P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc.

Size: px
Start display at page:

Download "P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc."

Transcription

1 P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. Product Category: Password Management/Provisioning Validation Date: TBD Product Abstract M-Tech software streamlines identity management: the administration of user authentication and access privileges across an enterprise. M-Tech's identity management platform consists of two tightly integrated products: P-Synch and ID-Synch. P-Synch is a total password management solution that can synchronize user passwords across all systems and platforms; enforce enterprise-wide password strength policies; allow support staff to reset passwords on every system, with no special administrative rights, and allow authenticated users to reset their own forgotten passwords. P-Synch reduces support costs while improving network security. ID-Synch is an account management tool that simplifies the routine tasks of multi-system directory management. It can be used to create, update and delete login IDs based on input from an authorization workflow engine, central user administration console or rules-based provisioning system. P-Synch s password management functionality includes: Secure management of passwords using any web browser: End-user password synchronization Help desk password reset User password self-reset Enterprise password policy enforcement Extended native password management tools: Available for Windows 2000,.Net, NT, LDAP, RACF, ACF2, Top Secret, and Unix Enforces enterprise password policy natively Automatically propagates new passwords to other systems RSA SecurID PIN management features: Set SecurID/ACE accounts to "New PIN" mode Initialize or change the PIN number for the tokens Temporarily enable or disable the security tokens Enable and disable emergency access mode for the SecurID/ACE accounts P-Synch's four most popular modes of operation: Transparent synchronization: o native user password changes on Win 2000, NT, LDAP, RACF and Unix are automatically extended to other systems. Web synchronization: o users synchronize their passwords on all systems from a web browser. User self-service password reset: o users are authenticated by some means other than passwords, and are able to reset their own passwords. Help desk reset: o support staff authenticate callers and reset their passwords from a web browser. 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 1

2 Integration Summary P-Synch Integration The integration between P-Synch and the Remedy AR System automatically updates existing call records (also called requests or entries ) when P-Synch is used by a help desk operator and automatically creates call records from self-service events. This eliminates redundant data entry, streamlines the password problem resolution process, and provides management with effective call and problem statistics. Many events that occur when using P-Synch can be configured to create a new call record or modify an existing one. Using this option, help desk personnel can track events that have occurred in P-Synch and take appropriate action. If the appropriate options are configured, the help desk user can correct a problem within P-Synch and have a specific call record updated or closed automatically. Along with this functionality, information from specific call records can be retrieved and sent, via , to a specified list of recipients, thus providing immediate notification. Figure 1: Integration Between P-Synch/ID-Synch and the Remedy AR System Events in P-Synch occur when a user performs an action. This may be, for example, a failed password change or a successful password reset. P-Synch supports 105 possible actions. Whenever an event takes place, the P-Synch server follows these steps: 1. Check if an interface program has been associated with this event; if so, start it. 2. The interface program reads a log describing the actions taken by the user. 3. The interface program reads a script file. 4. The section in the script file describing the particular event is found. 5. The actions for that section are performed. This includes the ability to search for data in the help desk system, add data to the help desk system, iterate through the information from the event log, send messages, etc. 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 2

3 ID-Synch Integration ID-Synch Interface ID-Synch supplies agents that integrate with the various versions of AR System. These agents allow administrators to perform various operations such as creating or deleting AR System user accounts, listing and/or updating accounts and user attributes, and performing password verifications and resets. ID-Synch will automate and simplify the tasks of provisioning new users and managing existing users across several different target systems, including Remedy AR System. Core ID-Synch features include: Automatic Propagation of Changes from Authoritative to Target Systems Self-service Authorization workflow for Change Requests Consolidated and Delegated User Administration Consolidated Reporting and Auditing Additional ID-Synch features include: Group Membership Management Fulfillment Engine Administration for Physical Devices Access Control System Directory Cleanup Automatic Account Discovery Self-service Login ID Reconciliation SOAP Web Service ID-Synch also supplies a SOAP (Simple Object Access Protocol) web service that provides a method for SOAP clients to access a number of P-Synch/ID-Synch functionalities. The ID-Synch web service now supports numerous methods, ranging from password management to account management functionalities. For example, it is possible to create, update and delete login IDs using the ID-Synch web service. ID-Synch integrates with the AR System Server by using SOAP as shown in Figure 1. The ID-Synch SOAP service can be used by any SOAP client toolkit conforming to the SOAP standards. The ID-Synch web service and its method of access are described in a supplied WSDL (Web Service Description Language) file. The AR Server has a built-in web services integration that can handle Soap Requests and Responses based on a supplied WSDL file. The data being exchanged between ID-Synch and the AR System would need to be mapped between the AR System s forms and the ID-Synch web service as described in the Developing AR System Applications: Advanced guide. When the ID-Synch web service receives a SOAP request from the AR System, it: 1. parses the SOAP request 2. performs the operations requested with the data supplied, and 3. sends a response to the AR System indicating the results of the operations The AR System then parses the response and stores or displays the information. 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 3

4 Support Information The integration described in this note is supported by M-Tech Information Technology, Inc. M-Tech Information Technology, Inc develops, markets, and supports the installation of P-Synch / ID-Synch and its integration with BMC Software products. System Requirements The following M-Tech software and BMC Software application must be installed and operating correctly prior to the integration: Remedy AR System 3.x, 4.x, 5.x, or 6.x (AR System 5.x or later required for Web Services) M-Tech P-Synch 6.x / ID-Synch 4.x Server Requirements Microsoft Windows NT 4.0 (with Service Pack 4 or later), Windows MB of available disk space, plus additional space for each managed client s data. 32 MB of RAM. Client Requirements Windows 2000 or GB SCSI Disk. 256 MB of RAM. Detailed AR System requirements and supported platforms can be found at Contact Information M-Tech Information Technology, Inc. BMC Software, Inc. #500, st Street S.E West Maude Avenue Calgary, Alberta, Canada T2G 2J3 Sunnyvale, CA Phone: Phone: Fax: Fax: sales@mtechit.com info@remedy.com Website: Website: 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 4

5 Integration Details Pre-installation Steps Prior to integrating P-Synch or ID-Synch and AR System, you must perform the following steps: 1. Ensure that you install the Remedy AR System client for the AR System that you will be targeting. Also test the connectivity between the client and the AR System. 2. Create an account on the Remedy AR System that is allowed to reset user passwords. 3. Edit the system PATH on the P-Synch or ID-Synch server to include the AR System installation directory (default is C:\Program Files\AR System\User for AR System 6.x and C:\Program Files\AR System for previous versions). 4. Reboot the computer to ensure that the system PATH is updated. P-Synch Integration Once the AR System User module and P-Synch are installed, you can integrate them. The steps to perform this are as follows: Determine which interface program you will be using. AR System 3.x, 4.x, 5.x, and 6.x require pxrem3.exe, pxrem4.exe, pxrem5.exe, and pxrem6.exe as their interface programs, respectively. Set the P-Synch system variable(s) for the event(s) to be tracked to the interface program chosen in the previous step. This is performed through P-Synch s help desk module (nph-psa.exe). After logging in, select the Configure P-Synch option. Select the Web Modules option from the screen that follows, and then Help Desk to view the options shown in the screen shot shown below. For desired system variables that execute an exit trap program, click the On radio button and enter the interface program name in the Value box. Click Update to enable the selected system variables. For more information on setting system variables see the P-Synch Installation and Configuration Guide. 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 5

6 Add an operation section for each of the selected system variables to the configuration file. For more information as to how to complete the configuration file see see the Help Desk Interface section in the P-Synch Installation and Configuration Guide. Sample operations are also provided in the sample scenarios section of this document. AR System Schema Information When writing the configuration file, there are utilities called schmrem5.exe (AR System 5.x) and schmrem6.exe (AR System 6.x) that list the required and optional fields for each of the forms on the AR System. These utilities create a file containing the schema information for each field. The field names as well as the information such as the data types, limits, and values for enumeration lists are provided. This utility is helpful when writing the configuration file (such as pxrem6.cfg) since these fields may be used directly for use with the events. It is also used by the automated P-Synch event action configuration interface. For example, schmrem6.exe is run with the following arguments: schmrem6.exe -t <targetid> -l <filename> Sample output of the schema information: "Status" "Status" = { "default value" = "0" "requirement" = "required" "type" = "enumeration" "enum" "" = { "0" = "New" "1" = "Assigned" "2" = "Fixed" "3" = "Rejected" "4" = "Closed" } } For additional information regarding the operation of schmrem5.exe or schrem6.exe, see the P- Synch Installation and Configuration Guide. Event Action Configuration Interface The configuration file may also be auto-generated for AR System version 5 or 6 via the event action configuration interface. To do so, perform the following steps: Select the "Configure P-Synch" option, then "Event Actions". From the Event configuration page, click the "Target systems" button. Select "Remedy ARS 5.x" or "Remedy ARS 6.x" and the AR System target. Click Add. Psupdate must now be run in order to generate the schema list file (schmrem5.exe or schmrem6.exe generates this file). Once psupdate is complete, go back to the Event configuration page, select an event that you wish to configure and click the Add button. Click "Configure" next to "Remedy ARS 5.x" or "Remedy ARS 6.x". On the next page, choose a custom AR System form that will be used for the event. The next page is where you choose which fields will be used for the configuration script, such as pxrem6.cfg, as well as their values. After clicking the Update button, the fields and their values will be written to the pxrem6.cfg file, which can be found in the <instance>\bin directory. It is now ready to be used with the specified event. For more information on configuring event actions, see the Configuring and Other Event Actions in the P-Synch Installation and Configuration Guide. 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 6

7 ID-Synch Integration ID-Synch Interface One of the operations that may be performed by ID-Synch is to be able to create a new AR System user account. To do so, perform the following steps. Enter your ID-Synch administrator login ID. Enter your ID-Synch administrator password. 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 7

8 Create a new Remedy AR System target on the ID-Synch server. To do so, click the Home button, and then select the System configuration link, followed by Targets, and then Target systems. The target address may simply be specified as the server name of the Remedy AR System. See the ID-Synch Installation and Configuration Guide for more options regarding the specification of the target address. Ensure that the Login IDs are case-sensitive option is checked. 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 8

9 Set the administrative ID and password for the Remedy AR System administrator, which was created in the pre-installation steps. Run the automatic update process to retrieve the list of Remedy AR System users. 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 9

10 Optionally, create authorizers / locations / object types / templates / roles for provisioning new Remedy AR System users. 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 10

11 Create a new Remedy AR System user by following the steps outlined for a new user profile. 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 11

12 Existing user profiles may also be viewed and modified. SOAP Web Service Once the AR System User module and ID-Synch are installed, you can integrate them. The steps to perform this are included in the SYNCHAPI documentation, but a summary of the steps is as follows: The steps to integrate ID-Synch and the AR System are included in the ID-Synch Remote API documentation, but a summary of the steps is as follows: Set up an administrator on the ID-Synch server; for example: psadmin. This user will be used to login to the ID-Synch web service. Obtain the WSDL file supplied with ID-Synch and update the generic URL with the real URL to the installed ID-Synch web service. Create forms and filters on the AR System to consume the ID-Synch web service. To do so, follow the AR System s documentation on consuming web services. 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 12

13 Example Logon Screens ID-Synch Self-Service Interface Enter your Remedy AR System login ID. Enter your Remedy AR System password. 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 13

14 Use the self-service interface to reset and manage your Remedy AR System account and ID-Synch profile. P-Synch Self-Service Interface Use the self-service interface to reset and manage your Remedy AR System account and P-Synch profile. 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 14

15 Sample Scenario P-Synch Integration A company has installed P-Synch and the AR System and has set up the configuration file to perform various entry creations and updates. Below are extractions from sample configuration files showing the event configurations. Only the "operations" part of the script file is shown. Any "global definitions" and "functions" would need to be added to the file above these "operations". See the Help Desk Interface section in the P-Synch Installation and Configuration Guide for more information. The following are two sample scenarios describing how P-Synch integrates with the AR System. Sample Scenario #1 The configuration file is set up to create a new entry when a FRONTEND_IDENTIFY_LOCKOUT event occurs. It is also set up to update a ticket to a closed status when an ADMIN_ENABLE_USER event occurs. Note that all fields that are specified in the operations must previously exist for the AR System form and are able to be set with the specified values. For this sample, you will also need to expose the ticket entry field in the P-Synch Help Desk Module in order for help desk users to be able to enter the appropriate ticket number that they are referencing to for the ADMIN_ENABLE_USER operation. To do so, you will first need to copy the <instance>\design\examples\cgilogin.m4 file to the <instance>\design\custom directory. Then, you must copy the A_LOGIN section from <instance>\design\src\common\cgilogin.m4 to the custom cgilogin.m4 file. Uncomment the entries referring to the ticket number. The next step will be to regenerate the P-Synch GUI using the make commands; for example: make en-us, then make install en-us. For more information regarding the make commands, consult the Customizing the User Interface section of the P-Synch Installation and Configuration Guide. Once this has been completed, there will be a new entry field on the Help desk login page (nph-psa.exe) for help desk users to be able to enter in the ticket number. This value is stored in the %TICKET% variable that will be used in the AR System configuration script (for example: pxrem6.cfg). operation(frontend_identify_lockout) { append good bad { "Assigned To" = "%USERID%" "Name" = "%USERNAME%" "Short Description" = "%USERID% locked out of P-Synch" "Long Description" = "%USERID% (%USERNAME%) locked themselves out of their P-Synch account" "P-Synch User" = "%USERID%" "Status" = "0" "Priority" = "1" "Case Type" = "1" "Source" = "2" "Summary" = "Lock out" "Category" = "Security/Admin" "Type" = "Other" "Item" = "Password Reset" "Submitter" = "P-SynchAdmin" } [good] success } [bad] failure "Couldn t create call record for FRONTEND_IDENTIFY_LOCKOUT" 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 15

16 operation(admin_enable_user) { search "Request ID" "%TICKET%" good bad { } [good] assign next bad { "Status" = "4" "Resolved Description" = "Enabled the account for %USERID% by P-Synch administrator %ADMINID%" } success } [bad] failure "Couldn t update call record for ADMIN_ENABLE_USER" The results of this configuration file would be as follows: An employee named Joe decides he would like to change his password. Unfortunately, when he enters his old password the Caps Lock is on. After attempting to validate himself three consecutive times he gets locked out of P-Synch. This is a FRONTEND_IDENTIFY_LOCKOUT event. A new entry in the AR System is created with the specified type, priority, login name, etc. All of these are fields within the company s custom AR System form. Joe then calls the help desk. Jane answers his call. She logs in to P-Synch as a help desk administrator and enters the request ID of the previously created entry. She logs into P-Synch and resets his password to a standard value. She then re-enables his profile id so that he is allowed to once again log in. This is an ADMIN_ENABLE_USER event. The entry is updated to the closed state and an appropriate description is filled in. Sample Scenario #2 Alternatively, the ticket may also be created and closed all in the same operation. The configuration file is set up to create and close a ticket when an ADMIN_RESET_SUCCESS event occurs. The %TICKET% variable is not required in this case. The status of the ticket is changed to a closed state directly after it is created. operation(admin_reset_success) { append good bad { "Choice" = "1" "psynch user" = "%USERID%" "Resolved Description" = "auto-closing ticket. account reset." "Assigned To" = "%USERID%" "Name" = "%USERNAME%" "Short Description" = "Reset %USERID%'s P-Synch Account" "Long Description" = "Admin Reset of %USERID%'s (%USERNAME%) P-Synch account by %ADMINID%" "P-Synch User" = "%USERID%" "Status" = "4" "Priority" = "1" "Case Type" = "1" "Source" = "2" "Summary" = "Reset" 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 16

17 } } "Category" = "Security/Admin" "Type" = "Other" "Item" = "Password Reset" "Submitter" = "P-SynchAdmin" [good] success [bad] failure "Couldn't create call record" The results of this configuration file would be as follows: An employee named Joe has forgotten his password and is unable to login to P-Synch. Joe calls the help desk. Jane answers his call. She logs in to P-Synch and resets his password to a standard value. This is an ADMIN_RESET_SUCCESS event. A new ticket is created in the AR System database for Joe, and then is immediately closed because the password has been successfully reset. Joe may now login to P-Synch. These scenarios demonstrate the usefulness of the integration of P-Synch and the AR System. Had this integration not existed, Jane would have had to create the ticket with all of the required information when Joe called. She would also have had to make all of the necessary updates and close the entry. In a company where this type of password related entry occurs often, the time saved by having entries created and updated automatically is tremendous. ID-Synch Integration Let s refer to the sample scenario #2 above with Joe and Jane. If the AR System had been integrated with ID-Synch using the SOAP web service, Jane would not have needed to log in using the P-Synch user interface. Instead, Jane only needs to open the company s custom AR System form, supply her credentials, and reset Joe s passwords. Similarly, Jane could potentially do all account management functions, such as creating or deleting accounts, all through AR System forms that are customized to the company s liking. Jane may alternatively also centrally perform many AR System account management functions directly from the P-Synch and ID-Synch interfaces. Several processes may be put in place to provision new AR System user accounts, delete existing accounts, as well as update user attributes and reset passwords. Endnotes M-Tech Information Technology, Inc and BMC Software produced this integration note to assist customers with joint BMC Software/M-Tech implementations. BMC Software and M-Tech Information Technology, Inc have made an effort to ensure that the information contained in this document is accurate, but do not guarantee any accuracy now or in the future. P-Synch and ID-Synch are registered trademarks of M-Tech Information Technology, Inc. Remedy and AR System are registered trademarks or trademarks of BMC Software, Inc. All other trademarks are the property of their respective owners. M-Tech Information Technology Rights to reproduce this document by written permission of M-Tech Information Technology only. 20 December 05 M-Tech P-Synch / ID-Synch Integration Note Page 17

Hitachi ID Password Manager Frequently Asked Questions for Help Desk Managers

Hitachi ID Password Manager Frequently Asked Questions for Help Desk Managers Hitachi ID Password Manager Frequently Asked Questions for Help Desk Managers 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 What kind of call volume reduction can I expect? 1 2 Can I integrate

More information

Citrix Online, div. of Citrix Systems Inc. GoToAssist TM. Product Category: Knowledge Management/eSupport Validation Date: 2/22/2005

Citrix Online, div. of Citrix Systems Inc. GoToAssist TM. Product Category: Knowledge Management/eSupport Validation Date: 2/22/2005 , div. of Citrix Systems Inc. GoToAssist TM Product Category: Knowledge Management/eSupport Validation Date: 2/22/2005 Product Abstract GoToAssist enables businesses to securely interact in real time with

More information

RSA SecurID Certified Administrator (RSA Authentication Manager 8.0) Certification Examination Study Guide

RSA SecurID Certified Administrator (RSA Authentication Manager 8.0) Certification Examination Study Guide RSA SecurID Certified Administrator (RSA Authentication Manager 8.0) Certification Examination Study Guide Introduction The RSA SecurID Certified Administrator (CA) examination is based on the critical

More information

Integrating Hitachi ID Suite with WebSSO Systems

Integrating Hitachi ID Suite with WebSSO Systems Integrating Hitachi ID Suite with WebSSO Systems 2015 Hitachi ID Systems, Inc. All rights reserved. Web single sign-on (WebSSO) systems are a widely deployed technology for managing user authentication

More information

Password Management Before User Provisioning

Password Management Before User Provisioning Password Management Before User Provisioning 2015 Hitachi ID Systems, Inc. All rights reserved. Identity management spans technologies including password management, user profile management, user provisioning

More information

AD Self-Service Suite for Active Directory

AD Self-Service Suite for Active Directory The Dot Net Factory AD Self-Service Suite for Active Directory Version 3.6 The Dot Net Factory, LLC. 2005-2011. All rights reserved. This guide contains proprietary information, which is protected by copyright.

More information

IT Service Desk Manual Ver. 2.0. Document Prepared By: IT Department. Page 1 of 12

IT Service Desk Manual Ver. 2.0. Document Prepared By: IT Department. Page 1 of 12 Document Prepared By: Page 1 of 12 INDEX 1. Introduction. 3 2. Home Page..... 4 2.1 My Request Summary..... 4 2.2 Announcement....... 5 2.3 Submit your Request...... 5 2.4 Report a Problem...... 6 2.5

More information

Cloud Identity Management Tool Quick Start Guide

Cloud Identity Management Tool Quick Start Guide Cloud Identity Management Tool Quick Start Guide Software version 2.0.0 October 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com Copyright 2013 CionSystems Inc., All

More information

Approaches to Enterprise Identity Management: Best of Breed vs. Suites

Approaches to Enterprise Identity Management: Best of Breed vs. Suites Approaches to Enterprise Identity Management: Best of Breed vs. Suites 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Executive Summary 1 3 Background 2 3.1 Enterprise Identity

More information

Lieberman Software. RSA SecurID Ready Implementation Guide. Account Reset Console. Partner Information. Last Modified: March 20 th, 2012

Lieberman Software. RSA SecurID Ready Implementation Guide. Account Reset Console. Partner Information. Last Modified: March 20 th, 2012 RSA SecurID Ready Implementation Guide Last Modified: March 20 th, 2012 Partner Information Product Information Partner Name Web Site Product Name Lieberman Software Corporation www.liebsoft.com Version

More information

Avatier Identity Management Suite

Avatier Identity Management Suite Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:

More information

VERALAB LDAP Configuration Guide

VERALAB LDAP Configuration Guide VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to

More information

ADSelfService Plus Client Software Installation Guide

ADSelfService Plus Client Software Installation Guide ADSelfService Plus Client Software Installation Guide ( I n s t a l l a t io n t h r o u g h A DS e l f S e r v ic e P l u s w e b p o r t a l a n d M a n u a l I n s t a l l a t io n ) 1 Table of Contents

More information

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2 HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7.

Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Contents 1. Introduction 2. Security Considerations 3. Installation 4. Configuration 5. Uninstallation 6. Automated Bulk Enrollment 7. Troubleshooting Introduction Adaxes Self-Service Client provides secure

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

Enterprise Self Service Quick start Guide

Enterprise Self Service Quick start Guide Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.

More information

1.6 HOW-TO GUIDELINES

1.6 HOW-TO GUIDELINES Version 1.6 HOW-TO GUIDELINES Setting Up a RADIUS Server Stonesoft Corp. Itälahdenkatu 22A, FIN-00210 Helsinki Finland Tel. +358 (9) 4767 11 Fax. +358 (9) 4767 1234 email: info@stonesoft.com Copyright

More information

IDENTIKEY Server Windows Installation Guide 3.2

IDENTIKEY Server Windows Installation Guide 3.2 IDENTIKEY Server Windows Installation Guide 3.2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

Password Manager Windows Desktop Client

Password Manager Windows Desktop Client Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard

More information

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM)

MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) MICROSOFT BITLOCKER ADMINISTRATION AND MONITORING (MBAM) Microsoft BitLocker Administration and Monitoring (MBAM) provides a simplified administrative

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Remote Access: Internet Explorer

Remote Access: Internet Explorer Introduction: Welcome to the MSVU Remote Access service. The following documentation is intended to assist first time or active users with connecting, authenticating and properly logging out of Remote

More information

Polar Help Desk Installation Guide

Polar Help Desk Installation Guide Polar Help Desk Installation Guide Copyright (legal information) Copyright Polar 1995-2005. All rights reserved. The information contained in this document is proprietary to Polar and may not be used or

More information

Using Exclaimer Signature Manager with Office 365

Using Exclaimer Signature Manager with Office 365 Using Exclaimer Signature Manager with Office 365 www.exclaimer.com How does Signature Manager Work? Signature Manager takes an email signature template and fills it out for a specific individual using

More information

Kaseya 2. User Guide. for Network Monitor 4.1

Kaseya 2. User Guide. for Network Monitor 4.1 Kaseya 2 Ping Monitor User Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations.

More information

Vyapin Office 365 Management Suite

Vyapin Office 365 Management Suite Vyapin Office 365 Management Suite Last Updated: May 2015 Copyright 2015 Vyapin Software Systems Private Limited. All rights reserved. This document is being furnished by Vyapin Software Systems Private

More information

Quick Install Guide - Safe AutoLogon For First-time Users - Installing and Running the Software. Published: February 2013 Software version: 5.

Quick Install Guide - Safe AutoLogon For First-time Users - Installing and Running the Software. Published: February 2013 Software version: 5. Quick Install Guide - Safe AutoLogon For First-time Users - Installing and Running the Software Published: February 2013 Software version: 5.0 Contents Introduction... 1 Safe AutoLogon solution... 2 Installation

More information

How To Login To The Mft Internet Server (Mft) On A Pc Or Macbook Or Macintosh (Macintosh) With A Password Protected (Macbook) Or Ipad (Macro) (For Macintosh) (Macros

How To Login To The Mft Internet Server (Mft) On A Pc Or Macbook Or Macintosh (Macintosh) With A Password Protected (Macbook) Or Ipad (Macro) (For Macintosh) (Macros TIBCO MFT Internet Server User Guide Software Release 7.2.4 October 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE

More information

DPH TOKEN SELF SERVICE SITE INSTRUCTIONS:

DPH TOKEN SELF SERVICE SITE INSTRUCTIONS: DPH TOKEN SELF SERVICE SITE INSTRUCTIONS: The purpose of this document is to provide users with assistance on resolving connection issues with Department of Public Health (DPH) Entrust tokens. These instructions

More information

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management

ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management ZyWALL OTP Co works with Active Directory Not Only Enhances Password Security but Also Simplifies Account Management Problem: The employees of a global enterprise often need to telework. When a sales representative

More information

Entrust Managed Services PKI

Entrust Managed Services PKI Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.

More information

Manual POLICY PATROL SECURE FILE TRANSFER

Manual POLICY PATROL SECURE FILE TRANSFER Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software

More information

1 Hitachi ID Password Manager

1 Hitachi ID Password Manager 1 Hitachi ID Password Manager Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Integrated Credential Management for Users: Passwords, encryption keys, tokens, smart cards and

More information

White Paper. Software version: 5.0 www.wmsoftware.com

White Paper. Software version: 5.0 www.wmsoftware.com Safe AutoLogon Password Server Using Safe AutoLogon Password Server to manage Safe AutoLogon clients for seamless and centrally managed automatic logons White Paper Software version: 5.0 www.wmsoftware.com

More information

Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal

Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal Integrating ConnectWise Service Desk Ticketing with the Cisco OnPlus Portal This Application Note explains how to configure ConnectWise PSA (Professional Service Automation) application settings and Cisco

More information

Use Enterprise SSO as the Credential Server for Protected Sites

Use Enterprise SSO as the Credential Server for Protected Sites Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured

More information

Unicenter NSM Integration for Remedy (v 1.0.5)

Unicenter NSM Integration for Remedy (v 1.0.5) Unicenter NSM Integration for Remedy (v 1.0.5) The Unicenter NSM Integration for Remedy package brings together two powerful technologies to enable better tracking, faster diagnosis and reduced mean-time-to-repair

More information

BMC Remedy Integration Guide 7.6.04

BMC Remedy Integration Guide 7.6.04 BMC Remedy Integration Guide 7.6.04 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

POLICY PATROL MFT. Manual

POLICY PATROL MFT. Manual POLICY PATROL MFT Manual MANUAL Policy Patrol MFT This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software may be copied, reproduced, translated

More information

CA Mobile Device Management 2014 Q1 Getting Started

CA Mobile Device Management 2014 Q1 Getting Started CA Mobile Device Management 2014 Q1 Getting Started This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Delegated Administration Quick Start

Delegated Administration Quick Start Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information

How To Install Help Desk Premier

How To Install Help Desk Premier Help Desk Premier Installation Guide 2012 BrightBox Solutions All rights reserved. Last Updated October, 2012 Help Desk Premier is a trademark of BrightBox Solutions. Help Desk Premier software and the

More information

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the

More information

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé

fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.

More information

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients

EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients EMC Physical Security Enabled by RSA SecurID Two-Factor Authentication with Verint Nextiva Review and Control Center Clients A Detailed Review EMC Information Infrastructure Solutions Abstract This white

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

Alleviating Password Management Demands on Your IT Service Desk SOLUTION WHITE PAPER

Alleviating Password Management Demands on Your IT Service Desk SOLUTION WHITE PAPER Alleviating Password Management Demands on Your IT Service Desk SOLUTION WHITE PAPER Table of Contents Executive Summary...1 The Importance of Automation...2 The Role of Password Management in Modern Business...3

More information

Installation Guide. Version 1.5. May 2015 Edition 2002-2015 ICS Learning Group

Installation Guide. Version 1.5. May 2015 Edition 2002-2015 ICS Learning Group Installation Guide Version 1.5 May 2015 Edition 2002-2015 ICS Learning Group 1 Disclaimer ICS Learning Group makes no representations or warranties with respect to the contents or use of this manual, and

More information

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide

RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide RSA Authentication Agent 7.2 for Microsoft Windows Installation and Administration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com

More information

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the

More information

Backing Up and Restoring Data

Backing Up and Restoring Data Backing Up and Restoring Data Cisco Unity Express backup and restore functions use an FTP server to store and retrieve data. The backup function copies the files from the Cisco Unity Express application

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

Identikey Server Windows Installation Guide 3.1

Identikey Server Windows Installation Guide 3.1 Identikey Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark

Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Windows Server 2008 Domain Controllers Version: 3.0.0 Symantec Enterprise Security Manager Baseline Policy Manual for

More information

Full disk encryption with Sophos Safeguard Enterprise With Two-Factor authentication of Users Using SecurAccess by SecurEnvoy

Full disk encryption with Sophos Safeguard Enterprise With Two-Factor authentication of Users Using SecurAccess by SecurEnvoy Full disk encryption with Sophos Safeguard Enterprise With Two-Factor authentication of Users Using SecurAccess by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker. Version 3.6 Administrator Guide NetWrix USB Blocker Version 3.6 Administrator Guide Table of Contents 1. Introduction...3 1.1. What is NetWrix USB Blocker?...3 1.2. Product Architecture...3 2. Licensing...4 3. Operation Guide...5 3.1.

More information

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email

More information

User Self-Service Configuration Overview

User Self-Service Configuration Overview User Self-Service Configuration Overview Version 8.2 Mobile Service Manager Legal Notice This document, as well as all accompanying documents for this product, is published by Good Technology Corporation

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

WHITE PAPER. Best Practices for Configuring PATROL for Microsoft Exchange Servers

WHITE PAPER. Best Practices for Configuring PATROL for Microsoft Exchange Servers WHITE PAPER Best Practices for Configuring PATROL for Microsoft Exchange Servers Contents INTRODUCTION..................................................... 3 PATROL SECURITY....................................................

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

DIS VPN Service Client Documentation

DIS VPN Service Client Documentation DIS VPN Service Client Documentation Background ------------------------------------------------------------------------------------------------ 1 Downloading the Client ---------------------------------------------------------------------------------

More information

Team Foundation Server 2013 Installation Guide

Team Foundation Server 2013 Installation Guide Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day benday@benday.com v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide

More information

ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7

ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7 ECAT SWE Exchange Customer Administration Tool SWE - Exchange Customer Administration Tool (ECAT) Table of Contents About this Guide... 3 Audience and Purpose... 3 What is in this Guide?... 3 CA.mail Website...

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Installation Guide. Tech Excel January 2009

Installation Guide. Tech Excel January 2009 Installation Guide Tech Excel January 2009 Copyright 1998-2009 TechExcel, Inc. All Rights Reserved. TechExcel, Inc., TechExcel, ServiceWise, AssetWise, FormWise, KnowledgeWise, ProjectPlan, DownloadPlus,

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

Interworks. Interworks Cloud Platform Installation Guide

Interworks. Interworks Cloud Platform Installation Guide Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,

More information

Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN-10233 June 2009

Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN-10233 June 2009 Application Note AN-10233 June 2009 ShoreTel 9: Active Directory Integration This application note outlines the configuration required to prepare a customer s Microsoft Active Directory environment for

More information

(Installation through ADSelfService Plus web portal and Manual Installation)

(Installation through ADSelfService Plus web portal and Manual Installation) ADSelfService Plus Client Software Installation Guide (Installation through ADSelfService Plus web portal and Manual Installation) 1 Table of Contents Introduction:... 3 ADSelfService Plus Client software:...

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

How to Use Remote Access Using Internet Explorer

How to Use Remote Access Using Internet Explorer Introduction Welcome to the Mount s Remote Access service. The following documentation is intended to assist first time or active users with connecting, authenticating and properly logging out of Remote

More information

Self-Service Active Directory Group Management

Self-Service Active Directory Group Management Self-Service Active Directory Group Management 2015 Hitachi ID Systems, Inc. All rights reserved. Hitachi ID Group Manager is a self-service group membership request portal. It allows users to request

More information

Configuring IBM Cognos Controller 8 to use Single Sign- On

Configuring IBM Cognos Controller 8 to use Single Sign- On Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright

More information

Setting up an MS SQL Server for IGSS

Setting up an MS SQL Server for IGSS Setting up an MS SQL Server for IGSS Table of Contents Table of Contents...1 Introduction... 2 The Microsoft SQL Server database...2 Setting up an MS SQL Server...3 Installing the MS SQL Server software...3

More information

RSA SecurID Token User Guide February 12, 2015

RSA SecurID Token User Guide February 12, 2015 RSA SecurID Token User Guide Page i Table of Contents Section I How to request an RSA SecurID token... 1 Section II Setting your RSA SecurID PIN... 6 Section III Setting up PuTTY on your Windows workstation

More information

New Brunswick Internal Services Agency. RSA Self-Service Console User Guide

New Brunswick Internal Services Agency. RSA Self-Service Console User Guide New Brunswick Internal Services Agency RSA Self-Service Console User Guide Version: 1.0 Created: November 27, 2013 Modified: November 27, 2013 Table of Contents Introduction...1 Logging on to the RSA Self-Service

More information

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2008 2015 VASCO Data Security, Inc., VASCO Data Security International

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

MaaS360 Cloud Extender

MaaS360 Cloud Extender MaaS360 Cloud Extender Installation Guide Copyright 2013 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software described

More information

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft

Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft 5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft

More information

CA Spectrum and CA Service Desk

CA Spectrum and CA Service Desk CA Spectrum and CA Service Desk Integration Guide CA Spectrum 9.4 / CA Service Desk r12 and later This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

NETWRIX IDENTITY MANAGEMENT SUITE

NETWRIX IDENTITY MANAGEMENT SUITE NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Configure Outbound Web Services 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

IDENTIKEY Server Windows Installation Guide 3.1

IDENTIKEY Server Windows Installation Guide 3.1 IDENTIKEY Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from

More information

Quick Start Guide. IT Management On-Demand

Quick Start Guide. IT Management On-Demand 1 Quick Start Guide Quick Start Guide IT Management On-Demand Introduction... 2 Getting Started... 3 Planning Your Deployment... 5 Performing a Test Deployment... 6 Enterprise Deployment Options... 8 Remote

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

MaaS360 On-Premises Cloud Extender

MaaS360 On-Premises Cloud Extender MaaS360 On-Premises Cloud Extender Installation Guide Copyright 2014 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software

More information

IBM Tivoli Identity Manager

IBM Tivoli Identity Manager Automated, role-based user management and provisioning of user services IBM Tivoli Identity Manager Reduce help-desk costs and IT staff workload with Web self-service and password reset/synch interfaces

More information

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet

DirX Identity V8.4. Secure and flexible Password Management. Technical Data Sheet Technical Data Sheet DirX Identity V8.4 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service

More information

ADSelfService Plus: 3rd party Winlogon Client Software Support

ADSelfService Plus: 3rd party Winlogon Client Software Support ADSelfService Plus: 3rd party Winlogon Client Software Support 1 Contents ADSelfService Plus - Introduction:... 3 ADSelfService Plus Client Software:... 3 Support for 3rd party GINA/Credential Provider

More information

PrinterOn Print Management Overview

PrinterOn Print Management Overview PrinterOn Print Management Overview Table of Contents 1. PrinterOn and Print Management Overview... 4 1.1. Combined PrinterOn and Print Management Capabilities... 5 1.1.1. Comprehensive Workflow Tracking

More information

White Paper BMC Remedy Action Request System Security

White Paper BMC Remedy Action Request System Security White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information

More information