SlideShare a Scribd company logo
1 of 2
Download to read offline
Troux Application Flow
[Last Updated: 11/29/2015]
Author: mreams
Client Browser Back-End
CompanyACompanyB
User A
User is logged into computer
with companya.com Active
Directory credentials
ADAuthentication
User invokes in IEbrowser
Portfolio Instance A
The WAFFLE agent runs in front of the
Web Servers as the gateway into the
app. WAFFLE checks the user’s
Windows AD credentials against it’s
configured Troux Roles the person is
or is not assigned to
Waffle
Tomcat
Troux_A
SQL Cluster
ActiveDirectory
User Flow Database
AD Forest
Companya.com
ServiceAccount runs the
Windows service and
brokers against coxinc in
order to see ifthe user is
in AD groups mapped to
Troux Roles
ServiceAccount
AD Forest
Companya.com
Is user
authorized?
User is granted access and
willsee designated content
based on role
Yes
User is not in any Troux roles
and will seeblank content on
the screen or a message
saying access denied
No
User B
User is logged into computer
with companyb.com Active
Directory credentials
ADAuthentication
User invokes in IEbrowser
Portfolio Instance B
The WAFFLE agent runs in front of the
Web Servers as the gateway into the
app. WAFFLE checks the user’s
Windows AD credentials against it’s
configured Troux Roles the person is
or is not assigned to
Waffle
Tomcat
Troux_B
SQL Cluster
AD Forest
Companyb.com
ServiceAccount runs the
Windows service and
brokers against coxinc in
order to see ifthe user is
in AD groups mapped to
Troux Roles
ServiceAccount
AD Forest
Companyb.com
User is granted access and
willsee designated content
based on role
Yes
User is not in any Troux roles
and will seeblank content on
the screen or a message
saying access denied
No
Is user
authorized?
User is granted access
User is granted access
Company A Users
Active Directory
ApplicationLayerNetworkLayer
Portfolio Instance B
Troux App Servers (A)
Virtual Server 1
Waffle
Tomcat
TrouxServer1.domainA.com
Host IP – 0.0.0.0
Data&AccessLayer
Data Storage
Troux_B
Portfolio Instance A
Company B Users
Virtual Server2
Troux App Servers (B)
Virtual Server 1
Virtual Server 2
Troux_A
Waffle
Tomcat
TrouxServer2.domainA.com
Host IP – 0.0.0.0
Waffle
Tomcat
Waffle
Tomcat
TrouxServer1.domainB.com
Host IP – 0.0.0.0
TrouxServer2.domainB.com
Host IP – 0.0.0.0
F5 Big-IP Load Balancer
VirtualPublic IP: 0.0.0.0
F5 Big-IP Load Balancer
VirtualPublic IP: 0.0.0.0
Virtual Server
Kerberos
AuthN
ActiveDirectory
Domain Forest A
Virtual Server
Kerberos
AuthN
ActiveDirectory
Domain Forest B
SQL Cluster

More Related Content

What's hot

Alfresco DevCon 2011. Implementing eGov Portal. Powered by Alfresco and Orbeon
Alfresco DevCon 2011. Implementing eGov Portal. Powered by Alfresco and OrbeonAlfresco DevCon 2011. Implementing eGov Portal. Powered by Alfresco and Orbeon
Alfresco DevCon 2011. Implementing eGov Portal. Powered by Alfresco and Orbeon
Oksana Kurysheva
 
Dh2 Apps Training Part2
Dh2   Apps Training Part2Dh2   Apps Training Part2
Dh2 Apps Training Part2
jamram82
 
New Features of ASP.NET 4.0
New Features of ASP.NET 4.0New Features of ASP.NET 4.0
New Features of ASP.NET 4.0
Buu Nguyen
 

What's hot (20)

Alfresco DevCon 2011. Implementing eGov Portal. Powered by Alfresco and Orbeon
Alfresco DevCon 2011. Implementing eGov Portal. Powered by Alfresco and OrbeonAlfresco DevCon 2011. Implementing eGov Portal. Powered by Alfresco and Orbeon
Alfresco DevCon 2011. Implementing eGov Portal. Powered by Alfresco and Orbeon
 
SharePoint 2007 Security
SharePoint 2007 SecuritySharePoint 2007 Security
SharePoint 2007 Security
 
Integration of linked in using mule esb
Integration of linked in using mule esbIntegration of linked in using mule esb
Integration of linked in using mule esb
 
Mule integration with linkedin
Mule integration with linkedinMule integration with linkedin
Mule integration with linkedin
 
Microsoft Tech Ed 2006 #2
Microsoft Tech Ed 2006 #2Microsoft Tech Ed 2006 #2
Microsoft Tech Ed 2006 #2
 
Integrate with linked in
Integrate with linked inIntegrate with linked in
Integrate with linked in
 
Microsoft Tech Ed 2006 #1
Microsoft Tech Ed 2006 #1Microsoft Tech Ed 2006 #1
Microsoft Tech Ed 2006 #1
 
Manage and consume the api
Manage and consume the apiManage and consume the api
Manage and consume the api
 
Mule real-world-old
Mule real-world-oldMule real-world-old
Mule real-world-old
 
Mule with facebook
Mule with facebookMule with facebook
Mule with facebook
 
Dh2 Apps Training Part2
Dh2   Apps Training Part2Dh2   Apps Training Part2
Dh2 Apps Training Part2
 
Intro to vaadin
Intro to vaadinIntro to vaadin
Intro to vaadin
 
Basic fundamentals of web application development
Basic fundamentals of web application developmentBasic fundamentals of web application development
Basic fundamentals of web application development
 
Muleesb
MuleesbMuleesb
Muleesb
 
Tutorial asp.net
Tutorial  asp.netTutorial  asp.net
Tutorial asp.net
 
Salesforce Integration using Mule ESB
Salesforce Integration using Mule ESBSalesforce Integration using Mule ESB
Salesforce Integration using Mule ESB
 
Integration with microsoft share point
Integration with microsoft share pointIntegration with microsoft share point
Integration with microsoft share point
 
Apps 101 - Moving to the SharePoint 2013 App Model - Presented 7/27/13 at Sha...
Apps 101 - Moving to the SharePoint 2013 App Model - Presented 7/27/13 at Sha...Apps 101 - Moving to the SharePoint 2013 App Model - Presented 7/27/13 at Sha...
Apps 101 - Moving to the SharePoint 2013 App Model - Presented 7/27/13 at Sha...
 
New Features of ASP.NET 4.0
New Features of ASP.NET 4.0New Features of ASP.NET 4.0
New Features of ASP.NET 4.0
 
Anypoint access management
Anypoint access management Anypoint access management
Anypoint access management
 

Viewers also liked

What's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AGWhat's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AG
Software AG South Africa
 

Viewers also liked (6)

IW14 Keynote, Dr. Wolfram Jost, CTO, Software AG
IW14 Keynote, Dr. Wolfram Jost, CTO, Software AGIW14 Keynote, Dr. Wolfram Jost, CTO, Software AG
IW14 Keynote, Dr. Wolfram Jost, CTO, Software AG
 
Molina Troux Worldwide Conference 2014
Molina Troux Worldwide Conference 2014Molina Troux Worldwide Conference 2014
Molina Troux Worldwide Conference 2014
 
Apama and Terracotta World: Getting Started in Predictive Analytics
Apama and Terracotta World: Getting Started in Predictive Analytics Apama and Terracotta World: Getting Started in Predictive Analytics
Apama and Terracotta World: Getting Started in Predictive Analytics
 
webMethods World: How Can You Innovate Even Faster With the Latest webMethods...
webMethods World: How Can You Innovate Even Faster With the Latest webMethods...webMethods World: How Can You Innovate Even Faster With the Latest webMethods...
webMethods World: How Can You Innovate Even Faster With the Latest webMethods...
 
Pbmr Ea Meta Model Poster V01.03
Pbmr Ea Meta Model Poster V01.03Pbmr Ea Meta Model Poster V01.03
Pbmr Ea Meta Model Poster V01.03
 
What's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AGWhat's new in webMethods - Gareth Whitaker - Software AG
What's new in webMethods - Gareth Whitaker - Software AG
 

Similar to High-level Architecture viewpoint of a Troux Infrastructure

SaaSPlex Enterprise
SaaSPlex EnterpriseSaaSPlex Enterprise
SaaSPlex Enterprise
La Lakis
 
Azure from scratch part 2 By Girish Kalamati
Azure from scratch part 2 By Girish KalamatiAzure from scratch part 2 By Girish Kalamati
Azure from scratch part 2 By Girish Kalamati
Girish Kalamati
 
Authorization in asp
Authorization in aspAuthorization in asp
Authorization in asp
OPENLANE
 
Build your silver light application
Build your silver light applicationBuild your silver light application
Build your silver light application
Pranay Rana
 
Claims Based Identity In Share Point 2010
Claims  Based  Identity In  Share Point 2010Claims  Based  Identity In  Share Point 2010
Claims Based Identity In Share Point 2010
Steve Sofian
 

Similar to High-level Architecture viewpoint of a Troux Infrastructure (20)

Series of Visual Flow Diagrams
Series of Visual Flow DiagramsSeries of Visual Flow Diagrams
Series of Visual Flow Diagrams
 
SaaSPlex Enterprise
SaaSPlex EnterpriseSaaSPlex Enterprise
SaaSPlex Enterprise
 
Mobile user single sign on flow
Mobile user single sign on flowMobile user single sign on flow
Mobile user single sign on flow
 
Azure from scratch part 2 By Girish Kalamati
Azure from scratch part 2 By Girish KalamatiAzure from scratch part 2 By Girish Kalamati
Azure from scratch part 2 By Girish Kalamati
 
Authorization in asp
Authorization in aspAuthorization in asp
Authorization in asp
 
20200513 Getting started with AWS Amplify
20200513   Getting started with AWS Amplify20200513   Getting started with AWS Amplify
20200513 Getting started with AWS Amplify
 
Office 365 identity
Office 365 identityOffice 365 identity
Office 365 identity
 
Build your silver light application
Build your silver light applicationBuild your silver light application
Build your silver light application
 
SECURE DATA TRANSMISSION AND DELETION FROM BLOOM FILTER (2).pptx
SECURE DATA TRANSMISSION AND DELETION FROM BLOOM FILTER (2).pptxSECURE DATA TRANSMISSION AND DELETION FROM BLOOM FILTER (2).pptx
SECURE DATA TRANSMISSION AND DELETION FROM BLOOM FILTER (2).pptx
 
O auth 2
O auth 2O auth 2
O auth 2
 
Deep Dive on Amazon Cognito - March 2017 AWS Online Tech Talks
Deep Dive on Amazon Cognito - March 2017 AWS Online Tech TalksDeep Dive on Amazon Cognito - March 2017 AWS Online Tech Talks
Deep Dive on Amazon Cognito - March 2017 AWS Online Tech Talks
 
AWSM2C3.pptx
AWSM2C3.pptxAWSM2C3.pptx
AWSM2C3.pptx
 
TMCnet final
TMCnet finalTMCnet final
TMCnet final
 
AWS AWSome Day - Getting Started Best Practices
AWS AWSome Day - Getting Started Best PracticesAWS AWSome Day - Getting Started Best Practices
AWS AWSome Day - Getting Started Best Practices
 
Claims Based Identity In Share Point 2010
Claims  Based  Identity In  Share Point 2010Claims  Based  Identity In  Share Point 2010
Claims Based Identity In Share Point 2010
 
Cloud Identity and Access Management
Cloud Identity and Access ManagementCloud Identity and Access Management
Cloud Identity and Access Management
 
AWS Enterprise Summit Netherlands - Starting Your Journey in the Cloud
AWS Enterprise Summit Netherlands - Starting Your Journey in the CloudAWS Enterprise Summit Netherlands - Starting Your Journey in the Cloud
AWS Enterprise Summit Netherlands - Starting Your Journey in the Cloud
 
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUGAzure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
Azure AD App Proxy Login Scenarios with an On Premises Applications - TSPUG
 
Simplifying Microsoft Architectures with AWS Services (WIN306) - AWS re:Inven...
Simplifying Microsoft Architectures with AWS Services (WIN306) - AWS re:Inven...Simplifying Microsoft Architectures with AWS Services (WIN306) - AWS re:Inven...
Simplifying Microsoft Architectures with AWS Services (WIN306) - AWS re:Inven...
 
Salesforce Developer Garage Seattle: Force.com Canvas
Salesforce Developer Garage Seattle: Force.com CanvasSalesforce Developer Garage Seattle: Force.com Canvas
Salesforce Developer Garage Seattle: Force.com Canvas
 

More from Mike Reams

More from Mike Reams (15)

Design Pattern Logical Model
Design Pattern Logical ModelDesign Pattern Logical Model
Design Pattern Logical Model
 
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle ManagerKnowledge Transfer Training Presentation for Identity Lifecycle Manager
Knowledge Transfer Training Presentation for Identity Lifecycle Manager
 
Solution Delivery Calendar
Solution Delivery CalendarSolution Delivery Calendar
Solution Delivery Calendar
 
Environment Gap Analysis for Applications
Environment Gap Analysis for ApplicationsEnvironment Gap Analysis for Applications
Environment Gap Analysis for Applications
 
Design Pattern for Federated Single Sign-On Access
Design Pattern for Federated Single Sign-On AccessDesign Pattern for Federated Single Sign-On Access
Design Pattern for Federated Single Sign-On Access
 
Perimeter Protected Access Design Pattern
Perimeter Protected Access Design PatternPerimeter Protected Access Design Pattern
Perimeter Protected Access Design Pattern
 
Design Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity ProvisioningDesign Pattern for Oracle Identity Provisioning
Design Pattern for Oracle Identity Provisioning
 
Retiree Data Flow Diagram
Retiree Data Flow DiagramRetiree Data Flow Diagram
Retiree Data Flow Diagram
 
Visio Diagram of a user SSO Flow
Visio Diagram of a user SSO FlowVisio Diagram of a user SSO Flow
Visio Diagram of a user SSO Flow
 
Visio Diagram Scripting and Server Management flow
Visio Diagram Scripting and Server Management flowVisio Diagram Scripting and Server Management flow
Visio Diagram Scripting and Server Management flow
 
Visio Diagram for Configuration Management
Visio Diagram for Configuration ManagementVisio Diagram for Configuration Management
Visio Diagram for Configuration Management
 
User Flow swim-lane Diagram for New Hire
User Flow swim-lane Diagram for New Hire User Flow swim-lane Diagram for New Hire
User Flow swim-lane Diagram for New Hire
 
Architecture Design Presentation for OIM
Architecture Design Presentation for OIMArchitecture Design Presentation for OIM
Architecture Design Presentation for OIM
 
Sample Template for Single Sign-On (SSO)
Sample Template for Single Sign-On (SSO)Sample Template for Single Sign-On (SSO)
Sample Template for Single Sign-On (SSO)
 
Visual representation as an architectural artifact
Visual representation as an architectural artifactVisual representation as an architectural artifact
Visual representation as an architectural artifact
 

Recently uploaded

Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
Emergent Methods: Multi-lingual narrative tracking in the news - real-time ex...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 

High-level Architecture viewpoint of a Troux Infrastructure

  • 1. Troux Application Flow [Last Updated: 11/29/2015] Author: mreams Client Browser Back-End CompanyACompanyB User A User is logged into computer with companya.com Active Directory credentials ADAuthentication User invokes in IEbrowser Portfolio Instance A The WAFFLE agent runs in front of the Web Servers as the gateway into the app. WAFFLE checks the user’s Windows AD credentials against it’s configured Troux Roles the person is or is not assigned to Waffle Tomcat Troux_A SQL Cluster ActiveDirectory User Flow Database AD Forest Companya.com ServiceAccount runs the Windows service and brokers against coxinc in order to see ifthe user is in AD groups mapped to Troux Roles ServiceAccount AD Forest Companya.com Is user authorized? User is granted access and willsee designated content based on role Yes User is not in any Troux roles and will seeblank content on the screen or a message saying access denied No User B User is logged into computer with companyb.com Active Directory credentials ADAuthentication User invokes in IEbrowser Portfolio Instance B The WAFFLE agent runs in front of the Web Servers as the gateway into the app. WAFFLE checks the user’s Windows AD credentials against it’s configured Troux Roles the person is or is not assigned to Waffle Tomcat Troux_B SQL Cluster AD Forest Companyb.com ServiceAccount runs the Windows service and brokers against coxinc in order to see ifthe user is in AD groups mapped to Troux Roles ServiceAccount AD Forest Companyb.com User is granted access and willsee designated content based on role Yes User is not in any Troux roles and will seeblank content on the screen or a message saying access denied No Is user authorized? User is granted access User is granted access
  • 2. Company A Users Active Directory ApplicationLayerNetworkLayer Portfolio Instance B Troux App Servers (A) Virtual Server 1 Waffle Tomcat TrouxServer1.domainA.com Host IP – 0.0.0.0 Data&AccessLayer Data Storage Troux_B Portfolio Instance A Company B Users Virtual Server2 Troux App Servers (B) Virtual Server 1 Virtual Server 2 Troux_A Waffle Tomcat TrouxServer2.domainA.com Host IP – 0.0.0.0 Waffle Tomcat Waffle Tomcat TrouxServer1.domainB.com Host IP – 0.0.0.0 TrouxServer2.domainB.com Host IP – 0.0.0.0 F5 Big-IP Load Balancer VirtualPublic IP: 0.0.0.0 F5 Big-IP Load Balancer VirtualPublic IP: 0.0.0.0 Virtual Server Kerberos AuthN ActiveDirectory Domain Forest A Virtual Server Kerberos AuthN ActiveDirectory Domain Forest B SQL Cluster