INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace"

Transcription

1 INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace

2 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility for its accuracy and/or completeness. In no event will VASCO Data Security be liable for damages arising directly or indirectly from any use of the information contained in this document. Copyright Copyright 2013 VASCO Data Security, Inc, VASCO Data Security International GmbH. All rights reserved. VASCO, Vacman, IDENTIKEY AUTHENTICATION, axsguard and DIGIPASS logo are registered or unregistered trademarks of VASCO Data Security, Inc. and/or VASCO Data Security International GmbH in the U.S. and other countries. VASCO Data Security, Inc. and/or VASCO Data Security International GmbH own or are licensed under all title, rights and interest in VASCO Products, updates and upgrades thereof, including copyrights, patent rights, trade secret rights, mask work rights, database rights and all other intellectual and industrial property rights in the U.S. and other countries. Microsoft and Windows are trademarks or registered trademarks of Microsoft Corporation. Other names may be trademarks of their respective owners. 1 DIGIPASS Authentication for VMware Horizon Workspace

3 Table of Contents 1 Overview Technical Concepts VMware Horizon Workspace VASCO IDENTIKEY Federation Server IDENTIKEY Authentication Server Configuration Details Architecture Pre-requisites IDENTIKEY Federation Server Add application Adapt Meta-Data VMware Horizon Workspace Pre-Configuration Adding Authentication Method Adding Identity provider Apply Policy set to Web Application Testing the Solution Authentication using built-in Horizon Workspace Connector Authentication using IDENTIKEY Federation Server Changing Default Access Policy Set Overview Solution Test DIGIPASS Authentication for VMware Horizon Workspace

4 3 DIGIPASS Authentication for VMware Horizon Workspace

5 1 Overview VMware Horizon Workspace workspace.vmware.com SSL SAML v2.0 RADIUS IDENTIKEY Federation Server Ifs.vasco.be IDENTIKEY Authentication Server DIGIPASS Authentication for VMware Horizon Workspace

6 2 Technical Concepts 2.1 VMware Horizon Workspace Horizon Workspace provides an integrated workspace that delivers the right applications and data on any device, which promotes employee productivity without compromising security or IT control. As an IT administrator, you can use the Web-based management platform to create customized sets of applications and data access (workspaces) for end users, including setting security policies and application entitlements. Using their desktops, mobile browsers, or mobile applications, employees can gain access to work resources, including shared corporate documents and many types of applications, customized based on their entitlements and devices. VMware Horizon Workspace provides secure access to applications and data on any mobile device or computer, enhancing the end user experience while reducing management costs. Horizon Workspace provides an easy way for end users to access applications and files on any device, while at the same time enabling IT to deliver, manage, and secure these assets centrally. Horizon Workspace provides secure, single sign-on to applications, data, and virtual desktops from any computer or mobile device, and meets the challenges of today s changing Bring Your Own Device (BYOD) and mobile environments. Horizon Workspace benefits both end users and IT administrators. Horizon Workspace provides end users with a single workspace for all applications and data, as well as seamless file sharing. It enables IT administrators to manage users instead of devices and to offer advanced security and protection of corporate data. 2.2 VASCO IDENTIKEY Federation Server IDENTIKEY Federation Server (IFS) is a virtual appliance providing you with the most powerful identity and access management platform. It is used to validate user credentials across multiple applications and disparate networks. The solution validates users and creates an identity ticket, enabling online single sign-on for different applications across organizational boundaries. As validated credentials can be reused, once a user s identity is confirmed access to authorized services and applications is granted. Users can securely switch between the different applications and collaborate with colleagues, business partners, suppliers, customers, and partners, using one single identity. IDENTIKEY Federation Server functions as an identity provider within the local organization but it can also delegate authentication requests (for unknown users) to other identity providers. In a federated model, IDENTIKEY Federation Server does not only delegate authentication requests to but also receives requests from other identity providers when local users want to access applications from other organizations within the same federated infrastructure IDENTIKEY Authentication Server IDENTIKEY Authentication Server (IAS) is an off-the-shelf centralized authentication server that supports the deployment, use and administration of DIGIPASS strong user authentication. It 5 DIGIPASS Authentication for VMware Horizon Workspace

7 offers complete functionality and management features without the need for significant budgetary or personnel investments. IDENTIKEY Authentication Server is supported on 32bit systems as well as on 64bit systems. IDENTIKEY Appliance is a standalone authentication appliance that secures remote access to corporate networks and web-based applications. The use and configuration of an IDENTIKEY Authentication Server and an IDENTIKEY Appliance is similar. 6 DIGIPASS Authentication for VMware Horizon Workspace

8 3 Configuration Details 3.1 Architecture VMware Horizon Workspace workspace.vmware.com SAML v2.0 IDENTIKEY Federation Server Ifs.vasco.be Pre-requisites A basic configured VMware Workspace Environment. Information can be found here: Basic configured IDENTIKEY Federation Server Metadata file of the VMware Horizon o Log in to the Administrator Web interface. o Select Settings > SAML Certificate. o o Click Service Provider (SP) metadata. Copy and save the appropriate information using the method that best suits your organization. 3.3 IDENTIKEY Federation Server Add application 1. Log into the management console 7 DIGIPASS Authentication for VMware Horizon Workspace

9 2. Navigate to Applications > Add Application a. Application type: SAML v2.0 Application b. Select an authentication profile c. Set the distribution method to Upload metadata file d. Upload the retrieved metadata file from the VMware Horizon Workspace 3. Click Save Adapt metadata 1. Download the metadata from your IFS: (in this example: 2. Adapt the NameIDFormat in the IDPSSODescriptor section: <md:nameidformat>urn:oasis:names:tc:saml:2.0:nameid-format:persistent</md:nameidformat> <md:nameidformat>urn:oasis:names:tc:saml:2.0:nameid-format:transient</md:nameidformat> <md:nameidformat>urn:oasis:names:tc:saml:1.1:nameid-format:unspecified</md:nameidformat> <md:nameidformat>urn:oasis:names:tc:saml:2.0:nameid-format:unspecified</md:nameidformat> 3. Remove the persistent and transient NameIDFormat and leave only the unspecified: <md:nameidformat>urn:oasis:names:tc:saml:1.1:nameid-format:unspecified</md:nameidformat> <md:nameidformat>urn:oasis:names:tc:saml:2.0:nameid-format:unspecified</md:nameidformat> 4. Replace the SingleLogoutService location URL of the IDPSSODescriptor section to: a. It will look like: <md:singlelogoutservice Location=" Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST"/> 3.4 VMware Horizon Workspace The below configuration points can found in depth in the VMware Horizon Workspace manual: Workspace 2.0 Administrator Documentation Center Pre-Configuration Verify if the third-party instances are SAML 2.0 compliant and that Horizon Workspace can reach them. 8 DIGIPASS Authentication for VMware Horizon Workspace

10 Determine how Horizon Workspace obtains the metadata from the third-party instance. Copy and save the appropriate metadata information from the third-party instance that you can paste into the Horizon Workspace Administrator Web interface during configuration. The metadata information you obtain from the third-party instance is either the URL to the metadata or the actual metadata. To enable Horizon Workspace to use authentication methods supported by the third-party identity provider, use the Administrator Web interface to configure the additional authentication methods. Edit an authentication method by selecting the Default Method checkbox. This action allows Horizon Workspace to use that authentication method in case of an issue with the third-party authentication method Adding Authentication Method 1. Log in to the Workspace Admin Console. 2. Select Settings > Authentication Methods. 3. Add a new authentication method. a. Type a name for this identity provider instance. b. Select the appropriate SAML context from the drop-down menu: The list includes SAML authentication contexts that are currently supported according to SAML 2.0 specifications. c. Apply an authentication score based on your predetermined security levels for authentication methods Authentication Score: When you create access policies for either the default access policy set or for Web-application-specific policy sets, you configure a minimum authentication score. The policies require users to authenticate using an authentication method with the specified authentication score or higher to access Horizon Workspace, in the case of a default access policy, or a web application, in the case of a Web-application-specific policy Adding Identity provider 1. Log in to the Workspace Admin Console. 2. Select Settings > Identity Providers. 9 DIGIPASS Authentication for VMware Horizon Workspace

11 3. Click Add Identity Provider. This option prompts you for information that enables Workspace to register an existing third-party identity provider instance. a. Select Manual for third-party identity provider instances. b. Type a name for this identity provider instance. c. Type a description for this identity provider instance. d. Select the authentication methods for Workspace to apply when users who are associated with this identity provider instance log in. e. Copy the XML metadata from the identity provider instance and paste it in the Meta data XML text box. f. Select the network ranges of the users, based on their IP addresses, that you want to direct to this identity provider instance for authentication. g. Click Save 4. If necessary, change the order of the identity provider instances Apply Policy set to Web Application An access policy set contains one or more access policies. Each access policy consists of settings that you can configure to manage user access to the Horizon Workspace User Portal as a whole or to specified web applications. Each access policy links a network range to a minimum authentication score. A user logging in from an IP address within the applied policy's specified network range is presented with an authentication method that is equal to or higher than the minimum authentication score of the policy. Each identity provider instance in your Horizon Workspace deployment also links network ranges with authentication methods. When you configure an access policy, ensure that the network range and authentication score pairing that you create are covered by an existing identity provider instance. More information on how to configure an access policy please refer to the documentation provided by VMware. 10 DIGIPASS Authentication for VMware Horizon Workspace

12 To apply an access policy, you create the policy as a part of an access policy set. Each policy in an access policy set can specify the following 1. Click the Catalog tab. 2. Click Any Application Type > Web Applications. 3. Click the Web application to which to apply a Web-application-specific access policy set. 4. The information page for the Web application appears with the Entitlements tab selected by default. 5. Click Access Policies. 6. From the Access Policy Set drop-down menu, select the Web-application-specific access policy set to apply to the application. 7. Click Save. Web-Application-Specific Policy Set Example P o l i c y N a m e N e t w o r k M i n i m u m A u t h e n t i c a t i o n S c o r e T T L ( h o u r s ) ExtraSensitive All Ranges Level 3 1 The preceding example policy set applies to the following use case. Extra Strict Web-Application-Specific Access Policy Set Use Case 1. User logs in inside the enterprise network using the password authentication method, which is level 1 according to the example. 2. Now, the user has access to the user portal for eight hours. 3. The user immediately tries to launch a web application with the Example 2 policy set applied, which requires level 3 or above authentication 4. The user is redirected to an identity provider that provides level 3 or higher authentication strength, such as a Connector instance requiring 2-factor authentication. 5. After the user successfully logs in, Horizon Workspace launches the application and saves the authentication event. 11 DIGIPASS Authentication for VMware Horizon Workspace

13 6. The user can continue to launch this application for up to an hour but is asked to reauthenticate after an hour unless the user initiated a level 3 or higher authentication event within an hour of the launch, as dictated by the policy. 12 DIGIPASS Authentication for VMware Horizon Workspace

14 4 Testing the Solution 4.1 Authentication using built-in Horizon Workspace Connector (in our environment) Make sure the access policy for your test web applications is set to the default policy set (unmodified, or create a new policy with minimal authentication level settings). Log in as a user who is entitled to use the test web application. And navigate to the web application (click the icon) The user is directly logged in. 4.2 Authentication using IDENTIKEY Federation Server (in our environment) Make sure the access policy for your test web applications is set to the newly created access policy set (make sure this access policy set is associated with IDENTIKEY Federation Server login). 13 DIGIPASS Authentication for VMware Horizon Workspace

15 Log in as a user who is entitled to use the test web application. Navigate to the web application (click the icon) The user is now redirected to the IDENTIKEY Federation Server and is required to log in using their username and OTP. 4.3 Changing Default Access Policy Set Overview Horizon Workspace includes a default access policy set that controls user access to Horizon Workspace User Portal. You can edit the policy set by editing, deleting, or adding policies as necessary. Each policy in the default access policy set requires that a set of criteria is met in order for Horizon Workspace to allow access to the user portal. 14 DIGIPASS Authentication for VMware Horizon Workspace

16 The following access policy set serves as an example of how you can configure the default access policy set to control access to Horizon Workspace User Portal. Example Default Access Policy Set: P o l i c y N a m e N e t w o r k M i n i m u m A u t h e n t i c a t i o n S c o r e T T L ( h o u r s ) Internal Internal Range 1 8 External All Ranges 3 4 Policies are evaluated in the preceding order. You can drag a policy in a policy set up or down to change the priority for evaluation. The preceding example policy set applies to the following use case. Default Access Policy, Browser Use Case: Internal. To access Horizon Workspace from an internal (Internal Range) network, Horizon Workspace presents users with the Active Directory password authentication method. To ensure that Horizon Workspace attempts to authenticate users with Kerberos authentication first, you make the authentication score of the Kerberos method higher than the authentication score of the password method and you place Kerberos at the top of the list on the Authentication Methods page. You also assign a network range for internal users. The user logs in using a browser and now has access to the user portal for an eight-hour session. External. To access Horizon Workspace from an external (All Ranges) network, the user is required to log in with 2-factor authentication, which for this example has an authentication score of 3. The user logs in using a browser and now has access to the user portal for a four-hour session. When a user attempts to access a resource, except for a web application covered by a Webapplication-specific policy set, the default portal access policy set applies. For example, the time-to-live (TTL) for such resources matches the TTL of the default portal access policy set. If the TTL for a user who logs in to the user portal is 8 hours according to the default portal access policy set, when the user attempts to launch a resource, the application launches without requiring the user to re-authenticate Solution Test 1. Log in to the Workspace Admin Console. 2. Select Policies > Access Policy Sets. 3. Click Edit to edit the Default Access Policy Set to configure. 4. Click the policy name (all ranges policy, by default) a. Change minimum authentication score to the value that was assigned to the Authentication Method used for the IDENTIKEY Federation Server 1. Navigate to the Workspace user portal 15 DIGIPASS Authentication for VMware Horizon Workspace

17 2. You will be redirected the IDENTIKEY Federation Server for authentication a. Log in using username and OTP 3. When authentication is successful you are redirected to the Workspace portal 16 DIGIPASS Authentication for VMware Horizon Workspace

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is

More information

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO

More information

INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter

INTEGRATION GUIDE. DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter INTEGRATION GUIDE DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN INTEGRATION GUIDE DIGIPASS Authentication for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data

More information

OVERVIEW. DIGIPASS Authentication for Office 365

OVERVIEW. DIGIPASS Authentication for Office 365 OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility

More information

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass INTEGRATION GUIDE DIGIPASS Authentication for F5 FirePass Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505 INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE) INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';

More information

INTEGRATION GUIDE. General Radius Config

INTEGRATION GUIDE. General Radius Config INTEGRATION GUIDE General Radius Config Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no

More information

DIGIPASS as a Service. Google Apps Integration

DIGIPASS as a Service. Google Apps Integration DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007

INTEGRATION GUIDE. DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007 INTEGRATION GUIDE DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

MIGRATION GUIDE. Authentication Server

MIGRATION GUIDE. Authentication Server MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations

More information

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox VMware Identity Manager SEPTEMBER 2015 V1 Configuring Single Sign-On from VMware Identity Manager to Dropbox Table of Contents

More information

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services 1 HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding

More information

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

VMware Identity Manager Integration with Active Directory Federation Services 2.0

VMware Identity Manager Integration with Active Directory Federation Services 2.0 VMware Identity Manager Integration with Active Directory Federation Services 2.0 VMware Identity Manager J ULY 2015 V 2 Table of Contents Active Directory Federation Services... 2 Configuring AD FS Instance

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2008 2015 VASCO Data Security, Inc., VASCO Data Security International

More information

DIGIPASS Authentication for Check Point Connectra

DIGIPASS Authentication for Check Point Connectra DIGIPASS Authentication for Check Point Connectra With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 21 Disclaimer Disclaimer of Warranties and Limitations

More information

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of

More information

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to AirWatch Applications

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents

More information

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

DIGIPASS Authentication for Sonicwall Aventail SSL VPN DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties

More information

Configuring Single Sign-on from the VMware Identity Manager Service to Amazon Web Services

Configuring Single Sign-on from the VMware Identity Manager Service to Amazon Web Services Configuring Single Sign-on from the VMware Identity Manager Service to Amazon Web Services VMware Identity Manager OCTOBER 2015 V1 Configuring Single Sign-On from VMware Identity Manager to Amazon Web

More information

Hyper-V Installation Guide. Version 8.0.0

Hyper-V Installation Guide. Version 8.0.0 Hyper-V Installation Guide Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. About this Document... 1 1.2. Documentation and Training... 1 1.3. About the AXS GUARD... 1 1.3.1. Introduction... 1

More information

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

HOTPin Integration Guide: Google Apps with Active Directory Federated Services HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

DIGIPASS Authentication for Check Point Security Gateways

DIGIPASS Authentication for Check Point Security Gateways DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS Authentication for Cisco ASA 5500 Series DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

INTEGRATION GUIDE. DIGIPASS Authentication for FortiGate IPSec VPN

INTEGRATION GUIDE. DIGIPASS Authentication for FortiGate IPSec VPN INTEGRATION GUIDE DIGIPASS Authentication for FortiGate IPSec VPN Disclaimer DIGIPASS Authentication for FortiGate IPSec VPN Disclaimer of Warranties and Limitation of Liabilities All information contained

More information

WHITE PAPER. Identikey Server 3.1 Strong Authentication solution for On-Demand Applications and SaaS

WHITE PAPER. Identikey Server 3.1 Strong Authentication solution for On-Demand Applications and SaaS WHITE PAPER Identikey Server 3.1 Strong Authentication solution for On-Demand Applications and SaaS Emerging trend: SaaS and Online Applications for every market Software deployments are shifting from

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

DIGIPASS Authentication for SonicWALL SSL-VPN

DIGIPASS Authentication for SonicWALL SSL-VPN DIGIPASS Authentication for SonicWALL SSL-VPN With VACMAN Middleware 3.0 2006 VASCO Data Security. All rights reserved. Page 1 of 53 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations

More information

Defender 5.7 - Token Deployment System Quick Start Guide

Defender 5.7 - Token Deployment System Quick Start Guide Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register

More information

Setting Up Resources in VMware Identity Manager

Setting Up Resources in VMware Identity Manager Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

axsguard Gatekeeper Internet Redundancy How To v1.2

axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH

More information

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Sharepoint 2007

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Sharepoint 2007 DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Sharepoint 2007 With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations

More information

To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to work with each other.

To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to work with each other. w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Installation for VMware Horizon To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to

More information

Configuring Single Sign-on from the VMware Identity Manager Service to BambooHR

Configuring Single Sign-on from the VMware Identity Manager Service to BambooHR Configuring Single Sign-on from the VMware Identity Manager Service to BambooHR VMware Identity Manager S E P T E M B E R 2015 V1 Configuring Single Sign-On from VMware Identity Manager to BambooHR Table

More information

Strong Authentication for Juniper Networks SSL VPN

Strong Authentication for Juniper Networks SSL VPN Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Internet Redundancy How To. Version 8.0.0

Internet Redundancy How To. Version 8.0.0 Internet Redundancy How To Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. 1.2. 1.3. 1.4. About this Document... Examples used in this Guide... Documentation Sources... About the AXS GUARD...

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

IDENTIKEY Server Windows Installation Guide 3.2

IDENTIKEY Server Windows Installation Guide 3.2 IDENTIKEY Server Windows Installation Guide 3.2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

DIGIPASS Authentication for Citrix XenDesktop Web Interface

DIGIPASS Authentication for Citrix XenDesktop Web Interface DIGIPASS Authentication for Citrix XenDesktop Web Interface With VASCO DIGIPASS Pack for Citrix 2008 VASCO Data Security. All rights reserved. Page 1 of 44 Integration Guideline Disclaimer Disclaimer of

More information

Strong Authentication for Juniper Networks

Strong Authentication for Juniper Networks Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright

More information

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1

PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1 PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity

More information

Identikey Server Windows Installation Guide 3.1

Identikey Server Windows Installation Guide 3.1 Identikey Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

Copyright Pivotal Software Inc, 2013-2015 1 of 10

Copyright Pivotal Software Inc, 2013-2015 1 of 10 Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

axsguard Gatekeeper Open VPN How To v1.4

axsguard Gatekeeper Open VPN How To v1.4 axsguard Gatekeeper Open VPN How To v1.4 Legal Notice VASCO Products VASCO Data Security, Inc. and/or VASCO Data Security International GmbH are referred to in this document as 'VASCO'. VASCO Products

More information

Enterprise Self Service Quick start Guide

Enterprise Self Service Quick start Guide Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix Access Essentials 2.0 Web Interface

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix Access Essentials 2.0 Web Interface INTEGRATION GUIDE DIGIPASS Authentication for Citrix Access Essentials 2.0 Web Interface Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is

More information

IDENTIKEY Server Windows Installation Guide 3.1

IDENTIKEY Server Windows Installation Guide 3.1 IDENTIKEY Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Identikey Server Getting Started Guide 3.1

Identikey Server Getting Started Guide 3.1 Identikey Server Getting Started Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

IP Tunnels September 2014

IP Tunnels September 2014 IP Tunnels September 2014 Table of Contents 1. Introduction... 1 1.1. About this Document... 1 1.2. Concept... 1 2. Configuration and Parameters... 2 VASCO Data Security 2014 ii VASCO Products VASCO Data

More information

SAM Context-Based Authentication Using Juniper SA Integration Guide

SAM Context-Based Authentication Using Juniper SA Integration Guide SAM Context-Based Authentication Using Juniper SA Integration Guide Revision A Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete

More information

Dell One Identity Cloud Access Manager How to Configure as an Identity Provider

Dell One Identity Cloud Access Manager How to Configure as an Identity Provider Dell One Identity Cloud Access Manager 8.1.1 - How to Configure as an Identity Provider January 2016 To provide end-users located on another network with access to your applications, you can configure

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1

DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1 DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Security Assertion Markup Language (SAML) Site Manager Setup

Security Assertion Markup Language (SAML) Site Manager Setup Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Hyper-V Server 2008 Setup and Configuration Tool Guide

Hyper-V Server 2008 Setup and Configuration Tool Guide Hyper-V Server 2008 Setup and Configuration Tool Guide Microsoft Corporation Published: October 2008 Author: Cynthia Nottingham Abstract This guide will help you set up and configure Microsoft Hyper-V

More information

DIGIPASS Authentication for Windows Logon Product Guide 1.1

DIGIPASS Authentication for Windows Logon Product Guide 1.1 DIGIPASS Authentication for Windows Logon Product Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions,

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

NETWRIX EVENT LOG MANAGER

NETWRIX EVENT LOG MANAGER NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication This document describes SonicWALL s implementation of two-factor authentication for SonicWALL SSL-VPN appliances. This document contains the following sections: Feature Overview

More information

Strong Authentication for Cisco ASA 5500 Series

Strong Authentication for Cisco ASA 5500 Series Strong Authentication for Cisco ASA 5500 Series with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Security Provider Integration RADIUS Server

Security Provider Integration RADIUS Server Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

SonicWALL SSL VPN 3.5: Virtual Assist

SonicWALL SSL VPN 3.5: Virtual Assist SonicWALL SSL VPN 3.5: Virtual Assist Document Scope This document describes how to use the SonicWALL Virtual Assist add-on for SonicWALL SSL VPN security appliances. This document contains the following

More information

PingFederate. Identity Menu Builder. User Guide. Version 1.0

PingFederate. Identity Menu Builder. User Guide. Version 1.0 Identity Menu Builder Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Identity Menu Builder User Guide Version 1.0 April, 2011 Ping Identity Corporation 1099 18th Street, Suite

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

EQUELLA. Blackboard Learn Configuration Guide. Version 6.2

EQUELLA. Blackboard Learn Configuration Guide. Version 6.2 EQUELLA Blackboard Learn Configuration Guide Version 6.2 Document History Document No. Reviewed Finalised Published 1 11/12/2013 12/12/2013 12/12/2013 December 2013 edition. Information in this document

More information

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

WHITE PAPER. Identikey Server 3.1 Strong Authentication solution against MITM Attacks for e-banking

WHITE PAPER. Identikey Server 3.1 Strong Authentication solution against MITM Attacks for e-banking WHITE PAPER Identikey Server 3.1 Strong Authentication solution against MITM Attacks for e-banking Protection against Man-in-the-Middle attacks As the global leader in two-factor authentication solutions

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

Quick Start Guide For Ipswitch Failover v9.0

Quick Start Guide For Ipswitch Failover v9.0 For Ipswitch Failover v9.0 Copyright 1991-2015 All rights reserved. This document, as well as the software described in it, is furnished under license and may be used or copied only in accordance with

More information

HDA Integration Guide. Help Desk Authority 9.0

HDA Integration Guide. Help Desk Authority 9.0 HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic

More information

Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide

Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide Symantec On-Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide ii Preface Copyright Information: Symantec Corporation Copyright

More information

Single Sign On for ShareFile with NetScaler. Deployment Guide

Single Sign On for ShareFile with NetScaler. Deployment Guide Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents

More information

Cloud Authentication. Getting Started Guide. Version 2.1.0.06

Cloud Authentication. Getting Started Guide. Version 2.1.0.06 Cloud Authentication Getting Started Guide Version 2.1.0.06 ii Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for Google Apps All information herein is either public information or is the property of and

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

User Management Tool 1.5

User Management Tool 1.5 User Management Tool 1.5 2014-12-08 23:32:23 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.5... 3 ShareFile User Management

More information

Agent Configuration Guide

Agent Configuration Guide SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright

More information