Data Access Server Mark Servilla & Duane Costa 17/18 February 2009 The Water Cooler Session.

Slides:



Advertisements
Similar presentations
Final Presentation WINTER 2009 – SUMMER 2009 PRESENTED BY: George Kour Hany Danial SUPERVISOR: Victor Kulikov Networked Software Systems Laboratory DEPARTMENT.
Advertisements

ATC Conference Call January 10, 2008 Thank you for joining the call. We will start the call shortly. Please enter * 6 to mute your line and # 6 to unmute.
Oakland County Purchasing Division Online Bidder Registration.
The Sports Authority Fundraising Sign-up Instructions.
Sonnenglanz Consulting BV 28 September CPA Management Idea’s for large-scale deployments E.J. Van Nigtevecht Sonnenglanz Consulting BV.
© 2008 RightNow Technologies, Inc. Title Best Practices for Maintaining Your RightNow Knowledge Base Penni Kolpin Knowledge Engineer.
For MIP Fund Accounting Software
2009 Mid–Term Review El Verde Field Station June 4, 2009.
Final Presentation WINTER 2009 – SUMMER 2009 PRESENTED BY: George Kour Hany Danial SUPERVISOR: Victor Kulikov Networked Software Systems Laboratory DEPARTMENT.
National Center for Supercomputing Applications Integrating MyProxy with Site Authentication Jim Basney Senior Research Scientist National Center for Supercomputing.
Secure Electronic Data Communications and Transactions.
AASHTO’s NTPEP Program presents:
ETD-db: Today ETD-db 2.0: Tomorrow Gail McMillan Director, Digital Library and Archives, Virginia Tech Recorded by Edward A. Fox, Virginia Tech Newcomers’
1 Representing Identity CSSE 490 Computer Security Mark Ardis, Rose-Hulman Institute April 19, 2004.
0-1 Team ?? Status Report (1 of 3) Client Contact –Point 1 –Point 2 Team Meetings –Point 1 –Point 2 Team Organization –Point 1 –Point 2 Team 1: Auraria.
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. 1 Cryptographic.
Campus Firewalling Dearbhla O’Reilly Network Manager Dublin Institute of Technology.
Turkey IDA Info-Day PM Session, September 25, 2003 CIRCA 1 CIRCA : The IDA Collaborative Software Tool Grzegorz Ambroziewicz European Commission - DG Enterprise.
Users' Meeting San Francisco, CA April 18 th, 2006 RCRAInfo Network Exchange.
Getting started on informaworld™ How do I register my institution with informaworld™? How is my institution’s online access activated? What do I do if.
2 Session S105 FISAP On The Web n eCB’s FISAP On The Web
Global Customer Partnership Council Forum | 2008 | November 18 1IBM - GCPC MeetingIBM - GCPC Meeting IBM Lotus® Sametime® Meeting Server Deployment and.
Turkey IDA Info-Day AM Session, September 25, 2003 CIRCA 1 CIRCA : The IDA Collaborative Software Tool Grzegorz Ambroziewicz European Commission - DG Enterprise.
Copyright ®xSpring Pte Ltd, All rights reserved Versions DateVersionDescriptionAuthor May First version. Modified from Enterprise edition.NBL.
XHTML Introductory1 Linking and Publishing Basic Web Pages Chapter 3.
Auditing Authentication & Authorization in Banner
UDDI ebXML(?) and such Essential Web Services Directory and Discovery.
U.S. Department of Agriculture eGovernment Program August 14, 2003 eAuthentication Agency Application Pre-Design Meeting eGovernment Program.
Budget Module For Sage MIP Fund Accounting. Sage Requirements Fund Accounting 10.0 or higher Budget Module optional but required for multiple budget versions.
COMP3121 E-Commerce Technologies Richard Henson University of Worcester November 2011.
Bonanza Creek LTER Information Management Information Management at BNZ Information Management Data & Metadata Website & Communication Education.
Fire Safe Cigarette Online Registration Instructions.
In the web address box enter Enter your user ID (first and last initial 7 digit ID number) Select Log in.
Common PSMFC “data use agreement or policy” Overview of current data sharing in PTAGIS, RMIS, StreamNet.
Introduction to Morpho BEAM Workshop Samantha Romanello Long Term Ecological Research University of New Mexico.
Controlled Vocabulary VTC June 1, Agenda Review some past activities Plan some future activities.
Common Origination and Disbursement Navigating the Web Presenter: Renee Wade National Association of Sigma Users July 24, 2003.
Configure the Server –Login to the Web-Based Server Manager Username “admin” Password – your password –You can change the.
OARN Database UPDATE – SEPTEMBER We’re Live – and Testing  The site is up and running in Google’s data centers:  The site has been secured: 
Doc.: IEEE /0773r1 Submission July 2007 Rick Alfvin, VeriLANSlide 1 Project: IEEE Working Group for Wireless Personal Area Networks (WPANs)
Introduction to Morpho RCN Workshop Samantha Romanello Long Term Ecological Research University of New Mexico.
Chapter 14: Representing Identity Dr. Wayne Summers Department of Computer Science Columbus State University
Enterprise Messaging & Collaboration. e-Interact Modules.
Beavercreek High School BYOD Student Training: Wi-Fi Login and Authentication Portal.
Database Form Processing Made Easy Chad Killingsworth Web Projects Coordinator.
State Purchasing Forum Impacts of SFS on VendRep System & Other Updates Lynn Hansen Irene Waldorf May 2011.
© 2014 IBM Corporation Mobile Customization & Administration IBM Connections 5.0 Workshop Author: Paul Godby IBM Ecosystem Development Duration: 30 minutes.
American Diploma Project Administrative Site Training.
American Diploma Project Administrative Site Training.
American Diploma Project Administrative Site Training.
Kamdhenu Website is used to Add agent in Kamdhenu offer under Group head Pfiger Software Technologies Pvt. Ltd.
American Diploma Project Administrative Site Training New Jersey.
Welcome to Greenville County’s Introduction of the new online Permitting System!
PRACE user authentication and vetting Vincent RIBAILLIER, 29 th EUGridPMA meeting, Bucharest, September 9 th, 2013.
Stavroula Balopoulou , Angelo Lykiardopoulos, Sissy Iona HCMR-HNODC
Gina Leimkuehler Director of Accounting
DIAS & DIAS data release 2 years DIAS-GCI Cooperation Hiroko KINUTANI DIAS (Data Integration and Analysis System in Japan) , St. Petersburg.
KMIP Client Registration Ideas for Discussion
Data Access Policy Review
Update on EDG Security (VOMS)
MyGaDOE Portal Provisioning for Security Officers
Chapter 14: Representing Identity
CDISC SHARE API v1.0 CAC Update 22 February 2018
Expanded Clearinghouse Initiative
User Registration.
Process flow Kindly note: This presentation is automated – please do not click any of your mouse buttons or keyboard keys.
PDS, Primo, Aleph, MetaLib, SFX General workflow
Key components of MiTO. Key components of MiTO. A, Unregistered users can only read FS made public by the owner of a model in the World Wide Web. Registration,
Presentation transcript:

Data Access Server Mark Servilla & Duane Costa 17/18 February 2009 The Water Cooler Session

Background  LTER Network Data Access Policy –Approved 6 April 2005 by LTER Coordinating Committee –Issues addressed: Release of LTER data products (along with metadata) User registration for accessing data, includes –Obtaining Name, Affiliation, Address, and Full Contact Information –Must accept User Agreement (General and/or Restricted) –Provide statement of intended use of data License agreements specifying conditions for data use

Data Access Server

DAS Service Goals  LTER Data Access Policy compliant service –Registration –Authentication –Auditing –Notification –Reporting  Low impact on site Information Managers/ Administrators –Minimal replacement of data URL paths –Administrative interface for proxy URL to real URL mapping

DAS Software Stack

User Registration & Authentication  Separate user table for registration specific information, including statement of intended use (all users)  Authentication –LTER LDAP –Local pass-phrase challenge for non-LTER users  Supports “cookies” for automatic login  By-pass for 3 rd party applications (e.g. Kepler)  Filter for “search bots” or “web spiders”

Data URLs  Arctic LTER  North Inlet LTER  Georgia Coastal Ecosystem LTER

URL Heads and URL Tails  Arctic LTER  North Inlet LTER  Georgia Coastal Ecosystem LTER

DAS Proxy URLs  Arctic LTER  North Inlet LTER  Georgia Coastal Ecosystem LTER

Generalized Use Case  Step 1: User selects DAS proxy URL located in metadata document

Generalized Use Case  Step 1: User selects DAS proxy URL located in metadata document  Step 2: DAS service verifies user has authenticated and has accepted LTER Data Access Policy

Generalized Use Case  Step 3: DAS uses document ID to obtain EML document for notification content –Contacts, Creators, and Metadata Providers

Generalized Use Case  Step 4: DAS uses document ID to obtain EML document for the data 'entity' name

Generalized Use Case  Step 5: DAS sends notification to data owner and data user

Generalized Use Case  Step 5: DAS sends notification to data owner and data user  Step 6: DAS records access in audit log

Generalize Use Case  Step 7: DAS uses document ID to determine the LTER site

Generalize Use Case  Step 7: DAS uses document ID to determine the LTER site  Step 8: DAS selects the URLHead value entered by the LTER site

Generalize Use Case  Step 9: DAS appends URLTail value from the proxy URL to the URLHead to re-form the original data URL +

Generalize Use Case  Step 9: DAS appends URLTail value from the proxy URL to the URLHead to re-form the original data URL  Step 10: DAS uses original data URL to obtain data and pass-through to user +

DAS Administration

DAS Audit Report

Notifications Data Owner Data User

Information about DAS  General Information and Status –  Project Plan – ProjectPlan.pdf?view=co&root=NIS  Project Management – view&project_id=44  Project Bugzilla – order=relevance+desc&bug_status=__open__&product= Data+Access+Server&content=

Thank you!