axsguard Gatekeeper Directory Services How To v1.2

Size: px
Start display at page:

Download "axsguard Gatekeeper Directory Services How To v1.2"

Transcription

1 axsguard Gatekeeper

2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH are referred to in this document as 'VASCO'. VASCO Products comprise Hardware, Software, Services and Documentation. This document addresses potential and existing VASCO customers and has been provided to you and your organization for the sole purpose of helping you to use and evaluate VASCO Products. As such, it does not constitute a license to use VASCO Software or a contractual agreement to use VASCO Products. Disclaimer of Warranties and Limitations of Liabilities VASCO Products are provided as is without warranty or conditions of any kind, whether implied, statutory, or related to trade use or dealership, including but not limited to implied warranties of satisfactory quality, merchantability, title, non-infringement or fitness for a particular purpose. VASCO, VASCO DISTRIBUTORS, RESELLERS AND SUPPLIERS HAVE NO LIABILITY UNDER ANY CIRCUMSTANCES FOR ANY LOSS, DAMAGE OR EXPENSE INCURRED BY YOU, YOUR ORGANIZATION OR ANY THIRD PARTY (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF PROFITS, BUSINESS INTERRUPTION OR LOSS OF data) ARISING DIRECTLY OR INDIRECTLY FROM THE USE, OR INABILITY TO USE VASCO SOFTWARE, HARDWARE, SERVICES OR DOCUMENTATION, REGARDLESS OF THE CAUSE OF THE LOSS, INCLUDING NEGLIGENCE, EVEN IF VASCO HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES, OR IF THEY WERE FORESEEABLE. OUR MAXIMUM AGGREGATE LIABILITY TO YOU, AND THAT OF OUR DISTRIBUTORS, RESELLERS AND SUPPLIERS SHALL NOT EXCEED THE AMOUNT PAID BY YOU FOR THE PRODUCT. THE LIMITATIONS IN THIS SECTION SHALL APPLY WHETHER OR NOT THE ALLEGED BREACH OR DEFAULT IS A BREACH OF A FUNDAMENTAL CONDITION OR TERM, OR A FUNDAMENTAL BREACH. THIS SECTION WILL NOT APPLY ONLY WHEN AND TO THE EXTENT THAT APPLICABLE LAW SPECIFICALLY REQUIRES LIABILITY DESPITE THE FOREGOING EXCLUSIONS AND LIMITATIONS. Intellectual Property and Copyright VASCO Products contain proprietary and confidential information. VASCO data Security, Inc. and/or VASCO data Security International GmbH own or are licensed under all title, rights and interest in VASCO Products, updates and upgrades thereof, including copyrights, patent rights, trade secret rights, mask work rights, database rights and all other intellectual and industrial property rights. No part of these Products may be transferred, disclosed, reproduced or transmitted in any form or by any means, electronic, mechanical or otherwise, for any purpose, except as expressly permitted by VASCO or its authorized licensee in writing. This document is protected under US and international copyright law as an unpublished work of authorship. No part of it may be transferred, disclosed, reproduced or transmitted in any form or by any means, electronic, mechanical or otherwise, for any purpose, except as expressly permitted in writing by VASCO or its authorized licensee. Trademarks VASCO, VACMAN, IDENTIKEY, axsguard, DIGIPASS, and are registered or unregistered trademarks of VASCO data Security, Inc. and/or VASCO data Security International GmbH in the U.S. and other countries. Other company brand or product names or other designations, denominations, labels and/or other tags, titles, as well as all URLs (Internet addresses) linked to such designations or communications (irrespective of whether protected by intellectual property law or not), mentioned in VASCO Products may be the trademarks or registered trademarks or be part of any other entitlement of their respective owners. Radius Disclaimer Information on the RADIUS server provided in this document relates to its operation in the axsguard Gatekeeper environment. We recommend that you contact your NAS/RAS vendor for further information. Copyright 2009 VASCO data Security, Inc, VASCO data Security International GmbH All rights reserved. 2

3 Table of Contents Table of Contents 1 Introduction Audience and Purpose of this document What is the axsguard Gatekeeper? About VASCO Directory Servers and LDAP Overview What is a Directory Server? The Lightweight Directory Access Protocol Definition LDAP Objects LDAP Binding Strings Directory Servers and the axsguard Gatekeeper Supported Directory Servers Directory Services Concept Overview Directory Services Authentication Directory Services Synchronization Synchronization Disabled Synchronization Enabled Modifying Synchronized Parameters Existing Users and Groups and Synchronization Single Sign-On (SSO) and Directory Services Group Concepts axsguard Gatekeeper Groups Active Directory Groups Directory Services Configuration Overview Feature Activation Enabling DS Lookups Selecting the Directory Server Type Adding the Directory Server Specifying the Directory Base Setting the Integration Level

4 Table of Contents 4.8 Group Filters (Group Selection) Path-based Group Selection Membership-based Group Selection User Filters (User Selection) Centralized Users (Single OU) Decentralized Users (Multiple OUs) Directory Services Name Restrictions Group and User Templates Editing the Group Template Editing the User Template Status, Tools and Logs Configuration Example Overview Before you start: Configuring the User and Group Templates Feature Activation Directory Services Main Screen Checking the Directory Services Status Directory Services Test Tool Directory Services Logs Troubleshooting Support Overview If you encounter a problem Return procedure if you have a hardware failure

5 Table of Contents Illustration Index Image 1: adsiedit console...11 Image 2: Active Directory Users...12 Image 3: Directory Services Concept...14 Image 4: User and Group Modifications...15 Image 5: SSO Concept...16 Image 6: axsguard vs. Active Directory Groups...17 Image 7: Directory Services Feature Activation...18 Image 8: Enabling DS Lookups...19 Image 9: Available DS Server Types...19 Image 10: Adding a Directory Server's IP Address...20 Image 11: Entering DS user with Search Permission...21 Image 12: Setting the Integration Level...21 Image 13: Path-based Group Selection...23 Image 14: Membership-based Group Selection...24 Image 15: User Filters...26 Image 16: Name Restrictions...27 Image 17: Group Template Configuration Screen...29 Image 18: Example of a Group Template...29 Image 19: Application of a Group Template...29 Image 20: Synchronized Groups Icons...30 Image 21: User Template Configuration Screen...30 Image 22: Example of a User Template...31 Image 23: Syncrhonized User Icons...31 Image 24: Directory Services Configuration Example...34 Image 25: Directory Services Status...35 Image 26: Directory Services Tools...36 Image 27: Directory Services Logs

6 Table of Contents Index of Tables Table 1: Overview of LDAP Names...11 Table 2: Overview of DS Integration Level Options...22 Table 3: Importing and Syncrhonizing Centralized Users...25 Table 4: Overview of Directory Services Naming Restrictions

7 1 Introduction 1.1 Audience and Purpose of this document Introduction This axsguard Gatekeeper guide serves as a reference source for technical personnel and / or system administrators. This document covers the installation and configuration of the axsguard Gatekeeper Directory Services Module. It is intended for system administrators or technical personnel with a thorough knowledge of Microsoft Active Directory and Directory Servers in general. Although Novell edirectory is fully supported by the axsguard Gatekeeper Directory Services feature, the examples in this guide have been limited to Microsoft Active Directory. In sections 1.2 and 1.3, we introduce the axsguard Gatekeeper and VASCO. In section 2, we explain some general terminology and required background knowledge, such as the the LDAP protocol and LDAP objects. In section 3, we explain axsguard Gatekeeper LDAP Authentication and Synchronization. In section 4, we explain how to configure the axsguard Gatekeeper using the LDAP syntax so that Directory Server users and groups can be successfully imported and synchronized. In section 5, we provide a practical example of how to configure the axsguard Gatekeeper with a Windows 2003 server. In section 6, we provide some solutions to solve difficulties. In section 7, we explain how to request support, and return hardware for replacement. 7

8 Introduction Other documents in the set of axsguard Gatekeeper documentation include: axsguard Gatekeeper Installation Guide, which explains how to set up the axsguard Gatekeeper, and is intended for technical personnel and / or system administrators. 'How to guides', which provide detailed information on configuration of each of the features available as 'add-on' modules (explained in the next section). These guides cover specific features such as: axsguard Gatekeeper Authentication axsguard Gatekeeper Firewall axsguard Gatekeeper Single Sign-On axsguard Gatekeeper VPN axsguard Gatekeeper Reverse Proxy axsguard Gatekeeper Directory Services Access to axsguard Gatekeeper guides is provided through the permanently on-screen Documentation button in the axsguard Gatekeeper Administrator Tool. Further resources available include: Context-sensitive help, which is accessible in the Administrator Tool through the Help button. This button is permanently available and displays information related to the current screen. Training courses covering features in detail can be organized on demand. These courses address all levels of expertise. Please see for further information. Welcome to axsguard Gatekeeper security. 8

9 1.2 Introduction What is the axsguard Gatekeeper? The axsguard Gatekeeper is an authentication appliance, intended for small and medium sized enterprises. In addition to strong authentication, the axsguard Gatekeeper has the potential to manage all of your Internet security needs. Its modular design means that optional features can be purchased at any time to support, for example, , Web access and VPN management. The axsguard Gatekeeper can easily be integrated into existing IT infrastructures as a stand-alone authentication appliance or as a gateway providing both authentication services and Internet Security. Authentication and other features such as firewall, and Web access, are managed by security policies, which implement a combination of rules, for example, whether a user must use a Digipass One-Time Password in combination with a static password for authentication. Security Policies are applied to specific users or groups of users and can also be applied to specific computers and the entire system. 1.3 About VASCO VASCO is a leading supplier of strong authentication and Electronic Signature solutions and services specializing in Internet Security applications and transactions. VASCO has positioned itself as a global software company for Internet Security serving customers in more than 100 countries, including many international financial institutions. VASCO s prime markets are the financial sector, enterprise security, e-commerce and egovernment. Over 50 of VASCO s client authentication technologies, products and services are based on the VASCO s one and unique core authentication platform: VACMAN. VASCO solutions comprise combinations of the VACMAN core authentication platform, IDENTIKEY authentication server, axsguard authentication appliances, DIGIPASS client Password and Electronic Signature software and DIGIPASS PLUS authentication services. For further information on these security solutions, please see 9

10 2 Directory Servers and LDAP 2.1 Overview Directory Servers and LDAP This chapter provides some general information about Directory Servers and the Lightweight Directory Access Protocol (hereafter LDAP) and explains how the axsguard Gatekeeper can be integrated into a network with a Directory Server. If you are already familiar with the LDAP concept, you may proceed to chapter 3 on page 14. Topics covered in this chapter include: A comprehensive definition of Directory Servers. LDAP: Definition, objects and binding strings. axsguard Gatekeeper LDAP integration. 2.2 What is a Directory Server? A Directory Server stores and centralizes information about the users, groups and resources in a database. This allows network administrators to easily manage users and their rights. The most commonly known Directory Servers are Microsoft Active Directory and Novell edirectory. Active Directory (hereafter AD) is an implementation of LDAP services by Microsoft, primarily used in Windows environments. The main purpose of AD is to provide central authentication and authorization services for Windows based computers. AD also allows administrators to assign policies to users and groups, delegate control, deploy software to client stations and to install system-critical updates on the entire corporate network. AD networks and their databases can vary from very small environments with a few hundred objects to very large setups with thousands of objects. Novell edirectory (formerly called Novell Directory Services or NDS) is an X.500 compatible directory service software product, which was released by Novell in Its purpose is similar to its Microsoft counterpart; to centrally manage users and control access to network resources. Its database can also be accessed with LDAP. 2.3 The Lightweight Directory Access Protocol Definition The Lightweight Directory Access Protocol or LDAP is an application protocol for querying and modifying directory services running over TCP/IP. For detailed information, consult RFC 2253 or the following website: LDAP Objects This section provides an overview of the most commonly used LDAP objects and their names. The object names are required to configure the axsguard Gatekeeper Directory Services Module. 10

11 Directory Servers and LDAP Note The list of provided object names is non exhaustive. For detailed information about LDAP object naming conventions, please consult the related RFCs or the following Internet site: To bind Microsoft Active Directory Server objects with LDAP, the following common abbreviations have to be used: Table 1: Overview of LDAP Names Abbreviations Description DC Domain Component (part of domain name) CN Common Name (group name) CN Common Name (user name) CN Common Name (Windows created) OU Organizational Unit (user created) Microsoft Active Directory Symbol Tip In Windows 2003 and 2008 Server, the objects can be identified by opening a command prompt and executing the following command: adsiedit.msc. Image 1: adsiedit console 11

12 Directory Servers and LDAP LDAP Binding Strings Caution When pointing to a specific Windows 2003 / 2008 user on the axsguard Gatekeeper, enter the CN as displayed in the Active Directory Users and Computers screen (as shown in Image 2). Do not use the SAM account name, as it may be different. Image 2: Active Directory Users Based on the image above, you would have the following binding string: cn=axsguard,cn=users,dc=supdomain,dc=be The axsguard Gatekeeper Directory Services module requires that binding strings are entered without spaces, separated by a comma and starting with the lowest intended object in the Directory Tree (e.g. cn=axsguard), until the tree base (e.g. dc=supdomain,dc=be) has been reached. 12

13 2.4 Directory Servers and LDAP Directory Servers and the axsguard Gatekeeper The axsguard Gatekeeper Directory Services Module (hereafter abbreviated as DS Module) relays the client authentication credentials to the Directory Server. If the authentication credentials are valid, the axsguard Gatekeeper services (i.e. Firewall, Web Access, etc.) become available to the authenticating user. This means that axsguard Gatekeeper services can be made available to users with valid Directory Server (e.g. Active Directory, e-directory) credentials. In addition, the axsguard Gatekeeper DS Module allow you to import and synchronize users and groups from a Directory Server, using LDAP (see section 2.3). 2.5 Supported Directory Servers The following Directory Servers have been tested and are supported by the axsguard Gatekeeper: Windows Server 2003 Windows Server 2008 Novell edirectory 8.8 Posix LDAP implementations 13

14 Directory Services Concept 3 Directory Services Concept 3.1 Overview This chapter explains the general concept, main features, properties of the axsguard Gatekeeper Directory Services Module (hereafter DS Module). If you are already familiar with the DS concept, please skip to chapter 4. Topics covered in this chapter include: DS Authentication DS Synchronization Image 3: Directory Services Concept 3.2 Directory Services Authentication As mentioned in section 2.4, the axsguard Gatekeeper can be used as a stand-alone authentication appliance. In such case, the axsguard Gatekeeper queries a Directory Server in your network to verify the user credentials (of the clients). The axsguard Gatekeeper verifies whether or not a user exists on the Directory Server. If the user exists, the user credentials are checked by the axsguard Gatekeeper. If the credentials are valid, i.e. the user has successfully authenticated, the user is granted the applicable axsguard Gatekeeper access rights (i.e. Firewall, Web Access, etc.). 14

15 Directory Services Concept 3.3 Directory Services Synchronization As mentioned in section 2.4, the axsguard Gatekeeper DS Module allows you to synchronize users and groups from a Directory Server, using LDAP. LDAP is explained in section Synchronization Disabled It is recommended to keep synchronization disabled while editing user and group templates (see sections and 5.2). If synchronization remains disabled, each Directory Server group, user and the according credentials have to be manually entered on the axsguard Gatekeeper, which is not only a cumbersome and time-consuming process, but also one prone to errors, especially in large networks with a great number of users Synchronization Enabled If enabled, the axsguard Gatekeeper automatically queries a specific Directory Server every minute, adding and removing (if enabled) Directory Server users, groups and their according profile information, e.g. their address(es). This process is fully transparent. Notes The initial synchronization takes longer than a minute. The axsguard Gatekeeper DS Module never adds or changes any user or group settings on the Directory Server, the user and group information is only imported and synchronized. Image 4: User and Group Modifications 15

16 Directory Services Concept Modifying Synchronized Parameters Caution Directory Server-specific user or group settings should always be modified or updated on the Directory Server, not on the axsguard Gatekeeper! axsguard Gatekeeper-specific vs. Directory Server-specific It is important not to modify any user or group parameters which are Directory Server-specific on the axsguard Gatekeeper. For example, a Firewall Policy is an axsguard Gatekeeper-specific setting, while a synchronized user's full name is Directory Server-specific. Modifying Directory-Specific parameters on the axsguard Gatekeeper may cause undesired results, as after the modification some Directory Server information is synchronized, while other information is not. It is therefore crucial to change the specific settings on the correct host. Always modify Directory Server-specific parameters on the Directory Server. These parameters are synchronized (imported to the axsguard Gatekeeper). Always modify axsguard Gatekeeper-specific parameters on the axsguard Gatekeeper. Modifications in axsguard Gatekeeper-specific parameters are kept, regardless whether synchronization is enabled or not. axsguard Gatekeeper-specific settings can be applied to users and groups on the fly or with user and group templates (as explained in section 4.11) Existing Users and Groups and Synchronization When synchronization is enabled, existing axsguard Gatekeeper users and groups with an identical name on the Directory Server, are upgraded to the Directory Server's user or group type. 3.4 Single Sign-On (SSO) and Directory Services The axsguard Gatekeeper Single Sign-On (SSO) Utility is an authentication tool which enables users who are stored in an LDAP database, such as Microsoft Windows AD, to provide only a single set of credentials to get access to predefined resources on multiple systems (see Image 5). For more information about the SSO utility, its installation and specifics, please consult the Single Sign-On Utility (SSO) guide, which can be accessed by clicking on the permanently available Documentation button in the Administrator Tool. Image 5: SSO Concept 16

17 Directory Services Concept 3.5 Group Concepts The primary purpose of using groups is to simplify access control arrangements. There is a crucial difference between axsguard Gatekeeper groups and groups in Active Directory axsguard Gatekeeper Groups On the axsguard Gatekeeper, a user can only be assigned to a single group at a given time. There is no possibility to assign a user to multiple groups simultaneously (see Image 6). This could be compared to the Primary Group concept in Active Directory Active Directory Groups In Active Directory, users can be assigned to multiple groups simultaneously, but only to one Primary Group (see Image 6). Image 6: axsguard vs. Active Directory Groups 17

18 Directory Services Configuration 4 Directory Services Configuration 4.1 Overview This section provides a detailed overview of the axsguard Gatekeeper DS configuration. Some configuration settings require LDAP syntax, as explained in chapter Feature Activation Before you can use the axsguard Gatekeeper Directory Services Module and synchronize users and groups, you need to enable the feature on the axsguard Gatekeeper: 1. Log on to the axsguard Gatekeeper, as explained in the axsguard Gatekeeper System Administration How To, which can be accessed by clicking on the permanently on-screen Documentation button in the Administrator Tool. 2. Navigate to System > Feature Activation. 3. In the left pane, expand the Directory Services Integration option. 4. Check the Do you use Directory Services Integration check box, as shown below. 5. Click on Update. Image 7: Directory Services Feature Activation 18

19 Directory Services Configuration 4.3 Enabling DS Lookups Before users and groups can be imported and synchronized, the DS lookups option should be enabled: 1. Log on to the axsguard Gatekeeper, as explained in the axsguard Gatekeeper System Administration How To, which can be accessed by clicking on the permanently on-screen Documentation button in the Administrator Tool. 2. Navigate to Directory Services > General. 3. Check the Enable DS Lookups option. Image 8: Enabling DS Lookups 4.4 Selecting the Directory Server Type Specify the type of your Directory Server (edirectory and Active Directory are both supported). 1. Follow steps 1 and 2 as explained above. 2. Select the type of Directory Server you wish to use for authentication and / or synchronization: Active Directory Novell Directory Services Posix LDAP Image 9: Available DS Server Types Note See section 2.5 for the supported types. 19

20 Directory Services Configuration 4.5 Adding the Directory Server The DS feature offers the possibility to enter a Primary Directory Server and one or multiple backups for that server (see Image 9 on page 19). The entered servers should be each other's mirrors. In case of a problem with the Primary Directory Server, the axsguard Gatekeeper automatically reverts to the backup(s) for user and group synchronization / authentication. To add the Directory Server(s) IP addresses: 1. Log on to the axsguard Gatekeeper, as explained in the axsguard Gatekeeper System Administration How To, which can be accessed by clicking on the permanently on-screen Documentation button in the Administrator Tool. 2. Navigate to Directory Services > General. 3. Enter the IP address of the Directory Server in the Server IP Address field. 4. Click on the Add button. 5. Follow the same procedure to add a Directory Services backup server (mirror). Image 10: Adding a Directory Server's IP Address 4.6 Specifying the Directory Base Enter the tree base of the Directory Server as shown below. Use LDAP syntax as explained in section 2: 1. Follow steps 1 and 2, as explained above. 2. Enter the Directory Base in the Directory Base field. Use LDAP syntax as explained in section 2. (see Image 11). 3. Enter a DS username with DS tree search permissions. Use LDAP syntax as explained in section 2. (see Image 11). 4. Enter the password of the DS user with DS tree search permissions. 20

21 Directory Services Configuration Username with Search Permissions Cautions It is highly recommended to create a separate user on your Directory Server with limited access (read-only rights), as that user's password is transmitted over the LAN in cleartext during authentication. Do not use the Directory Server's administrator account. Consult your Directory Server's documentation, if necessary. It is necessary to have at least one local administrator on the axsguard Gatekeeper, in case the LDAP back-end authentication server fails (Back-end authentication is no longer possible, also see section 3.3.4). If no local administrator exists (all users are synced), the sysadmin account can be used to create a new administrator. See the axsguard Gatekeeper System Administration How To and the Getting Started Guide for more information on the sysadmin user account. Image 11: Entering DS user with Search Permission 4.7 Setting the Integration Level The axsguard Gatekeeper Integration Level, allows you to specify which options apply to your network. To set the Integration Level: 1. Log on to the axsguard Gatekeeper, as explained in the axsguard Gatekeeper System Administration How To, which can be accessed by clicking on the permanently on-screen Documentation button in the Administrator Tool. 2. Navigate to Directory Services > General. 3. Select the options applicable to your network (see Image 12), as explained in Table 2. Image 12: Setting the Integration Level 21

22 Directory Services Configuration Caution User and Group data which has been (automatically) deleted from the axsguard Gatekeeper cannot be recovered, including mail boxes. The automatically delete users option should be used with care. Renaming a user or group on the Directory Server causes the original user/group to be erased on the axsguard Gatekeeper during the next synchronization. This means manually configured settings and critical user data ( ) of a specific group or user are irrevocably lost. Table 2: Overview of DS Integration Level Options Option Description Synchronize group and user objects Check this option to synchronize the axsguard Gatekeeper with the Directory Server. Users and groups are synchronized every minute. Do not enable this option if you are creating user or group templates (see section 4.11). Automatically delete users If this option is checked, deleted Directory Server users are also deleted from the axsguard Gatekeeper during the next synchronization. If the option is unchecked, the synchronized user and group information remains on the axsguard Gatekeeper and will be marked as such (see sections and ). Also see the caution above. Add user mail addresses as aliases If checked, the user's Directory Server mail address(es) is/are imported on the axsguard Gatekeeper as an alias. This is useful when, for instance, there is no Exchange Server in your network and the axsguard Gatekeeper is used as a mail server or when different mail access rights apply on the axsguard Gatekeeper. (Please refer to the axsguard Gatekeeper Relay How To, which is accessible by clicking on the permanently on-screen Documentation button in the administrator tool). aliases are synchronized as of the second synchronization, not during the initial synchronization. If the alias is identical to the username, it is not imported on the axsguard Gatekeeper, since the username constitutes an alias by itself. Add SMTP Proxy Addresses as mail aliases (AD Specific) The following option only applies to Microsoft Active Directory servers with a Microsoft Exchange Plugin. If checked, the SMTP addresses are synchronized. A user who wants to receive from outside the Exchange organization, needs an address which a foreign messaging system can understand. Microsoft calls this a proxy address because Exchange acts as a proxy for the foreign messaging system. Because Exchange uses SMTP for internal and external mail routing, all objects in Active Directory get an SMTP proxy address. Exchange also assigns an X.400 proxy address, just in case messages need routing to a legacy Exchange system. Legacy Exchange uses X.400 to route messages. aliases are synchronized as of the second synchronization, not during the initial synchronization. 22

23 Directory Services Configuration 4.8 Group Filters (Group Selection) Group filters allow you to specify which groups should be imported and synchronized, based on the search path on the Directory Server. In order to assign a user to an axsguard Gatekeeper group, the group should exist (be valid) before the user is created or imported. Groups are always synchronized before users. Caution If the Directory Base for Group search is limited to the domain tree (see section 2.3.3) and '*' is entered in the Add these groups only field, ALL groups of the Directory Server are imported and synchronized, cluttering the axsguard Gatekeeper Groups database (Users&Groups > Groups) Path-based Group Selection With path-based group selection, the axsguard Gatekeeper queries and only imports groups from the specified location (path). The path should be entered using LDAP syntax (see section 2.3.3), e.g. ou=groups,ou=mycompany,dc=mycompany,dc=com. The Directory Base for Group search field recursively points to the location on the Directory Server where the groups to be imported on and synchronized with the axsguard Gatekeeper are stored. The axsguard Gatekeeper initiates the synchronization before any objects are imported. To enter the search path: 1. Log on to the axsguard Gatekeeper, as explained in the axsguard Gatekeeper System Administration How To, which can be accessed by clicking on the permanently on-screen Documentation button in the Administrator Tool. 2. Navigate to Directory Services > General. 3. Enter the group search path, using LDAP syntax (see section 2.3.3). 4. In order to import all groups of the entered base path, enter '*' (without quotes) as the group pattern (see Image 13). Image 13: Path-based Group Selection 23

24 Directory Services Configuration Membership-based Group Selection Groups can be selected based on their full DS name or by using group patterns. (DOS wildcards), as shown below. Group names and / or patterns can be added by entering the group in the add these groups only field and by pressing enter or by clicking on the add button. Only the groups which have been specified will be imported and synchronized. To specify the groups to be imported / synchronized: 1. Follow steps 1 and 2 as explained in section Enter the full DS group name or a group pattern (see Image 14). 3. Click on Add or press enter. Image 14: Membership-based Group Selection 4.9 User Filters (User Selection) Similar to group filters, explained in section 4.8, a path which recursively points to the users on the Directory Server must be configured (a user filter). The axsguard Gatekeeper uses this path to import and synchronize the DS user information. There are 5 different methods to import and synchronize DS users. Three methods exist to import centralized users and are explained in section Two methods exist to import decentralized users and are explained in section Note Users which are selected to be imported / synchronized should be members of a valid group. A group should exist on the axsguard Gatekeeper before a user(s) is / are created or imported. For this reason, groups are always synchronized before users. 24

25 Directory Services Configuration Centralized Users (Single OU) This section explains the three possible methods to import centralized users; users stored in a single organizational unit or OU on the Directory Server. To import centralized users: 1. Log on to the axsguard Gatekeeper, as explained in the axsguard Gatekeeper System Administration How To, which can be accessed by clicking on the permanently on-screen Documentation button in the Administrator Tool. 2. Navigate to Directory Services > General. 3. Enter the user search path, using LDAP syntax (see section 2.3.3). 4. Check the options as explained in Table 3. Table 3: Importing and Syncrhonizing Centralized Users Option Description Adding users based on the Directory Base for User Search If no option is checked, the axsguard Gatekeeper only imports and synchronizes the users based on the entered search path. In the example shown on page 26, the users from the organizational unit Users is imported and added to a user template on the axsguard Gatekeeper. The group which is specified in the user template is used when no valid group is specified for the user on the Directory Server. If a valid group is specified for the user, item 3 of this table applies. Default user and group templates exist on the axsguard Gatekeeper and can be customized as needed. User and group templates are explained in section Only add users with a Valid Primary Group If checked, the axsguard Gatekeeper only imports and synchronizes users who are located in the specified DS search path and who are members of a valid Primary DS Group. For setting the Primary Group of a user in Windows 2003, consult the adequate Microsoft documentation. Only add users which are members of a valid group If checked, the axsguard Gatekeeper only imports and synchronizes users who are located in the specified DS search path and are members of a valid DS group. When an AD user is a member of several valid groups and the Primary Group is set to a non-valid group, the group which appears first in that user's AD profile is imported on the axsguard Gatekeeper. The user is then automatically assigned to this group on the axsguard Gatekeeper. AD uses the alphabetical order to organize group names. Priority is given to the Primary Group, if present in the user profile. 25

26 Directory Services Configuration Image 15: User Filters Decentralized Users (Multiple OUs) This situation most probably occurs when your organization already has an installed and configured Directory Server and the users are spread out over the Directory tree (Multiple Organizational Units or OUs), rather than stored in a single organizational unit (see.section 4.9.1). It is therefore critical to set and verify the search parameters correctly, so that unneeded users and groups are not accidentally imported and synchronized. This also avoids extra license costs. To import decentralized users: 1. Follow steps 1 and 2 as explained in section Enter the user search path, using LDAP syntax (see section 2.3.3). 3. Check the options as explained below (also see Table 3 on page 25). Adding users assigned to a Valid Primary Group: the axsguard Gatekeeper only imports and synchronizes users who are located in the specified Directory Base and who are members of a valid Primary Group on the Directory Server. This method is similar to the one described in section The main distinction is that the Directory Base for Group search and the Directory Base for User search parameters should be modified accordingly, because the users are spread out over the AD tree and not centralized in a single organizational unit. Adding users assigned to a Valid Group: Here as well, the Directory Base for Group search and the Directory Base for User search should be modified accordingly. If no valid primary group has been assigned to a DS user, the first valid group occurring in that user's profile is imported and synchronized. Priority is given to the Primary Group, if present. In an Active Directory user profile, groups are ordered alphabetically. 26

27 Directory Services Configuration 4.10 Directory Services Name Restrictions Some group and user name restrictions apply when importing DS users and groups. If the restrictions aren't met, the Directory Services status displays a warning message (see Image 16). An overview of naming restrictions is provided in Table 4: Image 16: Name Restrictions Table 4: Overview of Directory Services Naming Restrictions Restriction Type Description Group and User name restrictions User and group names may not exceed 25 characters. User name-specific restrictions No special characters, such as French accents, may be used. Spaces are not allowed. Group name-specific restrictions Special French characters are automatically converted (accents are removed). Other special characters such as (', +,...) are not allowed. Spaces are automatically converted to underscores. Upper cases are converted to lower cases. 27

28 4.11 Directory Services Configuration Group and User Templates Tip It is recommended to disable synchronization until the user / group templates are properly configured, as groups and users are automatically synchronized after a minute (see section 3.3.1). Temporarily disabling synchronization prevents users and groups from being imported before the proper template(s) is / are in place. axsguard Gatekeeper user and group templates facilitate the organization and customization of axsguard Gatekeeper specific settings to be assigned groups or users. Rather than creating individual axsguard Gatekeeper settings per user, it is much more convenient and efficient to define templates in which certain user / group settings, such as Firewall access rights, Web access rights and Mail policies are predefined and combined. If you have a large amount of users within your organization, managing settings per user soon becomes cumbersome. Therefore, the administrator(s) will need to assess beforehand which group and user settings are the most widely used by the majority of the employees within their organization and define them in templates on the axsguard Gatekeeper. More simply put, the administrators need to ascertain the lowest common denominator for all users. If a certain user or group needs special access (or needs to be denied access) to a specific resource, it is easier to define and assign the exception(s) afterwards. Note Templates are only applied to users and groups which are initially imported on the axsguard Gatekeeper. Once a group or user is imported, template modification does not affect the existing user and / or group settings, even after a next synchronization with the Directory Server. This is to prevent the loss of any manual modifications Editing the Group Template To edit a group template: 1. Log on to the axsguard Gatekeeper, as explained in the axsguard Gatekeeper System Administration How To, which can be accessed by clicking on the permanently on-screen Documentation button in the Administrator Tool. 2. Navigate to Users & Groups > Groups 3. Click on Template. The Group template detail screen is displayed (see Image 17). 28

29 Directory Services Configuration Image 17: Group Template Configuration Screen 4. Navigate through the tabs and adjust the settings accordingly. 5. Click on Update to finish. Example Image 17 shows three tabs: , Web Access and Firewall. The number of tabs varies according to the purchased software licenses. In this example, we configure a group template in which Web Access is forbidden. Click on the Web Acces Tab and select No Access Everything is blocked from the drop-down list. Click on Update to save the template settings (see Image 18). Image 18: Example of a Group Template After synchronization, all imported groups are denied Web Access as defined in the group template (see Image 19). Image 19: Application of a Group Template 29

30 Directory Services Configuration Image 20: Synchronized Groups Icons Editing the User Template As for groups, templates can be created for new users: 1. Log on to the axsguard Gatekeeper, as explained in the axsguard Gatekeeper System Administration How To, which can be accessed by clicking on the permanently on-screen Documentation button in the Administrator Tool. 2. Navigate to Users & Groups > Users 3. Click on Template. The User template detail screen is displayed. Image 21: User Template Configuration Screen 4. Navigate through the tabs and adjust the settings accordingly. 5. Click on Update to finish. 30

31 Directory Services Configuration Example Image 21 shows several tabs. The number of tabs on your axsguard Gatekeeper may vary, since they depend on the software options you purchased. Assuming you only wish to grant Web Access during working hours to all imported users, click on the Web Access tab. Check Overrule Group Web Access Filter and select Working Hours from the drop down menu. Click on Update to save the settings. Image 22: Example of a User Template All newly imported users have web access during working hours, regardless of the group they are assigned to. Image 23: Syncrhonized User Icons Note Synchronized users only remain on the axsguard Gatekeeper if the Automatically Delete Users option is disabled (see section 4.7). 31

32 4.12 Directory Services Configuration Status, Tools and Logs The Directory Services status, tools and logs are explained in chapter 5. 32

33 5 Configuration Example 5.1 Overview Configuration Example This chapter provides a configuration example of the axsguard Gatekeeper Directory Services configuration as used with a Microsoft Active Directory Server. The Directory Services Status, Tools and Logs are explained afterwards. 5.2 Before you start: Configuring the User and Group Templates Tip It is recommended to disable synchronization until the user / group templates are properly modified, as groups and users are automatically synchronized after a minute. Temporarily disabling synchronization prevents users and groups from being imported before the proper template(s) is / are in place. Before importing and/or synchronizing users and groups, make sure to configure the adequate user and group templates as explained in section 4.11 (if applicable). 5.3 Feature Activation Make sure the Directory Services feature is enabled: 1. Log on to the axsguard Gatekeeper, as explained in the axsguard Gatekeeper System Administration How To, which can be accessed by clicking on the permanently on-screen Documentation button in the Administrator Tool. 2. Navigate to System > Feature Activation. 3. Enable the Directory Services Integration. 4. Click on Update. 5.4 Directory Services Main Screen To configure Directory Synchronization: 1. Make sure you have at least on local advanced administrator account on the axsguard Gatekeeper (see section 3.3.4). 2. Log on to the axsguard Gatekeeper, as explained in the axsguard Gatekeeper System Administration How To, which can be accessed by clicking on the permanently on-screen Documentation button in the Administrator Tool. 3. Navigate to Directory Services > General. 4. Configure the settings as explained in chapter 4 and shown in the example on the next page. 33

34 Configuration Example Image 24: Directory Services Configuration Example 34

35 Configuration Example 1. Check the Enable DS lookups option. 2. Select Active Directory as the Service Type from the drop-down list. 3. Enter the IP address of the Active Directory Server and its back-up(s) (if applicable), e.g Enter the Directory Base using the LDAP syntax (see section 2.3.3), e.g. dc=mycompany,dc=com. 5. Create a user whose access is limited to searching the Directory Tree (read-only access) on the Directory Server. Refer to the adequate Microsoft documentation if necessary. 6. Enter the search path to the newly created Active Directory user, using LDAP syntax (see section 2.3.3), e.g. cn=axsguard,cn=users,dc=mycompany,dc=com. 7. Enter that user's password twice. 8. Select the Integration Level as explained in section Enter the Directory Base for Group Search (see section 4.8), using LDAP syntax, e.g. ou=groups,ou=mycompany,dc=mycompany,dc=com. 10. Enter the group name(s) which should be imported from / synchronized with the Directory Server as explained in section 4.8, e.g. sales, accounting, legal* or '*' without the quotes, if all groups of the specified path should be imported / synchronized. 11. Enter the Directory Base for User Search (see section 4.9), using LDAP syntax, e.g. ou=users,ou=mycompany,dc=mycompany,dc=com. 12. Select the users which need to be imported / synchronized as explained in section 4.9 (Member of Primary Group / Member of Valid Group / Based on Directory Base User search path). 13. Click on Update when finished. 5.5 Checking the Directory Services Status The Directory Services Status screen, allows you to verify if the synchronization was successful. Any problems will be reported. To check the status: 1. Log on to the axsguard Gatekeeper, as explained in the axsguard Gatekeeper System Administration How To, which can be accessed by clicking on the permanently on-screen Documentation button in the Administrator Tool. 2. Navigate to Directory Services > Status. Image 25: Directory Services Status 35

36 Configuration Example 5.6 Directory Services Test Tool The Directory Services Test Tool allows you to test settings on the fly. To test your settings: 1. Log on to the axsguard Gatekeeper, as explained in the axsguard Gatekeeper System Administration How To, which can be accessed by clicking on the permanently on-screen Documentation button in the Administrator Tool. 2. Navigate to Directory Services > Tools. 3. Click on here to test your configuration settings (see Image 26). Image 26: Directory Services Tools 5.7 Directory Services Logs To access the Directory Services logs: 1. Log on to the axsguard Gatekeeper, as explained in the axsguard Gatekeeper System Administration How To, which can be accessed by clicking on the permanently on-screen Documentation button in the Administrator Tool. 2. Navigate to Directory Services > Logs. A list of log files is displayed. The most recent log file appears on top of the list. Click on a log file date to view its details. Clicking on the live button displays the details of the most recent log. Image 27: Directory Services Logs 36

37 6 Troubleshooting Troubleshooting I have deleted a group on the Directory Server, but the group is not automatically removed / deleted from the axsguard Gatekeeper after synchronization A group cannot be deleted / removed on the axsguard Gatekeeper as long as it contains users. This is to preserve the referential integrity. Under certain conditions, a group can be removed / deleted from the Directory Server (i.e. Active Directory), while still in use by the axsguard Gatekeeper. If the "automatically delete users" option is disabled (see section 4.7), the axsguard Gatekeeper will keep a deleted AD user (and his/her according settings +- ). The user is marked by a red cross in the axsguard Gatekeeper administrator tool (see section ). The group / user and according settings do no longer exist on the axsguard Gatekeeper. If the "automatically delete users" option is enabled (see section 4.7): Renaming a user or group on the Directory Server causes the original user/group to be erased on the axsguard Gatekeeper during the next synchronization. This means manually configured settings and critical user data ( ) of a specific group or user are irrevocably lost (see section 4.7). This situation can be prevented by following this procedure: Disable DS synchronization on the axsguard Gatekeeper Rename the synchronized group on the axsguard Gatekeeper Modify the synchronized group name on the Directory Server Re-activate DS synchronization on the axsguard Gatekeeper I cannot access the axsguard Gatekeeper Administrator Tool. It is necessary to have at least one local advanced administrator on the axsguard Gatekeeper, in case the LDAP back-end authentication server fails (Back-end authentication is no longer possible). Local axsguard Gatekeeper users and groups which have the same name on the Directory Server, are upgraded to DS users and group during synchronization (see section 3.3.4). If no local administrator exists,(all users are synced) the sysadmin account can be used to create a new administrator. See the axsguard Gatekeeper System Administration How To and the Getting Started Guide for more information on the sysadmin user account. I receive an error when using special characters in user and / or group names See section The support for the use of special characters is on the axsguard Gatekeeper development roadmap. How can I view the LDAP objects in Active Directory? In Windows 2003 and 2008, open a command prompt and execute adsiedit.msc (see section 2.3.2). I get an error message in the Directory Service Test tool Check the server settings under Directory Services > General. Check the entered search paths (see sections 4.8 and 4.9). Check the Directory Server's configuration. 37

38 Troubleshooting When synchronizing a new user with AD, the user's alias is initially not synchronized aliases are automatically synchronized as of the second synchronization with the Directory Server. 38

axsguard Gatekeeper Internet Redundancy How To v1.2

axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH

More information

Hyper-V Installation Guide. Version 8.0.0

Hyper-V Installation Guide. Version 8.0.0 Hyper-V Installation Guide Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. About this Document... 1 1.2. Documentation and Training... 1 1.3. About the AXS GUARD... 1 1.3.1. Introduction... 1

More information

DIGIPASS as a Service. Google Apps Integration

DIGIPASS as a Service. Google Apps Integration DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About

More information

Internet Redundancy How To. Version 8.0.0

Internet Redundancy How To. Version 8.0.0 Internet Redundancy How To Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. 1.2. 1.3. 1.4. About this Document... Examples used in this Guide... Documentation Sources... About the AXS GUARD...

More information

axsguard Gatekeeper Open VPN How To v1.4

axsguard Gatekeeper Open VPN How To v1.4 axsguard Gatekeeper Open VPN How To v1.4 Legal Notice VASCO Products VASCO Data Security, Inc. and/or VASCO Data Security International GmbH are referred to in this document as 'VASCO'. VASCO Products

More information

axsguard Gatekeeper System Administration How To v1.7

axsguard Gatekeeper System Administration How To v1.7 axsguard Gatekeeper System Administration How To v1.7 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH are referred to in this document as 'VASCO'. VASCO

More information

IP Tunnels September 2014

IP Tunnels September 2014 IP Tunnels September 2014 Table of Contents 1. Introduction... 1 1.1. About this Document... 1 1.2. Concept... 1 2. Configuration and Parameters... 2 VASCO Data Security 2014 ii VASCO Products VASCO Data

More information

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8

IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2008 2015 VASCO Data Security, Inc., VASCO Data Security International

More information

axsguard Gatekeeper IPsec XAUTH How To v1.6

axsguard Gatekeeper IPsec XAUTH How To v1.6 axsguard Gatekeeper IPsec XAUTH How To v1.6 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH are referred to in this document as 'VASCO'. VASCO Products

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter

INTEGRATION GUIDE. DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter INTEGRATION GUIDE DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained

More information

axsguard Gatekeeper Reverse Proxy How To 1.5

axsguard Gatekeeper Reverse Proxy How To 1.5 axsguard Gatekeeper Reverse Proxy How To 1.5 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH are referred to in this document as 'VASCO'. VASCO Products

More information

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass

INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass INTEGRATION GUIDE DIGIPASS Authentication for F5 FirePass Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is

More information

IPS How To. Version 8.0.0

IPS How To. Version 8.0.0 IPS How To Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. About this Document... 1 1.2. Examples used in this Guide... 1 1.3. Documentation and Training... 1 1.4. About the AXS GUARD... 2 1.4.1.

More information

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace

INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';

More information

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations

More information

MIGRATION GUIDE. Authentication Server

MIGRATION GUIDE. Authentication Server MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN

INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN INTEGRATION GUIDE DIGIPASS Authentication for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data

More information

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN

INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO

More information

INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server

INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server INTEGRATION GUIDE DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505

INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505 INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this

More information

Identikey Server Getting Started Guide 3.1

Identikey Server Getting Started Guide 3.1 Identikey Server Getting Started Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without

More information

OVERVIEW. DIGIPASS Authentication for Office 365

OVERVIEW. DIGIPASS Authentication for Office 365 OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility

More information

DIGIPASS Authentication for GajShield GS Series

DIGIPASS Authentication for GajShield GS Series DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and

More information

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007

INTEGRATION GUIDE. DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007 INTEGRATION GUIDE DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

DIGIPASS Authentication for Citrix Access Gateway VPN Connections

DIGIPASS Authentication for Citrix Access Gateway VPN Connections DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer

More information

DIGIPASS Authentication for Windows Logon Product Guide 1.1

DIGIPASS Authentication for Windows Logon Product Guide 1.1 DIGIPASS Authentication for Windows Logon Product Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions,

More information

Reverse Proxy How To. Version 8.0.0

Reverse Proxy How To. Version 8.0.0 Reverse Proxy How To Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. 1.2. 1.3. 1.4. About this Document... Examples used in this Guide... Documentation Sources... About the AXS GUARD... 1.4.1.

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication

DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of

More information

DIGIPASS as a Service. Product Guide

DIGIPASS as a Service. Product Guide DIGIPASS as a Service Product Guide October 2011 Table of Contents 1. Introduction... 1 1.1. 1.2. 1.3. 1.4. Audience and Purpose of this Document... Available Guides... What is DIGIPASS as a Service?...

More information

DIGIPASS Authentication for Check Point Security Gateways

DIGIPASS Authentication for Check Point Security Gateways DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and

More information

FOR WINDOWS FILE SERVERS

FOR WINDOWS FILE SERVERS Quest ChangeAuditor FOR WINDOWS FILE SERVERS 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1

DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1 DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or

More information

Check Point FDE integration with Digipass Key devices

Check Point FDE integration with Digipass Key devices INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document

More information

Radius Integration Guide Version 9

Radius Integration Guide Version 9 Radius Integration Guide Version 9 Document version 9402-1.0-18/10/2006 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but

More information

DIGIPASS Authentication for Cisco ASA 5500 Series

DIGIPASS Authentication for Cisco ASA 5500 Series DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations

More information

MobileStatus Server Installation and Configuration Guide

MobileStatus Server Installation and Configuration Guide MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,

More information

DIGIPASS Authentication for Sonicwall Aventail SSL VPN

DIGIPASS Authentication for Sonicwall Aventail SSL VPN DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties

More information

DIGIPASS Authentication for Check Point Connectra

DIGIPASS Authentication for Check Point Connectra DIGIPASS Authentication for Check Point Connectra With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 21 Disclaimer Disclaimer of Warranties and Limitations

More information

CA Spectrum and CA Embedded Entitlements Manager

CA Spectrum and CA Embedded Entitlements Manager CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically

More information

Password Management Guide

Password Management Guide www.novell.com/documentation Management Guide Identity Manager 4.0.2 June 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

Identikey Server Windows Installation Guide 3.1

Identikey Server Windows Installation Guide 3.1 Identikey Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

DIGIPASS CertiID. Getting Started 3.1.0

DIGIPASS CertiID. Getting Started 3.1.0 DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express

More information

Delegated Administration Quick Start

Delegated Administration Quick Start Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,

More information

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)

INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE) INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';

More information

Defender Delegated Administration. User Guide

Defender Delegated Administration. User Guide Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01

Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01 Oracle Enterprise Single Sign-on Provisioning Gateway Administrator Guide Release 10.1.4.1.0 E12613-01 March 2009 Oracle Enterprise Single Sign-on Provisioning Gateway, Administrator Guide, Release 10.1.4.1.0

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

ADS Integration Guide

ADS Integration Guide ADS Integration Guide Document version 9402-1.0-18/10/2006 Cyberoam ADS Integration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

HOTPin Integration Guide: Google Apps with Active Directory Federated Services HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac)

How To Install Caarcserve Backup Patch Manager 27.3.2.2 (Carcserver) On A Pc Or Mac Or Mac (Or Mac) CA ARCserve Backup Patch Manager for Windows User Guide r16 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

Novell Identity Manager

Novell Identity Manager Password Management Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 3.6.1 June 05, 2009 www.novell.com Identity Manager 3.6.1 Password Management Guide Legal Notices Novell, Inc. makes no representations

More information

INTEGRATION GUIDE. General Radius Config

INTEGRATION GUIDE. General Radius Config INTEGRATION GUIDE General Radius Config Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no

More information

Quality Center LDAP Guide

Quality Center LDAP Guide Information Services Quality Assurance Quality Center LDAP Guide Version 1.0 Lightweight Directory Access Protocol( LDAP) authentication facilitates single sign on by synchronizing Quality Center (QC)

More information

Security Explorer 9.5. User Guide

Security Explorer 9.5. User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

How To Install Ctera Agent On A Pc Or Macbook With Acedo (Windows) On A Macbook Or Macintosh (Windows Xp) On An Ubuntu 7.5.2 (Windows 7) On Pc Or Ipad

How To Install Ctera Agent On A Pc Or Macbook With Acedo (Windows) On A Macbook Or Macintosh (Windows Xp) On An Ubuntu 7.5.2 (Windows 7) On Pc Or Ipad Deploying CTERA Agent via Microsoft Active Directory and Single Sign On Cloud Attached Storage September 2015 Version 5.0 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

axsguard Gatekeeper Command Line Interface How To v1.6

axsguard Gatekeeper Command Line Interface How To v1.6 axsguard Gatekeeper Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH are referred to in this document as 'VASCO'. VASCO Products comprise Hardware, Software,

More information

PineApp Surf-SeCure Quick

PineApp Surf-SeCure Quick PineApp Surf-SeCure Quick Installation Guide September 2010 WEB BASED INSTALLATION SURF-SECURE AS PROXY 1. Once logged in, set the appliance s clock: a. Click on the Edit link under Time-Zone section.

More information

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that

More information

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide

BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9

More information

GRAVITYZONE HERE. Deployment Guide VLE Environment

GRAVITYZONE HERE. Deployment Guide VLE Environment GRAVITYZONE HERE Deployment Guide VLE Environment LEGAL NOTICE All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, including

More information

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide

Quest ChangeAuditor 5.1 FOR ACTIVE DIRECTORY. User Guide Quest ChangeAuditor FOR ACTIVE DIRECTORY 5.1 User Guide Copyright Quest Software, Inc. 2010. All rights reserved. This guide contains proprietary information protected by copyright. The software described

More information

Configuring Sponsor Authentication

Configuring Sponsor Authentication CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Installation Guide Supplement

Installation Guide Supplement Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,

More information

Secure your business DIGIPASS BY VASCO. The world s leading software company specializing in Internet Security

Secure your business DIGIPASS BY VASCO. The world s leading software company specializing in Internet Security Secure your business DIGIPASS BY VASCO The world s leading software company specializing in Internet Security Secure Your Business A secure and flexible work environment Today s workforce needs to use

More information

Configuration Guide BES12. Version 12.2

Configuration Guide BES12. Version 12.2 Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property

More information

SafeNet Authentication Manager Express. Upgrade Instructions All versions

SafeNet Authentication Manager Express. Upgrade Instructions All versions SafeNet Authentication Manager Express Upgrade Instructions All versions www.safenet-inc.com 4690 Millennium Drive, Belcamp, Maryland 21017 USA Telephone: +1 410 931 7500 or 1 800 533 3958 www.safenet-inc.com

More information

IDENTIKEY Server Windows Installation Guide 3.2

IDENTIKEY Server Windows Installation Guide 3.2 IDENTIKEY Server Windows Installation Guide 3.2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

Trustwave SEG Cloud Customer Guide

Trustwave SEG Cloud Customer Guide Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation

More information

TRITON Unified Security Center Help

TRITON Unified Security Center Help TRITON Unified Security Center Help Websense TRITON Unified Security Center v7.7 2011-2012, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2012 Printed

More information

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software

Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved

More information

XenClient Enterprise Synchronizer Installation Guide

XenClient Enterprise Synchronizer Installation Guide XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V

More information

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide

Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations

More information

How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance

How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance An Oracle Technical White Paper November 2014 How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance Table of Contents Introduction...3 Active Directory LDAP Services...4

More information

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide

WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see

More information

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

HP A-IMC Firewall Manager

HP A-IMC Firewall Manager HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this

More information

Integrated Citrix Servers

Integrated Citrix Servers Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights

More information

CA Technologies SiteMinder

CA Technologies SiteMinder CA Technologies SiteMinder Agent for Microsoft SharePoint r12.0 Second Edition This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to

More information

Configuration Guide BES12. Version 12.1

Configuration Guide BES12. Version 12.1 Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

CONFIGURING ACTIVE DIRECTORY IN LIFELINE

CONFIGURING ACTIVE DIRECTORY IN LIFELINE White Paper CONFIGURING ACTIVE DIRECTORY IN LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Test Environment 2 Joining a Lenovo network storage device to an AD domain 3 Importing Domain Users

More information

ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7

ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7 ECAT SWE Exchange Customer Administration Tool SWE - Exchange Customer Administration Tool (ECAT) Table of Contents About this Guide... 3 Audience and Purpose... 3 What is in this Guide?... 3 CA.mail Website...

More information

Installation Guide. Version 1.5. May 2015 Edition 2002-2015 ICS Learning Group

Installation Guide. Version 1.5. May 2015 Edition 2002-2015 ICS Learning Group Installation Guide Version 1.5 May 2015 Edition 2002-2015 ICS Learning Group 1 Disclaimer ICS Learning Group makes no representations or warranties with respect to the contents or use of this manual, and

More information

Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services

Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

KeyAdvantage System DMS Integration. Software User Manual

KeyAdvantage System DMS Integration. Software User Manual KeyAdvantage System DMS Integration Software User Manual ii Copyright Disclaimer Trademarks and patents Intended use EMC Directive Regulatory 2013 United Technologies Corporation. All rights reserved.

More information

DIGIPASS Authentication for Juniper ScreenOS

DIGIPASS Authentication for Juniper ScreenOS DIGIPASS Authentication for Juniper ScreenOS With Vasco VACMAN Middleware 3.0 2007 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 53 Disclaimer Disclaimer of Warranties and Limitations

More information