Quantcast
Channel: iamfortress
Browsing all 90 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Apache Fortress Ten Minute Guide

Course Prerequisites Before starting, you need a working fortress environment to test with.  Complete the following steps under the Apache Fortress Ten Minute Guide: Setup Apache Directory Server Setup...

View Article


Image may be NSFW.
Clik here to view.

Apache Fortress End-to-End Security Tutorial

The tutorial provides a how-to guide for applying end-to-end security enforcement across a sample Java Web environment using Java EE, Spring and Apache Fortress security. Requirements covered include...

View Article


Image may be NSFW.
Clik here to view.

The Seven Steps of Role Engineering

Defined Role Engineering is the process by which an organization develops, defines, enforces, and maintains role-based access control. RBAC is often seen as a way to improve security controls for...

View Article

Image may be NSFW.
Clik here to view.

Enabling Java EE and Fortress Security inside an Apache Wicket Web App

     Introduction The aim of this tutorial is to demonstrate how a simple wicket web app can be converted to use java EE and fortress security.  It’s not intended to highlight all of the possible...

View Article

Image may be NSFW.
Clik here to view.

Top 10 Things I Learned at ApacheCon North America 2015

As another ApacheCon is being wrapped up I wanted to get my thoughts down before they fade. 10. Austin TX is a great city for tech conferences Where else would the mayor proclaim Apache Software...

View Article


Image may be NSFW.
Clik here to view.

What is Delegated Administration?

Defined The ability to control access on the security system itself.  This control is exercised inside the policy administration programs. In addition to what functions may be executed, we must control...

View Article

Image may be NSFW.
Clik here to view.

What are Password Policies?

Defined A set of rules surrounding the content, quality and lifecycle of a password. What Are They For? Helps to safeguard the integrity of password values within a particular security domain.  With...

View Article

Image may be NSFW.
Clik here to view.

What Are Temporal Constraints?

Defined Ability to control when an entity activation occurs based on time and date criteria.  Temporal constraints are typically applied during User and Role activation as part of an authentication or...

View Article


Image may be NSFW.
Clik here to view.

Apache Directory Fortress SAML Demo

The aim of this tutorial is to connect Apache Directory Fortress with Spring Security SAML and a common Identity Provider – SSO Circle.com. It’s not intended to highlight all of the possible locations...

View Article


Image may be NSFW.
Clik here to view.

JavaOne Open Source IAM Expert Panel

Once again we’ll be meeting in San Francisco for a Birds-of-Feather. Open Source IAM Expert Panel Part 4 Abstract There is a growing need in the market today to provide open source identity and access...

View Article

Image may be NSFW.
Clik here to view.

The Seven Deadly Sins

The personality traits that destroy software development projects are as follows: Stupidity is the most obvious toxic personality trait found on this list.  Engineers of this caliber leave a trail of...

View Article

Image may be NSFW.
Clik here to view.

Top Five Reasons for Attending ApacheCon

Capturing the pros so when I consider returning, along with its cons, i.e. time away from home and family, there is a balanced decision. Inspiration. When asking a colleague, who was attending for the...

View Article

Image may be NSFW.
Clik here to view.

JavaOne Survival Guide

With next week being my 12th time at JavaOne, here’s some wisdom for those who’ve never been. Use the schedule builder.  Many sessions fill up early and if you didn’t reserve your seat you’ll be stuck...

View Article


Image may be NSFW.
Clik here to view.

LDAP is dead. Long Live LDAP!

David Goodman’s keynote, LDAP 2020 Paradise Lost or Regained?, provides a retrospective for us to contemplate. In it, he describes LDAP’s roots (X.500), where it’s been (U of Mich, Netscape, Sun,...

View Article

Image may be NSFW.
Clik here to view.

Why Bugs are Good

Goes against the grain of conventional wisdom.  The nastier, the better.  How can this be?  Let me state the ways. Status.  It demonstrates an active project.  If you go to their bug tracking page and...

View Article


Image may be NSFW.
Clik here to view.

What is Delegated Administration?

Defined The ability to control access on the security system itself.  This control is exercised inside the policy administration programs. In addition to what functions may be executed, we must control...

View Article

Image may be NSFW.
Clik here to view.

What are Password Policies?

Defined A set of rules surrounding the content, quality and lifecycle of a password. What Are They For? Helps to safeguard the integrity of password values within a particular security domain.  With...

View Article


Image may be NSFW.
Clik here to view.

What Are Temporal Constraints?

Defined Ability to control when an entity activation occurs based on time and date criteria.  Temporal constraints are typically applied during User and Role activation as part of an authentication or...

View Article

Image may be NSFW.
Clik here to view.

Apache Directory Fortress SAML Demo

The aim of this tutorial is to connect Apache Directory Fortress with Spring Security SAML and a common Identity Provider – SSO Circle.com. It’s not intended to highlight all of the possible locations...

View Article

Image may be NSFW.
Clik here to view.

Part VI – Hitting The Wall

Pic above 65 miles into the 2016 DK200. Note:  this post is about my first-ever Dirty Kanza 200 experience on June 4, 2016.  Read Part I – The Signup Read Part II – Prep / Training Read Part III –...

View Article
Browsing all 90 articles
Browse latest View live