Introduction. Connection security

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Introduction. Connection security"

Transcription

1 SECURITY AND AUDITABILITY WITH SAGE ERP X3 Introduction An ERP contains usually a huge set of data concerning all the activities of a company or a group a company. As some of them are sensitive information (accounting, human resources for example), ensuring the security of those critical information is important. Another important point is the traceability of some modifications. This is especially the case for legislations where the accounting regulations require a complete access to the history of the modifications done on data. Another good example of traceability constraint is given by the FDA regulation, and concerns data linked to the BOMs and routings. The SAFE X3 platform, on which Sage ERP X3 is based, integrates a set of tools in order to ensure the security and the traceability of the information stored and the operations performed. This document will give you details on the tools available on the platform. Connection security SAFE X3 platform is based on components that can be installed on secured servers, protected by firewalls, using https secured connections to the client for the Web native client, but also for the Web service layer that can be used by any external software willing to access to application and administration services provided through the platform. The user authentication can be controlled through an access to a centralized LDAP directory, and the identity can be inherited via NTLM over http protocol (in Web mode) or through the Windows login information (in client-server). LDAP means Lightweight Directory Access Protocol. It refers to open structures used to manage identities in a centralized way, and all the authentication information linked to it. Several implementations exist (such as OpenLdap). Active Directory is the corresponding implementation used by Microsoft to store identities and is LDAP compatible. In Sage ERP X3 version V6, a setup allows to declare that an LDAP directory exists somewhere on the network, and to map information usually stored in the user s or parameter s table with LDAP fields. Once this is done, the parameters stored in Sage ERP X3 database can automatically be refreshed according to the values stored in the LDAP directory (setup option): a central user s repository of the users can thus be managed. Since version 6.2, the connection can also be secured by using a token sent by an external Single Sign On system. Sage SSO provides this single sign on procedure, which is used for example by Netvibes, in order to provide a secured access to business data within end-user portals. Security, traceability, auditability with SAFE X3 platform Version 1 SAGE / 6

2 Organizations The security for Sage ERP X3 can be defined by folders. A folder is a container that stores the data related to several entities as well as parameters and common data. In each folder, Sage ERP X3 permits to describe companies, financial sites, operational sites, and to define hierarchies of sites based on the legal and accounting organization (a warehouse posting entries on a financial site belonging to a company member of the group), but also on any organizational link (all the European warehouses, whenever they belong to the same legal company or not). This is shown in the following screen: Each company belongs to a given legislation; in a group of company, several legislations can be used. The security can be established for each folder by granting rights to users and users groups, based on these organizational levels. Security, traceability, auditability with SAFE X3 platform Version 1 SAGE / 6

3 Users and profile Associated to a user, the platform allows the description of function profiles managing the access rights at any level of the organization (sites, companies, sites grouping). Different controls can be set up: 1) Access restriction to data and operations for each function by site, by company, or by groups of sites. For example, it is possible to set up that a user will have access to the sales orders : o Those related to a group of sites or companies in creation, and modification, allocation and preparation, but not deletion nor invoicing o Those related to a site only for inquiry o And no access for all the other sites This is shown by the screen copy above: Depending on functions, the operation controlled can be different (for example, on fixed assets, the rights to reevaluate an asset, to revise it, to split it, to issue them, the change the methods can be controlled separately if needed). Security, traceability, auditability with SAFE X3 platform Version 1 SAGE / 6

4 2) Authorization management by field, and per transaction, per report through access codes. This will permit to deny for example the access to a given accounting transaction, or disable the modification of the payment term on the customer record. 3) In addition, filter can be added on any field by defining roles and assigning codes related to this role by user. Let s imagine for example that a given user, connected via the Web, is a client with the role of payer. Thus, he will have the right to view the invoices for which he is paying customer. The roles can be freely defined: suppliers, buyers, trade... roles can be set up to secure the filtering of information accessible via the application. 4) Filters can be given on any inquiry, and also for groups of inquiries; access can be given to statistics at a given level. Let s have an example: if a statistical inquiry published on the portal gives the sales detail per area, per sales representative, per item category and customer, a sales representative can have only access to the sales detail for himself (by item category and customer), while the sales director for an area will have access to the detail of his area by sales representative, product line and customer. Parameter setting Transverse security parameters are also defined in the platform. Let s give examples: password policy (length and complexity, renewal period, number of unsuccessful connection attempts ) if the authentication is managed by the platform and not through an external SSO. Automatic time-out for connections Audit constraints and restrictions Administrator identifier, and sub-administrators profile codes These parameters can be set up, depending on the parameters, at global level, at legislation level, at company level, at site level, or at user level. The most local level is used if it exists; otherwise the parameter value is inherited from an upper level. Predefined set of parameter can be registered (for example, having 3 level of security for a given set of parameter, called LOW, MEDIUM, and HIGH). Some global parameters can be locked to a predefined value if given legislations are used for companies belonging to a group. Security, traceability, auditability with SAFE X3 platform Version 1 SAGE / 6

5 Traceability and audit The SAFE X3 platform includes several traceability and audit functions. The following elements are available: Every login is recorded on the system (whether it is successful or unsuccessful: in case of login failure, the reason why the login could not be done is stored). The information available is: the IP address of the client, the login code, the type of connection, date and time, OS user code. The recording of all critical data stores the date of creation, of last successful modification, and user s identifier who performed the creation and the last modification. Regarding operations performed by users, a first level of audit (user level) allows you to log every successful operation done by users. For each user, a parameter can have the following value: No log, Log of all operations, log of delete and change code operation only. The details stored are date, time, and user code, function and operation performed, and also the key identifying the data. For example, using this function, you will know that John DOE performed a modification on item CD100 the First of December 2008 at 5:31 AM. A more detailed information track can be done through parameter setting (data traceability in dictionary). In that case you will indicate for each database table you want to secure, whether you want to log creation, modification and/or deletion of this table. This level gives you, at the table level, the operation done history. You can also store the details of the modifications done on the fields. In that case, you will get detailed information such as: The First of December 2008 at 5:31 AM, John DOE modified the item (table ITMMASTER) record CD100; the field DEFPOT (default potency) was modified (the previous value was 0.95, and the new value is 0.96). When such a parameter setting is done, a trigger is automatically created in the database. Thus, any modification including a modification through direct access to the database will be tracked. In order to be compliant with regulation such as CFR-21, you can, through a modification, add a control that will force, for modification made on critical fields, the user to sign by entering his password and a reason code for the modification. If the password is not entered, the modification won t be possible. The libraries needed to implement this functionality and the inquiry function are provided, as well as a configuration parameter (a dedicated activity code) and a sequence code for log numbering. The only modification to be done is to add given fields (with a predefined name) on the tables that you want to manage with e- signature, to set up the field traceability on these fields, and finally to add a screen control that will call a dedicated action when modification is done. A technical document describes the methodology to be used for the implementation. Security, traceability, auditability with SAFE X3 platform Version 1 SAGE / 6

6 Alerts, Workflow and approval In order to trigger dedicated actions based on a given operation done, or to notify and request for approval some modification done, the SAFE X3 platform includes a workflow setup. The workflow engine is able: To send mails. To feed workbenches presented to the users in order to help them to take decisions. To trigger updates, request for approval and manage approval circuits with multiple approvers. To send linked documents to the s; for example, after completion of a batch request, sending a summarized report including the log file generated if errors or warning occurred. Predefined rules are supplied by default, for example: purchase requests and purchase order approval, batch operations notification, modification summary on critical data, approval on sales quotation and orders, password renewals if they are managed by the platform, escalation on signatures Document management The traceability constraints can be requested not only for the ERP data, but also for the documents produced by the ERP or sent to the ERP. The SAFE X3 platform is able to store securely documents in different electronic document management systems, through a standard connector used by several EDM vendors. The documents produced by the ERP (reports, log file, exports, linked documents ) can be securely stored in containers with associated data, and retrieved easily through link established with the data managed in the ERP (for example, linking technical documents to items or BOMS, linking the closing balances reports to a company record, linking simulation Excel spreadsheet exported from a budget entry to the budget definition ). Security, traceability, auditability with SAFE X3 platform Version 1 SAGE / 6

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide

TREENO ELECTRONIC DOCUMENT MANAGEMENT. Administration Guide TREENO ELECTRONIC DOCUMENT MANAGEMENT Administration Guide October 2012 Contents Introduction... 8 About This Guide... 9 About Treeno... 9 Managing Security... 10 Treeno Security Overview... 10 Administrator

More information

Oracle WebCenter Content

Oracle WebCenter Content Oracle WebCenter Content 21 CFR Part 11 Certification Kim Hutchings US Data Management Phone: 888-231-0816 Email: khutchings@usdatamanagement.com Introduction In May 2011, US Data Management (USDM) was

More information

Managing Users and Identity Stores

Managing Users and Identity Stores CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting

More information

for Sage 100 ERP Paperless Office Overview Document

for Sage 100 ERP Paperless Office Overview Document for Sage 100 ERP Paperless Office Document 2012 Sage Software, Inc. All rights reserved. Sage Software, Sage Software logos, and the Sage Software product and service names mentioned herein are registered

More information

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher

A Nemaris Company. Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher A Nemaris Company Formal Privacy & Security Assessment For Surgimap version 2.2.6 and higher 306 East 15 th Street Suite 1R, New York, New York 10003 Application Name Surgimap Vendor Nemaris Inc. Version

More information

Netwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015

Netwrix Auditor. Administrator's Guide. Version: 7.1 10/30/2015 Netwrix Auditor Administrator's Guide Version: 7.1 10/30/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation

More information

EPM Performance Suite Profitability Administration & Security Guide

EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 EPM Performance Suite Profitability Administration & Security Guide BusinessObjects XI R2 11.20 Windows Patents Trademarks Copyright Third-party Contributors Business Objects

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

Group Management Server User Guide

Group Management Server User Guide Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring

More information

Interwise Connect. Working with Reverse Proxy Version 7.x

Interwise Connect. Working with Reverse Proxy Version 7.x Working with Reverse Proxy Version 7.x Table of Contents BACKGROUND...3 Single Sign On (SSO)... 3 Interwise Connect... 3 INTERWISE CONNECT WORKING WITH REVERSE PROXY...4 Architecture... 4 Interwise Web

More information

Full Compliance Contents

Full Compliance Contents Full Compliance for and EU Annex 11 With the regulation support of Contents 1. Introduction 2 2. The regulations 2 3. FDA 3 Subpart B Electronic records 3 Subpart C Electronic Signatures 9 4. EU GMP Annex

More information

White paper inforouter in the Life Sciences Industry: 21 CFR Part 11 Compliance

White paper inforouter in the Life Sciences Industry: 21 CFR Part 11 Compliance White paper inforouter in the Life Sciences Industry: 21 CFR Part 11 Compliance Overview of 21 CFR Part 11 The final version of the 21 CFR Part 11 regulation released by the FDA in 1997 provides a framework

More information

Immotec Systems, Inc. SQL Server 2005 Installation Document

Immotec Systems, Inc. SQL Server 2005 Installation Document SQL Server Installation Guide 1. From the Visor 360 installation CD\USB Key, open the Access folder and install the Access Database Engine. 2. Open Visor 360 V2.0 folder and double click on Setup. Visor

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Documentation. CloudAnywhere. http://www.cloudiway.com. Page 1

Documentation. CloudAnywhere. http://www.cloudiway.com. Page 1 Documentation CloudAnywhere http://www.cloudiway.com Page 1 Table of Contents 1 INTRODUCTION 3 2 OVERVIEW 4 2.1 KEY FUNCTIONALITY 4 2.2 PREREQUISITES 5 3 FEATURES 6 3.1 A UNIVERSAL PROVISIONING SOLUTION.

More information

NETASQ ACTIVE DIRECTORY INTEGRATION

NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos

More information

MEDITECH CUSTOMERS & THE OIG QUESTIONNAIRE

MEDITECH CUSTOMERS & THE OIG QUESTIONNAIRE MEDITECH CUSTOMERS & THE OIG QUESTIONNAIRE Hospitals that have received Medicare incentive payments for meaningful use of electronic health records have been asked by the Office of Inspector General of

More information

VERALAB LDAP Configuration Guide

VERALAB LDAP Configuration Guide VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to

More information

StreamServe Persuasion SP5 StreamStudio

StreamServe Persuasion SP5 StreamStudio StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other

More information

Enterprise Self-Service Portal FAQ

Enterprise Self-Service Portal FAQ Enterprise Self-Service Portal FAQ General Information: info@cionsystems.com Online Support: support@cionsystems.com CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com

More information

Spectrum Technology Platform. Version 9.0. Administration Guide

Spectrum Technology Platform. Version 9.0. Administration Guide Spectrum Technology Platform Version 9.0 Administration Guide Contents Chapter 1: Getting Started...7 Starting and Stopping the Server...8 Installing the Client Tools...8 Starting the Client Tools...9

More information

qliqdirect Active Directory Guide

qliqdirect Active Directory Guide qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect

More information

Sophos Mobile Control Technical guide

Sophos Mobile Control Technical guide Sophos Mobile Control Technical guide Product version: 2 Document date: December 2011 Contents 1. About Sophos Mobile Control... 3 2. Integration... 4 3. Architecture... 6 4. Workflow... 12 5. Directory

More information

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE

Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication

More information

Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker

Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker Monitoring SharePoint 2007/2010/2013 Server Using Event Tracker White Paper Publication Date: June 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Overview EventTracker

More information

Océ LDAP Adapter User Guide

Océ LDAP Adapter User Guide Océ LDAP Adapter User Guide Océ PRISMAweb V4.0 The e-business solution for Print Service Providers _ Copyright 2005, 2006,2007 by Océ Printing Systems GmbH. All rights reserved. This User Documentation

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks

WildFire Reporting. WildFire Administrator s Guide 55. Copyright 2007-2015 Palo Alto Networks WildFire Reporting When malware is discovered on your network, it is important to take quick action to prevent spread of the malware to other systems. To ensure immediate alerts to malware discovered on

More information

User Bulletin. 8200 Cellular Detection System Analysis Software v4.0. Introduction. 21 CFR Part 11 Software Console - Administrators Guide

User Bulletin. 8200 Cellular Detection System Analysis Software v4.0. Introduction. 21 CFR Part 11 Software Console - Administrators Guide . User Bulletin 8200 Cellular Detection System Analysis Software v4.0 August 14, 2007 SUBJECT: 21 CFR Part 11 Software Console - Administrators Guide In This User Bulletin This user bulletin covers: Introduction.......................................................

More information

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

SOA Software: Troubleshooting Guide for Agents

SOA Software: Troubleshooting Guide for Agents SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet

Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from

More information

Web Remote Access. User Guide

Web Remote Access. User Guide Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior

More information

Configuring SonicWALL TSA on Citrix and Terminal Services Servers

Configuring SonicWALL TSA on Citrix and Terminal Services Servers Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,

More information

Single Sign-on (SSO) technologies for the Domino Web Server

Single Sign-on (SSO) technologies for the Domino Web Server Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145

More information

Installation and Configuration Guide

Installation and Configuration Guide Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark

More information

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background

Customer Tips. Xerox Network Scanning TWAIN Configuration for the WorkCentre 7328/7335/7345. for the user. Purpose. Background Xerox Multifunction Devices Customer Tips dc07cc0432 October 19, 2007 This document applies to these Xerox products: X WC 7328/7335/7345 for the user Xerox Network Scanning TWAIN Configuration for the

More information

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011

User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011 User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

SchoolBooking SSO Integration Guide

SchoolBooking SSO Integration Guide SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,

More information

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing

PA-DSS Implementation Guide for. Sage MAS 90 and 200 ERP. Credit Card Processing for Sage MAS 90 and 200 ERP Credit Card Processing Version 4.30.0.18 and 4.40.0.1 - January 28, 2010 Sage, the Sage logos and the Sage product and service names mentioned herein are registered trademarks

More information

ADSelfService Plus Client Software Installation Guide

ADSelfService Plus Client Software Installation Guide ADSelfService Plus Client Software Installation Guide ( I n s t a l l a t io n t h r o u g h A DS e l f S e r v ic e P l u s w e b p o r t a l a n d M a n u a l I n s t a l l a t io n ) 1 Table of Contents

More information

MICROSOFT OFFICE 365 MIGRATION 2013/05/13

MICROSOFT OFFICE 365 MIGRATION 2013/05/13 MICROSOFT OFFICE 365 MIGRATION 2013/05/13 WHAT IS OFFICE 365 Office 365 provides virtually anywhere access to familiar Office tools Word WEB App Excel WEB App PowerPoint WEB App Enterprise-grade email

More information

Overview. Edvantage Security

Overview. Edvantage Security Overview West Virginia Department of Education (WVDE) is required by law to collect and store student and educator records, and takes seriously its obligations to secure information systems and protect

More information

Business Portal for Microsoft Dynamics GP 2010. User s Guide Release 5.1

Business Portal for Microsoft Dynamics GP 2010. User s Guide Release 5.1 Business Portal for Microsoft Dynamics GP 2010 User s Guide Release 5.1 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Best Practices Report

Best Practices Report Overview As an IT leader within your organization, you face new challenges every day from managing user requirements and operational needs to the burden of IT Compliance. Developing a strong IT general

More information

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform

Version 1.0 January 2011. Xerox Phaser 3635MFP Extensible Interface Platform Version 1.0 January 2011 Xerox Phaser 3635MFP 2011 Xerox Corporation. XEROX and XEROX and Design are trademarks of Xerox Corporation in the United States and/or other countries. Changes are periodically

More information

Jet Data Manager 2012 User Guide

Jet Data Manager 2012 User Guide Jet Data Manager 2012 User Guide Welcome This documentation provides descriptions of the concepts and features of the Jet Data Manager and how to use with them. With the Jet Data Manager you can transform

More information

User-ID Best Practices

User-ID Best Practices User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers

More information

Tools to Aid in 21 CFR Part 11 Compliance with EZChrom Elite Chromatography Data System. White Paper. By Frank Tontala

Tools to Aid in 21 CFR Part 11 Compliance with EZChrom Elite Chromatography Data System. White Paper. By Frank Tontala Tools to Aid in 21 CFR Part 11 Compliance with EZChrom Elite Chromatography Data System White Paper By Frank Tontala Agilent Technologies Software & Informatics Life Sciences & Chemical Analysis Group

More information

OnCommand Unified Manager

OnCommand Unified Manager OnCommand Unified Manager Operations Manager Administration Guide For Use with Core Package 5.2 NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1(408) 822-6000 Fax: +1(408) 822-4501

More information

CERN, Information Technology Department alberto.pace@cern.ch

CERN, Information Technology Department alberto.pace@cern.ch Identity Management Alberto Pace CERN, Information Technology Department alberto.pace@cern.ch Computer Security The present of computer security Bugs, Vulnerabilities, Known exploits, Patches Desktop Management

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Manual Password Depot Server 8

Manual Password Depot Server 8 Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...

More information

Service Overview & Installation Guide

Service Overview & Installation Guide Service Overview & Installation Guide Contents Contents... 2 1.0 Overview... 3 2.0 Simple Setup... 4 3.0 OWA Setup... 5 3.1 Receive Test... 5 3.2 Send Test... 6 4.0 Advanced Setup... 7 4.1 Receive Test

More information

PSW Guide. Version 4.7 April 2013

PSW Guide. Version 4.7 April 2013 PSW Guide Version 4.7 April 2013 Contents Contents...2 Documentation...3 Introduction...4 Forms...5 Form Entry...7 Form Authorisation and Review... 16 Reporting in the PSW... 17 Other Features of the Professional

More information

Audits. Email Alerts. Procedure

Audits. Email Alerts. Procedure You can generate access and activity audits for your organization s Cisco ScanCenter account. You can also configure email alerts to notify you of failed Cisco ScanCenter login attempts. You must have

More information

Manage all your Office365 users and licenses

Manage all your Office365 users and licenses Manage all your Office365 users and licenses Delegate 365 White Paper Authors: Toni Pohl, Martina Grom Version: 1.2 of December 2014 atwork information technology gmbh. All rights reserved. For information

More information

2X ApplicationServer & LoadBalancer Manual

2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Manual 2X ApplicationServer & LoadBalancer Contents 1 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies,

More information

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide

NetWrix Account Lockout Examiner Version 4.0 Administrator Guide NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email

More information

NTP Software VFM Administration Web Site for EMC Atmos

NTP Software VFM Administration Web Site for EMC Atmos NTP Software VFM Administration Web Site for EMC Atmos User Manual Revision 1.1 - July 2015 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective.

More information

Release 6.2.1 System Administrator s Guide

Release 6.2.1 System Administrator s Guide IBM Maximo Release 6.2.1 System Administrator s Guide Note Before using this information and the product it supports, read the information in Notices on page Notices-1. First Edition (January 2007) This

More information

SECTION C SCHEDULE A: PROJECT BRIEF PART 1: SCOPE OF SERVICES

SECTION C SCHEDULE A: PROJECT BRIEF PART 1: SCOPE OF SERVICES Table of Contents Page C1/ 1 Statement of Work and Business Requirements... 2 1.1 Objective... 2 1.2 General Requirements... 2 1.3 Technical Requirements... 2 1.4 Services List... 4 1.5 Implementation

More information

Sophos Mobile Control Installation guide

Sophos Mobile Control Installation guide Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running

More information

Getting Started with Clearlogin A Guide for Administrators V1.01

Getting Started with Clearlogin A Guide for Administrators V1.01 Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality

More information

Chapter 9 Monitoring System Performance

Chapter 9 Monitoring System Performance Chapter 9 Monitoring System Performance This chapter describes the full set of system monitoring features of your ProSafe Dual WAN Gigabit Firewall with SSL & IPsec VPN. You can be alerted to important

More information

Chapter 3 Authenticating Users

Chapter 3 Authenticating Users Chapter 3 Authenticating Users Remote users connecting to the SSL VPN Concentrator must be authenticated before being allowed to access the network. The login window presented to the user requires three

More information

SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit

SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit Note: SecureAware version 3.7 and above contains all files and setup configuration needed to use Microsoft IIS as a front end web server. Installing

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Gigabyte Content Management System Console User s Guide. Version: 0.1

Gigabyte Content Management System Console User s Guide. Version: 0.1 Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...

More information

System Administration Training Guide. S125 Document Management

System Administration Training Guide. S125 Document Management System Administration Training Guide S125 Document Management Table of contents Certification Course Prerequisites... 4 Document Management... 6 Learning Objects:... 6 Wiki... 6 Wiki Article Approval...

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

SonicWALL PCI 1.1 Implementation Guide

SonicWALL PCI 1.1 Implementation Guide Compliance SonicWALL PCI 1.1 Implementation Guide A PCI Implementation Guide for SonicWALL SonicOS Standard In conjunction with ControlCase, LLC (PCI Council Approved Auditor) SonicWall SonicOS Standard

More information

User Management Guide

User Management Guide AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,

More information

TIBCO Spotfire Platform IT Brief

TIBCO Spotfire Platform IT Brief Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

ManageEngine Desktop Central. Mobile Device Management User Guide

ManageEngine Desktop Central. Mobile Device Management User Guide ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

Agenda. How to configure

Agenda. How to configure dlaw@esri.com Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context of ArcGIS Server/Portal for ArcGIS Access Authentication Authorization: securing web services

More information

End User Training Guide

End User Training Guide End User Training Guide October 2013 2005-2013 ExpenseWire LLC. All rights reserved. 1 expensewire.com Use of this user documentation is subject to the terms and conditions of the applicable End- User

More information

OpenScape Business V2

OpenScape Business V2 OpenScape Business V2 Description Open Directory Service ODBC-ODBC Bridge Version 1.0 Table of Contents 1. Overview 5 1.1. ODBC-Bridge Client 5 1.2. ODBC-Server 6 1.3. Access Control 6 1.4. Licensing 7

More information

Leverage Your Financial System to Enable Sarbanes-Oxley Compliance: An Evaluator s Guide

Leverage Your Financial System to Enable Sarbanes-Oxley Compliance: An Evaluator s Guide Leverage Your Financial System to Enable Sarbanes-Oxley Compliance: An Evaluator s Guide W H I T E P A P E R Summary This document provides an overview on how financial systems can provide companies with

More information

Project Title: Judicial Branch Enterprise Document Management System RFP Number: FIN122210CK Appendix D Technical Features List

Project Title: Judicial Branch Enterprise Document Management System RFP Number: FIN122210CK Appendix D Technical Features List FEAT891 Medium Recoverable using backup The solution shall be recoverable from backup storage media storage media. FEAT893 Desired Medium Support Load Sharing High Availability The solution should utilize

More information

Installation Guide. Qlik Sense 1.1 Copyright 1993-2015 QlikTech International AB. All rights reserved.

Installation Guide. Qlik Sense 1.1 Copyright 1993-2015 QlikTech International AB. All rights reserved. Installation Guide Qlik Sense 1.1 Copyright 1993-2015 QlikTech International AB. All rights reserved. Copyright 1993-2015 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik Sense, QlikView,

More information

ecopy ShareScan v4.3 Pre-Installation Checklist

ecopy ShareScan v4.3 Pre-Installation Checklist ecopy ShareScan v4.3 Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication section describes

More information

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4

Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4 Contents Before You Start 2 Configuring Rumpus 3 Testing Accessible Directory Service Access 4 Specifying Home Folders 4 Open Directory Groups 6 Maxum Development Corp. Before You Start Open Directory

More information

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0

Administration Guide. BlackBerry Enterprise Service 12. Version 12.0 Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...

More information

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server

More information

Matrix Logic WirelessDMS Email Service 2.0

Matrix Logic WirelessDMS Email Service 2.0 Matrix Logic WirelessDMS Email Service 2.0 Version 2.0 August 2009. WHAT IS WDMS EMAIL SERVICE?...2 FEATURES OF WDMS EMAIL SERVICE...3 HOW DOES WDMS EMAIL SERVICE WORK?...4 REQUIREMENTS...5 Server Prerequesites...5

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

Introduction to the AirWatch Browser Guide

Introduction to the AirWatch Browser Guide Introduction to the AirWatch Browser Guide The AirWatch Browser application provides a safe, accessible and manageable alternative to Internet browsing using native device browsers. The AirWatch Browser

More information

Agilent UV-Visible ChemStation with Security Pack

Agilent UV-Visible ChemStation with Security Pack Agilent UV-Visible ChemStation with Security Pack Compliance with 21 CFR Part 11 Introduction Part 11 in Title 21 of the Code of Federal Regulations includes the US Federal guidelines for storing and protecting

More information

Features of AnyShare

Features of AnyShare of AnyShare of AnyShare CONTENT Brief Introduction of AnyShare... 3 Chapter 1 Centralized Management... 5 1.1 Operation Management... 5 1.2 User Management... 5 1.3 User Authentication... 6 1.4 Roles...

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard

More information

A Guide to New Features in Propalms OneGate 4.0

A Guide to New Features in Propalms OneGate 4.0 A Guide to New Features in Propalms OneGate 4.0 Propalms Ltd. Published April 2013 Overview This document covers the new features, enhancements and changes introduced in Propalms OneGate 4.0 Server (previously

More information

Advanced Event Viewer Manual

Advanced Event Viewer Manual Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application

More information