Proxy User Security Mechanism (Virtual Users)
|
|
- Elinor Miller
- 7 years ago
- Views:
Transcription
1 Prxy User Security Mechanism (Virtual Users) June 28, 2012 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL Tel: (954) , Fax: (954) Supprt:
2 Attunity Prxy User Security Guide 2012 Attunity Ltd. All rights reserved. The infrmatin in this manual has been cmpiled with care, but Attunity Ltd. makes n warranties as t its accuracy r cmpleteness. The sftware described herein may be changed r enhanced frm time t time. This infrmatin des nt cnstitute a cmmitment r representatin by Attunity and is subject t change withut ntice. The sftware described in this dcument is furnished under license and may be used and/r cpied nly in accrdance with the terms f this license and the End User License Agreement. N part f this manual may be reprduced r transmitted, in any frm, by any means (electrnic, phtcpying, recrding r therwise) withut the express written cnsent f Attunity Ltd. Windws, Windws XP and Windws Vista are trademarks f Micrsft Crpratin in the US and/r ther cuntries. UNIX is a registered trademark f Bell Labratries licensed t X/OPEN. Any ther prduct r cmpany names referred t in this dcument may be the trademarks f their respective wners. Please direct crrespndence r inquiries t: RepliWeb, Inc Lyns Rad Ccnut Creek, Flrida USA Telephne: (954) Fax: (954) Sales & General Infrmatin: Dcumentatin: Technical Supprt: Website: inf@repliweb.cm dcs@repliweb.cm ii
3 Attunity Prxy User Security Guide Table f Cntents Intrductin Security Rules... 2 Security Rules Parsing Users and Rules Management... 4 Defining Users... 5 Updating the Submit Cmmand... 7 Managing Rules Examples User Cnfiguratins Mapping All Users t One User Rules Cnfiguratins Allwing Cnnectin frm the Web UI Only Allwing SSL-nly cnnectins: Allwing Backup & Restre in SSL mde: iii
4 Attunity Prxy User Security Guide Intrductin The RepliWeb User Accunt Prxy is a layer within the RepliWeb R-1 and RDS platfrms that acts as bth an incming security reference mnitr and as a User prxy. Nte: The samples prvided in this dc are applicable t R-1 and RDS, using the respective cnsle and cmmand lines. A system administratr can cntrl R-1 and RDS peratins n any system cmpnent (Cntrller, Satellite, Center, Edge) thrugh the Prxy Security Mechanism. Whenever a request fr an R-1 and RDS peratin is received, it activates a security check, which cmpares the details f the requested peratin against a rule base. Based n the administratr-defined rules recrded in this file, the peratin is apprved r refused. The Prxy Security Mechanism plays tw majr rles: It is an administrative tl, allwing administratrs t cntrl hw users use R-1 and RDS and its related prgrams. It is a security tl, allwing administratrs t cntrl all incming R-1 and RDS requests frm utside. The Prxy Security Mechanism serves here as a data transfer firewall, allwing remte users access withut expsing any system accunt and passwrd infrmatin. T understand hw the Prxy Security Mechanism carries ut these functins, it is useful t knw hw it perfrms the security check. Fr each requested peratin, a number f parameters are examined during a security check. These include the requester's nde, user name and netwrk address, the lcal user name and passwrd given fr the peratin, the type f peratin r cmmand, the affected files and directries, the time f day, and any special cdes r identifying signs used in the peratin. Any f these prperties can be used as criteria t determine if a given rule shuld apply t the peratin. A matching rule can instruct the checking applicatin t refuse r apprve the requested peratin. The rules can als tell the applicatin t mdify the peratin's prperties, such as changing the lcal user accunt the peratin is carried under. Once a particular requested sessin has been apprved, the actin taken is t frk the child prcess that handles the request under the specified lcal user cntext defined in the security file. This is the Virtual User functinality. 1
5 Attunity Prxy User Security Guide 1. Security Rules The Prxy Security Mechanism perates n the principal f Active Security: instead f passively relying n the system's built-in security measures, it actively takes any infrmatin it has n the requested peratin and decides if it shuld be refused, apprved r mdified, based n any relevant rules defined in ne r mre security files. Because f this, security is nt based n what the remte user knws abut a system (like ftp r rcp passive security), but n what the administratr actively allws t be dne n the system thrugh the security rule base. This means that sensitive system infrmatin such as user accunt names r passwrds dn t have t be given t remte users r passed ver the netwrk. The administratr decides exactly wh is allwed t cnnect frm where, what authenticatin prcess they must pass, and what exactly they will r will nt be allwed t d. Active Security can be used t limit access based n remte user's name, remte nde's name, netwrk address, and ther identifiers. Cmplete sub-netwrks and user grups can be identified and restricted in a single rule. The administratr can define Rules t divert remte users t specific lcal accunts, regardless f infrmatin they might pssess. By default, the security file in the R-1 and RDS evaluatin kits allws all users with real username and passwrds t have full access and cntrl. Belw is a brief descriptin f each part f the rule fllwed by a shrt example f a secure set-up. Nte: The Security File ~rds/cnfig/rw_security.cf must have restricted permissins set n it (600 n UNIX and Administratr nly n Windws) therwise an errr wuld be returned cnnectin. 2
6 Attunity Prxy User Security Guide Security Rules Security Rules Parsing Rules cmprise 3 majr parts: WHO is the User - this part includes infrmatin t match the user trying t access the server. This includes the requester's nde, user name and netwrk address, the lcal user name and passwrd given fr the peratin, the type f peratin r cmmand, the files and directries affected, the time f day, etc. WHAT is the Rule this part specifies if the rule accepts r denies the user. Is this the LAST Rule As part f the rule definitin, it is specified if t keep lking fr ther rules that match this user, r t stp the rule parsing and act upn this rule s specificatin. This is applied nly if the user matches the requesting user s specificatin. The security rule based is parsed in the fllwing way: 1. The rules are parsed in an ascending rder. 2. The user is cmpared against the first rule s specificatins. 3. If the rule applies t this user: a. The user is granted r denied access accrding t the rule s specificatin. b. If this rule is marked stp the user s access is granted r denied accrding t that rule. Otherwise, parsing f the rules cntinues t the next rule. 4. If the rule des nt apply t this user, cntinue t the next rule. Nte: The Rule base is parsed such that later rules will verwrite and take precedence ver earlier nes. 3
7 Attunity Prxy User Security Guide 2. Users and Rules Management The Cnsle GUI - Manage ptin and the RepliWeb Tplgy Manager - RTM enable yu t define virtual users and the rules t cnvert them t real users. It can be used n Windws systems nly. Fr RDS - T use a virtual user between the Cntrller and a Satellite, yu shuld cnnect t the Satellite. If yu want t use a virtual user between yur Cnsle and Cntrller, cnnect t the Cntrller. Fr R-1 - T use a virtual user between the Center and an Edge, yu shuld cnnect t the Edge. If yu want t use a virtual user between yur Cnsle and Center, cnnect t the Center. The virtual user and the rules are defined n the machine accepting the cnnectin. This way, the machine initiating the cnnectin knws nly virtual infrmatin and nly virtual infrmatin is sent n the netwrk. Real infrmatin never leaves the machine accepting the cnnectin. 4
8 Attunity Prxy User Security Guide Users and Rules Management Defining Users The Virtual Users tab enables yu t define virtual users t cnvert them t real users. These users may be used fr cnnectin between the Cnsle and Center. Virtual users are defined n the machine accepting the cnnectin. This way, the machine initiating the cnnectin knws nly virtual infrmatin and nly virtual infrmatin is sent n the netwrk. Real infrmatin never leaves the machine accepting the cnnectin. Figure 1: Define Virtual Users 1. Click the leftmst buttn t add a new user. 2. Add the virtual user and virtual passwrd. Leave the dmain field blank. 5
9 Attunity Prxy User Security Guide Users and Rules Management Nte: There is n virtual dmain. If yu put smething there it will lk fr that user in a real dmain. 3. Select the Virtual radi buttn and click OK. 4. Nw add anther user, this time the real user that the virtual user is translated t. Check the Real radi buttn and fill a real Dmain: 5. Click the Save buttn. 6
10 Attunity Prxy User Security Guide Users and Rules Management Updating the Submit Cmmand Assuming that yu have defined virtual users n an R-1 Edge r RDS Satellite, yu can g back t yur submit cmmand n the Cnsle, and change the user/passwrd cmbinatin fr the remte cnnectin: Instead f: > r1 submit -user=real-user passwrd=xxx dmain=cmpdmain yu can nw specify: > r1 submit -user=vuser passwrd=vpass ( n dmain) 7
11 Attunity Prxy User Security Guide Users and Rules Management Managing Rules The Security Rules tab enables yu t define rules that apply t real and virtual users. These rules apply fr cnnecting frm the Cnsle t the Center. Security rules are defined n the machine accepting the cnnectin, as this is where access t real and virtual users is granted r denied. Here yu define the cnnectin between the virtual user and the real user. Figure 2: Security Rules Tab 8
12 Attunity Prxy User Security Guide Users and Rules Management T define a new security rule: 1. Click the leftmst buttn New Rule t add a new rule. Enable Rule Specify if this rule is enabled r nt. If this ptin is nt selected the rule is nt taken int accunt while evaluating a user. Descriptin Fill in a descriptin f that rule. This field has n effect n the rule s functinality. Incming User - specify the user name perfrming the cnnectin. This user name will be translated t a real user n the target machine. Specify if the incming user is Virtual r nt. If the incming user is a virtual user, yu may define a virtual dmain as well. The dmain will be then used in the actual cnnectin cmmand. Nte: In UNIX, yu can nly define virtual users. N need t define real users t be used in the Rules Tab. In Windws, in rder t map a virtual user t a real user, the real user must be defined in the User Definitin tab as well. In a Cnsle Center / Hst cnnectin, the incming user is the ne used in the Cnsle Cnnectin screen. In a Center Edge cnnectin, the incming user is the ne used in the jb definitin. SSL - Specify if SSL is cnsidered during the cnnectin: With SSL - The cnnectin must be with SSL 9
13 Attunity Prxy User Security Guide Users and Rules Management Withut SSL - The cnnectin must be withut SSL. Actin - specify if the rule is psitive apprve the user t cnnect (Accept), r negative deny access t that user (Reject). Transfrm T - specify the real target user the Incming User is translated t. If applicable, specify Dmain. Nte: If the virtual user was defined with a dmain (a virtual ne), yu shuld als specify that dmain name here. This is a basic rule. As we defined nly ne user, all yu have t d is click OK t say that the user vuser, will be examined as a virtual user and translated t the real user james frm the dmain cmp_dmain. Stp Search D nt check that user using ther rules. If the incming user matches that rule, accept r deny accrding t that rule. Advanced Rules may be further enhanced t tighten security and limit accessibility t R-1/RDS machines. These features describe the perating system envirnment frm which the cnnectin request is cming frm. Requester Users - Wildcard and multiple values are supprted. In a Cnsle Cntrller / Center cnnectin, this is the ACTUAL ACCOUNT frm which the R-1/RDS cmmand came frm, i.e. Windws r UNIX accunt, nt the Cnsle lgin. In a Cntrller / Center Satellite / Edge cnnectin, this is the user used in the Cnsle lgin t the Cntrller / Center. Requester Dmains Wildcard and multiple values are supprted. 10
14 Attunity Prxy User Security Guide Users and Rules Management In a Cnsle Cntrller / Center cnnectin, this is the ACTUAL Windws dmain frm which the R-1/RDS cmmand came frm. In a Cntrller / Center Satellite / Edge cnnectin, this is the dmain f the user used in the Cnsle lgin t the Cntrller / Center. Requester Ndes The machine name frm which the request cmes frm. Wildcard and multiple values are supprted. In a Cnsle Cntrller / Center cnnectin, this is the netwrk name f the Cnsle machine. In a Cntrller / Center Satellite / Edge cnnectin, this is the netwrk name f the Cntrller / Center. Requester Subnets The subnet frm which the request cmes frm. Wildcard and multiple values are supprted *- fr example. In a Cnsle Cntrller / Center cnnectin, this is the subnet f the Cnsle machine. In a Cntrller / Center Satellite / Edge cnnectin, this is the subnet f the Cntrller / Center. Requester Netmasks The netmask frm which the request cmes frm. Wildcard and multiple values are supprted fr example. In a Cnsle Cntrller / Center cnnectin, this is the netmask f the Cnsle machine. In a Cntrller / Center Satellite / Edge cnnectin, this is the netmask f the Cntrller / Center. Requester Applicatins The applicatin name frm which the request cmes frm. Multiple values are supprted, and ALL can be selected meaning the request can cme frm any f the listed applicatins. This field can have the fllwing ptins: Cnsle (R-1 r RDS) Cmmand Line API Replicatin Jb Multicast Distributin Backup Restre Target Applicatins The target applicatin receiving the cnnectin request. This field can have the fllwing ptins: R-1 Center / RDS Cntrller R-1 Edge / RDS Satellite 11
15 Attunity Prxy User Security Guide Users and Rules Management In the screen-sht abve, nly users that their name begins with cmp, frm dmain cmp_dmain, and that are cnnecting frm machines whse IP address begins with are allwed t cnnect. Other users will nt pass that rule and their cnnectin request will be denied. 2. Click the Save buttn. 3. Defining a few rules, yu can determine the rder in which the rules are applied when a user tried t cnnect t the machine. T update the lcatin f a rule, right-click the rule, and in the flating menu select the Mve ptin. A windw will pen, enabling t mve the rule up and dwn between the existing rules. 12
16 Attunity Prxy User Security Guide 3. Examples This chapter prvides examples f mapping users and delegating applicatin access. User Cnfiguratins Mapping All Users t One User A Linux Team Manager wuld like t map all incming Web users t user web_accunt fr a specific Server. This can be achieved in tw ways: 1. Map all real users t the Web Accunt user web_accunt. This way all users cntinue t use their wn user name and passwrd, but prcesses n that server run as web_accunt. 2. Create a virtual accunt t be used by all users while cnnecting, and map it t the Web accunt user n the server. In the RTM cnsle, duble click the Edge t manage. Enter the username and passwrd in the prmpt. T edit the security cnfiguratin n Linux, cnnect as rt. 13
17 Attunity Prxy User Security Guide Example: Mapping All Users t One User Mapping all real users t the Web Accunt user web_accunt 1. If using Windws, the real user web_accunt has t be added in the User Definitin tab as a Real user. 2. Under the Rules tab, create a rule that maps all incming users t user web_accunt. All access t that server will be dne using real system users and passwrds, but all prcesses will be transfrmed t run under the user cntext f the web_accunt user. 3. Als, edit the first tw rules t reject access frm any user accunt. 14
18 Attunity Prxy User Security Guide Example: Mapping All Users t One User Mapping a Virtual user t the Web Accunt user web_accunt. 1. Under the User Definitin tab, create a new virtual user. 15
19 Attunity Prxy User Security Guide Example: Mapping All Users t One User 2. If using Windws, the real user web_accunt has t be added in the User Definitin tab as a Real user. 3. In the Rules tab, create a rule that maps the virtual repliweb user t user web_accunt. All access t that server will be dne using that virtual user, but all prcesses will be transfrmed t run under the cntext f the web_accunt user. 16
20 Attunity Prxy User Security Guide Example: Mapping All Users t One User 4. Als, edit the last tw rules t reject access frm any user accunt. 17
21 Attunity Prxy User Security Guide Example: Mapping All Users t One User Rules Cnfiguratins Allwing Cnnectin frm the Web UI Only The fllwing example shws hw t enable access t users cnnecting frm the Web UI while rejecting a cnnectin frm all ther interfaces. Nte: Make sure t disable any existing rules (by unchecking each rule s Enable Rule checkbx) befre perfrming this prcedure. Nte: The prcedure belw assumes that any existing rules have been disabled. 1. Click New Rule t add a new rule that rejects access frm all lcal users. a. In the Incming User area, select the Real ptin and enter an asterisk (*) in the User field. b. In the Actin area, select the Reject Cnnectin ptin. c. Click OK. 2. If yu are using a dmain envirnment, add anther rule that rejects dmain users. a. In the Incming User area, select the Real ptin and enter an asterisk (*) fr bth the User and Dmain fields. b. In the Actin area, select the Reject Cnnectin ptin. 18
22 Attunity Prxy User Security Guide Example: Mapping All Users t One User 3. Add anther rule that enables access t the Center fr users cnnecting frm a specific Web UI machine. Fr example, machine: WebServer. a. In the Incming User area, select the Real ptin and enter an asterisk (*) as the User. b. In the Actin area, make sure that the Accept Cnnectin ptin is selected. c. Click the Advanced buttn, the Advanced Rule Filters windw appears. d. In Requester Users, remve the default asterisk (*) and any existing users, and enable Web UI users by entering: IUSR_<MACHINE NAME> where <MACHINE NAME> is the machine running the IIS that yu are cnnecting t. Nte: The IUSR_ prefix is mandatry. Fr example, IUSR_WEBSERVER: 4. Click OK. 19
23 Attunity Prxy User Security Guide Example: Mapping All Users t One User The Security Rules tab shuld lk as fllws: Allwing SSL-nly cnnectins: This rule allws cnnectins in SSL mde nly while rejecting nn-ssl cnnectins. Nte: If Backup & Restre is needed, make sure the Allw backup and restre security rules are enabled and appear first in the Center Management s Security Rules list. Fr mre infrmatin n these rules, refer t the next example. T allw an SSL-nly cnnectin: 1. Click New Rule t add a new rule. 2. In the Descriptin field, enter a prper descriptin, such as Allw ssl cnnectin nly. 3. In the Incming User area, select the Real ptin and enter an asterisk (*) fr the User field. 4. Select the SSL checkbx and make sure With SSL is selected. 5. In the Actin area, select the Accept Cnnectin ptin. 6. Click OK. Allwing Backup & Restre in SSL mde: In envirnments that require an SSL cnnectin, the fllwing tw rules need t be created t enable Backup & Restre t run. 20
24 Attunity Prxy User Security Guide Example: Mapping All Users t One User Nte: Fr these rules t wrk prperly, make sure they are enabled and appear first in the Rules list. T allw Backup & Restre fr all real dmain users: 1. Click New Rule t add a new rule. 2. In the Descriptin field, enter a prper descriptin, such as Allw backup and restre access t dmain users. 3. In the Incming User area, select the Real ptin and enter an asterisk (*) fr bth the User and Dmain fields. 4. In the Actin area, select the Accept Cnnectin ptin. 5. Click the Advanced buttn, the Advanced Rule Filters windw appears. a. In Requester Applicatins, remve the all entry and add the fllwing tw entries: Backup and Restre, as fllws: b. Click OK. 6. Select the Stp searching fr additinal rules checkbx. 7. Click OK. T allw Backup & Restre fr all real lcal users: 1. Click New Rule t add a new rule. 2. In the Descriptin field, enter a relevant descriptin, such as Allw backup and restre access t lcal users. 3. In the Incming User area, select the Real ptin and enter an asterisk (*) fr the User field. 4. In the Actin area, select the Accept Cnnectin ptin. 5. Click the Advanced buttn, the Advanced Rule Filters windw appears. 21
25 Attunity Prxy User Security Guide Example: Mapping All Users t One User a. In Requester Applicatins, remve the all entry and add the fllwing tw entries: Backup and Restre, as fllws: b. Click OK. 6. Select the Stp searching fr additinal rules checkbx. 7. Click OK. Fr any additinal infrmatin, cntact us at supprt.repliweb.cm 22
ROSS RepliWeb Operations Suite for SharePoint. SSL User Guide
ROSS RepliWeb Operatins Suite fr SharePint SSL User Guide Sftware Versin 2.5 March 18, 2010 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm,
More informationMaaS360 Cloud Extender
MaaS360 Clud Extender Installatin Guide Cpyright 2012 Fiberlink Cmmunicatins Crpratin. All rights reserved. Infrmatin in this dcument is subject t change withut ntice. The sftware described in this dcument
More informationAttunity RepliWeb SSL Guide
Attunity RepliWeb SSL Guide Sftware Versin 5.2 June 25, 2012 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954) 337-6424 E-mail: inf@repliweb.cm, Supprt: http://supprt.repliweb.cm
More informationSTIOffice Integration Installation, FAQ and Troubleshooting
STIOffice Integratin Installatin, FAQ and Trubleshting Installatin Steps G t the wrkstatin/server n which yu have the STIDistrict Net applicatin installed. On the STI Supprt page at http://supprt.sti-k12.cm/,
More informationSBClient and Microsoft Windows Terminal Server (Including Citrix Server)
SBClient and Micrsft Windws Terminal Server (Including Citrix Server) Cntents 1. Intrductin 2. SBClient Cmpatibility Infrmatin 3. SBClient Terminal Server Installatin Instructins 4. Reslving Perfrmance
More informationRDS Directory Synchronization. SSL Guide
RDS Directry Synchrnizatin SSL Guide Sftware Versin 3.1.1 Fr Windws, Linux and UNIX perating systems August 4, 2009 RepliWeb, Inc., 6441 Lyns Rad, Ccnut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954)
More informationExercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008
Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,
More informationViPNet VPN in Cisco Environment. Supplement to ViPNet Documentation
ViPNet VPN in Cisc Envirnment Supplement t ViPNet Dcumentatin 1991 2015 Inftecs Americas. All rights reserved. Versin: 00121-04 90 02 ENU This dcument is included in the sftware distributin kit and is
More informationIntroduction LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE. 2015 Savision B.V. savision.com All rights reserved.
Rev 7.5.0 Intrductin 2 LIVE MAPS UNITY PORTAL / INSTALLATION GUIDE 2015 Savisin B.V. savisin.cm All rights reserved. This manual, as well as the sftware described in it, is furnished under license and
More informationTaskCentre v4.5 Send Message (SMTP) Tool White Paper
TaskCentre v4.5 Send Message (SMTP) Tl White Paper Dcument Number: PD500-03-17-1_0-WP Orbis Sftware Limited 2010 Table f Cntents COPYRIGHT 1 TRADEMARKS 1 INTRODUCTION 2 Overview 2 FEATURES 2 GLOBAL CONFIGURATION
More informationDeployment Overview (Installation):
Cntents Deplyment Overview (Installatin):... 2 Installing Minr Updates:... 2 Dwnlading the installatin and latest update files:... 2 Installing the sftware:... 3 Uninstalling the sftware:... 3 Lgging int
More informationISAM TO SQL MIGRATION IN SYSPRO
118 ISAM TO SQL MIGRATION IN SYSPRO This dcument is aimed at assisting yu in the migratin frm an ISAM data structure t an SQL database. This is nt a detailed technical dcument and assumes the reader has
More informationExercise 5 Server Configuration, Web and FTP Instructions and preparatory questions Administration of Computer Systems, Fall 2008
Exercise 5 Server Cnfiguratin, Web and FTP Instructins and preparatry questins Administratin f Cmputer Systems, Fall 2008 This dcument is available nline at: http://www.hh.se/te2003 Exercise 5 Server Cnfiguratin,
More informationRemote Desktop Tutorial. By: Virginia Ginny Morris
Remte Desktp Tutrial By: Virginia Ginny Mrris 2008 Remte Desktp Tutrial Virginia Ginny Mrris Page 2 Scpe: The fllwing manual shuld accmpany my Remte Desktp Tutrial vide psted n my website http://www.ginnymrris.cm
More informationInstant Chime for IBM Sametime Quick Start Guide
Instant Chime fr IBM Sametime Quick Start Guide Fall 2014 Cpyright 2014 Instant Technlgies. All rights reserved. Cpyright and Disclaimer This dcument, as well as the sftware described in it, is furnished
More informationRemote Setup and Configuration of the Outlook Email Program Information Technology Group
Remte Setup and Cnfiguratin f the Outlk Email Prgram Infrmatin Technlgy Grup The fllwing instructins will help guide yu in the prper set up f yur Outlk Email Accunt. Please nte that these instructins are
More informationTaskCentre v4.5 SMTP Tool White Paper
TaskCentre v4.5 SMTP Tl White Paper Dcument Number: PD500-03-04-1_0-WP Orbis Sftware Limited 2010 Table f Cntents COPYRIGHT... 1 TRADEMARKS... 1 INTRODUCTION... 2 Overview... 2 Features... 2 GLOBAL CONFIGURATION...
More informationClick Studios. Passwordstate. RSA SecurID Configuration
Passwrdstate RSA SecurID Cnfiguratin This dcument and the infrmatin cntrlled therein is the prperty f Click Studis. It must nt be reprduced in whle/part, r therwise disclsed, withut prir cnsent in writing
More informationScaleIO Security Configuration Guide
ScaleIO Security Cnfiguratin Guide 1 Intrductin This sectin prvides an verview f the settings available in ScaleIO t ensure secure peratin f the prduct: Security settings are divided int the fllwing categries:
More informationLab 12A Configuring Single Sign On Service
Lab 12A Cnfiguring Single Sign On Service Intrductin In this lab exercise we will see hw t cnfigure the Single Sign On Service and cnfigure Individual and Grup Enterprise Applicatin Definitins. The lab
More informationHelpdesk Support Tickets & Knowledgebase
Helpdesk Supprt Tickets & Knwledgebase User Guide Versin 1.0 Website: http://www.mag-extensin.cm Supprt: http://www.mag-extensin.cm/supprt Please read this user guide carefully, it will help yu eliminate
More informationHOWTO: How to configure SSL VPN tunnel gateway (office) to gateway
HOWTO: Hw t cnfigure SSL VPN tunnel gateway (ffice) t gateway Hw-t guides fr cnfiguring VPNs with GateDefender Integra Panda Security wants t ensure yu get the mst ut f GateDefender Integra. Fr this reasn,
More informationSITE APPLICATIONS USER GUIDE:
SITE APPLICATIONS USER GUIDE: CPCONTROLLER, CCENGINE, SYNC, TPORT, CCTERMINAL Cpyright 2013 Triple E Technlgies. All rights reserved. Site Applicatins User Guide INTRODUCTION The applicatins described
More informationTen Steps for an Easy Install of the eg Enterprise Suite
Ten Steps fr an Easy Install f the eg Enterprise Suite (Acquire, Evaluate, and be mre Efficient!) Step 1: Dwnlad the eg Sftware; verify hardware and perating system pre-requisites Step 2: Obtain a valid
More informationConfiguring and Monitoring AS400 Servers. eg Enterprise v5.6
Cnfiguring and Mnitring AS400 Servers eg Enterprise v5.6 Restricted Rights Legend The infrmatin cntained in this dcument is cnfidential and subject t change withut ntice. N part f this dcument may be reprduced
More informationCenterPoint Accounting for Agriculture Network (Domain) Installation Instructions
CenterPint Accunting fr Agriculture Netwrk (Dmain) Installatin Instructins Dcument # Prduct Mdule Categry 2257 CenterPint CenterPint Installatin This dcument describes the dmain netwrk installatin prcess
More informationConfiguring BMC AREA LDAP Using AD domain credentials for the BMC Windows User Tool
Cnfiguring BMC AREA LDAP Using AD dmain credentials fr the BMC Windws User Tl Versin 1.0 Cnfiguring the BMC AREA LDAP Plugin fr Dmain Username and Passwrds Intrductin...3 LDAP Basics...4 What is LDAP and
More informationBackupAssist SQL Add-on
WHITEPAPER BackupAssist Versin 6 www.backupassist.cm 2 Cntents 1. Requirements... 3 1.1 Remte SQL backup requirements:... 3 2. Intrductin... 4 3. SQL backups within BackupAssist... 5 3.1 Backing up system
More informationGETTING STARTED With the Control Panel Table of Contents
With the Cntrl Panel Table f Cntents Cntrl Panel Desktp... 2 Left Menu... 3 Infrmatin... 3 Plan Change... 3 Dmains... 3 Statistics... 4 Ttal Traffic... 4 Disk Quta... 4 Quick Access Desktp... 4 MAIN...
More informationWebalo Pro Appliance Setup
Webal Pr Appliance Setup 1. Dwnlad the Webal virtual appliance apprpriate fr yur virtualizatin infrastructure, using the link yu were emailed. The virtual appliance is delivered as a.zip file that is n
More informationFINRA Regulation Filing Application Batch Submissions
FINRA Regulatin Filing Applicatin Batch Submissins Cntents Descriptin... 2 Steps fr firms new t batch submissin... 2 Acquiring necessary FINRA accunts... 2 FTP Access t FINRA... 2 FTP Accunt n FINRA s
More informationTECHNICAL BULLETIN. Title: Remote Access Via Internet Date: 12/21/2011 Version: 1.1 Product: Hikvision DVR Action Required: Information Only
Title: Remte Access Via Internet Date: 12/21/2011 Versin: 1.1 Prduct: Hikvisin DVR Actin Required: Infrmatin Only The fllwing steps will guide yu thrugh the steps necessary t access yur Hikvisin DVR remtely
More informationPreparing to Deploy Reflection : A Guide for System Administrators. Version 14.1
Preparing t Deply Reflectin : A Guide fr System Administratrs Versin 14.1 Table f Cntents Table f Cntents... 2 Preparing t Deply Reflectin 14.1:... 3 A Guide fr System Administratrs... 3 Overview f the
More informationUninstalling and Reinstalling on a Server Computer. Medical Director / PracSoft
Uninstalling and Reinstalling n a Server Cmputer Medical Directr / PracSft This guide describes the prcess fr uninstalling and then reinstalling Medical Directr, PracSft, and/r SQL Instances n a cmputer
More informationHow To Install Fcus Service Management Software On A Pc Or Macbook
FOCUS Service Management Sftware Versin 8.4 fr Passprt Business Slutins Installatin Instructins Thank yu fr purchasing Fcus Service Management Sftware frm RTM Cmputer Slutins. This bklet f installatin
More informationClient Application Installation Guide
Remte Check Depsit Client Applicatin Installatin Guide Client Applicatin Installatin Guide Table f Cntents Minimum Client PC Requirements... 2 Install Prerequisites... 4 Establish a Trust t the Web Server...
More informationAvePoint High Speed Migration Supplementary Tools
AvePint High Speed Migratin Supplementary Tls User Guide Issued April 2016 1 Table f Cntents Intrductin... 3 MD5 Value Generatr Tl... 3 Azure Data Uplad Tl... 3 Dwnlading and Unpacking the Tl... 4 Using
More informationInstructions for Configuring a SAFARI Montage Managed Home Access Expansion Server
Instructins fr Cnfiguring a SAFARI Mntage Managed Hme Access Expansin Server ~ Please read these instructins in their entirety befre yu begin. ~ These instructins explain hw t add a SAFARI Mntage Managed
More informationTaskCentre v4.5 File Transfer (FTP) Tool White Paper
TaskCentre v4.5 File Transfer (FTP) Tl White Paper Dcument Number: PD500-03-22-1_0-WP Orbis Sftware Limited 2010 Table f Cntents COPYRIGHT 1 TRADEMARKS 1 INTRODUCTION 2 Overview 2 FEATURES 2 GLOBAL CONFIGURATION
More informationFOCUS Service Management Software Version 8.5 for Passport Business Solutions Installation Instructions
FOCUS Service Management Sftware fr Passprt Business Slutins Installatin Instructins Thank yu fr purchasing Fcus Service Management Sftware frm RTM Cmputer Slutins. This bklet f installatin instructins
More informationTaskCentre v4.5 MS SQL Server Trigger Tool White Paper
TaskCentre v4.5 MS SQL Server Trigger Tl White Paper Dcument Number: PD500-03-02-1_0-WP Orbis Sftware Limited 2010 Table f Cntents COPYRIGHT... 1 TRADEMARKS... 1 INTRODUCTION... 2 Overview... 2 Features...
More informationAdobe Sign. Enabling Single Sign-On with SAML Reference Guide
Enabling Single Sign-On with SAML Reference Guide 2016 Adbe Systems Incrprated. All Rights Reserved. Prducts mentined in this dcument, such as the services f identity prviders Micrsft Active Directry Federatin,
More informationInstallation Guide Marshal Reporting Console
INSTALLATION GUIDE Marshal Reprting Cnsle Installatin Guide Marshal Reprting Cnsle March, 2009 Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 3 Sftware Prerequisites 3 Installatin
More informationHow To Install An Orin Failver Engine On A Network With A Network Card (Orin) On A 2Gigbook (Orion) On An Ipad (Orina) Orin (Ornet) Ornet (Orn
SlarWinds Technical Reference Preparing an Orin Failver Engine Installatin Intrductin t the Orin Failver Engine... 1 General... 1 Netwrk Architecture Optins and... 3 Server Architecture Optins and... 4
More informationImplementing SQL Manage Quick Guide
Implementing SQL Manage Quick Guide The purpse f this dcument is t guide yu thrugh the quick prcess f implementing SQL Manage n SQL Server databases. SQL Manage is a ttal management slutin fr Micrsft SQL
More informationUsing PayPal Website Payments Pro UK with ProductCart
Using PayPal Website Payments Pr UK with PrductCart Overview... 2 Abut PayPal Website Payments Pr & Express Checkut... 2 What is Website Payments Pr?... 2 Website Payments Pr and Website Payments Standard...
More informationServ-U Distributed Architecture Guide
Serv-U Distributed Architecture Guide Hrizntal Scaling and Applicatin Tiering fr High Availability, Security, and Perfrmance Serv-U Distributed Architecture Guide v14.0.1.0 Page 1 f 16 Intrductin Serv-U
More informationUser Guide. Sysgem SysMan Remote Control. By Sysgem AG
Sysgem SysMan Remte Cntrl User Guide By Sysgem AG Sysgem is a registered trademark f Sysgem AG. Other brands and prducts are registered trademarks f their respective hlders. 2012 Sysgem AG, Lavaterstrasse
More informationLearn More Cloud Extender Requirements Cheat Sheet
MaaS360.cm > Learn Mre Learn Mre Clud Extender Requirements Cheat Sheet OVERVIEW This dcument defines all requirements t ensure a successfully installatin f the Clud Extender t enable use f ActiveSync
More informationCallRex 4.2 Installation Guide
CallRex 4.2 Installatin Guide This dcument describes hw t install CallRex 4.2. It cvers the fllwing: CallRex 4.2 Cmpnents. Server Prerequisites. Perfrming the Installatin. Changing the Accunt Used by CallRex
More informationClick Studios. Passwordstate. SafeNet Two-Factor Configuration
Passwrdstate SafeNet Tw-Factr Cnfiguratin This dcument and the infrmatin cntrlled therein is the prperty f Click Studis. It must nt be reprduced in whle/part, r therwise disclsed, withut prir cnsent in
More informationFOCUS Service Management Software Version 8.5 for CounterPoint Installation Instructions
FOCUS Service Management Sftware Versin 8.5 fr CunterPint Installatin Instructins Thank yu fr purchasing Fcus Service Management Sftware frm RTM Cmputer Slutins. This bklet f installatin instructins will
More informationThis guide is intended for administrators, who want to install, configure, and manage SAP Lumira, server for BI Platform
Hw T install SAP Lumira, server n SAP BusinessObjects BI platfrm Distributed Install Applies t: SAP Lumira, server versin fr the SAP BusinessObjects BI platfrm Summary This guide is intended fr administratrs,
More informationEmail Setup PPD IT How-to Guides June 2010
Email Setup Cntents Email Infrmatin... 2 IMAP and POP3 settings... 2 Cnfiguring Micrsft Outlk 2007... 2 Archiving mail... 3 Cnfiguring AutArchive in Micrsft Outlk 2007... 3 Access frm ff site... 4 Cnfiguring
More informationProvisioning Services Architecture Overview. User Account Context / Service Account Context
This article prvides a descriptin abut hw the Prvisining Services cmpnents interact with each ther and hw they shuld be cnfigured t grant adequate permissins. Prvisining Services Architecture Overview
More informationefusion Table of Contents
efusin Cst Centers, Partner Funding, VAT/GST and ERP Link Table f Cntents Cst Centers... 2 Admin Setup... 2 Cst Center Step in Create Prgram... 2 Allcatin Types... 3 Assciate Payments with Cst Centers...
More informationTitle: How Do You Handle Exchange Mailboxes for Employees Who Are No Longer With the Company
Dean Suzuki Blg Title: Hw D Yu Handle Exchange Mailbxes fr Emplyees Wh Are N Lnger With the Cmpany Created: 1/21/2013 Descriptin: I asked by ne f my custmers, hw d yu handle mailbxes fr emplyees wh are
More informationImproved Data Center Power Consumption and Streamlining Management in Windows Server 2008 R2 with SP1
Imprved Data Center Pwer Cnsumptin and Streamlining Management in Windws Server 2008 R2 with SP1 Disclaimer The infrmatin cntained in this dcument represents the current view f Micrsft Crpratin n the issues
More informationX7500 Series, X4500 Scanner Series MFPs: LDAP Address Book and Authentication Configuration and Basic Troubleshooting Tips
X7500 Series, X4500 Scanner Series MFPs: LDAP Address Bk and Authenticatin Cnfiguratin and Basic Trubleshting Tips Lexmark Internatinal 1 Prerequisite Infrm atin In rder t cnfigure a Lexmark MFP fr LDAP
More informationIntroduction to Mindjet MindManager Server
Intrductin t Mindjet MindManager Server Mindjet Crpratin Tll Free: 877-Mindjet 1160 Battery Street East San Francisc CA 94111 USA Phne: 415-229-4200 Fax: 415-229-4201 mindjet.cm 2013 Mindjet. All Rights
More informationMcAfee Enterprise Security Manager. Data Source Configuration Guide. Infoblox NIOS. Data Source: September 2, 2014. Infoblox NIOS Page 1 of 8
McAfee Enterprise Security Manager Data Surce Cnfiguratin Guide Data Surce: Infblx NIOS September 2, 2014 Infblx NIOS Page 1 f 8 Imprtant Nte: The infrmatin cntained in this dcument is cnfidential and
More informationNETWRIX CHANGE NOTIFIER
NETWRIX CHANGE NOTIFIER FOR ACTIVE DIRECTORY, EXCHANGE AND GROUP POLICY QUICK-START GUIDE Prduct versin: 7.5.873 February 2014 February 2014. Legal Ntice The infrmatin in this publicatin is furnished fr
More informationConfiguring and Integrating LDAP
Cnfiguring and Integrating LDAP The Basics f LDAP 3 LDAP Key Terms and Cmpnents 3 Basic LDAP Syntax 4 The LDAP User Experience Mnitr 6 This dcument includes infrmatin abut LDAP and its rle with SlarWinds
More informationInstallation Guide Marshal Reporting Console
Installatin Guide Installatin Guide Marshal Reprting Cnsle Cntents Intrductin 2 Supprted Installatin Types 2 Hardware Prerequisites 2 Sftware Prerequisites 3 Installatin Prcedures 3 Appendix: Enabling
More informationRecommended Backup Plan for SQL 2000 Server Database Servers
Recmmended Backup Plan fr SQL 2000 Server Database Servers (DAISI) General Ntes STI recmmends that data backup be perfrmed n a regular basis. Transactin Lg Backup Users shuld nt truncate the Transactin
More informationSteps to fix the product is not properly fixed issue for international clients.
Axxya Systems supprt cntact details 1-800-709-2977 ext 9 within US 1-425-999-4350 ext 9 utside f US Email supprt@axxya.cm Technical FAQ -- www.nutritinistpr.cm/help-center/ Steps t fix the prduct is nt
More informationDurango Merchant Services QuickBooks SyncPay
Durang Merchant Services QuickBks SyncPay Gateway Plug-In Dcumentatin April 2011 Durang-Direct.cm 866-415-2636-1 - QuickBks Gateway Plug-In Dcumentatin... - 3 - Installatin... - 3 - Initial Setup... -
More informationRegions File Transmission
Regins File Transmissin Getting Started with FTPS Regins Bank Member FDIC Revised 022113 It s time t expect mre. Table f Cntents Getting Started with FTPS Setting Up FTPS Cnnectin in FTP Client 3 4 9 Regins
More informationUSF Remote Desktop Gateway
USF Remte Desktp Gateway Fr Hme Cmputers and Laptps Running Windws XP The Remte Desktp Gateway (RDG) allws access t yur USF campus cmputer frm remte lcatins while adding an additinal layer f security t
More informationConnecting to Email: Live@edu
Cnnecting t Email: Live@edu Minimum Requirements fr Yur Cmputer We strngly recmmend yu upgrade t Office 2010 (Service Pack 1) befre the upgrade. This versin is knwn t prvide a better service and t eliminate
More informationConfiguring SSL and TLS Decryption in ngeniusone
Cnfiguring SSL and TLS Decryptin in ngeniusone The cnfigure SSL Decryptin feature supprts real-time capture f ASI and ASR traffic flws as well as decding f Secure Scket Link (SSL) and Transprt Layer Security
More informationICD-10 Handbook APPLICATION MANUAL
APPLICATION MANUAL Table f Cntents Definitin...3 Billing...3 Transactin Cdes...3 Diagnsis Cdes...3 PQRS Measures (frmerly PQRI Measures)...5 Parameters...5 System Wide Defaults...5 System...5 Patient Definitin...6
More informationConfiguring and Monitoring SysLog Servers
Cnfiguring and Mnitring SysLg Servers eg Enterprise v5.6 Restricted Rights Legend The infrmatin cntained in this dcument is cnfidential and subject t change withut ntice. N part f this dcument may be reprduced
More informationMobile Device Manager Admin Guide. Reports and Alerts
Mbile Device Manager Admin Guide Reprts and Alerts September, 2013 MDM Admin Guide Reprts and Alerts i Cntents Reprts and Alerts... 1 Reprts... 1 Alerts... 3 Viewing Alerts... 5 Keep in Mind...... 5 Overview
More informationReadme File. Purpose. Introduction to Data Integration Management. Oracle s Hyperion Data Integration Management Release 9.2.
Oracle s Hyperin Data Integratin Management Release 9.2.1 Readme Readme File This file cntains the fllwing sectins: Purpse... 1 Intrductin t Data Integratin Management... 1 Data Integratin Management Adapters...
More informationBlue Link Solutions Terminal Server Configuration How to Install Blue Link Solutions in a Terminal Server Environment
Blue Link Slutins Terminal Server Cnfiguratin Hw t Install Blue Link Slutins in a Terminal Server Envirnment Prepared by: Darren Myher April 9, 2002 Table f Cntents Backgrund... 2 Applicatin Server mde
More informationSMART Active Directory Migrator 9.0.2. Requirements
SMART Active Directry Migratr 9.0.2 January 2016 Table f Cntents... 3 SMART Active Directry Migratr Basic Installatin... 3 Wrkstatin and Member Server System... 5 Netwrking... 5 SSL Certificate... 6 Service
More informationE-Biz Web Hosting Control Panel
1 f 38 E-Biz Web Hsting Cntrl Panel This dcument has been created t give yu a useful insight in t the Hsting Cntrl Panel available with E-Biz hsting services. Please nte: Optins available are dependent
More informationCopyrights and Trademarks
Cpyrights and Trademarks Sage One Accunting Cnversin Manual 1 Cpyrights and Trademarks Cpyrights and Trademarks Cpyrights and Trademarks Cpyright 2002-2014 by Us. We hereby acknwledge the cpyrights and
More informationAvePoint Office Connect 1.31
AvePint Office Cnnect 1.31 User Guide Issued May 2016 1 Table f Cntents What s New in this Guide... 4 Abut Office Cnnect... 5 Understanding the Office Cnnect Explrer... 6 Sharing Files with Others (Quick
More informationService Desk Self Service Overview
Tday s Date: 08/28/2008 Effective Date: 09/01/2008 Systems Invlved: Audience: Tpics in this Jb Aid: Backgrund: Service Desk Service Desk Self Service Overview All Service Desk Self Service Overview Service
More informationAvePoint CallAssist 3.2.5 for Microsoft Dynamics CRM. User Guide
AvePint CallAssist 3.2.5 fr Micrsft Dynamics CRM User Guide Revisin J Issued Nvember 2014 Table f Cntents Overview... 3 Signing in... 4 Using CallAssist... 5 Understanding the Menu Bar... 5 File Menu...
More informationOptimal Payments Extension. Supporting Documentation for the Extension Package. 20140225 v1.1
Optimal Payments Extensin Supprting Dcumentatin fr the Extensin Package 20140225 v1.1 Revisin Histry v1.1 Updated Demac Media branding v1.0 Initial Dcument fr Distributin supprt@ptimalpayments.cm Page
More informationBusiness Digital Voice Site Services - Phone & User Assignments
Feature Overview The Phnes and Users must be assigned befre setting up ther cmpnents f Business Digital Vice. The system is designed t allw custmers t quickly setup and mdify phne assignments in real time
More informationCreate a Non-Catalog Requisition
Create a Nn-Catalg Requisitin Jb Aid This jb aid describes hw t create a standard nn-catalg (i.e., nn-ibuynu) purchase request. REFER TO ADDITIONAL TRAINING GUIDES If yu need t create a special requisitin
More informationReadme File. Purpose. What is Translation Manager 9.3.1? Hyperion Translation Manager Release 9.3.1 Readme
Hyperin Translatin Manager Release 9.3.1 Readme Readme File This file cntains the fllwing sectins: Purpse... 1 What is Translatin Manager 9.3.1?... 1 Cmpatible Sftware... 2 Supprted Internatinal Operating
More informationSystem Business Continuity Classification
System Business Cntinuity Classificatin Business Cntinuity Prcedures Infrmatin System Cntingency Plan (ISCP) Business Impact Analysis (BIA) System Recvery Prcedures (SRP) Cre Infrastructure Criticality
More informationTaskCentre v4.5 File Management Tool White Paper
TaskCentre v4.5 File Management Tl White Paper Dcument Number: PD500-03-30-1_0-WP Orbis Sftware Limited 2010 Table f Cntents COPYRIGHT 1 TRADEMARKS 1 INTRODUCTION 2 Overview 2 FEATURES 2 TECHNICAL SUMMARY
More informationWatchDox for Windows User Guide
WatchDx fr Windws User Guide Versin 3.9.7 Cnfidentiality This dcument cntains cnfidential material that is prprietary WatchDx. The infrmatin and ideas herein may nt be disclsed t any unauthrized individuals
More informationJunos Pulse Instructions for Windows and Mac OS X
Juns Pulse Instructins fr Windws and Mac OS X When yu pen the Juns client fr the first time yu get the fllwing screen. This screen shws yu have n cnnectins. Create a new cnnectin by clicking n the + icn.
More informationPharmaserv GR 7.1.0 Release Notes. Product Name: Pharmaserv Release Version: GR 7.1.0
Prduct Name: Pharmaserv Release Versin: GR 7.1.0 0202114 Cpyright 2014 McKessn Crpratin and/r ne f its subsidiaries. All Rights Reserved. This dcumentatin is an unpublished wrk f McKessn Crpratin and/r
More informationTelelink 6. Installation Manual
Telelink 6 Installatin Manual Table f cntents 1. SYSTEM REQUIREMENTS... 3 1.1. Hardware Requirements... 3 1.2. Sftware Requirements... 3 1.2.1. Platfrm... 3 1.2.1.1. Supprted Operating Systems... 3 1.2.1.2.
More informationEmail Server Settings
Email Server Settings All email accunts we hst, regardless f the dmain name, will use the fllwing server settings. T use a secure cnnectin, use the settings marked "SSL." Incming Server Type: Server Name:
More informationINUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE
INUVIKA OPEN VIRTUAL DESKTOP ENTERPRISE MIGRATION GUIDE Mathieu Schires Versin 1.0 Published 06/03/2015 This dcument describes the preparatin and steps t fllw t upgrade an OVD farm frm Inuvika OVD 0.9.x
More informationPassword Reset for Remote Users
1 Passwrd Reset fr Remte Users Curin prvides a cmpnent fr the PasswrdCurier Passwrd Prvisining System that manages the lcal passwrd cache in cnjunctin with self-service passwrd reset activities. The slutin
More informationFirewall/Proxy Server Settings to Access Hosted Environment. For Access Control Method (also known as access lists and usually used on routers)
Firewall/Prxy Server Settings t Access Hsted Envirnment Client firewall settings in mst cases depend n whether the firewall slutin uses a Stateful Inspectin prcess r ne that is cmmnly referred t as an
More informationHarePoint HelpDesk for SharePoint. For SharePoint Server 2010, SharePoint Foundation 2010. User Guide
HarePint HelpDesk fr SharePint Fr SharePint Server 2010, SharePint Fundatin 2010 User Guide Prduct versin: 14.1.0 04/10/2013 2 Intrductin HarePint.Cm (This Page Intentinally Left Blank ) Table f Cntents
More informationPENNSYLVANIA SURPLUS LINES ASSOCIATION Electronic Filing System (EFS) Frequently Asked Questions and Answers
PENNSYLVANIA SURPLUS LINES ASSOCIATION Electrnic Filing System (EFS) Frequently Asked Questins and Answers 1 What changed in Release 2.0?...2 2 Why was my accunt disabled?...3 3 Hw d I inactivate an accunt?...4
More informationConnector for Microsoft Dynamics Installation Guide
Micrsft Dynamics Cnnectr fr Micrsft Dynamics Installatin Guide June 2014 Find updates t this dcumentatin at the fllwing lcatin: http://g.micrsft.cm/fwlink/?linkid=235139 Micrsft Dynamics is a line f integrated,
More informationVancouver Island University Job Posting System Instruction Manual
Vancuver Island University Jb Psting System Instructin Manual Have questins, cncerns, r need training? Cntact Human Resurces Recruitment Office at recruit@viu.ca r lcal 6239 Last updated: February 2013
More information