"CAS を利用した Single Sign On 環境の構築"
|
|
|
- さなえ そめや
- 6 years ago
- Views:
Transcription
1 CAS 2 SSO Authorization 1,3, 2,3, 2, 2, Central Authentication and Authorization Service (CAS 2 ) Web Application Single Sign On Authorization CAS 2 SSO/AuthZ Jan , p. 1/40
2 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary Jan , p. 2/40
3 >. Example IP Jan , p. 3/40
4 > > UserID Password DB Single Sign On DB Jan , p. 4/40
5 >... CAS Jan , p. 5/40
6 > CAS SSO CAS CAS Jan , p. 6/40
7 Brief survey of SSO using CAS CAS (Central Authentication Service) Web Application Single Sign On (SSO) Yale University, JA-SIG Open Source Cookie, http direction, JavaScript SSL (https) DB, DB DB Web Application CAS Jan , p. 7/40
8 Brief... using CAS > Usual Authentication Web Browser 1 Web Application Web Application DB Web Application DB Web Application 2 USER DB Jan , p. 8/40
9 Brief... using CAS > AuthN mechanisum of CAS USER DB Web Application Sending Ticket Data / Its Reply AuthN CAS Server AuthN Data Web Browser Web Application CAS client library Web Application DB Jan , p. 9/40
10 Brief... using CAS > Web Browser USER DB AuthN 1 Web Application Sending Ticket Data / Its Reply CAS Server Web Application AuthN Data 2 Web Browser USER DB App. SSL... CAS App. Jan , p. 10/40
11 Brief... using CAS > AuthN mechanisum of CAS Ticket Granting Cookie (TGC) Cookie Browser TGC Service Ticket (ST) URL Parameter App. One Time Ticket App. CAS Server ST = Jan , p. 11/40
12 Brief... using CAS > AuthN mechanisum of CAS TGC App. CAS Server Login Window WEB Browser 1. Access 2a. Redirection 2b. Login Window WEB Application CAS Server User DB CAS Server TGC App. ST ST WEB Application WEB Browser 4. Redirection with TGC/ST TGC CAS Server 3a. Input User ID/Password 3b. Authentication 3c. Result User DB Jan , p. 12/40
13 Brief... using CAS > AuthN mechanisum of CAS App. ST CAS Server ST WEB Browser 6. Response WEB Application 5a. Send ST ST 5b. Validation Result CAS Server User DB Jan , p. 13/40
14 Brief... using CAS > AuthN mechanisum of CAS TGC App. CAS Server redirection WEB Browser TGC 1. Access WEB Application 2a. Redirection TGC CAS Server User DB TGC App. ST WEB Browser TGC ST 4. Redirection with ST WEB Application CAS Server User DB TGC Login Window Jan , p. 14/40
15 Brief... using CAS > CAS ST, App. (current version fix ) CAS Server App. User ID POST method CAS 2 Authorization Jan , p. 15/40
16 Brief survey of Authorization Environment using CAS 2 CAS 2 (Central Authentication and Authorization Service) CAS ST App. DB CAS Server App. CAS Web Application CAS 2 module FOR WHICH (URL of Web Application) WHO (User) WHEN (Access Time) FROM WHERE (Client) Jan , p. 16/40
17 Brief... using CAS 2 > Access Control List CAS 2 CAS-ACL dn: cn=entry1,ou=gakumu,ou=cas,o=nagoyauniv cas-allow: (&(uid=naito)(date>= ) (date<= )(ip= /24)) cas-service: cas-attributes: uid,mail URL uid is naito Access time is between 2005/10/10 and 2005/11/10 Client IP: /24 Jan , p. 17/40
18 Brief... using CAS 2 > Access Control List CAS 2 CAS-ACL dn: cn=entry1,ou=gakumu,ou=cas,o=nagoyauniv cas-allow: (&(uid=naito)(date>= ) (date<= )(ip= /24)) cas-service: cas-attributes: uid,mail cas-attributes App.. App. Jan , p. 18/40
19 Brief... using CAS 2 > AuthZ mechanisum of CAS App. App. URL redirection App. URL CAS-ACL ST WEB Browser TGC ST 2. Redirection with ST WEB Application CAS Server 1a. Authorization 1b. Result CAS-ACL Access Denied Jan , p. 19/40
20 Brief... using CAS 2 > AuthZ mechanisum of CAS App. ST CAS Server App. URL ST CAS-ACL ST Man-in-Middle Attack ST App. WEB Browser TGC 6. Response WEB Application 3. Send ST ST 5. Validation CAS Server 4a. Authorization 4b. Result CAS-ACL Jan , p. 20/40
21 Brief... using CAS 2 > AuthZ mechanisum of CAS, ST Access Denied redirection WEB Browser TGC 1. Access Invalid ST WEB Application 5. Redirection 2. Send ST Invalid ST 4. Invalid CAS Server 3a. Authorization 3b. Result CAS-ACL Jan , p. 21/40
22 CAS 2 CAS 2 CAS 2 CAS 2,... Jan , p. 22/40
23 > CAS Server CAS Server access log 1000, 3000 Oracle, Jan , p. 23/40
24 > ID,..., CAS, DB LDAP... Jan , p. 24/40
25 > ID DB... CAS... CAS DB... CAS DB, DB App. CAS Jan , p. 25/40
26 > CAS-ACL,. CAS-ACL Role Management = Identity Management Role Management = Jan , p. 26/40
27 SSO PKI ( ), Jan , p. 27/40
28 > IC Card with PKI... IC Card BBS light PKI IC Card Reader, BBS SSO/AuthZ Jan , p. 28/40
29 > Example CAS 2 SSO requirement : requirement :, BBS requirement :,.... Jan , p. 29/40
30 > Example 3-tiered security hierarchy Level 2 Level 1 Username/Password authentication Level 0 Subscriber ID Level = Level 2 = Level 1 BBS = Level 0 Jan , p. 30/40
31 > Mutiple-tiered secuirty hierarchy hierarchy CAS 2 Level 2 User Level 2 Application Level 1 User Level 1 Application Level 0 User Level 0 Application Jan , p. 31/40
32 > CAS 2 secuirty hierarchy CAS-ACL security level CAS-ACL FOR WHICH (URL of Web Application) WHO (User) WHEN (Access Time) FROM WHERE (Client) HOW (Security Level) CAS 2 multiple-tiered AuthN sequence CAS 2 Jan , p. 32/40
33 ... > CAS 2... > security level in CAS-ACL dn: cn=entry1,ou=gakumu,ou=cas,o=nagoyauniv cas-allow: (&(uid=naito)(date>= ) (date<= )(ip= /24)) cas-security-hierarchy: X509 cas-service: cas-attributes: uid,mail URL ACL X509 (Level 2) Jan , p. 33/40
34 ... > CAS 2... > Modify AuthN mechanism in CAS 2 fall down sequence TGC DB... CAS (version 3) SpringFramework Multiple-tiered AuthN sequence Dependancy Injection Multiple-tiered AuthN sequence Jan , p. 34/40
35 ... > CAS 2... > Modify AuthN mechanism in CAS 2 Example 3-tiered hierarchy... bean bean class="x509credentialstoprincipalhandler" property name="loginlevel" value="x509" bean class="bindldapauthenticationhandler" property name="loginlevel" value="pin_uid" bean class="subscriberidldapauthenticationhandler" property name="loginlevel" value="subscriberid" Login Level bean <list> <value>subscriberid</value> <value>pin_uid</value> <value>x509</value> </list> Jan , p. 35/40
36 ... > CAS 2... > Modify AuthZ mechanism in CAS 2 Case 1 : Level 2 Authentication Level 2 TGC Level 2 App. Web Browser TGC with Level 2 ST 2. Redirection 1. Access with client certificate Web Application with Security Level 2 CAS Server Jan , p. 36/40
37 ... > CAS 2... > Modify AuthZ mechanism in CAS 2 Case 2 : Level 1 Level 2 App. ST Web App. CAS Server redirect, Level 2 App. Level 2 TGC Web Browser TGC with Level 1 1. Access 2. Redirection to obtain client certification Web Application with Security Level 2 CAS Server Jan , p. 37/40
38 Summary CAS 2 SSO/AuthZ. CAS 2 SSO/AuthZ.,. CAS-ACL. SSO/AuthZ,, CAS 2 Beta Version Jan , p. 38/40
39 References,,,,, CAS, 47 (2006) Naito, Kajita, Hirano, Mase, Multiple-tiered Security Hierarachy for Web Applications Using Central Authentication and Authorization Service, Proceeding of Middleware Workshop on IEEE International Symposium on Applications and the Internet (SAINT 2007), Hiroshima, JAPAN (2007). Jan , p. 39/40
40 Q and A Jan , p. 40/40
"CAS を利用した Single Sign On 環境の構築"
CAS 2 Single Sign On 1,3, 2,3, 2, 2,3 1 2 3 May 31, 2007 ITRC p. 1/29 Plan of Talk Brief survey of Single Sign On using CAS Brief survey of Authorization Environment using CAS 2 Summary May 31, 2007 ITRC
Plan of Talk CAS CAS 2 CAS Single Sign On CAS CAS 2 CAS Aug. 19, 2005 NII p. 2/32
CAS Single Sign On [email protected] [email protected], Aug. 19, 2005 NII p. 1/32 Plan of Talk CAS CAS 2 CAS Single Sign On CAS CAS 2 CAS [email protected], Aug. 19, 2005 NII p.
CAS Yale Open Source software Authentication Authorization (nu-cas) Backend Database Authentication Authorization [email protected], Powered by A
Central Authentication System [email protected] [email protected], Powered by Adobe Reader & ipod Photo March 10, 2005 RIMS p. 1/55 CAS Yale Open Source software Authentication Authorization
Windows Oracle -Web - Copyright Oracle Corporation Japan, All rights reserved.
Windows Oracle -Web - Copyright Oracle Corporation Japan, 2004. All rights reserved. Agenda Oracle Windows Windows Oracle 1 / Active Directory/Enterprise User Security 1-1 Windows 1-2 Kerberos 1-3 Enterprise
Oracle Identity Managementの概要およびアーキテクチャ
Oracle Identity Management 2003 12 Oracle Identity Management... 3 ID... 3 ID... 4 ID... 4 Oracle Identity Management... 5 Oracle Identity Management... 6 Oracle Identity Management... 7 ID... 8 Application
Web Web ( (SOAP (SOAP/http (WSDL UDDI 1. 2.XML 3. (XDoS http, https SOAP XML Web/App ( App
Web 2005 12 15 XML Day XML [email protected] 2005 1 1 Web Web Web 2005 2 2 Web 2005 3 3 Web ( (SOAP (SOAP/http (WSDL UDDI 1. 2.XML 3. (XDoS http, https SOAP XML Web/App ( App 2005 4 4 SOAP Crypto-Gram
1: 3 CAS[3] uportal[4] (Web ) 3.1 CAS CAS[3] Yale JA-SIG [5] CAS 1. 2(1) CAS Web (2)CAS ID LDAP 2. 2(3) CAS Web CAS Ticket (4)Web Ticket 3. Ticket Web
,, 2007 8 2006 CAS uportal Web 2006 10 Web keyword:, CAS, uportal, 1 SOSEKI 1300 2006 PC LAN IT (LMS: Learning Management System) WebCT CALL (Computer Assisted Language Learning) LMS IT [1] 2004 SOSEKI
Oracle Calendar Oracle Collaboration Suite 2(9.0.4) Creation Date: Jun 04, 2003 Last Update: Nov 18, 2003 Version:
Oracle Calendar Oracle Collaboration Suite 2(9.0.4) Creation Date: Jun 04, 2003 Last Update: Nov 18, 2003 Version: 1.1-1- -2- 1.... 4 2. Oracle Calendar... 4 2.1... 4 2.2... 5 2.3 https ( 9.0.4.0 )...
内閣官房情報セキュリティセンター(NISC)
( ) ...1 1.1.1...1 (1)..1 (2)...1 (3)...1 1.1.2...2 (1)...2 (2)...2 (3)...2 (4)...3 (5)...3 (6)...3 1.1.3...4...10 2.1...10 2.1.1...10...10...10 (1)...10 (2)... 11 (3)... 11 (4)...12 (5)...13 (6)...13
2.1... 1 2.1.1.1... 1 (1). 1 (2)... 1 (3)... 1 2.1.1.2... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.3... 1 (1)... 1 (2)... 1 (3)... 1 2.1.1.4... 2 2.1.1.5... 2 2.2... 3 2.2.1... 3 2.2.1.1... 3... 3... 3 (1)...
Oracle Web Conferencing Oracle Collaboration Suite 2 (9.0.4) Creation Date: May 14, 2003 Last Update: Jan 21, 2005 Version: 1.21
Oracle Web Conferencing Oracle Collaboration Suite 2 (9.0.4) Creation Date: May 14, 2003 Last Update: Jan 21, 2005 Version: 1.21 ... 2... 3...3...4...5 Oracle9i Platform...10 Oracle Collaboration Suite...12...15...23
Oracle Secure Enterprise Search 10gを使用したセキュアな検索
Oracle Secure Enterprise Search 10g 2006 3 Oracle Secure Enterprise Search 10g... 3... 3... 3... 4 Oracle Internet Directory... 4 Microsoft Active Directory... 5... 5 1... 5 2... 6 3 ACL... 6 4 ACL...
PowerPoint プレゼンテーション
Room D Azure Active Directory によるクラウドアプリ連携編 ~ Password Windows Intune Password Windows Intune デスクトップ PC(Windows) に対するガバナンス Azure Active Directory World SaaS Windows Server Active Directory World 業務データ
7,, i
23 Research of the authentication method on the two dimensional code 1145111 2012 2 13 7,, i Abstract Research of the authentication method on the two dimensional code Karita Koichiro Recently, the two
2
2 485 1300 1 6 17 18 3 18 18 3 17 () 6 1 2 3 4 1 18 11 27 10001200 705 2 18 12 27 10001230 705 3 19 2 5 10001140 302 5 () 6 280 2 7 ACCESS WEB 8 9 10 11 12 13 14 3 A B C D E 1 Data 13 12 Data 15 9 18 2
Web ( ) [1] Web Shibboleth SSO Web SSO Web Web Shibboleth SAML IdP(Identity Provider) Web Web (SP:ServiceProvider) ( ) IdP Web Web MRA(Mail Retrieval
SAML PAM SSO Web 1,a) 1 1 1 Shibboleth SAML Web IMAPS Web SAML PAM IMAPS SSO Web Shibboleth Web SSO, Shibboleth, SAML, Web, Web-based mail system with SSO authentication through SAML supporting PAM Makoto
Web...1 1....2 1.1....2 1.2....3 1.3. STEPS...4 2. Web...5 2.1. Web...5 2.2....5 2.3. Form Cookie...6 2.4....7 2.5. HTTP...7 3. STEPS Web...8 3.1....8
2001/1/11 Web Simplified Techniques for Econometric Plannings & Simulations for WWW Fujiwara Takamichi 97-5075 N-23 Web...1 1....2 1.1....2 1.2....3 1.3. STEPS...4 2. Web...5 2.1. Web...5 2.2....5 2.3.
組織変更ライブラリ
2003 6 1...1 2...2 3...4 3.1...4 3.2...5 3.3...6 3.4...6 4...7 4.1...7 4.2...9 4.3...9 4.4...10 4.5...10 5 Web...11 5.1 WebUI...11 5.2Oracle 9iFS WebUI...12 6Oracle9i AS...13 6.1OiD...13 6.2 SSO...13 7...14
Cisco® ASA シリーズルーター向けDigiCert® 統合ガイド
Cisco ASA DigiCert 2013 7 8 Cisco ASA VPN DigiCert : 2013 7 8 Copyright 2018 DigiCert, Inc. All rights reserved. DigiCert DigiCert DigiCert, Inc. Symantec Norton Symantec Corporation DigiCert, Inc. DigiCert,
untitled
WS-Federation Federation PKI [email protected] Agenda WS-Federation Federation Active Directory ADFS) CWID2005 CWID2005- Windows Windows Kerberos 5/LDAP X.509/Smartcard/PKI VPN/802.1x/RADIUS SSPI/SPNEGO
Oracle Application Server 10g( )インストール手順書
Oracle Application Server 10g (10.1.2) for Microsoft Windows J2EE Oracle Application Server 10g (10.1.2) for Microsoft Windows J2EE and Web Cache...2...3...3...4...6...6...6 OS...9...10...12...13...25...25
スライド 1
IBM Global Technology Services PCI DSS ITS IAS. IAS. 2I/T 1PCIDSS 2 2 PCI DSS QSA PCIDSS Fi Gap IBM PCIDSS IBM PCIDSS QSA QSA PCIDSS ROC* 1/ * ROC: Report on Compliance 3 PCI DSS 4 PCIDSS PCIDSS 1. PCIDSS
<Insert Picture Here> Oracle Business Intelligence 2006/6/27
Oracle Business Intelligence 2006/6/27 Oracle Business Intelligence Suite Enterprise Edition Oracle Warehouse Builder 10g Release 2 Agenda BI FY07 3 Oracle Business Intelligence 2007
shio_20041004.PDF
JPNIC JPCERT/CC 2004 Web 2004 10 4 Web Web Web WASC Web Application Security Consortium 7 Web Security Threat Classification Web URL 2 ...?? It depends!? It depends!??? 3 ? It depends!...
FileMaker Server Getting Started Guide
FileMaker Server 13 2007-2013 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker Bento FileMaker, Inc. FileMaker WebDirect Bento FileMaker,
Encryption Security
200426 XML Consortium WG XML Signature XML Encryption XKMS2.0 X-KRSS:Register X-KISS:Locate X-KISS:Validate WS-Security XACML WG 2004/02/06 1 XML WG 2004/02/06 2 2001 2002 2003 XKMS XML SAML SSO SAML XML
BIG‑IP Access Policy Manager | F5 Datasheet
2 3 5 7 8 Secure Web Gateway 10 12 BIG-IP APM 13 F5 Global Services 13 13 BIG-IP Access Policy Manager (APM) LAN BIG-IP APM IT LAN 1 Web OAM XenApp Exchange Web Web Web Web Web web BIG-IP APM LAN IT /
FirePass Edge Client TM Edge Client LAN Edge Client 7.0 Edge Client Edge Client Edge Client Edge Client Edge Client Edge Client LAN Edge Client VPN Wi
Security FirePass SSL VPN FirePass SSL VPN Virtual Edition VE) 1 Web E 11 12 icontrol SSL VPN API 12 FirePass FirePass Edge Client TM Edge Client LAN Edge Client 7.0 Edge Client Edge Client Edge Client
SAML
2003 6 2 XML Consortium SWG ( )NTT ( ) Copyright XML Consortium 2003/06/02 1 Copyright XML Consortium 2003/06/02 2 2002 2003 7 8 9 10 11 12 1 2 3 4 5 6 3/5 6/2 Copyright XML Consortium 2003/06/02 3 Copyright
1. PKI (EDB/PKI) (Single Sign On; SSO) (PKI) ( ) Private PKI, Free Software ITRC 20th Meeting (Oct. 5, 2006) T. The University of Tokush
PKI LAN EDB/PKI and Campus Wireless LAN Authentication EDB/PKI http://web.db.tokushima-u.ac.jp/edb-manual/pki.html http://ldap.db.tokushima-u.ac.jp/wireless/ @. E-mail: [email protected] Id: itrc20th-20061005.tex,v
403-0702_‚Ofl¼
HP-UX HP System Insight Manager Whitepaper ..................................................................................2..............................................................2 SIM....................................................................................2.............................................................3................................................................................3
¥Í¥Ã¥È¥ï¡¼¥¯¥×¥í¥°¥é¥ß¥ó¥°ÆÃÏÀ
2 : TCP/IP : HTTP HTTP/2 1 / 22 httpget.txt: http.rb: ruby http get Java http ( ) HttpURLConnection 2 / 22 wireshark httpget.txt httpget cookie.txt ( ) telnet telnet localhost 80 GET /index.html HTTP/1.1
Epson Print Admin
Epson Print Admin NPD5368-02 JA Epson Print Admin Epson Print Admin Epson Print Admin Epson Print Admin Epson Open Platform Epson Open Platform Epson Print Admin Epson Print Admin Epson Print Admin Epson
etrust Access Control etrust Access Control UNIX(Linux, Windows) 2
etrust Access Control etrust Access Control UNIX(Linux, Windows) 2 etrust Access Control etrust Access Control 3 ID 10 ID SU ID root 4 OS OS 2 aaa 3 5 TCP/IP outgoing incoming DMZ 6 OS setuid/setgid) OS
Oracle Application Server 10g(9
Oracle Application Server 10g (9.0.4) for Microsoft Windows J2EE Oracle Application Server 10g (9.0.4) for Microsoft Windows J2EE and Web Cache...2...3...3...4...6...6...6 OS...9...10...12...13...24...24
ICカード利用システムにおいて新たに顕現化したPre-play attackとその対策
IC Pre-play attack IC IC IC EMV EMV 1 IC IC Pre-play attack ATM Pre-play attack Pre-play attack IC EMV Pre-play attack... E-mail: [email protected] E-mail: [email protected] / /2015.10
2 BIG-IP 800 LTM v HF2 V LTM L L L IP GUI VLAN.
BIG-IP800 LTM v11.4.0 HF2 V1.0 F5 Networks Japan 2 BIG-IP 800 LTM v11.4.0 HF2 V1.0...1 1....3 1.1. LTM...3 2. L3...4 2.1. L3...4 2.2. L3...5 3....6 3.1....6 3.1.1. IP...6 3.1.2. GUI...10 3.1.3. VLAN...19
第2回_416.ppt
3 2 2010 4 IPA Web http://www.ipa.go.jp/security/awareness/vendor/programming Copyright 2010 IPA 1 2-1 2-1-1 (CSRF) 2-1-2 ID 2-1-3 ID 2-1-4 https: 2-1-5 ID 2-1-6 2-1-7 2-2 2-2-1 2-2-2 2-3 2 2-3-1 Web Copyright
DEIM Forum 2010 D Development of a La
DEIM Forum 2010 D5-3 432-8011 3-5-1 E-mail: {cs06062,cs06015}@s.inf.shizuoka.ac.jp, {yokoyama,fukuta,ishikawa}@.inf.shizuoka.ac.jp Development of a Large-scale Visualization System Based on Sensor Network
LWW EJ on Ovid LWW Ovid Online (Ovid Web Gateway) Ovid Online LWW tutorial Ovid Online Refresh Ovid Online LWW Ovid Medline, Cinahl, EBMR, Ovid
LWW EJ on Ovid Tutorial For Kagawa University Sep 2005 Ovid Technologies Japan Office [email protected] Visit our homepage at http://www.ovid.jp/site/index.html for more Japanese documents and latest news.
IPSJ SIG Technical Report Vol.2014-EIP-63 No /2/21 1,a) Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on tra
1,a) 1 1 2 1 Wi-Fi Probe Request MAC MAC Probe Request MAC A dynamic ads control based on traffic Abstract: The equipment with Wi-Fi communication function such as a smart phone which are send on a regular
11 Windows XP IP WEP (Web )
Docodemo-Net (WEP ) cis-supports 25 11 18 1 Docodemo-Net 3 2 Docodemo-Net 3 3 3 4 3 5 4 5.1 LAN........................................ 4 5.2 LAN........................................ 4 6 5 6.1 LAN........................................
i
21 Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed Networks 1125153 2010 3 2 i Abstract Fault-Toleranted Authentication Data Distribution Protocol for Autonomous Distributed
/07/ /10/12 I
Certificate Policy Version 1.10 2018 10 12 1.00 2018/07/24 1.10 2018/10/12 I 1.... 1 1.1... 1 1.2... 1 1.3 PKI... 2 1.3.1 CA... 2 1.3.2 RA... 2 1.3.3... 2 1.3.3.1... 2 1.3.3.2... 3 1.3.4... 3 1.3.5...
OpenAM(OpenSSO) のご紹介
学認 Shibboleth とOpenAM を連携させて 学外と学内をシングルサインオン オープンソース ソリューション テクノロジ株式会社 Copyright 2011 Open Source Solution Technology Corporation All Rights Reserved. - 1 - 目次 会社紹介 OpenAM のご紹介 概要 開発の歴史 シングルサインオン方式 認証方式
Epson Print Admin
Epson Print Admin NPD5369-02 JA Epson Print Admin Epson Print Admin Epson Print Admin Epson Open Platform Epson Open Platform Epson Print Admin Epson Print Admin 2 B K L U OS Windows OSWindows 10Windows
Aventail EX-2500/1600/750 STv(Ver.8.9) Sep 2007 c 2007 SonicWALL,Inc. All rights reserved.
Aventail EX-2500/1600/750 STv(Ver.8.9) Sep 2007 c 2007 SonicWALL,Inc. All rights reserved. SonicWALL Aventail EX-2500/1600/750 v8.9 1 4 2 4 3 5 3.1................................................ 5 3.2..................................
DocuCentre-III C3300 / C2200
C3300 / C2200 2 3 50 45 35 35 35 35 G4 G3 Management Ecology Scan Fax Print Copy C3300 / C2200 Product Summary 4 5 SCAN 6 7 COPY 8 9 PRINT 10 FAX 11 SECURITY 12 12 13 13 MANAGEMENT IC Card Gate IC Card
Microsoft Word - D JP.docx
Application Service Gateway Thunder/AX Series vthunder ライセンスキー インストール 手順 1 1.... 3 2. vthunder... 3 3. ACOS... 3 4. ID... 5 5.... 8 6.... 8 61... 8 62 GUI... 10 2 1. 概要 2. vthunder へのアクセス 方法 SSHHTTPSvThunder
HIS-CCBASEver2
Information Access Interface in the Immersive Virtual World Tetsuro Ogi, *1*2*3 Koji Yamamoto, *3*4 Tadashi Yamanouchi *3 and Michitaka Hirose *2 Abstract - In this study, in order to access database server
○広島大学船員就業規則
1 (14 2 1 (58 2 (9 3 (10 4 (1112 5 (1316 6 (1720 7 (2123 8 (2425 3 (26 4 (27 37 5 (38 6 (3959 7 (60 8 (6166 9 (67 78 10 (79 11 (80 12(81 13 (82 14 (83 15 (84 1641 79 1 ( 1 ( 1641 121 2 ( ( ( 2 ( 22 100
3_23.dvi
Vol. 52 No. 3 1234 1244 (Mar. 2011) 1 1 mixi 1 Casual Scheduling Management and Shared System Using Avatar Takashi Yoshino 1 and Takayuki Yamano 1 Conventional scheduling management and shared systems
/02/ /09/ /05/ /02/ CA /11/09 OCSP SubjectAltName /12/02 SECOM Passport for Web SR
for Web SR Certificate Policy Version 2.50 2017 5 23 1.00 2008/02/25 1.10 2008/09/19 1.20 2009/05/13 5 1.30 2012/02/15 5.6 CA 1.40 2012/11/09 OCSP SubjectAltName 2.00 2013/12/02 SECOM Passport for Web
wp_integrating_active_directory_ml
Apple OS X Mountain Lion v10.8 2 OS X Active Directory Mac Mac Active Directory Mac Windows Apple OS X Active Directory Apple Open Directory Open Directory OS X OS X OS X Server Open Directory LDAP Kerberos
IPSJ SIG Technical Report * Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka
* Wi-Fi Survey of the Internet connectivity using geolocation of smartphones Yoshiaki Kitaguchi * Kenichi Nagami and Yutaka Kikuchi With the rapid growth in demand of smartphone use, the development of
FileMaker Server Getting Started Guide
FileMaker Server 11 2004-2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker FileMaker, Inc. FileMaker, Inc. FileMaker FileMaker,
untitled
Studies in Human Geography 32 Geoenvironmental Sciences, Graduate School of Life and Environmental Sciences, University of Tsukuba, Japan ArcGIS Geography Network ArcGIS ArcGIS ArcGIS Geography Network
<Documents Title Here>
Oracle Application Server 10g Release 2 (10.1.2) for Microsoft Windows Business Intelligence Standalone Oracle Application Server 10g Release 2 (10.1.2) for Microsoft Windows Business Intelligence Standalone
Lync Server 2010 Lync Server Topology Builder BIG-IP LTM Topology Builder IP Lync 2010 BIG IP BIG-IP VE Virtual Edition BIG-IP SSL/TLS BIG-IP Edge Web
1.1 Microsoft Lync Server 2010 BIG-IP LTM 2 4 5 BIG-IP : Lync 6 BIG-IP : Lync 7 BIG-IP : - 8 BIG-IP : - 9 A: BIG-IP Microsoft Lync Server 2010 Microsoft Lync Server 2010 Office Communications Server BIG-IP
1 DHT Fig. 1 Example of DHT 2 Successor Fig. 2 Example of Successor 2.1 Distributed Hash Table key key value O(1) DHT DHT 1 DHT 1 ID key ID IP value D
P2P 1,a) 1 1 Peer-to-Peer P2P P2P P2P Chord P2P Chord Consideration for Efficient Construction of Distributed Hash Trees on P2P Systems Taihei Higuchi 1,a) Masakazu Soshi 1 Tomoyuki Asaeda 1 Abstract:
JP1/Integrated Management - Service Support 操作ガイド
JP1 Version 9 JP1/Integrated Management - Service Support 3020-3-R92-10 P-242C-8F94 JP1/Integrated Management - Service Support 09-50 OS Windows Server 2008 Windows Server 2003 OS JP1/Integrated Management
