Traitware Authentication Service Integration Document
|
|
|
- Merry Briggs
- 10 years ago
- Views:
Transcription
1 Traitware Authentication Service Integration Document February 2015 V1.1 Secure and simplify your digital life.
2 Integrating Traitware Authentication This document covers the steps to integrate Traitware Authentication into your existing web applications. To do so you will need to become a little bit familiar with OAuth 2.0 if you are not already. Fortunately there are several OAuth 2.0 open source libraries written in various languages depending on your server-side requirements. There are three main steps to integrate with Traitware: 1. Add an application to your Traitware Customer Console. This is where you register the application you are going to protect. 2. Add your users to the Traitware system and set their permissions. This can be done through our APIs or through the Traitware Customer Console web site. 3. Create the necessary modifications to your webserver and backend to handle the OAuth 2.0 authentication flow. Add an Application to the Traitware Customer Console You are required to use the Traitware app to login to your Traitware Customer Console (TCC). When you first establish a customer account with Traitware you should receive an activation code to activate the Traitware app. Once activated you will be able to access your TCC. In the future you can choose to give TCC access to other administrators when you create their accounts. 1. Go to tcc.traitware.com and click Login with Traitware
3 2. Login to the TCC by scanning the QR code using your activated Traitware app. 3. Once logged in you should see a screen like this. Your customer name should be in the top right.
4 4. Click on the Application tab on the top bar and click on the Create your application and click Save. To create your application you must provide two items: 1. The name of the application (Application Name) you are going to be using with Traitware. This can be anything but should indicate the application. 2. An OAuth Redirect URI. This is the URI Traitware will redirect to after receiving an authentication attempt.
5 You also have two additional options that can be changed at any time: 1. Toggle the Active/Inactive state of your application. Making an application inactive will block any attempts to access it via Traitware. 2. Enable Tap-to-Login. You can choose whether or not to make this access method available to your users. When inactive, you will not see a field to enter an address when trying to log in. The default for this feature is ON. 6. You will see your application listed under your application list. You can always add additional applications. 7. Click on your application to find your OAuth ClientId and OAuth Client Secret. These values are used for the OAuth 2.0 authentication flow.
6 Add Users To Traitware The Traitware service offers several APIs to register users. You can also add them manually or through a bulk.csv import. Please see the Traitware Customer API Document for a thorough overview of the available APIs. When you register a user with Traitware you will receive a traitwareuserid in the response. This value should be associated with the user in your database that you are registering. You will need to reference this value during an authentication attempt. This value is mirrored on your server and the Traitware server as a common reference point for each user. Once a user is registered you will need to send Activation Codes to your users to activate their Traitware app. When you do they will be sent an Activation Code via SMS to the number registered with their account. The Activation Code can be sent any time after a user has been registered and can be triggered via an API call or manually in the TCC under each user account. The user can enter the Activation Code into the downloaded Traitware app to activate their account on that device. **Please note that the Activation Code has an expiration time of 48 hours. You will have to issue a new code via the Traitware API if the app is not activated in that time period. The Traitware app can currently be downloaded from the Apple itunes Store and Google Play. Search for Traitware Authentication at either site. Create the OAuth 2.0 Integration Integrating the OAuth 2.0 flow into your existing web application will provide the option to direct your web application to the Traitware authentication server for login authentications. It will also allow your server to talk directly to the Traitware server to verify an authentication attempt. These are the general steps required for this integration. The sections that follow will contain additional details 1. Add a snippet of JavaScript to the HTML on your webpage. This is to add the Login with Traitware button that will redirect to the Traitware authentication site when clicked. Your web server needs to generate and store a STATE value, which is like a session identifier, to protect against Cross Site Request Forgery. This value is used by the JavaScript snippet when directed to the Traitware authentication site. 2. Create a redirect endpoint URI on your webserver for the OAuth 2.0 flow. This would be something like
7 3. Consume the parameters passed back to the redirect URI (Authorization Code, State Value, Traitware User Id) during an authentication attempt. You should verify the STATE value here to make sure it is valid. 4. Implement a call to the Traitware server to exchange the received Authorization Code for a Traitware Authentication Token. If a Token is successfully received, the user has been authenticated. 5. Upon receipt of the Authentication Token, advance your user to the authorized resource they are attempting to access. Step 1: Add JavaScript to your Login Page and Generate STATE Value The following needs to be added to the HTML in the login page where the "Login with TraitWare" button will appear: <div id="traitwareloginbutton"></div> This needs to be added to the bottom of that page: <script type="text/javascript"> TW = Object(); TW.clientId = "CLIENT_ID"; TW.state = "STATE"; </script> <script src=" api.traitware.com/twlogin.js"></script> Be sure to substitute CLIENT_ID and STATE with your own values during page render. CLIENT_ID is your application's OAuth ClientID available in the Traitware Customer Console. The STATE value needs to be generated by your web server as a protection against Cross Site Request Forgery. We suggest a random UUID of sufficient length to not be easily compromised. For example, a JavaScript UUID generator for STATE value can be found here: Step 2: Create a Redirect URI on your Webserver Create a web address that the Traitware server will call to pass an Authorization Code, a State value, and a Traitware User ID during an authentication attempt. This could be something like Remember to add the Redirect URI to your application in the TCC.
8 Step 3: Consume Authentication Parameters Passed to the Redirect URI A request to your Redirect URI would look something like this: &state=57eb45ac8 &traitwa reuserid=8de56c4a- 55b8-44df With parameters:?code= &state= &traitwareuserid= # the AUTHORIZATION_CODE # the CSRF value # the identifier linked to the authenticating user AUTHORIZATION_CODE The authorization code is used to query the Traitware server for an Authentication Token. If you receive an error, the person was not authenticated and no further action should be taken. STATE (CSRF value) - Your web server should verify that the STATE value received here is valid. If it is not an active STATE value the session may have been compromised and no further action should be taken. TRAITWARE USER ID This is the user identifier you receive when you register a user with the Traitware service. This should be linked to your user s account in your database. When you receive a request to your Redirect URI, this value is passed to let you know which user is attempting to authenticate to your site. Step 4: Call Traitware Service For Authentication Token Once you have received the Authorization Code and have verified the STATE you should request an Authentication Token from Traitware. You can do this via a JSON request or as an x-www-form-urlencoded request. This request is never passed through the browser, but through a direct server-to-server query. A request for an Authentication Token would follow one of these formats:
9 JSON Format [Content- Type: application/json] Request: POST api.traitware.com/oauth2/token { "client_id": { type: String, required: true }, # from the TCC for this application "client_secret": { type: String, required: true }, # from the TCC for this application "code": { type: String, required: true }, # AUTHORIZATION_CODE "grant_type": "authorization_code" } x-www-form-urlencoded Format [Content- Type: application/x- www- form- urlencoded] Request: POST /token QueryString Params:?client_id=CLIENT_ID # from the TCC for this application &client_secret=client_secret # from the TCC for this application &code=authorization_code &grant_type=authorization_code } **Remember that the client_secret can be found under your application in the TCC. This parameter allows your server to contact the Traitware server directly. This value is very important and needs to remain secret. Here is an example of a successful response: Successful Response: (Content- Type: application/json) { "access_token": { type: String, required: true }, "timeout": { type: Integer, required: true }, "state": { type: String, required: true } } HTTP Status 200 If you receive an access_token in the response, the user has been successfully authenticated. Step 5: Grant User Access to Authorized Resource
10 Once you have received an access_token you know the user has been authenticated with Traitware. You can now direct their web browser to the page they are requesting access to. You should use the traitwareuserid received at the Redirect URI to bind your user to the authentication session. In other words, you should grant access to the resource requested by the user associated with that particular traitwareuserid in your database. This assumes the user has authorization for that resource. API Documentation Please contact a representative from Traitware for the API documentation. [email protected]
ACR Connect Authentication Service Developers Guide
ACR Connect Authentication Service Developers Guide Revision History Date Revised by Version Description 29/01/2015 Sergei Rusinov 1.0 Authentication using NRDR account Background The document describes
OAuth 2.0 Developers Guide. Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900
OAuth 2.0 Developers Guide Ping Identity, Inc. 1001 17th Street, Suite 100, Denver, CO 80202 303.468.2900 Table of Contents Contents TABLE OF CONTENTS... 2 ABOUT THIS DOCUMENT... 3 GETTING STARTED... 4
Fairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
How To Use Kiteworks On A Microsoft Webmail Account On A Pc Or Macbook Or Ipad (For A Webmail Password) On A Webcomposer (For An Ipad) On An Ipa Or Ipa (For
GETTING STARTED WITH KITEWORKS DEVELOPER GUIDE Version 1.0 Version 1.0 Copyright 2014 Accellion, Inc. All rights reserved. These products, documents, and materials are protected by copyright law and distributed
Using ArcGIS with OAuth 2.0. Aaron Parecki @aaronpk CTO, Esri R&D Center Portland
Using ArcGIS with OAuth 2.0 Aaron Parecki @aaronpk CTO, Esri R&D Center Portland Before OAuth Apps stored the user s password Apps got complete access to a user s account Users couldn t revoke access to
Login with Amazon. Getting Started Guide for Websites. Version 1.0
Login with Amazon Getting Started Guide for Websites Version 1.0 Login with Amazon: Getting Started Guide for Websites Copyright 2016 Amazon Services, LLC or its affiliates. All rights reserved. Amazon
Login with Amazon. Developer Guide for Websites
Login with Amazon Developer Guide for Websites Copyright 2014 Amazon Services, LLC or its affiliates. All rights reserved. Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.
Axway API Gateway. Version 7.4.1
O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1
Configuration Guide - OneDesk to SalesForce Connector
Configuration Guide - OneDesk to SalesForce Connector Introduction The OneDesk to SalesForce Connector allows users to capture customer feedback and issues in OneDesk without leaving their familiar SalesForce
Office365Mon Developer API
Office365Mon Developer API Office365Mon provides a set of services for retrieving report data, and soon for managing subscriptions. This document describes how you can create an application to programmatically
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps
Dell One Identity Cloud Access Manager 8.0.1 - How to Develop OpenID Connect Apps May 2015 This guide includes: What is OAuth v2.0? What is OpenID Connect? Example: Providing OpenID Connect SSO to a Salesforce.com
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0)
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0) July 2015 Oracle API Gateway OAuth User Guide, 11g Release 2 (11.1.2.4.0) Copyright 1999, 2015, Oracle and/or its
Copyright Pivotal Software Inc, 2013-2015 1 of 10
Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10
OAuth2lib. http://tools.ietf.org/html/ietf-oauth-v2-10 implementation
OAuth2lib http://tools.ietf.org/html/ietf-oauth-v2-10 implementation 15 Julio 2010 OAuth2 - Assertion Profile Library! 3 Documentation! 4 OAuth2 Assertion Flow! 4 OAuth Client! 6 OAuth Client's Architecture:
Force.com REST API Developer's Guide
Force.com REST API Developer's Guide Version 35.0, Winter 16 @salesforcedocs Last updated: December 10, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark
EHR OAuth 2.0 Security
Hospital Health Information System EU HIS Contract No. IPA/2012/283-805 EHR OAuth 2.0 Security Final version July 2015 Visibility: Restricted Target Audience: EHR System Architects EHR Developers EPR Systems
Cloud Elements! Events Management BETA! API Version 2.0
Cloud Elements Events Management BETA API Version 2.0 Event Management Version 1.0 Event Management Cloud Elements Event Management provides a uniform mechanism for subscribing to events from Endpoints
Working with Indicee Elements
Working with Indicee Elements How to Embed Indicee in Your Product 2012 Indicee, Inc. All rights reserved. 1 Embed Indicee Elements into your Web Content 3 Single Sign-On (SSO) using SAML 3 Configure an
Security and ArcGIS Web Development. Heather Gonzago and Jeremy Bartley
Security and ArcGIS Web Development Heather Gonzago and Jeremy Bartley Agenda Types of apps Traditional token-based authentication OAuth2 authentication User login authentication Application authentication
RCS Liferay Google Analytics Portlet Installation Guide
RCS Liferay Google Analytics Portlet Installation Guide Document Revisions Date Revision By 07/02/12 1 Pablo Rendón 2 Table of Contents RCS Liferay-Google Analytics...1 Document Revisions...2 General Description...4
GoCoin: Merchant integration guide
GoCoin: Merchant integration guide More information can be found at help.gocoin.com Preface This guide is intended for Merchants who wish to use the GoCoin API to accept and process payments in Cryptocurrency.
Adeptia Suite 6.2. Application Services Guide. Release Date October 16, 2014
Adeptia Suite 6.2 Application Services Guide Release Date October 16, 2014 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 Document Information DOCUMENT INFORMATION
OAuth 2.0. Weina Ma [email protected]
OAuth 2.0 Weina Ma [email protected] Agenda OAuth overview Simple example OAuth protocol workflow Server-side web application flow Client-side web application flow What s the problem As the web grows, more
OAuth: Where are we going?
OAuth: Where are we going? What is OAuth? OAuth and CSRF Redirection Token Reuse OAuth Grant Types 1 OAuth v1 and v2 "OAuth 2.0 at the hand of a developer with deep understanding of web security will likely
Configuring user provisioning for Amazon Web Services (Amazon Specific)
Chapter 2 Configuring user provisioning for Amazon Web Services (Amazon Specific) Note If you re trying to configure provisioning for the Amazon Web Services: Amazon Specific + Provisioning app, you re
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Social Application Guide
Social Application Guide Version 2.2.0 Mar 2015 This document is intent to use for our following Magento Extensions Or any other cases it might help. Copyright 2015 LitExtension.com. All Rights Reserved
itds OAuth Integration Paterva itds OAuth Integration Building and re-using OAuth providers within Maltego 2014/09/22
Paterva itds OAuth Integration itds OAuth Integration Building and re-using OAuth providers within Maltego AM 2014/09/22 Contents Maltego OAuth Integration... 3 Introduction... 3 OAuth within the Maltego
Contents. 2 Alfresco API Version 1.0
The Alfresco API Contents The Alfresco API... 3 How does an application do work on behalf of a user?... 4 Registering your application... 4 Authorization... 4 Refreshing an access token...7 Alfresco CMIS
How to pull content from the PMP into Core Publisher
How to pull content from the PMP into Core Publisher Below you will find step-by-step instructions on how to set up pulling or retrieving content from the Public Media Platform, or PMP, and publish it
AIRTEL INDIA OPEN API. Application Developer Guide for OAuth2 Authentication and Authorization. Document Version 1.1
AIRTEL INDIA OPEN API Application Developer Guide for OAuth2 Authentication and Authorization Document Version 1.1 This Application Developer Guide has been prepared for Airtel India. Copyright Intel Corporation
INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
Administering Jive Mobile Apps
Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native
Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA
Cloud Elements ecommerce Hub Provisioning Guide API Version 2.0 BETA Page 1 Introduction The ecommerce Hub provides a uniform API to allow applications to use various endpoints such as Shopify. The following
Manual. Netumo NETUMO HELP MANUAL WWW.NETUMO.COM. Copyright Netumo 2014 All Rights Reserved
Manual Netumo NETUMO HELP MANUAL WWW.NETUMO.COM Copyright Netumo 2014 All Rights Reserved Table of Contents 1 Introduction... 0 2 Creating an Account... 0 2.1 Additional services Login... 1 3 Adding a
Google Cloud Print Administrator Configuration Guide
Google Cloud Print Administrator Configuration Guide 1 December, 2014 Advanced Customer Technologies Ricoh AMERICAS Holdings, Inc. Table of Contents Scope and Purpose... 4 Overview... 4 System Requirements...
E*TRADE Developer Platform. Developer Guide and API Reference. October 24, 2012 API Version: v0
E*TRADE Developer Platform Developer Guide and API Reference October 24, 2012 API Version: v0 Contents Getting Started... 5 Introduction... 6 Architecture... 6 Authorization... 6 Agreements... 7 Support
Salesforce Opportunities Portlet Documentation v2
Salesforce Opportunities Portlet Documentation v2 From ACA IT-Solutions Ilgatlaan 5C 3500 Hasselt [email protected] Date 29.04.2014 This document will describe how the Salesforce Opportunities portlet
Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3
Open-Xchange Authentication & Session Handling Table of Contents 1.Introduction...3 2.System overview/implementation...4 2.1.Overview... 4 2.1.1.Access to IMAP back end services...4 2.1.2.Basic Implementation
Portal Recipient Guide
Portal Recipient Guide Lindenhouse Software Limited 2015 Contents 1 Introduction... 4 2 Account Activation... 4 3 Forgotten Password... 9 4 Document signing... 12 5 Authenticating your Device & Browser...
Finding and Preventing Cross- Site Request Forgery. Tom Gallagher Security Test Lead, Microsoft
Finding and Preventing Cross- Site Request Forgery Tom Gallagher Security Test Lead, Microsoft Agenda Quick reminder of how HTML forms work How cross-site request forgery (CSRF) attack works Obstacles
SETTING UP YOUR JAVA DEVELOPER ENVIRONMENT
SETTING UP YOUR JAVA DEVELOPER ENVIRONMENT Summary This tipsheet describes how to set up your local developer environment for integrating with Salesforce. This tipsheet describes how to set up your local
Securing ASP.NET Web APIs Dominick Baier h;p://leastprivilege.com @leastprivilege
Securing ASP.NET Web APIs Dominick Baier h;p://leastprivilege.com think mobile! Dominick Baier Security consultant at thinktecture Focus on security in distributed applica9ons iden9ty management access
Web 2.0 Lecture 9: OAuth and OpenID
Web 2.0 Lecture 9: OAuth and OpenID doc. Ing. Tomáš Vitvar, Ph.D. [email protected] @TomasVitvar http://www.vitvar.com Leopold-Franzens Universität Innsbruck and Czech Technical University in Prague Faculty
Authenticate and authorize API with Apigility. by Enrico Zimuel (@ezimuel) Software Engineer Apigility and ZF2 Team
Authenticate and authorize API with Apigility by Enrico Zimuel (@ezimuel) Software Engineer Apigility and ZF2 Team About me Enrico Zimuel (@ezimuel) Software Engineer since 1996 PHP Engineer at Zend Technologies
Zapper for ecommerce. Magento Plugin Version 1.0.0. Checkout
Zapper for ecommerce Magento Plugin Version 1.0.0 Branden Paine 4/14/2014 Table of Contents Introduction... 1 What is Zapper for ecommerce? Why Use It?... 1 What is Zapper?... 1 Zapper App Features...
Egnyte Single Sign-On (SSO) Installation for OneLogin
Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin
Authorization and Authentication
CHAPTER 2 Cisco WebEx Social API requests must come through an authorized API consumer or API client and be issued by an authenticated Cisco WebEx Social user. The Cisco WebEx Social API uses the Open
Qlik REST Connector Installation and User Guide
Qlik REST Connector Installation and User Guide Qlik REST Connector Version 1.0 Newton, Massachusetts, November 2015 Authored by QlikTech International AB Copyright QlikTech International AB 2015, All
Webmail Using the Hush Encryption Engine
Webmail Using the Hush Encryption Engine Introduction...2 Terms in this Document...2 Requirements...3 Architecture...3 Authentication...4 The Role of the Session...4 Steps...5 Private Key Retrieval...5
Getting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
CUSTOMER Android for Work Quick Start Guide
Mobile Secure Cloud Edition Document Version: 1.0 2016-01-25 CUSTOMER Content 1 Introduction to Android for Work.... 3 2 Prerequisites....4 3 Setting up Android for Work (Afaria)....5 4 Setting up Android
Device Token Protocol for Persistent Authentication Shared Across Applications
Device Token Protocol for Persistent Authentication Shared Across Applications John Trammel, Ümit Yalçınalp, Andrei Kalfas, James Boag, Dan Brotsky Adobe Systems Incorporated, 345 Park Avenue, San Jose,
Your Mission: Use F-Response Cloud Connector to access Google Apps for Business Drive Cloud Storage
Your Mission: Use F-Response Cloud Connector to access Google Apps for Business Drive Cloud Storage Note: This guide assumes you have installed F-Response Consultant, Consultant + Covert, or Enterprise,
Creating an Apple ID Account Using the Internet on a Desktop or Laptop Computer
Creating an Apple ID Account Using the Internet on a Desktop or Laptop Computer An Apple ID account is required to complete the device setup and to purchase apps. Your Apple ID is used for almost everything
Page 1 Rev Date: February 2010. User Manual for Encrypted Email Services
Page 1 User Manual for Encrypted Email Services Instructions for Using Encrypted Email Services This document is being provided to assist you in opening encrypted emails sent from Century Bank. The following
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications. Slides by Connor Schnaith
A Server and Browser-Transparent CSRF Defense for Web 2.0 Applications Slides by Connor Schnaith Cross-Site Request Forgery One-click attack, session riding Recorded since 2001 Fourth out of top 25 most
Cloud Elements! Marketing Hub Provisioning and Usage Guide!
Cloud Elements Marketing Hub Provisioning and Usage Guide API Version 2.0 Page 1 Introduction The Cloud Elements Marketing Hub is the first API that unifies marketing automation across the industry s leading
Step 1. Step 2. Open your browser and go to https://accounts.bestcare.org and you will be presented a logon screen show below.
Manage your two-factor options through the accounts.bestcare.org website. This website is available internally and externally of the organization. Like other services, if you connect while external of
TeamViewer 9 Manual Management Console
TeamViewer 9 Manual Management Console Rev 9.2-07/2014 TeamViewer GmbH Jahnstraße 30 D-73037 Göppingen www.teamviewer.com Table of Contents 1 About the TeamViewer Management Console... 4 1.1 About the
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
The full setup includes the server itself, the server control panel, Firebird Database Server, and three sample applications with source code.
Content Introduction... 2 Data Access Server Control Panel... 2 Running the Sample Client Applications... 4 Sample Applications Code... 7 Server Side Objects... 8 Sample Usage of Server Side Objects...
Cloud Backup for Joomla
Cloud Backup for Joomla Email: [email protected] Release: January, 2013 Version: 2.1 By - 1 Installation 1. Download the extensions from our website http:// 2. Extract the downloaded archive using your
Multi-Factor Authentication Job Aide
To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please
AccountView. Single Sign-On Guide
AccountView Single Sign-On Guide 2014 Morningstar. All Rights Reserved. AccountView Version: 1.4 Document Version: 2 Document Issue Date: March 09, 2013 Technical Support: (866) 856-4951 Telephone: (781)
Globus Auth. Steve Tuecke. The University of Chicago
Globus Auth Enabling an extensible, integrated ecosystem of services and applications for the research and education community. Steve Tuecke The University of Chicago Cloud has transformed how platforms
Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server
Add Microsoft Azure as the Federated Authenticator in WSO2 Identity Server This blog will explain how to use Microsoft Azure as a Federated Authenticator for WSO2 Identity Server 5.0.0. In this example
AT&T Synaptic Storage as a Service SM Getting Started Guide
AT&T Synaptic Storage as a Service SM Getting Started Guide Version 3.0 2011 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. All other
For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.
Chapter 41 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
McAfee One Time Password
McAfee One Time Password Integration Module Outlook Web App 2010 Module version: 1.3.1 Document revision: 1.3.1 Date: Feb 12, 2014 Table of Contents Integration Module Overview... 3 Prerequisites and System
OAuth 2.0: Theory and Practice. Daniel Correia Pedro Félix
OAuth 2.0: Theory and Practice Daniel Correia Pedro Félix 1 whoami Daniel Correia Fast learner Junior Software Engineer Passionate about everything Web-related Currently working with the SAPO SDB team
Cloud Powered Mobile Apps with Azure
Cloud Powered Mobile Apps with Azure Malte Lantin Technical Evanglist Microsoft Azure Agenda Mobile Services Features and Demos Advanced Features Scaling and Pricing 2 What is Mobile Services? Storage
Identity Management with Spring Security. Dave Syer, VMware, SpringOne 2011
Identity Management with Spring Security Dave Syer, VMware, SpringOne 2011 Overview What is Identity Management? Is it anything to do with Security? Some existing and emerging standards Relevant features
Comodo Mobile Device Manager Software Version 1.0
Comodo Mobile Device Manager Software Version 1.0 Installation Guide Guide Version 1.0.041114 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.CMDM Setup... 3 1.1.System
Comodo Mobile Device Manager Software Version 3.0
Comodo Mobile Device Manager Software Version 3.0 CMDM Cloud Portal Setup Guide Guide Version 3.0.010515 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo Mobile Device Manager - Cloud
Electronic Ticket and Check-in System for Indico Conferences
Electronic Ticket and Check-in System for Indico Conferences September 2013 Author: Bernard Kolobara Supervisor: Jose Benito Gonzalez Lopez CERN openlab Summer Student Report 2013 Project Specification
Configuring Salesforce
Chapter 94 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
CA Nimsoft Service Desk
CA Nimsoft Service Desk Configure Outbound Web Services 7.13.7 Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject
VIRTUAL SOFTWARE LIBRARY REFERENCE GUIDE
VIRTUAL SOFTWARE LIBRARY REFERENCE GUIDE INTRODUCTION The Virtual Software Library (VSL) provides remote and on-campus access to lab/course software. This approach is intended to simplify access for all
How to break in. Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering
How to break in Tecniche avanzate di pen testing in ambito Web Application, Internal Network and Social Engineering Time Agenda Agenda Item 9:30 10:00 Introduction 10:00 10:45 Web Application Penetration
Yandex.Money API API for Apps
16.10.2014 .. Version 1.8 Document build date: 16.10.2014. This volume is a part of Yandex technical documentation. Yandex helpdesk site: http://help.yandex.ru 2008 2014 Yandex LLC. All rights reserved.
HOTPin Integration Guide: Google Apps with Active Directory Federated Services
HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
Getting Started Guide
Getting Started Guide Table of Contents OggChat Overview... 3 Getting Started Basic Setup... 3 Dashboard... 4 Creating an Operator... 5 Connecting OggChat to your Google Account... 6 Creating a Chat Widget...
www.store.belvg.com skype ID: store.belvg email: [email protected] US phone number: +1-424-253-0801
1 Table of Contents Table of Contents: 1. Introduction to Google+ All in One... 3 2. How to Install... 4 3. How to Create Google+ App... 5 4. How to Configure... 8 5. How to Use... 13 2 Introduction to
INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
#07 Web Security CLIENT/SERVER COMPUTING AND WEB TECHNOLOGIES
1 Major security issues 2 #07 Web Security CLIENT/SERVER COMPUTING AND WEB TECHNOLOGIES Prevent unauthorized users from accessing sensitive data Authentication: identifying users to determine if they are
Programming Autodesk PLM 360 Using REST. Doug Redmond Software Engineer, Autodesk
Programming Autodesk PLM 360 Using REST Doug Redmond Software Engineer, Autodesk Introduction This class will show you how to write your own client applications for PLM 360. This is not a class on scripting.
Web Application Vulnerability Testing with Nessus
The OWASP Foundation http://www.owasp.org Web Application Vulnerability Testing with Nessus Rïk A. Jones, CISSP [email protected] Rïk A. Jones Web developer since 1995 (16+ years) Involved with information
Login and Pay with Amazon Integration Guide
Login and Pay with Amazon Integration Guide 2 2 Contents...4 Introduction...5 Important prerequisites...5 How does Login and Pay with Amazon work?... 5 Key concepts...5 Overview of the buyer experience...
SAML application scripting guide
Chapter 151 SAML application scripting guide You can use the generic SAML application template (described in Creating a custom SAML application profile) to add a SAML-enabled web application to the app
MXview ToGo Quick Installation Guide
MXview ToGo Quick Installation Guide First Edition, July 2015 2015 Moxa Inc. All rights reserved. P/N: 18020000000C0 Overview MXview ToGo allows you to use your mobile devices to monitor network devices
Using IBM dashdb With IBM Embeddable Reporting Service
What this tutorial is about In today's mobile age, companies have access to a wealth of data, stored in JSON format. Leading edge companies are making key decision based on that data but the challenge
ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0
ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a
SysPatrol - Server Security Monitor
SysPatrol Server Security Monitor User Manual Version 2.2 Sep 2013 www.flexense.com www.syspatrol.com 1 Product Overview SysPatrol is a server security monitoring solution allowing one to monitor one or
Wireless Presentation Gateway. User Guide
User Guide Table of Contents 1 Initial Setup Present Anything Without Wires p. 3 2 From A Laptop (Windows or Mac) First, download he client p. 4 Now connect p. 5 Additional Features p. 6 3 From An ios
AWS Account Management Guidance
AWS Account Management Guidance Introduction Security is a top priority at AWS. Every service that is offered is tightly controlled and adheres to a strict security standard. This is evident in the security
SITELINK Server. Voytech Systems Limited. Applications. Connectivity. Cloud connected Modbus Server. Remote Telemetry and Control
SITELINK Server Voytech Systems Limited Cloud connected Modbus Server Remote Telemetry and Control Broadband and Mobile Support Plug-and-play Installation Applications Connectivity The SITELINK Interface
Synology SSO Server. Development Guide
Synology SSO Server Development Guide THIS DOCUMENT CONTAINS PROPRIETARY TECHNICAL INFORMATION WHICH IS THE PROPERTY OF SYNOLOGY INCORPORATED AND SHALL NOT BE REPRODUCED, COPIED, OR USED AS THE BASIS FOR
