Amazon Web Services: Overview of Security Processes – This document is intended to answer questions such as “How does AWS help me ensure my data are secure?” Specifically, AWS physical and operational security processes are described for network and infrastructure under AWS’ management, as well as service-specific security implementations.
I started work this morning at Huawei‘s Santa Clara office, specifically in the ‘Virtual Data Center’ team with Geoff Arnold. So far, the best description of what I’ll be doing is in Geoff’s blog entry – Building a Team.
They say that all good things come to an end; today, that’s true for both Superpatterns at blogs.sun.com and my nearly ten year tenure at Sun. It’s certainly been a wild ride, and I’ve enjoyed (amost!) every minute of it! My blog will move to blog.superpat.com (If you’ve been using the FeedBurner feed, there’s no need to make any changes) at some point in the next day or so, and I’ll be starting a new job on Monday.
As Kohsuke mentions, this has a number of advantages – every AD admin knows the domain name, while many would likely have to go look up an individual host name, not to mention the LDAP port number. Since we use the domain name to look up an individual AD controller via DNS, it also means that the admin doesn’t need to update OpenSSO’s configuration as AD controllers come and go – OpenSSO will always get a valid host name from DNS.
So, when configuring OpenSSO Express 8, you can now just specify the AD domain name. As improvements go, this one is pretty small, but, as I think everyone agrees, the cumulative effect of all these little improvements in OpenSSO over the past two or three years has been HUGE…