Simplest way to secure static HTML based on certificate

Trying to handle too many jobs at once - but is there a simple way to hide a group of static html pages behind a check to make sure that the user has a certificate signed by a trusted CA. I do not want to authorize the user against any list of valid users, in fact, I specifically want to allow all users whose certificate is signed by chains in the truststore. Thanks!
It's odd that this seems more difficult than getting a rich-client application secure using certificates.

Hi Roberto,
For this you could use a "certificate-map", as following:
tunnel-group Financials type remote-access
tunnel-group IT type remote-access
crypto ca certificate map AnyConnect_Map 10
subject-name co ou = financials
crypto ca certificate map AnyConnect_Map 20
subject-name co ou = it
webvpn
enable outside
certificate-group-map AnyConnect_Map 10 Financials
certificate-group-map AnyConnect_Map 20 IT
So in this case, I am looking at the OU attribute of each certificate.
Let me know if you have any questions.
Thanks.
Portu.
Please rate any helpful posts.

Similar Messages

  • Is there a way to develop an HTML based extension for Dreamweaver like ones for PS or AI?

    Is there a way to develop an HTML based extension for Dreamweaver like ones for PS or AI? I mean like extension produced by Extesion Builder 3.

    Snippets is a good idea. But you can also do this with a template. Each time you use FILE | New > Page from Template, as you would to create a new child page, you have the option to enable or disable an option called "Update page when template changes". If that option is DISABLED (i.e., unchecked), then the child page will be created but with NO TEMPLATE MARKUP (i.e., no editable/non-editable regions)! Seems that's exactly what you want, no?

  • Best way for producing static html?

    I would like to write a program that produces some static web pages that will display some summary stats from stats that are collected in a database but cleared out every few days.
    I'm not sure where to begin or what I should be looking at for producing static html pages. Can anyone offer suggestions?
    Thanks

    Use the KISS principal.
    XML with XSLT is a huge learnng curve, IMHO. It most
    likely way overkill for your needs.
    Well, let's see - if I go the application route as you suggested I need to do the following things:
    Connect to the Database
    Get a ResultSet of Data I am interested in presenting
    Iterate over this ResultSet constructing an HTML page likely via a ton of "output "<TR><TD>" + someData + "</TD>" " type statements.
    If I go the XSLT route then I do something like this:
    Connect to the Database
    Get a ResultSet of Data I am interested in presenting
    Iterate over this ResultSet constructing some normal Java classes
    Use something like Castor to convert these things to XML, or just use the XMLEncoder class in the standard lib.
    Use XSLT to convert that to HTML
    The second way involves learning more technologies than the first, but then it also moves the layout of your page out of the code and into an XSLT file where it (IMO) belongs. And it's not that much more complex, really.
    Besides, to me "learning more technologies" is still a plus instead of a minus. KISS is a good thing to keep in mind, but this profession makes it difficult to avoid learning new things.
    Good Luck
    Lee

  • What is the simplest way to make a movie from BufferedImages?

    I have a 3d rendered animation from which I can grab BufferedImages of each frame. What is the simplest way I can create a movie from these images?
    I've seen the JpegImagesToMovie.java file and not only is it suprisingly overcomplicated, it requires me to change the code so that I can get images from memory rather than from files.
    Is there some simple way of creating a movie which requires a few statements? I'm also prepared to use QuickTime for Java. I don't care about the format, since I can just use any video converter to convert it to my desired video format.

    I recently came up with a simplified JpegImagesToMovie program. It generates QuickTime movies with a single video track output as a file. Input is a series of jpegs (currently as a list of file names, but easily modified to a take any form of jpeg data.) Since the compression used by the movie is JPEG, if you have an uncompressed image buffer, you'll need to convert that into jpeg data bytes with some quality setting. (Since its a movie file, go with something low if you have a lot of similar images.) This will even run without a full install of jmf--no native code is called (as far as I could tell..)
    Here is the source code, sorry about the formatting!
    import java.awt.Dimension;
    import java.io.File;
    import java.io.IOException;
    import java.io.RandomAccessFile;
    import java.net.URL;
    import java.util.Vector;
    import javax.media.Buffer;
    import javax.media.Format;
    import javax.media.MediaLocator;
    import javax.media.format.VideoFormat;
    import javax.media.protocol.ContentDescriptor;
    import javax.media.protocol.FileTypeDescriptor;
    import com.sun.media.multiplexer.video.QuicktimeMux;
    * This program takes a list of JPEG image files and converts them into a
    * QuickTime movie.
    * This was based on Sun's JMF Sample Code JpegImagesToMovie.java 1.3 01/03/13
    * This code is an attempt to reduce the complexity to demonstrate a very basic
    * JPEG file list to movie generator. It does not use a Manager or Processor
    * class, so it doesn't need to implement any event listening classes. One
    * advantage of this simplified class is that you can just link it with the
    * jvm.jar file. (you might also need to track down the com.ms.security library
    * stubs, use google. You'll need PermissionID.java and PolicyEngine.java.)
    * I tried to get it to generate AVI files without success.
    * These output files are could use further compression.
    * A Vector of jpeg image paths was one way to do this--the appropriate
    * methods can be overwritten to grab images from another source
    * --zip file, http, etc.
    * - Brad Lowe; Custom7; NuSpectra; 2/10/2005
    * The existing Copyright from Sun follows.
    * Copyright (c) 1999-2001 Sun Microsystems, Inc. All Rights Reserved.
    * Sun grants you ("Licensee") a non-exclusive, royalty free, license to use,
    * modify and redistribute this software in source and binary code form,
    * provided that i) this copyright notice and license appear on all copies of
    * the software; and ii) Licensee does not utilize the software in a manner
    * which is disparaging to Sun.
    * This software is provided "AS IS," without a warranty of any kind. ALL
    * EXPRESS OR IMPLIED CONDITIONS, REPRESENTATIONS AND WARRANTIES, INCLUDING ANY
    * IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR
    * NON-INFRINGEMENT, ARE HEREBY EXCLUDED. SUN AND ITS LICENSORS SHALL NOT BE
    * LIABLE FOR ANY DAMAGES SUFFERED BY LICENSEE AS A RESULT OF USING, MODIFYING
    * OR DISTRIBUTING THE SOFTWARE OR ITS DERIVATIVES. IN NO EVENT WILL SUN OR ITS
    * LICENSORS BE LIABLE FOR ANY LOST REVENUE, PROFIT OR DATA, OR FOR DIRECT,
    * INDIRECT, SPECIAL, CONSEQUENTIAL, INCIDENTAL OR PUNITIVE DAMAGES, HOWEVER
    * CAUSED AND REGARDLESS OF THE THEORY OF LIABILITY, ARISING OUT OF THE USE OF
    * OR INABILITY TO USE SOFTWARE, EVEN IF SUN HAS BEEN ADVISED OF THE POSSIBILITY
    * OF SUCH DAMAGES.
    * This software is not designed or intended for use in on-line control of
    * aircraft, air traffic, aircraft navigation or aircraft communications; or in
    * the design, construction, operation or maintenance of any nuclear facility.
    * Licensee represents and warrants that it will not use or redistribute the
    * Software for such purposes.
    public class SimpleMovie
    Vector images; // jpeg image file path list
    VideoFormat format; // format of movie to be created..
    // Sample code.
    public static void main(String args[])
    try
    // change imageDir to the location of a directory
    // of images to convert to a movie;
    String imageDir = "images";
    File d = new File(imageDir);
    SimpleMovie imageToMovie = new SimpleMovie();
    // change width, height, and framerate!
    // Excercise: Read width and height of first image and use that.
    imageToMovie.init(320, 240, 10.0f);
    imageToMovie.setFiles(d);
    File dest = new File("simple.mov");
    imageToMovie.createMovie(dest);
    System.err.println("Created movie " + dest.getAbsolutePath() + " "
    + dest.length() + " bytes.");
    } catch (Exception e)
    System.out.println(e.toString());
    e.printStackTrace();
    // return jpeg image bytes of image zIndex (zero-based index)
    public byte[] getImageBytes(int zIndex) throws IOException
    if (images == null)
    return null;
    if (zIndex >= images.size())
    return null;
    String imageFile = (String) images.elementAt(zIndex);
    // Open a random access file for the next image.
    RandomAccessFile raFile = new RandomAccessFile(imageFile, "r");
    byte data[] = new byte[(int) raFile.length()];
    raFile.readFully(data);
    raFile.close();
    return data;
    // Call this before converting a movie;
    // Use movie width, height;
    public void init(int width, int height, float frameRate)
    format = new VideoFormat(VideoFormat.JPEG,
    new Dimension(width, height), Format.NOT_SPECIFIED,
    Format.byteArray, frameRate);
    // Set up the files to process
    public void setFiles(Vector inFiles)
    images = inFiles;
    // point converter to jpeg directory. Only does one level,
    // but could recurse, but then sorting would be interesting..
    public void setFiles(File dir) throws Exception
    if (dir.isDirectory())
    if (images == null)
    images = new Vector();
    String l[] = dir.list();
    for (int x = 0; x < l.length; x++)
    if (l[x].toLowerCase().endsWith(".jpg"))
    File f = new File(dir, l[x]);
    images.addElement(f.getAbsolutePath());
    // Crank out the movie file.
    public void createMovie(File out) throws Exception
    if (format == null)
    throw new Exception("Call init() first.");
    String name = out.getAbsolutePath();
    QuicktimeMux mux = null; // AVI not working, otherwise would use
    // BasicMux
    if (out.getPath().endsWith(".mov"))
    mux = new QuicktimeMux();
    mux.setContentDescriptor(new ContentDescriptor(
    FileTypeDescriptor.QUICKTIME));
    } else
    throw new Exception(
    "bad movie file extension. Only .mov supported.");
    // create dest file media locator.
    // This sample assumes writing a QT movie to a file.
    MediaLocator ml = new MediaLocator(new URL("file:"
    + out.getAbsolutePath()));
    com.sun.media.datasink.file.Handler dataSink = new com.sun.media.datasink.file.Handler();
    dataSink.setSource(mux.getDataOutput()); // associate file with mux
    dataSink.setOutputLocator(ml);
    dataSink.open();
    dataSink.start();
    // video only in this sample.
    mux.setNumTracks(1);
    // JPEGFormat was the only kind I got working.
    mux.setInputFormat(format, 0);
    mux.open();
    // Each jpeg goes in a Buffer.
    // When done, buffer must contain EOM flag (and zero length data?).
    Buffer buffer = new Buffer();
    for (int x = 0;; x++)
    read(x, buffer); // read in next file. x is zero index
    mux.doProcess(buffer, 0);
    if (buffer.isEOM())
    break;
    mux.close();
    // close it up
    dataSink.close();
    // Read jpeg image into Buffer
    // id is zero based index of file to get.
    // Always starts at zero and increments by 1
    // Buffer is a jmf structure
    public void read(int id, Buffer buf) throws IOException
    byte b[] = getImageBytes(id);
    if (b == null)
    System.err.println("Done reading all images.");
    // We are done. Set EndOfMedia.
    buf.setEOM(true);
    buf.setOffset(0);
    buf.setLength(0);
    } else
    buf.setData(b);
    buf.setOffset(0);
    buf.setLength(b.length);
    buf.setFormat(format);
    buf.setFlags(buf.getFlags() | Buffer.FLAG_KEY_FRAME);
    }

  • Simplest way to sign a JAR?

    I made an applet using Eclipse that pulls information from a website while running. Apparently this needs to be signed before it works online -- what is the quickest, easiest way to sign it?
    I'm one of the few people who are going to be using this applet, and I have basically no knowledge about JARs. I read the tutorial here but it didn't help me at all, as I don't have a "keystore" on my computer and I don't even know where to type any of that ("that" being jarsigner -keystore mykeys -storepass abc123 -keypass mypass app.jar johndoe).
    I tried to run the unsigned JAR using Firefox (+<applet code="MU.class" archive="MU.jar" width=300 height=400>+). The applet didn't even initiate, it simply turned into a white box saying Error. Click for details -- clicking it brought up a Java Console starting with this line: java.security.AccessControlException: access denied (java.net.SocketPermission www.forsaken-mu.com:80 connect,resolve).

    coopkev2 wrote:
    ejp wrote:
    I don't have a "keystore" on my computerSee the Javadoc for the 'keytool' tool.The link for the "Keytool reference page for Windows" here redirects here which is of no use to me that I can see. Did I click the wrong link, or is it just out of date?Those are pointing to the 1.2 JavaDocs. I have always wished Sun would establish an URL for the current API and tool documentation. As the new JRE major versions are released for public use, the docs should change accordingly.
    Try instead [http://java.sun.com/javase/6/docs/technotes/tools/windows/keytool.html].
    Out of curiosity. How did you get that URL?
    As to your more general question of "Simplest way to sign a JAR?". I would answer that "Load a project (that signs code) with a build.xml into your IDE and call the main task."
    But there are some caveats to that advice.
    1) There are very few people on these forums willing to help with IDEs, so it is up to you to figure out how to import/build the ant based project, or take it to a forum for the IDE.
    2) Understanding what the build file is doing, depends on understanding the underlying tools it calls. Most of those tools come directly from the JDK.
    Having said that, I do have some open source projects that digitally sign code. For example the [demo. of the JNLP API file service|http://pscode.org/jws/api.html#fs] with the source files available in [http://pscode.org/jws/filetest.zip]. Maybe you can get a head start by looking that over (and building it, and changing it etc.).

  • Research on the Security of NGDC Based on ASP

    Research on the Security of NGDC Based on ASP
    Zhang Li Gong Jianya Zhu Qing
    Key Words
    active server pages (ASP); national geospatial data clearinghouse (NGDC); geographic information system (GIS); Internet
    Abstract
    On the basis of the authors? experience of setting up an NGDC Web site, this paper attempts to present some significant aspects about the security of NGDC based on ASP. They include data storing, database maintenance, new technical support and so on. Firstly, this paper discusses how to provide the security of data which is saved in the host of NGDC. The security model of ?New works ?DB Sever-DB-DB Object? is also presented. In Windows NT Server, Internet Information Server (I IIS) is in charge of transferring message and the management of Web sites. ASP is also based on IIS. The advantages of virtual directory technique provide by IIS are emphasized.
    An NGDC Web site, at the Research Center of GIS in Wuhan Technical University of Surveying and Mapping is also mentioned in this paper. Because it is only an analogue used for case study, the transmission of digital spatial products is not included in the functions in this NGDC Web site. However, the management of spatial metadata is more important and some functions of metadata query are implemented in it. It is illustrated clearly in the functional diagram of the NGDC Web site.
    1 Introduction
    Needless to say, it is very important for most GIS users to acquire and integrate the geospatial information from various districts. However, the current situation of geospatial information production and dissemination in the world is still unsatisfactory. On one hand, users do not know where the geospatial data files are stored and what geospatial data is useful for their applications, or have not necessary computer facilities. On the other hand, due to the lack of coordination and cooperation, the duplication of geospatial data production widely exists. Most of geospatial information is stored by different organizations including governmental organizations, commercial companies. What?s more, the lack of geospatial data exchange and sharing mechanism results in relative low benefit of geospatial data use. It is difficult for some products to get necessary information from other producers to integrate with or to update their own databases. In short, the value of geospatial information has not been shown exactly in GIS industry of China.
    It is obvious that the information distribution technique based on Internet can play a great role in GIS industry. National Geospatial Data Clearinghouse users will be able to query what geospatial data is being produced, how about is quality, where it is produced, and how to get the geospatial data economically and conveniently.
    2 NGDC and ASP technology
    As mentioned above, NGDC is a geospatial information distributed network system which is concerned with geospatial data producers, managers and users. So the relationship among them must be harmonized. The NGDC provides the service of geospatial information through internet. In detail, it will allow various data formats to exist in this opened geospatial information service system and it supports the share and query of the geospatial data from different sources. The main mission of NGDC is to offer a means of fast, efficient, safe, economical service of geospatial data provision to users. At the same time, it will offer means for data providers to advertise their new products and collect users? demands and feedbacks in order to promote the geospatial data production.
    To date, the model of NGDC is usually described as a provider-oriented model. In this model, every geospatial data provider is linked with internet as an NGDC node... user?s access NGDC nodes through internet and browses the catalogues of geospatial data stored in NGDC, and then they query the metadata about the available products for their applications. After selecting the desired data set, the user can send an order to the relevant producer on-line or by E-mail system. If users can not find the geospatial data available in this NGDC node for their applications, they will be able to access other NGDC nodes.
    So the construction of NGDC is concerned with the planning and maintenance of dynamic Web sites linked with internet. Since Active Server Pages (ASP) came out with its peculiar characteristics several years ago, which is applied to the construction of more and more dynamic Web sites in the diverse fields? In comparison with common gateway interface (CGI), ASP is more effective and flexible as a server scripts environment.
    With html pages, script commands and active X components, ASP can set up dynamic, interactive and efficient Web server programs. It is not important whether browsers can run those ASP codes, because all of ASP programs including scripts plugged in html, such as VBScript, JScript, are executed in servers. ASP programs will send a series of commands to the script engine, and then the script engine translates the commands into some codes which can be executed by servers. After running the executive codes, the results will be sent by servers to users? browsers in html. In this way, it is sufficient for browsers to have basic function of browse. As a result, the speed of the system increases rapidly.
    NGDC Web site provides users with a catalogue of geospatial data entity, data entity and the relevant metadata. Therefore it is inevitable to access various databases in the construction of NGDC. It is convenient to connect database systems with ASP plug-in Active X components, so Web pages can be linked to all kinds of databases which provide ODBC interfaces for other programs. Active X components provide the objects whose tasks are to finish certain functions. So Active X components are of great significance in setting up Web programs.
    3 Research on security of NGDC
    This paper attempts to present some significant aspects about the security of NGDC base on ASP, such as data storing, database, maintenance, new technical supporting and so on.
    3.1 Security of data storing
    The information stored in NGDC includes geospatial data, relevant metadata and catalogues of data products. The maintenance of all the information is a very hard task. Of course, the security of data storing is included in it. From the point of system maintenance, the security of data storing in NGDC is concerned with disk error-tolerance and back-up supporting.
    With the rapid development of manufacturing technique of hard disk, the life-span of hard disk has been lengthened. Disk error-tolerance decreases usually the possibility of data-losing because of errors of hard disks. It is inevitable that some errors cannot be limited in spite of any error-tolerance system. In order to maintain the security of data, the significance of data should be assessed firstly and so should the loss of data-losing. There are three kinds of dump plans for database or data files: full data dump, increment data dump and combination of them. As in NGDC the need of data back-up depends on its significance.
    3.2 Security of database maintenance
    As for popular large-scale database systems such as Microsoft SQL Server, Sybase, Oracle, Informix, security maintenance is implemented by four levels of ?New works ?DB Sever-DB-DB Object? security model. Every user has his network login ID and his password, with which the user ID and the password, users can login into network. Take Windows NT Server for example, Windows NT Server provides some security maintaining methods such as encoded password, minimum password length and so on.
    In general, network cannot automatically permit its network users to access databases in it. The fact that a user can access databases does not mean that he can automatically access databases in it. Only those users who have their database user IDs stored in system tables in database can access database.
    3.3 Security with ASP
    In the environment of Windows NT Server, Internet Information Server (IIS) is in charge of distributing information and maintenance of Web sites. ASP is also based on IIS. When users access some ASP files in their browsers, the relevant ASP scripts will run in server and the results will be sent users in Web pages.
    Virtual directories are different from physical directories in hosts or servers. Net work administrators may make good use of the mechanism of virtual directory in order to maintain the security. IIS supports virtual directory which plays a great role in the security maintenance of Web sites. Firstly, virtual directory conceals the information about actual directory structure. In normal browsers, users can get the path information of a certain Web site; the directory information of Web sites will be exposed to users linked with Internet. As a result, it is easy for the Web sites to be attacked by hikers. Secondly, it is convenient to transfer the WWW service from one server to another without updating the code in Web pages if there is the same virtual directory structure in two servers. Finally, when putting Web pages into virtual directories, administrators can assign different attributes to the directories. For example, in the construction of NGDC Web site, it is important to put normal html files and ASP files into different virtual directories. The attribute of directories in which normal html files are stored may be ?Read? while the attribute of directories in which ASP files are stored may be ?Execute?. On one hand, it simplifies the maintenance and management of NGDC Web sites. On the other hand, ASP source files will never be sent to user browsers. In other words, hikers cannot get the ASP source codes through their browsers. Thus it improves the security of ASP files.
    4 An NGDC model Web site in WTUSM
    Some other security aspects in operational model, programming, management in the plan and construction of NGDC should be concerned. As an example the construction of an NGDC model Web site is presented below in order to explain the security maintenance of NGDC in detail. On the basis of authors? research on relevant problems, this NGDC model Web site was planned and deployed in early 1999. As a model project, the purpose of construction of this Web site is to provide some useful experiences for other projects on NGDC. Therefore the process of geospatial metadata plays a great role in this Web site. In fact, there are not actual geospatial data products stored in this NGDC model Web site. The main task of this Web site is to provide relevant geospatial metadata services, so the functions of data product maintenance cannot be found. Geospatial metadata is stored into meta-database in Microsoft SQL Server. With ?New works -DB Sever-DB-DB Object? security model in Microsoft SQL Server, the relations between user and access rights are set up. In order to simplify the problem, those two tasks are assigned to two DB users. One is a user who is the owner of DB objects. (Of course, he has all rights to access, update and delete DB objects); the other is a normal user who can only access DB objects such as tables. While developing ASP programs in the integrate developing environment of Microsoft Interdev, the functions may be fulfilled by script programs running either in clients or in servers. As a result, it improves the confidentiality of ASP programs and the efficiency of NGDC service system.
    In the NGDC Web site, something has been done in order to improve the security of operation: a table named providers? information table is stored in NGDC to keep some useful information about relevant geospatial data providers, such as name, ID, passwords, contact methods and son on. The information may be a long, irregular string whose length is less than 1024. It is produced and maintained by NGDC. The providers? information table is stored in the server in NGDC. In this way, data producers provide geospatial products together with their identifying information through Internet.
    5 Conclusions
    In short, it is very convenient and efficient to distribute geospatial data in the NGDC nodes through internet. On the other hand, with the development and construction of NGDC, there will come more and more challenges and problems about the security of NGDC. Obviously some researches and discussions in this field need to be further carried on.

    Jaya
    We have two ways to achieve this scenario
    1.Going with PCR where we Query No of Years Completed
    2. Going for Custom Function
    In the above two ways  we have to maintain the year of completion in Date Specification Either Manually or Thorugh Dynamic Action which shd automaticallly update....IT00041
    I prefer the second one since PCR is some wht complicated

  • Simplest way to restrict access to remote EJB calls

    I'm using weblogic 10.3 and I'm new to security in weblogic. I was looking at the documentation at http://docs.oracle.com/cd/E13222_01/wls/docs103/ConsoleHelp/taskhelp/security/ManageSecurityForDD.html
    but got a little overwhelmed by the many options on how to implement security. Plus, I am getting confused between JDNI security and EJB Layer security (they're not the same thing, right?)
    Can someone explain what the simplest way would be to prevent an "unauthorized" client to make remote EJB calls? For example, I know of the ConnectionFilters that you can implement, which can prevent remote callers from making T3 or IIOP calls if they're not from an authorized IP, etc. This is a good start but ideally I would want to password protect the EJBs, and any EJB client would have to provide this username/password somehow. Or possibly use two-way SSL for t3? The client app would have to provide a certificate to prove that it's trusted.
    To be clear, I don't think I need weblogic to handle any fine-grained access control. I just want to make sure that the client (e.g., a webapp) is a trusted one. Once the EJB container is satisfied that the client is trusted (preferably by user/pass) then the client is free to execute any EJB methods.
    Thanks in advance.
    Edited by: user10123426 on Mar 14, 2012 10:26 AM

    I'm don't think you can do a posture check by MAC address.  If you're using SSLVPN, and you're running Windows,  you can do a Host Scan check for the following registry key:
    HKLM\System\CurrentControlSet\Services\Tcpip\Parameters\Domain
    Then set up a Pre-Login policy that goes Windows->Registry Check->Success->RegCheckOK
                                                                                                         |->Fail->RegCheckFail
    At this point you've just verified that you can read that key and the value is stored for later use.  You're not making an allow/deny decision yet. 
    Then in your Dynamic Access policy you do a Policy check for Location=RegCheckFail, that says "Unable to read registry".  The following DAP policy check looks for Location=RegCheckOK, and validates that the value is your AD domain. 
    Alternatively, you could put a NAC box (ISE or Clean Access) 'behind/after' the VPN box, so although anyone can connect only domain machines (and/or whatever other posture checks you want to make, e.g. Antivirus status) make it through to the rest of the network.

  • Password encrypt - looking for the simplest way

    I�m implementing a web application which needs to encrypt the user password and store it in a database... (the classic scenario).
    what is the simplest way to encrypt the user password?
    I need only the encryption method..

    There are several ways: You do a secure hash of the password and store that. Then, when you want to verify the password, you do the same hash of the proposed password and if they match, you call it macaroni. Alternately, you can encrypt the password using DES or some other private key encryption technique. The technique for authentication is the same: encrypt the proposed password and if the cipertext matches that stored in your DB, the user is authenticated.
    You can do an SHA-1 hash or DES encryption using the JCE.
    See here:
    http://www.ja.net/CERT/Belgers/UNIX-password-security.html
    http://www.itworld.com/nl/unix_sec/12062001/

  • Simplest way to have a portlet link to the root of the knowlege directory?

    We have the knowlege directory unavailable in our navigation. What is this simplest way to create a portlet that permits a user to link to the root of the directory?
    I created a simple html file and attmpted to use different transformer tags but ran into problems, like did not know the user's id so linked in as guest, etc. Is there an undocumented transformer tag that can send me to the knowlege directory?
    I attempted to append
    server.pt?space=Dir&spaceID=2&parentname=CommunityPage&parentid=1&control=OpenSubFolder&DirMode=1&subfolderID=-1
    to a url where the portlet is hosted on the plumtree server. This works but reverts to guest.
    Does this really require the EDK?

    Once your widget is on the slide, it has complete control over the display tree. So what you can do is to move up the parent hierarchy until you find the slide (parent.parent.parent) and then re-parent yourselft or you popup window on top of the hierarchy by just calling addChild(). That works well for the static widgets. You just need to deal with the position being different on the slide so you'll have to juggle with localToGlobal() and globalToLocal().
    Whyves
    www.flash-factor.com

  • Simplest way to get count

    What is the simplest way to record a count of hits to a Web
    page that is platform-independent, secure and client-friendly?

    DECLARE
      CURSOR c_tablename IS
        SELECT table_name FROM user_tables WHERE table_name = 'EDI_850_HDR';
      v_count     NUMBER := NULL;
    BEGIN
      FOR r_tablename IN c_tablename
      LOOP
        EXECUTE IMMEDIATE 'SELECT COUNT(*) FROM ' || r_tablename.table_name
          INTO v_count;
        DBMS_OUTPUT.put_line('v_tablename : ' || v_tablename || ' : count : ' ||
                             v_count);
      END LOOP;
    END;

  • Best way to create an html from application

    I need connect to an Oracle database and generate a static report from the result Query.
    Do you know what can be the best way to create this html file ?
    There is exists some html library to use?
    Thanks in advance

    you don't need a library. html is verry easy to use. you only have to write text to a file with html-tags.
    hope it helps

  • Is it possible to serve a few plain old simple static HTML pages with ITS?

    Hi,
    I am looking for a way to serve a few plain old simple static HTML pages (together with some javascript and image files) with ITS?
    The HTML page should be served unaltered.
    Is this possible somehow?
    Thanks,
      Wolfgang

    Hello Wolfgang.
    Yes, that is possible.  What ITS are you using, Integrated or Standalone?
    With Standalone you could just put the static HTML anywhere in the web server directory. 
    With Integrated ITS you will need to upload it to the Integrated ITS and then publish your static HTML.  There is an example of this in the SYSTEM service.  Just go to SE80 > SYSTEM Internet Service > Topic SL > Mime Objects > PAGE > aboutbox.html.
    Edgar

  • Servlets in one machine and static html pages in another machine

    We have one technical problem concerning WebLogic Server 5.1. Our customer
              wants to install two WLS servers in two machines. Let's call these machines
              and WLS instances A, which is a front end machine, and B, which is a back
              end machine. WLS A has all the static html pages and is open to public. WLS
              B has all servlets and business logic (EJB components...) and is open only
              to machine A. We are wondering if it is possible to configure WLS A so that
              when the client's browser requests a static html page and there is a link to
              a servlet in WLS B, the http requests goes from the client's browser first
              to WLS A, which sends the same request to WLS B, which runs the request in a
              servlet and sends the response to WLS A, which sends the response back to
              the client's browser. In that way the client allways thinks that it is
              communucating with WLS A and is unaware of the existance of the WLS B. We
              are wondering if this is possible with WLS configuration and if it is, how
              this can be done.
              Sami Elomaa
              

    Use ProxyServlet:
              http://www.weblogic.com/docs51/admindocs/http.html#proxy
              btw, why don't you let WLS A serve html and servlets, and let WLS B serve
              EJBs... it's more logical that way. Well, I'm kinda biased because that's
              how we do it... ;-)
              Gene Chuang
              Teach the world. Join Kiko!
              http://www.kiko.com/profile/join.jsp?refcode=TAF-gchuang
              "Sami Elomaa" <[email protected]> wrote in message
              news:[email protected]...
              > We have one technical problem concerning WebLogic Server 5.1. Our customer
              > wants to install two WLS servers in two machines. Let's call these
              machines
              > and WLS instances A, which is a front end machine, and B, which is a back
              > end machine. WLS A has all the static html pages and is open to public.
              WLS
              > B has all servlets and business logic (EJB components...) and is open only
              > to machine A. We are wondering if it is possible to configure WLS A so
              that
              > when the client's browser requests a static html page and there is a link
              to
              > a servlet in WLS B, the http requests goes from the client's browser first
              > to WLS A, which sends the same request to WLS B, which runs the request in
              a
              > servlet and sends the response to WLS A, which sends the response back to
              > the client's browser. In that way the client allways thinks that it is
              > communucating with WLS A and is unaware of the existance of the WLS B. We
              > are wondering if this is possible with WLS configuration and if it is, how
              > this can be done.
              >
              > Sami Elomaa
              >
              >
              

  • Static html file

    How do I access an uploaded static html file thru a url? What directory is this file uploaded to?

    You'll need to explain what you're trying to achieve.
    You can incorporate static HTML in various ways, for example copy and paste (minus header and body tags etc.) into an HTML region, or retrieve from the database (stored as a VARCHAR or CLOB) and htp.p to the browser.
    Or there is a very good 'upload/download' how-to if you want to find out about this aspect also.
    John.

  • Simplest way to create a web form

    hi
    what's the simplest way to create a web form?
    i dont want to use action of mailto:.
    the components like aspmail are complicated.
    i teach a class of teenagers to create a simple html page
    (notepad) and i need a simple form proccessor
    thanks
    lenny

    The simplest would be to use a form processor that can handle
    unlimited fields without additional coding. All you need to worry
    about is correctly naming the send to address and subject form
    fields. The processor loops through the form object and takes care
    of all of the form fields. I don't know of a free script off hand,
    but check out hotscripts. Most can use cdonts or cdosys.
    http://www.hotscripts.com/ASP/Scripts_and_Components/Form_Processors/index.html

Maybe you are looking for

  • How to Delete Mutiple bookmarks instead of one at a time - in desktop Safari

    I have several hundred bookmarks in the left hand side Bookmarks (not the Collections) section - I would like to delete lots of them one at a time - can't see how to highlite more than one at a time? John

  • HT5900 how do i add my apple tv to devices

    how do i add my apple tv to devices on itunes?

  • Install FCE HD 3.0?

    Hi I am trying to install my FCE HD 3.0 upgrade on my 17" core 2 duo imac and am stumped. I have the required video card but this is not recognized by the installer and it quits. It also disables my older FCE program. I understand there is a patch fo

  • No sound in my imovie

    I made a little movie with my digital camera. I imported it into iMovie. Now I want to cut it and insert other things (it's for practising, this is the first movie I'm making). But there is not sound. I cannot hear me talking. How do I know where to

  • CSS - Visited Link format won't apply

    Hello, The following is a column that I have in a table, and its cells are all hyperlinks that trigger some AJAX.  The hyperlink works great.  However, I would like the background color to turn white after the link has been clicked.  It seems like th