Revolution R Enterprise DeployR 7.1 Enterprise Security Guide. Authentication, Authorization, and Access Controls

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Revolution R Enterprise DeployR 7.1 Enterprise Security Guide. Authentication, Authorization, and Access Controls"

Transcription

1 Revolution R Enterprise DeployR 7.1 Enterprise Security Guide Authentication, Authorization, and Access Controls

2 The correct bibliographic citation for this manual is as follows: Revolution Analytics, Inc Revolution R Enterprise DeployR Enterprise Security Guide. Revolution Analytics, Inc., Mountain View, CA. Revolution R Enterprise DeployR Enterprise Security Guide Copyright 2014 Revolution Analytics, Inc. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of Revolution Analytics. U.S. Government Restricted Rights Notice: Use, duplication, or disclosure of this software and related documentation by the Government is subject to restrictions as set forth in subdivision (c) (1) (ii) of The Rights in Technical Data and Computer Software clause at Revolution R, Revolution R Enterprise, RPE, RevoScaleR, DeployR, RevoTreeView, and Revolution Analytics are trademarks of Revolution Analytics. Other product names mentioned herein are used for identification purposes only and may be trademarks of their respective owners. Revolution Analytics 2570 West El Camino Real Suite 222 Mountain View, CA, USA We want our documentation to be useful, and we want it to address your needs. If you have comments on this or any Revolution document, write to

3 Contents Chapter 1: Overview...1 Chapter 2: Authentication and Authorization...3 Siteminder Single Sign-On (Pre-Authentication)...4 LDAP Authentication...5 Active Directory Authentication...6 PAM Authentication...7 Basic Authentication...7 Chapter 3: Server Access Controls...9 Working with HTTPS...9 Mandatory HTTPS...9 Working with IP Address Filters...10 Working with XDR (CORS)...10 Chapter 4: Project and Repository File Access Controls...11 Project Access Controls...11 Repository File Access Controls...12 Repository File Download Controls...12 Repository Scripts Access Controls...13 Repository Script Download Controls...14 Chapter 5: Appendix: LDAP & Active Directory Properties...15 [i]

4 ii Chapter 1: Overview

5 Revolution R Enterprise DeployR Enterprise Security Guide Overview 1 1 DeployR is a server framework that exposes the R platform as a service to allow the integration of R statistics, analytics, and visualizations inside Web, desktop, and mobile applications. In addition to providing a simple yet powerful Web services API, the framework also supports a highly-flexible, enterprise security model. By default, DeployR supports basic authentication. Users simply provide plain text username and password credentials, which are then matched against user account data stored in the DeployR database. User accounts are created and managed by an administrator using the DeployR Administration Console. Given these credentials are passed from client to server as plain text, we strongly recommend that you enable and use HTTPS connections, in production environments, every time your application attempts to authenticate with DeployR. For more information, see the section Working with HTTPS in this document. While basic authentication provides a simple and reliable authentication solution, the ability to deliver a seamless integration with existing enterprise security solutions is often paramount. The DeployR enterprise security model can easily be configured to "plug" into a number of widelyadopted enterprise security solutions. The DeployR security model is sufficiently flexible that it can work with multiple enterprise security solutions at the same time. As such, DeployR ships with a number of security providers that together represent a provider-chain upon which user credentials are evaluated. For more information, see Chapter 2. Every aspect of the DeployR security model is controlled by simple configuration properties found in the DeployR external configuration file. This file can be found at $DEPLOYR_HOME/deployr/deployr.groovy. The following chapters in this guide detail how to work with these configuration properties to achieve your preferred security implementation.

6 2 Chapter 1: Overview

7 3 Revolution R Enterprise DeployR Enterprise Security Guide Authentication and 2 Authorization DeployR ships with security providers for the following enterprise security solutions: Siteminder Single Sign-On (Pre-Authentication) LDAP Authentication Active Directory Services PAM Authentication Services Basic Authentication The DeployR security model is sufficiently flexible that it can work with multiple enterprise security solutions at the same time. If two or more enterprise security solutions are active, then user credentials are evaluated by each of the DeployR security providers in the order indicated in preceding list. If a security provider, at any depth in the provider-chain, establishes that the credentials are valid, then the login call succeeds. If the user credentials are not validated by any of the security providers in the provider-chain, then the login call fails. When DeployR processes a user login, there are two key steps involved: 1. Credentials must be authenticated 2. Access privileges must be determined DeployR access privileges are determined by the roles assigned to a user. In the case of basic authentication, an administrator simply assigns roles to a user within the DeployR Administration Console. Learn More! For information on how to manage user accounts as well as how to use roles as a means to assign access privileges to a user or to restrict access to individual R scripts, refer to the Revolution R Enterprise DeployR Administration Console Guide. When you integrate with an external enterprise security solution, you want access privileges to be inherited from the external system. This is achieved with simple mappings in the DeployR configuration properties, which link external groups to internal roles.

8 4 Chapter 2: Authentication and Authorization Siteminder Single Sign-On (Pre-Authentication) By default, the Siteminder security provider is disabled. To enable Siteminder support you must update the relevant properties in your DeployR external configuration file. Configuring a Siteminder Policy Server is outside the scope of this document, we assume yours is already up and running and you understand what header fields your policy server is using. / Siteminder Single Sign-On (Pre-Authentication) Policy Properties / deployr.security.siteminder.preauth.enabled = false // deployr.security.preauth.username.header // Identify Siteminder username header, defaults to HTTP_SM_USER as used by Siteminder Tomcat 7 Agent. deployr.security.preauth.username.header = 'HTTP_SM_USER' // deployr.security.preauth.group.header // Identify Siteminder groups header. deployr.security.preauth.group.header = 'SM_USER_GROUP' // deployr.security.preauth.group.separator // Identify Siteminder groups delimiter header. deployr.security.preauth.group.separator = '^' // deployr.security.preauth.groups.map // Allows you to map Siteminder group names to DeployR role names: deployr.security.preauth.groups.map = [ 'SM_GROUP_A' : 'ROLE_BASIC_USER', 'SM_GROUP_B' : 'ROLE_POWER_USER' ] // deployr.security.preauth.default.role // Optional, grant default DeployR Role to all Siteminder authenticated users: deployr.security.preauth.default.role = 'ROLE_BASIC_USER'

9 Revolution R Enterprise DeployR Enterprise Security Guide 5 LDAP Authentication By default, the LDAP security provider is disabled. To enable LDAP authentication support, you must update the relevant properties in your DeployR external configuration file. The values you assign to these properties should match the configuration of your LDAP Directory Information Tree (DIT). Note: The LDAP and Active Directory security providers are, in fact, one and the same, and only their configuration properties differ. As such, you may enable the LDAP provider or the Active Directory provider but not both at the same time. / DeployR LDAP Authentication Configuration Properties / grails.plugins.springsecurity.ldap.context.managerdn = 'dc=example,dc=com' grails.plugins.springsecurity.ldap.context.managerpassword = 'secret' grails.plugins.springsecurity.ldap.context.server = 'ldap://localhost:10389/' grails.plugins.springsecurity.ldap.context.anonymousreadonly = true grails.plugins.springsecurity.ldap.search.base = 'ou=people,dc=example,dc=com' grails.plugins.springsecurity.ldap.search.searchsubtree = true grails.plugins.springsecurity.ldap.authorities.retrievegrouproles = true grails.plugins.springsecurity.ldap.authorities.groupsearchbase = 'ou=people,dc=example,dc=com' grails.plugins.springsecurity.ldap.authorities.defaultrole = "ROLE_BASIC_USER" grails.plugins.springsecurity.ldap.authorities.groupsearchfilter = 'member={0}' // Optionally, specify LDAP password encryption algorithm: MD5, SHA-256 // grails.plugins.springsecurity.password.algorithm = 'xxx' // deployr.security.ldap.user.properties.map // Allows you to map between LDAP user property names to DeployR user property names: deployr.security.ldap.user.properties.map = ['displayname':'cn', ' ':'mail'] // deployr.security.ldap.roles.map // Allows you to map between LDAP group names to DeployR role names: deployr.security.ldap.roles.map = ['ROLE_BASIC_USER':'ROLE_BASIC_USER', 'ROLE_SOME_LDAP_ROLE':'ROLE_POWER_USER'] Note: For a complete list of LDAP configuration properties, refer to the Appendix: LDAP & Active Directory Properties in this guide.

10 6 Chapter 2: Authentication and Authorization Active Directory Authentication By default, the Active Directory security provider is disabled. To enable Active Directory authentication support you must update the relevant properties in your DeployR external configuration file. The values you assign to these properties should match the configuration of your Active Directory Directory Information Tree (DIT). Note: The LDAP and Active Directory security providers are, in fact, one and the same, and only their configuration properties differ. As such, you may enable the LDAP provider or the Active Directory provider but not both at the same time. / DeployR Active Directory Configuration Properties / grails.plugins.springsecurity.ldap.context.managerdn = 'dc=example,dc=com' grails.plugins.springsecurity.ldap.context.managerpassword = 'secret' grails.plugins.springsecurity.ldap.context.server = 'ldap://locahost:10389/' grails.plugins.springsecurity.ldap.authorities.ignorepartialresultexception = true grails.plugins.springsecurity.ldap.search.base = 'ou=people,dc=example,dc=com' grails.plugins.springsecurity.ldap.search.searchsubtree = true grails.plugins.springsecurity.ldap.search.attributestoreturn = ['mail', 'displayname'] grails.plugins.springsecurity.ldap.search.filter="samaccountname={0}" grails.plugins.springsecurity.ldap.auth.hideusernotfoundexceptions = false grails.plugins.springsecurity.ldap.authorities.retrievegrouproles = true grails.plugins.springsecurity.ldap.authorities.groupsearchfilter = 'member={0}' grails.plugins.springsecurity.ldap.authorities.groupsearchbase = 'ou=group,dc=example,dc=com' // Optionally, specify LDAP password encryption algorithm: MD5, SHA-256 // grails.plugins.springsecurity.password.algorithm = 'xxx' // deployr.security.ldap.user.properties.map // Allows you to map between LDAP user property names to DeployR user property names: deployr.security.ldap.user.properties.map = ['displayname':'cn', ' ':'mail'] // deployr.security.ldap.roles.map // Allows you to map between LDAP group names to DeployR role names: deployr.security.ldap.roles.map = ['ROLE_BASIC_USER':'ROLE_BASIC_USER', 'ROLE_SOME_LDAP_ROLE':'ROLE_POWER_USER'] Note: For a complete list of LDAP configuration properties, refer to the Appendix: LDAP & Active Directory Properties in this guide.

11 Revolution R Enterprise DeployR Enterprise Security Guide 7 PAM Authentication By default, the PAM security provider is disabled. To enable PAM authentication support, you must update the relevant properties in your DeployR external configuration file. PAM is the Linux Pluggable Authentication Modules provided to support dynamic authorization for applications and services in a Linux system. If DeployR is installed on a Linux system, then the PAM security provider allows users to authenticate with DeployR using their existing Linux system username and password. / DeployR PAM Authentication Policy Properties / deployr.security.pam.authentication.enabled = false // deployr.security.pam.groups.map // Allows you to map between PAM User group names to DeployR role names: deployr.security.pam.groups.map = [ 'PAM_GROUP_A' : 'ROLE_BASIC_USER', 'PAM_GROUP_B' : 'ROLE_POWER_USER' ] // deployr.security.pam.default.role // Optional, grant default DeployR Role to all PAM authenticated users: deployr.security.pam.default.role = 'ROLE_BASIC_USER' Basic Authentication By default, the Basic Authentication security provider is enabled. The Basic Authentication provider is always enabled and there are no additional security configuration properties for this provider. / DeployR Basic Authentication Policy Properties /

12 8 Chapter 2: Authentication and Authorization

13 Revolution R Enterprise DeployR Enterprise Security Guide Server Access Controls 3 9 Working with HTTPS The Secure Sockets Layer (SSL) is a commonly-used protocol for managing the security of message transmissions on the Internet. By default, SSL on DeployR is disabled. To enable SSL support, follow the step-by-step instructions in the Configuring SSL for Tomcat section of the DeployR installation guide for your OS. Once your DeployR deployment has SSL enabled client applications can make API calls that connect over HTTPS. Also note that the following external configuration properties can be used to ensure all connections to the DeployR Administration Console are secured using HTTPS. / DeployR Administration Console Encryption (HTTPS) Configuration. Enable the following properties to enforce encryption on all Administration Console connections. / grails.plugins.springsecurity.auth.forcehttps = false grails.plugins.springsecurity.portmapper.httpport=7100 grails.plugins.springsecurity.portmapper.httpsport=7101 Mandatory HTTPS While the section Working with HTTPS details how you can enable SSL on the DeployR server so that client applications can make API calls that connect over HTTPS, providing this facility is not always enough. Sometimes you want to make it mandatory for client applications to connect over HTTPS. Using the Server Policies tab in the DeployR Administration Console, you can find a mechanism to enforce this policy at runtime. The Operation Policies for authenticated, asynchronous, and anonymous operations each support an HTTPS encrypted property. If you enable this property, then any non-https connections to the server will be automatically rejected.

14 10 Chapter 3: Server Access Controls Working with IP Address Filters While access to DeployR is typically controlled by the authentication mechanisms discussed in this document, DeployR also supports access controls based on IP address filters. Under the Server Policies tab in the DeployR Administration Console, you have a mechanism to configure your IP address filter policy. The Operation Policies for authenticated, asynchronous, and anonymous operations each support an IP filter property. If you assign an IP filter to this property, then any attempt by a client application to connect from outside of the IP address range on that filter will be automatically rejected. For example, you can make your DeployR server instance accessible only from IP addresses on the local LAN or VPN, such as xxx or 10.xxx.xxx.xxx. Note that it is possible to achieve these same kinds of access controls with an appropriate configuration on your firewall and/or routers. Refer to the chapters Managing Access with IP Filters and Managing Server Policies in the Revolution R Enterprise DeployR Administration Console Guide for further details. Working with XDR (CORS) By default, support for CORS is disabled. To enable CORS support, you must update the relevant properties in your DeployR external configuration file. Once enabled, CORS support in the DeployR server permits cross-site HTTP requests, which are requests for resources from a domain other than where the DeployR is hosted. Optionally, you can specify a value for Access-Control-Allow-Origin on the cors.headers property if you want to restrict cross-site HTTP requests to only those requests coming from a specific domain. / DeployR CORS Policy Configuration cors.headers = [ 'Access-Control-Allow-Origin': ' / cors.enabled = false

15 11 Revolution R Enterprise DeployR Enterprise Security Guide Project and Repository File 3 Access Controls DeployR enforces a consistent security model across projects and repository-managed files. This model is based on two simple precepts: ownership and access levels. Project Access Controls When a project is created, it is privately owned by default, meaning it is visible only to its owner. Such user-based privacy is a central aspect of the DeployR security model. The owner of a temporary or persistent project has, by default, full read-write access to that project and use of the full set of project-related APIs. Revolution R Enterprise DeployR 7.0 introduced a new type of secure, temporary project called a blackbox project. Blackbox projects restrict access to the underlying R session. In this case, the project owner can use only a small subset of the project-related APIs, collectively known as the Blackbox API Controls. If the owner of a project wants to grant read-only access to that project to other authenticated users, then the owner can set the access level for the project to Shared. You can change the access level on a project using the /r/project/about/update API call. Note: Anonymous users are not permitted access to projects. For more information, refer to the section Introducing Projects on the API in the DeployR API Reference Guide.

16 12 Chapter 3: Project and Repository File Access Controls Repository File Access Controls When a repository-managed file is created, it is privately owned by default, meaning it is visible only to its owner. Such user-based privacy is a central aspect of the DeployR security model. The owner of a repository-managed file has full read-write access to that file and use of the full set of repository-related APIs. If the owner of a repository-managed file wants to grant read-only access to that file to other users, then the owner can set the file s access level to one of the following values: Private - the default access level, the file is visible to its author(s) only. Restricted - the file is visible to authenticated users that have been granted one or more of the roles indicated on the restricted property of the file. Shared - the file is visible to all authenticated users when the shared property is true. Public - the file is visible to all authenticated and all anonymous users when the published property is true. You can change the access level on a repository-managed file using the /r/repository/file/update API call. For more information, refer to the section Introducing the Repository on the API in the DeployR API Reference Guide. Repository File Download Controls The repository file download controls provide fine-grain control over who can download repository file data. It is important to tailor the configuration of these controls in your DeployR external configuration file in order to enforce your preferred download policy for repositorymanaged files.

17 13 Revolution R Enterprise DeployR Enterprise Security Guide / DeployR Repository File Download Controls The repository file download controls provide fine grain control over user access to repository file data returned on the following API call: /r/repository/file/download The default repository file download policy is shown for each of the supported repository file access levels: [Private, Restricted, Shared, Public] - Files with private access can be downloaded by authors only. - Files with restriced access can be downloaded by authors and by authenticated users with sufficient privileges. - Files with shared access can be downloaded by authors and by authenticated users. - Files with public access can be downloaded by authors and by authenticated users. - Regardless of access level, by default anonymous users can not download repository files. Enable file.author.only.download to ensure only authors can download a repository-managed file. When this property is enabled the file.anonymous.download option is ignored. Enable file.anonymous.download to allow anonymous users to download files with public access. Note: The repository file download controls apply to all repository-managed files excluding R scripts. / deployr.security.repository.file.author.only.download=false deployr.security.repository.file.anonymous.download=false Repository Scripts Access Controls Repository-managed R scripts can be exposed as an executable on the API. Since repositorymanaged R scripts are a type of repository-managed files, all information in the previous section, Repository File Access Controls, also applies to repository-managed scripts. However, repository-managed R scripts deserve special mention since scripts can be managed through the Administration Console interface. Additionally, when you work with the R scripts in the Administration Console, you will likely also use and work with roles so as to impose restricted access to your R scripts. Learn More! For information on how to use roles as a means to restrict access to individual R scripts, refer to the Revolution R Enterprise DeployR Administration Console Guide.

18 14 Chapter 3: Project and Repository File Access Controls Repository Script Download Controls The repository script download controls provide fine-grain control over who can download repository script data. It is important to tailor the configuration of these controls in your DeployR external configuration file in order to enforce your preferred download policy for repositorymanaged scripts. / DeployR Repository Script Download Controls The repository script download controls apply to repository-managed scripts [.R/r] and markdown files [.Rmd/rmd] only. The repository script download controls provide fine grain control over user access to repository script data returned on the following API call: /r/repository/file/download Note: Script download controls do not intefere with permissions to execute a script. Execution permissions are entirely determined by the file access level assigned to the script by it's author. The default repository script download policy is shown for each of the supported repository script access levels: [Private, Restricted, Shared, Public] - Scripts with private access can be downloaded by authors only. - Scripts with restriced access can be downloaded by authors and by authenticated users with sufficient privileges. - Scripts with shared access can be downloaded by authors and by authenticated users. - Scripts with public access can be downloaded by authors and by authenticated users. - Regardless of access level, by default anonymous users can not download repository scripts. Enable script.author.only.download to ensure only authors can download a repository-managed script. When this property is enabled the script.anonymous.download option is ignored. Enable script.anonymous.download to allow anonymous users to download scripts with public access. Enabled script.list.authenticate to prevent anonymous users from calling the /r/repository/script/list API. / deployr.security.repository.script.author.only.download=false deployr.security.repository.script.anonymous.download=false deployr.security.repository.script.list.authenticate=false

19 15 Revolution R Enterprise DeployR Enterprise Security Guide Appendix: LDAP & Active Directory Properties The following table presents the complete list of LDAP and Active Directory properties. To use one of these configuration properties in the deployr.groovy external configuration file, you must prefix the property name with grails.plugins.springsecurity. For example, to use the ldap.context.server='ldap://localhost:389' property in deploy.groovy, you must write the property as such: grails.plugins.springsecurity.ldap.context.server='ldap://localhost:389' Table 1: Configruation Properties for LDAP and Active Directory. Property Default Value Description Context Properties ldap.context.server 'ldap://localhost:389' Address of the LDAP server. ldap.context.managerdn 'cn=admin,dc=example,dc=com' DN to authenticate with. ldap.context.managerpassword secret' Manager password to authenticate with. ldap.context.baseenvironmentproperties none Extra context properties. ldap.context.cacheenvironmentproperties true Whether environment properties should be cached between requests. ldap.context.anonymousreadonly false Whether an anonymous environment should be used for read-only operations. ldap.context.referral null ('ignore') The method to handle referrals. Can be 'ignore' or 'follow' to enable referrals to be automatically followed.

20 16 Appendix: LDAP & Active Directory Properties Search Properties ldap.search.base 'ou=users,dc=example,dc=com' Context name to search in, relative to the base of the configured ContextSource, e.g. 'ou=users,dc=example,dc=com'. ldap.search.searchsubtree true If true then searches the entire subtree as identified by context, if false (the default) then only searches the level identified by the context. ldap.search.filter '(uid={0})' The filter expression used in the user search. ldap.search.dereflink false Enables/disables link dereferencing during the search. ldap.search.timelimit 0 (unlimited) The time to wait before the search fails. ldap.search.attributestoreturn null (all) The attributes to return as part of the search. ldap.authenticator.dnpatterns null (none) Optional pattern(s) used to create DN search patterns, e.g. ["cn={0},ou=people"]. ldap.authenticator.attributestoreturn null (all) Names of attribute ids to return; use null to return all and an empty list to return none. Authorities Properties ldap.authorities.retrievegrouproles true Whether to infer roles based on group membership. ldap.authorities.retrievedatabaseroles false Whether to retrieve additional roles from the database using the User/Role many-to-many. ldap.authorities.grouproleattribute 'cn' The ID of the attribute which contains the role name for a group. ldap.authorities.groupsearchfilter 'uniquemember={0}' The pattern to be used for the user search. {0} is the user's DN. ldap.authorities.searchsubtree true If true a subtree scope search will be performed, otherwise a single-level search is used. ldap.authorities.groupsearchbase 'ou=groups,dc=example,dc=com' The base DN from which the search for group membership should be performed.

21 17 Revolution R Enterprise DeployR Enterprise Security Guide ldap.authorities.ignorepartialresultexception false Whether PartialResultExceptions should be ignored in searches, typically used with Active Directory since AD servers often have a problem with referrals. ldap.authorities.defaultrole none An optional default role to be assigned to all users. ldap.mapper.roleattributes null Optional names of role attributes. ldap.mapper.converttouppercase true Whether to uppercase retrieved role names (will also be prefixed with "ROLE_")

Revolution R Enterprise DeployR 7.1 Installation Guide for Windows

Revolution R Enterprise DeployR 7.1 Installation Guide for Windows Revolution R Enterprise DeployR 7.1 Installation Guide for Windows The correct bibliographic citation for this manual is as follows: Revolution Analytics, Inc. 2014. Revolution R Enterprise DeployR Installation

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Using DeployR to Solve the R Integration Problem

Using DeployR to Solve the R Integration Problem DEPLOYR WHITE PAPER Using DeployR to olve the R Integration Problem By the Revolution Analytics DeployR Team March 2015 Introduction Organizations use analytics to empower decision making, often in real

More information

CMDBuild Authentication (file auth.conf)

CMDBuild Authentication (file auth.conf) CMDBuild Authentication (file auth.conf) 1 Indice Introduction...3 1. Authentication type selection...3 auth.methods...3 serviceusers...3 force.ws.password.digest...3 2. Header authentication configuration...3

More information

Xerox DocuShare Security Features. Security White Paper

Xerox DocuShare Security Features. Security White Paper Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a

More information

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies

Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright

More information

Setting up LDAP settings for LiveCycle Workflow Business Activity Monitor

Setting up LDAP settings for LiveCycle Workflow Business Activity Monitor Adobe Enterprise & Developer Support Knowledge Article ID: c4715 bc Setting up LDAP settings for LiveCycle Workflow Business Activity Monitor In addition to manually creating users and user permissions,

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Xerox DocuShare Private Cloud Service. Security White Paper

Xerox DocuShare Private Cloud Service. Security White Paper Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard

More information

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory

More information

Adeptia Suite LDAP Integration Guide

Adeptia Suite LDAP Integration Guide Adeptia Suite LDAP Integration Guide Version 6.2 Release Date February 24, 2015 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 DOCUMENT INFORMATION Adeptia

More information

Enabling Single-Sign-On on WebSphere Portal in IBM Cognos ReportNet

Enabling Single-Sign-On on WebSphere Portal in IBM Cognos ReportNet Guideline Enabling Single-Sign-On on WebSphere Portal in IBM Cognos ReportNet Product(s): IBM Cognos ReportNet Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).

More information

Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal

Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal Guideline Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal Product(s): IBM Cognos 8 BI Area of Interest: Security Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Configuring Single Sign-on for WebVPN

Configuring Single Sign-on for WebVPN CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using

More information

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference

Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise

More information

Sophos Mobile Control Super administrator guide. Product version: 3

Sophos Mobile Control Super administrator guide. Product version: 3 Sophos Mobile Control Super administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...3 2 Super administrator accounts...4 3 The super administrator customer...5

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Configuration Worksheets for Oracle WebCenter Ensemble 10.3

Configuration Worksheets for Oracle WebCenter Ensemble 10.3 Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the

More information

Enabling SSO between Cognos 8 and WebSphere Portal

Enabling SSO between Cognos 8 and WebSphere Portal Guideline Enabling SSO between Cognos 8 and WebSphere Portal Product(s): Cognos 8 Area of Interest: Security Enabling SSO between Cognos 8 and WebSphere Portal 2 Copyright Your use of this document is

More information

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of

More information

Configuring and Using the TMM with LDAP / Active Directory

Configuring and Using the TMM with LDAP / Active Directory Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring

More information

LDAP Authentication and Authorization

LDAP Authentication and Authorization LDAP Authentication and Authorization What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned to centralized

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

CA Spectrum and CA Embedded Entitlements Manager

CA Spectrum and CA Embedded Entitlements Manager CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically

More information

HP Device Manager 4.7

HP Device Manager 4.7 Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...

More information

Security IIS Service Lesson 6

Security IIS Service Lesson 6 Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and

More information

Enterprise Knowledge Platform

Enterprise Knowledge Platform Enterprise Knowledge Platform Single Sign-On Integration with Windows Document Information Document ID: EN136 Document title: EKP Single Sign-On Integration with Windows Version: 1.3 Document date: 19

More information

IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide

IBM Endpoint Manager Version 9.2. Patch Management for SUSE Linux Enterprise User's Guide IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide IBM Endpoint Manager Version 9.2 Patch Management for SUSE Linux Enterprise User's Guide Note Before using this

More information

White Paper BMC Remedy Action Request System Security

White Paper BMC Remedy Action Request System Security White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information

More information

Password Management Guide

Password Management Guide www.novell.com/documentation Management Guide Identity Manager 4.0.2 June 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Using LDAP Authentication in an Informatica Domain

Using LDAP Authentication in an Informatica Domain Using LDAP Authentication in an Informatica Domain Copyright Informatica LLC 2016. Informatica LLC. Informatica, the Informatica logo, Informatica Big Data Management, and Informatica PowerCenter are trademarks

More information

Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal

Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal Guideline Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal Product(s): IBM Cognos ReportNet Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).

More information

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER

Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication

More information

ProxySG TechBrief LDAP Authentication with the ProxySG

ProxySG TechBrief LDAP Authentication with the ProxySG ProxySG TechBrief LDAP Authentication with the ProxySG What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned

More information

Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01

Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01 Oracle Enterprise Single Sign-on Provisioning Gateway Administrator Guide Release 10.1.4.1.0 E12613-01 March 2009 Oracle Enterprise Single Sign-on Provisioning Gateway, Administrator Guide, Release 10.1.4.1.0

More information

Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online

Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online 062212 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any

More information

TIBCO Spotfire Platform IT Brief

TIBCO Spotfire Platform IT Brief Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

LISTSERV LDAP Documentation

LISTSERV LDAP Documentation LISTSERV LDAP Documentation L Soft Sweden AB 2007 28 November 2007 Overview LISTSERV version 15.5 can interface to LDAP servers to authenticate user logins, to insert LDAP attributes in mail merge distributions

More information

CA Technologies SiteMinder

CA Technologies SiteMinder CA Technologies SiteMinder Agent for Microsoft SharePoint r12.0 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to

More information

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5

DEPLOYMENT GUIDE Version 1.1. Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 DEPLOYMENT GUIDE Version 1.1 Deploying the BIG-IP LTM v10 with Citrix Presentation Server 4.5 Table of Contents Table of Contents Deploying the BIG-IP system v10 with Citrix Presentation Server Prerequisites

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property

More information

Secure Messaging Server Console... 2

Secure Messaging Server Console... 2 Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating

More information

Polycom RealPresence Resource Manager System Getting Started Guide

Polycom RealPresence Resource Manager System Getting Started Guide [Type the document title] Polycom RealPresence Resource Manager System Getting Started Guide 8.0 August 2013 3725-72102-001B Polycom Document Title 1 Trademark Information POLYCOM and the names and marks

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE) INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';

More information

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

Fedora Directory Server FUDCon III London, 2005

Fedora Directory Server FUDCon III London, 2005 Jon Fautley Fedora Directory Server FUDCon III London, 2005 Overview of LDAP What Is LDAP? Lightweight Directory Access Protocol Widely supported, standard protocol, up to version

More information

Perceptive Content Security

Perceptive Content Security Perceptive Content Security Best Practices Perceptive Content, Version: 7.1.x Written by: Product Knowledge, R&D Date: June 2015 2015 Perceptive Software. All rights reserved. Perceptive Software is a

More information

Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal

Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal Guideline Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal Product: IBM Cognos 8 BI Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).

More information

WhatsUpGold. v14.2. Getting Started with WhatsUp Gold MSP Edition

WhatsUpGold. v14.2. Getting Started with WhatsUp Gold MSP Edition WhatsUpGold v14.2 Getting Started with WhatsUp Gold MSP Edition Getting Started with MSP Edition In This Guide About WhatsUp Gold MSP Edition... 1 User interfaces... 2 About the MSP Edition reporting capabilities...

More information

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note

BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory

Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory May 21, 2014 This edition of this document applies to Piston OpenStack 3.0. To send us your comments about this document, e-mail documentation@pistoncloud.com.

More information

Perceptive Experience Single Sign-On Solutions

Perceptive Experience Single Sign-On Solutions Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Google Apps Deployment Guide

Google Apps Deployment Guide CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate

More information

Shipping Services Files (SSF) Secure File Transmission Account Setup

Shipping Services Files (SSF) Secure File Transmission Account Setup Company This template is provided to document all of the materials and information needed for configuring secure file transmission for Shipping Services Files. Version 1.3 Page 1 of 5 1. Enter Date Submitted:

More information

DIGIPASS Authentication for Check Point Security Gateways

DIGIPASS Authentication for Check Point Security Gateways DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and

More information

CA Unified Infrastructure Management Server

CA Unified Infrastructure Management Server CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for

More information

Accops HyWorks v2.5. Quick Start Guide. Last Update: 4/18/2016

Accops HyWorks v2.5. Quick Start Guide. Last Update: 4/18/2016 Accops HyWorks v2.5 Quick Start Guide Last Update: 4/18/2016 2016 Propalms Technologies Pvt. Ltd. All rights reserved. The information contained in this document represents the current view of Propalms

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5

Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Oracle Directory Services Integration with Database Enterprise User Security O R A C L E W H I T E P A P E R F E B R U A R Y 2 0 1 5 Disclaimer The following is intended to outline our general product

More information

Securing SAS Web Applications with SiteMinder

Securing SAS Web Applications with SiteMinder Configuration Guide Securing SAS Web Applications with SiteMinder Audience Two application servers that SAS Web applications can run on are IBM WebSphere Application Server and Oracle WebLogic Server.

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

Leostream Corporation leostream.com help@leostream.com Share this Whitepaper!

Leostream Corporation leostream.com help@leostream.com Share this Whitepaper! Introduction... 3 Advantages of Providing Remote Access to Personal PC... 4 Disadvantages of Typical Remote Access Solutions in a Corporate Environment... 5 Why Use Leostream for Remote Access... 5 Using

More information

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities

Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust

More information

P R O V I S I O N I N G O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E M E N T

P R O V I S I O N I N G O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E M E N T O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E M E N T, F U S I O N E D I T I O N R E L E A S E 1 1. 1. 1.x P R O V I S I O N I N G O R A C L E H Y P E R I O N F I N A N C I A L M A N A G E

More information

CA SiteMinder. Directory Configuration - OpenLDAP. r6.0 SP6

CA SiteMinder. Directory Configuration - OpenLDAP. r6.0 SP6 CA SiteMinder Directory Configuration - OpenLDAP r6.0 SP6 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Tableau Server Security. Version 8.0

Tableau Server Security. Version 8.0 Version 8.0 Author: Marc Rueter Senior Director, Strategic Solutions, Tableau Software June 2013 p2 Today s enterprise class systems need to provide robust security in order to meet the varied and dynamic

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 5 Release 4 System i Security Digital Certificate Manager Version 5 Release 4 Note Before using this information and the product it supports, be sure

More information

Configuring IBM Cognos Controller 8 to use Single Sign- On

Configuring IBM Cognos Controller 8 to use Single Sign- On Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright

More information

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory

More information

Assistant Enterprise. User Guide. www.lumosnetworks.com 3-27-08

Assistant Enterprise. User Guide. www.lumosnetworks.com 3-27-08 Assistant Enterprise User Guide www.lumosnetworks.com 3-27-08 Assistant Enterprise (Toolbar) Guide Copyright Notice Trademarks Copyright 2007 BroadSoft, Inc. All rights reserved. Any technical documentation

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

NetIQ Identity Manager

NetIQ Identity Manager NetIQ Identity Manager Management Guide October 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A

More information

enterprise^ IBM WebSphere Application Server v7.0 Security "publishing Secure your WebSphere applications with Java EE and JAAS security standards

enterprise^ IBM WebSphere Application Server v7.0 Security publishing Secure your WebSphere applications with Java EE and JAAS security standards IBM WebSphere Application Server v7.0 Security Secure your WebSphere applications with Java EE and JAAS security standards Omar Siliceo "publishing enterprise^ birmingham - mumbai Preface 1 Chapter 1:

More information

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide

IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices

More information

Security Provider Integration RADIUS Server

Security Provider Integration RADIUS Server Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

Enterprise Security with mobilecho

Enterprise Security with mobilecho Enterprise Security with mobilecho Enterprise Security from the Ground Up When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come

More information

Novell Identity Manager

Novell Identity Manager Password Management Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 3.6.1 June 05, 2009 www.novell.com Identity Manager 3.6.1 Password Management Guide Legal Notices Novell, Inc. makes no representations

More information

Centrify Cloud Connector Deployment Guide

Centrify Cloud Connector Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as

More information

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO

DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO DESlock+ Basic Setup Guide ENTERPRISE SERVER ESSENTIAL/STANDARD/PRO Contents Overview...1 System requirements...1 Enterprise Server:...1 Client PCs:...1 Section 1: Before installing...1 Section 2: Download

More information

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication

More information

SAS 9.4 Management Console

SAS 9.4 Management Console SAS 9.4 Management Console Guide to Users and Permissions SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2015. SAS 9.4 Management Console: Guide to

More information

An Oracle White Paper September 2013. Directory Services Integration with Database Enterprise User Security

An Oracle White Paper September 2013. Directory Services Integration with Database Enterprise User Security An Oracle White Paper September 2013 Directory Services Integration with Database Enterprise User Security Disclaimer The following is intended to outline our general product direction. It is intended

More information

Active Directory LDAP Quota and Admin account authentication and management

Active Directory LDAP Quota and Admin account authentication and management Active Directory LDAP Quota and Admin account authentication and management Version 4.1 Updated July 2014 GoPrint Systems 2014 GoPrint Systems, Inc, All rights reserved. One Annabel Lane, Suite 105 San

More information

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5

bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 bbc Overview Adobe Flash Media Rights Management Server September 2008 Version 1.5 2008 Adobe Systems Incorporated. All rights reserved. Adobe Flash Media Rights Management Server 1.5 Overview for Microsoft

More information

Administration Quick Start

Administration Quick Start www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

Group Management Server User Guide

Group Management Server User Guide Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring

More information

Enterprise Toolbar User s Guide. Revised March 2015

Enterprise Toolbar User s Guide. Revised March 2015 Revised March 2015 Copyright Notice Trademarks Copyright 2007 DSCI, LLC All rights reserved. Any technical documentation that is made available by DSCI, LLC is proprietary and confidential and is considered

More information

FileMaker Server 14. FileMaker Server Help

FileMaker Server 14. FileMaker Server Help FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks

More information

Managing Identities and Admin Access

Managing Identities and Admin Access CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.

More information

HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE

HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means

More information

Coveo Platform 7.0. Microsoft Active Directory Connector Guide

Coveo Platform 7.0. Microsoft Active Directory Connector Guide Coveo Platform 7.0 Microsoft Active Directory Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds

More information

DreamFactory Security Whitepaper Customer Information about Privacy and Security

DreamFactory Security Whitepaper Customer Information about Privacy and Security DreamFactory Security Whitepaper Customer Information about Privacy and Security DreamFactory Software publishes rich applications for salesforce.com. All of our products for salesforce use the DreamFactory

More information