SlideShare a Scribd company logo
1 of 57
Download to read offline
ICTA Technology Meetup 03

Enterprise Security
(Part 01)

By Crishantha Nanayakkara
Agenda
●

Functional Aspects of Security

●

An Introduction to PKI

●

An Introduction to SOA Security

●

Securing SOAP Web Services

●

An Introduction to Apache Rampart

●

Security Patterns with Apache Rampart

●

Mediating SOAP Web Services via ESB
2
Functional Aspects 
of Security

3
Authentication
Confidentiality
Integrity
Non­Repudiation
4
An Introduction to 
PKI

5
PKI enables parties to an e­commerce 
transaction to identify one another by 
providing authentication with digital 
certificates, and allows reliable business 
communications by providing confidentiality 
through the use of encryption, and 
authentication, data integrity and a 
reasonable basis for nonrepudiation through 
the use of digital signatures.
(Resource ­ WebTrust)
6
Ensuring
Authentication

7
–

Transport Layer  
●

–

SSL certificates

HTTP Layer / Message Layer – 
●

●

–

HTTP Basic Authentication
UserNameTokens

Application Layer – 
●

Form based Authentication 

8
Ensuring
Confidentiality

9
Public Key Encryption

10
Ensuring
Non Repudiation

11
By maintaing key pairs at both ends with 2­way 
authentication can ensure non­repudiation

12
Ensuring
Integrity

13
Digital Signatures
(Signing Process)

14
Digital Signatures
(Verification Process)

Step 1

Step 2

15
Digital Certificates
A digital certificate is basically a wrapper around a 
public key, which includes identifying information 
for the party owning that key. This wrapped body is 
then signed by a trusted third party, and the 
signature is included in the certificate. The trusted 
third party vouches for the public key and 
identifying information by issuing the certificate with 
its signature.
16
Creating Digital Certificates
●

Step 1: Creating the “public­private” key­pair
keytool  ­genkey  ­keyalg  RSA  ­keysize  2048  ­keystore 
crish_keystore.jks ­alias certificatekey

At this stage your certificate is owned and issued by you. 
However, a certificate issued by you will not be trusted by 
other organizations that does business with you electronically. 
Therefore your certificate would need to be “signed” by a recognized
certification authority.

17
Creating SSL Digital Certificates
●

Step 2: Retrieve the contents of the keystore
keytool ­list ­v ­keystore crish_keystore.jks ­storepass password
crishantha@crishantha-laptop$ keytool -list -v -keystore crish_keystore.jks -storepass password
Keystore type: JKS
Keystore provider: SUN
Your keystore contains 1 entry
Alias name: certificatekey
Creation date: Mar 10, 2012
Entry type: PrivateKeyEntry
Certificate chain length: 1
Certificate[1]:
Owner: CN=Crishantha Nanayakkara, OU=ICTA, O=ICTA, L=Colombo, ST=Western, C=SL
Issuer: CN=Crishantha Nanayakkara, OU=ICTA, O=ICTA, L=Colombo, ST=Western, C=SL
Serial number: 4f5b98a6
Valid from: Sat Mar 10 23:38:38 IST 2012 until: Fri Jun 08 23:38:38 IST 2012
Certificate fingerprints:
MD5: D0:56:A2:FE:EF:B0:CE:08:A6:28:FF:2C:2C:33:D7:4D
SHA1: 1D:77:C2:42:FD:AC:FA:32:7C:2B:D1:FF:70:95:0A:A2:66:4C:CE:27
Signature algorithm name: SHA1withRSA
Version: 3

18
Creating Digital Certificates
●

Step  3:  Generating  the  Certification  Service 
Request (CSR)
keytool  ­certreq  ­alias  certificatekey  ­keystore  crish_keystore.jks 
­file certificate_request.csr
crishantha@crishantha-laptop:~/test$ cat certificate_request.csr
-----BEGIN NEW CERTIFICATE REQUEST----MIICtTCCAZ0CAQAwcDELMAkGA1UEBhMCU0wxEDAOBgNVBAgTB1dlc3Rlcm4xEDAOBgNVBAcTB0Nv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-----END NEW CERTIFICATE REQUEST-----

19
Creating Digital Certificates
●

●

Step  4:  Send  the  generated  CSR  to  the 
Certification Authority (CA)
Step 5: CA will send you two things
–

CA root certificate

–

CA signed certificate
Both of these need to be imported to the keystore of 
yours

20
Creating Digital Certificates
●

Step 6: Importing the CA root certificate
keytool  ­import  ­alias  root­ca  ­v  ­trustcacerts    ­keystore 
crish_keystore.jks ­file ca.der

●

Step 7: Importing the CA signed certificate
keytool ­import ­alias certificatekey ­file signed_ca.der  ­keystore 
crish_keystore.jks

●

Step 8: Retrieve the contents of the keystore
keytool ­list ­v ­keystore crish_keystore.jks ­storepass password
21
Keystore and Truststore

22
PKI
Trust Models

23
PKI Trust Models
(Rooted Heirarchy Model)

24
PKI Trust Models
(Rooted Heirarchy Model)

The subordinate CAs (intermediate CAs and 
Issuing CAs) are certified by the parent CAs. 
The parent CAs are usually an intermediate 
CA or a Root CA.

25
PKI Trust Models

(Network/ Cross Certification Model)

26
PKI Trust Models

(Network/ Cross Certification Model)

Root CA can cross certify the other Root CA by 
just importing the public key certificate of the 
other Root CA. This relationship can be 
unidirectional or bidirectional

27
So what is National 
CA?

28
An Introduction to
SOA Security

29
SOA Security
●

SOAP Web Services
–

●

Transport Level and Message Level (Using 
WS­Security)

REST Web Services
–

Transport Level and OAuth

30
Securing SOAP 
Web Services

31
Securing a SOAP web service
with HTTPS

Client
Client

Server Public Key

Secured using
HTTPS

Web Service
Web Service

Server Certificate

32
Securing a SOAP 
web service
with WS­Security

33
WS­Security 
An Introduction

The standard framework for including XML­
formatted security data into SOAP messages 
is WS­Security

34
WS­Security 
An Introduction

It basically provides a XML based Abstraction 
Layer for the above established cryptography 
techniques.

35
WS­Security 
An Introduction

36
WS­Security 
SOAP

37
Apache Rampart 
An Introduction

●

●

●

Apache Rampart is the security module of 
Apache Axis2
It provides the WS­Security functionality 
to Axis2 web services and their clients
Mainly has 3 components
–

Rampart core

–

Rampart policy

–

Rampart trust

38
Apache Rampart 
An Introduction

●

●

●

Rampart Core: This drives security enforcement and 
validation on SOAP messages. Implements WS­Security 
and WS­SecureConversation.
Rampart Policy: This implements WS­SecurityPolicy 
specification, which is an extension to WS­Policy, Apache 
Neethi implements the WS­Policy specification.
Rampart Trust: This implements the WS­Trust 
specification. Basically this provides a framework to 
issue, cancel, renew and validate security tokens. For 
example STS (Security Token Service) tokens.
39
Apache Rampart 
An Introduction

40
Securing a SOAP web service
Transport level with HTTPS

Client
Client

Server Public Key

Secured using
HTTPS

Web Service
Web Service

Server Key Pair

41
Securing a SOAP web service

UserNameToken with Transport level HTTPS
Client
Client

Server Public Key

UsernameToken

Secured using
HTTPS
+
Authenticated with
UserNameToken

Web Service
Web Service

Server Key Pair

Call back Handler

42
The Callback Handler

43
The Service Policy

44
Securing a SOAP web service
Message Level Security – Asymmetric (Sign)
Client
Client

Client Key Pair

Callback Handler

Message is
Signed

Web Service
Web Service

Server Key Pair

Call back Handler

45
Service Policy (Sign only)

46
Service Policy (Sign) cont..

47
The Callback Handler



48
Securing a SOAP web service
Message Level Security ­ Asymmetric

49
Securing a SOAP web service
Message Level Security – Asymmetric 
(SignEncrypt)
Client
Client

Client Key Pair

Callback Handler

Message is
Signed and Encrypted

Web Service
Web Service

Server Key Pair

Call back Handler

50
Service Policy (SignEncrypt)

51
The Callback Handler

52
Ensuring Interoperablity

53
Mediating Secure 
Web Services via
ESB

54
End to End Security
with a ”Pass Through Proxy”

55
End to End Security
 with a ”Secure Proxy”

56
57

More Related Content

What's hot

SSO with the WSO2 Identity Server
SSO with the WSO2 Identity ServerSSO with the WSO2 Identity Server
SSO with the WSO2 Identity Server
WSO2
 
Integration Solution Patterns
Integration Solution Patterns Integration Solution Patterns
Integration Solution Patterns
WSO2
 

What's hot (20)

SSO with the WSO2 Identity Server
SSO with the WSO2 Identity ServerSSO with the WSO2 Identity Server
SSO with the WSO2 Identity Server
 
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise IntegratorTroubleshooting and Best Practices with WSO2 Enterprise Integrator
Troubleshooting and Best Practices with WSO2 Enterprise Integrator
 
Integration Solution Patterns
Integration Solution Patterns Integration Solution Patterns
Integration Solution Patterns
 
SOA Security
SOA Security SOA Security
SOA Security
 
Deep-dive into APIs in a Microservice Architecture
Deep-dive into APIs in a Microservice ArchitectureDeep-dive into APIs in a Microservice Architecture
Deep-dive into APIs in a Microservice Architecture
 
Architecture blockchain-azure
Architecture blockchain-azureArchitecture blockchain-azure
Architecture blockchain-azure
 
Service mesh in Microservice World to Manage end to end service communications
Service mesh in Microservice World to Manage end to end service communicationsService mesh in Microservice World to Manage end to end service communications
Service mesh in Microservice World to Manage end to end service communications
 
Microservice architecture-api-gateway-considerations
Microservice architecture-api-gateway-considerationsMicroservice architecture-api-gateway-considerations
Microservice architecture-api-gateway-considerations
 
[WSO2Con EU 2017] Extending Your Enterprise Integration Patterns Beyond ESBs
[WSO2Con EU 2017] Extending Your Enterprise Integration Patterns Beyond ESBs[WSO2Con EU 2017] Extending Your Enterprise Integration Patterns Beyond ESBs
[WSO2Con EU 2017] Extending Your Enterprise Integration Patterns Beyond ESBs
 
API Security in a Microservice Architecture
API Security in a Microservice ArchitectureAPI Security in a Microservice Architecture
API Security in a Microservice Architecture
 
Anypoint platform cloud
Anypoint platform cloudAnypoint platform cloud
Anypoint platform cloud
 
Intro to Microservices Architecture
Intro to Microservices ArchitectureIntro to Microservices Architecture
Intro to Microservices Architecture
 
SOA Security - So What?
SOA Security - So What?SOA Security - So What?
SOA Security - So What?
 
Microservice Architecture
Microservice ArchitectureMicroservice Architecture
Microservice Architecture
 
Heterogeneous Enterprise and Cloud Systems
Heterogeneous Enterprise and Cloud SystemsHeterogeneous Enterprise and Cloud Systems
Heterogeneous Enterprise and Cloud Systems
 
[WSO2Con EU 2017] Creating Composite Services Using Ballerina
[WSO2Con EU 2017] Creating Composite Services Using Ballerina[WSO2Con EU 2017] Creating Composite Services Using Ballerina
[WSO2Con EU 2017] Creating Composite Services Using Ballerina
 
Web Services and the Service-Oriented Architecture
Web Services and the Service-Oriented ArchitectureWeb Services and the Service-Oriented Architecture
Web Services and the Service-Oriented Architecture
 
The Complete Guide to Service Mesh
The Complete Guide to Service MeshThe Complete Guide to Service Mesh
The Complete Guide to Service Mesh
 
EAI (Integration) and Mulesoft
EAI (Integration) and MulesoftEAI (Integration) and Mulesoft
EAI (Integration) and Mulesoft
 
SOA Integration Blueprint with Oracle SOA Suite
SOA Integration Blueprint with Oracle SOA SuiteSOA Integration Blueprint with Oracle SOA Suite
SOA Integration Blueprint with Oracle SOA Suite
 

Similar to ICTA Technology Meetup 03 - SOA Security

DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
ijcisjournal
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
Conference Papers
 
electronic_payment_system_in_korea_eng
electronic_payment_system_in_korea_engelectronic_payment_system_in_korea_eng
electronic_payment_system_in_korea_eng
Frank Mercado
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
Oliver Pfaff
 

Similar to ICTA Technology Meetup 03 - SOA Security (20)

Ch12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key InfrastructureCh12 Cryptographic Protocols and Public Key Infrastructure
Ch12 Cryptographic Protocols and Public Key Infrastructure
 
ch17.ppt
ch17.pptch17.ppt
ch17.ppt
 
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
DEVELOPMENT OF SECURE CLOUD TRANSMISSION PROTOCOL (SCTP) ENGINEERING PHASES :...
 
Narrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forwardNarrative of digital signature technology and moving forward
Narrative of digital signature technology and moving forward
 
eMCA Suite
eMCA SuiteeMCA Suite
eMCA Suite
 
electronic_payment_system_in_korea_eng
electronic_payment_system_in_korea_engelectronic_payment_system_in_korea_eng
electronic_payment_system_in_korea_eng
 
Pki and OpenSSL
Pki and OpenSSLPki and OpenSSL
Pki and OpenSSL
 
PKI Industry growth in Bangladesh
PKI Industry growth in BangladeshPKI Industry growth in Bangladesh
PKI Industry growth in Bangladesh
 
Voip security
Voip securityVoip security
Voip security
 
Digital certificates & its importance
Digital certificates & its importanceDigital certificates & its importance
Digital certificates & its importance
 
ch1 eriht eriotery erogyteip ergy7.ppt
ch1 eriht  eriotery  erogyteip  ergy7.pptch1 eriht  eriotery  erogyteip  ergy7.ppt
ch1 eriht eriotery erogyteip ergy7.ppt
 
Implementing Public-Key-Infrastructures
Implementing Public-Key-InfrastructuresImplementing Public-Key-Infrastructures
Implementing Public-Key-Infrastructures
 
Chapter 6 Presentation
Chapter 6 PresentationChapter 6 Presentation
Chapter 6 Presentation
 
Digital signature and certificate authority
Digital signature and certificate authorityDigital signature and certificate authority
Digital signature and certificate authority
 
Digital certificates and information security
Digital certificates and information securityDigital certificates and information security
Digital certificates and information security
 
QR Code and Transport Layer Security For Licensing Documents Verification- Ir...
QR Code and Transport Layer Security For Licensing Documents Verification- Ir...QR Code and Transport Layer Security For Licensing Documents Verification- Ir...
QR Code and Transport Layer Security For Licensing Documents Verification- Ir...
 
TADSummit, Kandy Marketplace: Helping Solution Providers Accelerate Sales Sac...
TADSummit, Kandy Marketplace: Helping Solution Providers Accelerate Sales Sac...TADSummit, Kandy Marketplace: Helping Solution Providers Accelerate Sales Sac...
TADSummit, Kandy Marketplace: Helping Solution Providers Accelerate Sales Sac...
 
TADSummit, Ribbon Communications Keynote, Sacha Gera - Kandy Marketplace: Hel...
TADSummit, Ribbon Communications Keynote, Sacha Gera - Kandy Marketplace: Hel...TADSummit, Ribbon Communications Keynote, Sacha Gera - Kandy Marketplace: Hel...
TADSummit, Ribbon Communications Keynote, Sacha Gera - Kandy Marketplace: Hel...
 
Blockchain PoC For Education
Blockchain PoC For EducationBlockchain PoC For Education
Blockchain PoC For Education
 
Iaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured emailIaetsd secure emails an integrity assured email
Iaetsd secure emails an integrity assured email
 

More from Crishantha Nanayakkara

More from Crishantha Nanayakkara (20)

Sri Lanka Government Enterprise Architecture
Sri Lanka Government Enterprise ArchitectureSri Lanka Government Enterprise Architecture
Sri Lanka Government Enterprise Architecture
 
Application Deployement Strategies
Application Deployement StrategiesApplication Deployement Strategies
Application Deployement Strategies
 
Azure for AWS Developers
Azure for AWS DevelopersAzure for AWS Developers
Azure for AWS Developers
 
Enterprise Integration in Cloud Native Microservices Architectures
Enterprise Integration in Cloud Native Microservices ArchitecturesEnterprise Integration in Cloud Native Microservices Architectures
Enterprise Integration in Cloud Native Microservices Architectures
 
AWS Systems Manager
AWS Systems ManagerAWS Systems Manager
AWS Systems Manager
 
AWS Big Data Landscape
AWS Big Data LandscapeAWS Big Data Landscape
AWS Big Data Landscape
 
1BT_Designing_Microservices
1BT_Designing_Microservices1BT_Designing_Microservices
1BT_Designing_Microservices
 
1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access1BT_Tech_Talk_AWS_Cross_Account_Access
1BT_Tech_Talk_AWS_Cross_Account_Access
 
AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
 
Resiilient Architectures on AWS
Resiilient Architectures on AWSResiilient Architectures on AWS
Resiilient Architectures on AWS
 
Reactive Microservices
Reactive MicroservicesReactive Microservices
Reactive Microservices
 
Expectaions in IT industry
Expectaions in IT industryExpectaions in IT industry
Expectaions in IT industry
 
Towards Cloud Enabled Data Intensive Digital Transformation
Towards Cloud Enabled Data Intensive Digital TransformationTowards Cloud Enabled Data Intensive Digital Transformation
Towards Cloud Enabled Data Intensive Digital Transformation
 
Container Architecture
Container ArchitectureContainer Architecture
Container Architecture
 
Domain Driven Design and Hexagonal Architecture
Domain Driven Design and Hexagonal ArchitectureDomain Driven Design and Hexagonal Architecture
Domain Driven Design and Hexagonal Architecture
 
Microservices
MicroservicesMicroservices
Microservices
 
Enterprise architecture in the current e-Government context in Sri Lanka
Enterprise architecture in the current e-Government context in Sri LankaEnterprise architecture in the current e-Government context in Sri Lanka
Enterprise architecture in the current e-Government context in Sri Lanka
 
Modern Trends in IT
Modern Trends in ITModern Trends in IT
Modern Trends in IT
 
ICTA Meetup 12 - Message Brokers
ICTA Meetup 12 - Message BrokersICTA Meetup 12 - Message Brokers
ICTA Meetup 12 - Message Brokers
 
ICTA Meetup 11 - Big Data
ICTA Meetup 11 - Big DataICTA Meetup 11 - Big Data
ICTA Meetup 11 - Big Data
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024Manulife - Insurer Innovation Award 2024
Manulife - Insurer Innovation Award 2024
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 

ICTA Technology Meetup 03 - SOA Security