Red Hat Enterprise Linux OpenStack Platform 7 Users and Identity Management Guide
|
|
|
- Stuart Damian Berry
- 9 years ago
- Views:
Transcription
1 Red Hat Enterprise Linux OpenStack Platform 7 Users and Identity Management Guide Managing users and authentication mechanisms OpenStack Team
2
3 Red Hat Enterprise Linux OpenStack Platform 7 Users and Identity Management Guide Managing users and authentication mechanisms OpenStack Team [email protected]
4 Legal Notice Copyright 2015 Red Hat, Inc. The text of and illustrations in this document are licensed by Red Hat under a Creative Commons Attribution Share Alike 3.0 Unported license ("CC-BY-SA"). An explanation of CC-BY-SA is available at In accordance with CC-BY-SA, if you distribute this document or an adaptation of it, you must provide the URL for the original version. Red Hat, as the licensor of this document, waives the right to enforce, and agrees not to assert, Section 4d of CC-BY-SA to the fullest extent permitted by applicable law. Red Hat, Red Hat Enterprise Linux, the Shadowman logo, JBoss, MetaMatrix, Fedora, the Infinity Logo, and RHCE are trademarks of Red Hat, Inc., registered in the United States and other countries. Linux is the registered trademark of Linus Torvalds in the United States and other countries. Java is a registered trademark of Oracle and/or its affiliates. XFS is a trademark of Silicon Graphics International Corp. or its subsidiaries in the United States and/or other countries. MySQL is a registered trademark of MySQL AB in the United States, the European Union and other countries. Node.js is an official trademark of Joyent. Red Hat Software Collections is not formally related to or endorsed by the official Joyent Node.js open source or commercial project. The OpenStack Word Mark and OpenStack Logo are either registered trademarks/service marks or trademarks/service marks of the OpenStack Foundation, in the United States and other countries and are used with the OpenStack Foundation's permission. We are not affiliated with, endorsed or sponsored by the OpenStack Foundation, or the OpenStack community. All other trademarks are the property of their respective owners. Abstract
5 Table of Contents Table of Contents. PREFACE CHAPTER USER..... AND..... ROLE..... MANAGEMENT USER MANAGEMENT ROLE MANAGEMENT QUOTA MANAGEMENT 7. CHAPTER PROJECT MANAGEMENT PROJECT MANAGEMENT PROJECT SECURITY MANAGEMENT HIERARCHICAL MULTI-TENANCY IN IDENTITY SERVICE 13. CHAPTER IDENTITY MANAGEMENT ACTIVE DIRECTORY INTEGRATION RESETTING ADMINISTRATOR PASSWORD SECURE LDAP COMMUNICATION 18 1
6 Red Hat Enterprise Linux OpenStack Platform 7 Users and Identity Management Guide 2
7 PREFACE PREFACE As a cloud administrator, you can manage projects, users, and roles. Projects are organizational units in the cloud to which you can assign users. Projects are also known as tenants or accounts. Users can be members of one or more projects. Roles define the actions that users can perform. Each OpenStack deployment must include at least one project, one user, and one role, linked together. As a cloud administrator, you can add, update, and delete projects and users, assign users to one or more projects, and change or remove these assignments. You can manage projects and users independently from each other. You can also configure user authentication with the Keystone identity service to control access to services and endpoints. Keystone provides token-based authentication and can integrate with LDAP and Active Directory, so you can manage users and identities externally and synchronize the user data with Keystone. 3
8 Red Hat Enterprise Linux OpenStack Platform 7 Users and Identity Management Guide CHAPTER 1. USER AND ROLE MANAGEMENT 1.1. USER MANAGEMENT As a cloud administrator, you can add, modify, and delete users in the dashboard. Users can be members of one or more projects. You can manage projects and users independently from each other Create a User Use this procedure to create users in the dashboard. You can assign a primary project and role to the user. Note that users created in the dashboard are Keystone users by default. To integrate Active Directory users, you can configure the LDAP provider included in the Red Hat Enterprise Linux OpenStack Platform Identity service. See Section 3.1, Active Directory Integration for the full procedure on how to integrate and configure Active Directory for identity management. 1. As an admin user in the dashboard, select Identity > Users. 2. Click Create User. 3. Enter a user name, , and preliminary password for the user. 4. Select a project from the Primary Project list. 5. Select a role for the user from the Role list (the default role is _member_). 6. Click Create User Edit a User Use this procedure to update the user s details, including the primary project. 1. As an admin user in the dashboard, select Identity > Users. 2. In the User s Actions column, click Edit. 3. In the Update User window, you can update the User Name, , and Primary Project. 4. Click Update User Enable or Disable a User Use this procedure to enable or disable a user. You can disable or enable only one user at a time. A disabled user cannot log in to the dashboard, and does not have access to any OpenStack services. Also, a disabled user s primary project cannot be set as active. A disabled user can be enabled again, unlike deleting a user where the action cannot be reversed. A disabled user must be reenabled for any user-project action in the dashboard. 1. As an admin user in the dashboard, select Identity > Users. 2. In the Actions column, click the arrow, and select Enable User or Disable User. In the Enabled column, the value then updates to either True or False. 4
9 CHAPTER 1. USER AND ROLE MANAGEMENT Delete a User As an admin user, use this procedure to delete a user using the dashboard. This action cannot be reversed, unlike disabling a user. Deleted users get delisted from a project s members' list for projects it belongs to. All roles associated with the user-project pair are also lost. 1. As an admin user in the dashboard, select Identity > Users. 2. Select the users you want to delete. 3. Click Delete Users. The Confirm Delete Users window is displayed. 4. Click Delete Users to confirm the action ROLE MANAGEMENT OpenStack uses a role-based access control (RBAC) mechanism to manage access to its resources. Roles define which actions users can perform. By default, there are two predefined roles: a member role that gets attached to a tenant, and an administrative role to enable users other than the admin to administer the environment. Note that there are abstract levels of permission, and it is possible to create the roles the administrator needs, and configure services adequately View Roles Use the following command to list the available predefined roles. $ keystone role-list id name ccc37d41c8491c975ae72676db687f Member 149f50a1fe684bfa88dae76a48d26ef7 ResellerAdmin 9fe2ff9ee4384b1894a90878d3e92bab _member_ 6ecf da985db2f141e46a7c8 admin To get details for a specified role, run: $ keystone role-get [ROLE] Example $ keystone role-get admin Property Value id 6ecf da985db2f141e46a7c8 name admin Create and Assign a Role 5
10 Red Hat Enterprise Linux OpenStack Platform 7 Users and Identity Management Guide As a cloud administrator, you can create and manage roles on the Keystone client using the following set of commands. Each OpenStack deployment must include at least one project, one user, and one role, linked together. However, users can be members of multiple projects. To assign users to multiple projects, create a role and assign that role to a user-project pair. Note that you can create a user and assign a primary project and default role in the dashboard. Note Either the name or ID can be used to specify users, roles, or projects. 1. Create the new-role role: $ keystone role-create --name [ROLE_NAME] Example $ keystone role-create --name new-role Property Value id 61013e7aa4ba4e00a0a1ab4b14bc6b2a name new-role To assign a user to a project, you must assign the role to a user-project pair. To do this, obtain the user, role, and project names or IDs: a. List users: $ keystone user-list b. List roles: $ keystone role-list c. List projects: $ keystone tenant-list 3. Assign a role to a user-project pair. $ keystone user-role-add --user [USER_NAME] --role [ROLE_NAME] -- tenant [TENANT_NAME] 6 Example In this example, you assign the new-role role to the demo-demo pair: $ keystone user-role-add --user demo --role new-role --tenant
11 CHAPTER 1. USER AND ROLE MANAGEMENT demo 4. Verify the role assignment for the user demo: $ keystone user-role-list --user [USER_NAME] --tenant [TENANT_NAME] Example $ keystone user-role-list --user demo --tenant demo Delete a Role 1. Use the following command to delete a role from a user-project pair. Deleting a role ensures the associated user-project pairing is lost. $ keystone user-role-remove --user [USER_NAME] --role [ROLE] -- tenant [TENANT_NAME] 2. Verify the role removal: $ keystone user-role-list --user [USER_NAME] --tenant [TENANT_NAME] If the role was removed, the command output omits the removed role QUOTA MANAGEMENT As a cloud administrator, you can set and manage quotas for a project. Each project is allocated resources, and project users are granted access to consume these resources. This enables multiple projects to use a single cloud without interfering with each other s permissions and resources. A set of resource quotas are preconfigured when a new tenant is created. The quotas include the amount of VCPUs, instances, RAM, floating IPs, that can be assigned to tenants. Quotas can be enforced at both the tenant (or project) and the tenant-user level. Note that you can set or modify Compute and Block Storage quotas for new and existing tenants using the dashboard. See Chapter 2, Project Management for the procedure on how to set and update project quotas within the dashboard View Compute Quotas for a User Run the following command to list the currently set quota values for a user: $ nova quota-show --user [USER] --tenant [TENANT] Example $ nova quota-show --user demouser --tenant demo Quota Limit 7
12 Red Hat Enterprise Linux OpenStack Platform 7 Users and Identity Management Guide instances 10 cores 20 ram floating_ips 5 fixed_ips -1 metadata_items 128 injected_files 5 injected_file_content_bytes injected_file_path_bytes 255 key_pairs 100 security_groups 10 security_group_rules 20 server_groups 10 server_group_members Update Compute Quotas for a User Run the following commands to update a particular quota value: $ nova quota-update --user [USER] --[QUOTA_NAME] [QUOTA_VALUE] [TENANT] $ nova quota-show --user [USER] --tenant [TENANT] Example $ nova quota-update --user demouser --floating-ips 10 demo $ nova quota-show --user demouser --tenant demo Quota Limit instances 10 cores 20 ram floating_ips Note To view a list of options for the quota-update command, run: $ nova help quota-update Set Object Storage Quotas for a User Object Storage quotas can be classified under the following categories: Container quotas - Limits the total size (in bytes) or number of objects that can be stored in a single container. 8
13 CHAPTER 1. USER AND ROLE MANAGEMENT Account quotas - Limits the total size (in bytes) that a user has available in the Object Storage service. To set either container quotas or the account quotas, the Object Storage proxy server must have the parameters container_quotas or account_quotas (or both) added to the [pipeline:main] section of the proxy-server.conf file: [pipeline:main] pipeline = catch_errors [...] tempauth container-quotas \ account-quotas slo dlo proxy-logging proxy-server [filter:account_quotas] use = egg:swift#account_quotas [filter:container_quotas] use = egg:swift#container_quotas Use the following command to view and update the Object Storage quotas. All users included in a project can view the quotas placed on the project. To update the Object Storage quotas on a project, you must have the role of a ResellerAdmin in the project. To view account quotas: # swift stat Account: AUTH_b36ed2d326034beba0a9dd1fb19b70f9 Containers: 0 Objects: 0 Bytes: 0 Meta Quota-Bytes: X-Timestamp: Content-Type: text/plain; charset=utf-8 Accept-Ranges: bytes To update quotas: # swift post -m quota-bytes:<bytes> For example, to place a 5 GB quota on an account: # swift post -m quota-bytes: To verify the quota, run the swift stat command again: # swift stat Account: AUTH_b36ed2d326034beba0a9dd1fb19b70f9 Containers: 0 Objects: 0 Bytes: 0 Meta Quota-Bytes: X-Timestamp: Content-Type: text/plain; charset=utf-8 Accept-Ranges: bytes 9
14 Red Hat Enterprise Linux OpenStack Platform 7 Users and Identity Management Guide CHAPTER 2. PROJECT MANAGEMENT 2.1. PROJECT MANAGEMENT As a cloud administrator, you can create and manage projects (tenants). A tenant describes a project with an assigned number of OpenStack users and resources. It is possible to set up quotas for each tenant. This enables multiple projects to use a single cloud without interfering with each other s permissions and resources. The words project and tenant are used interchangeably. Users can be associated with more than one project. Each user-project pairing must have a role associated with it Create a Project Use this procedure to create projects, add members to the project, and set resource limits for the project. 1. As an admin user in the dashboard, select Identity > Projects. 2. Click Create Project. 3. On the Project Information tab, enter a name and description for the project (the Enabled check box is selected by default). 4. On the Project Members tab, add members to the project from the All Users list. 5. On the Quotas tab, specify resource limits for the project. 6. Click Create Project Edit a Project You can edit a project to change its name or description, enable or temporarily disable it, or update its members. 1. As an admin user in the dashboard, select Identity > Projects. 2. In the project s Actions column, click the arrow, and click Edit Project. 3. In the Edit Project window, you can update a project to change its name or description, and enable or temporarily disable the project. 4. On the Project Members tab, add members to the project, or remove them as needed. 5. Click Save. Note The Enabled check box is selected by default. To temporarily disable the project, clear the Enabled check box. To enable a disabled project, select the Enabled check box Delete a Project 10
15 CHAPTER 2. PROJECT MANAGEMENT 1. As an admin user in the dashboard, select Identity > Projects. 2. Select the project you want to delete. 3. Click Delete Projects. The Confirm Delete Projects window is displayed. 4. Click Delete Projects to confirm the action. The project gets deleted and any user pairing will be disassociated Update Project Quotas Quotas are operational limits that can be set per project to optimize cloud resources. You can set quotas to prevent project resources from being exhausted without notification. Quotas can be enforced at both the project and the project-user level. 1. As an admin user in the dashboard, select Identity > Projects. 2. In the project s Actions column, click the arrow, and click Modify Quotas. 3. In the Quota tab, modify project quotas as needed. 4. Click Save Change Active Project A user can set a project as the active project only of which they are a member. It is also necessary for the user to be a member of more than one project to have the Set as Active Project option be enabled. Setting a project as an active project enables you to access objects in the dashboard for the active project. Note that a disabled project cannot be set as active, unless it is re-enabled. 1. As an admin user in the dashboard, select Identity > Projects. 2. In the project s Actions column, click the arrow, and click Set as Active Project. 3. Alternatively, as a non-admin user, in the project s Actions column, click Set as Active Project which becomes the default action in the column PROJECT SECURITY MANAGEMENT Security groups are sets of IP filter rules that can be assigned to project instances, and which define networking access to the instance. Security groups are project specific; project members can edit the default rules for their security group and add new rule sets. All projects have a default security group that is applied to any instance that has no other defined security group. Unless you change the default values, this security group denies all incoming traffic and allows only outgoing traffic to your instance Create a Security Group 1. In the dashboard, select Project > Compute > Access & Security. 2. On the Security Groups tab, click Create Security Group. 11
16 Red Hat Enterprise Linux OpenStack Platform 7 Users and Identity Management Guide 3. Provide a name and description for the group, and click Create Security Group Add a Security Group Rule By default, rules for a new group only provide outgoing access. You must add new rules to provide additional access. 1. In the dashboard, select Project > Compute > Access & Security. 2. On the Security Groups tab, click Manage Rules for the security group that you want to edit. 3. Click Add Rule to add a new rule. 4. Specify the rule values, and click Add. The following rule fields are required: Rule Rule type. If you specify a rule template (for example, SSH), its fields are automatically filled in: Direction Open Port TCP: Typically used to exchange data between systems, and for end-user communication. UDP: Typically used to exchange data between systems, particularly at the application level. ICMP: Typically used by network devices, such as routers, to send error or monitoring messages. Ingress (inbound) or Egress (outbound). For TCP or UDP rules, the Port or Port Range (single port or range of ports) to open: For a range of ports, enter port values in the From Port and To Port fields. For a single port, enter the port value in the Port field. Type Code The type for ICMP rules; must be in the range -1:255. The code for ICMP rules; must be in the range -1:255. Remote The traffic source for this rule: CIDR (Classless Inter-Domain Routing): IP address block, which limits access to IPs within the block. Enter the CIDR in the Source field. 12
17 CHAPTER 2. PROJECT MANAGEMENT Security Group: Source group that enables any instance in the group to access any other group instance Delete a Security Group Rule 1. In the dashboard, select Project > Compute > Access & Security. 2. On the Security Groups tab, click Manage Rules for the security group. 3. Select the security group rule, and click Delete Rule. 4. Click Delete Rule again. Note You cannot undo the delete action Delete a Security Group 1. In the dashboard, select Project > Compute > Access & Security. 2. On the Security Groups tab, select the group, and click Delete Security Groups. 3. Click Delete Security Groups. Note You cannot undo the delete action HIERARCHICAL MULTI-TENANCY IN IDENTITY SERVICE Multi-tenancy is an architecture in which a single instance of a software application serves multiple customers. In cloud computing, the meaning of multi-tenancy architecture has broadened because of new service models that take advantage of virtualization and remote access. A software-as-aservice (SaaS) provider, for example, can run one instance of its application on one instance of a database and provide web access to multiple customers. In such a scenario, each tenant s data is isolated and remains invisible to other tenants. In the OpenStack Identity Service (keystone) you can use multi-tenancy to nest projects. Domains represent collections of users, groups, and projects where each one of these is owned by exactly one domain. Users can be associated with multiple projects by granting roles to them on a project, including projects owned by other domains. Projects are the container of resources, which define quotas and access to VM images. Multi-tenancy is available as a technology preview in the RHEL OpenStack Platform 7 (Kilo) release. For more information on the support scope for features marked as technology previews, see 13
18 Red Hat Enterprise Linux OpenStack Platform 7 Users and Identity Management Guide CHAPTER 3. IDENTITY MANAGEMENT 3.1. ACTIVE DIRECTORY INTEGRATION The Red Hat Enterprise Linux OpenStack Platform Identity service includes an LDAP provider that you can configure to perform LDAP calls to Active Directory. In Active Directory, you must create and point to user accounts, and create Organizational Units (OU) for roles and tenants. Then you configure Identity to use those objects. Important For the Identity service to access an LDAP backend, SELinux requires the authlogin_nsswitch_use_ldap boolean enabled on any client machine accessing the LDAP backend. Run the following command on each client machine as the root user to enable the boolean and make it persistent across reboots: # setsebool -P authlogin_nsswitch_use_ldap Configuring Active Directory In a Microsoft Windows Server 2008 installation, you must set up a different tree for each identity type on the Active Directory configuration: one for users, one for tenants, and one for roles. 1. On the machine where Active Directory is installed, create a new domain/forest. For example, the tree in Active Directory might look like this: Users @mail Tenants @description member(adminuser,demouser) AdminRole roleoccupant(adminuser) MemberRole roleoccupant(demouser) Roles 14
19 CHAPTER 3. IDENTITY 2. Create a user for connecting to LDAP (ldapbind user). 3. Right click on the domain and select Delegate Control. 4. Select the ldapbind user you created. 5. Create an OU stating where to search for users, for example: ou=openstack_users,ou=openstack,dc=redhat,dc=corp 6. Create an OU stating where to search the tenants, for example: ou=openstack_tenants,ou=openstack,dc=redhat,dc=corp 7. Create an OU stating where to search the roles, for example: ou=openstack_roles,ou=openstack,dc=redhat,dc=corp Configure organizationalrole To enable Identity s roles to work correctly with Active Directory, you must configure organizationalrole to allow groupofnames as a possible superior. To do so, you must have a user in the group Schema Administrators that has rights to modify the configuration setting of the schema. This user needs to modify the configuration on Active Directory Schema Master, as follows: 1. In the Active Directory Schema Master, use ASDI Edit and select schema. 2. Open CN=Organizational-Role. 3. In the attribute editor, select posssuperiors. 4. Add groupofnames to the list. 5. Click OK Collecting Information about Active Directory Configuration Now you need to find the required information about your Active Directory configuration with Active Directory Users and Computers. For example, locate the Organizational Unit (OU) that contains Users. You will use this information to configure the lookup point for users in Identity. Active Directory identifies the Users OU differently to the way LDAP does, so you must search for Common Name (CN). In the following example, the OU is called Users: CN=Users,dc=example,dc=com Similarly, locate the OUs that contains Groups and Roles Configuring OpenStack Identity 15
20 Red Hat Enterprise Linux OpenStack Platform 7 Users and Identity Management Guide 1. Test the ldapbind account created on the Microsoft Windows Server 2008 machine with the command: # ldapsearch -LLL -H ldap:// E pr=1000/noprompt -w 'ldapbindpasswd' -x -D 'DC\ldapbind' -b 'dc=redhat,dc=corp' " (samaccountname=*)" Where: -D DC is the username, DC is the hostname, and ldapbind is the user you created on the Windows server -b dc=redhat,dc=corp is the point where the search will start 2. On the Identity server, edit /etc/keystone/keystone.conf as follows: [identity] driver = keystone.identity.backends.ldap.identity... [assignment] driver = keystone.assignment.backends.sql.assignment... [ldap] url user password suffix use_dumb_member dumb_member = ldap://dc.example.com = CN=ldap,OU=Users,DC=example,DC=com = password = DC=example,DC=com = True = CN=ldap,OU=Users,DC=example,DC=com user_tree_dn = OU=Users,DC=example,DC=com user_objectclass = person user_filter = user_id_attribute = cn user_name_attribute = cn user_mail_attribute = mail user_pass_attribute = user_enabled_attribute = useraccountcontrol user_enabled_mask = 2 user_enabled_default = 512 user_attribute_ignore = password,tenant_id,tenants user_allow_create = False user_allow_update = False user_allow_delete = False tenant_tree_dn = OU=Tenants,DC=example,DC=com tenant_filter = tenant_objectclass = groupofnames tenant_id_attribute = cn tenant_member_attribute = member tenant_name_attribute = ou tenant_desc_attribute = description tenant_enabled_attribute = extensionname tenant_attribute_ignore = 16
21 CHAPTER 3. IDENTITY MANAGEMENT tenant_allow_create tenant_allow_update tenant_allow_delete = True = True = True role_tree_dn = OU=Roles,DC=example,DC=com role_filter = role_objectclass = organizationalrole role_id_attribute = cn role_name_attribute = ou role_member_attribute = roleoccupant role_attribute_ignore = role_allow_create = True role_allow_update = True role_allow_delete = True Restart the Identity service: # service openstack-keystone restart 4. Test that authentication is working by retrieving a list of users: # keystone user-list 3.2. RESETTING ADMINISTRATOR PASSWORD You may want to reset or change your existing or the default administrator password after installing OpenStack in your environment. Use this procedure to reset the administrator password in your Red Hat Enterprise Linux OpenStack Platform environment. 1. Get the admin token from the file in /etc/keystone/keystone.conf 2. Create a file containing the following entries: export OS_SERVICE_TOKEN={admin_token} export OS_SERVICE_ENDPOINT= 3. Source the above file: # source FILE_NAME 4. Update the admin password: # keystone user-password-update-admin 5. Unset the environment variables: # unset OS_SERVICE_TOKEN # unset OS_SERVICE_ENDPOINT 6. Delete the file created in step 2: # rm FILE_NAME 17
22 Red Hat Enterprise Linux OpenStack Platform 7 Users and Identity Management Guide Warning It is recommended that the token is disabled in production environment. To do this, remove AdminTokenAuthMiddleware from your paste application pipelines. For example, you can use the keystone-paste.ini file to configure the Web Service Gateway Interface (WSGI) middleware pipeline for the Identity service SECURE LDAP COMMUNICATION If you have configured the Identity service (keystone) to authenticate against or to retrieve identity information from an LDAP server, you can secure LDAP communication for the Identity service using a CA certificate. This section outlines how to obtain the CA certificate from Active Directory, how to convert the CA certificate file into Privacy Enhanced Mail (PEM) file format, and the three methods for configuring secure LDAP communication for the Identity service. The procedure in each method must be performed depending on where and how the CA trust is configured Obtaining the CA Certificate from Active Directory The following code shows an example of how to query Active Directory to obtain the CA certificate. The CA_NAME is the name of the certificate (you can see it in mmc.exe) and the rest of the parameters can be changed according to your setup: CA_NAME="WIN2012DOM-WIN2012-CA" AD_SUFFIX="dc=win2012dom,dc=com" LDAPURL="ldap://win2012.win2012dom.com" ADMIN_DN="cn=Administrator,cn=Users,$AD_SUFFIX" ADMINPASSWORD="MyPassword" CA_CERT_DN="cn=latexmath:[$CA_NAME,cn=certification authorities,cn=public key services,cn=services,cn=configuration,$]ad_suffix" TMP_CACERT=/tmp/cacert.`date +'%Y%m%d%H%M%S'`.$$.pem ldapsearch -xlll -H latexmath:[$ldapurl -D `echo \"$]ADMIN_DN"`-W -s base -b`echo "$CA_CERT_DN"` objectclass=* cacertificate Converting the CA Certificate into PEM file format Create a file called /path/cacert.pem and include the contents of the LDAP query that obtained the CA certificate from Active Directory, within the header and footer, as shown in the example below: -----BEGIN CERTIFICATE----- MIIDbzCCAlegAwIBAgIQQD14hh1Yz7tPFLXCkKUOszANB END CERTIFICATE
23 CHAPTER 3. IDENTITY MANAGEMENT For troubleshooting, you can execute the following query to check if LDAP is working, and to ensure the PEM certificate file was created correctly. LDAPTLS_CACERT=/path/cacert.pem ldapsearch -xlll -ZZ -H $LDAPURL -s base -b "" "objectclass=*" currenttime The query should return a result similar to: dn: currenttime: Z You can run the following command to get a CA certificate if it was hosted by a web server. Example $HOST=redhat.com $PORT=443 # echo Q openssl s_client -connect $HOST:$PORT sed -n -e '/BEGIN CERTIFICATE/,/END CERTIFICATE/ p' Methods for Configuring Secure LDAP Communication for the Identity Service Method 1 Use this method if the CA trust is configured at the LDAP level using a PEM file. Manually specify the location of a CA certificate file. The following procedure secures LDAP communication not only for the Identity service, but for all applications that use the OpenLDAP libraries. 1. Copy the file containing your CA certificate chain in PEM format to the /etc/openldap/certs directory. 2. Edit /etc/openldap/ldap.conf and add the following directive, replacing [CA_FILE] with the location and name of the CA certificate file: TLS_CACERT /etc/openldap/certs/[ca_file] 3. Restart the openstack-keystone service: # systemctl restart openstack-keystone.service Method 2 Use this method if the CA trust is configured at the LDAP library level using a Network Security Services (NSS) database. Use the certutil command to import and trust a CA certificate into the NSS certificate database used by the OpenLDAP libraries. The following procedure secures LDAP communication not only for the Identity service, but for all applications that use the OpenLDAP libraries. 19
24 Red Hat Enterprise Linux OpenStack Platform 7 Users and Identity Management Guide 1. Import and trust the certificate, replacing [CA_FILE] with the location and name of the CA certificate file: # certutil -d /etc/openldap/certs -A -n "My CA" -t CT,, -a -i [CA_FILE] 2. Confirm the CA certificate was imported correctly: # certutil -d /etc/openldap/certs -L Your CA certificate is listed, and the trust attributes are set to CT,,. 3. Restart the openstack-keystone service: # systemctl restart openstack-keystone.service Method 3 Use this method if the CA trust is configured at the Keystone level using a PEM file. The final method of securing communication between the Identity service and an LDAP server is to configure TLS for the Identity service. However, unlike the two methods above, this method only secures LDAP communication for the Identity service and does not secure LDAP communication for other applications that use the OpenLDAP libraries. The following procedure uses the openstack-config command to edit values in the /etc/keystone/keystone.conf file. 1. Enable TLS: # openstack-config --set /etc/keystone/keystone.conf ldap use_tls True 2. Specify the location of the certificate, replacing [CA_FILE] with the name of the CA certificate: # openstack-config --set /etc/keystone/keystone.conf ldap tls_cacertfile [CA_FILE] 3. Specify the client certificate checks performed on incoming TLS sessions from the LDAP server, replacing [CERT_BEHAVIOR] with one of the behaviors listed below: demand a certificate will always be requested from the LDAP server. The session will be terminated if no certificate is provided, or if the certificate provided cannot be verified against the existing certificate authorities file. allow a certificate will always be requested from the LDAP server. The session will proceed as normal even if a certificate is not provided. If a certificate is provided but it cannot be verified against the existing certificate authorities file, the certificate will be ignored and the session will proceed as normal. 20
25 CHAPTER 3. IDENTITY MANAGEMENT never a certificate will never be requested. # openstack-config --set /etc/keystone/keystone.conf ldap tls_req_cert [CERT_BEHAVIOR] 4. Restart the openstack-keystone service: # systemctl restart openstack-keystone.service 21
Red Hat Enterprise Linux OpenStack Platform 7 OpenStack Data Processing
Red Hat Enterprise Linux OpenStack Platform 7 OpenStack Data Processing Manually provisioning and scaling Hadoop clusters in Red Hat OpenStack OpenStack Documentation Team Red Hat Enterprise Linux OpenStack
Red Hat JBoss Core Services Apache HTTP Server 2.4 Apache HTTP Server Installation Guide
Red Hat JBoss Core Services Apache HTTP Server 2.4 Apache HTTP Server Installation Guide For use with Red Hat JBoss middleware products. Red Hat Customer Content Services Red Hat JBoss Core Services Apache
JBoss Developer Studio 6.0
JBoss Developer Studio 6.0 OpenShift Tools Reference Guide 1 JBoss Developer Studio 6.0 OpenShift Tools Reference Guide Provides information about the use of the JBoss Developer Studio with the Red Hat
Red Hat Subscription Management All Subscription Docs Quick Registration for RHEL
Red Hat Subscription Management All Subscription Docs Quick Registration for RHEL quickly register and subscribe Red Hat Enterprise Linux systems Edition 4 John Ha Deon Ballard Red Hat Subscription Management
Red Hat OpenStack Platform 8 DNS-as-a-Service Guide
Red Hat OpenStack Platform 8 DNS-as-a-Service Guide Integrate DNS Management with Red Hat OpenStack Platform OpenStack Team Red Hat OpenStack Platform 8 DNS-as-a-Service Guide Integrate DNS Management
Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory
Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory May 21, 2014 This edition of this document applies to Piston OpenStack 3.0. To send us your comments about this document, e-mail [email protected].
Red Hat Enterprise Linux OpenStack Platform 7 Back Up and Restore Red Hat Enterprise Linux OpenStack Platform
Red Hat Enterprise Linux OpenStack Platform 7 Back Up and Restore Red Hat Enterprise Linux OpenStack Platform Backup and Restore the Director undercloud OpenStack Team Red Hat Enterprise Linux OpenStack
Red Hat Directory Server 8.2 Using the Directory Server Console
Red Hat Directory Server 8.2 Using the Directory Server Console Managing users and access within the Red Hat Directory Server 8.2 console Edition 8.2.1 Landmann Red Hat Directory Server 8.2 Using the Directory
Managing Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
Red Hat Cloud Infrastructure 5 Release Notes
Red Hat Cloud Infrastructure 5 Release Notes Release Notes for Red Hat Cloud Infrastructure 5.0 Red Hat Cloud Infrastructure Documentation Team Red Hat Cloud Infrastructure 5 Release Notes Release Notes
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Configuring Keystone in OpenStack (Essex)
WHITE PAPER Configuring Keystone in OpenStack (Essex) Joshua Tobin April 2012 Copyright Canonical 2012 www.canonical.com Executive introduction Keystone is an identity service written in Python that provides
http://www.trendmicro.com/download
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Red Hat CloudForms 3.2 NetApp Storage Integration Guide
Red Hat CloudForms 3.2 NetApp Storage Integration Guide Technology preview feature that enables you to collect NetApp Storage data using CloudForms Management Engine Red Hat CloudForms Documentation Team
Biznet GIO Cloud Connecting VM via Windows Remote Desktop
Biznet GIO Cloud Connecting VM via Windows Remote Desktop Introduction Connecting to your newly created Windows Virtual Machine (VM) via the Windows Remote Desktop client is easy but you will need to make
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
McAfee Cloud Identity Manager
Salesforce Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Basic Exchange Setup Guide
Basic Exchange Setup Guide The following document and screenshots are provided for a single Microsoft Exchange Small Business Server 2003 or Exchange Server 2007 setup. These instructions are not provided
Polycom RealPresence Resource Manager System Getting Started Guide
[Type the document title] Polycom RealPresence Resource Manager System Getting Started Guide 8.0 August 2013 3725-72102-001B Polycom Document Title 1 Trademark Information POLYCOM and the names and marks
Virtual Web Appliance Setup Guide
Virtual Web Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance This guide describes the procedures for installing a Virtual Web Appliance. If you are installing
Chapter 3 Authenticating Users
Chapter 3 Authenticating Users Remote users connecting to the SSL VPN Concentrator must be authenticated before being allowed to access the network. The login window presented to the user requires three
McAfee Cloud Identity Manager
NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
OneFabric Connect and Lightspeed Systems Rocket Web Filtering Appliance
OneFabric Connect and Lightspeed Systems Rocket Web Filtering Appliance Configuration and Installation Guide Abstract: This document covers the integration of Lightspeed Systems Rocket Web with Extreme
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
Red Hat Customer Portal 1 Managing User Access to the Red Hat Customer Portal and the Red Hat Network Application
Red Hat Customer Portal 1 Managing User Access to the Red Hat Customer Portal and the Red Hat Network Application Creating and Configuring User Accounts Edition 4 Red Hat Global Support Services Red Hat
Parallels Plesk Panel
Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011
Web Application Firewall
Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks
Red Hat Customer Portal Current Customer Portal Subscription Management
Red Hat Customer Portal Current Customer Portal Subscription Management for managing subscriptions Edition 1 Landmann Red Hat Customer Portal Current Customer Portal Subscription Management for managing
Virtual Managment Appliance Setup Guide
Virtual Managment Appliance Setup Guide 2 Sophos Installing a Virtual Appliance Installing a Virtual Appliance As an alternative to the hardware-based version of the Sophos Web Appliance, you can deploy
Active Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: [email protected] Online Support: [email protected] CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
F-SECURE MESSAGING SECURITY GATEWAY
F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE
CloudCIX Bootcamp. The essential IaaS getting started guide. http://www.cix.ie
The essential IaaS getting started guide. http://www.cix.ie Revision Date: 17 th August 2015 Contents Acronyms... 2 Table of Figures... 3 1 Welcome... 4 2 Architecture... 5 3 Getting Started... 6 3.1 Login
Product Guide Revision A. McAfee Web Reporter 5.2.1
Product Guide Revision A McAfee Web Reporter 5.2.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
SOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1
Application Discovery Manager User s Guide vcenter Application Discovery Manager 6.2.1 This document supports the version of each product listed and supports all subsequent versions until the document
CA SiteMinder. Directory Configuration - OpenLDAP. r6.0 SP6
CA SiteMinder Directory Configuration - OpenLDAP r6.0 SP6 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Framework 8.1. External Authentication. Reference Manual
Framework 8.1 External Authentication Reference Manual The information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent of Genesys
Request Manager Installation and Configuration Guide
Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
HP Device Manager 4.7
Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...
Quick Start Guide. Sendio Email System Protection Appliance. Sendio 5.0
Sendio Email System Protection Appliance Quick Start Guide Sendio 0 Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +949.274375 www.sendio.com QUICK START GUIDE SENDIO This Quick Start
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Deploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
Using LDAP for User Authentication
Using LDAP for User Authentication Product version: 4.50 Document version: 1.1 Document creation date: 03-06-05 Purpose This technical note describes how to configure and set up EPiServer to use an LDAP
Installation and Configuration Guide
www.novell.com/documentation Installation and Configuration Guide GroupWise Coexistence Solution for Exchange November 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
The Wingu guide to creating your first cloud server.
The Wingu guide to creating your first cloud server. This guide explains how to create your very first server in the Wingu cloud by using our easy to use cloud dashboard. 1. Login to the dashboard by pointing
Windows Azure Pack Installation and Initial Configuration
Windows Azure Pack Installation and Initial Configuration Windows Server 2012 R2 Hands-on lab In this lab, you will learn how to install and configure the components of the Windows Azure Pack. To complete
ARIS Server Installation and Administration Guide ARIS. Version 9.6 - Service Release 1
ARIS Server Installation and Administration Guide ARIS Version 9.6 - Service Release 1 June 2014 This document applies to ARIS Version 9.6 SR1 and to all subsequent releases. Specifications contained herein
Setting up your virtual infrastructure using FIWARE Lab Cloud
Setting up your virtual infrastructure using FIWARE Lab Cloud Fernando López Telefónica I+D Cloud Architects, FIWARE [email protected], @flopezaguilar (Slides: http://tinyurl.com/fiwarelab-cloud)
Web Sites, Virtual Machines, Service Management Portal and Service Management API Beta Installation Guide
Web Sites, Virtual Machines, Service Management Portal and Service Management API Beta Installation Guide Contents Introduction... 2 Environment Topology... 2 Virtual Machines / System Requirements...
App Orchestration 2.0
App Orchestration 2.0 Configuring NetScaler Load Balancing and NetScaler Gateway for App Orchestration Prepared by: Christian Paez Version: 1.0 Last Updated: December 13, 2013 2013 Citrix Systems, Inc.
JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2
JAMF Software Server Installation and Configuration Guide for Linux Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide
User Management Resource Administrator. Managing LDAP directory services with UMRA
User Management Resource Administrator Managing LDAP directory services with UMRA Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted
WebApp S/MIME Manual. Release 7.2.1. Zarafa BV
WebApp S/MIME Manual Release 7.2.1 Zarafa BV January 06, 2016 Contents 1 Introduction 2 2 Installation 3 2.1 RPM based distributions............................................. 3 2.2 DEB based distributions.............................................
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Administration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
Introduction to Mobile Access Gateway Installation
Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure
App Orchestration 2.5
Configuring NetScaler 10.5 Load Balancing with StoreFront 2.5.2 and NetScaler Gateway for Prepared by: James Richards Last Updated: August 20, 2014 Contents Introduction... 3 Configure the NetScaler load
eprism Email Security Suite
Guide eprism 2505 eprism Email Security Suite 800-782-3762 www.edgewave.com 2001 2012 EdgeWave. All rights reserved. The EdgeWave logo is a trademark of EdgeWave Inc. All other trademarks and registered
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
Securing SAS Web Applications with SiteMinder
Configuration Guide Securing SAS Web Applications with SiteMinder Audience Two application servers that SAS Web applications can run on are IBM WebSphere Application Server and Oracle WebLogic Server.
CTERA Portal Datacenter Edition
User Guide CTERA Portal Datacenter Edition September 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means
McAfee Cloud Identity Manager
SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
Getting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
Red Hat Enterprise Linux 7 High Availability Add-On Administration. Configuring and Managing the High Availability Add-On
Red Hat Enterprise Linux 7 High Availability Add-On Administration Configuring and Managing the High Availability Add-On Red Hat Enterprise Linux 7 High Availability Add-On Administration Configuring
Delegated Administration Quick Start
Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
JAMF Software Server Installation Guide for Linux. Version 8.6
JAMF Software Server Installation Guide for Linux Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate.
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
Automating Server Firewalls
Automating Server Firewalls With CloudPassage Halo Contents: About Halo Server Firewalls Implementing Firewall Policies Create and Assign a Firewall Policy Specify Firewall-Related Components Managing
Transparent Identification of Users
Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA
www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014
www.novell.com/documentation Administration Guide Novell Filr 1.0.1 May 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Using DC Agent for Transparent User Identification
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
Sample Configuration: Cisco UCS, LDAP and Active Directory
First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
Getting Started Guide Polycom RealPresence Resource Manager System, Appliance Edition
Getting Started Guide Polycom RealPresence Resource Manager System, Appliance Edition 8.2.0 July 2014 3725-72102-001G Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be
SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION
SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION Table of content ScopTel with Active Directory... 3 Software Features... 3 Software Compatibility... 3 Requirements... 3 ScopTel Configuration... 4 Prerequisites...
Importing data from Linux LDAP server to HA3969U
Importing data from Linux LDAP server to HA3969U Application Notes Abstract: This document describes how to import data and records from Linux LDAP servers to Storageflex HA3969U systems, and by doing
1 Keystone OpenStack Identity Service
1 Keystone OpenStack Identity Service In this chapter, we will cover: Creating a sandbox environment using VirtualBox and Vagrant Configuring the Ubuntu Cloud Archive Installing OpenStack Identity Service
IaaS Configuration for Cloud Platforms
vrealize Automation 6.2.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
ZCP trunk (build 51762) Z-Admin Manual. The Z-Admin Manual
ZCP trunk (build 51762) Z-Admin Manual The Z-Admin Manual Z-Admin Manual ZCP trunk (build 51762) Z-Admin Manual The Z-Admin Manual Edition 7.0 Copyright 2015 Zarafa BV. The text of and illustrations in
