InformaCast LDAP Integration

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "InformaCast LDAP Integration"

Transcription

1 Microsoft Active Directory Configuration Example Version October 23, W e s t B e l t l i n e H i g h w a y, S u i t e Madison, Wis c o n s i n P h o n e www. s i n g l e w i r e. c o m

2 Copyright 2011 Singlewire Software. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose, without written permission from Singlewire.

3 Contents Executive Summary... 1 Before You Begin... 2 Using This Document... 2 Base Understanding Of InformaCast... 2 Healthy Domain Controllers and Active Directory... 2 CUCM Integrated to IC For LDAP Recipient Groups... 2 Third Party LDAP Browser... 2 LDAP User For InformaCast... 3 Create A User In The LDAP... 3 Locate User and Record LDAP Attributes... 4 Connect To MS AD LDAP With Softerra... 6 Configure Softerra... 6 Verify Successful Bind... 8 Troubleshoot Here Before Proceeding... 8 InformaCast Base Configuration... 9 Enable LDAP User Logins Configure Authentication Required Fields Verify Users and Groups Are Seen From LDAP Searching For Users And Groups Limit Where IC Looks In The LDAP Use Softerra To View The LDAP Tree Structure Configure InformaCast s Authentication Search Base Verify Users and Groups Are Seen From LDAP Filter What IC Sees From The LDAP Administer the Microsoft Active Directory Use Softerra To Locate & Gather Attribute Data Create & Test LDAP Filters Configure InformaCast User and Group Filters Verify Users and Groups Are Seen From LDAP Assign LDAP Users InformaCast Roles Assign Administrator Role To LDAP Group Assign User Role To LDAP Group Verify Assigned Login Permissions... 31

4 Create LDAP Based Recipient Groups CUCM Extension Verification MS AD Attribute Verification Use Softerra To Locate Attribute Value Configure InformaCast Map Attribute Create LDAP Rule For A Recipient Group Configure IC Create the Recipient Group Troubleshooting Support... 43

5 Executive Summary Executive Summary InformaCast can integrate to a LDAP repository for user authentication and for information on user s CUCM phones. The LDAP user accounts can have permissions assigned in InformaCast to allow authentication and access to the InformaCast GUI. You can also use LDAP attributes to create Recipient Groups of phones based on information obtained from the LDAP The examples provided here are done with Microsoft Active Directory. This document assumes the reader is somewhat familiar with the navigation of Microsoft Active Directory, and is capable of creating Users and Groups. InformaCast can integrate to any LDAPv3 compliant vendor s solution, but those features are outside the scope of this document. This document assumes the reader is somewhat familiar with InformaCast, but will try to teach the LDAP integration and features related from a beginner standpoint. This document is not meant to be a full featured guide to everything that is capable with these features, but will provide a tutorial for one way this could work in an organization. Singlewire Software 1 October 23, 2012

6 Before You Begin Before You Begin Using This Document This document should be read from start to finish as many of the later pages and procedures build upon concepts and steps covered and performed in previous sections. Base Understanding Of InformaCast This document assumes some familiarity with the concepts and navigation of InformaCast (abbreviated as IC throughout this document). Before starting the LDAP integration, you should ensure the InformaCast server is working as expected. Healthy Domain Controllers and Active Directory Before attempting any integration from InformaCast you should ensure your Microsoft Domain Controllers and the Active Directory are healthy and functional (abbreviated as MS AD through this document). While the load InformaCast will place on the MS AD DC should be minimal, there will be some load as IC tries to access the data. CUCM Integrated to IC For LDAP Recipient Groups If you plan to build Recipient Groups based on information from the LDAP, Cisco Unified Communications Manager should be integrated to InformaCast. You can broadcast to CUCM phones without any LDAP integration. Third Party LDAP Browser Much of the configuration in this document will be done with a Third Party s LDAP Browser. All configurations should be done first with the Third Party Tool to verify and test the settings before trying them with InformaCast. InformaCast does not provide good feedback if something is not successful, so troubleshooting the Third Party Tool tends to be easier. This tutorial will use Softerra s LDAP Browser which is free. You can download it at the link below. Ensure you download the Browser version and not the Administrator. Singlewire Software 2 October 23, 2012

7 LDAP User For InformaCast LDAP User For InformaCast You will need a user account to access the Microsoft Active Directory. By default all users will have Read access, so a standard end user with minimal permissions will suffice. Create A User In The LDAP Access the Domain Controller you will point InformaCast at Open Active Directory Users and Computers and create a new user that InformaCast will use to access the LDAP data Make sure the password cannot be changed Make sure the password does not expire You should now be able to view the newly created user in the Active Directory Singlewire Software 3 October 23, 2012

8 LDAP User For InformaCast Locate User and Record LDAP Attributes InformaCast and Softerra will need the created user s information to connect to the LDAP. Typically you can use either a Distinguished Name or User Principal Name. While we only need one of these, it only takes a couple seconds to gather both. If one doesn t work, try the other. In MS AD Users & Computers, right click the user you created and select properties Choose the Attribute Editor tab Locate the distinguishedname attribute and copy it somewhere like a notepad document. (NOTE: in this example the distinguishedname of the user would be CN=pl App-InformaCast,OU=pl-Applications,OU=pl- Staff,DC=sandbox,DC=lan) Singlewire Software 4 October 23, 2012

9 LDAP User For InformaCast Locate the userprincipalname attribute and copy it somewhere like a notepad document. (NOTE: in this example the userprincipalname of the user would be Singlewire Software 5 October 23, 2012

10 Connect To MS AD LDAP With Softerra Connect To MS AD LDAP With Softerra It will be easier to gather information and perform any troubleshoot using a Third Party Tool rather than InformaCast. Ensure all steps are completed using Softerra LDAP Browser before attempting to integrate InformaCast. Configure Softerra Open Softerra LDAP Browser Click New to setup a new profile and give it a name such as MS AD Enter the IP address of the Domain Controller to connect to Make sure the port is set to 389 for the standard LDAP port unless the connection requires SSL (NOTE: if you check the box to use secure connection (SSL) the port will automatically get modified to 636) Leave RootDSE in the Base DN field By default MS AD does not require SSL, so leave the use secure connection (SSL) box unchecked unless your server requires SSL. (NOTE: if you check the box to use secure connection (SSL) the port will automatically get modified to 636) Click Next Singlewire Software 6 October 23, 2012

11 Connect To MS AD LDAP With Softerra For the radio button of Other Credentials, make sure Simple is selected as the Mechanism For the Principal field, enter the value of the distinguishedname or userprincipalname of the created user in the previous section. (NOTE: if one doesn t work, try the other) Enter the password for the user and check the box to save the password Click Next For the next page, LDAP Settings, just accept the defaults by clicking Finish Singlewire Software 7 October 23, 2012

12 Connect To MS AD LDAP With Softerra Verify Successful Bind At this point the program should attempt to bind to the Domain Controller to browse the LDAP data. If the bind is successful you should be able to view the LDAP as in the picture below. If the bind was not successful, you will need to go back and troubleshoot the settings that were entered until you can bind and view the LDAP data successfully. Troubleshoot Here Before Proceeding The settings you use with Softerra to access the LDAP data will be the same settings you use with InformaCast to access the LDAP data. The Softerra tool will be easier to troubleshoot, so only progress to InformaCast once you have been able to successfully use Softerra to browse the LDAP. Singlewire Software 8 October 23, 2012

13 InformaCast Base Configuration InformaCast Base Configuration For InformaCast to connect to the LDAP repository, various items specific to the LDAP are going to be required in the InformaCast configuration. You should have already been able to successfully use Softerra to bind and access the LDAP data. InformaCast will need to use these same settings. If you have not connected successfully with Softerra, please visit the previous sections to ensure they work successfully before going to forward. Open the IC GUI in a web browser and login Navigate to Admin > System > LDAP Integration Check the box to Enable LDAP Integration Fill in the fields using the same values that were successfully used to connect with Softerra LDAP Browser o LDAP Host Name: The Domain Controller IP Address (NOTE 1: Only one entry will be accepted here; there is no redundancy) (NOTE 2: It is recommended to use the IP Address and not the Host Name) Singlewire Software 9 October 23, 2012

14 InformaCast Base Configuration o LDAP Port: default is 389 (if SSL is required use 636) o Use SSL: default is no, but if your connection requires it select yes o Authentication Method: Simple will be used for most integrations o LDAP Administrator Distinguished Name: this is the MS AD user created for InformaCast s distinguishedname or userprincipalname gathered from a previous section of this document o LDAP Administrator Password: this is the corresponding password for the created MS AD user account for InformaCast o Schema Type: because this document s example is Microsoft Active Directory, this is the selection to be used. Click Update If there were no errors, you should be redirected to the Admin > Overview page (NOTE: if errors were seen, see the Troubleshooting section of this document) If no errors were seen then InformaCast should have successfully been able to bind to the LDAP data. However, there are really no features being used at this point and only the base integration has been performed. Singlewire Software 10 October 23, 2012

15 Enable LDAP User Logins Enable LDAP User Logins In a previous section of this document InformaCast s base configuration for LDAP was completed on the General tab. The steps in that section must be completed successfully before configuring the items on the Authentication tab. Configure Authentication Required Fields Open the IC GUI in a web browser and login Navigate to Admin > System > LDAP Integration Click the Authentication Tab Click the Enable Authenticating Users Via LDAP checkbox Fill in the required fields (NOTE: In a later section we will go into details on how to narrow down what InformaCast will see and request from the LDAP using a Search Base and Filters) o Configuration Name: Give this a descriptive name your users will understand, such as (Company ID Login) (NOTE: it may be helpful to wrap whatever text is entered into this field in parentheses. This way it will be the first option selected by default when users navigate to the IC GUI and they won t have to toggle anything) o Maximum Number of Users: this is set to 1000 by default so if your LDAP directory contains more users, you will need to increment this to a larger number. However, there are instances where large numbers of objects can slow Singlewire Software 11 October 23, 2012

16 Enable LDAP User Logins down the performance of IC. (NOTE: In a later section we will go into details on how to narrow down what InformaCast will see and request from the LDAP using a Search Base and Filters) Click Update If there were no errors, you should be redirected to the Admin > Overview page (NOTE: if errors were seen, see the Troubleshooting section of this document) Singlewire Software 12 October 23, 2012

17 Enable LDAP User Logins Verify Users and Groups Are Seen From LDAP Open the IC GUI in a web browser and login Navigate to Admin > User Administration > Edit Users Next to Security Domain, click the drop down to access the LDAP Users and click OK Verify that the user accounts from the LDAP show up as expected Do the same thing for LDAP Groups (Admin > User Administration > Edit User Groups) Singlewire Software 13 October 23, 2012

18 Enable LDAP User Logins Searching For Users And Groups At the time of this writing there is no search function within IC to locate particular users or groups. By default IC will limit the number of users displayed on a page to 50. This can make it almost impossible to find users or groups when large numbers are present. To dance around this, you can do the following: In the Show _50_ results per page box, enter a large number like 5000 Press enter (it could take a little while to load the page with that many entries) Press CTRL+F (this should open the search feature of your browser) Enter the user or group to search for and press enter Singlewire Software 14 October 23, 2012

19 Limit Where IC Looks In The LDAP Limit Where IC Looks In The LDAP The LDAP structure is a tree. When we look at the LDAP tree perhaps we do not have to look at the whole tree but can limit the search to a particular branch and the objects underneath it. For this example then we are going to limit what IC looks at using a Search Base. Use Softerra To View The LDAP Tree Structure Open Softerra LDAP Browser Click the Profile that was created previously to view the LDAP data Navigate the tree until the lowest point you would like to search beneath (NOTE: in this example we want to view the objects in the OU s pl-msn & pl- MSP. To have IC view the objects in these two OU s, we need to use a Search Base that is at least one step higher. Thus, the Search Base we will want to use will be the OU of pl-staff. Click on the LDAP object that will be used as the Search Base On the right, locate and copy the distinguishedname (NOTE: in this example we want to use the OU of pl-staff as our Search Base, so the distinguishedname value would be OU=pl-Staff,DC=sandbox,DC=lan) Singlewire Software 15 October 23, 2012

20 Limit Where IC Looks In The LDAP Configure InformaCast s Authentication Search Base Open the IC GUI in a web browser and login Navigate to Admin > System > LDAP Integration Click the Authentication: Tab Paste in the value of the distinguishedname of the Search Base found using Softerra Click Update Singlewire Software 16 October 23, 2012

21 Limit Where IC Looks In The LDAP Verify Users and Groups Are Seen From LDAP When we first verified that our LDAP users and groups were seen by IC, there were many items listed. After entering the Search Base we should now only see users and groups from the location of the Search Base and items beneath it. Open the IC GUI in a web browser and login Navigate to Admin > User Administration > Edit Users Next to Security Domain, click the drop down to access the LDAP Users and click OK Verify that the user accounts from the LDAP show up as expected Do the same thing for LDAP Groups (Admin > User Administration > Edit User Groups) Singlewire Software 17 October 23, 2012

22 Filter What IC Sees From The LDAP Filter What IC Sees From The LDAP When verifying the user and groups that showed up, there were likely many items shown. In all likelihood most of these people and groups will not need access to InformaCast. There are typically two types of users who will login to the InformaCast GUI: Administrators IT personnel who will be responsible for server configuration and maintenance Users end users who will use the GUI to send out messages We will create two Security Groups in the MS AD: one for each type of the user account types. We ll then assign the users to their proper group in MS AD and tell IC to only search for those users and groups using LDAP Filters. Any user who will need to login to InformaCast will now have common attributes in the LDAP: they will either be members of the InformaCast Administrators or InformaCast Users groups. Using Softerra we can locate these common attributes in the LDAP data and use the attributes to construct filters. These filters can be used in the InformaCast configuration to further limit what IC sees. We will need to construct two filters: one for the users and another for the groups. Singlewire Software 18 October 23, 2012

23 Filter What IC Sees From The LDAP Administer the Microsoft Active Directory Access the Domain Controller you have InformaCast pointed to Open Active Directory Users and Computer Navigate to a location in the MS AD structure that is under the Search Base InformaCast was programmed to use Create two new groups: one for InformaCast Administrators and another for InformaCast Users Assign all users who require Administrator access to InformaCast to the newly created MS AD Group for the Administrators Assign all users who require User access to InformaCast to the newly created MS AD Group for the Users Singlewire Software 19 October 23, 2012

24 Filter What IC Sees From The LDAP Use Softerra To Locate & Gather Attribute Data Open Softerra LDAP Browser Click the Profile that was created previously to view the LDAP data Gather memberof Attributes To Create User Filter Navigate and click on a user who was assigned to the group created for InformaCast Administrators In right hand pane, locate the memberof attribute for the InformaCast Administrator group and copy it someplace like a notepad document where we can later create a valid filter with the data. Now do the same thing for a user in the InformaCast User group Singlewire Software 20 October 23, 2012

25 Filter What IC Sees From The LDAP Gather distinguishedname Attributes To Create User Filter Navigate and click on the group that was created for InformaCast Administrators In the right hand pane, locate the distinguishedname attribute and copy it someplace like a notepad document where we can later create a valid filter with the data. Now do the same thing for the group that was created for InformaCast Users Verify Attribute Data Collected At this point you should have a document with two memberof attributes and two distinguishedname attributes. Singlewire Software 21 October 23, 2012

26 Filter What IC Sees From The LDAP Create & Test LDAP Filters From the previous section we should now have a notepad document that contains the data obtained with Softerra. We pulled two types of attributes that we ll use to build two different filters: Group membership attributes (memberof) used to build a User Filter Group name attributes(distinguishedname) used to build a Group Filter A full explanation or tutorial of building LDAP filters is outside the scope of this document. There are many examples and tutorials online that can be found by searching for something like LDAP Search Filters. For our uses we ll only need to know a few things: A valid LDAP filter is surrounded by parenthesis (paramone=value1) Groups of LDAP search filter strings can be combined using operators for and (&) and or ( ) and wrapping these in parentheses o This example says that everything must match the first and second filter (&(paramone=value1)(paramtwo=value2)) o This example says that everything must match the first or second filter ( (paramone=value1)(paramtwo=value2)) Singlewire Software 22 October 23, 2012

27 Filter What IC Sees From The LDAP Format Attribute Data to Syntax of Proper LDAP Search Filter We need to turn the attributes that we copied into usable search filters. The first thing we need to do is get the attribute data in the proper syntax format. To do this we replace the colon and spaces after the attribute name with an equals sign. Now that we have the proper format, we need to wrap each statement in parentheses to make them valid search filters. Singlewire Software 23 October 23, 2012

28 Filter What IC Sees From The LDAP Use Softerra To Test LDAP Search Filteres Each of these items should now be valid search filters. You can test each in Softerra to verify you are going to get the proper data and each is formatted correctly. To test in Softerra: Open Softerra LDAP Browser Click the Profile that was created previously to view the LDAP data Select Entry > Directory Search Copy one of the filters from the notepad document and paste it into the Filter field and press enter All of the objects that match the rule should appear in the window. Test each of these rules individually to make sure they work as expected before trying to use them in InformaCast Singlewire Software 24 October 23, 2012

29 Filter What IC Sees From The LDAP We now need to combine the individual rules to create one User Filter, and one Group Filter. We do this by enclosing our current rules in another set of parentheses and use the pipe as a logical or statement. We should now be able to paste these rules into Softerra to test they are created correctly. Test each of these rules individually before trying to use them in InformaCast Singlewire Software 25 October 23, 2012

30 Filter What IC Sees From The LDAP Configure InformaCast User and Group Filters Once you have created your LDAP Filters and tested them successfully in Softerra they are ready to be input into InformaCast. Open the IC GUI in a web browser and login Navigate to Admin > System > LDAP Integration Click the Authentication: Tab Paste the memberof filter into the Valid User Filter field. Paste the distinguishedname filter in the Valid Group Filter field Click Update Singlewire Software 26 October 23, 2012

31 Filter What IC Sees From The LDAP Verify Users and Groups Are Seen From LDAP Open the IC GUI in a web browser and login Navigate to Admin > User Administration > Edit Users Next to Security Domain, click the drop down to access the LDAP Users and click OK Verify that only user accounts that match our Valid User Filter now show Do the same thing for LDAP Groups (Admin > User Administration > Edit User Groups) Singlewire Software 27 October 23, 2012

32 Assign LDAP Users InformaCast Roles Assign LDAP Users InformaCast Roles By default a LDAP user in InformaCast has no permissions in the application. If they happen to log into InformaCast they will be unable to access any application features. At this point in the document we should have all of our users, or a subset of our users, from MS AD in InformaCast. Once the accounts are available to InformaCast we can assign roles and grant them permissions to features in the application. In our example we have created two Security Groups in MS AD: one for Administrators and one for end Users. We will now need to grant these groups Roles in InformaCast so the group members receive access to InformaCast. Assign Administrator Role To LDAP Group Open the IC GUI in a web browser and login Singlewire Software 28 October 23, 2012

33 Assign LDAP Users InformaCast Roles Navigate to Admin > User Administration > Edit User Groups Next to Security Domain, click the drop down to access the LDAP Groups and click OK Locate the MS AD Security Group created for InformaCast Administrators and click the Edit button Assign the following Roles to the User Group and click Update o appadmin o keyadmin o messageadmin o schedadmin o useradmin Assign User Role To LDAP Group Open the IC GUI in a web browser and login Singlewire Software 29 October 23, 2012

34 Assign LDAP Users InformaCast Roles Navigate to Admin > User Administration > Edit User Groups Next to Security Domain, click the drop down to access the LDAP Groups and click OK Locate the MS AD Security Group created for InformaCast Users and click the Edit button Assign the following Roles to the User Group and click Update o messagesenderdnsrestricted Singlewire Software 30 October 23, 2012

35 Assign LDAP Users InformaCast Roles Verify Assigned Login Permissions After permissions have been assigned to the LDAP groups in InformaCast you will want to verify that the access granted to the groups is what the users will receive when they login. Administrator Accounts If still logged into the IC GUI, logout now On the IC logon page, enter a LDAP user with administrator access Make sure the Security Domain is set to the LDAP context After logging in with an account with administrator access you should have access to all the menu items available to InformaCast Navigate the menus and verify full system access Singlewire Software 31 October 23, 2012

36 Assign LDAP Users InformaCast Roles End User Accounts If still logged into the IC GUI, logout now On the IC logon page, enter a LDAP user with end user access Make sure the Security Domain is set to the LDAP context After logging in with an account with end user access you should be taken to the Messages menu and only have access to send messages from the GUI. Verify the restricted access is present Singlewire Software 32 October 23, 2012

37 Create LDAP Based Recipient Groups Create LDAP Based Recipient Groups To be able to broadcast to a group of people s phones who all share a common LDAP attribute, you have to be able to map their CUCM Directory Number to a corresponding value in the LDAP data. These types of Recipient Groups are good for work flow type scenarios. For example, what if you don t need to page the whole building but maybe only need to reach someone in HR, or Accounting? CUCM Extension Verification The value of the extensions created in CUCM must correspond exactly to a populated attribute on the users in the LDAP. For this example, looking in the CUCM, we can see that the telephone system is using four digit extensions. Singlewire Software 33 October 23, 2012

38 Create LDAP Based Recipient Groups MS AD Attribute Verification In Active Directory we can have multiple telephone numbers entered for each user, but we ll need at least one of these fields to contain the same extension that is in the CUCM. In the example below, the Telephone Number is stored in E.164 format, but the IP Phone field is set to the four digit extension seen in CUCM. Singlewire Software 34 October 23, 2012

39 Create LDAP Based Recipient Groups Use Softerra To Locate Attribute Value Once we know there is an attribute populated in Active Directory that matches the CUCM extensions exactly, we can correlate to these by locating what that attribute maps to in the LDAP using Softerra Open Softerra LDAP Browser Click the Profile that was created previously to view the LDAP data Navigate and click on a user who we are looking to put into a Recipient Group In right hand pane, search for the telephone extension as it is seen in CUCM and locate the LDAP attribute that it is assigned to. In this example we see the ipphone attribute is where the four digit extension is stored. Make a note of this attribute as we ll need to enter it into InformaCast. Singlewire Software 35 October 23, 2012

40 Create LDAP Based Recipient Groups Configure InformaCast Map Attribute Open the IC GUI in a web browser and login Navigate to Admin > System > LDAP Integration Click the Grouping tab Check the box to Enable Grouping Recipients via LDAP In the Phone Extension Attribute field, enter the LDAP attribute found using Softerra that correlates to the phone extensions as they are seen in CUCM. (NOTE: in our example the four digit CUCM extensions map to the ipphone LDAP attribute) Click Update Singlewire Software 36 October 23, 2012

41 Create LDAP Based Recipient Groups Create LDAP Rule For A Recipient Group We ve already used rules to create LDAP filters in this document. Now we will do so again to create a Recipient Group. First we must find the common LDAP attribute that our Recipient Group member phones will share. For this example, we ll make a Recipient Group of all phones who belong to HR team members. Gather memberof Attributes To Create User Filter Open Softerra LDAP Browser Click the Profile that was created previously to view the LDAP data Navigate and click on a user who we are looking to put into a Recipient Group In right hand pane, locate an attribute that would be shared by all members of the Recipient Group you will create (NOTE: in this example all HR team members are assigned the pl-corp-hr security group in MS AD) Copy the data from the attribute to a notepad document so we can work with the data Singlewire Software 37 October 23, 2012

42 Create LDAP Based Recipient Groups Format Attribute Data to Syntax of Proper LDAP Search Filter Remove the colon and space after the attribute name and replace it with an equal sign Wrap the string in parentheses so it uses the proper syntax We should now be able to paste this rule into Softerra to test it is created correctly. Singlewire Software 38 October 23, 2012

43 Create LDAP Based Recipient Groups Configure IC Create the Recipient Group Open the IC GUI in a web browser and login Navigate to Recipient Groups and click Add Give the new Recipient Group a name Select the box to Filter with Rules Create a rule that says Directory Numbers Does Match LDAP Filter Paste in the new filter string you just obtained and created using Softerra Click the view button at the bottom Verify the phones show up as expected, and click the Update button Singlewire Software 39 October 23, 2012

44 Troubleshooting Troubleshooting InformaCast Error: The LDAP directory cannot be accessed: Unable to create LDAP context This error will be seen in the InformaCast GUI if any piece of the entered information is not entered correctly. Try to connect to the LDAP using Softerra If successful with Softerra, verify you are using the same information used in Softerra within IC. If not successful with Softerra, you will need to troubleshoot the settings with Softerra and get that working prior to being able to use InformaCast. Any Issue Experienced During InformaCast LDAP Integration The first question to ask is did it work with Softerra? If you have not tested with Softerra, first verify that you can successfully test with a Third Party Tool. There will be better error messages and troubleshooting resources available using Softerra. Softerra Does Not Bind To The LDAP There are many tools available online for troubleshooting Softerra s LDAP Browser. It will be easier to troubleshoot a connection problem to the LDAP with Softerra than InformaCast and you should not attempt to use InformaCast until you have successfully used Softerra. Softerra Does Not Locate Proper Users When Entering Filter There are many tools available online for troubleshooting Softerra s LDAP Browser. It will be easier to troubleshoot a connection problem to the LDAP with Softerra than InformaCast and you should not attempt to use InformaCast until you have successfully used Softerra. Singlewire Software 40 October 23, 2012

45 Troubleshooting Softerra Does Not Show the memberof Attribute For a User Ensure you added the user to the group in MS Active Directory. Use Active Directory Users & Computers to verify the user is a member of the group. When Logging In To InformaCast I Always Have To Toggle The Security Domain The easiest way to make sure the LDAP Security Domain is always the default is to wrap it in parentheses in the configuration. This is on the Admin > System > LDAP Integration > Authentication Tab > Configuration Name. Whatever is entered here, wrap it in parentheses (MS AD LDAP). No Users or Groups are Seen After Applying Filters Verify the syntax and data entered for the filter. Can you use Softerra to bind to the LDAP? Once connected to the LDAP can you use Softerra to enter in the filters you ve created and do the users show up in Softerra? If they do not, you need to examine the filter you are using with Softerra before trying to use it with InformaCast. Integrating to non Microsoft LDAP Directories This is also supported but this document does not cover the details. Please see the InformaCast Installation Manual for the details about using other Directory types. There is No Attribute In The LDAP That Matches The Extension In CUCM For InformaCast to be able to map LDAP users to telephones seen from CUCM, the extension in CUCM must be entered exactly on some LDAP attribute for the user. If the CUCM extensions are not in the LDAP today, you will need to update your LDAP users to have the CUCM extension applied to some LDAP attribute if want to be able to create Recipient Groups by LDAP attributes. If you have no need to create these types of Recipient Groups, there is nothing to worry about and you can ignore this feature. Phone Extensions in CUCM Start With \+ but LDAP Has Them as Just + Currently InformaCast takes no special consideration of E.164 numbering formats from CUCM, so if the CUCM has the DN s as \+ they must also be in the LDAP somewhere as \+ to correlate them. This is only required if you want to build Recipient Groups based on LDAP attributes. If you have no need to create these types of Recipient Groups, there is nothing to worry about and you can ignore this feature. Singlewire Software 41 October 23, 2012

46 Troubleshooting After Modifying and Saving the LDAP Configuration I Have to Log Back In This is likely because the user account you were logged in with at the time you were making the changes was a LDAP user account. If you are logged in with an account that authenticates to the LDAP and you modify the configuration of the LDAP setup, you must be logged out of the application so your account s permissions can be reevaluated when you log back in. You can use a Superuser Application level account to not experience this; however any end user that may have been logged in while you made a change to the LDAP would still need to log back in to have their access permission reevaluated. Singlewire Software 42 October 23, 2012

47 Troubleshooting Support Before contacting Support to assist with the InformaCast setup, please ensure you are able to use the Softerra LDAP Browser to connect to the LDAP. If you are unable to connect with Softerra, InformaCast will be unable to connect. If you do contact support, please have the following ready: Screenshot of successful connection from Softerra to the LDAP All the settings used with the successful Softerra setup InformaCast performance.log file(s) Screenshots of the LDAP config pages from the GUI All of the values for any search strings and filters used that are not seen fully in the screenshots. Contact Support Singlewire Software 43 October 23, 2012

PriveonLabs Research. Cisco Security Agent Protection Series:

PriveonLabs Research. Cisco Security Agent Protection Series: Cisco Security Agent Protection Series: Enabling LDAP for CSA Management Center SSO Authentication For CSA 5.2 Versions 5.2.0.245 and up Fred Parks Systems Consultant 3/25/2008 2008 Priveon, Inc. www.priveonlabs.com

More information

Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.

Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc. Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,

More information

Configuring Sponsor Authentication

Configuring Sponsor Authentication CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five

More information

Basic Configuration. Key Operator Tools older products. Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work

Basic Configuration. Key Operator Tools older products. Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work Where to configure: User Tools Basic Configuration Key Operator Tools older products Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work Administrator Tools newest products

More information

Configuring User Identification via Active Directory

Configuring User Identification via Active Directory Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be User Identification Overview User Identification allows you to create security policies based

More information

Avatier Identity Management Suite

Avatier Identity Management Suite Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:

More information

MX-M283N/MX-M363N/MX-M453N/MX-M503N MX-M623N/MX-M753N MX-4100N/MX-4101N/MX-5001N MX-2610N/MX-3110N/MX-3610N MX-4110N/MX-4111N/MX-5110N/MX-5111N

MX-M283N/MX-M363N/MX-M453N/MX-M503N MX-M623N/MX-M753N MX-4100N/MX-4101N/MX-5001N MX-2610N/MX-3110N/MX-3610N MX-4110N/MX-4111N/MX-5110N/MX-5111N MFP TT-20412 TECHNICAL TIP Models: Priority: MX-M283N/MX-M363N/MX-M453N/MX-M503N MX-M623N/MX-M753N MX-4100N/MX-4101N/MX-5001N MX-2610N/MX-3110N/MX-3610N MX-4110N/MX-4111N/MX-5110N/MX-5111N Medium Date:

More information

Alibre Vault. Contents. Installation, Licensing, and Initial Setup

Alibre Vault. Contents. Installation, Licensing, and Initial Setup Alibre Vault Installation, Licensing, and Initial Setup Contents Important Notes Before you Install / Modify the Vault... 2 Class files to avoid deleting... 2 Object types to avoid deleting... 3 Terminology...

More information

Sample Configuration: Cisco UCS, LDAP and Active Directory

Sample Configuration: Cisco UCS, LDAP and Active Directory First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Creating Home Directories for Windows and Macintosh Computers

Creating Home Directories for Windows and Macintosh Computers ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory

More information

Configuring and Using the TMM with LDAP / Active Directory

Configuring and Using the TMM with LDAP / Active Directory Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Single Sign On for ShareFile with NetScaler. Deployment Guide

Single Sign On for ShareFile with NetScaler. Deployment Guide Single Sign On for ShareFile with NetScaler Deployment Guide This deployment guide focuses on defining the process for enabling Single Sign On into Citrix ShareFile with Citrix NetScaler. Table of Contents

More information

Content Management System User Guide

Content Management System User Guide Content Management System User Guide support@ 07 3102 3155 Logging in: Navigate to your website. Find Login or Admin on your site and enter your details. If there is no Login or Admin area visible select

More information

SchoolBooking LDAP Integration Guide

SchoolBooking LDAP Integration Guide SchoolBooking LDAP Integration Guide Before you start This guide has been written to help you configure SchoolBooking to connect to your LDAP server. Please treat this document as a reference guide, your

More information

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview

Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the

More information

LDaemon. This document is provided as a step by step procedure for setting up LDaemon and common LDaemon clients.

LDaemon. This document is provided as a step by step procedure for setting up LDaemon and common LDaemon clients. LDaemon This document is provided as a step by step procedure for setting up LDaemon and common LDaemon clients. LDaemon... 1 What you should know before installing LDaemon:... 2 ACTIVE DIRECTORY... 2

More information

Configuring Toad Team Coding to use Microsoft Team Foundation Server 2010

Configuring Toad Team Coding to use Microsoft Team Foundation Server 2010 Configuring Toad Team Coding to use Microsoft Team Foundation Server 2010 Introduction Toad for Oracle version 10.6 directly supports Microsoft s Team Foundation Server 2010. Previous versions of Toad

More information

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip

Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the

More information

Import Users From LDAP Directory

Import Users From LDAP Directory LDAP Synchronization Overview, page 1 LDAP Synchronization Prerequisites, page 2 LDAP Synchronization Configuration Task Flow, page 3 LDAP Synchronization Overview Lightweight Directory Access Protocol

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

Integrating LANGuardian with Active Directory

Integrating LANGuardian with Active Directory Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity

More information

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE

HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Information Systems Services. Configuring Entourage 2008 to connect to the University s Exchange service Version 2.2 February 2009

Information Systems Services. Configuring Entourage 2008 to connect to the University s Exchange service Version 2.2 February 2009 Information Systems Services Configuring Entourage 2008 to connect to the University s Exchange service Configuring Entourage 2008 to connect to the University s Exchange service Contents Contents... 2

More information

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users

Tool Tip. SyAM Management Utilities and Non-Admin Domain Users SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Using Microsoft s CA Server with SonicWALL Devices

Using Microsoft s CA Server with SonicWALL Devices SonicOS Using Microsoft s CA Server with SonicWALL Devices Introduction You can use the Certificate Server that ships with Windows 2000/2003 Server to create certificates for SonicWALL devices, as well

More information

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks

More information

Skyward LDAP Launch Kit Table of Contents

Skyward LDAP Launch Kit Table of Contents 04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know

More information

Authenticating users of Cisco NCS or Cisco Prime Infrastructure against Microsoft NPS (RADIUS)

Authenticating users of Cisco NCS or Cisco Prime Infrastructure against Microsoft NPS (RADIUS) Authenticating users of Cisco NCS or Cisco Prime Infrastructure against Microsoft NPS (RADIUS) Date: January 15, 2013 My hope with this guide is to help others take advantage of a centralized user database

More information

Application Note: Cisco Integration with Onsight Connect

Application Note: Cisco Integration with Onsight Connect Application Note: Cisco Integration with Onsight Connect Table of Contents Application Note:... 1 Cisco Integration with Onsight Connect... 3 Direct Onsight Device to Cisco Endpoint Calls... 3 Cisco Unified

More information

BlackShield ID. QUICKStart Guide. Integrating Active Directory Lightweight Services

BlackShield ID. QUICKStart Guide. Integrating Active Directory Lightweight Services QUICKStart Guide Integrating Active Directory Lightweight Services 2010 CRYPTOCard Corp. All rights reserved. http://www.cryptocard.com Trademarks CRYPTOCard, CRYPTO Server, CRYPTO Web, CRYPTO Kit, CRYPTO

More information

StarTeam/CaliberRM LDAP QuickStart Manager 2009. Administration Guide

StarTeam/CaliberRM LDAP QuickStart Manager 2009. Administration Guide StarTeam/CaliberRM LDAP QuickStart Manager 2009 Administration Guide Borland Software Corporation 8310 N Capital of Texas Bldg 2, Ste 100 Austin, TX 78731 USA http://www.borland.com Borland Software Corporation

More information

Installation Steps for PAN User-ID Agent

Installation Steps for PAN User-ID Agent Installation Steps for PAN User-ID Agent If you have an Active Directory domain, and would like the Palo Alto Networks firewall to match traffic to particular logged-in users, you can install the PAN User-ID

More information

System Administration and Log Management

System Administration and Log Management CHAPTER 6 System Overview System Administration and Log Management Users must have sufficient access rights, or permission levels, to perform any operations on network elements (the devices, such as routers,

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210

More information

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names DataCove DT Active Directory Authentication In Active Directory (AD) authentication mode, the server uses NTLM v2 and LDAP protocols to authenticate users residing in Active Directory. The login procedure

More information

Here, we will discuss step-by-step procedure for enabling LDAP Authentication.

Here, we will discuss step-by-step procedure for enabling LDAP Authentication. LDAP Authenticated Web Administration : MailScan 5.x is powered with LDAP Authenticated Web Administration. This gives security enhancement to authenticate users, to check their quarantined and ham emails.

More information

Select the Akeni Enterprise Server installation file that matches your operating system and double-click on the file.

Select the Akeni Enterprise Server installation file that matches your operating system and double-click on the file. Akeni Enterprise Server Administration Guide (Version 2) Contents Chapter 1 Chapter 2 Chapter 3 Getting Started.: 1 Enterprise Server Installation.: 2 Launching Akeni Enterprise Server.: 3 Enterprise Client

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

Introducing the FirePass and Windows Terminal Services configuration

Introducing the FirePass and Windows Terminal Services configuration Deployment Guide Deploying Microsoft Windows Terminal Services and F5 s FirePass Controller Introducing the FirePass and Windows Terminal Services configuration Welcome to the FirePass and Microsoft Windows

More information

Configuring LDAP Authentication and LDAP Addressing

Configuring LDAP Authentication and LDAP Addressing Configuring LDAP Authentication and LDAP Addressing What information do I need? 1.) LDAP server Bind Method (Simple or Simple over SSL) 2.) LDAP server 3.) LDAP server port number (389, 636, or 3268) 4.)

More information

Deploying RSA ClearTrust with the FirePass controller

Deploying RSA ClearTrust with the FirePass controller Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you

More information

How to Enable LDAP Directory Services Authentication to Microsoft Active Directory in the HP cclass Onboard Administrator

How to Enable LDAP Directory Services Authentication to Microsoft Active Directory in the HP cclass Onboard Administrator How to Enable LDAP Directory Services Authentication to Microsoft Active Directory in the HP cclass Onboard Administrator I. Certificate Services a. Install a Certificate Authority onto a Windows server

More information

Integrating Webalo with LDAP or Active Directory

Integrating Webalo with LDAP or Active Directory Integrating Webalo with LDAP or Active Directory Webalo can be integrated with an external directory to identify valid Webalo users and then authenticate them to the Webalo appliance. Integration with

More information

Creating a New Database and a Table Owner in SQL Server 2005 for exchange@pam

Creating a New Database and a Table Owner in SQL Server 2005 for exchange@pam Creating a New Database and a Table Owner in SQL Server 2005 for exchange@pam We planning to install exchange@pam an empty database an appropriate database user must be created before running the setup.

More information

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.

TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access. Secure Remote Access SRA Two-factor Authentication with Quest Defender SonicOS Contents Introduction... 1 System Requirements... 1 Defender Configuration... 2 Dell SonicWALL SRA Configuration... 18 Two-factor

More information

FastPass Password Manager Version 3.5.1

FastPass Password Manager Version 3.5.1 FastPass Password Manager Version 3.5.1 Document Title Delegating permissions in Active Directory Document Classification Confidential Document Revision B Document Status Final Document Date August 21,

More information

User Management Guide

User Management Guide AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

Integrating N-central with LDAP

Integrating N-central with LDAP Contents About this Guide 3 About LDAP 3 Requirements Checklist 4 Configuring N-central to Communicate with Active Directory Servers 5 About this Guide This guide is intended for a technical audience that

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

ImportManager 5 Installation Manual

ImportManager 5 Installation Manual ImportManager 5 Installation Manual Installation and setup The installation guide comes in two versions, a short version that simply describes the overall steps you need to go through to install ImportManager

More information

PORTAL ADMINISTRATION

PORTAL ADMINISTRATION 1 Portal Administration User s Guide PORTAL ADMINISTRATION GUIDE Page 1 2 Portal Administration User s Guide Table of Contents Introduction...5 Core Portal Framework Concepts...5 Key Items...5 Layouts...5

More information

Verify LDAP over SSL/TLS (LDAPS) and CA Certificate Using Ldp.exe

Verify LDAP over SSL/TLS (LDAPS) and CA Certificate Using Ldp.exe Verify LDAP over SSL/TLS (LDAPS) and CA Certificate Using Ldp.exe Document ID: 118761 Contributed by Nazmul Rajib and Binyam Demissie, Cisco TAC Engineers. Jan 14, 2015 Contents Introduction How to Verify

More information

Delegated Administration Quick Start

Delegated Administration Quick Start Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information

Active Directory Integration

Active Directory Integration January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

Training module 2 Installing VMware View

Training module 2 Installing VMware View Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and

More information

ADFS Integration Guidelines

ADFS Integration Guidelines ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS

More information

Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning

Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

McAfee One Time Password

McAfee One Time Password McAfee One Time Password Integration Module Outlook Web App 2010 Module version: 1.3.1 Document revision: 1.3.1 Date: Feb 12, 2014 Table of Contents Integration Module Overview... 3 Prerequisites and System

More information

Wireless Setup Instructions for Windows 8

Wireless Setup Instructions for Windows 8 Wireless Setup Instructions for Windows 8 1. Make sure that your wireless is turned on. (You may need to flip a switch or press a button on your laptop.) On most laptops you should see a light that indicates

More information

InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x

InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x Active Innovations, Inc. Copyright 1998 2015 www.inforouter.com Installing the LDAP Authentication Web Service

More information

Wireless LAN Controller Web Authentication Configuration Example

Wireless LAN Controller Web Authentication Configuration Example Wireless LAN Controller Web Authentication Configuration Example Document ID: 69340 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Web Authentication Process

More information

Team Foundation Server 2017 Installation Guide

Team Foundation Server 2017 Installation Guide Team Foundation Server 2017 Installation Guide Page 1 of 87 Team Foundation Server 2017 Installation Guide Benjamin Day benday@benday.com v1.0.0 November 15, 2016 Team Foundation Server 2017 Installation

More information

Chapter 3 Authenticating Users

Chapter 3 Authenticating Users Chapter 3 Authenticating Users Remote users connecting to the SSL VPN Concentrator must be authenticated before being allowed to access the network. The login window presented to the user requires three

More information

Baylor Secure Messaging. For Non-Baylor Users

Baylor Secure Messaging. For Non-Baylor Users Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7

More information

Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services

Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal

More information

WirelessOffice Administrator LDAP/Active Directory Support

WirelessOffice Administrator LDAP/Active Directory Support Emergin, Inc. WirelessOffice Administrator LDAP/Active Directory Support Document Version 6.0R02 Product Version 6.0 DATE: 08-09-2004 Table of Contents Objective:... 3 Overview:... 4 User Interface Changes...

More information

Active Directory LDAP Quota and Admin account authentication and management

Active Directory LDAP Quota and Admin account authentication and management Active Directory LDAP Quota and Admin account authentication and management Version 4.1 Updated July 2014 GoPrint Systems 2014 GoPrint Systems, Inc, All rights reserved. One Annabel Lane, Suite 105 San

More information

Active Directory Authentication Integration

Active Directory Authentication Integration Active Directory Authentication Integration This document provides a detailed explanation of how to integrate Active Directory into the ipconfigure Installation of a Windows 2003 Server for network security.

More information

Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS

Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS Chapter 3 ADDRESS BOOK, CONTACTS, AND DISTRIBUTION LISTS 03Archer.indd 71 8/4/05 9:13:59 AM Address Book 3.1 What Is the Address Book The Address Book in Outlook is actually a collection of address books

More information

Step by step guide to implement SMS authentication to Microsoft Forefront Unified Access Gateway 2010

Step by step guide to implement SMS authentication to Microsoft Forefront Unified Access Gateway 2010 Step by step guide to implement SMS authentication to Microsoft Forefront Unified Access Gateway 2010 Installation guide for securing the authentication to your Microsoft Forefront Unified Access Gateway

More information

Ingenious Testcraft Technical Documentation Installation Guide

Ingenious Testcraft Technical Documentation Installation Guide Ingenious Testcraft Technical Documentation Installation Guide V7.00R1 Q2.11 Trademarks Ingenious, Ingenious Group, and Testcraft are trademarks of Ingenious Group, Inc. and may be registered in the United

More information

Outlook Express / Windows Mail Setup Guide

Outlook Express / Windows Mail Setup Guide Versions Addressed: Outlook Express 6, Windows Mail 6, Microsoft Outlook 2000 Document Updated: 11/22/2010 Copyright 2010 Purpose: This document will assist the end user in configuring Outlook Express,

More information

Protected Trust Directory Sync Guide

Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide 2 Overview Protected Trust Directory Sync enables your organization to synchronize the users and distribution lists in Active Directory

More information

Windows 2000 Active Directory Configuration Guide

Windows 2000 Active Directory Configuration Guide Windows 2000 Active Directory Configuration Guide 24-4-2003 1 Windows 2000 Active Directory Configuration Guide Table of Contents Chapter 1 Introduction 2 1 About Metatude 2 2 About this manual 3 3 The

More information

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide

Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook

More information

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION

HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION HOW TO SILENTLY INSTALL CLOUD LINK REMOTELY WITHOUT SUPERVISION Version 1.1 / Last updated November 2012 INTRODUCTION The Cloud Link for Windows client software is packaged as an MSI (Microsoft Installer)

More information

Installation Guide v3.0

Installation Guide v3.0 Installation Guide v3.0 Shepherd TimeClock 4465 W. Gandy Blvd. Suite 800 Tampa, FL 33611 Phone: 813-882-8292 Fax: 813-839-7829 http://www.shepherdtimeclock.com The information contained in this document

More information

Installation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.

Installation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Inventory is a trademark owned by Specops Software.

More information

LDAP Directory Integration with Cisco Unity Connection

LDAP Directory Integration with Cisco Unity Connection CHAPTER 6 LDAP Directory Integration with Cisco Unity Connection The Lightweight Directory Access Protocol (LDAP) provides applications like Cisco Unity Connection with a standard method for accessing

More information

XCM Internet Explorer Settings

XCM Internet Explorer Settings XCM Internet Explorer Settings For best results, you must prepare your Internet Explorer (IE) browser so that interactions with the XCM site are fully trusted (XCM only supports Microsoft s Internet Explorer).

More information

DreamFactory on Microsoft SQL Azure

DreamFactory on Microsoft SQL Azure DreamFactory on Microsoft SQL Azure Account Setup and Installation Guide For general information about the Azure platform, go to http://www.microsoft.com/windowsazure/. For general information about the

More information

Entrust Managed Services PKI

Entrust Managed Services PKI Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.

More information

Windows Live Mail Setup Guide

Windows Live Mail Setup Guide Versions Addressed: Windows Live Mail 2011 Document Updated: 11/24/2010 Copyright 2010 Purpose: This document will assist the end user in configuring Windows Live Mail to access a POP3 email account hosted

More information

To enable an application to use external usernames and passwords, you need to first configure CA EEM to use external directories.

To enable an application to use external usernames and passwords, you need to first configure CA EEM to use external directories. Most clients utilize an external directory tool, such as Microsoft Active Directory, to provide authentication. CA Embedded Entitlements Manager (EEM) can be configured to integrate with the same external

More information

Introducing the FirePass and IBM Domino Web Access configuration

Introducing the FirePass and IBM Domino Web Access configuration Deployment Guide Deploying IBM Lotus Domino Web Access (inotes) and F5 s FirePass controller Introducing the FirePass and IBM Domino Web Access configuration Welcome to the FirePass Domino Web Access Deployment

More information

Specops Command. Installation Guide

Specops Command. Installation Guide Specops Software. All right reserved. For more information about Specops Command and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Command is a trademark owned by Specops

More information

Using the Content Distribution Manager GUI

Using the Content Distribution Manager GUI CHAPTER 3 Using the Content Distribution Manager GUI The Content Distribution Manager is the central location from which much of the work of creating and managing ACNS networks and hosted content can be

More information

800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410

800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410 800-782-3762 www.stbernard.com Active Directory 2008 Implementation Version 6.410 Contents 1 INTRODUCTION...2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION...3 2.1 Supported Deployment

More information

How to pull content from the PMP into Core Publisher

How to pull content from the PMP into Core Publisher How to pull content from the PMP into Core Publisher Below you will find step-by-step instructions on how to set up pulling or retrieving content from the Public Media Platform, or PMP, and publish it

More information

SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE

SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

Oracle 11g Express Edition Release 2 Guide This is an installation and setup guide for use of Oracle 11g Express Edition Release 2 and of Oracle SQL

Oracle 11g Express Edition Release 2 Guide This is an installation and setup guide for use of Oracle 11g Express Edition Release 2 and of Oracle SQL Oracle 11g Express Edition Release 2 Guide This is an installation and setup guide for use of Oracle 11g Express Edition Release 2 and of Oracle SQL Developer. This guide is intended for research and educational

More information

Installing Microsoft WebMatrix

Installing Microsoft WebMatrix From http://www.microsoft.com/web/ click on the Install WebMatrix button This opens a new page, be sure to read the System Requirements: Supported Operating Systems are Windows 7, Windows Vista, Windows

More information