Apache Fortress Ten Minute Guide
Course Prerequisites Before starting, you need a working fortress environment to test with. Complete the following steps under the Apache Fortress Ten Minute Guide: Setup Apache Directory Server Setup...
View ArticleApache Fortress End-to-End Security Tutorial
The tutorial provides a how-to guide for applying end-to-end security enforcement across a sample Java Web environment using Java EE, Spring and Apache Fortress security. Requirements covered include...
View ArticleThe Seven Steps of Role Engineering
Defined Role Engineering is the process by which an organization develops, defines, enforces, and maintains role-based access control. RBAC is often seen as a way to improve security controls for...
View ArticleEnabling Java EE and Fortress Security inside an Apache Wicket Web App
Introduction The aim of this tutorial is to demonstrate how a simple wicket web app can be converted to use java EE and fortress security. It’s not intended to highlight all of the possible...
View ArticleTop 10 Things I Learned at ApacheCon North America 2015
As another ApacheCon is being wrapped up I wanted to get my thoughts down before they fade. 10. Austin TX is a great city for tech conferences Where else would the mayor proclaim Apache Software...
View ArticleWhat is Delegated Administration?
Defined The ability to control access on the security system itself. This control is exercised inside the policy administration programs. In addition to what functions may be executed, we must control...
View ArticleWhat are Password Policies?
Defined A set of rules surrounding the content, quality and lifecycle of a password. What Are They For? Helps to safeguard the integrity of password values within a particular security domain. With...
View ArticleWhat Are Temporal Constraints?
Defined Ability to control when an entity activation occurs based on time and date criteria. Temporal constraints are typically applied during User and Role activation as part of an authentication or...
View ArticleApache Directory Fortress SAML Demo
The aim of this tutorial is to connect Apache Directory Fortress with Spring Security SAML and a common Identity Provider – SSO Circle.com. It’s not intended to highlight all of the possible locations...
View ArticleJavaOne Open Source IAM Expert Panel
Once again we’ll be meeting in San Francisco for a Birds-of-Feather. Open Source IAM Expert Panel Part 4 Abstract There is a growing need in the market today to provide open source identity and access...
View ArticleThe Seven Deadly Sins
The personality traits that destroy software development projects are as follows: Stupidity is the most obvious toxic personality trait found on this list. Engineers of this caliber leave a trail of...
View ArticleTop Five Reasons for Attending ApacheCon
Capturing the pros so when I consider returning, along with its cons, i.e. time away from home and family, there is a balanced decision. Inspiration. When asking a colleague, who was attending for the...
View ArticleJavaOne Survival Guide
With next week being my 12th time at JavaOne, here’s some wisdom for those who’ve never been. Use the schedule builder. Many sessions fill up early and if you didn’t reserve your seat you’ll be stuck...
View ArticleLDAP is dead. Long Live LDAP!
David Goodman’s keynote, LDAP 2020 Paradise Lost or Regained?, provides a retrospective for us to contemplate. In it, he describes LDAP’s roots (X.500), where it’s been (U of Mich, Netscape, Sun,...
View ArticleWhy Bugs are Good
Goes against the grain of conventional wisdom. The nastier, the better. How can this be? Let me state the ways. Status. It demonstrates an active project. If you go to their bug tracking page and...
View ArticleWhat is Delegated Administration?
Defined The ability to control access on the security system itself. This control is exercised inside the policy administration programs. In addition to what functions may be executed, we must control...
View ArticleWhat are Password Policies?
Defined A set of rules surrounding the content, quality and lifecycle of a password. What Are They For? Helps to safeguard the integrity of password values within a particular security domain. With...
View ArticleWhat Are Temporal Constraints?
Defined Ability to control when an entity activation occurs based on time and date criteria. Temporal constraints are typically applied during User and Role activation as part of an authentication or...
View ArticleApache Directory Fortress SAML Demo
The aim of this tutorial is to connect Apache Directory Fortress with Spring Security SAML and a common Identity Provider – SSO Circle.com. It’s not intended to highlight all of the possible locations...
View ArticlePart VI – Hitting The Wall
Pic above 65 miles into the 2016 DK200. Note: this post is about my first-ever Dirty Kanza 200 experience on June 4, 2016. Read Part I – The Signup Read Part II – Prep / Training Read Part III –...
View Article