Archive | July, 2010

is it going to rain (.com)?

goingtorain.com geo-locates your IP address and checks the weather to tell you, in one simple word, whether it’s going to rain (or snow) today.
(Link: is it going to rain (.com)?)

8.5.3. Using JBoss Login Modules

JBoss includes several bundled login modules suitable for most user management needs. JBoss can read user information from a relational database, an LDAP server or flat files. In addition to these core login modules, JBoss provides several other login modules that provide user information for very customized needs in JBoss. Before we explore the individual login modules, let’s take a look at a few login module configuration options that are common to multiple modules.
(Link: 8.5.3. Using JBoss Login Modules)

Introduction to Securing Web Applications with JBoss and LDAP — Developer.com

The sample application described here demonstrates using LDAP with the JBoss Security Extension (JBossSX), and describes a simple API for managing users, roles, and groups in LDAP. In addition, this article demonstrates the use of the Abstract Factory pattern to implement pluggable persistence.

An Abstract Factory is used to decouple the LDAP access classes in order that LDAP can easily be replaced with another type of storage. This is useful if you are building multiple web applications for different clients, some requiring LDAP storage, and others requiring a database.
(Link: Introduction to Securing Web Applications with JBoss and LDAP — Developer.com)

XACML – Wikipedia, the free encyclopedia

XACML stands for eXtensible Access Control Markup Language. It is a declarative access control policy language implemented in XML and a processing model, describing how to interpret the policies.
(Link: XACML – Wikipedia, the free encyclopedia)

InfoQ Video: Understanding SOA Security Patterns

Jason Hogg makes a quick overview of security and application design followed by a more in-depth look at web services security, explaining the need for threat modeling through security design patterns. Hogg explains a number of design patterns related to processes, services and SOA security, detailing on how they can be applied to service-oriented systems.
(Link: InfoQ Video: Understanding SOA Security Patterns)

Security Patterns within a Service-Oriented Architecture (Part I of II)

This paper aims to challenge the reader to think about security-as-a-service within a service-oriented architecture. In this paper, we focus on an example of security as an infrastructure service in the context of an Enterprise Service Bus (ESB). We discuss the SOA architectural model and how the SOA principles can influence the definition of security as part of an overall service model, the benefits of a SOA based approach to security infrastructure components in a business environment and some typical patterns of the deployment of a SOA-security infrastructure.
(Link: Security Patterns within a Service-Oriented Architecture (Part I of II))

Security Assertion Markup Language – Wikipedia, the free encyclopedia

Security Assertion Markup Language (SAML) is an XML-based standard for exchanging authentication and authorization data between security domains, that is, between an identity provider (a producer of assertions) and a service provider (a consumer of assertions). SAML is a product of the OASIS Security Services Technical Committee.
(Link: Security Assertion Markup Language – Wikipedia, the free encyclopedia)

YouTube – Southwest Power Pool – About SPP

Southwest Power Pool’s mission is “helping our members work together to keep the lights on… today and in the future.” Learn how SPP – one of the United States’ Regional Transmission Organizations – got its start during World War II and grew into the organization it is today.
(Link: YouTube – Southwest Power Pool – About SPP)

Nuts & Bolts: Database Servers

We only use RAID controllers that have a battery backup for the cache, disable read-ahead caching, and turn on write-back caching. With this setup we’re able to configure MySQL to immediately flush all writes to the disk rather than relying on the operating system to periodically write the data to the drives. In reality, the writes will be staged to the controller’s cache, but with the battery backup we are protected from unexpected power outages which could otherwise cause data loss. In addition, since the controller is caching the writes in memory, it can optimize the order and number of writes that it makes to the physical disks to dramatically improve performance.
(Link: Nuts & Bolts: Database Servers)

Sauce Labs – Selenium-based Downloads, Hosting and Support

Sauce OnDemand runs web browsers in the cloud, which you can control using Selenium test scripts. It’s a drop-in replacement for Selenium RC, so configuring your scripts to use Sauce OnDemand is a snap. If your app is behind a firewall, Sauce Labs offers a simple, secure automated tunneling system to bridge between your secure infrastructure and ours.
(Link: Sauce Labs – Selenium-based Downloads, Hosting and Support)