White Paper March 1, Integrating AR System with Single Sign-On (SSO) authentication systems

Size: px
Start display at page:

Download "White Paper March 1, 2005. Integrating AR System with Single Sign-On (SSO) authentication systems"

Transcription

1 White Paper March 1, 2005 Integrating AR System with Single Sign-On (SSO) authentication systems

2 Copyright 2005 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names, BMC Software, the BMC Software logos, and all other BMC Software product or service names, are registered trademarks or trademarks of BMC Software, Inc. All other trademarks belong to their respective companies. BMC Software, Inc., considers information included in this documentation to be proprietary and confidential. Your use of this information is subject to the terms and conditions of the applicable end user license agreement or nondisclosure agreement for the product and the proprietary and restricted rights notices included in this documentation. For license information about the OpenSource files used in the licensed program, please read OpenSourceLicenses.pdf. This file is in the \Doc folder of the distribution CD-ROM and in the documentation download portion of the Remedy Electronic Software Distribution (ESD). Restricted Rights Legend U.S. Government Restricted Rights to Computer Software. UNPUBLISHED -- RIGHTS RESERVED UNDER THE COPYRIGHT LAWS OF THE UNITED STATES. Use, duplication, or disclosure of any data and computer software by the U.S. Government is subject to restrictions, as applicable, set forth in FAR Section , DFARS , DFARS , DFARS , and DFARS , as amended from time to time. Contractor/Manufacturer is BMC Software, Inc., 2101 CityWest Blvd., Houston, TX , USA. Any contract notices should be sent to this address. Contacting Us If you need technical support for this product, contact Customer Support by at If you have comments or suggestions about this documentation, contact Information Development by at This edition applies to version 6.3 of the licensed program. BMC Software, Inc.

3 White Paper Integrating AR System with Single Sign- On authentication systems This white paper describes the architectural overview and the integration of the Action Request System 6.3 into an SSO environment. This paper contains the following sections:! Introduction to single sign-on (page 4)! SSO architecture (page 4)! Remedy mid tier implementation (page 9)! AREA plug-in implementation (page 16) Integrating AR System with Single Sign-On authentication systems! 3

4 White Paper Introduction to single sign-on SSO architecture The Remedy Mid Tier now supports integration with Single Sign-On (SSO) for web environments. This feature means that, after the mid tier is integrated with an SSO environment, the user needs only to sign in one time using a web browser and is then authenticated to access all the web applications within a configured domain, including the mid tier as one of the deployed web applications. Because each SSO environment varies greatly and there are few applicable standards for SSO, the SSO integration of the mid tier can be complicated. This document describes how to integrate the AR System with an SSO environment. For this discussion, we assume that the user is familiar with the basic AR System architecture, and for the implementation portion, we assume that the reader is familiar with the Java and C API for writing an AR System client. (For more information, see the Action Request System C API Reference Guide.) The AR System consists of a two-tiered client/server architecture with Remedy User acting as the client and the AR System Server acting as the server. Extending this to the web environment, consider the mid tier as a meta- Remedy User; that is, the mid tier is a single Remedy User with the ability to support multiple users at the same time. The mid tier behaves as described in the following sequence: 1 The mid tier presents a login page to the user if no session is established yet for this user. 2 After the user is logged on, the mid tier creates a session associated with this user containing, minimally, the user s credentials. (Other information would include locale, and so on.) 3 For each request placed by the user after a session is established, the mid tier makes a request on the user s behalf to an AR System server, supplying the request with the credentials as retrieved from the associated user session. 4 The mid tier places the request with the AR System server through the normal RPC channel. 4 "Integrating AR System with Single Sign-On authentication systems

5 Integrating AR System with Single Sign-On authentication systems The AR System does not distinguish a request made by the mid tier from that of Remedy User. Therefore, you treat the mid tier as a normal AR System client such as the Remedy User. In an SSO environment, a web application used in a configured SSO domain gives control of the authentication process to the SSO service. In other words, the deployed web application no longer performs its own user authentication; instead, the SSO service does the user authentication for it. In exchange for giving up this control, the SSO service guarantees that an SSO token is always paired with each request when the request reaches the deployed application within the configured SSO domain. The token is then retrieved and exchanged for the user s credentials by the application. You must use some type of centralized identity service running with the SSO service (1) for the SSO service to authenticate the user against the identity service and (2) for the web application at a post-authentication time to make the exchange of the SSO token for the user credentials. Request-response sequence in an SSO environment Figure 1-1 shows a typical sequence of interaction for a user request in an SSO environment. Depending on the SSO environment, a variation of the sequence shown might take place. Tip: Substitute the proxy server with a servlet filter or some type of a web agent deployed in the web-server. SSO architecture! 5

6 White Paper Figure 1-1: Request-response in an SSO environment A user request in an SSO environment carries out the following sequence of interactions: 1 The user requests a resource from a web application deployed in an SSO environment. 2 If the user has not logged in with the SSO service, the proxy server intercepts the request and routes it to the SSO service. 3 The SSO service challenges the user for his credentials by presenting a login page. 4 The user submits his credentials to the SSO service. 5 The SSO service uses the centralized identity service to authenticate the user. 6 After successful authentication, the SSO service routes the request back to the proxy server, embedding some type of SSO token (specific to the protocol used) in the request. 7 The proxy server detects the SSO token in the request (indicating that the user has been authenticated) and routes the original request (now paired with the SSO token) to the web application. 6 "Integrating AR System with Single Sign-On authentication systems

7 Integrating AR System with Single Sign-On authentication systems 8 The web application extracts the SSO token from the request and exchanges it with the identity service for the user credentials. 9 The identity service returns the user credentials to the web application. 10 The web application applies the user credentials to the request and returns the appropriate requested resource. Request-response for an AR System integrated with SSO environment Unlike a normal web application where the authentication and authorization process can be centralized to a single tier, the AR System's authentication and authorization process must start at the mid tier but is ultimately performed by the AR System server. For that reason, the mid tier, an AR System client, needs to delegate the exchange of the SSO token for the user credentials to the AR System server. Thus, the AR System client must pass this token to the AR System server in such a way that it signals the AR System server to invoke the AREA plug-in to use the token to verify that user authentication has been performed, and then exchange this token for the user credentials to perform the authorization process. The AR System server architecture isolates the authentication and authorization process to an AREA plug-in if the authentication and authorization process requires extending. The integrator of the AR System with the SSO environment must implement this AREA plug-in module to supplement the implementation of the custom authenticator (see The authenticator API on page 10) in the mid tier to provide a complete SSO solution. SSO architecture! 7

8 White Paper This sequence is illustrated in Figure 1-2. Figure 1-2: Request-response for an AR System integrated with SSO environment The AR System integrated with the SSO environment carries out the following sequence of request-response interactions: 1 The user requests a resource from the mid tier application deployed in an SSO environment. 2 If the user has not logged in with the SSO service, the proxy server intercepts the request and routes it to the SSO service. 3 The SSO service challenges the user for the credentials by presenting a login page. 4 The user submits the credentials to the SSO service. 5 The SSO service uses the identity service to authenticate the user. 6 After successful authentication, the SSO service routes the request back to the proxy server. 7 The proxy server detects the SSO token in the request (indicating that the user has been authenticated) and routes the original request to the mid tier application. 8 The mid tier constructs a request on behalf of the user and forwards it to the AR System server with the SSO token. 8 "Integrating AR System with Single Sign-On authentication systems

9 Integrating AR System with Single Sign-On authentication systems 9 The AR System server calls the AREA plug-in with the SSO token. 10 The AREA plug-in verifies that the user has been authenticated and exchanges the SSO token for the user credentials with the identity service. 11 The identity service returns the user credentials to the AREA plug-in. 12 The AREA plug-in forwards the user credentials to the AR System server. 13 The AR System server applies the user credentials to the request and returns the result to the mid tier. 14 The mid tier returns the response to the user. Note: The previous sequence is very detailed; some deployments might combine more than one service. For brevity, a caching strategy to optimize performance is not included in the diagram. Remedy mid tier implementation Integrating the 6.3 mid tier into an SSO environment requires two implementations and the proper configuration of the implemented pieces:! An implementation of the com.remedy.arsys.session.authenticator interface for the mid tier! An implementation of the AREA plug-in for the AR System server to supplement the implementation in the previous bullet! The configuration of the pieces implemented in the two previous bullets as described in Instantiation on page 11 Remedy mid tier implementation! 9

10 White Paper The authenticator API Figure 1-3 shows the class diagram for the authenticator interface. The com.remedy.arsys.sso.oracleauthenticator is packed in the midtier.jar file in a standard installation. Figure 1-3: Authenticator interface The authenticator interface is given by: public interface Authenticator { public void init(map config) public void destroy() publicusercredentials getauthenticatedcredentials (HttpServletRequest request, HttpServletResponse response) throws IOException; } where UserCredentials is a data-object class with the following constructor: public UserCredentials(String user, String password, String authenticationstr) The getauthenticatedcredentials() method throws IOException to simplify the support of the methods of the classes HttpServetRequest and HttpServletResponse. 10 "Integrating AR System with Single Sign-On authentication systems

11 Integrating AR System with Single Sign-On authentication systems Method responsibilities In the default configuration of the mid tier, an instance of the com.remedy.arsys.session.defaultauthenticator class will perform the login and authentication. If the mid tier is configured for SSO, the CustomAuthenticator extracts the user credentials from the request in a way that is specific to the SSO system in use. The mid tier sends the retrieved credentials to the AR System server using one of the following mechanisms:! Cross-reference blank password! The Authenticate Unregistered User in the AR System to invoke an AREA plug-in to validate the user s credentials with the identity management server provided by the SSO system. Both of these mechanisms are configured using Remedy Administrator. The AREA plug-in must be matched with the correct authenticator object during configuration because the plug-in and the object must be synchronized to perform the authentication/authorization as a complete SSO solution. The Java methods used with the authenticator are responsible for instantiating, initializing, and destructing the authenticator object. Instantiation Note: You can instantiate only one authenticator for the life of the mid tier execution. When the mid tier web application is initialized, it uses reflection to instantiate an instance of the authenticator. The fully qualified name of the class implementing this interface must be specified in the config.properties file under the entry arsystem.authenticator. For example: arsystem.authenticator=com.remedy.arsys.session.defaultauthenticator In a normal deployment, the config.properties file is found in the WEB_INF/ classes directory. Remedy mid tier implementation! 11

12 White Paper In the previous example, the DefaultAuthenticator is the authenticator that provides normal authentication services when the mid tier is deployed in a non-sso environment. This is the authenticator the mid tier defaults to if the configured authenticator fails. Initialization and destruction init() After the mid tier instantiates an instance of the authenticator using reflection, it builds an object of type java.util.properties using the properties specified in the file indicated by the entry arsystem.authenticator.config.file in the config.properties file. (This is a map of the name-value order pairs provided by the content of the file.) For example: arsystem.authenticator.config.file=myauthenticator.properties In a normal deployment, the property file myauthenticator.properties, used in the example, must be in the same directory as the file config.properties, for example, in WEB-INF/classes. If there is no entry for the authenticator init file in the config.properties file or if it is not possible for the mid tier to locate or open the file given by the arsystem.authenticator.config.file entry, it creates an empty properties object. This object is then passed into the init() method. In summary, any initialization of the authenticator should be done inside the init() method; if any of the parameters that can be externalized are needed during the authenticator initialization process, they should be placed in a separate file. The file name must be registered in the config.properties file under the entry arsystem.authenticator.config.file. destroy() When the mid tier is being unloaded from the application server, it calls the destroy() method of the authenticator. As a result, any clean-up of resource usage should be done here. Figure 1-4 describes the sequence for the initialization and destruction of the authenticator. 12 "Integrating AR System with Single Sign-On authentication systems

13 Integrating AR System with Single Sign-On authentication systems Figure 1-4: Init() and destroy() sequence Main authenticator implementation The main implementation of the authenticator takes place inside the getusercredentials() method. The implementation of this method is divided into two cases, depending on the SSO environment configuration.! In the case where the mid tier is deployed behind a proxy (that is, the mid tier is deployed in an SSO environment where each request that reaches the mid tier is guaranteed to have been authenticated), the method getusercredentials() is called only when the mid tier needs to retrieve the user credentials in order to establish a session for the user. Here, the method must return the UserCredentials object. The object s value is used to establish a session for the user, and then it is wrapped and passed, as is, to the AR System server when the mid tier constructs a request on behalf of the user. If the returned UserCredentials object is in an invalid format (for example, missing the user name), the mid tier will default to the DefaultAuthenticator, the normal login mechanism of the mid tier. Remedy mid tier implementation! 13

14 White Paper In summary, if the mid tier is deployed behind a proxy, guaranteeing that any request reaching the mid tier has been authenticated, then the getusercredentials() method s responsibility is to extract the user credentials that are specific to the protocol of the SSO environment from the request, construct a UserCredentials object, and return this object as the return value.! In the case where the mid tier is not deployed behind a proxy (that is, the mid tier is deployed in such a way that it must route unauthenticated requests to a configured SSO service), it has the additional responsibility of routing the pre-session establishment requests to the SSO service. This is achieved by synchronizing the mid tier with the configured authenticator. Again, the mid tier will invoke the getusercredentials() method only when it needs to establish a session for the user. In the context of pre-session establishment, when the user request arrives, the mid tier calls the getusercredentials() method, passing both the HttpServletRequest and HttpServletResponse objects. At this point, the authenticator examines the HttpServletRequest object to see whether the SSO token is embedded inside the HttpServletRequest. (The embedding protocol is specific to the SSO environment.)! If yes, the method extracts the information, constructs a UserCredentials object, and returns this object as the return value.! If no, the method embeds the routing information to the SSO service in the HttpServletResponse object and returns null. When the mid tier receives null, it routes the HttpServletResponse object to the Servlet container so that the user request is redirected to the SSO service. After the SSO service has authenticated the user, it embeds the SSO token in the HttpServletRequest object, reconstructs the original request, and routes it back to the mid tier. At this point, the behavior is the same as described in the first case. 14 "Integrating AR System with Single Sign-On authentication systems

15 Integrating AR System with Single Sign-On authentication systems Remedy Mid Tier and getusercredentials() sequence Figure 1-5 shows the calling sequence for processing a user request the first time. (The sequence is for a deployment without a proxy server, the more complex implementation.) There are two cases:! Request with token After the user has authenticated with the SSO service and an SSO token is provided with the request.! Request without token Before the user has been authenticated with the SSO service and no SSO token is provided with the request. Figure 1-5: Request processing sequence for initial user request with no proxy Remedy mid tier implementation! 15

16 White Paper AREA plug-in implementation The architecture of the AR System server allows you to isolate the authentication/authorization process so that the authentication/ authorization can be extended to work with one or more external services. The system ships with an AREA plug-in specifically for an LDAP directory service. If the Identity Service for the SSO environment can be accessed using LDAP, this plug-in can be configured to work with the authenticator without modifications. For configuration issues, see the LDAP plug-in documentation. If the SSO environment does not allow this LDAP plug-in, then a custom AREA plug-in must be implemented. Implementation objectives The two goals of the implementation of the AREA plug-in are:! Coordinate with the authenticator (implemented for the mid tier) to receive the SSO token.! Use the SSO token to verify that authentication had taken place and then exchange the SSO token for the user credentials. The AREA plug-in API The AREA plug-in API consists of three C language callback functions, five plug-in lifecycle functions to be implemented, and one data structure in which to return results. Typically, a plug-in must be implemented for each authenticator implemented, corresponding to each SSO system for which integration with the AR System is to be provided. The C API can be found in Action Request System C API Reference Guide. For the first implementation objective, make sure that the AR System server is configured to use either the cross-reference blank password or the authenticate unregistered user functions, or both, of the AR System server. This causes the AR System server to invoke an AREA plug-in that validates the user s credentials with the Identity Management server. After that, depending on the SSO environment, the AREA plug-in must do the following: 1 Establish a connection to the Identity Service. 2 Verify that the user has been authenticated using the received SSO token. 16 "Integrating AR System with Single Sign-On authentication systems

17 Integrating AR System with Single Sign-On authentication systems 3 Retrieve the user credentials using the SSO token and return this as a structure required by the C API. Authentication chaining In previous releases of the AR System, you could configure one AREA plugin to extend the authentication/authorization process. This meant all AR System clients of an AR System server were subjected to an identical process of authentication/authorization, either internally or as configured using the external AREA plug-in. In some deployments, this behavior posed a support limitation for different AR System client types. For example, you may have wanted a single AR System server to service the mid tier using an external identity service, while servicing the Remedy User clients using the internal AR System authentication process. With the 6.3 release, the AR System now supports the following three options for extending the authentication/authorization process:! Cross-reference blank passwords! Authenticate unregistered users! Authentication chaining The first two options are as in pre-6.3 release. The third option provides a flexible configuration so that one AR System server can use different authentication/authorization processes to serve varying AR System client types. Authentication chaining allows the AR System server administrator to configure the behavior using a configuration file. The behaviors and their corresponding values are described in the following table: Behavior Corresponding values Use the default behavior as in pre-6.3 release 0 Use internal authentication first, then use external 1 authentication via the AREA plug-in Use external authentication by way of the AREA plug-in first, and then use internal authentication 2 AREA plug-in implementation! 17

18 White Paper If a single external AREA plug-in is insufficient, as in the case of multiple identity services, the AR System server administrator can configure the AR System server to use the AREA plug-in hub. (For more information, see the Installing AR System Guide.) The AREA plug-in hub provides a sequential chaining of one or more external AREA plug-ins. The chain then behaves as a single AREA plug-in. That is, when the AR System server invokes the AREA plug-in hub, each AREA plug-in configured in the chain is called in sequence until a first valid response is returned. 18 "Integrating AR System with Single Sign-On authentication systems

19

20 *65700* *65700* *65700* *65700* *65708*

White Paper BMC Remedy Action Request System Security

White Paper BMC Remedy Action Request System Security White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information

More information

CA Spectrum and CA Embedded Entitlements Manager

CA Spectrum and CA Embedded Entitlements Manager CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically

More information

BMC Remedy Action Request System 7.0 Configuring

BMC Remedy Action Request System 7.0 Configuring BMC Remedy Action Request System 7.0 Configuring May 2006 Part No: 58466 Copyright 1991 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names, BMC Software,

More information

Web Application Security Assessment and Vulnerability Mitigation Tests

Web Application Security Assessment and Vulnerability Mitigation Tests White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

PATROL Console Server and RTserver Getting Started

PATROL Console Server and RTserver Getting Started PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.

More information

White Paper August 2006. BMC Best Practice Process Flows for ITIL Change Management

White Paper August 2006. BMC Best Practice Process Flows for ITIL Change Management White Paper August 2006 BMC Best Practice Process Flows for ITIL Change Management Copyright 1991 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,

More information

BMC Remedy Action Request System 7.6.04 Configuration Guide

BMC Remedy Action Request System 7.6.04 Configuration Guide BMC Remedy Action Request System 7.6.04 Configuration Guide January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain

More information

SSO Plugin. Release notes. J System Solutions. http://www.javasystemsolutions.com Version 3.6

SSO Plugin. Release notes. J System Solutions. http://www.javasystemsolutions.com Version 3.6 SSO Plugin Release notes J System Solutions Version 3.6 JSS SSO Plugin v3.6 Release notes What's new... 3 Improved Integrated Windows Authentication... 3 BMC ITSM self service... 3 Improved BMC ITSM Incident

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

BMC Remedy IT Service Management Suite 7.6.04 Installing and Configuring Server Groups

BMC Remedy IT Service Management Suite 7.6.04 Installing and Configuring Server Groups BMC Remedy IT Service Management Suite 7.6.04 Installing and Configuring Server Groups January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From

More information

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft 5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft

More information

SSO Plugin. J System Solutions. Upgrading SSO Plugin 3x to 4x - BMC AR System & Mid Tier. http://www.javasystemsolutions.com

SSO Plugin. J System Solutions. Upgrading SSO Plugin 3x to 4x - BMC AR System & Mid Tier. http://www.javasystemsolutions.com SSO Plugin Upgrading SSO Plugin 3x to 4x - BMC AR System & Mid Tier J System Solutions JSS SSO Plugin Upgrading 3x to 4x Introduction... 3 [Prerequisite] Generate a new license... 4 [Prerequisite] Download

More information

BMC Service Request Management 7.6.04 User s Guide

BMC Service Request Management 7.6.04 User s Guide BMC Service Request Management 7.6.04 User s Guide January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information

More information

CONTROL-M/Enterprise Manager API Developer Guide

CONTROL-M/Enterprise Manager API Developer Guide CONTROL-M/Enterprise Manager API Developer Guide Supporting CONTROL-M/Enterprise Manager version 6.4.01 September 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.

More information

Knowledge Article Performance Comparison: BMC Remedy ITSM Incident Management version 7.5.00 Vs. 7.0.03 on Windows

Knowledge Article Performance Comparison: BMC Remedy ITSM Incident Management version 7.5.00 Vs. 7.0.03 on Windows Knowledge Article Performance Comparison: BMC Remedy ITSM Incident Management version 7.5.00 Vs. 7.0.03 on Windows April 2009 www.bmc.com Contacting BMC Software You can access the BMC Software website

More information

Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific

Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific Q: Is the challenge required or can pass through authentication be used with regard to automatic login after you login to your corporate domain? A: You can configure the system to pass on the challenge

More information

White Paper November 2006. BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management

White Paper November 2006. BMC Best Practice Process Flows for Asset Management and ITIL Configuration Management White Paper November 2006 BMC Best Practice Process Flows for Asset and ITIL Configuration Copyright 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service names,

More information

SAML Security Option White Paper

SAML Security Option White Paper Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions

More information

Copyright http://support.oracle.com/

Copyright http://support.oracle.com/ Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.

More information

Perceptive Experience Single Sign-On Solutions

Perceptive Experience Single Sign-On Solutions Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark

More information

BMC Remedy Action Request System 7.6.04 Integration Guide

BMC Remedy Action Request System 7.6.04 Integration Guide BMC Remedy Action Request System 7.6.04 Integration Guide January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain

More information

HP Software as a Service. Federated SSO Guide

HP Software as a Service. Federated SSO Guide HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying

More information

CA Technologies SiteMinder

CA Technologies SiteMinder CA Technologies SiteMinder Agent for Microsoft SharePoint r12.0 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to

More information

BMC Remedy IT Service Management 7.5.00 Concepts Guide

BMC Remedy IT Service Management 7.5.00 Concepts Guide BMC Remedy IT Service Management 7.5.00 Concepts Guide February 2009 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain

More information

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright

More information

Remedy IT Service Management 5.6 Installation and Configuration Guide

Remedy IT Service Management 5.6 Installation and Configuration Guide Remedy IT Service Management 5.6 Installation and Configuration Guide March 2004 Part No: ITSM-560-ICG-01 Copyright 2004 BMC Software, Inc. All rights reserved. Remedy, the Remedy logo, all other Remedy

More information

BMC Remedy Action Request System 7.0 Administering BMC Remedy Email Engine

BMC Remedy Action Request System 7.0 Administering BMC Remedy Email Engine BMC Remedy Action Request System 7.0 Administering BMC Remedy Email Engine May 2006 Part No: 58475 Copyright 2006 BMC Software, Inc. All rights reserved. BMC, the BMC logo, all other BMC product or service

More information

BMC BladeLogic Client Automation Installation Guide

BMC BladeLogic Client Automation Installation Guide BMC BladeLogic Client Automation Installation Guide Supporting BMC BladeLogic Client Automation 8.2.02 January 2013 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.

More information

Bentley CONNECT Dynamic Rights Management Service

Bentley CONNECT Dynamic Rights Management Service v1.0 Implementation Guide Last Updated: March 20, 2013 Table of Contents Notices...5 Chapter 1: Introduction to Management Service...7 Chapter 2: Configuring Bentley Dynamic Rights...9 Adding Role Services

More information

NetIQ Access Manager. Developer Kit 3.2. May 2012

NetIQ Access Manager. Developer Kit 3.2. May 2012 NetIQ Access Manager Developer Kit 3.2 May 2012 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A NON DISCLOSURE

More information

AGILEXRM REFERENCE ARCHITECTURE

AGILEXRM REFERENCE ARCHITECTURE AGILEXRM REFERENCE ARCHITECTURE 2012 AgilePoint, Inc. Table of Contents 1. Introduction 4 1.1 Disclaimer of warranty 4 1.2 AgileXRM components 5 1.3 Access from PES to AgileXRM Process Engine Database

More information

SchoolBooking SSO Integration Guide

SchoolBooking SSO Integration Guide SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,

More information

Web Applications Access Control Single Sign On

Web Applications Access Control Single Sign On Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,

More information

Intellicus Single Sign-on

Intellicus Single Sign-on Intellicus Single Sign-on Intellicus Enterprise Reporting and BI Platform Intellicus Technologies info@intellicus.com www.intellicus.com Copyright 2010 Intellicus Technologies This document and its content

More information

CA SiteMinder. Implementation Guide. r12.0 SP2

CA SiteMinder. Implementation Guide. r12.0 SP2 CA SiteMinder Implementation Guide r12.0 SP2 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for your informational purposes only

More information

HP Operations Orchestration Software

HP Operations Orchestration Software HP Operations Orchestration Software Software Version: 9.00 HP Business Availability Center Integration Document Release Date: June 2010 Software Release Date: June 2010 Legal Notices Warranty The only

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac) CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

CA Unified Infrastructure Management Server

CA Unified Infrastructure Management Server CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for

More information

CA Adapter. Installation and Configuration Guide for Windows. r2.2.9

CA Adapter. Installation and Configuration Guide for Windows. r2.2.9 CA Adapter Installation and Configuration Guide for Windows r2.2.9 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Building Secure Applications. James Tedrick

Building Secure Applications. James Tedrick Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS

More information

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices

More information

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website:

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

Single Sign On. SSO & ID Management for Web and Mobile Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing

More information

SSO Plugin. Troubleshooting. J System Solutions. http://www.javasystemsolutions.com Version 3.4

SSO Plugin. Troubleshooting. J System Solutions. http://www.javasystemsolutions.com Version 3.4 SSO Plugin Troubleshooting J System Solutions Version 3.4 Page 2 of 19 Troubleshooting...4 Mid Tier...4 The Mid Tier can not find the jss-sso.jar file...4 I'm using Windows Authentication. The plugin is

More information

BMC Impact Solutions Infrastructure Management Guide

BMC Impact Solutions Infrastructure Management Guide BMC Impact Solutions Infrastructure Management Guide Supporting BMC Impact Manager version 7.3 BMC Impact Administration Server 7.3 BMC Impact Explorer version 7.3 BMC Impact Portal version 7.3 February

More information

Swivel Multi-factor Authentication

Swivel Multi-factor Authentication Swivel Multi-factor Authentication White Paper Abstract Swivel is a flexible authentication solution that offers a wide range of authentication models. The use of the Swivel patented one-time code extraction

More information

HP Asset Manager. Implementing Single Sign On for Asset Manager Web 5.x. Legal Notices... 2. Introduction... 3. Using AM 5.20... 3

HP Asset Manager. Implementing Single Sign On for Asset Manager Web 5.x. Legal Notices... 2. Introduction... 3. Using AM 5.20... 3 HP Asset Manager Implementing Single Sign On for Asset Manager Web 5.x Legal Notices... 2 Introduction... 3 Using AM 5.20... 3 Using AM 5.12... 3 Design Blueprint... 3 Technical Design... 3 Requirements,

More information

BMC FootPrints Asset Core - Asset Discovery. Version 11.7

BMC FootPrints Asset Core - Asset Discovery. Version 11.7 BMC FootPrints Asset Core - Asset Discovery Version 11.7 Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1994-2013 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are

More information

Copyright: WhosOnLocation Limited

Copyright: WhosOnLocation Limited How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and

More information

SSO Plugin. Release notes. J System Solutions. http://www.javasystemsolutions.com Version 3.5

SSO Plugin. Release notes. J System Solutions. http://www.javasystemsolutions.com Version 3.5 SSO Plugin Release notes J System Solutions Version 3.5 JSS SSO Plugin v3.5 Release notes What's new...3 SSO Plugin for HP Service Manager & Request Catalog...3 SAP Business Objects XI (BMC Analytics)...3

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Configuring IBM Cognos Controller 8 to use Single Sign- On

Configuring IBM Cognos Controller 8 to use Single Sign- On Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright

More information

AccountView. Single Sign-On Guide

AccountView. Single Sign-On Guide AccountView Single Sign-On Guide 2014 Morningstar. All Rights Reserved. AccountView Version: 1.4 Document Version: 2 Document Issue Date: March 09, 2013 Technical Support: (866) 856-4951 Telephone: (781)

More information

Chapter 1: How to Register a UNIX Host in a One-Way Trust Domain Environment 3

Chapter 1: How to Register a UNIX Host in a One-Way Trust Domain Environment 3 Contents Chapter 1: How to Register a UNIX Host in a One-Way Trust Domain Environment 3 Introduction... 3 How to Register a UNIX Host in a One-Way Trust Domain Environment... 4 Creating a Windows Agentless

More information

A Standards-based Mobile Application IdM Architecture

A Standards-based Mobile Application IdM Architecture A Standards-based Mobile Application IdM Architecture Abstract Mobile clients are an increasingly important channel for consumers accessing Web 2.0 and enterprise employees accessing on-premise and cloud-hosted

More information

Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite. Abstract

Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite. Abstract Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite Abstract This white paper outlines the deployment and configuration of a Single Sign-On solution for EMC Documentum

More information

CA Data Protection. Content Provider Development Guide. Release 15.0

CA Data Protection. Content Provider Development Guide. Release 15.0 CA Data Protection Content Provider Development Guide Release 15.0 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation

More information

TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS

TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS White Paper TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS Abstract This white paper explains how to diagnose and troubleshoot issues in the RSA Access Manager single sign-on

More information

Single Sign-on (SSO) technologies for the Domino Web Server

Single Sign-on (SSO) technologies for the Domino Web Server Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145

More information

Single Sign On (SSO) solution for BMC Remedy Action Request System

Single Sign On (SSO) solution for BMC Remedy Action Request System Single Sign On (SSO) solution for BMC Remedy Action Request System Installation/Administration Guide Creator: NTT DATA Version: 1.7 Date: 22.01.2013 Modified Date: 11.06.2013 Filename: SSOInstallationAdministration.docx

More information

Synology SSO Server. Development Guide

Synology SSO Server. Development Guide Synology SSO Server Development Guide THIS DOCUMENT CONTAINS PROPRIETARY TECHNICAL INFORMATION WHICH IS THE PROPERTY OF SYNOLOGY INCORPORATED AND SHALL NOT BE REPRODUCED, COPIED, OR USED AS THE BASIS FOR

More information

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Leverage Active Directory with Kerberos to Eliminate HTTP Password Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website: www.pistolstar.com

More information

PINsafe Multifactor Authentication Solution. Technical White Paper

PINsafe Multifactor Authentication Solution. Technical White Paper PINsafe Multifactor Authentication Solution Technical White Paper Abstract PINsafe is a flexible authentication solution that offers a wide range of authentication models. The use of the patented one-time

More information

Securing SAS Web Applications with SiteMinder

Securing SAS Web Applications with SiteMinder Configuration Guide Securing SAS Web Applications with SiteMinder Audience Two application servers that SAS Web applications can run on are IBM WebSphere Application Server and Oracle WebLogic Server.

More information

Flowpack Single sign-on Server Documentation

Flowpack Single sign-on Server Documentation Flowpack Single sign-on Server Documentation Release 1.0.0 Author name(s) August 21, 2013 CONTENTS 1 Contents 3 1.1 Overview................................................. 3 1.2 Getting started..............................................

More information

OAuth Guide Release 6.0

OAuth Guide Release 6.0 [1]Oracle Communications Services Gatekeeper OAuth Guide Release 6.0 E50767-02 November 2015 Oracle Communications Services Gatekeeper OAuth Guide, Release 6.0 E50767-02 Copyright 2012, 2015, Oracle and/or

More information

SSO Plugin. Troubleshooting. J System Solutions. http://www.javasystemsolutions.com Version 3.5

SSO Plugin. Troubleshooting. J System Solutions. http://www.javasystemsolutions.com Version 3.5 SSO Plugin Troubleshooting J System Solutions Version 3.5 Page 2 of 21 Table of Contents Troubleshooting...4 BMC AR System Mid Tier and HP Service Manager Web Tier...4 User account must change password

More information

CA Cloud Service Delivery Platform

CA Cloud Service Delivery Platform CA Cloud Service Delivery Platform Customer Onboarding Version 01.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the

More information

esoc SSA DC-I Part 1 - Single Sign-On and Access Management ICD

esoc SSA DC-I Part 1 - Single Sign-On and Access Management ICD esoc European Space Operations Centre Robert-Bosch-Strasse 5 64293 Darmstadt Germany Tel: (49)615190-0 Fax: (49)615190485 www.esa.int SSA DC-I Part 1 - Single Sign-On and Access Management ICD Prepared

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps

Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com

More information

AlarmPoint Adapter for BMC Remedy AR System by AlarmPoint Systems

AlarmPoint Adapter for BMC Remedy AR System by AlarmPoint Systems AlarmPoint Adapter for BMC Remedy AR System by AlarmPoint Systems User Guide Supporting AlarmPoint Adapter for BMC Remedy AR System by AlarmPoint Systems November 30, 2007 Contacting BMC Software You can

More information

Developing Applications for SSO

Developing Applications for SSO Developing Applications for SSO Justen Stepka Authentisoft, LLC www.authentisoft.com Overview Introduction What is SSO Designing and Implementing for SSO environments Available Solutions Introduction Justen

More information

Centrify Mobile Authentication Services

Centrify Mobile Authentication Services Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

Architecture Guidelines Application Security

Architecture Guidelines Application Security Executive Summary These guidelines describe best practice for application security for 2 or 3 tier web-based applications. It covers the use of common security mechanisms including Authentication, Authorisation

More information

ACM Crossroads Student Magazine The ACM's First Electronic Publication

ACM Crossroads Student Magazine The ACM's First Electronic Publication Page 1 of 8 ACM Crossroads Student Magazine The ACM's First Electronic Publication Crossroads Home Join the ACM! Search Crossroads crossroads@acm.org ACM / Crossroads / Columns / Connector / An Introduction

More information

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution

White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations

More information

Upgrade Guide. CA Application Delivery Analysis 10.1

Upgrade Guide. CA Application Delivery Analysis 10.1 Upgrade Guide CA Application Delivery Analysis 10.1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

CTSU SSO (Java) Installation and Integration Guide

CTSU SSO (Java) Installation and Integration Guide Cancer Trials Support Unit CTSU A Service of the National Cancer Institute CTSU SSO (Java) Installation and Integration Guide Revision 1.0 18 October 2011 Introduction Document Information Revision Information

More information

OpenLDAP Oracle Enterprise Gateway Integration Guide

OpenLDAP Oracle Enterprise Gateway Integration Guide An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information

More information

Oracle Enterprise Single Sign-on Logon Manager. Installation and Setup Guide Release 11.1.1.2.0 E15720-02

Oracle Enterprise Single Sign-on Logon Manager. Installation and Setup Guide Release 11.1.1.2.0 E15720-02 Oracle Enterprise Single Sign-on Logon Manager Installation and Setup Guide Release 11.1.1.2.0 E15720-02 November 2010 Oracle Enterprise Single Sign-on Logon Manager, Installation and Setup Guide, Release

More information

Enterprise Toolbar User s Guide. Revised March 2015

Enterprise Toolbar User s Guide. Revised March 2015 Revised March 2015 Copyright Notice Trademarks Copyright 2007 DSCI, LLC All rights reserved. Any technical documentation that is made available by DSCI, LLC is proprietary and confidential and is considered

More information

Implementation Guide SAP NetWeaver Identity Management Identity Provider

Implementation Guide SAP NetWeaver Identity Management Identity Provider Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before

More information

Securing WebFOCUS A Primer. Bob Hoffman Information Builders

Securing WebFOCUS A Primer. Bob Hoffman Information Builders Securing WebFOCUS A Primer Bob Hoffman Information Builders 1 Agenda Gain an understanding of the WebFOCUS Architecture Where can security be implemented? Review the internal WebFOCUS repository and resource

More information

CA Mobile Device Management 2014 Q1 Getting Started

CA Mobile Device Management 2014 Q1 Getting Started CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

CA ARCserve Backup for Windows

CA ARCserve Backup for Windows CA ARCserve Backup for Windows Agent for Microsoft SharePoint Server Guide r15 This documentation and any related computer software help programs (hereinafter referred to as the "Documentation") are for

More information

Software Design Document SAMLv2 IDP Proxying

Software Design Document SAMLv2 IDP Proxying Software Design Document SAMLv2 IDP Proxying Federation Manager 7.5 Version 0.2 Please send comments to: dev@opensso.dev.java.net This document is subject to the following license: COMMON DEVELOPMENT AND

More information

Installation and Configuration Guide

Installation and Configuration Guide Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

15-415 Database Applications Recitation 10. Project 3: CMUQFlix CMUQ s Movies Recommendation System

15-415 Database Applications Recitation 10. Project 3: CMUQFlix CMUQ s Movies Recommendation System 15-415 Database Applications Recitation 10 Project 3: CMUQFlix CMUQ s Movies Recommendation System Project Objective 1. Set up a front-end website with PostgreSQL back-end 2. Allow users to login, like

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM

IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.

More information

CA VPN Client. User Guide for Windows 1.0.2.2

CA VPN Client. User Guide for Windows 1.0.2.2 CA VPN Client User Guide for Windows 1.0.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your

More information

CA Clarity PPM. Connector for Microsoft SharePoint Product Guide. Service Pack 02.0.01

CA Clarity PPM. Connector for Microsoft SharePoint Product Guide. Service Pack 02.0.01 CA Clarity PPM Connector for Microsoft SharePoint Product Guide Service Pack 02.0.01 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

BMC Track-It! Web. Web Services API Guide. Version 11.3

BMC Track-It! Web. Web Services API Guide. Version 11.3 BMC Track-It! Web Web Services API Guide Version 11.3 Legal Notices Copyright 1999, 2009 BMC Software, Inc. Copyright 1989-2014 Numara Software, Inc. BMC, BMC Software, and the BMC Software logo are the

More information

Centrify Mobile Authentication Services for Samsung KNOX

Centrify Mobile Authentication Services for Samsung KNOX Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under

More information