
Configuring Tomcat 7 Single Sign-on with SPNEGO (Kerberos & LDAP) Part 2
In this recipe you will see how to configure authentication cross forest and how you might implement cross forest authorization.
Brett is a Seasoned Application Security Engineer and Thought Leader with a Proven Track Record in Software Engineering and Security Best Practices.
Brett has over 10 years of application security experience and 25 years in software engineering. He holds (ISC)² certifications including CISSP, CSSLP, and CCSP. As the author of Threat Modeling Gameplay with EoP and the project lead for the OWASP Application Security Awareness Campaigns, Brett actively contributes to the security community. He also maintains the Ostering.com blog, where he shares insights on security practices.
Brett has successfully collaborated with teams to define security best practices and integrate security by design into their software development lifecycle (SDLC). His training initiatives in threat modeling have led to significant improvements in design quality and security awareness within organizations.
In his spare time, Brett enjoys sports, gardening, cooking, and photography. He is fluent in both English and Italian and holds dual citizenship.
Key Skills: Secure by Design, Privacy by Design, Threat Modeling (STRIDE, EoP, Privacy, LinddunGO, Plot4AI), Secure Coding, Vulnerability Management, and more.
Brett welcomes connections and opportunities to collaborate on innovative security solutions.

In this recipe you will see how to configure authentication cross forest and how you might implement cross forest authorization.

I program in Java pretty much every day or at least every week day. Yet I could think of very few peculiarities.

So what is SPNEGO? SPNEGO stands for Simple and Protected GSSAPI Negotiation Mechanism (SPNEGO). It is a mechanism by which an authenticating body negotiates with the authenticator what security protocol to use, for example Kerberos, NTLM, Digest or Basic

Last week I wrote about some of the strange statements that are considered syntactically correct in Ruby. This week I am going to write about function scoping peculiarities with JavaScript. Firstly there are a number of ways you can define functions in JavaScript

As programmers we get used to moving from one programming language to another, among language families this is relatively simple. When I refer to programming language families, for the purpose of this article I mean high level or low level languages.

A TED talk to get you motivated

I saw the poster in this post in a pub the other day so I took a photo. Wonderful!

Working in IT I have met a number of what I would call “IT Extremists”. There are different factions of these people but they are all characterized by a common trait, they don’t see reason and they all take things way too far.

Why oh why do people insist on using the phrase ‘often times”?

The name derives from two words, one in Italian “Osteria” and one in English “Running”.