Enterprise Single Sign-On Getting Started with SSOWatch
|
|
- Emmeline Horn
- 8 years ago
- Views:
Transcription
1 Enterprise Single Sign-On Getting Started with SSOWatch
2 Copyright Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary information protected by copyright. The software described in this publication is furnished under a software license or nondisclosure agreement. This software may be used or copied only in accordance with the terms of the applicable agreement. No part of this publication may be reproduced, stored in a retrieval system or transmitted in any form or by any means, electronic, mechanical or otherwise without the prior written permission of the publisher. DISCLAIMER The information in this publication is provided in connection with Quest branded products from Evidian. No license, express or implied, by estoppel or otherwise, to any intellectual property right is granted by this publication. EXCEPT AS OTHERWISE SPECIFIED IN THE END USER LICENSE AGREEMENT FOR THIS PRODUCT, EVIDIAN AND QUEST ASSUME NO LIABILITY WHATSOEVER AND DISCLAIM ANY EXPRESS, IMPLIED OR STATUTORY WARRANTY RELATING TO THIS PRODUCT, INCLUDING BUT NOT LIMITED TO, THE IMPLIED WARRANTY OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. IN NO EVENT SHALL EVIDIAN OR QUEST BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF INFORMATION) ARISING OUT OF THE USE OR INABILITY TO USE THIS PUBLICATION, EVEN IF EVIDIAN OR QUEST HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. Evidian and Quest make no representations or warranties with respect to the accuracy or completeness of the contents of this publication and reserve the right to make changes to specifications and product descriptions at any time without notice. Evidian and Quest do not make any commitment to update the information contained in this publication. The information and specifications in this publication are subject to change without notice. Trademarks Quest, Quest Software, the Quest Software logo, Aelita, AppAssure, Benchmark Factory, Big Brother, DataFactory, DeployDirector, ERDisk, Foglight, Funnel Web, I/Watch, Imceda, InLook, IntelliProfile, InTrust, IT Dad, I/Watch, JClass, Jint, JProbe, LeccoTech, LiteSpeed, LiveReorg, NBSpool, NetBase, Npulse, PerformaSure, PL/Vision, Quest Central, RAPS, SharePlex, Sitraka, SmartAlarm, Spotlight, SQL LiteSpeed, SQL Navigator, SQL Watch, SQLab, Stat, Stat!, StealthCollect, Tag and Follow, Toad, T.O.A.D., Toad World, Vintela, Virtual DBA, Xaffire, and XRT are trademarks and registered trademarks of Quest Software, Inc in the United States of America and other countries. The terms Evidian, AccessMaster, SafeKit, OpenMaster, SSOWatch, WiseGuard, Enatel and CertiPass are trademarks registered by Evidian. All other trademarks mentioned in this document are the propriety of their respective owners. World Headquarters, 5 Polaris Way, Aliso Viejo, CA Website: Please refer to our website for regional and international office information. Quest Enterprise SSO Updated January 2010 Software version 8.0.3
3 CONTENTS About This Guide... 3 Access Management... 3 Conventions Overview Installing SSOWatch Starting the "Administration Tools" Interface Configuring the Workstation Installing SSOWatch on the Workstation Configuring SSOWatch to Enable Single Sign-On A Step by Step Tutorial Enabling SSO for Yahoo! Mail Using the SSOWatch Wizard Enabling SSO for Lotus Notes Application Using SSOStudio Starting SSOStudio Personal Enabling SSO for Lotus Notes Saving the Configuration Going Further Using SSOWatch Engine Session Opening SSO Data Collection First Start of an SSO enabled application Password Update Request Displaying the SSOWatch Engine Popup Menu The SSOWatch Engine Management Module Opening the SSOWatch Engine Management Module User Account Management Activating, Suspending, Resetting the SSOWatch Engine Exiting SSOWatch Initializing the Emergency Access Using the Reset Password Feature Importing the Enterprise SSO Sample Certification Authority (First-Time Use) Resetting Your Primary Password About Quest Software, Inc Contacting Quest Software Contacting Quest Support i
4
5 Getting Started with SSOWatch About This Guide Access Management Subject Intended Reader Software/Hardware Required Supported Operating Systems This guide explains how to begin with SSOWatch. It describes how to install SSOWatch, how to quickly enable SSO and perform basic SSO operations. This guide does not apply to SSOWatch used in Access Collector mode. End-users. Enterprise SSO - SSOWatch 8.0 evolution 3 and later versions. For further information about the operating systems and other software solutions mentioned in this guide, please refer to the Quest Enterprise SSO Release Notes. Enterprise SSO SSOWatch runs only on Windows systems. 3
6 Quest Enterprise SSO Conventions In order to help you get the most out of this guide, we have used specific formatting conventions. These conventions apply to procedures, icons, keystrokes and crossreferences. ELEMENT Select Bolded text Italic text Bold Italic text Blue text CONVENTION This word refers to actions such as choosing or highlighting various interface elements, such as files and radio buttons. Interface elements that appear in Quest products, such as menus and commands. Used for comments. Introduces a series of procedures. Indicates a cross-reference. When viewed in Adobe Acrobat, this format can be used as a hyperlink. Used to highlight additional information pertinent to the process being described. Used to provide Best Practice information. A best practice details the recommended course of action for the best result. Used to highlight processes that should be performed with care. + A plus sign between two keystrokes means that you must press them at the same time. A pipe sign between elements means that you must select the elements in that particular sequence. 4
7 Getting Started with SSOWatch 1. Overview Single Sign-On (SSO) is the functionality that allows users to sign-in (authenticate) only once during a whole session, no matter how many applications are being accessed. They can then access their data transparently, without the constraint of retyping a new user name/password couple. SSOWatch performs the SSO functionality by interfacing itself between a security system, where the security data is stored (in the form of user name/password couples) and the applications that require an authentication. It consists of two technical components: SSOWatch Engine, which performs single sign-on. SSOStudio, which allows you to configure SSOWatch. You will use it to "teach" SSOWatch Engine how to recognize the authentication windows of your web and Windows applications. For more information on SSOStudio, see Enterprise SSO - SSOWatch Administrator Guide. The present guide explains how to begin with SSOWatch. It describes how to install SSOWatch, how to quickly enable SSO and perform basic SSO operations with the SSOWatch Engine. 5
8 Quest Enterprise SSO Installing SSOWatch Subject SSOWatch is installable on a single workstation or deployable on all the workstations of an enterprise network. This section introduces the interactive installation on a single workstation. For information on implementing the directory mode and on enterprise-wide installation, see Enterprise SSO Advanced Installation and Configuration Guide. Before Starting Make sure you have a supported Windows version. Make sure you have a strong authentication device (smartcard, USB key, or biometrics). For details on the supported Windows versions and on the supported strong authentication devices, see Quest Enterprise SSO Release Notes. Make sure you have 25MB of available hard disk space. Make sure you have the license information supplied with the software. Close all running applications. Download the Enterprise SSO installation package from the Quest support website ( 2.1 Starting the "Administration Tools" Interface Subject The Enterprise SSO Administration Tools is a task-oriented interface that allows you to configure and install your Enterprise SSO solution. 6
9 Getting Started with SSOWatch Procedure 1. Log on as system administrator. 2. Once you have downloaded the Enterprise SSO Installation Package, run start.hta. The following window appears: If the window does not appear, do the following: from the E-SSO Installation Package; browse the Tools directory and run WGAdSetup\WGADSetup.exe and go to Step 3 of the current procedure. 3. In the E-SSO Advanced Installation area, click one of the following, depending on your Windows system processor: Enterprise SSO: for 32 bits processors. Enterprise SSO - x64: for 64 bits processors. The Administration Tools window appears. 7
10 Quest Enterprise SSO Each tool that you can run from the Administration Tools window is a wizard that allows you to perform a specific operation during the installation process of the Enterprise SSO databases. 2.2 Configuring the Workstation Subject Before installing SSOWatch, you must configure the workstation so that it runs in standalone mode. Procedure 1. Start the Administration Tools interface (see Section 2.1, Starting the "Administration Tools" Interface). To open the Configuration Assistant if the Administration Tools does not work properly, browse the installation package folder, double-click TOOLS\WGConfig\WGConfig.exe and go to step 4 of the current procedure. 2. In the Select a task list, select Install software modules. 3. In the Software Installation task list, click Configure workstation. The Configuration Assistant appears. 8
11 Getting Started with SSOWatch 4. Follow the instructions displayed in the wizard windows with the following guidelines: WHEN THIS WINDOW APPEARS DO THE FOLLOWING 1. Select Standalone. 2. Click Next. 1. Select Stand-alone Windows workstation. 2. Click Next. 2.3 Installing SSOWatch on the Workstation Subject Once you have configured the workstation so that it runs in standalone mode, you can install SSOWatch as explained in the following procedure. Before Starting Configure the workstation to run in standalone mode (see Section 2.2, Configuring the Workstation). Install Microsoft Redistributables if it is not already set up on your workstation: in the Administration Tools interface, click Install Microsoft Redistributables. If you plan to install the SSOJava plug-in (which is an installation feature of SSOWatch, as shown in step 5 in the following procedure), a supported Java version must imperatively be already installed on your workstation (for more details about the supported JRE versions, see Quest Enterprise SSO Release Notes). 9
12 Quest Enterprise SSO Procedure 1. Start the Administration Tools interface (see Section 2.1, Starting the "Administration Tools" Interface). To run the SSOWatch installation wizard if the Administration Tools does not work properly, browse the installation package folder, double-click INSTALL\SSOWatch.msi, and go to step 4 of the current procedure. 2. In the Select a task list, select Install software modules. 3. In the Software Installation task list, click Install E-SSO Client. The E-SSO Client installation wizard appears. 4. Follow the displayed instructions. 5. When the wizard prompts you to choose the installation type, choose Custom, click Next, and fill in the Select Features window as follows: Biometrics Enrollment tool: installs the biometrics enrollment wizard on the computer, which allows a user to enroll his/her biometric data for fingerprint authentication. For more information on the Enterprise SSO biometrics feature, see Enterprise SSO Advanced Login for Windows User Guide. Integration with Windows Authentication: launches transparently SSOWatch Engine at session startup using the user Windows credentials. If this feature is not installed, SSOWatch will be launched automatically, but it will ask the user for their credentials. Old IE Plugin: deprecated Internet Explorer plug-in that must only be installed for compatibility reasons with the previous WiseGuard versions. Java plugin: allows SSOWatch to access Java applications. 10
13 Getting Started with SSOWatch If you select this feature, make sure a supported Java version is already installed on your workstation before launching the installation of SSOWatch. SSOStudio Personal: allows a single user to configure the applications for which he wants to enable SSO. SSOStudio Enterprise: dedicated to administrators: the SSO configuration is shared by a number of users. Fast User Switching: installs the Fast User Switching option, which allows authorized users to access their session from a workstation that has been locked by another user. 6. Restart the workstation. The SSOWatch Engine icon appears in your Windows' system tray, which is located on the far right end of your task bar. 11
14 Quest Enterprise SSO Configuring SSOWatch to Enable Single Sign-On A Step by Step Tutorial This section explains how to quickly enable SSO. We guide you through the steps required to configure SSO for a standard Windows application. To register an application for SSO, you can use one of the following SSOWatch tools: The SSOWatch Wizard, which is the easiest way to enable SSO for standard application windows. You will find a step-by-step tutorial to register the Yahoo! Mail example application in Section 3.1, Enabling SSO for Yahoo! Mail Using the SSOWatch Wizard. SSOStudio, which is the SSOWatch personal configuration editor for applications that cannot be configured with SSOWatch Wizard, or that require advanced settings. You will find a step-by-step tutorial to register the Lotus Notes example application in Section 3.2, Enabling SSO for Lotus Notes Application Using SSOStudio. 3.1 Enabling SSO for Yahoo! Mail Using the SSOWatch Wizard Subject The SSOWatch Wizard is the easiest way to enable SSO. It helps you to declare the applications' authentication windows that must be automatically filled in by SSOWatch Engine. The parameters of applications defined this way make up a configuration for SSOWatch Engine. The SSOWatch wizard is suitable for standard authentication windows. For applications that cannot be configured through the SSOWatch wizard, you must use SSOStudio. We use Yahoo! Mail as an example, but you can follow the same procedure for almost all web applications. 12
15 Getting Started with SSOWatch Before Starting Start Yahoo!Mail so that the authentication window appears, as shown in the following picture: Procedure 1. In the Windows system tray, right-click the SSOWatch icon (in the notification area) and select Add application. The SSOWatch wizard appears. 2. Fill in the wizard as follows: ACTION ILLUSTRATION Step 1: Select New Application 13
16 Quest Enterprise SSO ACTION ILLUSTRATION Step 2: Select Windows, and type in the name of your application. Step 3: Drag and drop the target button (1) onto login field (as this is a web application) of the Yahoo! Mail authentication window (2) to fill in this window (3). 14
17 Getting Started with SSOWatch ACTION ILLUSTRATION Step 4: Continue drag and drop operations to fill in this window, as shown opposite. Step 5: Click Finish. The following window appears: - 3. Click Yes. The SSOWatch Security Data Collect windows appears. 15
18 Quest Enterprise SSO Fill in this window as follows and click OK: Yahoo! Mail starts automatically. SSOWatch is now configured to detect and automatically fill in your Yahoo! Mail authentication window. If you mistyped the user name or password in the above window, the application does not start. In this case, you need to modify the credentials for the application, as explained in Section , Change Password. Why does the Security Data Collect window appear? At this step of the procedure, the SSOWatch Engine is running, and your Yahoo! Mail authentication window is still displayed. Although SSOWatch can detect the window it cannot fill it in as you have not provided your authentication information yet. That is the reason why the Security Data Collect window appears: the first time you start a declared application, SSOWatch requests your user name and password. This data is stored in a secured way by SSOWatch so it will be able to reuse it afterwards, without requesting any new data. 3.2 Enabling SSO for Lotus Notes Application Using SSOStudio Subject SSOStudio Personal is the SSOWatch personal configuration editor. It provides an easy-to-use graphical interface for declaring the applications for which you want to enable single sign-on. You need to use SSOStudio for applications that cannot be configured with SSOWatch Wizard, but you can also use it for applications that have already been configured using SSOWatch Wizard, to modify or enhance their configurations. 16
19 Getting Started with SSOWatch Restriction The following example works only with Lotus Notes 5 and later Starting SSOStudio Personal Subject The following procedure explains how to start SSOStudio Personal. Procedure To start SSOStudio Personal, do one of the following: Click Start Programs Quest Software Enterprise SSO Personal SSOStudio Right-click the SSOWatch icon (in the notification area) and select Open SSOStudio. The Personal SSOStudio window appears. The application that we shall use as an example is Lotus Notes Enabling SSO for Lotus Notes The following sub-sections describe how to register the Lotus Notes application using SSOStudio Personal. We use Lotus Notes as an example, but you can follow the same procedure for almost all authorized applications Creating the Lotus Notes "Application" Object Subject This section describes how to quickly create the Lotus Notes Application object in your SSOStudio configuration. 17
20 Quest Enterprise SSO Procedure 1. In the SSOStudio main window, right-click the Applications node and select New Application. The Application properties window appears. 2. In the Properties tab, type "Lotus Notes" in the Application Name field: 3. You do not have to change any other options. Click OK. The Lotus Notes Application object appears under the Applications node Creating the Lotus Notes Authentication "Window" Object Subject This section describes how to quickly declare the Lotus Notes logon window in your SSOStudio configuration. 18
21 Getting Started with SSOWatch Before Starting Start Lotus Notes to display the authentication window, as shown in the following picture: Procedure 1. In the SSOStudio main window, right-click the Lotus Notes Application object that you have just created and select New Window. The Window properties window appears. 2. Fill in the General tab as follows: In the Window name field, type Notes Logon. In the Window type field, select NotesLogin. 19
22 Quest Enterprise SSO Fill in the Detection tab as follows: All the fields are already pre-configured for Lotus Notes, and you would normally not have anything further to do. However, to show you how it works, we will describe how to configure the window manually. 20 a) Launch the Lotus Notes application. b) In the Detection tab, click the target button and "drag n drop" it onto the title bar of your Lotus Notes authentication window. c) As many authentication windows could have the same title, we are going to configure an additional text that will be looked for in one of the fields of the window, to distinguish the Lotus Notes authentication window from the other ones: Select Look for text, and click the In Field sub-option. Using the small target button, indicate the field containing the text Enter the password of, as you did for the title detection window. The content of the field Look for text is automatically updated with the content of the selected field. In our case: Enter the password of John Smith/QUEST. Depending on your needs, you can erase the user s name to only keep the text Enter the password of. If it is not erased, SSO will only be enabled for the user connected during this detection session.
23 Getting Started with SSOWatch 4. Fill in the Actions tab as follows: All the fields are already pre-configured for Lotus Notes, and you would normally not have anything further to do. However, to show you how it works, we will describe how to configure the window manually. a) Using the upper small target icon, select the field containing the text Enter the password of, as you did during the detection configuration. The text in the following field is automatically updated. b) In this field, select the Lotus Notes identifier (First name/last name/ Unit/Organization) and click the button. c) Using the second small target icon, select the field where the password will have to be entered. d) Using the last small target icon select the OK button. 5. Click OK. The Notes Logon Window object appears under the Lotus Notes Application object. 6. See Section 3.2.3, Saving the Configuration. 21
24 Quest Enterprise SSO Saving the Configuration Subject Once you have saved your configuration, SSOWatch can detect the window you have just configured, as explained in the following procedure. Procedure 1. Click the (Save) button located in the SSOStudio toolbar. The following window appears: 2. Click Yes. The SSOWatch Security Data Collect windows appears. 3. Fill in this window as follows and click OK: Lotus Notes starts automatically. SSOWatch is now configured to detect and automatically fill in your Lotus Notes authentication window. If you mistyped the user name or password in the above window, the application does not start. In this case, you need to modify the credentials for the application, as explained in Section , Change Password. 22
25 Getting Started with SSOWatch Why does the Security Data Collect window appear? At this step of the procedure, the SSOWatch Engine is running, and your Lotus Notes authentication window is still displayed. Although SSOWatch can detect the window it cannot fill it in, as you have not provided your authentication information yet. That is the reason why the Security Data Collect window appears: the first time you start a declared application, SSOWatch requests your user name and password. This data is stored in a secure way by SSOWatch, so it will be able to reuse it afterwards, without requesting any new data. 3.3 Going Further There you are! You have configured and enabled your first SSO using SSOWatch Wizard and the SSOWatch SSOStudio Configuration Editor. Using the same steps and procedures, you can configure other types of application and authentication windows. The detection modes for other applications are different. For more details, see Enterprise SSO - SSOWatch Administrator Guide. 23
26 Quest Enterprise SSO Using SSOWatch Engine This section describes SSOWatch from the user point of view. This covers basic SSO operations: SSO data collection, and SSO engine management. 4.1 Session Opening If you have installed SSOWatch as described in Section 2, Installing SSOWatch, the SSOWatch engine starts automatically when you open a session. Otherwise, SSOWatch may prompt you to authenticate through the following window: Once the engine is started, an icon is displayed in the Windows notification area: This indicates that the SSO engine is running. 24
27 Getting Started with SSOWatch 4.2 SSO Data Collection First Start of an SSO enabled application During its standard utilization, SSOWatch is almost invisible to the user. However, when it starts for the first time, or when some particular events occur such as password update requests, you will have to provide some information. At the first launch of an SSO enabled application, when the application requests the user s authentication, the SSOWatch collect window appears in foreground (the application is temporarily disabled) and requests the user name and password for the application: Simply provide your usual user name for this application, your password (and confirm it to avoid mistype errors), and validate by clicking the OK button. This data will be stored in a secured way by SSOWatch so it will be able to reuse it afterwards, without requesting any new data. It has enabled the Single Sign-On function. 25
28 Quest Enterprise SSO Password Update Request When an SSO enabled application asks for password update, this request is intercepted by SSOWatch, which displays the following window: Simply type in a new password (and confirm it to avoid mistype errors) and validate it by clicking the OK button. This data will be updated and securely stored in the security database, by SSOWatch, so that it will be able to reuse it afterwards, without requesting any new data. 4.3 Displaying the SSOWatch Engine Popup Menu Subject The SSOWatch Engine popup menu allows you to control the SSOWatch Engine. This popup menu is associated with the SSOWatch Engine taskbar icon: 26
29 Getting Started with SSOWatch From this popup menu, you can: Emergency Access: Initialize your primary password or PIN code reset (Emergency Access). This feature runs only with the LDAP configuration storage mode, as described in Section 4.7, Initializing the Emergency Access. Biometric Enrollment: Enroll your biometric data using the biometrics scan wizard (a biometric authentication device must be installed on your computer). For more information, see Enterprise SSO Advanced Login for Windows User Guide. Open the management module of SSOWatch: SSOEngine. Add application: Enable SSO applications with SSOWatch Wizard. Open SSOStudio to add an application with SSOStudio, as described in Section 3, Configuring SSOWatch to Enable Single Sign-On A Step by Step Tutorial. Suspend and Activate the SSOWatch Engine. Reset the configuration. Exit SSOWatch: Stop the SSO Engine. Procedure To display this popup menu, right-click the SSOWatch Engine icon in the taskbar. Double-clicking the SSOWatch Engine icon performs the default action (in bold): Open. 4.4 The SSOWatch Engine Management Module The administration module of SSOEngine provides the following functions: Managing the SSOWatch Engine. Management of user accounts. 27
30 Quest Enterprise SSO Opening the SSOWatch Engine Management Module Procedure 1. To open the SSOWatch engine management module, right click the SSOWatch icon in the taskbar, and click Open, or simply double-click the SSOWatch icon itself. The following window appears: 2. Do one of the following: To manage your accounts, click the button: see Section 4.4.2, User Account Management. To manage the SSO Engine, click the button: see Section 4.5, Activating, Suspending, Resetting the SSOWatch Engine. 28
31 Getting Started with SSOWatch User Account Management You can see (and update) your user accounts using the User accounts option in the SSOEngine module by clicking on the icon in the SSOWatch Engine management module Change Password The button allows you to change your password for the selected account, but only in the security database: the password is not changed in the security base of the target application. This action can be used to manually deal with BadPasswords. This option may be disabled in the configuration file or with a centralized parameter New Account The button allows you to create a new account for the selected application. When you create an account, you enter security information associated with this account. This operation will be done automatically for the first account defined in the configuration (for an application). User Roles If you have defined several accounts, you will have to manually create the other accounts, through the user account management interface. This is designed for those users who have a number of accounts on the same application(s). An account name designates a role. If a role is shown in the text box of the SSOEngine screen, the corresponding SSO applications will be launched using the security data associated with this role. 29
32 Quest Enterprise SSO If no role has been selected for multiple account applications, you will be prompted to choose an account on connection Delete Account The button allows you to delete security information (user name, password and optional parameters) associated with an account. If many accounts are associated with an application, the account line will be deleted. If you delete the only remaining account, <not registered> will be displayed in place of the user name Show Password The button allows the owner of an account to see the password associated with the account. Using this feature always requires the user to authenticate Delegate Account The icon is only available if you use SSOWatch in standalone and LDAP storage mode. It allows the owner of an account to delegate access to other users Hide Applications without Credentials This option is available by right-clicking an account. It allows you to display only the applications for which you have an account Enable/Disable an Application or all Applications This command is available by right-clicking an account. It allows you to deactivate (and activate again) the SSO function for the specified application. 4.5 Activating, Suspending, Resetting the SSOWatch Engine Subject The Suspend, Activate, Reset Configuration commands allow you to manage the SSOWatch Engine. You can use this commands either from the SSOWatch engine popup menu, or through the SSOWatch management module, using the Home button. 30
33 Getting Started with SSOWatch The Suspend command allows you to suspend the use of SSO. When suspended, the SSOWatch engine does not carry out single sign-on. You can prevent the user from disabling the SSO engine through the configuration options. SSOWatch Engine automatically suspends itself when the smart card or USB key used for authentication is removed. The Reset Configuration command allows you to load the modifications performed in your SSOWatch configuration file and reset the applications and windows states (those windows and applications which have been disabled will be reactivated).you can use this menu when the engine is running or when it is suspended. Once the reset action is complete, the SSO Engine will be in a running state. The Activate command allows you to resume the SSOWatch Engine and enable again the use of SSO. Procedure To suspend the SSOWatch engine, right-click the SSOWatch engine icon and select Suspend. The SSOWatch engine icon changes to. To activate the SSOWatch engine, right-click the SSOWatch engine icon and select Activate. The SSOWatch engine icon changes to. To reset the SSOWatch engine configuration, right-click the SSOWatch engine icon and select Reset Configuration. If your SSOWatch engine was suspended, its icon changes to. 31
34 Quest Enterprise SSO Exiting SSOWatch To exit SSOWatch, right-click the SSOWatch engine icon and select Exit SSOWatch. The SSOWatch engine icon disappears and single sign-on is disabled. The Exit SSOWatch command can be disabled through the configuration file. 4.7 Initializing the Emergency Access Subject The Emergency Access feature allows you to reset your password or your PIN code in case you lost or forgot it. Initializing the Emergency Access feature consists in choosing a set of questions and recording the associated answers (if you want to reset your password or PIN code, you will have to answer the question you have chosen). This feature runs only with the LDAP configuration storage mode. To know your configuration storage mode, right-click the SSOWatch Engine icon (located on the taskbar), select About SSOWatch, and in the displayed window, check the value of the Configuration storage mode field. When the Emergency Access feature is enabled, you can define your questions (optional) and answers the first time that your SSOWatch engine is activated. Then you may need to modify this data in the following cases: The questions have changed, so you have to update your answers. You must enter your answers periodically. You want to change your questions/answers. Procedure 1. Right-click the SSOWatch icon located in the notification area, and select Emergency Access. The Authentication window appears. 2. Enter your ID and Password and click OK. The Emergency Access wizard appears. 3. Follow the displayed instructions. You may have restrictions to define your questions/answers, as for example a minimum/maximum number of characters, words that you cannot use If you do not know why your questions/answers are not accepted, contact your Enterprise SSO administrator. 32
35 4.8 Using the Reset Password Feature Getting Started with SSOWatch Importing the Enterprise SSO Sample Certification Authority (First-Time Use) Subject To avoid Security Alert messages when connecting to the Reset Password portal, you must import the Sample Certification Authority (CA) in your Internet Explorer web browser, as explained in the following procedure. Procedure 1. Start Internet Explorer and enter in the address bar the URL corresponding to the Reset Password web server followed by /ca.crt (example: The following window appears: 2. Click Open, and in the displayed window, click Install Certificate. 3. Follow the instruction of the Import Certificate wizard. It is recommended to keep the default selected options. Just click the Next and Finish buttons to install the file. 4. Click OK to close the Certificate window. The Sample CA is imported Resetting Your Primary Password Subject This section describes how to securely reset your primary password from any workstation using Internet Explorer. If you can no longer log on any workstation, reset your primary password as explained in the following procedure. 33
36 Quest Enterprise SSO Before Starting The Emergency Access feature must be initialized: you must have chosen a set of questions and answers (see Section 4.7, Initializing the Emergency Access). Procedure 1. Start your Internet Explorer web browser and enter in the address bar the URL corresponding to the Reset Password web server (example: If you do not know this URL, contact your Enterprise SSO administrator. 2. In the displayed page, click the reset your primary password link. 3. Type your identifier and click the Submit button. The Password reinitialization page appears. 4. Answer each question, depending on the answers you gave while initializing the Password Reset functionality and type your new primary password twice. 5. Click the Submit button. After a certain number of wrong answers, the process may be blocked and you will not be able to try again. In this case, contact your Enterprise SSO administrator. You can now use your new password to connect to your workstation. 34
37 Getting Started with SSOWatch About Quest Software, Inc. Now more than ever, organizations need to work smart and improve efficiency. Quest Software creates and supports smart systems management products helping our customers solve everyday IT challenges faster and easier. Visit for more information. Contacting Quest Software Phone (United States and Canada) Mail Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA USA Web site Please refer to our Web site for regional and international office information. Contacting Quest Support Quest Support is available to customers who have a trial version of a Quest product or who have purchased a Quest product and have a valid maintenance contract. Quest Support provides unlimited 24x7 access to SupportLink, our self-service portal. Visit SupportLink at From SupportLink, you can do the following: Retrieve thousands of solutions from our online Knowledgebase Download the latest releases and service packs Create, update and review Support cases View the Global Support Guide for a detailed explanation of support programs, online services, contact information, and policy and procedures. The guide is available at: 35
Enterprise Single Sign-On 8.0.3
For Internal Use Only Enterprise Single Sign-On 8.0.3 Additional Dedicated Server Instance Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary
More informationEnterprise Single Sign-On 8.0.3 Installation and Configuration Guide
Enterprise Single Sign-On 8.0.3 Installation and Configuration Guide Dedicated Directory Replication Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains
More informationEnterprise Single Sign-On 8.0.3 User Guide
Enterprise Single Sign-On 8.0.3 User Guide Advanced Login for Windows Copyright 1998-2009 Quest Software and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary information protected
More information2007 Quest Software, Inc. ALL RIGHTS RESERVED. TRADEMARKS. Disclaimer
What s New 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationQuest Management Agent for Forefront Identity Manager
Quest Management Agent for Forefront Identity Manager Version 1.0 Administrator Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationEnterprise Single Sign-On 8.0.6. SSOWatch Administrator Guide
Enterprise Single Sign-On 8.0.6 SSOWatch Administrator Guide 2013 Quest Software, Inc. and/or its Licensors ALL RIGHTS RESERVED. This publication contains proprietary information protected by copyright.
More information10.2. Auditing Cisco PIX Firewall with Quest InTrust
10.2 Auditing Cisco PIX Firewall with Quest InTrust 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationQuest Site Administrator 4.4
Quest Site Administrator 4.4 for SharePoint Product Overview 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information, which is protected by copyright. The software described
More informationFOR WINDOWS FILE SERVERS
Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
More informationQuest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide
Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described
More information8.0. Quick Start Guide
8.0 Quick Start Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
More informationDefender Delegated Administration. User Guide
Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationQuest Site Administrator 4.4
Quest Site Administrator 4.4 for SharePoint Quick Start Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information, which is protected by copyright. The software described
More information2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions
4.9 Evaluator Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
More informationFoglight 5.5.4.5 for SQL Server
Foglight 5.5.4.5 for SQL Server Managing SQL Server Database Systems 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationDirect Migration from SharePoint 2003 to SharePoint 2010
Direct Migration from SharePoint 2003 to SharePoint 2010 It s Easy with Quest Migration Manager for SharePoint Written By Alexander Kirillov, Quest Software TECHNICAL BRIEF 2010 Quest Software, Inc. ALL
More informationAn Introduction to Toad Extension for Visual Studio. Written By Thomas Klughardt Systems Consultant Quest Software, Inc.
An Introduction to Toad Extension for Visual Studio Written By Thomas Klughardt Systems Consultant Quest Software, Inc. Contents Introduction... 2 Installation... 3 Creating Projects... 4 Working with
More informationQuest ChangeAuditor 4.8
Quest ChangeAuditor 4.8 Migration Guide Copyright Quest Software, Inc. 2009. All rights reserved. This guide contains proprietary information protected by copyright. The software described in this guide
More information8.7. Resource Kit User Guide
8.7 Resource Kit User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document is furnished under
More informationQuick Connect Express for Active Directory
Quick Connect Express for Active Directory Version 5.2 Quick Start Guide 2012 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More information4.0. Offline Folder Wizard. User Guide
4.0 Offline Folder Wizard User Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this
More informationformerly Help Desk Authority 9.1.3 Upgrade Guide
formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com
More informationformerly Help Desk Authority 9.1.3 HDAccess Administrator Guide
formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656
More informationDefender 5.7. Remote Access User Guide
Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationFoglight. Foglight for Virtualization, Free Edition 6.5.2. Installation and Configuration Guide
Foglight Foglight for Virtualization, Free Edition 6.5.2 Installation and Configuration Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationFoglight for Oracle. Managing Oracle Database Systems Getting Started Guide
Foglight for Oracle Managing Oracle Database Systems Getting Started Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationDell Spotlight on Active Directory 6.8.3. Server Health Wizard Configuration Guide
Dell Spotlight on Active Directory 6.8.3 Server Health Wizard Configuration Guide 2013 Dell Software Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More information7.5 7.5. Spotlight on Messaging. Evaluator s Guide
7.5 Spotlight on Messaging 7.5 Evaluator s Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationQuest ChangeAuditor 5.0. For Windows File Servers. Events Reference
Quest ChangeAuditor For Windows File Servers 5.0 Events Reference 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationFoglight 5.6.4. Managing SQL Server Database Systems Getting Started Guide. for SQL Server
Foglight for SQL Server 5.6.4 Managing SQL Server Database Systems Getting Started Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More information6.7. Quick Start Guide
6.7 Quick Start Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
More informationChangeAuditor 6.0. Web Client User Guide
ChangeAuditor 6.0 Web Client User Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationFoglight 5.6.5.2. Managing SQL Server Database Systems Getting Started Guide. for SQL Server
Foglight for SQL Server 5.6.5.2 Managing SQL Server Database Systems Getting Started Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationFoglight. Foglight for Virtualization, Enterprise Edition 7.2. Virtual Appliance Installation and Setup Guide
Foglight Foglight for Virtualization, Enterprise Edition 7.2 Virtual Appliance Installation and Setup Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected
More informationformerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual
formerly Help Desk Authority 9.1.2 Quest Free Network Tools User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo,
More information2.0. Quick Start Guide
2.0 Quick Start Guide Copyright Quest Software, Inc. 2007. All rights reserved. This guide contains proprietary information, which is protected by copyright. The software described in this guide is furnished
More informationQuest SQL Optimizer 6.5. for SQL Server. Installation Guide
Quest SQL Optimizer for SQL Server 6.5 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More information8.7. Target Exchange 2010 Environment Preparation
8.7 Target Exchange 2010 Environment Preparation 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. The software described in this document
More informationSecure and Efficient Log Management with Quest OnDemand
Secure and Efficient Log Management with Quest OnDemand TECHNICAL BRIEF 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of
More informationTaking Unix Identity and Access Management to the Next Level
Taking Unix Identity and Access Management to the Next Level Now that you ve taken care of local users and groups what s next? Written by Quest Software, Inc. TECHNICAL BRIEF 2010 Quest Software, Inc.
More informationFoglight. Dashboard Support Guide
Foglight Dashboard Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationActiveRoles 6.8. Web Interface User Guide
ActiveRoles 6.8 Web Interface User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationFoglight 1.0.0.0. Cartridge for Active Directory Installation Guide
Foglight 1.0.0.0 Cartridge for Active Directory Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationWeb Portal Installation Guide 5.0
Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationGo Beyond Basic Up/Down Monitoring
Go Beyond Basic Up/Down Monitoring Extending the Value of SCOM with Spotlight on SQL Server Enterprise and Foglight Performance Analysis for SQL Server Introduction Microsoft Systems Center Operations
More informationDell Statistica Document Management System (SDMS) Installation Instructions
Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationDell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
More informationQuest Privilege Manager Console 1.1.1. Installation and Configuration Guide
Quest Privilege Manager Console 1.1.1 Installation and Configuration Guide 2008 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationformerly Help Desk Authority 9.1.3 HDAccess User Manual
formerly Help Desk Authority 9.1.3 HDAccess User Manual 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA
More informationChangeAuditor 5.6. For Windows File Servers Event Reference Guide
ChangeAuditor 5.6 For Windows File Servers Event Reference Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationQuick Connect for Cloud Services
Quick Connect for Cloud Services Version 3.5 Administrator Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationFoglight 5.2.0. Foglight Experience Viewer (FxV) Upgrade Field Guide
Foglight 5.2.0 Foglight Experience Viewer (FxV) 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
More information6.5. Web Interface. User Guide
6.5 Web Interface User Guide 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a
More informationDell InTrust 11.0. Preparing for Auditing Microsoft SQL Server
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationQuest Collaboration Services 3.5. How it Works Guide
Quest Collaboration Services 3.5 How it Works Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationFoglight. Managing Java EE Systems Supported Platforms and Servers Guide
Foglight Managing Java EE Systems Supported Platforms and Servers Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationSystem Requirements and Platform Support Guide
Foglight 5.6.7 System Requirements and Platform Support Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationSpotlight Management Pack for SCOM
Spotlight Management Pack for SCOM User Guide January 2015 The is used to display data from alarms raised by Spotlight on SQL Server Enterprise in SCOM (System Center Operations Manager). About System
More informationChangeAuditor 6.0 For Windows File Servers. Event Reference Guide
ChangeAuditor 6.0 For Windows File Servers Event Reference Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationQuest Migration Manager 3.2
Quest Migration Manager 3.2 for SharePoint User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information, which is protected by copyright. The software described
More information2010 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Third Party Contributions
4.9 User Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More information6.7. Replication: Best Practices and Troubleshooting
6.7 Replication: Best Practices and Troubleshooting 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More information2009 Quest Software, Inc. ALL RIGHTS RESERVED. Trademarks. Disclaimer
6.5 User Guide 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationQuest Collaboration Services 3.6.1. How it Works Guide
Quest Collaboration Services 3.6.1 How it Works Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationFoglight 5.5.5. Managing Microsoft Active Directory Installation Guide
Foglight 5.5.5 Managing Microsoft Active Directory 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationEight Best Practices for Identity and Access Management
Eight Best Practices for Identity and Access Management BUSINESS BRIEF 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright. No part of this
More informationformerly Help Desk Authority 9.1.2 Quick Start Guide
formerly Help Desk Authority 9.1.2 Quick Start Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com
More informationHow to Use Custom Site Templates and Definitions supporting Corporate look-and-feel
l 10.3 1.0 Installation Auditing and Configuration Microsoft ISA Server Guide How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel 2010 Quest Software, Inc. ALL RIGHTS RESERVED.
More informationDeployment Guide 6.7
Deployment Guide 6.7 2007 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
More information6.0. Planning for Capacity in Virtual Environments Reference Guide
6.0 Planning for Capacity in Virtual Environments 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationHow to Use Custom Site Templates and Definitions supporting Corporate look-and-feel
l 10.3 1.0 Auditing Installation and and Monitoring Configuration Microsoft Guide IIS How to Use Custom Site Templates and Definitions supporting Corporate look-and-feel 2010 Quest Software, Inc. ALL RIGHTS
More informationQuest One Password Manager
Quest One Password Manager Version 5.0 Administrator Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this
More informationSecurity Analytics Engine 1.0. Help Desk User Guide
2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More informationDell Unified Communications Command Suite - Diagnostics 8.0. Data Recorder User Guide
Dell Unified Communications Command Suite - Diagnostics 8.0 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationScriptLogic Desktop Authority Password Self-Service version 4.6 Quick Start Guide
ScriptLogic Desktop Authority Password Self-Service version 4.6 Quick Start Guide Password Self-Service 4 ii 2010 Quest Software, Inc. ALL RIGHTS RESERVED. Licensed to ScriptLogic Corporation This guide
More informationUsing Stat with Custom Applications
Using Stat with Custom Applications Written by Quest Software Inc. TECHNICAL BRIEF 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information protected by copyright.
More informationMigrating Your Applications to the Cloud
Migrating Your Applications to the Cloud How to Overcome the Challenges and Reduce the Costs Written By Quest Software, Inc. Contents Abstract... 2 Introduction... 3 What is the Cloud?... 3 Current and
More informationDell Recovery Manager for Active Directory 8.6. Quick Start Guide
Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationScriptLogic Desktop Authority Password Self-Service version 4.7 Administrator Guide
ScriptLogic Desktop Authority Password Self-Service version 4.7 Administrator Guide Password Self-Service 4.7 Administrator Guide ii 2010 Quest Software, Inc. ALL RIGHTS RESERVED. Licensed to ScriptLogic
More informationSecurity Explorer 9.5. User Guide
2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.
More information4.7. Administrator Guide
4.7 Administrator Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software
More informationFoglight. Managing Hyper-V Systems User and Reference Guide
Foglight Managing Hyper-V Systems User and Reference Guide 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this
More informationIntroduction to Version Control in
Introduction to Version Control in In you can use Version Control to work with different versions of database objects and to keep the database updated. You can review, manage, compare, and revert to any
More informationAbout Recovery Manager for Active
Dell Recovery Manager for Active Directory 8.6.1 May 30, 2014 These release notes provide information about the Dell Recovery Manager for Active Directory release. About Resolved issues Known issues System
More informationDell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
More informationToad for Oracle Compatibility with Windows 7 Revealed
Toad for Oracle Compatibility with Windows 7 Revealed Written by John Pocknell Quest Software TECHNICAL BRIEF Contents Contents... 1 Abstract... 2 Introduction... 3 Testing... 4 Possible Issues... 5 Issue
More information8.0. Forest Edition. Deployment Guide
8.0 Forest Edition Deployment Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationHow Password Lifecycle Management Can Save Money and Improve Security
How Password Lifecycle Management Can Save Money and Improve Security by Don Jones Quest Software, Inc. WHITE PAPER 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary information
More informationActiveRoles 6.9. Replication: Best Practices and Troubleshooting
ActiveRoles 6.9 Replication: Best Practices and Troubleshooting 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationDell Statistica. Statistica Document Management System (SDMS) Requirements
Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationUsing Self Certified SSL Certificates. Paul Fisher. Quest Software. Systems Consultant. Desktop Virtualisation Group
Using Self Certified SSL Certificates Paul Fisher Systems Consultant paul.fisher@quest.com Quest Software Desktop Virtualisation Group Quest Software (UK) Limited Ascot House Maidenhead Office Park Westacott
More informationActiveRoles 6.9. Quick Start Guide
ActiveRoles 6.9 Quick Start Guide 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationAvePoint CallAssist 3.2.5 for Microsoft Dynamics CRM. Installation and Configuration Guide
AvePoint CallAssist 3.2.5 for Microsoft Dynamics CRM Installation and Configuration Guide Revision K Issued November 2014 Table of Contents Overview... 4 Prerequisites... 5 Environment Requirements...
More informationTroubleshooting Guide 5.1. Quest Workspace ChangeBASE
Troubleshooting Guide 5.1 Quest Workspace ChangeBASE [Type text] 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationDell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
More informationDATA GOVERNANCE EDITION
Quest One Identity Manager DATA GOVERNANCE EDITION 6.1 What s New 2013 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 9.0 Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book is furnished under a
More informationSymantec Enterprise Vault
Symantec Enterprise Vault Guide for Microsoft Outlook 2003/2007 Users 10.0 Full Outlook Add-In Symantec Enterprise Vault: Guide for Microsoft Outlook 2003/2007 Users The software described in this book
More information