Services

Unsere Spezialisten entwickeln Software für unsere Kunden in verschiedenen Technologienbereichen. Vom Identity & Access Management (IAM)-System bis zur Test-Suite für Remoting-Protokolle, decken wir eine große Vielfalt an Technologien ab.

PROGRAMMIER-/SCRIPTSPRACHEN

Java, C#, C, C++, Shell bash, JavaScript, Groovy

METHODEN/MODELLIERUNG

Scrum, OOA, OOD, OOP, UML, Domain Driven Design (DDD), Secure Development Lifecycle (SDL), Secure Test Driven Development (STDD), Test Driven Development (TDD), (Enterprise) Design Patterns

TOOLS

Eclipse, IntelliJ, Xcode, Confluence, JIRA, Visual Studio, Visual Studio Code, MS Office, MS Visio

DEVOPS

Git, Maven, Gradle, Artifactory, CI/CD, Jenkins, Docker, Kubernetes, Red Hat OpenShift, GitHub, Azure DevOps

PLATTFORMEN/SERVER

ForgeRock Identity Platform, Red Hat Single Sign-On (Keycloak), IdentityServer, Apache DS, IIS, Apache (mit ModSecurity), F5 BIG-IP, AD Federation Server (ADFS), MS-Certificate Authority, MS-Remote Desktop, Citrix XenDesktop und XenApp, VMware vSphere

DATENBANKEN

Oracle Database, MariaDB, SQL Server, Virtuoso, GraphDB

FRAMEWORKS

Jakarta EE (JEE), Red Hat JBoss Enterprise Application Platform (JBoss EAP), Quarkus, WildFly, Spring, .NET Core (cross-platform), ASP.NET Core, ASP.NET Core Middleware, ASP.NET Core MVC, Entity Framework (EF) Core, Angular, .NET Framework and ASP.NET, STL, MFC, ATL, Windows Platform SDK, Windows Driver Kit (WDK), Windows Identity Foundation (WIF), Windows Communication Foundation (WCF), Windows Presentation Foundation (WPF), VMware vSphere Management SDK, VMware Remote Console (VMRC) SDK, NHibernate, Autofac, ASP.NET Zero, ASP.NET Boilerplate, dotNetRDF

TECHNOLOGIEN

Identity & Access Management (IAM), Application and API Security, (Web) Single-Sign-On (SSO), Identity Federation (Brokering), Single- / Multi-factor authentication, Security Assertion Markup Language (SAML 2.0), OpenID Connect, OAuth 2.0, WS-Security (WS-Trust, WS-Federation), WebAuthn, Fast Identity Online (FIDO) 2.0, Windows Hello for Business, Authentication mechanisms (Password, HOTP, TOTP, Push, Certificates, Smartcards, …), Kerberos, Kerberos Protocol Transition, Kerberos Constrained Delegation, RADIUS, Claims-based Identity, Virtualization, Containerization, Microservices, Service Oriented Architecture (SOA), Client/Server Architecture, Single Page Application (SPA), Web Services (SOAP and REST), Penetration Test, Win32 Services, COM, Credential Providers und Filters, Apache Modules, Local Security Authority (LSA), Security Support Provider Interface (SSPI), Crypto Service Providers (CSP), (Contactless) Smartcards, MS-Certificate Authority Extensions, x509 Certificates, Cryptography (AES, RSA, …), RDP, RemoteFX, ICA, HDX, RDP und ICA virtuellen Kanälen, Remote Desktop Services, Terminal Services, Virtual Machines, Virtual Desktop Infrastructure, VMware Remote Console (VMRC) Protocol, DMZ, SSL, (SSL-)VPN, Reverse Proxies, Web Application Firewall, Cloud Computing, LDAP, Active Directory, Azure AD, Public Key Infrastructures (PKI), Windows Deployment Services (WDS) Server API, Windows Filtering Platform (WFP), Messaging Application Programming Interface (MAPI), Keycloak Service Provider Interfaces (SPI), Resource Description Framework (RDF), SPARQL, TripleStore (Graph DB), Directed-Acyclic-Word-Graph (DAWG), Protocol Buffers

BETRIEBSYSTEME

Linux (RedHat, CentOS), Unix, Windows (Desktop, Server, Embedded)