Best Practices for Breeze Directory Service Integration
|
|
|
- Merryl Miller
- 10 years ago
- Views:
Transcription
1 Best Practices for Breeze Directory Service Integration
2 Trademarks 1 Step RoboPDF, ActiveEdit, ActiveTest, Authorware, Blue Sky Software, Blue Sky, Breeze, Breezo, Captivate, Central, ColdFusion, Contribute, Database Explorer, Director, Dreamweaver, Fireworks, Flash, FlashCast, FlashHelp, Flash Lite, FlashPaper, Flex, Flex Builder, Fontographer, FreeHand, Generator, HomeSite, JRun, MacRecorder, Macromedia, MXML, RoboEngine, RoboHelp, RoboInfo, RoboPDF, Roundtrip, Roundtrip HTML, Shockwave, SoundEdit, Studio MX, UltraDev, and WebHelp are either registered trademarks or trademarks of Macromedia, Inc. and may be registered in the United States or in other jurisdictions including internationally. Other product names, logos, designs, titles, words, or phrases mentioned within this publication may be trademarks, service marks, or trade names of Macromedia, Inc. or other entities and may be registered in certain jurisdictions including internationally. Third-Party Information This guide contains links to third-party websites that are not under the control of Macromedia, and Macromedia is not responsible for the content on any linked site. If you access a third-party website mentioned in this guide, then you do so at your own risk. Macromedia provides these links only as a convenience, and the inclusion of the link does not imply that Macromedia endorses or accepts any responsibility for the content on those third-party sites. Copyright 2005 Macromedia, Inc. All rights reserved. This manual may not be copied, photocopied, reproduced, translated, or converted to any electronic or machine-readable form in whole or in part without written approval from Macromedia, Inc. Notwithstanding the foregoing, the owner or authorized user of a valid copy of the software with which this manual was provided may print out one copy of this manual from an electronic version of this manual for the sole purpose of such owner or authorized user learning to use such software, provided that no part of this manual may be printed out, reproduced, distributed, resold, or transmitted for any other purposes, including, without limitation, commercial purposes, such as selling copies of this documentation or providing paid-for support services. Acknowledgments Project Management: Stephanie Gowin, Suzanne Smith, Writing: Tom Wetzel Editing: Geta Carlson Production Management: Patrice O Neill Media Design and Production: Adam Barnett, John Francis, Mario Reynoso First Edition: July 2005 Macromedia, Inc. 601 Townsend St. San Francisco, CA 94103
3 Contents Best Practice for Breeze Directory Service Integration Working with LDAP Importing users Importing groups Selecting the directory node to be imported Importing sub-branches Internal (nonimported) versus external (imported) users and groups Working with branches in Directory Service Managing passwords Automatic single sign-on Making manual changes in the Breeze configuration NTLM authentication HTTP header-based authentication Other methods for managing passwords Notifying users to set their password Setting the password to an LDAP attribute Recommended practices for synchronization Scheduling synchronizations Verifying connections to the LDAP server Log file format Previewing the synchronization Questions about Breeze Directory Service Integration
4 4 Contents
5 Best Practice for Breeze Directory Service Integration Working with LDAP Managing passwords Recommended practices for synchronization Questions about Breeze Directory Service Integration Macromedia Breeze Directory Service Integration (DSI) allows enterprise customers to incorporate users and groups into Macromedia Breeze from existing directories using Lightweight Directory Access Protocol (LDAP). LDAP is an Internet client-server protocol used for lookup of user contact information from an LDAP-compliant directory server. DSI supports the following directory servers: Microsoft Active Directory (Windows 2003 server) Sun One Directory Server 5.2 Open LDAP Novel edirectory IBM Directory Server 5.1 DSI enables the Breeze server to connect as an LDAP client to an LDAP directory, import users and groups, and ensure that information about these imported users and groups in the Breeze database is kept in sync with the external LDAP directory. With DSI, administrators can avoid having to manually add users to Breeze one by one. User accounts are created automatically in Breeze through manual or scheduled synchronizations with an organization s directory service. The best solution is to combine DSI with a system for authenticating userswhich allows automatic single sign-on for Breeze. A user who is logged on to their desktop using their network user name and password can access Breeze services directly, bypassing the Breeze login screen. 5
6 To perform a directory integration task, you must be defined as an administrator in your Breeze profile. An administrator is defined in the Create Administrator screen of the Application Management Console The administrator s point of access for Breeze DSI is the Directory Service Settings tab in the Application Management Console. Setting up and initiating synchronization with an LDAP server is accomplished with the screens accessible through this tab. Working with LDAP Users and groups in a directory are LDAP called entries. Each entry is a collection of attributes that has a name, called a distinguished name (DN). The attribute values for user entries consists of user information such as phone number, address, and photo. The DN describes a path to the entry through a hierarchical tree structure. The DN that refers to a particular entry in the LDAP directory is formed by taking the name of the entry itself (called a relative distinguished name, RDN) and concatenating it with the names of its ancestor entries in the tree structure. The way that the tree structure is organized may reflect geographical locations or departmental boundaries within an organization. For example, if Alicia Solis is a user in the QA department of Acme, Incorporated in France, the DN for this user might be: cn=alicia Solis, ou=qa, c=france, dc=acme, dc=com The DN specifies the path through the tree to the user from the root. In the example above, the root is specified by dc=com. Each of the attributes that make up an entry has a type and one or more values. The values for an attribute depend on what type of attribute it is. Mnemonic strings are used to specify types, such as ou for organizational unit or cn for common name, as in the example above. Importing users When importing user entries from an LDAP server, the administrator uses the User Profile Mapping screen to map Breeze user profile fields to the equivalent attribute in the LDAP entries. The following example shows a mapping of an LDAP user entry to a Breeze user profile: Login: samaccountname First Name: givenname Last Name: sn userprincipalname Network Login: samaccountname 6 Best Practice for Breeze Directory Service Integration
7 The required fields are: Login, First Name, Last Name, and . If you have defined any custom fields (Breeze Administration > Users and Groups > Customize User Profile), these fields are added to the User Profile Mapping screen. in the example above Network Login is a custom field. Working with LDAP 7
8 Importing groups To map LDAP group entry attributes to Breeze group profiles, the administrator creates a mapping on the Group Profile Mapping screen. The following shows an example of a mapping between LDAP group entry attributes and a Breeze group profile: Name: cn Membership: member Name and membership are the two required fields for Breeze group profiles. Breeze group profiles do not support custom fields, unlike the Breeze user profifles. 8 Best Practice for Breeze Directory Service Integration
9 Selecting the directory node to be imported When importing users and groups from an LDAP directory into Breeze, you specify a path to a section of the LDAP tree by using the DN. This specifies the scope of the search of the LDAP directory for selection of entries. You can restrict the selection of entries within that part of the tree by using a filter to specify a condition that an entry must satisfy to be selected. For example, if the filter specifies (objectclass=organizationalperson) then only entries that have the attribute organizataionalperson are selected for import. The example below shows the User Branch editor which you use to specify the user branch DN. The attribute objectclass must be present in every entry in a LDAP directory. This attribute defines the rules and required attributes for that entry. Working with LDAP 9
10 There are two ways of relating group and user entries in LDAP directories. A directory may be configured with the user groups under the same node in an LDAP branch. In that case, the user and group settings for importing entries contain the same branch DN. This means you must use a filter to select only the users when importing users and a filter to select only groups when importing groups. The second type of LDAP tree structure puts users and groups under different branches in the tree. In this case, when you import the users you use a branch DN that selects the user branch. When you import groups, you use a branch DN that selects the groups branch. Separate administration screens for selecting users and groups to be imported from the LDAP server are provided in the Breeze Directory Service Settings tab. For example, administrators use the Group Branch editor, shown below, to select groups for import: 10 Best Practice for Breeze Directory Service Integration
11 Importing sub-branches Let us suppose that you have set the Branch DN on the User Profile Mapping screen to import all the users in a certain branch of the directory tree. In that case, there may be subbranches below that level in the tree structure. For example, you may set the branch to import all employees in the sales department by setting the branch DN, as follows: ou=sales, dc=acme, dc=com But this branch of the tree may have the employees of sales offices in sub-branches. In that case, DSI will import the users from the sub-branches below that level in the tree if you set the Subtree Search parameter to true. Internal (nonimported) versus external (imported) users and groups You may want to have some users or groups within Breeze that are not imported from the external LDAP server. For this reason, the Breeze database makes a distinction between internal and external Breeze users and groups. Users or groups that have been created directly in Breeze and not imported from an LDAP directory using DSIare internal. Any user or group that has been imported into the Breeze database using Directory Service is external. To ensure that imported groups are kept in sync with the external LDAP directory, the membership of external groups can be changed only through DSI. Internal Breeze users and groups cannot be added to external groups. However, external users and groups can be added to internal groups in Breeze. For example, if you want to add all the users in the Singapore office to a Breeze Presentation user group, they can be assigned to the internal Breeze group even if it has other users that have not been imported through DSI. If the value of the login or name of an imported user or group entry matches the Breeze login for an existing internal Breeze user or group, Breeze DSI will change that user or group from internal to external and log a warning to the scynchronization log. Working with LDAP 11
12 Working with branches in Directory Service When importing users and groups from an LDAP-compliant directory into the Breeze directory, you may want to import only the users of a particular group within your organization. To do this, you need to know where the entries for that group are located within the directory tree structure. This depends on the particular topology or tree structure in the directory you are importing from. LDAP allows a number of different possible arrangements. One possible arrangement is shown below. Root Employees Customers Engineering Marketing U.S. Europe A common technique is to use the organization s Internet domain as the root for the tree structure. A company might then use dc=com to specify the root element in the tree. A DN that specifies the Singapore sales office for Acme, Inc. might then be: ou=singapore, ou=marketing, ou=employess, dc=acme, dc=com. In this example, ou is an abbreviation for organizational unit, and dc is an abbreviation for domain component. In the Breeze Directory Service tab, there are separate screens for specifying the branch DN for import of users and import of groups. 12 Best Practice for Breeze Directory Service Integration
13 The User Branch editor, shown below, is used to select the users for import. The Marketing node from the above example is selected in this screen. When you map Breeze user profiles to LDAP fields, the Add Branch DN button on the User Profile Mapping screen enables you to specify a branch DN to select the users to be imported to the Breeze directory. When you map a Breeze group profile on the Group Profile Mapping screen, there is also an Add Branch DN button that allows you to select a branch DN for the import of groups to the Breeze directory. Not all LDAP directories have a single root. You can handle this by defining separate branches to be imported. Working with LDAP 13
14 Managing passwords When Breeze imports user information using DSI, this does not provide Breeze with access to the user s network password. In theory, an organization could use an LDAP field to store the user password in the directory. But storing user passwords in clear text would be a major security breach. Because Breeze DSI does not obtain the network password for users, some other method for managing passwords for users imported into the Breeze directory from external LDAP servers is needed. Several methods for doing this are discussed below. Automatic single sign-on The recommended method for managing Breeze user passwords and authentication with DSI is to use it with automatic single sign-on. Automatic single sign-on is a mechanism that allows a user who is logged in to gain access to Breeze and resources for which they have permission without being prompted each time for their login and password. Two methods for implementing automatic single sign-on are supported for Breeze: Windows NT LAN Manager (NTLM) authentication HTTP header-based authentication 14 Best Practice for Breeze Directory Service Integration
15 If you plan on using either of these methods for single sign-on authentication, you will want set the authentication policy for DSI to Do Nothing in the DSI Policy Settings screen, as shown below. Making manual changes in the Breeze configuration Implementing either NTLM or HTTP header-based authentication requires that you make manual changes in the Breeze custom.ini file. It is recommended that this be done only by an experienced Breeze administrator with guidance from Breeze technical support. Managing passwords 15
16 To set Breeze configuration variables manually for authentication integration: 1. Stop all Breeze services. 2. Enter the new parameters and values (as described in the following sections). 3. Save the modified file as custom.ini. 4. Restart all Breeze services. 5. Verify that the Breeze services are functioning successfully. NTLM authentication NTLM is a challenge/response protocol that enables a client to prove its identity without providing a password. An application queries an authentication server for the user s credentials. The NTLM routine is transparent to the user. To implement NTLM for Breeze, you will need to add the following parameters to the Breeze custom.ini file: NTLM_DOMAIN=domain NTLM_SERVER=NTLM_server_IP_address where domain is the name of the domain, such as acme.com, and NTLM_server_IP_address is the IP address of the NTLM authentication server. The numeric IP address must be used with NTLM_SERVER; the host name won t work. Breeze and Microsoft NTLM use different login policies for authenticating users. These policies must be made consistent before a user can employ single sign-on to access Breeze. By default, Breeze employs the user s address ([email protected]) and password as the primary login to authenticate the user. But you can configure Breeze to use an external login, such as a user name and password for authentication. The Breeze login and password policy is configured in Breeze Manager (Administration > Edit Login and Password Policies). In the Login Policy section you can specify whether to use the user s login as the default login to Breeze. Select No if you want Breeze to accept a user name as the authentication vehicle. This configuration makes the Breeze password policy consistent with the NTLM password policy. In order for users to make use of single sign-on with NTLM authentication, they must be using Internet Explorer. Other web browsers do not support NTLM authentication. 16 Best Practice for Breeze Directory Service Integration
17 HTTP header-based authentication HTTP header-based authentication uses extra fields in the header of an HTTP request for authentication of the user. In this scenario, Breeze login requests are routed to a proxy server positioned between the client and the Breeze Server. The proxy server performs the role of the authentication server. The proxy server takes the original HTTP request from the client and augments it with an extra HTTP header field with the user ID. The Breeze server uses this information to identify the user. if the user passes this authentication test, the Breeze server creates a valid session and allows the user to begin using the system To implement HTTP header-based authentication for Breeze, changes must be made to two Breeze configuration files. 1. Access the Breeze server and open the following file: Breeze_Install_Dir\appserv\conf\WEB-INF\web.xml Change the following section to enable it by removing the commenting-out code: <!-- <filter-mapping> <filter-name>headerauthenticationfilter</filter-name> <url-pattern>/*</url-pattern> </filter-mapping> --> 1. Add an entry to the Breeze custom.ini file as follows: HTTP_AUTH_HEADER=header_field_name where header_field_name is the extra HTTP field used for authentication. For example: HTTP_AUTH_HEADER=X-User-Id The value of this field must be the user login that already exists in Breeze. Other methods for managing passwords If you select not to use automatic single sign-on, there are two other methods available for managing passwords with DSI. Under both of these scenarios, users will need to enter their Breeze login and password. Notifying users to set their password In this scenario, users who are added to Breeze through DSI are automatically sent an with a link to set their password. This option can be selected on the Policy Settings screen under the Directory Service Settings tab. Managing passwords 17
18 Setting the password to an LDAP attribute Under this scenario, DSI would set the initial password of imported users to the value of an attribute in the directory entry for that user. For example, if the LDAP directory contains the employee ID number as a field, you could set the initial password for users to their employee ID number. After users log in using this initial password, they can change their passwords. Recommended practices for synchronization An administrator can initiate two different kinds of synchronization of Breeze with the external LDAP directory: A manual synchronization that immediately synchronizes the Breeze directory with the organization s LDAP directory. Scheduled synchronization that takes place at defined intervals. Some directory servers have limits on the number of entries that can be imported with a single query. If you cannot remove this limit or do not want to remove the limit due to directory server performance issues, you can work around the limit by separately synchronizing to the various branches that make up the directory tree for your organization. Paging packaging multiple queries into one request is not supported by Breeze DSI. Another solution for limits on directory request size for the Active Directory is to increase the page size. But this might have an adverse impact on directory server performance. Macromedia recommends the following practices for synchronization. Scheduling synchronizations An initial synchronization of the Breeze directory with the external LDAP directory might consume significant resources if you are importing a large number of users and groups. If this is the case, Macromedia recommends that you do the initial synchronization at an off-peak time, such as late at night. You may also want to do the initial synchronization manually. You could do all of the subsequent synchronizations manually also, but the recommended practice is to use scheduled synchronizations to ensure that Breeze has an up-to-date picture of the users and groups imported from the organization s LDAP directory service. You use the Schedule Settings screen (shown below) to set this up. 18 Best Practice for Breeze Directory Service Integration
19 If you anticipate relatively few changes of LDAP server entries between scheduled synchronizations, you may not need to worry about the timing of the scheduled synchronization. But if a significant number of changes are possible perhaps because of the large scope of the organization that is being synchronized you may also want to schedule the synchronizations at an off-peak time in order to minimize impact on users. When a synchronization takes place, Breeze DSI only imports those entries in its scope of search that have changed in the content of at least one of its fields, when compared to the existing entry in the Breeze directory. Verifying connections to the LDAP server The Connection Settings screen in the Breeze console asks you for information needed to connect to the LDAP server (such as the server s URL). Before you attempt to do an initial synchronization, importing users and groups into the Breeze server database, Macromedia recommends that you verify the parameters you are using for connection to the LDAP server. Open-source LDAP browsers are available to carry out this task. For example, LDAP Editor/ Browser can be downloaded from the following site: www-unix.mcs.anl.gov/~gawor/ldap/ Recommended practices for synchronization 19
20 Log file format The synchronization logs store values in a comma-separated format. In the tables below principal refers to user and group entries. The following values are included in the log entries: Field Date Principal ID Principal type Event Detail Description Formatted date/time value, with time to the millisecond. The format is yyyymmdd T HHmmss.SSS. Breeze login or group name. A single character, U for user, G for group. The action taken or condition encountered. Detailed information about the event. The following table describes the different kinds of events that can appear in the synchronization log files: Event Description Detail add update update-members delete The principal was added to Breeze. The principal exists as an external user in Breeze, and some fields were updated. The principal exists as an external group in Breeze, and principals were added to or removed from membership in the group. The principal was deleted from Breeze. Abbreviated XML packet describes the updated fields. A series of <fieldname>value</fieldname>. The parent node and non-updated fields are omitted. For example: <firstname>joe</last-name> Abbreviated XML packet that describes the added and removed members. The parent node is omitted: <add>id list</add> <remove>id list</remove> The ID list is a series of <id>principal ID</id> packets where principal ID is an ID that would be listed in the Principal ID column, such as a user login or group name. If there are no members of an ID list, the parent node is output as <add/> or <remove/>. 20 Best Practice for Breeze Directory Service Integration
21 Event Description Detail up-to-date make-external The principal exists as an external principal in Breeze and is already synchronized with the external directory. No changes were made. The principal exists as an internal principal in Breeze and was converted to an external principal. A user or group created in Breeze is considered an internal principal. A user or group created by the synchronization process is considered an external principal. This event permits the synchronization to modify or delete the principal and is usually followed by another event that does one or the other. This event is logged in the warning log. warning Some other warning-level event occurred. Warning message. error An error occurred. Java exception message. Previewing the synchronization Before you try to import users and groups in an initial synchronization, it is also recommended that you first preview the synchronization. A preview is a kind of dry run to test the mappings you are using, and to ensure that there are no errors. In a preview, errors are logged but no actual import of users and groups takes place. The log file that is generated can help you to diagnose any problems in the synchronization. You can access the synchronization logs through the Synchronization Logs screen, shown below. Recommended practices for synchronization 21
22 Logs consist of events with one line per event. The synchronization produces at least one event for each principal (user or group) processed. If any warnings or errors are generated during a preview synchronization, a second warning log listing all the warnings and errors is also generated. The administrator can use these log files to diagnose problems in the synchronization before attempting to actually synchronize the Breeze directory with the external LDAP directory. Questions about Breeze Directory Service Integration What happens in Breeze when I delete a user in the LDAP directory? The action that Breeze takes depends on the deletion policy that you have selected for DSI. You can choose to have DSI delete external users in Breeze if they have been deleted from the source LDAP server. In that case, the user is deleted in Breeze if a synchronization discovers that the user has been deleted from the LDAP directory. If you disable this DSI feature on the Deletion Policy screen, a user deleted in the LDAP server is not automatically deleted from the Breeze database on the next synchronization. Can I have a combination of users imported from an LDAP directory and users manually created in Breeze? Yes. Both internal and external users can coexist in the Breeze directory. Can I integrate my corporate directory with my Application Server Provider (ASP) Breeze implementation? No. Under the ASP implementation of Breeze, Macromedia is the host for the Breeze services. DSI is not supported in that implementation. Is there a way to populate particular Breeze groups from a particular LDAP directory group? Once users and groups from the LDAP group have been imported into Breeze, you can assign them to Breeze groups manually. How many directory users can I import into the Breeze database? The number of external Breeze users is limited only by the capacity of your database. In tests, more than 100,000 user entries have been successfully synchronized with a Breeze directory using DSI. However, if you are trying to import a very large number of users (thousands of users), you may want to do this in stages, performing separate synchronizations for the various directory branches. 22 Best Practice for Breeze Directory Service Integration
23 What if there is a make a mistake when importing thousands of users and I want to start over again. Can I easily remove the external users and remove them? If you have the deletion policy set to true, the unwanted users and groups will be automatically deleted when you do another synchronization. Another solution would be to sync Breeze with another LDAP server that doesn t have the users and groups you want to delete, and do this with the deletion policy set to true. Which fields from the directory can I map to Breeze profiles? Can I automatically populate Customized User Profile fields on the Breeze server? Yes. The User Profile Mapping screen in DSI lets you specify customized fields that you want to map to particular LDAP entry attributes. Is directory information automatically encrypted over the network when it is transferred from the LDAP server? No. LDAPS is not currently supported for DSI. What if someone already has an account in Breeze that matches the LDAP directory account? Will that user loose all their Breeze-specific content, such as links to meetings? No. The existing Breeze data is not overwritten. The user is changed from an internal to external user. Questions about Breeze Directory Service Integration 23
24 24 Best Practice for Breeze Directory Service Integration
Integrating the Acoustic Magic Voice Tracker Array Microphone with Adobe Acrobat Connect Professional Voice over IP
Integrating the Acoustic Magic Voice Tracker Array Microphone with Adobe Acrobat Connect Professional Voice over IP By Bob Feingold President, Acoustic Magic, Inc. www.acousticmagic.com 1 Trademarks 1
ProxySG TechBrief LDAP Authentication with the ProxySG
ProxySG TechBrief LDAP Authentication with the ProxySG What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
User Management Resource Administrator. Managing LDAP directory services with UMRA
User Management Resource Administrator Managing LDAP directory services with UMRA Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
LDAP Authentication and Authorization
LDAP Authentication and Authorization What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned to centralized
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Setting up LDAP settings for LiveCycle Workflow Business Activity Monitor
Adobe Enterprise & Developer Support Knowledge Article ID: c4715 bc Setting up LDAP settings for LiveCycle Workflow Business Activity Monitor In addition to manually creating users and user permissions,
User Management Tool 1.6
User Management Tool 1.6 2014-12-08 23:32:48 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.6... 3 ShareFile User Management
USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity
USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Quality Center LDAP Guide
Information Services Quality Assurance Quality Center LDAP Guide Version 1.0 Lightweight Directory Access Protocol( LDAP) authentication facilitates single sign on by synchronizing Quality Center (QC)
Security Assertion Markup Language (SAML) Site Manager Setup
Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and
Installation and Configuration Guide
www.novell.com/documentation Installation and Configuration Guide GroupWise Coexistence Solution for Exchange November 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect
How To Use Libap With A Libap Server With A Mft Command Center And Internet Server
MFT Command Center/Internet Server LDAP Integration Guide Ver sio n 7.1.1 September 7, 2011 Documentation Information MFT LDAP Integration Guide Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES
PriveonLabs Research. Cisco Security Agent Protection Series:
Cisco Security Agent Protection Series: Enabling LDAP for CSA Management Center SSO Authentication For CSA 5.2 Versions 5.2.0.245 and up Fred Parks Systems Consultant 3/25/2008 2008 Priveon, Inc. www.priveonlabs.com
Authorized Send Installation and Configuration Guide Version 4.0
Canon Authorized Send Installation and Configuration Guide Version 4.0 08011-40-UD2-003 This page is intentionally left blank. 2 Authorized Send Installation and Configuration Guide Contents Preface...7
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
Securing SAS Web Applications with SiteMinder
Configuration Guide Securing SAS Web Applications with SiteMinder Audience Two application servers that SAS Web applications can run on are IBM WebSphere Application Server and Oracle WebLogic Server.
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012
www.novell.com/documentation Jobs Guide Identity Manager 4.0.1 February 10, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
LDAP Directory Integration with Cisco Unity Connection
CHAPTER 6 LDAP Directory Integration with Cisco Unity Connection The Lightweight Directory Access Protocol (LDAP) provides applications like Cisco Unity Connection with a standard method for accessing
CA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Active Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
User Management Tool 1.5
User Management Tool 1.5 2014-12-08 23:32:23 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.5... 3 ShareFile User Management
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
How To Take Advantage Of Active Directory Support In Groupwise 2014
White Paper Collaboration Taking Advantage of Active Directory Support in GroupWise 2014 Flexibility and interoperability have always been hallmarks for Novell. That s why it should be no surprise that
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
Using LDAP with Sentry Firmware and Sentry Power Manager (SPM)
Using LDAP with Sentry Firmware and Sentry Power Manager (SPM) Table of Contents Purpose LDAP Requirements Using LDAP with Sentry Firmware (GUI) Initiate a Sentry GUI Session Configuring LDAP for Active
Configuring and Using the TMM with LDAP / Active Directory
Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Adobe Connect LMS Integration for Blackboard Learn 9
Adobe Connect LMS Integration for Blackboard Learn 9 Install Guide Introduction The Adobe Connect LMS Integration for Blackboard Learn 9 gives Instructors, Teaching Assistants and Course Builders the ability
Installation and Configuration Guide
Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
What's New in BlackBerry Enterprise Server 5.0 SP4 for Novell GroupWise
What's New in BlackBerry Enterprise Server 5.0 SP4 for Novell GroupWise Upgrade paths Enhancements to the setup application Administrators can upgrade to BlackBerry Enterprise Server 5.0 SP4 for Novell
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
User Identification and Authentication
User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included
800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410
800-782-3762 www.stbernard.com Active Directory 2008 Implementation Version 6.410 Contents 1 INTRODUCTION...2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION...3 2.1 Supported Deployment
PineApp Surf-SeCure Quick
PineApp Surf-SeCure Quick Installation Guide September 2010 WEB BASED INSTALLATION SURF-SECURE AS PROXY 1. Once logged in, set the appliance s clock: a. Click on the Edit link under Time-Zone section.
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
Oracle Enterprise Single Sign-on Provisioning Gateway. Administrator Guide Release 10.1.4.1.0 E12613-01
Oracle Enterprise Single Sign-on Provisioning Gateway Administrator Guide Release 10.1.4.1.0 E12613-01 March 2009 Oracle Enterprise Single Sign-on Provisioning Gateway, Administrator Guide, Release 10.1.4.1.0
Authorized Send Installation and Configuration Guide for imagerunner ADVANCE Machines Version 4.1
Canon Authorized Send Installation and Configuration Guide for imagerunner ADVANCE Machines Version 4.1 08011-41-UD4-002 This page is intentionally left blank. 2 Authorized Send Installation and Configuration
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
How To Authenticate On An Xtma On A Pc Or Mac Or Ipad (For A Mac) On A Network With A Password Protected (For An Ipad) On An Ipa Or Ipa (For Mac) With A Log
WatchGuard Certified Training Fireware XTM Advanced Active Directory Authentication Courseware: Fireware XTM and WatchGuard System Manager v11.7 Revised: January 2013 Updated for: Fireware XTM v11.7 Disclaimer
Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Siteminder Integration Guide
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
Active Directory LDAP Quota and Admin account authentication and management
Active Directory LDAP Quota and Admin account authentication and management Version 4.1 Updated July 2014 GoPrint Systems 2014 GoPrint Systems, Inc, All rights reserved. One Annabel Lane, Suite 105 San
Module 1: Introduction to Active Directory Infrastructure
Module 1: Introduction to Active Directory Infrastructure Contents Overview 1 Lesson: The Architecture of Active Directory 2 Lesson: How Active Directory Works 10 Lesson: Examining Active Directory 19
Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies
Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
LDAP and Active Directory Guide
LDAP and Active Directory Guide Contents LDAP and Active Directory Guide...2 Overview...2 Configuring for LDAP During Setup...2 Deciding How to Use Data from LDAP... 2 Starting the Setup Tool... 3 Configuring
Skyward LDAP Launch Kit Table of Contents
04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know
Implementation notes on Integration of Avaya Aura Application Enablement Services with Microsoft Lync 2010 Server.
Implementation notes on Integration of Avaya Aura Application Enablement Services with Microsoft Lync 2010 Server. Introduction The Avaya Aura Application Enablement Services Integration for Microsoft
Transparent Identification of Users
Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
How-to: Single Sign-On
How-to: Single Sign-On Document version: 1.02 nirva systems [email protected] nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features
Protected Trust Directory Sync Guide
Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide 2 Overview Protected Trust Directory Sync enables your organization to synchronize the users and distribution lists in Active Directory
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
http://docs.trendmicro.com/en-us/smb/hosted-email-security.aspx
Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release
Configuring IBM Cognos Controller 8 to use Single Sign- On
Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright
Getting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
Security Provider Integration LDAP Server
Security Provider Integration LDAP Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Administrator s Guide
Administrator s Guide Directory Synchronization Client Websense Cloud Products v1.2 1996 2015, Websense, Inc. All rights reserved. 10900 Stonelake Blvd, 3rd Floor, Austin, TX 78759, USA First published
SharePoint AD Information Sync Installation Instruction
SharePoint AD Information Sync Installation Instruction System Requirements Microsoft Windows SharePoint Services V3 or Microsoft Office SharePoint Server 2007. License management Click the trial link
Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN-10233 June 2009
Application Note AN-10233 June 2009 ShoreTel 9: Active Directory Integration This application note outlines the configuration required to prepare a customer s Microsoft Active Directory environment for
Introduction... 1. Installing and Configuring the LDAP Server... 3. Configuring Yealink IP Phones... 30. Using LDAP Phonebook...
Introduction... 1 Installing and Configuring the LDAP Server... 3 OpenLDAP... 3 Installing the OpenLDAP Server... 3 Configuring the OpenLDAP Server... 4 Configuring the LDAPExploreTool2... 8 Microsoft
Deploying ModusGate with Exchange Server. (Version 4.0+)
Deploying ModusGate with Exchange Server (Version 4.0+) Active Directory and LDAP: Overview... 3 ModusGate/Exchange Server Deployment Strategies... 4 Basic Requirements for ModusGate & Exchange Server
How To Login To The Mft Internet Server (Mft) On A Pc Or Macbook Or Macintosh (Macintosh) With A Password Protected (Macbook) Or Ipad (Macro) (For Macintosh) (Macros
TIBCO MFT Internet Server User Guide Software Release 7.2.4 October 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE
Enabling single sign-on for Cognos 8/10 with Active Directory
Enabling single sign-on for Cognos 8/10 with Active Directory Overview QueryVision Note: Overview This document pulls together information from a number of QueryVision and IBM/Cognos material that are
Sample Configuration: Cisco UCS, LDAP and Active Directory
First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
Microsoft Active Directory Oracle Enterprise Gateway Integration Guide
An Oracle White Paper May 2011 Microsoft Active Directory Oracle Enterprise Gateway Integration Guide 1/33 Disclaimer The following is intended to outline our general product direction. It is intended
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
SINGLE SIGN-ON SETUP T ECHNICAL NOTE
T ECHNICAL NOTE Product: Create!archive 6.2.1 Last modified: October 5, 2007 12:03 pm Created by: Development SINGLE SIGN-ON SETUP This Technical Note contains the following sections: Summary Create!archive
The following gives an overview of LDAP from a user's perspective.
LDAP stands for Lightweight Directory Access Protocol, which is a client-server protocol for accessing a directory service. LDAP is a directory service protocol that runs over TCP/IP. The nitty-gritty
ADOBE CONNECT ENTERPRISE SERVER 6
Chapter 1: ADOBE CONNECT ENTERPRISE SERVER 6 SSL CONFIGURATION GUIDE Copyright 2006 Adobe Systems Incorporated. All rights reserved. Adobe Connect Enterprise Server 6, for Windows If this guide is distributed
Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online
Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online 062212 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
Synchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
Polycom RealPresence Resource Manager System Getting Started Guide
[Type the document title] Polycom RealPresence Resource Manager System Getting Started Guide 8.0 August 2013 3725-72102-001B Polycom Document Title 1 Trademark Information POLYCOM and the names and marks
Quick Start Guide Sendio Hosted
Sendio Email System Protection Appliance Quick Start Guide Sendio Hosted Sendio 6.x and 7.x Sendio, Inc. 4911 Birch St, Suite 150 Newport Beach, CA 92660 USA +1.949.274.4375 www.sendio.com QUICK START
Troubleshooting Active Directory Server
Proven Practice Troubleshooting Active Directory Server Product(s): IBM Cognos Series 7 Area of Interest: Security Troubleshooting Active Directory Server 2 Copyright Copyright 2008 Cognos ULC (formerly
Version 9. Active Directory Integration in Progeny 9
Version 9 Active Directory Integration in Progeny 9 1 Active Directory Integration in Progeny 9 Directory-based authentication via LDAP protocols Copyright Limit of Liability Trademarks Customer Support
Installation and Configuration Guide
Installation and Configuration Guide BlackBerry Resource Kit for BlackBerry Enterprise Service 10 Version 10.2 Published: 2015-11-12 SWD-20151112124827386 Contents Overview: BlackBerry Enterprise Service
User Identification (User-ID) Tips and Best Practices
User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using
CRM to Exchange Synchronization
CRM to Exchange Synchronization Installation, Configuration and End-User Instructions VERSION 1.0 DATE PREPARED: 9/1/2012 DEVELOPMENT: BRITE GLOBAL, INC. 2012 Brite Global, Incorporated. All rights reserved.
TRITON Unified Security Center Help
TRITON Unified Security Center Help Websense TRITON Unified Security Center v7.7 2011-2012, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2012 Printed
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory
Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory HOWTO, 2 nd edition Introduction... 2 Integration using the Lights-Out Migration Utility... 2 Integration using the ilo web interface...
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Active Directory Integration
Active Directory Integration Last updated March 2016 Contents Introduction:... 2 Administration configuration set up:... 2 Configuring for a single OU import... 3 User Importing... 3 Active Directory and
