Integrate 'Oracle Forms', 'Oracle Reports', 'Oracle
|
|
- Marlene Gaines
- 8 years ago
- Views:
Transcription
1 Integrate 'Oracle Forms', 'Oracle Reports', 'Oracle Discoverer' with Oracle Single Sign On', 'Oracle Internet Directory' and 'Virtual Private Database' for the Luxembourg communities. How to make sure that a user can only use the products he is allowed to use and see only the data he is allowed to see using 1 username/password login.
2 Integrating it all at sigi Agenda Introduction VDS Computing Sigi Project Constraints Solution ORACLE-VDS Application structure overview Issues not covered with standard Oracle Example of a logon procedure Advantages of this solution
3 VDS Computing: History Since employees Turnover from million Euro International Focus VDS- Computing Luxembourg sàrl VDS- Computing UK Ltd. ISO 9001 certified
4 VDS Computing: Services Consulting Analysis Development Project Management Installation Training Support Outsourcing
5 VDS Computing: Products Software Financial and logistics Software on Oracle : Piton Business Intelligence Turn-key Development on Oracle Hardware Design Implementation Management
6 Presentation of SIGI
7 Project Constraints Centralised IT Infrastructure Secure network between Cities and the Datacenter Secure Data(Base) (account- and budget info) Intuitive and Open Applications Rich User Interface Cutting Edge Technology
8 Solution ORACLE-VDS Database ORACLE 9i Enterprise Edition (EE) Virtual Private Database Advanced Security Option (Enterprise Users) Application Server ORACLE 10g EE Single Sign On Oracle Internet Directory (LDAP) Thin Client: MS Internet Explorer Forms, Reports and Discoverer Services Oracle Portal XML-Interface RAD Development Tools Designer, Forms et Reports
9 Application Architecture Application Server IAS Database Data Filters by VPD Scheme: Read Scheme Upd. LDAP Directory Forms Reports Data PORTAL GESCOM Other Applications Discoverer Business Logic Authentification Read Access ASO
10 Application Architecture Oracle Portal Intra- or Internet website builder/publisher. No programming skills needed. Oracle Forms Build and run OLAP-applications Moved from character based via client/server Now 3-tier architecture
11 Application Architecture Oracle Reports Reporting tool. Run using a report server (with possibility to run in batch) Possibility to the result or retrieve it from a repository via the web. Oracle Discoverer Business Intelligence tool Design without DB-knowledge Design without extra programs using a java applet.
12 Application Architecture SSO : Single Sign On Authenticate once, then authenticate automatically for different products. OID : Oracle Internet Directory A standard (LDAP) way to hold security data. Virtual Private Database Limit user acces on record level. Allow a user only to see what he is allowed to see without extra programming.
13 Security issues NOT solved with standard Oracle Forms / reports menu Definition who can use which forms is maintained inside the application Definition who can run which report is maintained inside the application
14 Example of a Logon Procedure User : Marcel DUPONT of the city SEPTFONTAINES Log into portal Login : mdupont.septfontaines Password SSO : abcdefgh1 Result: User gets the portal pages he is allowed to see
15
16
17
18
19
20
21
22
23 Example of a Logon Procedure User clicks on the URL to start the forms application. Based on the SSO info, forms checks if the user is allowed to start the application The resource information is retrieved from the OID Resource information : Database logon information for forms.
24 Example of a Logon Procedure Resource: Login : mdupont.septfontaines Password : ##### (secret) Database : REC1 Forms application starts and logs onto the DB In the database mdupont.septfontaines is unkown as a schema user : ASO is activated.
25 Example of a Logon Procedure Advanced Security Option : The database asks the OID if the user mdupont.septfontaines is allowed to log into the DB with the password ##### The OID replies ok and map this user to the schema recdev The user is connected to the DB.
26 Example of a Logon Procedure The logon in the DB fires a logon trigger Using the ASO info (mdupont) the OID is interrogated to find his community (septfontaines). The context is set to activate the VPD. Virtual Private Database For Each select/insert/update/delete statement an additional where community= septfontaines is added
27 Example of a Logon Procedure The forms application is started User sees only info he is allowed to see User can start reports (also using ASO and VPD because the same logon-info is used) User can see the reports he has run with the results The user can only see his reports (Reports server is also SSO enabled.) The user can start a discoverer report
28 Example of a Logon Procedure Discoverer AS10G Rel2. Is started User logs into the database as the discoverer user SSO information is available during the DB logon Using the SSO info (mdupont) the OID is interrogated to find his community (septfontaines). The context is set to activate the VPD. The user can only interrogate info from his community.
29 Advantages of this solution Central standard security maintenance. Security is independent from development (developer doesn t have to think about security) Application security is maintained in the OID, not in Forms/reports. Data security is maintained in the DB using VPD Data security setup is done automatically
30 Advantages of this solution Integration with other front-ends with guaranteed security. MS office integration possible : ODBC connection to get info from the DB (with VPD active).net integration possible MS Active Directory integration possible
31 Le progiciel de GEStion COMmunale du Luxembourg
32 Historique du projet Situation de départ : 100 sites délocalisés Développement de GESCOM autour de la plate-forme propriétaire HP3000 Novembre 2001 : annonce par HP de l arrêt du HP3000 programmé au 31 décembre 2006 Nouveau projet GESCOM : 2002 : pilotes architecture et développement 2003 et 2004 : réécriture 2005 : finalisation et début de la migration
33 Organisation de GESCOM Une architecture applicative sécurisée Gestion des utilisateurs au travers un LDAP Sécurité d accès aux données confiée à la DB Applications avec un point d entrée unique Portail applicatif avec SSO Des solutions de Reporting performantes Déploiement facilité (Browser, Acrobat Reader)
34 Bilans Bilan technique Démarches imposées par les SSO et VPD Bénéfices immédiats grâce aux SSO et VPD Bilan utilisateurs SSO avec Modules intégrés Sécurité rassurante et transparente Bilan financier Charge importante pour la mise au point de l architecture Largement récupéré lors du développement et de la maintenance
35 Questions - Réponses
ESMA REGISTERS OJ/26/06/2012-PROC/2012/004. Questions/ Answers
ESMA REGISTERS OJ/26/06/2012-PROC/2012/004 Questions/ Answers Question n.10 (dated 18/07/2012) In the Annex VII Financial Proposal, an estimated budget of 1,500,000 Euro is mentioned for the total duration
More informationDIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
More informationCentralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan Paul.J.Sullivan@oracle.com Principal Security Consultant Kevin Moulton Kevin.moulton@oracle.com Senior Manager,
More informationSOFTWARE DEFINED SOLUTIONS JEUDI 19 NOVEMBRE 2015. Nicolas EHRMAN Sr Presales SDS
SOFTWARE DEFINED SOLUTIONS JEUDI 19 NOVEMBRE 2015 Nicolas EHRMAN Sr Presales SDS Transform your Datacenter to the next level with EMC SDS EMC SOFTWARE DEFINED STORAGE, A SUCCESS STORY 5 ÈME ÉDITEUR MONDIAL
More informationOracleAS Identity Management Solving Real World Problems
OracleAS Identity Management Solving Real World Problems Web applications are great... Inexpensive development Rapid deployment Access from anywhere BUT. but they can be an administrative and usability
More informationSEC 07 : L IAM : Comment accorder sécurité et productivité?
SEC 07 : L IAM : Comment accorder sécurité et productivité? Arnaud DELANDE IBM Security TSS Team Leader Arnaud.delande@fr.ibm.com 2 Multi-perimeter approach to security focuses on the data and where it
More informationDIGIPASS Authentication for GajShield GS Series
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
More informationSchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
More informationRAPPORT FINANCIER ANNUEL PORTANT SUR LES COMPTES 2014
RAPPORT FINANCIER ANNUEL PORTANT SUR LES COMPTES 2014 En application de la loi du Luxembourg du 11 janvier 2008 relative aux obligations de transparence sur les émetteurs de valeurs mobilières. CREDIT
More informationSingle Sign-On Access Management A Technical Framework on Access Management Systems
Single Sign-On Access Management A Technical Framework on Access Management Systems Polaris Software Lab Ltd., 766, Anna Salai, Chennai, INDIA 600 006 Single Sign-On Access Management Service This paper
More informationUSER MANUAL KNOWLEDGE CENTER - PORTAL
User manual for Knowledge Center (Portal for Distributors) Page 1 USER MANUAL FOR KNOWLEDGE CENTER - PORTAL FOR DISTRIBUTORS VERSION 3.1 PREPARED BY IVAN TAGILTSEV (IT CONSULTANT) GIVEN IMAGING LTD 02-02-12
More informationAccessing the Media General SSL VPN
Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your
More informationRemote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
More informationIl est repris ci-dessous sans aucune complétude - quelques éléments de cet article, dont il est fait des citations (texte entre guillemets).
Modélisation déclarative et sémantique, ontologies, assemblage et intégration de modèles, génération de code Declarative and semantic modelling, ontologies, model linking and integration, code generation
More informationKerberos and Windows SSO Guide Jahia EE v6.1
Documentation Kerberos and Windows SSO Guide Jahia EE v6.1 Jahia delivers the first Web Content Integration Software by combining Enterprise Web Content Management with Document and Portal Management features.
More informationDesktop Configurations For General Ledger and Financial Reports. User Guide
Desktop Configurations For General Ledger and Financial Reports User Guide Contents 2 Overview...1 Checking for Java Client on your Desktop...2 Installing Java Client...3 Web Application Desktop Integrator
More informationConfiguring Single Sign-on for WebVPN
CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using
More informationVERALAB LDAP Configuration Guide
VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to
More informationMagento Extension Point of Sales User Manual Version 1.0
Magento Extension Point of Sales Version 1.0 1. Overview... 2 2. Integration... 2 3. General Settings... 3 3.1 Point of sales Settings... 3 3.2 Magento Client Computer Settings... 3 4. POS settings...
More informationSSO Plugin. HP Service Request Catalog. J System Solutions. http://www.javasystemsolutions.com Version 3.6
SSO Plugin HP Service Request Catalog J System Solutions Version 3.6 Page 2 of 7 Introduction... 3 Adobe Flash and NTLM... 3 Enabling the identity federation service... 4 Federation key... 4 Token lifetime...
More informationThe Weakest Link : Securing large, complex, global Oracle ebusiness Suite solutions
The Weakest Link : Securing large, complex, global Oracle ebusiness Suite solutions Radomir Vranesevic Director and IT Architect Oracle Certified Master, CISSP Fusion Professionals 1 Agenda Introduction
More informationConfiguring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
More information2.3 - Installing the moveon management module - SQL version
2.3 - Installing the moveon management module - SQL version The moveon management module consists of two elements: the moveon client and the moveon database. The moveon client contains all the program
More informationMigrating a Discoverer System to Oracle Business Intelligence Enterprise Edition
Migrating a Discoverer System to Oracle Business Intelligence Enterprise Edition Milena Gerova President Bulgarian Oracle User Group mgerova@technologica.com Who am I Project Manager in TechnoLogica Ltd
More informationSecurity Assertion Markup Language (SAML) Site Manager Setup
Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and
More informationAuthentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
More informationJANVIER 2013 / CATALOGUE DES FORMATIONS
1 New Vision of Technology Société de Services et de Solutions en Électronique, Informatique et Télécoms Adresse géographique : Abidjan - Cocody Riviera Palmeraie Téléphone : 225 22 49 59 45 Fax : 225
More informationSecuring SAS Web Applications with SiteMinder
Configuration Guide Securing SAS Web Applications with SiteMinder Audience Two application servers that SAS Web applications can run on are IBM WebSphere Application Server and Oracle WebLogic Server.
More informationLytecube Technologies. EnCircle Automation. User Guide
Lytecube Technologies EnCircle Automation User Guide Lytecube Technologies 1/1/2009 Contents Installation... 3 Using Encircle... 3 Launching EnCircle as a desktop application... 3 Logon Screen... 3 EnCircle
More informationAdministrer les solutions Citrix XenApp et XenDesktop 7.6 CXD-203
Administrer les solutions Citrix XenApp XenDesktop 7.6 CXD-203 MIEL Centre Agréé : N 11 91 03 54 591 Pour contacter le service formation : 01 60 19 16 27 Pour consulter le planning des formations : www.miel.fr/formation
More informationUpgrade of Business Systems Data Warehouse Reporting
Upgrade of Business Systems Data Warehouse Reporting The Business Systems Data Warehouse Reporting System was upgraded to a new version of Business Objects the weekend of December 12 th. The current system
More informationLinShare project version 0.8 File sharing and vault application
LinShare project version 0.8 File sharing and vault application RMLL 2010 Slideshow LinShare project LinShare uses : File sharing - Big files support - Enterprise directory support - Group management -
More informationBusinessObjects Enterprise InfoView User's Guide
BusinessObjects Enterprise InfoView User's Guide BusinessObjects Enterprise XI 3.1 Copyright 2009 SAP BusinessObjects. All rights reserved. SAP BusinessObjects and its logos, BusinessObjects, Crystal Reports,
More informationConfiguring User Identification via Active Directory
Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be User Identification Overview User Identification allows you to create security policies based
More informationUsing Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
More informationIdentity Hub Service Desk Handbook. Document Ref: NSWG/MS/SG/v1.0 December, 2014. Version 1.0
Identity Hub Service Desk Handbook Document Ref: NSWG/MS/SG/v1.0 December, 2014 Version 1.0 Contents 1.0 INTRODUCTION 3 Who is Dataweave? 4 Who is the Dataweave Identity Hub service desk? 4 2.0 HOW DO
More informationWirelessOffice Administrator LDAP/Active Directory Support
Emergin, Inc. WirelessOffice Administrator LDAP/Active Directory Support Document Version 6.0R02 Product Version 6.0 DATE: 08-09-2004 Table of Contents Objective:... 3 Overview:... 4 User Interface Changes...
More informationThe following information is provided by ARX, Inc. to aid customers in their evaluation of CoSign for SharePoint (C4SP).
The following information is provided by ARX, Inc. to aid customers in their evaluation of CoSign for SharePoint (C4SP). Lay Boon Tay Sales Engineering Manager ARX, Inc. 855 Folsom Street Suite 939 San
More informationTenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
More informationADMINISTERING ADOBE LIVECYCLE MOSAIC 9.5
ADMINISTERING ADOBE LIVECYCLE MOSAIC 9.5 Legal notices Copyright 2011 Adobe Systems Incorporated and its licensors. All rights reserved. Administering Adobe LiveCycle Mosaic 9.5 March 31, 2011 This administering
More informationAdobe Connect LMS Integration for Blackboard Learn 9
Adobe Connect LMS Integration for Blackboard Learn 9 Install Guide Introduction The Adobe Connect LMS Integration for Blackboard Learn 9 gives Instructors, Teaching Assistants and Course Builders the ability
More informationenterprise^ IBM WebSphere Application Server v7.0 Security "publishing Secure your WebSphere applications with Java EE and JAAS security standards
IBM WebSphere Application Server v7.0 Security Secure your WebSphere applications with Java EE and JAAS security standards Omar Siliceo "publishing enterprise^ birmingham - mumbai Preface 1 Chapter 1:
More informationDeploying Oracle Business Intelligence Publisher in J2EE Application Servers Release 10.1.3.2.0
Oracle Business Intelligence Publisher Deploying Oracle Business Intelligence Publisher in J2EE Application Servers Release 10.1.3.2.0 Part No. B32481-01 December 2006 Introduction Oracle BI Publisher
More informationManage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory Overview August 2008 Introduction... 3 Centralizing DataBase Account Management using Existing Directories with OVD...
More informationStockage distribué sous Linux
Félix Simon Ludovic Gauthier IUT Nancy-Charlemagne - LP ASRALL Mars 2009 1 / 18 Introduction Répartition sur plusieurs machines Accessibilité depuis plusieurs clients Vu comme un seul et énorme espace
More informationSAP NetWeaver AS Java
Chapter 75 Configuring SAP NetWeaver AS Java SAP NetWeaver Application Server ("AS") Java (Stack) is one of the two installation options of SAP NetWeaver AS. The other option is the ABAP Stack, which is
More informationCrystal Reports Installation Guide
Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks
More informationOnDemand. Getting Started Guide
OnDemand Getting Started Guide Copyright Copyright 2009 ACS Technologies Group, Inc. All rights reserved. Reproduction of any part of this publication by mechanical or electronic means, including facsimile
More informationGuide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication This document serves as a How To reference guide for employees to execute the following MFA tasks: 1.
More informationL évolution des progiciels métier dans un contexte SOA
L évolution des progiciels métier dans un contexte SOA Ashish SHARMA Business Development Manager Oracle Fusion Middleware Agenda Quels scénarios pour conformer
More informationActive Directory Requirements and Setup
Active Directory Requirements and Setup The information contained in this document has been written for use by Soutron staff, clients, and prospective clients. Soutron reserves the right to change the
More informationEntrust Managed Services PKI Administrator s Quick Start Guide
Entrust Managed Services PKI Administrator s Quick Start Guide Each Managed Services PKI organization requires an administrator also known as a local registration authority (LRA) whose duty it is to manage
More informationAvatier Identity Management Suite
Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:
More informationInfoView User s Guide. BusinessObjects Enterprise XI Release 2
BusinessObjects Enterprise XI Release 2 InfoView User s Guide BusinessObjects Enterprise XI Release 2 Patents Trademarks Copyright Third-party contributors Business Objects owns the following U.S. patents,
More informationNuFirewall. Open-source authenticating firewall
NuFirewall Open-source authenticating firewall Who's that guy? Eric Leblond CTO EdenWall Technologies NuFW project leader Netfilter developper Regit Ulogd2 maintener http://home.regit.org/ @Regiteric on
More informationOnline Timesheets Guide for Contractors
Online Timesheets Guide for Contractors Table Of Contents 1. Welcome To Online Timesheets Page 2 2. Email Activation Page 2 3. Logging Onto The Online Timesheet Portal Page 2 4. Online Timesheet Portal
More informationStep-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x
Step-by-Step guide for SSO from MS Sharepoint 2010 to SAP EP 7.0x Sverview Trust between SharePoint 2010 and ADFS 2.0 Use article Federated Collaboration with Shibboleth 2.0 and SharePoint 2010 Technologies
More informationAn Oracle White Paper October 2009. Frequently Asked Questions for Oracle Forms 11g
An Oracle White Paper October 2009 Frequently Asked Questions for Oracle Forms 11g Disclaimer The following is intended to outline our general product direction. It is intended for information purposes
More informationInstallation Guide. Tech Excel January 2009
Installation Guide Tech Excel January 2009 Copyright 1998-2009 TechExcel, Inc. All Rights Reserved. TechExcel, Inc., TechExcel, ServiceWise, AssetWise, FormWise, KnowledgeWise, ProjectPlan, DownloadPlus,
More informationSession Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence. Greg Wcislo
Session Code*: 0310 Demystifying Authentication and SSO Options in Business Intelligence Greg Wcislo Introduction We will not go into detailed how-to, however links to multiple how-to whitepapers will
More informationUsing Microsoft Active Directory for Checkpoint NG AI SecureClient
Using Microsoft Active Directory for Checkpoint NG AI SecureClient Dave Crowfoot www.works4me.com dave@works4me.com This is the solution that I came up with to utilize MS Active directory to authenticate
More informationIntegrating OID/SSO with E- Business Suite and Third-Party SSO Solutions. Presented by Paul Jackson (Norman Leach)
Integrating OID/SSO with E- Business Suite and Third-Party SSO Solutions Presented by Paul Jackson (Norman Leach) Agenda Why SSO Install Options Log Locations EBS Cloning Considerations Disaster Recovery
More informationContents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...
Post Installation Guide for Primavera Contract Management 14.1 July 2014 Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...
More informationIntroduction. Connection security
SECURITY AND AUDITABILITY WITH SAGE ERP X3 Introduction An ERP contains usually a huge set of data concerning all the activities of a company or a group a company. As some of them are sensitive information
More informationLuminis to Banner Single Sign-On
SUNGARD SUMMIT 2007 sungardsummit.com 1 Luminis to Banner Single Sign-On Presented by: Rajesh Kumar Les von Holstein SunGard Higher Education Tuesday 8:30 AM March 20, 2007 A Community of Learning Session
More informationMigrating helpdesk to a new server
Migrating helpdesk to a new server Table of Contents 1. Helpdesk Migration... 2 Configure Virtual Web on IIS 6 Windows 2003 Server:... 2 Role Services required on IIS 7 Windows 2008 / 2012 Server:... 2
More informationAlcatel-Lucent Extended Communication Server Active directory synchronization : installation and administration
Alcatel-Lucent Extended Communication Server Active directory synchronization : installation and administration September, 2009 TC1312 Alcatel-Lucent Office Offer - All Rights Reserved Alcatel-Lucent 2009
More informationHELP DOCUMENTATION E-SSOM INSTALLATION GUIDE
HELP DOCUMENTATION E-SSOM INSTALLATION GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationIntegrating Webalo with LDAP or Active Directory
Integrating Webalo with LDAP or Active Directory Webalo can be integrated with an external directory to identify valid Webalo users and then authenticate them to the Webalo appliance. Integration with
More information1. How to Register... 2. 2. Forgot Password... 4. 3. Login to MailTrack Webmail... 5. 4. Accessing MailTrack message Centre... 6
MailTrack How To Document 27 March 2014 Table of Contents 1. How to Register... 2 2. Forgot Password... 4 3. Login to MailTrack Webmail... 5 4. Accessing MailTrack message Centre... 6 5. Creating a MailTrack
More informationShibboLEAP Project. Final Report: School of Oriental and African Studies (SOAS) Colin Rennie
ShibboLEAP Project Final Report: School of Oriental and African Studies (SOAS) Colin Rennie May 2006 Shibboleth Implementation at SOAS Table of Contents Introduction What this document contains Who writes
More informationHP Client Automation Standard Fast Track guide
HP Client Automation Standard Fast Track guide Background Client Automation Version This document is designed to be used as a fast track guide to installing and configuring Hewlett Packard Client Automation
More information360 Online authentication
360 Online authentication Version October 2015 This document will help you set up a trust for authentication of 360 Online users between Azure Access Control Service and either Office 365 or Active Directory
More informationAuthentication in Apache Lenya
Authentication in Apache Lenya Using LDAP The user authentication mechanism in Apache Lenya is carried out by specifi c components using certain policy fi les. This process is, in itself, complex to understand
More informationRelease Bulletin Sybase ETL Small Business Edition 4.2
Release Bulletin Sybase ETL Small Business Edition 4.2 Document ID: DC00737-01-0420-02 Last revised: November 16, 2007 Topic Page 1. Accessing current release bulletin information 2 2. Product summary
More informationSage 300 ERP 2014. Installation and Administration Guide
Sage 300 ERP 2014 Installation and Administration Guide This is a publication of Sage Software, Inc. Copyright 2013. Sage Software, Inc. All rights reserved. Sage, the Sage logos, and the Sage product
More informationAAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes. Lukas Hämmerle lukas.haemmerle@switch.ch
AAI for Mobile Apps How mobile Apps can use SAML Authentication and Attributes Lukas Hämmerle lukas.haemmerle@switch.ch Berne, 13. August 2014 Introduction App by University of St. Gallen Universities
More informationQuel pilote ètes-vous
Quel pilote ètes-vous Mario Andretti Unique Multi-World Champion en Formula 1, Indy Car, World Sportscar, Nascar Copyright 2 3/27/2013 BMC Software, Inc 2 If everything seems under control, you're not
More informationSeptember 9 11, 2013 Anaheim, California 507 Demystifying Authentication and SSO Options in Business Intelligence
September 9 11, 2013 Anaheim, California 507 Demystifying Authentication and SSO Options in Business Intelligence Greg Wcislo Introduction We will not go into detailed how-to, however links to multiple
More informationWhite Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution
White Paper Cybercom & Axiomatics Joint Identity & Access Management (R)evolution Federation and Attribute Based Access Control Page 2 Realization of the IAM (R)evolution Executive Summary Many organizations
More informationAmeritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
More informationINUVIKA OVD SUPPORT SUPPORT SYSTEM GUIDE. Mathieu Schires Version 1.1 Published 28/04/2015
INUVIKA OVD SUPPORT SUPPORT SYSTEM GUIDE Mathieu Schires Version 1.1 Published 28/04/2015 This document describes how to use the Inuvika Support System for reporting support incidents related to Inuvika
More informationActive Directory LDAP
Whitepaper WPS Parking Solutions Hoevenweg 11 5652 AW EIndhoven T +31 (0)40 250 91 11, info@wps-nl.com, www.wpsparkingsolutions.com T +31(0)40 250 91 11, E info@wps-nl.com, W www.wpsparkingsolutions.com
More informationAradial Installation Guide
Aradial Technologies Ltd. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise noted. No part of this document
More informationHow to configure your Windows PC post migrating to Microsoft Office 365
How to configure your Windows PC post migrating to Microsoft Office 365 1 Contents Purpose... 3 Document Support Boundaries... 3 Examples used in this document... 4 Several different Microsoft Office 365
More informationCrystal Reports Server Quick Installation Guide
Crystal Reports Server Quick Installation Guide Crystal Reports Server Windows Patents Trademarks Copyright Business Objects owns the following U.S. patents, which may cover products that are offered and
More informationQuick Start Guide to Logging in to Online Banking
Quick Start Guide to Logging in to Online Banking Log In to Internet Banking: Note: The first time you log in you are required to use your Customer ID. Your Customer ID is the primary account holder s
More informationConfiguring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
More informationUsing CertAgent to Obtain Domain Controller and Smart Card Logon Certificates for Active Directory Authentication
Using CertAgent to Obtain Domain Controller and Smart Card Logon Certificates for Active Directory Authentication Contents Domain Controller Certificates... 1 Enrollment for a Domain Controller Certificate...
More informationSAP BusinessObjects Business Intelligence Platform Document Version: 4.1 Support Package 5-2014-11-06. Business Intelligence Launch Pad User Guide
SAP BusinessObjects Business Intelligence Platform Document Version: 4.1 Support Package 5-2014-11-06 Business Intelligence Launch Pad User Guide Table of Contents 1 Document history....7 2 Getting started
More informationPurpose... 1 Overview... 1 Installation... 2 Configuration... 2 Using the Adapter... 3 Tips and Troubleshooting... 4 Known Issues... 4 Notes...
Oracle Financial Data Quality Management ERP Integration Adapter for Oracle Applications, Fusion Edition Release FIN-C Readme Purpose... 1 Overview... 1 Installation... 2 Configuration... 2 Using the Adapter...
More informationLong User ID and Password Support In JD Edwards EnterpriseOne
Long User ID and Password Support In JD Edwards EnterpriseOne An Oracle JD Edwards EnterpriseOne Red Paper November 2007 PURPOSE STATEMENT This document outlines the steps that existing JD Edwards EnterpriseOne
More informationSecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit
SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit Note: SecureAware version 3.7 and above contains all files and setup configuration needed to use Microsoft IIS as a front end web server. Installing
More informationExternal Authentication with Checkpoint R75.40 Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Checkpoint R75.40 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale
More informationOBIEE 11g Security it s as easy as 1-2-3!
OBIEE 11g Security it s as easy as 1-2-3! Antony Heljula BI Architect @aheljula Peak Indicators Limited Agenda Aim of Presentation 10g Security Model 11g Security Model What is Supported Identity Providers
More informationFax User Guide 07/31/2014 USER GUIDE
Fax User Guide 07/31/2014 USER GUIDE Contents: Access Fusion Fax Service 3 Search Tab 3 View Tab 5 To E-mail From View Page 5 Send Tab 7 Recipient Info Section 7 Attachments Section 7 Preview Fax Section
More informationBarTender Print Portal. Web-based Software for Printing BarTender Documents WHITE PAPER
BarTender Print Portal Web-based Software for Printing BarTender Documents WHITE PAPER Contents Overview 3 Installing Print Portal 4 Configuring Your Installation 4 Supported Printing Technologies 5 Web
More informationDIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
More informationNexxis User Management
User Manual Version 5.0 Nexxis User Management Nexxis User Management v5.0 User Manual Copyright 2011 Labtronics Inc. Printed in Canada. Windows is a registered trademark of Microsoft Corporation. Microsoft
More information