Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory

Size: px
Start display at page:

Download "Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory"

Transcription

1 W H I T E P A P E R C E N T R I F Y C O R P. M A Y 2008 Single Sign-On for SAP R/3 on UNIX with Centrify DirectControl and Microsoft Active Directory The Active Directory-Based Single Sign-On Solution for SAP R/3 A B S T R A C T Many of the largest, most recognizable and successful organizations use SAP R/3. But to the end-users within those organizations who need access to SAP R/3, this means yet another username and password they have to remember and constantly enter and re-enter. To IT managers, SAP R/3 represents yet another authentication and identity store to manage. In addition, given the sensitive nature of the data stored in SAP R/3 systems, there is a compelling need from both a security and compliance perspective to ensure that communication and access to that sensitive data is done in a highly secure manner. In most organizations, Microsoft s Active Directory is now the de facto standard for providing authentication and identity management for Windows systems and applications. Centrify s DirectControl extends Active Directory s reach to UNIX, Linux, Mac, Java/web and database environments. Centrify DirectControl for SAP goes one step farther by enabling Active Directory-based single sign-on for SAP R/3. This means Windows users using SAP GUI and non-windows users using SAP Java client can enter their Active Directory credentials to access SAP R/3 running on UNIX or Linux without having to remember or re-enter another username and password. And auditors and security professionals can feel safe that access to SAP R/3 is more secure due to DirectControl s use of Kerberos. This white paper describes how Centrify DirectControl for SAP delivers single sign-on capabilities for SAP R/3 and how this ability translates into major benefits in the form of increased security, ease of use and enterprise readiness.

2 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the example companies, organizations, products, domain names, e- mail addresses, logos, people, places and events depicted herein are fictitious, and no association with any real company, organization, product, domain name, address, logo, person, place or event is intended or should be inferred. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in or introduced into a retrieval system, or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise), or for any purpose, without the express written permission of Centrify Corporation. Centrify may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Centrify, the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or other intellectual property Centrify Corporation. All rights reserved. Centrify is a registered trademark, and DirectControl and DirectAudit are trademarks of Centrify Corporation. Microsoft, Active Directory, Windows, Windows NT, and Windows Server are either registered trademarks or trademarks of Microsoft Corporation in the United States and/or other countries. Other names used are trademarks of their respective companies The names of actual companies and products mentioned herein may be the trademarks of their respective owners. WP CENTRIFY CORPORATION ALL RIGHTS RESERVED. PAGE II

3 Contents 1 Introduction Challenges with SAP Authentication Addressing SAP Authentication Challenges with DirectControl for SAP The Centrify DirectControl Solution SAP Secure Network Communications (BC-SNC) Overview Enterprise Readiness SAP and DirectControl Integration: Step-by-Step Join the SAP Server to Active Directory with DirectControl Configure Service and Kerberos Configure SNC on the SAP Server Configure the SAP Client Single Sign-On Using SNC, Kerberos and Active Directory Summary How to Contact Centrify...12 CENTRIFY CORPORATION ALL RIGHTS RESERVED. PAGE III

4 1 Introduction Centrify DirectControl delivers secure access control and centralized identity management by seamlessly integrating your UNIX, Linux, Mac, web and database platforms with Microsoft Active Directory. DirectControl effectively turns a non- Microsoft system into an Active Directory client, enabling you to secure that system using the same authentication, authorization and Group Policy services currently deployed for your Windows systems. With its patent-pending Zone technology, Centrify delivers the only solution that does not require intrusive reconfiguration of existing systems and provides the granular administrative control needed to securely manage a diverse set of systems and applications. With DirectControl, you can fully leverage your investment in Active Directory to address regulatory compliance, strengthen security, and enhance IT and end-user efficiency and productivity. Centrify DirectControl for SAP enables Active Directory-based single sign-on to SAP R/3 servers running on a UNIX or Linux system. This means users who access SAP R/3 via the SAP GUI client application on Windows workstations and/or via the SAP Java client on non-windows workstations can access the desired SAP business application using their Active Directory user credentials. DirectControl enables this capability via integration with SAP s Secure Network Communication (SNC) interface. Key benefits of Centrify DirectControl for SAP include the ability to: Increase user satisfaction and reduce user/password-related support calls by providing users with single sign-on (SSO) access to SAP R/3 through their Active Directory credentials. Increase security by allowing IT administrators to disable access not only to Windows but also to DirectControl-managed systems and applications such as SAP via a single management tool Microsoft Active Directory. Enforce consistent password and other security policies using familiar Active Directory tools. Implement encrypted communication between the SAP client and the SAP R/3 server via DirectControl s use of Kerberos. Deploy without intrusive changes to Active Directory. Simplify compliance with regulatory requirements. Maximize your existing investment in Active Directory. Before discussing the details of the DirectControl for SAP solution, let s first discuss some of the challenges of SAP authentication. CENTRIFY CORPORATION ALL RIGHTS RESERVED. PAGE 1

5 2 Challenges with SAP Authentication SAP R/3 is a mature technology that has been widely used in many organizations for many years. However, SAP provides many approaches to securing communication and authenticating end-users to SAP R/3. Understanding and choosing the right approach can be a confusing and difficult process, often requiring external consulting time and rationalization with existing security policies and architecture. With the standard SAPdefined username and password approach to authentication (which is the default deployment option with SAP R/3), SAP administrators may find that this approach has some shortcomings when compared to more secure approaches provided by commercial security software: Additional usernames and passwords have to be defined and managed in SAP. This creates a hassle both for end-users, who need to remember another username and password, and for IT and SAP administrators, who need to deal with password resets and user account lockouts. Additional usernames and passwords also create security vulnerability, as end-users often write down their username and password in order to remember them. Another security concern arises when end-users leave an organization. Their user account in SAP (and in Active Directory, and in every system and application they are provisioned into) needs to be at least deactivated if not completely deprovisioned. Administrators would prefer to make deprovisioning a periodic task and not a security issue requiring expensive and complex software and processes that exist just to manage identities throughout their lifecycle. Microsoft provides basic information on how to integrate SAP with Active Directory if the R/3 server is installed on Windows Server. This is of little help to the majority of SAP R/3 customers who have deployed on AIX, HP-UX, Solaris or a flavor of Linux. Alternatives to using basic username and password authentication for SAP servers installed on UNIX or Linux include: Complex and expensive public key infrastructure (PKI) providing access via SSL and X.509 client certificates. Pluggable Authentication Modules ( PAM ) to leverage the UNIX operating system credentials. While the PAM approach can be integrated with Active Directory using DirectControl for Systems, this is less than an ideal solution because it challenges end-users to re-enter their Active Directory username and password, depriving them of the SSO login experience. Other challenges arise when organizations need enterprise-quality end-to-end support. For example, Microsoft will support the Windows client side for SSO and authentication, but does not provide support services for UNIX. CENTRIFY CORPORATION ALL RIGHTS RESERVED. PAGE 2

6 Other higher-end enterprise features such as cross-domain authentication, failover support for NTLM, domain controller failover support, large group-based access control, and access rights reporting are simply not supported with most other approaches. Based on feedback from SAP R/3 users who needed true enterprise-level SSO capabilities for working with Active Directory, Centrify has built a dedicated solution that extends DirectControl to SAP R/3. 3 Addressing SAP Authentication Challenges with DirectControl for SAP In order to address the challenge of providing a more secure, Active Directory-centric SSO solution for SAP, Centrify provides a solution that consists of the following components: DirectControl for Systems. Centrify DirectControl delivers secure access control and centralized identity management by seamlessly integrating your UNIX, Linux, Mac, Java/web and database platforms with Microsoft Active Directory. The DirectControl Agent effectively turns a non-microsoft system into an Active Directory client, enabling you to secure that system using the same operating system-level authentication, authorization and Group Policy services currently deployed for your Windows systems. DirectControl is non-intrusive, easy to deploy and manage, and is the only solution that enables fine-grained operating system access control through its unique Zone technology. SAP Secure Network Communication. SAP provides a standard layer for SAP R/3 to integrate and interface with third-party security software called SNC (Secure Network Communication). SNC enables a secure connection between SAP clients, servers and services. This layer is designed to allow third-party security software providers to cleanly and comprehensively integrate with SAP R/3 to provide security services such as SSO authentication. In fact, SNC is being developed in the Internet Engineering Task Force (IETF), an international standards body. DirectControl for SAP. The DirectControl for SAP module is an extension of SNC providing single sign-on for an SAP client based on the exchange of Kerberos tickets. By implementing the Generic Security Services API (GSS-API), DirectControl for SAP provides the necessary SNC extensions to enable Kerberos ticket exchange from the SAP client to the SAP server. Additional security, including signing and encrypting of data that is communicated between the SAP client and server, is provided by leveraging these Kerberos tickets. Solution Documentation. DirectControl for SAP includes an installation and deployment guide. There is also guidance related to configuring your SAP R/3 server, SNC environment and SAP clients (SAPgui and SAPjava.) CENTRIFY CORPORATION ALL RIGHTS RESERVED. PAGE 3

7 Solution Support. Licensed Centrify customers who have maintenance contracts and are running Centrify DirectControl for SAP R/3 can get support for the integration of DirectControl with SAP R/3. By packaging the DirectControl Agent for the operating system and SAP SNC, along with installation and configuration documentation of the DirectControl and SAP products into a single comprehensive solution, Centrify delivers a true SAP R/3 single sign-on solution and better interoperability with your enterprise. Not only do you get a finished product that works you know who to contact if you encounter problems. In addition, Centrify addresses a number of issues related to central user attribute storage, enterprise functionality and complete integration with Active Directory, as mentioned earlier in this paper. Let s take a look at these components in more detail. 3.1 The Centrify DirectControl Solution Centrify DirectControl delivers secure access control and centralized identity management by seamlessly integrating your UNIX, Linux, Mac and web platforms with Microsoft Active Directory. DirectControl effectively turns a non-microsoft system into an Active Directory client, enabling you to secure that system using the same authentication, authorization and Group Policy services currently deployed for your Windows systems. DirectControl is non-intrusive, easy to deploy and manage, and is the only solution that enables fine-grained access control through its unique Zone technology. DirectControl also supports strong Kerberos-based Active Directory authentication for databases such as IBM s DB2 and Informix, and for enterprise applications such as SAP. While many of these platforms offer some type of Kerberos support, setting up and administering the Kerberos service to talk with Active Directory securely and reliably can be a complex task on non-microsoft platforms. With the DirectControl Agent installed, the host platform becomes Active Directory-aware and can take advantage of active Directory services such as automatic updates of Keytab files and Keytab versioning, automatic time synchronization with Active Directory, local caching for disconnected mode, and dynamic DNS support that greatly simplify initial configuration and provide a much higher degree of maintainability and reliability. The end result is cross-platform and cross-application single sign-on as shown by Figure 1. CENTRIFY CORPORATION ALL RIGHTS RESERVED. PAGE 4

8 Figure 1. Centrify eliminates the need for multiple Access Control, Identity and Policy Management solutions in the distributed environment by consolidating management in Microsoft Active Directory: one user, one account, one directory, one policy mechanism. The DirectControl suite is comprised of two main architectural components that seamlessly integrate with your Active Directory infrastructure: On UNIX, Linux and Mac systems, a DirectControl Agent is installed on each server or workstation. The DirectControl Agent, which is natively compiled for each platform, effectively turns the host system into an Active Directory client, enabling you to secure that system using the same authentication, access control and Group Policy services currently deployed for your Windows systems. The agent is not a single piece of code; rather, it is a central service that interacts with a set of seamlessly integrated modules that provide services such as web and database single sign-on and Samba integration. UNIX administrators have a comprehensive command-line interface for real-time or scripted interaction with Active Directoryheld data. The DirectControl Management Tools enable both Windows and UNIX administrators to manage UNIX-specific data stored in Active Directory. The Windows tools consist of a Microsoft Management Console (MMC) application for all administrative tasks and centralized reporting and license management. Property extensions to the Active Directory Users and Computers MMC are also provided, and DirectControl s UNIX/Linux/Mac policies are fully integrated into the standard Group Policy Editor. A browser-based management console also provides crossplatform access to essential administrative tasks. CENTRIFY CORPORATION ALL RIGHTS RESERVED. PAGE 5

9 3.2 SAP Secure Network Communications (BC-SNC) Overview SAP provides a standard layer for SAP R/3 and ERP to integrate and interface with thirdparty security software called SNC (Secure Network Communication). SNC protects the communication between SAP components (client, router, application server, etc.). By leveraging SNC you can extend the basic user and password authentication used by SAP to include the protection and benefits of Centrify DirectControl and Active Directory. SNC is also being developed in the Internet Engineering Task Force (IETF), an international standards body. The primary integration point with SNC is via the GSSAPI v2 (Generic Security Services Application Programming Interface version 2). Centrify DirectControl provides support for integration via Kerberos and the GSSAPI as depicted below: Figure 2. Centrify DirectControl integration with SAP. In addition to providing an interface to authenticate users via DirectControl, SNC also allow higher levels of security through the configuration of communication integrity (ensuring that communication has not been tampered or altered) as well as communication encryption (ensuring that communication is secure in transit). 3.3 Enterprise Readiness In addition, DirectControl for SAP supports a number of enterprise features that are not found in other similar solutions. Full Support for Active Directory Policies. DirectControl for SAP talks directly to Active Directory; therefore, all native Active Directory features are supported. This includes support for a centrally managed password policy and flexible user-naming conventions of Active Directory. Cross-Domain Authentication. Users who are authenticated members of a remote domain can access an SAP server joined to another domain if the appropriate cross-domain trust relationship has been established. This occurs without the user being prompted for credentials. This is the same behavior that users would expect in an all-windows environment. CENTRIFY CORPORATION ALL RIGHTS RESERVED. PAGE 6

10 Gold Standard Kerberos: Leveraging the MIT reference implementation of Kerberos, DirectControl delivers the most compatible and mature approach to Kerberos-based Active Directory authentication for enterprise applications such as SAP. While many platforms offer some type of Kerberos support, setting up and administering the Kerberos service to talk with Active Directory securely and reliably can be a complex task on non-microsoft platforms. With the DirectControl agent installed, the host platform becomes Active Directory-aware and can take advantage of DirectControl services such as automatic updates of Keytab files and Keytab versioning, automatic time synchronization with Active Directory, local caching for disconnected mode, and dynamic DNS support that greatly simplifies initial configuration and provides a much higher degree of maintainability and reliability. 4 SAP and DirectControl Integration: Step-by-Step Once the DirectControl for SAP solution is deployed, the basic steps to the authentication are as follows: Figure 3: Single Sign-On Flow for SAP R/3 using Active Directory When a user first signs on to a Windows XP workstation, a Kerberos ticket granting ticket (tgt) is obtained from Active Directory. When the user then opens SAPgui, XP requests, via SNC, an SAP service ticket from the SAP Server/Router using the previously obtained tgt. SNC passes the service request to the DirectControl Agent. The DirectControl Agent validates the ticket with Active Directory. The user is granted access and a secure user session is provided back to the client. The simple steps to set up the various components of this solution are as follows: CENTRIFY CORPORATION ALL RIGHTS RESERVED. PAGE 7

11 1. Join the SAP server to Active Directory with DirectControl. 2. Configure Kerberos and the SAP service. 3. Configure SNC on the SAP server. 4. Configure SNC on the SAPgui. 4.1 Join the SAP Server to Active Directory with DirectControl The automation scripts included with DirectControl for Systems simplify the installation and configuration of DirectControl and Active Directory. The installation script will do the following automatically for you: You will be prompted for the domain, Zone, and the Active Directory username and password to be used for joining to Active Directory. The script will offer defaults based on your current configuration. Checks are made to ensure that DNS is set up correctly on your system. PAM and NSS modules are configured correctly. The machine is joined to the Active Directory domain, and is added to the DirectControl Zone. The DirectControl adclient service is started. Scripts are created to automatically start the correct DirectControl services each time the system boots. The configuration information for DirectControl is output to the screen. 4.2 Configure Service and Kerberos Another utility, adkeytab, is provided with DirectControl to simplify the creation of an SAP service in Active Directory and to configure the Kerberos stack. This utility will do the following automatically for you: Create a new service account in Active Directory for SAP in the currently joined domain. Configure the encryption type. Configure the Keytab file in the Kerberos stack to work correctly based on this new service account. CENTRIFY CORPORATION ALL RIGHTS RESERVED. PAGE 8

12 4.3 Configure SNC on the SAP Server SNC must be enabled and properly configured on each of the SAP servers. The DirectControl for SAP solution provides instructions that augment the SAP SNC documentation and OSS notes to accomplish the following: Install the DirectControl for SAP package into the DirectControl for Systems Agent. Modify the default and instance profiles to enable and configure SNC. Modify the SAP server UNIX environment to see the DirectControl libraries and to renew Kerberos tickets periodically. Modify the user profiles that are used to leverage SNC and map them to their Active Directory User Principal Name (UPN). Figure 4. Mapping of the Active Directory user to the SAP account. Once SAP is configured to use SNC, it is very straightforward to map an Active Directory user to an SAP user. 4.4 Configure the SAP Client The SAPgui Client must also be configured to use SNC for SSO to SAP R/3. The DirectControl for SAP solution provides instructions that augment the SAP SNC documentation and OSS notes to accomplish the following: Install the SNC SSO patch for SAPgui. CENTRIFY CORPORATION ALL RIGHTS RESERVED. PAGE 9

13 Enable Secure Networking Communications and provide the SNC name for the SAP service. Similar steps are documented for configuring the SAP Java client as well. 4.5 Single Sign-On Using SNC, Kerberos and Active Directory Once the SAP server has been joined into Active Directory and the SAP server and clients have been configured properly, the SAP server can be configured to use the Centrify DirectControl GSSAPI library to support the authentication to Active Directory. Figure 5. Single sign-on for SAPgui using Active Directory and Secure Network Communication. In production the Centrify DirectControl for SAP solution has four primary steps: The SAP client requests a service ticket using the built-in Kerberos SSP (Security Service Provider) from the Active Directory KDC (or local cache). This is accomplished via the cgsskrb5.dll library that translates standard GSS calls to SSP calls on the client. The SAP client then connects with the SAP server and presents the service ticket received from step 1. The SAP server consumes the request and validates it via the GSS libraries and Centrify s DirectControl Agent. Once the request is successfully authenticated with Active Directory, a User Principal Name (UPN) is provided to the SAP server. This UPN is mapped to an SAP user in the SNC tab of the user profile. Finally, when the user is logged on using his Active Directory identity, he is mapped to the correct SAP user without having to physically provide a username or password. CENTRIFY CORPORATION ALL RIGHTS RESERVED. PAGE 10

14 5 Summary In summary, Centrify DirectControl for SAP provides a number of unique features that enable organizations to leverage Kerberos and Microsoft Active Directory to provide single sign-on for their SAP users: SAP users can now use their Active Directory username and password to log in to their Windows workstation once and then gain SSO into SAP R/3 on UNIX. SAP authentication is managed securely, using SNC and the Kerberos technology that is part of DirectControl and Active Directory. The SAP UNIX systems are securely joined to the Active Directory domain and a DirectControl Zone and can be controlled and managed centrally through Active Directory. Advanced enterprise features such as full support for Active Directory policies, multidomain trusted authentication and NTLM support are provided by the DirectControl software. The complex and often underestimated tasks of administering a Kerberos service and managing keytab and configuration files is scripted and automated. Central password policy is applied to SAP through the Kerberos services. Any update of DNS, KDC and other Active Directory-relevant information in a distributed enterprise environment is required to achieve minimum downtime and maximum security. DirectControl updates this information automatically. SAP integration is much easier because of Centrify s SNC module and the professional support to provide a single point of contact for your problems. In general, DirectControl is less complex and time-consuming to maintain in comparison to open source integration solutions, delivering organizations a payback of the product investment. Centrify s professional services and support help to guarantee organizations a faster resolution in case of technical problems. The resulting benefits for customers include: More Secure. SAP is now tightly coupled with Active Directory authentication. In addition, DirectControl Zone technology gives users the ability to create secure Zones to help with enforcement of role-based access control to the SAP servers by the ABAP administrators. DirectControl reports also allow administrators and auditors to instantly see who has access to corporate resources. CENTRIFY CORPORATION ALL RIGHTS RESERVED. PAGE 11

15 More Manageable. The resulting solution is easier to configure and maintain. Administrators have full centralized control over user and group access rights with the DirectControl Administrator s Console. Management costs can be reduced because less time is required to maintain SAP. Enterprise Ready. By providing pre-packaged, tested SAP binaries and enterpriseclass support, Centrify turns SAP SSO into a solution that any organization can feel comfortable deploying. 6 How to Contact Centrify For the latest product information on DirectControl, check out our web site: See the DirectControl for SAP portal for the latest information on using this solution: North America (And All Locations Outside EMEA) Centrify Corporation 444 Castro St., Suite 1100 Mountain View, CA United States Europe, Middle East, Africa (EMEA) Centrify EMEA Asmec Centre Merlin House Brunel Road Theale, Berkshire, RG7 4AB United Kingdom Sales: +1 (650) Sales: Enquiries: Web site: info@centrify.com CENTRIFY CORPORATION ALL RIGHTS RESERVED. PAGE 12

Centrify-Enabled Samba

Centrify-Enabled Samba CENTRIFY CORP. Centrify-Enabled Samba DECEMBER 2009 The easy-to-manage enterprise solution for Active Directory-enabled Samba file sharing ABSTRACT Samba is one of the most popular open source technologies

More information

Active Directory and DirectControl

Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now

More information

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite

Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite WHITE PAPER CENTRIFY CORP. MARCH 2009 Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite Securing and auditing administrative access to the Virtual Infrastructure

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

Managing UNIX Generic and Service Accounts with Active Directory

Managing UNIX Generic and Service Accounts with Active Directory APPLICATION NOTE Managing UNIX Generic and Service Accounts with Active Directory Published: June 2007 Abstract Generic accounts are commonly used to enable UNIX administrative staff to log on to a computer

More information

Automating Cloud Security with Centrify Express and RightScale

Automating Cloud Security with Centrify Express and RightScale QUICK START GUIDE. MAY 2011 Automating Cloud Security with Centrify Express and RightScale How to secure cloud systems by joining them to your Active Directory infrastructure Abstract This Quick Start

More information

Windows Security and Directory Services for UNIX using Centrify DirectControl

Windows Security and Directory Services for UNIX using Centrify DirectControl SOLUTION GUIDE CENTRIFY CORP. SEPTEMBER 2005 Windows Security and Directory Services for UNIX using Centrify DirectControl With Centrify, you can now fully leverage your investment in Active Directory

More information

An Overview of Samsung KNOX Active Directory-based Single Sign-On

An Overview of Samsung KNOX Active Directory-based Single Sign-On C E N T R I F Y W H I T E P A P E R. S E P T E M B E R 2013 An Overview of Samsung KNOX Active Directory-based Single Sign-On Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

Centrify Identity and Access Management for Cloudera

Centrify Identity and Access Management for Cloudera Centrify Identity and Access Management for Cloudera Integration Guide Abstract Centrify Server Suite is an enterprise-class solution that secures Cloudera Enterprise Data Hub leveraging an organization

More information

Single Sign-On for Kerberized Linux and UNIX Applications

Single Sign-On for Kerberized Linux and UNIX Applications Likewise Enterprise Single Sign-On for Kerberized Linux and UNIX Applications AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise facilitates the

More information

Centralized Identity and Access Management of Cross-Platform Systems and Applications with Active Directory and the Centrify Suite

Centralized Identity and Access Management of Cross-Platform Systems and Applications with Active Directory and the Centrify Suite WHITE PAPER CENTRIFY CORP. OCTOBER 2008 Centralized Identity and Access Management of Cross-Platform Systems and Applications with Active Directory and the Centrify Suite The Centrify Suite is an integrated

More information

Centrify Single Sign-On

Centrify Single Sign-On Centrify Single Sign-On Configuring Integration with SAP December 2014 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject to

More information

Windows Least Privilege Management and Beyond

Windows Least Privilege Management and Beyond CENTRIFY WHITE PAPER Windows Least Privilege Management and Beyond Abstract Devising an enterprise-wide privilege access scheme for Windows systems is complex (for example, each Window system object has

More information

identity management in Linux and UNIX environments

identity management in Linux and UNIX environments Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual

More information

Samsung KNOX: An Overview for Business Customers

Samsung KNOX: An Overview for Business Customers CENTRIFY WHITE PAPER. SEPTEMBER 2013 Samsung KNOX: An Overview for Business Customers Abstract Samsung, the mobile device market leader, has introduced Samsung KNOX for its Android-based mobile platforms

More information

How To Use Directcontrol With Netapp Filers And Directcontrol Together

How To Use Directcontrol With Netapp Filers And Directcontrol Together Application Note Using DirectControl with Network Appliance Filers Published: June 2006 Abstract This Application Note describes the integration between Network Appliance servers and Centrify DirectControl

More information

Centralized Management for UNIX, Linux, Mac and Java with Active Directory and DirectControl

Centralized Management for UNIX, Linux, Mac and Java with Active Directory and DirectControl WHITE PAPER CENTRIFY CORP. APRIL 2006 Centralized Management for UNIX, Linux, Mac and Java with Active Directory and DirectControl Centrify DirectControl delivers secure access control and centralized

More information

Centralized Mac Home Directories with ExtremeZ-IP

Centralized Mac Home Directories with ExtremeZ-IP APPLICATION NOTE Centralized Mac Home Directories with ExtremeZ-IP Published: July 2009 Abstract Organizations wanting to integrate Mac OS X systems into their Windows-based enterprise network will most

More information

A Practical Path to Unified Identity Across Data Center, Cloud and Mobile

A Practical Path to Unified Identity Across Data Center, Cloud and Mobile C E N T R I F Y W H I T E P A P E R A Practical Path to Unified Identity Across Data Center, Cloud and Mobile Abstract The major trends challenging IT organizations today are the increasing heterogeneity

More information

Centrify's Solution for Migrating UNIX Directories to Active Directory

Centrify's Solution for Migrating UNIX Directories to Active Directory WHITE PAPER CENTRIFY CORP. JANUARY 2007 Centrify's Solution for Migrating UNIX Directories to Active Directory Leveraging Centrify s DirectControl and Zone Technology to Simplify Migration ABSTRACT Microsoft

More information

Active Directory and Linux Identity Management

Active Directory and Linux Identity Management Active Directory and Linux Identity Management Published by the Open Source Software Lab at Microsoft. December 2007. Special thanks to Chris Travers, Contributing Author to the Open Source Software Lab.

More information

Centrify Mobile Authentication Services for Samsung KNOX

Centrify Mobile Authentication Services for Samsung KNOX Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under

More information

Centrify Suite 2012 Express

Centrify Suite 2012 Express Centrify Suite 2012 Express Administrator s Guide November 2011 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject to the terms

More information

Virtualization Case Study

Virtualization Case Study INDUSTRY Finance COMPANY PROFILE Major Financial Institution. BUSINESS SITUATION Internal security audits found that VMware ESX, Red Hat Linux, and Solaris systems lacked an efficient way to control access

More information

Centrify Server Suite 2014

Centrify Server Suite 2014 Centrify Server Suite 2014 Administrator s Guide for Linux and UNIX June 2014 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

Leverage Active Directory with Kerberos to Eliminate HTTP Password

Leverage Active Directory with Kerberos to Eliminate HTTP Password Leverage Active Directory with Kerberos to Eliminate HTTP Password PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website: www.pistolstar.com

More information

Google Apps Deployment Guide

Google Apps Deployment Guide CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate

More information

Open Directory. Apple s standards-based directory and network authentication services architecture. Features

Open Directory. Apple s standards-based directory and network authentication services architecture. Features Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data

More information

Stop Password Sprawl with SaaS Single Sign-On via Active Directory

Stop Password Sprawl with SaaS Single Sign-On via Active Directory CENTRIFY WHITE PAPER Stop Password Sprawl with SaaS Single Sign-On via Active Directory Abstract Organizations are rushing to SaaS in an effort to move business initiatives along faster than the traditional

More information

Likewise Security Benefits

Likewise Security Benefits Likewise Enterprise Likewise Security Benefits AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise improves the security of Linux and UNIX computers

More information

Office 365 Single Sign-On: High Availability Without High Complexity

Office 365 Single Sign-On: High Availability Without High Complexity WHITE PAPER Office 365 Single Sign-On: High Availability Without High Complexity WWW.CENTRIFY.COM Office 365 Single Sign-On: High Availability without High Complexity Contents Abstract 3 Introduction 4

More information

Whitepaper: Centeris Likewise Identity 3.0 Security Benefits

Whitepaper: Centeris Likewise Identity 3.0 Security Benefits Whitepaper: Centeris Likewise Identity 3.0 Security Benefits Author: Manny Vellon VP, Product Development Centeris Corporation Abstract This document describes how Centeris Likewise Identity improves the

More information

CA SiteMinder SSO Agents for ERP Systems

CA SiteMinder SSO Agents for ERP Systems PRODUCT SHEET: CA SITEMINDER SSO AGENTS FOR ERP SYSTEMS CA SiteMinder SSO Agents for ERP Systems CA SiteMinder SSO Agents for ERP Systems help organizations minimize sign-on requirements and increase security

More information

Integration with Active Directory. Jeremy Allison Samba Team

Integration with Active Directory. Jeremy Allison Samba Team Integration with Active Directory Jeremy Allison Samba Team Benefits of using Active Directory Unlike the earlier Microsoft Windows NT 4.x Domain directory service which used proprietary DCE/RPC calls,

More information

Best Practices for Adding Macs to Microsoft Networks

Best Practices for Adding Macs to Microsoft Networks WHITE PAPER Best Practices for Adding Macs to Microsoft Networks WWW.CENTRIFY.COM Best Practices for Adding Macs to Microsoft Networks Contents Abstract 3 Introduction 4 Requirements for Solving the Challenge

More information

Enforcing Enterprise-out Security for Cloud Servers

Enforcing Enterprise-out Security for Cloud Servers WHITE PAPER Enforcing Enterprise-out Security for Cloud Servers By David McNeely Publication Date: March 2011 Cloud-based computing models offer the promise of a highly scalable compute infrastructure

More information

Using Apple Remote Desktop to Deploy Centrify DirectControl

Using Apple Remote Desktop to Deploy Centrify DirectControl APPLICATION NOTE Using Apple Remote Desktop to Deploy Centrify DirectControl Published: June 2007 Abstract Apple Remote Desktop is commonly used by administrators to perform various administrative management

More information

Centrify Mobile Authentication Services

Centrify Mobile Authentication Services Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

How the Quest One Identity Solution Products Enhance Each Other

How the Quest One Identity Solution Products Enhance Each Other Better Together How the Quest One Identity Solution Products Enhance Each Other Written by Quest Software, Inc. Business Brief 2009 Quest Software, Inc. ALL RIGHTS RESERVED. This document contains proprietary

More information

Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On

Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On SAP Brief SAP NetWeaver SAP NetWeaver Single Sign-On Objectives Improve Security, Lower Risk, and Increase Compliance Using Single Sign-On Single sign-on in the SAP software architecture Single sign-on

More information

Implementing Detailed User-Level Auditing of UNIX and Linux Systems Using Centrify DirectAudit

Implementing Detailed User-Level Auditing of UNIX and Linux Systems Using Centrify DirectAudit WHITE PAPER CENTRIFY CORP. MARCH 2007 Implementing Detailed User-Level Auditing of UNIX and Linux Systems Using Centrify DirectAudit Centrify DirectAudit enhances regulatory compliance and troubleshooting

More information

Major Retailer Achieves Compliance With the PCI Data Security Standard

Major Retailer Achieves Compliance With the PCI Data Security Standard Leading Online Retailer INDUSTRY Online retail clothing sales COMPANY PROFILE This world-class apparel business operates multiple enterprises under multiple brands. BUSINESS SITUATION Had difficulty meeting

More information

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper

Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.

More information

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac

Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE

More information

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos

Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: salesteam@pistolstar.com Website:

More information

MBAM Self-Help Portals

MBAM Self-Help Portals MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa

More information

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley

Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley Likewise Enterprise Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley IMPROVE SOX COMPLIANCE WITH CENTRALIZED ACCESS CONTROL AND AUTHENTICATION With Likewise Enterprise, you get one user,

More information

ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains

ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains ADMT v3.1 Guide: Migrating and Restructuring Active Directory Domains Microsoft Corporation Published: July 2008 Authors: Moon Majumdar, Brad Mahugh Editors: Jim Becker, Fran Tooke Abstract This guide

More information

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009

Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 Oracle Enterprise Single Sign-on Technical Guide An Oracle White Paper June 2009 EXECUTIVE OVERVIEW Enterprises these days generally have Microsoft Windows desktop users accessing diverse enterprise applications

More information

Understanding Enterprise Cloud Governance

Understanding Enterprise Cloud Governance Understanding Enterprise Cloud Governance Maintaining control while delivering the agility of cloud computing Most large enterprises have a hybrid or multi-cloud environment comprised of a combination

More information

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide

Samsung KNOX EMM Authentication Services. SDK Quick Start Guide Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license

More information

Red Hat Enterprise ipa

Red Hat Enterprise ipa Red Hat Enterprise ipa Introduction Red Hat Enterprise IPA enables your organization to comply with regulations, reduce risk, and become more efficient. Simply and centrally manage your Linux/Unix users

More information

Active Directory Compatibility with ExtremeZ-IP

Active Directory Compatibility with ExtremeZ-IP Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices White Paper Group Logic White Paper October 2010 About This Document The purpose of this technical paper is to discuss how ExtremeZ-IP

More information

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure

Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure Technical White Paper DESKTOP www.novell.com Using SUSE Linux Enterprise Desktop with Microsoft * Active Directory Infrastructure * Using SUSE Linux Enterprise Desktop with Microsoft Active Directory Infrastructure

More information

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications

Using SAP Logon Tickets for Single Sign on to Microsoft based web applications Collaboration Technology Support Center - Microsoft - Collaboration Brief March 2005 Using SAP Logon Tickets for Single Sign on to Microsoft based web applications André Fischer, Project Manager CTSC,

More information

Macintosh Printer Management using Centrify DirectControl Group Policies

Macintosh Printer Management using Centrify DirectControl Group Policies WHITE PAPER CENTRIFY CORP. MARCH 2010 Macintosh Printer Management using Centrify DirectControl Group Policies ABSTRACT This white paper examines various approaches to managing printer configuration files

More information

Hyper-V Server 2008 Setup and Configuration Tool Guide

Hyper-V Server 2008 Setup and Configuration Tool Guide Hyper-V Server 2008 Setup and Configuration Tool Guide Microsoft Corporation Published: October 2008 Author: Cynthia Nottingham Abstract This guide will help you set up and configure Microsoft Hyper-V

More information

How to Secure a Groove Manager Web Site

How to Secure a Groove Manager Web Site How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,

More information

Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper

Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper Active Directory Comapatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner 05 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner Learn How to Get Started with Pipeliner Sales CRM Application. CONTENT. Setting up Pipeliner

More information

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4

What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 Page 1 Product Bulletin What s New in Juniper Networks Secure Access (SA) SSL VPN Version 6.4 This document lists the new features available in Version 6.4 of the Secure Access SSL VPN product line. This

More information

CENTRIFY TRAINING CLASS Centrify Suite Standard Edition - Mac OS X Training Course Details. Format: 100% lecture including demonstrations.

CENTRIFY TRAINING CLASS Centrify Suite Standard Edition - Mac OS X Training Course Details. Format: 100% lecture including demonstrations. Centrify Suite Standard Edition - Mac OS X Training Course Details Synopsis This course introduces the customer to the Centrify Mac OS X specific features of the Centrify Suite Standard Edition. What You

More information

AD RMS Step-by-Step Guide

AD RMS Step-by-Step Guide AD RMS Step-by-Step Guide Microsoft Corporation Published: March 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide provides instructions for setting up a test environment to

More information

Windows Scheduled Tasks Management Pack Guide for System Center Operations Manager. Published: 07 March 2013

Windows Scheduled Tasks Management Pack Guide for System Center Operations Manager. Published: 07 March 2013 Windows Scheduled Tasks Management Pack Guide for System Center Operations Manager Published: 07 March 2013 Copyright Information in this document, including URL and other Internet Web site references,

More information

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007

Oracle Identity Management for SAP in Heterogeneous IT Environments. An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments An Oracle White Paper January 2007 Oracle Identity Management for SAP in Heterogeneous IT Environments Executive Overview... 3 Introduction...

More information

Management Reporter Integration Guide for Microsoft Dynamics GP

Management Reporter Integration Guide for Microsoft Dynamics GP Microsoft Dynamics Management Reporter Integration Guide for Microsoft Dynamics GP July 2013 Find updates to this documentation at the following location: http://go.microsoft.com/fwlink/?linkid=162565

More information

Centrify Cloud Management Suite

Centrify Cloud Management Suite Centrify Cloud Management Suite Installation and Configuration Guide April 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1

Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1 Update and Installation Guide for Microsoft Management Reporter 2.0 Feature Pack 1 Microsoft Corporation Published: December 2010 Microsoft Dynamics is a line of integrated, adaptable business management

More information

Centrify for Web Applications

Centrify for Web Applications Centrify for Web Applications Authentication Guide for Apache Servers June 2014 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject

More information

Copyright http://support.oracle.com/

Copyright http://support.oracle.com/ Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

Active Directory Provider User s Guide

Active Directory Provider User s Guide Active Directory Provider User s Guide Mike Horton Version 01.00.03 Last Updated: December 28, 2007 Category: DotNetNuke v4.6.0 and greater Information in this document, including URL and other Internet

More information

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide

Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Installing Windows Rights Management Services with Service Pack 2 Step-by- Step Guide Microsoft Corporation Published: October 2006 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide

More information

Best Practices: Integrating Mac OS X with Active Directory. Technical White Paper April 2009

Best Practices: Integrating Mac OS X with Active Directory. Technical White Paper April 2009 Best Practices: Integrating Mac OS X Technical White Paper April 2009 2 Contents Page 3 Page 5 Page 9 Page 10 Page 11 Page 12 Apple s Built-In Solution How to Integrate Mac OS X Getting Started dsconfigad

More information

Linux/Windows Security Interop: Apache with mod_auth_kerb and Windows Server 2003 R2

Linux/Windows Security Interop: Apache with mod_auth_kerb and Windows Server 2003 R2 Linux/Windows Security Interop: Apache with mod_auth_kerb and Windows Server 2003 R2 Published by the Open Source Software Lab at Microsoft. January 2008. Special thanks to Chris Travers, Contributing

More information

How To Set Up A Load Balancer With Windows 2010 Outlook 2010 On A Server With A Webmux On A Windows Vista V2.2.5.2 (Windows V2) On A Network With A Server (Windows) On

How To Set Up A Load Balancer With Windows 2010 Outlook 2010 On A Server With A Webmux On A Windows Vista V2.2.5.2 (Windows V2) On A Network With A Server (Windows) On Load Balancing Exchange 2010 OWA for External Access using WebMux Published: April 2011 Information in this document, including URL and other Internet Web site references, is subject to change without

More information

2X Cloud Portal v10.5

2X Cloud Portal v10.5 2X Cloud Portal v10.5 URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features

Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features Windows Services Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features File and print services Integrated Samba 3 for native SMB/CIFS protocol support

More information

SAP User and Access Management with Microsoft Identity Integration Server

SAP User and Access Management with Microsoft Identity Integration Server Collaboration Technology Support Center Microsoft Collaboration Brief August 2005 SAP User and Access Management with Microsoft Identity Integration Server Authors Rüdiger Berndt, IdM Lead Architect, Oxford

More information

White paper December 2008. Addressing single sign-on inside, outside, and between organizations

White paper December 2008. Addressing single sign-on inside, outside, and between organizations White paper December 2008 Addressing single sign-on inside, outside, and between organizations Page 2 Contents 2 Overview 4 IBM Tivoli Unified Single Sign-On: Comprehensively addressing SSO 5 IBM Tivoli

More information

Single Sign-on (SSO) technologies for the Domino Web Server

Single Sign-on (SSO) technologies for the Domino Web Server Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145

More information

Passlogix Sign-On Platform

Passlogix Sign-On Platform Passlogix Sign-On Platform The emerging ESSO standard deployed by leading enterprises Extends identity management to the application and authentication device level No modifications to existing infrastructure

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

White Paper. Software version: 5.0 www.wmsoftware.com

White Paper. Software version: 5.0 www.wmsoftware.com Safe AutoLogon Password Server Using Safe AutoLogon Password Server to manage Safe AutoLogon clients for seamless and centrally managed automatic logons White Paper Software version: 5.0 www.wmsoftware.com

More information

Datacenter Management and Virtualization. Microsoft Corporation

Datacenter Management and Virtualization. Microsoft Corporation Datacenter Management and Virtualization Microsoft Corporation June 2010 The information contained in this document represents the current view of Microsoft Corporation on the issues discussed as of the

More information

Microsoft Corporation. Status: Preliminary documentation

Microsoft Corporation. Status: Preliminary documentation Microsoft Corporation Status: Preliminary documentation Beta content: This guide is currently in beta form. The AppLocker team greatly appreciates you reviewing the document and looks forward to receiving

More information

Integrating Unix and Linux Systems with Active Directory

Integrating Unix and Linux Systems with Active Directory Integrating Unix and Linux Systems with Active Directory Technical Brief written by Jackson Shaw Senior Director, Product Management - Active Directory Infrastructure Management Quest Software, Inc. Copyright

More information

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities

Product overview. CA SiteMinder lets you manage and deploy secure web applications to: Increase new business opportunities PRODUCT SHEET: CA SiteMinder CA SiteMinder we can CA SiteMinder provides a centralized security management foundation that enables the secure use of the web to deliver applications and cloud services to

More information

Vyom SSO-Edge: Single Sign-On for BMC Remedy

Vyom SSO-Edge: Single Sign-On for BMC Remedy Vyom SSO-Edge: Single Sign-On for BMC Remedy Guaranteed ROI of BMC Remedy with Reduced Service Desk Calls, Increased BMC Remedy Adoption, Improved End-User Satisfaction, Strengthened Security and Effective

More information

Citrix MetaFrame Password Manager 2.5

Citrix MetaFrame Password Manager 2.5 F E A T U R E S O V E R V I E W Citrix MetaFrame Password Manager 2.5 Citrix access infrastructure provides on-demand access to information, and Citrix MetaFrame Password Manager makes that information

More information

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001

Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001 Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance

More information

Thales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved.

Thales ncipher modules. Version: 1.2. Date: 22 December 2009. Copyright 2009 ncipher Corporation Ltd. All rights reserved. ncipher modules Integration Guide for IBM Tivoli Access Manager for e-business 6.1 Windows Server 2003 32-bit and 64-bit Windows Server 2008 32-bit and 64-bit Version: 1.2 Date: 22 December 2009 Copyright

More information

Microsoft Dynamics AX 2009 Installation Guide. Microsoft Corporation Published: November 2009

Microsoft Dynamics AX 2009 Installation Guide. Microsoft Corporation Published: November 2009 Microsoft Dynamics AX 2009 Installation Guide Microsoft Corporation Published: November 2009 Microsoft Dynamics is a line of integrated, adaptable business management solutions that enables you and your

More information

Centrify Server Suite, Standard Edition

Centrify Server Suite, Standard Edition CENTRIFY SERVER SUITE SUPPORTED PLATFORMS Centrify Server Suite, Standard Edition Centrify Server Suite, Standard Edition, centralizes authentication and privileged user access across disparate systems

More information

Technical Brief for Windows Home Server Remote Access

Technical Brief for Windows Home Server Remote Access Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality

More information

Using Centrify s DirectControl with Mac OS X

Using Centrify s DirectControl with Mac OS X WHITE PAPER CENTRIFY CORP. OCTOBER 2008 Using Centrify s DirectControl with Mac OS X Centralized, Active Directory-based authentication, access control and policy enforcement for Mac OS X systems in Windows

More information

NETWRIX IDENTITY MANAGEMENT SUITE

NETWRIX IDENTITY MANAGEMENT SUITE NETWRIX IDENTITY MANAGEMENT SUITE FEATURES AND REQUIREMENTS Product Version: 3.3 February 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Configuring IBM Cognos Controller 8 to use Single Sign- On

Configuring IBM Cognos Controller 8 to use Single Sign- On Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright

More information