Xerox App Gallery 3.0

Size: px
Start display at page:

Download "Xerox App Gallery 3.0"

Transcription

1 Xerox App Gallery 3.0 Information Assurance Disclosure Version P04368

2 2016 Xerox Corporation. All rights reserved. Xerox, Xerox, Design, and ConnectKey are trademarks of Xerox Corporation in the United States and/or other countries. Microsoft, SQL Server, Microsoft.NET, Windows, Windows Server, SharePoint, and Windows 7 are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Xerox PDF Reader Powered by Foxit Software Company ( This product includes software developed by Aspose ( BR18116 Page 2 of 16

3 Contents Introduction... 4 Purpose... 4 Target Audience... 4 Disclaimer... 4 System Workflows... 5 Gallery Account Creation and Activation Workflow... 5 Browse the App Gallery Workflow... 6 Install of App from App Gallery Workflow... 7 License Workflow... 8 Security Description Xerox App Gallery Network Protocols and Port Numbers Diagram Individual System Components Xerox App Gallery Rackspace Catalog Servers, Design Servers, Load Balancers Xerox ecommerce Server Xerox Corporate Licensing system Xerox App Gallery User Web Pages Devices Xerox Backup Server MySQL Database Server Cloud File Storage App Gallery Portal App Communication between System Components The Role of Xerox Page 3 of 16

4 Introduction Xerox App Gallery is a Xerox Marketplace that allows users to browse Xerox ConnectKey device Apps and install the Apps on the devices themselves. Purpose The purpose of this document is to disclose information for the Xerox App Gallery with respect to system security. System Security, for this paper, is defined as follows: 1. How scan and print jobs are created and submitted 2. How user information is stored and transmitted 3. How the product behaves in a networked environment 4. How the product may be accessed, both locally and remotely NOTE: The customer must be responsible for the security of their network and the Xerox App Gallery does not establish security for any network environment. The purpose of this document is to inform Xerox customers of the design, functions, and features of Xerox App Gallery relative to Information Assurance (IA). This document does not provide tutorial level information about security, connectivity, PDLs, or Xerox App Gallery features and functions. This information is readily available elsewhere. We assume that the reader has a prior knowledge of these types of topics. Target Audience The target audience for this document is Xerox field personnel and customers concerned with IT security. Disclaimer The information in this document is accurate to the best knowledge of the authors, and is provided without warranty of any kind. In no event shall Xerox Corporation be liable for any damages whatsoever as a result of user's use or disregard of the information provided in this document which includes direct, indirect, incidental, consequential, loss of business profits or special damages, even if Xerox Corporation has been advised of the possibility of such damages. Page 4 of 16

5 System Workflows Gallery Account Creation and Activation Workflow Step 1: User connects to the Xerox App Gallery login web page. Step 2: User selects option to create a Xerox App Gallery account. Step 3: User enters required information to create an account and submits the request. Step 4: Xerox App Gallery creates account and activates it Step 5: User is sent back to login page where they enter user id and password to successfully login Page 5 of 16

6 Browse the App Gallery Workflow Step 1: User logs in to Xerox App Gallery. Step 2: User selects the gallery tab. Step 3: User can browse through the apps in the app gallery. Step 4: User can select an app and choose information option. Step 5: User will see the detailed information for the app including screenshots and demo video. Page 6 of 16

7 Install of App from App Gallery Workflow Step 1: User logs into Xerox App Gallery. Step 2: User selects the app in the app gallery they want to install and selects install. Step 3: User selects the device they wish to install the app to. Step 4: Xerox App Gallery installs the app to the chosen device. Step 5: If the app is a cloud repository app, the app and device are registered with the cloud middleware. Page 7 of 16

8 License Workflow Step 1: Gallery user logs into Xerox App Gallery. Step 2: Gallery user selects the Licenses tab. Step 3: Gallery user selects the Purchase button. Step 4: Gallery user is instructed where to purchase licenses or they can click the link to go to the ecommerce site to purchase licenses. Once purchased the user will receive an activation key via . Note: This step is purposely outside of App Gallery control. It is not the responsibility of App Gallery to provide security for this step. Step 5: Gallery user selects the Add button. Step 6: Gallery user enters activation key to activate the licenses purchased for App Gallery. Step 7: Gallery user can see the licenses purchased, the total and remainder of the license s count. Page 8 of 16

9 Step 8: Gallery user can now install an app from app gallery and apply a license to the app. Page 9 of 16

10 Security Description The security considerations are three-fold: 1. The security of the apps found in the Xerox App Gallery 2. The security of the user account information required by the Xerox App Gallery system 3. The security of the devices registered within the system by the user As one can see from the below diagram, information travels through multiple system components over a combination of wired and wireless networks. All use normal, industrystandard technologies and built-in security capabilities. These capabilities do need to be enabled, and the choice of which are used at each point in the system varies. This section captures the security considerations of Xerox App Gallery in the areas shown below: 1. Protocols and Port numbers used by the system 2. Individual system components a. Xerox App Gallery Rackspace Catalog server (2) b. Xerox App Gallery Rackspace Designer server (2) c. Xerox ecommerce server d. Xerox Corporate Licensing System e. Xerox App Gallery User Web Pages f. Devices g. Rackspace Load Balancer servers h. Xerox Backup server i. MYSQL Database server j. Cloud File storage k. App Gallery Portal App 3. Communication between system components a. Communication between Xerox App Gallery User Web Pages and Rackspace Catalog server, Rackspace Designer server and Rackspace Load Balancer servers b. Communication between Rackspace Design server and Xerox Corporate Licensing System c. Communication between Rackspace Catalog server, Rackspace Design Server and Devices d. Communication between the Xerox Backup Server and the Rackspace Catalog server e. Communication between Rackspace Catalog servers, Rackspace Design servers and the Rackspace MYSQL Database server f. Communication between Rackspace Catalog servers, Rackspace Design servers and the Rackspace Cloud Files storage g. App Gallery Portal App Page 10 of 16

11 Xerox App Gallery Network Protocols and Port Numbers Diagram This diagram shows the protocols used in the system. Port numbers are not configurable. For non-secure connection, port number 80 is used. For secure connection, port number 443 is used. For the SMTP server port 25 is used. Xerox ecommerce Xerox Licensing Xerox UK Xerox ecommerce Server XCLS License Server Xerox Backup Server SMTP Router (Desired State) Confirmation Request Rackspace Cloud Servers MySQL Ruby on Rails App Catalog Ubuntu Linux Catalog Server File Server MYSQL Database Server Register & Unregister Apps and Devices SMTP Server (Back-up) SMTP Server (Main) Load Balancers Code Gen Web Svc License Activation SQL Web Svc Server Express Windows Design Web Server Cloud Repositories Confirmation Design XAS App Azure Azure Storage Document Conversion Azure Cloud VM ActiveX Enterprise / SMB Deploy SNMP/HTTP Middleware Middleware Azure Cloud Service Azure Cloud Service Individual System Components Xerox App Gallery Rackspace Catalog Servers, Design Servers, Load Balancers The Xerox App Gallery Servers, which are located in the United Kingdom, run in the Rackspace Platform. There are two considerations for security based on this architecture as follows: 1. Rackspace specific security information 2. Xerox App Gallery Servers specific security information Each consideration is covered below. Page 11 of 16

12 Rackspace Platform Specific Rackspace is an open source cloud company which offers various degrees of security options. Xerox App Gallery have opted to use the security option that comes with the Managed Service level for cloud servers. Rackspace managed service security highlights: System installation to a hardened patched OS System patches are configured by Rackspace to provide continued protection from exploits in the extent that this is offered and accomplished by Microsoft Server and Ubuntu Linux Dedicated firewall and VPN services to help block unauthorized system access Data protection with Rackspace managed backup solutions Dedicated intrusion detection devices to provide an additional layer of protection against unauthorized system access Distributed Denial of Service (DDoS) mitigation services based on proprietary Rackspace PrevenTier system Risk assessment and security consultation by Rackspace professional services teams ISO17799-based policies and procedures regularly reviewed as part of SAS70 Type II audit process All passwords encrypted in transit and while in storage at Rackspace Please visit the Rackspace web site for more information: Xerox App Gallery Cloud Service Specific All communications to and from the Xerox App Gallery Cloud Service are over https, with the exception of communication between the devices and the Rackspace Design server license activation service. Data is transmitted securely and is protected by TLS security for both upload and download. Xerox ecommerce Server The Xerox ecommerce Server is purposely left outside of the Xerox App Gallery workflows. When the button to purchase licenses is pushed, a message is displayed to the user to go to the ecommerce web site to purchase licenses for App Gallery. Xerox App Gallery is not responsible for the security of communication with the ecommerce server. Xerox Corporate Licensing system The Xerox Corporate Licensing System is accessed with https (Hyper Text Transfer Protocol) from the license activation service in the Rackspace Design server. Page 12 of 16

13 Xerox App Gallery User Web Pages All user web pages are accessed with https from a Web Browser. Xerox App Gallery users have to authenticate with the Xerox App Gallery Service to access the user web pages. Once authenticated the user can view: 1. All apps that reside in the App Gallery system. 2. All devices registered by the user in the App Gallery system. Devices Xerox devices have a variety of security features that can be employed to increase security. Availability of these features depends based on model. It is the customer s responsibility to understand and implement appropriate controls for devices behavior. Some examples are as follows: 1. Xerox Image Overwrite electronically shreds information stored on the hard drive of devices as part of the routine job process. 2. Data Encryption uses state of the art encryption technology on data stored within the device as well as for data in motion in and out of the device. For more information about the above examples as well as for other device security related technologies please see The Xerox App Gallery only supports Xerox ConnectKey devices. It is the customer s responsibility to understand the security features of these Xerox devices which are used in the Xerox App Gallery system. Communication between the device and the License Activation Web Service has been changed to use https. Xerox Backup Server The Xerox Backup Server uses https to access the Rackspace Catalog server. Xerox App Gallery backup files are copied from the Catalog server to the backup server which is located in a Xerox facility. MySQL Database Server MySQL database server stores the data used by the designer server and catalog server. MySQL database server uses https to communicate with the Rackspace Catalog server and the Rackspace Designer server. Cloud File Storage Cloud file storage stores files used by the designer server and catalog server. The Rackspace Catalog server and the Rackspace Designer server use https to access the Cloud file storage. Page 13 of 16

14 App Gallery Portal App The Xerox App Gallery Portal App is an app which will be delivered with all NextWave and ConnectKey 2.0i devices. The Xerox App Portal App will give users of the NextWave and ConnectKey 2.0i devices access to the Xerox App Gallery. The Xerox App Gallery Portal App will have the ability to associate a Xerox App Gallery Account with the app which will allow any user walking up to the device to have access to the Xerox App Gallery. The associated credentials will be saved on the device s local storage and will be encrypted for security. Communication between System Components Communication between Xerox App Gallery, Rackspace Catalog Servers, Design Servers and Load Balancers and Xerox App Gallery Web Pages The Xerox App Gallery servers use the https protocol for all communication with the Xerox App Gallery Web Pages. It establishes an https secure connection with the Xerox App Gallery Service which relies on the web page OS to validate the security certificate as part of creation of the TLS connection. The TLS certificate is issued by Comodo (a trusted certificate authority) and ensures that the Xerox App Gallery webserver is in communication with the user s web browser, and no third party can pretend to be that webserver or intercept traffic between the web browser and the webserver. Xerox App Gallery requires users to authenticate before they can use any of its features. Basic authentication is performed with the Xerox App Gallery that provides username and password information over the https protocol. Once authentication is complete, data is passed between the Xerox App Gallery servers and the Xerox App Gallery Web Pages to enable the features of the service within the Xerox App Gallery. This includes all data for apps, information for registered devices, and user data. Communication between Xerox App Gallery, Rackspace Design Server, and Xerox Corporate Licensing System The Xerox App Gallery Rackspace License Activation Service uses the https protocol for all communication with the Xerox Corporate Licensing System. It establishes an https secure connection when the Xerox Corporate Licensing System relies on the certificate authority configuration of the Windows server on which it resides to validate the security certificate as part of establishment of the TLS connection with the Xerox Corporate Licensing System. Page 14 of 16

15 Communication between Xerox App Gallery Rackspace Catalog and Design Servers and Devices The Xerox App Gallery uses SNMPv2 to discover printers and printer capabilities. Customers can configure the community name strings for the agent to use if they have configured their printers to use non-default values. Xerox App Gallery also uses SOAP messages transmitted over the https protocol to communicate with devices in order to accomplish app installation and uninstallation. The WSSE standard for SOAP messages is used to transmit nonce-protected hashes of device administrator credentials to the device to provide authorization. These device administrator credentials are supplied by the user and stored as part of the device record in Xerox App Gallery. The devices communicate directly with the Xerox App Gallery Design server when it tries to validate a license for an App that has been installed on the device. This communication is done via https. Communication between Xerox Backup Server and Xerox App Gallery Rackspace Catalog Server The Xerox Backup Server is a password protected server which communicates via https with the Xerox App Gallery Rackspace Catalog server at a regularly scheduled interval to copy the backup files of Xerox App Gallery to the Xerox Backup Server. The Xerox Backup server is located at a Xerox facility in the United Kingdom. Communication between Xerox App Gallery Portal App and the Xerox App Gallery The Xerox App Gallery Portal App communicates with the Xerox App Gallery via https and the data is transmitted securely and is protected by TLS security. The Xerox App Gallery Portal App can associate App Gallery credentials with the device. These credentials are encrypted on the device. Page 15 of 16

16 The Role of Xerox Xerox strives to provide the most secure software product possible based on the information and technologies available while maintaining the product performance, value, functionality, and productivity. Xerox will: Run industry standard security diagnostics tests in development to determine vulnerabilities. If found, the vulnerabilities will either be fixed, minimized, or documented Monitor, notify, and supply necessary security patches provided by third party software vendors used with the App Gallery software. Page 16 of 16

October 2013 702P00860. Xerox App Studio. Information Assurance Disclosure. Version 2.0

October 2013 702P00860. Xerox App Studio. Information Assurance Disclosure. Version 2.0 October 2013 702P00860 Xerox App Studio Information Assurance Disclosure Version 2.0 2013 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation

More information

December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure

December 2015 702P00860. Xerox App Studio 3.0 Information Assurance Disclosure December 2015 702P00860 Xerox App Studio 3.0 Information Assurance Disclosure 2014 Xerox Corporation. All rights reserved. Xerox and Xerox and Design and ConnectKey are trademarks of Xerox Corporation

More information

Xerox Mobile Print Cloud

Xerox Mobile Print Cloud September 2012 702P00860 Xerox Mobile Print Cloud Information Assurance Disclosure 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation in the United

More information

Xerox Mobile Print Cloud

Xerox Mobile Print Cloud Xerox Mobile Print Cloud Information Assurance Disclosure Software Version 3.0 May 2015 702P03595 2013-2015 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation

More information

Xerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations

Xerox FreeFlow Digital Publisher Information Assurance Disclosure. Onsite, Cloud and epublishing Configurations Xerox FreeFlow Digital Publisher Information Assurance Disclosure Onsite, Cloud and epublishing Configurations May 2016 2016 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks

More information

Software Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide

Software Version 1.0 ConnectKey TM Share to Cloud April 2013. Xerox ConnectKey Share to Cloud User / Administrator s Guide Software Version 1.0 ConnectKey TM Share to Cloud April 2013 Xerox ConnectKey Share to Cloud User / Administrator s Guide 2013 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and Xerox

More information

Xerox PrintSafe Software

Xerox PrintSafe Software Software Version 1.0 Version 1.0 702P03957 Xerox PrintSafe Software Information Assurance Disclosure Xerox PrintSafe Software Copyright 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design,

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

Strong Authentication for Juniper Networks SSL VPN

Strong Authentication for Juniper Networks SSL VPN Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

NovaBACKUP xsp Version 15.0 Upgrade Guide

NovaBACKUP xsp Version 15.0 Upgrade Guide NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject

More information

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Introduction Tenable Network Security is the first and only solution to offer security visibility, Azure cloud environment auditing, system

More information

Xerox Mobile Print Solution

Xerox Mobile Print Solution Software Version 3.0 Version 1.0 702P03147 Xerox Mobile Print Solution Information Assurance Disclosure 1 Introduction... 6 1.1 Purpose... 6 1.1 Target Audience... 6 1.2 Disclaimer... 6 2 System Workflows...

More information

EMR Link Server Interface Installation

EMR Link Server Interface Installation EMR Link Server Interface Installation Version 1.0 ** INTRODUCTION ** If you would like assistance with installation, please contact our preferred support provider at support@bonecomputer.com, or call

More information

VPN Overview. The path for wireless VPN users

VPN Overview. The path for wireless VPN users VPN Overview The path for wireless VPN users First, the user's computer (the blue computer) connects to an access point in the uiuc-wireless-net network and is assigned an IP address in that range (172.21.0.0

More information

formerly Help Desk Authority 9.1.3 Upgrade Guide

formerly Help Desk Authority 9.1.3 Upgrade Guide formerly Help Desk Authority 9.1.3 Upgrade Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656 USA www.quest.com

More information

Defender 5.7. Remote Access User Guide

Defender 5.7. Remote Access User Guide Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Preparing Your Network for an MDsuite Installation

Preparing Your Network for an MDsuite Installation Preparing Your Network for an MDsuite Installation Professional Data Services 1632 East 23 rd Avenue Hutchinson, KS 67502 Toll-free: 800.875.0480 Fax: 858.486.5493 www.mdsuite.com Introduction This document

More information

Foglight Experience Monitor and Foglight Experience Viewer

Foglight Experience Monitor and Foglight Experience Viewer Foglight Experience Monitor and Foglight Experience Viewer Quest Software, Inc. April 2008 Using the Dell Remote Access Controller Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains

More information

MTS Remote Drive Service. Quick Start Guide

MTS Remote Drive Service. Quick Start Guide MTS Remote Drive Service Quick Start Guide Signing In to Remote Drive service through My Internet Account To sign in to use the service, you need to be a registered user with a user name and password.

More information

How To Secure Your Data Center From Hackers

How To Secure Your Data Center From Hackers Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

FileRunner Security Overview. An overview of the security protocols associated with the FileRunner file delivery application

FileRunner Security Overview. An overview of the security protocols associated with the FileRunner file delivery application FileRunner Security Overview An overview of the security protocols associated with the FileRunner file delivery application Overview Sohonet FileRunner is a secure high-speed transfer application that

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port

technical brief browsing to an installation of HP Web Jetadmin. Internal Access HTTP Port Access List User Profiles HTTP Port technical brief in HP Overview HP is a powerful webbased software utility for installing, configuring, and managing networkconnected devices. Since it can install and configure devices, it must be able

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud

Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud Deploying and Managing Private Clouds The Essentials Series Managing for the Long Term: Keys to Securing, Troubleshooting and Monitoring a Private Cloud sponsored by Managing for the Long Term: Keys to

More information

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release)

Product comparison. GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release) Product comparison GFI LanGuard 2014 vs. Microsoft Windows InTune (October 2013 Release) GFI LanGuard 2014 Windows Intune General features Scheduled scans Agent-less r Agent-based Integration with Active

More information

VNC User Guide. Version 5.0. June 2012

VNC User Guide. Version 5.0. June 2012 VNC User Guide Version 5.0 June 2012 Trademarks VNC is a registered trademark of RealVNC Ltd. in the U.S. and in other countries. Other trademarks are the property of their respective owners. Protected

More information

4.0 SP1 (4.0.1.0) November 2014 702P03296. Xerox FreeFlow Core Installation Guide: Windows Server 2008 R2

4.0 SP1 (4.0.1.0) November 2014 702P03296. Xerox FreeFlow Core Installation Guide: Windows Server 2008 R2 4.0 SP1 (4.0.1.0) November 2014 702P03296 Installation Guide: Windows Server 2008 R2 2014 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, FreeFlow, and VIPP are trademarks of Xerox Corporation

More information

NovaBACKUP xsp Version 12.2 Upgrade Guide

NovaBACKUP xsp Version 12.2 Upgrade Guide NovaBACKUP xsp Version 12.2 Upgrade Guide NovaStor / August 2011 Rev 20110815 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06 SafeNet Authentication Service Configuration Guide 1.06 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Apache HTTP Server

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Apache HTTP Server SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Vendor Questionnaire

Vendor Questionnaire Instructions: This questionnaire was developed to assess the vendor s information security practices and standards. Please complete this form as completely as possible, answering yes or no, and explaining

More information

Enterprise Self Service Quick start Guide

Enterprise Self Service Quick start Guide Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: info@cionsystems.com Online Support: support@cionsystems.com 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.

More information

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services

Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services Security FAQs (Frequently Asked Questions) for Xerox Remote Print Services February 30, 2012 2012 Xerox Corporation. All rights reserved. Xerox and Xerox and Design are trademarks of Xerox Corporation

More information

Remote Access Platform. Architecture and Security Overview

Remote Access Platform. Architecture and Security Overview Remote Access Platform Architecture and Security Overview NOTICE This document contains information about one or more ABB products and may include a description of or a reference to one or more standards

More information

JetAdvice Manager Data Collector v. 2.1. Date: 2014-06-30

JetAdvice Manager Data Collector v. 2.1. Date: 2014-06-30 JetAdvice Manager Data Collector v. 2.1 Date: 2014-06-30 NOTE The information contained in this document is subject to change without notice. EuroForm makes no warranty of any kind with regard to this

More information

Xerox Security Bulletin XRX13-006

Xerox Security Bulletin XRX13-006 Cumulative update for Common Criteria Certification Background The System Software Versions listed below for the WorkCentre 5845/5855/5865/5875/5890, WorkCentre 7220/7225, WorkCentre 7830/7835/7845/7855

More information

SSL VPN Technology White Paper

SSL VPN Technology White Paper SSL VPN Technology White Paper Keywords: SSL VPN, HTTPS, Web access, TCP access, IP access Abstract: SSL VPN is an emerging VPN technology based on HTTPS. This document describes its implementation and

More information

McAfee Public Cloud Server Security Suite

McAfee Public Cloud Server Security Suite Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012

SOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012 SOLARWINDS ORION Patch Manager Evaluation Guide for ConfigMgr 2012 About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse

More information

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15

Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15 Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com

More information

Sophos Mobile Control Installation guide. Product version: 3

Sophos Mobile Control Installation guide. Product version: 3 Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External

More information

For Use with QR Code Scanner / Reader Enabled Applications

For Use with QR Code Scanner / Reader Enabled Applications Xerox QR Code App Quick Start Guide 702P03999 For Use with QR Code Scanner / Reader Enabled Applications Use the QR (Quick Response) Code App with the following applications: QR Code Scanner / Reader Applications,

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

4.0 SP2 (4.0.2.0) May 2015 702P03296. Xerox FreeFlow Core Installation Guide: Windows Server 2008 R2

4.0 SP2 (4.0.2.0) May 2015 702P03296. Xerox FreeFlow Core Installation Guide: Windows Server 2008 R2 4.0 SP2 (4.0.2.0) May 2015 702P03296 Installation Guide: Windows Server 2008 R2 2015 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and FreeFlow are trademarks of Xerox Corporation in

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

Secure Installation and Operation of Your Xerox Multi-Function Device. Version 1.0 August 6, 2012

Secure Installation and Operation of Your Xerox Multi-Function Device. Version 1.0 August 6, 2012 Secure Installation and Operation of Your Xerox Multi-Function Device Version 1.0 August 6, 2012 Secure Installation and Operation of Your Xerox Multi-Function Device Purpose and Audience This document

More information

Retention & Destruction

Retention & Destruction Last Updated: March 28, 2014 This document sets forth the security policies and procedures for WealthEngine, Inc. ( WealthEngine or the Company ). A. Retention & Destruction Retention & Destruction of

More information

MultiSite Manager. Setup Guide

MultiSite Manager. Setup Guide MultiSite Manager Setup Guide Contents 1. Introduction... 2 How MultiSite Manager works... 2 How MultiSite Manager is implemented... 2 2. MultiSite Manager requirements... 3 Operating System requirements...

More information

Connectivity to Polycom RealPresence Platform Source Data

Connectivity to Polycom RealPresence Platform Source Data Polycom RealAccess Security White Paper The Polycom RealAccess service is delivered using the Software as a Service (SaaS) model. This white paper outlines how the service protects sensitive customer data

More information

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2

Appalachian Regional Commission Evaluation Report. Table of Contents. Results of Evaluation... 1. Areas for Improvement... 2 Report No. 13-35 September 27, 2013 Appalachian Regional Commission Table of Contents Results of Evaluation... 1 Areas for Improvement... 2 Area for Improvement 1: The agency should implement ongoing scanning

More information

Strong Authentication for Juniper Networks

Strong Authentication for Juniper Networks Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright

More information

My FreeScan Vulnerabilities Report

My FreeScan Vulnerabilities Report Page 1 of 6 My FreeScan Vulnerabilities Report Print Help For 66.40.6.179 on Feb 07, 008 Thank you for trying FreeScan. Below you'll find the complete results of your scan, including whether or not the

More information

SHARPCLOUD SECURITY STATEMENT

SHARPCLOUD SECURITY STATEMENT SHARPCLOUD SECURITY STATEMENT Summary Provides details of the SharpCloud Security Architecture Authors: Russell Johnson and Andrew Sinclair v1.8 (December 2014) Contents Overview... 2 1. The SharpCloud

More information

LDAP Synchronization Agent Configuration Guide for

LDAP Synchronization Agent Configuration Guide for LDAP Synchronization Agent Configuration Guide for Powerful Authentication Management for Service Providers and Enterprises Version 3.x Authentication Service Delivery Made EASY LDAP Synchronization Agent

More information

Reference Architecture: Enterprise Security For The Cloud

Reference Architecture: Enterprise Security For The Cloud Reference Architecture: Enterprise Security For The Cloud A Rackspace Whitepaper Reference Architecture: Enterprise Security for the Cloud Cover Table of Contents 1. Introduction 2 2. Network and application

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

Network and Security Controls

Network and Security Controls Network and Security Controls State Of Arizona Office Of The Auditor General Phil Hanus IT Controls Webinar Series Part I Overview of IT Controls and Best Practices Part II Identifying Users and Limiting

More information

ACTi NVR Config Converter User s Manual. Version 1.0.0.17 2012/06/07

ACTi NVR Config Converter User s Manual. Version 1.0.0.17 2012/06/07 ACTi NVR Config Converter User s Manual Version 1.0.0.17 2012/06/07 Legal Notice Disclaimer The information contained in this document is intended for general information purposes. ACTi Corporation shall

More information

ABB solar inverters. User s manual ABB Remote monitoring portal

ABB solar inverters. User s manual ABB Remote monitoring portal ABB solar inverters User s manual ABB Remote monitoring portal List of related manuals Title ABB Remote monitoring portal User s manual NETA-01 Ethernet adapter module User s manual Code (English) 3AUA0000098904

More information

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

DIGIPASS Authentication for Sonicwall Aventail SSL VPN DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within

More information

Comodo Certificate Manager Version 5.3

Comodo Certificate Manager Version 5.3 Comodo Certificate Manager Version 5.3 Introduction to Auto-Installer Comodo CA Limited, 3rd Floor, 26 Office Village, Exchange Quay, Trafford Road, Salford, Greater Manchester M5 3EQ, United Kingdom.

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

Sophos Mobile Control Installation guide. Product version: 3.5

Sophos Mobile Control Installation guide. Product version: 3.5 Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External

More information

Synthetic Application Monitoring

Synthetic Application Monitoring Synthetic Application Monitoring... Andrew Martin Senior Technical Consultant Contents End User Experience Monitoring - Synthetic Transactions 3 Argent and Synthetic Transactions 3 Web Based Application

More information

End User Devices Security Guidance: Apple ios 8

End User Devices Security Guidance: Apple ios 8 GOV.UK Guidance End User Devices Security Guidance: Apple ios 8 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best satisfy

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

NAS 221 Remote Access Using Cloud Connect TM

NAS 221 Remote Access Using Cloud Connect TM NAS 221 Remote Access Using Cloud Connect TM Access the files on your NAS remotely with Cloud Connect TM A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire SAMPLE CREDIT UNION INFORMATION SECURITY DUE DILIGENCE QUESTIONNAIRE FOR POTENTIAL VENDORS Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire 1. Physical security o Where is

More information

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2

JAMF Software Server Installation and Configuration Guide for Linux. Version 9.2 JAMF Software Server Installation and Configuration Guide for Linux Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

2X Cloud Portal v10.5

2X Cloud Portal v10.5 2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Administrator Operations Guide

Administrator Operations Guide Administrator Operations Guide 1 What You Can Do with Remote Communication Gate S 2 Login and Logout 3 Settings 4 Printer Management 5 Log Management 6 Firmware Management 7 Installation Support 8 Maintenance

More information

CareGiver Remote Support Information Technology FAQ

CareGiver Remote Support Information Technology FAQ CareGiver Remote Support Information Technology FAQ CareGiver remote support Information Technology FAQ Purpose The purpose of this document is to answer Frequently Asked Questions (FAQs) regarding CareGiver

More information

Troux Hosting Options

Troux Hosting Options Troux Hosting Options Introducing Troux Hosting Options Benefits of a Hosted Troux Environment...3 Convenience...3 Time-to-Value...3 Reduced Cost of Ownership...3 Scalability and Flexibility...3 Security...4

More information

introducing The BlackBerry Collaboration Service

introducing The BlackBerry Collaboration Service Introducing the Collaboration Service 10.2 for the Enterprise IM app 3.1 introducing The Collaboration Service Sender Instant Messaging Server Collaboration Service 10 device Recipient V. 1.0 June 2013

More information

ICONICS Using the Azure Cloud Connector

ICONICS Using the Azure Cloud Connector Description: Guide to use the Azure Cloud Connector General Requirement: Valid account for Azure, including Cloud Service, SQL Azure and Azure Storage. Introduction Cloud Connector is a FrameWorX Server

More information

Xerox Mobile Link 2.0 Frequently Asked Questions (FAQ) - Android

Xerox Mobile Link 2.0 Frequently Asked Questions (FAQ) - Android Xerox Mobile Link 2.0 Frequently Asked Questions (FAQ) - Android Xerox Mobile Link is a personal productivity app that connects your mobile phone and tablet to a Xerox Multifunction Printer (MFP). You

More information

Strong Authentication for Microsoft SharePoint

Strong Authentication for Microsoft SharePoint Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

HP IMC Firewall Manager

HP IMC Firewall Manager HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this

More information

GiftWrap 4.0 Security FAQ

GiftWrap 4.0 Security FAQ GiftWrap 4.0 Security FAQ The information presented here is current as of the date of this document, and may change from time-to-time, in order to reflect s ongoing efforts to maintain the highest levels

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web App. Technical Manual Template

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web App. Technical Manual Template SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

How to Install SSL Certificates on Microsoft Servers

How to Install SSL Certificates on Microsoft Servers How to Install SSL Certificates on Microsoft Servers Ch apter 4: Installing SSL Certificates in Exchange Server, SharePoint, and SQL Server... 57 Co mmon Operations... 57 Step 1: Prepare the Microsoft

More information

ReadyNAS Remote White Paper. NETGEAR May 2010

ReadyNAS Remote White Paper. NETGEAR May 2010 ReadyNAS Remote White Paper NETGEAR May 2010 Table of Contents Overview... 3 Architecture... 3 Security... 4 Remote Firewall... 5 Performance... 5 Overview ReadyNAS Remote is a software application that

More information

WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION

WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION WHITE PAPER SETTING UP AND USING ESTATE MASTER ON THE CLOUD INTRODUCTION Cloud Computing can provide great flexibility for the Estate Master user. You can access your feasibilities, manage you projects

More information

qliqdirect Active Directory Guide

qliqdirect Active Directory Guide qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

Configuration Guide. SafeNet Authentication Service AD FS Agent

Configuration Guide. SafeNet Authentication Service AD FS Agent SafeNet Authentication Service AD FS Agent Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document

More information

Nokia E90 Communicator Using WLAN

Nokia E90 Communicator Using WLAN Using WLAN Nokia E90 Communicator Using WLAN Nokia E90 Communicator Using WLAN Legal Notice Nokia, Nokia Connecting People, Eseries and E90 Communicator are trademarks or registered trademarks of Nokia

More information