Identikey Server Performance and Deployment Guide 3.1
|
|
- Avice Carson
- 8 years ago
- Views:
Transcription
1 Identikey Server Performance and Deployment Guide 3.1
2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express or implied, including but not limited to warranties of merchantable quality, merchantability of fitness for a particular purpose, or those arising by law, statute, usage of trade or course of dealing. The entire risk as to the results and performance of the product is assumed by you. Neither we nor our dealers or suppliers shall have any liability to you or any other person or entity for any indirect, incidental, special or consequential damages whatsoever, including but not limited to loss of revenue or profit, lost or damaged data of other commercial or economic loss, even if we have been advised of the possibility of such damages or they are foreseeable; or for claims by a third party. Our maximum aggregate liability to you, and that of our dealers and suppliers shall not exceed the amount paid by you for the Product. The limitations in this section shall apply whether or not the alleged breach or default is a breach of a fundamental condition or term, or a fundamental breach. Some states/countries do not allow the exclusion or limitation or liability for consequential or incidental damages so the above limitation may not apply to you. Copyright Copyright 2009 VASCO Data Security, Inc., VASCO Data Security International GmbH. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of VASCO Data Security Inc. RADIUS Documentation Disclaimer The RADIUS documentation featured in this manual is focused on supplying required information pertaining to the RADIUS server and its operation in the Identikey Server environment. It is recommended that further information be gathered from your NAS/RAS vendor for information on the use of RADIUS. Trademarks VASCO, Vacman, IDENTIKEY, axs GUARD, DIGIPASS, and are registered or unregistered trademarks of VASCO Data Security, Inc. and/or VASCO Data Security International GmbH in the U.S. and other countries. Document version: 1.1
3 Table of Contents Table of Contents 1 Introduction Scope Identikey Server Functionality Selecting a Deployment Model How Can We Get the Best Possible Performance from Identikey Server? Deployment Models Basic Deployment Model Advanced Deployment Model High-Availability Deployment Model Maximum-Availability Deployment WAN Deployment Model Deployment Considerations Data Replication Back-End Authentication Load balancing Performance Baselines Performance Setup Results Variations Recommendations Limitations Identikey Server Performance and Deployment Guide 3
4 Introduction 1 Introduction This guide contains information on deploying Identikey Server, and performance statistics detailing the performance of Identikey Server in different deployment models. 1.1 Scope Only Identikey Server installations using an ODBC database as their data store are covered in this guide Installations of Identikey Server using Active Directory as their data store are not covered, as performance differs widely depending on the Active Directory implementation in use. 1.2 Identikey Server Functionality An Identikey Server installation may be utilized for: Authentication Signature validation Auditing Co-ordinating distribution of Digipass (provisioning) Administration of data, configuration and authentication settings Reporting In larger systems, single Identikey Servers may be assigned specific tasks for example, one to handle authentication requests, another to handle provisioning and administration, still another for auditing and reporting tasks. See the Scenarios section of the Product Guide for more information. 1.3 Selecting a Deployment Model A number of options are available to scale Identikey Server to the level of operability, availability and performance required by your company. Below is a brief summary of the basic deployment models suggested. See the Deployment Models section for more detailed information. Basic This deployment model is useful for a low-traffic system, such as a small company's internal network on a single site. It may also be used to evaluate Identikey Server. Identikey Server Performance and Deployment Guide 4
5 Introduction Advanced The Advanced model is designed for a moderate-traffic system and supports faster disaster recovery. High Availability The High Availability model is an example of the setup for a higher-traffic system, with better performance and greater availability, achieved with load balancing and failover. Maximum Availability This model approximates a system where authentication may NOT fail under any circumstances. Load balancing is performed between two or more Identikey Servers, with dedicated backup Identikey Servers for each. Wide Area Network Multi-site deployment with intra-site replication. 1.4 How Can We Get the Best Possible Performance from Identikey Server? Some elements which will affect performance in Identikey Server are: Machine specifications Data store type, and location(s) Data replication method Load balancing and failover options Auditing method Authentication protocol Tracing enabled or disabled See the Performance Guidelines chapter of this guide for more information. Identikey Server Performance and Deployment Guide 5
6 2 Deployment Models Five basic deployment models are covered in this guide. The deployment model which will apply best to your situation depends on these basic factors: Number of Users in the system Amount of authentication traffic Number of sites needing authentication System availability required how important is it that authentication requests be processed immediately? See the table below for a summary. Table 1: Deployment Models Deployment Model Number of Users Authentications per second Number of sites System availability required Standard < 50 < 50 1 Normal Advanced < 50 1 Normal High Availability > 50 1 High Maximum Availability < > Critical WAN < 50 multiple High Identikey Server Performance and Deployment Guide 6
7 2.1 Basic Deployment Model Image 1: Basic Deployment Model The Basic deployment model is intended for small, low-demand situations, such as a small company local network or an evaluation of Identikey Server. Identikey Servers A single Identikey Server installation, which handlies authentication, auditing and administration tasks. It uses the embedded PostgreSQL database as its data store. Administration Administration done on server. It is recommended that import procedures be scheduled for off-peak authentication times, to reduce the load on the server. Replication No replication required. Auditing Auditing would typically be done to a text file, as this is the simplest option. Identikey Server Performance and Deployment Guide 7
8 Reporting Reporting should be configured to extract information from the auditing text file. See the Reporting section of the Administrator Reference for more information Deployment Steps Install Identikey Server on a machine, using the basic installation option. This will also install and set up a Tomcat web server, the Administration Web Interface, and an embedded PostgreSQL database Limitations No failover support or data replication included. Recovery time from any machine or data problems may be extensive. Identikey Server Performance and Deployment Guide 8
9 2.2 Advanced Deployment Model Image 2: Advanced Deployment Model The Advanced deployment model is an extension of the Basic model, with better backup and availability. The primary Identikey Server may be dedicated exclusively to authentication requests, using none of its work time on administrative tasks. If the primary server fails, the backup server may be substituted with minimal effort, as replication will have kept the data up to date. Identikey Servers Two Identikey Server installations: 1 primary, dedicated to handling authentication requests 1 backup, available for authentication requests if required, used for administration Administration Administration link to backup server. Replication 2-way replication enabled on both Identikey Servers. See the Replication section of the Administrator Reference for more information. Auditing Two options: Auditing to text file on both servers Identikey Server Performance and Deployment Guide 9
10 Auditing to text file on primary server and auditing to database on backup server See the Auditing sections of the Product Guide and Administrator Reference for more information. Reporting Reporting should be configured via the reporting scenario options in the configuration utility or via the Administration Web Interface. Two basic options: input from auditing file (if auditing configured to file) input from local database (if auditing configured to database) Deployment Steps 1. Install Identikey Server on primary machine. 2. Install Identikey Server on backup machine. 3. Install Administration Web Interface on backup server. 4. Configure 2-way replication on each Identikey Server. 5. Optional: disable administration scenario on primary server 6. Schedule making data available for reporting: 7. Merge primary server audit files with backup server auditing information using configuration wizard application (see the Making data available for reporting topic in the Reporting section of the Product Guide for more information). Identikey Server Performance and Deployment Guide 10
11 2.3 High-Availability Deployment Model Image 3:: High-Availability Deployment Model The High-Availability deployment model is an example of a system with higher performance and greater availability. Performance Higher performance is achieved with the use of load-balancing in client-side applications, between two primary Identikey Servers. Database load sharing to dedicated database servers is configured in each Identikey Server. A dedicated audit database is used for auditing and reporting. Administration is performed via the backup Identikey Server, cutting down pressure on the primary servers. Availability Availability of the system is increased by the configuration of failover and failback between Identikey Servers, and the use of a backup database server. Identikey Server Performance and Deployment Guide 11
12 Note Client side load-balancing and fail-over is built in into the client application in this type of deployment. Identikey Servers Two primary Identikey Servers and one backup Identikey Server. Data stored on dedicated database servers. Administration All administrative operations are performed on the backup server. Long running operations taking quite some time can be performed with no direct impact on the authentication server performance handling authentication requests (these administrative operations will introduce only a replication impact on the commercial database servers) Administration scenario could be disabled on both primary servers to exclude administrative load. See the Scenarios section of the Administrator Reference for more information. Replication Custom database replication used. Identikey Server replication is not enabled. Auditing Auditing from primary Identikey Servers: auditing to text file, or auditing immediately to the audit database Auditing from backup Identikey Server: Reporting Dedicated auditing database used Reporting should be configured to collect input from the auditing database for increased report generation performance. This can be done via the reporting scenario in the Identikey Server Configuration GUI, or the Administration Web Interface. See the Scenarios section of the Administrator Reference for more information Deployment Steps 1. Install commercial database on each dedicated database server, and modify schema. 2. Set up replication between the databases. Identikey Server Performance and Deployment Guide 12
13 3. Install Identikey Server on each primary server and the backup server, using the Advanced installation option. 4. Configure database load sharing on each Identikey Server. 5. Install a database on the audit server. 6. Set up auditing as required. 7. Configure reporting as required. 8. Schedule making data available for reporting - merge of primary servers audit files with backup server auditing information using configuration wizard application. Identikey Server Performance and Deployment Guide 13
14 2.4 Maximum-Availability Deployment Image 4: Maximum-Availability Deployment Model The Maximum-Availability deployment model increases performance and availability by introducing greater backup measures and adding a dedicated third-party load balancer application. Performance Higher performance is achieved with the use of the third-party load balancer directing authentication requests to two primary Identikey Servers. Database load sharing to dedicated database servers is configured in each Identikey Server. A dedicated audit database is used for auditing and reporting. Administration is performed via the backup Identikey Server, cutting down pressure on the primary servers. Identikey Server Performance and Deployment Guide 14
15 Availability Availability of the system is maximised by allowing the third-party load balancer to handle load balancing and failover/failback between primary Identikey Servers. Additionally, each primary Identikey Server is configured to failover to a backup Identikey Server. A backup database server is in use, and each Identikey Server is configured to connect to it automatically if the primary database server is not available. Identikey Servers Two primary Identikey Servers, two backup Identikey Servers, one dedicated administration, auditing and reporting Identikey Server. Data stored on dedicated database servers. Administration All administrative operations are performed on the administration server. Long running operations taking quite some time can be performed with no direct impact on the authentication server performance handling authentication requests (these administrative operations will introduce only a replication impact on the commercial database servers) Administration scenario could be disabled on both primary servers and backup servers to exclude administrative load. See the Scenarios section of the Administrator Reference for more information. Replication Commercial replication enabled between database servers. Identikey Server replication disabled. Auditing Auditing on primary and backup Identikey Servers: auditing to text file, or auditing immediately to the audit database Auditing to audit database on admin server Reporting Reporting with auditing input from database for increased report generation throughput Reporting to be configured via reporting scenario configuration utility (see administration reference guide; reporting scenario configuration) or via web administration. Identikey Server Performance and Deployment Guide 15
16 2.4.1 Deployment Steps 1. Install commercial database on each dedicated database server, and modify schema. 2. Set up replication between the databases. 3. Install Identikey Server on each primary and backup server, using the Advanced installation option. 4. Configure database load sharing on each Identikey Server. 5. Install a database on the audit server. 6. Set up auditing as required. 7. Configure reporting as required. 8. Schedule making data available for reporting - merge of primary servers audit files with backup server auditing information using configuration wizard application. Identikey Server Performance and Deployment Guide 16
17 2.5 WAN Deployment Model Image 5: Wide Area Network Deployment Model The WAN deployment model illustrates an multi-site deployment of Identikey Server, with data regularly replicated between sites. Administration and reporting is handled in a single location. Other sites handle only authentication, validation and provisioning requests. Identikey Servers One primary/backup pair of Identikey Servers on each non-administration site. Data is stored in a commercial database on a dedicated database server at each site. Failover is configured on each primary Identikey Server for authentication requests only. One administration site with a dedicated Identikey server for administration and reporting Administration Web Interface installed. All primary commercial database servers replicating with each other and with the backup database server. Dedicated database server for auditing data. Identikey Server Performance and Deployment Guide 17
18 Administration All administrative operations are performed on the administration server. Long running operations taking quite some time can be performed with no direct impact on the authentication server performance handling authentication requests (these administrative operations will introduce only a replication impact on the commercial database servers). Administration scenario could be disabled on both primary servers and backup servers to exclude administrative load. See the Scenarios section of the Administrator Reference for more information. Replication Custom database replication used over the Virtual Private Network. Identikey Server replication is not enabled. Auditing Auditing from primary Identikey Servers: auditing to text file, or auditing directly to the audit database Auditing from backup Identikey Server: Reporting Dedicated auditing database used Reporting should be configured to collect input from the auditing database for increased report generation performance. This can be done via the reporting scenario in the Identikey Server Configuration GUI, or the Administration Web Interface. See the Scenarios section of the Administrator Reference for more information Deployment Steps 1. Install commercial database on each dedicated database server, and modify schema. 2. Set up replication between the databases. 3. Install Identikey Server on each primary server and the backup server, using the Advanced installation option. 4. Configure database load sharing on each Identikey Server. 5. Install a database on the audit server. 6. Set up auditing as required. 7. Configure reporting as required. 8. Schedule making data available for reporting - merge of primary servers audit files with backup server auditing information using configuration wizard application. Identikey Server Performance and Deployment Guide 18
19 Deployment Considerations 3 Deployment Considerations 3.1 Data Replication Will data replication be performed by Identikey Server, or a custom database replication program? Database replication may provide better performance than replication via Identikey Servers, but may cost extra. 3.2 Back-End Authentication Back-end server performance is largely dependent on the back end used. 3.3 Load balancing Load balancing is a technique to spread client requests between two or more hardware servers to get optimal request throughput. A load balancer can be either a software product to be installed on standard server hardware or can be a solution (appliance with pre-installed software; configuration via a web interface; e.g. Barracuda Load balancer). Using multiple servers with load balancing, instead of a single server, can also increase reliability through redundancy. A load balancer typically exposes one virtual IP address and abstracts the IP addresses of each of its supporting servers. Each load balanced service is assigned a specific port on the load balancer. Methods 2 setups exist for SSL communication between an Application and Identikey Server via a load-balancer: SSL bridging SSL tunneling Scheduling Most load balancers support a variety of scheduling algorithms to distribute the client requests. Common scheduling algorithms are: Random: each incoming client request is forwarded to a random back-end server. Round robin: incoming client requests are equally distributed over the different back-end servers. The load balancer determines the next server to send the request to by retrieving the next server entry in the list of available back-end servers. Identikey Server Performance and Deployment Guide 19
20 Deployment Considerations Least connection: the load balancer forwards an incoming request to the server with the least number of active connections at that time. Persistence An important issue when operating a load-balanced service is how to handle information that must be kept across the multiple requests in a user's session. If this information is stored locally on one back end server, then subsequent requests going to different back end servers would not be able to find it. This might be cached information that can be recomputed, in which case loadbalancing a request to a different back end server just introduces a performance issue. One solution to the session data issue is to send all requests in a user session consistently to the same back end server. This is known as "persistence" or "stickiness". A large downside to this technique is its lack of automatic failover: if a backend server goes down, its pre-session information becomes inaccessible, and sessions depending on it are lost. The persistence could be performed based on the following information in the client request: Client IP HTTP Cookie High-availability Each load balancer should be deployed together with a backup load-balancer (mode primary-backup) to ensure high-availability (no single point of failure) SSL Bridging In this setup, the load balancer acts as end-point or terminator of all connections: SSL tunnel between the Identikey client and the load-balancer (SSL tunnel 1 in the diagram above). Tunnels between load-balancer and each of the back-end Identikey Servers (e.g. SSL tunnel 2 in the diagram above). Identikey Server Performance and Deployment Guide 20
21 Deployment Considerations Advantages Since the load balancer acts as SSL tunnel end-point, the load-balancer can introspect the client request contents and easily handle persistent sessions. Disadvantages The load-balancer can introspect all sensitive information communicated by the Identikey client as it will at a some point in time be available in the clear on the load balancer. This security risk should be evaluated when this setup is considered. Persistence Following persistence mechanisms are supported: Client IP address HTTP cookie SSL certificates This setup requires following SSL certificates: 1 commercial SSL certificate for the client-loadbalancer tunnel, to be installed on the load balancer. Commercial or self-signed certificates for the individual back-end Identikey servers. In case self-signed certificates are used, the certificates should be imported into the load-balancer to establish trust with the backend servers SSL Tunneling In this setup, SSL tunnels are created between the Identikey client and the Identikey Server. Advantages No data introspection possible by load-balancer. Disadvantages Not supported by all load balancers. Identikey Server Performance and Deployment Guide 21
22 Deployment Considerations Persistence Following persistence mechanisms are supported: Client IP address SSL certificates This setup requires following SSL certificate: 1 commercial wildcard SSL certificate for the different client-identikey server tunnels, to be installed on each of the back-end Identikey Servers IK3 Load balancing limitations There are a number of theoretical limitations on using load balancing for client requests communicated to Identikey Server 3.1: Authentication Following load-balancing limitations exist for the authentication API: 1-step CR: subsequent authentication request should be handled by the same Identikey server as the one generating the challenge. 2-step CR: second step of authentication request should be handled by the same Identikey server as the one generating the challenge. Provisioning No load balancing issues expected for provisioning. Administration Following load-balancing limitations exist for the administration API: Administrative sessions: all administration operations are session based. They require a prior administrative logon before they can be executed. Administrative sessions are tied to a specific Identikey Server and should therefore not be balanced between different Identikey Servers. Reporting Following load-balancing limitations exist for the reporting API: Administrative sessions: Reporting requires establishing a prior administrative session. Administrative sessions are tied to a specific Identikey Server and should therefore not be balanced between different Identikey Servers. Identikey Server Performance and Deployment Guide 22
23 Performance Baselines 4 Performance Baselines 4.1 Performance Setup A basic installation of Identikey Server was run on the machine, which includes the embedded PostgreSQL database. Performance data was gathered using the following methods: A digipass record import was performed. The time taken for the import was recorded. A user record import was performed and digipass were automatically assigned. The time taken for the import was recorded. A performance test was run for ten minutes, and repeated for each protocol used. The top and average number of authentications per second was recorded. Note Only authentications/second were recorded. Other transactions such as administration, auditing, and reporting were not counted. Hardware Quad core Intel Xeon CPU 4GB RAM Hardware Raid controller 3 * 7200RPM Hard Disk (RAID 5 volume) Operating Systems Windows bit, Red Hat Enterprise Linux 32-bit, or Red Hat Enterprise Linux 64-bit Database Embedded PostgreSQL Test data Digipass Users Protocols SOAP or RADIUS (including PAP, CHAP, MS-CHAP and MS-CHAPv2) Identikey Server Performance and Deployment Guide 23
24 Performance Baselines Auditing Auditing to text file or to embedded PostgreSQL database Reporting 4.2 Results Import records Authentication No reporting or reporting from embedded database. Windows (32-bit) Linux (32-bit) Linux (64-bit) Digipass import 4 minutes 56 seconds 6 minutes 33 seconds 5 minutes 49 seconds User import and assign 9 minutes 36 seconds 11 minutes 13 seconds 9 minutes 32 seconds Configuration Best rate Average Rate Audit to text file with no reporting Windows (32-bit) Linux (32-bit) Linux (64-bit) Windows (32-bit) Linux (32-bit) Linux (64-bit) SOAP PAP CHAP MS-CHAP MS-CHAPv Audit to database with no reporting SOAP PAP CHAP MS-CHAP MS-CHAPv Audit to database with reporting SOAP PAP CHAP MS-CHAP MS-CHAPv Identikey Server Performance and Deployment Guide 24
25 Performance Baselines 4.3 Variations Protocol The protocol to be used will depend primarily on your current network infrastructure. Results indicate that Identikey Server performs better using SOAP when using a local database and auditing to that database. When using RADIUS, all protocol types provide similar performance levels. Auditing and Reporting Auditing to database decreases performance on multiple-ik systems, consider an IK dedicated to auditing and other administrative tasks, or using a separate auditing database. Platform Performance is similar on Windows and Linux systems. 32-bit and 64-bit architecture yields similar results. 4.4 Recommendations The following recommendations are made based on the testing performed: With a database size of 20,000 users and DP, it is already recommended to have bulk administration and report generation on a separate server either a backup server or a dedicated server; up to about 2,000 users and DP, this is not likely to be necessary If your database size is getting toward 20,000 users and DP, consider a separate database if you have the resources and expertise to have a very fast, well maintained database; for the main database and for an audit database Consider using RAID-5 disk striping and faster disks if your sustained or peak transaction rate authentications plus other requests, eg. administration and digital signatures - is above 50 authentciations/second, unless the database and auditing are handled with fast, separate database servers. 4.5 Limitations An upper limit of Digipass records is recommended for Identikey Server. Performance, in the sense of authentications/second, will be highly dependent on your hardware setup and deployment choices. Identikey Server Performance and Deployment Guide 25
Identikey Server Getting Started Guide 3.1
Identikey Server Getting Started Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without
More informationDIGIPASS Authentication for Windows Logon Getting Started Guide 1.1
DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or
More informationIdentikey Server Windows Installation Guide 3.1
Identikey Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
More informationIdentikey Server Administrator Reference 3.1
Identikey Server Administrator Reference 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
More informationIdentikey Server Product Guide 3.0 3.1
Identikey Server Product Guide 3.0 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without
More informationIDENTIKEY Server Product Guide 3.0 3.1
IDENTIKEY Server Product Guide 3.0 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without
More informationDigipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Getting Started
Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Getting Started Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of
More informationIDENTIKEY Server Windows Installation Guide 3.2
IDENTIKEY Server Windows Installation Guide 3.2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
More informationIDENTIKEY Server Administrator Reference 3.1
IDENTIKEY Server Administrator Reference 3.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express or
More informationDIGIPASS Authentication for Windows Logon Product Guide 1.1
DIGIPASS Authentication for Windows Logon Product Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions,
More informationIDENTIKEY Server Windows Installation Guide 3.1
IDENTIKEY Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
More informationDigipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide
Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations
More informationaxsguard Gatekeeper Internet Redundancy How To v1.2
axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH
More informationDIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
More informationDigipass Authentication For IIS Basic 3.2
Digipass Authentication For IIS Basic 3.2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without
More informationRelease Notes. Identikey Server Release Notes 3.1
Release Notes Identikey Server Release Notes 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
More informationIP Tunnels September 2014
IP Tunnels September 2014 Table of Contents 1. Introduction... 1 1.1. About this Document... 1 1.2. Concept... 1 2. Configuration and Parameters... 2 VASCO Data Security 2014 ii VASCO Products VASCO Data
More informationA dm inistrator Reference
Digipass Plug-In for IAS IAS Plug-In Digipass Extension for Active Directory Users and Computers Administration MMC Interface IAS Microsoft's Internet Authentication Service SBR Funk Steel-Belted RADIUS
More informationInternet Redundancy How To. Version 8.0.0
Internet Redundancy How To Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. 1.2. 1.3. 1.4. About this Document... Examples used in this Guide... Documentation Sources... About the AXS GUARD...
More informationDIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations
More informationINTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass
INTEGRATION GUIDE DIGIPASS Authentication for F5 FirePass Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
More informationSymantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations
Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This
More informationDIGIPASS Authentication for Check Point Security Gateways
DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
More informationDIGIPASS as a Service. Google Apps Integration
DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About
More informationHyper-V Installation Guide. Version 8.0.0
Hyper-V Installation Guide Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. About this Document... 1 1.2. Documentation and Training... 1 1.3. About the AXS GUARD... 1 1.3.1. Introduction... 1
More informationStrong Authentication in details
Strong Authentication in details Kuznetsov Alexander Technical Account Manager VASCO Core Activities Overview DIGIPASS DIGIPASS Go Range DIGIPASS E-signature DIGIPASS Reader DIGIPASS for Mobile DIGIPASS
More informationI n s t a lla t io n G u id e
Modify these field values (right-click and select Fields) to change text throughout the document: NOTE: Diagrams may appear or disappear depending on these field settings so BE CAREFUL adding and removing
More informationIDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8
IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2008 2015 VASCO Data Security, Inc., VASCO Data Security International
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505
INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this
More informationDIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
More informationDIGIPASS Authentication for Check Point Connectra
DIGIPASS Authentication for Check Point Connectra With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 21 Disclaimer Disclaimer of Warranties and Limitations
More informationDIGIPASS Authentication for Remote Desktop Web Access User Manual 3.4
DIGIPASS Authentication for Remote Desktop Web Access User Manual 3.4 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties,
More informationNetIQ Sentinel 7.0.1 Quick Start Guide
NetIQ Sentinel 7.0.1 Quick Start Guide April 2012 Getting Started Use the following information to get Sentinel installed and running quickly. Meeting System Requirements on page 1 Installing Sentinel
More informationMIGRATION GUIDE. Authentication Server
MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
More informationDIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
More informationINTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace
INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
More informationaxsguard Gatekeeper Open VPN How To v1.4
axsguard Gatekeeper Open VPN How To v1.4 Legal Notice VASCO Products VASCO Data Security, Inc. and/or VASCO Data Security International GmbH are referred to in this document as 'VASCO'. VASCO Products
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN
INTEGRATION GUIDE DIGIPASS Authentication for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data
More informationProof of Concept Guide
Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the
More informationwww.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013
www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this
More informationDeveloping Higher Density Solutions with Dialogic Host Media Processing Software
Telecom Dialogic HMP Media Server Developing Higher Density Solutions with Dialogic Host Media Processing Software A Strategy for Load Balancing and Fault Handling Developing Higher Density Solutions with
More informationDIGIPASS Authentication for GajShield GS Series
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
More information2007 Digipass Pack for OWA 2007 Basic Authentication IIS IIS 6 Module Authentication Server web site Digipass Pack for OWA 2007 Basic Authentication
2007 Digipass Pack for OWA 2007 Basic Authentication IIS IIS 6 Module Authentication Server web site Digipass Pack for OWA 2007 Basic Authentication 3.0 dppack Basic Forms Disclaimer of Warranties and
More informationDIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
More informationAppSense Environment Manager. Enterprise Design Guide
Enterprise Design Guide Contents Introduction... 3 Document Purpose... 3 Basic Architecture... 3 Common Components and Terminology... 4 Best Practices... 5 Scalability Designs... 6 Management Server Scalability...
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter
INTEGRATION GUIDE DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained
More informationIntegrated Citrix Servers
Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights
More informationSECURITY DOCUMENT. BetterTranslationTechnology
SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of
More informationSymantec NetBackup OpenStorage Solutions Guide for Disk
Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a
More informationAcronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH.
1 Copyright Acronis International GmbH, 2002-2016 Copyright Statement Copyright Acronis International GmbH, 2002-2016. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of
More informationPORTA ONE. o r a c u l a r i u s. Concepts Maintenance Release 19 POWERED BY. www.portaone.com
PORTA ONE TM Porta Billing o r a c u l a r i u s Concepts Maintenance Release 19 POWERED BY www.portaone.com Porta Billing PortaBilling Oracularius Concepts o r a c u l a r i u s Copyright Notice & Disclaimers
More informationINTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
More informationOVERVIEW. DIGIPASS Authentication for Office 365
OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility
More informationMultiple Public IPs (virtual service IPs) are supported either to cover multiple network segments or to increase network performance.
EliteNAS Cluster Mirroring Option - Introduction Real Time NAS-to-NAS Mirroring & Auto-Failover Cluster Mirroring High-Availability & Data Redundancy Option for Business Continueity Typical Cluster Mirroring
More informationDIGIPASS Authentication for SonicWALL SSL-VPN
DIGIPASS Authentication for SonicWALL SSL-VPN With VACMAN Middleware 3.0 2006 VASCO Data Security. All rights reserved. Page 1 of 53 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations
More informationHow to setup NovaBACKUP DataCenter to backup data to Amazon S3 using Amazon s AWS Storage Gateway
Whitepaper How to setup NovaBACKUP DataCenter to backup data to Amazon S3 using Amazon s AWS Storage Gateway Contents What is Amazon S3?... 3 What is the AWS Storage Gateway?... 4 How to setup Amazon Storage
More informationDIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
More informationIGEL Universal Management. Installation Guide
IGEL Universal Management Installation Guide Important Information Copyright This publication is protected under international copyright laws, with all rights reserved. No part of this manual, including
More informationVeeam Cloud Connect. Version 8.0. Administrator Guide
Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be
More informationVIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS
VIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS Successfully configure all solution components Use VMS at the required bandwidth for NAS storage Meet the bandwidth demands of a 2,200
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)
INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
More informationAcronis Storage Gateway
Acronis Storage Gateway DEPLOYMENT GUIDE Revision: 12/30/2015 Table of contents 1 Introducing Acronis Storage Gateway...3 1.1 Supported storage backends... 3 1.2 Architecture and network diagram... 4 1.3
More informationDell One Identity Cloud Access Manager 7.0.2. Installation Guide
Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationCheck Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
More informationAvailability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013
the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they
More informationNetworking and High Availability
TECHNICAL BRIEF Networking and High Availability Deployment Note Imperva appliances support a broad array of deployment options, enabling seamless integration into any data center environment. can be configured
More informationGRAVITYZONE HERE. Deployment Guide VLE Environment
GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including
More informationSanDisk SSD Boot Storm Testing for Virtual Desktop Infrastructure (VDI)
WHITE PAPER SanDisk SSD Boot Storm Testing for Virtual Desktop Infrastructure (VDI) August 214 951 SanDisk Drive, Milpitas, CA 9535 214 SanDIsk Corporation. All rights reserved www.sandisk.com 2 Table
More informationVirtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V. Reference Architecture
Virtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V Copyright 2011 EMC Corporation. All rights reserved. Published February, 2011 EMC believes the information
More informationQuick Install Guide. Lumension Endpoint Management and Security Suite 7.1
Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite
More informationLoad Balancing Oracle Web Applications. An Oracle White Paper November 2004
Load Balancing Oracle Web Applications An Oracle White Paper November 2004 Load Balancing Oracle Web Applications Introduction... 3 Load Balancing Implementation... 3 Architecture Overview... 3 Architecture
More informationUsing Data Domain Storage with Symantec Enterprise Vault 8. White Paper. Michael McLaughlin Data Domain Technical Marketing
Using Data Domain Storage with Symantec Enterprise Vault 8 White Paper Michael McLaughlin Data Domain Technical Marketing Charles Arconi Cornerstone Technologies - Principal Consultant Data Domain, Inc.
More informationINTEGRATION GUIDE. General Radius Config
INTEGRATION GUIDE General Radius Config Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no
More informationHardware/Software Guidelines
There are many things to consider when preparing for a TRAVERSE v11 installation. The number of users, application modules and transactional volume are only a few. Reliable performance of the system is
More informationUnderstanding EMC Avamar with EMC Data Protection Advisor
Understanding EMC Avamar with EMC Data Protection Advisor Applied Technology Abstract EMC Data Protection Advisor provides a comprehensive set of features that reduce the complexity of managing data protection
More informationLaserfiche Hardware Planning and Specifications. White Paper
Laserfiche Hardware Planning and Specifications White Paper September 2012 Table of Contents Introduction... 3 Gathering System Requirements... 3 System Storage Calculations... 4 Evaluate Current State...
More informationDameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
More informationCisco Secure Control Access System 5.8
Data Sheet Cisco Secure Control Access System 5.8 Cisco Secure Access Control System ties together an enterprise s network access policy and identity strategy. It is the world s most trusted policy-based
More informationGetting Started. Websense V10000 Appliance. v1.1
Getting Started Websense V10000 Appliance v1.1 1996 2009, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights reserved. Published 2009 Revision C Printed in the United States
More informationZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy
ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to
More informationDell Statistica. Statistica Document Management System (SDMS) Requirements
Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationEMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION
EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All
More informationOracle Collaboration Suite
Oracle Collaboration Suite Firewall and Load Balancer Architecture Release 2 (9.0.4) Part No. B15609-01 November 2004 This document discusses the use of firewall and load balancer components with Oracle
More informationCentrata IT Management Suite 3.0
Centrata IT Management Suite 3.0 Technical Operating Environment April 9, 2004 Centrata Incorporated Copyright 2004 by Centrata Incorporated All rights reserved. April 9, 2004 Centrata IT Management Suite
More informationEMC Unified Storage for Microsoft SQL Server 2008
EMC Unified Storage for Microsoft SQL Server 2008 Enabled by EMC CLARiiON and EMC FAST Cache Reference Copyright 2010 EMC Corporation. All rights reserved. Published October, 2010 EMC believes the information
More informationNovell LDAP Proxy Server
AUTHORIZED DOCUMENTATION Best Features Guide Novell LDAP Proxy Server 1.0 October 2011 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use
More informationServer Scalability and High Availability
Server Scalability and High Availability GO!Enterprise GLOBO Plc. March 2015 Copyright Notice and Usage Terms This guide is Copyright 2012 GLOBO. All Rights Reserved. Permission is granted to make and
More informationv.5.5.2 Installation Guide for Websense Enterprise v.5.5.2 Embedded on Cisco Content Engine with ACNS v.5.4
v.5.5.2 Installation Guide for Websense Enterprise v.5.5.2 Embedded on Cisco Content Engine with ACNS v.5.4 Websense Enterprise Installation Guide 1996 2004, Websense, Inc. All rights reserved. 10240 Sorrento
More informationInstallation Guide Supplement
Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,
More informationEMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage
EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL
More informationDell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability
Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical
More informationDNS ROUND ROBIN HIGH-AVAILABILITY LOAD SHARING
PolyServe High-Availability Server Clustering for E-Business 918 Parker Street Berkeley, California 94710 (510) 665-2929 wwwpolyservecom Number 990903 WHITE PAPER DNS ROUND ROBIN HIGH-AVAILABILITY LOAD
More informationWeb Application Hosting Cloud Architecture
Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described
More informationTELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE
TELSTRA CLOUD SERVICES CLOUD INFRASTRUCTURE PRICING GUIDE SINGAPORE WELCOME TO TELSTRA CLOUD SERVICES Our cloud infrastructure solutions are made up of a combination of scalable cloud resources, including
More informationv7.1 Technical Specification
v7.1 Technical Specification Copyright 2011 Sage Technologies Limited, publisher of this work. All rights reserved. No part of this documentation may be copied, photocopied, reproduced, translated, microfilmed,
More informationOracle BI Publisher Enterprise Cluster Deployment. An Oracle White Paper August 2007
Oracle BI Publisher Enterprise Cluster Deployment An Oracle White Paper August 2007 Oracle BI Publisher Enterprise INTRODUCTION This paper covers Oracle BI Publisher cluster and high availability deployment.
More informationTotal Disaster Recovery in Clustered Storage Servers
Tech Sheet Total Disaster Recovery in Clustered Storage Servers 1 Copyright 1998-2009 American Megatrends, Inc. All rights reserved. American Megatrends, Inc. 5555 Oakbrook Parkway, Building 200 Norcross,
More information