Good UX Means Good Business
In a world where technology is rapidly advancing and user expectations are rising, it’s no longer enough to have an average user experience; to delight your users and surpass your competition you must strive for the exceptional.
Well, I am probably going to kick myself for trying to do this, but I have finally decided to write an overview of Google Search Appliance security. I realize this is a bit like trying to write an article on how the Internet works – the topic is broad, it has been covered by many people before me, and there are countless angles from which I could approach the subject.
But alas, I keep getting asked the same questions: How does the GSA implement security? Does it rely on the security of the underlying content systems? What is the difference between authentication and authorization? How do I lookup what groups a user belongs to? What if a user has different usernames for different applications?
Ok, I’m already getting sweaty palms. I know how to answer all of these questions individually, but it’s going to take some creativity to cover all of them in one short article. I will have to avoid going a mile deep – Google has already done that in their ‘must read’ white paper, Google Search Appliance: Security. So, I will skip some admittedly interesting details in favor of telling an easier to understand story. Sorry. Something’s gotta give.
Fill out the form below to download the complete guide. I hope you find it informative and useful. (If the form doesn’t appear, you can go directly to the Download page here).