Please return this document to when complete.

Size: px
Start display at page:

Download "Please return this document to ezproxy-anz@oclc.org when complete."

Transcription

1 Section 1 to be completed prior to quote Please return this document to when complete. 1. Institution Name: 2. OCLC has selected an institution domain name for this server. This is the domain address for logging in and proxy access. The server domain name will be: XXXX.idm.oclc.org Please advise if this domain name is unsuitable. 3. OCLC Symbol (if known): 4. Contact Name: 5. Direct Contact Phone Number: 6. Contact 7. Institution Address: 8. What method is used to authenticate your users? (e.g. user.txt, LDAP*, SIP*, CGI, III Patron AP, WMS, Other): *Further details will need to be provided for these authentication methods when placing the order (see Section 2: Question 15 in this document) See: Page 1

2 9. Do you currently use EZproxy? Yes / No 10. Please list the remote resources that you intend to proxy. Include the following information: - Title of the online resource, collection/journal or website (eg. EBSCOhost, Overdrive, World Book Online) - Starting point URL (initial URL), i.e. the URL you use to access this online resource, collection/journal or website Note: The starting point URL is the URL you would use to access the resource (as if you were first going to the website with the intention of searching for content), and not the URL(s) of individual articles (or journals). Note: The number of resources is unlimited. Add extra resources, if required. Resource 1: Resource 2: Resource 3: Resource 4: Resource 5: Resource 6: Resource 7: Resource 8: Page 2

3 Resource 9: Resource 10: Resource 11: Resource 12: Resource 13: Resource 14: Resource 15: Resource 16: Resource 17: Resource 18: Resource 19: Resource 20: Page 3

4 Section 2 to be completed prior to placing order 11. Technical Contact Name: 12. Direct Technical Contact Phone Number: 13. Technical Contact Do you prefer to be contacted by or phone? / Phone (please circle preferred) 15. What method is used to authenticate your users? (e.g. user.txt, LDAP*, SIP*, CGI, III Patron AP, WMS, Other): See Section 1: Question 8 of this document * See further questions below for these authentication methods See: If LDAP Authentication please supply the following information: a) LDAP Server Name and IP address: b) LDAP Port number: c) Should the authentication be LDAP or LDAPS: LDAP / LDAPS d) Binding Username and Password if anonymous bind disabled: Page 4

5 e) Base DN and other account information (i.e. CN, OU, O etc.): f) Filter if needed to search: 15.2 If SIP Authentication please supply the following information: a) SIP Server Name/IP address: b) SIP Port number: c) SIP User name (if applicable): d) SIP User password (if applicable): 15.3 If Shibboleth Authentication please supply the following information: a) Shibboleth Identity Provider Entity ID: b) Shibboleth Identity Provider metadata: (Please attach another page or expand text box if not enough space below) Page 5

6 16. If you answered Yes in Section 1: Question 9 about currently using EZproxy, please complete the questions below. a) What is the version number you are using? See: b) Are you using SSL within EZproxy? Yes / No See: c) Please supply your configuration files (user.txt, config.txt, and any files included by these files). Do not files containing usernames and password before contacting OCLC. Please contact OCLC for instructions before sending files 17. Please provide the contact details of the person who manages your firewall configurations. Contact Name: Contact Phone Number: Contact Are you using NAT (Network Address Translation) addresses? Yes / No 19. If you are not using NAT addresses, what is your internal IP address range(s)? Page 6

7 20. What is your externally visible IP address(es)? Note: This is the IP address(es) that EZproxy will see as being the source of connections from users on your internal network(s). 21. Do you intend to use EZproxy to authenticate onsite user access to remote resources? Yes, login required / Yes, login not required / No 22. Updating your configuration usually results in a 5-10 minute downtime. What day/time(s) are preferable for non-critical updates? (Timing of critical updates will be discussed as required.) INSTITUTION RESPONSIBILITIES Any links that are accessed by your users will need to be updated with your hosted EZproxy prefix URL. You will need to consider all locations that contain links for your users to access databases and resources (including websites, catalogues, bookmarks and jump pages). IMPORTANT: We will give you the IP address of your new EZproxy Hosted server. Please register this IP address with the content providers listed in Section 1: Question 10 above. In order to achieve minimum disruption to database access, activation of IP addresses should be scheduled with the content providers to occur before activation of your new EZproxy service. Page 7

EZproxy Hosted Frequently Asked Questions

EZproxy Hosted Frequently Asked Questions EZproxy Hosted Frequently Asked Questions Q: What firewall ports would have to be opened to accommodate hosted EZproxy? A: It mostly depends on how you plan to authenticate. For example if you want to

More information

Authenticating SSL VPN users using LDAP

Authenticating SSL VPN users using LDAP Authenticating SSL VPN users using LDAP This example illustrates how to configure a FortiGate to use LDAP authentication to authenticate remote SSL VPN users. With a properly configured LDAP server, user

More information

WorldCat Navigator: EZproxy Configuration Guide

WorldCat Navigator: EZproxy Configuration Guide WorldCat Navigator: EZproxy Configuration Guide Contents 1. Introduction 2. Obtaining an EZproxy license 3. The EZproxy userobject 4. Configuring EZproxy to allow userobject 5a. Configuring EZproxy for

More information

Configuring User Identification via Active Directory

Configuring User Identification via Active Directory Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be User Identification Overview User Identification allows you to create security policies based

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

Summary. How-To: Active Directory Integration. April, 2006

Summary. How-To: Active Directory Integration. April, 2006 How-To How-To Integrate CanIt-PRO with Active Directory: April, 2006 Summary Several organizations use Active Directory to manage their user accounts. This paper describes how to integrate CanIt-PRO with

More information

Getting Started with Clearlogin A Guide for Administrators V1.01

Getting Started with Clearlogin A Guide for Administrators V1.01 Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality

More information

NETASQ ACTIVE DIRECTORY INTEGRATION

NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos

More information

Basic Configuration. Key Operator Tools older products. Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work

Basic Configuration. Key Operator Tools older products. Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work Where to configure: User Tools Basic Configuration Key Operator Tools older products Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work Administrator Tools newest products

More information

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER

REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series

More information

The authentication process for validating a user using an external AD or LDAP provider is as follows.

The authentication process for validating a user using an external AD or LDAP provider is as follows. IntelligenceBank - External Authentication Active Directory Integration Overview The authentication process for validating a user using an external AD or LDAP provider is as follows. 1. The user accesses

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

Email Proxy POP3S. then authentication occurs. POP3S is for a receiving email. IMAP4S. and then authentication occurs. SMTPS is for sending email.

Email Proxy POP3S. then authentication occurs. POP3S is for a receiving email. IMAP4S. and then authentication occurs. SMTPS is for sending email. Email proxies extend remote email capability to users of Clientless SSL VPN. When users attempt an email session via email proxy, the email client establishes a tunnel using the SSL protocol. The email

More information

4 - TexShare and HARLiC CARDS http://www.pvamu.edu/pages/3693.asp ( Online Application Form) 5 REMOTE ACCESS TO DATABASES

4 - TexShare and HARLiC CARDS http://www.pvamu.edu/pages/3693.asp ( Online Application Form) 5 REMOTE ACCESS TO DATABASES The Library will email articles if they are in electronic format already. Patrons must complete a Distance Education Materials Request Form in order to receive articles. Please note, however, that we will

More information

Active Directory Requirements and Setup

Active Directory Requirements and Setup Active Directory Requirements and Setup The information contained in this document has been written for use by Soutron staff, clients, and prospective clients. Soutron reserves the right to change the

More information

nexvortex Setup Guide

nexvortex Setup Guide nexvortex Setup Guide CUDATEL COMMUNICATION SERVER September 2012 510 S P R I N G S T R E E T H E R N D O N V A 2 0 1 7 0 + 1 8 5 5. 6 3 9. 8 8 8 8 Introduction This document is intended only for nexvortex

More information

Using different Security Policies on Group Level for AD within one Portal. SSL-VPN Security on Group Level. Introduction

Using different Security Policies on Group Level for AD within one Portal. SSL-VPN Security on Group Level. Introduction SSL-VPN Using different Security Policies on Group Level for AD within one Portal SSL-VPN Security on Group Level Introduction Security on the SSL-VPN is done via Policies which allows or denies access

More information

Email Migration Manual (For Outlook 2010)

Email Migration Manual (For Outlook 2010) Email Migration Manual (For Outlook 2010) By SYSCOM (USA) May 13, 2013 Version 2.2 1 Contents 1. How to Change POP3/SMTP Setting for Outlook 2010... 3 2. How to Login to Webmail... 10 3. How to Change

More information

How to Configure Active Directory based User Authentication

How to Configure Active Directory based User Authentication How to Configure Active Directory based User Authentication You Must Have: Microsoft server with Active Directory configured. Windows 2000 Server is configured as Active Directory server in this example.

More information

CMDBuild Authentication (file auth.conf)

CMDBuild Authentication (file auth.conf) CMDBuild Authentication (file auth.conf) 1 Indice Introduction...3 1. Authentication type selection...3 auth.methods...3 serviceusers...3 force.ws.password.digest...3 2. Header authentication configuration...3

More information

3rd Party VoIP Phone Setup Guide (Panasonic 500-550b)

3rd Party VoIP Phone Setup Guide (Panasonic 500-550b) 3rd Party VoIP Phone Setup Guide (Panasonic 500-550b) We are changing how we add 3rd party VoIP phones to accounts. Going forward, you can simply add a 3rd Party Softphone and use those credentials to

More information

SchoolBooking LDAP Integration Guide

SchoolBooking LDAP Integration Guide SchoolBooking LDAP Integration Guide Before you start This guide has been written to help you configure SchoolBooking to connect to your LDAP server. Please treat this document as a reference guide, your

More information

VoIPon www.voipon.co.uk sales@voipon.co.uk Tel: +44 (0)1245 808195 Fax: +44 (0)1245 808299

VoIPon www.voipon.co.uk sales@voipon.co.uk Tel: +44 (0)1245 808195 Fax: +44 (0)1245 808299 VoiceGear/3CX Integration Guide Ver.0.1 Page 2 1. OVERVIEW... 3 1.1 SETTING UP 3CX PBX...4 1.2 SETTING UP VOICEGEAR GATEWAY...5 2. VOICEGEAR-3CX SIP INTEGRATION... 6 2.1 3CX CONFIGURATION...7 2.2 VOICEGEAR

More information

LDAP Authentication with JAGUAR ver.1.1

LDAP Authentication with JAGUAR ver.1.1 JAG C TB LDAP v1.1 E LDAP Authentication with JAGUAR ver.1.1 The definition of LDAP Authentication T e c h n i c a l B r i e f In modern world, most of the users who have user accounts on multiple services

More information

EMR Link Server Interface Installation

EMR Link Server Interface Installation EMR Link Server Interface Installation Version 1.0 ** INTRODUCTION ** If you would like assistance with installation, please contact our preferred support provider at support@bonecomputer.com, or call

More information

Email Migration Manual (For Outlook Express 6)

Email Migration Manual (For Outlook Express 6) Email Migration Manual (For Outlook Express 6) By SYSCOM (USA) May 13, 2013 Version 1.0 1 Contents 1. How to Change POP3/SMTP Setup for Outlook Express... 3 2. How to Login to Webmail... 7 3. How to Change

More information

Secure Messaging Server Console... 2

Secure Messaging Server Console... 2 Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating

More information

SonicWALL Email Security Quick Start Guide. Version 4.6

SonicWALL Email Security Quick Start Guide. Version 4.6 SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more

More information

User Management Guide

User Management Guide AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

7.0 Self Service Guide

7.0 Self Service Guide 7.0 Self Service Guide Copyright 2010 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated, microfilmed,

More information

PineApp Surf-SeCure Quick

PineApp Surf-SeCure Quick PineApp Surf-SeCure Quick Installation Guide September 2010 WEB BASED INSTALLATION SURF-SECURE AS PROXY 1. Once logged in, set the appliance s clock: a. Click on the Edit link under Time-Zone section.

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION

SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION Table of content ScopTel with Active Directory... 3 Software Features... 3 Software Compatibility... 3 Requirements... 3 ScopTel Configuration... 4 Prerequisites...

More information

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of

More information

HP Device Manager 4.7

HP Device Manager 4.7 Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Frequently Asked Questions (FAQ) (click header to jump to the section of your choice) HOW DO I REGISTER FOR AN ACCOUNT? HOW DO I CHANGE MY PASSWORD? WHY SHOULD I REGISTER FOR AN ACCOUNT? HOW CAN I SET

More information

Configuring Sponsor Authentication

Configuring Sponsor Authentication CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five

More information

What is the Barracuda SSL VPN Server Agent?

What is the Barracuda SSL VPN Server Agent? The standard communication model for outgoing calls is for the appliance to simply make a direct connection to the destination host. This paradigm does not suit all business needs. The Barracuda SSL VPN

More information

To enable an application to use external usernames and passwords, you need to first configure CA EEM to use external directories.

To enable an application to use external usernames and passwords, you need to first configure CA EEM to use external directories. Most clients utilize an external directory tool, such as Microsoft Active Directory, to provide authentication. CA Embedded Entitlements Manager (EEM) can be configured to integrate with the same external

More information

FTP e TFTP. File transfer protocols PSA1

FTP e TFTP. File transfer protocols PSA1 FTP e TFTP File transfer protocols PSA1 PSA2 PSA3 PSA4 PSA5 PSA6 PSA7 PSA8 PSA9 Firewall problems with FTP Client-side Firewalls the client is behind a firewall and cannot be reached directly from the

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Connecting an Android to a FortiGate with SSL VPN

Connecting an Android to a FortiGate with SSL VPN Connecting an Android to a FortiGate with SSL VPN This recipe describes how to provide a group of remote Android users with secure, encrypted access to the network using FortiClient and SSL VPN. You must

More information

OFFICE OF KNOWLEDGE, INFORMATION, AND DATA SERVICES (KIDS) DIVISION OF ENTERPRISE DATA

OFFICE OF KNOWLEDGE, INFORMATION, AND DATA SERVICES (KIDS) DIVISION OF ENTERPRISE DATA OFFICE OF KNOWLEDGE, INFORMATION, AND DATA SERVICES (KIDS) DIVISION OF ENTERPRISE DATA Technical Guide Active Directory/Infinite Campus Integration in the KETS Environment Version 1.3 February 24, 2015

More information

Configuring and Using the TMM with LDAP / Active Directory

Configuring and Using the TMM with LDAP / Active Directory Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring

More information

Email Client configuration and migration Guide Setting up Thunderbird 3.1

Email Client configuration and migration Guide Setting up Thunderbird 3.1 Email Client configuration and migration Guide Setting up Thunderbird 3.1 1. Open Mozilla Thunderbird. : 1. On the Edit menu, click Account Settings. 2. On the Account Settings page, under Account Actions,

More information

JetWave SIP Trunk Setup

JetWave SIP Trunk Setup DSX JetWave SIP Trunk Setup April 23, 2011 Issue 1.01 NEC Corporation of America 4 Forest Parkway, Shelton, CT 06484 Copyright 2011 NEC Corporation of America 6535 N. State Highway 161 Irving, TX 75039-2402

More information

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook

ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access. Integration Handbook ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access Integration Handbook Document Version 1.1 Released July 16, 2012 ActivIdentity 4TRESS AAA Web Tokens and SSL VPN Fortinet Secure Access

More information

Active Directory Integration

Active Directory Integration Active Directory Integration Last updated March 2016 Contents Introduction:... 2 Administration configuration set up:... 2 Configuring for a single OU import... 3 User Importing... 3 Active Directory and

More information

Configuration Worksheets for Oracle WebCenter Ensemble 10.3

Configuration Worksheets for Oracle WebCenter Ensemble 10.3 Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the

More information

Setting up LDAP settings for LiveCycle Workflow Business Activity Monitor

Setting up LDAP settings for LiveCycle Workflow Business Activity Monitor Adobe Enterprise & Developer Support Knowledge Article ID: c4715 bc Setting up LDAP settings for LiveCycle Workflow Business Activity Monitor In addition to manually creating users and user permissions,

More information

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016

Folder Proxy + OWA + ECP/EAC Guide. Version 2.0 April 2016 Version 2.0 April 2016 Folder Proxy + OWA + ECP/EAC Guide Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

Using WebAccess with Windows Server 2008

Using WebAccess with Windows Server 2008 Using WebAccess with Windows Server 2008 2008 June Using WebAccess on Windows Server 2008requires Software Build 6.0-2008.06.06 or later (June 6 2008 or later). Enable IIS (Internet Information Service)

More information

MFT Command Center/Internet Server LDAP Integration Guide. Ver sio n 7.1.1

MFT Command Center/Internet Server LDAP Integration Guide. Ver sio n 7.1.1 MFT Command Center/Internet Server LDAP Integration Guide Ver sio n 7.1.1 September 7, 2011 Documentation Information MFT LDAP Integration Guide Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES

More information

AskCody Connect Connect your Outlook or AD to AskCody s solutions seamlessly. Everything included!

AskCody Connect Connect your Outlook or AD to AskCody s solutions seamlessly. Everything included! AskCody Connect Connect your Outlook or AD to AskCody s solutions seamlessly. Everything included! Integrate the solutions from AskCody with your existing calendar system and create a complete, dynamic

More information

Integrating a Hitachi IP5000 Wireless IP Phone

Integrating a Hitachi IP5000 Wireless IP Phone November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition

More information

Stealth SSH Tunneling for Windows

Stealth SSH Tunneling for Windows Stealth SSH Tunneling for Windows In situations where you are behind a strong firewall, Deep Packet Inspection device or proxy that blocks all ports and only allow outgoing connections on ports 80(HTTP)

More information

escan SBS 2008 Installation Guide

escan SBS 2008 Installation Guide escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.

More information

2.2.1. Astaro User Portal: Getting Software and Certificates...13. 2.2.2. Astaro IPsec Client: Configuring the Client...14

2.2.1. Astaro User Portal: Getting Software and Certificates...13. 2.2.2. Astaro IPsec Client: Configuring the Client...14 1. Introduction... 2 2. Remote Access via IPSec... 2 2.1. Configuration of the Astaro Security Gateway... 2 2.2. Configuration of the Remote Client...13 2.2.1. Astaro User Portal: Getting Software and

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

THINKTEL COMMUNICATIONS TALKSWITCH VS TALKSWITCH VS THINKTEL SIP TRUNK & DID

THINKTEL COMMUNICATIONS TALKSWITCH VS TALKSWITCH VS THINKTEL SIP TRUNK & DID THINKTEL COMMUNICATIONS TALKSWITCH VS TALKSWITCH VS THINKTEL SIP TRUNK & DID TA B L E O F C O N T E N T S 1.1 INTRODUCTION... 3 1.2 STARTING THE MANAGEMENT SOFTWARE... 4 1.3 IP CONFIGURATION... 5 1.4 ROUTER

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE) INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';

More information

AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members

AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members AusCERT Remote Monitoring Service (ARMS) User Guide for AusCERT Members Last updated: 27/06/2014 Contents 1 Introduction... 2 1.1 What is ARMS?... 2 1.2 Glossary Terms... 2 2 Setting up your ARMS configuration

More information

MFT Internet Server/Command Center

MFT Internet Server/Command Center MFT Internet Server/Command Center September 17, 2010 Administrators Guide LDAP Integration Guide Version 7.0 Version 7.0 September 24, 2010 Updated: December 20, 2010 Documentation Information MFT Command

More information

ThinkTel ITSP with Registration Setup Quick Start Guide

ThinkTel ITSP with Registration Setup Quick Start Guide January 13 ThinkTel ITSP with Registration Setup Quick Start Guide Author: Zultys Technical Support This configuration guide was created to assist knowledgeable vendors with configuring the Zultys MX Phone

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

ProxySG TechBrief LDAP Authentication with the ProxySG

ProxySG TechBrief LDAP Authentication with the ProxySG ProxySG TechBrief LDAP Authentication with the ProxySG What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned

More information

Cloudwork Dashboard User Manual

Cloudwork Dashboard User Manual STUDENTNET Cloudwork Dashboard User Manual Make the Cloud Yours! Studentnet Technical Support 10/28/2015 User manual for the Cloudwork Dashboard introduced in January 2015 and updated in October 2015 with

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

Skyward LDAP Launch Kit Table of Contents

Skyward LDAP Launch Kit Table of Contents 04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know

More information

Using LDAP with Sentry Firmware and Sentry Power Manager (SPM)

Using LDAP with Sentry Firmware and Sentry Power Manager (SPM) Using LDAP with Sentry Firmware and Sentry Power Manager (SPM) Table of Contents Purpose LDAP Requirements Using LDAP with Sentry Firmware (GUI) Initiate a Sentry GUI Session Configuring LDAP for Active

More information

Authentication and Single Sign On

Authentication and Single Sign On Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication

More information

SSL Web Proxy. Generally to access an internal web server which is behind a NAT router, you have the following two methods:

SSL Web Proxy. Generally to access an internal web server which is behind a NAT router, you have the following two methods: SSL Web Proxy Vigor2930, Vigor2950 and VigorPro 5500/5510 series router support SSL Web Proxy function to let user access lots of servers in security via Internet environment. We provide a general user

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Group Management Server User Guide

Group Management Server User Guide Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring

More information

UX5000 with CommPartners SIP Trunks

UX5000 with CommPartners SIP Trunks UX5000 with CommPartners SIP Trunks SECTION 1 NEC S UX5000 AND CommPartners SETUP GUIDE This guide provides example entries for the required fields. The actual data will be e- mailed to you in the following

More information

Configuring Embedded LDAP Authentication

Configuring Embedded LDAP Authentication Configuring Embedded LDAP Authentication configure Configuring Embedded LDAP Authentication For HP product models: LaserJet 4345mfp, LaserJet 9040mfp, LaserJet 9050mfp, LaserJet 9500mfp, and Digital Sender

More information

Configuring Global Protect SSL VPN with a user-defined port

Configuring Global Protect SSL VPN with a user-defined port Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure

More information

Enterprise Toolbar User s Guide. Revised March 2015

Enterprise Toolbar User s Guide. Revised March 2015 Revised March 2015 Copyright Notice Trademarks Copyright 2007 DSCI, LLC All rights reserved. Any technical documentation that is made available by DSCI, LLC is proprietary and confidential and is considered

More information

How to configure your email client

How to configure your email client How to configure your email client This guide will teach you how to set up your email client. In this guide we will cover both Outlook and Windows Live mail, which are two of the major email clients used

More information

External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park

More information

Sage CRM. 7.2 Self Service Guide

Sage CRM. 7.2 Self Service Guide Sage CRM 7.2 Self Service Guide Copyright 2013 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated,

More information

Sage Accpac CRM 5.8. Self Service Guide

Sage Accpac CRM 5.8. Self Service Guide Sage Accpac CRM 5.8 Self Service Guide Copyright 2005 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated,

More information

Siteminder Integration Guide

Siteminder Integration Guide Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with

More information

NEFSIS DEDICATED SERVER

NEFSIS DEDICATED SERVER NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis

More information

Centrify Cloud Connector Deployment Guide

Centrify Cloud Connector Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as

More information

HRG Performance Series DVR DDNS Support Application Note (hrgddns)

HRG Performance Series DVR DDNS Support Application Note (hrgddns) HRG Performance Series DVR DDNS Support Application Note (hrgddns) This document describes how to enable and configure Dynamic DNS (DDNS) functionality on the HRG Performance Series digital video recorder

More information

Version 9. Active Directory Integration in Progeny 9

Version 9. Active Directory Integration in Progeny 9 Version 9 Active Directory Integration in Progeny 9 1 Active Directory Integration in Progeny 9 Directory-based authentication via LDAP protocols Copyright Limit of Liability Trademarks Customer Support

More information

CompleteSBC: Getting Started Guide

CompleteSBC: Getting Started Guide CompleteSBC: Getting Started Guide Default CompleteSBC Configuration CompleteSBC (SBC) is pre-configured to perform the following actions: registration caching limiting the number of concurrent calls via

More information

Setup Corporate (Microsoft Exchange) Email. This tutorial will walk you through the steps of setting up your corporate email account.

Setup Corporate (Microsoft Exchange) Email. This tutorial will walk you through the steps of setting up your corporate email account. Setup Corporate (Microsoft Exchange) Email This tutorial will walk you through the steps of setting up your corporate email account. Microsoft Exchange Email Support Exchange Server Information You will

More information

Cryoserver Archive Lotus Notes Configuration

Cryoserver Archive Lotus Notes Configuration Lotus Notes Configuration Version 1.0 December 2007 Forensic & Compliance Systems Ltd +44 (0)800 280 0525 info@cryoserver.com www.cryoserver.com Contents INTRODUCTION... 3 SMTP ROUTING TO CRYOSERVER...

More information

LDAP User Guide PowerSchool Premier 5.1 Student Information System

LDAP User Guide PowerSchool Premier 5.1 Student Information System PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson

More information

Integrating Webalo with LDAP or Active Directory

Integrating Webalo with LDAP or Active Directory Integrating Webalo with LDAP or Active Directory Webalo can be integrated with an external directory to identify valid Webalo users and then authenticate them to the Webalo appliance. Integration with

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Mobile Device Management Solution Hexnode MDM

Mobile Device Management Solution Hexnode MDM Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode

More information

EDINBURGH UNIVERSITY PRESS LIBRARIAN ADMINISTRATION USER GUIDE http://www.euppublishing.com

EDINBURGH UNIVERSITY PRESS LIBRARIAN ADMINISTRATION USER GUIDE http://www.euppublishing.com EDINBURGH UNIVERSITY PRESS LIBRARIAN ADMINISTRATION USER GUIDE http://www.euppublishing.com Journal Subscription Activation... 1 1. Register as an Individual User... 1 2. Subscription Confirmation Email...

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Shibboleth and Library Resources

Shibboleth and Library Resources Shibboleth and Library Resources InCommon Library/Shibboleth Project What is the Library/Shibboleth Project? Established 2007 Five universities + Internet2 Campus IT, Library IT, Librarians Adding Shibboleth

More information

Assistant Enterprise. User Guide. www.lumosnetworks.com 3-27-08

Assistant Enterprise. User Guide. www.lumosnetworks.com 3-27-08 Assistant Enterprise User Guide www.lumosnetworks.com 3-27-08 Assistant Enterprise (Toolbar) Guide Copyright Notice Trademarks Copyright 2007 BroadSoft, Inc. All rights reserved. Any technical documentation

More information

External Authentication with Citrix NetScaler (Access Gateway Enterprise) Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Citrix NetScaler (Access Gateway Enterprise) Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Citrix NetScaler (Access Gateway Enterprise) Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin

More information

About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack

About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer

More information