USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity"

Transcription

1 USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity

2 TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of Authentication... 1 Implementation of Authentication... 1 The Effects of on the Use of Centricity... 4 The Authentication Process... 4 Effects of on Users of Centricity... 6 After the Initial Implementation... 6 Cen_ Page i

3 Introduction T he Lightweight Directory Access Protocol () Authentication enhancement module allows user information to be maintained in one centralized location and enables single sign-on access. User credentials can be shared between the network and Centricity user management systems. Audience and Objectives We recommend that Site Directors, read this chapter. In this chapter, you will learn: The benefits of Authentication; How and Centricity interact; and, How to implement and administer Authentication; Overview is an Internet protocol that allows programs to look up information on a server. Used with Centricity, authenticates and synchronizes user information for Centricity that is stored on a remote directory (i.e., ) server. Servers Supported by Centricity Centricity currently supports the following directory servers: Novell edirectory Microsoft Active directory Open, an open source directory Benefits of Authentication The primary benefit of authentication is having a single source of user information for both the organization s directory server and Centricity. Consequently, maintaining user information requires less time. In addition, users of both services use the same sign-in name and password. Implementation of Authentication You or your network engineer will work with one of the Schoolwires developers to set up the authentication process for your organization. If Schoolwires hosts your website on one of its servers, you will need to open your firewall to allow the specific IP address and port provided by the Schoolwires developer to access the directory server. Once you have opened Cen_ Page 1

4 the firewall, the Schoolwires developer will test the connectivity between the servers. You will also need to provide the developer with the following information: Which server you are using. The domain name or IP address for your directory. Whether you will be using a Secured Socket Layer (SSL). For ASP clients, this will determine which port you will need to open in your firewall. Note: If your website is hosted by Schoolwires and you will be using SSL, you must create a certificate on your server that Schoolwires will install on the server that hosts your Schoolwires website. The Distinguished Name (DN), which the path for the starting point for the search of your directory during the authentication process. The Login Name and password to use when Centricity accesses your directory server. Whether the formats for the sign-in name for your organization s directory server and Centricity are the same. If they are not, the authentication process will result in the creation of duplicate user profiles within Centricity. Consequently, if these do not currently match, the Schoolwires developer will run a script to match the format for the sign-in name for Centricity to that of your organization s directory server. The Distinguished Name for each directory group you wish to associate with a Schoolwires role and the role with which it will be associated. Cen_ Page 2

5 The Schoolwires developer will use this information to enter the parameters for on the Settings window accessible from Site Workspace Configure Site. See Figure 1 and Figure 2. Figure 1: Settings window: General tab Cen_ Page 3

6 Figure 2: Settings window: Groups tab After the set up is complete, the Schoolwires developer will test the authentication process (Test Authentication button). The Effects of on the Use of Centricity The Authentication Process When a user attempts to sign in to Centricity, authentication takes place in the following manner: 1. If that user is found in Centricity and marked as an user (Figure 3), the user will be authenticated against your organization s directory server. a. If that user is found on the directory server and the sign-in name and password match, the sign-in will be successful. b. If that user is not found on the directory server or the sign-in name and password do not match, the sign-in will fail and the user will need to contact the System Administrator. Cen_ Page 4

7 Login field only appears if your organization purchased the Enhancement Module. It is checked for users. 2. If that user is not found in Centricity, but is found on your organization s directory server, the user will be automatically added as an user within Centricity. The following information from the directory will be duplicated in the User Profile in Centricity: a. First name b. Last name c. address d. Sign-in Name Figure 3: User Profile when enabled e. Roles (Groups on the directory server) Note: Groups can be created within your organization s directory server and users can be assigned to them. During the implementation of, the Schoolwires developer sets up a table that cross references these groups within the directory server to roles in Centricity. If a user is assigned to a group on the directory server, then the user will be assigned the associated role in Centricity. 3. If that user is found in Centricity and not marked as an user (Figure 3), the user will be authenticated against the user database in Centricity. If the sign-in name and password match, the sign-in will be successful. 4. If that user is not found in Centricity or your organization s directory server or the sign-in name and password do not match, the sign-in will fail and the user will need to contact the System Administrator. Cen_ Page 5

8 Effects of on Users of Centricity Once authentication is implemented, you will notice the following effects: On the User Profile in Centricity for each user: o The Login box will be checked. (See Figure 3.) For new users, this happens during the authentication process. For existing users, the Schoolwires developer will run a script during implementation. o The password in Centricity will be a non-functioning, encrypted password. If you delete a user from the directory server, you do not need to delete that user from Centricity. The authentication will fail and that user will not be able to sign in to the website. However, you may want to purge this data from Centricity periodically. users of Centricity will still need to sign in. However, they will use the same sign-in name and password as they use for the network. When users of Centricity access their profiles (Access My Info), they will not have access to the Sign-in Name, Password or Confirm Password fields. If you make any changes to a User Profile (e.g., add a zip code, unlock a user) for an user, that user will not receive any confirmation from Centricity. The User Profiles for users of Centricity who are not users will be maintained within Centricity. They will be able to access their own profiles, including the Sign-in Name, Password and Confirm Password fields. They will receive the normal confirmation messages from Centricity. After the Initial Implementation Once the Schoolwires developer sets up authentication, there will be few reasons for a Site Director to access the Settings window from Site Workspace Configure Site. The main reasons for making changes are: You have added roles to your Schoolwires website. Your directory server has changed. The use of SSL has changed. However, we recommend that you contact Schoolwires prior to making any changes to the settings. Cen_ Page 6

Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity2

Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity2 Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity2 Schoolwires Centricity2 LDAP Table of Contents Introduction... 1 About LDAP... 2 Primary Benefit of LDAP Authentication... 2 LDAP Servers

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password

Emailing from The E2 Shop System EMail address Server Name Server Port, Encryption Protocol, Encryption Type, SMTP User ID SMTP Password Emailing from The E2 Shop System With recent releases of E2SS (at least 7.2.7.23), we will be allowing two protocols for EMail delivery. A new protocol for EMail delivery Simple Mail Transfer Protocol

More information

Security Assertion Markup Language (SAML) Site Manager Setup

Security Assertion Markup Language (SAML) Site Manager Setup Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and

More information

HP Device Manager 4.7

HP Device Manager 4.7 Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...

More information

Installing and configuring Microsoft Reporting Services

Installing and configuring Microsoft Reporting Services Installing and configuring Microsoft Reporting Services Every company, big or small has to use various tools to retrieve data from their Databases. IT departments receive many different requests for data

More information

Open Thunderbird. To set up an e-mail account in Thunderbird, from the Tools menu select Account Settings; choose Email account; then click Next.

Open Thunderbird. To set up an e-mail account in Thunderbird, from the Tools menu select Account Settings; choose Email account; then click Next. Server Type: POP3 or IMAP Incoming(POP3 or IMAP) Mail Server: student.ncnm.edu POP3 Port: 995 (SSL) IMAP Port: 993 (SSL) Outgoing(SMTP) Mail Server: student.ncnm.edu SMTP Port: 587 (TLS) (Users must change

More information

Integrating N-central with LDAP

Integrating N-central with LDAP Contents About this Guide 3 About LDAP 3 Requirements Checklist 4 Configuring N-central to Communicate with Active Directory Servers 5 About this Guide This guide is intended for a technical audience that

More information

Configuring Sponsor Authentication

Configuring Sponsor Authentication CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five

More information

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home.

Remote Desktop Gateway. Accessing a Campus Managed Device (Windows Only) from home. Remote Desktop Gateway Accessing a Campus Managed Device (Windows Only) from home. Contents Introduction... 2 Quick Reference... 2 Gateway Setup - Windows Desktop... 3 Gateway Setup Windows App... 4 Gateway

More information

Device Log Export ENGLISH

Device Log Export ENGLISH Figure 14: Topic Selection Page Device Log Export This option allows you to export device logs in three ways: by E-Mail, FTP, or HTTP. Each method is described in the following sections. NOTE: If the E-Mail,

More information

NovaBACKUP Remote Workforce Version 14.5 Upgrade Guide

NovaBACKUP Remote Workforce Version 14.5 Upgrade Guide NovaBACKUP Remote Workforce Version 14.5 Upgrade Guide NovaStor / April 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications

More information

Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop

Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop Designing IT Platform Collaborative Applications with Microsoft SharePoint 2003 Workshop Course 8036: Two days; Instructor-led Microsoft Certified Professional Exams No Microsoft Certified Professional

More information

Skyward LDAP Launch Kit Table of Contents

Skyward LDAP Launch Kit Table of Contents 04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know

More information

Training module 2 Installing VMware View

Training module 2 Installing VMware View Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and

More information

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory

More information

Product Summary RADIUS Servers

Product Summary RADIUS Servers Configuration Guide for Cisco Secure ACS with 802.1x Authentication for Avaya 3631 Wireless Telephone This document details how to configure the Cisco Secure ACS (Access Control Server) v3.3 with 802.1x

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.

Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. 1. Click the Windows Start button, then Control Panel How-To-WCC-Secure-Windows-7-11/4/2010-4:09

More information

LDAP User Guide PowerSchool Premier 5.1 Student Information System

LDAP User Guide PowerSchool Premier 5.1 Student Information System PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson

More information

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP

HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP When you install SQL Server you have option to automatically deploy & configure SQL Server Reporting

More information

BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist

BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist BlackBerry Enterprise Server for Microsoft Office 365 preinstallation checklist This document lists the preinstallation requirements that must be met before you install the BlackBerry Enterprise Server

More information

Administrator Guide. v 11

Administrator Guide. v 11 Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main

More information

Configuration Guide. Remote Backups How-To Guide. Overview

Configuration Guide. Remote Backups How-To Guide. Overview Configuration Guide Remote Backups How-To Guide Overview Remote Backups allow you to back-up your data from 1) a ShareCenter TM to either a Remote ShareCenter or Linux Server and 2) Remote ShareCenter

More information

PassKey Manager. Schoolwires Centricity

PassKey Manager. Schoolwires Centricity Schoolwires Centricity Table of Contents Introduction... 1 What Provides... 1 What Does Not Provide... 1 Definitions for... 1 Manage PassKeys in Site Manager... 2 Access... 2 Create PassKeys... 2 Create

More information

Avaya one X Portal 1.1.3 Lightweight Directory Access Protocol (LDAP) over Secure Socket Layer (SSL) Configuration

Avaya one X Portal 1.1.3 Lightweight Directory Access Protocol (LDAP) over Secure Socket Layer (SSL) Configuration Avaya one X Portal 1.1.3 Lightweight Directory Access Protocol (LDAP) over Secure Socket Layer (SSL) Configuration This document provides configuration steps for Avaya one X Portal s 1.1.3 communication

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

WHMCS LUXCLOUD MODULE

WHMCS LUXCLOUD MODULE èè WHMCS LUXCLOUD MODULE Update: 02.02.2015 Version 2.0 This information is only valid for partners who use the WHMCS module (v2.0 and higher). 1.1 General overview 1.2 Installing the plugin Go to your

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Setting up LDAP settings for LiveCycle Workflow Business Activity Monitor

Setting up LDAP settings for LiveCycle Workflow Business Activity Monitor Adobe Enterprise & Developer Support Knowledge Article ID: c4715 bc Setting up LDAP settings for LiveCycle Workflow Business Activity Monitor In addition to manually creating users and user permissions,

More information

Taking Advantage of Active Directory Support in GroupWise 2014

Taking Advantage of Active Directory Support in GroupWise 2014 White Paper Collaboration Taking Advantage of Active Directory Support in GroupWise 2014 Flexibility and interoperability have always been hallmarks for Novell. That s why it should be no surprise that

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION

SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION Table of content ScopTel with Active Directory... 3 Software Features... 3 Software Compatibility... 3 Requirements... 3 ScopTel Configuration... 4 Prerequisites...

More information

HP Device Manager 4.6

HP Device Manager 4.6 Technical white paper HP Device Manager 4.6 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Configuring User Authentication...

More information

Compiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1

Compiled By: Chris Presland v1.0. 29 th September. Revision History Phil Underwood v1.1 Compiled By: Chris Presland v1.0 Date 29 th September Revision History Phil Underwood v1.1 This document describes how to integrate Checkpoint VPN with SecurEnvoy twofactor Authentication solution called

More information

Authentication Integration

Authentication Integration Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication

More information

Security Guidelines for MapInfo Discovery 1.1

Security Guidelines for MapInfo Discovery 1.1 Security Guidelines for MapInfo Discovery 1.1 This paper provides guidelines and detailed instructions for improving the security of your Mapinfo Discovery deployment. In this document: Overview.........................................

More information

Email setup information for most domains hosted with InfoRailway.

Email setup information for most domains hosted with InfoRailway. Email setup information for most domains hosted with InfoRailway. Incoming server (POP3): pop.secureserver.net port 995 (SSL) Incoming server (IMAP): imap.secureserver.net port 993 (SSL) Outgoing server

More information

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode

Step-by-Step Setup Guide Wireless File Transmitter FTP Mode EOS Step-by-Step Setup Guide Wireless File Transmitter FTP Mode Infrastructure Setup Windows 7 2012 Canon U.S.A., Inc. All Rights Reserved. Reproduction in whole or in part without permission is prohibited.

More information

Security. TestOut Modules 12.6 12.10

Security. TestOut Modules 12.6 12.10 Security TestOut Modules 12.6 12.10 Authentication Authentication is the process of submitting and checking credentials to validate or prove user identity. 1. Username 2. Credentials Password Smart card

More information

Avatier Identity Management Suite

Avatier Identity Management Suite Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Protected Trust Directory Sync Guide

Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide 2 Overview Protected Trust Directory Sync enables your organization to synchronize the users and distribution lists in Active Directory

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

NovaBACKUP xsp Version 12.2 Upgrade Guide

NovaBACKUP xsp Version 12.2 Upgrade Guide NovaBACKUP xsp Version 12.2 Upgrade Guide NovaStor / August 2011 Rev 20110815 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications

More information

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module

Requirements Collax Security Gateway Collax Business Server or Collax Platform Server including Collax SSL VPN module Collax SSL VPN Howto This howto describes the easy configuration of a Collax server as SSL VPN gateway in order to enable external access to selected applications in the company network. Except for a common

More information

LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation

LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation LDAP Implementation AP561x KVM Switches All content in this presentation is protected 2008 American Power Conversion Corporation LDAP Implementation Does not require LDAP Schema to be touched! Uses existing

More information

Alcatel-Lucent Extended Communication Server Active directory synchronization : installation and administration

Alcatel-Lucent Extended Communication Server Active directory synchronization : installation and administration Alcatel-Lucent Extended Communication Server Active directory synchronization : installation and administration September, 2009 TC1312 Alcatel-Lucent Office Offer - All Rights Reserved Alcatel-Lucent 2009

More information

Deploying RSA ClearTrust with the FirePass controller

Deploying RSA ClearTrust with the FirePass controller Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you

More information

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network

70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network 70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites

More information

Authentication and Single Sign On

Authentication and Single Sign On Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication

More information

To enable an application to use external usernames and passwords, you need to first configure CA EEM to use external directories.

To enable an application to use external usernames and passwords, you need to first configure CA EEM to use external directories. Most clients utilize an external directory tool, such as Microsoft Active Directory, to provide authentication. CA Embedded Entitlements Manager (EEM) can be configured to integrate with the same external

More information

How to Configure Active Directory based User Authentication

How to Configure Active Directory based User Authentication How to Configure Active Directory based User Authentication You Must Have: Microsoft server with Active Directory configured. Windows 2000 Server is configured as Active Directory server in this example.

More information

Setup 1of 2: AKO (NOT EEmail) Email Setup on Outlook 2010

Setup 1of 2: AKO (NOT EEmail) Email Setup on Outlook 2010 Setup 1of 2: AKO (NOT EEmail) Email Setup on Outlook 2010 1. Open Outlook 2010, select File and then +Add Account 2. On the Add New Account, select Manually configure server settings or additional server

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

How To - Implement Single Sign On Authentication with Active Directory

How To - Implement Single Sign On Authentication with Active Directory How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory

More information

Central Administration QuickStart Guide

Central Administration QuickStart Guide Central Administration QuickStart Guide Contents 1. Overview... 2 Licensing... 2 Documentation... 2 2. Configuring Central Administration... 3 3. Using the Central Administration web console... 4 Managing

More information

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

Immotec Systems, Inc. SQL Server 2005 Installation Document

Immotec Systems, Inc. SQL Server 2005 Installation Document SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor

More information

External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park

More information

PineApp Surf-SeCure Quick

PineApp Surf-SeCure Quick PineApp Surf-SeCure Quick Installation Guide September 2010 WEB BASED INSTALLATION SURF-SECURE AS PROXY 1. Once logged in, set the appliance s clock: a. Click on the Edit link under Time-Zone section.

More information

How to Pop Email to Outlook

How to Pop Email to Outlook Webmail Access How to Pop Email to Outlook You can access your email account through the following URL: http://webmail.usalocalbiz.com. The login is your full email address and your account password. We

More information

Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online

Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online 062212 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any

More information

Email Update Instructions

Email Update Instructions 1 Email Update Instructions Contents Email Client Settings The Basics... 3 Outlook 2013... 4 Outlook 2007... 6 Outlook Express... 7 Windows Mail... 8 Thunderbird 3... 9 Apple Mail... 10 2 Email Client

More information

Server Installation, Administration and Integration Guide

Server Installation, Administration and Integration Guide Server Installation, Administration and Integration Guide Version 1.1 Last updated October 2015 2015 sitehelpdesk.com, all rights reserved TABLE OF CONTENTS 1 Introduction to WMI... 2 About Windows Management

More information

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2008 2015 VASCO Data Security, Inc., VASCO Data Security International

More information

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication

Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and

More information

Quality Center LDAP Guide

Quality Center LDAP Guide Information Services Quality Assurance Quality Center LDAP Guide Version 1.0 Lightweight Directory Access Protocol( LDAP) authentication facilitates single sign on by synchronizing Quality Center (QC)

More information

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using

More information

Integration of Active Directory in BMC Remedy ARS. Doc Title : Integration of Active Directory in BMC Remedy ARS

Integration of Active Directory in BMC Remedy ARS. Doc Title : Integration of Active Directory in BMC Remedy ARS Doc Title : Integration of Active Directory in BMC Remedy ARS Audience : BMC Remedy Consultants, Trainee Engineers. Author : Vaijanath Shintre Description : This document is created to explain how to integrate

More information

1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010

1 Outlook Web Access. 1.1 Outlook Web Access (OWA) Foundation IT Written approximately Dec 2010 Foundation IT Written approximately Dec 2010 1 Outlook Web Access With the new version of Exchange 2010 Outlook Anywhere has been enabled and configured with a secure socket layer (SSL) certificate from

More information

pcanywhere Advanced Configuration Guide

pcanywhere Advanced Configuration Guide Introduction The pcanywhere Solution Advanced Configuration Guide is provided to assist customers with advanced features once they have the Symantec Management Platform with pcanywhere Solution installed.

More information

HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE

HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

7.0 Self Service Guide

7.0 Self Service Guide 7.0 Self Service Guide Copyright 2010 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated, microfilmed,

More information

Secure Data Transfer

Secure Data Transfer Secure Data Transfer INSTRUCTIONS 3 Options to SECURELY TRANSMIT DATA 1. FTP 2. WinZip 3. Password Protection Version 2.0 Page 1 Table of Contents Acronyms & Abbreviations...1 Option 1: File Transfer Protocol

More information

Lenovo Partner Access - Overview

Lenovo Partner Access - Overview Table of Contents: Lenovo Partner Access Overview How to Access the Lenovo Partner Access Portal Registration Process and Account Activation First time login Accepting the T s & C s and Selecting Challenge

More information

ClockWork Enterprise 5

ClockWork Enterprise 5 ClockWork Enterprise 5 Technical Overview rev 5.1 Table of Contents Overview... 3 Database Requirements... 4 Database Storage Requirements... 4 Sql Server Authentication and Permissions... 5 ClockWork

More information

WINGS WEB SERVICE MODULE

WINGS WEB SERVICE MODULE WINGS WEB SERVICE MODULE GENERAL The Wings Web Service Module is a SOAP (Simple Object Access Protocol) interface that sits as an extra layer on top of the Wings Accounting Interface file import (WAIimp)

More information

PowerLink for Blackboard Vista and Campus Edition Install Guide

PowerLink for Blackboard Vista and Campus Edition Install Guide PowerLink for Blackboard Vista and Campus Edition Install Guide Introduction...1 Requirements... 2 Authentication in Hosted and Licensed Environments...2 Meeting Permissions... 2 Installation...3 Configuring

More information

Configuring User Identification via Active Directory

Configuring User Identification via Active Directory Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be User Identification Overview User Identification allows you to create security policies based

More information

Initial Setup of Mac Mail with IMAP for OS X Lion

Initial Setup of Mac Mail with IMAP for OS X Lion Concept Initial Setup of Mac Mail This document describes the procedures for setting up the Mac Mail client to receive messages from Google Mail using Internet Message Access Protocol (IMAP) with the Mac

More information

NETASQ ACTIVE DIRECTORY INTEGRATION

NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos

More information

MICROSOFT ISA SERVER 2006

MICROSOFT ISA SERVER 2006 OTP SERVER INTEGRATION MODULE MICROSOFT ISA SERVER 2006 Copyright, NordicEdge, 2010 www.nordicedge.se Copyright, 2010, NordicEdge AB Page 1 of 10 1 Introduction 1.1 OTP Server Overview Nordic Edge OTP

More information

Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with

Lepide Active Directory Self Service. Configuration Guide. Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Configuration Guide 2014 Follow the simple steps given in this document to start working with Lepide Active Directory Self Service Table of Contents 1. Introduction...3

More information

ProxySG TechBrief LDAP Authentication with the ProxySG

ProxySG TechBrief LDAP Authentication with the ProxySG ProxySG TechBrief LDAP Authentication with the ProxySG What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

Email Update Instructions

Email Update Instructions Email Update Instructions Table of Contents Email Client Settings The Basics... 2 Outlook 2013... 2 Outlook 2007... 4 Outlook Express... 6 Windows Mail... 7 Thunderbird 3... 9 Apple Mail... 11 1 Email

More information

Technical Overview. Active Directory Synchronization

Technical Overview. Active Directory Synchronization Technical Overview Document Revision: March 15, 2010 AD Sync Technical Overview Page 2 of 7 Description of (AD Sync) is a utility that performs a one way synchronization from a customer s Active Directory

More information

Group Management Server User Guide

Group Management Server User Guide Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring

More information

Work with PassKey Manager

Work with PassKey Manager Work with PassKey Manager Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and logos of Blackboard, Inc. All other

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

TECHNICAL NOTE TNOI27

TECHNICAL NOTE TNOI27 TECHNICAL NOTE TNOI27 Title: FTP Synchronization Product(s): G3, DSP and Enhanced Modular Controller ABSTRACT The purpose of this document is to describe the G3 s FTP feature and the configuration steps

More information

Business mail 1 MS OUTLOOK CONFIGURATION... 2

Business mail 1 MS OUTLOOK CONFIGURATION... 2 Business mail Instructions for configuration of Outlook, 2007, 2010, 2013 and mobile devices CONTENT 1 MS OUTLOOK CONFIGURATION... 2 1.1 Outlook 2007, 2010 and 2013 adding new exchange account, automatic

More information

Email Update Instructions

Email Update Instructions 1 Email Update Instructions Contents Email Client Settings The Basics... 3 Outlook 2013... 4 Outlook 2007... 6 Outlook Express... 7 Windows Mail... 8 Thunderbird 3... 9 Apple Mail... 10 Apple Mail 8.2...

More information

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights

More information

Management, Logging and Troubleshooting

Management, Logging and Troubleshooting CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network

More information