1 White Paper CONFIGURING ACTIVE DIRECTORY IN LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Test Environment 2 Joining a Lenovo network storage device to an AD domain 3 Importing Domain Users and Groups 6 Managing Local and Active Directory Users (Hybrid Authentication) 8 Best Practices 9 Frequently Asked Questions 12
2 INTRODUCTION Active Directory (AD) is a technology created by Microsoft to provide a variety of network services, including LDAP directory access, Kerberos authentication, DNS-based naming and network information, and information security for user access to networked resources. Active Directory also allows administrators to assign policies, deploy software, and apply critical updates in Windows environments. Active Directory was first released with Windows 2000 Server edition, and revised to extend functionality and improve administration in Windows Server Additional improvements were made in Windows Server 2003 R2. In Windows Server 2008 and Windows Server 2008 R2, AD was further refined and renamed Active Directory Domain Services. The Active Directory framework that holds all objects can be viewed at different levels. At the top of the structure is the forest, a collection of every object and its attributes and rules. A forest can contain trees, and a tree is a collection of one or more domains. All Lenovo network storage products support both Active Directory domain mode and peer-to-peer Windows workgroup mode for Common Internet File System (CIFS) file sharing. A Lenovo network storage device offers great reliability, ease of use, and ease of management that are designed specifically for the needs of Small Businesses (SMBs) and Remote Office/Branch Office (ROBOs). The Active Directory support enables the device to be deployed in a domain infrastructure, regardless of the size of the domain and the location of the domain controller (DC). After joining the network storage device to an AD domain, users can take advantage of the many AD benefits, such as centralized user account management and authentication for storage administration. This paper describes the Active Directory support and integration on Lenovo network storage, using a Lenovo EMC px6-300d network storage device as an example. Some instructions and procedures are presented to illustrate common administrative tasks, including joining a storage device to AD, managing domain users and groups, and granting device administrator permission to a domain user. An FAQ about the AD support and integration is included at the end of the paper. AUDIENCE Information contained in this paper is intended for Lenovo customers, partners, and service personnel involved in planning, deploying, or administering a Lenovo network storage device in an Active Directory environment. TERMINOLOGY Active Directory (AD): a technology created by Microsoft to provide a variety of network services including LDAP directory access, Kerberos authentication, DNS-based naming and network information, and information security for user access to networked resources. Active Directory also allows administrators to assign policies, deploy software, and apply critical updates in Windows environments. 1
3 Lightweight Directory Access Protocol (LDAP): an application protocol for querying and modifying data using directory services running over TCP/IP. Domain: a logical group of computers that share a central directory database that contains the user accounts and security information for the resources in the domain. Organizational Unit (OU): an AD container into which users, groups, computers, and other organizational units are placed for logical organization of domain objects. An OU cannot contain objects from other domains. Domain Controller (DC): a server that manages all security-related aspects between user and domain interactions and responds to security authentication requests within a Windows domain. Server Message Block (SMB): an application layer network protocol that was later renamed to CIFS by Microsoft. Common Internet File System (CIFS): A distributed file system providing transparent access to remote file systems. Whether you are a small business without dedicated IT resources, or a medium-sized business with a small IT staff that is already stretched thin, continuously managing your corporate network can be a difficult, expensive proposition. For businesses with multiple sites, the task is even more daunting, since the equipment is typically physically separated from those who are required to manage it effectively. Samba: a free software re-implementation of the SMB/CIFS networking protocol. It runs mostly on UNIX and Unix-like operating systems, such as Linux, to provide file and print services for Microsoft Windows clients and can integrate with Active Directory as part of a domain. Windows File Sharing: the practice of distributing or providing access to files using the CIFS protocol. Domain Name System (DNS): a hierarchical naming system for resources connected to the Internet or a local network. It associates various information with domain names assigned to each of the participants. Folder: on a Lenovo network storage device, a folder is a file system directory that can be accessed by hosts using file sharing protocols, including NFS and CIFS. In addition to the IT resource constraints, the hardware and software required to achieve and maintain a highly available infrastructure can easily cost hundreds of thousands of dollars well out of reach for small-and medium-sized businesses. TEST ENVIRONMENT The Active Directory configuration for this white paper is performed with a Lenovo EMC px6-300d. The following Active Directory domain infrastructure was used: Domain name: MIXED2K8.COM 2
4 Preferred Server IP: JOINING A LENOVO NETWORK STORAGE DEVICE TO AN AD DOMAIN When you join your Lenovo network storage device to your existing Active Directory user organization, your network storage device can work in a high availability environment, which means it can work with multiple AD servers, should one server fail or go offline. Configuring DNS Information A DNS server is required for the Lenovo network storage device to join a domain and function correctly in a domain mode. Depending on your network, you may have to manually add your storage device to your DNS server. Or your domain controller may also be your DHCP and DNS server, in which case you don t have to change your network settings, and your device has configured the DNS server automatically. Contact your AD system administrator to learn how your network is configured. To manually configure the DNS server on your storage device, perform the following procedure: 1. Access the Network feature page on your Lenovo network storage device. 2. On the Network page, click Modify network settings. 3. In the Network Settings box, uncheck Automatically configure DNS, WINS, and all IP addresses. 4. Enter the IP address of the DNS Server in the text box and click Apply. In this example, the IP address of the DNS server is Configuring AD Domain Information 3
5 Currently Lenovo network storage devices can join and function in a Windows NT domain, Windows Server 2000 domain, Windows Server 2003 domain, Windows Server 2003 R2 domain, Windows Server 2008 domain, and Windows Server 2008 R2 domain. 1. Access the Device Identification feature in your storage device s management console. 2. On the Device Identification page, select Active Directory. 3. Enter Domain Name and Preferred Server information, MIXED2K8.COM and , respectively, in this example. 4. Optionally enter Organizational Unit information to place the network storage device as part of a domain OU if desired. 5. You must use a domain account that has permission to join computers into the domain. Enter the Administrator Username and Administrator Password for the domain join operation. 6. Choose how often the network storage device should refresh users and groups from the domain controller. By default, it is Daily. 7. Optionally set Local Network Encryption. By default, it is not required. 8. Optionally set Remote Network Encryption. By default, it is always set. 9. Optionally check Enable trusted domains. This allows your storage device to access other trusted domains. 4
6 10. Click Apply to join the storage device into the domain. This operation will take awhile to complete. After it completes successfully, your storage device automatically redirects to the login page. 11. Log in to your storage device using the administrator credentials you entered in step 5. 5
7 IMPORTING DOMAIN USERS AND GROUPS You can import domain users and groups onto the Lenovo network storage device. Only the users and groups that have been imported can be granted permissions to shared storage and log in through the management console. 1. Click the Users & Groups feature in the device console. All users and groups that have been imported onto the network storage device are listed here. 2. Click the Synchronize with the Active Directory domain controller link to synchronize domain users and groups with the DC. Wait until the refresh finishes before performing any user/group related operations. Note: the Synchronize operation does not import new or additional domain users and groups automatically. Follow step 3 to import new or additional users and groups. 3. Click Add users and groups to import domain users and groups. All the domain users and groups that have not already been imported to the device are listed in this page. Note: this GUI page only displays up to 3,000 users and groups. If there are more than 3,000 users and groups, you could click the Find link to search for a user or group that you want to import but do not see in the list. 6
8 4. Check the users and groups that you want to add to the px6-300d device and click the plus button. These selected users and groups are imported onto the device. Deleting Users and Groups To delete an imported user or group from the network storage device: 1. To delete an existing user or group, expand the user or group name. 2. In the Information section, click Delete. 7
9 Note: Deleting a user or group does not delete any Shares to which the user or group has access. Click the checkbox if you want to delete all Shares that only this user can access. 3. In the confirmation pop-up window, click Yes. 4. If you do not wish to delete a user or group, click No to return to the Users & Groups page. MANAGING LOCAL AND ACTIVE DIRECTORY USERS (HYBRID AUTHENTICATION) After you have enabled Active Directory and added AD users and groups, you may want users and groups that are local to the storage device. You can configure your Lenovo network storage device to allow both local users and groups and Active Directory (AD) users and groups on the device, simultaneously. While in AD mode, you can have existing local users and groups and also create new ones. In addition, both AD and local administrator users can log in to and manage the storage device. This allows hybrid authentication on your storage device and, if desired, you can switch between AD mode and Workgroup mode. 1. Access the Users & Groups page. 2. On the Users & Groups page, click Add users and groups. 3. In the Import Users and Groups from Active Directory page, under Local, click Users to create a local user or Groups to create a group. You can add AD users to any local groups you create. 4. Enter the necessary credentials for the user or the group name, and click Create. 8
10 BEST PRACTICES The following are best practices you should use when you deploy Active Directory in your system environment. Creating Secured Shares in AD Mode To accelerate the progress of adding a large number of secured Shares in AD mode, the following practices are recommended: Create Shares first and then import users from the domain Aggregate users in groups and grant access control to the groups if a large number of users need access to the Shares 1. Access the Shares page to create a new Share. Set Access Permissions for users and groups. 2. Repeat step 1 to create all the secured Shares you plan to add before the next steps. 3. Create groups on the domain controller to aggregate users that share the same level of access control to secured Shares on the Lenovo network storage device. 4. Import the groups onto the Lenovo network storage device. 5. Grant access permissions to the groups. All the users that belong to a group inherit from the group the same permissions to access secured Shares. 6. Configure access permissions to all secured folders for the group. 9
11 Using NFS in AD Mode NFS permissions on Unix/Linux are based on User IDs (UIDs). For a user to access a secured Share with NFS, the user must have a UID on the Lenovo network storage device matching its corresponding UID on the host. When a Lenovo network storage device is in AD mode, the user accounts are imported from the domain and therefore do not have UIDs unless a user mapping service is in place to map Windows users to Unix/Linux users. Lenovo network storage devices do not have a user mapper running to provide such a service. Consequently, in AD mode, NFS access control is only enforced at the host level. Whereas in Workgroup mode, NFS access control is enforced at both the user level and host level. To set NFS access control on secured Shares: 1. Access the Protocols page in the storage device s console. 2. Turn on the NFS protocol. 3. Apply the NFS security setting for Active Directory. System security. This uses Linux system security. Kerberos security. Kerberos is a protocol that uses secret key cryptography for authentication between client and server applications. 10
12 All. Combines system security and Kerberos security. 4. On the Shares page, expand a Share name to display the NFS section. 5. Expand the NFS section, enter an NFS rule for the Share, and click Apply. 11
13 FREQUENTLY ASKED QUESTIONS Q: What are the recommended numbers of users, groups, and folders to configure in the AD mode on a Lenovo network storage device? A: Different Lenovo platforms have different numbers. Note that these are not hard limits they merely indicate a level of configuration that may result in the best overall system performance. Platform # of users # of groups # of folders ix ix4-200d ix4-200r ix12-300r Q: Can I create a local user account on the Lenovo device when it is in AD mode? A: Yes. Your Lenovo device offers hybrid authentication which allows the creation of local users while the device is in AD mode. Q: What happens if my DC is down or my network connection to the DC is lost? A: Your Lenovo network storage device can work in a high availability environment, which means it can work with multiple AD servers should one server fail or go offline. Your storage device can automatically switch authentication services to other domain controllers in the network, if there are any. Q: When using an administrator user account to log in to the device console, why does the admin account appear turned into a normal user and the Lenovo network storage device console presents only limited functions accordingly? A: Occasionally, the status of a user becomes incorrect during authentication with the DC. You may reboot the Lenovo network storage device to resolve this problem. Q: When clicking the Synchronize or Add commands on the Users & Groups page, why does the updating progress stall? A: Occasionally data synchronization with the DC can time out. You may retry the operation or reboot the device to resolve this problem. Q: If a group is a system built-in group in the domain, after importing this group to the Lenovo network storage device, why is no member user shown out of this group? A: Currently domain built-in groups are not supported on Lenovo network storage devices. 12
14 Q: Can I import domain groups that are categorized as Distribution groups, such as a mail group? A: All imported groups must be of the Security Group type. If the type is Distribution Group, it won t be imported onto the Lenovo network storage device, so you need to change the group type to Security. You may find the group type on the DC. Q: I have a user named Aaa in the domain. Why can t I find this user when I search in the Select users and groups from Active Directory dialog box? A: The DC converts all NetBIOS names to lowercase for the Samba server, so you should use all lowercase to search for names, as in aaa in this case. Q: How do I make sure AD authentication is not impacted by other I/O activities on a network with very limited bandwidth, such as VPN over WAN? A: You can set the Quality of Service (QoS) settings as following: Set the VPN tunnel from the Lenovo network storage device to the DC on ports 137, 138, 139, 445, 389, 445 and 901. Set the VPN tunnel from the client PC to the Lenovo network storage device on port
15 Q: What kind of domain users could be used to join a Lenovo network storage device into the domain? A: Any domain user having authority to join PCs into the domain could also be used to join the Lenovo network storage device into the domain. Q: When a Lenovo network storage device is joined into a domain, is a DNS record created automatically for the device in the DNS server? A: Yes, a DNS record for the Lenovo network storage device is created automatically. Q: What Microsoft domains do Lenovo network storage devices support? A: Lenovo network storage devices support Windows NT domain, Windows 2K domain, W2K3 domain, W2K3R2 domain, W2K8 domain, and W2K8R2 domain. Q: How large a domain can Lenovo network storage devices support? A: There is no maximum size for the domain. Lenovo network storage devices have been tested in a domain with as many as 10,000+ groups and 100,000+ users. Keep in mind, the larger the domain, the slower the performance on user/group operations, such as syncing to the AD controller and importing members. Q: Do Lenovo network storage devices support domain names that contain an underscore? A: No, Lenovo network storage devices do not support domain name that contain an _. According to Microsoft s best practices, it is illegal to use the character. Check out for more details. Q: What are the restrictions on using special characters in domain user names and passwords? A: There is no known restriction on special characters being used in passwords. According to Microsoft, the following characters are invalid in user names and should not be used: / \ [ ] : ; =, + *? < Lenovo. All rights reserved. Lenovo, the Lenovo logo and For Those Who Do are either registered trademarks or trademarks of Lenovo in the United States, other countries, or both. EMC is a registered trademark of EMC Corporation in the U.S. and other countries. Iomega, the stylized "i" logo, LenovoEMC and LenovoEMC LifeLine are either registered trademarks or trademarks of LenovoEMC, Ltd. in the United States, other countries, or both. Certain other product names, brand names and company names may be trademarks or designations of their respective owners. Product capacity is specified in gigabytes (GB), where 1GB = 1,000,000,000 bytes or terabytes, where 1TB = 1,000,000,000,000 bytes. The capacity reported by your operating system may vary.
White Paper CONFIGURING AND USING WEBDAV IN LENOVO EMC LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Enabling WebDAV on Your Lenovo Network Storage Device 1 Accessing Shares from Your Computer
White Paper SETTING UP AND RUNNING A WEB SITE ON YOUR LENOVO STORAGE DEVICE WORKING WITH WEB SERVER TOOLS CONTENTS Introduction 1 Audience 1 Terminology 1 Enabling a custom home page 1 Adding webmysqlserver
White Paper CONFIGURING VIDEO SURVEILLANCE WITH LENOVO NETWORK STORAGE DEVICES CONTENTS Executive Summary 1 Assumptions 1 Audience 1 Terminology 1 Video Surveillance Business Need 2 Mindtree SecureMind
Intel Entry Storage System SS4200-E Active Directory Implementation and Troubleshooting 1 Active Directory Overview SS4200-E Active Directory is based on the Samba 3 implementation The SS4200-E will function
Windows Services Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features File and print services Integrated Samba 3 for native SMB/CIFS protocol support
White Paper UNSTOPPABLE COMPUTING ENTERPRISE NETWORK AVAILABILITY AT AN SMB PRICE CONTENTS Introduction 1 Continuity of Business Operations 1 An Expensive Proposition 2 High Availability Made Easy 2 What
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions
Active Directory Management Agent Deployment Guide Document Revision Date: June 12, 2014 Active Directory Management Deployment Guide i Contents System Requirements...1 Hardware Requirements...1 Installation...3
Univention Corporate Server Operation of a Samba domain based on Windows NT domain services 2 Table of Contents 1. Components of a Samba domain... 4 2. Installation... 5 3. Services of a Samba domain...
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
ThinManager and Active Directory Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit http://www.thinmanager.com/kb/index.php/special:allpages for a list of Knowledge
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
COURSE FILE (COURSE PLAN) Year : 2012-13 Sem: ODD Faculty Details Name of the Faculty : Mullai.P & Yaashuwanth.C Designation : Assistant Professor ( OG. ),Assistant Professor (OG) Department : Information
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...
Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Chapter 3 Authenticating Users Remote users connecting to the SSL VPN Concentrator must be authenticated before being allowed to access the network. The login window presented to the user requires three
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
LDAP Implementation AP561x KVM Switches All content in this presentation is protected 2008 American Power Conversion Corporation LDAP Implementation Does not require LDAP Schema to be touched! Uses existing
Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE
Contents Installation Overview... 2 How to Install Ad-Aware Management Server... 3 How to Deploy the Ad-Aware Security Solutions... 5 General Deployment Conditions... 5 Deploying Ad-Aware Management Agent...
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V
Egnyte Storage Sync For NetApp Installation Guide Introduction... 2 Architecture... 2 Key Features... 3 Access Files From Anywhere With Any Device... 3 Easily Share Files Between Offices and Business Partners...
Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Remote Access Technical Guide To Setting up RADIUS V 2.4 Published: 09 May 2006 1 Index 1 Index...2 1.1 Other Relevant Documents...2 2 Introduction...3 2.1 Authentication realms...3 2.2 Installing IAS...4
Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level
Deploying CTERA Agent via Microsoft Active Directory and Single Sign On Cloud Attached Storage September 2015 Version 5.0 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document
Installation Guide for Microsoft Hyper-V Egnyte Inc. 1890 N. Shoreline Blvd. Mountain View, CA 94043, USA Phone: 877-7EGNYTE (877-734-6983) www.egnyte.com 2013 by Egnyte Inc. All rights reserved. Revised
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
ACS 5.x and later: Integration with Microsoft Active Directory Configuration Example Document ID: 113571 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information
Getting Started Guide CensorNet Professional Copyright CensorNet Limited, 2007-2011 This document is designed to provide information about the first time configuration and testing of the CensorNet Professional
ECAT SWE Exchange Customer Administration Tool SWE - Exchange Customer Administration Tool (ECAT) Table of Contents About this Guide... 3 Audience and Purpose... 3 What is in this Guide?... 3 CA.mail Website...
Managing Celerra for the Windows Environment P/N 300-002-679 Rev A01 March 2006 Contents Introduction..................................................3 Windows and multiprotocol documentation....................3
Wazza s Snow Leopard Server QuickStart 14. Win XP - Workgroup Setup About the Document This document is the fourteenth in a series of documents describing the process of installing and configuring a Mac
WINDOWS 2000 Active TE Directory Services WINDOWS 2000 Training Division, NIC Active Directory Stores information about objects on the network and makes this information easy for administrators and users
Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
Your Question Article: 00120 Question: How to Configure External Authentication for Net Report Web Portal Net Report Answer Introduction Security devices can be used to control access to network resources.
04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know
SAFETICA INSIGHT INSTALLATION MANUAL SAFETICA INSIGHT INSTALLATION MANUAL for Safetica Insight version 6.1.2 Author: Safetica Technologies s.r.o. Safetica Insight was developed by Safetica Technologies
Application Note Using DirectControl with Network Appliance Filers Published: June 2006 Abstract This Application Note describes the integration between Network Appliance servers and Centrify DirectControl
Course: WIN310 Student Lab Setup Guide Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 STUDENT COMPUTER SETUP Hardware Requirements All hardware must be on the Microsoft
Setting Up a Macintosh For Use In The Medical Center The purpose of this document is to provide some assistance and direction to the users of Macintosh computers in The Medical Center network environment.
Security Provider Integration Kerberos Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Joining a Domain in Windows XP Pro Table of Content HOW DO I CHANGE A COMPUTER'S DESCRIPTION, NAME, OR JOIN A DOMAIN IN WINDOWS XP PRO?... 1 TO ADD A COMPUTER DESCRIPTION... 1 TO CHANGE A COMPUTER NAME...
INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
OVERVIEW IPedge Enterprise Manager Active Directory Sync (ADSync) is a feature that automatically configures telephone users in the IPedge system based on data entry in the Active Directory service. Active
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
[Type the document title] Polycom RealPresence Resource Manager System Getting Started Guide 8.0 August 2013 3725-72102-001B Polycom Document Title 1 Trademark Information POLYCOM and the names and marks
PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
Security Provider Integration LDAP Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient
Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active
Course: WIN310 Student Lab Setup Guide Summer 2010 Microsoft Windows Server 2003 Network Infrastructure (70-291) ISBN: 0-470-06887-6 Published by Wiley & Sons 1 STUDENT COMPUTER SETUP Hardware Requirements
SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM Abstract This paper explains how to setup Active directory service on windows server 2008.This guide also explains about how to install
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
Technical White Paper DESKTOP www.novell.com Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure * Using SUSE Linux Enterprise Desktop with Microsoft Active Directory Infrastructure
ZyWALL OTPv2 Support Notes Revision 1.00 September, 2010 Written by CSO Table of Contents 1. Introduction... 3 2. Server Installation... 7 2.1 Pre-requisites... 7 2.2 Installations walk through... 7 3.
Active Directory Integration Last updated March 2016 Contents Introduction:... 2 Administration configuration set up:... 2 Configuring for a single OU import... 3 User Importing... 3 Active Directory and
Technical white paper HP Device Manager 4.6 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Configuring User Authentication...
MCSE Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory
VPN Hello and welcome. In the VPN section we will cover the steps for enabling the VPN feature on the Allworx server and how to set up a VPN connection to the Allworx System from your PC. Page 1 VPN The
How To Configure Apple ipad for Cyberoam L2TP VPN Connection Applicable to Version: 10.00 (All builds) Layer 2 Tunneling Protocol (L2TP) can be used to create VPN tunnel over public networks such as the
Chapter 10 Managing Group Policy MICROSOFT EXAM OBJECTIVES COVERED IN THIS CHAPTER: Implement and troubleshoot Group Policy. Create a Group Policy object (GPO). Link an existing GPO. Delegate administrative
1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create
Mirage 5.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,
Application Note Using a Windows NT Domain / Active Directory for User Authentication NetScreen Devices 8/15/02 Jay Ratford Version 1.0 Page 1 Controlling Access to Large Numbers of Networks Devices to
MCSA Objectives Exam 70-236: TS:Exchange Server 2007, Configuring Installing and Configuring Microsoft Exchange Servers Prepare the infrastructure for Exchange installation. Prepare the servers for Exchange
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: email@example.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
Setting Up a Backup Domain Controller June 27, 2012 Copyright 2012 by World Class CAD, LLC. All Rights Reserved. A Backup Domain Controller After setting up a primary domain controller, we will want to