Enterprise Single Sign-On Getting Started with SSOWatch

Size: px
Start display at page:

Download "Enterprise Single Sign-On 8.0.3. Getting Started with SSOWatch"

Transcription

1 Enterprise Single Sign-On Getting Started with SSOWatch

2 Copyright Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary information protected by copyright. The software described in this publication is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical or otherwise without the prior written permission of the publisher. DISCLAIMER The information in this publication is provided in connection with Quest branded products from Evidian. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this publication. EXCEPT AS OTHERWISE SPECIFIED IN THE END USER LICENSE AGREEMENT FOR THIS PRODUCT, EVIDIAN AND QUEST ASSUME NO LIABILITY WHATSOEVER AND DISCLAIM ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO THIS PRODUCT, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL EVIDIAN OR QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS PUBLICATION, EVEN IF EVIDIAN OR QUEST HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Evidian and Quest make no representations or warranties with respect to the accuracy or completeness of the contents of this publication and reserve the right to make changes to specifications and product descriptions at any time without notice. Evidian and Quest do not make any commitment to update the information contained in this publication. The information and specifications in this publication are subject to change without notice. Trademarks Quest, Quest Software, the Quest Software logo, Aelita, AppAssure, Benchmark Factory, Big Brother, DataFactory, DeployDirector, ERDisk, Foglight, Funnel Web, I/Watch, Imceda, InLook, IntelliProfile, InTrust, IT Dad, I/Watch, JClass, Jint, JProbe, LeccoTech, LiteSpeed, LiveReorg, NBSpool, NetBase, Npulse, PerformaSure, PL/Vision, Quest Central, RAPS, SharePlex, Sitraka, SmartAlarm, Spotlight, SQL LiteSpeed, SQL Navigator, SQL Watch, SQLab, Stat, Stat!, StealthCollect, Tag and Follow, Toad, T.O.A.D., Toad World, Vintela, Virtual DBA, Xaffire, and XRT are trademarks and registered trademarks of Quest Software, Inc in the United States of America and other countries. The terms Evidian, AccessMaster, SafeKit, OpenMaster, SSOWatch, WiseGuard, Enatel and CertiPass are trademarks registered by Evidian. All other trademarks mentioned in this document are the propriety of their respective owners. World Headquarters, 5 Polaris Way, Aliso Viejo, CA Website: Please refer to our website for regional and international office information. Quest Enterprise SSO Updated January 2010 Software version 8.0.3

3 CONTENTS About This Guide... 3 Access Management... 3 Conventions Overview Installing SSOWatch Starting the "Administration Tools" Interface Configuring the Workstation Installing SSOWatch on the Workstation Configuring SSOWatch to Enable Single Sign-On A Step by Step Tutorial Enabling SSO for Yahoo! Mail Using the SSOWatch Wizard Enabling SSO for Lotus Notes Application Using SSOStudio Starting SSOStudio Personal Enabling SSO for Lotus Notes Saving the Configuration Going Further Using SSOWatch Engine Session Opening SSO Data Collection First Start of an SSO enabled application Password Update Request Displaying the SSOWatch Engine Popup Menu The SSOWatch Engine Management Module Opening the SSOWatch Engine Management Module User Account Management Activating, Suspending, Resetting the SSOWatch Engine Exiting SSOWatch Initializing the Emergency Access Using the Reset Password Feature Importing the Enterprise SSO Sample Certification Authority (First-Time Use) Resetting Your Primary Password About Quest Software, Inc Contacting Quest Software Contacting Quest Support i

4

5 Getting Started with SSOWatch About This Guide Access Management Subject Intended Reader Software/Hardware Required Supported Operating Systems This guide explains how to begin with SSOWatch. It describes how to install SSOWatch, how to quickly enable SSO and perform basic SSO operations. This guide does not apply to SSOWatch used in Access Collector mode. End-users. Enterprise SSO - SSOWatch 8.0 evolution 3 and later versions. For further information about the operating systems and other software solutions mentioned in this guide, please refer to the Quest Enterprise SSO Release Notes. Enterprise SSO SSOWatch runs only on Windows systems. 3

6 Quest Enterprise SSO Conventions In order to help you get the most out of this guide, we have used specific formatting conventions. These conventions apply to procedures, icons, keystrokes and crossreferences. ELEMENT Select Bolded text Italic text Bold Italic text Blue text CONVENTION This word refers to actions such as choosing or highlighting various interface elements, such as files and radio buttons. Interface elements that appear in Quest products, such as menus and commands. Used for comments. Introduces a series of procedures. Indicates a cross-reference. When viewed in Adobe Acrobat, this format can be used as a hyperlink. Used to highlight additional information pertinent to the process being described. Used to provide Best Practice information. A best practice details the recommended course of action for the best result. Used to highlight processes that should be performed with care. + A plus sign between two keystrokes means that you must press them at the same time. A pipe sign between elements means that you must select the elements in that particular sequence. 4

7 Getting Started with SSOWatch 1. Overview Single Sign-On (SSO) is the functionality that allows users to sign-in (authenticate) only once during a whole session, no matter how many applications are being accessed. They can then access their data transparently, without the constraint of retyping a new user name/password couple. SSOWatch performs the SSO functionality by interfacing itself between a security system, where the security data is stored (in the form of user name/password couples) and the applications that require an authentication. It consists of two technical components: SSOWatch Engine, which performs single sign-on. SSOStudio, which allows you to configure SSOWatch. You will use it to "teach" SSOWatch Engine how to recognize the authentication windows of your web and Windows applications. For more information on SSOStudio, see Enterprise SSO - SSOWatch Administrator Guide. The present guide explains how to begin with SSOWatch. It describes how to install SSOWatch, how to quickly enable SSO and perform basic SSO operations with the SSOWatch Engine. 5

8 Quest Enterprise SSO Installing SSOWatch Subject SSOWatch is installable on a single workstation or deployable on all the workstations of an enterprise network. This section introduces the interactive installation on a single workstation. For information on implementing the directory mode and on enterprise-wide installation, see Enterprise SSO Advanced Installation and Configuration Guide. Before Starting Make sure you have a supported Windows version. Make sure you have a strong authentication device (smartcard, USB key, or biometrics). For details on the supported Windows versions and on the supported strong authentication devices, see Quest Enterprise SSO Release Notes. Make sure you have 25MB of available hard disk space. Make sure you have the license information supplied with the software. Close all running applications. Download the Enterprise SSO installation package from the Quest support website ( 2.1 Starting the "Administration Tools" Interface Subject The Enterprise SSO Administration Tools is a task-oriented interface that allows you to configure and install your Enterprise SSO solution. 6

9 Getting Started with SSOWatch Procedure 1. Log on as system administrator. 2. Once you have downloaded the Enterprise SSO Installation Package, run start.hta. The following window appears: If the window does not appear, do the following: from the E-SSO Installation Package; browse the Tools directory and run WGAdSetup\WGADSetup.exe and go to Step 3 of the current procedure. 3. In the E-SSO Advanced Installation area, click one of the following, depending on your Windows system processor: Enterprise SSO: for 32 bits processors. Enterprise SSO - x64: for 64 bits processors. The Administration Tools window appears. 7

10 Quest Enterprise SSO Each tool that you can run from the Administration Tools window is a wizard that allows you to perform a specific operation during the installation process of the Enterprise SSO databases. 2.2 Configuring the Workstation Subject Before installing SSOWatch, you must configure the workstation so that it runs in standalone mode. Procedure 1. Start the Administration Tools interface (see Section 2.1, Starting the "Administration Tools" Interface). To open the Configuration Assistant if the Administration Tools does not work properly, browse the installation package folder, double-click TOOLS\WGConfig\WGConfig.exe and go to step 4 of the current procedure. 2. In the Select a task list, select Install software modules. 3. In the Software Installation task list, click Configure workstation. The Configuration Assistant appears. 8

11 Getting Started with SSOWatch 4. Follow the instructions displayed in the wizard windows with the following guidelines: WHEN THIS WINDOW APPEARS DO THE FOLLOWING 1. Select Standalone. 2. Click Next. 1. Select Stand-alone Windows workstation. 2. Click Next. 2.3 Installing SSOWatch on the Workstation Subject Once you have configured the workstation so that it runs in standalone mode, you can install SSOWatch as explained in the following procedure. Before Starting Configure the workstation to run in standalone mode (see Section 2.2, Configuring the Workstation). Install Microsoft Redistributables if it is not already set up on your workstation: in the Administration Tools interface, click Install Microsoft Redistributables. If you plan to install the SSOJava plug-in (which is an installation feature of SSOWatch, as shown in step 5 in the following procedure), a supported Java version must imperatively be already installed on your workstation (for more details about the supported JRE versions, see Quest Enterprise SSO Release Notes). 9

12 Quest Enterprise SSO Procedure 1. Start the Administration Tools interface (see Section 2.1, Starting the "Administration Tools" Interface). To run the SSOWatch installation wizard if the Administration Tools does not work properly, browse the installation package folder, double-click INSTALL\SSOWatch.msi, and go to step 4 of the current procedure. 2. In the Select a task list, select Install software modules. 3. In the Software Installation task list, click Install E-SSO Client. The E-SSO Client installation wizard appears. 4. Follow the displayed instructions. 5. When the wizard prompts you to choose the installation type, choose Custom, click Next, and fill in the Select Features window as follows: Biometrics Enrollment tool: installs the biometrics enrollment wizard on the computer, which allows a user to enroll his/her biometric data for fingerprint authentication. For more information on the Enterprise SSO biometrics feature, see Enterprise SSO Advanced Login for Windows User Guide. Integration with Windows Authentication: launches transparently SSOWatch Engine at session startup using the user Windows credentials. If this feature is not installed, SSOWatch will be launched automatically, but it will ask the user for their credentials. Old IE Plugin: deprecated Internet Explorer plug-in that must only be installed for compatibility reasons with the previous WiseGuard versions. Java plugin: allows SSOWatch to access Java applications. 10

13 Getting Started with SSOWatch If you select this feature, make sure a supported Java version is already installed on your workstation before launching the installation of SSOWatch. SSOStudio Personal: allows a single user to configure the applications for which he wants to enable SSO. SSOStudio Enterprise: dedicated to administrators: the SSO configuration is shared by a number of users. Fast User Switching: installs the Fast User Switching option, which allows authorized users to access their session from a workstation that has been locked by another user. 6. Restart the workstation. The SSOWatch Engine icon appears in your Windows' system tray, which is located on the far right end of your task bar. 11

14 Quest Enterprise SSO Configuring SSOWatch to Enable Single Sign-On A Step by Step Tutorial This section explains how to quickly enable SSO. We guide you through the steps required to configure SSO for a standard Windows application. To register an application for SSO, you can use one of the following SSOWatch tools: The SSOWatch Wizard, which is the easiest way to enable SSO for standard application windows. You will find a step-by-step tutorial to register the Yahoo! Mail example application in Section 3.1, Enabling SSO for Yahoo! Mail Using the SSOWatch Wizard. SSOStudio, which is the SSOWatch personal configuration editor for applications that cannot be configured with SSOWatch Wizard, or that require advanced settings. You will find a step-by-step tutorial to register the Lotus Notes example application in Section 3.2, Enabling SSO for Lotus Notes Application Using SSOStudio. 3.1 Enabling SSO for Yahoo! Mail Using the SSOWatch Wizard Subject The SSOWatch Wizard is the easiest way to enable SSO. It helps you to declare the applications' authentication windows that must be automatically filled in by SSOWatch Engine. The parameters of applications defined this way make up a configuration for SSOWatch Engine. The SSOWatch wizard is suitable for standard authentication windows. For applications that cannot be configured through the SSOWatch wizard, you must use SSOStudio. We use Yahoo! Mail as an example, but you can follow the same procedure for almost all web applications. 12

15 Getting Started with SSOWatch Before Starting Start Yahoo!Mail so that the authentication window appears, as shown in the following picture: Procedure 1. In the Windows system tray, right-click the SSOWatch icon (in the notification area) and select Add application. The SSOWatch wizard appears. 2. Fill in the wizard as follows: ACTION ILLUSTRATION Step 1: Select New Application 13

16 Quest Enterprise SSO ACTION ILLUSTRATION Step 2: Select Windows, and type in the name of your application. Step 3: Drag and drop the target button (1) onto login field (as this is a web application) of the Yahoo! Mail authentication window (2) to fill in this window (3). 14

17 Getting Started with SSOWatch ACTION ILLUSTRATION Step 4: Continue drag and drop operations to fill in this window, as shown opposite. Step 5: Click Finish. The following window appears: - 3. Click Yes. The SSOWatch Security Data Collect windows appears. 15

18 Quest Enterprise SSO Fill in this window as follows and click OK: Yahoo! Mail starts automatically. SSOWatch is now configured to detect and automatically fill in your Yahoo! Mail authentication window. If you mistyped the user name or password in the above window, the application does not start. In this case, you need to modify the credentials for the application, as explained in Section , Change Password. Why does the Security Data Collect window appear? At this step of the procedure, the SSOWatch Engine is running, and your Yahoo! Mail authentication window is still displayed. Although SSOWatch can detect the window it cannot fill it in as you have not provided your authentication information yet. That is the reason why the Security Data Collect window appears: the first time you start a declared application, SSOWatch requests your user name and password. This data is stored in a secured way by SSOWatch so it will be able to reuse it afterwards, without requesting any new data. 3.2 Enabling SSO for Lotus Notes Application Using SSOStudio Subject SSOStudio Personal is the SSOWatch personal configuration editor. It provides an easy-to-use graphical interface for declaring the applications for which you want to enable single sign-on. You need to use SSOStudio for applications that cannot be configured with SSOWatch Wizard, but you can also use it for applications that have already been configured using SSOWatch Wizard, to modify or enhance their configurations. 16

19 Getting Started with SSOWatch Restriction The following example works only with Lotus Notes 5 and later Starting SSOStudio Personal Subject The following procedure explains how to start SSOStudio Personal. Procedure To start SSOStudio Personal, do one of the following: Click Start Programs Quest Software Enterprise SSO Personal SSOStudio Right-click the SSOWatch icon (in the notification area) and select Open SSOStudio. The Personal SSOStudio window appears. The application that we shall use as an example is Lotus Notes Enabling SSO for Lotus Notes The following sub-sections describe how to register the Lotus Notes application using SSOStudio Personal. We use Lotus Notes as an example, but you can follow the same procedure for almost all authorized applications Creating the Lotus Notes "Application" Object Subject This section describes how to quickly create the Lotus Notes Application object in your SSOStudio configuration. 17

20 Quest Enterprise SSO Procedure 1. In the SSOStudio main window, right-click the Applications node and select New Application. The Application properties window appears. 2. In the Properties tab, type "Lotus Notes" in the Application Name field: 3. You do not have to change any other options. Click OK. The Lotus Notes Application object appears under the Applications node Creating the Lotus Notes Authentication "Window" Object Subject This section describes how to quickly declare the Lotus Notes logon window in your SSOStudio configuration. 18

21 Getting Started with SSOWatch Before Starting Start Lotus Notes to display the authentication window, as shown in the following picture: Procedure 1. In the SSOStudio main window, right-click the Lotus Notes Application object that you have just created and select New Window. The Window properties window appears. 2. Fill in the General tab as follows: In the Window name field, type Notes Logon. In the Window type field, select NotesLogin. 19

22 Quest Enterprise SSO Fill in the Detection tab as follows: All the fields are already pre-configured for Lotus Notes, and you would normally not have anything further to do. However, to show you how it works, we will describe how to configure the window manually. 20 a) Launch the Lotus Notes application. b) In the Detection tab, click the target button and "drag n drop" it onto the title bar of your Lotus Notes authentication window. c) As many authentication windows could have the same title, we are going to configure an additional text that will be looked for in one of the fields of the window, to distinguish the Lotus Notes authentication window from the other ones: Select Look for text, and click the In Field sub-option. Using the small target button, indicate the field containing the text Enter the password of, as you did for the title detection window. The content of the field Look for text is automatically updated with the content of the selected field. In our case: Enter the password of John Smith/QUEST. Depending on your needs, you can erase the user s name to only keep the text Enter the password of. If it is not erased, SSO will only be enabled for the user connected during this detection session.

23 Getting Started with SSOWatch 4. Fill in the Actions tab as follows: All the fields are already pre-configured for Lotus Notes, and you would normally not have anything further to do. However, to show you how it works, we will describe how to configure the window manually. a) Using the upper small target icon, select the field containing the text Enter the password of, as you did during the detection configuration. The text in the following field is automatically updated. b) In this field, select the Lotus Notes identifier (First name/last name/ Unit/Organization) and click the button. c) Using the second small target icon, select the field where the password will have to be entered. d) Using the last small target icon select the OK button. 5. Click OK. The Notes Logon Window object appears under the Lotus Notes Application object. 6. See Section 3.2.3, Saving the Configuration. 21

24 Quest Enterprise SSO Saving the Configuration Subject Once you have saved your configuration, SSOWatch can detect the window you have just configured, as explained in the following procedure. Procedure 1. Click the (Save) button located in the SSOStudio toolbar. The following window appears: 2. Click Yes. The SSOWatch Security Data Collect windows appears. 3. Fill in this window as follows and click OK: Lotus Notes starts automatically. SSOWatch is now configured to detect and automatically fill in your Lotus Notes authentication window. If you mistyped the user name or password in the above window, the application does not start. In this case, you need to modify the credentials for the application, as explained in Section , Change Password. 22

25 Getting Started with SSOWatch Why does the Security Data Collect window appear? At this step of the procedure, the SSOWatch Engine is running, and your Lotus Notes authentication window is still displayed. Although SSOWatch can detect the window it cannot fill it in, as you have not provided your authentication information yet. That is the reason why the Security Data Collect window appears: the first time you start a declared application, SSOWatch requests your user name and password. This data is stored in a secure way by SSOWatch, so it will be able to reuse it afterwards, without requesting any new data. 3.3 Going Further There you are! You have configured and enabled your first SSO using SSOWatch Wizard and the SSOWatch SSOStudio Configuration Editor. Using the same steps and procedures, you can configure other types of application and authentication windows. The detection modes for other applications are different. For more details, see Enterprise SSO - SSOWatch Administrator Guide. 23

26 Quest Enterprise SSO Using SSOWatch Engine This section describes SSOWatch from the user point of view. This covers basic SSO operations: SSO data collection, and SSO engine management. 4.1 Session Opening If you have installed SSOWatch as described in Section 2, Installing SSOWatch, the SSOWatch engine starts automatically when you open a session. Otherwise, SSOWatch may prompt you to authenticate through the following window: Once the engine is started, an icon is displayed in the Windows notification area: This indicates that the SSO engine is running. 24

27 Getting Started with SSOWatch 4.2 SSO Data Collection First Start of an SSO enabled application During its standard utilization, SSOWatch is almost invisible to the user. However, when it starts for the first time, or when some particular events occur such as password update requests, you will have to provide some information. At the first launch of an SSO enabled application, when the application requests the user s authentication, the SSOWatch collect window appears in foreground (the application is temporarily disabled) and requests the user name and password for the application: Simply provide your usual user name for this application, your password (and confirm it to avoid mistype errors), and validate by clicking the OK button. This data will be stored in a secured way by SSOWatch so it will be able to reuse it afterwards, without requesting any new data. It has enabled the Single Sign-On function. 25

28 Quest Enterprise SSO Password Update Request When an SSO enabled application asks for password update, this request is intercepted by SSOWatch, which displays the following window: Simply type in a new password (and confirm it to avoid mistype errors) and validate it by clicking the OK button. This data will be updated and securely stored in the security database, by SSOWatch, so that it will be able to reuse it afterwards, without requesting any new data. 4.3 Displaying the SSOWatch Engine Popup Menu Subject The SSOWatch Engine popup menu allows you to control the SSOWatch Engine. This popup menu is associated with the SSOWatch Engine taskbar icon: 26

29 Getting Started with SSOWatch From this popup menu, you can: Emergency Access: Initialize your primary password or PIN code reset (Emergency Access). This feature runs only with the LDAP configuration storage mode, as described in Section 4.7, Initializing the Emergency Access. Biometric Enrollment: Enroll your biometric data using the biometrics scan wizard (a biometric authentication device must be installed on your computer). For more information, see Enterprise SSO Advanced Login for Windows User Guide. Open the management module of SSOWatch: SSOEngine. Add application: Enable SSO applications with SSOWatch Wizard. Open SSOStudio to add an application with SSOStudio, as described in Section 3, Configuring SSOWatch to Enable Single Sign-On A Step by Step Tutorial. Suspend and Activate the SSOWatch Engine. Reset the configuration. Exit SSOWatch: Stop the SSO Engine. Procedure To display this popup menu, right-click the SSOWatch Engine icon in the taskbar. Double-clicking the SSOWatch Engine icon performs the default action (in bold): Open. 4.4 The SSOWatch Engine Management Module The administration module of SSOEngine provides the following functions: Managing the SSOWatch Engine. Management of user accounts. 27

30 Quest Enterprise SSO Opening the SSOWatch Engine Management Module Procedure 1. To open the SSOWatch engine management module, right click the SSOWatch icon in the taskbar, and click Open, or simply double-click the SSOWatch icon itself. The following window appears: 2. Do one of the following: To manage your accounts, click the button: see Section 4.4.2, User Account Management. To manage the SSO Engine, click the button: see Section 4.5, Activating, Suspending, Resetting the SSOWatch Engine. 28

31 Getting Started with SSOWatch User Account Management You can see (and update) your user accounts using the User accounts option in the SSOEngine module by clicking on the icon in the SSOWatch Engine management module Change Password The button allows you to change your password for the selected account, but only in the security database: the password is not changed in the security base of the target application. This action can be used to manually deal with BadPasswords. This option may be disabled in the configuration file or with a centralized parameter New Account The button allows you to create a new account for the selected application. When you create an account, you enter security information associated with this account. This operation will be done automatically for the first account defined in the configuration (for an application). User Roles If you have defined several accounts, you will have to manually create the other accounts, through the user account management interface. This is designed for those users who have a number of accounts on the same application(s). An account name designates a role. If a role is shown in the text box of the SSOEngine screen, the corresponding SSO applications will be launched using the security data associated with this role. 29

32 Quest Enterprise SSO If no role has been selected for multiple account applications, you will be prompted to choose an account on connection Delete Account The button allows you to delete security information (user name, password and optional parameters) associated with an account. If many accounts are associated with an application, the account line will be deleted. If you delete the only remaining account, <not registered> will be displayed in place of the user name Show Password The button allows the owner of an account to see the password associated with the account. Using this feature always requires the user to authenticate Delegate Account The icon is only available if you use SSOWatch in standalone and LDAP storage mode. It allows the owner of an account to delegate access to other users Hide Applications without Credentials This option is available by right-clicking an account. It allows you to display only the applications for which you have an account Enable/Disable an Application or all Applications This command is available by right-clicking an account. It allows you to deactivate (and activate again) the SSO function for the specified application. 4.5 Activating, Suspending, Resetting the SSOWatch Engine Subject The Suspend, Activate, Reset Configuration commands allow you to manage the SSOWatch Engine. You can use this commands either from the SSOWatch engine popup menu, or through the SSOWatch management module, using the Home button. 30

33 Getting Started with SSOWatch The Suspend command allows you to suspend the use of SSO. When suspended, the SSOWatch engine does not carry out single sign-on. You can prevent the user from disabling the SSO engine through the configuration options. SSOWatch Engine automatically suspends itself when the smart card or USB key used for authentication is removed. The Reset Configuration command allows you to load the modifications performed in your SSOWatch configuration file and reset the applications and windows states (those windows and applications which have been disabled will be reactivated).you can use this menu when the engine is running or when it is suspended. Once the reset action is complete, the SSO Engine will be in a running state. The Activate command allows you to resume the SSOWatch Engine and enable again the use of SSO. Procedure To suspend the SSOWatch engine, right-click the SSOWatch engine icon and select Suspend. The SSOWatch engine icon changes to. To activate the SSOWatch engine, right-click the SSOWatch engine icon and select Activate. The SSOWatch engine icon changes to. To reset the SSOWatch engine configuration, right-click the SSOWatch engine icon and select Reset Configuration. If your SSOWatch engine was suspended, its icon changes to. 31

34 Quest Enterprise SSO Exiting SSOWatch To exit SSOWatch, right-click the SSOWatch engine icon and select Exit SSOWatch. The SSOWatch engine icon disappears and single sign-on is disabled. The Exit SSOWatch command can be disabled through the configuration file. 4.7 Initializing the Emergency Access Subject The Emergency Access feature allows you to reset your password or your PIN code in case you lost or forgot it. Initializing the Emergency Access feature consists in choosing a set of questions and recording the associated answers (if you want to reset your password or PIN code, you will have to answer the question you have chosen). This feature runs only with the LDAP configuration storage mode. To know your configuration storage mode, right-click the SSOWatch Engine icon (located on the taskbar), select About SSOWatch, and in the displayed window, check the value of the Configuration storage mode field. When the Emergency Access feature is enabled, you can define your questions (optional) and answers the first time that your SSOWatch engine is activated. Then you may need to modify this data in the following cases: The questions have changed, so you have to update your answers. You must enter your answers periodically. You want to change your questions/answers. Procedure 1. Right-click the SSOWatch icon located in the notification area, and select Emergency Access. The Authentication window appears. 2. Enter your ID and Password and click OK. The Emergency Access wizard appears. 3. Follow the displayed instructions. You may have restrictions to define your questions/answers, as for example a minimum/maximum number of characters, words that you cannot use If you do not know why your questions/answers are not accepted, contact your Enterprise SSO administrator. 32

35 4.8 Using the Reset Password Feature Getting Started with SSOWatch Importing the Enterprise SSO Sample Certification Authority (First-Time Use) Subject To avoid Security Alert messages when connecting to the Reset Password portal, you must import the Sample Certification Authority (CA) in your Internet Explorer web browser, as explained in the following procedure. Procedure 1. Start Internet Explorer and enter in the address bar the URL corresponding to the Reset Password web server followed by /ca.crt (example: The following window appears: 2. Click Open, and in the displayed window, click Install Certificate. 3. Follow the instruction of the Import Certificate wizard. It is recommended to keep the default selected options. Just click the Next and Finish buttons to install the file. 4. Click OK to close the Certificate window. The Sample CA is imported Resetting Your Primary Password Subject This section describes how to securely reset your primary password from any workstation using Internet Explorer. If you can no longer log on any workstation, reset your primary password as explained in the following procedure. 33

36 Quest Enterprise SSO Before Starting The Emergency Access feature must be initialized: you must have chosen a set of questions and answers (see Section 4.7, Initializing the Emergency Access). Procedure 1. Start your Internet Explorer web browser and enter in the address bar the URL corresponding to the Reset Password web server (example: If you do not know this URL, contact your Enterprise SSO administrator. 2. In the displayed page, click the reset your primary password link. 3. Type your identifier and click the Submit button. The Password reinitialization page appears. 4. Answer each question, depending on the answers you gave while initializing the Password Reset functionality and type your new primary password twice. 5. Click the Submit button. After a certain number of wrong answers, the process may be blocked and you will not be able to try again. In this case, contact your Enterprise SSO administrator. You can now use your new password to connect to your workstation. 34

37 Getting Started with SSOWatch About Quest Software, Inc. Now more than ever, organizations need to work smart and improve efficiency. Quest Software creates and supports smart systems management products helping our customers solve everyday IT challenges faster and easier. Visit for more information. Contacting Quest Software Phone (United States and Canada) Mail Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA USA Web site Please refer to our Web site for regional and international office information. Contacting Quest Support Quest Support is available to customers who have a trial version of a Quest product or who have purchased a Quest product and have a valid maintenance contract. Quest Support provides unlimited 24x7 access to SupportLink, our self-service portal. Visit SupportLink at From SupportLink, you can do the following: Retrieve thousands of solutions from our online Knowledgebase Download the latest releases and service packs Create, update and review Support cases View the Global Support Guide for a detailed explanation of support programs, online services, contact information, and policy and procedures. The guide is available at: 35

Enterprise Single Sign-On 8.0.3

Enterprise Single Sign-On 8.0.3 For Internal Use Only Enterprise Single Sign-On 8.0.3 Additional Dedicated Server Instance Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary

More information

Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide

Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide Dedicated Directory Replication Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains

More information

Enterprise Single Sign-On 8.0.3 User Guide

Enterprise Single Sign-On 8.0.3 User Guide Enterprise Single Sign-On 8.0.3 User Guide Advanced Login for Windows Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary information protected

More information

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer

2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer What s New 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Quest Management Agent for Forefront Identity Manager

Quest Management Agent for Forefront Identity Manager Quest Management Agent for Forefront Identity Manager Version 1.0 Administrator Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Enterprise Single Sign-On 8.0.6. SSOWatch Administrator Guide

Enterprise Single Sign-On 8.0.6. SSOWatch Administrator Guide Enterprise Single Sign-On 8.0.6 SSOWatch Administrator Guide 2013 Quest Software, Inc. and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary information protected by copyright.

More information

10.2. Auditing Cisco PIX Firewall with Quest InTrust

10.2. Auditing Cisco PIX Firewall with Quest InTrust 10.2 Auditing Cisco PIX Firewall with Quest InTrust 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Quest Site Administrator 4.4

Quest Site Administrator 4.4 Quest Site Administrator 4.4 for SharePoint Product Overview 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information, which is protected by copyright. The software described

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

8.0. Quick Start Guide

8.0. Quick Start Guide 8.0 Quick Start Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Defender Delegated Administration. User Guide

Defender Delegated Administration. User Guide Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Quest Site Administrator 4.4

Quest Site Administrator 4.4 Quest Site Administrator 4.4 for SharePoint Quick Start Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information, which is protected by copyright. The software described

More information

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions 4.9 Evaluator Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Foglight 5.5.4.5 for SQL Server

Foglight 5.5.4.5 for SQL Server Foglight 5.5.4.5 for SQL Server Managing SQL Server Database Systems 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Direct Migration from SharePoint 2003 to SharePoint 2010

Direct Migration from SharePoint 2003 to SharePoint 2010 Direct Migration from SharePoint 2003 to SharePoint 2010 It s Easy with Quest Migration Manager for SharePoint Written By Alexander Kirillov, Quest Software TECHNICAL BRIEF 2010 Quest Software, Inc. ALL

More information

An Introduction to Toad Extension for Visual Studio. Written By Thomas Klughardt Systems Consultant Quest Software, Inc.

An Introduction to Toad Extension for Visual Studio. Written By Thomas Klughardt Systems Consultant Quest Software, Inc. An Introduction to Toad Extension for Visual Studio Written By Thomas Klughardt Systems Consultant Quest Software, Inc. Contents Introduction... 2 Installation... 3 Creating Projects... 4 Working with

More information

Quest ChangeAuditor 4.8

Quest ChangeAuditor 4.8 Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide

More information

8.7. Resource Kit User Guide

8.7. Resource Kit User Guide 8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under

More information

Quick Connect Express for Active Directory

Quick Connect Express for Active Directory Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

4.0. Offline Folder Wizard. User Guide

4.0. Offline Folder Wizard. User Guide 4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

Defender 5.7. Remote Access User Guide

Defender 5.7. Remote Access User Guide Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide

Foglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide

Foglight for Oracle. Managing Oracle Database Systems Getting Started Guide Foglight for Oracle Managing Oracle Database Systems Getting Started Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide

Dell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

7.5 7.5. Spotlight on Messaging. Evaluator s Guide

7.5 7.5. Spotlight on Messaging. Evaluator s Guide 7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Quest ChangeAuditor 5.0. For Windows File Servers. Events Reference

Quest ChangeAuditor 5.0. For Windows File Servers. Events Reference Quest ChangeAuditor For Windows File Servers 5.0 Events Reference 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server Foglight for SQL Server 5.6.4 Managing SQL Server Database Systems Getting Started Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

6.7. Quick Start Guide

6.7. Quick Start Guide 6.7 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

ChangeAuditor 6.0. Web Client User Guide

ChangeAuditor 6.0. Web Client User Guide ChangeAuditor 6.0 Web Client User Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Foglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server

Foglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server Foglight for SQL Server 5.6.5.2 Managing SQL Server Database Systems Getting Started Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide

Foglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide Foglight Foglight for Virtualization, Enterprise Edition 7.2 Virtual Appliance Installation and Setup Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected

More information

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual

formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,

More information

2.0. Quick Start Guide

2.0. Quick Start Guide 2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished

More information

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide

Quest SQL Optimizer 6.5. for SQL Server. Installation Guide Quest SQL Optimizer for SQL Server 6.5 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

8.7. Target Exchange 2010 Environment Preparation

8.7. Target Exchange 2010 Environment Preparation 8.7 Target Exchange 2010 Environment Preparation 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document

More information

Secure and Efficient Log Management with Quest OnDemand

Secure and Efficient Log Management with Quest OnDemand Secure and Efficient Log Management with Quest OnDemand TECHNICAL BRIEF 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of

More information

Taking Unix Identity and Access Management to the Next Level

Taking Unix Identity and Access Management to the Next Level Taking Unix Identity and Access Management to the Next Level Now that you ve taken care of local users and groups what s next? Written by Quest Software, Inc. TECHNICAL BRIEF 2010 Quest Software, Inc.

More information

Foglight. Dashboard Support Guide

Foglight. Dashboard Support Guide Foglight Dashboard Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

ActiveRoles 6.8. Web Interface User Guide

ActiveRoles 6.8. Web Interface User Guide ActiveRoles 6.8 Web Interface User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Foglight 1.0.0.0. Cartridge for Active Directory Installation Guide

Foglight 1.0.0.0. Cartridge for Active Directory Installation Guide Foglight 1.0.0.0 Cartridge for Active Directory Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Web Portal Installation Guide 5.0

Web Portal Installation Guide 5.0 Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Go Beyond Basic Up/Down Monitoring

Go Beyond Basic Up/Down Monitoring Go Beyond Basic Up/Down Monitoring Extending the Value of SCOM with Spotlight on SQL Server Enterprise and Foglight Performance Analysis for SQL Server Introduction Microsoft Systems Center Operations

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Quest Privilege Manager Console 1.1.1. Installation and Configuration Guide

Quest Privilege Manager Console 1.1.1. Installation and Configuration Guide Quest Privilege Manager Console 1.1.1 Installation and Configuration Guide 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

formerly Help Desk Authority 9.1.3 HDAccess User Manual

formerly Help Desk Authority 9.1.3 HDAccess User Manual formerly Help Desk Authority 9.1.3 HDAccess User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA

More information

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide

ChangeAuditor 5.6. For Windows File Servers Event Reference Guide ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Quick Connect for Cloud Services

Quick Connect for Cloud Services Quick Connect for Cloud Services Version 3.5 Administrator Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Foglight 5.2.0. Foglight Experience Viewer (FxV) Upgrade Field Guide

Foglight 5.2.0. Foglight Experience Viewer (FxV) Upgrade Field Guide Foglight 5.2.0 Foglight Experience Viewer (FxV) 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

6.5. Web Interface. User Guide

6.5. Web Interface. User Guide 6.5 Web Interface User Guide 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a

More information

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server

Dell InTrust 11.0. Preparing for Auditing Microsoft SQL Server 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Quest Collaboration Services 3.5. How it Works Guide

Quest Collaboration Services 3.5. How it Works Guide Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide

Foglight. Managing Java EE Systems Supported Platforms and Servers Guide Foglight Managing Java EE Systems Supported Platforms and Servers Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

System Requirements and Platform Support Guide

System Requirements and Platform Support Guide Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

Spotlight Management Pack for SCOM

Spotlight Management Pack for SCOM Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System

More information

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide

ChangeAuditor 6.0 For Windows File Servers. Event Reference Guide ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Quest Migration Manager 3.2

Quest Migration Manager 3.2 Quest Migration Manager 3.2 for SharePoint User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information, which is protected by copyright. The software described

More information

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions

2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions 4.9 User Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

6.7. Replication: Best Practices and Troubleshooting

6.7. Replication: Best Practices and Troubleshooting 6.7 Replication: Best Practices and Troubleshooting 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

2009 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Disclaimer

2009 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Disclaimer 6.5 User Guide 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Quest Collaboration Services 3.6.1. How it Works Guide

Quest Collaboration Services 3.6.1. How it Works Guide Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Foglight 5.5.5. Managing Microsoft Active Directory Installation Guide

Foglight 5.5.5. Managing Microsoft Active Directory Installation Guide Foglight 5.5.5 Managing Microsoft Active Directory 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Eight Best Practices for Identity and Access Management

Eight Best Practices for Identity and Access Management Eight Best Practices for Identity and Access Management BUSINESS BRIEF 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of this

More information

formerly Help Desk Authority 9.1.2 Quick Start Guide

formerly Help Desk Authority 9.1.2 Quick Start Guide formerly Help Desk Authority 9.1.2 Quick Start Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel l 10.3 1.0 Installation Auditing and Configuration Microsoft ISA Server Guide How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel 2010 Quest Software, Inc. ALL RIGHTS RESERVED.

More information

Deployment Guide 6.7

Deployment Guide 6.7 Deployment Guide 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

6.0. Planning for Capacity in Virtual Environments Reference Guide

6.0. Planning for Capacity in Virtual Environments Reference Guide 6.0 Planning for Capacity in Virtual Environments 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel

How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel l 10.3 1.0 Auditing Installation and and Monitoring Configuration Microsoft Guide IIS How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel 2010 Quest Software, Inc. ALL RIGHTS

More information

Quest One Password Manager

Quest One Password Manager Quest One Password Manager Version 5.0 Administrator Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide

Dell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

ScriptLogic Desktop Authority Password Self-Service version 4.6 Quick Start Guide

ScriptLogic Desktop Authority Password Self-Service version 4.6 Quick Start Guide ScriptLogic Desktop Authority Password Self-Service version 4.6 Quick Start Guide Password Self-Service 4 ii 2010 Quest Software, Inc. ALL RIGHTS RESERVED. Licensed to ScriptLogic Corporation This guide

More information

Using Stat with Custom Applications

Using Stat with Custom Applications Using Stat with Custom Applications Written by Quest Software Inc. TECHNICAL BRIEF 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright.

More information

Migrating Your Applications to the Cloud

Migrating Your Applications to the Cloud Migrating Your Applications to the Cloud How to Overcome the Challenges and Reduce the Costs Written By Quest Software, Inc. Contents Abstract... 2 Introduction... 3 What is the Cloud?... 3 Current and

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

ScriptLogic Desktop Authority Password Self-Service version 4.7 Administrator Guide

ScriptLogic Desktop Authority Password Self-Service version 4.7 Administrator Guide ScriptLogic Desktop Authority Password Self-Service version 4.7 Administrator Guide Password Self-Service 4.7 Administrator Guide ii 2010 Quest Software, Inc. ALL RIGHTS RESERVED. Licensed to ScriptLogic

More information

Security Explorer 9.5. User Guide

Security Explorer 9.5. User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

4.7. Administrator Guide

4.7. Administrator Guide 4.7 Administrator Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software

More information

Foglight. Managing Hyper-V Systems User and Reference Guide

Foglight. Managing Hyper-V Systems User and Reference Guide Foglight Managing Hyper-V Systems User and Reference Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

Introduction to Version Control in

Introduction to Version Control in Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any

More information

About Recovery Manager for Active

About Recovery Manager for Active Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

Toad for Oracle Compatibility with Windows 7 Revealed

Toad for Oracle Compatibility with Windows 7 Revealed Toad for Oracle Compatibility with Windows 7 Revealed Written by John Pocknell Quest Software TECHNICAL BRIEF Contents Contents... 1 Abstract... 2 Introduction... 3 Testing... 4 Possible Issues... 5 Issue

More information

8.0. Forest Edition. Deployment Guide

8.0. Forest Edition. Deployment Guide 8.0 Forest Edition Deployment Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

How Password Lifecycle Management Can Save Money and Improve Security

How Password Lifecycle Management Can Save Money and Improve Security How Password Lifecycle Management Can Save Money and Improve Security by Don Jones Quest Software, Inc. WHITE PAPER 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information

More information

ActiveRoles 6.9. Replication: Best Practices and Troubleshooting

ActiveRoles 6.9. Replication: Best Practices and Troubleshooting ActiveRoles 6.9 Replication: Best Practices and Troubleshooting 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Dell Statistica. Statistica Document Management System (SDMS) Requirements Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group

Using Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott

More information

ActiveRoles 6.9. Quick Start Guide

ActiveRoles 6.9. Quick Start Guide ActiveRoles 6.9 Quick Start Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

AvePoint CallAssist 3.2.5 for Microsoft Dynamics CRM. Installation and Configuration Guide

AvePoint CallAssist 3.2.5 for Microsoft Dynamics CRM. Installation and Configuration Guide AvePoint CallAssist 3.2.5 for Microsoft Dynamics CRM Installation and Configuration Guide Revision K Issued November 2014 Table of Contents Overview... 4 Prerequisites... 5 Environment Requirements...

More information

Troubleshooting Guide 5.1. Quest Workspace ChangeBASE

Troubleshooting Guide 5.1. Quest Workspace ChangeBASE Troubleshooting Guide 5.1 Quest Workspace ChangeBASE [Type text] 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

DATA GOVERNANCE EDITION

DATA GOVERNANCE EDITION Quest One Identity Manager DATA GOVERNANCE EDITION 6.1 What s New 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book is furnished under a

More information

Symantec Enterprise Vault

Symantec Enterprise Vault Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book

More information