Authentication in Apache Lenya
|
|
- Sheena Goodwin
- 8 years ago
- Views:
Transcription
1 Authentication in Apache Lenya Using LDAP The user authentication mechanism in Apache Lenya is carried out by specifi c components using certain policy fi les. This process is, in itself, complex to understand and inclusion of LDAP authentication makes it more complex. Lenya does not have provision of user creation on LDAP, instead it provides mapping of Lenya user with the existing users on the LDAP. This mapping of user is one-to-one and would be cumbersome if the number of existing LDAP user is large. This problem can be solved through a small standalone program which would interface LDAP server to Lenya and would copy the users to latter in single execution. 1
2 About the Author Shishir Saxena Shishir Saxena is an associate of Open Source and Linux Practice and has more than fi ve years experience in J2EE related technologies. His expertise includes web tier architecture and java/xml based open source content management system. He is presently involved with development of open source content management system related initiatives and offerings. Shishir has obtained his engineering degree in computer science and is a java certifi ed programmer. 1
3 Table of Contents 1. Introduction 3 2. Description 3 3. Authentication through LDAP 5 4. Conclusion 6 2
4 Introduction Most of the organisations would require a proper authentication mechanism to be in place for authorising the privileged users to access the respective resources in the system. LDAP authentication is one of the popular mechanisms for the same. It is a standard application supported by various companies like Microsoft, Lotus Notes, Netscape and so forth. In Apache Lenya, the user can be authenticated based on the Access Controller component using specifi c user policy fi le. These users are defi ned in the context of Apache Lenya and are referred through their respective user case policy fi le. This process of authentication is complex to understand and the complexity increases when a LDAP user needs to be authenticated to access Lenya publications. Though the authentication for this user happens at LDAP server, Lenya needs to be aware of the profi le of this user and the role to which this user is associated within Lenya context. Hence, the user creation process regarding LDAP users can be cumbersome, if a large number of existing LDAP users is required to be provided access. Lenya supported LDAP authentication was tested with OpenLDAP and MS Active Directory servers. Authentication means password checking is done through LDAP, so that the user does not need a Lenyaspecifi c password. Note that only authentication is done through LDAP and the Lenya administrator still has to inform Lenya which LDAP users to allow and also inform to assign Lenya roles to these users. LDAP setup is handled in Lenya confi guration fi les, adding users and assigning them roles are handled within the Lenya Admin GUI. The LDAP implementation in Lenya is based on the factor that you have an existing LDAP directory containing users and passwords, but you do not want to (or are not allowed to) add anything particular to Lenya within this LDAP directory, such as Lenya roles. Consequently, the Lenya-specifi c user information is not stored in LDAP but instead it is stored with the same mechanism as non-ldap users. Here Lenya delegates authorization (the checking of the user s password in LDAP), which means that the user does not require an additional Lenya password. In the fi le ldap.properties, set security-protocol to the value ssl and set key-store to the name of your keystore fi le. Add the LDAP server certifi cate fi le to the local keystore using this command: Keytool -import -keystore.keystore -file <ca_cert_file> -alias <yourdomain.com> This white paper initially provides an overview of the process involved in normal CMS and LDAP user authentication and hence the solution to solve the problem posed during manual creation of large number of LDAP users to access Lenya. Description User Authentication how it happens in Lenya The user authentication and authorization is carried out by a Lenya component known as Access Controller. The access controller would generally combine an authenticator, authorizer, a policy manager and an accreditable manager. The Authenticator is responsible for identifying a user. There are various types of authenticators that can be used but generally User Authenticator is implied, which identifi es and verifi es a user through the password. There is another authenticator known as Anonymous Authenticator that is being used for authenticating users called as anonymous. This authenticator can be further customised on the publication requirements. The Authorizer is used for determining the access for the user to invoke a certain request. This access can be based on the user profile as well as on the group profi le to which the user belongs. A policy associates a role to a user or a group. This means that a user or a group would be able to 3
5 perform certain specifi c task such as edit, review or administer. Hence, for a request, the Policy Manager determines the policy to be followed by the user. The Accreditable Manager is again a combination of User Manager, Group Manager and Role Manager. While the Group Manager and the Role Manager manage the groups and the roles respectively, the User Manager associates the user with its respective profi le maintained in a fi le. The User Manager also determines the type of the user, whether the user is a normal CMS user or whether the user is a LDAP user. All these components should be put together to understand the authentication process being followed for a request. Figure 1 User Authentication When there is a request for a URL and if the user is logging for the fi rst time or the session has expired, the login screen is produced to take the username and the password as input else the user name is retrieved from the current context. For the fi rst case, the Authenticator would authenticate and the User Manager would use respective fi les to provide the credentials to authenticate the user. If the user already exists in the context, the authentication part is skipped. The User Manager would provide the group information for the user in the context; hence, the Authorizer would associate if the user or his respective group has access to the respective URL. The association information would be retrieved through the policy fi le provided by Policy Manager for the respective request. If the users are not authorised for the request then they would be provided with the login page else they would be provided with the requested page as the response. 4
6 Authentication through LDAP We have already seen that the User Manager determines whether a user should be authenticated through fi le authentication or through LDAP authentication. If the user is required to be authenticated through LDAP, Authenticator would use the LDAP properties to connect to the respective LDAP server. The properties file would contain the respective credentials for the LDAP server, though Lenya requires some basic information to always be present in the fi le. This information includes the provider URL (both IP and port number), the base domain name and security authentication mechanism (anonymous, simple or MD5). There are certain fi elds that are mandatory to be present in the fi le but can remain unfi lled. This includes the directory manager name along with the password (it can remain unfi lled for anonymous binding), user branch (can remain unfi lled if the user needs to be searched in all the sub-trees) and the security protocol (can remain unfi lled if secured authentication is not required). This property fi le is not only used during user authentication but also during user creation. In the next section, we would see how LDAP users are being created in Lenya and what its problems are. LDAP User Creation the Problem and the Solution The users for a publication are created through the administrator interface provided by Lenya. The same interface is also used for creating various groups and for associating the users to these groups. There are two types of users that can be created through the interface, one is normal user whose password is maintained in their respective user profi le fi le and the other type of user is LDAP user. The LDAP user creation does not imply that Lenya would be able to create a new user in LDAP server. Instead, the application would be mapping this new Lenya user name to the user name already existing in LDAP server. Thus, for creating such a user, the username fi eld needs to be pre-determined from the LDAP server. Lenya would be using the LDAP properties fi le to connect to the LDAP server and search the respective fi eld. The Lenya user name LDAP user name mapping would be stored in the user profi le fi le that would hence be used by User Manager for authentication. Thus, to create a user who already exists with LDAP, a Lenya user is required to be mapped and placed in the user profi le. Consider a scenario where the number of existing LDAP user is large and all of these users are required to be associated with certain group. It would be a cumbersome process if these users are created through the interface. Also, connecting to LDAP server each time for a single user creation would further delay the process. This problem can be solved by writing a standalone program that would connect to the LDAP server once (using the same property fi le) and copy all the respective users from the server to specifi c Lenya placeholder already known by User manager. This program would be associating the users to a specifi c group as well and would maintain the profi le of these users as desired by Lenya. If a specifi c user branch is mentioned in the LDAP properties fi le then the program would pick only those users that belong to that user branch. This program can either be scheduled or can be user initiated depending on the design policy. 5
7 Conclusion We have seen the process being followed by Lenya for user authentication and the various components being involved for the same. We have also seen the difference between authentication of a LDAP user and a normal user. We have tried to understand the problem being posed for large number of user creations that would be authenticated at LDAP server and hence, the solution that can cater this problem. Similarly depending on the requirement, the other issues related with user creation and authentication can be determined and accordingly, either the existing components can be customised or an additional tool can be created. 6
8 About Open Source & Linux Practice From understanding business pain areas, recommending and implementing solutions to providing support, the OSL practice at TCS helps enterprises to overcome the challenges moving to Open Source, achieve tangible results and optimize the Total Cost of Ownership (TCO). The OSL practice offers secure and scalable solutions, built around Linux & Open Source, that cover Application Development, Reengineering, Migration, Product Porting, Application Consolidation and Kernel Programming. About Tata Consultancy Services Tata Consultancy Services (TCS) is among the leading global information technology consulting, services and business process outsourcing organizations. Pioneer of the fl exible global delivery model for IT services that enables organizations to operate more effi ciently and produce more value, TCS focuses on delivering technology led business solutions to its international customers across varied industries. For more information contact Rakhi Gupta Tata Consultancy Services Ltd. Akruti Business Port Road No 13, MIDC Andheri (East) Mumbai , India Phone: Fax: Website : All content / information present here is the exclusive property of Tata Consultancy Services Limited (TCS). The content / information contained here is correct at the time of publishing. No material from here may be copied, modifi ed, reproduced, republished, uploaded, transmitted, posted or distributed in any form without prior written permission from TCS. Unauthorized use of the content / information appearing here may violate copyright, trademark and other applicable laws, and could result in criminal or civil penalties. Copyright Tata Consultancy Services Limited 7
MySQL Database Replication and Failover Clustering
MySQL Database Replication and Failover Clustering The increasing use of information and critical data using the Internet and other networked environments has made high availability a necessity for enterprises.
More informationApplication Consolidation
Application Consolidation As enterprises look for ways to reduce costs and simplify IT management, they often consider various approaches to server consolidation. Among them, application consolidation
More informationPhase-Wise Risks in OSS Projects
Phase-Wise Risks in OSS Projects While the advantages of Open Source are many, unrealistic expectations, ignoring important lessons in project management as well as limitations of the model may make some
More informationwebmunit for WebMethods Integration Server
webmunit for WebMethods Integration Server This document presents webmunit, a Unit Testing Library developed from scratch on the webmethods Integration Server platform. It also discusses the unit testing
More informationOSSIM Open Source Security Information Management
OSSIM Open Source Security Information Management Last few years, Open Source softwares are widely adopted in I.T industry. Open Source software are most popular because free distribution and variety of
More informationLDAP User Guide PowerSchool Premier 5.1 Student Information System
PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationOpen-Xchange Hosted Edition Directory Integration
OPEN-XCHANGE Whitepaper Open-Xchange Hosted Edition Directory Integration Concept to integrate Open-Xchange Hosted Edition into Company Directory Services v1.00 Author: Editors: Layout: Manuel Kraft Manuel
More informationAdeptia Suite LDAP Integration Guide
Adeptia Suite LDAP Integration Guide Version 6.2 Release Date February 24, 2015 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 DOCUMENT INFORMATION Adeptia
More informationEvaluating Customer Loyalty Solutions
Evaluating Customer Loyalty Solutions Customer Loyalty Programs (CLP) have come a long way from their early beginnings in the 1970 s. Conceptualized with the original idea of gaining a better understanding
More informationHow To Set Up Chime For A Coworker On Windows 7.1.2 (Windows) With A Windows 7 (Windows 7) On A Windows 8.1 (Windows 8) With An Ipad (Windows).Net (Windows Xp
INSTALLATION GUIDE July 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may
More informationConfiguring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
More informationHP Device Manager 4.7
Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...
More informationClickShare Network Integration
ClickShare Network Integration Application note 1 Introduction ClickShare Network Integration aims at deploying ClickShare in larger organizations without interfering with the existing wireless network
More informationUsing LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
More informationWirelessOffice Administrator LDAP/Active Directory Support
Emergin, Inc. WirelessOffice Administrator LDAP/Active Directory Support Document Version 6.0R02 Product Version 6.0 DATE: 08-09-2004 Table of Contents Objective:... 3 Overview:... 4 User Interface Changes...
More informationUnified Access for Enterprise Users
Unified Access for Enterprise Users Informational webinar Chinmay Meghani Liferay Portal Specialist Fulcrum Worldwide, Inc. Mehria Askaryar Business Development Manager Fulcrum Worldwide, Inc. Agenda Introduction
More informationConferencing Agent Enhancing the Communication Experience
White Paper Conferencing Agent Enhancing the Communication Experience To achieve corporate operational excellence, the existing resources of an organization must be utilized to the best possible extent.
More informationConfiguring User Identification via Active Directory
Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be User Identification Overview User Identification allows you to create security policies based
More informationBusiness Process Management A Balance Between Process Efficiency & Business Agility
Business Process Management A Balance Between Process Efficiency & Business Agility is a rapidly evolving domain within IT. Vendors are entering into this domain from various directions: from EAI, Document
More informationFolder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016
Version 2.0 April 2016 Folder Proxy + OWA + ECP/EAC Guide Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationSetup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
More informationServer External Authentication
Technology Brief Server External Authentication FileMaker Pro 8, FileMaker Server 8, FileMaker Server 8 Advanced Server External Authentication page 1 Table of Contents What is Server External Authentication?...3
More informationXerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
More informationCase Based Reasoning A reliable technique to automate manually controlled situations
A reliable technique to automate manually controlled situations Even as proliferation of automation increases, ever so often there are pockets in processes that are manually controlled. These pockets are
More informationUsing Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
More informationVERALAB LDAP Configuration Guide
VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to
More informationUsing LDAP for User Authentication
Using LDAP for User Authentication Product version: 4.50 Document version: 1.1 Document creation date: 03-06-05 Purpose This technical note describes how to configure and set up EPiServer to use an LDAP
More informationBlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
More informationBlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
More informationTIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
More informationAddressing Security Issues The ecopy solution for document imaging
WHITE PAPER Addressing Security Issues The ecopy solution for document imaging Contents Product overview...1 User authentication...2 Document security...2 Activity logging...2 Device security...3 Personalization
More informationMatrix Technical Support Mailer 33 COSEC Integrate (Import from Active Directory)
Matrix Technical Support Mailer 33 COSEC Integrate (Import from Active Directory) Dear Friends, This technical mailer will help you to understand the Integrate application which is available from COSEC
More informationProxySG TechBrief LDAP Authentication with the ProxySG
ProxySG TechBrief LDAP Authentication with the ProxySG What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned
More informationUser Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
More informationSelecting the Right Architectures for Successful Data Warehouses
Selecting the Right Architectures for Successful Data Warehouses Deciding a suitable architecture is very important activity in the Data warehouse life cycle. Architecture is critical in setting up the
More informationMixed Authentication Setup
Mixed Authentication Setup Version 8.2 January 1, 2016 For the most recent version of this document, visit our documentation website. Table of Contents 1 Overview 3 2 IIS installed components 3 2.1 Creating
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationLepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with
Lepide Active Directory Self Service Configuration Guide 2014 Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Table of Contents 1. Introduction...3
More informationSophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
More informationCloudwork Dashboard User Manual
STUDENTNET Cloudwork Dashboard User Manual Make the Cloud Yours! Studentnet Technical Support 10/28/2015 User manual for the Cloudwork Dashboard introduced in January 2015 and updated in October 2015 with
More informationConfiguring Steel-Belted RADIUS Proxy to Send Group Attributes
Configuring Steel-Belted RADIUS Proxy to Send Group Attributes Copyright 2007 Sophos Group. All rights reserved. No part of this publication may be reproduced, stored in retrieval system, or transmitted,
More informationMicrosoft Active Directory Oracle Enterprise Gateway Integration Guide
An Oracle White Paper May 2011 Microsoft Active Directory Oracle Enterprise Gateway Integration Guide 1/33 Disclaimer The following is intended to outline our general product direction. It is intended
More informationMetalogix Replicator. Quick Start Guide. Publication Date: May 14, 2015
Metalogix Replicator Quick Start Guide Publication Date: May 14, 2015 Copyright Metalogix International GmbH, 2002-2015. All Rights Reserved. This software is protected by copyright law and international
More informationBlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
More informationSophos Mobile Control Installation guide
Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running
More informationSophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
More informationDEPLOYMENT ROADMAP March 2015
DEPLOYMENT ROADMAP March 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may
More informationConfiguring TLS Security for Cloudera Manager
Configuring TLS Security for Cloudera Manager Cloudera, Inc. 220 Portage Avenue Palo Alto, CA 94306 info@cloudera.com US: 1-888-789-1488 Intl: 1-650-362-0488 www.cloudera.com Notice 2010-2012 Cloudera,
More informationExternal Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210
More informationAuthentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
More informationSophos Mobile Control Installation guide. Product version: 3.6
Sophos Mobile Control Installation guide Product version: 3.6 Document date: November 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...5 3 Set up Sophos Mobile Control...11 4 External
More informationConfiguring IBM Cognos Controller 8 to use Single Sign- On
Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright
More informationInstallation, Configuration and Administration Guide
Installation, Configuration and Administration Guide ehd10.0.1 everything HelpDesk Installation, Configuration and Administration Guide GroupLink Corporation 2013 GroupLink Corporation. All rights reserved
More informationEMC DOCUMENTUM MANAGING DISTRIBUTED ACCESS
EMC DOCUMENTUM MANAGING DISTRIBUTED ACCESS This white paper describes the various distributed architectures supported by EMC Documentum and the relative merits and demerits of each model. It can be used
More informationHow To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal 1.1.3 On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (
Avaya one X Portal 1.1.3 Lightweight Directory Access Protocol (LDAP) over Secure Socket Layer (SSL) Configuration This document provides configuration steps for Avaya one X Portal s 1.1.3 communication
More informationCybernetics Approach to Sales Incentive Compensation Management
Cybernetics Approach to Sales Incentive Compensation Management Sales Incentive Compensation Management (ICM) is increasingly becoming the key decisive and motivating factor in influencing sales force
More informationVersion 9. Active Directory Integration in Progeny 9
Version 9 Active Directory Integration in Progeny 9 1 Active Directory Integration in Progeny 9 Directory-based authentication via LDAP protocols Copyright Limit of Liability Trademarks Customer Support
More informationLepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1
Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of
More informationINTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
More informationSample Configuration: Cisco UCS, LDAP and Active Directory
First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
More informationHP Device Manager 4.6
Technical white paper HP Device Manager 4.6 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Configuring User Authentication...
More informationSCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.
Enabling Integrated Windows Authentication For CitectSCADA Web Client Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.xx Summary: What is the difference between Basic Authentication and Windows
More informationOcé LDAP Adapter User Guide
Océ LDAP Adapter User Guide Océ PRISMAweb V4.0 The e-business solution for Print Service Providers _ Copyright 2005, 2006,2007 by Océ Printing Systems GmbH. All rights reserved. This User Documentation
More informationHow to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
More informationDistributed Document Imaging: Maximizing Your Investment in Microsoft Technology Integration with Active Directory
WHITE PAPER Distributed Document Imaging: Maximizing Your Investment in Microsoft Technology Integration with Active Directory Contents Introduction...1 Distributed Document Imaging in Microsoft IT Infrastructures...2
More informationActive Directory Authentication Integration
Active Directory Authentication Integration This document provides a detailed explanation of how to integrate Active Directory into the ipconfigure Installation of a Windows 2003 Server for network security.
More informationOpen Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
More informationIntegrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies
Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright
More informationAn Oracle White Paper September 2013. Oracle WebLogic Server 12c on Microsoft Windows Azure
An Oracle White Paper September 2013 Oracle WebLogic Server 12c on Microsoft Windows Azure Table of Contents Introduction... 1 Getting Started: Creating a Single Virtual Machine... 2 Before You Begin...
More informationIntegrating EJBCA and OpenSSO
Integrating EJBCA and OpenSSO EJBCA is an Enterprise PKI Certificate Authority issuing certificates to users, servers and devices. In an organization certificate can be used for strong authentication.
More informationConfiguring idrac6 for Directory Services
Configuring idrac6 for Directory Services Instructions for Setting Up idrac6 with Active Directory, Novell, Fedora, OpenDS and OpenLDAP Directory Services. A Dell Technical White Paper Dell Product Group
More informationTrading & Its Features
Trading & Its Features The buying and selling of futures contracts, equity shares, bonds and options is known as trading. There are several types of trading styles that persons seeking to profi t from
More informationDIGIPASS Authentication for GajShield GS Series
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
More informationExternal Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
More informationScheduling in SAS 9.4 Second Edition
Scheduling in SAS 9.4 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. Scheduling in SAS 9.4, Second Edition. Cary, NC: SAS Institute
More informationClient SSL Integration Guide
Client SSL Integration Guide Version 8.2 December 15, 2015 For the most recent version of this document, visit our documentation website. Table of Contents 1 Client SSL integration overview 3 2 System
More informationDIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
More informationLivezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
More informationLDAP User Service Guide 30 June 2006
LDAP User Service Guide 30 June 2006 This documents usage of the LDAP User Service for NiagaraAX version 3.1. INSTALLATION... 2 PALETTE... 3 LDAPUSERSERVICE... 3 ACTIVEDIRECTORYSERVICE... 3 KEY CONCEPTS...
More informationClick Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
More informationCA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
More informationPrivileged Account Access Management: Why Sudo Is No Longer Enough
Access Control Excellence Privileged Account Access Management: Why Sudo Is No Longer Enough The new privileged access management solutions available on the market today provide highly efficient and effective
More informationDefender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
More informationConfiguring Controller 8.2 to use Active Directory authentication
Proven Practice Configuring Controller 8.2 to use Active Directory authentication Product(s): Controller 8.2 Area of Interest: Infrastructure Configuring Controller 8.2 to use Active Directory authentication
More informationConfiguring and Using the TMM with LDAP / Active Directory
Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
More informationCA SiteMinder. Directory Configuration - OpenLDAP. r6.0 SP6
CA SiteMinder Directory Configuration - OpenLDAP r6.0 SP6 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationIGEL Universal Management. Installation Guide
IGEL Universal Management Installation Guide Important Information Copyright This publication is protected under international copyright laws, with all rights reserved. No part of this manual, including
More informationMSSQL quick start guide
C u s t o m e r S u p p o r t MSSQL quick start guide This guide will help you: Add a MS SQL database to your account. Find your database. Add additional users. Set your user permissions Upload your database
More informationShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie
ShibboLEAP Project Final Report: School of Oriental and African Studies (SOAS) Colin Rennie May 2006 Shibboleth Implementation at SOAS Table of Contents Introduction What this document contains Who writes
More informationFileCruiser. VA2600 SR1 Quick Configuration Guide
FileCruiser VA2600 SR1 Quick Configuration Guide Contents About this guide 1 Setup FileCruiser 2 Get IP address 2 Login to the Administration Portal 3 Basic configuration with Setup Wizard 4 Step 1: Configure
More informationExchange Migration Guide
IceWarp Unified Communications Exchange Migration Guide Version 11.3 Exchange Migration Guide 2 Exchange Migration Guide This document will guide you through a process of migration from Microsoft Exchange
More informationInstant Chime for IBM Sametime For IBM Websphere and IBM DB2 Installation Guide
Instant Chime for IBM Sametime For IBM Websphere and IBM DB2 Installation Guide Fall 2014 Page 1 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license
More informationConfiguring and Monitoring Citrix Branch Repeater
Configuring and Monitoring Citrix Branch Repeater eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of
More informationQuick Start Guide for Parallels Virtuozzo
PROPALMS VDI Version 2.1 Quick Start Guide for Parallels Virtuozzo Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the current
More informationOpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
More informationAn Oracle White Paper September 2013. Directory Services Integration with Database Enterprise User Security
An Oracle White Paper September 2013 Directory Services Integration with Database Enterprise User Security Disclaimer The following is intended to outline our general product direction. It is intended
More informationReverse Proxy Guide. Version 2.0 April 2016
Version 2.0 April 2016 Reverse Proxy Guide Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
More informationCopyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
More information