Identikey Server Performance and Deployment Guide 3.1

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Identikey Server Performance and Deployment Guide 3.1"

Transcription

1 Identikey Server Performance and Deployment Guide 3.1

2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express or implied, including but not limited to warranties of merchantable quality, merchantability of fitness for a particular purpose, or those arising by law, statute, usage of trade or course of dealing. The entire risk as to the results and performance of the product is assumed by you. Neither we nor our dealers or suppliers shall have any liability to you or any other person or entity for any indirect, incidental, special or consequential damages whatsoever, including but not limited to loss of revenue or profit, lost or damaged data of other commercial or economic loss, even if we have been advised of the possibility of such damages or they are foreseeable; or for claims by a third party. Our maximum aggregate liability to you, and that of our dealers and suppliers shall not exceed the amount paid by you for the Product. The limitations in this section shall apply whether or not the alleged breach or default is a breach of a fundamental condition or term, or a fundamental breach. Some states/countries do not allow the exclusion or limitation or liability for consequential or incidental damages so the above limitation may not apply to you. Copyright Copyright 2009 VASCO Data Security, Inc., VASCO Data Security International GmbH. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of VASCO Data Security Inc. RADIUS Documentation Disclaimer The RADIUS documentation featured in this manual is focused on supplying required information pertaining to the RADIUS server and its operation in the Identikey Server environment. It is recommended that further information be gathered from your NAS/RAS vendor for information on the use of RADIUS. Trademarks VASCO, Vacman, IDENTIKEY, axs GUARD, DIGIPASS, and are registered or unregistered trademarks of VASCO Data Security, Inc. and/or VASCO Data Security International GmbH in the U.S. and other countries. Document version: 1.1

3 Table of Contents Table of Contents 1 Introduction Scope Identikey Server Functionality Selecting a Deployment Model How Can We Get the Best Possible Performance from Identikey Server? Deployment Models Basic Deployment Model Advanced Deployment Model High-Availability Deployment Model Maximum-Availability Deployment WAN Deployment Model Deployment Considerations Data Replication Back-End Authentication Load balancing Performance Baselines Performance Setup Results Variations Recommendations Limitations Identikey Server Performance and Deployment Guide 3

4 Introduction 1 Introduction This guide contains information on deploying Identikey Server, and performance statistics detailing the performance of Identikey Server in different deployment models. 1.1 Scope Only Identikey Server installations using an ODBC database as their data store are covered in this guide Installations of Identikey Server using Active Directory as their data store are not covered, as performance differs widely depending on the Active Directory implementation in use. 1.2 Identikey Server Functionality An Identikey Server installation may be utilized for: Authentication Signature validation Auditing Co-ordinating distribution of Digipass (provisioning) Administration of data, configuration and authentication settings Reporting In larger systems, single Identikey Servers may be assigned specific tasks for example, one to handle authentication requests, another to handle provisioning and administration, still another for auditing and reporting tasks. See the Scenarios section of the Product Guide for more information. 1.3 Selecting a Deployment Model A number of options are available to scale Identikey Server to the level of operability, availability and performance required by your company. Below is a brief summary of the basic deployment models suggested. See the Deployment Models section for more detailed information. Basic This deployment model is useful for a low-traffic system, such as a small company's internal network on a single site. It may also be used to evaluate Identikey Server. Identikey Server Performance and Deployment Guide 4

5 Introduction Advanced The Advanced model is designed for a moderate-traffic system and supports faster disaster recovery. High Availability The High Availability model is an example of the setup for a higher-traffic system, with better performance and greater availability, achieved with load balancing and failover. Maximum Availability This model approximates a system where authentication may NOT fail under any circumstances. Load balancing is performed between two or more Identikey Servers, with dedicated backup Identikey Servers for each. Wide Area Network Multi-site deployment with intra-site replication. 1.4 How Can We Get the Best Possible Performance from Identikey Server? Some elements which will affect performance in Identikey Server are: Machine specifications Data store type, and location(s) Data replication method Load balancing and failover options Auditing method Authentication protocol Tracing enabled or disabled See the Performance Guidelines chapter of this guide for more information. Identikey Server Performance and Deployment Guide 5

6 2 Deployment Models Five basic deployment models are covered in this guide. The deployment model which will apply best to your situation depends on these basic factors: Number of Users in the system Amount of authentication traffic Number of sites needing authentication System availability required how important is it that authentication requests be processed immediately? See the table below for a summary. Table 1: Deployment Models Deployment Model Number of Users Authentications per second Number of sites System availability required Standard < 50 < 50 1 Normal Advanced < 50 1 Normal High Availability > 50 1 High Maximum Availability < > Critical WAN < 50 multiple High Identikey Server Performance and Deployment Guide 6

7 2.1 Basic Deployment Model Image 1: Basic Deployment Model The Basic deployment model is intended for small, low-demand situations, such as a small company local network or an evaluation of Identikey Server. Identikey Servers A single Identikey Server installation, which handlies authentication, auditing and administration tasks. It uses the embedded PostgreSQL database as its data store. Administration Administration done on server. It is recommended that import procedures be scheduled for off-peak authentication times, to reduce the load on the server. Replication No replication required. Auditing Auditing would typically be done to a text file, as this is the simplest option. Identikey Server Performance and Deployment Guide 7

8 Reporting Reporting should be configured to extract information from the auditing text file. See the Reporting section of the Administrator Reference for more information Deployment Steps Install Identikey Server on a machine, using the basic installation option. This will also install and set up a Tomcat web server, the Administration Web Interface, and an embedded PostgreSQL database Limitations No failover support or data replication included. Recovery time from any machine or data problems may be extensive. Identikey Server Performance and Deployment Guide 8

9 2.2 Advanced Deployment Model Image 2: Advanced Deployment Model The Advanced deployment model is an extension of the Basic model, with better backup and availability. The primary Identikey Server may be dedicated exclusively to authentication requests, using none of its work time on administrative tasks. If the primary server fails, the backup server may be substituted with minimal effort, as replication will have kept the data up to date. Identikey Servers Two Identikey Server installations: 1 primary, dedicated to handling authentication requests 1 backup, available for authentication requests if required, used for administration Administration Administration link to backup server. Replication 2-way replication enabled on both Identikey Servers. See the Replication section of the Administrator Reference for more information. Auditing Two options: Auditing to text file on both servers Identikey Server Performance and Deployment Guide 9

10 Auditing to text file on primary server and auditing to database on backup server See the Auditing sections of the Product Guide and Administrator Reference for more information. Reporting Reporting should be configured via the reporting scenario options in the configuration utility or via the Administration Web Interface. Two basic options: input from auditing file (if auditing configured to file) input from local database (if auditing configured to database) Deployment Steps 1. Install Identikey Server on primary machine. 2. Install Identikey Server on backup machine. 3. Install Administration Web Interface on backup server. 4. Configure 2-way replication on each Identikey Server. 5. Optional: disable administration scenario on primary server 6. Schedule making data available for reporting: 7. Merge primary server audit files with backup server auditing information using configuration wizard application (see the Making data available for reporting topic in the Reporting section of the Product Guide for more information). Identikey Server Performance and Deployment Guide 10

11 2.3 High-Availability Deployment Model Image 3:: High-Availability Deployment Model The High-Availability deployment model is an example of a system with higher performance and greater availability. Performance Higher performance is achieved with the use of load-balancing in client-side applications, between two primary Identikey Servers. Database load sharing to dedicated database servers is configured in each Identikey Server. A dedicated audit database is used for auditing and reporting. Administration is performed via the backup Identikey Server, cutting down pressure on the primary servers. Availability Availability of the system is increased by the configuration of failover and failback between Identikey Servers, and the use of a backup database server. Identikey Server Performance and Deployment Guide 11

12 Note Client side load-balancing and fail-over is built in into the client application in this type of deployment. Identikey Servers Two primary Identikey Servers and one backup Identikey Server. Data stored on dedicated database servers. Administration All administrative operations are performed on the backup server. Long running operations taking quite some time can be performed with no direct impact on the authentication server performance handling authentication requests (these administrative operations will introduce only a replication impact on the commercial database servers) Administration scenario could be disabled on both primary servers to exclude administrative load. See the Scenarios section of the Administrator Reference for more information. Replication Custom database replication used. Identikey Server replication is not enabled. Auditing Auditing from primary Identikey Servers: auditing to text file, or auditing immediately to the audit database Auditing from backup Identikey Server: Reporting Dedicated auditing database used Reporting should be configured to collect input from the auditing database for increased report generation performance. This can be done via the reporting scenario in the Identikey Server Configuration GUI, or the Administration Web Interface. See the Scenarios section of the Administrator Reference for more information Deployment Steps 1. Install commercial database on each dedicated database server, and modify schema. 2. Set up replication between the databases. Identikey Server Performance and Deployment Guide 12

13 3. Install Identikey Server on each primary server and the backup server, using the Advanced installation option. 4. Configure database load sharing on each Identikey Server. 5. Install a database on the audit server. 6. Set up auditing as required. 7. Configure reporting as required. 8. Schedule making data available for reporting - merge of primary servers audit files with backup server auditing information using configuration wizard application. Identikey Server Performance and Deployment Guide 13

14 2.4 Maximum-Availability Deployment Image 4: Maximum-Availability Deployment Model The Maximum-Availability deployment model increases performance and availability by introducing greater backup measures and adding a dedicated third-party load balancer application. Performance Higher performance is achieved with the use of the third-party load balancer directing authentication requests to two primary Identikey Servers. Database load sharing to dedicated database servers is configured in each Identikey Server. A dedicated audit database is used for auditing and reporting. Administration is performed via the backup Identikey Server, cutting down pressure on the primary servers. Identikey Server Performance and Deployment Guide 14

15 Availability Availability of the system is maximised by allowing the third-party load balancer to handle load balancing and failover/failback between primary Identikey Servers. Additionally, each primary Identikey Server is configured to failover to a backup Identikey Server. A backup database server is in use, and each Identikey Server is configured to connect to it automatically if the primary database server is not available. Identikey Servers Two primary Identikey Servers, two backup Identikey Servers, one dedicated administration, auditing and reporting Identikey Server. Data stored on dedicated database servers. Administration All administrative operations are performed on the administration server. Long running operations taking quite some time can be performed with no direct impact on the authentication server performance handling authentication requests (these administrative operations will introduce only a replication impact on the commercial database servers) Administration scenario could be disabled on both primary servers and backup servers to exclude administrative load. See the Scenarios section of the Administrator Reference for more information. Replication Commercial replication enabled between database servers. Identikey Server replication disabled. Auditing Auditing on primary and backup Identikey Servers: auditing to text file, or auditing immediately to the audit database Auditing to audit database on admin server Reporting Reporting with auditing input from database for increased report generation throughput Reporting to be configured via reporting scenario configuration utility (see administration reference guide; reporting scenario configuration) or via web administration. Identikey Server Performance and Deployment Guide 15

16 2.4.1 Deployment Steps 1. Install commercial database on each dedicated database server, and modify schema. 2. Set up replication between the databases. 3. Install Identikey Server on each primary and backup server, using the Advanced installation option. 4. Configure database load sharing on each Identikey Server. 5. Install a database on the audit server. 6. Set up auditing as required. 7. Configure reporting as required. 8. Schedule making data available for reporting - merge of primary servers audit files with backup server auditing information using configuration wizard application. Identikey Server Performance and Deployment Guide 16

17 2.5 WAN Deployment Model Image 5: Wide Area Network Deployment Model The WAN deployment model illustrates an multi-site deployment of Identikey Server, with data regularly replicated between sites. Administration and reporting is handled in a single location. Other sites handle only authentication, validation and provisioning requests. Identikey Servers One primary/backup pair of Identikey Servers on each non-administration site. Data is stored in a commercial database on a dedicated database server at each site. Failover is configured on each primary Identikey Server for authentication requests only. One administration site with a dedicated Identikey server for administration and reporting Administration Web Interface installed. All primary commercial database servers replicating with each other and with the backup database server. Dedicated database server for auditing data. Identikey Server Performance and Deployment Guide 17

18 Administration All administrative operations are performed on the administration server. Long running operations taking quite some time can be performed with no direct impact on the authentication server performance handling authentication requests (these administrative operations will introduce only a replication impact on the commercial database servers). Administration scenario could be disabled on both primary servers and backup servers to exclude administrative load. See the Scenarios section of the Administrator Reference for more information. Replication Custom database replication used over the Virtual Private Network. Identikey Server replication is not enabled. Auditing Auditing from primary Identikey Servers: auditing to text file, or auditing directly to the audit database Auditing from backup Identikey Server: Reporting Dedicated auditing database used Reporting should be configured to collect input from the auditing database for increased report generation performance. This can be done via the reporting scenario in the Identikey Server Configuration GUI, or the Administration Web Interface. See the Scenarios section of the Administrator Reference for more information Deployment Steps 1. Install commercial database on each dedicated database server, and modify schema. 2. Set up replication between the databases. 3. Install Identikey Server on each primary server and the backup server, using the Advanced installation option. 4. Configure database load sharing on each Identikey Server. 5. Install a database on the audit server. 6. Set up auditing as required. 7. Configure reporting as required. 8. Schedule making data available for reporting - merge of primary servers audit files with backup server auditing information using configuration wizard application. Identikey Server Performance and Deployment Guide 18

19 Deployment Considerations 3 Deployment Considerations 3.1 Data Replication Will data replication be performed by Identikey Server, or a custom database replication program? Database replication may provide better performance than replication via Identikey Servers, but may cost extra. 3.2 Back-End Authentication Back-end server performance is largely dependent on the back end used. 3.3 Load balancing Load balancing is a technique to spread client requests between two or more hardware servers to get optimal request throughput. A load balancer can be either a software product to be installed on standard server hardware or can be a solution (appliance with pre-installed software; configuration via a web interface; e.g. Barracuda Load balancer). Using multiple servers with load balancing, instead of a single server, can also increase reliability through redundancy. A load balancer typically exposes one virtual IP address and abstracts the IP addresses of each of its supporting servers. Each load balanced service is assigned a specific port on the load balancer. Methods 2 setups exist for SSL communication between an Application and Identikey Server via a load-balancer: SSL bridging SSL tunneling Scheduling Most load balancers support a variety of scheduling algorithms to distribute the client requests. Common scheduling algorithms are: Random: each incoming client request is forwarded to a random back-end server. Round robin: incoming client requests are equally distributed over the different back-end servers. The load balancer determines the next server to send the request to by retrieving the next server entry in the list of available back-end servers. Identikey Server Performance and Deployment Guide 19

20 Deployment Considerations Least connection: the load balancer forwards an incoming request to the server with the least number of active connections at that time. Persistence An important issue when operating a load-balanced service is how to handle information that must be kept across the multiple requests in a user's session. If this information is stored locally on one back end server, then subsequent requests going to different back end servers would not be able to find it. This might be cached information that can be recomputed, in which case loadbalancing a request to a different back end server just introduces a performance issue. One solution to the session data issue is to send all requests in a user session consistently to the same back end server. This is known as "persistence" or "stickiness". A large downside to this technique is its lack of automatic failover: if a backend server goes down, its pre-session information becomes inaccessible, and sessions depending on it are lost. The persistence could be performed based on the following information in the client request: Client IP HTTP Cookie High-availability Each load balancer should be deployed together with a backup load-balancer (mode primary-backup) to ensure high-availability (no single point of failure) SSL Bridging In this setup, the load balancer acts as end-point or terminator of all connections: SSL tunnel between the Identikey client and the load-balancer (SSL tunnel 1 in the diagram above). Tunnels between load-balancer and each of the back-end Identikey Servers (e.g. SSL tunnel 2 in the diagram above). Identikey Server Performance and Deployment Guide 20

21 Deployment Considerations Advantages Since the load balancer acts as SSL tunnel end-point, the load-balancer can introspect the client request contents and easily handle persistent sessions. Disadvantages The load-balancer can introspect all sensitive information communicated by the Identikey client as it will at a some point in time be available in the clear on the load balancer. This security risk should be evaluated when this setup is considered. Persistence Following persistence mechanisms are supported: Client IP address HTTP cookie SSL certificates This setup requires following SSL certificates: 1 commercial SSL certificate for the client-loadbalancer tunnel, to be installed on the load balancer. Commercial or self-signed certificates for the individual back-end Identikey servers. In case self-signed certificates are used, the certificates should be imported into the load-balancer to establish trust with the backend servers SSL Tunneling In this setup, SSL tunnels are created between the Identikey client and the Identikey Server. Advantages No data introspection possible by load-balancer. Disadvantages Not supported by all load balancers. Identikey Server Performance and Deployment Guide 21

22 Deployment Considerations Persistence Following persistence mechanisms are supported: Client IP address SSL certificates This setup requires following SSL certificate: 1 commercial wildcard SSL certificate for the different client-identikey server tunnels, to be installed on each of the back-end Identikey Servers IK3 Load balancing limitations There are a number of theoretical limitations on using load balancing for client requests communicated to Identikey Server 3.1: Authentication Following load-balancing limitations exist for the authentication API: 1-step CR: subsequent authentication request should be handled by the same Identikey server as the one generating the challenge. 2-step CR: second step of authentication request should be handled by the same Identikey server as the one generating the challenge. Provisioning No load balancing issues expected for provisioning. Administration Following load-balancing limitations exist for the administration API: Administrative sessions: all administration operations are session based. They require a prior administrative logon before they can be executed. Administrative sessions are tied to a specific Identikey Server and should therefore not be balanced between different Identikey Servers. Reporting Following load-balancing limitations exist for the reporting API: Administrative sessions: Reporting requires establishing a prior administrative session. Administrative sessions are tied to a specific Identikey Server and should therefore not be balanced between different Identikey Servers. Identikey Server Performance and Deployment Guide 22

23 Performance Baselines 4 Performance Baselines 4.1 Performance Setup A basic installation of Identikey Server was run on the machine, which includes the embedded PostgreSQL database. Performance data was gathered using the following methods: A digipass record import was performed. The time taken for the import was recorded. A user record import was performed and digipass were automatically assigned. The time taken for the import was recorded. A performance test was run for ten minutes, and repeated for each protocol used. The top and average number of authentications per second was recorded. Note Only authentications/second were recorded. Other transactions such as administration, auditing, and reporting were not counted. Hardware Quad core Intel Xeon CPU 4GB RAM Hardware Raid controller 3 * 7200RPM Hard Disk (RAID 5 volume) Operating Systems Windows bit, Red Hat Enterprise Linux 32-bit, or Red Hat Enterprise Linux 64-bit Database Embedded PostgreSQL Test data Digipass Users Protocols SOAP or RADIUS (including PAP, CHAP, MS-CHAP and MS-CHAPv2) Identikey Server Performance and Deployment Guide 23

24 Performance Baselines Auditing Auditing to text file or to embedded PostgreSQL database Reporting 4.2 Results Import records Authentication No reporting or reporting from embedded database. Windows (32-bit) Linux (32-bit) Linux (64-bit) Digipass import 4 minutes 56 seconds 6 minutes 33 seconds 5 minutes 49 seconds User import and assign 9 minutes 36 seconds 11 minutes 13 seconds 9 minutes 32 seconds Configuration Best rate Average Rate Audit to text file with no reporting Windows (32-bit) Linux (32-bit) Linux (64-bit) Windows (32-bit) Linux (32-bit) Linux (64-bit) SOAP PAP CHAP MS-CHAP MS-CHAPv Audit to database with no reporting SOAP PAP CHAP MS-CHAP MS-CHAPv Audit to database with reporting SOAP PAP CHAP MS-CHAP MS-CHAPv Identikey Server Performance and Deployment Guide 24

25 Performance Baselines 4.3 Variations Protocol The protocol to be used will depend primarily on your current network infrastructure. Results indicate that Identikey Server performs better using SOAP when using a local database and auditing to that database. When using RADIUS, all protocol types provide similar performance levels. Auditing and Reporting Auditing to database decreases performance on multiple-ik systems, consider an IK dedicated to auditing and other administrative tasks, or using a separate auditing database. Platform Performance is similar on Windows and Linux systems. 32-bit and 64-bit architecture yields similar results. 4.4 Recommendations The following recommendations are made based on the testing performed: With a database size of 20,000 users and DP, it is already recommended to have bulk administration and report generation on a separate server either a backup server or a dedicated server; up to about 2,000 users and DP, this is not likely to be necessary If your database size is getting toward 20,000 users and DP, consider a separate database if you have the resources and expertise to have a very fast, well maintained database; for the main database and for an audit database Consider using RAID-5 disk striping and faster disks if your sustained or peak transaction rate authentications plus other requests, eg. administration and digital signatures - is above 50 authentciations/second, unless the database and auditing are handled with fast, separate database servers. 4.5 Limitations An upper limit of Digipass records is recommended for Identikey Server. Performance, in the sense of authentications/second, will be highly dependent on your hardware setup and deployment choices. Identikey Server Performance and Deployment Guide 25

Identikey Server Getting Started Guide 3.1

Identikey Server Getting Started Guide 3.1 Identikey Server Getting Started Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without

More information

DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1

DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1 DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or

More information

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Getting Started

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Getting Started Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Getting Started Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of

More information

Identikey Server Windows Installation Guide 3.1

Identikey Server Windows Installation Guide 3.1 Identikey Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

Identikey Server Product Guide 3.0 3.1

Identikey Server Product Guide 3.0 3.1 Identikey Server Product Guide 3.0 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without

More information

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations

More information

Identikey Server Administrator Reference 3.1

Identikey Server Administrator Reference 3.1 Identikey Server Administrator Reference 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

IDENTIKEY Server Product Guide 3.0 3.1

IDENTIKEY Server Product Guide 3.0 3.1 IDENTIKEY Server Product Guide 3.0 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without

More information

DIGIPASS Authentication for Windows Logon Product Guide 1.1

DIGIPASS Authentication for Windows Logon Product Guide 1.1 DIGIPASS Authentication for Windows Logon Product Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions,

More information

IDENTIKEY Server Windows Installation Guide 3.2

IDENTIKEY Server Windows Installation Guide 3.2 IDENTIKEY Server Windows Installation Guide 3.2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

IDENTIKEY Server Administrator Reference 3.1

IDENTIKEY Server Administrator Reference 3.1 IDENTIKEY Server Administrator Reference 3.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express or

More information

axsguard Gatekeeper Internet Redundancy How To v1.2

axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH

More information

IDENTIKEY Server Windows Installation Guide 3.1

IDENTIKEY Server Windows Installation Guide 3.1 IDENTIKEY Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

Release Notes. Identikey Server Release Notes 3.1

Release Notes. Identikey Server Release Notes 3.1 Release Notes Identikey Server Release Notes 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

Password Synchronization Manager

Password Synchronization Manager Password Synchronization Manager VACMAN Middleware & Identikey Server User Manual 3.0 PSM for VM & IK User Manual Disclaimer of Warranties and Limitations of Liabilities Disclaimer The Product is provided

More information

IP Tunnels September 2014

IP Tunnels September 2014 IP Tunnels September 2014 Table of Contents 1. Introduction... 1 1.1. About this Document... 1 1.2. Concept... 1 2. Configuration and Parameters... 2 VASCO Data Security 2014 ii VASCO Products VASCO Data

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS Authentication for Cisco ASA 5500 Series DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations

More information

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass INTEGRATION GUIDE DIGIPASS Authentication for F5 FirePass Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security

More information

Hyper-V Installation Guide. Version 8.0.0

Hyper-V Installation Guide. Version 8.0.0 Hyper-V Installation Guide Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. About this Document... 1 1.2. Documentation and Training... 1 1.3. About the AXS GUARD... 1 1.3.1. Introduction... 1

More information

Digipass Authentication For IIS Basic 3.2

Digipass Authentication For IIS Basic 3.2 Digipass Authentication For IIS Basic 3.2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without

More information

A dm inistrator Reference

A dm inistrator Reference Digipass Plug-In for IAS IAS Plug-In Digipass Extension for Active Directory Users and Computers Administration MMC Interface IAS Microsoft's Internet Authentication Service SBR Funk Steel-Belted RADIUS

More information

Strong Authentication in details

Strong Authentication in details Strong Authentication in details Kuznetsov Alexander Technical Account Manager VASCO Core Activities Overview DIGIPASS DIGIPASS Go Range DIGIPASS E-signature DIGIPASS Reader DIGIPASS for Mobile DIGIPASS

More information

DIGIPASS Authentication for Check Point Security Gateways

DIGIPASS Authentication for Check Point Security Gateways DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and

More information

Internet Redundancy How To. Version 8.0.0

Internet Redundancy How To. Version 8.0.0 Internet Redundancy How To Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. 1.2. 1.3. 1.4. About this Document... Examples used in this Guide... Documentation Sources... About the AXS GUARD...

More information

DIGIPASS as a Service. Google Apps Integration

DIGIPASS as a Service. Google Apps Integration DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

I n s t a lla t io n G u id e

I n s t a lla t io n G u id e Modify these field values (right-click and select Fields) to change text throughout the document: NOTE: Diagrams may appear or disappear depending on these field settings so BE CAREFUL adding and removing

More information

NetIQ Sentinel 7.0.1 Quick Start Guide

NetIQ Sentinel 7.0.1 Quick Start Guide NetIQ Sentinel 7.0.1 Quick Start Guide April 2012 Getting Started Use the following information to get Sentinel installed and running quickly. Meeting System Requirements on page 1 Installing Sentinel

More information

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations

Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Symantec Endpoint Protection 11.0 Architecture, Sizing, and Performance Recommendations Technical Product Management Team Endpoint Security Copyright 2007 All Rights Reserved Revision 6 Introduction This

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

DIGIPASS Authentication for Check Point Connectra

DIGIPASS Authentication for Check Point Connectra DIGIPASS Authentication for Check Point Connectra With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 21 Disclaimer Disclaimer of Warranties and Limitations

More information

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';

More information

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013

www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 www.novell.com/documentation Server Installation ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505 INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this

More information

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2008 2015 VASCO Data Security, Inc., VASCO Data Security International

More information

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations

More information

DIGIPASS Authentication for Remote Desktop Web Access User Manual 3.4

DIGIPASS Authentication for Remote Desktop Web Access User Manual 3.4 DIGIPASS Authentication for Remote Desktop Web Access User Manual 3.4 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties,

More information

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

DIGIPASS Authentication for Sonicwall Aventail SSL VPN DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties

More information

2007 Digipass Pack for OWA 2007 Basic Authentication IIS IIS 6 Module Authentication Server web site Digipass Pack for OWA 2007 Basic Authentication

2007 Digipass Pack for OWA 2007 Basic Authentication IIS IIS 6 Module Authentication Server web site Digipass Pack for OWA 2007 Basic Authentication 2007 Digipass Pack for OWA 2007 Basic Authentication IIS IIS 6 Module Authentication Server web site Digipass Pack for OWA 2007 Basic Authentication 3.0 dppack Basic Forms Disclaimer of Warranties and

More information

axsguard Gatekeeper Citrix Xen Center Client Installation 7.7.1

axsguard Gatekeeper Citrix Xen Center Client Installation 7.7.1 axsguard Gatekeeper Citrix Xen Center Client Installation 7.7.1 Table of Contents 1. Introduction... 1 1.1. About this Document... 1.2. Documentation Sources... 1.3. About the axsguard Gatekeeper... 1.3.1.

More information

MIGRATION GUIDE. Authentication Server

MIGRATION GUIDE. Authentication Server MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE) INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';

More information

Developing Higher Density Solutions with Dialogic Host Media Processing Software

Developing Higher Density Solutions with Dialogic Host Media Processing Software Telecom Dialogic HMP Media Server Developing Higher Density Solutions with Dialogic Host Media Processing Software A Strategy for Load Balancing and Fault Handling Developing Higher Density Solutions with

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter

INTEGRATION GUIDE. DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter INTEGRATION GUIDE DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained

More information

AppSense Environment Manager. Enterprise Design Guide

AppSense Environment Manager. Enterprise Design Guide Enterprise Design Guide Contents Introduction... 3 Document Purpose... 3 Basic Architecture... 3 Common Components and Terminology... 4 Best Practices... 5 Scalability Designs... 6 Management Server Scalability...

More information

Implementing Windows Server 2003 and SQL Server 2005 Clustering with StorTrends Storage.

Implementing Windows Server 2003 and SQL Server 2005 Clustering with StorTrends Storage. Tech Sheet Implementing Windows Server 2003 and SQL Server 2005 Clustering with StorTrends Storage. Copyright 1998-2010 American Megatrends India pvt ltd All rights reserved American Megatrends India PVT

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN INTEGRATION GUIDE DIGIPASS Authentication for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data

More information

VIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS

VIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS VIDEO SURVEILLANCE WITH SURVEILLUS VMS AND EMC ISILON STORAGE ARRAYS Successfully configure all solution components Use VMS at the required bandwidth for NAS storage Meet the bandwidth demands of a 2,200

More information

Proof of Concept Guide

Proof of Concept Guide Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the

More information

Integrated Citrix Servers

Integrated Citrix Servers Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights

More information

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION

EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION EMC SYNCPLICITY FILE SYNC AND SHARE SOLUTION Automated file synchronization Flexible, cloud-based administration Secure, on-premises storage EMC Solutions January 2015 Copyright 2014 EMC Corporation. All

More information

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO

More information

axsguard Gatekeeper Open VPN How To v1.4

axsguard Gatekeeper Open VPN How To v1.4 axsguard Gatekeeper Open VPN How To v1.4 Legal Notice VASCO Products VASCO Data Security, Inc. and/or VASCO Data Security International GmbH are referred to in this document as 'VASCO'. VASCO Products

More information

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud

Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud Dell One Identity Cloud Access Manager 8.0 - How To Deploy Cloud Access Manager in a Virtual Private Cloud February 2015 This guide describes how to deploy Dell One Identity Cloud Access Manager within

More information

OVERVIEW. DIGIPASS Authentication for Office 365

OVERVIEW. DIGIPASS Authentication for Office 365 OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1

Quick Install Guide. Lumension Endpoint Management and Security Suite 7.1 Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite

More information

DIGIPASS Authentication for SonicWALL SSL-VPN

DIGIPASS Authentication for SonicWALL SSL-VPN DIGIPASS Authentication for SonicWALL SSL-VPN With VACMAN Middleware 3.0 2006 VASCO Data Security. All rights reserved. Page 1 of 53 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations

More information

Infor Web UI Sizing and Deployment for a Thin Client Solution

Infor Web UI Sizing and Deployment for a Thin Client Solution Infor Web UI Sizing and Deployment for a Thin Client Solution Copyright 2012 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and

More information

Symantec NetBackup OpenStorage Solutions Guide for Disk

Symantec NetBackup OpenStorage Solutions Guide for Disk Symantec NetBackup OpenStorage Solutions Guide for Disk UNIX, Windows, Linux Release 7.6 Symantec NetBackup OpenStorage Solutions Guide for Disk The software described in this book is furnished under a

More information

How to setup NovaBACKUP DataCenter to backup data to Amazon S3 using Amazon s AWS Storage Gateway

How to setup NovaBACKUP DataCenter to backup data to Amazon S3 using Amazon s AWS Storage Gateway Whitepaper How to setup NovaBACKUP DataCenter to backup data to Amazon S3 using Amazon s AWS Storage Gateway Contents What is Amazon S3?... 3 What is the AWS Storage Gateway?... 4 How to setup Amazon Storage

More information

DIGIPASS Authentication for Citrix XenDesktop Web Interface

DIGIPASS Authentication for Citrix XenDesktop Web Interface DIGIPASS Authentication for Citrix XenDesktop Web Interface With VASCO DIGIPASS Pack for Citrix 2008 VASCO Data Security. All rights reserved. Page 1 of 44 Integration Guideline Disclaimer Disclaimer of

More information

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of

More information

IGEL Universal Management. Installation Guide

IGEL Universal Management. Installation Guide IGEL Universal Management Installation Guide Important Information Copyright This publication is protected under international copyright laws, with all rights reserved. No part of this manual, including

More information

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH.

Acronis and Acronis Secure Zone are registered trademarks of Acronis International GmbH. 1 Copyright Acronis International GmbH, 2002-2016 Copyright Statement Copyright Acronis International GmbH, 2002-2016. All rights reserved. Acronis and Acronis Secure Zone are registered trademarks of

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

Dell Statistica. Statistica Document Management System (SDMS) Requirements

Dell Statistica. Statistica Document Management System (SDMS) Requirements Dell Statistica Statistica Document Management System (SDMS) Requirements 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

SolarWinds. Packet Analysis Sensor Deployment Guide

SolarWinds. Packet Analysis Sensor Deployment Guide SolarWinds Packet Analysis Sensor Deployment Guide Copyright 1995-2015 SolarWinds Worldwide, LLC. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled,

More information

Multiple Public IPs (virtual service IPs) are supported either to cover multiple network segments or to increase network performance.

Multiple Public IPs (virtual service IPs) are supported either to cover multiple network segments or to increase network performance. EliteNAS Cluster Mirroring Option - Introduction Real Time NAS-to-NAS Mirroring & Auto-Failover Cluster Mirroring High-Availability & Data Redundancy Option for Business Continueity Typical Cluster Mirroring

More information

Virtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V. Reference Architecture

Virtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V. Reference Architecture Virtualizing SQL Server 2008 Using EMC VNX Series and Microsoft Windows Server 2008 R2 Hyper-V Copyright 2011 EMC Corporation. All rights reserved. Published February, 2011 EMC believes the information

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Hardware/Software Guidelines

Hardware/Software Guidelines There are many things to consider when preparing for a TRAVERSE v11 installation. The number of users, application modules and transactional volume are only a few. Reliable performance of the system is

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.02 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

Acronis Storage Gateway

Acronis Storage Gateway Acronis Storage Gateway DEPLOYMENT GUIDE Revision: 12/30/2015 Table of contents 1 Introducing Acronis Storage Gateway...3 1.1 Supported storage backends... 3 1.2 Architecture and network diagram... 4 1.3

More information

DIGIPASS Authentication for Microsoft ISA 2006 VPN Connections

DIGIPASS Authentication for Microsoft ISA 2006 VPN Connections DIGIPASS Authentication for Microsoft ISA 2006 VPN Connections With IDENTIKEY Server / Axsguard IDENTIFIER 2010 VASCO Data Security. All rights reserved. Page 1 of 19 Integration Guidelines Disclaimer

More information

PORTA ONE. o r a c u l a r i u s. Concepts Maintenance Release 19 POWERED BY. www.portaone.com

PORTA ONE. o r a c u l a r i u s. Concepts Maintenance Release 19 POWERED BY. www.portaone.com PORTA ONE TM Porta Billing o r a c u l a r i u s Concepts Maintenance Release 19 POWERED BY www.portaone.com Porta Billing PortaBilling Oracularius Concepts o r a c u l a r i u s Copyright Notice & Disclaimers

More information

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy

ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy ZEN LOAD BALANCER EE v3.04 DATASHEET The Load Balancing made easy OVERVIEW The global communication and the continuous growth of services provided through the Internet or local infrastructure require to

More information

Veeam Cloud Connect. Version 8.0. Administrator Guide

Veeam Cloud Connect. Version 8.0. Administrator Guide Veeam Cloud Connect Version 8.0 Administrator Guide April, 2015 2015 Veeam Software. All rights reserved. All trademarks are the property of their respective owners. No part of this publication may be

More information

Oracle BI Publisher Enterprise Cluster Deployment. An Oracle White Paper August 2007

Oracle BI Publisher Enterprise Cluster Deployment. An Oracle White Paper August 2007 Oracle BI Publisher Enterprise Cluster Deployment An Oracle White Paper August 2007 Oracle BI Publisher Enterprise INTRODUCTION This paper covers Oracle BI Publisher cluster and high availability deployment.

More information

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions The objective of Implementing Citrix NetScaler 10.5 for App and Desktop Solutions is to provide the foundational concepts and skills

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

INTEGRATION GUIDE. General Radius Config

INTEGRATION GUIDE. General Radius Config INTEGRATION GUIDE General Radius Config Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no

More information

Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013

Availability Digest. www.availabilitydigest.com. Redundant Load Balancing for High Availability July 2013 the Availability Digest Redundant Load Balancing for High Availability July 2013 A large data center can comprise hundreds or thousands of servers. These servers must not only be interconnected, but they

More information

Deployment Options for Microsoft Hyper-V Server

Deployment Options for Microsoft Hyper-V Server CA ARCserve Replication and CA ARCserve High Availability r16 CA ARCserve Replication and CA ARCserve High Availability Deployment Options for Microsoft Hyper-V Server TYPICALLY, IT COST REDUCTION INITIATIVES

More information

VMware AirWatch VMware AirWatch Deployment Guide

VMware AirWatch VMware AirWatch Deployment Guide VMware AirWatch Deployment Guide VERSION: 1.0 UPDATED: APRIL 2016 Copyright 2002-2016 KEMP Technologies, Inc. All Rights Reserved. 1 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights

More information

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage

EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage EMC Backup and Recovery for Microsoft SQL Server 2008 Enabled by EMC Celerra Unified Storage Applied Technology Abstract This white paper describes various backup and recovery solutions available for SQL

More information

vcenter Chargeback User s Guide

vcenter Chargeback User s Guide vcenter Chargeback 1.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

How to Backup and Restore a VM using Veeam

How to Backup and Restore a VM using Veeam How to Backup and Restore a VM using Veeam Table of Contents Introduction... 3 Assumptions... 3 Add ESXi Server... 4 Backup a VM... 6 Restore Full VM... 12 Appendix A: Install Veeam Backup & Replication

More information

Server Scalability and High Availability

Server Scalability and High Availability Server Scalability and High Availability GO!Enterprise GLOBO Plc. March 2015 Copyright Notice and Usage Terms This guide is Copyright 2012 GLOBO. All Rights Reserved. Permission is granted to make and

More information

Quest vworkspace Virtual Desktop Extensions for Linux

Quest vworkspace Virtual Desktop Extensions for Linux Quest vworkspace Virtual Desktop Extensions for Linux What s New Version 7.6 2012 Quest Software, Inc. ALL RIGHTS RESERVED. Patents Pending. This guide contains proprietary information protected by copyright.

More information

Load Balancing Oracle Web Applications. An Oracle White Paper November 2004

Load Balancing Oracle Web Applications. An Oracle White Paper November 2004 Load Balancing Oracle Web Applications An Oracle White Paper November 2004 Load Balancing Oracle Web Applications Introduction... 3 Load Balancing Implementation... 3 Architecture Overview... 3 Architecture

More information

ORACLE VM MANAGEMENT PACK

ORACLE VM MANAGEMENT PACK ORACLE VM MANAGEMENT PACK Effective use of virtualization promises to deliver significant cost savings and operational efficiencies. However, it does pose some management challenges that need to be addressed

More information

Quick Start Guide for VMware and Windows 7

Quick Start Guide for VMware and Windows 7 PROPALMS VDI Version 2.1 Quick Start Guide for VMware and Windows 7 Rev. 1.1 Published: JULY-2011 1999-2011 Propalms Ltd. All rights reserved. The information contained in this document represents the

More information

Citrix NetScaler 10 Essentials and Networking

Citrix NetScaler 10 Essentials and Networking Citrix NetScaler 10 Essentials and Networking CNS205 Rev 04.13 5 days Description The objective of the Citrix NetScaler 10 Essentials and Networking course is to provide the foundational concepts and advanced

More information