In today’s digitally-driven world, connecting multiple systems is a must for any organization. As organizations use different systems, websites and much more, a single authentication mechanism is highly beneficial.
Single Sign-On (SSO) is a user authentication service that permits a user to use one set of login credentials (for example, their name and password) to access multiple systems.
Configuring Outbound SSL connection to invoke secured RESTPradeep Mishra
This document outlines the steps to configure an Oracle SOA 12c environment to invoke SSL-secured REST/SOAP web services. It describes verifying the keystore configuration in WebLogic Server, importing SSL certificates into the Oracle keystore, and concluding that following these steps will allow the SOA environment to make SSL calls to exposed web services.
This document describes how to enable auditing for a user in Office 365. It involves running the Windows Azure Active Directory PowerShell module as an administrator, authenticating with Office 365 admin credentials, and using the Set-Mailbox cmdlet to set the AuditEnabled property to true for a specific user's mailbox. This will enable auditing to track actions performed in that user's Office 365 mailbox.
Visual Programming Framework for Unity - UniFlow のご紹介Mori Tetsuya
This document contains code snippets and configuration files related to Unity packages and message handling in a messaging system. It includes a JSON file listing dependencies and scoped package registries, code for connecting a message handler and annotating messages as composable or collectable, and release information for a messaging library called UniFlow.
Architecting Secure and Compliant Applications with MongoDB MongoDB
High profile security breaches have become embarrassingly common, but ultimately avoidable. Now more than ever, database security is a critical component of any production application. In this talk we'll learn to secure your deployment in accordance with best practices and compliance regulations. We'll explore the MongoDB Enterprise features which ensure HIPAA and PCI compliance, and protect you against attack, data exposure and a damaged reputation.
Open source wso2 identity server sso with drupal 8Iwantha Lekamge
Single sign-on is important for government agencies to maintain a single authentication mechanism among their systems. Open Source WSO2 Identity Server can connect with Drupal 8 and create an SSO environment for government agencies.
Configuration Management Tools on NX-OSCisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. On Cisco Nexus devices, configuration is performed using command-line interfaces (CLIs) that run only on the device. Configuration Management Tools allow you to automate the network devices configuration in the same way sysadmin have automated the server configuration. These tools include Puppet, Chef and Ansible. We will be introducing the concept of each of them, agent vs agent-less and demoing some use cases.
We will also describe some of the technology enablers like NX-API REST that allows you to enable configurations that would require issuing many CLI commands by combining configuration actions in relatively few HTTP/HTTPS operations."
Single Sign-On (SSO) is a user authentication service that permits a user to use one set of login credentials (for example, their name and password) to access multiple systems.
Configuring Outbound SSL connection to invoke secured RESTPradeep Mishra
This document outlines the steps to configure an Oracle SOA 12c environment to invoke SSL-secured REST/SOAP web services. It describes verifying the keystore configuration in WebLogic Server, importing SSL certificates into the Oracle keystore, and concluding that following these steps will allow the SOA environment to make SSL calls to exposed web services.
This document describes how to enable auditing for a user in Office 365. It involves running the Windows Azure Active Directory PowerShell module as an administrator, authenticating with Office 365 admin credentials, and using the Set-Mailbox cmdlet to set the AuditEnabled property to true for a specific user's mailbox. This will enable auditing to track actions performed in that user's Office 365 mailbox.
Visual Programming Framework for Unity - UniFlow のご紹介Mori Tetsuya
This document contains code snippets and configuration files related to Unity packages and message handling in a messaging system. It includes a JSON file listing dependencies and scoped package registries, code for connecting a message handler and annotating messages as composable or collectable, and release information for a messaging library called UniFlow.
Architecting Secure and Compliant Applications with MongoDB MongoDB
High profile security breaches have become embarrassingly common, but ultimately avoidable. Now more than ever, database security is a critical component of any production application. In this talk we'll learn to secure your deployment in accordance with best practices and compliance regulations. We'll explore the MongoDB Enterprise features which ensure HIPAA and PCI compliance, and protect you against attack, data exposure and a damaged reputation.
Open source wso2 identity server sso with drupal 8Iwantha Lekamge
Single sign-on is important for government agencies to maintain a single authentication mechanism among their systems. Open Source WSO2 Identity Server can connect with Drupal 8 and create an SSO environment for government agencies.
Configuration Management Tools on NX-OSCisco DevNet
A session in the DevNet Zone at Cisco Live, Berlin. On Cisco Nexus devices, configuration is performed using command-line interfaces (CLIs) that run only on the device. Configuration Management Tools allow you to automate the network devices configuration in the same way sysadmin have automated the server configuration. These tools include Puppet, Chef and Ansible. We will be introducing the concept of each of them, agent vs agent-less and demoing some use cases.
We will also describe some of the technology enablers like NX-API REST that allows you to enable configurations that would require issuing many CLI commands by combining configuration actions in relatively few HTTP/HTTPS operations."
Expanding your impact with programmability in the data centerCisco Canada
1) Digital readiness involves embracing automation, operational simplicity through programmability, network disaggregation, and DevOps to drive speed and agility.
2) Programmability allows for more flexibility, innovation, speed, repeatability and fewer mistakes by enabling automated workflows, off-box management via controllers and APIs, and SDKs for application development.
3) Adopting programmability means network operations will need to understand concepts like REST, XML, JSON, and work with developers to automate tasks and integrate the network.
Što danas zamjenjuje Small Business Server?Tomislav Lulic
Jos uvijek je dosta nezadovoljnih zbog nestanka Small Business Servera. No, da li stvarno moraju biti nezadovoljni? Prebacivanjem vecine servisa u Cloud uz pomoc Office 365 korisnik dobiva puno više nego je prije imao. Kroz demo pokazati koji su servisi poboljšani, koje promjene u poslovanju mogu korisnici (u SMB segementu) očekivati. Kroz demo pokazati kako Windows Server 2012 R2 Essential i Office 365 mogu pružiti Enterprise mogućnosti manjim tvrtkama koje nemaju zaposlene IT stručnjake.
Oracle Identity Management presentation for 2010 Conference presented by Peter McLarty, looks at installation issues, planning and design, overall view of 11g Identity Management, more detailed look at installation and configuration of the Oracle Internet Directory.
Presentation on Oracle Identity Management from Insync10 conference in Melbourne August 2010. Looks at OID and some of the potential issues around installation and configuration
This document provides instructions for installing and configuring Adobe Connect and integrating it with Moodle. It discusses installing Adobe Connect on-premises or using the SaaS version. It then covers configuring settings in Connect and Moodle to enable single sign-on between the two systems. Troubleshooting tips are also provided for issues with multi-byte user/meeting names and possible bugs. Lastly, using multiple IP addresses with Connect on Amazon EC2 is discussed.
Node is used to build a reverse proxy to provide secure access to internal web resources and sites for mobile clients within a large enterprise. Performance testing shows the proxy can handle over 1000 requests per second with latency under 1 second. Code quality analysis tools like Plato and testing frameworks like Jest are useful for maintaining high quality code. Scalability is achieved through auto-scaling virtual machine instances with a load balancer and configuration management.
PSU Security Conference 2015 - LAPS PresentationDan Barr
This document discusses the Local Administrator Password Solution (LAPS) created by Microsoft to securely manage unique local administrator passwords on systems. LAPS uses Active Directory and Group Policy to randomly generate and centrally store administrator passwords, reducing the risk of password sharing attacks. It extends the AD schema, uses a client-side DLL to generate and reset passwords periodically based on Group Policy, and provides tools to configure and manage passwords. LAPS aims to mitigate pass-the-hash attacks while maintaining a simple implementation without additional infrastructure requirements.
This document provides an overview of booting Oracle WebLogic server instances. It discusses the key components involved, including Node Manager and WebLogic Scripting Tool (WLST). It recommends using Node Manager to start the Administration Server and WLST to start managed servers. Sample scripts are provided to start all servers using this approach. The document also covers encrypting credentials, configuring Node Manager as a Windows service, and other tips.
Enterprise Node - Securing Your EnvironmentKurtis Kemple
This document discusses securing an enterprise Node.js environment. It recommends using Node LTS versions for stability, containerizing applications for isolation, and securing dependencies by whitelisting modules. It also covers authenticating users with JWT, authorizing access with scopes and roles, validating input data, encrypting sensitive data, and ensuring HTTPS is used everywhere. Securing the runtime is important to protect the company from threats, improve confidence, and meet regulations.
Building and Managing your Virtual Datacenter using PowerShell DSC - Florin L...ITCamp
PowerShell DSC is a configuration management platform that provides the operations team the capability to deploy and manage systems by defining the desired configuration of a machine while having the assurance that whatever happens, the machines configuration will remain the same.
In this session you will learn what is PowerShell DSC, and how it can grant you the power of implementing a DevOps oriented environment by building and managing your infrastructure in an automatic and consistent fashion.
This document provides an overview of server management in Windows Server 2008, including primary management tools, initial configuration tasks, alternative management tools, and technical background information. It discusses tools like Server Manager Console, Windows PowerShell, and Remote Management. It also covers managing Server Core installations, centralized application access with Terminal Services, and using a Terminal Services Gateway.
This document summarizes a presentation about OpenIDM. It describes where OpenIDM fits into Open Identity Stack (OIS), common identity management use cases like provisioning and password management that OpenIDM addresses, and OpenIDM features like its REST interface, connectors to external systems, and use of workflows. The architecture of OpenIDM is also summarized, including its components like OSGi, persistence layer, and connectors. Configuration of connectors and potential role management challenges are also briefly outlined.
Red Hat Single Sign-On (RH-SSO) is an identity and access management product based on the open source Keycloak project. The document provides an overview of RH-SSO, including its architecture, core concepts such as authentication, authorization, tokens, and security considerations for deployment. It also discusses clustering, user federation, and identity brokering capabilities.
The document provides an agenda for a MuleSoft Meetup Group meeting in Moscow on May 13, 2021. The agenda includes introductions, MuleSoft updates, a demo and discussion on building secure financial APIs, a networking break, and a demo and discussion on revealing OData capabilities with Mulesoft and connecting it to Salesforce and mobile apps.
Securing Your Enterprise Web Apps with MongoDB Enterprise MongoDB
Speaker: Jay Runkel, Principal Solution Architect, MongoDB
Level: 200 (Intermediate)
Track: Operations
When architecting a MongoDB application, one of the most difficult questions to answer is how much hardware (number of shards, number of replicas, and server specifications) am I going to need for an application. Similarly, when deploying in the cloud, how do you estimate your monthly AWS, Azure, or GCP costs given a description of a new application? While there isn’t a precise formula for mapping application features (e.g., document structure, schema, query volumes) into servers, there are various strategies you can use to estimate the MongoDB cluster sizing. This presentation will cover the questions you need to ask and describe how to use this information to estimate the required cluster size or cloud deployment cost.
What You Will Learn:
- How to architect a sharded cluster that provides the required computing resources while minimizing hardware or cloud computing costs
- How to use this information to estimate the overall cluster requirements for IOPS, RAM, cores, disk space, etc.
- What you need to know about the application to estimate a cluster size
The document discusses the Azure Service Management API which allows users to manage Azure services through a RESTful API. It can be used to perform CRUD operations on hosted services, storage accounts, and other Azure resources. The API uses HTTP verbs like GET, PUT, POST, and DELETE and requires an authentication certificate. Tools like Powershell, the management portal, and third party tools can also be used to manage Azure services by interacting with the Service Management API in the background.
Autonomous Transaction Processing (ATP): In Heavy Traffic, Why Drive Stick?Jim Czuprynski
Autonomous Transaction Processing (ATP) - the second in the family of Oracle’s Autonomous Databases – offers Oracle DBAs the ability to apply a force multiplier for their OLTP database application workloads. However, it’s important to understand both the benefits and limitations of ATP before migrating any workloads to that environment. I'll offer a quick but deep dive into how best to take advantage of ATP - including how to load data quickly into the underlying database – and some ideas on how ATP will impact the role of Oracle DBA in the immediate future. (Hint: Think automatic transmission instead of stick-shift.)
CloudAPI allows users to provision and manage machines as well as perform cloud analysis. It provides APIs, SDKs, and CLIs to create, list, start, stop and delete machines. Users can choose from public datasets and packages to specify machine configurations. CloudAPI also offers instruments and decomposition to monitor infrastructure and obtain metrics for individual machines or zones. Dtrace and JSON tools help further analyze collected data.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
More Related Content
Similar to Single Sign On Across Drupal 8 - DrupalCon Global 2020
Expanding your impact with programmability in the data centerCisco Canada
1) Digital readiness involves embracing automation, operational simplicity through programmability, network disaggregation, and DevOps to drive speed and agility.
2) Programmability allows for more flexibility, innovation, speed, repeatability and fewer mistakes by enabling automated workflows, off-box management via controllers and APIs, and SDKs for application development.
3) Adopting programmability means network operations will need to understand concepts like REST, XML, JSON, and work with developers to automate tasks and integrate the network.
Što danas zamjenjuje Small Business Server?Tomislav Lulic
Jos uvijek je dosta nezadovoljnih zbog nestanka Small Business Servera. No, da li stvarno moraju biti nezadovoljni? Prebacivanjem vecine servisa u Cloud uz pomoc Office 365 korisnik dobiva puno više nego je prije imao. Kroz demo pokazati koji su servisi poboljšani, koje promjene u poslovanju mogu korisnici (u SMB segementu) očekivati. Kroz demo pokazati kako Windows Server 2012 R2 Essential i Office 365 mogu pružiti Enterprise mogućnosti manjim tvrtkama koje nemaju zaposlene IT stručnjake.
Oracle Identity Management presentation for 2010 Conference presented by Peter McLarty, looks at installation issues, planning and design, overall view of 11g Identity Management, more detailed look at installation and configuration of the Oracle Internet Directory.
Presentation on Oracle Identity Management from Insync10 conference in Melbourne August 2010. Looks at OID and some of the potential issues around installation and configuration
This document provides instructions for installing and configuring Adobe Connect and integrating it with Moodle. It discusses installing Adobe Connect on-premises or using the SaaS version. It then covers configuring settings in Connect and Moodle to enable single sign-on between the two systems. Troubleshooting tips are also provided for issues with multi-byte user/meeting names and possible bugs. Lastly, using multiple IP addresses with Connect on Amazon EC2 is discussed.
Node is used to build a reverse proxy to provide secure access to internal web resources and sites for mobile clients within a large enterprise. Performance testing shows the proxy can handle over 1000 requests per second with latency under 1 second. Code quality analysis tools like Plato and testing frameworks like Jest are useful for maintaining high quality code. Scalability is achieved through auto-scaling virtual machine instances with a load balancer and configuration management.
PSU Security Conference 2015 - LAPS PresentationDan Barr
This document discusses the Local Administrator Password Solution (LAPS) created by Microsoft to securely manage unique local administrator passwords on systems. LAPS uses Active Directory and Group Policy to randomly generate and centrally store administrator passwords, reducing the risk of password sharing attacks. It extends the AD schema, uses a client-side DLL to generate and reset passwords periodically based on Group Policy, and provides tools to configure and manage passwords. LAPS aims to mitigate pass-the-hash attacks while maintaining a simple implementation without additional infrastructure requirements.
This document provides an overview of booting Oracle WebLogic server instances. It discusses the key components involved, including Node Manager and WebLogic Scripting Tool (WLST). It recommends using Node Manager to start the Administration Server and WLST to start managed servers. Sample scripts are provided to start all servers using this approach. The document also covers encrypting credentials, configuring Node Manager as a Windows service, and other tips.
Enterprise Node - Securing Your EnvironmentKurtis Kemple
This document discusses securing an enterprise Node.js environment. It recommends using Node LTS versions for stability, containerizing applications for isolation, and securing dependencies by whitelisting modules. It also covers authenticating users with JWT, authorizing access with scopes and roles, validating input data, encrypting sensitive data, and ensuring HTTPS is used everywhere. Securing the runtime is important to protect the company from threats, improve confidence, and meet regulations.
Building and Managing your Virtual Datacenter using PowerShell DSC - Florin L...ITCamp
PowerShell DSC is a configuration management platform that provides the operations team the capability to deploy and manage systems by defining the desired configuration of a machine while having the assurance that whatever happens, the machines configuration will remain the same.
In this session you will learn what is PowerShell DSC, and how it can grant you the power of implementing a DevOps oriented environment by building and managing your infrastructure in an automatic and consistent fashion.
This document provides an overview of server management in Windows Server 2008, including primary management tools, initial configuration tasks, alternative management tools, and technical background information. It discusses tools like Server Manager Console, Windows PowerShell, and Remote Management. It also covers managing Server Core installations, centralized application access with Terminal Services, and using a Terminal Services Gateway.
This document summarizes a presentation about OpenIDM. It describes where OpenIDM fits into Open Identity Stack (OIS), common identity management use cases like provisioning and password management that OpenIDM addresses, and OpenIDM features like its REST interface, connectors to external systems, and use of workflows. The architecture of OpenIDM is also summarized, including its components like OSGi, persistence layer, and connectors. Configuration of connectors and potential role management challenges are also briefly outlined.
Red Hat Single Sign-On (RH-SSO) is an identity and access management product based on the open source Keycloak project. The document provides an overview of RH-SSO, including its architecture, core concepts such as authentication, authorization, tokens, and security considerations for deployment. It also discusses clustering, user federation, and identity brokering capabilities.
The document provides an agenda for a MuleSoft Meetup Group meeting in Moscow on May 13, 2021. The agenda includes introductions, MuleSoft updates, a demo and discussion on building secure financial APIs, a networking break, and a demo and discussion on revealing OData capabilities with Mulesoft and connecting it to Salesforce and mobile apps.
Securing Your Enterprise Web Apps with MongoDB Enterprise MongoDB
Speaker: Jay Runkel, Principal Solution Architect, MongoDB
Level: 200 (Intermediate)
Track: Operations
When architecting a MongoDB application, one of the most difficult questions to answer is how much hardware (number of shards, number of replicas, and server specifications) am I going to need for an application. Similarly, when deploying in the cloud, how do you estimate your monthly AWS, Azure, or GCP costs given a description of a new application? While there isn’t a precise formula for mapping application features (e.g., document structure, schema, query volumes) into servers, there are various strategies you can use to estimate the MongoDB cluster sizing. This presentation will cover the questions you need to ask and describe how to use this information to estimate the required cluster size or cloud deployment cost.
What You Will Learn:
- How to architect a sharded cluster that provides the required computing resources while minimizing hardware or cloud computing costs
- How to use this information to estimate the overall cluster requirements for IOPS, RAM, cores, disk space, etc.
- What you need to know about the application to estimate a cluster size
The document discusses the Azure Service Management API which allows users to manage Azure services through a RESTful API. It can be used to perform CRUD operations on hosted services, storage accounts, and other Azure resources. The API uses HTTP verbs like GET, PUT, POST, and DELETE and requires an authentication certificate. Tools like Powershell, the management portal, and third party tools can also be used to manage Azure services by interacting with the Service Management API in the background.
Autonomous Transaction Processing (ATP): In Heavy Traffic, Why Drive Stick?Jim Czuprynski
Autonomous Transaction Processing (ATP) - the second in the family of Oracle’s Autonomous Databases – offers Oracle DBAs the ability to apply a force multiplier for their OLTP database application workloads. However, it’s important to understand both the benefits and limitations of ATP before migrating any workloads to that environment. I'll offer a quick but deep dive into how best to take advantage of ATP - including how to load data quickly into the underlying database – and some ideas on how ATP will impact the role of Oracle DBA in the immediate future. (Hint: Think automatic transmission instead of stick-shift.)
CloudAPI allows users to provision and manage machines as well as perform cloud analysis. It provides APIs, SDKs, and CLIs to create, list, start, stop and delete machines. Users can choose from public datasets and packages to specify machine configurations. CloudAPI also offers instruments and decomposition to monitor infrastructure and obtain metrics for individual machines or zones. Dtrace and JSON tools help further analyze collected data.
Similar to Single Sign On Across Drupal 8 - DrupalCon Global 2020 (20)
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Essentials of Automations: The Art of Triggers and Actions in FMESafe Software
In this second installment of our Essentials of Automations webinar series, we’ll explore the landscape of triggers and actions, guiding you through the nuances of authoring and adapting workspaces for seamless automations. Gain an understanding of the full spectrum of triggers and actions available in FME, empowering you to enhance your workspaces for efficient automation.
We’ll kick things off by showcasing the most commonly used event-based triggers, introducing you to various automation workflows like manual triggers, schedules, directory watchers, and more. Plus, see how these elements play out in real scenarios.
Whether you’re tweaking your current setup or building from the ground up, this session will arm you with the tools and insights needed to transform your FME usage into a powerhouse of productivity. Join us to discover effective strategies that simplify complex processes, enhancing your productivity and transforming your data management practices with FME. Let’s turn complexity into clarity and make your workspaces work wonders!
Enchancing adoption of Open Source Libraries. A case study on Albumentations.AIVladimir Iglovikov, Ph.D.
Presented by Vladimir Iglovikov:
- https://www.linkedin.com/in/iglovikov/
- https://x.com/viglovikov
- https://www.instagram.com/ternaus/
This presentation delves into the journey of Albumentations.ai, a highly successful open-source library for data augmentation.
Created out of a necessity for superior performance in Kaggle competitions, Albumentations has grown to become a widely used tool among data scientists and machine learning practitioners.
This case study covers various aspects, including:
People: The contributors and community that have supported Albumentations.
Metrics: The success indicators such as downloads, daily active users, GitHub stars, and financial contributions.
Challenges: The hurdles in monetizing open-source projects and measuring user engagement.
Development Practices: Best practices for creating, maintaining, and scaling open-source libraries, including code hygiene, CI/CD, and fast iteration.
Community Building: Strategies for making adoption easy, iterating quickly, and fostering a vibrant, engaged community.
Marketing: Both online and offline marketing tactics, focusing on real, impactful interactions and collaborations.
Mental Health: Maintaining balance and not feeling pressured by user demands.
Key insights include the importance of automation, making the adoption process seamless, and leveraging offline interactions for marketing. The presentation also emphasizes the need for continuous small improvements and building a friendly, inclusive community that contributes to the project's growth.
Vladimir Iglovikov brings his extensive experience as a Kaggle Grandmaster, ex-Staff ML Engineer at Lyft, sharing valuable lessons and practical advice for anyone looking to enhance the adoption of their open-source projects.
Explore more about Albumentations and join the community at:
GitHub: https://github.com/albumentations-team/albumentations
Website: https://albumentations.ai/
LinkedIn: https://www.linkedin.com/company/100504475
Twitter: https://x.com/albumentations
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Single Sign On Across Drupal 8 - DrupalCon Global 2020
1. SSO
.SINGLE SIGN ON ACROSS DRUPAL 8.
I w a n t h a L e k a m g e | A s s o c i a t e T e c h n i c a l L e a d | W S O 2
2. In today’s digitized world, connecting its systems is a must for any organization.
DIGITALLY DRIVEN WORLD
3.
4. Given the number of systems, websites, and more, having a single authentication
mechanism across all systems is highly beneficial.
AUTHENTICATION
5. Single Sign-On (SSO) is a user authentication service that permits a user to use
one set of login credentials (for example, their name and password) to access
multiple systems.
WHAT IS SSO?
6.
7. ● Same user credentials used for multiple systems to simplify login benefits
● Automatic login to federated systems
● Single logout system (SLO)
BENEFITS
8. ● Centralized system to manage users and roles
● Lower operational costs
● Easy migration and configuration with a new system
WHY ORGANIZATIONS NEED SSO
10. Security Assertion Markup Language (SAML) is an XML-based data format for
exchanging authentication and authorization data between an identity provider
and a service provider.
SAML
11. ● Identity Provider (IdP)
The SAML authority that provides the identity assertion to authenticate a user
● Service Provider (SP)
The SAML consumer that provides the service for users
PROVIDERS
15. ● Two Drupal instances
● One instance as SP
● Other instance as IdP
SETTING UP SP AND IDP
16. ● Set up a SimpleSAMLphp library inside the docroot of the Drupal
● Create a symlink and update the .htaccess file
● Configure config.php
● Generate certificates (Run this command inside cert folder)
openssl req -new -x509 -days 3652 -nodes -out saml.crt -keyout saml.pem
SERVICE PROVIDER CONFIGURATIONS
17.
18. ● Set up SimpleSAMLphp library inside the docroot of the Drupal
● Create a symlink and update the .htaccess file
● Update config.php
'enable.saml20-idp' => true
● Enable exampleauth module
cd modules/exampleauth
touch enable
● Configure authsources.php
IDP CONFIGURATIONS
19.
20. ● Generate certificates (Run this command inside cert folder)
cd cert
openssl req -newkey rsa:3072 -new -x509 -days 3652 -nodes -out server.crt -keyout
server.pem
● SAML 2.0 IdP needs to be configured by the metadata stored in
metadata/saml20-idp-hosted.php
metadata/saml20-idp-hosted.php
VERIFYING THE IDP
21.
22. ● Copy IdP metadata to the
metadata/saml20-idp-remote.php file of the SP
● Copy SP metadata to the
metadata/saml20-sp-remote.php file of the IdP
● Configure Service Provider with the IdP name
METADATA
24. ● Download and install the module
● Check ‘Activate authenticate via SimpleSAMLphp’ (Basic settings)
● Change ‘User info and Syncing’
○ uid as the unique identifier for the user
○ uid as the username for the user
○ email as the email address for the user
SIMPLESAMLPHP_AUTH MODULE
26. OPEN SOURCE SSO
● Aerobase
● CAS
● Keycloak
● Shibboleth
● WSO2 Identity Server
27. CONNECT WITH WSO2 IDENTITY SERVER
● Download WSO2 Identity Server
● Run/bin/wso2server.sh on terminal
● Open https://localhost:9443/carbon/ in web browser
● Login to the system
○ Username: admin
○ Password: admin
30. .THANK YOU.
I w a n t h a L e k a m g e | A s s o c i a t e T e c h n i c a l L e a d | W S O 2
E m a i l : i w a n t h a @ w s o 2 . c o m
https://medium.com/@iwantha
https://www.linkedin.com/in/iwantha-lekamge-5b90b629/
https://twitter.com/IwanthaLekamge