Services
Unsere Spezialisten entwickeln Software für unsere Kunden in verschiedenen Technologienbereichen. Vom Identity & Access Management (IAM)-System bis zur Test-Suite für Remoting-Protokolle, decken wir eine große Vielfalt an Technologien ab.
PROGRAMMIER-/SCRIPTSPRACHEN
Java, C#, C, C++, Shell bash, JavaScript, Groovy
METHODEN/MODELLIERUNG
Scrum, OOA, OOD, OOP, UML, Domain Driven Design (DDD), Secure Development Lifecycle (SDL), Secure Test Driven Development (STDD), Test Driven Development (TDD), (Enterprise) Design Patterns
TOOLS
Eclipse, IntelliJ, Xcode, Confluence, JIRA, Visual Studio, Visual Studio Code, MS Office, MS Visio
DEVOPS
Git, Maven, Gradle, Artifactory, CI/CD, Jenkins, Docker, Kubernetes, Red Hat OpenShift, GitHub, Azure DevOps
PLATTFORMEN/SERVER
ForgeRock Identity Platform, Red Hat Single Sign-On (Keycloak), IdentityServer, Apache DS, IIS, Apache (mit ModSecurity), F5 BIG-IP, AD Federation Server (ADFS), MS-Certificate Authority, MS-Remote Desktop, Citrix XenDesktop und XenApp, VMware vSphere
DATENBANKEN
Oracle Database, MariaDB, SQL Server, Virtuoso, GraphDB
FRAMEWORKS
Jakarta EE (JEE), Red Hat JBoss Enterprise Application Platform (JBoss EAP), Quarkus, WildFly, Spring, .NET Core (cross-platform), ASP.NET Core, ASP.NET Core Middleware, ASP.NET Core MVC, Entity Framework (EF) Core, Angular, .NET Framework and ASP.NET, STL, MFC, ATL, Windows Platform SDK, Windows Driver Kit (WDK), Windows Identity Foundation (WIF), Windows Communication Foundation (WCF), Windows Presentation Foundation (WPF), VMware vSphere Management SDK, VMware Remote Console (VMRC) SDK, NHibernate, Autofac, ASP.NET Zero, ASP.NET Boilerplate, dotNetRDF
TECHNOLOGIEN
Identity & Access Management (IAM), Application and API Security, (Web) Single-Sign-On (SSO), Identity Federation (Brokering), Single- / Multi-factor authentication, Security Assertion Markup Language (SAML 2.0), OpenID Connect, OAuth 2.0, WS-Security (WS-Trust, WS-Federation), WebAuthn, Fast Identity Online (FIDO) 2.0, Windows Hello for Business, Authentication mechanisms (Password, HOTP, TOTP, Push, Certificates, Smartcards, …), Kerberos, Kerberos Protocol Transition, Kerberos Constrained Delegation, RADIUS, Claims-based Identity, Virtualization, Containerization, Microservices, Service Oriented Architecture (SOA), Client/Server Architecture, Single Page Application (SPA), Web Services (SOAP and REST), Penetration Test, Win32 Services, COM, Credential Providers und Filters, Apache Modules, Local Security Authority (LSA), Security Support Provider Interface (SSPI), Crypto Service Providers (CSP), (Contactless) Smartcards, MS-Certificate Authority Extensions, x509 Certificates, Cryptography (AES, RSA, …), RDP, RemoteFX, ICA, HDX, RDP und ICA virtuellen Kanälen, Remote Desktop Services, Terminal Services, Virtual Machines, Virtual Desktop Infrastructure, VMware Remote Console (VMRC) Protocol, DMZ, SSL, (SSL-)VPN, Reverse Proxies, Web Application Firewall, Cloud Computing, LDAP, Active Directory, Azure AD, Public Key Infrastructures (PKI), Windows Deployment Services (WDS) Server API, Windows Filtering Platform (WFP), Messaging Application Programming Interface (MAPI), Keycloak Service Provider Interfaces (SPI), Resource Description Framework (RDF), SPARQL, TripleStore (Graph DB), Directed-Acyclic-Word-Graph (DAWG), Protocol Buffers
BETRIEBSYSTEME
Linux (RedHat, CentOS), Unix, Windows (Desktop, Server, Embedded)