Job Portal Security the Objective Term Paper

Download this Term Paper in word format (.doc)

Note: Sample below may appear distorted but all corresponding word document files contain proper formatting

Excerpt from Term Paper:

XML is used not only to represent the data but also as a messaging protocol called SOAP; and (6) Portal Integration is another popular integration methodology in use today. It doesn't involve expensive and time consuming technologies and processes that EAI and data warehousing require. Also, it is the most customer-facing of all the methods described in this section. This means that it can be highly personalized and customized to the customer's requirements. In future, portals will present their functionality as web services so that multiple portals from different vendors can be integrated.

Architecture of Portals

The portal, when speaking technically, is "a framework that enables developers to plug various software components called portlets, and then deliver the aggregated content to multi-devices." (Mohan, 2003) Integration may be accomplished through using HRML, JSP, Java Beans, Java servlets, XSL that transforms XML through XSL transformation or even CGI. Sun Microsystems' Java Community Process is present reviewing Java Service request, JSR 168 in order to "define a set of API for aggregation, personalization, presentation and security. The specification will be based on the specification for Java Servlet. According to Mohan: "once the standard is in place, there could be a new third party portlet industry that could mushroom as portals will be able to integrate any portlet based on the standards using the Java architecture." (2003) Mohan additionally states that: "Taking the portlet even further is a standard called Web Services for Remote Portals (WSRP) from Organization for Advancement of Structured Information Standards (OASIS). This standard defines interfaces and behaviors to encapsulate portlets as web services so that any portal based on WSRP standard could bind to the portlets. This means that the local portal will only have the WSRP portlet proxy while the actually portlet will run on the remote server. The portal developers will be able to locate WSRP portlets in a public or private UDDI (universal description, discovery and integration) registry. WSRP will also interoperate with portlets developed using Microsoft.NET architecture." (2003)

Identity Management

Identity management works with infrastructure building in order to centralize both management of users and their privileges within the system. Centralizations of users have the benefits of: (1) Better control over security applications and servers through consolidation of the authentical and authorization; (2) reduction of the number of user accounts within the organization; (3) ease of managing a user life-cycle; (4) control auditing of user actions over the network; and (5) ability to integrate of federate with external networks using similar standards for identity management. (Mohan, 2003) the Lightweight Directory Access Protocol (LDAP) is the most predominantly used standard in managing identities.

Single Sign on (SSO)

The work of Mohan (2003) relates that a single sign on architecture is inclusive of a "centralized authentication hub that is used by all the users of the portal. Once the SSO server authenticates a user, the user is free to access all the applications available to the portal without having to login again. Also, when a user signs off, single sing off ensures that the user is logged off all the participation applications. The following figure illustrates how a SSO works.

Single Sign on (SSO)

Source: Mohan (2003)

The single sign on works on each application or webpage that needs authentication. When the client browser attempts to access the page the web server checks to see if the site has the proper cookie set or not and in cases it does not the browser is then redirected to the SSO service or the provider of identity. At this point the browser "will then receive one or more 'tokens' and will set a cookie. The web browser will once again be redirected to the web server but this time the URL has identifying information encoded in it." (Mohan, 2003) Mohan relates that there are presently two predominant SSO architectures:

1) Microsoft's NET Passport; and 2) Liberty Alliance's Liberty 1.1 specification with the largest being the Microsoft NET passport, which claims 200 million user accounts. (Mohan, 2003)

The primary difference between these two is the "SSO implementations of both the groups in how the tokens are generated. "Microsoft uses 3 DES-encrypted identifiers in a proprietary format. However, this makes the Passport network proprietary. Hence, Microsoft has committed to upgrading to Kerberos tickets. However, Liberty rejects Kerberos because of the overhead of the Kerberos ticket server and its inability to distinguish between authentication and authorization. Liberty Alliance has instead proposed an XML-based standard for exchanging authentication and authorization data called Security Assertion Markup language (SAML). The SAML data is embedded in the HTTP responses. Microsoft has also collaborated with IBM and VeriSign to enable passing authentication and authorization data in the SOAP header as a part of the WS-Security specification.

The work entitled: "Building a Portal? Vive La Difference" relates that portal servers are becoming more popular in providing users with "ready access to the information they need, when they need it through Web browsers. An intuitive jumping off point to content and applications from a variety of internal and external sources, portals consolidate access to information that used to require multiple interfaces. Businesses in every industry are turning to portals for faster, more efficient business-to-business and business-to-consumer communication. They see these tools as the key to delivering content that's timely and relevant to individual's roles and to promoting collaboration across geographic boundaries." (InformationWeek, 2001) a portal has the power to ": enhance knowledge sharing and improve productivity, and provide a unified and consistent view of the business to customers, suppliers, investors partners, and visitors. And it can reduce the costs of distributing and sharing content and applications."

The work of Sumner Blount, eTrust Solutions entitled: "Reducing the Costs of it Security Management" states that Identity and Access Management involve the following considerations:

Who has access to what?

What did they do?

When did they do it?

How can we prove it? (Sumner Blount, eTrust Solutions, 2006)

Upon answering these questions it is possible to "effectively align security with business goals, protect vital business assets, streamline business operations and achieve regulatory compliance." (Sumner Blount, eTrust Solutions 2006) Key capabilities for integration and identity and access management success are:

Identity Administration - Enables the creation and administration of user identities and profile information;

Provisioning - Allocates to each user the appropriate accounts and access rights to corporate resources, as well a de-provisioning them at the appropriate time (e.g. when they leave the company);

Access Management - Helps to ensure that the organization maintains the integrity of its information and applications through prevention to unauthorized access including access being controlled to all "...critical resources; web applications; enterprise applications; systems; critical system services; databases and repositories; and Monitoring/Auditing - Provides aggregation, filtering, analysis and correlation of security events across all components within the environment. Also, it provides visualization tools to facilitate analysis of this information by system administrators. (Sumner Blount, eTrust Solutions, 2006)

The following illustrates an 'integrated IAM platform'

Integrated IAM Platform

Source: Sumner Blount, eTrust Solutions (2006)

This solution results in reduction of it security costs including help desk costs. Efficiency is greatly increased through the IAM Platform. The Meta Group states findings that single sign on results in 33% reductions help desk call volume. Security often devotes much of its time to:

creation of identities or profiles for new users;

Creation of the access rights for each user;

Allocation of resources to new users;

De-allocation of resources when users are removed from the system;

Managing the identities and entitlements of external (typically partner) users;

Ensuring that each system and its critical services, databases, and files are protected from unauthorized access;

Collection and analysis of system log and auditing information; and Managing systems to ensure that the patches for all known vulnerabilities are installed in a timely manner.

Potential savings from automated provisioning will be based upon:

The number and rate of new users;

The number of accounts and applications that typically require access provisioning;

The time required to grant and create access to each of these accounts or applications (this depends heavily on the type of account being created and the system where the account resides)

The time expended in requesting, tracking, and managing the management approval process for access requests.

The cost/hour of the security administration staff

The following chart lists the cost reduction and productivity improvements with the IAM Platform.

Cost Reduction and Productivity Improvement with the IAM Platform


Mohan, Sajeev (2003) Mechanics of Oracle Portal and Identity Management. Online available at

Reducing the Costs of it Security Management (2006) Sumner Blount eTrust Solutions Online available at

Building a Portal? Vive La Difference (2001) Information Week. 5 November 2001 Online available at

Oracle Solutions for Workforce Excellence - HR Transformation: Transform HR from an Administrative Function to a Strategic Partner.

Mohan, Sajeev (2003) Mechanics of Oracle Portal and Identity…[continue]

Some Sources Used in Document:


Cite This Term Paper:

"Job Portal Security The Objective" (2007, December 17) Retrieved December 9, 2016, from

"Job Portal Security The Objective" 17 December 2007. Web.9 December. 2016. <>

"Job Portal Security The Objective", 17 December 2007, Accessed.9 December. 2016,

Other Documents Pertaining To This Topic

  • Security Agip Kazakhstan North

    They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

  • Marketing Strategy Job Opening Letter

    I am lucky in that my education and my professional experience have both been directly in line with my plans for future development and success, and I have managed to put an excellent portfolio of past work produced together. These external achievements, however, while representative and formative of certain internal qualities and skills, will not directly assist me in achieving more and greater results in the years ahead. For

  • Brazil Hospitality and the 2014 World Cup

    Brazil Hospitality and the 2014 World Cup Brazil is in 2014 expected to host an estimated 50,000 soccer fans from all over the globe. The event is to last for four weeks. The fans are expected to stay in the hotels, eat in restaurants, shop and visit Brazil's many attractions. Hosting an event of this magnitude is a challenge especially for a developing economy like Brazil. However, with careful planning the

  • Emc Corporation Analysis How Would You Describe

    EMC Corporation Analysis How would you describe the core competency of EMC Corp? What is the significance of understanding core competencies? Do core competencies provide competitive advantages or value to organizations? The core competency of EMC Corporation is the research and development, selling, implementing and supporting of their virtualization technologies incouding IT infrastructure systems and platforms. EMC's depth of expertise in virtualization and infrastructure technologies has made the company one of the

  • Establishing a Strong Application to Fashion School

    The capacity of good design is evident in its use to solve substantive socio-economic problems throughout the world. My experience and training at Parson's was rich and comprehensive, and left me with a lasting fascination for design -- and with many skills needed for a productive, meaningful career in fashion management. 4) Study Proposal Summary Fashion in Turkey is a fast moving sector that has been hampered by only summer and

  • Making Virtual Teams Work Introduction

    Virtual teams that gain the highest levels of performance first get their many processes in place first, and then move through the iterative stages of defining their information, collaboration and shared process ownership needs first, and then layer in specific technologies to automate these processes. Only by taking a very process-centric approach to defining technology needs will virtual teams be successful in their use of collaboration, synchronization, and project management applications. The processes need to form

  • Telecommunication Interception and Access in

    Conclusion: Chapter 2. Legal interception, defined as "the legally authorized process by which a network operators or services provider gives law enforcement officials access to the communications (telephone calls, e-mail massage etc.) of private individuals or organizations" , is crucial in preserving national security, investigating serious criminal activities, and combating terrorism. Currently, this includes intercepting cable systems, public switched telephone network and wireless. Parties involved in the interception process are sender of

Read Full Term Paper
Copyright 2016 . All Rights Reserved