How To Configure Bm Atrium Sso For A Long Term Memory (Long Term Memory) On A Microsoft Server (For A Long Time) On An Ubuntu 2.5 (For An Uborg 2.4) (For Ub

Size: px
Start display at page:

Download "How To Configure Bm Atrium Sso For A Long Term Memory (Long Term Memory) On A Microsoft Server (For A Long Time) On An Ubuntu 2.5 (For An Uborg 2.4) (For Ub"

Transcription

1 BMC Atrium Single Sign-On Administration Guide August

2 Contacting BMC Software You can access the BMC Software website at From this website, you can obtain information about the company, its products, corporate offices, special events, and career opportunities. United States and Canada Address BMC SOFTWARE INC 2101 CITYWEST BLVD HOUSTON TX USA Outside United States and Canada Telephone or Telephone (01) Fax (01) Fax If you have comments or suggestions about this documentation, contact Information Design and Development by at Copyright 2006, 2007, BMC Software, Inc. BMC, BMC Software, and the BMC Software logo are the exclusive properties of BMC Software, Inc., are registered with the U.S. Patent and Trademark Office, and may be registered or pending registration in other countries. All other BMC trademarks, service marks, and logos may be registered or pending registration in the U.S. or in other countries. All other trademarks or registered trademarks are the property of their respective owners. Linux is the registered trademark of Linus Torvalds. UNIX is the registered trademark of The Open Group in the US and other countries. Oracle and Java are registered trademarks of Oracle and/or its affiliates. Other names may be trademarks of their respective owners. BMC Software considers information included in this documentation to be proprietary and confidential. Your use of this information is subject to the terms and conditions of the applicable End User License Agreement for the product and the proprietary and restricted rights notices included in this documentation. Restricted rights legend U.S. Government Restricted Rights to Computer Software. UNPUBLISHED -- RIGHTS RESERVED UNDER THE COPYRIGHT LAWS OF THE UNITED STATES. Use, duplication, or disclosure of any data and computer software by the U.S. Government is subject to restrictions, as applicable, set forth in FAR Section , DFARS , DFARS , DFARS , and DFARS , as amended from time to time. Contractor/Manufacturer is BMC Software, Inc., 2101 CityWest Blvd., Houston, TX , USA. Any contract notices should be sent to this address.

3 Customer Support You can obtain technical support by using the Support page on the BMC Software website or by contacting Customer Support by telephone or . To expedite your inquiry, please see Before Contacting BMC Software. Support website You can obtain technical support from BMC Software 24 hours a day, 7 days a week at From this website, you can: Read overviews about support services and programs that BMC Software offers. Find the most current information about BMC Software products. Search a database for problems similar to yours and possible solutions. Order or download product documentation. Report a problem or ask a question. Subscribe to receive notices when new product versions are released. Find worldwide BMC Software support center locations and contact information, including addresses, fax numbers, and telephone numbers. Support by telephone or In the United States and Canada, if you need technical support and do not have access to the Web, call or send an message to customer_support@bmc.com. (In the Subject line, enter SupID:<yourSupportContractID>, such as SupID:12345.) Outside the United States and Canada, contact your local support center for assistance. Before contacting BMC Software Have the following information available so that Customer Support can begin working on your issue immediately: Product information Product name Product version (release number) License number and password (trial or permanent) Operating system and environment information Machine type Operating system type, version, and service pack System hardware configuration Serial numbers Related software (database, application, and communication) including type, version, and service pack or maintenance level Sequence of events leading to the problem Commands and options that you used Messages received (and the time and date that you received them) Product error messages Messages from the operating system, such as file system full Messages from related software

4 License key and password information If you have a question about your license key or password, contact Customer Support through one of the following methods: customer_support@bmc.com. (In the Subject line, enter SupID:<yourSupportContractID>, such as SupID:12345.) In the United States and Canada, call Outside the United States and Canada, contact your local support center for assistance. Submit a new issue at

5 Contents Chapter 1 BMC Atrium Single Sign-On overview 11 BMC Atrium SSO overview Log on and log off behavior BMC Atrium SSO and OpenSSO OpenSSO Administrator console access Atrium SSO user console access Realms Authentication JEE filter-based agents Certificates Generating a CSR Adding a new CA certificate Integrating with BMC Remedy AR System Chapter 2 Installing and configuring BMC Atrium SSO 21 Prerequisites Disk space requirements Log file memory requirements Configuring Terminal Services parameters Installing BMC Atrium SSO as a standalone Before you begin Default cookie domain Administrator password Where to go from here Installing BMC Atrium SSO on an external Tomcat server Configuring an external Tomcat instance for FIPS Installing and uninstalling in silent mode Installing in silent mode Uninstalling in silent mode Silent installation example Upgrading BMC Atrium SSO Stopping and restarting BMC Atrium SSO Stopping and restarting on Windows Stopping and restarting on UNIX or Linux Uninstalling BMC Atrium SSO Running the uninstaller on Windows Running the uninstaller on Solaris or Linux Contents 5

6 Uninstaller invocation error Chapter 3 Using CA certificates 33 Certificates overview Using the keytool utility Obtaining and importing CA certificates Generating CSRs in Windows Importing CA certificates in Windows Generating CSRs in UNIX Importing CA certificates in UNIX Adding another CA certificate Creating new keystores Locating the keystore and truststores Creating a keystore example Chapter 4 Authentication chaining 41 Authentication chaining overview Authentication chaining example Chapter 5 Using LDAP for authentication 45 Setting up LDAP to use for authentication Configuring the LDAP module LDAP configuration parameters Enabling LDAP authentication Chapter 6 Using AR Server for authentication 51 Setting up AR to use for authentication Configuring the AR module AR configuration parameters Enabling AR authentication Enabling the AR data store Accessing the AR data store configuration page Configuring the AR data store New data store configuration example Troubleshooting AR System module User has no profile in this organization Error saving user or group edits Chapter 7 Using Active Directory for authentication 59 Setting up Active Directory for authentication Configuring the Active Directory module Active Directory configuration information Enabling Active Directory authentication Chapter 8 Using RSA SecurID for authentication 65 Setting up SecurID to use for authentication Administration Guide

7 Specifying the sdconf.rec location Configuring to rely on an RSA SecurID server Reconfiguring the SecurID module Enabling RSA SecurID authentication Modifying the rsa_api.properties file Chapter 9 Using CAC for authentication 71 CAC configuration overview Modifying the Tomcat server Importing DoD CA certificates Validating CAC certificates Using OCSP responder to validate certificates Using CRL to validate certificates Specifying CAC users Allowing any user access with a valid CAC card Allowing a subset of users access through the internal data store Allowing a subset of user access through an external LDAP server Enabling CAC Chain Troubleshooting CAC authentication URL certificate authentication not enabled OCSP verify failed Chapter 10 Using an external LDAP data store 81 External LDAP server overview Creating a new data store Modifying an existing data store Troubleshooting an external LDAP data store No users in User tab No groups in Group tab Chapter 11 Configuring FIPS-140 mode 87 FIPS-140 overview Prerequisites for converting to FIPS-140 mode Before converting to FIPS-140 mode Converting to FIPS-140 mode Installing unlimited strength policy files Installing the cryptography library Enabling FIPS-140 mode Monitoring FIPS-140 mode conversion Reconfiguring integrated products Troubleshooting FIPS-140 conversion Converting back to normal mode Enabling normal mode Restoring the original encryption files and non-fips-140 library Reconfiguring integrated products Monitoring normal mode conversion Changing the FIPS-140 network ciphers Modifying the server.xml file Contents 7

8 Multiple ciphers example Single cipher example Chapter 12 Logging 99 Logging overview Support utility Support utility location Running the support utility Log file locations Log directory Debug directory Managing BMC Atrium SSO logging Modifying logging attributes Adjusting logging levels Logging with RSA SecurID Using JEE agents for logging Adjusting logging levels Agent audit logging Log file rotation Manually removing JEE agents Removing JEE agents from BMC Atrium SSO Removing JEE agents from WebSphere Removing JEE agents from Tomcat Removing JEE agents from JBoss or WebLogic Using Java agents Chapter 13 Managing users and groups 109 Managing users Adding users Searching for users Deleting users Modifying user accounts Viewing user sessions Terminating user sessions Managing groups Predefined groups Creating groups Deleting groups Adding users to groups Removing users from groups Chapter 14 Other Administrator Tasks 117 Configuring session parameters Cleaning up BMC product agents Deleting agent accounts Managing authentication modules Creating Modules Editing modules Administration Guide

9 Deleting modules Managing authentication chains Creating chains Editing chains Deleting chains Adding modules to chains Deleting modules from chains Editing a module instance in a chain Reordering modules in chains Appendix A Policy file additions for external Tomcat installations 125 Adding to the policy file Appendix B Error messages 129 Error Messages Contents 9

10 10 Administration Guide

11 1 BMC Chapter Atrium Single Sign-On overview The following topics are provided:! BMC Atrium SSO overview (page 12)! Log on and log off behavior (page 13)! BMC Atrium SSO and OpenSSO (page 14)! Realms (page 15)! Authentication (page 15)! JEE filter-based agents (page 16)! Certificates (page 18)! Integrating with BMC Remedy AR System (page 19) Chapter 1 BMC Atrium Single Sign-On overview 11

12 BMC Atrium Single Sign-on BMC Atrium SSO overview BMC Atrium Single Sign-On (BMC Atrium SSO) is an authentication system that supports many authentication protocols and provides single sign-on and single sign-off for users of BMC products. BMC Atrium SSO allows users to present credentials only once for authentication and subsequently be automatically authenticated by every BMC product that is integrated into the system. Not only does BMC Atrium SSO support authentication with traditional systems such as LDAP or Active Directory, it also supports integration into existing SSO systems. BMC Atrium SSO is the central integration point that performs integration with the local enterprise systems. BMC Atrium SSO can be configured:! As a standalone system! To rely upon an existing enterprise system, such as an LDAP server In addition to functioning as the central server, BMC Atrium SSO uses agents which are integrated into each of the BMC products. These agents perform the following functions:! Accessing authentication services! Coordinating with the server to authenticate users! Validating existing authentications Figure 1-1: BMC Atrium SSO integration with BMC products 12 Administration Guide

13 Log on and log off behavior When initially installed, BMC Atrium SSO is configured for immediate use. This default configuration uses the internal data store as an authentication source. This configuration is suitable for demonstrations, proof-of-concept deployments, testing, and other small deployment scenarios. However, for a large-scale system, you should configure the use of an external user repository for authentication, such as an LDAP server. To help with the configuration of BMC Atrium SSO, predefined authentication chains are provided using LDAP, RSA SecurID, and other methods. These predefined authentication chains allow you to:! Configure an authentication module specifically for your deployment environment.! Quickly configure your system.! Create more complex chains by modifying the predefined chains In addition, new chains can be created if a complex authentication chain is needed. To use authentication chains, see the Authentication Configuration section. Log on and log off behavior When using an SSO system, the normal authentication behavior is altered. The practice of logging on when you start a product is automatically performed when the second product is started. This change happens without any user involvement. When you log off, you are logged off of all BMC Atrium SSO-integrated products. If you want to continue working with other BMC products:! Quit the product instead of logging out of BMC Atrium SSO.! If the product supports application-only log off, log off the application and close the browser. IMPORTANT When quitting an product, the normal behavior is to log off and then quit. This process results in termination of all the product connections. If you want to continue working with other BMC products, quit the product that you are finished with, but only log off the last product. With web applications, the BMC Atrium SSO authentication status is maintained through sessions within the web browsers. When web applications share the same browser session, the authentication state with BMC Atrium SSO is shared by these applications. Chapter 1 BMC Atrium Single Sign-On overview 13

14 BMC Atrium Single Sign-on To use a different login ID without logging off BMC Atrium SSO, you must start a new session in the web browser. The following table summarizes how to share current sessions and how to create new sessions with the browsers supported by BMC Atrium SSO. Table 1-1: Session behavior in supported browsers Browser Share Session New Session Firefox 3 New tab, Ctrl-N for new window, or launch from Start menu or shortcut Use Private Browsing Internet Explorer 6 Ctrl-N to create a new window Launch new browser using Start menu or shortcut Internet Explorer 7 Internet Explorer 8 New tab or Ctrl-N to create a new window New tab, Ctrl-N to create a new window, or launch new browser from Start menu or short-cut Launch new browser using Start menu or shortcut Use New Session in File menu When BMC products launch a new application, the applications use the process needed to ensure a shared session and a seamless experience. BMC Atrium SSO and OpenSSO BMC Atrium SSO is built on the open source project OpenSSO. This project has a long history of providing authentication and authorization across many different platforms by using many authentication techniques. The OpenSSO platform is built using a pluggable architecture which allows the system to expand as new authentication technologies evolve. The goal of BMC Atrium SSO is to provide a simplified, turnkey system that applies OpenSSO technology to BMC products. Configuration of the servers and agents is automated as much as possible, allowing for easy adoption. OpenSSO Administrator console access The OpenSSO Administrator console is accessed through this URL: In this syntax, host is the FQDN of the server host.! In this syntax, port is the HTTPS port selected during server installation (default is 8443).! The default administrator name is AmAdmin.! The password is one that you supplied during installation. When BMC Atrium SSO is installed on a Microsoft Windows platform, a shortcut is created in the Start menu which can be used to access the Administrator console. 14 Administration Guide

15 Realms Atrium SSO user console access Realms Authentication The user console access is through the following URL: This URL can be used to verify the authentication module configuration. You do not need to rely on an installed and configured BMC application to initiate login in order to test configuration of authentication modules. The BMC Atrium SSO system makes use of the following realms within OpenSSO:! The Top Level Realm is the root realm that is used for administrative purposes. Specifically, the root realm is used during BMC product integration for remote Administrator access and as a repository for the J2EE agent configurations. To maintain this function, the root realm authentication must use an authentication scheme involving user name and password, such as the internal LDAP server.! The BmcRealm is used by BMC products for user authentication. As such, this realm does not have the constraints that the root realm does, and can be modified to use any authentication scheme needed. BMC Atrium SSO uses a subset of the technologies within the OpenSSO project that are required by BMC products. The current technologies of OpenSSO that are certified by BMC Atrium SSO include:! Authentication chaining! Authentication schemes! Internal! LDAP! BMC Remedy Action Request (AR) System! Active Directory! RSA SecurID! Common Access Cards (CAC), ActivIdentity-based! Groups Chapter 1 BMC Atrium Single Sign-On overview 15

16 BMC Atrium Single Sign-on IMPORTANT BMC Atrium SSO certifies a subset of platforms and technologies supported by OpenSSO 8.0. BMC Atrium SSO is certified on the configurations explicitly stated in this document. Reported defects either found to be unique to an unconfirmed configuration or not reproducible within a supported environment are addressed at the discretion of BMC. Visit the Customization Policy under the Support Contacts & Policies link on the BMC support website. JEE filter-based agents In this release of BMC Atrium SSO, a new JEE filter-based agent replaces the OpenSSO J2EE agent from BMC Atrium SSO 1.0. You can continue to manage these newer agents by using the J2EE Administrator console. With this release of BMC Atrium SSO, a new, lighter-weight agent is available for use by BMC applications. This new agent uses OpenSSO J2EE agent configuration features for its configuration. This section describes how configuration items apply to this newer agent. When using the JEE filter-based agent, some of the OpenSSO J2EE agent configurations are not used or do not apply. 16 Administration Guide

17 JEE filter-based agents The following table lists the functions that are enabled. Table 1-2: Administrator console functions with JEE Tab Global Notes All functions are enabled except: Profile! Location of Agent Configuration Repository! Configuration Reload Interval! Agent Root URL for CDSSO General! Agent Filter Mode (always SSO only) User Mapping! User Mapping Mode (always uses USER_ID) Application Audit! Audit Log Location (always LOCAL)! Remote Log File Name Logout Processing! Application Logout Handler is unused All parameters are used in:! Not Enforced URI Processing! Not Enforced IP Processing! Profile Attributes Processing! Response Attributes Processing! Common Attributes Fetching Processing! Privilege Attributes Processing SSO No parameters are used in:! Login Processing! Access Denied URI Processing! Custom Authentication Processing All parameters are used except:! Cross Domain SSO Chapter 1 BMC Atrium Single Sign-On overview 17

18 BMC Atrium Single Sign-on Tab Open SSO Services Notes All parameters are used in:! Login URL! Authentication Service No parameters are used in:! Policy Client Service! Session Client Service Miscellaneous No parameters are used in User Data Cache Service except:! Enable Notification of User Data Cache! User Data Cache Polling Time All parameters are used in:! Locale Advanced No parameters are used in:! Port Check Processing! Deprecated Agent Properties No parameters are used in the Advanced section. Certificates Generating a CSR 18 Administration Guide The default Tomcat server used by BMC Atrium SSO uses a keystore and a truststore for secure (HTTPS/TLS) communications. These files are stored in the following directory: installationdirectory/bmc Software/AtriumSSO/tomcat/conf The initial keystore created during the installation uses a self-signed certificate. This certificate causes browsers and other programs to warn users about the insecure nature of the certificate each time the user authenticates. This certificate warning can be prevented by doing one of the following:! Permanently importing the self-signed certificate into the user s truststore.! Obtaining and importing a signed identity certificate from a trusted Certificate Authority (CA). The CA vouches for the authenticity of the server s identity when the user visits the BMC Atrium SSO for authentication. In this case, the user has an established trust relationship with the CA, and this relationship is extended to BMC Atrium SSO after a digitally signed identity certificate is imported. A CA digitally signed certificate is obtain by generating a Certificate Signing Request (CSR):

19 Integrating with BMC Remedy AR System The output from the command must be sent to the CA for a digital signature. After the signed identity certificate is returned, the next step is to import the signed identity certificate into the keystore where it replaces the current self-signed certificate. NOTE The keytool utility is used to obtain a CSR, to obtain a signed certificate, and to import the signed certificate in order to replace the self-signed certificate. This tool is available with Oracle JDKs and BMC Atrium SSO. Adding a new CA certificate Adding another certificate is necessary when CAC authentication is used, when the Department of Defense (DoD) issues new CA certificates, or the CA certificates used to create a signed certificate for the BMC Atrium SSO server is not already within the truststore. The keytool utility is used to import a new CA certificate into the BMC Atrium SSO truststore. Integrating with BMC Remedy AR System The typical method for BMC Atrium SSO with BMC Remedy AR System is to install BMC Atrium SSO, install BMC Remedy AR System, and then integrate with BMC Remedy AR System. For information on integrating with BMC Remedy AR System, see the BMC Remedy AR System Installation Guide and Integration Guide. Chapter 1 BMC Atrium Single Sign-On overview 19

20 BMC Atrium Single Sign-on Administration Guide

21 2 Installing Chapter and configuring BMC Atrium SSO The following topics are provided:! Prerequisites (page 22)! Configuring Terminal Services parameters (page 22)! Installing BMC Atrium SSO as a standalone (page 23)! Installing BMC Atrium SSO on an external Tomcat server (page 25)! Configuring an external Tomcat instance for FIPS-140 (page 27)! Installing and uninstalling in silent mode (page 28)! Upgrading BMC Atrium SSO (page 29)! Stopping and restarting BMC Atrium SSO (page 30)! Uninstalling BMC Atrium SSO (page 31) Chapter 2 Installing and configuring BMC Atrium SSO 21

22 BMC Atrium Single Sign-on Prerequisites Disk space requirements Before installing BMC Atrium SSO, make sure you have met the following prerequisites:! Do not deploy BMC Atrium SSO on an NFS-mounted file system.! If the runtime user of the BMC Atrium SSO web container instance is a non-root user, this user must be able to write to his own home directory.! (Windows) You must have administrator privileges.! (UNIX) You can be any user. However, root privileges are required to set up auto-startup of the services. This section contains information about prerequisite storage space requirements for installation and log files. Before installing BMC Atrium SSO, you must have at least the following available disk space:! (Windows) 650 MB! (Linux) 750 MB! (Solaris) 850 MB Log file memory requirements An additional 7-10 GB of space is recommended for log file growth, depending on the volume of users and products integrating with the BMC Atrium SSO server. To manage log file storage space effectively, perform the following tasks:! Delete the debug log files periodically, especially if the debug level is set to message.! Check the.access and.error log files periodically in the logs directory.! Consider configuring the log rotation to delete the oldest log files. Configuring Terminal Services parameters If you are planning to install BMC Atrium SSO by using Terminal Services, you must first configure Terminal Services. To configure Terminal Services on Windows Server Navigate to the Terminal Services Configuration page. 2 In the Use temporary folders per session field, click No (disabled). 22 Administration Guide

23 Installing BMC Atrium SSO as a standalone 3 In the Delete temporary folders on exit field, click No (disabled). To configure Terminal Services on Windows Server 2008 (64-bit) 1 In Group Policy Editor, select: Computer Configuration > Windows Components > Terminal Services > Terminal Server > Temporary folders 2 In the Do not delete temp folder upon exit field, click Enabled. 3 In the Do not use temporary folders per session field, click Enabled. Installing BMC Atrium SSO as a standalone Before you begin This section describes how to perform a BMC Atrium SSO standalone installation. In this installation, a Tomcat server and JVM are installed and properly configured for use by the BMC Atrium SSO server. This installation method is the simplest and easiest to perform since all of the administrative and configuration details are performed by the installation program.! Obtain the zipped BMC Atrium SSO files from the BMC product package via Electronic Product Download (EPD) or the BMC Atrium SSO DVD.! If there is already an installation of BMC Atrium SSO the target computer, the installer will not allow another installation. Uninstall the existing version. Perform the following steps to install BMC Atrium SSO as a standalone system: To install BMC Atrium SSO standalone 1 Run the installation program. The installation program, autorun, automatically detects the appropriate subscript to run. However, if the appropriate file is not launched, manually run the setup executable. The setup executable is located in the Disk1 directory of the extracted files. (Windows) Run setup.cmd. (UNIX) Run setup.sh (which automatically detects the appropriate subscript to execute). 2 Accept the default destination directory or browse to select a different directory and click Next. 3 Verify that the hostname presented is the Fully Qualified Domain Name (FQDN) for the host, correct the value as needed, and click Next. 4 Verify that Install New Tomcat is selected and click Next. The Tomcat server options are: Chapter 2 Installing and configuring BMC Atrium SSO 23

24 BMC Atrium Single Sign-on ! Install New Tomcat (default)! Use External Tomcat. See Installing BMC Atrium SSO on an external Tomcat server to install with this option. NOTE The BMC Atrium SSO Tomcat server cannot be shared with any product that integrates with BMC Atrium SSO. BMC recommends that BMC Atrium SSO be the only application in the Tomcat server. 5 Accept the default Tomcat HTTP port number, HTTPS port number, and Shutdown port number or enter different port numbers and click Next. If any of the port numbers are incorrect, a panel identifies the incorrect port number and requires you to return to the previous page to correct the values before proceeding with the installation. NOTE When installing on Linux servers, port selections below 1000 require the server to run as root, or use a port forwarding mechanism. 6 Enter a cookie domain and click Next. The domain value of the cookie should be the network domain of BMC Atrium SSO or one of its parent domains. See Default cookie domain on page 24 for more information. IMPORTANT The higher the level of the selected parent domain, the higher the risk of user impersonation. Top-level domains are not supported (for example, "com" or "com.ca"). 7 Enter a strong administrator password, confirm the password, and click Next. The default administrator name is amadmin. See Administrator password on page 25 for more information. 8 Review the installation summary and click Install. 9 Verify that your BMC Atrium SSO installation was successful by accessing the BMC Atrium SSO URL. Default cookie domain a Launch the Administrator console. b Confirm that you can view the OpenSSO login panel. The default cookie domain value is the network domain of the computer you are installing the server on. The default cookie domain specifies the most restrictive access. This value is used to control cookie visibility between servers within the domain. By removing domain elements (lowest sub-domain first), the cookie becomes visible to servers outside of the BMC Atrium SSO domain. 24 Administration Guide

25 Installing BMC Atrium SSO on an external Tomcat server For example, changing the domain adprod.bmc.com to bmc.com gives all of the servers within the bmc.com domain access to the cookies stored by the server in a user s browser. The danger of increasing the cookie visibility is illustrated when the value is changed to com, giving all servers in the internet com domain access to the cookie. Administrator password The administrator password is used to access BMC Atrium SSO through a browser. This access allows user accounts to be created and enables other authentication algorithms. Also, the administrator password is used to integrate application servers that have deployed the BMC Atrium SSO Web agent to integrate with BMC Atrium SSO. Where to go from here! To secure certificates with an external CA, see Using CA certificates on page 33.! To configure authentication, such as LDAP or Active Directory, see Using LDAP for authentication on page 45 or Using Active Directory for authentication on page 59.! To create users, see Managing users and groups on page 109. Installing BMC Atrium SSO on an external Tomcat server This section explains how to install BMC Atrium SSO on an external Tomcat server. This installation option allows the BMC Atrium SSO server to be installed using versions of Tomcat and Java VM that are different from those provided by the standalone installation option. Using this option allows greater flexibility in choosing the Tomcat and JVM, but at the expense of adding administration of the Tomcat server and JVM. In addition, correct version selection must also be performed to avoid incompatibilities. Due to these added responsibilities, BMC recommends that this option be performed only when the default selections are not sufficient. Before installation! Before installation, make sure you have performed the tasks in Prerequisites on page 22.! Verify that no other product or application installed on your Tomcat server. Chapter 2 Installing and configuring BMC Atrium SSO 25

26 BMC Atrium Single Sign-on NOTE The BMC Atrium SSO Tomcat server cannot be shared with any product that integrates with BMC Atrium SSO. BMC recommends that BMC Atrium SSO be the only application in the Tomcat server.! If you plan to enable FIPS, perform the tasks in Configuring an external Tomcat instance for FIPS-140 on page 27. To install BMC Atrium SSO on an external Tomcat server 1 If autorun does not automatically launch the appropriate file, launch the setup executable, located in the Disk1 directory of the extracted files.! (Windows) Run setup.cmd.! (UNIX) Run setup.sh (which automatically detects the appropriate subscript to execute). 2 Accept the default destination directory or browse to select a different directory and click Next. 3 Verify that the hostname presented is the Fully Qualified Domain Name (FQDN) for the host, correct the value as needed, and click Next. 4 Click Use External Tomcat. The Tomcat server options are:! Install New Tomcat (default)! Use External Tomcat 5 At the prompt, enter the Tomcat directory (or use the browse button to specify the Tomcat directory) and click Next. 6 At the Tomcat Application Server Selection panel, enter the path to the Tomcat server. After clicking Next, the installer verifies that:! The directory has a webapps directory that can be written to.! The main program, tomcat6.exe, is present (even on UNIX).! The server.xml file contains a connector with port and secure defined and with scheme set to https. The installer parses important information from this Connector entry and stores it. As the installer deploys the BMC Atrium SSO web application to the Tomcat server, it will ask that you start or stop it when necessary. 7 (Windows) You will be asked whether your external Tomcat server is started by using scripts or as a Windows service. If the Tomcat server is started as a Windows service, enter the name of this service. 8 Enter additional information at the prompts. Be prepared with information about:! JDK directory location! Tomcat HTTPS server port! Tomcat truststore certificate location and password 26 Administration Guide

27 Configuring an external Tomcat instance for FIPS-140! Tomcat keystore password, alias, and certificate! Tomcat cookie domain! Tomcat administrator name and password 9 Stop the Tomcat server. 10 During installation, follow the installer directions to restart the Tomcat server. 11 Verify that your BMC Atrium SSO installation was successful: a Launch the Administrator console. b Confirm that you can view the OpenSSO login panel. The Tomcat server can now be used as the BMC Atrium SSO application server. If you make modifications to the server configuration, be sure to test each change to insure that the BMC Atrium SSO application functions correctly. Configuring an external Tomcat instance for FIPS-140 The Federal Information Processing Standard (FIPS-140) are standards for use in computer systems by all non-military government agencies and government contractors. For example, data encoding and encryption standards. See Configuring FIPS-140 mode (page 87) for more information. If you plan to enable FIPS-140 and are installing to an external Tomcat server, perform these steps: 1 Configure the Tomcat server for auto-deployment of.war files. 2 Use the same keystore for both non-fips and FIPS versions of your server.xml file. 3 Perform these modifications to the following files for non-fips and FIPS versions:! server.xml a Duplicate the original file to create a FIPS version (named server.xml.fips). b In the new FIPS version of the file, use the following ciphers attributes to force a higher level of encryption (using your own values): ciphers="ssl_rsa_with_rc4_128_md5,ssl_rsa_with_rc4_128_sha,tls_r SA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_128 CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA,SSL_RSA_WITH_3DES_EDE_C BC_SHA,SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA, SSL_DHE_DSS_WITH_ DES_EDE_CBC_SHA" c Add the XML comment to tag the file as FIPS-140: <!-- FIPS140 --> d Also duplicate the server.xml file to the conf folder (named server.xml.nofip).! java.security Chapter 2 Installing and configuring BMC Atrium SSO 27

28 BMC Atrium Single Sign-on e Duplicate the original file, creating java.security.nofips and java.security.fips versions. f In java.security.nofips, make sure that the provider is the first one in the security providers list, with the remaining providers renumbered. For example, the following list places the JsafeJCE provider at the top of the list with a key suffix of 1, while the providers after JsafeJCE are renumbered to follow the first. The com.rsa.cryptoj.jce.kat.strategy and com.rsa.cryptoj.jce.fips140initialmode properties are placed after the security providers list. For those properties, use the exact values shown in the following example: security.provider.1=com.rsa.jsafe.provider.jsafejce security.provider.2=sun.security.provider.sun security.provider.3=sun.security.rsa.sunrsasign security.provider.10=sun.security.mscapi.sunmscapi com.rsa.cryptoj.jce.kat.strategy=on.load com.rsa.cryptoj.jce.fips140initialmode=fips140_ssl_mode Installing and uninstalling in silent mode Installing in silent mode The installer and uninstaller program can be run from a script in addition to the GUI interface. This functionality is accessible by running the setup program from the command line and specifying certain parameters. This section provides examples for installing and uninstalling BMC Atrium SSO in silent mode with the setup script. The following represents the general command line syntax: {setup.sh setup.cmd} -i silent -DOPTIONS_FILE=<file> To install in silent mode 1 Open a command line window. 2 Navigate to the C:\SSO\AtriumSSO directory. 3 Create the SSOSilentInstallOptions.txt file with any environment-specific parameters. For details on the file format, see the Silent installation example (page 29) section. 4 Run the setup command by using the following syntax: setup.cmd -i silent -DOPTIONS_FILE=SSOSilentInstallOptions.txt 5 Verify that your BMC Atrium SSO installation was successful: 28 Administration Guide

29 Upgrading BMC Atrium SSO a Launch the Administrator console. b Confirm that you can view the OpenSSO login panel. Uninstalling in silent mode To uninstall in silent mode 1 Open a command-line window. 2 Run UninstallAtrium.exe by using the following syntax: C:\SSO\AtriumSSO\UninstallAtriumSSO.exe -i silent - DOPTIONS_FILE=SSOSilentUninstallOptions.txt where SSOSilentUninstallOptions.txt contains: -silent -U productatriumsso -U featureatriumsso Silent installation example The following example invokes a silent installation where the administrator password is admin123. setup.cmd -i silent -DOPTIONS_FILE=SSOSilentInstallOptions.txt The SSOSilentInstallOptions.txt file contains: -P installlocation=c:\sso\atriumsso -A featureatriumsso -J ATRIUMSSO_TOMCAT_SHUTDOWN_PORT=8005 -J ATRIUMSSO_TOMCAT_HTTP_PORT=8080 -J ATRIUMSSO_INSTALL_TOMCAT=true -J ATRIUMSSO_TOMCAT_HTTPS_PORT=8443 -J ATRIUMSSO_SERVER_PASSWORD=DES\:3996ba109b2b3f035fb c2339a78e cec de -J ATRIUMSSO_SERVER_PASSWORD_2=DES\:3996ba109b2b3f035fb c2339a7 8ecec de -J ATRIUMSSO_COOKIE_DOMAIN=bmc.com -J ATRIUMSSO_HOST_NAME=atrium-sso-vm4.bmc.com Upgrading BMC Atrium SSO You can upgrade a previous installation of BMC Atrium SSO by using the installer provided with BMC Atrium SSO. Chapter 2 Installing and configuring BMC Atrium SSO 29

30 BMC Atrium Single Sign-on NOTE BMC recommends that you backup BMC Atrium SSO before proceeding with an upgrade. The procedure for upgrading BMC Atrium SSO is the same for both Windows and UNIX. To upgrade BMC Atrium SSO 1 On the target computer, start the BMC Atrium SSO installation utility. 2 When prompted, choose to upgrade BMC Atrium SSO and agree to the license agreement. 3 When the upgrade is complete, review the summary information. 4 To view the upgrade logs, click View Log. 5 To close the dialog, click Done. Stopping and restarting BMC Atrium SSO This section describes how to stop and restart BMC Atrium SSO on Windows and UNIX. Stopping and restarting on Windows To stop and restart BMC Atrium SSO on Windows 1 From the desktop of the application server host, use the Control Panel to go to the Administrator Tools' Component Services dialog box. 2 Expand the Services folder. 3 Select BMC Atrium SSO. 4 Click Stop. 5 To restart BMC Atrium SSO, click Start. Stopping and restarting on UNIX or Linux To stop and restart BMC Atrium SSO on UNIX or Linux Ensure that your Java processes are stopped before restarting BMC Atrium SSO. Start the UNIX or Linux services by performing the following steps: 1 Navigate to the installationdirectory/atriumsso/bin directory. 2 To shut down the services, type the following command: shutdown-servers.sh 30 Administration Guide

31 Uninstalling BMC Atrium SSO 3 To start the services, type the following command: startup-servers.sh Uninstalling BMC Atrium SSO During installation, the uninstaller is installed with BMC Atrium SSO. Running the uninstaller removes BMC Atrium SSO from the system. Running the uninstaller on Windows To uninstall BMC Atrium SSO from a Windows platform, use the Add or Remove Programs control panel. To run the uninstaller program 1 From the control panel, select Add or Remove Programs. 2 Select BMC Atrium Single Sign-On in the list. 3 Click Change or Remove Programs once it is displayed. This last action launches the uninstaller program. NOTE Because of varying Windows system dependencies, a reboot might be required to completely the uninstall BMC Atrium SSO. Running the uninstaller on Solaris or Linux To run the uninstaller on Oracle Solaris or Linux, the uninstaller must be launched from within a graphical environment, for example, from the console or through an X-Windows server. To run the uninstaller program 1 Change the working directory to the installation directory. The following is the default directory: $ cd /opt/sso 2 Run the UninstallAtriumSSO script. $./UninstallAtriumAsso If the GUI environment is properly setup, the uninstaller program launches and walks the user through the steps to remove BMC Atrium SSO. IMPORTANT Be sure to select the BMC Atrium SSO component, otherwise the uninstaller will remove the server. Chapter 2 Installing and configuring BMC Atrium SSO 31

32 BMC Atrium Single Sign-on Manually delete the BMC Atrium SSO log file artifacts. These log files are left in the file system regardless of the reboot. Uninstaller invocation error If the GUI environment is incorrectly set up, an invocation error similar to the following occurs when you run the installer.: Invocation of this Java Application has caused an InvocationTargetException. This application will now exit. (LAX) Stack Trace: java.awt.headlessexception: No X11 DISPLAY variable was set, but this program performed an operation which requires it. at java.awt.graphicsenvironment.checkheadless(unknown Source) at java.awt.window.<init>(unknown Source) at java.awt.frame.<init>(unknown Source) at java.awt.frame.<init>(unknown Source) at javax.swing.jframe.<init>(unknown Source) at com.zerog.ia.installer.lifecyclemanager.g(dashoa8113) at com.zerog.ia.installer.lifecyclemanager.h(dashoa8113) at com.zerog.ia.installer.lifecyclemanager.a(dashoa8113) at com.zerog.ia.installer.main.main(dashoa8113) at sun.reflect.nativemethodaccessorimpl.invoke0(native Method) at sun.reflect.nativemethodaccessorimpl.invoke(unknown Source) at sun.reflect.delegatingmethodaccessorimpl.invoke(unknown Source) at java.lang.reflect.method.invoke(unknown Source) at com.zerog.lax.lax.launch(dashoa8113) at com.zerog.lax.lax.main(dashoa8113) This Application has Unexpectedly Quit: Invocation of this Java Application has caused an InvocationTargetException. This application will now exit. (LAX) 32 Administration Guide

33 3 Using Chapter CA certificates The following topics are provided:! Certificates overview (page 34)! Using the keytool utility (page 34)! Obtaining and importing CA certificates (page 35)! Adding another CA certificate (page 38)! Creating new keystores (page 38) Chapter 3 Using CA certificates 33

34 BMC Atrium Single Sign-on Certificates overview The default Tomcat server used by BMC Atrium SSO uses a keystore and a truststore for secure (HTTPS/TLS) communications. These files are stored in the following directory: installdir/bmc Software/AtriumSSO/tomcat/conf The initial keystore created during the installation uses a self-signed certificate. This certificate causes browsers and other programs to warn users about the insecure nature of the certificate each time the user authenticates. The certificate warning can be prevented by doing one of the following:! Permanently importing the self-signed certificate into the user s truststore.! Obtaining and importing a signed identity certificate from a trusted Certificate Authority (CA). The CA vouches for the authenticity of the server s identity when the user visits the BMC Atrium SSO for authentication. In this case, the user has an established trust relationship with the CA and this relationship is extended to BMC Atrium SSO after a digitally signed identity certificate is imported. By default, BMC Atrium SSO is installed with a self-signed certificate. Although valid, this certificate causes warning messages when users access the server to perform authentication. The warning messages occur because the certificate is not signed by a CA. Using the keytool utility The keytool utility is used to obtain a digitally signed identity certificate to replace the self-signed certificate. This utility is available with Oracle JDKs and BMC Atrium SSO. The keytool utility must be available within the shell command environment to generate a CSR or to import a CA signed certificate. To verify that the keytool utility is available 1 Open a shell command window. 2 At the command prompt, type keytool, and press Enter. NOTE The keytool utility from Oracle JDK Java 1.5 or 1.6 can also be used. If the keytool utility is available, a help message is generated that shows the keytool options. The following is the help output relevant to generating the CSR: -certreq [-v] [-protected] [-alias <alias>] [-sigalg <sigalg>] [-file <csr_file>] [-keypass <keypass>] 34 Administration Guide

35 Obtaining and importing CA certificates [-keystore <keystore>] [-storepass <storepass>] [-storetype <storetype>] [-providername <name>] [-providerclass <provider_class_name> [-providerarg <arg>]]... [-providerpath <pathlist>] 3 If the tool is available, proceed with the instructions for generating a CSR and importing signed certificates. If the tool is not available, update the command shell environment to include the following path: installationdirectory/bmc Software/AtriumSSO/jdk/bin Obtaining and importing CA certificates By default, BMC Atrium SSO is installed with a self-signed certificate. Although valid, this certificate causes warning messages when users access the server to perform authentication. The warning messages occur because the certificate is not signed by a CA. To obtain and import a CA signed identity certificate 1 Generate a Certificate Signing Request (CSR). The CSR must be sent to a CA to be digitally signed and returned. The CA signs the CSR using a private key which validates the server s identity and returns a signed identity certificate. 2 Import the CA certificate into BMC Atrium SSO Tomcat keystore. 3 Stop and restart the Tomcat server. 4 Update all integrated application truststores with the new public key. NOTE The new CA certificate will not take effect until the restart occurs. Generating CSRs in Windows To generate a Certificate Signing Request (CSR) 1 On the command line, change the working directory to: installationdirectory/bmc Software/AtriumSSO/tomcat/conf 2 From the conf directory, issue the following command: keytool -certreq -alias tomcat -keystore keystore.p12 -storepass internal4bmc -storetype PKCS12 -providername JsafeJCE Chapter 3 Using CA certificates 35

36 BMC Atrium Single Sign-on The supplied password is the default for BMC Atrium SSO Tomcat. Another password might need to be supplied if the keystore has been replaced with a locally-generated file. The command generates and displays the CSR on the shell window screen: -----BEGIN NEW CERTIFICATE REQUEST----- MIIBmDCCAQECAQAwWDEZMBcGA1UECxMQQXRyaXVtU1NPIFNlcnZlcjEVMBMGA1UECh MMQk1DIFNv ZnR3YXJlMSQwIgYDVQQDExtpQk1DLUpCSEJCSzEuYWRwcm9kLmJtYy5jb20wgZ8wDQ YJKoZIhvcN AQEBBQADgY0AMIGJAoGBAJABuagV7e12Yu3m0LmNWEmVE4HXrdaB+uOyZFyKLZxO2e +WX3r9vc9q al5vqse1yme6ml53b9sws2rwa5d8xdpw8ppqe3dqqdf3qddzfxq18mmzafrasbv6y2 Tj0Oad10Uf c8nuxycvkncmdhzkabahutoxuhfygyzycgfdd/ jtagmbaaggadanbgkqhkig9w0baqufaaobgqax oncbnvnbynhd02qoixep4emd9hlfjjvjhtas6syibmed00mq/ BD5iV1TewwkmvJRn1BjmzGXNO1c xbasqahn9l0+hp4x6awfrijtq9goj4d9y2wb5l6sesgnctnvbhdsmr0aeblpcr7nvj 4vgQsZ9xLj EfQB8idnyyimIfoqqQ== -----END NEW CERTIFICATE REQUEST----- The toolkit command output must be sent to the CA for a digital signature. After the signed identity certificate is returned, the next step is to import the signed identity certificate into the keystore where it replaces the current self-signed certificate. NOTE The Common Name (CN) of the certificate cannot be modified because the CN must match the host name of the server. If the names do not match, the browser issues a warning that the server is trying to impersonate another site. Importing CA certificates in Windows To import a CA certificate, use the keytool -importcert option. -importcert [-v] [-noprompt] [-trustcacerts] [-protected] [-alias <alias>] [-file <cert_file>] [-keypass <keypass>] [-keystore <keystore>] [-storepass <storepass>] [-storetype <storetype>] [-providername <name>] [-providerclass <provider_class_name> [-providerarg <arg>]]... [-providerpath <pathlist>] To execute the import 1 On the command line, change to: 36 Administration Guide

37 Obtaining and importing CA certificates installationdirectory/bmc Software/AtriumSSO/tomcat/conf 2 Run the keytool utility with the following parameters: keytool -importcert -alias tomcat -storepass internal4bmc -file signed.cert -keystore keystore.p12 -storetype PKCS12 -providername JsafeJCE 3 If the keystore has been altered from the default password created during installation, update the password. 4 Change the name of the CA certificate file to the actual value. 5 After successfully importing the signed certificate file into the keystore, restart the server. NOTE The new CA certificate will not take effect until the restart occurs. Generating CSRs in UNIX To obtain CA signed certificate for BMC Atrium SSO, you generate a CSR. To generate a CSR 1 Run the following keytool command: keytool -certreq -keyalg RSA -alias tomcat -file certreq.csr - keystore keystore.p12 -storetype PKCS12 -providername JsafeJCE 2 The CSR is automatically sent to the CA. The CA returns the signed certificate which is a verification of the server s identity. 3 Import the returned CA signed certificate into the BMC Atrium SSO Tomcat keystore. This must be done to provide secure communications. Importing CA certificates in UNIX To import the certificate 1 Run the following keytool command: keytool -import -alias tomcat -keystore keystore.p12 -file cert.txt -storetype PKCS12 -providername JsafeJCE 2 To use the new CA signed certificate, stop and restart the server. Chapter 3 Using CA certificates 37

38 BMC Atrium Single Sign-on Adding another CA certificate Adding another certificate is necessary when CAC authentication is used, the Department of Defense (DoD) issues new CA certificates, or you are using SSL with LDAP for authentication. By default, the BMC Atrium SSO truststore already contains the current certificates for CAC. The procedures for adding another CA certificate are the same as for importing a CA certificate. IMPORTANT Replacing the self-signed certificate on the BMC Atrium SSO server invalidates the certificates that have already been accepted by users. In addition, you will be required to install the new certificate into the truststore of all integrated BMC applications. Creating new keystores To create a new keystore 1 Create a new keystore by using a new password to secure the certificate as follows: keytool -genkey -alias tomcat -keyalg RSA -keystore tomcatinstallationdirectory/keystore 2 After the keystore has been created, update the server.xml file with the new password for the keystore. For details, see the Tomcat documentation at ssl-howto.html#ssl and Tomcat). Locating the keystore and truststores With the BMC Atrium SSO default installation, the keystore and truststores are in the following locations:! Keystore: <installdir>/tomcat/conf/keystore.p12! Tomcat truststore: <installdir>/tomcat/conf/cacerts.p12! JVM truststore: <installdir>/jvm/jre/lib/security/cacerts Creating a keystore example The following is an example of how to create a new keystore: 38 Administration Guide

39 Creating new keystores C:\apache-tomcat >keytool -genkey -alias tomcat -keyalg RSA -keystore C:/apache-tomcat /keystore Enter keystore password: What is your first and last name? [Unknown]: sample.bmc.com What is the name of your organizational unit? [Unknown]: BMC Atrium SSO What is the name of your organization? [Unknown]: BMC Software, Inc. What is the name of your City or Locality? [Unknown]: Austin What is the name of your State or Province? [Unknown]: TX What is the two-letter country code for this unit? [Unknown]: US Is CN=sample.bmc.com, OU=BMC Atrium SSO, O="BMC Software, Inc.", L=Austin, ST=TX, C=US correct? [no]: yes Enter key password for <tomcat> (RETURN if same as keystore password): Chapter 3 Using CA certificates 39

40 BMC Atrium Single Sign-on Administration Guide

41 4 Authentication Chapter chaining The following topics are provided:! Authentication chaining overview (page 42)! Authentication chaining example (page 42) Chapter 4 Authentication chaining 41

42 BMC Atrium Single Sign-on Authentication chaining overview An Authentication Chain is the object used by BMC Atrium SSO for specifying how authentication is to be performed. A chain can be a single authentication module or a combination of multiple authentication modules. Chaining allows different modules to act as a single authority. At its simplest form, an authentication chain consists of only a single authentication module. A chain can also be a complex combination of multiple authentication modules joined to validate the credentials that are used to authenticate a user. Through chaining, different modules can be merged to appear as a single authority. For example, if two organizations merge to form a new, single organization, then the authentication system from each organization could be used as a module within a single chain.! The effect of combining these modules into this single chain is that the users only provide credentials to a single authority.! The chain can be configured to check each of the modules until the user is authenticated.! This chaining creates the perception of a merged authority despite the reality of multiple, disparate systems that are actually employed. Authentication chains allow the combination of authentication modules to process authentication requests. One of the best uses for combining modules is to merge different authentication schemes to appear as a single authentication scheme. For example, when two departments have their own LDAP servers, these two servers could be put into a single chain and users would appear to validate against a single authority. Authentication chaining example The processing of the chain to determine the overall status of authentication is controlled by the criteria specified for each of modules in the chain. The following figure illustrates authentication chaining where authentication modules are tried in an ordered sequence. Figure 4-1: Authentication chaining 42 Administration Guide

43 Authentication chaining example The overall status is successful if all of the Required and Requisite modules pass before either the end of the chain or the first successful Sufficient module. When there are no Required or Requisite modules, then at least one Sufficient or Optional module must authenticate the user. See Adding modules to chains on page 122. In the chaining process for the above example illustration, three LDAP servers combined into a single authority, would be: 1 Check with LDAP A! Pass: Stop processing and accept user! Fail: Proceed to next 2 Check with LDAP B! Pass: Stop processing and accept user! Fail: Proceed to next 3 Check with LDAP C! Pass: Stop processing and accept user! Fail: Stop processing and reject user With this configuration, the first LDAP server is presented the user credentials for authentication. If the authentication succeeds, then processing stops with the user being authenticated. If the user is not within the first LDAP server, then the credentials are passed to the second LDAP server. Each server is checked in the sequence specified until either the user passes and is considered successfully authenticated, or the user fails to authenticate and is rejected. Chapter 4 Authentication chaining 43

44 BMC Atrium Single Sign-on Administration Guide

45 5 Using Chapter LDAP for authentication The following topics are provided:! Setting up LDAP to use for authentication (page 46)! Configuring the LDAP module (page 46)! Enabling LDAP authentication (page 49) Chapter 5 Using LDAP for authentication 45

46 BMC Atrium Single Sign-on Setting up LDAP to use for authentication BMC Atrium SSO provides support for using external Lightweight Directory Access Protocol (LDAP) servers for authentication. To set up LDAP to use for authentication 1 Configure the LDAP module. 2 If you enabled SSL Access to LDAP Server on the LDAP configuration page, import the certificates and restart the Tomcat server before enabling LDAP authentication. See Using CA certificates for more information. 3 Enable LDAP authentication. Configuring the LDAP module The configuration and use of the LDAP module is described for a single BMC Atrium SSO server. By default, a single LDAP module is created and configured as part of the LDAP chain. The LDAP module must be configured for the enterprise environment. To configure the LDAP module 1 Navigate to the Authentication tab: Access Control > BmcRealm link > Authentication 2 Click the Module Instances link 3 Click the LDAP link. 4 Enter your LDAP configuration parameters and click Save. LDAP configuration parameters LDAP configuration parameters are entered on the LDAP Realm Attributes page. The LDAP page has the following options:! Save to save your modifications! Reset to remove your modifications and stay on the LDAP page.! Back to Authentication to navigate back to the Authentication tab. 46 Administration Guide

47 Configuring the LDAP module Table 5-1: LDAP module parameters Parameters Primary LDAP Server Secondary LDAP Server DN to Start User Search DN for Root User Bind Attributes Used to Retrieve User Profile Attributes Used to Search for a User to be Authenticated User Search Filter Description (Required) Enter the host s Full Qualified Domain Name (FQDN) for the primary LDAP server is required. If the LDAP server is not listening on the default port (389), suffix the host name value with a colon (:) and port number that the LDAP server is using: <host name value (FQDN)>:<port> The secondary LDAP server is only used when the primary server is not available. It is not used in parallel or when a user fails to authenticate with the primary server. If the secondary server is not listening on the default LDAP port, suffix the host name with a colon (:) and the port that is being used. <host name value (FQDN)>:<port> The amount of time that the server uses the secondary server before attempting to re-connect with the primary server can be configured. The search DNs should be as specific as possible for performance reasons. The depth of the search that is performed can be configured. If an Object search is specified, then the DN should be the DN of the node containing the users. Enter the starting locations within the LDAP directory for performing user searches. For each starting point, enter the login name (DN). (Required) The DN is the login name that is used to connect to the LDAP server. A root user must have privileges to perform searches on the primary and secondary LDAP servers. Enter the DN for the root user, the password, and the password confirmation. Attributes can be specified to retrieve user profiles. (Required) Attributes are used to identify the DN to be used for authentication within the LDAP servers. The attributes specified are used to search for the DN for the user to be authenticated. Enter an attribute to identify user names in the LDAP servers. The default attribute is uid, but if a different value is used (such as givenname), then update this value to the environment-specific attribute. More than one attribute can be used to uniquely identify a user. For example, along with a unique user ID, the user's phone number or address could also be used. In this way, users could use their phone numbers or accounts when authenticating, instead of relying solely upon a user ID. The attribute-value pairs further refines the user search for authentication. This field can be left blank (default). Chapter 5 Using LDAP for authentication 47

48 BMC Atrium Single Sign-on Table 5-1: LDAP module parameters Parameters Search Scope SSL Access to LDAP Server Return User DN To DataStore LDAP Server Check Interval Description (Required) The Search Scope determines the level that the LDAP directory searches for users to authenticate. A search scope level must be selected.! OBJECT level searches the contents of the nodes specified in the search list.! ONELEVEL level searches the specified nodes and one level below.! SUBTREE level searches the specified nodes and all sub-levels (default). The SSL Access to LDAP Server field is enabled to use SSL to connect to the LDAP servers. In addition, before communications can be established, the certificates for the LDAP servers (primary and secondary) must be loaded into the JVM truststore and the BMC Atrium SSO Tomcat truststore. If client authentication is required, the BMC Atrium SSO server s certificate might need to be imported into the LDAP server s truststore. For more information on the default truststore location, see Locating the keystore and truststores (page 38). If you are using CA signed certificates for all servers, then the root certificate, and any intermediate signer certificates, can be used to complete the trust relationships instead of the server's certificates. Note: BMC recommends that the certificates be configured before enabling LDAP authentication. See Using CA certificates for more information. If the external LDAP server uses the same structure as the internal data store, the Return User DN to Data is enabled. This condition is atypical so this option is normally not checked. When a primary LDAP server is unavailable, authentication is switched to the secondary LDAP server. The interval specifies the delay before the primary LDAP status is re-checked for availability. Enter the number of minutes before the primary LDAP status is rechecked. The default is 15 minutes.! If the interval delay value is too low, performance issues occur if BMC Atrium SSO continuously tries to reconnect (unsuccessfully). 48 Administration Guide

49 Enabling LDAP authentication Table 5-1: LDAP module parameters Parameters User Creation Attribute Authentication Level Description User creation attributes allows attributes from the external LDAP servers to be provided as attributes from the internal data store. By defining the mappings, user account data (such as telephone numbers or addresses) can be provided to BMC products. The attribute mapping is created with an internal attribute, a vertical bar (' '), and then the external attribute. The following internal attributes are available for mapping:! The user s address! Phonenumber: The user s phone number! Address: The user s mailing address! Firstname: The first name of the user! Lastname: The last name of the user! Fullname: The full name of the user, usually including middle initial BMC Atrium SSO does not employ authentication levels. Note: Do not change the Authentication Level (the default is 0) for the LDAP Module. Enabling LDAP authentication After the LDAP module is configured, specify that the LDAP module is to be used for authentication. This task involves specifying LDAP Chain as the organizational choice for authentication. NOTE Configure only the BmcRealm to use external LDAP servers. IMPORTANT If you enabled SSL Access to LDAP Server on the LDAP module configuration page, import the certificates and restart the Tomcat server. See Using CA certificates for more information. To configure LDAP realm authentication 1 On the Authentication tab for the BmcRealm, click All Core Settings. A new page is displayed. At the top of this new page is a series of radio buttons. The buttons are used to select how the user profile is handled when a user is authenticated. 2 In the User Profile field, click either Dynamic or Ignored.! Dynamic specifies that a local SSO user profile is created after a successful authentication, if it does not already exist.! Dynamic with User Alias specifies that a local SSO user profile and user alias is created for each successful authentication. Chapter 5 Using LDAP for authentication 49

50 BMC Atrium Single Sign-on ! Ignored specifies that no local SSO user profile is created or required for authentication.! Required specifies that a local SSO user profile with the same user ID is required for authentication to be successful. 3 Click Save. 4 Click Back to Authentication. 5 On the BmcRealm Authentication page, select LDAP Chain from the Organization Authentication Configuration drop down menu. 6 On the BmcRealm Authentication page, select LDAP Chain from the Administrator Authentication Configuration drop down menu. 7 Click Save. 50 Administration Guide

51 6 Using Chapter AR Server for authentication The following topics are provided:! Setting up AR to use for authentication (page 52)! Configuring the AR module (page 52)! Enabling AR authentication (page 53)! Enabling the AR data store (page 54)! Troubleshooting AR System module (page 56) Chapter 6 Using AR Server for authentication 51

52 BMC Atrium Single Sign-on Setting up AR to use for authentication The Action Request (AR) authentication module allows BMC Atrium SSO to use the user accounts within an BMC Remedy AR System server for authentication. This module is normally used in conjunction with the AR data store to retrieve group information and other user attributes from the AR server. To use AR for authentication 1 Configure the AR module. 2 Enable AR authentication. 3 Enable AR data store. Configuring the AR module The AR authentication module allows BMC Atrium SSO to use user accounts within an BMCAR Server for authentication purposes. This module should be used in conjunction with the AR data store. To configure the AR module 1 Navigate to the Authentication tab: Access Control > BmcRealm link > Authentication 2 Click the Module Instances link. 3 Click the AR link. 4 Enter the AR configuration information and Save. AR configuration parameters AR configuration information is entered on the AR Server Realm Attributes page. The AR page has the following options:! Save to save your modifications! Reset to remove your modifications and stay on the AR page.! Back to Authentication to navigate back to the Authentication tab. 52 Administration Guide

53 Enabling AR authentication Table 6-1: AR module parameters Parameters AR Server Host Name AR Server Port Number Default Authentication String Allow AR Guests Authentication Level Description (Required) Provide the Full Qualified Domain Name (FQDN) for the server where AR Server is located The full host name includes the domain name of the computer and the individual name of the server. For example, the domain is bmc.com and the host name is sample. (Required) AR Server Port Number is the location where the AR Server is listening. Note: Enter a value of 0 if the AR Server is using port mapping. This string is only used when the AR module is placed downstream in a chain from another authentication module which prompts the user only for a name and password. In this scenario, this value is used to authenticate the user by reusing the credentials provided by the user along with this authentication string. If enabled, allows unknown or invalid users to authenticate as guests to the AR Server. (Required) Authentication Level is used to identify the level of authentication provided by the AR module. In normal BMC Atrium SSO usage, this value is ignored and should be left with the default value 0. Enabling AR authentication After the AR module is configured, specify that the AR module be used for user authentication. This task involves specifying the AR Chain as the organizational choice for authentication. 1 On the BmcRealm Authentication page, select AR Chain from the Organization Authentication Configuration drop down menu. 2 On the BmcRealm Authentication page, select AR Chain from the Administrator Authentication Configuration drop down menu. 3 Click Save. 4 On the BmcRealm Authentication tab, click All Core Settings. A new page is displayed. At the top of this new page are a series of radio buttons which are used to select how the user profile is handled when a user is authenticated. 5 In the User Profile field, click either Dynamic or Ignored.! Dynamic specifies that a local SSO user profile is created after a successful authentication, if it does not already exist. Chapter 6 Using AR Server for authentication 53

54 BMC Atrium Single Sign-on ! Dynamic with User Alias specifies that a local SSO user profile and user alias is created for each successful authentication.! Ignored specifies that no local SSO user profile is created or required for authentication.! Required specifies that a local SSO user profile with the same user ID is required for authentication to be successful. 6 Click Save. Enabling the AR data store The AR data store plug-in allows group information associated with AR Server users to be retrieved and provided to BMC products. The data store is designed to be used with the AR authentication module because it provides additional information for users authenticated against the AR Server. NOTE The AR data store provides read-only access to AR Server. The data store provides the following capabilities:! Read-only access to the user information stored in AR Server.! Displays user and group lists and memberships. The following capabilities are not provided:! User management functionality! Assigning group information that is retrieved from the AR Server to users that exist in another data store (for example, the internal data store)! Saving changes involving information retrieved from the AR Server Accessing the AR data store configuration page To configure the AR data store, you must have the server location and an administrator account. The AR data store information is provided on the Data Store configuration page. To access the Data Stores page 1 Navigate to: Access Control > BmcRealm link > Data Stores tab If a data store exists 1 Click the data store link to configure the data store. 54 Administration Guide

55 Enabling the AR data store 2 Configure the AR data store. 3 Click Save. If a data store does not exist 1 Click New. 2 In the Name field, enter a name for a new data store. 3 In the Type field, click AR Server as the data store type. 4 To configure the data store, click Next. 5 Click Finish. Configuring the AR data store The AR Data Store configuration page is used for both editing an existing data store s parameters and for creating a new AR data store. The AR Data Stores configuration page has the following options:! Save to save your modifications! Reset to remove your modifications and stay on the LDAP page.! Back to Data Stores to navigate back to the Authentication tab. After configuration is finished, the data store is immediately available to provide group information to users who are authenticating with the AR Authentication module. Table 6-2: AR data store parameters Parameters AR Server Host Name AR Server Port Number Administrator Name Description (Required) Provide the Fully Qualified Domain Name (FQDN) of the AR Server host server. The full host name includes the domain name of the machine along with the individual name of the server. In this example, the domain is bmc.com and the host name is sample. (Required) Provide the port number where the AR Server is listening. Enter a value of 0 if the AR Server is using port mapping. (Required) Provide the user name of an AR Server account that has administrator privileges, the password for the AR Server administrator account, and the password confirmation. Note: Empty or blank passwords for the AR administrator are not supported, however, a single space character can be used. For example, the default AR administrator account is Demo with no password. Authentication Pool Size Provide the authentication string that is needed when the Administrator account is used to connect with the AR Server. (Required) The Pool Size is the maximum number of connections the data store uses to service data requests for the AR Server. Chapter 6 Using AR Server for authentication 55

56 BMC Atrium Single Sign-on Table 6-2: AR data store parameters Parameters Linger Time AR Server Plug-in Description (Required) Linger Time is the amount of time (in milliseconds) that a connection is allowed to remain unused in the pool before being closed. (Required) The AR Server Plug-in parameter is the class that implements this plug-in and must not be changed. Note: Do not change the AR Server Plug-in parameter. New data store configuration example Figure 6-1: New Data Store configuration example Troubleshooting AR System module This section contains information on troubleshooting your AR System authentication module. 56 Administration Guide

White Paper BMC Remedy Action Request System Security

White Paper BMC Remedy Action Request System Security White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information

More information

BMC Impact Solutions Infrastructure Management Guide

BMC Impact Solutions Infrastructure Management Guide BMC Impact Solutions Infrastructure Management Guide Supporting BMC Impact Manager version 7.3 BMC Impact Administration Server 7.3 BMC Impact Explorer version 7.3 BMC Impact Portal version 7.3 February

More information

PATROL Console Server and RTserver Getting Started

PATROL Console Server and RTserver Getting Started PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.

More information

BMC Remedy IT Service Management Suite 7.6.04 Installing and Configuring Server Groups

BMC Remedy IT Service Management Suite 7.6.04 Installing and Configuring Server Groups BMC Remedy IT Service Management Suite 7.6.04 Installing and Configuring Server Groups January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From

More information

BMC Performance Manager Portal Monitoring and Management Guide

BMC Performance Manager Portal Monitoring and Management Guide BMC Performance Manager Portal Monitoring and Management Guide Supporting BMC Performance Manager Portal 2.7 Remote Service Monitor 2.7 April 2009 www.bmc.com Contacting BMC Software You can access the

More information

IBM WebSphere Application Server Version 7.0

IBM WebSphere Application Server Version 7.0 IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

BMC BladeLogic Client Automation Installation Guide

BMC BladeLogic Client Automation Installation Guide BMC BladeLogic Client Automation Installation Guide Supporting BMC BladeLogic Client Automation 8.2.02 January 2013 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.

More information

Embarcadero Performance Center 2.7 Installation Guide

Embarcadero Performance Center 2.7 Installation Guide Embarcadero Performance Center 2.7 Installation Guide Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco, CA 94111 U.S.A.

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

CA NetQoS Performance Center

CA NetQoS Performance Center CA NetQoS Performance Center Install and Configure SSL for Windows Server 2008 Release 6.1 (and service packs) This Documentation, which includes embedded help systems and electronically distributed materials,

More information

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2

HYPERION SYSTEM 9 N-TIER INSTALLATION GUIDE MASTER DATA MANAGEMENT RELEASE 9.2 HYPERION SYSTEM 9 MASTER DATA MANAGEMENT RELEASE 9.2 N-TIER INSTALLATION GUIDE P/N: DM90192000 Copyright 2005-2006 Hyperion Solutions Corporation. All rights reserved. Hyperion, the Hyperion logo, and

More information

TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation

TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation TIBCO ActiveMatrix BusinessWorks Plug-in for TIBCO Managed File Transfer Software Installation Software Release 6.0 November 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS

More information

EVALUATION ONLY. WA2088 WebSphere Application Server 8.5 Administration on Windows. Student Labs. Web Age Solutions Inc.

EVALUATION ONLY. WA2088 WebSphere Application Server 8.5 Administration on Windows. Student Labs. Web Age Solutions Inc. WA2088 WebSphere Application Server 8.5 Administration on Windows Student Labs Web Age Solutions Inc. Copyright 2013 Web Age Solutions Inc. 1 Table of Contents Directory Paths Used in Labs...3 Lab Notes...4

More information

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac) CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Web Application Security Assessment and Vulnerability Mitigation Tests

Web Application Security Assessment and Vulnerability Mitigation Tests White paper BMC Remedy Action Request System 7.6.04 Web Application Security Assessment and Vulnerability Mitigation Tests January 2011 www.bmc.com Contacting BMC Software You can access the BMC Software

More information

FileMaker Server 14. FileMaker Server Help

FileMaker Server 14. FileMaker Server Help FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks

More information

CA Spectrum and CA Service Desk

CA Spectrum and CA Service Desk CA Spectrum and CA Service Desk Integration Guide CA Spectrum 9.4 / CA Service Desk r12 and later This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

HP Business Availability Center

HP Business Availability Center HP Business Availability Center for the Windows and Solaris operating systems Software Version: 8.05 Business Process Monitor Administration Document Release Date:September 2010 Software Release Date:

More information

Control-M for Hadoop. Technical Bulletin. www.bmc.com

Control-M for Hadoop. Technical Bulletin. www.bmc.com Technical Bulletin Control-M for Hadoop Version 8.0.00 September 30, 2014 Tracking number: PACBD.8.0.00.004 BMC Software is announcing that Control-M for Hadoop now supports the following: Secured Hadoop

More information

TIBCO Hawk SNMP Adapter Installation

TIBCO Hawk SNMP Adapter Installation TIBCO Hawk SNMP Adapter Installation Software Release 4.9.0 November 2012 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR

More information

Knowledge Article Performance Comparison: BMC Remedy ITSM Incident Management version 7.5.00 Vs. 7.0.03 on Windows

Knowledge Article Performance Comparison: BMC Remedy ITSM Incident Management version 7.5.00 Vs. 7.0.03 on Windows Knowledge Article Performance Comparison: BMC Remedy ITSM Incident Management version 7.5.00 Vs. 7.0.03 on Windows April 2009 www.bmc.com Contacting BMC Software You can access the BMC Software website

More information

How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal 1.1.3 On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (

How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal 1.1.3 On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected ( Avaya one X Portal 1.1.3 Lightweight Directory Access Protocol (LDAP) over Secure Socket Layer (SSL) Configuration This document provides configuration steps for Avaya one X Portal s 1.1.3 communication

More information

Novell Access Manager

Novell Access Manager J2EE Agent Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 J2EE Agent Guide Legal Notices Novell, Inc., makes no representations

More information

OpenAM. 1 open source 1 community experience distilled. Single Sign-On (SSO) tool for securing your web. applications in a fast and easy way

OpenAM. 1 open source 1 community experience distilled. Single Sign-On (SSO) tool for securing your web. applications in a fast and easy way OpenAM Written and tested with OpenAM Snapshot 9 the Single Sign-On (SSO) tool for securing your web applications in a fast and easy way Indira Thangasamy [ PUBLISHING 1 open source 1 community experience

More information

NetIQ Identity Manager Setup Guide

NetIQ Identity Manager Setup Guide NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

BMC Remedy Integration Guide 7.6.04

BMC Remedy Integration Guide 7.6.04 BMC Remedy Integration Guide 7.6.04 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008

Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials

More information

TIBCO Runtime Agent Domain Utility User s Guide Software Release 5.8.0 November 2012

TIBCO Runtime Agent Domain Utility User s Guide Software Release 5.8.0 November 2012 TIBCO Runtime Agent Domain Utility User s Guide Software Release 5.8.0 November 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO

More information

JAMF Software Server Installation Guide for Windows. Version 8.6

JAMF Software Server Installation Guide for Windows. Version 8.6 JAMF Software Server Installation Guide for Windows Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate.

More information

AVG Business SSO Connecting to Active Directory

AVG Business SSO Connecting to Active Directory AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud

More information

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual

TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

SMART Vantage. Installation guide

SMART Vantage. Installation guide SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the

More information

Identikey Server Windows Installation Guide 3.1

Identikey Server Windows Installation Guide 3.1 Identikey Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

CA SiteMinder. SAML Affiliate Agent Guide. 6.x QMR 6

CA SiteMinder. SAML Affiliate Agent Guide. 6.x QMR 6 CA SiteMinder SAML Affiliate Agent Guide 6.x QMR 6 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

CA SiteMinder. Web Agent Installation Guide for IIS 12.51

CA SiteMinder. Web Agent Installation Guide for IIS 12.51 CA SiteMinder Web Agent Installation Guide for IIS 12.51 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation

More information

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V

Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com

More information

SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014]

SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014] SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014] Table of Contents 1. CONFIGURING SSL ON ORACLE WEBLOGIC... 1-1 1.1 INTRODUCTION... 1-1 1.2 SETTING UP

More information

Tivoli Access Manager Agent for Windows Installation Guide

Tivoli Access Manager Agent for Windows Installation Guide IBM Tivoli Identity Manager Tivoli Access Manager Agent for Windows Installation Guide Version 4.5.0 SC32-1165-03 IBM Tivoli Identity Manager Tivoli Access Manager Agent for Windows Installation Guide

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

IDENTIKEY Server Windows Installation Guide 3.2

IDENTIKEY Server Windows Installation Guide 3.2 IDENTIKEY Server Windows Installation Guide 3.2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED.

Portions of this product were created using LEADTOOLS 1991-2009 LEAD Technologies, Inc. ALL RIGHTS RESERVED. Installation Guide Lenel OnGuard 2009 Installation Guide, product version 6.3. This guide is item number DOC-110, revision 1.038, May 2009 Copyright 1992-2009 Lenel Systems International, Inc. Information

More information

Use Enterprise SSO as the Credential Server for Protected Sites

Use Enterprise SSO as the Credential Server for Protected Sites Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured

More information

Introduction to Mobile Access Gateway Installation

Introduction to Mobile Access Gateway Installation Introduction to Mobile Access Gateway Installation This document describes the installation process for the Mobile Access Gateway (MAG), which is an enterprise integration component that provides a secure

More information

026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide

026-1010 Rev 7 06-OCT-2011. Site Manager Installation Guide 026-1010 Rev 7 06-OCT-2011 Site Manager Installation Guide Retail Solutions 3240 Town Point Drive NW, Suite 100 Kennesaw, GA 30144, USA Phone: 770-425-2724 Fax: 770-425-9319 Table of Contents 1 SERVER

More information

Backup Exec 15. Quick Installation Guide

Backup Exec 15. Quick Installation Guide Backup Exec 15 Quick Installation Guide 21344987 Documentation version: 15 PN: 21344987 Legal Notice Copyright 2015 Symantec Corporation. All rights reserved. Symantec, the Symantec Logo, the Checkmark

More information

Polycom CMA System Upgrade Guide

Polycom CMA System Upgrade Guide Polycom CMA System Upgrade Guide 5.0 May 2010 3725-77606-001C Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or

More information

Installation & Configuration Guide

Installation & Configuration Guide Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks

More information

SysPatrol - Server Security Monitor

SysPatrol - Server Security Monitor SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or

More information

Integration for BMC Remedy Service Desk

Integration for BMC Remedy Service Desk Integration for BMC Remedy Service Desk User Guide Supporting Integration for BMC Remedy Service Desk 7.3.01 BMC Impact Manager 7.3.01 BMC Remedy Service Desk 7.3.01 BMC ProactiveNet Performance Management

More information

Active Directory Adapter with 64-bit Support Installation and Configuration Guide

Active Directory Adapter with 64-bit Support Installation and Configuration Guide IBM Security Identity Manager Version 6.0 Active Directory Adapter with 64-bit Support Installation and Configuration Guide SC27-4384-02 IBM Security Identity Manager Version 6.0 Active Directory Adapter

More information

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

RSA Authentication Manager 8.1 Virtual Appliance Getting Started RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides

More information

CA Nimsoft Unified Management Portal

CA Nimsoft Unified Management Portal CA Nimsoft Unified Management Portal HTTPS Implementation Guide 7.6 Document Revision History Document Version Date Changes 1.0 June 2014 Initial version for UMP 7.6. CA Nimsoft Monitor Copyright Notice

More information

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management

Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo

More information

Oracle Fusion Middleware. 1 Oracle Team Productivity Center Server System Requirements. 2 Installing the Oracle Team Productivity Center Server

Oracle Fusion Middleware. 1 Oracle Team Productivity Center Server System Requirements. 2 Installing the Oracle Team Productivity Center Server Oracle Fusion Middleware Installation Guide for Oracle Team Productivity Center Server 11g Release 2 (11.1.2.1.0) E17075-02 September 2011 This document provides information on: Section 1, "Oracle Team

More information

XenClient Enterprise Synchronizer Installation Guide

XenClient Enterprise Synchronizer Installation Guide XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V

More information

Exchange Reporter Plus SSL Configuration Guide

Exchange Reporter Plus SSL Configuration Guide Exchange Reporter Plus SSL Configuration Guide Table of contents Necessity of a SSL guide 3 Exchange Reporter Plus Overview 3 Why is SSL certification needed? 3 Steps for enabling SSL 4 Certificate Request

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Networking Best Practices Guide. Version 6.5

Networking Best Practices Guide. Version 6.5 Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form

More information

Symantec LiveUpdate Administrator. Getting Started Guide

Symantec LiveUpdate Administrator. Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide Symantec LiveUpdate Administrator Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

UserGuide ReflectionPKIServicesManager

UserGuide ReflectionPKIServicesManager UserGuide ReflectionPKIServicesManager User Guide Reflection PKI Services Manager version 1.3.1 Copyrights and Notices Copyright 2015 Attachmate Corporation. All rights reserved. No part of the documentation

More information

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014

DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...

More information

FileMaker Server 11. FileMaker Server Help

FileMaker Server 11. FileMaker Server Help FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered

More information

CA Spectrum and CA Embedded Entitlements Manager

CA Spectrum and CA Embedded Entitlements Manager CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically

More information

Enabling SSL and Client Certificates on the SAP J2EE Engine

Enabling SSL and Client Certificates on the SAP J2EE Engine Enabling SSL and Client Certificates on the SAP J2EE Engine Angel Dichev RIG, SAP Labs SAP AG 1 Learning Objectives As a result of this session, you will be able to: Understand the different SAP J2EE Engine

More information

BMC Software Webinars 2013 Atrium Single Sign On (Atrium SSO)

BMC Software Webinars 2013 Atrium Single Sign On (Atrium SSO) BMC Software Webinars 2013 Atrium Single Sign On (Atrium SSO) An introduction Vincent Lasfargues Atrium Customer Engineering Contributors: John Stamps, Murali Balijepally, Karl Miller, Rahul Vedak, Volodymyr

More information

JAMF Software Server Installation Guide for Linux. Version 8.6

JAMF Software Server Installation Guide for Linux. Version 8.6 JAMF Software Server Installation Guide for Linux Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate.

More information

Integrating EJBCA and OpenSSO

Integrating EJBCA and OpenSSO Integrating EJBCA and OpenSSO EJBCA is an Enterprise PKI Certificate Authority issuing certificates to users, servers and devices. In an organization certificate can be used for strong authentication.

More information

Oracle WebCenter Content Service for Microsoft Exchange

Oracle WebCenter Content Service for Microsoft Exchange Oracle WebCenter Content Service for Microsoft Exchange Installation and Upgrade Guide 10g Release 3 (10.3) November 2008 Oracle WebCenter Content Service for Microsoft Exchange Installation and Upgrade

More information

Pearl Echo Installation Checklist

Pearl Echo Installation Checklist Pearl Echo Installation Checklist Use this checklist to enter critical installation and setup information that will be required to install Pearl Echo in your network. For detailed deployment instructions

More information

Sophos Mobile Control Installation guide. Product version: 3.5

Sophos Mobile Control Installation guide. Product version: 3.5 Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External

More information

RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware

RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware Contact Information Go to the RSA corporate website for regional Customer Support telephone

More information

Installation Instruction STATISTICA Enterprise Server

Installation Instruction STATISTICA Enterprise Server Installation Instruction STATISTICA Enterprise Server Notes: ❶ The installation of STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation installations on each of

More information

Installation Instruction STATISTICA Enterprise Small Business

Installation Instruction STATISTICA Enterprise Small Business Installation Instruction STATISTICA Enterprise Small Business Notes: ❶ The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b) workstation installations

More information

CA SiteMinder. Web Agent Installation Guide for IIS. r12.5

CA SiteMinder. Web Agent Installation Guide for IIS. r12.5 CA SiteMinder Web Agent Installation Guide for IIS r12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Oracle Enterprise Single Sign-on Logon Manager. Installation and Setup Guide Release 11.1.1.2.0 E15720-02

Oracle Enterprise Single Sign-on Logon Manager. Installation and Setup Guide Release 11.1.1.2.0 E15720-02 Oracle Enterprise Single Sign-on Logon Manager Installation and Setup Guide Release 11.1.1.2.0 E15720-02 November 2010 Oracle Enterprise Single Sign-on Logon Manager, Installation and Setup Guide, Release

More information

LifeSize Control Installation Guide

LifeSize Control Installation Guide LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every

More information

Universal Content Management Version 10gR3. Security Providers Component Administration Guide

Universal Content Management Version 10gR3. Security Providers Component Administration Guide Universal Content Management Version 10gR3 Security Providers Component Administration Guide Copyright 2008 Oracle. All rights reserved. The Programs (which include both the software and documentation)

More information

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.

Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved. Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,

More information

Installation and Configuration Guide for Windows and Linux

Installation and Configuration Guide for Windows and Linux Installation and Configuration Guide for Windows and Linux vcenter Operations Manager 5.0.3 This document supports the version of each product listed and supports all subsequent versions until the document

More information

Application Servers - BEA WebLogic. Installing the Application Server

Application Servers - BEA WebLogic. Installing the Application Server Proven Practice Application Servers - BEA WebLogic. Installing the Application Server Product(s): IBM Cognos 8.4, BEA WebLogic Server Area of Interest: Infrastructure DOC ID: AS01 Version 8.4.0.0 Application

More information

DocuShare Installation Guide

DocuShare Installation Guide DocuShare Installation Guide Publication date: February 2011 This document supports DocuShare Release 6.6.1 Prepared by: Xerox Corporation DocuShare Business Unit 3400 Hillview Avenue Palo Alto, California

More information

CA SiteMinder Secure Proxy Server

CA SiteMinder Secure Proxy Server CA SiteMinder Secure Proxy Server Administration Guide 12.52 SP1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS

STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS STATISTICA VERSION 12 STATISTICA ENTERPRISE SMALL BUSINESS INSTALLATION INSTRUCTIONS Notes 1. The installation of STATISTICA Enterprise Small Business entails two parts: a) a server installation, and b)

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Chapter 1: How to Configure Certificate-Based Authentication

Chapter 1: How to Configure Certificate-Based Authentication Chapter 1: How to Configure Certificate-Based Authentication Introduction Product: CA ControlMinder Release: All OS: All This scenario describes how a system or a CA ControlMinder administrator configures

More information

Installing and Configuring Adobe LiveCycle 9.5 Connector for Microsoft SharePoint

Installing and Configuring Adobe LiveCycle 9.5 Connector for Microsoft SharePoint What s new Installing and Configuring Adobe LiveCycle 9.5 Connector for Microsoft SharePoint Contents Introduction What s new on page 1 Introduction on page 1 Installation Overview on page 2 System requirements

More information

Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles

Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles Appendix 1 Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles This section explains how you use the Cloud Management Suite installation wizard for the following purposes: To

More information

SOA Software API Gateway Appliance 7.1.x Administration Guide

SOA Software API Gateway Appliance 7.1.x Administration Guide SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,

More information

CONTROL-M/Enterprise Manager API Developer Guide

CONTROL-M/Enterprise Manager API Developer Guide CONTROL-M/Enterprise Manager API Developer Guide Supporting CONTROL-M/Enterprise Manager version 6.4.01 September 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.

More information

SSO Plugin. Installation for BMC AR System and WUT. J System Solutions. http://www.javasystemsolutions.com Version 3.4

SSO Plugin. Installation for BMC AR System and WUT. J System Solutions. http://www.javasystemsolutions.com Version 3.4 SSO Plugin Installation for BMC AR System and WUT J System Solutions http://www.javasystemsolutions.com Version 3.4 Table of Contents Introduction... 4 Compatibility... 5 Mixing versions of SSO Plugin...5

More information

WhatsUp Gold v16.1 Installation and Configuration Guide

WhatsUp Gold v16.1 Installation and Configuration Guide WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

CA Harvest Software Change Manager

CA Harvest Software Change Manager CA Harvest Software Change Manager Implementation Guide Release 12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information