SlideShare una empresa de Scribd logo
1 de 22
Novell ®  iChain ®  2.3
Firewall Student Intranet Internet Staff Extranet Professor NT IIS Solaris/ Netscape SECURITY Web Servers and Applications SECURITY Linux/ Apache SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],What are the Customer Problems?
Firewall Student Intranet Internet Staff Extranet Professor NT IIS Solaris/ Netscape SECURITY Web Servers and Applications SECURITY Linux/ Apache SECURITY ,[object Object],[object Object],[object Object],[object Object],[object Object],Competitors Solution
Firewall SECURITY INFRASTRUCTURE Web Servers and Applications Student One Net Staff Professor The Novell Solution NT IIS Solaris/ Netscape Linux/ Apache eDirectory ™ iChain ® ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Novell iChain - How does it work? 2. Access Control-    What do you have access to? Browser Proxy Server iChain Authorization Server Web and application servers Security 1. Authentication- Who are you ? 3. Single Sign On 4. OLAC (Personalization) 5. Data Confidentiality User=xx Password=xx Books=Thrillers, Horrors ACL ACL
Authentication Service ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Authorization Services ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Automating Access Control  – Integration with DirXML ® Dynamic Access Rule – checks User’s attributes for matching criteria   HR Application PeopleSoft® iChain Proxy ACL eDirectory DirXML
Single Sign-On / Personalization ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Data Confidentiality ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
User and Access Management  ,[object Object],[object Object],[object Object],[object Object],[object Object]
Typical Customer – ACME Inc. ,[object Object],[object Object],[object Object],[object Object],[object Object],Browser People Soft ® Oracle ® Windows 2000 ®
ACME Inc.  Basic (DMZ) Implementation Browser People Soft ® Oracle ® Windows 2000 ® ,[object Object],[object Object],[object Object],[object Object],Internet Intranet iChain Proxy Cache iChain Authorization Server Novell iChain iChain Basic Authentication Single Sign-on iChain Form Fill Single Sign-on ACL ACL ACL
Implementation  - Fault Tolerance / Load Balanced (DMZ) Browser iChain Proxy iChain Proxy L4 Switch Web Traffic LDAP Backup LDAP Web Servers eDirectory
SAML-based Single Sign-On ,[object Object],HOSPITAL 1 HOSPITAL 2 Physician connects to internal system and requests patient records from Hospital 2 1  Physician is redirected to Hospital 2 with SAML Assertions generated by Hospital 1 2  After the physicians status is cleared the patient details  are securely delivered to the physician 4  Hospital 2 needs to verify that the users credentials were supplied by a trusted partner 3
SAML Extensions for iChain ,[object Object],[object Object],[object Object],[object Object],[object Object]
For more information… ,[object Object],[object Object],[object Object],[object Object]
Novell ®  iChain ®  2.3 Server Configuration
Novell ®  iChain ®  2.3 Application Configuration
Novell ®  iChain ®  2.3 Live Demonstration
 
Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc.  Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments.  No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc.  Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product.  Novell, Inc., makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose.  Further, Novell, Inc., reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries.  All third-party trademarks are the property of their respective owners.

Más contenido relacionado

La actualidad más candente

SQL Server 2012 Security Task
SQL Server 2012 Security TaskSQL Server 2012 Security Task
SQL Server 2012 Security TaskYaakub Idris
 
Owasp Backend Security Project 1.0beta
Owasp Backend Security Project 1.0betaOwasp Backend Security Project 1.0beta
Owasp Backend Security Project 1.0betaSecurity Date
 
Deployment Patterns in WSO2 Enterprise Integrator
Deployment Patterns in WSO2 Enterprise IntegratorDeployment Patterns in WSO2 Enterprise Integrator
Deployment Patterns in WSO2 Enterprise IntegratorWSO2
 
Microsoft India - BranchCache in Windows 7 and Windows Server 2008 R2 Overvie...
Microsoft India - BranchCache in Windows 7 and Windows Server 2008 R2 Overvie...Microsoft India - BranchCache in Windows 7 and Windows Server 2008 R2 Overvie...
Microsoft India - BranchCache in Windows 7 and Windows Server 2008 R2 Overvie...Microsoft Private Cloud
 
Windows Server 2008 - Web and Application Hosting
Windows Server 2008 - Web and Application HostingWindows Server 2008 - Web and Application Hosting
Windows Server 2008 - Web and Application HostingInformation Technology
 
HP PolyServe Software for Microsoft SQL Server
HP PolyServe Software for Microsoft SQL ServerHP PolyServe Software for Microsoft SQL Server
HP PolyServe Software for Microsoft SQL Serverwebhostingguy
 
Microsoft Solution Proposal with AD, Exchange & SC--Bill of Materials
Microsoft Solution Proposal with AD, Exchange & SC--Bill of MaterialsMicrosoft Solution Proposal with AD, Exchange & SC--Bill of Materials
Microsoft Solution Proposal with AD, Exchange & SC--Bill of MaterialsShahab Al Yamin Chawdhury
 
Application server vs Web Server
Application server vs Web ServerApplication server vs Web Server
Application server vs Web ServerGagandeep Singh
 
Oracle 10g Application Server
Oracle 10g Application ServerOracle 10g Application Server
Oracle 10g Application ServerMark J. Feldman
 
Overview of Microsoft Exchange Server
Overview of Microsoft Exchange ServerOverview of Microsoft Exchange Server
Overview of Microsoft Exchange Serverbedekarpm
 
SharePoint Saturday Michigan Keynote - Top 5 Infrastructure Concerns for a Sh...
SharePoint Saturday Michigan Keynote - Top 5 Infrastructure Concerns for a Sh...SharePoint Saturday Michigan Keynote - Top 5 Infrastructure Concerns for a Sh...
SharePoint Saturday Michigan Keynote - Top 5 Infrastructure Concerns for a Sh...Michael Noel
 
Backup Exec 2014 Technical White Paper - Protecting Microsoft Exchange
Backup Exec 2014 Technical White Paper - Protecting Microsoft ExchangeBackup Exec 2014 Technical White Paper - Protecting Microsoft Exchange
Backup Exec 2014 Technical White Paper - Protecting Microsoft ExchangeSymantec
 
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15Symantec
 
Windows 2008 basics
Windows 2008 basicsWindows 2008 basics
Windows 2008 basicsanilinvns
 
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise IntegratorTroubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise IntegratorWSO2
 
Haider-Server Aministrator
Haider-Server AministratorHaider-Server Aministrator
Haider-Server AministratorHaider Ali
 

La actualidad más candente (20)

SQL Server 2012 Security Task
SQL Server 2012 Security TaskSQL Server 2012 Security Task
SQL Server 2012 Security Task
 
Owasp Backend Security Project 1.0beta
Owasp Backend Security Project 1.0betaOwasp Backend Security Project 1.0beta
Owasp Backend Security Project 1.0beta
 
Deployment Patterns in WSO2 Enterprise Integrator
Deployment Patterns in WSO2 Enterprise IntegratorDeployment Patterns in WSO2 Enterprise Integrator
Deployment Patterns in WSO2 Enterprise Integrator
 
Microsoft India - BranchCache in Windows 7 and Windows Server 2008 R2 Overvie...
Microsoft India - BranchCache in Windows 7 and Windows Server 2008 R2 Overvie...Microsoft India - BranchCache in Windows 7 and Windows Server 2008 R2 Overvie...
Microsoft India - BranchCache in Windows 7 and Windows Server 2008 R2 Overvie...
 
Windows Server 2008 - Web and Application Hosting
Windows Server 2008 - Web and Application HostingWindows Server 2008 - Web and Application Hosting
Windows Server 2008 - Web and Application Hosting
 
HP PolyServe Software for Microsoft SQL Server
HP PolyServe Software for Microsoft SQL ServerHP PolyServe Software for Microsoft SQL Server
HP PolyServe Software for Microsoft SQL Server
 
Microsoft Solution Proposal with AD, Exchange & SC--Bill of Materials
Microsoft Solution Proposal with AD, Exchange & SC--Bill of MaterialsMicrosoft Solution Proposal with AD, Exchange & SC--Bill of Materials
Microsoft Solution Proposal with AD, Exchange & SC--Bill of Materials
 
Application server vs Web Server
Application server vs Web ServerApplication server vs Web Server
Application server vs Web Server
 
Oracle 10g Application Server
Oracle 10g Application ServerOracle 10g Application Server
Oracle 10g Application Server
 
Installation Guide
Installation GuideInstallation Guide
Installation Guide
 
Overview of Microsoft Exchange Server
Overview of Microsoft Exchange ServerOverview of Microsoft Exchange Server
Overview of Microsoft Exchange Server
 
SharePoint Saturday Michigan Keynote - Top 5 Infrastructure Concerns for a Sh...
SharePoint Saturday Michigan Keynote - Top 5 Infrastructure Concerns for a Sh...SharePoint Saturday Michigan Keynote - Top 5 Infrastructure Concerns for a Sh...
SharePoint Saturday Michigan Keynote - Top 5 Infrastructure Concerns for a Sh...
 
Backup Exec 2014 Technical White Paper - Protecting Microsoft Exchange
Backup Exec 2014 Technical White Paper - Protecting Microsoft ExchangeBackup Exec 2014 Technical White Paper - Protecting Microsoft Exchange
Backup Exec 2014 Technical White Paper - Protecting Microsoft Exchange
 
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
WHITE PAPER▶ Protecting Microsoft SQL with Backup Exec 15
 
Windows 2008 basics
Windows 2008 basicsWindows 2008 basics
Windows 2008 basics
 
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise IntegratorTroubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
 
Haider-Server Aministrator
Haider-Server AministratorHaider-Server Aministrator
Haider-Server Aministrator
 
oracle
oracleoracle
oracle
 
Sql 2005 high availability
Sql 2005 high availabilitySql 2005 high availability
Sql 2005 high availability
 
Windows server 2012_r2_
Windows server 2012_r2_ Windows server 2012_r2_
Windows server 2012_r2_
 

Destacado

Linux apache server
Linux apache serverLinux apache server
Linux apache serverKhoa Quach
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.pptwebhostingguy
 
SureMail: Notification Overlay for Email Reliability
SureMail: Notification Overlay for Email ReliabilitySureMail: Notification Overlay for Email Reliability
SureMail: Notification Overlay for Email Reliabilitywebhostingguy
 
Slide 1 - Parallels Plesk Control Panel 8.6.0
Slide 1 - Parallels Plesk Control Panel 8.6.0Slide 1 - Parallels Plesk Control Panel 8.6.0
Slide 1 - Parallels Plesk Control Panel 8.6.0webhostingguy
 
Get your website noticed by Jason King of HAVS
Get your website noticed by Jason King of HAVSGet your website noticed by Jason King of HAVS
Get your website noticed by Jason King of HAVSwebhostingguy
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructurewebhostingguy
 
SureMail: Notification Overlay for Email Reliability
SureMail: Notification Overlay for Email ReliabilitySureMail: Notification Overlay for Email Reliability
SureMail: Notification Overlay for Email Reliabilitywebhostingguy
 
Linux Hosting Training Course Level 1-2
Linux Hosting Training Course Level 1-2Linux Hosting Training Course Level 1-2
Linux Hosting Training Course Level 1-2Ramy Allam
 
setting Dns linux debian
setting Dns linux debiansetting Dns linux debian
setting Dns linux debianArga Prahara
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Productswebhostingguy
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mbwebhostingguy
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy webhostingguy
 

Destacado (20)

elc200day13.ppt
elc200day13.pptelc200day13.ppt
elc200day13.ppt
 
Linux apache server
Linux apache serverLinux apache server
Linux apache server
 
Web design for business.ppt
Web design for business.pptWeb design for business.ppt
Web design for business.ppt
 
SureMail: Notification Overlay for Email Reliability
SureMail: Notification Overlay for Email ReliabilitySureMail: Notification Overlay for Email Reliability
SureMail: Notification Overlay for Email Reliability
 
Slide 1 - Parallels Plesk Control Panel 8.6.0
Slide 1 - Parallels Plesk Control Panel 8.6.0Slide 1 - Parallels Plesk Control Panel 8.6.0
Slide 1 - Parallels Plesk Control Panel 8.6.0
 
Get your website noticed by Jason King of HAVS
Get your website noticed by Jason King of HAVSGet your website noticed by Jason King of HAVS
Get your website noticed by Jason King of HAVS
 
Html
HtmlHtml
Html
 
Css
CssCss
Css
 
Managing Diverse IT Infrastructure
Managing Diverse IT InfrastructureManaging Diverse IT Infrastructure
Managing Diverse IT Infrastructure
 
PL WEB
PL WEBPL WEB
PL WEB
 
Notes8
Notes8Notes8
Notes8
 
Slide 1
Slide 1Slide 1
Slide 1
 
Ajax
AjaxAjax
Ajax
 
Web 2.0
Web 2.0Web 2.0
Web 2.0
 
SureMail: Notification Overlay for Email Reliability
SureMail: Notification Overlay for Email ReliabilitySureMail: Notification Overlay for Email Reliability
SureMail: Notification Overlay for Email Reliability
 
Linux Hosting Training Course Level 1-2
Linux Hosting Training Course Level 1-2Linux Hosting Training Course Level 1-2
Linux Hosting Training Course Level 1-2
 
setting Dns linux debian
setting Dns linux debiansetting Dns linux debian
setting Dns linux debian
 
Parallels Hosting Products
Parallels Hosting ProductsParallels Hosting Products
Parallels Hosting Products
 
Microsoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 MbMicrosoft PowerPoint presentation 2.175 Mb
Microsoft PowerPoint presentation 2.175 Mb
 
IT Power Management Strategy
IT Power Management Strategy IT Power Management Strategy
IT Power Management Strategy
 

Similar a Novell® iChain® 2.3

Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerNovell
 
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS ProjectIntroduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS ProjectMichael J Geiser
 
CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricSpiffy
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
SecDevOps - The Operationalisation of Security
SecDevOps -  The Operationalisation of SecuritySecDevOps -  The Operationalisation of Security
SecDevOps - The Operationalisation of SecurityDinis Cruz
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADuberbaum
 
API Security in a Microservice Architecture
API Security in a Microservice ArchitectureAPI Security in a Microservice Architecture
API Security in a Microservice ArchitectureMatt McLarty
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft CloudEuropean Collaboration Summit
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SASrobbuddingh
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authenticationdkaya
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPNAjay Nawani
 
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdfDeepakAC3
 
8 isecurity database
8 isecurity database8 isecurity database
8 isecurity databaseAnil Pandey
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud SecurityAlert Logic
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
8 i internet_security
8 i internet_security8 i internet_security
8 i internet_securityAnil Pandey
 

Similar a Novell® iChain® 2.3 (20)

Exploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access ManagerExploring Advanced Authentication Methods in Novell Access Manager
Exploring Advanced Authentication Methods in Novell Access Manager
 
Introduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS ProjectIntroduction to the WSO2 Identity Server &Contributing to an OS Project
Introduction to the WSO2 Identity Server &Contributing to an OS Project
 
CTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App FabricCTU June 2011 - Windows Azure App Fabric
CTU June 2011 - Windows Azure App Fabric
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
SecDevOps - The Operationalisation of Security
SecDevOps -  The Operationalisation of SecuritySecDevOps -  The Operationalisation of Security
SecDevOps - The Operationalisation of Security
 
Premier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure ADPremier Webcast - Identity Management with Windows Azure AD
Premier Webcast - Identity Management with Windows Azure AD
 
Windows Azure
Windows AzureWindows Azure
Windows Azure
 
API Security in a Microservice Architecture
API Security in a Microservice ArchitectureAPI Security in a Microservice Architecture
API Security in a Microservice Architecture
 
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
 
Saas security
Saas securitySaas security
Saas security
 
Ch08 Authentication
Ch08 AuthenticationCh08 Authentication
Ch08 Authentication
 
Safenet Authentication Service, SAS
Safenet Authentication Service, SASSafenet Authentication Service, SAS
Safenet Authentication Service, SAS
 
Implementing 802.1x Authentication
Implementing 802.1x AuthenticationImplementing 802.1x Authentication
Implementing 802.1x Authentication
 
AzureAAD
AzureAADAzureAAD
AzureAAD
 
Cyberoam SSL VPN
Cyberoam SSL VPNCyberoam SSL VPN
Cyberoam SSL VPN
 
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf
 
8 isecurity database
8 isecurity database8 isecurity database
8 isecurity database
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
8 i internet_security
8 i internet_security8 i internet_security
8 i internet_security
 

Más de webhostingguy

Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Frameworkwebhostingguy
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serverswebhostingguy
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreementwebhostingguy
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...webhostingguy
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...webhostingguy
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandiserswebhostingguy
 
Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...
Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...
Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...webhostingguy
 
Getting Started Guide
Getting Started GuideGetting Started Guide
Getting Started Guidewebhostingguy
 
"BEST MONEY TV HOST" CONSUELO MACK Launches Fifth Season on ...
"BEST MONEY TV HOST" CONSUELO MACK Launches Fifth Season on ..."BEST MONEY TV HOST" CONSUELO MACK Launches Fifth Season on ...
"BEST MONEY TV HOST" CONSUELO MACK Launches Fifth Season on ...webhostingguy
 
Best Practises: Java OGSI Hosting Environment Design
Best Practises: Java OGSI Hosting Environment DesignBest Practises: Java OGSI Hosting Environment Design
Best Practises: Java OGSI Hosting Environment Designwebhostingguy
 
Host Based Security Best Practices
Host Based Security Best PracticesHost Based Security Best Practices
Host Based Security Best Practiceswebhostingguy
 

Más de webhostingguy (19)

File Upload
File UploadFile Upload
File Upload
 
Running and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test FrameworkRunning and Developing Tests with the Apache::Test Framework
Running and Developing Tests with the Apache::Test Framework
 
Load-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web serversLoad-balancing web servers Load-balancing web servers
Load-balancing web servers Load-balancing web servers
 
What is mod_perl?
What is mod_perl?What is mod_perl?
What is mod_perl?
 
Master Service Agreement
Master Service AgreementMaster Service Agreement
Master Service Agreement
 
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...PHP and MySQL PHP Written as a set of CGI binaries in C in ...
PHP and MySQL PHP Written as a set of CGI binaries in C in ...
 
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...Dell Reference Architecture Guide Deploying Microsoft® SQL ...
Dell Reference Architecture Guide Deploying Microsoft® SQL ...
 
Excel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for MerchandisersExcel and SQL Quick Tricks for Merchandisers
Excel and SQL Quick Tricks for Merchandisers
 
OLUG_xen.ppt
OLUG_xen.pptOLUG_xen.ppt
OLUG_xen.ppt
 
Reseller's Guide
Reseller's GuideReseller's Guide
Reseller's Guide
 
Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...
Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...
Installation of MySQL 5.1 Cluster Software on the Solaris 10 ...
 
Getting Started Guide
Getting Started GuideGetting Started Guide
Getting Started Guide
 
"BEST MONEY TV HOST" CONSUELO MACK Launches Fifth Season on ...
"BEST MONEY TV HOST" CONSUELO MACK Launches Fifth Season on ..."BEST MONEY TV HOST" CONSUELO MACK Launches Fifth Season on ...
"BEST MONEY TV HOST" CONSUELO MACK Launches Fifth Season on ...
 
Best Practises: Java OGSI Hosting Environment Design
Best Practises: Java OGSI Hosting Environment DesignBest Practises: Java OGSI Hosting Environment Design
Best Practises: Java OGSI Hosting Environment Design
 
NGS
NGSNGS
NGS
 
Host Based Security Best Practices
Host Based Security Best PracticesHost Based Security Best Practices
Host Based Security Best Practices
 
MySQL and PHP
MySQL and PHPMySQL and PHP
MySQL and PHP
 
Winter 2003
Winter 2003 Winter 2003
Winter 2003
 
cPanel User Manual
cPanel User ManualcPanel User Manual
cPanel User Manual
 

Novell® iChain® 2.3

  • 1. Novell ® iChain ® 2.3
  • 2.
  • 3.
  • 4.
  • 5. Novell iChain - How does it work? 2. Access Control- What do you have access to? Browser Proxy Server iChain Authorization Server Web and application servers Security 1. Authentication- Who are you ? 3. Single Sign On 4. OLAC (Personalization) 5. Data Confidentiality User=xx Password=xx Books=Thrillers, Horrors ACL ACL
  • 6.
  • 7.
  • 8. Automating Access Control – Integration with DirXML ® Dynamic Access Rule – checks User’s attributes for matching criteria HR Application PeopleSoft® iChain Proxy ACL eDirectory DirXML
  • 9.
  • 10.
  • 11.
  • 12.
  • 13.
  • 14. Implementation - Fault Tolerance / Load Balanced (DMZ) Browser iChain Proxy iChain Proxy L4 Switch Web Traffic LDAP Backup LDAP Web Servers eDirectory
  • 15.
  • 16.
  • 17.
  • 18. Novell ® iChain ® 2.3 Server Configuration
  • 19. Novell ® iChain ® 2.3 Application Configuration
  • 20. Novell ® iChain ® 2.3 Live Demonstration
  • 21.  
  • 22. Unpublished Work of Novell, Inc. All Rights Reserved. This work is an unpublished work and contains confidential, proprietary, and trade secret information of Novell, Inc. Access to this work is restricted to Novell employees who have a need to know to perform tasks within the scope of their assignments. No part of this work may be practiced, performed, copied, distributed, revised, modified, translated, abridged, condensed, expanded, collected, or adapted without the prior written consent of Novell, Inc. Any use or exploitation of this work without authorization could subject the perpetrator to criminal and civil liability. General Disclaimer This document is not to be construed as a promise by any participating company to develop, deliver, or market a product. Novell, Inc., makes no representations or warranties with respect to the contents of this document, and specifically disclaims any express or implied warranties of merchantability or fitness for any particular purpose. Further, Novell, Inc., reserves the right to revise this document and to make changes to its content, at any time, without obligation to notify any person or entity of such revisions or changes. All Novell marks referenced in this presentation are trademarks or registered trademarks of Novell, Inc. in the United States and other countries. All third-party trademarks are the property of their respective owners.

Notas del editor

  1. This means that no work is lost with either the Novell Nsure UDDI corporate or testing solution. Enterprises that build their UDDI solutions with Novell Nsure UDDI Server, are not only leveraging the deep experience Novell Identity Management foundation brings to the standard, they are securing their own future by building on an open standard implementation that will grow and scale with their corporate needs.