS vs GFS2 vs OCFS2
Filesystem Comparison: NFS vs GFS2 vs OCFS2Filesystem Comparison: NFS vs GFS2 vs OCFS2
Filesystem Comparison: NFS vs GFS2 vs OCFS2Giuseppe Paterno'
 
Creating OTP with free software
Creating OTP with free softwareCreating OTP with free software
Creating OTP with free softwareGiuseppe Paterno'
 
Protecting confidential files using SE-Linux
Protecting confidential files using SE-LinuxProtecting confidential files using SE-Linux
Protecting confidential files using SE-LinuxGiuseppe Paterno'
 
Comparing IaaS: VMware vs OpenStack vs Google’s Ganeti
Comparing IaaS: VMware vs OpenStack vs Google’s GanetiComparing IaaS: VMware vs OpenStack vs Google’s Ganeti
Comparing IaaS: VMware vs OpenStack vs Google’s Ganeti
Giuseppe Paterno'
 
La gestione delle identità per il controllo delle frodi bancarie
La gestione delle identità per il controllo delle frodi bancarieLa gestione delle identità per il controllo delle frodi bancarie
La gestione delle identità per il controllo delle frodi bancarie
Giuseppe Paterno'
 
Identity theft in the Cloud and remedies
Identity theft in the Cloud and remediesIdentity theft in the Cloud and remedies
Identity theft in the Cloud and remedies
Giuseppe Paterno'
 
Il problema dei furti di identita' nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identita' nelle infrastrutture Cloud e possibili rimediIl problema dei furti di identita' nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identita' nelle infrastrutture Cloud e possibili rimedi
Giuseppe Paterno'
 

More from Giuseppe Paterno' (15)

OpenStack e le nuove Infrastrutture IT
OpenStack e le nuove Infrastrutture ITOpenStack e le nuove Infrastrutture IT
OpenStack e le nuove Infrastrutture IT
 
OpenStack Explained: Learn OpenStack architecture and the secret of a success...
OpenStack Explained: Learn OpenStack architecture and the secret of a success...OpenStack Explained: Learn OpenStack architecture and the secret of a success...
OpenStack Explained: Learn OpenStack architecture and the secret of a success...
 
Let's sleep better: programming techniques to face new security attacks in cloud
Let's sleep better: programming techniques to face new security attacks in cloudLet's sleep better: programming techniques to face new security attacks in cloud
Let's sleep better: programming techniques to face new security attacks in cloud
 
SecurePass at OpenBrighton
SecurePass at OpenBrightonSecurePass at OpenBrighton
SecurePass at OpenBrighton
 
OpenStack: Security Beyond Firewalls
OpenStack: Security Beyond FirewallsOpenStack: Security Beyond Firewalls
OpenStack: Security Beyond Firewalls
 
Remote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise LinuxRemote security with Red Hat Enterprise Linux
Remote security with Red Hat Enterprise Linux
 
Il problema dei furti di identità nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identità nelle infrastrutture Cloud e possibili rimediIl problema dei furti di identità nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identità nelle infrastrutture Cloud e possibili rimedi
 
How the Post-PC era changed IT Ubuntu for next gen datacenters
How the Post-PC era changed IT Ubuntu for next gen datacentersHow the Post-PC era changed IT Ubuntu for next gen datacenters
How the Post-PC era changed IT Ubuntu for next gen datacenters
 
Filesystem Comparison: NFS vs GFS2 vs OCFS2
Filesystem Comparison: NFS vs GFS2 vs OCFS2Filesystem Comparison: NFS vs GFS2 vs OCFS2
Filesystem Comparison: NFS vs GFS2 vs OCFS2
 
Creating OTP with free software
Creating OTP with free softwareCreating OTP with free software
Creating OTP with free software
 
Protecting confidential files using SE-Linux
Protecting confidential files using SE-LinuxProtecting confidential files using SE-Linux
Protecting confidential files using SE-Linux
 
Comparing IaaS: VMware vs OpenStack vs Google’s Ganeti
Comparing IaaS: VMware vs OpenStack vs Google’s GanetiComparing IaaS: VMware vs OpenStack vs Google’s Ganeti
Comparing IaaS: VMware vs OpenStack vs Google’s Ganeti
 
La gestione delle identità per il controllo delle frodi bancarie
La gestione delle identità per il controllo delle frodi bancarieLa gestione delle identità per il controllo delle frodi bancarie
La gestione delle identità per il controllo delle frodi bancarie
 
Identity theft in the Cloud and remedies
Identity theft in the Cloud and remediesIdentity theft in the Cloud and remedies
Identity theft in the Cloud and remedies
 
Il problema dei furti di identita' nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identita' nelle infrastrutture Cloud e possibili rimediIl problema dei furti di identita' nelle infrastrutture Cloud e possibili rimedi
Il problema dei furti di identita' nelle infrastrutture Cloud e possibili rimedi
 

Recently uploaded

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 

Recently uploaded (20)

JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 

Secure real-time collaboration with SecurePass and Etherpad

  • 1. Secure real-time collaboration with SecurePass and Etherpad Giuseppe Paterno', IT Security Architect and CTO, GARL Luca Oldano, Senior Network and Security Engineer, Moresi.com
  • 2. What is a "Pad" A "Pad" is an on-line web-based collaborative real-time editor, allowing authors to simultaneously edit a text document, and see all of  the participants' edits in real-time, with the ability to display each  author's text in their own color. Anyone can create a new collaborative document, known as a "pad". Each pad has its own URL and anyone who knows this URL can edit the pad and participate in the  associated chats. Password-protected pads are also possible. Each participant is identified by a color and a name. The software auto-saves the document at regular, short intervals, but  participants can permanently save specific versions (checkpoints) at  any time. A "time machine" feature allows anyone to explore the history of the pad, going back in the past release. The major "milestones" can also be tagged (or "stared").  A great feature of some pads is that document can be imported and exported in plain text, HTML, Open Document, Microsoft Word, or PDF format. Secure real-time collaboration with and Etherpad
  • 3. Working with "Pads" Working with pads is business going social:  social networks get us used to be always updated and connected to our community anytime and anywhere.  A pad follow that mindset and enables you with a simple tool to collaborate with your colleagues and partners while ensuring the right level of privacy online. Consider a pad like a clear whiteboard, open a new one and simply start writing an idea or a challenge. Invite your team, your partners, your external collaborators -no matter where they are- to share your ideas at the same time. Let  the pad grow with the contribution and the experience of trusted  people, every projects has the right team that are ready to contribute.  Review and compare the text with preview versions, until you'll find the answer and achieve your goal. Then export it, in your favourite format and share it. For example, write project documentations with your team through a pad and deliver it in a professional way using your favorite tool such as Microsoft Word. Secure real-time collaboration with and Etherpad
  • 4. Secure real-time collaboration Innovate, experiment, engage your customers in an easy and secure way. With a shared pad in a protected enviroment, it's easy focus on core facts and forget about your information being accessed from unauthorized users. All you have to do is following the speed of business.  Secure cooperation with employees and partners is now possible on the cloud with the protection of SecurePass. Access to a pad is as easy as sharing the web adress of your pad, SecurePass will ensure that access to information is allowed only to authorized users.  By integrating a pad with SecurePass you will be able to: ‣identify your employees and partners in a proper way ‣limit access to your company and/or your partners (with Apache module) ‣cooperate from anywhere, also through tablets and smartphones, without fear of loosing precious company information Secure real-time collaboration with and Etherpad
  • 6. Etherpad Etherpad is probably the most famous pad server implementation: it was born in 2008 by some Google employees. Etherpad itself is implemented in JavaScript, through the Node,js application environment. Etherpad was the first web application of its kind to achieve true real-time performance,  The home page is on: http://etherpad.org Secure real-time collaboration with and Etherpad
  • 7. Apache HTTPd Apache will be handling all data comunication from the external world, playing an important role for securing communication. In particular, the Apache web server will be performing the following roles: SSL termination Reverse proxy to the Etherpad web server on Node.js Authenticating the user using the SecurePass Web Single Sing-On feature Limitation of the SecurePass domains/realm for using the pad only within your company or allowing external partners Translating the user identity into something that Etherpad is able to understand We will not go in details on how to create a virtual server with the SSL feature. The configuration has been tested with CentOS 6. Secure real-time collaboration with and Etherpad
  • 8. Apache configuration for SecurePass Follow the instructions on this website: http://support.secure-pass.net/wiki/index.php/Apache and ensure you have these values set: CASCookiePath /var/cache/mod_auth_cas/ CASValidateServer Off CASLoginURL https://login.secure-pass.net/cas/login CASValidateURL https://login.secure-pass.net/cas/serviceValidate CASAllowWildcardCert On In CentOS you have to create the path   /var/cache/mod_auth_cas/ Secure real-time collaboration with and Etherpad
  • 9. Apache Reverse Proxy The following statement has to be copied in the Apache virtual host and will reverse proxy all the requests to the Etherpad service, with the exception of the administrative interface of Etherpad. ProxyVia On ProxyRequests Off ProxyPass /admin ! ProxyPass / http://127.0.0.1:9001/ retry=0 ProxyPassReverse / http://127.0.0.1:9001/ ProxyPreserveHost on <Proxy *> Options FollowSymLinks MultiViews AllowOverride All Order allow,deny allow from all </Proxy> Secure real-time collaboration with and Etherpad
  • 10. Install SecurePass Apache module This module will introduce the feature of limiting the access to the Etherpad to your company or the partners/companies you wish to cooperate with. Please download from the following site: https://github.com/AlessandroLorenzi/mod_authz_securepass and follow the instructions in the INSTALL file Secure real-time collaboration with and Etherpad
  • 11. Configure authentication in Apache The following statement has to be copied in the <Location /> Apache virtual host and will enable: AuthType CAS Require sprealm mycompany.com partner.net 1. Authentication with SecurePass RewriteEngine On 2. Limit the access to the realms listed in "Require RewriteCond %{REMOTE_USER} (.+) sprealm" directive (modify as appropriate) RewriteRule . - [E=RU:%1] RequestHeader add X-Forwarded-User %{RU}e 3. Pass the REMOTE_USER variable as the X-Forwarded-User header Header Set Cache-Control "max-age=0, no-store" </Location> Secure real-time collaboration with and Etherpad
  • 12. Install and Integration Etherpad To install Etherpad in your system, please Install the plugin sotauth to be able to follow the instructions in the web site: identify the user via the X-Forwarded- user HTTP header: https://help.ubuntu.com/community/ https://github.com/wtsi-hgi/ep_sotauth Etherpad-liteInstallation Note that in the website there is also an upstart configuration file that will work In the Etherpad configuration file also on CentOS 6. "settings.json" enable "requireAuthentication" and In our installation we also used MySQL to "requireAuthorization" have a more production-ready database. Secure real-time collaboration with and Etherpad
  • 13. Conclusions A lot of organisations are now adopting a collaboration tool to improve efficiency: the easy model of Etherpad with the trusted protection of SecurePass let the cloud be the right tool to save your time and money.  Once the secure pad tool has been implemented and become a part of everyday business, your business could rely on a new fast way to engage with partners, customers and your team. Secure real-time collaboration with and Etherpad
  • 14. Your daily secure business online Sponsored by www.secure-pass.net www.moresi.com