Application Note. Intelligent Application Gateway with SA server using AD password and OTP
|
|
- Rodger Cunningham
- 8 years ago
- Views:
Transcription
1 Application Note Intelligent Application Gateway with SA server using AD password and OTP
2 ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to file patent applications or any other kind of intellectual property protection in connection with such information. Nothing herein shall be construed as implying or granting to you any rights, by license, grant or otherwise, under any intellectual and/or industrial property rights of or concerning any of Gemalto s information. This document can be used for informational, non-commercial, internal and personal use only provided that: The copyright notice below, the confidentiality and proprietary legend and this full warning notice appear in all copies. This document shall not be posted on any network computer or broadcast in any media and no modification of any part of this document shall be made. Use for any other purpose is expressly prohibited and may result in severe civil and criminal liabilities. The information contained in this document is provided AS IS without any warranty of any kind. Unless otherwise expressly agreed in writing, Gemalto makes no warranty as to the value or accuracy of information contained herein. The document could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Furthermore, Gemalto reserves the right to make any change or improvement in the specifications data, information, and the like described herein, at any time. Gemalto hereby disclaims all warranties and conditions with regard to the information contained herein, including all implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Gemalto be liable, whether in contract, tort or otherwise, for any indirect, special or consequential damages or any damages whatsoever including but not limited to damages resulting from loss of use, data, profits, revenues, or customers, arising out of or in connection with the use or performance of information contained in this document. Gemalto does not and shall not warrant that this product will be resistant to all possible attacks and shall not incur, and disclaims, any liability in this respect. Even if each product is compliant with current security standards in force on the date of their design, security mechanisms' resistance necessarily evolves according to the state of the art in security and notably under the emergence of new attacks. Under no circumstances, shall Gemalto be held liable for any third party actions and in particular in case of any successful attack against systems or equipment incorporating Gemalto products. Gemalto disclaims any liability with respect to security for direct, indirect, incidental or consequential damages that result from any use of its products. It is further stressed that independent testing and verification by the person using the product is particularly encouraged, especially in any application in which defective, incorrect or insecure functioning could result in damage to persons or property, denial of service or loss of privacy. Copyright 2008 Gemalto N.V. All rights reserved. Gemalto and the Gemalto logo are trademarks and service marks of Gemalto N.V. and/or its subsidiaries and are registered in certain countries. All other trademarks and service marks, whether registered or not in specific countries, are the property of their respective owners. GEMALTO, B.P. 100, GEMENOS CEDEX, FRANCE. Tel: +33 (0) Fax: +33 (0) September 20, 2007
3 Contents Preface... 3 Who Should Read This Book...3 For More Information...3 Conventions...4 Contact Our Hotline...4 Overview... 5 Intelligent Application Gateway...5 Gemalto SA Server...5 Integration of SA Server with IAG...6 Use Case... 7 Main steps...7 Components description...8 Configure the Internet Authentication Service... 9 Add a RADIUS Client...10 Configure Access Policies...11 Configure the Gemalto Strong Authentication Server Installation...16 User management...18 Check SA Server usage...20 Install and configure SA Server agent for IAS Restart IAS...21 Configure Intelligent Application Gateway Client connection... 27
4 List of Figures Figure 1 Global Architecture... 6 Figure 2 Architecture for the use case... 7 Figure 3 - IAS RADIUS Server... 9 Figure 4 - New RADIUS Client Figure 5 - New RADIUS Client with shared secret Figure 6 - Policy Configuration Figure 7 - Policy Conditions Figure 8 - Attribute type Figure 9 - Client IP Address Figure 10 - Policy Conditions Figure 11 - Selecting Permissions Figure 12 - Editing Authentication Figure 13 - Encryption Type Figure 14 SA Installation LDAP Server Information Figure 15 SA Installation Administrator account Figure 16 SA Configuration Administrator connection Figure 17 SA Configuration User management Figure 18 SA Configuration Create OATH device Figure 19 SA Configuration Policy modification Figure 20 SA Configuration Link the device to the user Figure 21 IAS Agent installation Figure 22 - Stopping the IAS Service Figure 23 - Starting the IAS Service Figure 24 IAG Configuration Portal properties Figure 25 IAG Configuration Advanced Trunk Configuration Figure 26 IAG Configuration Add authentication server Figure 27 IAG Configuration - Add RADIUS Server Figure 28 IAG Configuration Select OTP Method Figure 29 IAG Configuration Select both authentication servers Figure 30 Client connection - Login Figure 31 Client connection - IAG Portal Figure 32 Client connection - OWA Access Figure 33 Client connection - OWA Figure 34 Client connection - Sharepoint Access
5 Preface The Gemalto two-factor authentication solution provides strong authentication based on smart cards for the enterprise, banking, and internet service provider (ISP) markets. This solution enables organizations to deploy a strong authentication solution for their endusers, whether local or remote. The system can service a broad range of deployments, from small corporations with less than 100 users to ISPs with potentially millions of users. Who Should Read This Book This guide is intended for system administrators responsible for configuring the Microsoft IAG and Gemalto SA Server in order to use Gemalto OTP devices to authenticate mobile users with IAG. Administrators should be familiar with: Intelligent Application Gateway of Microsoft. The Gemalto SA Server system architecture. For More Information For a complete list of the documentation for the Gemalto Strong Authentication (SA) Server, refer to the release notes (README.txt) on the Gemalto SA Server CD (or zip image of the CD). For more information about other supported components, see the manufacturer s documentation for those products. 3
6 Conventions The following conventions are used in this document: In this manual, the following highlighting styles are used: Bold Instructions, commands, file names, folder names, key names, icons, menus, menu items, field names, buttons, check boxes, tabs, registry keys and values. Italic Variables that you must replace with a value, book titles, news or emphasized terms. In this manual, hyperlinks are marked as described below Internal Links Displayed in quotation marks. When viewing this book online, click an internal link to jump to a different section of the book. External Links Displayed in blue, underlined text. When viewing this book online, click an external link to launch your default browser (or program) to navigate to that Web address or compose an . In this manual, notes and cautions are marked like this: Notes: Information that further explains a concept or instruction, tips, and tricks. Caution: Information that alerts you to potentially severe problems that might result in loss of data or system failure. Contact Our Hotline If you do not find the information you need in this manual, or if you have any questions, contact our hotline commissioning.support@gemalto.com 4
7 1 Overview This document provides a deployment scenario to show you how it is possible to configure the Microsoft IAG to use Gemalto SA Server to authenticate Mobiles Users in order to get access to applications through IAG Portal. Caution: Consequently, this document should not be considered as an instruction manual on how to configure your system. Intelligent Application Gateway Microsoft s Intelligent Application Gateway (IAG) 2007 with Application Optimizers provides secure socket layer (SSL) virtual private network (VPN), a Web application firewall, and endpoint security management that enable access control, authorization, and content inspection for a wide variety of line-of-business applications. Together, these technologies provide mobile and remote workers with easy and flexible secure access from a broad range of devices and locations including kiosks, PCs, and mobile devices. IAG also enables IT administrators to enforce compliance with application and information usage guidelines through a customized remote access policy based on device, user, application, or other business criteria. For more information, visit: Gemalto SA Server Gemalto SA Server is a strong authentication platform that was developed to incorporate the strengths of Gemalto s smart card technology. It consists of a family of smart card-based user authentication devices, a browser plug-in, an authentication and customer care server and a self-service user care portal. This server provides the usage of OTP (One Time Password) and the possibility to a Two Factor Authentication for a strongest authentication. For more information about OTP, visit and about Two Factor Authentication, visit Gemalto SA Server runs under Windows and Linux operating systems and is easily integrated with existing network and authentication infrastructure. For more information, visit 5
8 Integration of SA Server with IAG The fact to integrate SA Server in an existing IAG architecture reinforces the security, especially for mobile user by using an OTP. The installation and configuration is simple at the company side, just install the SA Server with Radius and configure IAG to use the radius for authentication. At the client side, nothing has to be installed. The user has to fill the authentication page by using his login, password and the OTP (provided by any OATH token). List of Gemalto s OATH device: After a successful authentication, you have a direct access to your application or IAG present to you a web page listing all your applications you are able to reach. Figure 1 Global Architecture 6
9 2 Use Case In this section, we are focusing on a specific use case to show in detail how the integration of SA Server with IAG can be done. In this scenario, the mobile user can access his applications such as OWA and/or Sharepoint through IAG with a Two Factor Authentication (Login / AD Password / OTP). We add the OTP mechanism to an existing IAG configuration by installing and configuring the Microsoft radius server (IAS) and the Gemalto SA Server. Figure 2 Architecture for the use case Main steps The main steps are: 1. Gemalto SA Server installation & configuration 2. Microsoft IAS Radius server configuration 3. SA Server IAS Agent installation & configuration 4. Microsoft IAG configuration 7
10 Components description External Network ( / ): CLIENT is the machine used by the mobile user from the external network. It could be any machines like windows 2000, XP, Vista, Macintosh and Linux. In this case, we use a windows XP SP2 machine with Internet Explorer. Gateway: IBIZA is the name of the IAG Appliance and has two network cards. We can also imagine a configuration with only one card for an IAG located in a DMZ for example. Note: This use case works also when IAG is not in the AD domain Internal Networks ( / ): DALLAS is a machine hosting Active Directory and acting as domain controller. SA Server is the additional server to add the OTP service.
11 3 Configure the Internet Authentication Service On Saserver machine, install the IAS service embedded in Windows Server Check IAS RADIUS Server domain The IAS RADIUS server must be part of the AD Domain as IAS RADIUS has to check that each Mobile User has an account in the directory. Access to IAS administration You have to: 1. Click on Start and Select Administrative Tools 2. Select Internet Authentication Service Figure 3 - IAS RADIUS Server 9
12 Add a RADIUS Client You now have to add the IAG machine as a RADIUS client: 3. Right click on RADIUS Clients and Select New RADIUS Client Figure 4 - New RADIUS Client 4. In Friendly name enter a name for Microsoft IAG, 5. In Client address (IP or DNS) enter the <IP internal address>. a. In our laboratory, we used Click on Next. Figure 5 - New RADIUS Client with shared secret 7. Select RADIUS Standard for Client-Vendor, 8. Enter the chosen shared secret in Shared secret: and in Confirm shared secret. 9. Click on Finish to validate those parameters. 10
13 Configure Access Policies You have to add a new remote access policy: 1. Right click on Remote Access Policies and Select New Remote Access Policy 2. Click on Next in the wizard windows Figure 6 - Policy Configuration 3. Select Set up a custom policy choice in How do you want to set up this policy and add a friendly name in Policy name. 4. Click on Next. Figure 7 - Policy Conditions 5. Click on Add in Policy Conditions window 11
14 Figure 8 - Attribute type 6. Select Client-IP-Address in Attribute types: and click on Add Figure 9 - Client IP Address 7. Enter <IP internal address> in Type a word or a wild card (for example, abc.*): and click on OK. 12
15 Figure 10 - Policy Conditions 8. Click on Next. Figure 11 - Selecting Permissions 9. Select Grant remote access permission in If a connection request matches the specified conditions: and click on Next. 13
16 Figure 12 - Editing Authentication 10. Click on Edit Profile in the profile window 11. Select Authentication tab and uncheck all boxes except unencrypted authentication (PAP, SPAP). 12. Select Encryption tab Figure 13 - Encryption Type 13. Check only the No encryption box. Then click on OK 14. In the Profile window, click on Next. 14
17 15. In the New Remote Access Policy Wizard window, click on Finish. The new policy is now available. Note: With PAP, there is no security mechanism, and then the traffic is in clear. As only the OTP is sent and valid once, there is no security issue. 15
18 4 Configure the Gemalto Strong Authentication Server Installation The complete installation is not detailed here. For the installation and the configuration steps, please refer to the Gemalto SA Server documentations. On the SA Server, you have to do a standard installation in mixed mode to reach the Active Directory on Dallas. Regarding the LDAP parameters during the installation, two users are needed for SA Server and have to be created on the AD: one is used for the AD connectivity and the second one is used for the administration of SA Server, respectively sasconnect user and sasadmin user in our case. 16
19 Figure 14 SA Installation LDAP Server Information LDAP Connection for SA Server: Hostname: (dallas) Base DN: DC=CONSTOSO, DC=COM Login DN: CN=sasconnect, CN=users User Base DN: CN=users Figure 15 SA Installation Administrator account sasadmin user is used for the administration of SA Server. 17
20 User management Reach the web administrator portal (in this case with the user sasadmin). You are able to migrate users from Active Directory to SA Server and attach OTP token to these users. Figure 16 SA Configuration Administrator connection Add a user from AD ( marc in this example): Manage Users -> Migrate User Figure 17 SA Configuration User management 18
21 Add an OATH device: In Manage Devices -> Create OATH Device Figure 18 SA Configuration Create OATH device Modify the policy to check only the OTP, and not the OTP+ AD password: Manage Policies->View all policies Select the policy linked to your device (OATH Policy 6R in this case) and disable Use Password Rule Figure 19 SA Configuration Policy modification 19
22 Link the Device to the user: In Manage Device, find the device you want to link to the user. Enter Marc in User field, update and activate Figure 20 SA Configuration Link the device to the user Check SA Server usage Reach the web user portal on SA Server (In this case Enter the username migrated previously in SA Server, his AD password, his OTP from the token. If successful, you can go on 20
23 5 Install and configure SA Server agent for IAS For the installation and the configuration steps, please refer to the Gemalto SA Server documentations. In this case, as IAS and SA Server are on the same machine, the address for SA Server Authentication Servlet URL is localhost (Default configuration) Figure 21 IAS Agent installation Restart IAS To launch the installed agent, you now have to re-start IAS. In Internet Authentication Service window, click on in the toolbar to stop IAS. 21
24 Figure 22 - Stopping the IAS Service Then, click on the green arrow in the same toolbar to restart the server and take the changes into account. Figure 23 - Starting the IAS Service Note: You can check the status of IAS Service and can also restart it if necessary by using the Service Console. 22
25 6 Configure Intelligent Application Gateway In this section, we are going to add the OTP authentication to the existing configuration. Logon on the IAG management application Figure 24 IAG Configuration Portal properties Select the Portal Portal1. Click on the Configure button for Advanced Trunk Configuration. 23
26 Figure 25 IAG Configuration Advanced Trunk Configuration In the Authentication tab, click on Add for a new authentication service. Figure 26 IAG Configuration Add authentication server Click on Add 24
27 Figure 27 IAG Configuration - Add RADIUS Server In Type field, select RADIUS, type a name, then you must type the IP/Host of RADIUS Server and Secret Key. Click on OK. Notes: The Secret Key is the shared secret you have configured in New Radius Client. Figure 28 IAG Configuration Select OTP Method Click on Select to select OTP 25
28 Always in Authentication tab, select User Must Provide Credentials for Each Selected Server and check Use the Same User Name. Figure 29 IAG Configuration Select both authentication servers 26
29 7 Client connection On the client workstation, open your web browser and type the IAG external IP address or the DNS name associated to it, Notes: In our laboratory, the website was Figure 30 Client connection - Login 1. Enter your credentials and click Submit. Note: You must enter the OTP in the IAS Password field 27
30 Figure 31 Client connection - IAG Portal 2. Select OWA 2007 to access to Outlook Web Access. Figure 32 Client connection - OWA Access In this example, the application authentication is done by web form. The logon is done automatically by IAG. Notes: With IAG, the authentication method can be done with Web Form, Integrated or both (defined by the application). All are compatible is this use case. 28
31 Figure 33 Client connection - OWA Connection to another application (Sharepoint): Go back to the IAG Portal, and then click on Sharepoint, you are automatically connected to Sharepoint: Figure 34 Client connection - Sharepoint Access 29
Application Note. Citrix Presentation Server through a Citrix Web Interface with OTP only
Application Note Citrix Presentation Server through a Citrix Web Interface with OTP only ii Preface All information herein is either public information or is the property of and owned solely by Gemalto
More informationApplication Note. Gemalto s SA Server and OpenLDAP
Application Note Gemalto s SA Server and OpenLDAP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall
More informationApplication Note. SA Server and ADAM
Application Note SA Server and ADAM Solution Overview All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and
More informationApplication Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista
Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista nicolas.bataille@gemalto.com hassen.frikha@gemalto.com November 2007 www.gemalto.com All information herein
More informationHow To Connect Checkpoint To Gemalto Sa Server With A Checkpoint Vpn And Connect To A Check Point Wifi With A Cell Phone Or Ipvvv On A Pc Or Ipa (For A Pbv) On A Micro
Application Note: Integrate Check Point IPSec or SSL VPN with Gemalto SA Server SASolutions@gemalto.com January 2008 www.gemalto.com All information herein is either public information or is the property
More informationApplication Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008
7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned
More informationSA Server 2.0. Application Note : Evidian SafeKit 7.0.4, Failover
SA Server 2.0 Application Note : Evidian SafeKit 7.0.4, Failover ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationSafeNet Cisco AnyConnect Client. Configuration Guide
SafeNet Cisco AnyConnect Client Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and
More informationApplication Note: Integrate Cisco IPSec or SSL VPN with Gemalto SA Server. SASolutions@gemalto.com January 2008. www.gemalto.com
Application Note: Integrate Cisco IPSec or SSL VPN with Gemalto SA Server SASolutions@gemalto.com January 2008 www.gemalto.com All information herein is either public information or is the property of
More informationIDGo 800 Minidriver for Windows. User Guide
IDGo 800 Minidriver for Windows User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the
More informationApplication Note. Gemalto Smart Cards with Citrix XenApp 5.0
Application Note Gemalto Smart Cards with Citrix XenApp 5.0 ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationHow To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net 3.5.1 (Net 2) On A Gmaalto.Com Web Server
Application Note: Integrate Juniper SSL VPN with Gemalto SA Server SASolutions@gemalto.com October 2007 www.gemalto.com Table of contents Table of contents... 2 Overview... 3 Architecture... 5 Configure
More informationSafeNet Authentication Service
SafeNet Authentication Service All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to
More informationSafeNet Authentication Service Token Validator Proxy Agent. Configuration Guide
SafeNet Authentication Service Token Validator Proxy Agent Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries
More informationApplication Note: Integrate Juniper IPSec VPN with Gemalto SA Server. SASolutions@gemalto.com October 2007. www.gemalto.com
Application Note: Integrate Juniper IPSec VPN with Gemalto SA Server SASolutions@gemalto.com October 2007 www.gemalto.com Table of contents Overview... 3 Architecture... 5 Configure Juniper IPSec on an
More informationUsing Microsoft Active Directory Server and IAS Authentication
StoneGate How-To Using Microsoft Active Directory Server and IAS Authentication StoneGate Firewall/VPN 3.0.7 and Management Center 4.1 Table of Contents Basic Scenario...page 3 Configuring a Windows 2003
More informationSafeNet Authentication Service Agent for Windows Logon. Configuration Guide
SafeNet Authentication Service Agent for Windows Logon Configuration Guide All information herein is either public information or is the property of and owned solely by SafeNet Inc. and/or its subsidiaries
More informationStrong Authentication for Juniper Networks
Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright
More informationDefender 5.7. Remote Access User Guide
Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationMicrosoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
More informationDualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited
DualShield for Implementation Guide (Version 5.2) Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks DualShield Unified Authentication, MobileID,
More informationVeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
More informationStrong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationRadius Integration Guide Version 9
Radius Integration Guide Version 9 Document version 9402-1.0-18/10/2006 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but
More informationSafeNet Authentication Service
SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have
More informationDell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
More informationDualShield Authentication Platform
Quick Start Guide (Version 5.7) Copyright 2013 Deepnet Security Limited Copyright 2013, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
More informationADS Integration Guide
ADS Integration Guide Document version 9402-1.0-18/10/2006 Cyberoam ADS Integration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of
More informationStrong Authentication for Microsoft TS Web / RD Web
Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationTechnical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism
Technical Note Configuring Outlook Web Access with Secure WebMail Proxy for eprism Information in this document is subject to change without notice. This document may be distributed freely only in whole,
More informationHow To Use A Smart Card With A Fingerprint On A Card On A Pc Or A Smartcard On A Microsoft Gina (Smart Card) On A Powerbook (Smartcard) On Windows Xp (Windows Xp) On An Iphone
.NET Bio Solution for Windows XP Administrator Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
More informationExecProtect Armored Office AD FS 2012 R2 with O365 Demo Guide
ExecProtect Armored Office How to configure AD FS 2012 R2 with IDC 6.2 on AZURE All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries
More informationHOTPin Integration Guide: DirectAccess
1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility
More informationStrong Authentication for Juniper Networks SSL VPN
Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationDell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud
Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within
More informationAbila Nonprofit Online. Connection Guide
Abila Nonprofit Online This is a publication of Abila, Inc. 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned
More informationSSL VPN Client Installation Guide Version 9
SSL VPN Client Installation Guide Version 9 Document version 96060-1.0-08/10/2009 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
More informationHow to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
More informationIPSec VPN Client Installation Guide. Version 4
IPSec VPN Client Installation Guide Version 4 Document version - 1.0-410003-25/10/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
More informationDefender Delegated Administration. User Guide
Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationDell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
More informationRelease Notes for Version 1.5.207
Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4
More informationRohos Logon Key for Windows Remote Desktop logon with YubiKey token
Rohos Logon Key for Windows Remote Desktop logon with YubiKey token Step-by-Step Integration Guide. Tesline-Service S.R.L. 10 Calea Iesilor str., Chisinau, MD-2069, Moldova. Tel: +373-22-740-242 www.rohos.com
More informationM86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12
M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.
More informationBlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
More informationOmniquad Exchange Archiving
Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith
More informationServer Installation Guide ZENworks Patch Management 6.4 SP2
Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch
More informationConfiguring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
More informationTechnical Brief for Windows Home Server Remote Access
Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality
More informationDameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
More informationExternal Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845
More informationDell One Identity Cloud Access Manager 7.0.2. Installation Guide
Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505
INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this
More informationBusiness Portal for Microsoft Dynamics GP 2010. Field Service Suite
Business Portal for Microsoft Dynamics GP 2010 Field Service Suite Copyright Copyright 2010 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views
More informationRSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
More informationHTTP Client Installation Guide Version 9
HTTP Client Installation Guide Version 9 Document version 7300-1.0-9/13/2006 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but
More informationSelf Help Guides. Create a New User in a Domain
Self Help Guides Create a New User in a Domain Creating Users & Groups This document is to be used as a guide to creating users and/or groups in a Domain Server environment; 1. Windows Server Domain exists,
More informationHOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services
HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
More informationBlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
More informationDell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
More informationCisco ASA. Implementation Guide. (Version 5.4) Copyright 2011 Deepnet Security Limited. Copyright 2011, Deepnet Security. All Rights Reserved.
Cisco ASA Implementation Guide (Version 5.4) Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID,
More informationBusiness Portal for Microsoft Dynamics GP. Project Time and Expense Administrator s Guide Release 10.0
Business Portal for Microsoft Dynamics GP Project Time and Expense Administrator s Guide Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable
More informationDIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
More informationIDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8
IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2008 2015 VASCO Data Security, Inc., VASCO Data Security International
More informationCA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
More informationBusiness Portal for Microsoft Dynamics GP. Key Performance Indicators Release 10.0
Business Portal for Microsoft Dynamics GP Key Performance Indicators Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the
More informationBES10 Self-Service. Version: 10.2. User Guide
BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create
More informationRSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
More informationCheck Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
More informationDell Recovery Manager for Active Directory 8.6. Quick Start Guide
Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationExternal Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210
More informationMobileStatus Server Installation and Configuration Guide
MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,
More informationUsing Entrust certificates with VPN
Entrust Managed Services PKI Using Entrust certificates with VPN Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
More informationSage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright
More informationContents Notice to Users
Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote
More informationAzure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note
KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies
More informationExternal Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
More informationPolycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6
INTEGRATION GUIDE May 2014 3725-75304-001 Rev B Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 Polycom, Inc. 0 Copyright 2014, Polycom, Inc. All rights reserved.
More informationUTM Quick Installation Guide
www.allo.com Version 2.0 1 Copy Right Copyright 2014 Allo. All rights reserved. No part of this publication may be copied, distributed, transmitted, transcribed, stored in a retrieval system, or translated
More informationCORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com 7300-1.
CYBEROAM - ADS INTEGRATION GUIDE VERSION: 7 7300-1.0-9/20/2005 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented
More informationWeb Remote Access. User Guide
Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
More informationCORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com
CYBEROAM LDAP INTEGRATION GUIDE VERSION: 7 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of
More informationDefender EAP Agent Installation and Configuration Guide
Defender EAP Agent Installation and Configuration Guide Introduction A VPN is an extension of a private network that encompasses links across shared or public networks like the Internet. VPN connections
More informationDIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
More informationDigipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide
Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations
More informationXcalibur Global Version 1.2 Installation Guide Document Version 3.0
Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.
More information2X SecureRemoteDesktop. Version 1.1
2X SecureRemoteDesktop Version 1.1 Website: www.2x.com Email: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious
More informationCyberoam IPSec VPN Client Configuration Guide Version 4
Cyberoam IPSec VPN Client Configuration Guide Version 4 Document version 1.0-410003-25/10/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time
More informationAgent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
More informationThe cloud server setup program installs the cloud server application, Apache Tomcat, Java Runtime Environment, and PostgreSQL.
GO-Global Cloud 4.1 QUICK START SETTING UP A WINDOWS CLOUD SERVER AND HOST This guide provides instructions for setting up a cloud server and configuring a host so it can be accessed from the cloud server.
More informationActive Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)
INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
More informationAD Self-Service Suite for Active Directory
The Dot Net Factory AD Self-Service Suite for Active Directory Version 3.6 The Dot Net Factory, LLC. 2005-2011. All rights reserved. This guide contains proprietary information, which is protected by copyright.
More informationIDENTIKEY Server Windows Installation Guide 3.1
IDENTIKEY Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
More informationDell InTrust 11.0. Preparing for Auditing and Monitoring Microsoft IIS
Preparing for Auditing and Monitoring Microsoft IIS 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More information