A 5min POC using google sheets in Zeppelin. Testing how easy it would be to drop data into a spreadsheet, then analyze it using Zeppelin. First go into https://docs.google.com and create a new spreadsheet, which would be used for collecting your data. Alternatively, my copy of bank.csv, which is used in this example, can be cloned for yours. Next, you will want to create a shareable link for this spreadsheet,
TL;DR : Using keycloak as an IDM or LDAP Domain Aggregator Download the APS Identity Sync Extension: https://github.com/alex4u2nv/aps-ais-authority-sync/releases/download/v1.0.0/aps-identity-sync-java-1.0.0-jar-with-dependencies.jar Configure APS to Integrate with Keycloak as in the example activiti-identity-service.properties Configure Keycloak to integrate with multiple LDAP domains via User Federation service. Authenticate into APS using users that were synchronized. If Keycloak authentication is enabled, then authenticate through keycloak If other authentication methods bounded to same user ids (email address) then use
Quick Steps Walkthrough This walk through is targeted for audiences who are new to Vault, or dev ops who just need an API to develop auto deployment scripts against. A production environment should be installed and operated by a Hashicorp Vault expert. Pull and Run Pull the docker image and run it in the foreground with exposed ports 8200 using the following command: docker pull vault docker run --cap-add=IPC_LOCK -p
Extending ACS 6 docker images After you have your ACS 6 local environment running, you’re probably thinking, this is nice, but I want to deploy my favorite amps, like JS console, Alfresco Governance Services (AGS), or even custom developed amps developed with Alfresco SDK.
IT departments today manage a massive amount of information, via a plethora of interconnected software components to provide businesses with the mission critical results that they need. To ensure the quality of these systems, IT departments are heavily invested in the testing, tuning and validation of these systems. The thought of validating these systems are already overwhelming, as a typical large-scale ECM system may consist of around 10 components, of