Operating Level Agreement for NYU Login Service
|
|
|
- Jasmine Johns
- 10 years ago
- Views:
Transcription
1 Operating Level Agreement for NYU Login Service This Operating Level Agreement (OLA) documents the agreement regarding support of Single Sign-On (SSO) services for a Partner Service, which has been integrated with the NYU Login Service managed by the Identity and Database Services group within NYU Information Technology Services. The main objective of this OLA is to specify party responsibilities and contact information. This will help ensure robust and reliable functionality for the Partner Service as well as all other applications integrated into the overall NYU SSO environment. Staff members responsible for the operation of the NYU Login Service and for the Partner Service are referred to herein, respectively, as the NYU Login Service Team and the Partner Service Team. This OLA provides detail regarding: 1. Supported Services Support and Assistance Service Availability, Maintenance, and Measurement Staff Member Responsibilities OLA Terms and Conditions... 4 Addendum Single Sign-On (OLA) Agreement Contact Information Approval Version History Supported Services a. Description of the NYU Login Service The NYU Login Service, introduced in the fall of 2008, provides web Single Sign-On capabilities for a variety of applications (for example NYUHome, Albert, and Blackboard) with more integrated on a regular basis. Upon initial NetID/password login to one of these applications, other services can be accessed immediately without another login. b. Basic Service Operation When logging in for the first time to any of the applications integrated with the NYU Login Service, the end-user browser is redirected to where the enduser is prompted for his/her NetID and password. The validity of the entered password is checked against the NYU Enterprise LDAP Directory and, if found to be valid, the end-user's browser is redirected back to the destination web site. Browser cookies are set by the NYU Login Service, and the NetID of the authenticated end-user is conveyed back to the destination application. Operating Level Agreement for NYU Login Service 1
2 Subsequent connections to this, or other, integrated applications rely on the browser cookies that have been set and/or session information (maintained at the client application or at the central Login server) in order to enable or deny continued access by the enduser. The NYU Login Service also supports a partial single sign-out capability that many partner services can take advantage of. To support this functionality, the Sign Out function of each integrated application should redirect the end-user's browser to the logout URL Note that applications integrated using Federation approaches (e.g. SAML, Shibboleth) will not receive a notification of log-out from OpenSSO, and will consider the user logged-in (even if they have invoked a signout link in another integrated application). c. Services Not Included The NYU Login Service performs only authentication, the process of affirming the identity of a user. This is distinct from authorization, the decision making process of allowing a user to perform actions within an application. To facilitate authorization decisions by the application, the Login Service will present the application with the minimal set of available user data that are required by the application to make authorization decisions. However, the Login Service will not act as a decision making point for user authorization. In order to facilitate integration, modifications to the central Login Service interfaces are not permitted. The Partner Service must conform to one of the existing interfaces offered by the Login Service, using either standardized Federation or a proprietary software module. 2. Support and Assistance a. Incident and Problem Resolution An incident or issue that affects the central infrastructure of the NYU Login Service, causing an outage across many partner services, would be considered an emergency. To report an apparent emergency, contact the IT Service desk as documented at An incident considered an emergency will be investigated as a priority and resolved as soon as possible and will be responded to by the NYU Login Service Team within 24 hours of notification by the IT Service Desk. Incidents or issues with the NYU Login Service that do not constitute an emergency should be reported via to [email protected]. Non-emergency incidents or issues will be responded to within 72 hours, not including NYU-NY holidays and weekends. b. Other Communications Information about system maintenance, planned outages, and known issues will be communicated via the ITS Status Page at Operating Level Agreement for NYU Login Service 2
3 Communications directed specifically to end-users of the Partner Service are the responsibility of the Partner Service Team. Communications to the broad NYU end-user community will be initiated by the NYU Login Service Team if a significant issue applies to the system infrastructure and affects service to all partner services. Subsequent to reporting an issue direct communications between the NYU Login Service and the Partner Service may be required and may be initiated by the technical contacts of either team. 3. Service Availability, Maintenance, and Monitoring a. Availability The NYU Login Service is available 24 hours per day, 365 days per year. Exceptions are listed in the Maintenance section below. b. Maintenance Regularly scheduled maintenance may, on an exceptional basis, render systems covered by this OLA to be unavailable. Advance notice and updates will be communicated via the ITS Status Page at Location(s): Timeframe(s): all locations First Friday of the Month, 8:00pm - 8:00am EST. All other Fridays, 10:00pm - Midnight EST. c. Monitoring The NYU Login Service is automatically monitored 24 hours per day, 365 days per year. The monitoring system will automatically notify the NYU Login Service Team in the event of potential service issues. 4. Staff Member Responsibilities a. NYU Login Service Team The NYU Login Service Team agrees to provide the service and support listed in this OLA. Additional responsibilities include the following: Central infrastructure management, modifications and/or updates, including availability of development and test instances of the NYU Login Service infrastructure. Consulting with the Partner Service Team to provide technical guidance in support of the Partner Service developer. All modifications and configurations outside of the Login Service server are the responsibility of the Partner Service Team. b. Partner Service Team The Partner Service Team agrees to abide by the service and support requirements listed in this OLA. Additional responsibilities include the following: Collaboration with the NYU Login Service Team in development/technical work in support of the Partner Service. Operating Level Agreement for NYU Login Service 3
4 A minimum of six weeks advanced notification to the NYU Login Service Team of planned upgrades or modifications to the Partner Service that may affect the single signon functionality and which may require testing and/or development work. Partner Service application modifications that support the single sign-on functionality, as well as testing to ensure proper functionality after Partner Service maintenance, updates, or upgrades. Communication with Partner Service end-users and documentation for them of login/logout functionality with respect to the Partner Service. When requested by the Login Service team to make changes necessary to sustain the availability and security of the Login Service, the Partner Service must implement such changes within six months of official notification. This may include updating SSL certificates, updating SSO Agent software, or changing configuration parameters that affect the performance of the Login Service. This work and its funding are the responsibility of the Partner Service and are necessary to facilitate the continued reliability and security of the shared Login Service environment. The Partner Service must pay particular attention to the eventual expiration of any signing certificate used as part of the SSO integration: (1) tracking upcoming certificate expiration dates, (2) maintaining a test environment where a new certificate can be tested, (3) performing such testing 3-6 weeks in advance of an upcoming expiration, and (4) making a new certificate operational in production 2-3 weeks in advance of expiration. 5. OLA Terms and Conditions a. Agreement period This Agreement is valid from the effective date on the attached addendum and remains in effect throughout the life span of the services and/or applications supported. b. Agreement review process A representative of any of the parties may request a review of the OLA at any time. The Agreement should be reviewed at least annually. In the absence of the completion of a review, the current Agreement will remain in effect. The NYU Login Service administrative contact will incorporate revisions into the Agreement if all parties mutually agree to the proposed changes. Operating Level Agreement for NYU Login Service 4
5 Addendum - Single Sign-On (OLA) Agreement Application: Effective Date: This is the addendum agreement between the following parties: Contact Information NYU Login Service Technical Contacts Tracy Edappara Department: ITS/.edu Services [email protected] Phone: Partner Service Technical Contact Department: Phone: NYU Login Service Administrative Contact David Basson Department: ITS/.edu Services [email protected] Phone: Partner Service Administrative Contact Department: Phone: Service Director: Gary Chapman [email protected] Phone: Mobile: Client Contact: Title: Phone: Mobile: Approvals The signatures below indicate approval of the contents of this SLA. Service Director Client Signature Date Signature Date Gary Chapman Title: Sr. IT Architect & Program Director Title: Contact [email protected] with any questions. Operating Level Agreement for NYU Login Service 5
6 Version history Version Date Revision Description By 1.0 November 29, July 22, 2012 Small typographical fixes; contact information update Gary Chapman Operating Level Agreement for NYU Login Service 6
7 Operating Level Agreement for NYU Login Service 7
TRIPwire HSIN Federation:
TRIPwire HSIN Federation: Reference Guide TRIPwire, in coordination with the Homeland Security Information Network (HSIN), is pleased to announce a federated partnership and the introduction of a single
OpenSSO: Cross Domain Single Sign On
OpenSSO: Cross Domain Single Sign On Version 0.1 History of versions Version Date Author(s) Changes 0.1 11/30/2006 Dennis Seah Contents Initial Draft. 1 Introduction 1 2 Single Domain Single Sign-On 2
i-mobile Multi-Factor Authentication
i-mobile Multi-Factor Authentication Introduction... 1 i-mobile Multi-Factor Authentication... 1 i-mobile WAP MFA Enrollment... 2 i-mobile Application MFA Enrollment... 4 Error Conditions and Resolutions...
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
This section includes troubleshooting topics about single sign-on (SSO) issues.
This section includes troubleshooting topics about single sign-on (SSO) issues. SSO Fails After Completing Disaster Recovery Operation, page 1 SSO Protocol Error, page 1 SSO Redirection Has Failed, page
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Getting Started with AD/LDAP SSO
Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories
IDAM Most frequently encountered messages / known issues document
IDAM Most frequently encountered messages / known issues document Amendment History Version Date Comment By 0.1 20-Dec-2012 Initial version Madhusudan Kappaganthula SharePoint location https://wss2.bp.com/dct/functions/teams/diessl/idam/operational%20processes/forms/allitems.aspx?
Single Sign-On for the UQ Web
Single Sign-On for the UQ Web David Gwynne Infrastructure Architect, ITIG, EAIT Taxonomy Authentication - Verification that someone is who they claim to be - ie, only the relevant user
Integrating EJBCA and OpenSSO
Integrating EJBCA and OpenSSO EJBCA is an Enterprise PKI Certificate Authority issuing certificates to users, servers and devices. In an organization certificate can be used for strong authentication.
About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack
Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
Safewhere*Identify 3.4. Release Notes
Safewhere*Identify 3.4 Release Notes Safewhere*identify is a new kind of user identification and administration service providing for externalized and seamless authentication and authorization across organizations.
From centralized to single sign on
The LemonLDAP::NG project Abstract LemonLDAP::NG is a modular WebSSO (Web Single Sign On) software based on Apache::Session modules. It simplifies the build of a protected area with a few changes in the
[name of project] Service Level Agreement
[name of project] Service Level Agreement Policies and Procedures Posting: Nov.2008 Rev# xxx CIO Sign-Off: Approved and Reviewed By: Date: Document ID: SLA Revision 001 Authors: Disclaimer: Document sign-off
Copyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Evaluation of different Open Source Identity management Systems
Evaluation of different Open Source Identity management Systems Ghasan Bhatti, Syed Yasir Imtiaz Linkoping s universitetet, Sweden [ghabh683, syeim642]@student.liu.se 1. Abstract Identity management systems
Logout Support on SP and Application
Logout Support on SP and application Logout Support on SP and Application Possibilities and and Limitations SWITCHaai Team [email protected] Single Logout: Is it possible? Single Logout will work only in some
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML
Configuring ADFS 3.0 to Communicate with WhosOnLocation SAML --------------------------------------------------------------------------------------------------------------------------- Contents Overview...
SAML Security Option White Paper
Fujitsu mpollux SAML Security Option White Paper Fujitsu mpollux Version 2.1 February 2009 First Edition February 2009 The programs described in this document may only be used in accordance with the conditions
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Adding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
Service Level Agreement for Database Hosting Services
Service Level Agreement for Database Hosting Services Objective Global Service Levels include the general areas of support that are applicable to every ITS service. The purpose of the Service Level Agreement
Statement of Service Enterprise Services - MANAGE Microsoft IIS
Statement of Service Enterprise Services - MANAGE Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The
Security Assertion Markup Language (SAML) Site Manager Setup
Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and
How To Use Adobe Software For A Business
EXHIBIT FOR MANAGED SERVICES (2013V3) This Exhibit for Managed Services, in addition to the General Terms, the OnDemand Exhibit, and any applicable PDM, applies to any Managed Services offering licensed
MY HELPDESK - END-USER CONSOLE...
Helpdesk User Guide Page 1 Helpdesk User Guide Table of Contents 1 INTRODUCTION... 3 1.1. OBJECTIVES... 3 1.2. END-USER CONSOLE... 3 1.3. SUMMARY OF RESPONSIBILITY... 3 1.4. HELPDESK INCIDENT LIFE CYCLE...
Configuring. SuccessFactors. Chapter 67
Chapter 67 Configuring SuccessFactors The following is an overview of the steps required to configure the SuccessFactors Enterprise Edition Web application for single sign-on (SSO) via SAML. SuccessFactors
Configuring SuccessFactors
Chapter 117 Configuring SuccessFactors The following is an overview of the steps required to configure the SuccessFactors Enterprise Edition Web application for single sign-on (SSO) via SAML. SuccessFactors
So we can deal with any issues you may face quickly and effectively, it is really important that you log them on your own helpdesk.
Help Desk How to use your Help Desk So we can deal with any issues you may face quickly and effectively, it is really important that you log them on your own helpdesk. This guide will teach you how to:
RSA SecurID Tokens Service Level Agreement (SLA)
RSA SecurID Tokens Service Level Agreement (SLA) 1. Agreement This Agreement defines RSA SecurID services provided to a Customer. Service definitions include responsibilities, hours, availability, support
Single Sign On (SSO) Implementation Manual. For Connect 5 & MyConnect Sites
Single Sign On (SSO) Implementation Manual For Connect 5 & MyConnect Sites Version 6 Release 5.7 September 2013 1 What is Blackboard Connect Single Sign On?... 3 How it Works... 3 Drawbacks to Using Single
HP Software as a Service. Federated SSO Guide
HP Software as a Service Federated SSO Guide Document Release Date: July 2014 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty statements accompanying
This Service Level Agreement applies to the Services as defined in the Service Supply Agreement.
Service Level Agreement This Service Level Agreement applies to the Services as defined in the Service Supply Agreement. DEFINITIONS Billing Period One calendar month, commencing from the Commencement
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
Using SAML for Single Sign-On in the SOA Software Platform
Using SAML for Single Sign-On in the SOA Software Platform SOA Software Community Manager: Using SAML on the Platform 1 Policy Manager / Community Manager Using SAML for Single Sign-On in the SOA Software
DualShield SAML & SSO. Integration Guide. Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.
DualShield Integration Guide Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
Agenda. How to configure
[email protected] Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services
SAML Authentication Quick Start Guide
SAML Authentication Quick Start Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved.
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
OpenAM. 1 open source 1 community experience distilled. Single Sign-On (SSO) tool for securing your web. applications in a fast and easy way
OpenAM Written and tested with OpenAM Snapshot 9 the Single Sign-On (SSO) tool for securing your web applications in a fast and easy way Indira Thangasamy [ PUBLISHING 1 open source 1 community experience
IST Drupal Cloud Hosting SLA
Table of Contents 1 General Overview 3 2 Service Description 3 2.1 Service Scope 3 2.2 Assumptions 4 3 Roles and Responsibilities 5 3.1 Parties 5 3.2 Research & Content Technologies Responsibilities 5
Portal Instructions for Mac
Portal Instructions for Mac Table of Contents Introduction... 1 Preparing Safari... 2 Advanced Access Instructions... 3 Installing Java... 3 Setting the Default Browser... 3 Installing the Browser Plug-in...
Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific
Q: Is the challenge required or can pass through authentication be used with regard to automatic login after you login to your corporate domain? A: You can configure the system to pass on the challenge
HDAccess Administrators User Manual. Help Desk Authority 9.0
HDAccess Administrators User Manual Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks
Allidm.com. SSO Introduction. Discovering IAM Solutions. Leading the IAM Training. @aidy_idm facebook/allidm
Discovering IAM Solutions Leading the IAM Training @aidy_idm facebook/allidm SSO Introduction Disclaimer and Acknowledgments The contents here are created as a own personal endeavor and thus does not reflect
SAP NetWeaver AS Java
Chapter 75 Configuring SAP NetWeaver AS Java SAP NetWeaver Application Server ("AS") Java (Stack) is one of the two installation options of SAP NetWeaver AS. The other option is the ABAP Stack, which is
Bloom Enhanced Performance Monitoring Service Level Agreement
Bloom Enhanced Performance Monitoring Service Level Agreement 1 SERVICE DESCRIPTION The Enhanced Performance Monitoring Service provides an enterprise-class level of assurance with regards to the performance
How To Write A Service Level Agreement For The National Patient Information Reporting System
National Patient Information Reporting System: Service Level Agreement NPIRS Data Mart Developer's Test Environment Version 2.0 June 2011 Department of Health and Human Services Indian Health Service Office
Absorb Single Sign-On (SSO) V3.0
Absorb Single Sign-On (SSO) V3.0 Overview Absorb allows single sign-on (SSO) with third-party systems, regardless of the programming language. SSO is made secure by a series of calls (between Absorb and
Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
Configuring. SugarCRM. Chapter 121
Chapter 121 Configuring SugarCRM The following is an overview of the steps required to configure the SugarCRM Web application for single sign-on (SSO) via SAML. SugarCRM offers both IdP-initiated SAML
WatchGuard SSL 2.0 New Features
WatchGuard SSL 2.0 New Features For Secure Remote Access, Identity Management, and Network Access Control Introduction WatchGuard SSL 2.0 unifies identity and access management capabilities, with features
SCAS: AN IMPROVED SINGLE SIGN-ON MODEL BASE ON CAS
SCAS: AN IMPROVED SINGLE SIGN-ON MODEL BASE ON CAS 1,2 XIANG LIYUN, 1 FANG ZHIYI, 1 SUN HONGYU 1 College of Computer Science and Technology, Jilin University, Changchun, China 2 Department of Computer
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House
How To Manage An Ipa Print Service At A College Of Korea
1 General Overview This is a Service Level Agreement ( SLA ) between and the Student Computer Labs to document: The technology services Student Computer Labs provides to the customer The targets for response
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
Implementation Guide SAP NetWeaver Identity Management Identity Provider
Implementation Guide SAP NetWeaver Identity Management Identity Provider Target Audience Technology Consultants System Administrators PUBLIC Document version: 1.10 2011-07-18 Document History CAUTION Before
Table of Contents INTRODUCTION... 2 HOME PAGE... 3. Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG...
Table of Contents INTRODUCTION... 2 HOME PAGE... 3 Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG... 11 Raising a Service Request... 12 Edit the Service Request...
APPENDIX 8 TO SCHEDULE 3.3
APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE
i. Maintenance of the operating system, applications, content on the server, or fault tolerant network connections
Physical Co-location Service Level Agreement 1. Agreement This agreement is to define Physical Server Co-location services provided to a Customer. Typically, service definitions include hours, availability,
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
Managed Support Policy
TABLE OF CONTENTS 1. SERVICE DESCRIPTION 2 2. SUPPORT OPTIONS 2 3. SERVICE SUPPORT HOURS 3 4. MONITORING AND OUTAGES 3 5. SERVICE LEVEL AGREEMENT 4 6. PLANNED MAINTENANCE AND UPGRADES 5 7. TARGET UPTIME
Desktop Web Access Single Sign-On Configuration Guide
Waypoint Global Suite Single Sign-On relies on establishing a relationship between a Windows network user identity and a Suite user (Windows Authentication). This is accomplished by assigning to each of
Working with Indicee Elements
Working with Indicee Elements How to Embed Indicee in Your Product 2012 Indicee, Inc. All rights reserved. 1 Embed Indicee Elements into your Web Content 3 Single Sign-On (SSO) using SAML 3 Configure an
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Statement of Service Enterprise Services - AID Microsoft IIS
Statement of Service Enterprise Services - AID Microsoft IIS Customer Proprietary Rights The information in this document is confidential to Arrow Managed Services, Inc. and is legally privileged. The
All other issues are to be submitted via a request ticket utilizing the Web Helpdesk found at https://helpdesk.tbcdsb.on.ca
Information Technology This Information Technology (ITSLA) establishes the overall support levels for IT supported systems and services within the Thunder Bay Catholic District School Board. Goals of Technology
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE SAML 2.0 CONFIGURATION GUIDE Roy Heaton David Pham-Van Version 1.1 Published March 23, 2015 This document describes how to configure OVD to use SAML 2.0 for user
Connected Data. Connected Data requirements for SSO
Chapter 40 Configuring Connected Data The following is an overview of the steps required to configure the Connected Data Web application for single sign-on (SSO) via SAML. Connected Data offers both IdP-initiated
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
ESXi Cluster Services - SLA
1 General Overview This is a Service Level Agreement ( SLA ) between the customer and IST Infrastructure Services (IST-IS) to document: The technology services IST-IS provides to the customer The targets
PowerLink for Blackboard Vista and Campus Edition Install Guide
PowerLink for Blackboard Vista and Campus Edition Install Guide Introduction...1 Requirements... 2 Authentication in Hosted and Licensed Environments...2 Meeting Permissions... 2 Installation...3 Configuring
Yale Secure File Transfer User Guide
Yale Secure File Transfer For assistance contact the ITS Help Desk 203-432-9000, [email protected] Yale Secure File Transfer User Guide This document provides information and detailed steps for using Yale's
An SAML Based SSO Architecture for Secure Data Exchange between User and OSS
An SAML Based SSO Architecture for Secure Data Exchange between User and OSS Myungsoo Kang 1, Choong Seon Hong 1,Hee Jung Koo 1, Gil Haeng Lee 2 1 Department of Computer Engineering, Kyung Hee University
IT Services. Service Level Agreement
IT Services Service Level Agreement Contents 1 Purpose... 3 2 IT Services Objectives... 3 3 IT Helpdesk... 3 3.1 Issues... 3 3.2 Service Requests... 4 3.3 Development Requests... 4 4 Priorities... 4 5
Securing Web Services With SAML
Carl A. Foster CS-5260 Research Project Securing Web Services With SAML Contents 1.0 Introduction... 2 2.0 What is SAML?... 2 3.0 History of SAML... 3 4.0 The Anatomy of SAML 2.0... 3 4.0.1- Assertion
A RESOURCE GUIDE FOR NEW FINANCIAL SYSTEM PROFESSIONALS
WELCOME KIT A RESOURCE GUIDE FOR NEW FINANCIAL SYSTEM PROFESSIONALS *Disclaimer: In the following documentation, dates, screen captures and data are not necessarily reflective of the current year. Settings
Help Desk Self Service Quick Start Guide
Help Desk Self Service Quick Start Guide Introduction Faculty and Staff can submit support tickets via Help Desk Self- Service. This will give users more control over how they submit helpdesk tickets and
Vidder PrecisionAccess
Vidder PrecisionAccess Security Architecture February 2016 910 E HAMILTON AVENUE. SUITE 410 CAMPBELL, CA 95008 P: 408.418.0440 F: 408.706.5590 WWW.VIDDER.COM Table of Contents I. Overview... 3 II. Components...
Logout in Single Sign-on Systems
Logout in Single Sign-on Systems Sanna Suoranta, Asko Tontti, Joonas Ruuskanen, Tuomas Aura IFIP IDMAN, London, UK, 8-9.4.2013 Logout in Single Sign-on Systems Motivation Single sign-on (SSO) systems SSO
Operating Level Agreement (OLA) Template
Operating Level Agreement (OLA) Template About this template This template provides a consistent format for all Operating Level Agreements (OLAs) between internal departments of ITS and a recognized IT
Enterprise UNIX Services - Systems Support - Extended
1 General Overview This is a Service Level Agreement ( SLA ) between and Enterprise UNIX Services to document: The technology services Enterprise UNIX Services provides to the customer. The targets for
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
CA Spectrum and CA Embedded Entitlements Manager
CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically
2 Downloading Access Manager 3.1 SP4 IR1
Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1
1. Schedule 1 Maintenance and Support Agreement
1. Schedule 1 Maintenance and Support Agreement The following terms and conditions represent an Agreement for Klyp Pty Ltd ACN 115 436 363 (Klyp) to provide Software Maintenance and Support Services to
Control Module, Inc. Software Support Plans
Control Module, Inc. Software Support Plans In addition to the resources of the Control Module, Inc. support Web site, the company offers annual support plans to meet your support needs. Each support plan
Information Services. Standing Service Level Agreement (SLA) Firewall and VPN Services
Information Services Standing Service Level Agreement (SLA) Firewall and VPN Services Overview This service level agreement (SLA) is between Information Services (IS), and any unit at the University of
