CRASH IDP Hardware/Software Recommendation

Size: px
Start display at page:

Download "CRASH IDP Hardware/Software Recommendation"

Transcription

1 CRASH IDP Hardware/Software Recommendation Crash Reporting and Analysis for Safer Highways (CRASH) CRASH Identity Provider Recommendation VERSION 1.6 Revision Date: January 7, 2013

2 Table of Contents Section Document Information Contributors Version Control... 3 Section Overview... 4 Purpose Scope... 4 Document Conventions... 4 Section Identity Provider Configuration... 5 What is an Identity Provider (IdP)? Hardware Single vs. Multiple (Core) Processors Software Apache Tuning JVM Tuning... 6 Section TxDOT IdP Platform Configuration... 7 Introduction... 7 Hardware... 7 Software... 8 Section User Management Infrastructure Introduction Shibboleth Components How does Shibboleth work with CRASH? Step 1 (User Browser Service Provider): Step 2 & 3 (Browser Discovery Service): Step 5: (Discovery Service Browser Service Provider): Step 6: (Service Provider Browser Identity Provider): Step 7: (Identity Provider Browser):

3 Step 8: (User Browser Identity Provider): Step 9: (Identity Provider Browser Service Provider): Section FAQ Troubleshooting Definitions: Links

4 Section 1 Document Information 1.1 Contributors Role Organization Name Owner TxDOT-TRF-TE-SCPDA Contributor TxDOT-TRF-TE-SCPDA Margo McCormick, Lyndon Clements, Ron Holt, Harold Campbell Jr., Susan Kirkpatrick, Missy Rodgers, Debbie Williams, Jennifer Castillo, Bea Pyle, Judy LeViseur Contributor Technology Consortium Mark McCalister, David Palacios, Dan McLaughlin 1.2 Version Control Date Version Author(s) Section(s) Update(s) 12/1/ TxDOT All Final Review 2/1/ TxDOT All Final Review 2/16/ TxDOT All Final Review 6/14/ TxDOT 5 Remove www. From url address, Update Landing Page Picture 10/19/ TxDOT 4 Update Apache Tomcat 11/20/ TxDOT All Final Review 1/7/ TxDOT All Final Review 3

5 Section 2 Overview Purpose The purpose of this document is to describe the recommended hardware and software matrix for installing and configuring an identity provider (IdP) for use in conjunction with the Crash Reporting and Analysis for Safer Highways (CRASH) application. Additionally, the document provides some detail for working configurations in use by the Texas Department of Transportation (TxDOT) for multiple environments in the systems development life cycle. 2.1 Scope This document covers the recommended base hardware and software list that comprises an identity provider for use by CRASH pilot agencies. Each agency will need to analyze and design the preferred hardware and software configuration that is best suited to provide service to their stakeholders. Document Conventions Italic type is used for URLs, filenames, file extensions, and environment variables. 4

6 Section 3 Identity Provider Configuration What is an Identity Provider (IdP)? This is a server(s) that handles authentication of users, allows a user(s) token with trusted information to be securely sent through the browser to a remote resources. Each CRASH pilot agency is responsible to set up its own IdP to authenticate their users. NOTE: the recommendations herein are simply meant to give you an idea of what types of systems you should be looking at. Many other hardware/software variations can be used successfully; for the latest hardware and software recommendations, refer to the online copy of the recommendations at Hardware The following hardware is sufficient for deploying an IdP that provides a basic example of how Shibboleth is used (on the order of logins per minute): Pentium III class processor in the 1GHz range 512MB RAM 150MB storage Any Ethernet card The following hardware is suited for a production deployment supporting around 150 simultaneous requests. Xeon/Opteron class processor (mid-level spec) 2GB RAM Gigabit Ethernet card To increase the availability, the production machines should have their hard drives mirrored (RAID 1). The use of multiple servers and load balancing hardware is also suggested Single vs. Multiple (Core) Processors Unlike most web applications, the IdP is CPU-bound because of the large number of cryptographic operations performed. Most multi-core systems sacrifice some CPU speed because of thermal issues in order to get more cores on the CPU. Since Java 5, most JVMs now scale across cores, but our recommendation is that faster cores over more cores is still the better option. This results in lower response times (because the crypto operations are performed more quickly), but slightly less overall throughput. 5

7 3.2 Software Generally the IdP is run within Tomcat with an Apache HTTP server front-end. Apache 2 and Java 6 are recommended. Be sure to tune both Apache and the JVM used by Tomcat appropriately Apache Tuning The most influential tuning within Apache is the MPM used and how it's configured. The Apache MPM worker is strongly encouraged. We recommend very few servers and a fair number of threads within each (maybe 3-5 servers and threads) JVM Tuning Proper tuning of the JVM is the single most important factor in IdP performance (assuming you don't choke connections with unreasonably restrictive Apache configurations). Assuming a Sun JVM, the following tasks should be carried out to complete configuration: Use the server VM instead of the client by using the -server flag. Increase the amount of heap initially allocated using -Xms###M (where ### is the amount of memory to allocate, probably something around ). Increase the maximum amount of memory that can be used using -Xmx###M (where ### is the amount of memory to allocate, probably something around ; don't go above 1800, as in most boxes this is the upper limit of JVM size; solaris and 64bit OSs may be able to go higher) If your hardware does have multiple processor cores, turn on the throughput garbage collector using the -XX:+UseParallelGC flag. 6

8 Section 4 TxDOT IdP Platform Configuration Introduction NOTE: the following information is intended to provide a real world example: The current CRIS IdP installation at TxDOT utilizes VMWare ESX 3.5 Enterprise Edition for virtualization and Windows 2003 R2 Standard Edition as the guest OS for the Virtual Machines. Tomcat 6.0 clustering is used to host an identically configured pair of IdP s using Active/Passive fail-over. The Virtual Machines used to run the pair of IdP s are located on separate ESX hosts to provide hardware level redundancy. A two tier load balancing approach was used for distributing requests to the IdP s. The first tier is a pair of Cisco Application Control Engines ( ACE ) configured for Active/Passive fail-over; their primary purpose is to provide SSL Offloading, Web Tier Active/Active clustering, and Layer 7 filtering. The second tier consists of a pair of Apache 2.2.x Web Servers configured as Reverse Proxies for an extra layer of security in an Active/Active load balanced configuration with sticky sessions. In addition, Apache is also used to provide the following services: Tomcat application load balancing using mod_jk. Detailed Access/Error handling, logging, and debugging of all client-to-application communications. Acts as third layer of redundancy in case there is a catastrophic failure with the Cisco ACE hardware. Hardware Cisco Application Control Engine SSL Offloading, Web Tier Load Balancing, Layer 7 Filtering. VMWare ESX 3.5 Cluster Host #1 Hosts Virtual Machine for Active IdP. IBM System x x Dual Core Intel Xeon 3.3 Ghz 32GB RAM SAN Storage 2 x Quad Port 1GbE 2 x Dual Port 4GB HBA 7

9 VMWare ESX 3.5 Cluster Host #2 Hosts Virtual Machine for Passive IdP. IBM System x x Dual Core Intel Xeon 3.3 Ghz 32GB RAM SAN Storage 2 x Quad Port 1GbE 2 x Dual Port 4GB HBA Software Operating Systems Production & UAT Windows 2008 R2 Standard Edition 2 x vcpu 4GB RAM Development CentOS 5.x 2 x vcpu 4GB RAM Web Servers Apache 2.2.x + Apache Tomcat Connector (mod_jk) Application Servers Apache Tomcat 7.x Java Virtual Machine (JVM) Oracle (Sun) JDK 6.0.x Identity Provider Shibboleth IdP 2.x 1BBF71757D1CF6BE0F7 Note: IdP server role is an application server. The types of data stored on the server are IdP installation and log files. 8

10 CRASH System Requirements Operating System Desktop & Laptop Windows XP/Vista/7 SP3 Software Adobe Flash player version 10.2 or greater Adobe reader version 9.x or greater Easy Street Draw (ESD) Version *(1 time download usually requires administrative rights) Internet Explorer 7 or greater is supported Preferred screen resolution 1024 x 768 9

11 Section 5 User Management Infrastructure Introduction The CRASH application is protected by Shibboleth, an open-source initiative by the Internet2 consortium, is a web-based Single Sign-On (SSO) infrastructure. It is based on SAML, a standard for the exchange of authentication data. Shibboleth allows users to authenticate using a local identity/authentication service (Identity Provider, or IdP) to gain access to remote resources and services (Service Providers, or SPs). Upon the user s successful authentication by the local IdP, Shibboleth sends attributes about the user to the remote SPs. The remote SPs can use these attributes in deciding whether or not to grant access to the user. For more information on Shibboleth, refer to the Internet2 consortium s FAQ. Shibboleth Components A successful deployment of Shibboleth involves three critical software components: Identity Provider (IdP) This is the server that handles the authentication of users. Each agency is responsible to set up its own IdP to authenticate their users. The CRIS User Management Subsystem does not manage user authentication. Service Provider (SP) An IdP is useless without Service Providers. SPs are web applications, resources, or other services which require authentication. The Shibboleth SP software allows most web servers (namely Apache and IIS) to integrate with an IdP or a number of IdPs. A cluster of SPs (for load balancing and failover support) are installed in the CRIS domain and managed by the CRIS technical team. These CRIS SPs integrate with IdPs installed in agencies to support secure access to the CRASH application and other CRIS applications. Discovery Service (WAYF) The goal of Discovery Service, or "Where Are You From" (WAYF) service is to guide a user to his Identity Provider (IdP). It serves as a triage between the CRIS SPs and various agency s IdPs. When CRIS SPs detect that a user is not authenticated, they redirect the user to the CRIS Discovery Service, which presents a list of IdPs of various agencies registered with CRIS. The user selects the IdP of his agency from the list, then is redirected to his agency s IdP for authentication. The CRIS Technical team installs and manages the CRIS Discovery Service. Each agency that wishes to use CRASH or other CRIS applications must provide its IdP coordinates to the CRIS technical team. The CRIS technical team will add the agency s IdP to the list of IdPs maintained in the CRIS Discovery Service. 10

12 In summary, each agency that wishes to use the CRASH application must undertake the following infrastructure setup to enable Shibboleth: 1. Install and configure Shibboleth Identity Provider (IdP) to work with CRIS Service Providers (SPs), and 2. Provide the IdP to the CRIS technical team, so its IdP can be added to the CRIS Shibboleth Discovery Service. How does Shibboleth work with CRASH? The following diagram illustrates how Shibboleth works with CRIS: 11

13 Step 1 (User Browser Service Provider): The user opens a web browser and accesses the CRASH application at Because is protected by the CRIS Shibboleth Service Provider, the CRIS Service Provider intercepts the request and checks if the user already has a Shibboleth session and therefore was authenticated already. If the user is not authenticated, the web server answers with an HTTP Redirect to the CRIS Discovery Service located at Step 2 & 3 (Browser Discovery Service): Consequently, the web browser sends a new request to the CRIS Discovery Service, and the CRIS Discovery Service answers with the web page that allows the user to select an Identity Provider (IdP). Agencies that wish to use CRASH or other CRIS applications must communicate with the CRIS technical team so their agency names can be added to the list of agencies under the CRIS Federation in the above Discovery Service page. 12

14 Step 4: (User Browser Discovery Service): On the CRIS Discovery page, the user selects the CRIS Federation from the drop down box, which brings up a list of registered agencies. The user selects his/her agency from the drop down box and clicks on the Select button to submit his selection to the Discovery Service. Step 5: (Discovery Service Browser Service Provider): The CRIS Discovery Service receives the user s agency selection, looks up the Identity Provider (IdP) for the selected agency, then it instructs the browser to send a redirect request to the Service Provider including the selected agency s IdP url. Step 6: (Service Provider Browser Identity Provider): The Service Provider sends a redirect to the selected agency s Identity Provider (IdP) to request authentication of the user. Step 7: (Identity Provider Browser): The Identity Provider (IdP) checks the authentication request, and because the user is not yet authenticated, it sends a redirect to the login handler configured in the IdP. Subsequently the browser sends a request for the username/password web page of the login page of the agency s authentication system. Step 8: (User Browser Identity Provider): The user types his username and password credentials and submits them to the agency s Identity Provider IdP). Step 9: (Identity Provider Browser Service Provider): The Identity Provider's (IdP s) authentication engine verifies the credentials against the underlying user authentication system such as LDAP or Database. After the user is successfully authenticated, the attribute authority in the IdP will perform the attribute resolution and filtering. The attribute authority of the agency IdP must be configured to release a list of user s attributes expected by the CRIS Service Provider. 13

15 The following user attributes are required by the CRIS Service Provider so the attribute authority of the agency IdP must release them: Agency Id - the id assigned to the Agency by the CRIS User Management Subsystem. IdP User Id - the id of the current user at the Identity Provider, e.g., user s login id. First Name - the current user s first name. Last Name - the current user s last name. Address - the current user s address. The following user attributes are optional and the attribute authority of the agency Identity Provider may release them if these attributes are available: Middle Name - the current user s middle name. Phone Number - the current user s phone number. After the attribute authority in the agency identity provider gathers all the user attributes to be released to the CRIS Service Provider, an HTML page is generated which includes the SAML assertion. Because this assertion contains not only an authentication statement but also an attribute statement with the user's attributes, this way of sending the attributes is called "Attribute Push". The assertion is transmitted using an auto-submit-post form, and the web browser posts the SAML assertion to the Service Provider immediately. The Service Provider processes the SAML assertion including the authentication and attribute statements and sends a redirect to the prior requested resource, with user attributes injected into the request as request headers. The request is then intercepted by the CRIS authorization framework. If this user is authorized to access the CRASH application, the CRASH Home page will be rendered and sent back to the browser as shown on the next page. 14

16 If this user is not authorized to access the CRASH application, the request is forwarded to the CRIS authorization error page by the CRIS Authorization Framework: 15

17 Section 6 FAQ Q: Does the IdP Server need to reside in our DMZ or can it reside in our internal network? Will there need to be any URL, DNS or Domain name configurations to support the IdP installation? A: The IdP will reside on your internal network. No DNS, URL or domain configuration changes will be required. Q: Can the IdP be installed on a workstation? A: TxDOT does not recommend using a workstation as a server, since there is typically not a good back up support for a workstation. Q: Do I have to use Virtual Software to install my agency IdP? A: TxDOT recommends Virtual Software but is not required. Q: Does the browser need to be configured to allow cookies? A: Yes, cookies need to be enabled to allow your Internet browsers to sign in and save your Internet settings. Q: Do I need to have administrative rights on my computer? A: The Technical Contact should have unrestricted access to create, delete, and modify an agency setting. (Configuration has to be set-up normally by the IT) Q: Does the CRASH User need administrative rights to install Easy Street Draw to their own machine? A: Yes, unless the agency has delegated these rights to certain few. There is a 1 time Active X download that will need to happen to install ESD. Now a work around would be two options: Option 1: Group Policy by agency to install ESD MSI (provided by TxDOT) to all machines Option 2: Physically touch each machine within your agency and install ESD MSI 16

18 Q: My Easy Street Draw shows and Evaluation watermark? A: When the diagram is showing evaluation all over and when CRASH is asking to: Buy, Activate, etc Select Activate and then input: ESD Genric Activation: Password: P54taw Troubleshooting Trouble Connecting: Each agency s IdP resides behind their firewall and if it has stopped or someone inadvertently stopped the IdP, the user would not have access to CRASH. Authentication Failed etc : Authentication Failed is never a TxDOT issue. It s always goin to be a bad username/password or a bug/misconfiguration of the IdP. The easiest thing for you to do is for every user that s not working, delete them out of Configure and ask them to login again and expect to fail. This is the initial step to start seeding the user, and after 5-10 mins the AAM should open Configure, click User panel and locate the user and assign to the appropriate group. The system will take care of automatically creating their user the correct way. This method is called seeding a user; if eliminates the need of knowing domain address. All the required information is populated when the user tries to login. Have user login in a second time and expect to succeed. Trouble Logging In: First, make sure they aren t using a bad bookmark. them the link to (Test) / (Production) and have them go to it directly, no bookmarks. Also make sure that they are closing the browser if they are trying to test logging in as a different users. For security reasons, if you log out of CRASH and try to log back in as a different user, then the IdP is expecting you to re-authenticate as the previous user. You can t switch users without closing all browser windows or you will get a profile exception from Shibboleth. It also possible that the problem is LDAP related and that the users are missing attributes that are required by CRASH. Authentication Denied: If you are getting Authentication Denied then it s always going to be a problem at the remote agency. Either the user ID is locked out or they are entering the wrong username/password. 17

19 Authorization Denied: If you are getting Authorization Denied then it s one of two things: 1. They are missing required Roles in Configure. If they have the correct Roles and they ve NEVER used CRASH before, then someone probably manually created their user wrong (usually they forgot to scope the user ID). Just delete the user out of Configure and ask them to login again; the CRASH system will automatically recreate their user and you should be abale to grant them the appropriate Roles. If their user isn t recreated automatically and they are still getting the Authorization Denied then they are most likely missing required attributes. 2. Their SAML2 token from their Agency is missing attributes that are required by CRASH. After they get the Authorization Denied message have them change the URL in the address bar to They should get a page that returns similar to the following: NOTE: All the Attributes, with the exception of shibb_phone_number are required. If they are missing any then have them go back to the IT department administrator have their user ID fixed in LDAP. Miscellaneous Client address: Identity Provider: SSO Protocol: urn:oasis:names:tc:saml:2.0:protocol Authentication Time: T1600:00:24.940Z Authentication Contex Class: urn:oasis:names:tc:saml:2.0:ac:classes:passwordprotectedtransport Authentication Context Decl: (none) Session Expiration (barring inactivity): 408 minute(s) Attributes Shibb_agency_id: 1 values(s) Shibb_ 1 value(s) Shibb_first_name: 1 value(s) Shibb_guid: 1 value(s) Shibb_idp_user_id: 1 value(s) Shibb_is_cris_user: 1 value(s) Shibb_last_name: 1 value(s) Shibb_phone_number: 1value(s) If you aren t getting Authentication Denied, your user was auto populated in Configure, and they have the correct Roles; then it s possible there is some type of systems issues and you should escalate the issue to the CRIS Technical Team for investigation. 18

20 Definitions: ESD Easy Street Draw - is designed to meet the specialized drawing requirements of crash scene diagramming. IdP - Identity Assertion Provider is an authentication module which verifies a Security token as an alternative to explicitly authenticating a user within a security realm VMware - Virtualization Management Software; lets you run multiple virtual machines on a single physical machine, with each virtual machine sharing the resources of that one physical computer across multiple environments Linux OS - an open source operating system, is a freely distributable, cross-platform operating system based on Unix that can be installed on PCs, laptops, netbooks, mobile and tablet devices, video game consoles, servers, supercomputers and more. Metadata - Data about data. Metadata describes how and when and by whom a particular set of data was collected, and how the data is formatted DNS Domain Name System - is an Internet service that translates domain names into IP addresses. Apache Tomcat - an open source web server and servlet container developed by the Apache Software Foundation (ASF). Tomcat implements the Java Servlet and the JavaServer Pages (JSP) specifications from Oracle Corporation, and provides a "pure Java" HTTP web server environment for Java code to run. Includes tools for configuration and management, but can also be configured by editing XML configuration files. Shibboleth - allows users to securely send trusted information about themselves to remote resources. It is a federated system, supporting secure access to resources across security domains. Information about a user is sent from a home identity provider (IdP) to a service provider (SP) which prepares the information for protection of sensitive content and use by applications NTP Network Time Protocol - an Internet standard protocol (built on top of TCP/IP) that assures accurate synchronization to the millisecond of computer clock times in a network of computers DHCP Dynamic Host Configuration Protocol - is a protocol for assigning dynamic IP addresses to devices on a network. LDAP Light Weight Access Directory - is an application protocol for accessing and maintaining distributed directory information services over an Internet Protocol (IP) network Proxy Configuration - acts as a security barrier, it ensures that the proxy server monitors all traffic between the Internet and Intranet. This is normally part of security enforcement in corporate firewalls within intranets. 19

21 Links Shibboleth - Identity Provider (IdP) Service Provider (SP) Discovery Service (WAYF) D1CF6BE0F7 Apache Tomcat 7.x Oracle (Sun) JDK 6.0.x (Java Development Kit) Easy Street Draw Adobe Flash player version 10.2 or greater 20

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication

More information

Xerox DocuShare Security Features. Security White Paper

Xerox DocuShare Security Features. Security White Paper Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a

More information

ShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie

ShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie ShibboLEAP Project Final Report: School of Oriental and African Studies (SOAS) Colin Rennie May 2006 Shibboleth Implementation at SOAS Table of Contents Introduction What this document contains Who writes

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

DEPLOYMENT GUIDE. SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity

DEPLOYMENT GUIDE. SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity DEPLOYMENT GUIDE SAML 2.0 Single Sign-on (SSO) Deployment Guide with Ping Identity Table of Contents SAML Overview...3 Integration Topology...3 Deployment Requirements...4 Configuration Steps...4 Step

More information

HP Client Automation Standard Fast Track guide

HP Client Automation Standard Fast Track guide HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation

More information

NetIQ Access Manager 4.1

NetIQ Access Manager 4.1 White Paper NetIQ Access Manager 4.1 Performance and Sizing Guidelines Performance, Reliability, and Scalability Testing Revisions This table outlines all the changes that have been made to this document

More information

Sharp Remote Device Manager (SRDM) Server Software Setup Guide

Sharp Remote Device Manager (SRDM) Server Software Setup Guide Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

How To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip

How To Use Netiq Access Manager 4.0.1.1 (Netiq) On A Pc Or Mac Or Macbook Or Macode (For Pc Or Ipad) On Your Computer Or Ipa (For Mac) On An Ip Setup Guide Access Manager 4.0 SP1 May 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

VMware Identity Manager Connector Installation and Configuration

VMware Identity Manager Connector Installation and Configuration VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document

More information

ACE Management Server Administrator s Manual VMware ACE 2.6

ACE Management Server Administrator s Manual VMware ACE 2.6 ACE Management Server Administrator s Manual VMware ACE 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Setup Guide Access Manager Appliance 3.2 SP3

Setup Guide Access Manager Appliance 3.2 SP3 Setup Guide Access Manager Appliance 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS

More information

Ignify ecommerce. Item Requirements Notes

Ignify ecommerce. Item Requirements Notes wwwignifycom Tel (888) IGNIFY5 sales@ignifycom Fax (408) 516-9006 Ignify ecommerce Server Configuration 1 Hardware Requirement (Minimum configuration) Item Requirements Notes Operating System Processor

More information

ACE Management Server Deployment Guide VMware ACE 2.0

ACE Management Server Deployment Guide VMware ACE 2.0 Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.

More information

Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite. Abstract

Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite. Abstract Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite Abstract This white paper outlines the deployment and configuration of a Single Sign-On solution for EMC Documentum

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

24x7 Scheduler Multi-platform Edition 5.2

24x7 Scheduler Multi-platform Edition 5.2 24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table

More information

Getting Started with ESXi Embedded

Getting Started with ESXi Embedded ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent

More information

Verax Service Desk Installation Guide for UNIX and Windows

Verax Service Desk Installation Guide for UNIX and Windows Verax Service Desk Installation Guide for UNIX and Windows March 2015 Version 1.8.7 and higher Verax Service Desk Installation Guide 2 Contact Information: E-mail: sales@veraxsystems.com Internet: http://www.veraxsystems.com/

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

PLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008

PLATO Learning Environment System and Configuration Requirements for workstations. October 27th, 2008 PLATO Learning Environment System and Configuration Requirements for workstations October 27th, 2008 Windows 2000 Professional with SP4 Windows XP Professional with SP2 Windows XP Home Edition with SP2

More information

Perceptive Experience Single Sign-On Solutions

Perceptive Experience Single Sign-On Solutions Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark

More information

PLATO Learning Environment System and Configuration Requirements. for workstations. April 14, 2008

PLATO Learning Environment System and Configuration Requirements. for workstations. April 14, 2008 PLATO Learning Environment System and Configuration Requirements Version 1.1 (for use with Academic Systems Algebra only) for workstations April 14, 2008 Windows 2000 Professional with SP4 Windows XP Professional

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES

WEBTITAN CLOUD. User Identification Guide BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES BLOCK WEB THREATS BOOST PRODUCTIVITY REDUCE LIABILITIES WEBTITAN CLOUD User Identification Guide This guide explains how to install and configure the WebTitan Cloud Active Directory components required

More information

PC-Duo Web Console Installation Guide

PC-Duo Web Console Installation Guide PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks

More information

Core Protection for Virtual Machines 1

Core Protection for Virtual Machines 1 Core Protection for Virtual Machines 1 Comprehensive Threat Protection for Virtual Environments. Installation Guide e Endpoint Security Trend Micro Incorporated reserves the right to make changes to this

More information

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1

Virtual Appliances. Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V. Virtual Appliance Setup Guide for Umbrella Page 1 Virtual Appliances Virtual Appliances: Setup Guide for Umbrella on VMWare and Hyper-V Virtual Appliance Setup Guide for Umbrella Page 1 Table of Contents Overview... 3 Prerequisites... 4 Virtualized Server

More information

MEGA Web Application Architecture Overview MEGA 2009 SP4

MEGA Web Application Architecture Overview MEGA 2009 SP4 Revised: September 2, 2010 Created: March 31, 2010 Author: Jérôme Horber CONTENTS Summary This document describes the system requirements and possible deployment architectures for MEGA Web Application.

More information

CA Adapter. Installation and Configuration Guide for Windows. r2.2.9

CA Adapter. Installation and Configuration Guide for Windows. r2.2.9 CA Adapter Installation and Configuration Guide for Windows r2.2.9 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013

SSL VPN Server Guide. Access Manager 3.2 SP2. June 2013 SSL VPN Server Guide Access Manager 3.2 SP2 June 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A

More information

PLATO Learning Environment 2.0 System and Configuration Requirements. Dec 1, 2009

PLATO Learning Environment 2.0 System and Configuration Requirements. Dec 1, 2009 PLATO Learning Environment 2.0 System and Configuration Requirements Dec 1, 2009 Table of Contents About this document... 3 Document Change Log... 4 System & Configuration Requirements... 5 Workstation

More information

vcenter Chargeback User s Guide

vcenter Chargeback User s Guide vcenter Chargeback 1.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

JBoss Seam Performance and Scalability on Dell PowerEdge 1855 Blade Servers

JBoss Seam Performance and Scalability on Dell PowerEdge 1855 Blade Servers JBoss Seam Performance and Scalability on Dell PowerEdge 1855 Blade Servers Dave Jaffe, PhD, Dell Inc. Michael Yuan, PhD, JBoss / RedHat June 14th, 2006 JBoss Inc. 2006 About us Dave Jaffe Works for Dell

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

vcloud Director User's Guide

vcloud Director User's Guide vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

SMART Vantage. Installation guide

SMART Vantage. Installation guide SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the

More information

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details

Ensure that the server where you install the Primary Server software meets the following requirements: Item Requirements Additional Details ZENworks 11 SP3 System December 2014 The following sections provide the Novell ZENworks 11 SP3 requirements for hardware and software: Section 1, Primary Server, on page 1 Section 2, Managed Device, on

More information

Closed Loop Incident Process (CLIP) Solution

Closed Loop Incident Process (CLIP) Solution Closed Loop Incident Process (CLIP) Solution HP Enterprise Collaboration Windows Operating System Software Version: 9.30 Configuration Guide Document Release Date: December 2012 Software Release Date:

More information

SNOW LICENSE MANAGER (7.X)... 3

SNOW LICENSE MANAGER (7.X)... 3 SYSTEM REQUIREMENTS Products Snow License Manager Software Store Option Snow Inventory Server, IDR, IDP Client for Windows Client for Linux Client for Unix Client for OS X Oracle Scanner Snow Integration

More information

Novell Access Manager

Novell Access Manager Access Gateway Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 November 16, 2010 www.novell.com Novell Access Manager 3.1 SP2 Access Gateway Guide Legal Notices Novell, Inc., makes no representations

More information

Administrator Guide. v 11

Administrator Guide. v 11 Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main

More information

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them. This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and

More information

Remote Application Server Version 14. Last updated: 25-02-15

Remote Application Server Version 14. Last updated: 25-02-15 Remote Application Server Version 14 Last updated: 25-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda Web Application Firewall hardware appliance. It is designed for easy deployment on

More information

StreamServe Persuasion SP5 StreamStudio

StreamServe Persuasion SP5 StreamStudio StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other

More information

Web Conferencing Version 8.3 Troubleshooting Guide

Web Conferencing Version 8.3 Troubleshooting Guide System Requirements General Requirements Web Conferencing Version 8.3 Troubleshooting Guide Listed below are the minimum requirements for participants accessing the web conferencing service. Systems which

More information

Mediasite for the enterprise. Technical planner: TP-05

Mediasite for the enterprise. Technical planner: TP-05 Mediasite for the enterprise Technical planner: TP-05 2011 Sonic Foundry, Inc. All rights reserved. No part of this document may be copied and/or redistributed without the consent of Sonic Foundry, Inc.

More information

www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication

More information

GlobalSCAPE DMZ Gateway, v1. User Guide

GlobalSCAPE DMZ Gateway, v1. User Guide GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical

More information

HP Universal CMDB. Software Version: 10.20. Support Matrix

HP Universal CMDB. Software Version: 10.20. Support Matrix HP Universal CMDB Software Version: 10.20 Support Matrix Document Release Date: January 2015 Software Release Date: January 2015 Legal Notices Warranty The only warranties for HP products and services

More information

Quark Publishing Platform 9.5 ReadMe

Quark Publishing Platform 9.5 ReadMe Quark Publishing Platform 9.5 ReadMe CONTENTS Contents Quark Publishing Platform 9.5 ReadMe...5 Quark Publishing Platform components...6 Compatibility matrix...6 Server components...7 Other optional components...8

More information

Hardware/Software Requirements For Self-Hosting Multi Server

Hardware/Software Requirements For Self-Hosting Multi Server Hardware/Software Requirements For Self-Hosting Multi Server Ebix recommends two or more servers for sites with more than 20 active users. The first step is deciding which type of configuration would best

More information

Cloud Authentication. Getting Started Guide. Version 2.1.0.06

Cloud Authentication. Getting Started Guide. Version 2.1.0.06 Cloud Authentication Getting Started Guide Version 2.1.0.06 ii Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

Cisco Application Networking Manager Version 2.0

Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager Version 2.0 Cisco Application Networking Manager (ANM) software enables centralized configuration, operations, and monitoring of Cisco data center networking equipment

More information

Receptionist-Small Business Administrator guide

Receptionist-Small Business Administrator guide Receptionist-Small Business Administrator guide What is it? Receptionist-Small Business works with your desk phone, soft phone, or mobile device so you can control calls, monitor the lines of employees,

More information

Building a Virtual Desktop Infrastructure A recipe utilizing the Intel Modular Server and VMware View

Building a Virtual Desktop Infrastructure A recipe utilizing the Intel Modular Server and VMware View Building a Virtual Desktop Infrastructure A recipe utilizing the Intel Modular Server and VMware View December 4, 2009 Prepared by: David L. Endicott NeoTech Solutions, Inc. 2816 South Main St. Joplin,

More information

VMware Workspace Portal Reference Architecture

VMware Workspace Portal Reference Architecture VMware Workspace Portal 2.1 TECHNICAL WHITE PAPER Table of Contents Executive Summary.... 3 Overview.... 4 Hardware Components.... 5 VMware vsphere.... 5 VMware Workspace Portal 2.1.... 5 VMware Horizon

More information

System requirements for A+

System requirements for A+ System requirements for A+ Anywhere Learning System: System Requirements Customer-hosted Browser Version Web-based ALS (WBA) Delivery Network Requirements In order to configure WBA+ to properly answer

More information

Quark Publishing Platform 9.5.1.1 ReadMe

Quark Publishing Platform 9.5.1.1 ReadMe Quark Publishing Platform 9.5.1.1 ReadMe TABLE DES MATIÈRES Table des matières Quark Publishing Platform 9.5.1.1 ReadMe...5 Quark Publishing Platform components...6 Compatibility matrix...6 Server components...8

More information

F-Secure Internet Gatekeeper Virtual Appliance

F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance F-Secure Internet Gatekeeper Virtual Appliance TOC 2 Contents Chapter 1: Welcome to F-Secure Internet Gatekeeper Virtual Appliance.3 Chapter 2: Deployment...4

More information

Interstage Application Server V7.0 Single Sign-on Operator's Guide

Interstage Application Server V7.0 Single Sign-on Operator's Guide Interstage Application Server V7.0 Single Sign-on Operator's Guide Single Sign-on Operator's Guide - Preface Trademarks Trademarks of other companies are used in this user guide only to identify particular

More information

SecurEnvoy Security Server. SecurMail Solutions Guide

SecurEnvoy Security Server. SecurMail Solutions Guide SecurEnvoy Security Server SecurMail Solutions Guide SecurMail Solutions Guide 2009 SecurEnvoy Printed: 2009 in United Kingdom Publisher SecurEnvoy Publishing Managing Editor SecurEnvoy Training Dept Technical

More information

How To Set Up A Thermal Cycler With Veritilink Remote Management Software

How To Set Up A Thermal Cycler With Veritilink Remote Management Software Installation Guide VeritiLink Remote Management Software Version 1.0 Installation Guide Getting Started VeritiLink Remote Management Software Version 1.0 Setting Up the Veriti Thermal Cyclers Setting

More information

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2

RSA Authentication Manager 8.1 Setup and Configuration Guide. Revision 2 RSA Authentication Manager 8.1 Setup and Configuration Guide Revision 2 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER

INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation Quick start guide version 1.0.1 Publication history Date Description Revision 2015.09.23 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

Release Notes for Version 1.5.207

Release Notes for Version 1.5.207 Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4

More information

System Requirements. Version 8.2 November 23, 2015. For the most recent version of this document, visit our documentation website.

System Requirements. Version 8.2 November 23, 2015. For the most recent version of this document, visit our documentation website. System Requirements Version 8.2 November 23, 2015 For the most recent version of this document, visit our documentation website. Table of Contents 1 System requirements 3 2 Scalable infrastructure example

More information

v7.1 Technical Specification

v7.1 Technical Specification v7.1 Technical Specification Copyright 2011 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated, microfilmed,

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

RSA Authentication Manager 8.1 Virtual Appliance Getting Started RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides

More information

Rally Installation Guide

Rally Installation Guide Rally Installation Guide Rally On-Premises release 2015.1 rallysupport@rallydev.com www.rallydev.com Version 2015.1 Table of Contents Overview... 3 Server requirements... 3 Browser requirements... 3 Access

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

BlackBerry Enterprise Service 10. Version: 10.2. Installation Guide

BlackBerry Enterprise Service 10. Version: 10.2. Installation Guide BlackBerry Enterprise Service 10 Version: 10.2 Installation Guide Published: 2015-08-17 SWD-20150817115607897 Contents 1 About this guide...5 2 What is BlackBerry Enterprise Service 10?... 6 Key features

More information

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections:

This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: CHAPTER 1 SAML Single Sign-On This chapter describes how to use the Junos Pulse Secure Access Service in a SAML single sign-on deployment. It includes the following sections: Junos Pulse Secure Access

More information

Remote Application Server Version 14. Last updated: 06-02-15

Remote Application Server Version 14. Last updated: 06-02-15 Remote Application Server Version 14 Last updated: 06-02-15 Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Request Manager Installation and Configuration Guide

Request Manager Installation and Configuration Guide Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Installing Websense Data Security

Installing Websense Data Security 3 Installing Websense Data Security The following procedures describe how to install Websense Data Security. The installation process and results depend on which components and which agents you choose

More information

Rebasoft Auditor Quick Start Guide

Rebasoft Auditor Quick Start Guide Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered

More information

CA Nimsoft Monitor Snap

CA Nimsoft Monitor Snap CA Nimsoft Monitor Snap Quick Start Guide 7.0 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being changed,

More information

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc.

Chapter 2 TOPOLOGY SELECTION. SYS-ED/ Computer Education Techniques, Inc. Chapter 2 TOPOLOGY SELECTION SYS-ED/ Computer Education Techniques, Inc. Objectives You will learn: Topology selection criteria. Perform a comparison of topology selection criteria. WebSphere component

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

XenClient Enterprise Synchronizer Installation Guide

XenClient Enterprise Synchronizer Installation Guide XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V

More information

Okta/Dropbox Active Directory Integration Guide

Okta/Dropbox Active Directory Integration Guide Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for

More information

Automation Engine 14. Troubleshooting

Automation Engine 14. Troubleshooting 4 Troubleshooting 2-205 Contents. Troubleshooting the Server... 3. Checking the Databases... 3.2 Checking the Containers...4.3 Checking Disks...4.4.5.6.7 Checking the Network...5 Checking System Health...

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied

More information

intertrax Suite resource MGR Web

intertrax Suite resource MGR Web intertrax Suite resource MGR Web Resource Management Installation Guide Version 4 2012 Copyright 2003-2012 by Salamander Technologies, Inc. Protected by US Patents 5,573,278; 5,596,652; 5,793,882; 6,761,312;

More information

User Guide. Cloud Gateway Software Device

User Guide. Cloud Gateway Software Device User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).

More information

Proof of Concept Guide

Proof of Concept Guide Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information