Datei: her-sec.ppt Freitag, 14-05-19 Index 1 University Würzburg, Dr. L.Marten University Würzburg Bavarian future offensive SAP / Higher Education & Research.

Slides:



Advertisements
Similar presentations
HiPath SIcurity Card Manager Smartcard Management and Personalization System Sales Presentation.
Advertisements

Interdisciplinary approach to health promotion Marek Jankowski Amsterdam, 2010 Polish Society for Health Programs 1.
Chapter 14 Intranets & Extranets. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES Introduction Technical Infrastructure Planning an Intranet.
Chapter 10 Encryption: A Matter of Trust. Awad –Electronic Commerce 1/e © 2002 Prentice Hall 2 OBJECTIVES What is Encryption? Basic Cryptographic Algorithm.
J0 1 Marco Ronchetti - The Web: an architectural view.
SSL Trust Pitfalls Prof. Ravi Sandhu.
SSL Trust Pitfalls Prof. Ravi Sandhu. 2 © Ravi Sandhu 2002 THE CERTIFICATE TRIANGLE user attributepublic-key X.509 identity certificate X.509 attribute.
By D. Fisher Geometric Transformations. Reflection, Rotation, or Translation 1.
The World Wide Web and the Internet MIS XLM.B Jack G. Zheng May 13 th 2008.
1 MyAPNIC Project update Database SIG APNIC 23, Bali 28 February 2007.
MyProxy Jim Basney Senior Research Scientist NCSA
Business Transaction Management Software for Application Coordination 1 Business Processes and Coordination.
International Telecommunication Union Workshop on Standardization in E-health Geneva, May 2003 The Use of X.509 in E-Healthcare Professor David W.
DIVIDING INTEGERS 1. IF THE SIGNS ARE THE SAME THE ANSWER IS POSITIVE 2. IF THE SIGNS ARE DIFFERENT THE ANSWER IS NEGATIVE.
Addition Facts
EVERY CONNECTION has a starting point. EVERY CONNECTION has a starting point. WorldCat Navigator - Authentication Library Hosted Navigator EZproxy and.
INFORMATION TECHNOLOGY, THE INTERNET, AND YOU
©2013 Check Point Software Technologies Ltd. | [Unrestricted] For everyone Best Practices to Secure the Mobile Enterprise Macy Torrey
Graduate Surveys in Germany as a Tool to Measure and Improve the Relevance of Higher Education Contribution to the International Seminar The Relevance.
1 Page: Objectives and main tasks of the German CAF Centre Referat VIII 1 German CAF Centre Dr Astrid Stein Cologne, February 2007.
1 The phone in the cloud Utilizing resources hosted anywhere Claes Nilsson.
Stimulate Stimulate The University of Antwerp - Library Anke Jacobs - UA - Campus Drie Eiken 3 August 2005.
Introduction for University Staff CiCS welcomes you to the University of Sheffield 12/06/2014Allan Wright © The University of Sheffield 1.
Authentication Applications
Citrix Secure Gateway v1.1 Technical Presentation August 2002 Technical Presentation August 2002.
ICS 434 Advanced Database Systems
A Comparison of HTTP and HTTPS Performance Arthur Goldberg, Robert Buff, Andrew Schmitt [artg, buff, Computer Science Department Courant.
ONE® Mail Training Presentation North York General Hospital North York General Hospital.
1 Three things about e-Business Chris Avram Computer Science and Software Engineering Monash University.
Web Hosting Lan Vu. How does a Website work ? Web development concepts Web Design Web Hosting Domain Name.
Clean Water State Revolving Fund Environmental Benefits Reporting Database (CBR) This handout provides information regarding the Clean Water Benefits.
Addition 1’s to 20.
25 seconds left…...
Jean Bradford Serials and Inter-library Document Supply, University of Bristol UKSG Serials Resource Management Seminar 12 th October 2005.
Week 1.
VPN AND REMOTE ACCESS Mohammad S. Hasan 1 VPN and Remote Access.
Chapter 11 Database Applications Using Internet Technology David M. Kroenke Database Processing © 2000 Prentice Hall.
Tux2 Database The Architecture of Our System © Juhani Välimäki 2005.
INFORMATION SYSTEMS SERVICES UNIVERSITY OF LEEDS Presentation to the UK e-Science Grid Workshop ‘Managing Access to Resources on the Grid’ e-Science Institute,
1. Introducing Java Computing  What is Java Computing?  Why Java Computing?  Enterprise Java Computing  Java and Internet Web Server.
Multiple Tiers in Action
Slide 5.1 Curtis/Cobham © Pearson Education Limited 2008 Chapter 5 The Internet and the World Wide Web.
 SAP AG 2001, Title of Presentation, Speaker Name 1 Thomas Ryan Product Manager SAP Markets SAP Internet Transaction Server.
HTTP client wide area network (Internet) HTTP proxy HTTP server HTTP gateway firewall HTTP tunnel Copyright Springer Verlag Berlin Heidelberg 2004.
Networked Application Architecture Design. Application Building Blocks Application Software Data Infrastructure Software Local Area Network Server Desktop.
 Computer Networking Computer Networking  Networking terminology Networking terminology  Client Server Model Client Server Model  Types of Networks.
Postacademic Interuniversity Course in Information Technology – Module C1p1 Contents Data Communications Applications –File & print serving –Mail –Domain.
CS 493/693: Distributed Systems Programming V. “Juggy” Jagannathan CSEE, West Virginia University March 21, 2005.
Attendance Enterprise Capabilities Required by Information Technology.
Mainframe (Host) - Communications - User Interface - Business Logic - DBMS - Operating System - Storage (DB Files) Terminal (Display/Keyboard) Terminal.
Grid Chemistry System Architecture Overview Akylbek Zhumabayev.
Building Security into Your System Bill Major Gregory Ponto.
® Gradient Technologies, Inc. Inter-Cell Interworking Access Control Across the Boundary Open Group Members Meeting Sand Diego, CA USA April 1998 Brian.
Dartmouth PKI Update Robert Brentrup Internet2 Member Meeting April 21, 2004.
SharePoint in the Education Space Presented by: Daniel Petersen Director of Business Solutions Applied Tech.
UNIT-3 1.Web server software and Tools 1IT2031 UNIT-3.
Intranet Steve Andy Michael. Intranet A network based on TCP/IP protocols (an internet) belonging to an organization, usually a corporation, accessible.
WEB SERVER SOFTWARE FEATURE SETS
2 Copyright © Oracle Corporation, All rights reserved. Basic Oracle Net Architecture.
Web-based Software Development - An introduction
3.1 Types of Servers.
Database Applications Using Internet Technology
What is WWW? The term WWW refers to the World Wide Web or simply the Web. The World Wide Web consists of all the public Web sites connected to the Internet.
3.1 Types of Servers.
Implementing TMG Server Publishing
Cisco Real Exam Dumps IT-Dumps
Dartmouth College Status Report
Management of users at UNIL
IS 4506 Server Configuration (HTTP Server)
File Operations Access Permissions.
Presentation transcript:

Datei: her-sec.ppt Freitag, Index 1 University Würzburg, Dr. L.Marten University Würzburg Bavarian future offensive SAP / Higher Education & Research User Group 4 th Meeting, Amsterdam, the Netherlands on 20 th - 22 th April, 1999 An Approach For SAP R/3 Security In Open Networks

Datei: her-sec.ppt Freitag, Index 2 University Würzburg, Dr. L.Marten University Würzburg Bavarian future offensive Contact Dr. Lutz Marten IT–Management Bayerische Julius-Maximilians-Universität Würzburg Am Hubland D Würzburg, Germany phone: +49 (0) 931 / fax: +49 (0) 931 /

Datei: her-sec.ppt Freitag, Index 3 University Würzburg, Dr. L.Marten University Würzburg Bavarian future offensive Facts & Figures University Würzburg first foundation: 1402, refoundation: faculties 70 departments wide spectrum of disciplines largest university in northern Bavaria over students about staff-members 350 professors, about 2700 academic assistants 19 university clinics budget 400 Mio. DM (without patient care, incl. research)

Datei: her-sec.ppt Freitag, Index 4 University Würzburg, Dr. L.Marten University Würzburg Bavarian future offensive User Access To Applications Students / Staff Application Systems SAP R/3, HISSOS World Wide Web up to user campus = internet administration = intranet

Datei: her-sec.ppt Freitag, Index 5 University Würzburg, Dr. L.Marten University Würzburg Bavarian future offensive Basic Security By A Firewall Client PC Internal Application Systems Firewall campus internet adminitration intranet

Datei: her-sec.ppt Freitag, Index 6 University Würzburg, Dr. L.Marten University Würzburg Bavarian future offensive Network Topology

Datei: her-sec.ppt Freitag, Index 7 University Würzburg, Dr. L.Marten University Würzburg Bavarian future offensive WWW Transaction Model - 3 Tier Model Web Browser Presentation representaion of the application Firewall Web Server Web-Adaption homogenisation authentification Application System Application Transaction data manipulation

Datei: her-sec.ppt Freitag, Index 8 University Würzburg, Dr. L.Marten University Würzburg Bavarian future offensive WWW Transaction Model - General Model Web-Browser / Java-VM Presentation Web Server ( e.g. MS-IIS) Web-Adaption Application Server Application Transaction Database Server HTML/Java Transformation / User Authentication

Datei: her-sec.ppt Freitag, Index 9 University Würzburg, Dr. L.Marten University Würzburg Bavarian future offensive WWW Transaction Model - TranSON Model Web-Browser Presentation TranSON Server Web-Adaption Web Server enciphered Firewall Application Server Application Transaction Database Server (optionally enciphered)

Datei: her-sec.ppt Freitag, Index 10 University Würzburg, Dr. L.Marten University Würzburg Bavarian future offensive WWW Transaction Model - SAP R/3 Model Web-Browser Presentation R/3 Application Server Application Transaction R/3 Database Server (optionally enciphered) manufacturer-dependent SAP-Protokoll manufacturer-dependent SAP-Protokoll Web Server ( z.B. MS-IIS) Web-Adaption Internet Transaction Server - ITS enciphered ISAPI HTTP

Datei: her-sec.ppt Freitag, Index 11 University Würzburg, Dr. L.Marten University Würzburg Bavarian future offensive WWW Transaction Model - HISSB Web-Browser with HISSB Java-applet Presentation HISSOS/GX Informix Database Application Transaction ODBC / JDBC (optionally enciphered) Web Server ( z.B. MS-IIS) Web-Adaption JDesignerPro Enterprise Server (JAGG) enciphered TCP Port 4899

Datei: her-sec.ppt Freitag, Index 12 University Würzburg, Dr. L.Marten University Würzburg Bavarian future offensive WWW Transaction Model- TranSON + SAP R/3 Web-Browser / Java-VM Presentation Web Server ( z.B. MS-IIS) Web-Adaption Internet Transaction Server - ITS enciphered ISAPI TCP Port 4444 and HTTP TranSON Server Firewall manufacturer-dependent SAP protocol manufacturer-dependent SAP protocol Application Server Application Transaction Database Server (optionally enciphered)

Datei: her-sec.ppt Freitag, Index 13 University Würzburg, Dr. L.Marten University Würzburg Bavarian future offensive WWW PKI (public key) Model - TranSON + SAP R/3 Web-Browser / Java-VM Web Server ( z.B. MS-IIS) Application Server Database Server Internet Transaction Server - ITS, Agate/Wgate running on one or two servers optionally with SNC TranSON Server / Firewall SAP protocol SNC optional Smartcard with keys and crtificates CA - Certificate Authority CA - Certificate Authority SSLv3 / TLSv1 using private key public key certificate Directory Services LDAP

Datei: her-sec.ppt Freitag, Index 14 University Würzburg, Dr. L.Marten University Würzburg Bavarian future offensive more information and contacts can be found at Thank you for your attention !