Infrastructure Managed Services Portal Pass-through authentication Implementation Guide

Size: px
Start display at page:

Download "Infrastructure Managed Services Portal Pass-through authentication Implementation Guide"

Transcription

1 Integration Technologies Infrastructure Managed Services Portal Pass-through authentication Implementation Guide Version 2.1

2 THIS DOCUMENT CONTAINS CONFIDENTIAL INFORMATION OF THE UNISYS CORPORATION ( Unisys ). Recipient agrees, in consideration for receipt of this document, to use it solely for the limited purpose for which it was made available and not to transmit it and/or the information therein contained, in whole or in part, or to suffer such action by others, for any purpose, except with the written permission, first obtained, of Unisys. Recipient further agrees to surrender this document and all copies, or certify destruction of same to Unisys when the reason for its receipt has terminated. NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product or related information described herein is only furnished pursuant and subject to the terms and conditions of a duly executed agreement to purchase or lease equipment or to license software. The only warranties made by Unisys, if any, with respect to the products described in this document are set forth in such agreement. Unisys cannot accept any financial or other responsibility that may be the result of your use of the information in this document or software material, including direct, special, or consequential damages. You should be very careful to ensure that the use of this information and/or software material complies with the laws, rules, and regulations of the jurisdictions with respect to which it is used. The information contained herein is subject to change without notice. Revisions may be issued to advise of such changes and/or additions. Unisys Copyright 2004, 2007 Unisys Corporation All rights reserved. UNISYS PROPRIETARY Revision History Version Date Author(s) Comments 1.0 8/16/2005 JM Initial Document 2.0 6/1/2007 JM Updated URL definitions /6/2007 JM Added SSL requirement

3 Table of Contents 1 Purpose of Document Customer / Partner Responsibilities Overview of Recommended Solution Architecture Basic View Pass-through Authentication Flow Overview Transaction Flow Web Access Request Authenticate User Request and redirect Redirected Request with appropriate parameters Authentication Success = Requested information Authentication Failed = Redirect to failure url URL parameter data items Pre-defined Unisys Service Portal data items Transaction Examples Authentication transaction in test mode... 8 Passed validation and login would occur Authentication transaction with Destination URL Authentication transaction without Destination URL Project Process Guide Approval and Identification Project Plan Support Requirements User Acceptance Testing Release into Production Page 3 of 11

4 1 Purpose of Document The goal of this document is to describe the Unisys electronic interface for exchanging user authentication information This document is a guide for Unisys customers and business partners who need to create an electronic interface for the systemic passing of user authentication information to the Portal application. The technical information is generally based on current accepted industry standards wherever possible in order to standardize and minimize development effort for the business partners and Unisys. This document does not attempt to define or constrain the tools or infrastructure a customer or business partner can use in order to implement the solution. General guidelines and recommendations are provided based on our experience. 2 Customer / Partner Responsibilities The Customer / Partner owns the development, configuration, and support of the processes and applications that validates the end user, formulates the login url-based parameters, and redirects the end users browser to Unisys. It is important to understand on-going support implications. 3 Overview of Recommended Solution A Shared Key authentication system will be used that provides the ability for a Customer developed application to authenticate with the Service Portal. The Customer developed application would typically be in the form of a web application that would authenticate the end user and redirect the user s browser to the portal with appropriate parameters. The Unisys Portal will receive the parameters, authenticate that it is a valid request via the Shared Key and then systemically log the user into the portal and route the user to the desired URL. Users will be validated that they are members of the Customer within the Unisys Service Management system. The valid user list will be provided to Unisys on an agreed upon periodic basis as part of the standard data load. Page 4 of 11

5 All communications between the end user and the Oracle Portal will be over a SSL connection to ensure security. 4 Architecture Basic View The following diagram shows the normal method of providing a Service Portal Passthrough Authentication solution from our external Customers / Partners and Unisys. Page 5 of 11

6 5 Pass-through Authentication Flow 5.1 Overview This section describes the transaction flow for the Pass-through authentication process. 5.2 Transaction Flow The normal course of operations and data exchange would usually take the following form: (1) Web Access Request (2) Authenticated user request and redirect to Unisys Service Portal Customer s internal Web Site End User s Browser (3) Redirected request with Appropriate parameters (4) Authentication success = Requested information Unisys Service Portal (5) Authentication failed = Redirect to failure url Note: All communications will be across a SSL connection Page 6 of 11

7 5.2.1 Web Access Request The End User would navigate to the designated web site internal to the Customer / Partner infrastructure Authenticate User Request and redirect The customer s internal website would: Authenticate the end user Determine the end user s Service Portal User-ID Generate a redirect response to the End User s browser containing the required url variables Redirected Request with appropriate parameters The Unisys Service Portal would authenticate the incoming authentication request and: Validate the Company can perform pass-through authentication Validate the Shared key for this Company Validate the User-ID is a valid member for this Company Authentication Success = Requested information If the authentication process is successful, the Unisys Service Portal will reply with the requested information Authentication Failed = Redirect to failure url If the authentication process fails, the Unisys Service Portal will redirect the End User s browser to the defined failure URL. 5.3 URL parameter data items The URL parameters consist of the following data items. Their descriptions and usage are detailed here. Each data item is listed with its name, its data type, a description and whether it is a required item or not. Page 7 of 11 Name Type Req? Description Company Identifier STRING Y Identifies the Company making the request. Pre-defined value provided by Unisys Shared Key STRING Y It is used in conjunction with the Company Identifier to authenticate the request. UserID STRING Y This is the address of the end user. This value must match value passed in the User Feed to the Service Management System.

8 Requested URL STRING N This is the destination URL for the End User. If not provided, the Portal will respond with the user s pre-defined home page. Mode STRING N If set to test this will provide a diagnostic screen that can be used during the development effort. Note: The Shared Key, UserID, and Requested URL parameters shall be passed as a single BASE64 encoded parameter string. Note: All communications will be across a SSL connection 5.4 Pre-defined Unisys Service Portal data items The Service Portal maintains the following data items to facilitate this pass-through authentication process. Their descriptions and usage are detailed here. Each data item is listed with its name, its data type, a description and whether it is a required item or not. Name Type Req? Description Company Identifier STRING Y Identifies the Company allowed to make the request. Shared Key STRING Y Used in conjunction with the Company Identifier to authenticate the request. Authentication failed URL STRING Y This is the destination URL for the End User if the authentication process fails. 6 Transaction Examples This section shows sample scenarios with their associated transactions 6.1 Authentication transaction in test mode An example to access the Authentication transaction in test mode with the following parameters: Page 8 of 11 Company = Multisys Shared Key = multisys UserID = autologin.user@multisys.com Requested Url = pge/multisys_home_pge Resulting transaction to the service portal would be: 2tleT1tdWx0aXN5cyZ1c2VyaWQ9YXV0b2xvZ2luLnVzZXJAbXVsdGlzeXMuY29tJnJlcXVy

9 bd1odhrwczovl3bvcnrhbc51bmlzexmuy29tl3bvcnrhbc9wywdll3bvcnrhbc9fu0vsv kldrv9qr1ivz2xvymfsl211bhrpc3lzx2xvz2lux3bnzs9ndwx0axn5c19it01fx1bhrq == Note: The Shared Key, UserID, and Requested URL parameters are passed as a single BASE64 encoded parameter string. Note: All communications will be across a SSL connection The service portal will return a result similar to the following: Company parameter Company status Mode Encoded pauth parameter Decoded pauth parameter Userid parameter Userid status Group in OID status User in Company Skey parameter Security Key Valid Requested URL Multisys Company validated with id: 499 Test c2tlet1tdwx0axn5cyz1c2vyawq9yxv0b2xvz2lulnvzzxjabxvsdglzexmuy29tjnjlcxvy bd1odhrwczovl3bvcnrhbc51bmlzexmuy29tl3bvcnrhbc9wywdll3bvcnrhbc9fu0vsv kldrv9qr1ivz2xvymfsl211bhrpc3lzx2xvz2lux3bnzs9ndwx0axn5c19it01fx1bhrq== multisys autologin.user@multisys.com User validated with id: *** Group Multisys-usergroup found in OID *** True multisys True /multisys_login_pge/multisys_home_pge Passed validation and login would occur 6.2 Authentication transaction with Destination URL An example to access the Authentication transaction with the following parameters: Page 9 of 11 Company = Multisys Shared Key = multisys

10 UserID = autologin.user@multisys.com Requested Url (deep link to Outlook FAQs)= pge/multisys_home_pge/answers Resulting transaction to the service portal would be: 1tdWx0aXN5cyZ1c2VyaWQ9YXV0b2xvZ2luLnVzZXJAbXVsdGlzeXMuY29tJnJlcXV ybd1odhrwczovl3bvcnrhbc51bmlzexmuy29tl3bvcnrhbc9wywdll3bvcnrhbc9 FU0VSVklDRV9QR1IvZ2xvYmFsL211bHRpc3lzX2xvZ2luX3BnZS9NdWx0aXN5c19 IT01FX1BHRS9hbnN3ZXJz The service portal would validate the transaction, log the user in, and navigate to ys_home_pge/answers 6.3 Authentication transaction without Destination URL An example to access the Authentication transaction with the following parameters: Company = Multisys Shared Key = multisys UserID = autologin.user@multisys.com Resulting transaction to the service portal would be: 1tdWx0aXN5cyZ1c2VyaWQ9YXV0b2xvZ2luLnVzZXJAbXVsdGlzeXMuY29t The service portal would validate the transaction, log the user in, and navigate to the user s defined home page. 7 Project Process Guide 7.1 Approval and Identification Approval of the overall project is required and must be scheduled for a timeslot suitable to both parties. While waiting for design and development work to start it is considered imperative that a number of key people for the project be identified and informed of their involvement. These would normally include: Unisys Project Manager Customer Project Manager Customer Analysts / developers Page 10 of 11

11 Test and user personnel to be involved Support and Network people to be involved. This is obviously a far from exhaustive list but it should give a general idea. Early definition of the project managers responsible for driving the project is considered vital to the success of the project. 7.2 Project Plan The production of an accurate and agreed project plan detailing the various steps and their timelines involved in the implementation of the interface is a primary requirement. 7.3 Support Requirements Unisys and the partner early in the project process should agree to the specifics of the support methodology. There maybe some design implications that may require specific processes in place. An understanding of the features & functions of the Unisys and partner s support operations promotes an understanding early in the process. 7.4 User Acceptance Testing This is a vital process that needs to involve the dedicated testers and a representative sampling of the end users themselves. User acceptance testing (or UAT as it is more commonly known) should include the following tests as a minimum requirement: Normal transactions Invalid transactions Customer Project Manager Approval and signoff is required at the conclusion of UAT in order to allow the release to proceed on schedule. 7.5 Release into Production After a successful UAT, the Customer will have their own release procedures, which they need to document and then perform in order to implement a new interface. Page 11 of 11

IMS Health Secure Outlook Web Access Portal. Quick Setup

IMS Health Secure Outlook Web Access Portal. Quick Setup IMS Health Secure Outlook Web Access Portal Purpose: This service has been developed to allow access to the IMS Health email system for staff that can not access the email system through VPN which is preferred

More information

Policy Based Encryption Z. Administrator Guide

Policy Based Encryption Z. Administrator Guide Policy Based Encryption Z Administrator Guide Policy Based Encryption Z Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

McAfee Email Gateway 7.x Encryption and IronPort Integration Guide

McAfee Email Gateway 7.x Encryption and IronPort Integration Guide Sample deployment architecture For this guide, we have provided a deployment architecture example. This example includes an IronPort Email Gateway sending outbound email, and the McAfee Email Gateway Encryption

More information

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam

CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam CA Single Sign-On r12.x (CA SiteMinder) Implementation Proven Professional Exam (CAT-140) Version 1.4 - PROPRIETARY AND CONFIDENTIAL INFORMATION - These educational materials (hereinafter referred to as

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

Policy Based Encryption Essentials. Administrator Guide

Policy Based Encryption Essentials. Administrator Guide Policy Based Encryption Essentials Administrator Guide Policy Based Encryption Essentials Administrator Guide Documentation version: 1.0 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved.

More information

eservice Portal Overview

eservice Portal Overview eservice Portal Overview About this Guide Purpose The eservice Portal Overview Guide provides a differences overview of Support Online to eservice Portal migration. The new eservice portal provides the

More information

Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved.

Replacements TECHNICAL REFERENCE. DTCCSOLUTIONS Dec 2009. Copyright 2009 Depository Trust Clearing Corporation. All Rights Reserved. TECHNICAL REFERENCE Replacements Page 1 Table of Contents Table of Contents 1 Overview... 3 1.1 Replacements Features... 3 2 Roles and Responsibilities... 4 2.1 Sender (Receiving Carrier)... 4 2.2 Recipient

More information

UNISYS. Server Management 2.0. Software Release Announcement. imagine it. done. Server Management 2.0 and Higher. May 2008 8216 3445 000

UNISYS. Server Management 2.0. Software Release Announcement. imagine it. done. Server Management 2.0 and Higher. May 2008 8216 3445 000 UNISYS imagine it. done. Server Management 2.0 Software Release Announcement Server Management 2.0 and Higher May 2008 8216 3445 000 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product

More information

Unisys INFOIMAGE FOLDER ON WINDOWS NT. Connector for Microsoft Exchange. Getting Started Guide

Unisys INFOIMAGE FOLDER ON WINDOWS NT. Connector for Microsoft Exchange. Getting Started Guide INFOIMAGE FOLDER ON WINDOWS NT Connector for Microsoft Exchange Unisys Getting Started Guide Copyright 1999 Unisys Corporation. All rights reserved. Unisys is a registered trademark of Unisys Corporation.

More information

Email Archiving User Guide Outlook Plugin. Manual version 3.1

Email Archiving User Guide Outlook Plugin. Manual version 3.1 Email Archiving User Guide Outlook Plugin Manual version 3.1 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith Road Hammersmith London W14 8TH United Kingdom Omniquad

More information

End-User Reference Guide

End-User Reference Guide Guide Websense Advanced Email Encryption v7.6 Contents Receiving secure email....................................... 1 How do I open a secure message?............................ 1 How do I register for

More information

End-User Reference Guide

End-User Reference Guide Guide Websense Advanced Email Encryption v7.6 Websense Advanced Email Encryption Copyright 1996-2011 Websense, Inc. All rights reserved. This document contains proprietary and confidential information

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01

Secure Web Service - Hybrid. Policy Server Setup. Release 9.2.5 Manual Version 1.01 Secure Web Service - Hybrid Policy Server Setup Release 9.2.5 Manual Version 1.01 M86 SECURITY WEB SERVICE HYBRID QUICK START USER GUIDE 2010 M86 Security All rights reserved. 828 W. Taft Ave., Orange,

More information

Service Description: Cisco Prime Home Hosted Services. This document describes the Cisco Prime Home Hosted Services.

Service Description: Cisco Prime Home Hosted Services. This document describes the Cisco Prime Home Hosted Services. Service Description: Cisco Prime Home Hosted Services This document describes the Cisco Prime Home Hosted Services. Related Documents: The following documents also posted at www.cisco.com/go/servicedescriptions/

More information

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow

Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow Configuring Single Sign-on from the VMware Identity Manager Service to ServiceNow VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to ServiceNow Table of Contents

More information

How to Configure Guest Management on the DWC-1000

How to Configure Guest Management on the DWC-1000 Configuration Guide How to Configure Guest Management on the DWC-1000 Overview This guide describes how to configure and customize a billing profile and generate temporary user account on the D-Link DWC-1000

More information

HP Software as a Service

HP Software as a Service HP Software as a Service Software Version: 6.1 Federated SSO Document Release Date: August 2013 Legal Notices Warranty The only warranties for HP products and services are set forth in the express warranty

More information

Synology SSO Server. Development Guide

Synology SSO Server. Development Guide Synology SSO Server Development Guide THIS DOCUMENT CONTAINS PROPRIETARY TECHNICAL INFORMATION WHICH IS THE PROPERTY OF SYNOLOGY INCORPORATED AND SHALL NOT BE REPRODUCED, COPIED, OR USED AS THE BASIS FOR

More information

Sample Configuration: Cisco UCS, LDAP and Active Directory

Sample Configuration: Cisco UCS, LDAP and Active Directory First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Using Voltage SecureMail

Using Voltage SecureMail Using Voltage SecureMail Using Voltage SecureMail Desktop Based on the breakthrough Identity-Based Encryption technology, Voltage SecureMail makes sending a secure email as easy as sending it without encryption.

More information

DigitalPersona Pro Enterprise

DigitalPersona Pro Enterprise DigitalPersona Pro Enterprise Version 5.3 Frequently Asked Questions 2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware and

More information

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01

ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 ORACLE USER PRODUCTIVITY KIT USAGE TRACKING ADMINISTRATION & REPORTING RELEASE 3.6 PART NO. E17087-01 FEBRUARY 2010 COPYRIGHT Copyright 1998, 2009, Oracle and/or its affiliates. All rights reserved. Part

More information

APP SOFTWARE LICENSE AGREEMENT

APP SOFTWARE LICENSE AGREEMENT APP SOFTWARE LICENSE AGREEMENT This App Software License Agreement (the Agreement ) is made by and between AvePoint, Inc., a Delaware company, with offices at Harborside Financial Center, Plaza 10, 3 Second

More information

Migrate from Exchange Public Folders to Business Productivity Online Standard Suite

Migrate from Exchange Public Folders to Business Productivity Online Standard Suite Migrate from Exchange Public Folders to Business Productivity Online Standard Suite White Paper Microsoft Corporation Published: July 2009 Information in this document, including URL and other Internet

More information

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

Paynow 3rd Party Shopping Cart or Link Integration Guide

Paynow 3rd Party Shopping Cart or Link Integration Guide Paynow 3rd Party Shopping Cart or Link Integration Guide Version 1.0.5 15 August 2014 A guide outlining merchant integration into Paynow for externally hosted shopping carts or applications. For details

More information

CA Service Desk Manager - Mobile Enabler 2.0

CA Service Desk Manager - Mobile Enabler 2.0 This Document is aimed at providing information about the (CA SDM) Mobile Enabler and mobile capabilities that is typically not available in the product documentation. This is a living document and will

More information

HP Priority Services. Priority Access

HP Priority Services. Priority Access HP Priority Services Online Case Management tool Web-based submission and tracking solutions. The HP Support Case Manager (SCM) provides 24/7 access and enables users to submit and manage support cases

More information

Everbridge Suite Winter 2015 Release Notes

Everbridge Suite Winter 2015 Release Notes Everbridge Suite Winter 2015 Release Notes Version 4.0.0 February 4, 2015 February 4, 2015 Printed in the USA. Copyright 2015. Everbridge, Inc. All rights are reserved. Everbridge, Aware, SmartGIS, Act-SaaS,

More information

Omniquad Exchange Archiving

Omniquad Exchange Archiving Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith

More information

unisys Unisys Stealth(cloud) for Amazon Web Services Deployment Guide Release 1.0 January 2016 8205 5658-001

unisys Unisys Stealth(cloud) for Amazon Web Services Deployment Guide Release 1.0 January 2016 8205 5658-001 unisys Unisys Stealth(cloud) for Amazon Web Services Deployment Guide Release 1.0 January 2016 8205 5658-001 NO WARRANTIES OF ANY NATURE ARE EXTENDED BY THIS DOCUMENT. Any product or related information

More information

End-User Reference Guide

End-User Reference Guide Guide Websense Advanced Email Encryption v7.x Websense Advanced Email Encryption Copyright 1996-2014 Websense, Inc. All rights reserved. This document contains proprietary and confidential information

More information

How To Use Libap With A Libap Server With A Mft Command Center And Internet Server

How To Use Libap With A Libap Server With A Mft Command Center And Internet Server MFT Command Center/Internet Server LDAP Integration Guide Ver sio n 7.1.1 September 7, 2011 Documentation Information MFT LDAP Integration Guide Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES

More information

Web Portal Installation Guide 5.0

Web Portal Installation Guide 5.0 Web Portal Installation Guide 5.0 2011 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Bridging People and Process. Bridging People and Process. Bridging People and Process. Bridging People and Process

Bridging People and Process. Bridging People and Process. Bridging People and Process. Bridging People and Process USER MANUAL DATAMOTION SECUREMAIL SERVER Bridging People and Process APPLICATION VERSION 1.1 Bridging People and Process Bridging People and Process Bridging People and Process Published By: DataMotion,

More information

FDIC Secure Email Procedures for External Users April 23, 2010

FDIC Secure Email Procedures for External Users April 23, 2010 FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving

More information

Long User ID and Password Support In JD Edwards EnterpriseOne

Long User ID and Password Support In JD Edwards EnterpriseOne Long User ID and Password Support In JD Edwards EnterpriseOne An Oracle JD Edwards EnterpriseOne Red Paper November 2007 PURPOSE STATEMENT This document outlines the steps that existing JD Edwards EnterpriseOne

More information

Policy Based Encryption Gateway. Administration Guide

Policy Based Encryption Gateway. Administration Guide Policy Based Encryption Gateway Administration Guide Policy Based Encryption Gateway Admin Guide 1 Contents Description of Policy Based Encryption... 2 Policy Based Encryption and Email Content Control...

More information

Click the link that best relates to your question.

Click the link that best relates to your question. Click the link that best relates to your question. I M HAVING TROUBLE FINDING THE RA I NEED. HOW DO I NAVIGATE THROUGH THE APPLICATION? I M DONE USING THE APPLICATION. HOW DO I EXIT? HOW LONG DO ELECTRONIC

More information

AccountView. Single Sign-On Guide

AccountView. Single Sign-On Guide AccountView Single Sign-On Guide 2014 Morningstar. All Rights Reserved. AccountView Version: 1.4 Document Version: 2 Document Issue Date: March 09, 2013 Technical Support: (866) 856-4951 Telephone: (781)

More information

BlackShield ID PRO. Steel Belted RADIUS 6.x. Implementation Guide. Copyright 2008 to present CRYPTOCard Corporation. All Rights Reserved

BlackShield ID PRO. Steel Belted RADIUS 6.x. Implementation Guide. Copyright 2008 to present CRYPTOCard Corporation. All Rights Reserved BlackShield ID PRO Steel Belted RADIUS 6.x Implementation Guide Copyright 2008 to present CRYPTOCard Corporation. All Rights Reserved License and Warranty Information CRYPTOCard and its affiliates retain

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Strong Authentication for Microsoft SharePoint

Strong Authentication for Microsoft SharePoint Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Chapter 1: How to Configure Certificate-Based Authentication

Chapter 1: How to Configure Certificate-Based Authentication Chapter 1: How to Configure Certificate-Based Authentication Introduction Product: CA ControlMinder Release: All OS: All This scenario describes how a system or a CA ControlMinder administrator configures

More information

PeopleSoft Enterprise Campus Solutions 9.0 Enrollment Web Services

PeopleSoft Enterprise Campus Solutions 9.0 Enrollment Web Services PeopleSoft Enterprise Campus Solutions 9.0 Enrollment Web Services DEVELOPER'S GUIDE July 2011 ORACLE PROPRIETARY AND C ONFIDENTIAL P AGE 1 OF 26 Enrollment Web Services Developer s Guide for PeopleSoft

More information

Deploying Remote Desktop IP Virtualization Step-by-Step Guide

Deploying Remote Desktop IP Virtualization Step-by-Step Guide Deploying Remote Desktop IP Virtualization Step-by-Step Guide Microsoft Corporation Updated: April 2010 Published: July 2009 Abstract Remote Desktop IP Virtualization provides administrators the ability

More information

Remote Access Platform. Architecture and Security Overview

Remote Access Platform. Architecture and Security Overview Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

UTM Quick Installation Guide

UTM Quick Installation Guide www.allo.com Version 2.0 1 Copy Right Copyright 2014 Allo. All rights reserved. No part of this publication may be copied, distributed, transmitted, transcribed, stored in a retrieval system, or translated

More information

EView/400i Management Pack for Systems Center Operations Manager (SCOM)

EView/400i Management Pack for Systems Center Operations Manager (SCOM) EView/400i Management Pack for Systems Center Operations Manager (SCOM) Concepts Guide Version 6.3 November 2012 Legal Notices Warranty EView Technology makes no warranty of any kind with regard to this

More information

Client Administrator Quick Reference Guide

Client Administrator Quick Reference Guide Client Administrator Quick Reference Guide Thank you for using ADP's ipaystatements to view your payroll information. Use this Quick Reference Guide to learn how to view your pay statement, understand

More information

Course Syllabus. 2553A: Administering Microsoft SharePoint Portal Server 2003. Key Data. Audience. At Course Completion.

Course Syllabus. 2553A: Administering Microsoft SharePoint Portal Server 2003. Key Data. Audience. At Course Completion. Key Data Course #: 2553A Number of Days: 3 Format: Instructor-Led This course syllabus should be used to determine whether the course is appropriate for the students, based on their current skills and

More information

Merchant Integration Guide

Merchant Integration Guide Merchant Integration Guide Card Not Present Transactions January 2012 Authorize.Net Developer Support http://developer.authorize.net Authorize.Net LLC 082007 Ver.2.0 Authorize.Net LLC ( Authorize.Net )

More information

Lepide Exchange Recovery Manager

Lepide Exchange Recovery Manager Configuration Guide Lepide Exchange Recovery Manager Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights

More information

Chambers Bank Business Internet Banking Agreement

Chambers Bank Business Internet Banking Agreement Chambers Bank Business Internet Banking Agreement 1. INTRODUCTION. Chambers Bank Business Online Banking is a banking and information service that allows its Business Banking clients, via the Internet,

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12

DEPLOYMENT GUIDE Version 1.2. Deploying F5 with Oracle E-Business Suite 12 DEPLOYMENT GUIDE Version 1.2 Deploying F5 with Oracle E-Business Suite 12 Table of Contents Table of Contents Introducing the BIG-IP LTM Oracle E-Business Suite 12 configuration Prerequisites and configuration

More information

RedBlack CyBake Online Customer Service Desk

RedBlack CyBake Online Customer Service Desk RedBlack CyBake Online Customer Service Desk Publication Date: June 2014 Copyright Copyright 2014 RedBlack Software Ltd. All rights reserved. Complying with all applicable copyright laws is the responsibility

More information

CA VPN Client. User Guide for Windows 1.0.2.2

CA VPN Client. User Guide for Windows 1.0.2.2 CA VPN Client User Guide for Windows 1.0.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your

More information

ORACLE CRM ON DEMAND DEVELOPMENT ADDENDUM TO THE ORACLE PARTNERNETWORK AGREEMENT

ORACLE CRM ON DEMAND DEVELOPMENT ADDENDUM TO THE ORACLE PARTNERNETWORK AGREEMENT ORACLE CRM ON DEMAND DEVELOPMENT ADDENDUM TO THE ORACLE PARTNERNETWORK AGREEMENT This Oracle CRM On Demand Development Addendum (the " CRM On Demand Addendum ") is between you ( Developer ) and the Oracle

More information

CA Unified Infrastructure Management Server

CA Unified Infrastructure Management Server CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for

More information

June, 2015 Oracle s Siebel CRM Statement of Direction Client Platform Support

June, 2015 Oracle s Siebel CRM Statement of Direction Client Platform Support June, 2015 Oracle s Siebel CRM Statement of Direction Client Platform Support Oracle s Siebel CRM Statement of Direction IP2016 Client Platform Support Disclaimer This document in any form, software or

More information

V-Requester Add-in for Microsoft Outlook

V-Requester Add-in for Microsoft Outlook V-Requester Add-in for Microsoft Outlook User Guide This document will guide in configuring and using the V-Requester for Microsoft Outlook. Copyright 2014 V-Link http://www.vlink.is Page 1 Contents Introduction...

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

CA Cloud Service Delivery Platform

CA Cloud Service Delivery Platform CA Cloud Service Delivery Platform Customer Onboarding Version 01.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the

More information

Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006

Siebel CRM On Demand Single Sign-On. An Oracle White Paper December 2006 Siebel CRM On Demand Single Sign-On An Oracle White Paper December 2006 Siebel CRM On Demand Single Sign-On Introduction... 3 Single Sign-On with Siebel CRM On Demand... 4 Customer Requirements... 4 SSO

More information

CA Nimsoft Monitor. Probe Guide for URL Endpoint Response Monitoring. url_response v4.1 series

CA Nimsoft Monitor. Probe Guide for URL Endpoint Response Monitoring. url_response v4.1 series CA Nimsoft Monitor Probe Guide for URL Endpoint Response Monitoring url_response v4.1 series Legal Notices This online help system (the "System") is for your informational purposes only and is subject

More information

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox VMware Identity Manager SEPTEMBER 2015 V1 Configuring Single Sign-On from VMware Identity Manager to Dropbox Table of Contents

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013 The information contained

More information

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2 HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and

More information

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents

More information

Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide

Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide c623242f-20f0-40fe-b5c1-8412a094fdc7 Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide Microsoft Corporation Published: June 2009 Updated: April 2010 Abstract

More information

CA Cloud Service Delivery Platform

CA Cloud Service Delivery Platform CA Cloud Service Delivery Platform Service Level Manager Version 01.0.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the

More information

Citrix Receiver. Configuration and User Guide. For Macintosh Users

Citrix Receiver. Configuration and User Guide. For Macintosh Users Citrix Receiver Configuration and User Guide For Macintosh Users rev: 25.03.2015 https://access.sap.com/ TABLE OF CONTENTS Introduction... 3 Installation... 3 Accessing our portal... 3 Accessing from SAP

More information

Merchant Integration Guide

Merchant Integration Guide Merchant Integration Guide Card Not Present Transactions Authorize.Net Customer Support support@authorize.net Authorize.Net LLC 071708 Authorize.Net LLC ( Authorize.Net ) has made efforts to ensure the

More information

SecureAnywhereTM Web Security Service

SecureAnywhereTM Web Security Service SecureAnywhereTM Web Security Service This document provides a general overview of the Webroot SecureAnywhere Web Security Service Partner Management Portal. Webroot Partners such as Managed Service Providers

More information

Oracle Procurement. Punchout and Transparent Punchout Guide for Oracle iprocurement and Oracle Exchange Release 11i. Part No.

Oracle Procurement. Punchout and Transparent Punchout Guide for Oracle iprocurement and Oracle Exchange Release 11i. Part No. Oracle Procurement Punchout and Transparent Punchout Guide for Oracle iprocurement and Oracle Exchange Release 11i Part No. A92190-03 April 2003 Oracle Procurement Punchout and Transparent Punchout Guide

More information

User Guide for Avaya Scopia Add-in for Microsoft Outlook for Aura Collaboration Suite

User Guide for Avaya Scopia Add-in for Microsoft Outlook for Aura Collaboration Suite User Guide for Avaya Scopia Add-in for Microsoft Outlook for Aura Collaboration Suite Version 8.3 For Solution 8.3 March 2014 2000-2014 Avaya Inc. All intellectual property rights in this publication are

More information

Usage Analysis Tools in SharePoint Products and Technologies

Usage Analysis Tools in SharePoint Products and Technologies Usage Analysis Tools in SharePoint Products and Technologies Date published: June 9, 2004 Summary: Usage analysis allows you to track how websites on your server are being used. The Internet Information

More information

BlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2.

BlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2. BlackBerry Enterprise Server Resource Kit BlackBerry Analysis, Monitoring, and Troubleshooting Tools Version: 5.0 Service Pack: 2 Release Notes Published: 2010-06-04 SWD-1155103-0604111944-001 Contents

More information

Microsoft Office 365 with ADFS

Microsoft Office 365 with ADFS Microsoft Office 365 with ADFS Implementation Guide (Version 5.4) Copyright 2012 Deepnet Security Limited Copyright 2012, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication,

More information

Publisher User Manual

Publisher User Manual Publisher User Manual Getting Started A manual on how to use the TradeDoubler performance based marketing interface CONTENT 1. Introduction... 2 2. Apply to Program... 2 Search Program... 2 Join Program...

More information

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012

www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software

Product Guide Revision A. McAfee Secure Web Mail Client 7.0.0 Software Product Guide Revision A McAfee Secure Web Mail Client 7.0.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Transglobal Secure Collaboration Program Secure E-mail v.1 Gateway Design Principles

Transglobal Secure Collaboration Program Secure E-mail v.1 Gateway Design Principles Transglobal Secure Collaboration Program Secure E-mail v.1 Gateway Design Principles Prepared by: CP Secure E-mail v.1 Project Team Version: 2.0.2 Date: 16 July 2012 Page i Copyright 2012 Transglobal Secure

More information

Strong Authentication for Juniper Networks

Strong Authentication for Juniper Networks Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright

More information

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding

More information

3rd Party Messaging Guidelines. Version 1.0

3rd Party Messaging Guidelines. Version 1.0 3rd Party Messaging Guidelines Version 1.0 March 2015 This documentation is confidential and proprietary information of T-Mobile USA, Inc. It is disclosed pursuant to a non-disclosure agreement between

More information

Understanding Slow Start

Understanding Slow Start Chapter 1 Load Balancing 57 Understanding Slow Start When you configure a NetScaler to use a metric-based LB method such as Least Connections, Least Response Time, Least Bandwidth, Least Packets, or Custom

More information

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004

Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 Protecting Microsoft Internet Information Services Web Servers with ISA Server 2004 White Paper Published: June 2004 For the latest information, please see http://www.microsoft.com/isaserver/ Contents

More information

MassTransit Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management

MassTransit Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management MassTransit Leveraging MassTransit and Active Directory for Easier Account Provisioning and Management A Technical Best Practices White Paper About This Document This whitepaper explores the challenges

More information

Portal Administration. Administrator Guide

Portal Administration. Administrator Guide Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec

More information