Mobile Secure Cloud Edition Document Version: Mobile Application Management

Size: px
Start display at page:

Download "Mobile Secure Cloud Edition Document Version: 2.0-2014-07-07. Mobile Application Management"

Transcription

1 Mobile Secure Cloud Edition Document Version:

2 Table of Contents 1 Important Disclaimers on Legal Aspects Introduction Application Catalog Application Catalog Icons Adding Applications Uploading Signed Applications Deleting Applications Mobile Application Protection Protecting Applications Protecting Applications with Policy Templates Policy Settings Templates Settings Access Settings Invalid Login Handling Settings EULA Settings Location Settings Firewall Settings Miscellaneous Settings Secure Browser Settings Publishing Applications Publishing Applications to Android Devices Publishing Applications to ios Devices SAP AG or an SAP affiliate company. All rights reserved. Table of Contents

3 1 Important Disclaimers on Legal Aspects This document is for informational purposes only. Its content is subject to change without notice, and SAP does not warrant that it is error-free. SAP MAKES NO WARRANTIES, EXPRESS OR IMPLIED, OR OF MERCHANTABILITY, OR FITNESS FOR A PARTICULAR PURPOSE. Coding Samples Any software coding and/or code lines / strings ("Code") included in this documentation are only examples and are not intended to be used in a productive system environment. The Code is only intended to better explain and visualize the syntax and phrasing rules of certain coding. SAP does not warrant the correctness and completeness of the Code given herein, and SAP shall not be liable for errors or damages caused by the usage of the Code, unless damages were caused by SAP intentionally or by SAP's gross negligence. Accessibility The information contained in the SAP documentation represents SAP's current view of accessibility criteria as of the date of publication; it is in no way intended to be a binding guideline on how to ensure accessibility of software products. SAP specifically disclaims any liability with respect to this document and no contractual obligations or commitments are formed either directly or indirectly by this document. Gender-Neutral Language As far as possible, SAP documentation is gender neutral. Depending on the context, the reader is addressed directly with "you", or a gender-neutral noun (such as "sales person" or "working days") is used. If when referring to members of both sexes, however, the third-person singular cannot be avoided or a gender-neutral noun does not exist, SAP reserves the right to use the masculine form of the noun and pronoun. This is to ensure that the documentation remains comprehensible. Internet Hyperlinks The SAP documentation may contain hyperlinks to the Internet. These hyperlinks are intended to serve as a hint about where to find related information. SAP does not warrant the availability and correctness of this related information or the ability of this information to serve a particular purpose. SAP shall not be liable for any damages caused by the use of related information unless damages have been caused by SAP's gross negligence or willful misconduct. Regarding link classification, see: Important Disclaimers on Legal Aspects 2014 SAP AG or an SAP affiliate company. All rights reserved. 3

4 2 Introduction SAP Mobile Secure cloud edition provides an interface that allows you to easily upload, protect, and deploy applications to managed devices. Wrapping applications in a security policy allows you to implement application security without accessing the application source code. Security policies can help control how applications access enterprise networks, determine how devices handle confidential data, and restrict the locations in which users can use applications. Security policies can also determine how devices respond to unsuccessful attempts to access protected applications. You can save security policies as templates, enabling the rapid deployment of enterprise applications to devices SAP AG or an SAP affiliate company. All rights reserved. Introduction

5 3 Application Catalog The application catalog in the SAP Mobile Secure cloud edition contains the applications that are available to device users. The application catalog is found on the App Protection tab. Administrators can add, manage, and deploy applications in the application catalog. 3.1 Application Catalog Icons The application catalog uses icons to illustrate the key characteristics of applications. Icon Application runs on Android devices Application runs on ios devices Application is not wrapped Application is wrapped Application is wrapped with a federated template Application is a secure browser Application is wrapped with a template that has been updated and applied to another application Application is published Application needs to be republished Multiple versions of the application in the Application Catalog Application Catalog 2014 SAP AG or an SAP affiliate company. All rights reserved. 5

6 3.2 Adding Applications You can upload a new application or a new version of an existing application to the Application Catalog. Procedure 1. On the App Protection tab, click Upload New Application. 2. Click Browse. 3. Navigate to the IPA or APK file and click Open. 4. Click Upload. 3.3 Uploading Signed Applications After you wrap an ios application, you can download the application, sign the application, and then add it to the application catalog. Procedure 1. On the App Protection tab, click the application. 2. Click Download to save the application to your computer. 3. Sign the application. 4. Click Upload Signed App to add the signed application to the application catalog. 3.4 Deleting Applications You can remove applications from the application catalog. You cannot delete built-in applications. Procedure 1. On the App Protection tab, click the application. 2. Click Delete. 3. To confirm the deletion, click OK SAP AG or an SAP affiliate company. All rights reserved. Application Catalog

7 4 Mobile Application Protection Mocana Mobile Application Protection wraps applications, after development, with security and usage policies to protect corporate data, limit usage, and control access. Mobile Application Protection divides policies into specific functional areas. Administrators can combine multiple functional areas into individual policies. When mobile device users install a wrapped application over an unwrapped application, they might need to uninstall the original, unwrapped application. Uninstalling an application might delete application data from devices. To let users keep a wrapped and an unwrapped version of an Android application on their devices, you must change the application s package name before wrapping. See developer.android.com for more information about Android package names. The Download button is available when an administrator wraps an application. The Reset Passphrase button is available when an administrator enables the Application Lockout feature at any point during an application life Mobile Application Protection 2014 SAP AG or an SAP affiliate company. All rights reserved. 7

8 cycle. For example, if a subsequent version of an application is wrapped, but the Application Lockout policy has been changed to disabled, the Reset Passphrase button remains as enabled, to support users who have a previous version installed. Administrators cannot upload itunes apps to the MAP server. For ios, MAP works with applications for distribution within an organization; that is, those written in-house or specifically for the organization. 4.1 Protecting Applications You can create custom policy settings to protect applications. Procedure 1. On the App Protection tab, click an application. 2. On the Template page, specify policy information. 3. On the Access page, specify the application security information. 4. On the Invalid Login Handling page, specify how the application responds when users enter incorrect credentials. 5. On the EULA page, specify the agreement that users must accept to use the application. 6. On the Location page, specify location-based restrictions for the application. 7. On the Firewall page, specify the firewall settings for the application. 8. On the Miscellaneous page, specify settings for application expiry, enforcement, and additional security. 9. On the Secure Browser page, specify the settings for secure-browsing applications. 10. Click Apply Policy. 4.2 Protecting Applications with Policy Templates You can use the policy settings from an existing template to protect applications. The latest version of the template is used, even if a previous version of the application uses a different version of the template. Procedure 1. On the App Protection tab, click an application. 2. Click Load Template. 3. Click the template. 4. Click Apply Policy SAP AG or an SAP affiliate company. All rights reserved. Mobile Application Protection

9 4.3 Policy Settings Security policies include settings that you can configure to regulate the use of applications Templates Settings The Template settings allow you to save policy settings and apply them to multiple applications. Setting Template name Maximum length of 64 characters Template version Number of revisions made to the template Template description of the template Overlay icon Icon that appears with the application icon when the template wraps the application A padlock icon is the default icon Supports PNG files Application federation Collection of trusted applications that can share data and policy settings To add an application to an application federation, wrap the application with a federated template Access Settings The Access settings allow you to configure how applications authenticate users. Setting Per application VPN Application establishes a VPN connection Only applications wrapped with the template have access to the VPN connection Devices can prompt users for a VPN password or a certificate passphrase Passphrase Application requires that users enter a passphrase before the application opens Mobile Application Protection 2014 SAP AG or an SAP affiliate company. All rights reserved. 9

10 Per Application VPN The Per Application VPN settings allow you to configure authentication using VPN credentials and the connection that applications make to VPN servers. Applications can establish a VPN connection for HTTP and HTTPS traffic. Applications check the VPN credentials of users before opening and connecting to the VPN server. If the user name or password changes on the VPN server, users must use the original credentials to open the application, then update the credentials on the VPN Settings page before connecting. For Android devices, if a user switches applications, the device keeps the VPN connection open while the application that initiated the VPN connection is running in the background. For ios devices, if a user switches applications, the device closes the VPN connection closes and suspends the application that initiated the VPN connection. If the user returns to the application before the VPN expiration timeout elapses, the application reconnects to the VPN server automatically. Users can open the application if it cannot connect to the VPN server if the application has established the connection to the VPN server at least once before, but the application blocks traffic that would go over the VPN connection. The Per Application VPN policy cannot be used with the Require Passphrase policy. Setting Allow override Whether users can select a VPN server that is different from the VPN server defined in the policy Server label Name of the VPN server Server address IP address of the VPN server Add Another Server Click to another VPN server Suite B Whether the application supports Suite B encryption and what level of encryption the application supports Allow Override allows users to prevent the use of Suite B encryption Authentication method The authentication method that the VPN server uses: Pre-shared key Digital certificate (see Digital Certificate Settings topic for more information) Application login Whether users must authenticate to use the application The credentials required for authentication IKE identity type The type of identifier for the Internet Key Exchange IKE identity value The identifier value for the Internet Key Exchange IKE version The version of the Internet Key Exchange SAP AG or an SAP affiliate company. All rights reserved. Mobile Application Protection

11 Setting IKE phase 1 The mode of the Internet Key Exchange phase 1 Main mode protects the identities of the VPN server and the VPN client Aggressive mode does not protect the identities of the VPN server and VPN client DH group The Diffie-Hellman group Determines the strength of the key Perfect forward secrecy (PFS) Whether the VPN server uses perfect forward secrecy to protect session keys Allow override allows users to prevent the use of perfect forward secrecy VPN expiration timeout The length of time for which the VPN connection remains inactive before prompting users for authentication On Android devices, the VPN connection remains open until the timeout elapses On ios devices, the VPN connection closes but reconnects automatically until the timeout elapses Digital Certificate Settings Setting Server's CA certificate The certificate for the certificate authority OCSP server URL Internet The Internet URL to the Online Certificate Status Protocol (OCSP) server that determines the status of the certificate OCSP server URL Intranet The intranet URL to the Online Certificate Status Protocol (OCSP) server that determines the status of the certificate Check VPN gateway hostname and IP address Whether the VPN gateway host name and IP address are checked against the certificate Wipe app data if user's certificate is revoked on OCSP server Whether the application wipes user data if the certificate has a revoked status Extended user authentication Whether devices prompt users for user names and passphrases before connecting to the VPN server Simple Certificate Enrollment Protocol (SCEP) Whether devices submit SCEP requests for certificates to use with the VPN server Mobile Application Protection 2014 SAP AG or an SAP affiliate company. All rights reserved. 11

12 Setting SCEP Base DN The distinguished name of the SCEP server SCEP Subject Common Name Identity Type The type of information that the certificate uses as a common name SCEP CA certificate Browse to and select the CA certificate for the SCEP server PEM format is recommended SCEP RA certificate Browse to and select the RA certificate for the SCEP server Only required if you use a Registration Authority SCEP URL The URL of the SCEP server SCEP Key type The RSA key type that the SCEP server uses for encryption SCEP client certificate expiration warning The number of days before expiry that devices prompt users to renew certificates Passphrase Settings The Passphrase settings allow you to configure authentication using a passphrase. Applications do not start until users enter the correct passphrase. If the application belongs to an application federation, the passphrase unlocks the other applications in the application federation. If the application restarts on is inactive in the background until passphrase expiration timeout elapses, users must enter the passphrase again. The Passphrase policy cannot be used with the Per Application VPN policy. Setting Minimum password length The minimum number of characters required for a user passphrase Passphrase expiration timeout The length of time, in minutes, that the application can stay inactive in the background before the policy prompts again for the passphrase Passphrase must contain at least one of each character type The criteria that passphrases must match to be valid Passphrase history Whether users are allowed to reuse passphrases Maximum age rule How ofter users must change their passphrases SAP AG or an SAP affiliate company. All rights reserved. Mobile Application Protection

13 Setting Start reminding user to change his/her passphrase When devices remind users to changes their passphrases Invalid Login Handling Settings The invalid login handling settings allow you to configure how applications respond when users fail authentication. The Invalid Login Handling policy requires the Per Application VPN or Passphrase policy. Setting Invalid login handing Whether to activate invalid login handling Failed login attempts The number of invalid login attempts before the invalid login handling feature is triggered Lock user out of the app Whether the application locks after invalid login attempts Users cannot access a locked application until a helpdesk representative generates an unlock key for the application and sends it to the device Wipe app data Whether the device performs a selective wipe after invalid login attempts With a selective wipe, you can delete MAP-protected data without physical access to devices Wiping data is permanent you cannot undo a wipe or restore data lost in a wipe Lockout message The message that appears on devices that lock after invalid login attempts Helpdesk phone number The phone number that appears on devices that lock after invalid login attempts Helpdesk address The address to which devices send lockout recovery requests when devices lock after invalid login attempts Subject line The subject line of the lockout recovery message that devices send to the helpdesk address when devices lock after invalid login attempts body text The body text of the lockout recovery message that devices send to the helpdesk address when devices lock after invalid login attempts Mobile Application Protection 2014 SAP AG or an SAP affiliate company. All rights reserved. 13

14 4.3.4 EULA Settings The end user licensing agreements settings (EULA) let you configure the agreement that users must accept before using the application. The EULA policy requires the Per Application VPN or Passphrase policy. Setting User agreement Whether devices display the user agreement when users start the application for the first time Frequency How often devices display after users initially accept the user agreement User agreement title The title of the user agreement User agreement text Browse to and select the TXT file that contains the text of the user agreement Users must read, scroll to the bottom of, and accept the user agreement before they can use the application Preview A preview of the user agreement Location Settings The location settings allow you to limit application use to specific regions and to mask the location data that devices report to applications. Setting Geo-fencing Whether the use of the application is restricted to a specific area The application does not start if the device is outside of the area The application will stop working temporarily if the device moves outside of the area, but will resume if the device moves back into the area You can enter coordinates or use a map to define the location data Top left coordinate The coordinate that defines the top-left corner of the area Bottom right coordinate The coordinate that defines the bottom-right corner of the area SAP AG or an SAP affiliate company. All rights reserved. Mobile Application Protection

15 Setting Location accuracy The location accuracy that the application requires to apply the geo-fencing restrictions Location data includes accuracy values The accuracy value and the location data define circles (with the accuracy value as the radius) that represents users' locations If the location circle overlaps the defined region, the geo-fencing policy applies Accuracy values: Fine: 10 meters High: 100 meters Medium: 1000 meters Low: 3000 meters Location masking Whether devices mask location data when reporting it to the application Obfuscation mode How devices mask location data Random location reports random location data Fixed point reports specific location data Fixed point location The specific location that devices report when using fixed point as the obfuscation mode You can enter coordinates or use a map to define the location data Firewall Settings The firewall settings allow you to block several types of potentially insecure network traffic to the application. Setting Smart firewall Whether the smart firewall is active Block all non-dns UDP traffic Whether the application blocks all non-dns UDP traffic Can help prevent a covert channel from transmitting data from the application Block all non-ssl TCP traffic Whether the application blocks all non-ssl TCP traffic Can help prevent the application from transmitting data using non-secure protocols Only trust the following SSL certificates Whether the applications trusts the listed SSL certificates only Mobile Application Protection 2014 SAP AG or an SAP affiliate company. All rights reserved. 15

16 Setting Certificates files Trusted SSL certificates Miscellaneous Settings The miscellaneous settings allow you to configure security settings for the application. Setting App expiration Whether to restrict the availability of the application by date Requires the Per Application VPN or Require Passphrase policy Start date The date on which the application becomes available End date The date on which the application stops being available Copy-paste protection Whether users can copy data from the application and paste the data into other applications ios devices Devices maintain a separate clipboard for the application Users cannot copy data from this clipboard and paste it into other applications Users cannot copy data from the system clipboard and paste it into the application Android devices Devices encrypt data from the application on the clipboard If users copy data from the protected application to another application, the data remains encrypted and unusable If the protected application closes, the data on the clipboard remains encrypted FIPS module Whether the application uses the FIPS cryptographic module to validate cryptographic algorithms The FIPS cryptographic module performs a self check when the application starts The self check might cause a delay when the application starts If the self check fails, the application will not start To apply the FIPS module, you must enable one of the following policies: SAP AG or an SAP affiliate company. All rights reserved. Mobile Application Protection

17 Setting Per-Application VPN Passphrase Copy-Paste Protection Jailbreak/rooting detection Whether the application can start if the device is jailbroken or rooted Encrypted data at rest Whether the application encrypts data before saving it to the device Requires the Per Application VPN or Require Passphrase policy Encrypted data is lost if users uninstall the application or install an unprotected version of the application enforcement Whether to restrict the functionality of the application enforcement response How the application restricts functionality: Allow the use of secure applications only Allow the use of all applications, but warn users first Block messages Warning statement The text that the application uses as a warning message for enforcement Secure Browser Settings The secure browser settings allow you to configure the Mocana secure browser. The secure browser is an application that establishes a VPN connection using SSL to browse Web sites that you allow. Setting Browser title The name of the secure browser in the Launcher view on devices Theme color The color of the toolbars in the secure browser Allow invalid certificates Whether the secure browser accepts self-signed certificates Show navigation bar Whether the secure browser displays the navigation bar that includes the URL and search Allow search Whether the search function is available in the navigation bar Mobile Application Protection 2014 SAP AG or an SAP affiliate company. All rights reserved. 17

18 Setting Allow URL entry Whether users can edit the URL in the navigation bar Show toolbar Whether the secure browser displays the toolbar Allow history Whether users can view the secure browser history and navigate to previously visited pages Allow bookmark Whether users can create and use bookmarks On ios devices, users can create bookmarks that appear in Safari and the Launcher view on devices Allow Whether users can share Web sites using Allow printing Whether users can print the contents of Web sites Default sites Web sites that devices include as bookmarks automatically SAP AG or an SAP affiliate company. All rights reserved. Mobile Application Protection

19 5 Publishing Applications After an application is wrapped, it must be deployed to mobile devices for the policies to take effect. You can publish applications in a number of ways, including through third-party MDM and enterprise app store vendors. For customers who leverage SAP Mobile Secure cloud edition, there is built-in integration for application distribution. Once an application is wrapped, administrators can follow a simple workflow to queue the application for distribution to the desired client groups. Wrapping is not a prerequisite for using the integrated deployment mechanism. For Android applications, once they are loaded into the catalog, they can be deployed. For ios devices, the application must be wrapped with either a personal or an enterprise distribution certificate when uploaded before administrators can deploy it. Optionally, administrators can add an application to a category to make the application available to devices in the SAP Afaria client. 5.1 Publishing Applications to Android Devices You can publish a wrapped application to Android devices. Procedure 1. On the App Protection tab, click the application. 2. Click Publish. 3. On the Application Information page, perform the following tasks: a) In the Display name field, type a name for the application that appears on devices. b) In the field, type a description for the application that appears in the application catalog on devices. c) Select whether the application is required. For some Android devices, the application installs automatically. d) Click Next. 4. On the Distribution Groups page, select the group that can access the application. 5. Click Next. 6. On the Application Configuration page, define the information that SAP Mobile Secure cloud edition passes to the application. Developers can compile libraries into applications that allow the applications to communicate with SAP Mobile Secure cloud edition using the SAP Afaria client. 7. Click Next. 8. To publish a required application immediately, select Distribute the application immediately to the device where supported. 9. Review the deployment settings and click Finish. Publishing Applications 2014 SAP AG or an SAP affiliate company. All rights reserved. 19

20 5.2 Publishing Applications to ios Devices You can publish a wrapped application to ios devices. Procedure 1. On the App Protection page, click the application. 2. Click Publish. 3. Click Next. 4. On the Sign Application - Specify Signing Information page, specify the information that you use to sign applications. 5. Click Sign. 6. On the Application Information page, perform the following tasks: a) In the Display name field, type a name for the application that appears on devices. b) In the field, type a description for the application that appears in the application catalog on devices. c) Select whether the application is a featured application. Featured applications appear on the home page of the SAP Afaria client. d) Select whether the application is required. If the application is managed, devices prompt users to install the application when policies are applied to the device. If the application is not managed, devices prompt users to install the application when the SAP Afaria client starts. 7. On the Distribution Groups page, select the group that can access the application. 8. Click Next. 9. On the Application Configuration page, define the information that SAP Mobile Secure cloud edition passes to the application. Developers can compile libraries into applications that allow the applications to communicate with SAP Mobile Secure cloud edition using the SAP Afaria client. 10. To publish a required application immediately, select Distribute the application immediately to the device where supported. 11. Review the deployment settings and click Finish SAP AG or an SAP affiliate company. All rights reserved. Publishing Applications

21 Important Disclaimers on Legal Aspects This document is for informational purposes only. Its content is subject to change without notice, and SAP does not warrant that it is error-free. SAP MAKES NO WARRANTIES, EXPRESS OR IMPLIED, OR OF MERCHANTABILITY, OR FITNESS FOR A PARTICULAR PURPOSE. Coding Samples Any software coding and/or code lines / strings ("Code") included in this documentation are only examples and are not intended to be used in a productive system environment. The Code is only intended to better explain and visualize the syntax and phrasing rules of certain coding. SAP does not warrant the correctness and completeness of the Code given herein, and SAP shall not be liable for errors or damages caused by the usage of the Code, unless damages were caused by SAP intentionally or by SAP's gross negligence. Accessibility The information contained in the SAP documentation represents SAP's current view of accessibility criteria as of the date of publication; it is in no way intended to be a binding guideline on how to ensure accessibility of software products. SAP specifically disclaims any liability with respect to this document and no contractual obligations or commitments are formed either directly or indirectly by this document. Gender-Neutral Language As far as possible, SAP documentation is gender neutral. Depending on the context, the reader is addressed directly with "you", or a gender-neutral noun (such as "sales person" or "working days") is used. If when referring to members of both sexes, however, the third-person singular cannot be avoided or a gender-neutral noun does not exist, SAP reserves the right to use the masculine form of the noun and pronoun. This is to ensure that the documentation remains comprehensible. Internet Hyperlinks The SAP documentation may contain hyperlinks to the Internet. These hyperlinks are intended to serve as a hint about where to find related information. SAP does not warrant the availability and correctness of this related information or the ability of this information to serve a particular purpose. SAP shall not be liable for any damages caused by the use of related information unless damages have been caused by SAP's gross negligence or willful misconduct. Regarding link classification, see: help.sap.com/disclaimer. Important Disclaimers on Legal Aspects 2014 SAP AG or an SAP affiliate company. All rights reserved. 21

22 SAP AG or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose without the express permission of SAP AG. The information contained herein may be changed without prior notice. Some software products marketed by SAP AG and its distributors contain proprietary software components of other software vendors. National product specifications may vary. These materials are provided by SAP AG and its affiliated companies ("SAP Group") for informational purposes only, without representation or warranty of any kind, and SAP Group shall not be liable for errors or omissions with respect to the materials. The only warranties for SAP Group products and services are those that are set forth in the express warranty statements accompanying such products and services, if any. Nothing herein should be construed as constituting an additional warranty. SAP and other SAP products and services mentioned herein as well as their respective logos are trademarks or registered trademarks of SAP AG in Germany and other countries. Please see index.epx for additional trademark information and notices.

Mobile Secure Cloud Edition Document Version: 2.0-2014-06-26. ios Application Signing

Mobile Secure Cloud Edition Document Version: 2.0-2014-06-26. ios Application Signing Mobile Secure Cloud Edition Document Version: 2.0-2014-06-26 Table of Contents 1 Introduction.... 3 2 Apple Team Membership....4 3 Building a Team by Adding Team Admins and Team Members.... 5 4 App Protection

More information

CUSTOMER SAP Afaria Windows Phone and Windows 8.1 Enrollment

CUSTOMER SAP Afaria Windows Phone and Windows 8.1 Enrollment SAP Afaria Document Version: 7 SP05-2014-09-03 CUSTOMER SAP Afaria Windows Phone and Windows 8.1 Enrollment Table of Contents 1 Windows 8.1 Device Enrollment....3 1.1 Enrolling a Windows 8.1 Device Using

More information

SuccessFactors HCM Suite August 2014 Release Document Version: 1.0 - August 22, 2014. SuccessFactors Learning Programs Administration Guide

SuccessFactors HCM Suite August 2014 Release Document Version: 1.0 - August 22, 2014. SuccessFactors Learning Programs Administration Guide SuccessFactors HCM Suite August 2014 Release Document Version: 1.0 - August 22, 2014 Programs Administration Guide Table of Contents 1 Change History....3 2 Programs.... 4 2.1 Adding a New Program....

More information

CUSTOMER Access Control Guide

CUSTOMER Access Control Guide Mobile Secure Cloud Edition Document Version: 2.3 2016-03-21 CUSTOMER Content 1 Access Control.... 3 2 Access Control Remote....4 2.1 Configuring Access Control Remote....4 3 Default Access Control Policies....

More information

SAP Business Intelligence Suite Patch 10.x Update Guide

SAP Business Intelligence Suite Patch 10.x Update Guide SAP BusinessObjects Business Intelligence Suite Document Version: 4.0 Support Package 10-2014-07-25 SAP Business Intelligence Suite Patch 10.x Update Guide Table of Contents 1 Introduction.... 3 1.1 About

More information

CUSTOMER Presentation of SAP Predictive Analytics

CUSTOMER Presentation of SAP Predictive Analytics SAP Predictive Analytics 2.0 2015-02-09 CUSTOMER Presentation of SAP Predictive Analytics Content 1 SAP Predictive Analytics Overview....3 2 Deployment Configurations....4 3 SAP Predictive Analytics Desktop

More information

SuccessFactors HCM Suite November 2014 Release Version: 1.0 - December 5, 2014. SuccessFactors Learning Programs Administration Guide

SuccessFactors HCM Suite November 2014 Release Version: 1.0 - December 5, 2014. SuccessFactors Learning Programs Administration Guide SuccessFactors HCM Suite November 2014 Release Version: 1.0 - December 5, 2014 Programs Administration Guide Content 1 Change History....3 2 Programs.... 4 2.1 Adding a New Program.... 5 2.2 Assigning

More information

2015-09-24. SAP Operational Process Intelligence Security Guide

2015-09-24. SAP Operational Process Intelligence Security Guide 2015-09-24 SAP Operational Process Intelligence Security Guide Content 1 Introduction.... 3 2 Before You Start....5 3 Architectural Overview.... 7 4 Authorizations and Roles.... 8 4.1 Assigning Roles to

More information

CUSTOMER SAP Afaria Overview

CUSTOMER SAP Afaria Overview SAP Afaria 7 SP15 Document Version: 1.0 2016-06-13 CUSTOMER Content 1 Afaria Overview....3 1.1 About Afaria....3 1.2 Afaria Access and Support....4 1.3 Finding Information....5 2 Afaria Architecture....7

More information

SAP Customer Influence Guide

SAP Customer Influence Guide User Guide SAP Customer Influence CUSTOMER Page 1 Document Version: 2.0 - September 2014 Table of Contents 1 Overview of SAP Customer Influence... 3 2 Getting Started... 4 2.1 Customer Influence Home Page...

More information

SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015

SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015 SAP Best Practices for SAP Mobile Secure Cloud Configuration March 2015 2014 SAP SE or an SAP affiliate company. All rights reserved. No part of this publication may be reproduced or transmitted in any

More information

How-To Guide SAP NetWeaver Document Version: 1.0-2013-12-22. How To Guide - Configure SSL in ABAP System

How-To Guide SAP NetWeaver Document Version: 1.0-2013-12-22. How To Guide - Configure SSL in ABAP System How-To Guide SAP NetWeaver Document Version: 1.0-2013-12-22 Document History Document Version Description 1.0 First official release of this guide Document History 2013 SAP AG or an SAP affiliate company.

More information

PUBLIC SAP IT Operations Analytics 1.0: Administrator's and User's Guide

PUBLIC SAP IT Operations Analytics 1.0: Administrator's and User's Guide Document Version: ITOA 1.0-1.3 2015-10-06 PUBLIC SAP IT Operations Analytics 1.0: Administrator's and User's Guide Content 1 Introduction....5 1.1 Technical Architecture....5 1.2 Basic Prerequisites....7

More information

SAP BusinessObjects BI Platform Document Version: 4.2 2015-11-12. Recommendations for Conversion Using the Report Conversion Tool

SAP BusinessObjects BI Platform Document Version: 4.2 2015-11-12. Recommendations for Conversion Using the Report Conversion Tool SAP BusinessObjects BI Platform Document Version: 4.2 2015-11-12 Recommendations for Conversion Using the Report Conversion Tool Content 1 Document History....3 2 About this Document.... 4 3 Conversion

More information

Sophos Mobile Control SaaS startup guide. Product version: 6

Sophos Mobile Control SaaS startup guide. Product version: 6 Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8

More information

SAP HANA Client Installation and Update Guide

SAP HANA Client Installation and Update Guide PUBLIC SAP HANA Platform SPS 12 Document Version: 1.0 2016-05-11 Content 1 Introduction....3 1.1 Supported Platforms.... 3 1.2 Software Download.... 4 2 SAP HANA Client on UNIX or Linux....7 2.1 Planning

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Release Document Version: 1.4 SP8-2014-07-31. What's New Guide: SAP BusinessObjects Analysis, edition for Microsoft Office

Release Document Version: 1.4 SP8-2014-07-31. What's New Guide: SAP BusinessObjects Analysis, edition for Microsoft Office Release Document Version: 1.4 SP8-2014-07-31 What's New Guide: SAP BusinessObjects Analysis, edition for Microsoft Office Table of Contents 1 About this guide....3 2 About the documentation set....4 3

More information

Technical Certificates Overview

Technical Certificates Overview Technical Certificates Overview Version 8.2 Mobile Service Manager Legal Notice This document, as well as all accompanying documents for this product, is published by Good Technology Corporation ( Good

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012

SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012 SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk

More information

What's New in SAP HANA Spatial (Release Notes)

What's New in SAP HANA Spatial (Release Notes) PUBLIC SAP HANA Platform Document Version: 4.0 2016-05-11 Content 1 What's New in SAP HANA Spatial....3 2 SAP HANA Spatial SPS 12, Features Included in Revision 120.... 4 2.1 SAP HANA Spatial (New and

More information

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0

Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0 Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

How-To Guide SAP Cloud for Customer Document Version: 1.0-2014-03-20. How to Configure SAP HCI basic authentication for SAP Cloud for Customer

How-To Guide SAP Cloud for Customer Document Version: 1.0-2014-03-20. How to Configure SAP HCI basic authentication for SAP Cloud for Customer How-To Guide SAP Cloud for Customer Document Version: 1.0-2014-03-20 How to Configure SAP HCI basic authentication for SAP Cloud for Customer Document History Document Version Description 1.0 First official

More information

SafeGuard Enterprise Web Helpdesk

SafeGuard Enterprise Web Helpdesk SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

SafeGuard Enterprise Web Helpdesk. Product version: 6.1

SafeGuard Enterprise Web Helpdesk. Product version: 6.1 SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk

More information

SAP BusinessObjects Analysis, edition for Microsoft Office Document Version: 2.3 2016-06-16. What's New Guide

SAP BusinessObjects Analysis, edition for Microsoft Office Document Version: 2.3 2016-06-16. What's New Guide SAP BusinessObjects Analysis, edition for Microsoft Office Document Version: 2.3 2016-06-16 Content 1 About this guide....3 2 About the documentation set....4 3 Administration.... 6 3.1 New and changed

More information

PUBLIC Supplement for J.D. Edwards

PUBLIC Supplement for J.D. Edwards SAP Data Services Document Version: 4.2 Support Package 7 (14.2.7.0) 2016-05-06 PUBLIC Content 1 Overview....3 2 System requirements....4 2.1 World....4 2.2 OneWorld....4 3 Datastores.... 6 3.1 Defining

More information

Generating an Apple Push Notification Service Certificate

Generating an Apple Push Notification Service Certificate www.novell.com/documentation Generating an Apple Push Notification Service Certificate ZENworks Mobile Management 2.6.x January 2013 Legal Notices Novell, Inc., makes no representations or warranties with

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

Mobile app for Android Version 1.0.x, January 2014

Mobile app for Android Version 1.0.x, January 2014 Mobile app for Android Version 1.0.x, January 2014 Legal disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission of SAP. This

More information

Advanced Administration

Advanced Administration BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What

More information

SAP BusinessObjects Mobile Document Version: 6.3 2015-11-27. Mobile Security Guide

SAP BusinessObjects Mobile Document Version: 6.3 2015-11-27. Mobile Security Guide SAP BusinessObjects Mobile Document Version: 6.3 2015-11-27 Content 1 Introduction....3 1.1 Why is Security Necessary?....3 1.2 About this Document....3 2 Understanding the Mobile System Landscape....4

More information

SAP BusinessObjects Document Version: 4.1 Support Package 7 2015-11-27. Dashboards and Presentation Design Installation Guide

SAP BusinessObjects Document Version: 4.1 Support Package 7 2015-11-27. Dashboards and Presentation Design Installation Guide SAP BusinessObjects Document Version: 4.1 Support Package 7 2015-11-27 Dashboards and Presentation Design Installation Guide Content 1 Document History....3 2 About this Guide....4 3 Planning Installations....5

More information

SAP Business One mobile app for Android Version 1.0.x November 2013

SAP Business One mobile app for Android Version 1.0.x November 2013 SAP Business One mobile app for Android Version 1.0.x November 2013 Legal disclaimer The information in this presentation is confidential and proprietary to SAP and may not be disclosed without the permission

More information

Securing Mobile Apps in a BYOD World

Securing Mobile Apps in a BYOD World SAP Thought Leadership Paper Mobile App Security Securing Mobile Apps in a BYOD World Protecting Apps Makes You More Responsive to Demands for Enterprise Mobility Table of Contents 4 The Mobile App Tsunami

More information

Supporting Apple ios Devices

Supporting Apple ios Devices Supporting Apple ios Devices 2016 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective

More information

Cyberoam IPSec VPN Client Configuration Guide Version 4

Cyberoam IPSec VPN Client Configuration Guide Version 4 Cyberoam IPSec VPN Client Configuration Guide Version 4 Document version 1.0-410003-25/10/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time

More information

Manual to Access SAP Training Systems Technical Description for Customer On-Site Training

Manual to Access SAP Training Systems Technical Description for Customer On-Site Training Manual to Access SAP Training Systems Technical Description for Customer On-Site Training 2.0 draft version available as of Jan. 5th 2015. The final version will be available in January 2015 after valuable

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

PUBLIC Preferences Setup Automated Analytics User Guide

PUBLIC Preferences Setup Automated Analytics User Guide SAP Predictive Analytics 2.3 2015-08-27 PUBLIC Automated Analytics User Guide Content 1 About Startup Options....3 1.1 Accessing the Preferences Dialog.... 3 2 Setting the General Options....4 2.1 Default

More information

Web Remote Access. User Guide

Web Remote Access. User Guide Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public

SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On. Public SEC100 Secure Authentication and Data Transfer with SAP Single Sign-On Public Speakers Las Vegas, Oct 19-23 Christian Cohrs, Area Product Owner Barcelona, Nov 10-12 Regine Schimmer, Product Management

More information

BYOD Guidance: BlackBerry Secure Work Space

BYOD Guidance: BlackBerry Secure Work Space GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

Administration Guide BES12. Version 12.3

Administration Guide BES12. Version 12.3 Administration Guide BES12 Version 12.3 Published: 2015-10-30 SWD-20151028105551254 Contents Introduction... 11 About this guide...12 How to use this guide... 13 Steps to administer BES12... 13 Examples

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

How to Configure an Example SAP Cloud Applications Studio (PDI) Solution for SAP Cloud for Customer

How to Configure an Example SAP Cloud Applications Studio (PDI) Solution for SAP Cloud for Customer How-To Guide Document Version: 1411 2014.12.15 How to Configure an Example SAP Cloud Applications Studio (PDI) Solution for SAP Cloud for Customer How to configure an example SAP Cloud Applications Studio

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Certificate Management. PAN-OS Administrator s Guide. Version 7.0

Certificate Management. PAN-OS Administrator s Guide. Version 7.0 Certificate Management PAN-OS Administrator s Guide Version 7.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

SAP BusinessObjects Business Intelligence 4 Innovation and Implementation

SAP BusinessObjects Business Intelligence 4 Innovation and Implementation SAP BusinessObjects Business Intelligence 4 Innovation and Implementation TABLE OF CONTENTS 1- INTRODUCTION... 4 2- LOGON DETAILS... 5 3- STARTING AND STOPPING THE APPLIANCE... 6 4.1 Remote Desktop Connection

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

Configuration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide

Configuration (X87) SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English. Building Block Configuration Guide SAP Mobile Secure: SAP Afaria 7 SP5 September 2014 English Afaria Network Configuration (X87) Building Block Configuration Guide SAP SE Dietmar-Hopp-Allee 16 69190 Walldorf Germany Copyright 2014 SAP SE

More information

CA Unified Infrastructure Management Server

CA Unified Infrastructure Management Server CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for

More information

Zenprise Device Manager 6.1.5

Zenprise Device Manager 6.1.5 Zenprise Device Manager 6.1.5 CLIENT GUIDE Rev 6.1.50 Introduction 2 ZENPRISE DEVICE MANAGER 6.1 CLIENT GUIDE 2011 Zenprise, Inc. All rights reserved. This manual, as well as the software described in

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

ios Team Administration Guide (Legacy)

ios Team Administration Guide (Legacy) ios Team Administration Guide (Legacy) Contents About ios Development Team Administration 5 At a Glance 6 Team Admins Manage Team Membership and Assign Roles in the Member Center 6 Development Devices

More information

Installation Guide: Agentry Device Clients SAP Mobile Platform 2.3

Installation Guide: Agentry Device Clients SAP Mobile Platform 2.3 Installation Guide: Agentry Device Clients SAP Mobile Platform 2.3 Windows DOCUMENT ID: DC01954-01-0230-01 LAST REVISED: February 2013 Copyright 2013 by SAP AG or an SAP affiliate company. All rights reserved.

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

Sophos Mobile Control Startup guide. Product version: 3

Sophos Mobile Control Startup guide. Product version: 3 Sophos Mobile Control Startup guide Product version: 3 Document date: January 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos

More information

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C

USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION. www.pesa.com August 2014 Phone: 256.726.9200. Publication: 81-9059-0703-0, Rev. C USER GUIDE WEB-BASED SYSTEM CONTROL APPLICATION Publication: 81-9059-0703-0, Rev. C www.pesa.com Phone: 256.726.9200 Thank You for Choosing PESA!! We appreciate your confidence in our products. PESA produces

More information

http://docs.trendmicro.com

http://docs.trendmicro.com Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,

More information

Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM. This guide provides information on...

Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM. This guide provides information on... Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM This guide provides information on...... APNs Requirements Tips on Enrolling in the ios Developer Enterprise Program...

More information

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0

Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0 Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...

More information

Symantec Mobile Management 7.2 MR1Quick-start Guide

Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1Quick-start Guide Symantec Mobile Management 7.2 MR1 Quick-start Guide The software described in this book is furnished under a license agreement and may be used only

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

GlobalProtect Configuration for IPsec Client on Apple ios Devices

GlobalProtect Configuration for IPsec Client on Apple ios Devices GlobalProtect Configuration for IPsec Client on Apple ios Devices Tech Note PAN-OS 4.1 Revision D 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com CONTENTS OVERVIEW... 3 PREREQUISITES... 3 GLOBALPROTECT

More information

Aspera Connect User Guide

Aspera Connect User Guide Aspera Connect User Guide Mac OS X 10.4/10.5 Browser: Firefox 2+, Safari 2+ Version 2.2 Chapter 1 Chapter 2 Chapter 3 Appendix Introduction Setting Up 2.1 Installation 2.2 Configure the Network Environment

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

Privileged Access Management Upgrade Guide

Privileged Access Management Upgrade Guide Privileged Access Management Upgrade Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

CaseWare Time. CaseWare Cloud Integration Guide. For Time 2015 and CaseWare Cloud

CaseWare Time. CaseWare Cloud Integration Guide. For Time 2015 and CaseWare Cloud CaseWare Time CaseWare Cloud Integration Guide For Time 2015 and CaseWare Cloud Copyright and Trademark Notice Copyright. 2015 CaseWare International Inc. ( CWI ). All Rights Reserved. Use, duplication,

More information

Good Share Client User Guide for ios Devices

Good Share Client User Guide for ios Devices Good Share Client User Guide for ios Devices Product Version: 3.1.3 Doc Rev 3.1 Last Updated: 24-Feb-15 Good Share TM Table of Contents Introducing Good Share 1 Installing the Good Share App 1 Getting

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Certificate Management

Certificate Management Certificate Management Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us

More information

Sophos Mobile Control User guide for Apple ios. Product version: 4

Sophos Mobile Control User guide for Apple ios. Product version: 4 Sophos Mobile Control User guide for Apple ios Product version: 4 Document date: May 2014 Contents 1 About Sophos Mobile Control...3 2 About this guide...4 3 Login to the Self Service Portal...5 4 Set

More information

Using the Cisco OnPlus Scanner to Discover Your Network

Using the Cisco OnPlus Scanner to Discover Your Network Using the Cisco OnPlus Scanner to Discover Your Network Last Revised: October 22, 2012 This Application Note explains how to use the Cisco OnPlus Scanner with the Cisco OnPlus Portal to discover and manage

More information

BES10 Self-Service. Version: 10.2. User Guide

BES10 Self-Service. Version: 10.2. User Guide BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create

More information

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

Application Note. Intelligent Application Gateway with SA server using AD password and OTP Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto

More information

Installation Guide. SafeNet Authentication Service

Installation Guide. SafeNet Authentication Service SafeNet Authentication Service Installation Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Visualization Extension Plugin Version: 1.0.0-2014-12-04. Visualization Extension Plugin for SAP Web IDE

Visualization Extension Plugin Version: 1.0.0-2014-12-04. Visualization Extension Plugin for SAP Web IDE Visualization Extension Plugin Version: 1.0.0-2014-12-04 Visualization Extension Plugin for SAP Web IDE Content 1 Visualization Extension Plugin Overview....3 1.1 About the visualization extension plugin....

More information

Sophos Mobile Control Installation guide. Product version: 3.5

Sophos Mobile Control Installation guide. Product version: 3.5 Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External

More information

Integrated SSL Scanning

Integrated SSL Scanning Software Version 9.0 Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included in this publication are the exclusive

More information

Getting Started with the License Administration Workbench 2.0 (LAW 2.0)

Getting Started with the License Administration Workbench 2.0 (LAW 2.0) Getting Started SAP Global License Auditing Document Version: 1.2 2015-03-13 Getting Started with the License Administration Workbench 2.0 (LAW 2.0) Table of Contents 1 Getting Started with the License

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Cloud Services MDM. Telecom Management Admin Guide

Cloud Services MDM. Telecom Management Admin Guide Cloud Services MDM Telecom Management Admin Guide 10/24/2014 CONTENTS Telecom Management... 2 Enabling Telecom Setting... 2 Creating and Managing Telecom Plans... 3 Dynamic Assignment... 4 Dashboard Usage...

More information