1 Proven Practice Configuring Controller 8.2 to use Active Directory authentication Product(s): Controller 8.2 Area of Interest: Infrastructure
3 Configuring Controller 8.2 to use Active Directory authentication 3 Contents 1 INTRODUCTION PURPOSE DISCLAIMER ASSUMPTIONS OVERVIEW CONFIGURE AUTHENTICATED ACCESS DISABLE ANONYMOUS ACCESS RESTRICT USER ACCESS TO THE COGNOS NAMESPACE CONFIGURE CONTROLLER 8 COMPONENTS TO USE ACTIVE DIRECTORY SERVER - PART ONE: CONFIGURE AN ACTIVE DIRECTORY NAMESPACE OPTIONAL ADVANCED CONFIGURATION: INCLUDE OR EXCLUDE DOMAINS USING ADVANCED PROPERTIES DECIDE WHICH IIS AUTHENTICATION METHOD TO USE ENABLE INTEGRATED WINDOWS AUTHENTICATION ON THE IIS WEB SERVER CONFIGURE CONTROLLER 8 COMPONENTS TO USE ACTIVE DIRECTORY SERVER - PART TWO: ENABLING SINGLE SIGNON BETWEEN ACTIVE DIRECTORY SERVER AND COGNOS 8 CONTROLLER COMPONENTS ADD COGNOS CONTROLLER USERS TO THE COGNOS CONTROLLER ROLES USING THE COGNOS CONNECTION PORTAL MAP COGNOS CONTROLLER USERS TO COGNOS 8 USERS CONFIGURE CONTROLLER TO USE COGNOS 8 AUTHENTICATION CREATE AN ASSOCIATION BETWEEN THE USERS DEFINED IN THE CONTROLLER APPLICATION, AND THOSE DEFINED IN THE COGNOS 8 NAMESPACE ROLES APPENDICES APPENDIX 1 - HOW TO SWAP BETWEEN NATIVE AND WINDOWS SECURITY APPENDIX 2 NATIVE AUTHENTICATION CONFIGURATION APPENDIX 3 NATIVE AUTHENTICATION CONFIGURATION APPENDIX 4 DELETE AN AUTHENTICATION PROVIDER... 20
4 Configuring Controller 8.2 to use Active Directory authentication 4 1 Introduction 1.1 Purpose This document is intended to demonstrate how best to configure Controller 8.2 to use Active Directory authentication (i.e. using Windows A.D. users/groups directly inside the Controller 8 application itself). By following these best practices the intention is to make utilising Active Directory authentication as easy as possible, with the minimum of possibility for errors/issues. NOTE: This document supersedes my previous document ( Configuring Controller 8 to use Active Directory authentication dated 2006). 1.2 Disclaimer Although this document demonstrates proven practices suitable for most environments, it is not necessarily perfect for all environments. There are an infinite variety of possible customer I.T. environments, many different ways to install/configure Controller 8.2, and therefore the advice in this document may have to be modified by the customer to fit in with their needs/environment. Your Cognos technical consultant (who installed your Controller server(s)) will be the best person to advise on any extra necessary changes. NB: This guide is intended as a quick-start guide, for the most popular of environments. The official documentation takes precedence over this document. 1.3 Assumptions This document is based on Controller 8.2 (released Summer 2007). However, it may be correct for future releases of Controller. Generally we shall assume that it is a simple server environment (i.e. only one Controller 8.2 application server).
5 Configuring Controller 8.2 to use Active Directory authentication 5 2 Overview Cognos 8 Controller can use the following 3 different types of security logon authentication methods: o Native o Cognos 8 o Windows this is the default method, where the users/passwords are entirely stored inside the Controller database itself) To configure Controller 8 to use Cognos 8 (or Windows Authentication), you must perform 3 steps: 1) Configure Controller 8 to run with authenticated access 2) Add Controller users to the Cognos roles 3) Map Controller roles to the Cognos 8 users Typically, the customer s: I.T. department would perform task (1) Finance Superuser (s) would perform (2) and (3). This document will demonstrate how to perform these 3 tasks.
6 Configuring Controller 8.2 to use Active Directory authentication 6 3 Configure Authenticated Access 3.1 Disable Anonymous Access On the Controller 8 application server: Start Cognos Configuration from the Start Menu In the Explorer window, under Security, Authentication, click Cognos Change Allow anonymous access (from True) to False Click File - Save. Now, you will notice that users are required to provide logon credentials when they access Cognos resources. 3.2 Restrict User Access to the Cognos Namespace On the Controller 8 application server: Inside Cognos Configuration, under Security, click Authentication change the value of Restrict access to members of the built-in namespace to True File - Save 3.3 Configure Controller 8 Components to Use Active Directory Server - PART ONE: Configure an Active Directory Namespace TIP: For Cognos 8 Controller to work properly with Active Directory Server, ensure that the Windows user group Authenticated users has Read privileges for the Active Directory folder where users are stored. The customer s I.T department s Active Directory administrator can help you with this. On the application server: launch Cognos Configuration under Security, right-click Authentication, and then click New resource, Namespace TIP: Do not delete the Cognos namespace. It contains authentication data that pertains to all users and is required to save the configuration. If you were ever to delete this new
7 Configuring Controller 8.2 to use Active Directory authentication 7 namespace (using Cognos Configuration), you must complete the process by ALSO deleting it in the Cognos Connection portal. For more info, see Appendix #4 Important: In the Name box, type a name for your authentication namespace (e.g. <DOMAIN>, and ensure the Type is set to Active Directory NOTE: In my examples/printscreens, I ve called the namespaces <DOMAIN>_namespace. This is just for visibility. You probably would prefer to just call it <DOMAIN>. Namespace ID property: specify a unique identifier e.g. TESTDOMAIN TIP: I have used TESTDOMAIN_namespace in the print-screens in this document Specify the values for all other required properties to ensure that Cognos 8 components can locate and use your existing authentication provider o e.g. Host and port <one of your domain controllers>:389 IMPORTANT: In most environments, there is no need to fill in the section Binding credentials (because most Windows domains allow anonymous LDAP querying). TIP: If you specify Binding Credentials (i.e. if you fill in this section), then (in some environments) it can lead to performance problems This is because it causes Cognos to unbind its original user and re-bind as the specified user This can lead to a delay if the domain controller is not on the same LAN (for example, one customer s logon was delayed from 2 seconds to 5 seconds by using binding credentials). Therefore, only fill in the Binding credentials section if your test (see later) fails. If authentication fails, specify a Windows user ID and password for the Binding credentials property. Use the credentials of a Windows user who has at least search and read privileges for that server. This should be a domain user who can see the folders inside the AD where the Controller users are located. This will probably be the Controller service account (e.g. DOMAIN\Controller_admin)
8 Configuring Controller 8.2 to use Active Directory authentication 8 Click File Save Test the connection, by right-clicking the new authentication resource and click Test. Restart the Cognos 8 service 3.4 OPTIONAL ADVANCED CONFIGURATION: Include or Exclude Domains Using Advanced Properties For more information, see Appendix #3 at end of this document 3.5 Decide which IIS authentication method to use The Cognos provider can use 2 different methods (of integrating with the IIS web server) to provide single signon: Kerberos delegation o This is the default method Remote_User Why would you wish to use Remote_User variable? For example, (see document Cognos 8 Controller Readme Updates (English) - rdm_ctrl_updates.pdf) if you have an NT4 domain, you need to use an LDAP not Active Directory namespace. To quote this document: This problem occurs because the Cognos 8 Active Directory provider uses ADSI protocol and Kerberos delegation for authentication in a single signon environment. When Microsoft Internet Explorer runs on Windows NT, it cannot authenticate to the IIS server using Kerberos delegation. When your system is configured for Windows Integrated Authentication, for the single signon to work with IIS, you must (a) configure Cognos 8 to communicate with the Active Directory server using the LDAP provider. (b) configure the external identity mapping property to read the REMOTE_USER environment variable. 3.6 Enable Integrated Windows Authentication on the IIS Web server TIP: Integrated Windows Authentication was formerly named NT Challenge Response. You must enable Windows Integrated Authentication on the IIS Web server (typically on the Default Website ):
9 Configuring Controller 8.2 to use Active Directory authentication 9 NOTE: The application server must be part of the domain where the users are located. TIP: By doing this, we are enabling Windows Authentication via the configuration of Internet Information Services (IIS). This will mean that (from now on), after users log on to client computers with their Windows username and password, they are not prompted with further logons when they run Cognos Controller or the Cognos Controller Excel Add-in. 3.7 Configure Controller 8 Components to Use Active Directory Server - PART TWO: Enabling Single Signon Between Active Directory Server and Cognos 8 Controller Components OPTION1: Steps for Single Signon Using Kerberos Delegation After enabling Windows Integrated Authentication, skip to the next step. OPTION2: Steps for Single Signon Using Remote_User variable After enabling Windows Integrated Authentication, perform the following (in addition) on every computer where you installed Content Manager: Launch Cognos Configuration In the Explorer window, under Security, Authentication, click the Active Directory namespace Click in the Value column for Advanced properties and then click the edit button In the Value - Advanced properties window, click Add In the Name column, type singlesignonoption In the Value column, type IdentityMapping Click OK. => The Active Directory provider now uses REMOTE_USER for single signon Tip: To switch back to Kerberos delegation, edit Advanced properties and, in the Value column, type KerberosAuthentication
11 4 Add Cognos Controller Users to the Cognos Controller Roles 4.1 Using the Cognos Connection portal Inside this section, we shall use the portal to: remove the Everyone group from the Cognos built-in roles and groups ensure that authorized users belong to at least one Cognos built-in role or group: Steps 1. Open Cognos Connection e.g From the Tools menu, click Directory TIP: In my example here, my domain s NETBIOS name is TESTDOMAIN. 3. On the Users, Groups, and Roles tab, click the Cognos namespace 4. In the Actions column, click the properties button for the Controller Administrators role 5. Click the Members tab.
12 6. To add members, click Add and choose how to select members: Method#1 - Choose from listed entries, using the GUI: Click to open the appropriate namespace (e.g. TESTDOMAIN ) Navigate and open the folder (e.g. Users ) that contains the Windows Domain User(s) that you wish to add Tick the box Show users in the list Tick the checkboxes next to the user(s) (and/or groups and roles) that you wish to add (on the left hand side of the screen) Method#2 - Search for entries: Click Search and in the Search string box, type the phrase you want to search for. For search options, click Edit, Find, and click the entry you want Method#3 Manually type in entries: Manually type the name of entries you want to add: click Type and type the names of groups,roles, or users using the following format, where a semicolon (;) separates each entry: namespace/group_name;namespace/role_name;namespace/user_n ame; Here is an example: Cognos/Authors;LDAP/scarter; 7. Click the right-arrow button and when the entries you want appear in the Selected entries box, click OK. For example: 8. TIP: For Security purposes, on the Members tab, if there is an Everyone namespace, click it, and then click Remove. 9. Click OK.
13 10. Repeat steps 4 to 8 for the Controller Users role, and click OK Tip: The Controller Administrators role must be a member of the Controller Users role. Therefore you must add the role Controller Administrators from the Cognos Namespace:
14 5 Map Cognos Controller Users to Cognos 8 Users 5.1 Configure Controller to use Cognos 8 Authentication On the Controller application server: Launch Cognos Controller Configuration Change the security authentication setting from native to Cognos 8 authentication Click save 5.2 Create an association between the users defined in the Controller application, and those defined in the Cognos 8 namespace roles After you add Cognos Controller users to the Cognos Controller roles, you must create an association between the users defined in the Cognos Controller application and those defined in the Cognos 8 namespace roles. Important: Associations can only be created by a user who has been configured as a member of the Controller Administrators role in Cognos Connection Logon to Windows using a username that is a member of the Controller Administrators role in Cognos Connection Launch Cognos Controller Notice how you are not asked for a username/password to logon with:
15 This is because the first time you launch Controller (after having performed the above) Controller automatically links the user ADM (i.e. the Controller user called Administrator ) with whoever the Windows user is who has just logged on (e.g. in this case TESTDOMAIN\ADMINISTRATOR). 2. From the Maintain menu, click Rights, Users. You will see something similar to the following: In other words, in this database that we ve just logged onto (although it will not affect all the databases e.g. live, test, training ) the user ADM is now associated with the Windows user TESTDOMAIN\Administrator 3. In the Create New box, click the drop-down arrow and then click User. 4. Beside the first User Id box, click the browse button, and then select the user as defined in the Cognos 8 namespace roles. If you get the following error: then it is likely that you need to reconfigure your groups/members inside Cognos Connection. In other words, you need to add users into the groups Controller Users and Controller Administrators. Once you ensure that there are valid users inside the relevant groups (Controller Users and Controller Administrators) then you should be able to create new users, and new associations to a Windows account e.g.
16 5. Beside the second User Id box, click the browse button, and then select the user as defined in the Cognos Controller database. 6. In the Name box, type the name of the Cognos Controller user. 7. In the Address box, type the address for the Cognos Controller user. 8. Beside the User Group box, click the browse button, and then select the user group for the Cognos Controller user. 9. Under Options, select the appropriate checkbox to identify the user. You can identify the user as either a Cognos Controller User or Cognos Controller Administrator. You can add optional comments for the user, as well as the user s location. 10. Click Save. If you get the following error when trying to logon as TESTDOMAIN\TEST1 then perhaps you ve not given that user any rights to logon inside the application!
17 6 Appendices 6.1 Appendix 1 - How to swap between Native and Windows security During the Controller development phase, you may wish to change from Windows to Native: Ensure no users on system Launch Controller Configuration Click on Web Services Server Server Authentication Change authentication method from Windows authentication to Native Launch Cognos Configuration Change Security Authentication Cognos Allow Anonymous Access from False to True File Save Restart Cognos 8 Service (using button at top of screen) How to change from Native to Windows: Perform reverse of above 6.2 Appendix 2 Native Authentication configuration Native authentication is the default authentication method. Login information is configured in the Cognos Controller databases and in the Cognos Controller user interface. Native authentication is the authentication method used in previous versions of Cognos Controller. If Native authentication is enabled, when users log on to Cognos Controller from Cognos Connection or from a URL and have selected a database to log on to, they are prompted to log in. Users are prompted with the same login window when they log on to Cognos Controller using the Cognos Controller Microsoft Excel Add-in. If you want to use Native authentication in your Cognos 8 Controller environment, the reporting components must run under anonymous access. When the reporting components run under anonymous access, no login is required. In Cognos Connection, anonymous access is enabled by default. Native authentication provides minimal security in your Cognos 8 Controller environment.
18 6.3 Appendix 3 Native Authentication configuration OPTIONAL ADVANCED CONFIGURATION: Include or Exclude Domains Using Advanced Properties When you configure an authentication namespace for Cognos 8 Controller, users from only one domain can log in. By using the Advanced properties for Active Directory Server, users from related (parent-child) domains and unrelated domain trees within the same forest can also log in. Authentication in One Domain Tree If you set a parameter named chase_referrals to true, users in the original authenticated domain and all child domains of the domain tree can log in to Cognos 8 Controller. Users above the original authenticated domain or in a different domain tree cannot log in. Authentication in All Domain Trees in the Forest If you set a parameter named multi_domain_tree to true, users in all domain trees in the forest can log in to Cognos 8 Controller. Steps 1. On every computer where you installed Content Manager, open Cognos Configuration. 2. In the Explorer window, under Security, Authentication, click the Active Directory namespace. 3. In the Properties window, specify the Host and port property: For users in one domain, specify the host and port of a domain controller for the single domain. For users in one domain tree, specify the host and port of the top-level controller for the domain tree. For users in all domain trees in the forest, specify the host and port of any domain controller in the forest. 4. Click in the Value column for Advanced properties and click the edit button. 5. In the Value - Advanced properties window, click Add. 6. Specify two new properties, chasereferrals and MultiDomainTrees, with the following values: 7. Click OK. 8. From the File menu, click Save.
19 6.4 Appendix 4 Delete an Authentication Provider If they are no longer required, you can delete namespaces that you added or unconfigured namespaces that Cognos 8 Controller components detected after an upgrade. Important: You must not delete the Cognos namespace. It contains authentication data that pertains to all users and is required to save the configuration. When you delete a namespace, you can no longer log on to the namespace. Security data for the namespace remains in Content Manager until you permanently delete it in the portal. For more information, see the Administration and Security Guide. After you delete a namespace, it appears as Inactive in the portal. Steps 1. On a computer where you installed Content Manager, open Cognos Configuration. 2. In the Explorer window, under Security, Authentication, right-click the namespace and click Delete. 3. Click Yes to confirm. The namespace disappears from the Explorer window and you can no longer log on to the namespace on that computer. 4. From the File menu, click Save. 5. Repeat steps 1 to 4 for each computer where you installed Content Manager. You must now log on to the portal and permanently delete the data for the namespace. For more information, see the Administration and Security Guide.
Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright
ChaseReferrals and multidomaintrees Graphical explanation of the difference Imagine your Active Directory network looked as follows: Then imagine that you have installed your Controller report server inside
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
CHAPTER 9 Changing Passwords in Cisco Unity 8.x This chapter contains the following sections: Changing Passwords for the Cisco Unity 8.x Service Accounts (Without Failover), page 9-1 Changing Passwords
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
Fairfield University Using Xythos for File Sharing Version 7.0 Table of Contents I: Manage your Department Folder...2 Your Department Folder... 2 II: Sharing Folders and Files Inside of Fairfield U...3
Dell Compellent Storage Center Active Directory Integration Best Practices Guide Dell Compellent Technical Solutions Group January, 2013 THIS BEST PRACTICES GUIDE IS FOR INFORMATIONAL PURPOSES ONLY, AND
Proven Practice Troubleshooting Active Directory Server Product(s): IBM Cognos Series 7 Area of Interest: Security Troubleshooting Active Directory Server 2 Copyright Copyright 2008 Cognos ULC (formerly
PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are
Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,
Deploying CTERA Agent via Microsoft Active Directory and Single Sign On Cloud Attached Storage September 2015 Version 5.0 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document
Guideline Creating IBM Cognos Controller Databases using Microsoft SQL Product(s): IBM Cognos Controller 8.1 or higher Area of Interest: Financial Management 2 Copyright Copyright 2008 Cognos ULC (formerly
SINGLE SIGN-ON FOR MTWEB FOR MASSTRANSIT ENTERPRISE WINDOWS SERVERS WITH DIRECTORY SERVICES INTEGRATION Group Logic, Inc. November 26, 2008 Version 1.1 CONTENTS Revision History...3 Feature Highlights...4
Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos firstname.lastname@example.org User Identification Overview User Identification allows you to create security policies based
Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level
CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM User Guide Revision D Issued July 2014 Table of Contents About CRM Migration Manager... 4 System Requirements... 5 Operating Systems... 5 Dynamics
BusinessObjects Enterprise XI Release 2 How to configure an Internet Information Services server as a front end to a WebLogic application server Overview Contents This document describes the process of
NT Authentication Configuration Guide Version 11 Last Updated: March 2014 Overview of Ad Hoc Security Models Every Ad Hoc instance relies on a security model to determine the authentication process for
Corporate Telephony Toolbar User Guide 1 Table of Contents 1 Introduction...6 1.1 About Corporate Telephony Toolbar... 6 1.2 About This Guide... 6 1.3 Accessing The Toolbar... 6 1.4 First Time Login...
How To Install SQL Server 2014 Express Edition Updated: 2/4/2016 2016 Shelby Systems, Inc. All Rights Reserved Other brand and product names are trademarks or registered trademarks of the respective holders.
ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory
SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit Note: SecureAware version 3.7 and above contains all files and setup configuration needed to use Microsoft IIS as a front end web server. Installing
Digital Signatures User Guide Revision 1.2 build 1, Document Revision 1.12 Published 31. Octover 2011 ii Contents Copyright Disclaimer iii iii Introduction 1 System Requirements... 3 Installing the software
Email Client Configuration Guide Table of Contents Email Configuration...3 Email settings...3 IMAP...3 POP...3 SMTP...3 Process Overview...5 Account set up wizards...5 Anatomy of an email address...5 Why
Proven Practice Cognos 8 Go! Mobile BlackBerry 'Pull' Install Product(s): Cognos 8 Go! Mobile Area of Interest: Infrastructure Cognos 8 Go! Mobile BlackBerry 'Pull' Install 2 Copyright Your use of this
Cisco TelePresence Management Suite Extension for Microsoft Exchange Installation Guide D14846.01 June 2011 Software version 2.3 Contents Introduction 5 End user guidance 5 Server requirements 6 Exchange
CHAPTER 6 System Overview System Administration and Log Management Users must have sufficient access rights, or permission levels, to perform any operations on network elements (the devices, such as routers,
Application Note 8: TrendView Recorders DCOM Settings and Firewall Plus DCOM Settings for Trendview Historian Server DCOM Configuration Introduction This document is intended to provide a check-list of
Cisco TelePresence Management Suite Extension for Microsoft Exchange Installation Guide Software version 2.3 D14846.03 August 2013 Contents Introduction 4 End user guidance 4 Server requirements 5 Exchange
HDAccess Administrators User Manual Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks
Telephony Toolbar Corporate User Guide Release 7.1 March 2011 Table of Contents 1 About This Guide...7 1.1 Open Telephony Toolbar - Corporate... 7 1.2 First Time Login... 8 1.3 Subsequent Use... 11 2 Using
04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: email@example.com Information in this document is subject to change without notice. Companies,
RESOURCE AND PATIENT MANAGEMENT SYSTEM IHS USER SECURITY AUDIT (BUSA) Version 1.0 Office of Information Technology Division of Information Technology Albuquerque, New Mexico Table of Contents 1.0 Release
How to set up Outlook Anywhere on your home system The Outlook Anywhere feature for Microsoft Exchange Server 2007 allows Microsoft Office Outlook 2007 and Outlook 2003 users to connect to their Outlook
Interact for Microsoft Office Installation and Setup Guide Perceptive Content Version: 7.0.x Written by: Product Knowledge, R&D Date: October 2014 2014 Perceptive Software. All rights reserved Perceptive
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Distribution List Manager User s Manual Welcome... 2 Configuring the Add-in... 3 Settings Tab... 3 Advanced Tab... 4 Troubleshooting... 5 Distribution List Manager Copyright 2008 Sperry Software Inc. P
formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: firstname.lastname@example.org Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656
How-to: Single Sign-On Document version: 1.02 nirva systems email@example.com nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features
econtrol 3.5 for Active Directory & Exchange Administrator Guide This Guide Welcome to the econtrol 3.5 for Active Directory and Exchange Administrator Guide. This guide is for system administrators and
Guideline Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal Product(s): IBM Cognos ReportNet Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks
Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than
2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: firstname.lastname@example.org Information in this document is subject to change without notice. Companies,
Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day email@example.com v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation
Installation Guide v3.0 Shepherd TimeClock 4465 W. Gandy Blvd. Suite 800 Tampa, FL 33611 Phone: 813-882-8292 Fax: 813-839-7829 http://www.shepherdtimeclock.com The information contained in this document
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Modular Messaging Release 3.0 / 3.1 Diminished Permissions for Exchange. Issue 1 March 2007 2006-2007 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information
Version 3.2 User Guide Copyright 2002-2009 Snow Software AB. All rights reserved. This manual and computer program is protected by copyright law and international treaties. Unauthorized reproduction or
Managing Users, Computers, & Groups IN THE AGNET.TAMU.EDU ACTIVE DIRECTORY DOMAIN Active Directory Administrative Center Managing Computers Managing Users & Groups Managing Organizational Units Introduction
PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
Nasuni Corporation Natick, MA Overview You use permissions to control user access to data. There are two basic considerations when using permissions to control user access to data: Which users have access
Chapter 1 Managing users The Users page in Cloud Manager lists all of the user accounts in the Centrify identity platform. This includes all of the users you create in the Centrify for Mobile user service
Mixed Authentication Setup Version 8.2 January 1, 2016 For the most recent version of this document, visit our documentation website. Table of Contents 1 Overview 3 2 IIS installed components 3 2.1 Creating
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Security Guidelines for MapInfo Discovery 1.1 This paper provides guidelines and detailed instructions for improving the security of your Mapinfo Discovery deployment. In this document: Overview.........................................
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
Chapter 3 Authenticating Users Remote users connecting to the SSL VPN Concentrator must be authenticated before being allowed to access the network. The login window presented to the user requires three
TM Control Panel User Guide Working with Mail (Hosted Exchange) 1 Working with Mail (Hosted Exchange) TM offers Microsoft Exchange hosting as a powerful messaging solution allowing you to create and manage
INSTALLATION GUIDE July 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may
Cisco Security Agent Protection Series: Enabling LDAP for CSA Management Center SSO Authentication For CSA 5.2 Versions 188.8.131.52 and up Fred Parks Systems Consultant 3/25/2008 2008 Priveon, Inc. www.priveonlabs.com
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
User Manual Version 5.0 Nexxis User Management Nexxis User Management v5.0 User Manual Copyright 2011 Labtronics Inc. Printed in Canada. Windows is a registered trademark of Microsoft Corporation. Microsoft
Quickstart Guide First Edition, Published September 2009 Remote Administrator / NOD32 Antivirus 4 Business Edition Contents Getting started...1 Software components...1 Section 1: Purchasing and downloading
3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
Appendix E Installing and configuring the Captioning Manager The Mediasite Captioning Manager, a separately sold EX Server add-on, allows users to submit and monitor captioning requests through Automatic
CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically
Wazza s QuickStart Configuring the Active Directory Plug-in Mac OS X 10.3.4 Background Using the Mac OS X 10.3.x built-in Active Directory (AD) plug-in, Mac users can authenticate with a Windows Active
Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them
Specialized. Recognized. Preferred. The right partner makes all the difference. Oracle E-Business Suite - Oracle Business Intelligence Enterprise Edition 11g Integration By: Arun Chaturvedi, Business Intelligence
Installation Guide for Microsoft SQL Server 2008 R2 Express October 2011 (GUIDE 1) Copyright 2011 Lucid Innovations Limited. All Rights Reserved This guide only covers the installation and configuration
Using SQL Reporting Services with Amicus Applies to: Amicus Attorney Premium Edition 2011 SP1 Amicus Premium Billing 2011 Contents About SQL Server Reporting Services...2 What you need 2 Setting up SQL
Active Directory Integration Last updated March 2016 Contents Introduction:... 2 Administration configuration set up:... 2 Configuring for a single OU import... 3 User Importing... 3 Active Directory and
How to Logon with Domain Credentials to a Server in a Workgroup Johan Loos firstname.lastname@example.org Version 1.0 Authentication Overview Basically when you logon to a Windows Server you can logon locally using