Skip to main content

Home/ Arquitectura?/ Group items tagged indexing

Rss Feed Group items tagged

Pablo Lalloni

Cryptography Tutorials - Herong's Tutorial Examples - 0 views

  •  
    Excelentes tutoriales de todo lo que pueda llegar a hacer falta al usar SSL con y sin java: claves, certificados, keytool, openssl, interoperabilidad, browsers, servers, etc.
munyeco

Why Vagrant? - Vagrant Documentation - 3 views

  •  
    Mientras tanto, en un lado de la brecha: Why Vagrant? Vagrant provides easy to configure, reproducible, and portable work environments built on top of industry-standard technology and controlled by a single consistent workflow to help maximize the productivity and flexibility of you and your team. To achieve its magic, Vagrant stands on the shoulders of giants. Machines are provisioned on top of VirtualBox, VMware, AWS, or any other provider. Then, industry-standard provisioning tools such as shell scripts, Chef, or Puppet, can be used to automatically install and configure software on the machine.
Pablo Lalloni

Getting Started With OpenAM - 0 views

  • OpenAM centralizes authentication by using a variety of authentication modules. Authentication modules connect to identity repositories that store identities and provide authentication services. The identity repositories can be implemented as LDAP directories, relational databases, RADIUS, Windows authentication, one-time password services, other standards-based access management systems and much more.
  • OpenAM centralizes authorization by letting you use OpenAM to manage access policies separate from applications and resources. Instead of building access policy into a web application, you install a policy agent with the web application to request policy decisions from OpenAM. This way you can avoid issues that could arise when developers must embed policy decisions into their applications. With OpenAM, if policy changes or an issue is found after the application is deployed, you have only to change the policy definition in OpenAM, not deploy a new version of the application. OpenAM makes the authorization decisions, and policy agents enforce the decisions on OpenAM's behalf.
  •  
    "OpenAM centralizes authentication by using a variety of authentication modules. Authentication modules connect to identity repositories that store identities and provide authentication services. The identity repositories can be implemented as LDAP directories, relational databases, RADIUS, Windows authentication, one-time password services, other standards-based access management systems and much more."
Pablo Lalloni

The Architecture of Open Source Applications - 0 views

  •  
    Gran colección de análisis de arquitectura de muchos sistemas open-source de diversa escala. ¡Invaluable!
munyeco

OpenAM Administration Guide - 0 views

  • An authentication service confirms the identity of a user or a client application.
  • OpenAM is most frequently used to protect web-accessible resources. Users browse to a protected web application page. An agent installed on the server with the web application redirects the user to OpenAM for access management. OpenAM determines who the user is, and whether the user has the right to access the protected page. OpenAM then redirects the user back to the protected page, with authorization credentials that can be verified by the agent. The agent allows OpenAM authorized users access the page.
Pablo Lalloni

Examining OpenSSO Enterprise (Sun OpenSSO Enterprise 8.0 Technical Overview) - 0 views

  •  
    "OpenSSO Enterprise Technical Overview"
Pablo Lalloni

InfluxDB - 0 views

  •  
    "An open-source distributed time series database with no external dependencies. InfluxDB is the new home for all of your metrics, events, and analytics."
Pablo Lalloni

Nomad by HashiCorp - 1 views

  •  
    "Nomad is a tool for managing a cluster of machines and running applications on them. Nomad abstracts away machines and the location of applications, and instead enables users to declare what they want to run and Nomad handles where they should run and how to run them."
Pablo Lalloni

System Out and Err redirected to SLF4J - 0 views

  •  
    "The sysout-over-slf4j module allows a user to redirect all calls to System.out and System.err to an SLF4J defined logger with the name of the fully qualified class in which the System.out.println (or similar) call was made, at configurable levels. "
Pablo Lalloni

OpenTSDB - A Distributed, Scalable Monitoring System - 2 views

    • Pablo Lalloni
       
      Esto podríamos usarlo para solucionar el pendiente de tener estadísticas en tiempo real de los ambientes en producción. Quizás incluso es aplicable a la solución de agentes de monitoreo.
‹ Previous 21 - 40 of 56 Next ›
Showing 20 items per page