StoneGate SSL VPN Technical Note Setting Up Sygate On-Demand

Size: px
Start display at page:

Download "StoneGate SSL VPN Technical Note 2076. Setting Up Sygate On-Demand"

Transcription

1 StoneGate SSL VPN Technical Note 2076 Setting Up Sygate On-Demand

2 Table of Contents Introduction page 3 Overview page 3 Sygate On-Demand and StoneGate SSL VPN page 3 Configuring Sygate On-Demand page 4 Copying Sygate Configuration to StoneGate page 5 Configuring StoneGate Access Point Default Page page 5 Configuring End-Point Integrity Client Scan page 5 Creating Customized Start Page page 7 Configuring StoneGate SSL VPN Logout Page page 7 Publishing Configuration page 8 Feedback page 8 Table of Contents 2

3 Introduction This technical note covers all aspects of configuring StoneGate SSL VPN and Sygate On-Demand Manager for the purpose of using Sygate On-Demand Virtual Desktop with StoneGate SSL VPN. Changes since the previous revision (SG_SVTN_2076_ ) are marked in the left margin with a change bar as seen here to the left of this paragraph. Note This technical note does not cover installation and general configuration of Sygate On-Demand. For information on installation and general configuration, please read the documentation provided with Sygate On- Demand. Prerequisites This technical note assumes a thorough understanding of StoneGate SSL VPN administration and of Sygate On- Demand. HTML proficiency is also required. Use the further reading to gain the required knowledge. Further Reading More information on StoneGate SSL VPN administration can be found in the StoneGate SSL VPN Administrator s Guide, the Online Help, and the Technical Note repository provided with the product. Another source of information is the Stonesoft Support site, which can be found at For more information on related subjects, visit Overview The Sygate On-Demand application consists of two modules: the Sygate On-Demand Manager and the Sygate On- Demand Agent (SODA). All settings and configurations are specified in the Sygate On-Demand Manager. The Sygate On-Demand Agent reads the settings from the Manager and acts like the secure desktop for the client. The files and settings generated from the Sygate On-Demand Manager are saved in a file system catalog in the SODA installation directory. The files include HTML pages, applets, configurations, components, and libraries. Sygate On-Demand and StoneGate SSL VPN The purpose of using Sygate On-Demand in combination with StoneGate SSL VPN is to take advantage of Sygate On-Demands secure desktop solution, while maintaining the authentication and authorization functionality of StoneGate SSL VPN. The End-Point Integrity solution of StoneGate SSL VPN is enabled to ensure that the Sygate On-Demand Agent is used on the clients. To achieve a secure integration between StoneGate SSL VPN and Sygate On-Demand, the following configuration is required: 1. Configure Sygate On-Demand The Sygate On-Demand Agent is configured to display a customized start page when started successfully and settings for the virtual desktop are specified. 2. Copy Sygate On-Demand Agent files to Administration Service To enable all Access Points to access the Sygate On-Demand Manager configuration, Sygate On-Demand Agent files are copied to the Administration Service. 3. Configure StoneGate SSL VPN Access Point Default page To automatically launch the Sygate On-Demand Agent when users access the Access Point, the default page for the Access Point is configured to correspond to the file that launches the Sygate On-Demand Agent. 4. Configuring End-Point Integrity Client Scan A client scan is configured to verify that the Sygate On-Demand Agent is running when resources are accessed. Introduction 3

4 5. Creating Authentication Method Access Rule An access rule is created to include the authentication methods that will be used to protect the resources. 6. Protect resources Applicable authentication methods are applied to your resources. To eliminate the possibility of users accessing resources directly without launching the Sygate On-Demand Agent, applicable resources are also protected by the End-Point Integrity client scan. 7. Create customized start page A customized start page is created in order to launch the StoneGate SSL VPN Portal in the Sygate On- Demand Agent. 8. Configure StoneGate SSL VPN logout Page The StoneGate SSL VPN logout page is configured to either close the browser or to redirect to the customized start page when users log off from the Application Portal. By utilizing this configuration the end user will have access to the configured StoneGate SSL VPN installation via the Sygate On-Demand Agent. The first contact with the system launches the Sygate On-Demand Agent. The Agent launches a browser displaying the End-Point Integrity scan page. The user clicks the scan button to initiate the client scan. Only if the client scan finds a running SODA process on the client, is the authentication page displayed. The page lists available authentication methods for the user, who then makes a selection and proceeds with authentication as usual. Note Due to the nature of Sygate On-Demand, it is not possible to use dynamic tunnels. Only static tunnels are supported. Please keep that in mind when setting up your system. The steps required are detailed in the following sections. Configuring Sygate On-Demand Use the Sygate On-Demand Manager to configure the Sygate On-Demand Agent to display a customized start page when started successfully. This process will also allow you to specify settings for the virtual desktop. Note Here you specify the URL for a customized start page. The start page is created later (refer to section Create Customized Start Page). In the examples we use the file name /soda/wa_default.html. If you use another file name, remember to enter this name when following the instructions for creating the start page. To configure Sygate On-Demand 1. In Sygate On-Demand Manager configure the following settings for the Virtual Desktop: Enable automatic switch: Select the checkbox Enable back and forward switch: Deselect the checkbox Terminate the Virtual Desktop upon closing the browser that launched the Success URL: Select the checkbox if you want SODA to shutdown automatically when the user closes the Application Portal. If the checkbox is deselected, SODA will still be running when the Application Portal is closed and the user must terminate SODA manually. 2. On the URL tab enter the URL to the client scan logon page: Example URL: Point host>/soda/wa_default.html Using this configuration the Sygate On-Demand Agent will automatically launch a browser with the start page loaded when it is started successfully. Configuring Sygate On-Demand 4

5 Copying Sygate Configuration to StoneGate To copy files and configurations produced by the Sygate On-Demand Manager to the Administration service 1. Create a folder called soda for the SODA files in the folder /data/portwise/administration-service/files/access-point/custom-files/wwwroot/soda/ 2. Copy the contents of the folder <Sygate installation folder>\sygate On-Demand\On-DemandAgent 3. Place the copied files in the folder you created When you publish the configuration in the StoneGate SSL VPN Administrator the Sygate On-Demand Manager captures the files and the configurations are automatically published to all StoneGate SSL VPN Access Points in the network. Configuring StoneGate Access Point Default Page Follow the instructions below to configure the StoneGate SSL VPN Access Point default page with correspond to the file in the previously created soda folder on the StoneGate SSL VPN Administration Service. This is the file that will launch the Sygate On-Demand Agent. To configure the Access Point default page 1. In the StoneGate SSL VPN Administrator, select Manage System in the main menu and click Access Points in the left-hand menu 2. Click the Manage Global Access Point Settings link 3. On the Client Access tab enter the following in Client Access Settings: Default Page: <location and file name of file that launches Sygate On-Demand Agent> Example /soda/index.htm 4. Click Save Using this configuration, the Sygate On-Demand Agent will automatically be launched when the user accesses the StoneGate SSL VPN Access Point. Configuring End-Point Integrity Client Scan You have now configured the Access Point default page to launch the Sygate On-Demand Agent. To protect all resources and authentication methods configured in the system, use a Global Access Rule defining that SODA must be running on the client. To verify that SODA is running, use a Sygate On-Demand Assessment Plug- In. Creating End-Point Integrity Access Rule To create a access rule defining that clients must have a running SODA process to access resources. 1. In StoneGate SSL VPN Administrator select Manage Resource Access in the main menu and click Access Rules in the left-hand menu 2. Click the Add Access Rule link 3. Enter a display name that describes what the End-Point Integrity scan will check Example Display Name: Sygate On-Demand 4. Click the Add Rule link 5. Select Assessment in the list and click Next Copying Sygate Configuration to StoneGate 5

6 6. Click Upload Plug-In and browse to the SygateOnDemand.jar file bundled with the installation 7. Click Upload Plug-In 8. Click Previous 9. Select the Sygate On-Demand Plug-In in the list of available plug-ins and click Next 10.If a newer version of the Sygate On-Demand client software is installed, verify the Process digest, otherwise use the supplied value 11.Define a customized error message or use the Default Message 12.Click Next and finish the wizard Creating Authentication Method Access Rule Follow the instructions below to create an access rule that contains the authentication methods your users may employ after the client scan has been performed. 1. In StoneGate SSL VPN Administrator select Manage Resource Access in the main menu and click Access Rules in the left-hand menu 2. Click the Add Access Rule link 3. Enter a display name that describes that the access rule contains available authentication methods Example Display Name: Authentication methods 4. Click the Add Rule link. 5. Select Authentication methods in the list and click Next. 6. Select the authentication methods you will use in the Available Authentication Methods list. Note Do not select the authentication method Client scan. 7. Click Add. The authentication methods are added to the Selected Authentication Methods list 8. Click Next. A confirmation page is displayed. The access rule is Allow user access when authenticated with <selected authentication methods> 9. Click Next. The rule Allow user access when authenticated with <selected authentication methods> is added to the Authentication methods access rule and displayed on the first page of the wizard 10.Click Next. A confirmation page is displayed for the access rule Authentication methods with the rule Allow user access when authenticated with <selected authentication methods> 11.Click Finish Wizard The access rule Authentication methods is displayed in the Registered Access Rules list on the Manage Access Rules page The next step is to protect your resources with the End-Point Integrity client scan as well as with your authentication methods using Global Access Rules. Protecting Resources Follow the instructions below to protect a resource with the End-Point Integrity Client Scan as well as with the applicable authentication methods. 1. In StoneGate SSL VPN Administrator select Manage Resource Access in the main menu and click Access Rules in the left-hand menu 2. Click the Manage Global Access Rule link 3. Select the Sygate On-Demand rule and the Authentication Access Rule in the list of available access rules 4. Click Add 5. Click Save to save the Global Access Rule The resource is now protected by the End-Point Integrity Client Scan and selected authentication methods. Configuring End-Point Integrity Client Scan 6

7 Creating Customized Start Page The next step is to create a customized HTML start page. When Sygate On-Demand is launched successfully, a browser will be started that displays the customized start page. To create a customized start page 1. Copy the default page from the folder /data/portwise/administration-service/files/access-point/built-in-files/wwwroot/ wa_default.html 2. Paste the copied file in to the newly created soda directory /data/portwise/administration-service/files/access-point/custom-files/wwwroot/soda/ 3. Open the copied HTML file using your preferred HTML editor. 4. Locate this section: <frame src= [$x:welcomepage] id= LoginArea name= LoginArea marginheight= 0 marginwidth= 0 frameborder= 0 /> 5. Replace it with this section: <frame src= /wa/_welcome.html id= LoginArea name= LoginArea marginheight= 0 marginwidth= 0 frameborder= 0 /> 6. Save and close the file. Configuring StoneGate SSL VPN Logout Page The logout page can be configured in one of two ways: either to close the browser when the user logs off from the Application Portal or to redirect the user to the customized start page. Configure Logout Page to Close Browser To configure the logout page to close the browser when the user logs off from the Application Portal 1. Copy the file _logoutpage.html found in the folder /data/portwise/administration-service/files/access-point/built-in-files/wwwroot/wa/ 2. Paste the file in the corresponding custom-files folder depending on your operating system: /data/portwise/administration-service/files/access-point/custom-files/wwwroot/wa/ 3. Open the file _logoutpage.html in your preferred HTML editor 4. Locate this section: function redirect() { window.location.href = / ; } 5. Replace it with this section: function redirect() { window.opener = top; window.close(); } 6. Save and close the file Note When using the line window.opener = top, the browser will close without informing the user. You can exclude the line from the code if you want a message to be displayed, asking the user whether the browser should be closed or not. Creating Customized Start Page 7

8 Configuring Logout Page to Redirect To configure the logout page to redirect the user to the customized start page previously configured. 1. Copy the file _logoutpage.html from the folder /data/portwise/administration-service/files/access-point/custom-files/wwwroot/wa/ 2. Paste the file in the corresponding custom-files folder /data/portwise/administration-service/files/access-point/custom-files/wwwroot/wa/ 3. Open the file _logoutpage.html in your preferred HTML editor. 4. Locate this row: window.location.href = / ; 5. Replace it with this row: window.location.href = /soda/wa_default.html ; 6. Save and close the file. Publishing Configuration For StoneGate SSL VPN Access Point and other services in the StoneGate network to receive the configuration in StoneGate SSL VPN Administrator, and to be able to access the Sygate On-Demand files copied to the StoneGate SSL VPN Administration Service, a publish is required. Publish the configuration by clicking the Publish button in the top menu in StoneGate SSL VPN Administrator. When the configuration has been successfully published it is distributed to all StoneGate services in the network. Note If you perform changes in the Sygate On-Demand Manager configuration in the future, you need to repeat the procedure of copying the Sygate On-Demand files to the StoneGate SSL VPN Administration Service. Remember that a Publish is required in StoneGate SSL VPN Administrator for the StoneGate SSL VPN Access Point to receive the configuration. Feedback Stonesoft is always interested in feedback from our users. For comments regarding Stonesoft s products, contact feedback@stonesoft.com. For comments regarding this technical note, contact documentation@stonesoft.com. Publishing Configuration 8

9 Trademarks and Patents Stonesoft, the Stonesoft logo and StoneGate are all trademarks or registered trademarks of Stonesoft Corporation. Multi-link technology, multi-link VPN, and the StoneGate clustering technology-as well as other technologies included in StoneGate-are protected by patents or pending patent applications in the U.S. and other countries. All other trademarks or registered trademarks are property of their respective owners. SSL VPN Powered by PortWise Copyright and Disclaimer Copyright Stonesoft Corporation. All rights reserved. These materials, Stonesoft products and related documentation are protected by copyright and other laws, international treaties and conventions. All rights, title and interest in the materials, Stonesoft products and related documentation shall remain with Stonesoft and its licensors. All registered or unregistered trademarks in these materials are the sole property of their respective owners. No part of this document or related Stonesoft products may be reproduced in any form, or by any means without written authorization of Stonesoft Corporation. Stonesoft provides these materials for informational purposes only. They are subject to change without notice and do not represent a commitment on the part of Stonesoft. Stonesoft assumes no liability for any errors or inaccuracies that may appear in these materials or for incompatibility between different hardware components, required BIOS settings, NIC drivers, or any NIC configuration issues. Use these materials at your own risk. Stonesoft does not warrant or endorse any third party products described herein. THESE MATERIALS ARE PROVIDED "AS-IS." STONESOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO, THE INFORMA- TION CONTAINED HEREIN. IN ADDITION, STONESOFT MAKES NO EXPRESS OR IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE OR USE WITH RESPECT THE INFORMATION CONTAINED IN THESE MATERIALS. IN NO EVENT SHALL STONESOFT BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL OR INCIDENTAL DAMAGES, INCLUD- ING, BUT NOT LIMITED TO, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING FROM THE USE OF THESE MATERIALS, EVEN IF ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH DAMAGES. SG_SVTN_2076_ Stonesoft Corp. Itälahdenkatu 22a FIN Helsinki Finland tel fax Stonesoft Inc Crown Pointe Parkway Suite 900 Atlanta, GA USA tel fax

StoneGate SSL VPN Technical Note 2081. Setting Up SSO with Citrix Presentation Server

StoneGate SSL VPN Technical Note 2081. Setting Up SSO with Citrix Presentation Server StoneGate SSL VPN Technical Note 2081 Setting Up SSO with Citrix Presentation Server Table of Contents Introduction................................... page 3 Overview.....................................

More information

StoneGate SSL VPN Technical Note 2068. Adding Bundled Certificates

StoneGate SSL VPN Technical Note 2068. Adding Bundled Certificates StoneGate SSL VPN Technical Note 2068 Adding Bundled Certificates Table of Contents Introduction................................... page 3 Overview..................................... page 3 Splitting

More information

StoneGate SSL VPN Technical Note 2069. Setting Up WPA Authentication

StoneGate SSL VPN Technical Note 2069. Setting Up WPA Authentication StoneGate SSL VPN Technical Note 2069 Setting Up WPA Authentication Table of Contents Introduction................................... page 3 Overview..................................... page 3 How WPA

More information

StoneGate SSL VPN Technical Note 2071. Setting Up BankID

StoneGate SSL VPN Technical Note 2071. Setting Up BankID StoneGate SSL VPN Technical Note 2071 Setting Up BankID Table of Contents Introduction................................... page 3 Overview..................................... page 3 StoneGate BankID Authentication

More information

Remote Firewall Deployment

Remote Firewall Deployment StoneGate How-To Remote Firewall Deployment StoneGate Firewall 3.0 and Management Center 3.5 Table of Contents The Scenario............................... page 3 Adjusting the Access Rules and NAT rules..........

More information

StoneGate SSL VPN Technical Note 2086. Setting up ActiveSync

StoneGate SSL VPN Technical Note 2086. Setting up ActiveSync StoneGate SSL VPN Technical Note 2086 Setting up ActiveSync Table of Contents Introduction................................... page 3 Overview..................................... page 3 Enabling Device

More information

Using Microsoft Active Directory Server and IAS Authentication

Using Microsoft Active Directory Server and IAS Authentication StoneGate How-To Using Microsoft Active Directory Server and IAS Authentication StoneGate Firewall/VPN 3.0.7 and Management Center 4.1 Table of Contents Basic Scenario...page 3 Configuring a Windows 2003

More information

StoneGate Firewall/VPN How-To Evaluating StoneGate FW/VPN in VMware Workstation

StoneGate Firewall/VPN How-To Evaluating StoneGate FW/VPN in VMware Workstation StoneGate Firewall/VPN How-To Evaluating StoneGate FW/VPN in VMware Workstation Created: February 14, 2008 Table of Contents Introduction to Evaluating StoneGate FW/VPN in VMware Workstation... 1 Prerequisites...

More information

VPNC Interoperability Profile

VPNC Interoperability Profile StoneGate Firewall/VPN 4.2 and StoneGate Management Center 4.2 VPNC Interoperability Profile For VPN Consortium Example Scenario 1 Introduction This document describes how to configure a StoneGate Firewall/VPN

More information

StoneGate IPsec VPN Client Release Notes for Version 4.3.0

StoneGate IPsec VPN Client Release Notes for Version 4.3.0 StoneGate IPsec VPN Client Release Notes for Version 4.3.0 Created: August 11, 2008 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility...

More information

Release Notes for Version 1.5.207

Release Notes for Version 1.5.207 Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4

More information

RELEASE NOTES. StoneGate Firewall/VPN v2.2.11 for IBM zseries

RELEASE NOTES. StoneGate Firewall/VPN v2.2.11 for IBM zseries RELEASE NOTES StoneGate Firewall/VPN v2.2.11 for IBM zseries Copyright 2006 Stonesoft Corp. All rights reserved. All trademarks or registered trademarks are property of their respective owners. Disclaimer:

More information

Strong Authentication for Juniper Networks SSL VPN

Strong Authentication for Juniper Networks SSL VPN Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

VPN CLIENT USER S GUIDE

VPN CLIENT USER S GUIDE STONEGATE IPSEC VPN 5.1 VPN CLIENT USER S GUIDE V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current

More information

Strong Authentication for Juniper Networks

Strong Authentication for Juniper Networks Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright

More information

Omniquad Exchange Archiving

Omniquad Exchange Archiving Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith

More information

Installing the BlackBerry Enterprise Server Management Software on an administrator or remote computer

Installing the BlackBerry Enterprise Server Management Software on an administrator or remote computer Installing the BlackBerry Enterprise Server Management Software on an administrator or Introduction Some administrators want to install their administrative tools on their own Windows 2000 computer. This

More information

Business Process Management IBM Business Process Manager V7.5

Business Process Management IBM Business Process Manager V7.5 Business Process Management IBM Business Process Manager V7.5 Federated task management for BPEL processes and human tasks This presentation introduces the federated task management feature for BPEL processes

More information

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

Business Portal for Microsoft Dynamics GP. Electronic Document Delivery Release 10.0

Business Portal for Microsoft Dynamics GP. Electronic Document Delivery Release 10.0 Business Portal for Microsoft Dynamics GP Electronic Document Delivery Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is

More information

Strong Authentication for Cisco ASA 5500 Series

Strong Authentication for Cisco ASA 5500 Series Strong Authentication for Cisco ASA 5500 Series with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Clearview Customer Web Access

Clearview Customer Web Access Clearview Customer Web Access This document outlines the Clearview Process flows for Logging in to Customer Web Access Service Listing o Service Order Desktop o Service Tasks o Viewing Service Schedules

More information

Symantec On-Demand 2.6/ Juniper IVE SSL VPN 5.2 Integration Guide Addendum

Symantec On-Demand 2.6/ Juniper IVE SSL VPN 5.2 Integration Guide Addendum Symantec On-Demand 2.6/ Juniper IVE SSL VPN 5.2 Integration Guide Addendum Uploading the Jedi Package: Preventing Virtual Desktop Bypass during User Access to Juniper SSL VPN Appliance Symantec On-Demand

More information

Pulse Redundancy. User Guide

Pulse Redundancy. User Guide Pulse Redundancy User Guide August 2014 Copyright The information in this document is subject to change without prior notice and does not represent a commitment on the part of AFCON Control and Automation

More information

Email Archiving User Guide Outlook Plugin. Manual version 3.1

Email Archiving User Guide Outlook Plugin. Manual version 3.1 Email Archiving User Guide Outlook Plugin Manual version 3.1 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith Road Hammersmith London W14 8TH United Kingdom Omniquad

More information

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo

More information

SafeNet Cisco AnyConnect Client. Configuration Guide

SafeNet Cisco AnyConnect Client. Configuration Guide SafeNet Cisco AnyConnect Client Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and

More information

Business Portal for Microsoft Dynamics GP. Key Performance Indicators Release 10.0

Business Portal for Microsoft Dynamics GP. Key Performance Indicators Release 10.0 Business Portal for Microsoft Dynamics GP Key Performance Indicators Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the

More information

Strong Authentication for Microsoft TS Web / RD Web

Strong Authentication for Microsoft TS Web / RD Web Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012

SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012 SOLARWINDS ORION Patch Manager Evaluation Guide for ConfigMgr 2012 About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse

More information

RedBlack CyBake Online Customer Service Desk

RedBlack CyBake Online Customer Service Desk RedBlack CyBake Online Customer Service Desk Publication Date: June 2014 Copyright Copyright 2014 RedBlack Software Ltd. All rights reserved. Complying with all applicable copyright laws is the responsibility

More information

Microsoft Dynamics GP Release

Microsoft Dynamics GP Release Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';

More information

Business Portal for Microsoft Dynamics GP. Project Time and Expense Administrator s Guide Release 10.0

Business Portal for Microsoft Dynamics GP. Project Time and Expense Administrator s Guide Release 10.0 Business Portal for Microsoft Dynamics GP Project Time and Expense Administrator s Guide Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable

More information

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass INTEGRATION GUIDE DIGIPASS Authentication for F5 FirePass Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security

More information

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide

formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656

More information

Lepide Exchange Recovery Manager

Lepide Exchange Recovery Manager Configuration Guide Lepide Exchange Recovery Manager Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights

More information

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

Application Note. Intelligent Application Gateway with SA server using AD password and OTP Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

Business Portal for Microsoft Dynamics GP 2010. Field Service Suite

Business Portal for Microsoft Dynamics GP 2010. Field Service Suite Business Portal for Microsoft Dynamics GP 2010 Field Service Suite Copyright Copyright 2010 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views

More information

Third Party System Management Integration Solution

Third Party System Management Integration Solution Third Party System Management Integration Solution Oracle Hardware Management Connector Update Catalog 1.1 for Microsoft System Center Configuration Manager 2007 A complete list of currently supported

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Microsoft Dynamics GP 2010. SQL Server Reporting Services Guide

Microsoft Dynamics GP 2010. SQL Server Reporting Services Guide Microsoft Dynamics GP 2010 SQL Server Reporting Services Guide April 4, 2012 Copyright Copyright 2012 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information

More information

Setting Up and Using the Funambol Outlook Plug-in v7

Setting Up and Using the Funambol Outlook Plug-in v7 Setting Up and Using the Funambol Outlook Plug-in v7 Contents Introduction.......................................... 2 Requirements for Plug-In Use........................... 2 Installing the Funambol

More information

Self Help Guides. Create a New User in a Domain

Self Help Guides. Create a New User in a Domain Self Help Guides Create a New User in a Domain Creating Users & Groups This document is to be used as a guide to creating users and/or groups in a Domain Server environment; 1. Windows Server Domain exists,

More information

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.

More information

Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide

Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide Symantec On-Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide ii Preface Copyright Information: Symantec Corporation Copyright

More information

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1

Lepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1 Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of

More information

AvePoint Record Rollback 3.1.2 for Microsoft Dynamics CRM

AvePoint Record Rollback 3.1.2 for Microsoft Dynamics CRM AvePoint Record Rollback 3.1.2 for Microsoft Dynamics CRM Installation and Configuration Guide Revision F Issued April 2014 1 Table of Contents Overview... 3 Obtaining the Record Rollback Solution Package...

More information

IDGo 800 Minidriver for Windows. User Guide

IDGo 800 Minidriver for Windows. User Guide IDGo 800 Minidriver for Windows User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the

More information

Configuring Active Directory with AD FS and SAML for Brainloop Secure Dataroom Setup Guide

Configuring Active Directory with AD FS and SAML for Brainloop Secure Dataroom Setup Guide Configuring Active Directory with AD FS and SAML for Brainloop Secure Dataroom Copyright Brainloop AG, 2004-2015. All rights reserved. Document version 1.0 All trademarks referred to in this document are

More information

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide

BlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide BlackBerry Web Desktop Manager Version: 5.0 Service Pack: 4 User Guide Published: 2012-10-03 SWD-20121003174218242 Contents 1 Basics... 5 Log in to the BlackBerry Web Desktop Manager... 5 Connect your

More information

2.0 HOW-TO GUIDELINES

2.0 HOW-TO GUIDELINES Version 2.0 HOW-TO GUIDELINES Setting up a VPN between a StoneGate cluster and a Cisco PIX firewall TECHN10-6/3/03 Introduction This document highlights a tested method to configure a VPN tunnel between

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

Sophos Mobile Control as a Service Startup guide. Product version: 3.5

Sophos Mobile Control as a Service Startup guide. Product version: 3.5 Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator

More information

Symantec Backup Exec 2010 R2. Quick Installation Guide

Symantec Backup Exec 2010 R2. Quick Installation Guide Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

ACT! by Sage. Premium for Workgroups 2007 (9.0) Administrator s Guide to the ACT! Reader Utility

ACT! by Sage. Premium for Workgroups 2007 (9.0) Administrator s Guide to the ACT! Reader Utility ACT! by Sage Premium for Workgroups 2007 (9.0) Administrator s Guide to the ACT! Reader Utility ACT! by Sage Premium for Workgroups 2007 (9.0) Administrator s Guide to the ACT! Reader Utility Copyright

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

NetMotion Mobility XE

NetMotion Mobility XE Implementation Guide (Version 5.4) Copyright 2012 Deepnet Security Limited Copyright 2012, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,

More information

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

SSL VPN Client Installation Guide Version 9

SSL VPN Client Installation Guide Version 9 SSL VPN Client Installation Guide Version 9 Document version 96060-1.0-08/10/2009 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,

More information

Juniper SSL VPN Authentication QUICKStart Guide

Juniper SSL VPN Authentication QUICKStart Guide Juniper SSL VPN Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights

More information

DualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited

DualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited DualShield for Implementation Guide (Version 5.2) Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks DualShield Unified Authentication, MobileID,

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Setting Up Resources in VMware Identity Manager

Setting Up Resources in VMware Identity Manager Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to AirWatch Applications

More information

Microsoft Exchange Mailbox Creation

Microsoft Exchange Mailbox Creation Microsoft Exchange Mailbox Creation The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide

Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government

More information

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide

Symantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec

More information

TIBCO Spotfire Automation Services Installation and Configuration

TIBCO Spotfire Automation Services Installation and Configuration TIBCO Spotfire Automation Services Installation and Configuration Software Release 7.0 February 2015 Updated March 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES

More information

Spam Manager. Quarantine Administrator Guide

Spam Manager. Quarantine Administrator Guide Spam Manager Quarantine Administrator Guide Spam Manager Quarantine Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

Strong Authentication for Microsoft SharePoint

Strong Authentication for Microsoft SharePoint Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Configuring and Monitoring Event Logs

Configuring and Monitoring Event Logs Configuring and Monitoring Event Logs eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document

More information

Using Internet or Windows Explorer to Upload Your Site

Using Internet or Windows Explorer to Upload Your Site Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting

More information

Web Remote Access. User Guide

Web Remote Access. User Guide Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior

More information

Deploying the Workspace Application for Microsoft SharePoint Online

Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Workspace is a method to enable Microsoft Excel-based dashboards for SharePoint Online. This

More information

Classroom Management, part of Intel Education User Manual

Classroom Management, part of Intel Education User Manual Classroom Management, part of Intel Education User Manual Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE

More information

Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide

Embedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide Embedded Document Accounting Solution (edas) for Cost Recovery Administrator's Guide September 2013 www.lexmark.com Contents 2 Contents Overview...4 Getting started...5 Understanding installation requirements...5

More information

BlackBerry Web Desktop Manager. User Guide

BlackBerry Web Desktop Manager. User Guide BlackBerry Web Desktop Manager User Guide Published: 2012-01-26 SWD-1952106-0126040849-001 Contents 1 About the BlackBerry Web Desktop Manager... 3 About the BlackBerry Business Cloud Services... 3 2 Getting

More information

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the

More information

NetVault : Backup. for Exchange Server. Recovery Manager Integration Guide. Application Plugin Module (APM) version 4.5 MEG-103-4.

NetVault : Backup. for Exchange Server. Recovery Manager Integration Guide. Application Plugin Module (APM) version 4.5 MEG-103-4. NetVault : Backup Application Plugin Module (APM) for Exchange Server version 4.5 Recovery Manager Integration Guide MEG-103-4.5-EN-01 03/31/11 Copyrights NetVault: Backup APM for Exchange Server Recovery

More information

MetaMorph Microscopy Automation & Image Analysis Software Super-Resolution Module

MetaMorph Microscopy Automation & Image Analysis Software Super-Resolution Module MetaMorph Microscopy Automation & Image Analysis Software Super-Resolution Module Version 7 Installation Instructions July 2013 This document is provided to customers who have purchased Molecular Devices

More information

Foglight Experience Monitor and Foglight Experience Viewer

Foglight Experience Monitor and Foglight Experience Viewer Foglight Experience Monitor and Foglight Experience Viewer Quest Software, Inc. April 2008 Using the Dell Remote Access Controller Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains

More information

RealPresence Media Manager Blackboard Learn 9.1 Learning Management System Integration Guide

RealPresence Media Manager Blackboard Learn 9.1 Learning Management System Integration Guide INTEGRATION GUIDE Software 6.5 September 2013 3725-75322-002 Rev A RealPresence Media Manager Blackboard Learn 9.1 Learning Management System Integration Guide RealPresence Media Manager Blackboard Learn

More information

Symantec Backup Exec TM 10d for Windows Servers

Symantec Backup Exec TM 10d for Windows Servers Symantec Backup Exec TM 10d for Windows Servers Quick Installation Guide N180808 September 2005 Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation

More information

VPN CLIENT ADMINISTRATOR S GUIDE

VPN CLIENT ADMINISTRATOR S GUIDE STONEGATE IPSEC VPN 5.1 VPN CLIENT ADMINISTRATOR S GUIDE V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then

More information

Citrix Systems, Inc.

Citrix Systems, Inc. Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change

More information

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0

Backup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0 Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

TIBCO Spotfire Automation Services 6.5. Installation and Deployment Manual

TIBCO Spotfire Automation Services 6.5. Installation and Deployment Manual TIBCO Spotfire Automation Services 6.5 Installation and Deployment Manual Revision date: 17 April 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Installation Guide Installing / Licensing / Unlocking Kepware Products

Installation Guide Installing / Licensing / Unlocking Kepware Products Installation Guide Installing / Licensing / Unlocking Kepware Products License Registration & Unlock online at https://my.kepware.com/mykepware Kepware Technologies is a private software development company

More information