Documentation. CloudAnywhere. Page 1

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Documentation. CloudAnywhere. http://www.cloudiway.com. Page 1"

Transcription

1 Documentation CloudAnywhere Page 1

2 Table of Contents 1 INTRODUCTION 3 2 OVERVIEW KEY FUNCTIONALITY PREREQUISITES 5 3 FEATURES A UNIVERSAL PROVISIONING SOLUTION CONNECTING DIRECTLY TO A SAAS PROVIDER INDIRECT CONNECTIONS 7 4 CONFIGURATION SOURCE CONFIGURATION SELECTING ATTRIBUTES AND EXCLUSIONS DEFINING TARGETS RECONCILIATION AND PROVISIONING RULES 13 5 MAIN OPERATIONS MANUAL READING MANUAL RECONCILIATION PLANNING 20 6 SYNCHRONIZING PASSWORDS OPERATION OFFICE 365 AND GOOGLE PASSWORD COMPLEXITY RESET PASSWORD PORTAL 24 7 ACCESS REQUEST MANAGEMENT PORTAL 27 8 INTEGRATION WITH META-DIRECTORIES 29 Page 2/29

3 1 INTRODUCTION Companies have always faced the challenge of managing identities and access to a growing number of applications and platforms hosted and deployed in heterogeneous environments. Typically, a user who joins a large company is provisioned in 17 different systems and de-provisioned in only 13 when they leave. These can include HR systems, LDAP directories for authentication and authorization, messaging systems, PBX systems, swipe cards for physical access to the restaurant or business, etc. These issues are now controlled much more effectively thanks to IAM (Identity and Access Management) solutions based on meta-directories. However, with the advent of the Cloud and hosted SaaS applications, this problem is back on the agenda with the need to integrate SaaS applications into the company s information system. Companies are forced to manage more and more online services (messaging, e-learning, CRM, storage, etc.) and, in order to control both costs and access, must ensure that their users can access only the services relevant to them: When a new employee joins a company their account should be created automatically in the range of services to which they need access. If they leave the company, or change roles, their access should be automatically revoked or updated to reflect their new position. Organizations are faced with three main problems: - To put in place role management, which is both effective and granular, in order to keep control of access to resources in the Cloud. - Grant and revoke access in a flexible and responsive way to track changes in its organization (the arrival and departure of employees, changes in use). - Minimize the number of user accounts and passwords necessary to access each user's distributed information system. Many companies already have one or more business directories (LDAP, Active Directory, HR databases, etc.) which they want to use to implement their strategy for integrating SaaS applications. Page 3/29

4 2 OVERVIEW CloudAnywhere is an Identity Management Solution for hosted services. It synchronizes the users, groups, contacts, Organizational Units (OU) and passwords in your source directory (Active Directory, LDAP, etc.) with all your SaaS or ASP suppliers. Connectors are also available to synchronize LDAP directories, Exchange and Lync platforms. This software meets the challenges of integrating SaaS applications into your global information system. It helps you to build a business strategy for the Cloud, guaranteeing you control over the administration and access for any present or future SaaS provider. CloudAnywhere replaces your Active Directory as the heart of your Cloud strategy by allowing you to manage access to your resources in the Cloud from your local Active Directory. The Active Directory source may be replaced by any other enterprise source (LDAP, based Google Apps accounts, etc.). Based on the definition of roles stored in the source directory (group membership, the value of an LDAP attribute, etc.), CloudAnywhere makes decisions for provisioning/de-provisioning users and groups connected to different targets. It ensures that users who require access to their resources have an account with the service provider based on roles and permissions defined in the source directory. CloudAnywhere fulfils the following objectives: - It provides SaaS resources access to your information system users. - It manages access from your local Active Directory. - It minimizes the number of user accounts and passwords needed to access all the various services. 2.1 KEY FUNCTIONALITY CloudAnywhere is a so-called On-Premises" solution that installs on your internal network. A Universal Provisioning solution. Active Directory synchronization <-> Cloud Synchronize your users Synchronize your groups Synchronize your contacts Synchronize your "Organizational Units (OU)" Synchronize your passwords Role and access management. A Reset Password Portal for end users and support teams. Multi-domain and multi-forest. Being multi-domain and multi-forest CloudAnywhere can connect to all your AD sources and eliminates the need for an expensive consolidation project for your source directories. Page 4/29

5 CloudAnywhere can also be used to consolidate internal directory or provision Exchange and Lync platforms (Powershell Connector to run the scripts of your choice). Sources available: - Active Directory - LDAP directories - CSV files - Google Apps Targets available: - Google - Postini - SalesForce - Office RunMyProcess - DropCloud - WikiPixel - Cloudiway Provisioning Portal (for ASP hosts) - Active Directory - LDAP directories - Exchange (Powershell Connector) - Lync (Powershell Connector) The CloudAnywhere SDK also means that new connectors can be developed in less than five days. Please contact us if you want us to develop a new target to meet your needs. 2.2 PREREQUISITES Installs on Windows Server 2003, 2008 or 2008 R2. 32 or 64 bit. Requires at least DotNet 4.0. Requires a Microsoft SQL Server: Any version. Also supports the free version, SQLExpress. Requires IIS (if the Reset Password Portal is installed). Supports virtual environments. Windows 2008 R2 and Windows 2012 are the recommended OS. If you plan to provision Office 365 it is mandatory to install CloudAnywhere on 2008 R2 or Windows The Powershell cmdlets for Office 365 can only be installed on Windows 7, Windows 2008 R2 and Windows Page 5/29

6 3 FEATURES CloudAnywhere is a universal provisioning platform for your SaaS applications. The provisioning is done by synchronizing your source directories used as repositories. 3.1 A UNIVERSAL PROVISIONING SOLUTION. CloudAnywhere comes with a range of connectors as standard for SaaS applications such as: - Google Apps - Postini - Office365 - SalesForce - RunMyProcess Page 6/29

7 CloudAnywhere comes with an SDK (Software Development Kit) for creating new connectors to SaaS applications. Thanks to this SDK the CloudAnywhere community regularly develops new connectors and expands the list of suppliers which can be managed by the solution. These connectors are all available on the CLOUDIWAY website. To set-up a new target, simply move the associated connector into the CloudAnywhere "Connectors" directory. In order to develop a connector for an SaaS application the supplier must have an Provisioning API (Application Programming Interface) available online (e.g. CreateUser, DeleteUser, ModifyUser, ChangePassword, etc.). If they don t have an API available CLOUDIWAY can approach the vendor and make its technology and provisioning server available to them to act as gateway between CloudAnywhere provisioning and the host system. 3.2 CONNECTING DIRECTLY TO A SAAS PROVIDER If the supplier has an SaaS Provisioning API, the connector can communicate natively with the SaaS application and provisioning. Any changes in the source AD (i.e. creation, deletion, modification) of users, groups or passwords will be propagated in the connected targets. 3.3 INDIRECT CONNECTIONS If the supplier does not have an SaaS Provisioning API, CLOUDIWAY can approach the provider and offer them its provisioning server. CloudAnywhere comes with a built-in connector that interfaces with the provisioning server. The installed server-side host can then read and write into the provider s account database (LDAP, SQL database etc.). Page 7/29

8 Page 8/29

9 4 CONFIGURATION 4.1 SOURCE CONFIGURATION CloudAnywhere connects to the various local Active Directories. It is multi-domain and multi-forest and connects to all the directory sources of the information system. By default all the AD source is read. However, it is possible to exclude certain OUs, or conversely to synchronize only the OUs selected. You can also pull the users of your AD based on a group Membership. Disable Pulling is an option that you check if you plan to work with/extend a platform like FIM CloudAnywhere can also be used as the source for any LDAP directory or CSV file. Page 9/29

10 Additional connectors (e.g. for Google, Novell) are under development. 4.2 SELECTING ATTRIBUTES AND EXCLUSIONS By default, most of the necessary attributes are pulled from the AD. However, you can read as many attributes as you like. Similarly all default accounts and group data are pulled. The source filtering engine allows you to exclude any accounts you want based on the criteria defined. Page 10/29

11 Defining a filter. 4.3 DEFINING TARGETS In the Targets tab, you can define the targets you want to connect to. Click Add to add a new target, then click Edit to configure its connection parameters. Page 11/29

12 For each target, the appropriate configuration window is shown. The deletion rules define how a target should react on receiving a delete event. This is a safety feature to avoid deleting a target s content by mistake. This parameter can be used to transform a delete request into a disable request. Some targets have organizational concepts equivalent to Active Directory Organizational Units (OU). It is then possible to synchronize them and to provision users in the respective OUs. For example it is possible to: Page 12/29

13 - not synchronize the OUs (Create Users in the root organization). - Synchronize users without using an existing OU (Create users to Existing Organizations) - Synchronize the OUs, making it possible to map them to different names. In this case, a mapping file is used: <?xml version="1.0" encoding="utf-8"?> <OUMapping> <Domain domainname="ilinfo.fr"> <OU source="ou=emea,dc=domvirtu,dc=com" target="businessou"/> <OU source="ou=computers,ou=bcp,dc=domvirtu,dc=com" target="ilinfo.fr/business2"/> <OU source="ou=users,ou=bcp,dc=domvirtu,dc=com" target="ilinfo.fr/business"/> </Domain> </OUMapping> OUMapping.xml 4.4 RECONCILIATION AND PROVISIONING RULES Configuring the provisioning rules requires four steps: - Provisioning decision: should the current object being provisioned be created or deleted in the target? - Which attributes need to be synchronized with the target? - What reconciliation rules are established with the target? - What naming convention is followed during the provisioning? Page 13/29

14 4.4.1 PROVISIONING DECISIONS An object being synchronized can be provisioned in a target based on different criteria, for example, based on the value of an LDAP attribute or based on an Active Directory group membership from a synchronized source domain. Page 14/29

15 4.4.2 ATTRIBUTES TO BE SYNCHRONIZED In this section you can choose which attributes to synchronize with this target RECONCILIATION RULES When you connect to a new SaaS target, it is likely that it will already contain objects (user accounts, groups or contacts). It is also possible that, in some cases, the target administrator will create user accounts manually. The reconciliation rules will allow you to map existing objects of the source with existing objects in the target according to the construction rules. Page 15/29

16 In this situation, all rules are evaluated from top to bottom. Once a rule matches, a connection is made between the source and target object. If, after the attempt at reconciliation, no match could be made the object will be created in the target. The connection is made between the construction rule defined here and the attribute value defining the unique identifier in the target. FLastName: <First letter of First Name><Surname> FDotLastName: <First letter of First Name><Surname> FirsNameDotLastName : <First Name>.<Surname> samaccountname : Processing: With migration it s possible that the domain name will change. This rule is used to retrieve the source, to apply the transformation to the target domain and to attempt a match. MailExactMatch: the attribute value for storing Programmatic: A programmatic extension where you can put your own business rules PROVISIONING Page 16/29

17 UpperCase : Converts the login to uppercase LowerCase : Converts the login to lowercase PascalCasing : Capitalizes the first letter of each word. If no reconciliation rule returns a match the account is created (provisioned in the target) following the naming rules that have been defined. Page 17/29

18 5 MAIN OPERATIONS The CloudAnywhere overview shows all the connected sources and targets. The management console shows each managed account in a source or a target, displays its properties and shows to which source or target accounts it is connected. You can manually change the status of an object: - Forcing an object to be filtered. o In this case the synchronization rules will never be applied. o If it is connected to an existing object the target object is deleted / deactivated. (You can break the link before disabling an account to avoid deleting the target) - Bind / unbind two objects manually o This is useful for managing any problems with homonyms and for forcing an account to bind to the target object of your choice. o These manually forced connections are then no longer checked. When the processing rules are validated, you can activate the CloudAnywhere service which periodically synchronizes sources and targets. Page 18/29

19 5.1 MANUAL READING You can manually read a source or a target to pull the data and then manually test the reconciliation and provisioning rules. 5.2 MANUAL RECONCILIATION You can test your reconciliation and provisioning rules manually. Firstly, synchronize your sources and targets and then click Reconcile. The list of pending changes appears. If you click the Simulate button you will see the expected result in the different targets for each entry. If everything is correct you can save your changes by clicking Commit. When all your rules are working the way you want, you can automate the synchronization and leave the service to periodically perform synchronizations. You can also export the simulation tests as an XML file for offline analysis. Page 19/29

20 5.3 PLANNING The CloudAnywhere service carries out regular synchronizations. You just need to decide how often synchronization should be carried out. Synchronization once or twice a day is adequate for most companies. If your administrators occasionally create accounts in the target SaaS, it will be necessary to rescan the targets during each synchronization. On the other hand, if you are certain that no account has been created directly in the target and that all users are managed from the local AD, you can turn off target pulling during synchronization. This step would then only be necessary during the initial connection. Page 20/29

21 Page 21/29

22 6 SYNCHRONIZING PASSWORDS CloudAnywhere works with your SSO (Single Sign On) solutions. These SSO solutions do not work in all cases. - Some protocols do not support SSO. Eg: IMAP,POP3,SMTP - The SSO may not work on all devices (e.g. some smartphones). - Some SaaS vendors have not implemented an SSO solution. Your SSO infrastructure is critical to your business and becomes your SPOF (Single Point of Failure). Therefore it requires special attention and a high availability implementation. If such a disaster should happen your whole company will lose access to the SaaS applications. CloudAnywhere does not include an SSO engine. It relies on its network of technology partners to offer an SSO solution if you want to use this technology. On the other hand, CloudAnywhere complements your SSO solution by enabling the synchronization of passwords between your local Active Directory and your various connected targets. Synchronization is actived target by target. This means you can use the SSO with a target and only enable password synchronization with the targets of your choice. Page 22/29

23 6.1 OPERATION CloudAnwyhere synchronizes passwords between Active Directory and your SaaS suppliers. The Active Directory passwords cannot be extracted. They are actually stored in an attribute whose permissions are set to "Write Only" for everyone: no one can read them. Moreover, this attribute stores a hash which is not reversible. Even if you were to succeed in capturing the value of this attribute you could not extract the actual password from the hash. CloudAnywhere therefore relies on the password change-capture function provided by the Active Directory infrastructure. A password filter extension must be installed on each domain controller (DC). When a user changes their password from any computer on the domain, this password is captured on one of the DCs and sent to a local service so as not to impact on the DC s performance. The local service then sends the password to the CloudAnywhere server over a secure connection. The CloudAnywhere service then searches all the targets where the source account is provisioned and then proceeds to change the password in the targets wherever password synchronization is enabled. When setting up CloudAnywhere and password synchronization it is recommended that a password changing policy is set up in Active Directory to synchronize your users passwords from the start. Retransmissions Mechanisms : Various retransmission mechanisms are implemented: - Retransmission mechanisms between the local DC service and the CloudAnywhere server. - Retransmission mechanisms between the CloudAnywhere server and the targets. Security: Passwords are not permanently stored on the hard disk. They are stored in memory only while they are waiting to be processed. They are encrypted in memory to avoid being revealed as plain text in a possible memory dump. In the case of a power failure pending password changes are lost. Passwords Compliance Strategies : The possible passwords rules (password length etc.) are not checked when the password is changed in the different targets. The resulting errors in the passwords changes are logged in the CloudAnywhere database. The Active Directory password policy rules must be stronger than your SaaS providers strongest password strategies to ensure that your users passwords will be synchronized with all your targets. Key Elements: - Multi-domain and multi-forest - Does not require a trust relationship - Does not require a schema extension. - Requires just a single open port (of your choice) in your firewall Page 23/29

24 6.2 OFFICE 365 AND GOOGLE PASSWORD COMPLEXITY When a user changes his password in the Active Directory, CloudAnywhere can force to respect the password complexity requested by Office 365 or Google Apps. When a password doesn t meet the required complexity of the SAAS application, the password change is refused and the user must type a compliant one. 6.3 RESET PASSWORD PORTAL In addition to the password synchronization solution the full version of CloudAnywhere comes with a reset passwords portal. It allows users who have forgotten their passwords to reset them themselves. The portal allows you to change the password in the Active Directory Source as well as in the target and can be used in On-Premise only, Cloud only or hybrid modes. For example, If you have enabled password synchronization between Active Directory and the Cloud, you can configure the portal to allow the password to be changed only in the local AD. The password will then be captured and sent to CloudAnywhere. The portal can also be used by your support staff to reset passwords. The user must first register with this service and answer a set of security questions which they must answer to prove their identity in the case of forgotten passwords. Page 24/29

25 They can also authenticate themselves using their old password, even if it has expired. This can be handy for users who do not have a computer in the domain. They can change their AD password from the portal. For this purpose, the portal also comes with a utility that scans the AD and periodically sends an automatically to users whose password will expire after a configurable delay. Page 25/29

26 Page 26/29

27 7 ACCESS REQUEST MANAGEMENT PORTAL The portal also includes a request feature for access management. The portal administrator can define a number of resources and assign a manager and a management group in Active Directory. Once logged in, the user can see the list of available resources and make an access request to be sent to the resource manager or his backup. If the manager approves the request the user will be automatically added to the associated group. If this group is the decision criterion for the provisioning of the resource in question, Cloudanywhere will provision it during its next action. Page 27/29

28 Note that this feature manages inclusion requests in the Active Directory groups. These groups are used by CloudAnywhere to make provisioning decisions but this self-service access management portal can be used for all other relevant uses. Page 28/29

29 8 INTEGRATION WITH META-DIRECTORIES CloudAnywhere operates autonomously. It knows how to connect all your sources and how to consolidate and synchronize them with all your SaaS and ASP vendors. If you are already have a meta-directory identity management solution, which is connected to your sources and currently provides consolidation, CloudAnywhere will work with and complement this existing service. CloudAnywhere is built around a SQL database that provides centralized storage of consolidated data. Using your meta-directory identity manager (e.g. Fim 2010), you can completely configure an SQL Server type connector and automatically update the CloudAnywhere database. In this case it is only necessary to disable the connection to the data sources. It will then synchronize its data with the SaaS suppliers or simply carry out password synchronization, leaving provisioning actions to your current platform. The data required for the proper operation of your CloudAnywhere will be made by your third-party solution. This solution provides a range of benefits. It allows you to keep your existing infrastructure. You can also extend the functionality of your metadirectory which is probably not available in the range of connectors provided by CloudAnywhere. Page 29/29

Requirements for building a Connector in CloudAnywhere

Requirements for building a Connector in CloudAnywhere Documentation Requirements for building a Connector in CloudAnywhere http://www.cloudiway.com Page 1 Table of Contents 1 INTRODUCTION 3 2 CONNECTOR INSTALLATION 4 3 DEVELOPPING A CONNECTOR 5 3.1 DIRECT

More information

Security whitepaper. CloudAnywhere. http://www.cloudiway.com

Security whitepaper. CloudAnywhere. http://www.cloudiway.com Security whitepaper CloudAnywhere http://www.cloudiway.com @Copyright 2011 CLOUDIWAY. All right reserved. Use of any CLOUDIWAY solution is governed by the license agreement included in your original contract.

More information

Okta/Dropbox Active Directory Integration Guide

Okta/Dropbox Active Directory Integration Guide Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for

More information

AVG Business SSO Connecting to Active Directory

AVG Business SSO Connecting to Active Directory AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions 20533B - Version: 1 02 July 2016 Implementing Microsoft Azure Infrastructure Solutions Implementing Microsoft Azure Infrastructure Solutions 20533B - Version: 1 5 days Course Description: This course is

More information

INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE

INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE MICROSOFT ACTIVE DIRECTORY INTEGRATION Agostinho Tavares Version 1.0 Published 06/05/2015 This document describes how Inuvika OVD 1.0 can be integrated with Microsoft

More information

Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support

Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support Bill Fiddes Learning and Development Specialist Rob Latino Program Manager in Office 365 Support Learning & Development Specialist Customer Support Services Been with Microsoft for 7 years Professionally

More information

Getting Started with Clearlogin A Guide for Administrators V1.01

Getting Started with Clearlogin A Guide for Administrators V1.01 Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality

More information

HELP DOCUMENTATION UMRA USER GUIDE

HELP DOCUMENTATION UMRA USER GUIDE HELP DOCUMENTATION UMRA USER GUIDE Copyright 2013, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means without the

More information

Configuring Sponsor Authentication

Configuring Sponsor Authentication CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five

More information

Course 20533: Implementing Microsoft Azure Infrastructure Solutions

Course 20533: Implementing Microsoft Azure Infrastructure Solutions Course 20533: Implementing Microsoft Azure Infrastructure Solutions Overview About this course This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Group Management Server User Guide

Group Management Server User Guide Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring

More information

Implementing Microsoft Azure Infrastructure Solutions

Implementing Microsoft Azure Infrastructure Solutions Course Code: M20533 Vendor: Microsoft Course Overview Duration: 5 RRP: 2,025 Implementing Microsoft Azure Infrastructure Solutions Overview This course is aimed at experienced IT Professionals who currently

More information

Setting Up Resources in VMware Identity Manager

Setting Up Resources in VMware Identity Manager Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Introduction to Directory Services

Introduction to Directory Services Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Skyward LDAP Launch Kit Table of Contents

Skyward LDAP Launch Kit Table of Contents 04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know

More information

Introduction to the EIS Guide

Introduction to the EIS Guide Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment

More information

Password Management Guide

Password Management Guide www.novell.com/documentation Management Guide Identity Manager 4.0.2 June 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led

Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Implementing Microsoft Azure Infrastructure Solutions 20533B; 5 Days, Instructor-led Course Description This course is aimed at experienced IT Professionals who currently administer their on-premises infrastructure.

More information

Enterprise Self Service Quick start Guide

Enterprise Self Service Quick start Guide Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.

More information

Centrify Cloud Connector Deployment Guide

Centrify Cloud Connector Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as

More information

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions

Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Course 20533B: Implementing Microsoft Azure Infrastructure Solutions Sales 406/256-5700 Support 406/252-4959 Fax 406/256-0201 Evergreen Center North 1501 14 th St West, Suite 201 Billings, MT 59102 Course

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

Certificate Management for your ICE Server

Certificate Management for your ICE Server Certificate Management for your ICE Server Version 2.23.301 Contact: sales@ingenius.com +1-613-591-9002 x3000 TRADEMARKS InGenius, InGenius Connector Enterprise and the InGenius logo are trademarks of

More information

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

TSM Studio Server User Guide 2.9.0.0

TSM Studio Server User Guide 2.9.0.0 TSM Studio Server User Guide 2.9.0.0 1 Table of Contents Disclaimer... 4 What is TSM Studio Server?... 5 System Requirements... 6 Database Requirements... 6 Installing TSM Studio Server... 7 TSM Studio

More information

Conceptual Design. Forefront Identity Manager. Karen McLaughlin

Conceptual Design. Forefront Identity Manager. Karen McLaughlin Conceptual Design Karen McLaughlin January 29, 2013 Overview The purpose of this design is to provide information on the value in addition to Global Address List Synchronization (GAL Sync) that a full

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

Course 50382A: Implementing Forefront Identity Manager 2010 OVERVIEW

Course 50382A: Implementing Forefront Identity Manager 2010 OVERVIEW Course 50382A: Implementing Forefront Identity Manager 2010 OVERVIEW About this Course This four-day instructor-led courseintroduces and explains the features and capabilities of Microsoft Forefront Identity

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property

More information

IceWarp to IceWarp Server Migration

IceWarp to IceWarp Server Migration IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone

More information

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta. Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.

More information

Cloudwork Dashboard User Manual

Cloudwork Dashboard User Manual STUDENTNET Cloudwork Dashboard User Manual Make the Cloud Yours! Studentnet Technical Support 10/28/2015 User manual for the Cloudwork Dashboard introduced in January 2015 and updated in October 2015 with

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Tharo Systems, Inc. 2866 Nationwide Parkway P.O. Box 798 Brunswick, OH 44212 USA Tel: 330.273.4408 Fax: 330.225.0099

Tharo Systems, Inc. 2866 Nationwide Parkway P.O. Box 798 Brunswick, OH 44212 USA Tel: 330.273.4408 Fax: 330.225.0099 Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,

More information

Stellar Active Directory Manager

Stellar Active Directory Manager Stellar Active Directory Manager What is the need of Active Directory Manager? Every organization uses Active Directory Services (ADMS) to manage the users working in the organization. This task is mostly

More information

Office 365 deployment checklists

Office 365 deployment checklists Chapter 128 Office 365 deployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of issues.

More information

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory

WHITEPAPER. 13 Questions You Must Ask When Integrating Office 365 With Active Directory WHITEPAPER 13 Questions You Must Ask When Integrating Office 365 With Active Directory Many organizations have begun their push to the cloud with a handful of applications. Microsoft s Office 365 offering

More information

Server-based Password Synchronization: Managing Multiple Passwords

Server-based Password Synchronization: Managing Multiple Passwords Server-based Password Synchronization: Managing Multiple Passwords Self-service Password Reset Layer v.3.2-004 PistolStar, Inc. dba PortalGuard PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax:

More information

Active Directory Manager Pro 5.0.0.0 New Features

Active Directory Manager Pro 5.0.0.0 New Features Active Directory Manager Pro 5.0.0.0 New Features General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

Setting up an MS SQL Server for IGSS

Setting up an MS SQL Server for IGSS Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3

More information

Alcatel-Lucent Extended Communication Server Active directory synchronization : installation and administration

Alcatel-Lucent Extended Communication Server Active directory synchronization : installation and administration Alcatel-Lucent Extended Communication Server Active directory synchronization : installation and administration September, 2009 TC1312 Alcatel-Lucent Office Offer - All Rights Reserved Alcatel-Lucent 2009

More information

SJRWMD Cloud-Based Email Quick-Start Guide

SJRWMD Cloud-Based Email Quick-Start Guide SJRWMD Cloud-Based Email Quick-Start Guide Your email account is now in the Microsoft cloud, also known as Office 365. This change from onpremise email provisioning to the cloud allows the agency to provide

More information

Table of Contents Introduction... 2 Azure ADSync Requirements/Prerequisites:... 2 Software Requirements... 2 Hardware Requirements...

Table of Contents Introduction... 2 Azure ADSync Requirements/Prerequisites:... 2 Software Requirements... 2 Hardware Requirements... Table of Contents Introduction... 2 Azure ADSync Requirements/Prerequisites:... 2 Software Requirements... 2 Hardware Requirements... 2 Service Accounts for Azure AD Sync Tool... 3 On Premises Service

More information

Configuration Guide for Active Directory Integration

Configuration Guide for Active Directory Integration Configuration Guide for Active Directory Integration Workspot, Inc. 12/4/2015 Workspot Active Directory Integration The Enterprise Connector provides synchronization between an on-premise Active Directory

More information

Installation & Configuration Guide User Provisioning Service 2.0

Installation & Configuration Guide User Provisioning Service 2.0 Installation & Configuration Guide User Provisioning Service 2.0 NAVEX Global User Provisioning Service 2.0 Installation Guide Copyright 2015 NAVEX Global, Inc. NAVEX Global is a trademark/service mark

More information

Sophos Mobile Control Installation guide

Sophos Mobile Control Installation guide Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Office 365 deploym. ployment checklists. Chapter 27

Office 365 deploym. ployment checklists. Chapter 27 Chapter 27 Office 365 deploym ployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of

More information

Setup Reset Password Portal. CloudAnywhere. Auteur Emmanuel Dreux edreux@cloudiway.com +33 4 26 78 17 58 + 33 6 47 81 26 70

Setup Reset Password Portal. CloudAnywhere. Auteur Emmanuel Dreux edreux@cloudiway.com +33 4 26 78 17 58 + 33 6 47 81 26 70 Setup Reset Password Portal CloudAnywhere Auteur Emmanuel Dreux edreux@cloudiway.com +33 4 26 78 17 58 + 33 6 47 81 26 70 http://www.cloudiway.com Setup RPP, CloudAnywhere, Version 156 Rédacteur Emmanuel

More information

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks

More information

Integrating OID with Active Directory and WNA

Integrating OID with Active Directory and WNA Integrating OID with Active Directory and WNA Hari Muthuswamy CTO, Eagle Business Solutions May 10, 2007 Suncoast Oracle User Group Tampa Convention Center What is SSO? Single Sign-On On (SSO) is a session/user

More information

Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles

Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles Appendix 1 Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles This section explains how you use the Cloud Management Suite installation wizard for the following purposes: To

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Z-Term V4 Administration Guide

Z-Term V4 Administration Guide Z-Term V4 Administration Guide The main purpose of Z-term is to allow for fast account termination process. Usually when an administrator terminates a departed user account, multiple consoles are used

More information

DocAve 6 Service Pack 1

DocAve 6 Service Pack 1 DocAve 6 Service Pack 1 Installation Guide Revision C Issued September 2012 1 Table of Contents About the Installation Guide... 4 Submitting Documentation Feedback to AvePoint... 4 Before You Begin...

More information

Aurora Hosted Services Hosted AD, Identity Management & ADFS

Aurora Hosted Services Hosted AD, Identity Management & ADFS 22/09/2013 Aurora Hosted Services Hosted AD, Identity Management & ADFS 1 Service Overview - Hosted Identity Management Core provides a fully managed solution hosted in Azure and connected directly to

More information

Fairsail. Implementer. Fairsail to Active Directory Synchronization. Version 1.0 FS-PS-FSAD-IG-201310--R001.00

Fairsail. Implementer. Fairsail to Active Directory Synchronization. Version 1.0 FS-PS-FSAD-IG-201310--R001.00 Fairsail Implementer Fairsail to Active Directory Synchronization Version 1.0 FS-PS-FSAD-IG-201310--R001.00 Fairsail 2013. All rights reserved. This document contains information proprietary to Fairsail

More information

How-to: Single Sign-On

How-to: Single Sign-On How-to: Single Sign-On Document version: 1.02 nirva systems info@nirva-systems.com nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Getting Started Guide

Getting Started Guide BlackBerry Web Services For Microsoft.NET developers Version: 10.2 Getting Started Guide Published: 2013-12-02 SWD-20131202165812789 Contents 1 Overview: BlackBerry Enterprise Service 10... 5 2 Overview:

More information

Installing and Configuring Login PI

Installing and Configuring Login PI Installing and Configuring Login PI Login PI Hands-on lab In this lab, you will configure Login PI to provide performance insights for a Windows Server 2012 R2 Remote Desktop Services installation. To

More information

Integrating Single Sign-on Across the Cloud By David Strom

Integrating Single Sign-on Across the Cloud By David Strom Integrating Single Sign-on Across the Cloud By David Strom TABLE OF CONTENTS Introduction 1 Access Control: Web and SSO Gateways 2 Web Gateway Key Features 2 SSO Key Features 3 Conclusion 5 Author Bio

More information

LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide

LT Auditor+ 2013. Windows Assessment SP1 Installation & Configuration Guide LT Auditor+ 2013 Windows Assessment SP1 Installation & Configuration Guide Table of Contents CHAPTER 1- OVERVIEW... 3 CHAPTER 2 - INSTALL LT AUDITOR+ WINDOWS ASSESSMENT SP1 COMPONENTS... 4 System Requirements...

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Dell One Identity Quick Connect for Cloud Services 3.6.1

Dell One Identity Quick Connect for Cloud Services 3.6.1 Dell One Identity Quick Connect for Cloud Services 3.6.1 March 2015 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

Managing policies. Chapter 7

Managing policies. Chapter 7 Chapter 7 Managing policies You use the Policies tab in Admin Portal to create policy sets for roles. A policy set lets you configure the following categories of policies: Mobile Device Policies Use to

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

Jet Data Manager 2012 User Guide

Jet Data Manager 2012 User Guide Jet Data Manager 2012 User Guide Welcome This documentation provides descriptions of the concepts and features of the Jet Data Manager and how to use with them. With the Jet Data Manager you can transform

More information

Password Policy Enforcer

Password Policy Enforcer Password Policy Enforcer Evaluator s Guide V7.6 Copyright 1998-2013 ANIXIS. All rights reserved. ANIXIS, ANIXIS Password Reset, Password Policy Enforcer, PPE/Web, Password Policy Client, Password Policy

More information

Manage all your Office365 users and licenses

Manage all your Office365 users and licenses Manage all your Office365 users and licenses Delegate 365 White Paper Authors: Toni Pohl, Martina Grom Version: 1.2 of December 2014 atwork information technology gmbh. All rights reserved. For information

More information

How Intel Cloud SSO Works

How Intel Cloud SSO Works TECHNICAL WHITE PAPER Intel Cloud SSO How Intel Cloud SSO Works Just as security professionals have done for ages, we must continue to evolve our processes, methods, and techniques in light of the opportunities

More information

CL_50382 Implementing Forefront Identity Manager 2010

CL_50382 Implementing Forefront Identity Manager 2010 Implementing Forefront Identity Manager 2010 www.ked.com.mx Av. Revolución No. 374 Col. San Pedro de los Pinos, C.P. 03800, México, D.F. Tel/Fax: 52785560 About this Course This course introduces and explains

More information

Active Directory Integration

Active Directory Integration January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process

More information

Admin Report Kit for Active Directory

Admin Report Kit for Active Directory Admin Report Kit for Active Directory Reporting tool for Microsoft Active Directory Enterprise Product Overview Admin Report Kit for Active Directory (ARKAD) is a powerful reporting solution for the Microsoft

More information

ADSelfService Plus Client Software Installation Guide

ADSelfService Plus Client Software Installation Guide ADSelfService Plus Client Software Installation Guide ( I n s t a l l a t io n t h r o u g h A DS e l f S e r v ic e P l u s w e b p o r t a l a n d M a n u a l I n s t a l l a t io n ) 1 Table of Contents

More information

Dell One Identity Quick Connect for Cloud Services 3.6.0

Dell One Identity Quick Connect for Cloud Services 3.6.0 Dell One Identity Quick Connect for Cloud Services 3.6.0 August, 2014 These release notes provide information about the Dell One Identity Quick Connect for Cloud Services release. About New features Resolved

More information

managing SSO with shared credentials

managing SSO with shared credentials managing SSO with shared credentials Introduction to Single Sign On (SSO) All organizations, small and big alike, today have a bunch of applications that must be accessed by different employees throughout

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM. User Guide

CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM. User Guide CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM User Guide Revision D Issued July 2014 Table of Contents About CRM Migration Manager... 4 System Requirements... 5 Operating Systems... 5 Dynamics

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

Installation and Setup Guide

Installation and Setup Guide Installation and Setup Guide Contents 1. Introduction... 1 2. Before You Install... 3 3. Server Installation... 6 4. Configuring Print Audit Secure... 11 5. Licensing... 16 6. Printer Manager... 17 7.

More information

Introduction. Connection security

Introduction. Connection security SECURITY AND AUDITABILITY WITH SAGE ERP X3 Introduction An ERP contains usually a huge set of data concerning all the activities of a company or a group a company. As some of them are sensitive information

More information

User-ID Best Practices

User-ID Best Practices User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

AVG Business Secure Sign On Active Directory Quick Start Guide

AVG Business Secure Sign On Active Directory Quick Start Guide AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and

More information

Upgrading Identity Lifecycle Manager 2007 to Forefront Identity Manager 2010

Upgrading Identity Lifecycle Manager 2007 to Forefront Identity Manager 2010 Upgrading Identity Lifecycle Manager 2007 to Forefront Identity Manager 2010 Course M50383 4 Day(s) 24:00 Hours Introduction This four-day instructor-led course equips participants already acquainted with

More information

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3 Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing

More information

Active Directory Management. Agent Deployment Guide

Active Directory Management. Agent Deployment Guide Active Directory Management Agent Deployment Guide Document Revision Date: June 12, 2014 Active Directory Management Deployment Guide i Contents System Requirements...1 Hardware Requirements...1 Installation...3

More information

User-ID Configuration

User-ID Configuration User-ID Configuration How to configure Active Directory for User-ID based internet access. Nick Pearce 5/11/2015 1 Install and configure the User-ID agent. Download the.zip file from https://dl.sgcyp.org.uk/pan/user-id.zip

More information

Novell Identity Manager

Novell Identity Manager Password Management Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 3.6.1 June 05, 2009 www.novell.com Identity Manager 3.6.1 Password Management Guide Legal Notices Novell, Inc. makes no representations

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide BlackBerry Resource Kit for BlackBerry Enterprise Service 10 Version 10.2 Published: 2015-11-12 SWD-20151112124827386 Contents Overview: BlackBerry Enterprise Service

More information

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1 The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information