EBL Authentication Ebooks Corporation

Size: px
Start display at page:

Download "EBL Authentication Ebooks Corporation"

Transcription

1 EBL Authentication Ebooks Corporation Ebooks Corporation Limited Washington D.C Brookville Road Chevy Chase, MD USA Tel: +1 (301) Fax: +1 (240) Perth 62 Bay View Terrace Claremont WA 6010 Australia Tel: +61 (0) Fax: +61 (0) Melbourne 2/3 Robe Street St Kilda VIC 3182 Australia Tel +61 (0) Fax +61 (0)

2 Table of Contents 1 INTRODUCTION...3 Overview AUTHENTICATION INTEGRATION...6 IP-Address Configuration...6 Unique Identifier...6 EZProxy...7 EZProxy Versions...7 Configuration forezproxy 3.0 and Configuration for EZProxy Athens Authentication Setting up Athens...10 Shared Secret Outline...11 Detailed Design...12 Token Based Authentication Token...14 Validation...14 Log-in Authentication Creating patron upload file...15 Uploading patron file...15 Customised permissions based on patron type...16 Download Permission Configuration- internal vs. external access...16 Global On/OFF...16 IP Based...17 Token Based...17 Copyright 2005, Ebooks Corporation Limited

3 1 Introduction In setting up authentication to your library s EBL portal, our aim is to protect patron privacy while ensuring secure Digital Rights Management (DRM) and comprehensive usage statistics. Seamless authentication also ensures that use of your ebook collection is reserved only for access by recognized patrons of your library. Wherever possible, we will work with you to integrate with your library s existing authentication procedures. To that end, EBL has designed its authentication processes to be broadly compatible with existing library authentication and can work with your library directly to find a streamlined way to use your existing authentication systems. Access to EBL is generally managed using a combination of IP recognition and some form of user ID. If your library is able to refer patrons to the EBL portal from a common IP range, then we will restrict access to the IP range you specify. This can be facilitated through a proxy server, VPN access or other process. IP restriction guarantees that use of your ebook collection is limited to patrons coming from your network. In order to properly manage circulation of ebook and copyright permissions per use, EBL requires that each patron accessing Ebook Library is authenticated and passed through with some form of unique identifier. EBL offers a variety of user authentication methods, customized to the existing technology and processes of each of our library customers. This document highlights some of the more commonly deployed authentication methods, including: Integrated EZProxy encrypted authentication Athens Authentication Token based Authentication Shared Key Direct Patron login These processes are explained in this document. Please peruse all and choose the best one for your set up. In each case, we have provided a few examples of how we have integrated with libraries existing authentication protocols. This document deals only with authentication processes for the patron portal. Access to LibCentral, our library management portal, uses direct log-in. Copyright 2005, Ebooks Corporation Limited 3

4 Overview To verify a patron s identification and access permissions, EBL controls DRM settings at the individual patron level. The EBL system utilizes a combined method of IP recognition plus individual identification, via a unique, consistent, and privacy-sensitive identifier. The authentication system works as follows: The patron s IP range is checked against the registered IP address of the library. 1. If the IP address is within the range, or none has been specified, then they pass to the authentication strategy check. 2. If the IP address is incorrect, then the system checks whether they have an authentication URL entered into the system settings (this would generally be the local library log-in screen) and they are sent to that URL for authentication and rechecked for the IP-address range. 3. If they don t have an authentication strategy, they are denied access. 4. After the IP check is passed, the authentication strategy is checked. Copyright 2005, Ebooks Corporation Limited 4

5 5. In the event that the library has not elected to set up an integrated authentication process, the system will default to EBL s Direct Patron Login, which asks the patron to enter an individual user name and password for access to the EBL Patron site. However, more commonly, libraries elect a more streamlined and seamless process of integrated authentication. Using integrated authentication, EBL communicates behind the scenes with the library s own systems to obtain unique log in details and/or patron authentication. For example: If the library has an OPAC or LDAP system that the patron logs into, the log in details can be passed to EBL as a parameter in the URL string or via other methods. If the library uses EZProxy, this identifier will be one-way encrypted during the referral process to ensure that the patron s identify is completely anonymous and untraceable once it reaches the EBL system. If the library uses Athens or another user system for example, the EBL server will contact the Athens server to verify the user s identification. Once the user ID is authenticated via one of these routes, the patron is considered approved and is taken directly into the to the requested ebook record or to the EBL welcome page. Copyright 2005, Ebooks Corporation Limited 5

6 2 Authentication Integration The following section outlines several different methods of connecting to EBL depending on your current library authentication or login system. We are developing new methods continually and understand that each library system is unique. We are willing to work with libraries, listening to their individual requirements, in order to customize an authorization procedure that best fits their needs. If you have EZProxy or Athens authentication, please refer to these sections, below. If you use another authentication system, EBL s token-based system may be your best starting point. Or, if none of these scenarios applies, you may want to consider EBL s Direct Patron Login or discuss with your account manager a customized solution to suit your requirements. In addition to providing you with this authentication reference document, it is customary to plan an initial-stage conference call between your systems staff and our technicians to discuss your requirements and issues and plan a best-way forward together. Some basics: IP-Address Configuration It is recommended that this additional security check is used if possible. If your library is able to supply a limited list of IP addresses from which your patrons will be accessing EBL, we will restrict access to only allow requests coming from those IP addresses. Libraries can have one or more ranges of IP addresses, as well as one or more specific IP addresses. There is no limit to the number of ranges or specific IP addresses that can be used. If available, please provide your account manager with the required IP Addresses. Unique Identifier A unique identifier is required for each patron who accesses the EBL system. This is used to control DRM rights for that user and to differentiate between patrons using the same inhouse library computers. If the authentication is conducted on the library s own system, a unique, encrypted identifier will be passed through to EBL at the time of requested access. This identifier can be a student number or any other consistent, unique ID. It can be encrypted to assure the patron s anonymity, provided that the information passed through is the same for that user on subsequent visits to the EBL system. Copyright 2005, Ebooks Corporation Limited

7 EZProxy If your library is using EZProxy as an intermediary server between your library s patrons and licensed content providers, the process generally occurs as follows: 1. Your patrons connect to EZProxy 2. The EZProxy system communicates with your licensed content provider or database system 3. The requested content (userid) is sent to EBL via EZProxy for patron access Since EZProxy runs on a machine located on your network, EBL sees the requests as coming from an IP address on your network and permits access. This is what EBL calls Web Authentication. EZProxy Versions Any version of EZProxy will work, but there are a few options depending on which version you have. The difference are summarised as: 3.0a or previous The standard version of EZProxy (previous to 3.0a GA) will send the information to EBL unencrypted. 3.0a GA (Encryption) To encrypt this information, EZProxy versions 3.0a GA and later contain the functionality to allow userid to be encrypted before being passed to EBL. To use the encrypted method, download the updated version of EZProxy: In the encrypted version, the EZProxy admin menu displays a new "Decrypt User Variable" option whenever EncryptVar appears in ezproxy.cfg. This option allows the EZProxy administrator to enter an encrypted value and see what the original plain-text value was. 3.2 (Security) Version 3.2 has added security for a library which adds a key to the authentication message sent to EBL. This key is also stored by EBL to verify that the user has come from the library authentication system which matches the URL that they re accessing. Configuration for EZProxy 3.0 and 3.1 These are the configuration changes needed for Ebook Library to be recognized as a database by EZproxy. 1. The file ezproxy.cfg will require an addition entry, as follows. Title Ebook Library URL Domain eblib.com Copyright 2005, Ebooks Corporation Limited 7

8 2. Modifications in ezpauth.pl, StartSession: Make sure the variable loguser is included in the $query variable. The value for loguser is used to pass the userid onto Ebook Library. Case Study Curtin University has successfully integrated their EZProxy 3.0 with EBL s system. The following is an explanation of their set up XX To pass the userid in the first place we needed to modify our login scripts to collect the userid and then pass it to EZproxy in the loguser variable. EZproxy then encrypts the value and places it wherever the ^u is located in the URL. The ezproxy.cfg file needed to have the option turned on to deal with userid being passed. The entry to added was OPTION LOGUSER The configuration for EBL: Title EBL EncryptVar u astringwechose URL DJ eblib.com HJ HJ HJ HJ : XX Configuration for EZProxy 3.2 These are the configuration changes needed for Ebook Library to be recognized as a database by EZproxy. 1. The file ezproxy.cfg will require an addition entry, as follows. Title ebook Library EBLSecret asecretstring URL DomainJavascript eblib.com 2. Modifications in ezpauth.pl, StartSession: Make sure the variable loguser is included in the $query variable. The value for loguser is used to pass the userid onto Ebook Library. Case Study University or New England has successfully integrated their EZProxy 3.2 with EBL s system. The following is an explanation of their set up XX Copyright 2005, Ebooks Corporation Limited 8

9 To pass the userid in the first place we needed to modify our login scripts to collect the userid and then pass it to EZproxy in the loguser variable. EZproxy then encrypts the value and places it wherever the ^u is located in the URL. The ezproxy.cfg file needed to have the option turned on to deal with userid being passed. The entry to added was OPTION LOGUSER The configuration for EBL: Title ebook Library EBLSecret asecretstring URL DomainJavascript eblib.com DomainJavascript eblib.com.au DomainJavascript * XX Copyright 2005, Ebooks Corporation Limited 9

10 Athens Authentication Athens is a central repository of organizations, usernames and passwords with associated rights. It has extensive account management facilities for organizations to create and manage usernames and passwords, and to allocate rights to individual usernames. The following diagram provides a detail on how a user is authenticated in Athens. (Ebook Library is the DSP service). 1. A library subscribes to the DSP (EBL), and is allocated a customer reference with associated rights. 2. EBL informs Athens that this library now has access to EBL. 3. When a patron tries to view a page on EBL, we send the patron to the Athens Authentication Point (AAP). The AAP is managed by Athens, and provides a central login form for the patron to enter their Athens credentials. 4. The patron enters their username and password at the AAP, and is sent back to EBL. 5. EBL then decides if the user has the correct permissions to access. Setting up Athens Please provide your account manager with your Athens name and organizational identifier. If you aren t registered with Athens and would like to join, the Athens website contains all the information needed. To register for Athens see their web page Copyright 2005, Ebooks Corporation Limited 10

11 Shared Key When a library student or staff user searches for a book in their online catalogue they will be presented with a link to EBL if that book is also available in ebook format. When they click this link, a server process, to be developed and run on Library s servers, will check to see if the current user is authenticated within their OPAC System. If they do not have a current active session, a login will be required, after which their request will be forwarded to EBL for processing. Attached to that request by the CGI process will be a series of required parameters that together as a whole will ensure the integrity of the access request. EBL will be able to process these parameters and know with a surety that the request originated from an authenticated library user. This process will be encapsulated within a single request that will be able to both Authenticate and Authorise access to requested resource. The key to the single request Authentication and Authorisation procedure shall be known as a Shared Secret. This will be an agreed value/token/string between the library and EBL that will be used as a Seed value to the encryption process to provide a hash value parameter on each request. Without knowledge of this shared key it is impossible to generate an identical request and gain access to EBL. Outline The following diagram outlines the steps involved in performing the seamless login into EBL for both internal and external library staff and students. User clicks Proxified URL link in their Catalogue search results to view the ebook in EBL Internal Library Users Library Catalogue External Library Users CGI Authentication Server Adds the following Parameters to the Request if the user is successfully Authenticated: 1. Unique User Id 2. UNIX Timestamp 3. Hash value of previous three (3) parameters plus the shared secret key. Shared Secret eg: F942E4C8A76EE0A1 Ebook Library Processes request with Authentication Parameters: 1. Regenerates Hash value with Shared Key 2. Compare result with the received hash 3. If All values match the user is Authorised to access EBL and a new session is created. Access is granted. Otherwise, the user is returned to a known Authentication URL where they must establish their credentials. Library / EBL Patron Authentication Process Copyright 2005, Ebooks Corporation Limited 11

12 Detailed Design The following authentication protocol is dependant on both EBL and the Library holding the Shared encryption seed key. 1. A Library user (either staff or student) searches for a book within the online catalogue. 2. They click the search result to view the full details of that book. 3. If the selected book is one that the library has purchased for their EBL catalogue, then when the page is rendered, there will be an additional link on the page to access the ebook version of the title within EBL. 4. This link will be a Proxified Link meaning that it contains the URL of the Library s CGI Authentication Server, along with enough information to determine where to send the user once their credentials have been established. A proxified link could look something like this: ron&extendedid=p_204038_0 where: is the URL of the CGI Authentication server process. The parameter url is the target URL to forward the request to once the users credentials have been verified. 5. When the CGI Authentication Server receives the request it authenticates the user. This can be by either redirecting them to a login page or verifying with the library login system that the user has a current active session. This is a process specific to the library and will need to be coded accordingly by the library s IT department. 6. If the user is authenticated, the CGI Server will append to the forwarding url listed above these parameters a unique user Id, the current timestamp, and a hash value of all of these parameters. The following details the constraints for each of these parameters: Unique User Id: this can be a string value up to 255 characters in length. This can be either an encrypted/hashed value or clear text. The only requirement is that it be traced back to the correct user. It can either be unique to the same user every time they visit EBL, or else can be traced according to the date/time of the session. Current Timestamp: this is a UNIX Timestamp (the current time in seconds since the epoch). This will be used to check to ensure that it does not fall outside a specific window of time, eg: 5 mins in the past or the future Hash Value: this is a combined value (a string for example) of each of the previous 3 values concatenated together, then one way hashed using an MD5 or SHA-1 Algorithm and the Shared Key as a seed to this process. The forwarding URL could look something like this (using MD5): Copyright 2005, Ebooks Corporation Limited 12

13 d= &tstamp= &id=4c4cfe5961e5c56610b821d071737e8d Where the id parameter is generated as follows: User Id + Timestamp + Shared Secret " " + " " + "F942E4C8A76EE0A1" Results in: " F942E4C8A76EE0A1" - this is the value that actually gets hashed. Note: the order of the above Hash input string concatenation is essential. Each value must be concatenated without any delimiter The resulting concatenated string is then hashed to produce: MD5: SHA-1: 4C4CFE5961E5C56610B821D071737E8D CB E C56276A1ABB 1. Once generated, the request is then forwarded to the new URL. (eg: sending a redirect back to the user s browser this could use a self submitting form which POSTs the parameters or as a simple http redirect directive.) 2. Once EBL receives the request it extracts the authorisation parameters from the query string, generates the same concatenated string as shown above, and then hashes the string to generate the hash value. 3. Check the Hash value sent in the request matches the one generated by EBL using its copy of the shared key. 4. The received timestamp is then checked to make sure that it is no more than a maximum (eg: 5 mins) number of minutes in the past or the future. 5. If everything matches, the user is logged into EBL and a session is established. 6. The target URL is then stripped of all of the unnecessary tokens that were used for authentication, and the request is then forwarded to the target URL where the user will be presented with the requested page. This ensures that if someone bookmarks the target page cannot return later without completing the correct authentication procedure etc 7. They are then presented with the requested page. 8. If any one of these steps fails to produce an identical result, login is denied and the user is returned to a known Authentication URL to establish their credentials. Copyright 2005, Ebooks Corporation Limited 13

14 Token Based Authentication For libraries which would like to use their library authentication system, this token based method can be used if you can send through the token as part of the URL. For the libraries security, you should also configure your system to send a request object with authentication information for validation. Token The userid is an essential token needed by EBL. This needs to be a unique number or string which is only used by one patron. A good ID to use could be the patron s library card number. For example: Within EBL LibCentral (library portal) you can set up one or several patron types which have different access privileges. For example, you might have a patrol type called 'student' and one called 'librarian' where the librarian patron is allowed to view all ebooks (owned and non-owned) where a student can only view owned books. In this case, you would need to send through the patron type (External Type Name) as well. For example: Please see section 7.3 Managing Patron Types, in the librarian Help Guide, for more information on patron types. You can download this guide by logging into your librarian portal and clicking on the help link in the top right corner. If you are setting downloads according to the patron location, then this information will need to be added to the URL also. For an internal patron: For example: loc=int Validation Authentication information needs to be added to the request object which tells EBL that the user is valid and ensures that the URL hasn t been created without authentication. Example in java: request.setattribute("valid", "true"); or: request.setattribute("ncsu_validation", "ACCESS_GRANTED"); Copyright 2005, Ebooks Corporation Limited

15 Log-in Authentication The EBL Patron management system can be used by libraries that don t use an internal authentication strategy. Patrons from these libraries will be directed to the EBL Patron log in page where they will enter their username and password to gain entry to EBL. The username and password database is administered by the library through the LibCentral Librarian portal. Patrons and patron types can be added, modified and deleted one-by-one or by using the upload function. Creating patron upload file Create a csv or tab delimited file following these rules: One user per line Each line contains username, password, patron type Separated by either a comma or tab depending on file type Notes: Username is the only required field Missing password or patron type will use default For reference, see Section 7.4 of the Library Help Guide Uploading patron file These controls are found in Administration -> Import Patrons 1. Browse to the location of the saved patron upload file 2. Select whether it s a csv or tab delimited file 3. Choose how to deal with existing patrons and click the Import Patrons button Notes: Ignore existing patrons will not upload a patron if the patron already exists in the system. Update existing patrons will over write a patron if the same username exists as well as uploading new patrons. Copyright 2005, Ebooks Corporation Limited 15

16 Customised permissions based on patron type EBL controls specific access permissions at the PATRON TYPE level. If your library is also able to pass a token identifying which type of patron is accessing the system along with the patron ID in the URL, you can take advantage of these more advanced custom settings. Some of these custom settings include: Whether or not a patron can see non-owned ebooks in the portal Length of loan for downloaded ebooks Access to pay-per-view or title request or auto-purchase for non-owned titles Ability to download ebooks on public computers If the patron was being authenticated by your library system and you were also sending the Unique user id and patron type as tokens, the URL would look like similar to this: Identifying the patron type is NOT a requirement for EBL authentication. Rather, this process is available to libraries wishing to add a deeper level of granularity in access permissions. Those libraries that cannot or wish not to identify patron type in the authentication process will use default patron permissions that will be consistent for all users. Download Permission Configuration- internal vs. external access Depending on your library s computer or network set-up, you may wish to restrict downloading ebooks to public computers. Restricting download still enables patrons on the library s public computers to read online in the browser-based reader. Depending on your Authentication set up, the download permissions can be set by identifying PATRON TYPE or location of access (internal or external) at the time of authentication. We can determine download permission in a number of ways: Global On/OFF This method is used where internal ip addresses cannot be specified so the download permissions cannot be set according to whether the patron is internal or external. The library can set this to be on or off for all patrons. Global ON means that patrons will be able to read online and also download the ebook to their PC. Global OFF means that the patron Copyright 2005, Ebooks Corporation Limited 16

17 will only be able to read online, and not download to their PC. Global On/OFF permissions can be set in the SYSTEM SETTINGS in LibCentral. IP Based IP Based means you can set whether a patron type can download ebooks according to whether they're internal or external. You need to be able to define ip addresses which are internal only and register these with EBL. Download permissions IP-based identifier will be set at the PATRON TYPE level. Token Based For token based you must be able to send a token in the URL which the patron uses to access EBL. For example: Where loc = parameter name int = value is internal ext = value is external Your account manager will provide you with further information on customizing these settings and will assist you in setting these patron permissions in LibCentral before your account is activated. Copyright 2005, Ebooks Corporation Limited 17

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

Sophos Mobile Control as a Service Startup guide. Product version: 3.5

Sophos Mobile Control as a Service Startup guide. Product version: 3.5 Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator

More information

Chapter 7 Managing Users, Authentication, and Certificates

Chapter 7 Managing Users, Authentication, and Certificates Chapter 7 Managing Users, Authentication, and Certificates This chapter contains the following sections: Adding Authentication Domains, Groups, and Users Managing Certificates Adding Authentication Domains,

More information

User Guide. Version R91. English

User Guide. Version R91. English AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

PCS Clinical Audit Tool User Guide

PCS Clinical Audit Tool User Guide PCS Clinical Audit Tool User Guide Version 3.4 PART 1 INSTALLATION AND CONFIGURATION Company Contacts Sydney (Head Office) Pen Computer Systems Level 6, The Barrington 10-14 Smith St PARRAMATTA NSW 2150

More information

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background

Customer Tips. Xerox Network Scanning HTTP/HTTPS Configuration using Microsoft IIS. for the user. Purpose. Background Xerox Multifunction Devices Customer Tips June 5, 2007 This document applies to these Xerox products: X WC Pro 232/238/245/ 255/265/275 for the user Xerox Network Scanning HTTP/HTTPS Configuration using

More information

TELNET CLIENT 5.11 SSH SUPPORT

TELNET CLIENT 5.11 SSH SUPPORT TELNET CLIENT 5.11 SSH SUPPORT This document provides information on the SSH support available in Telnet Client 5.11 This document describes how to install and configure SSH support in Wavelink Telnet

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Getting Started with AD/LDAP SSO

Getting Started with AD/LDAP SSO Getting Started with AD/LDAP SSO Active Directory and LDAP single sign- on (SSO) with Syncplicity Business Edition accounts allows companies of any size to leverage their existing corporate directories

More information

SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.

SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7. Enabling Integrated Windows Authentication For CitectSCADA Web Client Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.xx Summary: What is the difference between Basic Authentication and Windows

More information

Setting up single signon with Zendesk Remote Authentication

Setting up single signon with Zendesk Remote Authentication Setting up single signon with Zendesk Remote Authentication Zendesk Inc. 2 Zendesk Developer Library Introduction Notice Copyright and trademark notice Copyright 2009 2013 Zendesk, Inc. All rights reserved.

More information

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks

SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the

More information

Copyright: WhosOnLocation Limited

Copyright: WhosOnLocation Limited How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and

More information

User guide. Business Email

User guide. Business Email User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook

More information

RemotelyAnywhere Getting Started Guide

RemotelyAnywhere Getting Started Guide April 2007 About RemotelyAnywhere... 2 About RemotelyAnywhere... 2 About this Guide... 2 Installation of RemotelyAnywhere... 2 Software Activation...3 Accessing RemotelyAnywhere... 4 About Dynamic IP Addresses...

More information

Fireware How To Authentication

Fireware How To Authentication Fireware How To Authentication How do I configure my Firebox to authenticate users against my existing RADIUS authentication server? Introduction When you use Fireware s user authentication feature, you

More information

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4 Contents Before You Start 2 Configuring Rumpus 3 Testing Accessible Directory Service Access 4 Specifying Home Folders 4 Open Directory Groups 6 Maxum Development Corp. Before You Start Open Directory

More information

Bentley CONNECT Dynamic Rights Management Service

Bentley CONNECT Dynamic Rights Management Service v1.0 Implementation Guide Last Updated: March 20, 2013 Table of Contents Notices...5 Chapter 1: Introduction to Management Service...7 Chapter 2: Configuring Bentley Dynamic Rights...9 Adding Role Services

More information

Creating a User Profile for Outlook 2013

Creating a User Profile for Outlook 2013 Creating a User Profile for Outlook 2013 This document tells you how to create a user profile for Outlook 2013 on your computer (also known as the Outlook client). This is necessary, for example, when

More information

Using Foundstone CookieDigger to Analyze Web Session Management

Using Foundstone CookieDigger to Analyze Web Session Management Using Foundstone CookieDigger to Analyze Web Session Management Foundstone Professional Services May 2005 Web Session Management Managing web sessions has become a critical component of secure coding techniques.

More information

In this topic we will cover the security functionality provided with SAP Business One.

In this topic we will cover the security functionality provided with SAP Business One. In this topic we will cover the security functionality provided with SAP Business One. 1 After completing this topic, you will be able to: Describe the security functions provided by the System Landscape

More information

Configuring Single Sign-on for WebVPN

Configuring Single Sign-on for WebVPN CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

Setting Up One Search

Setting Up One Search Your teachers and students can take advantage of your school s subscription databases all in one place through Destiny One Search. One Search saves staff and patrons time and effort by letting them search

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

ADFS Integration Guidelines

ADFS Integration Guidelines ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS

More information

Virtual Appliance Setup Guide

Virtual Appliance Setup Guide The Barracuda SSL VPN Vx Virtual Appliance includes the same powerful technology and simple Web based user interface found on the Barracuda SSL VPN hardware appliance. It is designed for easy deployment

More information

Parental Control Setup Guide

Parental Control Setup Guide Parental Control Setup Guide This guide will show you how to setup parental controls on your Genexis router. The parental controls used in this guide are provided by OpenDNS. By using this you can either

More information

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

DIGIPASS Authentication for Sonicwall Aventail SSL VPN DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties

More information

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

WiNG5 CAPTIVE PORTAL DESIGN GUIDE WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated

More information

SchoolBooking SSO Integration Guide

SchoolBooking SSO Integration Guide SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Your Archiving Service

Your Archiving Service It s as simple as 1, 2, 3 This email archiving setup guide provides you with easy to follow instructions on how to setup your new archiving service as well as how to create archiving users and assign archiving

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

EM Single Sign On 1.2 (1018)

EM Single Sign On 1.2 (1018) (1018) 2015 VoIP Integration July 27, 2015 Table of Contents Product Overview... 3 Requirements... 3 Application Requirements... 3 Call Manager... 3 Network Connectivity... 3 EM Profile Requirements...

More information

SETUP AND OPERATION GUIDE CLOUD PRINT. Version 1.0. January 2015. 2015 KYOCERA Document Solutions UK

SETUP AND OPERATION GUIDE CLOUD PRINT. Version 1.0. January 2015. 2015 KYOCERA Document Solutions UK SETUP AND OPERATION GUIDE CLOUD PRINT Version 1.0 January 2015 2015 KYOCERA Document Solutions UK HyPAS TM and TASKalfa TM are trademarks of the KYOCERA Companies. Other company names in this guide may

More information

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x

Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies

More information

The Simple Submission URL. Overview & Guide

The Simple Submission URL. Overview & Guide The Simple Submission URL Overview & Guide Simple Submission URL (ssurl) What is a Simple Submission URL? A Simple Submission URL allows you to provide a Write a Review link that takes a potential contributor

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

IP Phone Service Administration and Subscription

IP Phone Service Administration and Subscription CHAPTER 6 IP Phone Service Administration and Subscription Cisco CallManager administrators maintain the list of services to which users can subscribe. These sections provide details about administering

More information

BioOne Librarian Tip Sheet Series. Using the Administration Panel

BioOne Librarian Tip Sheet Series. Using the Administration Panel BioOne Librarian Tip Sheet Series Using the Administration Panel How to Access My BioOne User Profile 1. From the BioOne homepage (www.bioone.org), please click on the Log in link in the upper right-hand

More information

Active Directory Self-Service FAQ

Active Directory Self-Service FAQ Active Directory Self-Service FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

4 - TexShare and HARLiC CARDS http://www.pvamu.edu/pages/3693.asp ( Online Application Form) 5 REMOTE ACCESS TO DATABASES

4 - TexShare and HARLiC CARDS http://www.pvamu.edu/pages/3693.asp ( Online Application Form) 5 REMOTE ACCESS TO DATABASES The Library will email articles if they are in electronic format already. Patrons must complete a Distance Education Materials Request Form in order to receive articles. Please note, however, that we will

More information

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? Enterprise Computing & Service Management How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend

More information

EDINBURGH UNIVERSITY PRESS LIBRARIAN ADMINISTRATION USER GUIDE http://www.euppublishing.com

EDINBURGH UNIVERSITY PRESS LIBRARIAN ADMINISTRATION USER GUIDE http://www.euppublishing.com EDINBURGH UNIVERSITY PRESS LIBRARIAN ADMINISTRATION USER GUIDE http://www.euppublishing.com Journal Subscription Activation... 1 1. Register as an Individual User... 1 2. Subscription Confirmation Email...

More information

Citrix Access on SonicWALL SSL VPN

Citrix Access on SonicWALL SSL VPN Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring

More information

USING MYWEBSQL FIGURE 1: FIRST AUTHENTICATION LAYER (ENTER YOUR REGULAR SIMMONS USERNAME AND PASSWORD)

USING MYWEBSQL FIGURE 1: FIRST AUTHENTICATION LAYER (ENTER YOUR REGULAR SIMMONS USERNAME AND PASSWORD) USING MYWEBSQL MyWebSQL is a database web administration tool that will be used during LIS 458 & CS 333. This document will provide the basic steps for you to become familiar with the application. 1. To

More information

Configure Cisco Unified Customer Voice Portal

Configure Cisco Unified Customer Voice Portal Cisco Unified Customer Voice Portal Configuration, page 1 Configure Gateways, page 1 Transfer Unified CVP Scripts and Media Files, page 2 Unified Customer Voice Portal Licenses, page 2 Configure SNMP,

More information

VPN Web Portal Usage Guide

VPN Web Portal Usage Guide VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET

More information

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 (

How To Configure A Kiwi Ip Address On A Gbk (Networking) To Be A Static Ip Address (Network) On A Ip Address From A Ipad (Netware) On An Ipad Or Ipad 2 ( UAG715 Support Note Revision 1.00 August, 2012 Written by CSO Scenario 1 - Trunk Interface (Dual WAN) Application Scenario The Internet has become an integral part of our lives; therefore, a smooth Internet

More information

Central Desktop Enterprise Edition (Security Pack)

Central Desktop Enterprise Edition (Security Pack) Central Desktop Enterprise Edition (Security Pack) The Central Desktop Security Pack is included in the Enterprise Edition of Central Desktop. The Enterprise Edition is for companies and organizations

More information

Smart Card Authentication. Administrator's Guide

Smart Card Authentication. Administrator's Guide Smart Card Authentication Administrator's Guide October 2012 www.lexmark.com Contents 2 Contents Overview...4 Configuring the applications...5 Configuring printer settings for use with the applications...5

More information

Contents Release Notes... ... 3 System Requirements... ... 4 Administering Jive for Office... ... 5

Contents Release Notes... ... 3 System Requirements... ... 4 Administering Jive for Office... ... 5 Jive for Office TOC 2 Contents Release Notes...3 System Requirements... 4 Administering Jive for Office... 5 Getting Set Up...5 Installing the Extended API JAR File... 5 Updating Client Binaries...5 Client

More information

Admin Quick Start Guide

Admin Quick Start Guide Getting Started TIBCO Slingshot Admin Quick Start Guide v1.8.1 1. September 2, 2011 Configuring Slingshot Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

ABB solar inverters. User s manual ABB Remote monitoring portal

ABB solar inverters. User s manual ABB Remote monitoring portal ABB solar inverters User s manual ABB Remote monitoring portal List of related manuals Title ABB Remote monitoring portal User s manual NETA-01 Ethernet adapter module User s manual Code (English) 3AUA0000098904

More information

Configuring the Watchguard Edge for RADIUS authentication

Configuring the Watchguard Edge for RADIUS authentication Watchguard Edge and the CRYPTOCard CRYPTO-MAS hosted RADIUS authentication service Mark Slater 6 th December 2008 Problem Watchguard introduced RADIUS authentication into their Edge range of firewall appliances

More information

How To Use Touchtone.Com'S Digital Phone Service Web Portal User Guide (For Ip Phones) On A Pc Or Ip Phone (For A Cell Phone) On Pc Or Mac) On Your Ip Phone On A Mac Or Ip Cell Phone On

How To Use Touchtone.Com'S Digital Phone Service Web Portal User Guide (For Ip Phones) On A Pc Or Ip Phone (For A Cell Phone) On Pc Or Mac) On Your Ip Phone On A Mac Or Ip Cell Phone On Digital Phone Service Web Portal User Guide TouchTone provides subscribers an easy-to-use Web-based administrator portal to help manage your IP phone s features and call routing functions. In this document

More information

VP-ASP Shopping Cart Quick Start (Free Version) Guide Version 6.50 March 21 2007

VP-ASP Shopping Cart Quick Start (Free Version) Guide Version 6.50 March 21 2007 VP-ASP Shopping Cart Quick Start (Free Version) Guide Version 6.50 March 21 2007 Rocksalt International Pty Ltd support@vpasp.com www.vpasp.com Table of Contents 1 INTRODUCTION... 3 2 FEATURES... 4 3 WHAT

More information

Defender 5.7 - Token Deployment System Quick Start Guide

Defender 5.7 - Token Deployment System Quick Start Guide Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register

More information

qliqdirect Active Directory Guide

qliqdirect Active Directory Guide qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect

More information

H3C SSL VPN RADIUS Authentication Configuration Example

H3C SSL VPN RADIUS Authentication Configuration Example H3C SSL VPN RADIUS Authentication Configuration Example Copyright 2012 Hangzhou H3C Technologies Co., Ltd. All rights reserved. No part of this manual may be reproduced or transmitted in any form or by

More information

Deltek Touch Time & Expense for GovCon. User Guide for Triumph

Deltek Touch Time & Expense for GovCon. User Guide for Triumph Deltek Touch Time & Expense for GovCon User Guide for Triumph November 25, 2014 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical or

More information

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report

Xerox Multifunction Devices. Verify Device Settings via the Configuration Report Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

Managed Security Web Portal USER GUIDE

Managed Security Web Portal USER GUIDE Managed Security Web Portal USER GUIDE CONTENTS 1.0 Introduction 4 2.0 Login 4 3.0 Portal Layout 4 3.1 Home Tab 5 3.2 Web Filtering Tab 5 3.3 SSL VPN Users Tab 6 4.0 Web Filtering Administration 7 4.1

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend the MS Remote Desktop for Mac client.

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013 The information contained

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2

Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2 Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2 End-User Authentication Using Active Directory and Network Policy Server C ONTENTS Introduction to NPS Authentication with AD... 2 Registering the NPS

More information

Chapter 8 Advanced Configuration

Chapter 8 Advanced Configuration Chapter 8 Advanced Configuration This chapter describes how to configure the advanced features of your ProSafe 802.11g Wireless VPN Firewall FVG318. Configuring Dynamic DNS If your network has a permanently

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

PageScope Router. Version 1.5. Configuration Guide

PageScope Router. Version 1.5. Configuration Guide PageScope Router Version 1.5 Configuration Guide Table of Contents TABLE OF CONTENTS... 2 1. Introduction...3 1.1 IP Address and Domain Name...3 2. Sending Files to PageScope Router...4 2.1 MFP Device

More information

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. 1. Setting up your network to allow incoming connections on ports used by Eyemax system. Default ports used by Eyemax system are: range of ports 9091~9115

More information

Eclipse.Net Hosted Librarian Guide

Eclipse.Net Hosted Librarian Guide v1.2 Eclipse.Net Hosted Librarian Guide Everything the librarian needs to know to get started. Installing Silverlight: It is a requirement of the application for you to have Silverlight installed on any

More information

Configuring and Monitoring SiteMinder Policy Servers

Configuring and Monitoring SiteMinder Policy Servers Configuring and Monitoring SiteMinder Policy Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

IBM i Version 7.2. Security Service Tools

IBM i Version 7.2. Security Service Tools IBM i Version 7.2 Security Service Tools IBM i Version 7.2 Security Service Tools Note Before using this information and the product it supports, read the information in Notices on page 37. This edition

More information

RingCentral Office. Configure Grandstream phones with RingCentral. To contact RingCentral, please visit www.ringcentral.com or call 1-800-574-5290.

RingCentral Office. Configure Grandstream phones with RingCentral. To contact RingCentral, please visit www.ringcentral.com or call 1-800-574-5290. TM RingCentral Office Configure Grandstream phones with RingCentral Configuring Grandstream phones Overview... 2 Getting ready to setup your Grandstream phones... 2 Configuring the Grandstream Phone...

More information

Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning

Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux

More information

User Guide. You will be presented with a login screen which will ask you for your username and password.

User Guide. You will be presented with a login screen which will ask you for your username and password. User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that

More information

DCH File Transfer Application User Manual

DCH File Transfer Application User Manual DCH File Transfer Application User Manual Table of Contents HIPAA Compliancy Statement 3 Overview 4 General.4 Getting Started 4 Screen Basics...4 Accessing the File Transfer application...5 Single Sign

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Your Question. Net Report Answer

Your Question. Net Report Answer Your Question Article: 00120 Question: How to Configure External Authentication for Net Report Web Portal Net Report Answer Introduction Security devices can be used to control access to network resources.

More information

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client

Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client A P P L I C A T I O N N O T E Creating a Gateway to Client VPN between Sidewinder G2 and a Mac OS X Client This application note describes how to set up a VPN connection between a Mac client and a Sidewinder

More information

Configuration Guide - OneDesk to SalesForce Connector

Configuration Guide - OneDesk to SalesForce Connector Configuration Guide - OneDesk to SalesForce Connector Introduction The OneDesk to SalesForce Connector allows users to capture customer feedback and issues in OneDesk without leaving their familiar SalesForce

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11

Investment Management System. Connectivity Guide. IMS Connectivity Guide Page 1 of 11 Investment Management System Connectivity Guide IMS Connectivity Guide Page 1 of 11 1. Introduction This document details the necessary steps and procedures required for organisations to access the Homes

More information

Fax User Guide 07/31/2014 USER GUIDE

Fax User Guide 07/31/2014 USER GUIDE Fax User Guide 07/31/2014 USER GUIDE Contents: Access Fusion Fax Service 3 Search Tab 3 View Tab 5 To E-mail From View Page 5 Send Tab 7 Recipient Info Section 7 Attachments Section 7 Preview Fax Section

More information

Getting Started with One Search for Destiny

Getting Started with One Search for Destiny Getting Started with One Search for Destiny Overview By providing one-stop searching of multiple online resources, One Search gives your students access to the best information in the least amount of time.

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

Quick Scan Features Setup Guide

Quick Scan Features Setup Guide Xerox WorkCentre 7132 Quick Scan Features Setup Guide 701P45042 This guide includes instructions for: Scan to Email on page 1 Scan to Mailbox Setup (Optional) on page 5 Network Scanning Setup (Optional)

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

Virto Active Directory Service for SharePoint. Release 4.1.2. Installation and User Guide

Virto Active Directory Service for SharePoint. Release 4.1.2. Installation and User Guide Virto Active Directory Service for SharePoint Release 4.1.2 Installation and User Guide 2 Table of Contents OVERVIEW... 3 SYSTEM REQUIREMENTS... 4 OPERATING SYSTEM... 4 SERVER... 4 BROWSER... 5 INSTALLATION...

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 30, 2005 Product Information Partner Name Juniper Networks Web Site www.juniper.net Product Name NetScreen SA Version

More information

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.

OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook. 5/1/2012 2012 Encryptomatic LLC www.encryptomatic. OutDisk 4.0 FTP FTP for Email Users using Microsoft Windows and/or Microsoft Outlook 5/1/2012 2012 Encryptomatic LLC www.encryptomatic.com Contents What is OutDisk?... 3 OutDisk Requirements... 3 How Does

More information