摘要:
A computer arrangement for providing services to clients over a network includes: at least two servers, each server hosting at least one application, an automated administrator configured to automatically provision the servers to provide the services, and at least one network load balancer connected to the clients and the servers. The network load balancer is responsible for at least one of the services and is configured to gather state information on the state of the servers and/or the applications hosted on the servers and is operable to route incoming requests of clients to at least one of the servers. The network load balancer provides the automated administrator with the state information. The automated administrator provides the network load balancer with provisioning information regarding which servers are provisioned to provide the at least one service for which the network load balancer is responsible.
摘要:
A method for provisioning servers in a computer arrangement allows more than one administrator to utilize the servers and prevents the servers from being influenced by more than one administrator at the same time. The computer arrangement includes at least one server, at least one administrator operable to control the usage of the servers by making provisioning decisions, and a deployment server operable to provision the servers according to the provisioning decisions of the administrators. An administrator is required to exclusively reserve the server before the administration unit can use the server. This prevents the server from being used by two or more interfering administrators, meanwhile allowing a flexible assignment between servers and administrators.
摘要:
Online and on-premise applications identify trusted authentication providers. The applications are configured with a list of trusted issuers of authentication credentials. When an application receives a request requiring authentication, the application returns a 401 response that includes the trusted issuer list. The requesting application compares the trusted issuer list from the 401 response to its own list of authentication providers. If there is a match between the two lists, then the requesting application creates a self-issued token for the authentication provider. The authentication provider uses the self-issued token to generate an authentication token for the requesting application. The requesting application may also directly create a token for a target partner application, without an authentication provider, if there is a direct trust between the two applications.
摘要:
An email security system is described that allows users within different organizations to securely send email to one another. The email security system provides a federation server on the Internet or other unsecured network accessible by each of the organizations. Each organization provides identity information to the federation server. When a sender in one organization sends a message to a recipient in another organization, the federation server provides the sender's email server with a secure token for encrypting the message to provide secure delivery over the unsecured network.
摘要:
Online and on-premise applications identify trusted authentication providers. The applications are configured with a list of trusted issuers of authentication credentials. When an application receives a request requiring authentication, the application returns a 401 response that includes the trusted issuer list. The requesting application compares the trusted issuer list from the 401 response to its own list of authentication providers. If there is a match between the two lists, then the requesting application creates a self-issued token for the authentication provider. The authentication provider uses the self-issued token to generate an authentication token for the requesting application. The requesting application may also directly create a token for a target partner application, without an authentication provider, if there is a direct trust between the two applications.
摘要:
An email security system is described that allows users within different organizations to securely send email to one another. The email security system provides a federation server on the Internet or other unsecured network accessible by each of the organizations. Each organization provides identity information to the federation server. When a sender in one organization sends a message to a recipient in another organization, the federation server provides the sender's email server with a secure token for encrypting the message to provide secure delivery over the unsecured network.