A presentation explaining how to build Single Sign On functionality in PHP using standards such as OpenID, OAuth and SAML. Delivered on November 4, 2010 at Zendcon in Santa Clara
Updated version of my PHP in a mobile ecosystem talk. Looks at how PHP plays a role in the mobile world, and explains what php developers need to know about mobile development.
Presentation delivered at the PHPBenelux 2011 conference and the PHP UK conference 2011.
These slides are supposed to help you understand the basics of application security, and how the latest technologies come together to enable you to reduce the number of times people at your organization need to authenticate.
For more information visit. http://gluu.org
Single sign on (SSO) How does your company apply?Đỗ Duy Trung
This document discusses Single Sign On (SSO), which allows a user to access multiple services or applications with a single set of login credentials. It describes common SSO protocols like SAML and OpenID Connect and where SSO can be implemented, such as on-premise or in the cloud. Examples of SSO use cases and product categories are provided.
We try to describe what is a Single Sign-On, what were the reasons for it to be implemented, how did we do it at our company and what it gave us in terms of UX, Security and developer happiness.
Single sign-on (SSO) allows users to access multiple systems after one authentication. Common SSO protocols discussed include SAML, OAuth, and username/password. SAML is best for single sign-on across websites while OAuth is for secure API access. Best practices include high availability, proactive certificate management, custom error pages, and testing. The document provides an overview of SSO concepts and recommendations for implementation and troubleshooting.
The document discusses considerations for implementing a single sign-on (SSO) strategy. It recommends first agreeing on terminology, then assessing the current authentication and authorization landscape. The document outlines a vision of SSO utopia and compares approaches of building an in-house SSO solution versus purchasing a vendor framework. It proposes a roadmap including defining terms, assessing vendors, integrating new and existing applications, and production deployment.
IdP, SAML, OAuth are new acronyms for identity in the cloud. SAML is used for federated authentication between an identity provider (IdP) like Active Directory and a service provider (SP) like Office 365. The IdP authenticates the user and sends a SAML token with claims to the SP. OAuth streamlines authentication for mobile by issuing short-lived access tokens instead of passing full credentials or SAML assertions between each service. It allows authorization without passwords and tokens can be revoked, reducing risks of compromised apps. Office 365 uses Azure Active Directory as an IdP with SAML or OAuth to authenticate users from an on-premises Active Directory via federation or synchronization.
My slides from the Identity Protocol Smackdown session at Gartner Catalyst 2013. Ignite format - 20 slides, 15 seconds per slide. There are auto-builds on a few slides, so download and view in PowerPoint for the best experience.
The document discusses single sign-on best practices. It recommends developing troubleshooting practices for SSO failures, such as having a process to gather information and check login errors. It also suggests preventing failures by ensuring high availability of IDP servers, being proactive about certificate expirations, and testing implementations. Reliable and scalable SSO can be achieved using federation IDs instead of Salesforce usernames and disabling direct login to Salesforce when SSO is enabled.
The document discusses single sign-on (SSO) architectural design patterns and security considerations for financial web applications. It outlines the business need for SSO to integrate multiple systems. It then covers SSO use cases and design options, including using encrypted tokens or a security token service. The document also discusses input validation, session management, authentication, authorization and other security controls. It provides threat models and examples of attack trees and misuse cases related to SSO architectures. Finally, it presents a security risk framework for the secure design of SSO architectures.
What is SAML , How does SAML Works , request and Response , Enterprise and Web SSO, Advantages and Disadvantages of SSO, What is SSO, Single Sign On, Security Assertion Mark-up language.
Single sign-on (SSO) is an authentication method that allows a user to access multiple applications using one set of login credentials. It authenticates the user for all applications they have rights to use and eliminates additional login prompts when switching between applications in a session. SSO provides benefits like reduced costs, improved user experience with fewer passwords to remember, and centralized user management. However, it also presents risks such as being difficult to implement for existing applications and creating a single point of attack for hackers.
This document discusses SAML (Security Assertion Markup Language), an XML-based standard for exchanging authentication and authorization data between security domains. It describes SAML's advantages like platform neutrality and loose directory coupling. The document also outlines how Liferay supports SAML through an enterprise edition plugin, allowing single sign-on between Liferay and other applications. Key features of the Liferay SAML plugin include identity provider and service provider modes as well as IdP-initiated and SP-initiated single logout.
This document provides an overview of different techniques for implementing single sign-on (SSO):
- LTPA is IBM's default SSO mechanism, using a Base64 encoded token containing user identity and expiration time.
- SAML resolves domain boundaries using cookies and requires additional software, using XML assertion tokens between an identity provider and service provider.
- OAuth allows external apps to access user data in Connections by obtaining a token after the user logs into Connections.
- SPNEGO provides SSO by logging into Windows and accessing IBM software without additional logins. External security managers can also manage access to protected resources across applications.
Saml vs Oauth : Which one should I use?Anil Saldanha
SAML and OAuth are both standards for authentication and authorization but have key differences. SAML is an XML standard that enables single sign-on, federation, and identity management through security assertions. OAuth is a standard for authorization that allows secure access to internet resources without sharing passwords. While SAML uses XML tokens and supports SOAP/JMS transport, OAuth uses HTTP and JSON/binary tokens. SAML is commonly used for enterprise SSO and identity federation, while OAuth is designed for authorization of internet resources from applications. The document recommends using SAML for SSO and OAuth for delegated access to resources.
This document discusses single sign-on (SSO), which allows a user to use one set of login credentials to access multiple applications. SSO works by authenticating a user once at an authentication domain and then asserting the user's identity to other affiliated domains without requiring additional logins. The document outlines how SSO systems function, their components, dependencies, session management, authentication methods, applications, and advantages and disadvantages. Examples of SSO implementations include logging in with Facebook, Twitter, or LinkedIn to access multiple affiliated sites and services.
This document discusses single sign-on (SSO), which allows users to access multiple protected resources with one set of credentials. It describes different SSO approaches like smart card-based and Kerberos-based SSO. Legacy SSO uses scripts or services to automatically fill login prompts. Password synchronization keeps passwords synced across devices. Software token-based SSO issues tokens for access instead of credentials. The document also covers web SSO using cookies and PC login session-based SSO. It concludes with a brief discussion of potential future uses of SSO on mobile devices.
This document provides an overview of the Security Assertion Markup Language (SAML) protocol. SAML allows sites to exchange user authentication, authorization, and attribute information via XML messages. It enables single sign-on, single logout, and attribute sharing across applications. SAML 2.0 uses standards like XML, HTTP, and SOAP to standardize single sign-on across enterprise cloud apps. It works by exchanging assertions about users via protocols and bindings to authenticate users among sites. Benefits include centralized identity control and single sign-on without exposing passwords.
For more info: http://scn.sap.com/community/sso.
SAP Single Sign-On enables companies to eliminate the need for multiple passwords and user IDs. Centralize and simplify the way users log on to systems and applications. Lower the risks of unsecured login information, reduce help desk calls, and help ensure the confidentiality and security of personal and company data.
SSO refers to Single Sign-On, which allows a user to access multiple applications and systems with a single set of login credentials. It authenticates users through an authentication system that stores credentials in a centralized directory. SSO simplifies access for users while improving security by reducing the number of usernames and passwords that must be stored and remembered.
Outline :
Introduction of SSO
Need of SSO
Simple SSO process
Types of SSO
Architecture of web SSO system
Kerberos-Based Authentication
How it works?
Conclusion
References
SSO IN/With Drupal and Identitiy ManagementManish Harsh
This presentation is a result of research and evaluation for SSO and IDM majorly focused to Drupal CMS.
Enterprises, corporations and companies with multiple web properties are struggling to provide a better user experience and offer a single "corporate ID" and "Password" as the key for all.
This single ID should be used across all the properties and corporations should still be able to manage the access level and permission of the respective user based on the grants assigned to this ID in each web property.
Alfresco: Implementing secure single sign on (SSO) with OpenSAMLJ V
Alfresco Summit 2013 (Barcelona and Boston)
This talk will provide an introduction to the OASIS SAML standard (Security Assertion Markup Language) and then describe in detail how we use OpenSAML to provide secure SSO to Alfresco Cloud in a multi-tenant environment, both in terms of Share and the core Repository. We will demonstrate the steps required for an Enterprise Network Admin to setup a trusted SAML connection ('circle of trust') to their chosen Identity Provider (IdP) such as Centrify, Ping Identity, ForgeRock OpenAM (formerly Sun OpenSSO) or potentially any other type of IdP that supports SAML v2.0. We will also discuss possible future requirements and improvements.
http://summit.alfresco.com/boston/sessions/implementing-secure-single-sign-sso-opensaml
http://www.youtube.com/watch?v=KroIZa1co6g
The document discusses authentication with OAuth and Connected Apps. It provides an overview of using OAuth for API authentication and securing mobile apps. It then demonstrates how to build a simple web app using OAuth by registering an app, crafting an authorization URL, and exchanging codes for tokens. The document also covers considerations for mobile apps, building integration apps, and enabling enterprise authorization controls for OAuth apps.
Ebizon implemented single sign-on (SSO) for several clients using major social networking sites like Facebook, LinkedIn, QQ, and Sina Weibo. This allowed users to access multiple applications using one set of login credentials, improving the user experience. Technical challenges included designing intuitive interfaces, maintaining different security mechanisms, and preventing duplicate accounts. Ebizon's solution directed users through a single sign-on flow and checked for existing accounts, creating new ones if needed. This enhanced the user experience for clients like a non-profit, a semiconductor company, and an industry-student platform.
Extending SharePoint 2010 to your customers and partnersCorey Roth
This document discusses setting up an extranet in SharePoint 2010 using forms-based authentication and claims-based authentication. It provides links to resources on how to configure an extranet, how users will authenticate using username and password, and how to populate the extranet with content from SharePoint. It also lists upcoming sessions at a conference on using claims-based authentication in SharePoint 2010.
This document provides an overview and agenda for an Android motivation and development session. It introduces key Android concepts like activities, services, content providers, and permissions. It outlines an agenda to build a simple "Hello World" app, add additional features, and explore concepts like location services and maps. The document also discusses Android application components, lifecycles, and how learning Android can benefit career prospects and opportunities.
Shailen Sukul is a senior SharePoint architect who works with latest web technologies and SharePoint. He specializes in SharePoint installation, configuration, development and training. In his personal projects he prefers AWS and ASP.Net MVC. He maintains several open source SharePoint projects on CodePlex. You can follow him on Twitter or check out his blog for more information.
The document discusses single sign-on best practices. It recommends developing troubleshooting practices for SSO failures, such as having a process to gather information and check login errors. It also suggests preventing failures by ensuring high availability of IDP servers, being proactive about certificate expirations, and testing implementations. Reliable and scalable SSO can be achieved using federation IDs instead of Salesforce usernames and disabling direct login to Salesforce when SSO is enabled.
The document discusses single sign-on (SSO) architectural design patterns and security considerations for financial web applications. It outlines the business need for SSO to integrate multiple systems. It then covers SSO use cases and design options, including using encrypted tokens or a security token service. The document also discusses input validation, session management, authentication, authorization and other security controls. It provides threat models and examples of attack trees and misuse cases related to SSO architectures. Finally, it presents a security risk framework for the secure design of SSO architectures.
What is SAML , How does SAML Works , request and Response , Enterprise and Web SSO, Advantages and Disadvantages of SSO, What is SSO, Single Sign On, Security Assertion Mark-up language.
Single sign-on (SSO) is an authentication method that allows a user to access multiple applications using one set of login credentials. It authenticates the user for all applications they have rights to use and eliminates additional login prompts when switching between applications in a session. SSO provides benefits like reduced costs, improved user experience with fewer passwords to remember, and centralized user management. However, it also presents risks such as being difficult to implement for existing applications and creating a single point of attack for hackers.
This document discusses SAML (Security Assertion Markup Language), an XML-based standard for exchanging authentication and authorization data between security domains. It describes SAML's advantages like platform neutrality and loose directory coupling. The document also outlines how Liferay supports SAML through an enterprise edition plugin, allowing single sign-on between Liferay and other applications. Key features of the Liferay SAML plugin include identity provider and service provider modes as well as IdP-initiated and SP-initiated single logout.
This document provides an overview of different techniques for implementing single sign-on (SSO):
- LTPA is IBM's default SSO mechanism, using a Base64 encoded token containing user identity and expiration time.
- SAML resolves domain boundaries using cookies and requires additional software, using XML assertion tokens between an identity provider and service provider.
- OAuth allows external apps to access user data in Connections by obtaining a token after the user logs into Connections.
- SPNEGO provides SSO by logging into Windows and accessing IBM software without additional logins. External security managers can also manage access to protected resources across applications.
Saml vs Oauth : Which one should I use?Anil Saldanha
SAML and OAuth are both standards for authentication and authorization but have key differences. SAML is an XML standard that enables single sign-on, federation, and identity management through security assertions. OAuth is a standard for authorization that allows secure access to internet resources without sharing passwords. While SAML uses XML tokens and supports SOAP/JMS transport, OAuth uses HTTP and JSON/binary tokens. SAML is commonly used for enterprise SSO and identity federation, while OAuth is designed for authorization of internet resources from applications. The document recommends using SAML for SSO and OAuth for delegated access to resources.
This document discusses single sign-on (SSO), which allows a user to use one set of login credentials to access multiple applications. SSO works by authenticating a user once at an authentication domain and then asserting the user's identity to other affiliated domains without requiring additional logins. The document outlines how SSO systems function, their components, dependencies, session management, authentication methods, applications, and advantages and disadvantages. Examples of SSO implementations include logging in with Facebook, Twitter, or LinkedIn to access multiple affiliated sites and services.
This document discusses single sign-on (SSO), which allows users to access multiple protected resources with one set of credentials. It describes different SSO approaches like smart card-based and Kerberos-based SSO. Legacy SSO uses scripts or services to automatically fill login prompts. Password synchronization keeps passwords synced across devices. Software token-based SSO issues tokens for access instead of credentials. The document also covers web SSO using cookies and PC login session-based SSO. It concludes with a brief discussion of potential future uses of SSO on mobile devices.
This document provides an overview of the Security Assertion Markup Language (SAML) protocol. SAML allows sites to exchange user authentication, authorization, and attribute information via XML messages. It enables single sign-on, single logout, and attribute sharing across applications. SAML 2.0 uses standards like XML, HTTP, and SOAP to standardize single sign-on across enterprise cloud apps. It works by exchanging assertions about users via protocols and bindings to authenticate users among sites. Benefits include centralized identity control and single sign-on without exposing passwords.
For more info: http://scn.sap.com/community/sso.
SAP Single Sign-On enables companies to eliminate the need for multiple passwords and user IDs. Centralize and simplify the way users log on to systems and applications. Lower the risks of unsecured login information, reduce help desk calls, and help ensure the confidentiality and security of personal and company data.
SSO refers to Single Sign-On, which allows a user to access multiple applications and systems with a single set of login credentials. It authenticates users through an authentication system that stores credentials in a centralized directory. SSO simplifies access for users while improving security by reducing the number of usernames and passwords that must be stored and remembered.
Outline :
Introduction of SSO
Need of SSO
Simple SSO process
Types of SSO
Architecture of web SSO system
Kerberos-Based Authentication
How it works?
Conclusion
References
SSO IN/With Drupal and Identitiy ManagementManish Harsh
This presentation is a result of research and evaluation for SSO and IDM majorly focused to Drupal CMS.
Enterprises, corporations and companies with multiple web properties are struggling to provide a better user experience and offer a single "corporate ID" and "Password" as the key for all.
This single ID should be used across all the properties and corporations should still be able to manage the access level and permission of the respective user based on the grants assigned to this ID in each web property.
Alfresco: Implementing secure single sign on (SSO) with OpenSAMLJ V
Alfresco Summit 2013 (Barcelona and Boston)
This talk will provide an introduction to the OASIS SAML standard (Security Assertion Markup Language) and then describe in detail how we use OpenSAML to provide secure SSO to Alfresco Cloud in a multi-tenant environment, both in terms of Share and the core Repository. We will demonstrate the steps required for an Enterprise Network Admin to setup a trusted SAML connection ('circle of trust') to their chosen Identity Provider (IdP) such as Centrify, Ping Identity, ForgeRock OpenAM (formerly Sun OpenSSO) or potentially any other type of IdP that supports SAML v2.0. We will also discuss possible future requirements and improvements.
http://summit.alfresco.com/boston/sessions/implementing-secure-single-sign-sso-opensaml
http://www.youtube.com/watch?v=KroIZa1co6g
The document discusses authentication with OAuth and Connected Apps. It provides an overview of using OAuth for API authentication and securing mobile apps. It then demonstrates how to build a simple web app using OAuth by registering an app, crafting an authorization URL, and exchanging codes for tokens. The document also covers considerations for mobile apps, building integration apps, and enabling enterprise authorization controls for OAuth apps.
Ebizon implemented single sign-on (SSO) for several clients using major social networking sites like Facebook, LinkedIn, QQ, and Sina Weibo. This allowed users to access multiple applications using one set of login credentials, improving the user experience. Technical challenges included designing intuitive interfaces, maintaining different security mechanisms, and preventing duplicate accounts. Ebizon's solution directed users through a single sign-on flow and checked for existing accounts, creating new ones if needed. This enhanced the user experience for clients like a non-profit, a semiconductor company, and an industry-student platform.
Extending SharePoint 2010 to your customers and partnersCorey Roth
This document discusses setting up an extranet in SharePoint 2010 using forms-based authentication and claims-based authentication. It provides links to resources on how to configure an extranet, how users will authenticate using username and password, and how to populate the extranet with content from SharePoint. It also lists upcoming sessions at a conference on using claims-based authentication in SharePoint 2010.
This document provides an overview and agenda for an Android motivation and development session. It introduces key Android concepts like activities, services, content providers, and permissions. It outlines an agenda to build a simple "Hello World" app, add additional features, and explore concepts like location services and maps. The document also discusses Android application components, lifecycles, and how learning Android can benefit career prospects and opportunities.
Shailen Sukul is a senior SharePoint architect who works with latest web technologies and SharePoint. He specializes in SharePoint installation, configuration, development and training. In his personal projects he prefers AWS and ASP.Net MVC. He maintains several open source SharePoint projects on CodePlex. You can follow him on Twitter or check out his blog for more information.
Quickly Build a Native Mobile App for Your Community Using Salesforce Mobile SDKSalesforce Developers
Join us to learn how to take a Visualforce-based community you built for the browser and convert it into a native app by using Salesforce Mobile SDK. You can then submit this native app into Apple's App store or Google Play without learning Objective-C or Android.
Flash Builder for PHP and Mobile developmentMihai Corlan
This document discusses using Flash Builder/Flex with PHP on mobile devices. It introduces Kent Mitchell and Mihai Corlan who will discuss using Data Centric Development wizards in Flash Builder to consume PHP services. They will demonstrate testing a mobile Flex and PHP app on desktop and device, debugging on device, and using the Network Monitor. The document also provides an overview of creating a new Flex Mobile and PHP project with an integrated wizard, connecting to various PHP services, and enabling debugging when running the app on an actual device connected to the same WiFi network as the development computer.
SharePoint 2013 Apps and the App ModelJames Tramel
SharePoint 2013 Apps - deep dive. We'll look at they work, what they look like, what they do and how to us apps. Its all about the apps. Apps are good, very good.
This document provides an introduction to the Salesforce Mobile SDK for Android. It discusses how mobile device usage is growing significantly, with many users relying on multiple devices for both work and personal use. The Mobile SDK provides tools to accelerate native, hybrid, and HTML5 mobile app development on Android and iOS platforms. These tools include OAuth authentication, API wrappers, an app container, secure offline storage, and push notifications. A five minute example is provided showing how to use the Mobile SDK to create a basic Android app that integrates with the Salesforce platform through REST calls.
Creating Engaging SAP User Interfaces with Adobe FlexMatthias Zeller
A presentation from SAP TechEd 2010. It covers different ways of integrating Flex applications with SAP and discusses how Adobe internally has developed a Flex based frontend on top of SAP CRM to make call center agents more efficient.
This document provides information about Appium, an open source test automation framework for use with native, hybrid and mobile web apps. It discusses Appium's architecture and features, how to set up Appium for testing iOS and Android apps, different language clients available and requirements for writing tests in Java. The document also covers new capabilities and strategies introduced in Appium, such as TouchActions and MultiTouchActions.
CIS14: PingOne IDaaS: What You Need to KnowCloudIDSummit
Ian Jaffe, Ping Identity
How to manage identities, how you can get a jump start for the identity revolution, and how to do it all using your existing infrastructure without having a duplicate identity in the cloud, using PingOne.
Ian Jaffe, Ping Identity
How to manage identities, how you can get a
jump start for the identity revolution, and how
to do it all using your existing infrastructure
without having a duplicate identity in the
cloud, using PingOne
In this presentation I provide a gentle introduction to successful open web protocols such as OpenID, OAuth, Atompub and OpenSocial in terms of what they provide as well as how they can be useful to developers. Presented at the inaugural MSCOSCON 2009 in Malaysia.
Note: This presentation draws from a lot of existing content online and I have attempted to ensure that the sources have copyright that allowed reuse as well as all sources have been duly attributed. If there is any attribution missing or misuse of content please do contact me and I will rectify it.
These slides provide detailed step by step deployment of the 9.0.1 IBM Notes/Domino OpenSocial Component, Integration with IBM Connections, and Troubleshooting steps.
This document provides information about a MuleSoft meetup event on connected apps. The meetup will include a presentation on connected apps using the Anypoint Platform, types of connected apps, authentication methods, benefits, and a demo of deploying a Mule application and publishing a project to the exchange. Attendees are instructed on how to participate in a trivia quiz to win a prize. The speaker is introduced and housekeeping items are covered including submitting questions and post-event feedback.
Appium is an open source test automation framework for use with native, hybrid and mobile web apps. It drives iOS and Android apps using the WebDriver protocol. Appium uses a client-server architecture with the Appium server executing commands on a mobile device. Tests are written using various client libraries that communicate with the Appium server via the JSON wire protocol over HTTP.
Visual Studio and Xamarin enable C# developers to become Android, iOS, and Windows app developers overnight. In this session, we will cover how to use your existing C# and .NET skills to create fully native apps on every platform. From start to finish Visual Studio and Xamarin give developers powerful tools to be hyper productive to craft these apps. Come see what is new for developers how we are making Visual Studio and Xamarin the absolute best way to build apps.
Federation Evolved: How Cloud, Mobile & APIs Change the Way We Broker IdentityCA API Management
Understanding how emerging standards like OAuth and OpenID Connect impact federation
Federation is a critical technology for reconciling user identity across Web applications. Now that users consume the same data through cloud and mobile, federation infrastructure must adapt to enable these new channels while maintaining security and providing a consistent user experience.
This webinar will examine the differences between identity federation across Web, cloud and mobile, look at API specific use cases and explore the impact of emerging federation standards.
You Will Learn
Best practices for federating identity across mobile and cloud
How emerging identity federation standards will impact your infrastructure
How to implement an identity-centric API security and management infrastructure
Presenters
Ehud Amiri
Director, Product Management, CA Technologies
Francois Lascelles
Chief Architect, Layer 7
apidays LIVE Australia 2021 - Designing Embedded Platforms by Jeremy Glassenb...apidays
apidays LIVE Australia 2021 - Accelerating Digital
September 15 & 16, 2021
Designing Embedded Platforms: Lessons from Industry Success & Failure
Jeremy Glassenberg, Product Lead, APIs at Docusign
Magento Imgine eCommerce Conference February 2011: Mashup of Magento and Sale...varien
Cloud Conversions CEO Jon Jessup presented how to integrate Magento's eCommerce platform with SalesForce.com during the Imagine eCommerce Conference's Day 2 technical breakout sessions.
PHP Development In The Cloud (php|tek edition)Ivo Jansch
This talk is the companion talk to the 'PHP Development in the Cloud' book I wrote with Vito Chin. It's an introduction into cloud computing for PHP developers. Delivered on may 25 at php|tek in Chicago.
These are the slides for a three hour primer for PHP developers. It covers the whole spectrum from the mobile web to apis for native apps, as well as topics such as generating QR codes and sending push notifications from PHP to android and apple devices.
Building an SSO platform in PHP (Zend Webinar Edition)Ivo Jansch
I did a Webinar for Zend on March 31st, 2011 about Single Sign On. In this presentation I covered openid, oauth and saml as suitable implementations for single sign on to web applications.
This talk was presented at the Daycamp 4 Developers 2 on March 5th, 2011. In this talk I talked about my experiences with telecommuting, and why it makes sense for businesses to allow developers to work remotely.
An overview of cloud computing for PHP developers.
This is a slightly updated version of my earlier 'PHP and the Cloud' slides, mostly to reflect my new company's layout.
PHP in a Mobile Ecosystem (Zendcon 2010)Ivo Jansch
A look at PHP's role in mobile web and app development. Delivered at Zendcon 2010 on November 3, 2010.
If you like the content or want to give feedback or if you need help with any of the concepts mentioned here, contact me at egeniq.com.
PHP and the Cloud (phpbenelux conference)Ivo Jansch
The document discusses PHP and cloud computing. It defines cloud computing according to NIST as having five essential characteristics, three service models (Software as a Service, Platform as a Service, Infrastructure as a Service), and four deployment models. Infrastructure as a Service involves offering hardware, storage, networking and computing resources as a service and allows for elastic scalability. The document provides examples of using Rackspace Cloud and Terremark's InfiniCloud for IaaS and discusses designing applications to take advantage of cloud capabilities like horizontal scalability and abstraction.
Content Management Selection and StrategyIvo Jansch
A presentation I did at the IMS 2009 event in London, helping organizations define a content management system strategy and helping them with the selection of CMS systems.
Slides of the talk I did at Zendcon 09. It tells PHP developers what they need to know about the cloud and gives exampes of how to interact with cloud services and applications.
PHP is a widely used programming language that powers many large, real-world websites and applications. The document discusses PHP's history and growth, provides examples of major websites that use PHP, and outlines best practices for PHP development including using an iterative development process, frameworks, testing, and teamwork. It also discusses using PHP alongside other technologies and open source software.
Dynamic Languages In The Enterprise (4developers march 2009)Ivo Jansch
Slightly more generic version of my 'Enterprise PHP' talk, adjusted for the 4developers conference's 'dedicated languages' track that features developers with different backgrounds.
The document discusses enterprise PHP development. It begins by noting how PHP usage has changed over time from personal projects in 1998 to powering large websites, banks, and insurance companies today. It then addresses whether PHP is "enterprise ready" and discusses improved metaphors for PHP beyond toys or LEGO bricks. The remainder of the document outlines 10 steps for enterprise PHP development, including establishing requirements, designing architecture and tools, using frameworks, implementing design patterns, and emphasizing testing.
Enterprise PHP Development - ZendCon 2008Ivo Jansch
The document discusses best practices for enterprise PHP development. It outlines 10 steps for building PHP applications in an enterprise setting: 1) assemble a skilled team, 2) define requirements, 3) design architecture, 4) select tools, 5) use a framework as a foundation, 6) employ design patterns, 7) implement thorough testing, 8) optimize performance through acceleration and caching, 9) properly deploy code to production environments, and 10) monitor and debug applications after deployment. The document uses metaphors of building construction with bricks to illustrate PHP development concepts.
Enterprise PHP Development (Dutch PHP Conference 2008)Ivo Jansch
This document discusses enterprise PHP development in 10 steps: 1) assemble a skilled team, 2) define requirements, 3) design architecture, 4) select tools, 5) use a framework for foundation, 6) implement design patterns, 7) thoroughly test all aspects of development, 8) optimize performance through acceleration and caching, 9) plan deployment across environments, and 10) monitor operations through logging and issue tracking. The document uses building a skyscraper as an analogy for developing large enterprise applications in PHP.
AI Agents in Logistics and Supply Chain Applications Benefits and ImplementationChristine Shepherd
AI agents are reshaping logistics and supply chain operations by enabling automation, predictive insights, and real-time decision-making across key functions such as demand forecasting, inventory management, procurement, transportation, and warehouse operations. Powered by technologies like machine learning, NLP, computer vision, and robotic process automation, these agents deliver significant benefits including cost reduction, improved efficiency, greater visibility, and enhanced adaptability to market changes. While practical use cases show measurable gains in areas like dynamic routing and real-time inventory tracking, successful implementation requires careful integration with existing systems, quality data, and strategic scaling. Despite challenges such as data integration and change management, AI agents offer a strong competitive edge, with widespread industry adoption expected by 2025.
In this talk, Elliott explores how developers can embrace AI not as a threat, but as a collaborative partner.
We’ll examine the shift from routine coding to creative leadership, highlighting the new developer superpowers of vision, integration, and innovation.
We'll touch on security, legacy code, and the future of democratized development.
Whether you're AI-curious or already a prompt engineering, this session will help you find your rhythm in the new dance of modern development.
מכונות CNC קידוח אנכיות הן הבחירה הנכונה והטובה ביותר לקידוח ארונות וארגזים לייצור רהיטים. החלק נוסע לאורך ציר ה-x באמצעות ציר דיגיטלי מדויק, ותפוס ע"י צבת מכנית, כך שאין צורך לבצע setup (התאמות) לגדלים שונים של חלקים.
Integration of Utility Data into 3D BIM Models Using a 3D Solids Modeling Wor...Safe Software
Jacobs has developed a 3D utility solids modelling workflow to improve the integration of utility data into 3D Building Information Modeling (BIM) environments. This workflow, a collaborative effort between the New Zealand Geospatial Team and the Australian Data Capture Team, employs FME to convert 2D utility data into detailed 3D representations, supporting enhanced spatial analysis and clash detection.
To enable the automation of this process, Jacobs has also developed a survey data standard that standardizes the capture of existing utilities. This standard ensures consistency in data collection, forming the foundation for the subsequent automated validation and modelling steps. The workflow begins with the acquisition of utility survey data, including attributes such as location, depth, diameter, and material of utility assets like pipes and manholes. This data is validated through a custom-built tool that ensures completeness and logical consistency, including checks for proper connectivity between network components. Following validation, the data is processed using an automated modelling tool to generate 3D solids from 2D geometric representations. These solids are then integrated into BIM models to facilitate compatibility with 3D workflows and enable detailed spatial analyses.
The workflow contributes to improved spatial understanding by visualizing the relationships between utilities and other infrastructure elements. The automation of validation and modeling processes ensures consistent and accurate outputs, minimizing errors and increasing workflow efficiency.
This methodology highlights the application of FME in addressing challenges associated with geospatial data transformation and demonstrates its utility in enhancing data integration within BIM frameworks. By enabling accurate 3D representation of utility networks, the workflow supports improved design collaboration and decision-making in complex infrastructure projects
Jeremy Millul - A Talented Software DeveloperJeremy Millul
Jeremy Millul is a talented software developer based in NYC, known for leading impactful projects such as a Community Engagement Platform and a Hiking Trail Finder. Using React, MongoDB, and geolocation tools, Jeremy delivers intuitive applications that foster engagement and usability. A graduate of NYU’s Computer Science program, he brings creativity and technical expertise to every project, ensuring seamless user experiences and meaningful results in software development.
Soulmaite review - Find Real AI soulmate reviewSoulmaite
Looking for an honest take on Soulmaite? This Soulmaite review covers everything you need to know—from features and pricing to how well it performs as a real AI soulmate. We share how users interact with adult chat features, AI girlfriend 18+ options, and nude AI chat experiences. Whether you're curious about AI roleplay porn or free AI NSFW chat with no sign-up, this review breaks it down clearly and informatively.
Data Virtualization: Bringing the Power of FME to Any ApplicationSafe Software
Imagine building web applications or dashboards on top of all your systems. With FME’s new Data Virtualization feature, you can deliver the full CRUD (create, read, update, and delete) capabilities on top of all your data that exploit the full power of FME’s all data, any AI capabilities. Data Virtualization enables you to build OpenAPI compliant API endpoints using FME Form’s no-code development platform.
In this webinar, you’ll see how easy it is to turn complex data into real-time, usable REST API based services. We’ll walk through a real example of building a map-based app using FME’s Data Virtualization, and show you how to get started in your own environment – no dev team required.
What you’ll take away:
-How to build live applications and dashboards with federated data
-Ways to control what’s exposed: filter, transform, and secure responses
-How to scale access with caching, asynchronous web call support, with API endpoint level security.
-Where this fits in your stack: from web apps, to AI, to automation
Whether you’re building internal tools, public portals, or powering automation – this webinar is your starting point to real-time data delivery.
National Fuels Treatments Initiative: Building a Seamless Map of Hazardous Fu...Safe Software
The National Fuels Treatments Initiative (NFT) is transforming wildfire mitigation by creating a standardized map of nationwide fuels treatment locations across all land ownerships in the United States. While existing state and federal systems capture this data in diverse formats, NFT bridges these gaps, delivering the first truly integrated national view. This dataset will be used to measure the implementation of the National Cohesive Wildland Strategy and demonstrate the positive impact of collective investments in hazardous fuels reduction nationwide. In Phase 1, we developed an ETL pipeline template in FME Form, leveraging a schema-agnostic workflow with dynamic feature handling intended for fast roll-out and light maintenance. This was key as the initiative scaled from a few to over fifty contributors nationwide. By directly pulling from agency data stores, oftentimes ArcGIS Feature Services, NFT preserves existing structures, minimizing preparation needs. External mapping tables ensure consistent attribute and domain alignment, while robust change detection processes keep data current and actionable. Now in Phase 2, we’re migrating pipelines to FME Flow to take advantage of advanced scheduling, monitoring dashboards, and automated notifications to streamline operations. Join us to explore how this initiative exemplifies the power of technology, blending FME, ArcGIS Online, and AWS to solve a national business problem with a scalable, automated solution.
Neural representations have shown the potential to accelerate ray casting in a conventional ray-tracing-based rendering pipeline. We introduce a novel approach called Locally-Subdivided Neural Intersection Function (LSNIF) that replaces bottom-level BVHs used as traditional geometric representations with a neural network. Our method introduces a sparse hash grid encoding scheme incorporating geometry voxelization, a scene-agnostic training data collection, and a tailored loss function. It enables the network to output not only visibility but also hit-point information and material indices. LSNIF can be trained offline for a single object, allowing us to use LSNIF as a replacement for its corresponding BVH. With these designs, the network can handle hit-point queries from any arbitrary viewpoint, supporting all types of rays in the rendering pipeline. We demonstrate that LSNIF can render a variety of scenes, including real-world scenes designed for other path tracers, while achieving a memory footprint reduction of up to 106.2x compared to a compressed BVH.
https://arxiv.org/abs/2504.21627
Mastering AI Workflows with FME - Peak of Data & AI 2025Safe Software
Harness the full potential of AI with FME: From creating high-quality training data to optimizing models and utilizing results, FME supports every step of your AI workflow. Seamlessly integrate a wide range of models, including those for data enhancement, forecasting, image and object recognition, and large language models. Customize AI models to meet your exact needs with FME’s powerful tools for training, optimization, and seamless integration
Creating an Accessible Future-How AI-powered Accessibility Testing is Shaping...Impelsys Inc.
Web accessibility is a fundamental principle that strives to make the internet inclusive for all. According to the World Health Organization, over a billion people worldwide live with some form of disability. These individuals face significant challenges when navigating the digital landscape, making the quest for accessible web content more critical than ever.
Enter Artificial Intelligence (AI), a technological marvel with the potential to reshape the way we approach web accessibility. AI offers innovative solutions that can automate processes, enhance user experiences, and ultimately revolutionize web accessibility. In this blog post, we’ll explore how AI is making waves in the world of web accessibility.
How Advanced Environmental Detection Is Revolutionizing Oil & Gas Safety.pdfRejig Digital
Unlock the future of oil & gas safety with advanced environmental detection technologies that transform hazard monitoring and risk management. This presentation explores cutting-edge innovations that enhance workplace safety, protect critical assets, and ensure regulatory compliance in high-risk environments.
🔍 What You’ll Learn:
✅ How advanced sensors detect environmental threats in real-time for proactive hazard prevention
🔧 Integration of IoT and AI to enable rapid response and minimize incident impact
📡 Enhancing workforce protection through continuous monitoring and data-driven safety protocols
💡 Case studies highlighting successful deployment of environmental detection systems in oil & gas operations
Ideal for safety managers, operations leaders, and technology innovators in the oil & gas industry, this presentation offers practical insights and strategies to revolutionize safety standards and boost operational resilience.
👉 Learn more: https://www.rejigdigital.com/blog/continuous-monitoring-prevent-blowouts-well-control-issues/
Domino IQ – Was Sie erwartet, erste Schritte und Anwendungsfällepanagenda
Webinar Recording: https://www.panagenda.com/webinars/domino-iq-was-sie-erwartet-erste-schritte-und-anwendungsfalle/
HCL Domino iQ Server – Vom Ideenportal zur implementierten Funktion. Entdecken Sie, was es ist, was es nicht ist, und erkunden Sie die Chancen und Herausforderungen, die es bietet.
Wichtige Erkenntnisse
- Was sind Large Language Models (LLMs) und wie stehen sie im Zusammenhang mit Domino iQ
- Wesentliche Voraussetzungen für die Bereitstellung des Domino iQ Servers
- Schritt-für-Schritt-Anleitung zur Einrichtung Ihres Domino iQ Servers
- Teilen und diskutieren Sie Gedanken und Ideen, um das Potenzial von Domino iQ zu maximieren
Boosting MySQL with Vector Search -THE VECTOR SEARCH CONFERENCE 2025 .pdfAlkin Tezuysal
As the demand for vector databases and Generative AI continues to rise, integrating vector storage and search capabilities into traditional databases has become increasingly important. This session introduces the *MyVector Plugin*, a project that brings native vector storage and similarity search to MySQL. Unlike PostgreSQL, which offers interfaces for adding new data types and index methods, MySQL lacks such extensibility. However, by utilizing MySQL's server component plugin and UDF, the *MyVector Plugin* successfully adds a fully functional vector search feature within the existing MySQL + InnoDB infrastructure, eliminating the need for a separate vector database. The session explains the technical aspects of integrating vector support into MySQL, the challenges posed by its architecture, and real-world use cases that showcase the advantages of combining vector search with MySQL's robust features. Attendees will leave with practical insights on how to add vector search capabilities to their MySQL systems.
Down the Rabbit Hole – Solving 5 Training RoadblocksRustici Software
Feeling stuck in the Matrix of your training technologies? You’re not alone. Managing your training catalog, wrangling LMSs and delivering content across different tools and audiences can feel like dodging digital bullets. At some point, you hit a fork in the road: Keep patching things up as issues pop up… or follow the rabbit hole to the root of the problems.
Good news, we’ve already been down that rabbit hole. Peter Overton and Cameron Gray of Rustici Software are here to share what we found. In this webinar, we’ll break down 5 training roadblocks in delivery and management and show you how they’re easier to fix than you might think.
If You Use Databricks, You Definitely Need FMESafe Software
DataBricks makes it easy to use Apache Spark. It provides a platform with the potential to analyze and process huge volumes of data. Sounds awesome. The sales brochure reads as if it is a can-do-all data integration platform. Does it replace our beloved FME platform or does it provide opportunities for FME to shine? Challenge accepted
25. Level 4 - SAML
Creating our own Identity Provider
26. SAML
Security Assertion Markup Language
XML standard by OASIS
Assertions contain:
Proof of Identity
Attributes
Supports XML signatures and encryption
43. SugarCRM
Plugin: didn’t work
Problem: auth structure
Solution: hacking the source
Options:
Contact me if you need to get SugarCRM to do
SSO :-)
Wait for SugarCRM 6.1, it contains a working SAML
plugin (/via @smalyshev)
44. Google Apps
Requires Premier or Education Edition
Configure SAML endpoint => Done!
Docs:
http://code.google.com/googleapps/domain/sso/
saml_reference_implementation.html
59. Credits
Pictures used in this presentation are creative commons attribution licensed pictures.
Here are the owners and the URLS where the originals can be found:
‘Multiple Padlock Farm Gate’ by Mike Baird - http://www.flickr.com/photos/mikebaird/2354116406/
‘Love Locks’ by James Manners - http://www.flickr.com/photos/jmanners/443421045/
‘Seguridad’ by Juan J. Martinez - http://www.flickr.com/photos/reidrac/4696900602/
‘Hotel Keys by Henri Bergius - http://www.flickr.com/photos/bergie/3468886680/
‘OAuth Shiny’ by Chris Messina - http://www.flickr.com/photos/factoryjoe/3343062926/
‘Take a number please’ by Andres Rueda - http://www.flickr.com/photos/andresrueda/3259487071/
’38/365 Puzzled’ by Mykl Roventine - http://www.flickr.com/photos/myklroventine/3261364899/
‘Visiting Portage’ by Jeremy Bronson - http://www.flickr.com/photos/jbrons/4444017497/
‘_dsc8037’ by Sergey Vladimirov - http://www.flickr.com/photos/vlsergey/4138735474/
Application logo’s and other icons have been used under the assumption that use of them in this context is
considered fair use.