• Aucun résultat trouvé

DARIAH Authentication and Authorization Infrastructure (AAI) Servic...

N/A
N/A
Protected

Academic year: 2022

Partager "DARIAH Authentication and Authorization Infrastructure (AAI) Servic..."

Copied!
1
0
0

Texte intégral

(1)

DARIAH-EU AAI Service Provider Workshop and colocated 1st FIM4D WG Meeting

The event will take place from 1st to 2nd June, 2016, in Tübingen, Germany

Schedule

Day 1 (1st June): Providing online services to a SAML based identity federation using Shibboleth software

Trainers: Lukas Hämmerle (GÉANT/SWITCH), Martin Haase (DAASI International)

A resource or service provider needs to install a server called Service Provider (SP) and integrate it with his or her service in order to securely provide resources and services to a SAML based identity federation online. In this submodule the participants install, test and configure a Service Provider using open source Shibboleth SP software. The goal is to make the participants familiar with the basics configuration of Shibboleth SP. At the end of the training participants should be familiar with the basic aspects of running a Shibboleth SP.

09:00 Welcome and Introductions

09:15 Federated Identity Management, SAML, Shibboleth and VM Setup 10:30 Coffee break

10:50 Basic Shibboleth SP Installation and Configuration 12:30 Lunch break

13:30 Session Handling and User Attributes 15:00 Coffee break

15:20 Access Control, Advanced Topics and Q&A session 17:00 Close

19:00 Social gathering in a restaurant

Day 2 (2nd June): DARIAH AAI session, and FIM4D meeting

Trainers: Peter Gietz, Martin Haase (DARIAH-DE / DAASI International) 09:00 Coffee and arrivals

09:15 Introduction to the DARIAH AAI (Overview) 10:45 Coffee break

11:00 Configuring the Shibboleth SP for the DARIAH AAI (Hands-On Part) 12:30 Lunch break

13:30 FIM4D meeting Part 1 15:00 Coffee break

15:15 FIM4D meeting Part 2

16:15 Wrap-up and post-workshop questionnaire 17:00 Close

Références

Documents relatifs

Similarly to the case of user authentication frameworks, for server authentication frame- works the basic factors SAMS (Server Authentication Method Strength), SCMA (Server

Based on this first large customer journey process mining project we learned two key lessons: self service is not a one-size-fits-all approach, and our data core... approach

The first one is to classify the UDDI nodes published by the different providers of the SC and the second one is to select the best services, it is based on the organization of web

In F M SP , we model the feature Service messaging DP as mandatory be- cause the three modeled communication technologies SOAP , REST and MOM are messaging-based, and the modeled

responds, after successful authorization, with the requested metadata and/or data. The metadata may be used for referral. Communities that typically collaborate with the data

exchange value.” [32] The goal of a platform is to enable interactions between producers and consumers. Interaction is a fundamental unit of analysis on a

We focus on the capacity changes during lockdown by inspecting two data sources: (1) to understand how ISPs responded by adding capacity to interconnects, we study the

This session provides an update of Cisco's voice solutions for service providers, including those for residential and managed business voice applications.. This session covers