Humboldt State University Request for Quote # Identity Management System

Size: px
Start display at page:

Download "Humboldt State University Request for Quote #03152013 Identity Management System"

Transcription

1 Humboldt State University Request for Quote # Identity Management System Addendum #1 The following changes, omissions and/or additions to the Request for Quote Documents shall apply to proposals made for and to the execution of the various parts of the work affected thereby and all other conditions shall remain the same. In case of conflict between Request for Proposal Documents and this Addendum, this Addendum shall govern. Table of Contents Section A: The RFQ Table of Contents incorrectly identified the Vendor Checklist as A.7 and omitted the listing for the Evaluation Criteria. The Table of Contents should have identified the Evaluation Criteria as A.7 and the Vendor Checklist as A.8. The section heading numbers and content were correctly identified in the body of the RFQ as A.7 Evaluation Criteria and A.8 Vendor Checklist B.1 Executive Summary: The final sentence of this section has been corrected from The vendor checklist contained in Section A.7 should follow the Executive Summary. to The vendor checklist contained in Section A.8 should follow the Executive Summary. A.4 Schedule of Events: The deadline for vendor responses is unchanged; all responses are due by Wednesday, April 17, 2013 at 4:00pm. Questions submitted by various prospective proposers: The University s response to each question is as follows: 1. We would like to know more in detail about payment option. If this bid is rewarded to my company, how would HSU pay us? Such as, are you going to pay us monthly bases, quarterly, based on level of completion, or after the completion? Also, we would like to know if there is any pre-bid meeting. Payments will be made based on the terms agreed to in the final contract and associated terms and conditions. If you have payment requirements or preferences, include them with your response to the RFQ. There will not be a pre-bid meeting, but all questions submitted by 4/4/13 will be included in an addendum to the RFQ and sent to all potential vendors on 4/8/ Section A.8 Vendor Checklist: Document Set-Up - The headings listed below are missing from the checklist. Is this purposeful? B.2 Profile ( the sub-sets are displayed: (B.2.1 & B.2.2) B.2 is the heading for B.2.1 & B.2.2; there is nothing to respond to for B.2 alone. HSU_IDM RFQ Addendum 1.docx Page 1

2 C.2 General Characteristics (seems no response is required to this section) C.2 is informational to the vendor to take into consideration when proposing their solution. C.4 Specific Requirements ( the sub-sets are displayed: C.4.1 & C.4.2) C.4 is the introduction to sections C.4.1 & C.4.2; there is nothing to respond to for C.4 alone. D.2 Proposed Schedule Paragraph 3 in section D.1 Proposed Implementation Plan notes that At a minimum, the proposed plan should include a Project Schedule and Timeline including estimated start and end dates, milestones, and accompanying written explanation for complete project implementation Therefore, the information on your proposed schedule should be part of your response to section D.1; section D.2 just reiterates schedule information contained in the project scope and other details informational to the vendor to take into consideration when proposing their solution. D.3 Acceptance Testing D.3 is informational to the vendor to take into consideration when proposing their solution. 3. User Provisioning a. Of the resources to be managed, how are they administered? i. Distributed among departments? No. ii. Geographical areas? No. iii. Centralized IT group? Yes. b. Are employees granted access to systems based on job roles/classifications (i.e. all Level I accounts immediately receive these four standard access )? Yes, initial provisioning to standard accounts (OpenLDAP, Active Directory, Kerberos, Google Apps, Web Servers, Databases) is fully automated based on affiliation. c. Are new employees, students granted access to systems based on a per platform/application need? Initial automated provisioning is all to the same set of systems. Additional provisioning is based upon appropriateness for the role and responsibilities of the position. d. Are the provisioning/de-provisioning processes standard for all resources or do they differ by application? This currently differs by application but our goal in this process is to develop a standard process across all resources. i. If non-standard, please list the resources that are different: In some cases provisioning is done manually in the local system. HSU_IDM RFQ Addendum 1.docx Page 2

3 e. Do you currently have conventions for creating new user accounts for each of the managed platforms/applications (i.e. Lastname, Firstinitial)? FirstInitialMidddleInitialLastInitialNextup# eg, mam87 i. Are new ID s consistent across all platforms? Yes, although users may have additional special privilege accounts that start with the username and have an appended _xxx indicating the type of account and privilege. ii. If not, is this an objective for the project? N/A f. When an employee leaves the company, what is the current process used to remove their access rights from the IT systems? Deprovision report, list of access For Active Directory, Kerberos, and Databases - Where no active affiliations remain, accounts are locked nightly and deleted after 40 days. Access to many systems is provided through a synchronized set of groups in Active Directory and OpenLDAP. Group Membership changes are performed every 4 hours and calculated and rebuilt nightly. Affiliation attributes are also stored in OpenLDAP edupersonaffiliation attributes which are calculated and updated nightly. Other systems which use local groups use manual processes for deprovisioning. Former employees are allowed to keep access to and self-service portals which rely on OpenLDAP for authentication. 4. Identity Data Synchronization Yes, Identity Data including users and groups is in scope and should be synchronized across all directories and target systems. a. Are there exception cases, complex scenarios, or other cases that fall outside a simple synchronization/copy scenario? There are some exception cases that may need to be handled manually. b. Are there rules which require specific accounts to be filtered? No. 5. Password Management a. How will initial passwords be assigned? Random One Time Passwords (OTP) are sent to prospective students home address via US mail. New employee random OTPs are sent via to the address provided to Human Resources during on-boarding. OTPs may not be used to access any system other than the password management interface. OTPs are human readable and must be locked after 5 failed attempts. b. How should subsequent passwords be assigned? Existing campus password strength, re-use, and complexity requirements must be enforced by the password management interface. 6. Reconciliation/Data Correlation HSU_IDM RFQ Addendum 1.docx Page 3

4 a. For the applications and systems that will be managed by the Identity Manager product, are the account names consistent across the platforms? Yes. i. If not, is there a key common to all resources that may be used as a correlation key for linking accounts to an individual? N/A ii. If so, what is the correlation key? Peoplesoft HCM/SA EmplID number. 7. Business Processes and Rules a. Are processes established concerning provisioning workflow? Yes. i. If so, are the processes documented? (Please provide sample workflow diagrams if available) Workflow diagrams are not available at this time. b. Is integration with a problem management (help desk) application required? No. i. If so, which application and what version? We use Kace, but integration is not required at this time. 8. Role Management a. Do you have IT or Business roles defined in your organization? Yes. i. If so, how do you provision these roles today? Through standard provisioning processes using affiliations that are calculated from PeopleSoft. 9. Identity Certification a. Are you currently performing identity certification? No. i. at what frequency? N/A ii. is it manual or automated process N/A b. How do you perform remediation? (e.g. Closed-Loop) N/A 10. Policy Enforcement a. Do you have existing IAM policy that needs to be enforced? N/A b. Do the need to be enforced at provisioning time? N/A c. Are detective scans sufficient to meet your requirements? N/A 11. Technical Infrastructure HSU_IDM RFQ Addendum 1.docx Page 4

5 a. What is the platform(s) on which the Identity Manager product will be installed (product/version)? Dependent on selected product. i. Application Server? Dependent on selected product. ii. Operating System? RHEL 6.3 or Windows server 2008R2/2012 are preferred iii. Database? Oracle 11G is preferred b. What application (include version) will be used for notifications/workflow approval requests? Google Apps for Education 12. Is automated provisioning in scope for this project? If so, please provide detailed requirements for provisioning as section A.2 references replacing an existing provisioning but section C does not provide detail. Yes, initial provisioning is fully automated based on affiliations calculated from data in PeopleSoft. Standard accounts are created in the IdM and populated to the main directories (OpenLDAP, Active Directory, Kerberos) and placed into relevant groups in OpenLDAP and Active Directory. Additionally, accounts are created in our hosted Google Apps for Education domain via Google's Java based API. Further self-service provisioning of web accounts and personal MySQL Databases is also possible for users with eligible affiliations. 13. In section C.4.2 Preferred Requirements, number 1 & 3, can you please provide more detail, specifically around the business goals? (1) Faculty and student governance groups hold elections on a recurring basis using Account Center; (3) Policies internal to the CSU require that we be able to audit our Identity Management system and directories for accuracy. 14. Please confirm the number of end users in scope for the following categories: 7200 is HSU s FTE (Full Time Equivalent) student population per IPEDs. See current headcount below: a. Students 9723 b. Applicants c. Alumni (w/ unexpired passwords) d. Faculty, staff & administration 2293* e. Contractors 42 f. Volunteers included in * above g. Guests 45 h. Former Students/Graduates see alumni i. Former Employees 100 (who are not also current/former students) j. Special purpose accounts (departmental, web, calendar resources) ~ What is the authoritative source of data for each of the defined categories of end users: a. Students Peoplesoft HR/SA HSU_IDM RFQ Addendum 1.docx Page 5

6 b. Applicants Peoplesoft HR/SA c. Alumni Not really tracked, just former student in HR/SA d. Faculty, staff & administration Peoplesoft HR/SA e. Contractors Current IDM system (Account Center) f. Volunteers Peoplesoft HR/SA g. Former Students/Graduates Peoplesoft HR/SA h. Former Employees Peoplesoft HR/SA i. Guests Current IDM system (Account Center) 16. To what degree will the CSU Accessibility Requirements effect the decision making process for this RFQ? Review of accessibility is required for all purchases greater than $15,000. Should the product that most meets our functionality requirements not be accessible, we will be required to develop an equally effective alternative access method and will negotiate with the vendor to develop a roadmap to becoming fully accessible. 17. Please list the other companies that have been invited to participate in this RFQ. VENDOR NAME CONTACT PHONE Advanced Integrated Systems Vera Russell Aegis Identity Software, Inc Janet Yarbrough AlphaCorp Security Brian Minner Bid Ocean, Inc Sherry Ramer Brooks Company Dick Brooks Carillon Information Security, Patrick Dube Inc. Cloupid, Inc. Ryan Champion Column Technologies Matt Moore Courion Brad Frost (508) Dell Inc Cheryl Gardner Enable-IT Dennis Rex Fischer Gary O'Neill FYA Construction James Appleton Global Technology Solutions, Kamal Deep Inc. Government Technology Kameron Militano Solutions GreMark Consultancy, Inc. Gregor Mark HEAVENLY TECHNOLOGIES RON BRANDON net Heritage Global Solutions, Inc. Nicole Buchan HSU_IDM RFQ Addendum 1.docx Page 6

7 HOMEFRONT LIGHTING INC TOM TREPANIER Innovative Federal Operations Larry Wick Group, LLC itab ALEX LIM KDJA Services LLC Karen Adams Lasting Impressions Katie Fuller MAXIMUS FEDERAL Franklin Smithson SERVICES mhc ram kumar Microsoft Eric Smith Multicard, Inc. Lindy DeCastro Onvia Kevin Green Oracle Dan Rupinski Smart Tools Byron Siu SUMEDHA Global Computing Manohar Mandadi Sypherlink, Inc. Charlisa Marcum Visionary Integration Professionals (VIP) Kelly Skelton In A2, scope is defined to be serving 7000 Students. The RFP then notes that the solution must also serve applicants, alumni, faculty, staff, guests, contractors, and volunteers (for a total of eight customer populations). So that we can present the requested complete proposal, please provide the approximate number of people in each population and the number of major groups within each. If possible, summarize the requestable resource access required for each population is HSU s FTE (Full Time Equivalent) student population per IPEDs. See current headcount below: a. Students 9723 b. Applicants c. Alumni (w/ unexpired passwords) d. Faculty, staff & administration 2293* e. Contractors 42 f. Volunteers included in * above g. Guests 45 h. Former Students/Graduates see alumni i. Former Employees 100 (who are not also current/former students) j. Special purpose accounts (departmental, web, calendar resources) ~ What are the acceptable platforms available and supported by HSU for hosting the application (OS, DB, etc.). For example, are Windows Server 2008 on VMware ESX and MS SQL 2008 R2 available for hosting the IdM system? VMWare ESX HSU_IDM RFQ Addendum 1.docx Page 7

8 Redhat Enterprise Linux 6 Windows Server 2008R2 or 2012 Oracle 11G MSSQL 20. Are there any other inputs besides those listed we should consider, including 1 - Scheduled queries to PeopleSoft HR PeopleSoft Student PeopleSoft Finance Accounts for guests and contractors are created locally in Identity Management System. 2 - Can you please confirm the versions of all integrated PeopleSoft modules? PeopleSoft versions are currently at version Any web self service functions? Please refer to the RFQ, section C.4.1, item #1 21. So that we can replace as-built functions, if possible please list existing input scripts by function which query PeopleSoft HR, Student, and Financial systems. This detail will be provided to the selected vendor. Please detail the process by which existing input scripts will be replicated using your solution. 22. Are screen shots available for all existing web self service functions so that we can make sure we factor the features and functions you will require we replicate in our proposed solution? Please provide in your response a description of the web self service functions available in the current shipping release of your solution. 23. Are there any other output targets we should consider in addition to those listed, including: AD OpenLDAP Kerberos MySQL Oracle Linux (via listener API) Google (via Java API) No, not for this proposal. If you have a full list of output targets that your solution natively supports, please include it with your response. a. Can you please confirm the versions of all in-scope target resources? AD = Win 2008R2 Servers Active Directory Functional Level 2008 OpenLDAP = Red Hat Enterprise Linux Server release 5.5 (Tikanga) OpenLDAP v 2.3 Kerberos = Red Hat Enterprise Linux Server release 5.9 (Tikanga) Kerberos 5 release MySQL = Red Hat Enterprise Linux Server release 6.4 (Santiago) Red Hat Enterprise Linux Server release 6.4 (Santiago) mysql Ver Distrib , for redhat-linuxgnu (x86_64) using readline 5.1 Oracle = Red Hat Enterprise Linux Server release 5.8 (Tikanga) Oracle Linux = Red Hat Enterprise Linux Server release 6.4 (Santiago HSU_IDM RFQ Addendum 1.docx Page 8

9 Google = Google Apps for Education 24. Please detail number of each target directory and system (for example if there is more than one AD Forest, how many MySQL instances must be supported, etc.) There is one AD Forest. There is one MySQL instance that accounts are provisioned to and one Oracle instance that accounts are provisioned to 25. Please provide details on the target Linux environment, including number of hosts, number of groups and roles supported (so that we can scope effort for the complexity of your environment), and if a directory (such as NIS, NIS+, or LDAP) or if native OS authentication is used today by your as built "listener API interface" currently in use. Currently only our production web server is provisioned via the listener API. Authentication to the Linux server still happens via Kerberos, but the Identity Management System sends over the username of the approved web developer who is to be added and the web site name to the web server via a TCP connection to the listener. The listener process then performs a useradd function to create an account for the new developer, adds them to the group with permission to write to the directory that site lives in, and creates a symbolic link from the user s home directory to that web directory. Other Linux systems use Kerberos authentication with local accounts and group membership for authorization. 26. For C.2.3, describe and quantify the identity management staff who shall be trained and expected to support the system. If available, a link to an organization chart would be ideal. To accurately scope training required, please include a technical summary of the skills for the key internal support staff for the IdM application. The org chart is available at: Primary operational responsibility for Identity Management is with the Enterprise Data Management group. Within that group, Peter Johnson and Jeff Stebbins, who are both programmers and database administrators will need to be trained to support the system. 27. For C Describe the functional requirements and security architecture (specifically authentication accepted by security policy) for the requested SMS password reset functionality. The desired SMS functionality would be for users who have forgotten their password, but have previously entered an SMS number into the IDM system, one password recovery option would be to text the user a temporary one-time password or token to that number that they could use to verify their identity and move forward to resetting their password. 28. For C what platforms are most desirable / common for mobile support (for example, Android tablets, Android phones, IOS tablets, IOS phones, etc.), and is there a mobile device management (MDM) security layer available? If MDM is not available and an open BYOD policy is supported, what authentication standards are required by security policy? If an MDM is implemented, what is the scope (for example Faculty and Staff only). ios phones and tablets, Android phones and tablets, Windows mobile phones and tablets are the most common and desirable. There is no MDM layer. Wireless Network access is authenticated via LDAP by Bradford Impulse Point Network Access Control 29. Regarding C Beyond the listed directories (OpenLDAP, Kerberos, MySQL, Oracle, Linux (via listener API) and Google (via Java API)), are there any additional systems that would need integration within the PW Reset workflow? How are Linux PWs managed? Linux systems authenticate via Kerberos. MS Active Directory is also listed in C.4.1 and should be included HSU_IDM RFQ Addendum 1.docx Page 9

10 30. For C Please list attributes required to manage contractor accounts within IdM, and list systems of reference which should be considered outputs (if any). dn: uid=xxx,cn=users,dc=humboldt,dc=edu uid: xxx uidnumber: xx departmentnumber: xx telephonenumber: xx gidnumber: xx calstateedupersonassurancelevel: 1 calstateedupersonorg: humboldt calstateedupersonprincipalname: xxx homedirectory: xxx userhomequota: xxx sn: Last Name givenname: First Name displayname: First Last Name cn: First Last Name mailhost: smtp server edupersonprimaryaffiliation: Contractor/Consultant calstateedupersonprimaryaffiliation: Contractor/Consultant humboldtedupersonidnumber: ID number humboldtedupersonoperid: xxxx calstateedupersonferpaflag: N edupersonaffiliation: Contractor calstateedupersonaffiliation: Contractor objectclass: inetorgperson objectclass: HSUPerson objectclass: person objectclass: eduperson objectclass: top objectclass: organizationalperson objectclass: inetlocalmailrecipient objectclass: posixaccount objectclass: HSU-Quota objectclass: hsuatistatus objectclass: calstateeduperson userpassword: hash HsuAccountLastUpdated: Regarding C Please document what is required and desirable for Eduperson and CalState Eduperson schema support. See Addendum 1 Exhibit A Person Affiliation Term Map and Addendum 1 Exhibit B calstateedu Attributes for a general overview of eduperson and Calstate Eduperson. HSU supports the first two levels moving from left to right on the map. Further detail is available at: 32. For C Please provide a link to documentation on CAS Single Sign On (including version implemented) and version details for your implementation of Shibboleth SSO. Are either of these extended into mobile operating systems and/or browsers? CAS is currently Shibboleth is currently shibboleth-identityprovider version Both work with all mobile HSU_IDM RFQ Addendum 1.docx Page 10

11 browsers we have tested with and both feed from OpenLDAP, so they should not need direct provisioning from the IDM system 33. Regarding C Please enumerate and describe the functional requirements preferred for the "election" function. Is this a secure survey type of application? Yes, elections function as a secure survey. A defined group (i.e. students or faculty) are presented with a survey where each office or position is a question and the nominated candidates are answers. Each member of that group can answer the survey once. 34. For C Is the expectation that the Vendor or University will be responsible for software distribution and support of Microsoft GINA extensions to AD bound computers? If Vendor responsibility, how many systems are in scope, and what OS versions should be supported? If GINA extensions are required, HSU would be responsible for distribution. Please specify in your response if this type of modification would be required for your solution. 35. Regarding C Does the requested functionality include performing SMS emergency notifications or just collecting numbers for a bulk notification system. If the expectation is for the IdM system to perform emergency notifications, what is the required performance (messages per second)? Just collecting numbers for a bulk notification system 36. How many environments are available of all target systems (for example DEV, TST, PRD)? Development and Production 37. So that we can factor in all software, directory and database interfaces necessary for implementation, what is the desired mean time to repair (MTR) and repair point objective (RPO) for the IdM system? What high-availability data center resources are available? The Identity Management System is considered mission critical, requiring 24/7 service. In the data center we have load balancers and a seven node VMWare cluster available. 38. If the proposed product is not VPAT compatible, is that an automatic exclusion from consideration? The Identity Management System will run in the background and is bassed on user passwords, authentication to AD, etc. Therefore we have not previously gone through the VPAT certification process as there is no interaction required from an end-user other than normal password input. Review of accessibility is required for all our purchases greater than $15,000. Should the product that most meets our functionality requirements not be accessible, we will be required to develop an equally effective alternative access method and will negotiate with the vendor to develop a roadmap to becoming fully accessible. Service password reset functionality needs to be accessible as this solution must be able to serve our disabled student population. Please see section B.5 (Compliance) in the RFQ for further details of the VPAT process. HSU_IDM RFQ Addendum 1.docx Page 11

12 39. Will only providing one Higher Education reference be an automatic exclusion from consideration? Identity Management Systems are relatively new to the Higher Education Industry, therefore referencing two Higher Education references may be a challenge. There are many private sector references available. As noted in section B.3 (System Reference Accounts) of the RFQ, reference accounts must include at least two higher education accounts. 40. Item D.3 references an Acceptance Test. However there is no definition of what this test will entail, or the length of the test. Can vendor s propose a Proof of Concept versus an Acceptance Test? This will minimize risk for Humboldt as the POC would take place before the actual purchase of the Identity Management System. A proof of concept is already outlined in Section. A6 as part of the proposal process. The Acceptance Test mentioned in section D.3. is intended to be part of the sign off process after implementation by the selected vendor. 41. E1 Price Quote. Will Humboldt pay for the software and services based on key Milestones? ie Pay for the software at the beginning of the project and pay for the implementation, installation and training in phases? Yes, this will be formalized during contract negotiations with the selected vendor. While HSU has typically paid for any software licenses upon receipt and any consulting or training as the work is performed and invoiced in past IT contract, payments will be made based on the terms agreed to in this final contract and associated terms and conditions. If you have payment requirements or preferences, include them with your response to the RFQ. 42. It is our goal to create and negotiate mutually acceptable master product agreements (MPA) that our end customers can utilize for future orders. Vendor s MPA is specific to the provision of its software products & services and contains the necessary licensing terms and conditions related to product & services, therefore Vendor prefers to propose and negotiate its standard license/service terms and conditions. Is Humboldt willing to take into consideration Vendor s terms, provided such terms are modified accordingly to address customer s concerns or requirements? As noted in Section B.5 (Compliance) all contracts will be drawn to comply with both CRL063 CSU General Provisions for Information Technology Acquisitions and CSU Supplementary Provisions for Information Technology Acquisitions. Responding vendors are expected to return red-lined copies with their RFQ response, indicating any areas of question or suggested edits. You are welcome to also include a copy of your terms and conditions with your response. HSU_IDM RFQ Addendum 1.docx Page 12

13 Exhibit A: Person Affiliation Term Map

14 Attribute Table - calstateeduperson schema RFQ # Exhibit B version OID (for calstateedu attributes) See Note 1 below attibute type multi-value description Multivalue list of attributes that can NOT be made available to the public. Values = all, meaning all attributes blocked, or a list of attribute names that are calstateedupersonrestrictflag required Y blocked calstateedupersonguid required N A globaly unique 128-bit number represented by a 32 hex character string. This number is a unique identifier for this directory entry, not a unique identifier for the person identified in this entry. See Note 2 below (deleted) OID will not be re-used calstateedupersonaffiliation suggested Y Further refinement of edupersonaffiliation (values = foundation, retired, asi (associated students)) need more input, examples and hints on how to use these. This is a controlled list of values, that can be extended after further discussion calstateedupersonmajor suggested Y Preferred name of the major to be used when displaying entries calstateedupersonmajorcode suggested Y CSU standard major codes calstateedupersonprimaryaffiliation suggested N Further refinement of edupersonprimaryaffiliation (values = foundation, retired, asi (associated students)) need more input, examples and hints on how to use these. This is a controlled list of values, that can be extended after further discussion calstateedupersonstateid suggested N The California ID, a California Drivers License number is the same as a California ID. This can NOT be a state ID from another state calstateedupersonlibraryid suggested N Library identification number assigned according to CSU Library standard calstateedupersonssn suggested N Social Security Number or Taxpayer ID Number calstateedupersonbirthdate suggested N Birth date (YYYYMMDD) e.g calstateedupersonsystemid suggested N A ten character identifier assigned by the CSU system to identify an individual person. Any instance of identity for the same person in any CSU identity system will have the same unique calstateedupersonsystemid. cn required Y First name, suggested middle name or initials, last name, generation qualifier, no title displayname required N Preferred name of the person to be used when displaying entries edupersonaffiliation required Y Everyone is at least a (member or affiliate) member can also be employee, student, or alum employee can be faculty or staff edupersonorgdn required N The DN (in DC naming) of the campus givenname required N First Name mail required N Preferred address for the TO field of to be sent to this person o required 2 Both long and short form of o sn required N Last name commuri suggested Y Labeled URI containing an LDAP URL identifying the directory containing the referenced commobject instance. See commobject specification. description suggested See description in eduperson (200604) edupersonentitlement suggested See description in eduperson (200604) edupersonnickname suggested See description in eduperson (200604) edupersonprimaryorgunitdn suggested See description in eduperson (200604) edupersonorgunitdn suggested See description in eduperson (200604) edupersonprimaryaffiliation suggested See description in eduperson (200604) edupersonprincipalname suggested See description in eduperson (200604) edupersonscopedaffiliation suggested See description in eduperson (200604) edupersontargetedid suggested See description in eduperson (200604) facsimiletelephonenumber suggested See description in eduperson (200604) initials suggested See description in eduperson (200604) jpegphoto suggested See description in eduperson (200604) l suggested See description in eduperson (200604) labeleduri suggested See description in eduperson (200604) manager suggested See description in eduperson (200604) mobile suggested See description in eduperson (200604) Page 1

KACE Appliance LDAP Reference Guide V1.4

KACE Appliance LDAP Reference Guide V1.4 KACE Appliance LDAP Reference Guide V1.4 Brandon Whitman Page 1 The purpose of this guide is to help you with both common and advanced LDAP issues related to the KACE appliances. This guide will give you

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in InCommon Federation ( Federation ) enables the participant to use Shibboleth identity attribute sharing technologies to manage access

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES 1. Federation Participant Information 1.1 The InCommon Participant Operational Practices information below is for: InCommon Participant organization

More information

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES

INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES INCOMMON FEDERATION: PARTICIPANT OPERATIONAL PRACTICES Participation in the InCommon Federation ( Federation ) enables a federation participating organization ("Participant") to use Shibboleth identity

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Single Sign On at Colorado State. Ron Splittgerber

Single Sign On at Colorado State. Ron Splittgerber Single Sign On at Colorado State Ron Splittgerber Agenda Identity Management Authentication Authorization The Problem The Solution: Federation Trust Between Institutions Trust Between Institution and Federal

More information

The Integration of LDAP into the Messaging Infrastructure at CERN

The Integration of LDAP into the Messaging Infrastructure at CERN The Integration of LDAP into the Messaging Infrastructure at CERN Ray Jackson CERN / IT-IS Group 29 Nov 2000 16:00 CERN IT Auditorium, bldg. 31, 3-005 A bit about me Technical Student Sep 1997-1998 in

More information

Conceptual Design. Forefront Identity Manager. Karen McLaughlin

Conceptual Design. Forefront Identity Manager. Karen McLaughlin Conceptual Design Karen McLaughlin January 29, 2013 Overview The purpose of this design is to provide information on the value in addition to Global Address List Synchronization (GAL Sync) that a full

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Novell to Microsoft Conversion: Identity Management Design & Plan

Novell to Microsoft Conversion: Identity Management Design & Plan Novell to Microsoft Conversion: Identity Management Design & Plan Presented To: 3/2/2011 1215 Hamilton Lane, Suite 200 Naperville, IL 60540 www.morantechnology.com Voice & Fax: 877-212-6379 Version History

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Humboldt State University Request for Quote #20101124 Imaging and Document Management Software Solution

Humboldt State University Request for Quote #20101124 Imaging and Document Management Software Solution Humboldt State University Request for Quote #20101124 Imaging and Document Management Software Solution Addendum #1 The following changes, omissions and/or additions to the Request for Quote Documents

More information

MACE-Dir SAML Attribute Profiles

MACE-Dir SAML Attribute Profiles 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 MACE-Dir SAML Attribute Profiles April 2008 Document identifier: internet2-mace-dir-saml-attributes-200804a Location: http://middleware.internet2.edu/dir Editors:

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Open Source Identity Management

Open Source Identity Management Open Source Management OpenAlt 2015 Radovan Semančík November 2015 Ing. Radovan Semančík, PhD. Software architect Co-owner of Evolveum (open source company) Architect of midpoint project Apache committer

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Authentication Authorization Infrastructure

Authentication Authorization Infrastructure Authentication Authorization Infrastructure Jan Du Caju LUDIT - KULeuvenNet AAI update ldap kerberos Shibboleth LDAP end user ldap servers (in fail-over without password hashes): ldap.kuleuven.be (point

More information

P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc.

P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. Product Category: Password Management/Provisioning Validation Date: TBD Product Abstract M-Tech software streamlines

More information

User Management Resource Administrator. Managing LDAP directory services with UMRA

User Management Resource Administrator. Managing LDAP directory services with UMRA User Management Resource Administrator Managing LDAP directory services with UMRA Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted

More information

The School Board of Palm Beach

The School Board of Palm Beach Project Change Request Customer Name: County, Florida Customer Number: 6873401 The School Board of Palm Beach Reference Agreement: Florida State Term Software contract: 252-008-05-ACS Contract #: CFTJQOP

More information

Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5

Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 TABLE OF CONTENTS Introduction... 1 Purpose and Target Audience... 1 Commonly Used Terms... 1 Overview of Shibboleth User

More information

Password Management Guide

Password Management Guide www.novell.com/documentation Management Guide Identity Manager 4.0.2 June 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

TG Web. Technical FAQ

TG Web. Technical FAQ TG Web Technical FAQ About this FAQ We encourage you to contact us if. You can't find the information you're looking for. You would like to discuss your specific testing requirements in more detail. You

More information

Novell Identity Manager

Novell Identity Manager Password Management Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 3.6.1 June 05, 2009 www.novell.com Identity Manager 3.6.1 Password Management Guide Legal Notices Novell, Inc. makes no representations

More information

Identity Access Management IAM 101. Mike Conlon Director of Data Infrastructure mconlon@ufl.edu

Identity Access Management IAM 101. Mike Conlon Director of Data Infrastructure mconlon@ufl.edu Identity Access Management IAM 101 Mike Conlon Director of Data Infrastructure mconlon@ufl.edu 1 Three Processes Identity Answers the question Who is in our environment? Authentication Answers the question

More information

Aurora Hosted Services Hosted AD, Identity Management & ADFS

Aurora Hosted Services Hosted AD, Identity Management & ADFS 22/09/2013 Aurora Hosted Services Hosted AD, Identity Management & ADFS 1 Service Overview - Hosted Identity Management Core provides a fully managed solution hosted in Azure and connected directly to

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: McGill University Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert

More information

Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources

Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Paul Riddle University of Maryland Baltimore County EDUCAUSE Mid-Atlantic Regional Conference January 16, 2008 Copyright

More information

NetIQ Identity Manager

NetIQ Identity Manager NetIQ Identity Manager Management Guide October 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Identity Management in Quercus. CampusIT_QUERCUS

Identity Management in Quercus. CampusIT_QUERCUS Identity Management in Quercus Student Interaction. Simplified CampusIT_QUERCUS Document information Document version 1.0 Document title Identity Management in Quercus Copyright All rights reserved. No

More information

Georgia Tech Active Directory Policy

Georgia Tech Active Directory Policy Georgia Tech Active Directory Policy Policy No: None Rev 1.1 Last Revised: April 18, 2005 Effective Date: 02/27/2004 Last Review Date: April 2005 Next Review Date: April 2006 Status Draft Under Review

More information

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet

DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet Technical Data Sheet DirX Identity V8.5 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

INFORMATION TECHNOLOGY SERVICES A GUIDE TO SUCCESSFUL SOFTWARE ACQUISITION

INFORMATION TECHNOLOGY SERVICES A GUIDE TO SUCCESSFUL SOFTWARE ACQUISITION INFORMATION TECHNOLOGY SERVICES A GUIDE TO SUCCESSFUL SOFTWARE ACQUISITION The ITS Project Office has prepared this set of guidelines to help staff and faculty navigate the HSU software acquisition process.

More information

UNIL Administration. > Many databases and applications:

UNIL Administration. > Many databases and applications: Directories at UNIL UNIL Administration > Many databases and applications: > ResHus: contracts with Etat de Vaud > SAP: other contracts > Immat: students > Physical persons in a single table > Moral persons

More information

aaps algacom Account Provisioning System

aaps algacom Account Provisioning System aaps algacom Account Provisioning System Simple web interface, data integrity checks and customizable policies allow account administration without specific skills Account provisioning against Active Directory

More information

IDENTITY MANAGEMENT ROLLOUT: IN A HURRY. Jason Blackader, UNIX Systems Administrator

IDENTITY MANAGEMENT ROLLOUT: IN A HURRY. Jason Blackader, UNIX Systems Administrator IDENTITY MANAGEMENT ROLLOUT: IN A HURRY Jason Blackader, UNIX Systems Administrator Undergraduate, Graduate, Continuing Ed Industrial Design, Communication Design, Design Sciences, Arts & Media Two Campuses

More information

econtrol 3.5 for Active Directory & Exchange Administrator Guide

econtrol 3.5 for Active Directory & Exchange Administrator Guide econtrol 3.5 for Active Directory & Exchange Administrator Guide This Guide Welcome to the econtrol 3.5 for Active Directory and Exchange Administrator Guide. This guide is for system administrators and

More information

Authentication Integration

Authentication Integration Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

YubiRADIUS Deployment Guide for corporate remote access. How to Guide

YubiRADIUS Deployment Guide for corporate remote access. How to Guide YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship

More information

QuickStart Guide for Managing Mobile Devices. Version 9.2

QuickStart Guide for Managing Mobile Devices. Version 9.2 QuickStart Guide for Managing Mobile Devices Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Cloudwork Dashboard User Manual

Cloudwork Dashboard User Manual STUDENTNET Cloudwork Dashboard User Manual Make the Cloud Yours! Studentnet Technical Support 10/28/2015 User manual for the Cloudwork Dashboard introduced in January 2015 and updated in October 2015 with

More information

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis

Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Canadian Access Federation: Trust Assertion Document (TAD) Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes

More information

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Application Setup help topics for printing

HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Application Setup help topics for printing HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Application Setup help topics for printing Document Release Date: December 2014 Software Release Date: December

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

University of Maryland Active Directory Policies

University of Maryland Active Directory Policies University of Maryland Active Directory Policies Purpose of this policy Scope AD Forest Forest Schema & Data Visibility Account and Group Synchronization Account Creation and Password Forest Security Principle

More information

identity management in Linux and UNIX environments

identity management in Linux and UNIX environments Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual

More information

Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1

Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1 Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks

More information

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008

Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008 Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory Overview August 2008 Introduction... 3 Centralizing DataBase Account Management using Existing Directories with OVD...

More information

Apache Syncope OpenSource IdM

Apache Syncope OpenSource IdM Apache Syncope OpenSource IdM Managing Identities in Enterprise Environments Version 1.3 / 2012-07-26 Apache Syncope OpenSource IdM by http://syncope.tirasa.net/ is licensed under a Creative Commons Attribution

More information

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions

Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including

More information

Active Directory Synchronization Tool Architecture and Design

Active Directory Synchronization Tool Architecture and Design Active Directory Synchronization Tool Architecture and Design Revised on: March 31, 2015 Version: 1.01 Hosting Controller www.hostingcontroller.com Contents Proprietary Notice... 1 1. Introduction... 2

More information

identity management identified

identity management identified DARRELL FUHRIMAN identity management identified Based in Portland, Oregon, Darrell has been managing UNIX systems for nearly thirteen years in a wide variety of environments. This fall he will be changing

More information

RFP BOR-1511 Federated Identity Services - Response to Questions / Answers

RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Q # 1 RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Under Technical Requirements the following requirement is listed: 2. The solution is cloud-based softwareas-a-service, requiring

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: University of Lethbridge 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources

More information

How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance

How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance An Oracle Technical White Paper November 2014 How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance Table of Contents Introduction...3 Active Directory LDAP Services...4

More information

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email

More information

Security with LDAP. Andrew Findlay. February 2002. Skills 1st Ltd www.skills-1st.co.uk. andrew.findlay@skills-1st.co.uk

Security with LDAP. Andrew Findlay. February 2002. Skills 1st Ltd www.skills-1st.co.uk. andrew.findlay@skills-1st.co.uk Security with LDAP Andrew Findlay Skills 1st Ltd www.skills-1st.co.uk February 2002 Security with LDAP Applications of LDAP White Pages NIS (Network Information System) Authentication Lots of hype How

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

IAM, Enterprise Directories and Shibboleth (oh my!)

IAM, Enterprise Directories and Shibboleth (oh my!) IAM, Enterprise Directories and Shibboleth (oh my!) Gary Windham Senior Enterprise Systems Architect University Information Technology Services windhamg@email.arizona.edu What is IAM? Identity and Access

More information

Managing users. Account sources. Chapter 1

Managing users. Account sources. Chapter 1 Chapter 1 Managing users The Users page in Cloud Manager lists all of the user accounts in the Centrify identity platform. This includes all of the users you create in the Centrify for Mobile user service

More information

Kaspersky Lab Mobile Device Management Deployment Guide

Kaspersky Lab Mobile Device Management Deployment Guide Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile

More information

Administration Guide BES12. Version 12.3

Administration Guide BES12. Version 12.3 Administration Guide BES12 Version 12.3 Published: 2015-10-30 SWD-20151028105551254 Contents Introduction... 11 About this guide...12 How to use this guide... 13 Steps to administer BES12... 13 Examples

More information

: IBM Tivoli Identity Manager V4.5 Implenentation

: IBM Tivoli Identity Manager V4.5 Implenentation Exam : IBM 000-797 Title : IBM Tivoli Identity Manager V4.5 Implenentation Version : R6.1 Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products

More information

Project Management RFQ 90058. Common Financial System: Security Consultant. Introduction. Environment Overview. The Common Financial System (CFS)

Project Management RFQ 90058. Common Financial System: Security Consultant. Introduction. Environment Overview. The Common Financial System (CFS) www.calstate.edu Common Financial System: Security Consultant Introduction The California State University (CSU), Office of the Chancellor seeks to identify a consulting partner for its Oracle Enterprise

More information

OFFICE OF KNOWLEDGE, INFORMATION, AND DATA SERVICES (KIDS) DIVISION OF ENTERPRISE DATA

OFFICE OF KNOWLEDGE, INFORMATION, AND DATA SERVICES (KIDS) DIVISION OF ENTERPRISE DATA OFFICE OF KNOWLEDGE, INFORMATION, AND DATA SERVICES (KIDS) DIVISION OF ENTERPRISE DATA Technical Guide Active Directory/Infinite Campus Integration in the KETS Environment Version 1.3 February 24, 2015

More information

Enterprise Manager. Version 6.2. Installation Guide

Enterprise Manager. Version 6.2. Installation Guide Enterprise Manager Version 6.2 Installation Guide Enterprise Manager 6.2 Installation Guide Document Number 680-028-014 Revision Date Description A August 2012 Initial release to support version 6.2.1

More information

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)

Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:

More information

Enterprise Self Service Quick start Guide

Enterprise Self Service Quick start Guide Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.

More information

Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.

Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Outline 1. What is authentication? a. General Informations 2. Authentication Systems in Linux a. Local

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

Active Directory at the University of Michgan. The Michigan Way Since 2000

Active Directory at the University of Michgan. The Michigan Way Since 2000 Active Directory at the University of Michgan The Michigan Way Since 2000 Introductions Who I am: Christina Fleming (cmhf) Who you are: Your Name Your Department How long have you worked with AD? What

More information

CUSTOMER SAP Afaria Overview

CUSTOMER SAP Afaria Overview SAP Afaria 7 SP15 Document Version: 1.0 2016-06-13 CUSTOMER Content 1 Afaria Overview....3 1.1 About Afaria....3 1.2 Afaria Access and Support....4 1.3 Finding Information....5 2 Afaria Architecture....7

More information

Sophos Mobile Control Administrator guide. Product version: 3

Sophos Mobile Control Administrator guide. Product version: 3 Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing

More information

University of Maine System Active Directory Services - RFP# 2016-027 ADDENDUM #01

University of Maine System Active Directory Services - RFP# 2016-027 ADDENDUM #01 QUESTIONS 1. On page 12 of the RFP, it mentions the use of a Custom Identity Management (IdM) solution. Could you please share with us the platform and nature of the IdM System or any other relevant details,

More information

Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)

Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN) Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN

More information

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University

Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University Identity and Access Management (IAM) Roadmap DRAFT v2 North Carolina State University April, 2010 Table of Contents Executive Summary... 3 IAM Dependencies... 4 Scope of the Roadmap... 4 Benefits... 4

More information

Technology Consulting

Technology Consulting Dallas Area Rapid Transit Authority Dallas, Texas EHIBIT H STATEMENT OF WORK Technology Consulting Purpose Dallas Area Rapid Transit (DART) is seeking a master service agreement with two qualified Contractors

More information

Prepared by Enea S.Teresa (Italy) Version 1.0 2006-October 24

Prepared by Enea S.Teresa (Italy) Version 1.0 2006-October 24 Mersea Information System: an Authentication and Authorization System to access distributed oceanographic data. Prepared by Enea S.Teresa (Italy) Version 1.0 2006-October 24 Revision History Date Version

More information

NetIQ Identity Manager Setup Guide

NetIQ Identity Manager Setup Guide NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

NETWRIX IDENTITY MANAGEMENT SUITE

NETWRIX IDENTITY MANAGEMENT SUITE NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Canadian Access Federation: Trust Assertion Document (TAD)

Canadian Access Federation: Trust Assertion Document (TAD) Participant Name: Canadian Access Federation: Trust Assertion Document (TAD) 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and

More information

Approximately 260 PST files totaling 180GB will be included in the pilot. 2. Are the Windows XP clients running XP 64 bit or 32 bit OS?

Approximately 260 PST files totaling 180GB will be included in the pilot. 2. Are the Windows XP clients running XP 64 bit or 32 bit OS? Addendum #1 1. What is the count of PST files and total aggregate size of PST files that will need to be ingested for the pilot? Approximately 260 PST files totaling 180GB will be included in the pilot.

More information

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service

More information

Documentation. CloudAnywhere. http://www.cloudiway.com. Page 1

Documentation. CloudAnywhere. http://www.cloudiway.com. Page 1 Documentation CloudAnywhere http://www.cloudiway.com Page 1 Table of Contents 1 INTRODUCTION 3 2 OVERVIEW 4 2.1 KEY FUNCTIONALITY 4 2.2 PREREQUISITES 5 3 FEATURES 6 3.1 A UNIVERSAL PROVISIONING SOLUTION.

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

PrinterOn Print Management Overview

PrinterOn Print Management Overview PrinterOn Print Management Overview Table of Contents 1. PrinterOn and Print Management Overview... 4 1.1. Combined PrinterOn and Print Management Capabilities... 5 1.1.1. Comprehensive Workflow Tracking

More information

Advanced Administration

Advanced Administration BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What

More information