Infrastructure Managed Services Portal Pass-through authentication Implementation Guide
|
|
- Lee Chandler
- 8 years ago
- Views:
Transcription
1 Integration Technologies Infrastructure Managed Services Portal Pass-through authentication Implementation Guide Version 2.1
2 THIS DOCUMENT CONTAINS CONFIDENTIAL INFORMATION OF THE UNISYS CORPORATION ( Unisys ). Recipient agrees, in consideration for receipt of this document, to use it solely for the limited purpose for which it was made available and not to transmit it and/or the information therein contained, in whole or in part, or to suffer such action by others, for any purpose, except with the written permission, first obtained, of Unisys. Recipient further agrees to surrender this document and all copies, or certify destruction of same to Unisys when the reason for its receipt has terminated. NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product or related information described herein is only furnished pursuant and subject to the terms and conditions of a duly executed agreement to purchase or lease equipment or to license software. The only warranties made by Unisys, if any, with respect to the products described in this document are set forth in such agreement. Unisys cannot accept any financial or other responsibility that may be the result of your use of the information in this document or software material, including direct, special, or consequential damages. You should be very careful to ensure that the use of this information and/or software material complies with the laws, rules, and regulations of the jurisdictions with respect to which it is used. The information contained herein is subject to change without notice. Revisions may be issued to advise of such changes and/or additions. Unisys Copyright 2004, 2007 Unisys Corporation All rights reserved. UNISYS PROPRIETARY Revision History Version Date Author(s) Comments 1.0 8/16/2005 JM Initial Document 2.0 6/1/2007 JM Updated URL definitions /6/2007 JM Added SSL requirement
3 Table of Contents 1 Purpose of Document Customer / Partner Responsibilities Overview of Recommended Solution Architecture Basic View Pass-through Authentication Flow Overview Transaction Flow Web Access Request Authenticate User Request and redirect Redirected Request with appropriate parameters Authentication Success = Requested information Authentication Failed = Redirect to failure url URL parameter data items Pre-defined Unisys Service Portal data items Transaction Examples Authentication transaction in test mode... 8 Passed validation and login would occur Authentication transaction with Destination URL Authentication transaction without Destination URL Project Process Guide Approval and Identification Project Plan Support Requirements User Acceptance Testing Release into Production Page 3 of 11
4 1 Purpose of Document The goal of this document is to describe the Unisys electronic interface for exchanging user authentication information This document is a guide for Unisys customers and business partners who need to create an electronic interface for the systemic passing of user authentication information to the Portal application. The technical information is generally based on current accepted industry standards wherever possible in order to standardize and minimize development effort for the business partners and Unisys. This document does not attempt to define or constrain the tools or infrastructure a customer or business partner can use in order to implement the solution. General guidelines and recommendations are provided based on our experience. 2 Customer / Partner Responsibilities The Customer / Partner owns the development, configuration, and support of the processes and applications that validates the end user, formulates the login url-based parameters, and redirects the end users browser to Unisys. It is important to understand on-going support implications. 3 Overview of Recommended Solution A Shared Key authentication system will be used that provides the ability for a Customer developed application to authenticate with the Service Portal. The Customer developed application would typically be in the form of a web application that would authenticate the end user and redirect the user s browser to the portal with appropriate parameters. The Unisys Portal will receive the parameters, authenticate that it is a valid request via the Shared Key and then systemically log the user into the portal and route the user to the desired URL. Users will be validated that they are members of the Customer within the Unisys Service Management system. The valid user list will be provided to Unisys on an agreed upon periodic basis as part of the standard data load. Page 4 of 11
5 All communications between the end user and the Oracle Portal will be over a SSL connection to ensure security. 4 Architecture Basic View The following diagram shows the normal method of providing a Service Portal Passthrough Authentication solution from our external Customers / Partners and Unisys. Page 5 of 11
6 5 Pass-through Authentication Flow 5.1 Overview This section describes the transaction flow for the Pass-through authentication process. 5.2 Transaction Flow The normal course of operations and data exchange would usually take the following form: (1) Web Access Request (2) Authenticated user request and redirect to Unisys Service Portal Customer s internal Web Site End User s Browser (3) Redirected request with Appropriate parameters (4) Authentication success = Requested information Unisys Service Portal (5) Authentication failed = Redirect to failure url Note: All communications will be across a SSL connection Page 6 of 11
7 5.2.1 Web Access Request The End User would navigate to the designated web site internal to the Customer / Partner infrastructure Authenticate User Request and redirect The customer s internal website would: Authenticate the end user Determine the end user s Service Portal User-ID Generate a redirect response to the End User s browser containing the required url variables Redirected Request with appropriate parameters The Unisys Service Portal would authenticate the incoming authentication request and: Validate the Company can perform pass-through authentication Validate the Shared key for this Company Validate the User-ID is a valid member for this Company Authentication Success = Requested information If the authentication process is successful, the Unisys Service Portal will reply with the requested information Authentication Failed = Redirect to failure url If the authentication process fails, the Unisys Service Portal will redirect the End User s browser to the defined failure URL. 5.3 URL parameter data items The URL parameters consist of the following data items. Their descriptions and usage are detailed here. Each data item is listed with its name, its data type, a description and whether it is a required item or not. Page 7 of 11 Name Type Req? Description Company Identifier STRING Y Identifies the Company making the request. Pre-defined value provided by Unisys Shared Key STRING Y It is used in conjunction with the Company Identifier to authenticate the request. UserID STRING Y This is the address of the end user. This value must match value passed in the User Feed to the Service Management System.
8 Requested URL STRING N This is the destination URL for the End User. If not provided, the Portal will respond with the user s pre-defined home page. Mode STRING N If set to test this will provide a diagnostic screen that can be used during the development effort. Note: The Shared Key, UserID, and Requested URL parameters shall be passed as a single BASE64 encoded parameter string. Note: All communications will be across a SSL connection 5.4 Pre-defined Unisys Service Portal data items The Service Portal maintains the following data items to facilitate this pass-through authentication process. Their descriptions and usage are detailed here. Each data item is listed with its name, its data type, a description and whether it is a required item or not. Name Type Req? Description Company Identifier STRING Y Identifies the Company allowed to make the request. Shared Key STRING Y Used in conjunction with the Company Identifier to authenticate the request. Authentication failed URL STRING Y This is the destination URL for the End User if the authentication process fails. 6 Transaction Examples This section shows sample scenarios with their associated transactions 6.1 Authentication transaction in test mode An example to access the Authentication transaction in test mode with the following parameters: Page 8 of 11 Company = Multisys Shared Key = multisys UserID = autologin.user@multisys.com Requested Url = pge/multisys_home_pge Resulting transaction to the service portal would be: 2tleT1tdWx0aXN5cyZ1c2VyaWQ9YXV0b2xvZ2luLnVzZXJAbXVsdGlzeXMuY29tJnJlcXVy
9 bd1odhrwczovl3bvcnrhbc51bmlzexmuy29tl3bvcnrhbc9wywdll3bvcnrhbc9fu0vsv kldrv9qr1ivz2xvymfsl211bhrpc3lzx2xvz2lux3bnzs9ndwx0axn5c19it01fx1bhrq == Note: The Shared Key, UserID, and Requested URL parameters are passed as a single BASE64 encoded parameter string. Note: All communications will be across a SSL connection The service portal will return a result similar to the following: Company parameter Company status Mode Encoded pauth parameter Decoded pauth parameter Userid parameter Userid status Group in OID status User in Company Skey parameter Security Key Valid Requested URL Multisys Company validated with id: 499 Test c2tlet1tdwx0axn5cyz1c2vyawq9yxv0b2xvz2lulnvzzxjabxvsdglzexmuy29tjnjlcxvy bd1odhrwczovl3bvcnrhbc51bmlzexmuy29tl3bvcnrhbc9wywdll3bvcnrhbc9fu0vsv kldrv9qr1ivz2xvymfsl211bhrpc3lzx2xvz2lux3bnzs9ndwx0axn5c19it01fx1bhrq== multisys autologin.user@multisys.com User validated with id: *** Group Multisys-usergroup found in OID *** True multisys True /multisys_login_pge/multisys_home_pge Passed validation and login would occur 6.2 Authentication transaction with Destination URL An example to access the Authentication transaction with the following parameters: Page 9 of 11 Company = Multisys Shared Key = multisys
10 UserID = autologin.user@multisys.com Requested Url (deep link to Outlook FAQs)= pge/multisys_home_pge/answers Resulting transaction to the service portal would be: 1tdWx0aXN5cyZ1c2VyaWQ9YXV0b2xvZ2luLnVzZXJAbXVsdGlzeXMuY29tJnJlcXV ybd1odhrwczovl3bvcnrhbc51bmlzexmuy29tl3bvcnrhbc9wywdll3bvcnrhbc9 FU0VSVklDRV9QR1IvZ2xvYmFsL211bHRpc3lzX2xvZ2luX3BnZS9NdWx0aXN5c19 IT01FX1BHRS9hbnN3ZXJz The service portal would validate the transaction, log the user in, and navigate to ys_home_pge/answers 6.3 Authentication transaction without Destination URL An example to access the Authentication transaction with the following parameters: Company = Multisys Shared Key = multisys UserID = autologin.user@multisys.com Resulting transaction to the service portal would be: 1tdWx0aXN5cyZ1c2VyaWQ9YXV0b2xvZ2luLnVzZXJAbXVsdGlzeXMuY29t The service portal would validate the transaction, log the user in, and navigate to the user s defined home page. 7 Project Process Guide 7.1 Approval and Identification Approval of the overall project is required and must be scheduled for a timeslot suitable to both parties. While waiting for design and development work to start it is considered imperative that a number of key people for the project be identified and informed of their involvement. These would normally include: Unisys Project Manager Customer Project Manager Customer Analysts / developers Page 10 of 11
11 Test and user personnel to be involved Support and Network people to be involved. This is obviously a far from exhaustive list but it should give a general idea. Early definition of the project managers responsible for driving the project is considered vital to the success of the project. 7.2 Project Plan The production of an accurate and agreed project plan detailing the various steps and their timelines involved in the implementation of the interface is a primary requirement. 7.3 Support Requirements Unisys and the partner early in the project process should agree to the specifics of the support methodology. There maybe some design implications that may require specific processes in place. An understanding of the features & functions of the Unisys and partner s support operations promotes an understanding early in the process. 7.4 User Acceptance Testing This is a vital process that needs to involve the dedicated testers and a representative sampling of the end users themselves. User acceptance testing (or UAT as it is more commonly known) should include the following tests as a minimum requirement: Normal transactions Invalid transactions Customer Project Manager Approval and signoff is required at the conclusion of UAT in order to allow the release to proceed on schedule. 7.5 Release into Production After a successful UAT, the Customer will have their own release procedures, which they need to document and then perform in order to implement a new interface. Page 11 of 11
IMS Health Secure Outlook Web Access Portal. Quick Setup
IMS Health Secure Outlook Web Access Portal Purpose: This service has been developed to allow access to the IMS Health email system for staff that can not access the email system through VPN which is preferred
More informationPolicy Based Encryption Z. Administrator Guide
Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationPolicy Based Encryption E. Administrator Guide
Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.
More informationMcAfee Email Gateway 7.x Encryption and IronPort Integration Guide
Sample deployment architecture For this guide, we have provided a deployment architecture example. This example includes an IronPort Email Gateway sending outbound email, and the McAfee Email Gateway Encryption
More informationCA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam
CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as
More informationDell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
More informationPolicy Based Encryption Essentials. Administrator Guide
Policy Based Encryption Essentials Administrator Guide Policy Based Encryption Essentials Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved.
More informationeservice Portal Overview
eservice Portal Overview About this Guide Purpose The eservice Portal Overview Guide provides a differences overview of Support Online to eservice Portal migration. The new eservice portal provides the
More informationReplacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved.
TECHNICAL REFERENCE Replacements Page 1 Table of Contents Table of Contents 1 Overview... 3 1.1 Replacements Features... 3 2 Roles and Responsibilities... 4 2.1 Sender (Receiving Carrier)... 4 2.2 Recipient
More informationUNISYS. Server Management 2.0. Software Release Announcement. imagine it. done. Server Management 2.0 and Higher. May 2008 8216 3445 000
UNISYS imagine it. done. Server Management 2.0 Software Release Announcement Server Management 2.0 and Higher May 2008 8216 3445 000 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product
More informationUnisys INFOIMAGE FOLDER ON WINDOWS NT. Connector for Microsoft Exchange. Getting Started Guide
INFOIMAGE FOLDER ON WINDOWS NT Connector for Microsoft Exchange Unisys Getting Started Guide Copyright 1999 Unisys Corporation. All rights reserved. Unisys is a registered trademark of Unisys Corporation.
More informationEmail Archiving User Guide Outlook Plugin. Manual version 3.1
Email Archiving User Guide Outlook Plugin Manual version 3.1 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith Road Hammersmith London W14 8TH United Kingdom Omniquad
More informationEnd-User Reference Guide
Guide Websense Advanced Email Encryption v7.6 Contents Receiving secure email....................................... 1 How do I open a secure message?............................ 1 How do I register for
More informationEnd-User Reference Guide
Guide Websense Advanced Email Encryption v7.6 Websense Advanced Email Encryption Copyright 1996-2011 Websense, Inc. All rights reserved. This document contains proprietary and confidential information
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationREQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series
More informationSecure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01
Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,
More informationService Description: Cisco Prime Home Hosted Services. This document describes the Cisco Prime Home Hosted Services.
Service Description: Cisco Prime Home Hosted Services This document describes the Cisco Prime Home Hosted Services. Related Documents: The following documents also posted at www.cisco.com/go/servicedescriptions/
More informationConfiguring Single Sign-on from the VMware Identity Manager Service to ServiceNow
Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to ServiceNow Table of Contents
More informationHow to Configure Guest Management on the DWC-1000
Configuration Guide How to Configure Guest Management on the DWC-1000 Overview This guide describes how to configure and customize a billing profile and generate temporary user account on the D-Link DWC-1000
More informationHP Software as a Service
HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty
More informationSynology SSO Server. Development Guide
Synology SSO Server Development Guide THIS DOCUMENT CONTAINS PROPRIETARY TECHNICAL INFORMATION WHICH IS THE PROPERTY OF SYNOLOGY INCORPORATED AND SHALL NOT BE REPRODUCED, COPIED, OR USED AS THE BASIS FOR
More informationSample Configuration: Cisco UCS, LDAP and Active Directory
First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
More informationUsing Voltage SecureMail
Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.
More informationDigitalPersona Pro Enterprise
DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and
More informationORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01
ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 FEBRUARY 2010 COPYRIGHT Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved. Part
More informationAPP SOFTWARE LICENSE AGREEMENT
APP SOFTWARE LICENSE AGREEMENT This App Software License Agreement (the Agreement ) is made by and between AvePoint, Inc., a Delaware company, with offices at Harborside Financial Center, Plaza 10, 3 Second
More informationMigrate from Exchange Public Folders to Business Productivity Online Standard Suite
Migrate from Exchange Public Folders to Business Productivity Online Standard Suite White Paper Microsoft Corporation Published: July 2009 Information in this document, including URL and other Internet
More informationSecurity FAQs (Frequently Asked Questions) for Xerox Remote Print Services
Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation
More informationBlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
More informationPaynow 3rd Party Shopping Cart or Link Integration Guide
Paynow 3rd Party Shopping Cart or Link Integration Guide Version 1.0.5 15 August 2014 A guide outlining merchant integration into Paynow for externally hosted shopping carts or applications. For details
More informationCA Service Desk Manager - Mobile Enabler 2.0
This Document is aimed at providing information about the (CA SDM) Mobile Enabler and mobile capabilities that is typically not available in the product documentation. This is a living document and will
More informationHP Priority Services. Priority Access
HP Priority Services Online Case Management tool Web-based submission and tracking solutions. The HP Support Case Manager (SCM) provides 24/7 access and enables users to submit and manage support cases
More informationEverbridge Suite Winter 2015 Release Notes
Everbridge Suite Winter 2015 Release Notes Version 4.0.0 February 4, 2015 February 4, 2015 Printed in the USA. Copyright 2015. Everbridge, Inc. All rights are reserved. Everbridge, Aware, SmartGIS, Act-SaaS,
More informationOmniquad Exchange Archiving
Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith
More informationunisys Unisys Stealth(cloud) for Amazon Web Services Deployment Guide Release 1.0 January 2016 8205 5658-001
unisys Unisys Stealth(cloud) for Amazon Web Services Deployment Guide Release 1.0 January 2016 8205 5658-001 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product or related information
More informationEnd-User Reference Guide
Guide Websense Advanced Email Encryption v7.x Websense Advanced Email Encryption Copyright 1996-2014 Websense, Inc. All rights reserved. This document contains proprietary and confidential information
More informationHow To Use Libap With A Libap Server With A Mft Command Center And Internet Server
MFT Command Center/Internet Server LDAP Integration Guide Ver sio n 7.1.1 September 7, 2011 Documentation Information MFT LDAP Integration Guide Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES
More informationWeb Portal Installation Guide 5.0
Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
More informationBridging People and Process. Bridging People and Process. Bridging People and Process. Bridging People and Process
USER MANUAL DATAMOTION SECUREMAIL SERVER Bridging People and Process APPLICATION VERSION 1.1 Bridging People and Process Bridging People and Process Bridging People and Process Published By: DataMotion,
More informationFDIC Secure Email Procedures for External Users April 23, 2010
FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving
More informationLong User ID and Password Support In JD Edwards EnterpriseOne
Long User ID and Password Support In JD Edwards EnterpriseOne An Oracle JD Edwards EnterpriseOne Red Paper November 2007 PURPOSE STATEMENT This document outlines the steps that existing JD Edwards EnterpriseOne
More informationPolicy Based Encryption Gateway. Administration Guide
Policy Based Encryption Gateway Administration Guide Policy Based Encryption Gateway Admin Guide 1 Contents Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control...
More informationClick the link that best relates to your question.
Click the link that best relates to your question. I M HAVING TROUBLE FINDING THE RA I NEED. HOW DO I NAVIGATE THROUGH THE APPLICATION? I M DONE USING THE APPLICATION. HOW DO I EXIT? HOW LONG DO ELECTRONIC
More informationAccountView. Single Sign-On Guide
AccountView Single Sign-On Guide 2014 Morningstar. All Rights Reserved. AccountView Version: 1.4 Document Version: 2 Document Issue Date: March 09, 2013 Technical Support: (866) 856-4951 Telephone: (781)
More informationBlackShield ID PRO. Steel Belted RADIUS 6.x. Implementation Guide. Copyright 2008 to present CRYPTOCard Corporation. All Rights Reserved
BlackShield ID PRO Steel Belted RADIUS 6.x Implementation Guide Copyright 2008 to present CRYPTOCard Corporation. All Rights Reserved License and Warranty Information CRYPTOCard and its affiliates retain
More informationCA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationStrong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationChapter 1: How to Configure Certificate-Based Authentication
Chapter 1: How to Configure Certificate-Based Authentication Introduction Product: CA ControlMinder Release: All OS: All This scenario describes how a system or a CA ControlMinder administrator configures
More informationPeopleSoft Enterprise Campus Solutions 9.0 Enrollment Web Services
PeopleSoft Enterprise Campus Solutions 9.0 Enrollment Web Services DEVELOPER'S GUIDE July 2011 ORACLE PROPRIETARY AND C ONFIDENTIAL P AGE 1 OF 26 Enrollment Web Services Developer s Guide for PeopleSoft
More informationDeploying Remote Desktop IP Virtualization Step-by-Step Guide
Deploying Remote Desktop IP Virtualization Step-by-Step Guide Microsoft Corporation Updated: April 2010 Published: July 2009 Abstract Remote Desktop IP Virtualization provides administrators the ability
More informationRemote Access Platform. Architecture and Security Overview
Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards
More informationNEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
More informationUTM Quick Installation Guide
www.allo.com Version 2.0 1 Copy Right Copyright 2014 Allo. All rights reserved. No part of this publication may be copied, distributed, transmitted, transcribed, stored in a retrieval system, or translated
More informationEView/400i Management Pack for Systems Center Operations Manager (SCOM)
EView/400i Management Pack for Systems Center Operations Manager (SCOM) Concepts Guide Version 6.3 November 2012 Legal Notices Warranty EView Technology makes no warranty of any kind with regard to this
More informationClient Administrator Quick Reference Guide
Client Administrator Quick Reference Guide Thank you for using ADP's ipaystatements to view your payroll information. Use this Quick Reference Guide to learn how to view your pay statement, understand
More informationCourse Syllabus. 2553A: Administering Microsoft SharePoint Portal Server 2003. Key Data. Audience. At Course Completion.
Key Data Course #: 2553A Number of Days: 3 Format: Instructor-Led This course syllabus should be used to determine whether the course is appropriate for the students, based on their current skills and
More informationMerchant Integration Guide
Merchant Integration Guide Card Not Present Transactions January 2012 Authorize.Net Developer Support http://developer.authorize.net Authorize.Net LLC 082007 Ver.2.0 Authorize.Net LLC ( Authorize.Net )
More informationLepide Exchange Recovery Manager
Configuration Guide Lepide Exchange Recovery Manager Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights
More informationChambers Bank Business Internet Banking Agreement
Chambers Bank Business Internet Banking Agreement 1. INTRODUCTION. Chambers Bank Business Online Banking is a banking and information service that allows its Business Banking clients, via the Internet,
More informationDell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
More informationDEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12
DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration
More informationRedBlack CyBake Online Customer Service Desk
RedBlack CyBake Online Customer Service Desk Publication Date: June 2014 Copyright Copyright 2014 RedBlack Software Ltd. All rights reserved. Complying with all applicable copyright laws is the responsibility
More informationCA VPN Client. User Guide for Windows 1.0.2.2
CA VPN Client User Guide for Windows 1.0.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your
More informationORACLE CRM ON DEMAND DEVELOPMENT ADDENDUM TO THE ORACLE PARTNERNETWORK AGREEMENT
ORACLE CRM ON DEMAND DEVELOPMENT ADDENDUM TO THE ORACLE PARTNERNETWORK AGREEMENT This Oracle CRM On Demand Development Addendum (the " CRM On Demand Addendum ") is between you ( Developer ) and the Oracle
More informationCA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
More informationJune, 2015 Oracle s Siebel CRM Statement of Direction Client Platform Support
June, 2015 Oracle s Siebel CRM Statement of Direction Client Platform Support Oracle s Siebel CRM Statement of Direction IP2016 Client Platform Support Disclaimer This document in any form, software or
More informationV-Requester Add-in for Microsoft Outlook
V-Requester Add-in for Microsoft Outlook User Guide This document will guide in configuring and using the V-Requester for Microsoft Outlook. Copyright 2014 V-Link http://www.vlink.is Page 1 Contents Introduction...
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
More informationProduct Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationCA Cloud Service Delivery Platform
CA Cloud Service Delivery Platform Customer Onboarding Version 01.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
More informationSiebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006
Siebel CRM On Demand Single Sign-On An Oracle White Paper December 2006 Siebel CRM On Demand Single Sign-On Introduction... 3 Single Sign-On with Siebel CRM On Demand... 4 Customer Requirements... 4 SSO
More informationCA Nimsoft Monitor. Probe Guide for URL Endpoint Response Monitoring. url_response v4.1 series
CA Nimsoft Monitor Probe Guide for URL Endpoint Response Monitoring url_response v4.1 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject
More informationConfiguring Single Sign-on from the VMware Identity Manager Service to Dropbox
Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox VMware Identity Manager SEPTEMBER 2015 V1 Configuring Single Sign-On from VMware Identity Manager to Dropbox Table of Contents
More informationTwo-Factor Authentication
Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013 The information contained
More informationHYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2
HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and
More informationConfiguring Single Sign-on from the VMware Identity Manager Service to WebEx
Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents
More informationDeploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide
c623242f-20f0-40fe-b5c1-8412a094fdc7 Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide Microsoft Corporation Published: June 2009 Updated: April 2010 Abstract
More informationCA Cloud Service Delivery Platform
CA Cloud Service Delivery Platform Service Level Manager Version 01.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
More informationCitrix Receiver. Configuration and User Guide. For Macintosh Users
Citrix Receiver Configuration and User Guide For Macintosh Users rev: 25.03.2015 https://access.sap.com/ TABLE OF CONTENTS Introduction... 3 Installation... 3 Accessing our portal... 3 Accessing from SAP
More informationMerchant Integration Guide
Merchant Integration Guide Card Not Present Transactions Authorize.Net Customer Support support@authorize.net Authorize.Net LLC 071708 Authorize.Net LLC ( Authorize.Net ) has made efforts to ensure the
More informationSecureAnywhereTM Web Security Service
SecureAnywhereTM Web Security Service This document provides a general overview of the Webroot SecureAnywhere Web Security Service Partner Management Portal. Webroot Partners such as Managed Service Providers
More informationOracle Procurement. Punchout and Transparent Punchout Guide for Oracle iprocurement and Oracle Exchange Release 11i. Part No.
Oracle Procurement Punchout and Transparent Punchout Guide for Oracle iprocurement and Oracle Exchange Release 11i Part No. A92190-03 April 2003 Oracle Procurement Punchout and Transparent Punchout Guide
More informationUser Guide for Avaya Scopia Add-in for Microsoft Outlook for Aura Collaboration Suite
User Guide for Avaya Scopia Add-in for Microsoft Outlook for Aura Collaboration Suite Version 8.3 For Solution 8.3 March 2014 2000-2014 Avaya Inc. All intellectual property rights in this publication are
More informationUsage Analysis Tools in SharePoint Products and Technologies
Usage Analysis Tools in SharePoint Products and Technologies Date published: June 9, 2004 Summary: Usage analysis allows you to track how websites on your server are being used. The Internet Information
More informationBlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2.
BlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2 Release Notes Published: 2010-06-04 SWD-1155103-0604111944-001 Contents
More informationMicrosoft Office 365 with ADFS
Microsoft Office 365 with ADFS Implementation Guide (Version 5.4) Copyright 2012 Deepnet Security Limited Copyright 2012, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication,
More informationPublisher User Manual
Publisher User Manual Getting Started A manual on how to use the TradeDoubler performance based marketing interface CONTENT 1. Introduction... 2 2. Apply to Program... 2 Search Program... 2 Join Program...
More informationwww.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
More informationProduct Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software
Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationTransglobal Secure Collaboration Program Secure E-mail v.1 Gateway Design Principles
Transglobal Secure Collaboration Program Secure E-mail v.1 Gateway Design Principles Prepared by: CP Secure E-mail v.1 Project Team Version: 2.0.2 Date: 16 July 2012 Page i Copyright 2012 Transglobal Secure
More informationStrong Authentication for Juniper Networks
Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright
More informationConfiguring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
More information3rd Party Messaging Guidelines. Version 1.0
3rd Party Messaging Guidelines Version 1.0 March 2015 This documentation is confidential and proprietary information of T-Mobile USA, Inc. It is disclosed pursuant to a non-disclosure agreement between
More informationUnderstanding Slow Start
Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom
More informationProtecting Microsoft Internet Information Services Web Servers with ISA Server 2004
Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents
More informationMassTransit Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management
MassTransit Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management A Technical Best Practices White Paper About This Document This whitepaper explores the challenges
More informationPortal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
More information