824 resultados para Single Sign-On, Shibboleth, Identity Provider, Identity Federation, SAML


Relevância:

100.00% 100.00%

Publicador:

Resumo:

General note: Title and date provided by Bettye Lane.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Aquest memòria explica el desenvolupament d’un projecte per ampliar l’eina de Help Desk ServiceTonic perquè accedeixi a fonts de dades de tipus LDAP i a bases de dades externes a la pròpia, per realitzar l’autentificació dels usuaris i extreure la informació dels contactes, també permetre l’accés d’usuaris ja autentificats externament sense que tornin a introduir les seves dades d’accés (Single Sign On). La realització del projecte ha suposat un increment en la capacitat d’integració de ServiceTonic amb fonts de dades externes, ampliant el mercat de clients a empreses que ja tenen les dades estructurades.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Este Proyecto Final del Máster Oficial de Software Libre, Módulo de autenticación SAML2 para DokuWiki, consiste en el desarrollo de un módulo que permite integrar la aplicación web DokuWiki con una infraestructura de autenticación y autorización basada en SAML2 (un sistema Single Sign-On). Concretamente la infraestructura SAML2 a la que se hace referencia consiste en la instalación de la aplicación SimpleSAMLphp con el consiguiente despliegue de un Proveedor de Servicios y un Proveedor de Identidad.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Projecte per implementar al gestor de continguts en programari lliure Drupal el sistema d'autenticació i autorització PAPI, mitjançant el desenvolupament d'un mòdul que permeti realitzar una autenticació Single Sign-On des d'un servidor d'autenticació extern a la plataforma de forma distribuïda.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

This article envisions the use of context-awareness to improve single sign-on solutions (SSO) for mobile users. The attribute-based SSO is expected to increase users' perceived ease of use of the system and service providers' authentication security of the application. From these two features we derive two value propositions for a new business model for mobile platforms. The business model can be considered as an instantiation of the privacy-friendly business model pattern presented in our previous work, reinforcing our claim that privacy-friendly value propositions are possible and can be used to obtain a competitive advantage.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Terveydenhuollon toimialalla käyttäjät joutuvat käyttämään työpäivän aikana useita eri tietojärjestelmiä. Näiden käyttöä on pyritty helpottamaan kehittämällä työpöytäintegraatiomalli. Sen keskeisiä osia ovat kertakirjautuminen ja kontekstinhallinta. Kontekstinhallinnan hyödyntämisestä terveydenhuollon järjestelmissä aiemmin tehtyjä tutkimuksia ja niissä havaittuja ongelmia käytetään tämän työn teoriakehyksenä. Työssä tutkitaan kuinka SerAPI – hankkeessa tehtyä Minimikontekstinhallinnan määrittely versio 3.0:aa voidaan hyödyntää tilanteessa, jossa kontekstiin liitettävää järjestelmää ei voida määritellä luotetuksi järjestelmäksi. Työn lopputuloksena syntyy toimintamalli ja väliohjelma, joiden avulla luotetuksi määrittelemätön järjestelmä voidaan liittää kontekstinhallintaan. Väliohjelma on suunniteltu ja toteutettu työssä case tapauksena käytetyn asiakkaan tarpeiden mukaisesti.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La tesi è relativa all'implementazione di un modulo per la comunicazione sicura tramite SSL/TLS sviluppato in JAVA che aggiunge il supporto del protocollo HTTPS a JOLIE. Le politiche di SSL/TLS vengono applicate mediante l'utilizzo dell'API SSLEngine, che viene descritta accuratamente. La tesi contiene inoltre un caso d'uso in cui viene utilizzato JOLIE per sviluppare un servizio di autenticazione integrata (single sign-on) tra l'ELMS Webstore del programma Microsoft MSDNAA e l'Università di Bologna.

Relevância:

100.00% 100.00%

Publicador:

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Social networks offer horizontal integration for any mobile platform providing app users with a convenient single sign-on point. Nonetheless, there are growing privacy concerns regarding its use. These vulnerabilities trigger alarm among app developers who fight for their user base: While they are happy to act on users’ information collected via social networks, they are not always willing to sacrifice their adoption rate for this goal. So far, understanding of this trade-off has remained ambiguous. To fill this gap, we employ a discrete choice experiment to explore the role of Facebook Login and investigate the impact of accompanying requests for different information items / actions in the mobile app adoption process. We quantify users’ concerns regarding these items in monetary terms. Beyond hands-on insights for providers, our study contributes to the theoretical discourse on the value of privacy in the growing world of Social Media and mobile web.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Personal technologies and social media use have changed the socialization experience of our 21st century learners. As learners have a new, embodied, virtual identity that is an omnipresent force within their social interactions, this study sought to examine how virtual identity influences student relationships both within and outside of a school context. This study also explored how personal technologies and social media use have influenced learners’ perceptions of their own 21st century learning. Using a qualitative inquiry, purposeful sampling was employed to recruit 6 participants between the ages of 15 to 19 to examine their social networking site use and education experience. Data were collected from single, one-on-one semi-structured interviews in which participants discussed their experiences using social media. Data were also collected from the teens’ personal Instagram accounts, and a personal reflexive researcher’s journal was kept for triangulation of data. Open and axial coding strategies alongside constant comparative methods were used to analyze data. Participants shared how they and their peers use social media, the pressures and expectations from other users, social media’s influence on peer relationships, and how social media influences their choices in the physical realm. All 6 participants explained that their teachers do not talk to them about their social media use, and even offered critiques of the school system itself and its inability to prepare students for the new realities of a digital world. This study concludes that while social media is very influential on students’ socialization, educators should be more concerned about the lack of guidance and support that students receive in school in terms of appropriate social media use and the navigation of virtual identity.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The chapter reports on the ‘This Is Me’ project, that aimed to help students and the wider public to be aware of the impact that online material, particularly that on the Internet, has on their identity and reputation. The chapter explores practical aspects of Digital Identity, relating to issues such as employability, relationships and even death. For example, understanding the impact a photograph posted on a social networking website might have for different groups of people, ranging from friends or parents to future employers. As part of the ‘This is Me’ project stories were collected from students and others about Digital Identity matters, a grounded methodological approach based on action research was used to establish issues related to Digital Identity particularly relevant to those in academia. Drawing from these issues, resources were developed to help inform and educate people about how they can understand and control their own Digital Identity. A number of these resources are presented here, along with reflections on how they are used and can be adapted.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

Predators directly and indirectly affect the density and the behavior of prey. These effects may potentially cascade down to lower trophic levels. In this study, we tested the effects of predator calls (playbacks of bird vocalizations: Tyto alba, Speotyto cunicularia, and Vanellus chilensis), predator visual stimuli (stuffed birds) and interactions of visual and auditory cues, on the behavior of frugivore phyllostomid bats in the field. In addition, we tested if the effects of predation risk cascade down to other trophic levels by measuring rates of seed dispersal of the tree Muntingia calabura. Using video recording, we found that bats significantly decreased the foraging frequency on trees when a visual cue of T. alba was present. However, no stimuli of potential predatory birds, including vocalization of T. alba, affected bat foraging frequency. There was a change in bat behavior during 7 min, but then their frequency of activity gradually increased. Consequently, the presence of T. alba decreased by up to ten times the rate of seed removal. These results indicate that risk sensitivity of frugivorous phyllostomid bats depends on predator identity and presence. Among the predators used in this study, only T. alba is an effective bat predator in the Neotropics. Sound stimuli of T. alba seem not to be a cue of predation risk, possibly because their vocalizations are used only for intraspecific communication. This study emphasizes the importance of evaluating different predator stimuli on the behavior of vertebrates, as well as the effects of these stimuli on trait-mediated trophic cascades. © 2013 Springer-Verlag Berlin Heidelberg.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

The strength of top-down indirect effects of carnivores on plants (trophic cascades) varies greatly and may depend on the identity of the intermediate (herbivore) species. If the effect strength is linked to functional traits of the herbivores then this would allow for more general predictions. Due to the generally sub-lethal effects of herbivory in terrestrial systems, trophic cascades manifest themselves in the first instance in the fitness of individual plants, affecting both their numerical and genetic contributions to the population. We directly compare the indirect predator effects on growth and reproductive output of individual Vicia faba plants mediated by the presence of two aphid species: Acyrtosiphon pisum is characterised by a boom and bust strategy whereby colonies grow fast and overexploit their host plant individual while Megoura viciae appear to follow a more prudent strategy that avoids over-exploitation and death of the host plant.Plants in the field were infested with A. pisum, M. viciae or both and half the plants were protected from predators. Exposure to predators had a strong impact on the biomass of individual plants and the strength of this effect differed significantly between the different herbivore treatments.A. pisum had a greater direct impact on plants and this was coupled with a significantly stronger indirect predator effect on plant biomass.Although the direct impact of predators was strongest on M. viciae, this was not transmitted to the plant level, indicating that the predator-prey interactions strength is not as important as the plant-herbivore link for the magnitude of the indirect predator impact. At the individual plant level, the indirect predator effect was purely due to consumptive effects on herbivore densities with no evidence for increased herbivore dispersal in response to presence of predators. The nature of plant-herbivore interactions is the key to terrestrial trophic cascade strength. The two herbivores that we compared were similar in feeding mode and body size but differed their way how they exploit host plants, which was the important trait explaining the strength of the trophic cascade.

Relevância:

100.00% 100.00%

Publicador:

Resumo:

La iniciativa FIWARE ofrece un conjunto de APIs potentes que proporcionan la base para una innovación rápida y eficiente en el Internet del Futuro. Estas APIs son clave en el desarrollo de aplicaciones que usan tecnologías muy recientes e innovadoras, como el Internet de las cosas o la Gestión de Identidad en módulos de seguridad. Este documento presenta el desarrollo de una aplicación web de FIWARE usando componentes virtualizados en máquinas virtuales. La aplicación web está basada en “la fábrica de chocolate de Willy Wonka” como una implementación metafórica de una aplicación de seguridad e IoT en un entorno industrial. El componente principal es un servidor web en node.js que conecta con varios componentes de FIWARE, conocidos como “Generic Enablers”. La implementación está compuesta por dos módulos principales: el módulo de IoT y el módulo de seguridad. El módulo de IoT gestiona los sensores instalados por Willy Wonka en las salas de fábrica para monitorizar varios parámetros como, por ejemplo, la temperatura, la presión o la ocupación. El módulo de IoT crea y recibe información de contexto de los sensores virtuales. Esta información de contexto es gestionada y almacenada en un componente de FIWARE conocido como Context Broker. El Context Broker está basado en mecanismos de subscripciones que postean los datos de los sensores en la aplicación, en tiempo real y cuando estos cambian. La conexión con el cliente se produce mediante Web Sockets (socket.io). El módulo de seguridad gestiona las cuentas y la información de los usuarios, les autentica en la aplicación usando una cuenta de FIWARE y comprueba la autorización para acceder a distintos recursos. Distintos roles son creados con distintos permisos asignados. Por ejemplo, Willy Wonka puede tener acceso a todos los recursos, mientras que un Oompa Loopa encargado de la sala del chocolate solo deberías de tener acceso a los recursos de su sala. Este módulo está compuesto por tres componentes: el Gestor de Identidades, el PEP Proxy y el PDP AuthZForce. El gestor de identidades almacena las cuentas de FIWARE de los usuarios y permite la autenticación Single Sing On usando el protocolo OAuth2. Tras logearse, los usuarios autenticados reciben un token de autenticación que es usado después por el AuthZForce para comprobar el rol y permiso asociado del usuario. El PEP Proxy actúa como un servidor proxy que redirige las peticiones permitidas y bloquea las no autorizadas.