Application Note. Intelligent Application Gateway with SA server using AD password and OTP

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Application Note. Intelligent Application Gateway with SA server using AD password and OTP"

Transcription

1 Application Note Intelligent Application Gateway with SA server using AD password and OTP

2 ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to file patent applications or any other kind of intellectual property protection in connection with such information. Nothing herein shall be construed as implying or granting to you any rights, by license, grant or otherwise, under any intellectual and/or industrial property rights of or concerning any of Gemalto s information. This document can be used for informational, non-commercial, internal and personal use only provided that: The copyright notice below, the confidentiality and proprietary legend and this full warning notice appear in all copies. This document shall not be posted on any network computer or broadcast in any media and no modification of any part of this document shall be made. Use for any other purpose is expressly prohibited and may result in severe civil and criminal liabilities. The information contained in this document is provided AS IS without any warranty of any kind. Unless otherwise expressly agreed in writing, Gemalto makes no warranty as to the value or accuracy of information contained herein. The document could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Furthermore, Gemalto reserves the right to make any change or improvement in the specifications data, information, and the like described herein, at any time. Gemalto hereby disclaims all warranties and conditions with regard to the information contained herein, including all implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Gemalto be liable, whether in contract, tort or otherwise, for any indirect, special or consequential damages or any damages whatsoever including but not limited to damages resulting from loss of use, data, profits, revenues, or customers, arising out of or in connection with the use or performance of information contained in this document. Gemalto does not and shall not warrant that this product will be resistant to all possible attacks and shall not incur, and disclaims, any liability in this respect. Even if each product is compliant with current security standards in force on the date of their design, security mechanisms' resistance necessarily evolves according to the state of the art in security and notably under the emergence of new attacks. Under no circumstances, shall Gemalto be held liable for any third party actions and in particular in case of any successful attack against systems or equipment incorporating Gemalto products. Gemalto disclaims any liability with respect to security for direct, indirect, incidental or consequential damages that result from any use of its products. It is further stressed that independent testing and verification by the person using the product is particularly encouraged, especially in any application in which defective, incorrect or insecure functioning could result in damage to persons or property, denial of service or loss of privacy. Copyright 2008 Gemalto N.V. All rights reserved. Gemalto and the Gemalto logo are trademarks and service marks of Gemalto N.V. and/or its subsidiaries and are registered in certain countries. All other trademarks and service marks, whether registered or not in specific countries, are the property of their respective owners. GEMALTO, B.P. 100, GEMENOS CEDEX, FRANCE. Tel: +33 (0) Fax: +33 (0) September 20, 2007

3 Contents Preface... 3 Who Should Read This Book...3 For More Information...3 Conventions...4 Contact Our Hotline...4 Overview... 5 Intelligent Application Gateway...5 Gemalto SA Server...5 Integration of SA Server with IAG...6 Use Case... 7 Main steps...7 Components description...8 Configure the Internet Authentication Service... 9 Add a RADIUS Client...10 Configure Access Policies...11 Configure the Gemalto Strong Authentication Server Installation...16 User management...18 Check SA Server usage...20 Install and configure SA Server agent for IAS Restart IAS...21 Configure Intelligent Application Gateway Client connection... 27

4 List of Figures Figure 1 Global Architecture... 6 Figure 2 Architecture for the use case... 7 Figure 3 - IAS RADIUS Server... 9 Figure 4 - New RADIUS Client Figure 5 - New RADIUS Client with shared secret Figure 6 - Policy Configuration Figure 7 - Policy Conditions Figure 8 - Attribute type Figure 9 - Client IP Address Figure 10 - Policy Conditions Figure 11 - Selecting Permissions Figure 12 - Editing Authentication Figure 13 - Encryption Type Figure 14 SA Installation LDAP Server Information Figure 15 SA Installation Administrator account Figure 16 SA Configuration Administrator connection Figure 17 SA Configuration User management Figure 18 SA Configuration Create OATH device Figure 19 SA Configuration Policy modification Figure 20 SA Configuration Link the device to the user Figure 21 IAS Agent installation Figure 22 - Stopping the IAS Service Figure 23 - Starting the IAS Service Figure 24 IAG Configuration Portal properties Figure 25 IAG Configuration Advanced Trunk Configuration Figure 26 IAG Configuration Add authentication server Figure 27 IAG Configuration - Add RADIUS Server Figure 28 IAG Configuration Select OTP Method Figure 29 IAG Configuration Select both authentication servers Figure 30 Client connection - Login Figure 31 Client connection - IAG Portal Figure 32 Client connection - OWA Access Figure 33 Client connection - OWA Figure 34 Client connection - Sharepoint Access

5 Preface The Gemalto two-factor authentication solution provides strong authentication based on smart cards for the enterprise, banking, and internet service provider (ISP) markets. This solution enables organizations to deploy a strong authentication solution for their endusers, whether local or remote. The system can service a broad range of deployments, from small corporations with less than 100 users to ISPs with potentially millions of users. Who Should Read This Book This guide is intended for system administrators responsible for configuring the Microsoft IAG and Gemalto SA Server in order to use Gemalto OTP devices to authenticate mobile users with IAG. Administrators should be familiar with: Intelligent Application Gateway of Microsoft. The Gemalto SA Server system architecture. For More Information For a complete list of the documentation for the Gemalto Strong Authentication (SA) Server, refer to the release notes (README.txt) on the Gemalto SA Server CD (or zip image of the CD). For more information about other supported components, see the manufacturer s documentation for those products. 3

6 Conventions The following conventions are used in this document: In this manual, the following highlighting styles are used: Bold Instructions, commands, file names, folder names, key names, icons, menus, menu items, field names, buttons, check boxes, tabs, registry keys and values. Italic Variables that you must replace with a value, book titles, news or emphasized terms. In this manual, hyperlinks are marked as described below Internal Links Displayed in quotation marks. When viewing this book online, click an internal link to jump to a different section of the book. External Links Displayed in blue, underlined text. When viewing this book online, click an external link to launch your default browser (or program) to navigate to that Web address or compose an . In this manual, notes and cautions are marked like this: Notes: Information that further explains a concept or instruction, tips, and tricks. Caution: Information that alerts you to potentially severe problems that might result in loss of data or system failure. Contact Our Hotline If you do not find the information you need in this manual, or if you have any questions, contact our hotline 4

7 1 Overview This document provides a deployment scenario to show you how it is possible to configure the Microsoft IAG to use Gemalto SA Server to authenticate Mobiles Users in order to get access to applications through IAG Portal. Caution: Consequently, this document should not be considered as an instruction manual on how to configure your system. Intelligent Application Gateway Microsoft s Intelligent Application Gateway (IAG) 2007 with Application Optimizers provides secure socket layer (SSL) virtual private network (VPN), a Web application firewall, and endpoint security management that enable access control, authorization, and content inspection for a wide variety of line-of-business applications. Together, these technologies provide mobile and remote workers with easy and flexible secure access from a broad range of devices and locations including kiosks, PCs, and mobile devices. IAG also enables IT administrators to enforce compliance with application and information usage guidelines through a customized remote access policy based on device, user, application, or other business criteria. For more information, visit: Gemalto SA Server Gemalto SA Server is a strong authentication platform that was developed to incorporate the strengths of Gemalto s smart card technology. It consists of a family of smart card-based user authentication devices, a browser plug-in, an authentication and customer care server and a self-service user care portal. This server provides the usage of OTP (One Time Password) and the possibility to a Two Factor Authentication for a strongest authentication. For more information about OTP, visit and about Two Factor Authentication, visit Gemalto SA Server runs under Windows and Linux operating systems and is easily integrated with existing network and authentication infrastructure. For more information, visit 5

8 Integration of SA Server with IAG The fact to integrate SA Server in an existing IAG architecture reinforces the security, especially for mobile user by using an OTP. The installation and configuration is simple at the company side, just install the SA Server with Radius and configure IAG to use the radius for authentication. At the client side, nothing has to be installed. The user has to fill the authentication page by using his login, password and the OTP (provided by any OATH token). List of Gemalto s OATH device: After a successful authentication, you have a direct access to your application or IAG present to you a web page listing all your applications you are able to reach. Figure 1 Global Architecture 6

9 2 Use Case In this section, we are focusing on a specific use case to show in detail how the integration of SA Server with IAG can be done. In this scenario, the mobile user can access his applications such as OWA and/or Sharepoint through IAG with a Two Factor Authentication (Login / AD Password / OTP). We add the OTP mechanism to an existing IAG configuration by installing and configuring the Microsoft radius server (IAS) and the Gemalto SA Server. Figure 2 Architecture for the use case Main steps The main steps are: 1. Gemalto SA Server installation & configuration 2. Microsoft IAS Radius server configuration 3. SA Server IAS Agent installation & configuration 4. Microsoft IAG configuration 7

10 Components description External Network ( / ): CLIENT is the machine used by the mobile user from the external network. It could be any machines like windows 2000, XP, Vista, Macintosh and Linux. In this case, we use a windows XP SP2 machine with Internet Explorer. Gateway: IBIZA is the name of the IAG Appliance and has two network cards. We can also imagine a configuration with only one card for an IAG located in a DMZ for example. Note: This use case works also when IAG is not in the AD domain Internal Networks ( / ): DALLAS is a machine hosting Active Directory and acting as domain controller. SA Server is the additional server to add the OTP service.

11 3 Configure the Internet Authentication Service On Saserver machine, install the IAS service embedded in Windows Server Check IAS RADIUS Server domain The IAS RADIUS server must be part of the AD Domain as IAS RADIUS has to check that each Mobile User has an account in the directory. Access to IAS administration You have to: 1. Click on Start and Select Administrative Tools 2. Select Internet Authentication Service Figure 3 - IAS RADIUS Server 9

12 Add a RADIUS Client You now have to add the IAG machine as a RADIUS client: 3. Right click on RADIUS Clients and Select New RADIUS Client Figure 4 - New RADIUS Client 4. In Friendly name enter a name for Microsoft IAG, 5. In Client address (IP or DNS) enter the <IP internal address>. a. In our laboratory, we used Click on Next. Figure 5 - New RADIUS Client with shared secret 7. Select RADIUS Standard for Client-Vendor, 8. Enter the chosen shared secret in Shared secret: and in Confirm shared secret. 9. Click on Finish to validate those parameters. 10

13 Configure Access Policies You have to add a new remote access policy: 1. Right click on Remote Access Policies and Select New Remote Access Policy 2. Click on Next in the wizard windows Figure 6 - Policy Configuration 3. Select Set up a custom policy choice in How do you want to set up this policy and add a friendly name in Policy name. 4. Click on Next. Figure 7 - Policy Conditions 5. Click on Add in Policy Conditions window 11

14 Figure 8 - Attribute type 6. Select Client-IP-Address in Attribute types: and click on Add Figure 9 - Client IP Address 7. Enter <IP internal address> in Type a word or a wild card (for example, abc.*): and click on OK. 12

15 Figure 10 - Policy Conditions 8. Click on Next. Figure 11 - Selecting Permissions 9. Select Grant remote access permission in If a connection request matches the specified conditions: and click on Next. 13

16 Figure 12 - Editing Authentication 10. Click on Edit Profile in the profile window 11. Select Authentication tab and uncheck all boxes except unencrypted authentication (PAP, SPAP). 12. Select Encryption tab Figure 13 - Encryption Type 13. Check only the No encryption box. Then click on OK 14. In the Profile window, click on Next. 14

17 15. In the New Remote Access Policy Wizard window, click on Finish. The new policy is now available. Note: With PAP, there is no security mechanism, and then the traffic is in clear. As only the OTP is sent and valid once, there is no security issue. 15

18 4 Configure the Gemalto Strong Authentication Server Installation The complete installation is not detailed here. For the installation and the configuration steps, please refer to the Gemalto SA Server documentations. On the SA Server, you have to do a standard installation in mixed mode to reach the Active Directory on Dallas. Regarding the LDAP parameters during the installation, two users are needed for SA Server and have to be created on the AD: one is used for the AD connectivity and the second one is used for the administration of SA Server, respectively sasconnect user and sasadmin user in our case. 16

19 Figure 14 SA Installation LDAP Server Information LDAP Connection for SA Server: Hostname: (dallas) Base DN: DC=CONSTOSO, DC=COM Login DN: CN=sasconnect, CN=users User Base DN: CN=users Figure 15 SA Installation Administrator account sasadmin user is used for the administration of SA Server. 17

20 User management Reach the web administrator portal (in this case with the user sasadmin). You are able to migrate users from Active Directory to SA Server and attach OTP token to these users. Figure 16 SA Configuration Administrator connection Add a user from AD ( marc in this example): Manage Users -> Migrate User Figure 17 SA Configuration User management 18

21 Add an OATH device: In Manage Devices -> Create OATH Device Figure 18 SA Configuration Create OATH device Modify the policy to check only the OTP, and not the OTP+ AD password: Manage Policies->View all policies Select the policy linked to your device (OATH Policy 6R in this case) and disable Use Password Rule Figure 19 SA Configuration Policy modification 19

22 Link the Device to the user: In Manage Device, find the device you want to link to the user. Enter Marc in User field, update and activate Figure 20 SA Configuration Link the device to the user Check SA Server usage Reach the web user portal on SA Server (In this case Enter the username migrated previously in SA Server, his AD password, his OTP from the token. If successful, you can go on 20

23 5 Install and configure SA Server agent for IAS For the installation and the configuration steps, please refer to the Gemalto SA Server documentations. In this case, as IAS and SA Server are on the same machine, the address for SA Server Authentication Servlet URL is localhost (Default configuration) Figure 21 IAS Agent installation Restart IAS To launch the installed agent, you now have to re-start IAS. In Internet Authentication Service window, click on in the toolbar to stop IAS. 21

24 Figure 22 - Stopping the IAS Service Then, click on the green arrow in the same toolbar to restart the server and take the changes into account. Figure 23 - Starting the IAS Service Note: You can check the status of IAS Service and can also restart it if necessary by using the Service Console. 22

25 6 Configure Intelligent Application Gateway In this section, we are going to add the OTP authentication to the existing configuration. Logon on the IAG management application Figure 24 IAG Configuration Portal properties Select the Portal Portal1. Click on the Configure button for Advanced Trunk Configuration. 23

26 Figure 25 IAG Configuration Advanced Trunk Configuration In the Authentication tab, click on Add for a new authentication service. Figure 26 IAG Configuration Add authentication server Click on Add 24

27 Figure 27 IAG Configuration - Add RADIUS Server In Type field, select RADIUS, type a name, then you must type the IP/Host of RADIUS Server and Secret Key. Click on OK. Notes: The Secret Key is the shared secret you have configured in New Radius Client. Figure 28 IAG Configuration Select OTP Method Click on Select to select OTP 25

28 Always in Authentication tab, select User Must Provide Credentials for Each Selected Server and check Use the Same User Name. Figure 29 IAG Configuration Select both authentication servers 26

29 7 Client connection On the client workstation, open your web browser and type the IAG external IP address or the DNS name associated to it, Notes: In our laboratory, the website was https://iag.contoso.com Figure 30 Client connection - Login 1. Enter your credentials and click Submit. Note: You must enter the OTP in the IAS Password field 27

30 Figure 31 Client connection - IAG Portal 2. Select OWA 2007 to access to Outlook Web Access. Figure 32 Client connection - OWA Access In this example, the application authentication is done by web form. The logon is done automatically by IAG. Notes: With IAG, the authentication method can be done with Web Form, Integrated or both (defined by the application). All are compatible is this use case. 28

31 Figure 33 Client connection - OWA Connection to another application (Sharepoint): Go back to the IAG Portal, and then click on Sharepoint, you are automatically connected to Sharepoint: Figure 34 Client connection - Sharepoint Access 29

Application Note. Citrix Presentation Server through a Citrix Web Interface with OTP only

Application Note. Citrix Presentation Server through a Citrix Web Interface with OTP only Application Note Citrix Presentation Server through a Citrix Web Interface with OTP only ii Preface All information herein is either public information or is the property of and owned solely by Gemalto

More information

Application Note. Gemalto s SA Server and OpenLDAP

Application Note. Gemalto s SA Server and OpenLDAP Application Note Gemalto s SA Server and OpenLDAP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall

More information

Application Note. SA Server and ADAM

Application Note. SA Server and ADAM Application Note SA Server and ADAM Solution Overview All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and

More information

Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista

Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista nicolas.bataille@gemalto.com hassen.frikha@gemalto.com November 2007 www.gemalto.com All information herein

More information

Application Note: Integrate Check Point IPSec or SSL VPN with Gemalto SA Server. SASolutions@gemalto.com January 2008. www.gemalto.

Application Note: Integrate Check Point IPSec or SSL VPN with Gemalto SA Server. SASolutions@gemalto.com January 2008. www.gemalto. Application Note: Integrate Check Point IPSec or SSL VPN with Gemalto SA Server SASolutions@gemalto.com January 2008 www.gemalto.com All information herein is either public information or is the property

More information

Application Note Gemalto.NET and Classic MDE TPC smart cards and EFS on Microsoft Windows Vista

Application Note Gemalto.NET and Classic MDE TPC smart cards and EFS on Microsoft Windows Vista www.gemalto.com Application Note Gemalto.NET and Classic MDE TPC smart cards and EFS on Microsoft Windows Vista All information herein is either public information or is the property of and owned solely

More information

SA Server 2.0. Application Note : Evidian SafeKit 7.0.4, Failover

SA Server 2.0. Application Note : Evidian SafeKit 7.0.4, Failover SA Server 2.0 Application Note : Evidian SafeKit 7.0.4, Failover ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries

More information

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned

More information

SafeNet Cisco AnyConnect Client. Configuration Guide

SafeNet Cisco AnyConnect Client. Configuration Guide SafeNet Cisco AnyConnect Client Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

IDGo 800 Minidriver for Windows. User Guide

IDGo 800 Minidriver for Windows. User Guide IDGo 800 Minidriver for Windows User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the

More information

IDGo 800 Minidriver for Windows

IDGo 800 Minidriver for Windows IDGo 800 Minidriver for Windows Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

Application Note: Integrate Cisco IPSec or SSL VPN with Gemalto SA Server. SASolutions@gemalto.com January 2008. www.gemalto.com

Application Note: Integrate Cisco IPSec or SSL VPN with Gemalto SA Server. SASolutions@gemalto.com January 2008. www.gemalto.com Application Note: Integrate Cisco IPSec or SSL VPN with Gemalto SA Server SASolutions@gemalto.com January 2008 www.gemalto.com All information herein is either public information or is the property of

More information

MobilePASS+ for Android. User Guide

MobilePASS+ for Android. User Guide MobilePASS+ for Android User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right

More information

Application Note: Integrate Juniper SSL VPN with Gemalto SA Server. SASolutions@gemalto.com October 2007. www.gemalto.com

Application Note: Integrate Juniper SSL VPN with Gemalto SA Server. SASolutions@gemalto.com October 2007. www.gemalto.com Application Note: Integrate Juniper SSL VPN with Gemalto SA Server SASolutions@gemalto.com October 2007 www.gemalto.com Table of contents Table of contents... 2 Overview... 3 Architecture... 5 Configure

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for Google Apps All information herein is either public information or is the property of and

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

Application Note. Gemalto Smart Cards with Citrix XenApp 5.0

Application Note. Gemalto Smart Cards with Citrix XenApp 5.0 Application Note Gemalto Smart Cards with Citrix XenApp 5.0 ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries

More information

S-Series Common Use Cases

S-Series Common Use Cases S-Series Common Use Cases vsec:cms Use Cases versasec.com 1(338) All information herein is either public information or is the property of and owned solely by Versasec who shall have and keep the sole

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to

More information

Microsoft Internet Information Services. Integration Guide

Microsoft Internet Information Services. Integration Guide Microsoft Internet Information Services Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have

More information

SafeNet Authentication Service Token Validator Proxy Agent. Configuration Guide

SafeNet Authentication Service Token Validator Proxy Agent. Configuration Guide SafeNet Authentication Service Token Validator Proxy Agent Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries

More information

Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server. SASolutions@gemalto.com October 2007. www.gemalto.com

Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server. SASolutions@gemalto.com October 2007. www.gemalto.com Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server SASolutions@gemalto.com October 2007 www.gemalto.com Table of contents Overview... 3 Architecture... 5 Configure Juniper IPSec on an

More information

Using Microsoft Active Directory Server and IAS Authentication

Using Microsoft Active Directory Server and IAS Authentication StoneGate How-To Using Microsoft Active Directory Server and IAS Authentication StoneGate Firewall/VPN 3.0.7 and Management Center 4.1 Table of Contents Basic Scenario...page 3 Configuring a Windows 2003

More information

Strong Authentication for Microsoft SharePoint

Strong Authentication for Microsoft SharePoint Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Strong Authentication for Juniper Networks

Strong Authentication for Juniper Networks Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright

More information

Strong Authentication for Microsoft TS Web / RD Web

Strong Authentication for Microsoft TS Web / RD Web Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have

More information

Radius Integration Guide Version 9

Radius Integration Guide Version 9 Radius Integration Guide Version 9 Document version 9402-1.0-18/10/2006 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

DualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited

DualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited DualShield for Implementation Guide (Version 5.2) Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks DualShield Unified Authentication, MobileID,

More information

Technical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism

Technical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism Technical Note Configuring Outlook Web Access with Secure WebMail Proxy for eprism Information in this document is subject to change without notice. This document may be distributed freely only in whole,

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

Defender 5.7. Remote Access User Guide

Defender 5.7. Remote Access User Guide Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Strong Authentication for Juniper Networks SSL VPN

Strong Authentication for Juniper Networks SSL VPN Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

SafeNet Authentication Service Agent for Windows Logon. Configuration Guide

SafeNet Authentication Service Agent for Windows Logon. Configuration Guide SafeNet Authentication Service Agent for Windows Logon Configuration Guide All information herein is either public information or is the property of and owned solely by SafeNet Inc. and/or its subsidiaries

More information

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within

More information

DualShield Authentication Platform

DualShield Authentication Platform Quick Start Guide (Version 5.7) Copyright 2013 Deepnet Security Limited Copyright 2013, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,

More information

ADS Integration Guide

ADS Integration Guide ADS Integration Guide Document version 9402-1.0-18/10/2006 Cyberoam ADS Integration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

ExecProtect Armored Office AD FS 2012 R2 with O365 Demo Guide

ExecProtect Armored Office AD FS 2012 R2 with O365 Demo Guide ExecProtect Armored Office How to configure AD FS 2012 R2 with IDC 6.2 on AZURE All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

Release Notes for Version 1.5.207

Release Notes for Version 1.5.207 Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4

More information

IPSec VPN Client Installation Guide. Version 4

IPSec VPN Client Installation Guide. Version 4 IPSec VPN Client Installation Guide Version 4 Document version - 1.0-410003-25/10/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,

More information

Defender Delegated Administration. User Guide

Defender Delegated Administration. User Guide Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Rohos Logon Key for Windows Remote Desktop logon with YubiKey token

Rohos Logon Key for Windows Remote Desktop logon with YubiKey token Rohos Logon Key for Windows Remote Desktop logon with YubiKey token Step-by-Step Integration Guide. Tesline-Service S.R.L. 10 Calea Iesilor str., Chisinau, MD-2069, Moldova. Tel: +373-22-740-242 www.rohos.com

More information

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration

Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

Abila Nonprofit Online. Connection Guide

Abila Nonprofit Online. Connection Guide Abila Nonprofit Online This is a publication of Abila, Inc. 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned

More information

Technical Brief for Windows Home Server Remote Access

Technical Brief for Windows Home Server Remote Access Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality

More information

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12

M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12 M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.

More information

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication

More information

HTTP Client Installation Guide Version 9

HTTP Client Installation Guide Version 9 HTTP Client Installation Guide Version 9 Document version 7300-1.0-9/13/2006 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

Omniquad Exchange Archiving

Omniquad Exchange Archiving Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith

More information

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

CA Unified Infrastructure Management Server

CA Unified Infrastructure Management Server CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

Configuring SSL VPN on the Cisco ISA500 Security Appliance

Configuring SSL VPN on the Cisco ISA500 Security Appliance Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Business Portal for Microsoft Dynamics GP 2010. Field Service Suite

Business Portal for Microsoft Dynamics GP 2010. Field Service Suite Business Portal for Microsoft Dynamics GP 2010 Field Service Suite Copyright Copyright 2010 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views

More information

Business Portal for Microsoft Dynamics GP. Project Time and Expense Administrator s Guide Release 10.0

Business Portal for Microsoft Dynamics GP. Project Time and Expense Administrator s Guide Release 10.0 Business Portal for Microsoft Dynamics GP Project Time and Expense Administrator s Guide Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July

More information

Dell Migration Manager Upgrade Guide

Dell Migration Manager Upgrade Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

SSL VPN Client Installation Guide Version 9

SSL VPN Client Installation Guide Version 9 SSL VPN Client Installation Guide Version 9 Document version 96060-1.0-08/10/2009 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,

More information

Defender EAP Agent Installation and Configuration Guide

Defender EAP Agent Installation and Configuration Guide Defender EAP Agent Installation and Configuration Guide Introduction A VPN is an extension of a private network that encompasses links across shared or public networks like the Internet. VPN connections

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Business Portal for Microsoft Dynamics GP. Key Performance Indicators Release 10.0

Business Portal for Microsoft Dynamics GP. Key Performance Indicators Release 10.0 Business Portal for Microsoft Dynamics GP Key Performance Indicators Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the

More information

Contents Notice to Users

Contents  Notice to Users Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote

More information

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2008 2015 VASCO Data Security, Inc., VASCO Data Security International

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Cisco ASA. Implementation Guide. (Version 5.4) Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.

Cisco ASA. Implementation Guide. (Version 5.4) Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved. Cisco ASA Implementation Guide (Version 5.4) Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID,

More information

Self Help Guides. Create a New User in a Domain

Self Help Guides. Create a New User in a Domain Self Help Guides Create a New User in a Domain Creating Users & Groups This document is to be used as a guide to creating users and/or groups in a Domain Server environment; 1. Windows Server Domain exists,

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet

More information

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE) INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using RADIUS Protocol for Citrix Netscaler 10.5 All information herein is either public information or is the property of and owned solely by Gemalto NV.

More information

Web Remote Access. User Guide

Web Remote Access. User Guide Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior

More information

The cloud server setup program installs the cloud server application, Apache Tomcat, Java Runtime Environment, and PostgreSQL.

The cloud server setup program installs the cloud server application, Apache Tomcat, Java Runtime Environment, and PostgreSQL. GO-Global Cloud 4.1 QUICK START SETTING UP A WINDOWS CLOUD SERVER AND HOST This guide provides instructions for setting up a cloud server and configuring a host so it can be accessed from the cloud server.

More information

BES10 Self-Service. Version: 10.2. User Guide

BES10 Self-Service. Version: 10.2. User Guide BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create

More information

CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com

CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com CYBEROAM LDAP INTEGRATION GUIDE VERSION: 7 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of

More information

CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com 7300-1.

CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com 7300-1. CYBEROAM - ADS INTEGRATION GUIDE VERSION: 7 7300-1.0-9/20/2005 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505 INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Agent Configuration Guide

Agent Configuration Guide SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright

More information

2X SecureRemoteDesktop. Version 1.1

2X SecureRemoteDesktop. Version 1.1 2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

Global VPN Client Getting Started Guide

Global VPN Client Getting Started Guide Global VPN Client Getting Started Guide 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential

More information

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.

More information

MobileStatus Server Installation and Configuration Guide

MobileStatus Server Installation and Configuration Guide MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,

More information

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide

RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks

More information

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS

Dell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6

Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 INTEGRATION GUIDE May 2014 3725-75304-001 Rev B Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 Polycom, Inc. 0 Copyright 2014, Polycom, Inc. All rights reserved.

More information