Return-Path: Delivered-To: apmail-tomcat-dev-archive@www.apache.org Received: (qmail 37167 invoked from network); 28 Nov 2007 18:49:28 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.2) by minotaur.apache.org with SMTP; 28 Nov 2007 18:49:28 -0000 Received: (qmail 6983 invoked by uid 500); 28 Nov 2007 18:49:15 -0000 Delivered-To: apmail-tomcat-dev-archive@tomcat.apache.org Received: (qmail 6154 invoked by uid 500); 28 Nov 2007 18:49:12 -0000 Mailing-List: contact dev-help@tomcat.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: "Tomcat Developers List" Delivered-To: mailing list dev@tomcat.apache.org Received: (qmail 6134 invoked by uid 500); 28 Nov 2007 18:49:12 -0000 Delivered-To: apmail-jakarta-tomcat-dev@jakarta.apache.org Received: (qmail 6131 invoked by uid 99); 28 Nov 2007 18:49:12 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 28 Nov 2007 10:49:12 -0800 X-ASF-Spam-Status: No, hits=-100.0 required=10.0 tests=ALL_TRUSTED X-Spam-Check-By: apache.org Received: from [140.211.11.130] (HELO eos.apache.org) (140.211.11.130) by apache.org (qpsmtpd/0.29) with ESMTP; Wed, 28 Nov 2007 18:49:11 +0000 Received: from eos.apache.org (localhost [127.0.0.1]) by eos.apache.org (Postfix) with ESMTP id 2C16AD2D4 for ; Wed, 28 Nov 2007 18:48:50 +0000 (GMT) Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Apache Wiki To: tomcat-dev@jakarta.apache.org Date: Wed, 28 Nov 2007 18:48:50 -0000 Message-ID: <20071128184850.23002.62390@eos.apache.org> Subject: [Tomcat Wiki] Update of "FAQ/FDA Validation" by GianlucaVarisco X-Virus-Checked: Checked by ClamAV on apache.org Dear Wiki user, You have subscribed to a wiki page or wiki category on "Tomcat Wiki" for change notification. The following page has been changed by GianlucaVarisco: http://wiki.apache.org/tomcat/FAQ/FDA_Validation New page: == FDA (21 CFR Part 11) Validation == === Preface === This page discusses using Tomcat in an [http://www.fda.gov/ FDA] [http://www.fda.gov/cdrh/comp/guidance/938.html validated] environment, i.e. one where [http://www.21cfrpart11.com/ 21 CFR Part 11] regulations apply. Please note that although this page mentions specific companies, we do not explicitly endorse or sell anyone's services. Tomcat and Apache are not-for-profit organizations. This page is also far from a complete listing of vendors and support options. It is meant as a demonstration showing that these options do exist and that running Tomcat in a validated environment is both feasible and reasonable. === Questions === '''Can Tomcat be used in a validated environment?''' Yes. There's nothing in Tomcat's design or implementation that prevent it from being used in a validated environment. The same validation procedures and guidelines that apply to most software packages apply to Tomcat as well. Being an open-source application does not preclude Tomcat validation. In fact, it helps in at least one key aspect: the source code itself can be audited, as can the commit and change logs for the software. '''Has anyone actually done it?''' Yes. As shown in [http://marc.theaimsgroup.com/?l=tomcat-user&m=109836874319797&w=2 this user mailing list archive], Merck and other large companies are using Tomcat in a validated environment. In addition, there is at least one application provider ([http://www.interchangedigital.com/ Interchange Digital]) whose application runs on Tomcat that has deployed said package in numerous pharma data centers. '''Is Tomcat itself validated?''' Yes. Tomcat itself is validated to the extent it can be. Tomcat implements two Java Specifications: the [http://java.sun.com/products/servlet Servlet Specification] and the [http://java.sun.com/products/jsp Java Server Pages (JSP) Specification]. Each of these specifications has a Technology Compatbility Kit (TCK), which is a collection of tests to certify a given product meets the Specification fully and accurately. The [http://www.apache.org/ Apache Software Foundation] is licensed to run these TCKs. They are run against every single Tomcat release. '''No Tomcat release is pronounced stable unless it has passed both of these TCKs with 100% compliance'''. Therefore, every stable Tomcat release is validated to the extent of Tomcat's core functionality. Furthermore, any company of individual may [http://java.sun.com/scholarship/ apply] to obtains and use these TCKs themselves. That way, you can re-validated Tomcat including any custom patches you have implemented. However, we cannot validate your application's use of Tomcat. You're on your own there. '''What kind of support is there around validating Tomcat?''' Several kinds. They include: * There are numerous smaller [http://jakarta.apache.org/site/vendors.html vendors] and several large ones, including IBM, HP, Sun, and Novell, who offer Tomcat consulting and support services, including application auditing, environment assessments, and risk analysis. * There are numerous vendors in addition to the above consultants, like [http://www.covalent.net/ Covalent] and [http://www.jboss.org/services/prodsupport JBoss], who offer 24/7/365 enterprise-level support for Tomcat. * The Tomcat [http://tomcat.apache.org/lists.html mailing lists] are extremely active and contain members of many of the above organizations, including contractors available for hire. '''How do I know I have a validated release? How do I know no one has tampered with the release package?''' All Tomcat releases are signed using the Release Manager's [http://www.pgpi.org/doc/pgpintro PGP] key. The key is also available in the KEYS file that ships with every Tomcat release. The same KEYS file is also available in the Tomcat CVS repository ([http://www.apache.org/dist/tomcat/tomcat-5/KEYS here]). The PGP signatures are available on all the Tomcat download pages, and can (and should!) be used to verify the release really is the signed distribution. As for tampering: every Tomcat release is also digested using the MD5 algorithm as specified in [http://www.faqs.org/rfcs/rfc1321.html RFC1321]. The MD5 digest is included in all the download pages. Users run MD5 on their local machine to verify that the digest of what they downlaoded is the same as that published in the Apache download pages. That way, users are assured the distribution has not been modified since the Release Manager signed it. '''What about security? I'm concerned about attacks.''' There's no need to be. See the [http://wiki.apache.org/tomcat/FAQ/Security security page] of this FAQ for more information. --------------------------------------------------------------------- To unsubscribe, e-mail: dev-unsubscribe@tomcat.apache.org For additional commands, e-mail: dev-help@tomcat.apache.org