SAP BusinessObjects Mobile Document Version: Mobile Security Guide
|
|
|
- Jean Bond
- 10 years ago
- Views:
Transcription
1 SAP BusinessObjects Mobile Document Version:
2 Content 1 Introduction Why is Security Necessary? About this Document Understanding the Mobile System Landscape User Management Authentication (Identity Management)....6 Importance of Authentication....6 Supported Authentication Types Authorization (Access Management)....7 Importance of Authorization... 7 Authorization in SAP BusinessObjects Mobile applications Network and Communication Security Network Security Understanding DMZ and Firewall DMZ and Firewall Support in the Mobile System Infrastructure Communication Channel Security Significance of HTTPS HTTPS Support in the Mobile System Infrastructure Security of Application Servers Reverse Proxy Support in the Mobile System Landscape URL Mapping Implemented on the Mobile Server Support for Security Deployments On the Web Application Server Installing the x509 Certificate on Device User Data Protection and Privacy Measures Implemented in SAP BusinessObjects Mobile Features of Application Password SAP SE or an SAP affiliate company. All rights reserved. Content
3 1 Introduction 1.1 Why is Security Necessary? Mobility is redefining the workplace and the borders between personal and professional, home and office, and device and application are fast disappearing. The number of devices connected to the internet is crossing millions. As the landscape of mobile devices is growing, the threats faced by them are also multiplying. Mobile Application stores are targets for attackers who are looking to maximize the effectiveness and reach of their malicious applications. Innumerable sorts of security attacks have been witnessed by the software systems over the years. As such, it is essential to identify the vulnerabilities and potential attack points that an attacker may target in a system, and apply adequate security mechanisms to protect the platform and application data. For Business Intelligence applications, the various security challenges must be addressed by both the BI platform and the mobile devices. SAP BusinessObjects Mobile implements the basic security mechanisms to ensure the safety of network, communication channels, application data, user data, plus the protection of many other aspects of the mobile system landscape. 1.2 About this Document This guide provides an overview of all aspects of the security strategy provided by the SAP BusinessObjects Mobile solution. It explains user management, data protection, network and communication security, application server security and the purpose of implementing the various security measures. Security is implemented both at the level of SAP BusinessObjects Mobile applications (clients) and at the overall Mobile system (landscape) level. Introduction 2015 SAP SE or an SAP affiliate company. All rights reserved. 3
4 2 Understanding the Mobile System Landscape The figure below depicts the technical and security landscape of the SAP BI Mobile system : SAP BI Mobile consists of a client-side application for mobile devices and a Mobile server component that communicates with the SAP Business Intelligence (BI) platform server. Using Mobile SAP BI applications, professionals on the move can access business intelligence information from a mobile device, such as a Smartphone or Tablet. The SAP BusinessObjects Mobile applications (for ios, Android and Blackberry) are designed specifically to meet the screen size and interactivity constraints of the mobile devices. Business Intelligence documents (including Web Intelligence, Crystal Reports, Dashboards and other types) are displayed on the device with native rendering, single-tap access and device-appropriate user interactivity. To access SAP BI platform content via the iphone, ipad, Android or Blackberry devices, users need to download the SAP BusinessObjects Mobile application to their devices. Although SAP BusinessObjects Mobile can work on data infrastructures like GPRS, the best performance is experienced on 3G and 3G+ Wifi networks SAP SE or an SAP affiliate company. All rights reserved. Understanding the Mobile System Landscape
5 Except the optional components (indicated in the figure), all entities depicted in the figure above of the Mobile system landscape are essential. Omitting any of them, may lead to insecurity of the network, services, data and users of the Mobile system. The importance and role of reverse proxy and certain other Mobile system entitles shown in the figure above are explained in other sections of this guide. Understanding the Mobile System Landscape 2015 SAP SE or an SAP affiliate company. All rights reserved. 5
6 3 User Management User Management includes the authentication or identity management of users and the authorization or access managment of system or application data. In the SAP BusinessObjects mobile system landscape, user management is implemented at both the BI platform level and the Mobile for android application level. The administrator creates user accounts and manages existing user accounts. This involves setting the authentication type, assigning a user role and assigning the user to a pre-defined group. By assigning a user to groups or otherwise, the administrator can control the rights of individual users or groups of users for accessing specific objects (documents) and performing various actions on the objects, such as downloading objects, refreshing objects, scheduling objects and viewing object instances. 3.1 Authentication (Identity Management) Importance of Authentication Implementing proper identity management or authentication is the first step towards ensuring a secure application. Using various authentication techniques such as phishing, eavesdropping, wiretapping, stealing, social engineering or reproduction of fingerprints, an attacker can easily gain invalid access to valuable system resources and data. Authentication means validating the identity claimed by a user through the information that he or she knows (as in the case of passwords) or some other data that the system has based on his or her actions in the recent past (as in the case of session cookies), and other mechanisms. The user's identity must only be corroborated on fields that Have been set by a trusted system, for example an application server or an Identity Provider. Are signed or integrity protected and cannot be modified by an attacker as such. A secure system protects sensitive authentication information of users by techniques such as password hashing for storage, encryption for data transfer and careful cookie management to avoid illegal access Supported Authentication Types The SAP BusinessObjects Mobile software uses standard authentication types to validate user identity. Before setting up the user accounts and groups within BI platform, the administrator needs to decide the type of authentication that he or she wants to use. SAP BusinessObjects Mobile applications support the following authentication types: SAP SE or an SAP affiliate company. All rights reserved. User Management
7 Authentication Type Enterprise LDAP Windows AD SAP Description This is the default authentication and is automatically enabled when the system is first installed. This should be used by the administrator when he or she prefers to create distinct accounts and groups for use within the BI platform, or when there is no existing hierarchy of users and groups in an LDAP directory server or Windows AD server. If an LDAP directory server is setup, the administrator can use existing LDAP user accounts and groups on the BI platform. When he or she maps the LDAP accounts to the BI platform, users are able to access BI platform applications with their LDAP user name and password. This eliminates the need to re-create individual user and group accounts within the BI platform. The administrator can use existing Windows AD user accounts and groups in the BI platform. When an AD account is mapped to the BI platform, users are able to log on to BI platform applications with their AD user name and password. This eliminates the need to recreate individual user and group accounts within the BI platform. The administrator can map existing SAP roles to BI platform accounts. When doing so, users are able to log on to BI platform applications with their SAP credentials. This eliminates the need to recreate individual user and group accounts within the BI platform. For the application to authenticate the user with the types mentioned above, the administrator must: Ensure that the appropriate prerequisites are satisfied. Perform additional configuration steps on the SAP BusinessObjects BI platform server and SAP BusinessObjects Mobile server. For the details of these prerequisites and additional configuration information, refer to the Administrator and Report Designer's Guide available at Authorization (Access Management) Importance of Authorization Authorization limits the accessibility of a software or platform's data to a particular set of users who can perform specific actions based on the rights or permissions granted to them. The goal of authorization is to ensure that users perform only legitimate actions. Authorization defines what a user can do and is critical for data protection, fraud prevention and general legislation compliance. Authorization is often explained using the analogy of locks and keys. The assets of a system are protected by locks. Users get keys (rights or permissions) to open locks. This concept is illustrated in the following example: User Management 2015 SAP SE or an SAP affiliate company. All rights reserved. 7
8 In the following figure, each lock represents an authorization attribute or condition imposed by the administrator that must be met by the user to access the asset. All locks of an asset need to be "opened" to access or work on an asset. The locks and their respective keys are depicted by the same color code: Asset 1: Neither Bob nor John have sufficient keys to unlock the asset. As such, neither of them can access Asset 1. Asset 2: Bob has the required (red and yellow) keys to unlock the asset. John does not have the red key. Hence, Bob can access Asset 2, while John cannot. Asset 3: Only the yellow key is required to unlock the asset. Both Bob and John have the yellow key and so both of them can access Asset Authorization in SAP BusinessObjects Mobile applications In the SAP BusinessObjects Mobile system, individual users or groups can access the BI platform content based on the rights granted to them by the application administrator. Users can hold the rights of only a BI Viewer,which means they can access and perform specific actions on the documents, but not modify or upload them from their devices. The application administrator must grant the following minimum rights to authorize the user: Object level rights: Users must have the following minimum rights: View rights for folders, categories and documents: This right enables users to access the required folders and categories; download documents, view documents and synchronize the downloaded documents with the mobile server. Refresh rights for documents: This right authorizes users to refresh the documents. Application level rights: The administrator must grant users the following rights at the application level: Rights to log on to Web Intelligence Rights to enable formatting for reports SAP SE or an SAP affiliate company. All rights reserved. User Management
9 The administrator grants rights to individual users from the Central Management Console (CMC) on the BI platform. For information on how to assign mobile specific user rights using the CMC, refer to the Mobile Server deployment guide available at E/xi4sp5_mob_inst_deploy_en.pdf For information on how the access rights are assigned in general, see the Business Intelligence Platform Administrator 's Guide available at xi4sp6_bip_admin_en.pdf User Management 2015 SAP SE or an SAP affiliate company. All rights reserved. 9
10 4 Network and Communication Security 4.1 Network Security Network hosts in a mobile system landscape provide various services to the internet such as web, , application files and confidential information and are vulnerable to attack by hackers, intruders and all sorts of malicious users. This section gives an overview of the security mechanisms that are applied to protect the components of the mobile system network Understanding DMZ and Firewall A DMZ, or De militarized Zone, is a physical or logical subnetwork that contains and exposes an organization's external services to a larger untrusted network, usually the Internet. The purpose of a DMZ is to add an additional layer of security to an organization's local area network (LAN). This means that an external attacker only has access to equipment in the DMZ, rather than any other part of the network. In a network, the hosts most vulnerable to attack are those that provide services to users outside of the local area network, such as , web and Domain Name System (DNS) servers. Because of the increased potential of these hosts being attacked, they are placed into their own sub-network to protect the rest of the network if an intruder were to succeed in attacking all of them. Hosts in the DMZ have limited connectivity to specific hosts in the internal network but communication with other hosts in the DMZ and to the external network is allowed. This allows hosts in the DMZ to provide services to both the internal and external network, while an intervening firewall controls the traffic between the DMZ servers and the internal network clients. A DMZ configuration typically provides security from external attacks. A DMZ is also referred to as a Perimeter Network. Any service that is being provided to users on the external network can be placed in the DMZ. The most common of these services are: Web servers Mail servers FTP servers VoIP(Voice over Internet Protocol) servers SAP SE or an SAP affiliate company. All rights reserved. Network and Communication Security
11 Architecture There are many different ways to design a network with a DMZ. Two of the most basic methods are with a single firewall, also known as the three legged model, and with dual firewalls. Single Firewall A single firewall with at least three network interfaces can be used to create a network architecture containing a DMZ. The external network is formed from the Internet Service Provider(ISP) to the firewall on the first network interface, the internal network is formed from the second network interface, and the DMZ is formed from the third network interface. The firewall becomes a single point of failure for the network and must be able to handle all of the traffic going to the DMZ as well as the internal network. The figure below illustrates the single firewall architecture. Notice that the various service hosts are placed within the DMZ. Network and Communication Security 2015 SAP SE or an SAP affiliate company. All rights reserved. 11
12 Dual Firewall This implementation uses two firewalls to create a DMZ. The first firewall (also called the "front-end" firewall) must be configured to allow traffic destined for the DMZ only. The second firewall (also called "back-end" firewall) allows only traffic from the DMZ to the internal network. Dual firewalls provide a more secure infrastructure. In some organizations, the two firewalls are provided by two different vendors. If an attacker manages to break through the first firewall, it may take more time to break through the second one if it is made by a different vendor, and thus less likely to suffer from the same security vulnerabilities if any are found. The figure below illustrates the dual firewall architecture DMZ and Firewall Support in the Mobile System Infrastructure The SAP BusinessObjects Mobile server supports deployments in the DMZ environment. The SAP BusinessObjects Mobile client on the extranet interacts with the SAP BusinessObjects BI platform server on the intranet using the DMZ environment. To enable this deployment, perform the following: 1. Configure the -requestport and -port parameters for the following servers: SAP SE or an SAP affiliate company. All rights reserved. Network and Communication Security
13 CMS (for authentication, querying InfoStore, and browsing the repository) Web intelligence report server Adaptive processing server 2. Open the listening ports (-requestport parameter) for the servers mentioned above on the internal firewall. 3. Open the Web application server port on the external firewall. The communication between the SAP BusinessObjects Mobile client and SAP BusinessObjects Mobile server uses the HTTPS protocol. The SAP BusinessObjects Mobile server communicates with SAP BusinessObjects BI platform Central Management Server (CMS), Web Intelligence Servers, and Adaptive Processing Servers in Corba mode. 4.2 Communication Channel Security Significance of HTTPS Hypertext Transfer Protocol Secure (HTTPS) is a combination of the Hypertext Transfer Protocol (HTTP) with Secure Socket Layer (SSL) or Transport Layer security (TLS) protocol. HTTPS provides secure identification of a web server in the network and encrypted communication between the interacting entities (client and server or two servers). HTTPS connections are used for sensitive transactions on the World Wide Web and corporate information systems. HTTPS is syntactically identical to the HTTP scheme used for normal HTTP connections, but it also signals the browser to use an added encryption layer of SSL/TLS to protect the traffic. SSL is especially suited for HTTP since it can provide some protection even if only one side of the communication is authenticated. This is the case with HTTP transactions over the Internet, where typically only the server is authenticated (by the client examining the server's certificate). The main idea of HTTPS is to create a secure channel over an insecure network. This ensures reasonable protection from eavesdroppers and man-in-the-middle attacks, provided that adequate cipher suites are used and that the server certificate is verified and trusted.the trust inherent in HTTPS is based on major certificate authorities that come pre-installed in browser software HTTPS Support in the Mobile System Infrastructure The SAP BusinessObjects Mobile server supports encrypted communication with the SAP BusinessObjects Mobile client. To encrypt the communication between the SAP BusinessObjects Mobile application (on device) and the SAP BusinessObjects Mobile server, you must configure HTTPS on your Web Application Server. We recommend that you configure HTTPS on your Web application server to ensure the security of the communication channel in your set up. For information on how to configure HTTPS, refer to the documentation of your Web Application Server. Network and Communication Security 2015 SAP SE or an SAP affiliate company. All rights reserved. 13
14 1. With effect from the 5.1 release, the SAP BusinessObjects Mobile application for ios allows HTTPS connections to only trusted servers. A trusted server is a server with secure server certificates signed by certificate authorities (CAs) that are trusted by ios. If the server is not trusted, and users try to add a server connection in the application, they encounter an error. For more information, refer to the related topic provided at the bottom. 2. By default HTTP caching is supported for all HTML content that you view using the application. However, you can disable it by defining the property feature.disable.http.caching with a value of 'false' in client settings on the Mobile server. For information on how to define or edit the client settings using the CMC on the server, refer to the Administrator's Guide available on help.sap.com/bomobileios Related Information Ensuring that the Mobile Server is Trusted [page 14] Ensuring that the Mobile Server is Trusted If you are using HTTPS to connect to your SAP BusinessObjects Mobile server, the SAP BI application (for ios and Android) only allows connections to trusted servers. In order for the application to establish successful connections to a server, it is essential that one of the following conditions is met: Your server is trusted. This means that the server has secure server certificates from a Certificate Authority (CA), and these CAs are trusted by ios (such as Verisign, Thawte and others listed at support.apple.com/kb/ht5012 ) The root certificate of your server is installed on the client device (iphone or ipad) as a profile, which means when the connection to the server is added in the application, the device can verify the server certificate. If one of the above conditions is not met, and you try to add a server connection in the application, you encounter an error like this: Connection to the server could not be established (MOB06031) (HTTP-1202) Details: The certificate for this server is invalid. You might be connecting to a server that is pretending to be <server1.servers.xxcompany.com>, which could put your confidential information at risk. If you are not using a root certificate that is preinstalled on the user's device (such as a self-signed root certificate created by your company), you can distribute it in one of the following ways: Using the Mobile Device Management (MDM) tools Sending the root certificate as an attachment Hosting the root certificate on a server and sharing the link For example, to retrieve the root certificate of a trusted server and to share it with other users, follow the procedure below: SAP SE or an SAP affiliate company. All rights reserved. Network and Communication Security
15 1. Open your browser settings and open the certificates (depending on your browser, the Manage Certificates or Certificates option may appear in one of the tabs). 2. In the Certificates window, access the Trusted Root Certification Authorities tab as shown in the figure below: 3. Select the trusted root certificate corresponding to your server, and choose Export. The Certificate Export wizard appears. 4. Follow the prompts to export the certificates. The certificate is saved on your machine. Attach the certificate to an and send it to the required recipients. Alternatively, host the root certificate on a server and send the URL to the users. When users receive the certificate on their ios device, they can choose the Install option when they tap the file or URL. Once installed, the certificate appears on the device as a profile, and users can check the installation on their iphone or ipad: Settings General Profiles. The SAP BusinessObjects Mobile application temporarily provides you with an option to bypass the verification of server certificate. However, this option should only be used in exceptional situations. We recommend that you install all the root certificates required for your servers on the device. Alternatively, get your current servers signed by a CA trusted by ios. For a list of certificate authorities trusted by ios, refer to This temporary option will be removed in a future release of the application. Network and Communication Security 2015 SAP SE or an SAP affiliate company. All rights reserved. 15
16 To bypass the verification of server certificate and to establish connections to an uncertified server through the application, access Application Settings Additional Settings Security Exceptions and add the names or the IP addresses (of the servers that you want to be ignored for verification) to the IGNORE SERVER TRUST CERTIFICATE field SAP SE or an SAP affiliate company. All rights reserved. Network and Communication Security
17 5 Security of Application Servers Access to the SAP BusinessObjects Business Intelligence platform servers and the SAP BusinessObjects Mobile server is secured by setting up reverse proxy servers in the system. This section explains the architecture of reverse proxy servers and how they are implemented in the mobile infrastructure. 5.1 Reverse Proxy Support in the Mobile System Landscape Significance of Reverse Proxy Servers Like a proxy server, a reverse proxy server is an intermediary between the client and the Web application server, but it is used the other way around. Instead of providing a service to internal users wanting to access an external network, a reverse proxy server provides an external network with indirect access to internal resources. For example, back office application access, such as an system, could be provided to external users (to read s while outside the company) but the remote user would not have direct access to his server. Only the reverse proxy server can physically access the internal server. Reverse proxy is an extra layer of security, which is particularly recommended when internal resources need to be accessed from the outside. Usually such a reverse proxy mechanism is provided by using an application layer firewall. Like a proxy server, reverse proxy also provides efficiency advantages such as load distribution, caching of static and dynamic content, and content compression. From the perspective of security, it gives the following advantages to the system : Reverse proxies hide the existence and characteristics of the original server(s). Application firewall features of a reverse proxy can protect against common web-based attacks. Without a reverse proxy, removing malware or initiating takedowns, for example, can become difficult. In the case of secure websites, the SSL encryption is sometimes not performed by the web server itself, but is instead offloaded to a reverse proxy that may be equipped with SSL acceleration hardware. Implementation in the Mobile Landscape The mobile platform is deployed in an environment with one or more reverse proxy servers. The reverse proxy server communicates with SAP BusinessObjects Mobile client(s) and is typically deployed in front of the SAP BusinessObjects Mobile server in order to hide the mobile and BI platform servers behind a single IP address. This configuration routes all Internet traffic that is addressed to private web application servers through the reverse proxy server, hiding private IP addresses. Security of Application Servers 2015 SAP SE or an SAP affiliate company. All rights reserved. 17
18 Because the reverse proxy server translates the public URLs to internal URLs, it must be configured with the URLs of the Mobile platform applications that are deployed on the internal network. Once reverse proxy is enabled for the server, the client can access the mobile application using the appropriate reverse proxy URL. 5.2 URL Mapping Implemented on the Mobile Server When users add Mobile server connections in the SAP BI application on their mobile device, they specify the Mobile <Server-URL> for each connection. After creating connections, when the user chooses a connection, the application creates a specific request URL to invoke the Web application server (Mobile server). Users need not enter the complete URL for a Mobile server. Instead, the application re-constructs the URLs in the following manner: If the user enters: x.com:8080 in the <Server-URL> field, the application contacts /MobileBIService/MessageHandlerServlet using HTTP POST. If the user enters: in the <Server-URL> field, the application contacts x.com:8080/mobilebiservice/messagehandlerservlet using HTTP POST. If the user enters: in the <Server-URL> field, the application contacts x.com:8080/mobilebiservice/messagehandlerservlet using HTTPS POST. 1. If a user is setting up a reverse proxy server, all communications recieved over the URL: external-hostname:port/mobilebiservice/messagehandlerservlet must be mapped to All the query parameters in the URL (such as?x=a&y=b) must also be mapped. 2. If user is setting up a load balancer, he/she must ensure that cookie-based persistence (for session data) is set up for the server that first serves the client request. If the load balancer faces issues with cookie-based persistence, ensure that IP based persistence is set up SAP SE or an SAP affiliate company. All rights reserved. Security of Application Servers
19 6 Support for Security Deployments On the Web Application Server Ensure that you have implemented either of the following scenarios on your Web application server (on which you have installed the SAP BusinessObjects Mobile server): Basic authentication (for example Siteminder) Form based authentication (for example Siteminder, Webseal) X509 certificate (two way client certificate) When users add connections to the SAP Mobile server (with either of the above security deployments) using the SAP BusinessObjects Mobile application on their devices, they see a security interface which asks for authentication. The following sections explain the three scenarios listed above. a. Basic Authentication 1. Using the Settings screen of the application, users add a connection to the CMS with basic authentication deployed on it. (As an administrator, you provide the specific server details to the application users.) 2. On choosing the new connection in the Settings screen, the application displays the basic Authentication dialog box, asking the user to enter his/her credentials. 3. User is logged in to the connection, and can browse the BI documents available on the server. b. Form Based Authentication 1. Using the Settings screen of the application, users add a connection to the CMS with form based authentication deployed on it. (As an administrator, you provide the specific server details to the application users.) 2. On choosing the new connection in the Settings screen, the application displays a form, asking the user to provide additional information. The form fields can be customized on the Web application server and UI features such as company logo can be included in the form. The form configured on the Web application server is displayed in the same way as in the application in a container on device. 3. User is logged in to the connection, and can browse the BI documents available on the server. Support for Security Deployments On the Web Application Server 2015 SAP SE or an SAP affiliate company. All rights reserved. 19
20 c. Certificate Based Authentication 1. Users first install the X509 certificate on the device. Information on how to install the certificate is provided in the sub-topic of this chapter. 2. Using the Settings screen of the application, users add a connection to the CMS with certificate based authentication deployed on it. (As an administrator, you provide the specific server details to the application users.) 3. When you choose the new connection in the Settings screen, the application displays a dialog box stating that the connection requires a certificate. User chooses Yes to display the certificate. 4. Application displays the available certificates and asks for the right certificate. 5. User selects the certificate (installed in step 1) from the list. 6. User is logged in to the connection, and can browse the BI documents available on the server. 1. Installed certificates can be removed from the application by choosing the Clear Data Remove Certificates option in the Settings screen. 2. The application supports basic authentication and certificate based authentication for hyperlink objects as well. 6.1 Installing the x509 Certificate on Device For adding or accessing a certificate based connection in the application, users need to first install the certificate on their device. SAP BusinessObjects Mobile applications support the set ups that are deployed based on the x 509 certificate. x 509 certificate is usually of the format "<>.p12" or "<>.cert" The procedures below are for users who install the certificate (received via or accessed from a Web application server) on their device: Installing the certificate received as an attachment 1. On your desktop, download the certificate (*.p12) file. 2. Change the certificate file extension from ".p12" to ".mcert" and send it to the account configured on your device.this ensures that the certificate file is in a recognizable format for the application. 3. On your device, double-click the certificate that you ed to your account. The application is launched. If the certificate is not password protected, a message appears on the screen saying that the certificate is installed successfully. If the certificate is password protected, a dialogue box appears on the screen asking you to enter the password. For the installation to complete successfully, enter the password and choose OK SAP SE or an SAP affiliate company. All rights reserved. Support for Security Deployments On the Web Application Server
21 The message for successful certificate installation appears. If the certificate you are installing already exists on your device, on performing step 3 in the above task, a dialogue box appears saying: "This certificate <ID> already exists". If you want to delete the existing certificate from the app, choose Delete in the dialogue box. Else, choose Cancel. Installing the certificate hosted on a Web Application Server 1. On your device, access either of the following links ed to you by the administrator: SAPBI://action=downloadcert&certurl=<Download URL> SAPBI://action=downloadcert&certurl=<Download URL>&Password=abc If you access the first link above: The application is launched and the certificate file is downloaded from the URL location (certurl). A dialogue box appears asking you to enter the password. Enter the password and choose OK. The certificate is installed successfully on the device. If the certificate is not password protected, the application is installed directly on accessing the link. 3. If you access the second link above: The application is launched and the certificate file is downloaded from the URL location (certurl). The certificate is directly installed on the device. Since the password is already included in the URL, the application does not ask the user for the password. In this case, if the certificate is not password protected, the parameter for password is ignored by the application. An example of the parameter "Download URL" is I p12 ; where :8080 is the IP address and port of the Web application server machine and I p12 is the certificate file. If the certificate you are installing already exists on your device, on accessing any of the two links, a dialogue box appears saying: "This certificate <ID> already exists". If you want to delete the existing certificate from the application, choose Delete in the dialogue box. Else, choose Cancel. Support for Security Deployments On the Web Application Server 2015 SAP SE or an SAP affiliate company. All rights reserved. 21
22 7 User Data Protection and Privacy Measures Implemented in SAP BusinessObjects Mobile User data is the data or information which is personal to an individual user. In the context of the SAP BusinessObjects Mobile applications, this includes the downloaded reports and application logon credentials of the user. To ensure the security of user data, the following features are implemented on the software: The downloaded documents are persisted on the device as encrypted files. The downloaded content is encrypted using the FIPS compliant AES algorithm. For ipad/iphone devices with ios version or above, these encrypted documents are not uploaded to icloud. Users have the same authorizations as defined on the SAP Business Intelligence (BI) platform server, even for the downloaded or offline documents. Users have the option of saving their password for a connection in the application. However, in the server configuration, this option is disabled by default (savepassword=false). If a user enables the Save Password option while configuring the connection on his or her device, the password is encrypted using the FIPS compliant AES algorithm and stored with the ios keychain. For information on the password enhancements implemented in the application, see the sub-topic of this chapter. In the default configuration of the application, the option to download and view documents locally on the device is disabled. (offlinestorage=false). Users can only access the documents available on the server in online mode of working. Based on requirements, administrator can enable this option in the server configuration file. If offline storage of documents is enabled, there is a "Time to Live" parameter in the server configuration file, with a default value of 365 days (offlinestorage.ttl=365). This means that the downloaded documents expire after 365 days and are automatically removed from the local memory of device. The administrator can choose to set a lower value for ttl (for example 5 days) based on the specific data protection requirements. For BI documents having private or confidential data, administrators can secure the documents by assigning them to a "Confidential" category on the BI platform. Users can access a secure document only while they are connected to the Mobile server. Once users log off from the server, the secure document is deleted from the device memory. The mobile application stores HTTP cache when user access hyperlinks, analysis application documents, and SAP Lumira BI content on the device. Administrator can disable the HTTP cache on mobile client by setting the feature.http.cache.disabled property to true in Client Settings in CMC. 1. For information on configuring the various security parameters (such as savepassword and offlinestorage) on the Mobile server; and on securing BI documents, refer to the Administrator and Report Designer's guide available at or at bomobileandroid SAP SE or an SAP affiliate company. All rights reserved. User Data Protection and Privacy Measures Implemented in SAP BusinessObjects Mobile
23 2. Advanced capabilities such as wiping the application data from the device are not supported in the SAP BusinessObjects Mobile software at this point in time. 7.1 Features of Application Password The application password acts as a source of input for encryption of user data, where other users cannot decrypt the data without this input. Here are some features of the SAP BusinessObjects Mobile application password: By default, the application password is not enabled in the application, until users add a connection to the BI platform server. When users add a BI platform server connection, the application forces them to create an application password (this is because user specific or personal information comes on the device only after a connection is created). However, if users have not created a single connection, yet, they wish to enable the application password, they can do so using the Settings screen of the application. (Settings screen appears on tapping the [Settings] icon which is next to the current connection name in the left hand navigation panel.) The above behavior applies if the user has performed a fresh installation of the application. If a user has upgraded the existing installation with a newer version of the application from the itunes store, server connections would already exist in the application, and so the password would remain enabled. Password prerequisites: Password length must be minimum eight characters. For entering the password, the application allows a maximum of twenty attempts. If the attempts exceed this number, the application forces the user to reset the application. Resetting the application erases the application password and all the SAP BI content downloaded on the device. By choosing the Clear Data Remove Application Data option in the of the Settings screen, all BI data of the application is deleted from the local memory. However, this does not delete the application password. Users can change the password and set the "Application password timeout" parameter using the Settings screen. The Application password timeout parameter defines the duration of inactivity. Once this is exceeded, the application forces the user to enter the password to resume the application activity. This applies to the scenario when the user has switched over to other applications, and returns to the SAP BusinessObjects Mobile application after some time.the default value of this parameter is 5 minutes. User Data Protection and Privacy Measures Implemented in SAP BusinessObjects Mobile 2015 SAP SE or an SAP affiliate company. All rights reserved. 23
24 The following lines of code in the clientsettings.properties file on the Mobile server, help you customize the password settings in the application: savepassword=true offlinestorage=true offlinestorage.ttl=365 offlinestorage.apppwd=true If you set savepassword=true, the Save Password option appears in the Connection settings screen of the application. Otherwise, it does not appear for the user. If for a server, the administrator has set the value of offlinestorage.apppwd parameter to true, users cannot disable the application password (for the particular server connection) while using the application. If this parameter has the false (default) value, users can disable the application password using the (Settings) screen of the application. Other parameters associated with offline storage (such as "time to live") apply to the password as well. For information on the workflow of a particular action (such as disabling application password), use the embedded Help provided in the application SAP SE or an SAP affiliate company. All rights reserved. User Data Protection and Privacy Measures Implemented in SAP BusinessObjects Mobile
25 Important Disclaimers and Legal Information Coding Samples Any software coding and/or code lines / strings ("Code") included in this documentation are only examples and are not intended to be used in a productive system environment. The Code is only intended to better explain and visualize the syntax and phrasing rules of certain coding. SAP does not warrant the correctness and completeness of the Code given herein, and SAP shall not be liable for errors or damages caused by the usage of the Code, unless damages were caused by SAP intentionally or by SAP's gross negligence. Accessibility The information contained in the SAP documentation represents SAP's current view of accessibility criteria as of the date of publication; it is in no way intended to be a binding guideline on how to ensure accessibility of software products. SAP in particular disclaims any liability in relation to this document. This disclaimer, however, does not apply in cases of wilful misconduct or gross negligence of SAP. Furthermore, this document does not result in any direct or indirect contractual obligations of SAP. Gender-Neutral Language As far as possible, SAP documentation is gender neutral. Depending on the context, the reader is addressed directly with "you", or a gender-neutral noun (such as "sales person" or "working days") is used. If when referring to members of both sexes, however, the third-person singular cannot be avoided or a gender-neutral noun does not exist, SAP reserves the right to use the masculine form of the noun and pronoun. This is to ensure that the documentation remains comprehensible. Internet Hyperlinks The SAP documentation may contain hyperlinks to the Internet. These hyperlinks are intended to serve as a hint about where to find related information. SAP does not warrant the availability and correctness of this related information or the ability of this information to serve a particular purpose. SAP shall not be liable for any damages caused by the use of related information unless damages have been caused by SAP's gross negligence or willful misconduct. All links are categorized for transparency (see: Important Disclaimers and Legal Information 2015 SAP SE or an SAP affiliate company. All rights reserved. 25
26 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP SE or an SAP affiliate company. The information contained herein may be changed without prior notice. Some software products marketed by SAP SE and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP SE or an SAP affiliate company for informational purposes only, without representation or warranty of any kind, and SAP or its affiliated companies shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP or SAP affiliate company products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP SE (or an SAP affiliate company) in Germany and other countries. All other product and service names mentioned are the trademarks of their respective companies. Please see index.epx for additional trademark information and notices.
SAP Business Intelligence Suite Patch 10.x Update Guide
SAP BusinessObjects Business Intelligence Suite Document Version: 4.0 Support Package 10-2014-07-25 SAP Business Intelligence Suite Patch 10.x Update Guide Table of Contents 1 Introduction.... 3 1.1 About
SAP BusinessObjects BI Platform Document Version: 4.2 2015-11-12. Recommendations for Conversion Using the Report Conversion Tool
SAP BusinessObjects BI Platform Document Version: 4.2 2015-11-12 Recommendations for Conversion Using the Report Conversion Tool Content 1 Document History....3 2 About this Document.... 4 3 Conversion
CUSTOMER Presentation of SAP Predictive Analytics
SAP Predictive Analytics 2.0 2015-02-09 CUSTOMER Presentation of SAP Predictive Analytics Content 1 SAP Predictive Analytics Overview....3 2 Deployment Configurations....4 3 SAP Predictive Analytics Desktop
Mobile Secure Cloud Edition Document Version: 2.0-2014-07-07. Mobile Application Management
Mobile Secure Cloud Edition Document Version: 2.0-2014-07-07 Table of Contents 1 Important Disclaimers on Legal Aspects....3 2 Introduction....4 3 Application Catalog....5 3.1 Application Catalog Icons....5
CUSTOMER SAP Afaria Windows Phone and Windows 8.1 Enrollment
SAP Afaria Document Version: 7 SP05-2014-09-03 CUSTOMER SAP Afaria Windows Phone and Windows 8.1 Enrollment Table of Contents 1 Windows 8.1 Device Enrollment....3 1.1 Enrolling a Windows 8.1 Device Using
2015-09-24. SAP Operational Process Intelligence Security Guide
2015-09-24 SAP Operational Process Intelligence Security Guide Content 1 Introduction.... 3 2 Before You Start....5 3 Architectural Overview.... 7 4 Authorizations and Roles.... 8 4.1 Assigning Roles to
CUSTOMER Access Control Guide
Mobile Secure Cloud Edition Document Version: 2.3 2016-03-21 CUSTOMER Content 1 Access Control.... 3 2 Access Control Remote....4 2.1 Configuring Access Control Remote....4 3 Default Access Control Policies....
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Mobile Secure Cloud Edition Document Version: 2.0-2014-06-26. ios Application Signing
Mobile Secure Cloud Edition Document Version: 2.0-2014-06-26 Table of Contents 1 Introduction.... 3 2 Apple Team Membership....4 3 Building a Team by Adding Team Admins and Team Members.... 5 4 App Protection
SuccessFactors HCM Suite November 2014 Release Version: 1.0 - December 5, 2014. SuccessFactors Learning Programs Administration Guide
SuccessFactors HCM Suite November 2014 Release Version: 1.0 - December 5, 2014 Programs Administration Guide Content 1 Change History....3 2 Programs.... 4 2.1 Adding a New Program.... 5 2.2 Assigning
SuccessFactors HCM Suite August 2014 Release Document Version: 1.0 - August 22, 2014. SuccessFactors Learning Programs Administration Guide
SuccessFactors HCM Suite August 2014 Release Document Version: 1.0 - August 22, 2014 Programs Administration Guide Table of Contents 1 Change History....3 2 Programs.... 4 2.1 Adding a New Program....
SAP BusinessObjects Document Version: 4.1 Support Package 7 2015-11-27. Dashboards and Presentation Design Installation Guide
SAP BusinessObjects Document Version: 4.1 Support Package 7 2015-11-27 Dashboards and Presentation Design Installation Guide Content 1 Document History....3 2 About this Guide....4 3 Planning Installations....5
SAP HANA Client Installation and Update Guide
PUBLIC SAP HANA Platform SPS 12 Document Version: 1.0 2016-05-11 Content 1 Introduction....3 1.1 Supported Platforms.... 3 1.2 Software Download.... 4 2 SAP HANA Client on UNIX or Linux....7 2.1 Planning
SAP BusinessObjects Analysis, edition for Microsoft Office Document Version: 2.3 2016-06-16. What's New Guide
SAP BusinessObjects Analysis, edition for Microsoft Office Document Version: 2.3 2016-06-16 Content 1 About this guide....3 2 About the documentation set....4 3 Administration.... 6 3.1 New and changed
CUSTOMER SAP Afaria Overview
SAP Afaria 7 SP15 Document Version: 1.0 2016-06-13 CUSTOMER Content 1 Afaria Overview....3 1.1 About Afaria....3 1.2 Afaria Access and Support....4 1.3 Finding Information....5 2 Afaria Architecture....7
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
SAP BusinessObjects Business Intelligence Suite Document Version: 4.1 Support Package 3-2014-05-07. Patch 3.x Update Guide
SAP BusinessObjects Business Intelligence Suite Document Version: 4.1 Support Package 3-2014-05-07 Table of Contents 1 Document History....3 2 Introduction....4 2.1 About this Document....4 2.1.1 Constraints....4
Introduction to the EIS Guide
Introduction to the EIS Guide The AirWatch Enterprise Integration Service (EIS) provides organizations the ability to securely integrate with back-end enterprise systems from either the AirWatch SaaS environment
Manual to Access SAP Training Systems Technical Description for Customer On-Site Training
Manual to Access SAP Training Systems Technical Description for Customer On-Site Training 2.0 draft version available as of Jan. 5th 2015. The final version will be available in January 2015 after valuable
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
PUBLIC SAP IT Operations Analytics 1.0: Administrator's and User's Guide
Document Version: ITOA 1.0-1.3 2015-10-06 PUBLIC SAP IT Operations Analytics 1.0: Administrator's and User's Guide Content 1 Introduction....5 1.1 Technical Architecture....5 1.2 Basic Prerequisites....7
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
SAP Business Intelligence Platform Translation Management Tool SDK Developer Guide
SAP BusinessObjects Business Intelligence platform Document Version: 4.2 2015-11-12 SAP Business Intelligence Platform Translation Management Tool SDK Developer Guide Content 1 Document History....4 2
Configuration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide
SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English Afaria Network Configuration (X87) Building Block Configuration Guide SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2014 SAP SE
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected]
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: [email protected] Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
System Requirements and Technical Prerequisites for SAP SuccessFactors HCM Suite
System Requirements and Technical Prerequisites for SAP SuccessFactors HCM Suite SAP SuccessFactors HCM Suite is a fully web-based offering. You will need an Internet connection and a system that meets
SSL VPN Technology White Paper
SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
SAP BusinessObjects Business Intelligence Platform Document Version: 4.1 Support Package 5-2014-11-06. Business Intelligence Launch Pad User Guide
SAP BusinessObjects Business Intelligence Platform Document Version: 4.1 Support Package 5-2014-11-06 Business Intelligence Launch Pad User Guide Table of Contents 1 Document history....7 2 Getting started
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Release Document Version: 1.4 SP8-2014-07-31. What's New Guide: SAP BusinessObjects Analysis, edition for Microsoft Office
Release Document Version: 1.4 SP8-2014-07-31 What's New Guide: SAP BusinessObjects Analysis, edition for Microsoft Office Table of Contents 1 About this guide....3 2 About the documentation set....4 3
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12
M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.
PUBLIC Supplement for J.D. Edwards
SAP Data Services Document Version: 4.2 Support Package 7 (14.2.7.0) 2016-05-06 PUBLIC Content 1 Overview....3 2 System requirements....4 2.1 World....4 2.2 OneWorld....4 3 Datastores.... 6 3.1 Defining
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Sync Security and Privacy Brief
Introduction Security and privacy are two of the leading issues for users when transferring important files. Keeping data on-premises makes business and IT leaders feel more secure, but comes with technical
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
SonicWALL Mobile Connect. Mobile Connect for OS X 3.0. User Guide
SonicWALL Mobile Connect Mobile Connect for OS X 3.0 User Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Installation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s
S E C U R I T Y A S S E S S M E N T : B o m g a r A p p l i a n c e s During the period between November 2012 and March 2013, Symantec Consulting Services partnered with Bomgar to assess the security
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Pre-Installation Instructions
Agile Product Lifecycle Management PLM Mobile Release Notes Release 2.0 E49504-02 October 2014 These Release Notes provide technical information about Oracle Product Lifecycle Management (PLM) Mobile 2.0.
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
BusinessObjects Enterprise InfoView User's Guide
BusinessObjects Enterprise InfoView User's Guide BusinessObjects Enterprise XI 3.1 Copyright 2009 SAP BusinessObjects. All rights reserved. SAP BusinessObjects and its logos, BusinessObjects, Crystal Reports,
Kaspersky Security Center 10 Getting Started
Kaspersky Security Center 10 Getting Started A P P L I C A T I O N V E R S I O N : 1 0 M A I N T E N A N C E R E L E A S E 1 Dear User, Thank you for choosing our product. We hope that this document will
HP Device Manager 4.6
Technical white paper HP Device Manager 4.6 Installation and Update Guide Table of contents Overview... 3 HPDM Server preparation... 3 FTP server configuration... 3 Windows Firewall settings... 3 Firewall
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Policy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
Novell Filr 1.0.x Mobile App Quick Start
Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide
HP ProLiant Essentials Vulnerability and Patch Management Pack Planning Guide Product overview... 3 Vulnerability scanning components... 3 Vulnerability fix and patch components... 3 Checklist... 4 Pre-installation
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Feature and Technical
BlackBerry Enterprise Server for Microsoft Exchange Version: 5.0 Service Pack: 4 Feature and Technical Overview Published: 2013-11-07 SWD-20131107160132924 Contents 1 Document revision history...6 2 What's
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson Copyright Information
CRESTRON-APP/CRESTRON-APP-PAD Control App for Apple ios
1 Introduction The Crestron apps CRESTRON-APP and CRESTRON-APP-PAD provide a Smart Graphics touch screen user interface on Apple devices running the ios operating system. CRESTRON-APP can also provide
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
CRESTRON-APP/CRESTRON-APP-PAD
1 3 Introduction The free version of the app has limitations on the size and complexity of the project. For complete functionality, upgrade to the Pro version via an in-app purchase. The CRESTRON-APP and
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER
M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network
RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide
RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
Decryption. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
Decryption Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
HP Device Manager 4.7
Technical white paper HP Device Manager 4.7 FTPS Certificates Configuration Table of contents Overview... 2 Server certificate... 2 Configuring a server certificate on an IIS FTPS server... 2 Creating
Kaspersky Security 10 for Mobile Implementation Guide
Kaspersky Security 10 for Mobile Implementation Guide APPLICATION VERSION: 10.0 MAINTENANCE RELEASE 1 Dear User, Thank you for choosing our product. We hope that you will find this documentation useful
Portal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
Remote Management Reference
www.novell.com/documentation Remote Management Reference ZENworks 11 Support Pack 2 October 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
Sophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123. Instructor Manual
Troubleshooting BlackBerry Enterprise Service 10 version 10.1.1 726-08745-123 Instructor Manual Published: 2013-07-02 SWD-20130702091645092 Contents Advance preparation...7 Required materials...7 Topics
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
How to configure SSL proxying in Zorp 3 F5
How to configure SSL proxying in Zorp 3 F5 June 14, 2013 This tutorial describes how to configure Zorp to proxy SSL traffic Copyright 1996-2013 BalaBit IT Security Ltd. Table of Contents 1. Preface...
Two-Factor Authentication over Mobile: Simplifying Security and Authentication
SAP Thought Leadership Paper SAP Mobile Services Two-Factor Authentication over Mobile: Simplifying Security and Authentication Controlling Fraud and Validating End Users Easily and Cost-Effectively Table
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
SAP BusinessObjects Query as a Web Service Designer SAP BusinessObjects Business Intelligence platform 4.0
SAP BusinessObjects Query as a Web Service Designer SAP BusinessObjects Business Intelligence platform 4.0 Copyright 2011 SAP AG. All rights reserved.sap, R/3, SAP NetWeaver, Duet, PartnerEdge, ByDesign,
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Introduction to the Mobile Access Gateway
Introduction to the Mobile Access Gateway This document provides an overview of the AirWatch Mobile Access Gateway (MAG) architecture and security and explains how to enable MAG functionality in the AirWatch
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
RMFT Web Client User Guide
RMFT Web Client User Guide Software Version 2.5 Supported Browsers: Browser Internet Explorer Firefox Safari Google Chrome Version 7.0 and above 3 and above 3.2 and above 1.0 and above August 7, 2011 RepliWeb,
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual
TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port
technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
What's New in SAP HANA Spatial (Release Notes)
PUBLIC SAP HANA Platform Document Version: 4.0 2016-05-11 Content 1 What's New in SAP HANA Spatial....3 2 SAP HANA Spatial SPS 12, Features Included in Revision 120.... 4 2.1 SAP HANA Spatial (New and
SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form
Setup Guide Access Manager Appliance 3.2 SP3
Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
