I tried to discuss about „perimeter authentication“ in one extra part of IT-Security“™s blogs, because this authentication“™s process is an essential approach in a heterogonous world of systems, applications and technologies that they need to trust and communicate to each other. Generally, we discussed about perimeter authentication, if a remote user requires an asserted identity and some form of proof material to an authentication server that performs the verification and then passes an artifact, or…
As I mentioned, JAAS is able for two important tasks: authentication and authorization of users. Now, let us see more…
Derzeit nutzen viele Mitarbeiter ihre privaten Geräte im Unternehmensumfeld und speichern Unternehmensdaten darauf. Der als „Bring Your Own Device“(BYOD) bezeichnete…
Wie Howard Beader (Vice President, Oracle Fusion Middleware) in „Musings on Fusion Middleware ®Oracle OpenWorld 2013“ [siehe 1] geschrieben hat,…
Schönes Blog Posting von Jakob Freund, warum alle BPM-Interessierten diesen Showdown nicht verpassen sollten…: http://www.bpm-guide.de/2013/05/07/camunda-vs-oracle-roadshow/
That’s good news and solves part of the licensing problem we always had: You don’t have to have a separate…