X-ROAD 6 SIGNER CONSOLE USER GUIDE
|
|
|
- Eunice Blankenship
- 10 years ago
- Views:
Transcription
1 X-ROAD 6 SIGNER CONSOLE USER GUIDE 2.2
2 Signer Console User Guide Page 2 VERSION HISTORY Date Version Description First draft Some improvements done Minor corrections done License information added sdsb changed to xroad Minor corrections done Editorial changes made Audit log added Editorial changes made
3 Signer Console User Guide Page 3 TABLE OF CONTENTS 1 Introduction References Using the Signer Console Signer Console Options Starting as Interactive Shell Executing Single Commands Available Commands list-tokens list-keys list-certs set-token-friendly-name set-key-friendly-name get-member-certs activate-certificate deactivate-certificate delete-key delete-certificate delete-certificate-request import-certificate login-token logout-token init-software-token sign generate-key generate-cert-request Example: Certificate Import Audit Log... 11
4 Signer Console User Guide Page 4 1 INTRODUCTION The purpose of this document is to explain how to manage keys and certificates in signer from the command line using the signer console utility. Signer is an X-Road component whose primary purpose is to process signing requests and produce signatures. Signer manages software and hardware (smart cards, HSMs) tokens and their keys and handles certificates associated with the keys. Signer console is a command line utility for interacting with Signer. The utility provides commands for various operations and can execute a single command or be started as an interactive text-based shell. 1.1 REFERENCES 1. [SPEC-AL] X-Road: Audit log events. Cybernetica AS. 2. [JSON] Introducing JSON,
5 Signer Console User Guide Page 5 2 USING THE SIGNER CONSOLE 2.1 SIGNER CONSOLE OPTIONS Signer console accepts the following options: -h or -help displays list of supported commands -v or -verbose displays more detailed execution output 2.2 STARTING AS INTERACTIVE SHELL To start the signer console as an interactive shell, type sudo -u xroad -i signer-console [<options>] 2.3 EXECUTING SINGLE COMMANDS To execute a single command, type sudo -u xroad -i signer-console [<options>] <command> [<command arguments>]
6 Signer Console User Guide Page AVAILABLE COMMANDS This section gives an overview of all available commands in signer console. A command may have one or more arguments, and may or may not produce any output. If command has arguments, they are always mandatory list-tokens Description: Lists all tokens. (none) Output: List of all tokens, each line representing the following token information: <id> (<status>, <read only writable>, <available unavailable>, <active inactive>) list-keys Description: Lists all keys on all tokens. (none) Output: List of keys on all tokens, each line representing the following key information: <id> (<usage>, <available unavailable>) list-certs Description: Lists all certificates and certificate requests on all keys. (none) Output: List of certificates and certificate requests on all keys, each line representing the following information: <id> (<status>, <client id>) set-token-friendly-name Description: Sets friendly name to the specified token. token id: the identifier of the token. Use list-tokens to look up token id-s. friendly name: the name to set set-key-friendly-name Description: Sets friendly name to the specified key. key id: the identifier of the key. Use list-keys to look up key id-s. friendly name: the name to set.
7 Signer Console User Guide Page get-member-certs Description: Returns certificates of a member. member id: the identifier of the member, entered as \ <instance> <class> <code>\. Output: List of certificates of the specified member activate-certificate Description: Activates the specified certificate. certificate id: the identifier of the certificate. Use list-certs to look up certificate identifiers deactivate-certificate Description: Deactivates the specified certificate. certificate id: the identifier of the certificate. Use list-certs to look up certificate identifiers delete-key Description: Deletes the specified key and all associated certificates and certificate requests. key id: the identifier of the key. Use list-keys to look up key id-s delete-certificate Description: Deletes the specified certificate from Signer. certificate id: the identifier of the certificate. Use list-certs to look up certificate identifiers delete-certificate-request Description: Deletes the specified certificate request from Signer. certificate request id: the identifier of the certificate. Use list-certs to look up certificate request identifiers.
8 Signer Console User Guide Page import-certificate Description: Imports a certificate from the specified file to a key. The certificate is imported to the key pair whose public key matches that of the certificate. file: the relative or absolute file name of the certificate in PEM or DER format. member id: the identifier of the member constructed from the C, O, CN fields of the certificates DN, entered as: \ <instance> <class> <code>\. If the certificate is an authentication certificate, the member id is not used. Output: Identifier of the key to which the certificate was imported login-token Description: Log in to the specified token. token id: the identifier of the token. Use list-tokens to look up token identifiers logout-token Description: Log out of the specified token token id: the identifier of the token. Use list-tokens to look up token identifiers init-software-token Description: Initialize the software token. A PIN is prompted that is used to log in to this token. (none) sign Description: Sign the specified character data using the specified key. key id: the identifier of the key. Use list-keys to look up key identifiers. data: character data to be signed as string Output: signature byte array generate-key Description: Generates a key on the specified token.
9 Signer Console User Guide Page 9 token id: the identifier of the token. Use list-tokens to look up token identifiers. Output: The id of the generated key generate-cert-request Description: Generates a certificate request under the specified key in Signer and saves it to a CSR file in current directory. key id: the identifier of the key. Use list-keys to look up key identifiers. member id: the identifier of the member that matches the subject name, entered as: \ <instance> <class> <code>\. usage: key usage either s (sign) or a (authentication) subject name: the subject distinguished name, entered as: C=<instance>, O=<class>, CN=<code> Output: Name of the file where the certificate request was saved.
10 Signer Console User Guide Page 10 3 EXAMPLE: CERTIFICATE IMPORT The following usage example shows how to initialize a software token and import a certificate to signer. 1. Initialize the software token: signer-console init-software-token A PIN is prompted, this will be used to log in to the software token afterwards. 2. Log in to the software token: signer-console login-token 0 Note, that the identifier of software token is always Generate a new key on the software token: Output is key id: signer-console generate-key 0 F30D41B745FC A3E Create a certificate request: signer-console generate-cert-request F30D41B745FC A3E \ FOO BAR BAZ\ s C=FOO,O=BAR,CN=BAZ Output: Saved to file F30D41B745FC A3E csr 5. Send the CSR to the Certificate Authority and get the certificate. 6. Import the new certificate to signer: signer-console import-certificate <PEM file> SAVED \ FOO BAR BAZ\
11 Signer Console User Guide Page 11 4 AUDIT LOG User actions events that are made by the signer-console utility and that change the system state or configuration are logged to the audit log. The actions are logged regardless of whether the outcome was a success or a failure. The complete list of the audit log events is described in [SPEC-AL]. An audit log record contains the description of the user action, the date and time of the event, the user name of the user performing the action, and the data related to the event. For example, logging in to the token produces the following log record: T17:41:28+03:00 my-server-host INFO [X-Road Signer Console] :41: {"event":"log into the token","user":"xroad","data":{"tokenid":"0"}} The event is present in JSON [JSON] format, in order to ensure machine processability. The fieldevent represents the description of the event, the fielduser represents the user name of the performer, and the fielddata represents data related with the event. The failed action event record contains an additional fieldreason for the error message. For example: T17:43:07+03:00 my-server-host INFO [X-Road Signer Console] :43: {"event":"log into the token failed","user":"xroad","reason":"signer.pinincorrect: PIN incorrect","data":{"tokenid":"0"}} By default, in the X-Road security server and central server, audit log is located in the file /var/log/xroad/audit.log
webmethods Certificate Toolkit
Title Page webmethods Certificate Toolkit User s Guide Version 7.1.1 January 2008 webmethods Copyright & Document ID This document applies to webmethods Certificate Toolkit Version 7.1.1 and to all subsequent
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Displaying SSL Certificate and Key Pair Information
CHAPTER 6 Displaying SSL Certificate and Key Pair Information This chapter describes the show commands available for displaying SSL-related information, such as certificate signing request (CSR) parameter
GoldKey and Cisco AnyConnect
Two-Factor VPN Authentication using GoldKey and Cisco AnyConnect Configuration Guide GoldKey Security Corporation www.goldkey.com 1 Table of Contents Configuration of the Cisco ASA... 3 Install the Active
Privilege Manager for Unix How To
Privilege Manager for Unix How To Administer Event and Keystroke Logs Event and Keystroke Logs Quest One Privilege Manager for UNIX can record two different types of log information for audit purposes.
Go to Policy/Global Properties/SmartDashboard Customization, click Configure. In Certificates and PKI properties, change host_certs_key_size to 2048
Checkpoint R71 to R71.3 You will see below that the openssl script uses a 2048 bit key which is correct for most CA's, however the default for R71.x is to provide a 1024 bit key which the script won't
PaaS Operation Manual
NTT Communications Cloudⁿ PaaS Operation Manual Ver.1.0 Any secondary distribution of this material (distribution, reproduction, provision, etc.) is prohibited. 1 Version no. Revision date Revision details
Using CertAgent to Obtain Domain Controller and Smart Card Logon Certificates for Active Directory Authentication
Using CertAgent to Obtain Domain Controller and Smart Card Logon Certificates for Active Directory Authentication Contents Domain Controller Certificates... 1 Enrollment for a Domain Controller Certificate...
Displaying SSL Certificate and Key Pair Information
CHAPTER6 Displaying SSL Certificate and Key Pair Information This chapter describes how to use the available show commands to display SSL-related information, such as the certificate and key pair files
WebSphere Application Server security auditing
Copyright IBM Corporation 2008 All rights reserved IBM WebSphere Application Server V7 LAB EXERCISE WebSphere Application Server security auditing What this exercise is about... 1 Lab requirements... 1
PRiSM Security. Configuration and considerations
PRiSM Security Configuration and considerations Agenda Security overview Authentication Adding a User Security Groups Security Roles Asset Roles Security Overview Three Aspects of Security Authentication
ASA 8.x Manually Install 3rd Party Vendor Certificates for use with WebVPN Configuration Example
ASA 8.x Manually Install 3rd Party Vendor Certificates for use with WebVPN Configuration Example Document ID: 98596 Contents Introduction Prerequisites Requirements Components Used Conventions Configure
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
User and Programmer Guide for the FI- STAR Monitoring Service SE
User and Programmer Guide for the FI- STAR Monitoring Service SE FI-STAR Beta Release Copyright 2014 - Yahya Al-Hazmi, Technische Universität Berlin This document gives a short guide on how to use the
Router CLI Overview. CradlePoint, Inc.
Router CLI Overview CradlePoint, Inc. Preface CradlePoint reserves the right to revise this publication and to make changes in the content thereof without obligation to notify any person or organization
SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014]
SSL Configuration on Weblogic Oracle FLEXCUBE Universal Banking Release 12.0.87.01.0 [August] [2014] Table of Contents 1. CONFIGURING SSL ON ORACLE WEBLOGIC... 1-1 1.1 INTRODUCTION... 1-1 1.2 SETTING UP
Install an SSL Certificate onto SilverStream. Sender Recipient Attached FIles Pages Date. Development Internal/External None 5 6/16/08
Technical Note Sender Recipient Attached FIles Pages Date Development Internal/External None 5 6/16/08 This technical note explains how to generate a Certificate Signing Request (CSR) and install an SSL
EJBCA with GemSAFE Toolbox Part2 Sign. and Encrypt Email
EJBCA with GemSAFE Toolbox Part2 Sign and Encrypt Email 2 Introduction This document introduces the process of using EJBCA together with GemSAFE toolbox to encrypt and sign email. In short, there are 4
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
WebLogic Server 6.1: How to configure SSL for PeopleSoft Application
WebLogic Server 6.1: How to configure SSL for PeopleSoft Application 1) Start WebLogic Server... 1 2) Access Web Logic s Server Certificate Request Generator page.... 1 3) Fill out the certificate request
TeamViewer 9 Manual Management Console
TeamViewer 9 Manual Management Console Rev 9.2-07/2014 TeamViewer GmbH Jahnstraße 30 D-73037 Göppingen www.teamviewer.com Table of Contents 1 About the TeamViewer Management Console... 4 1.1 About the
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server
MassTransit 6.0 Enterprise Web Configuration for Macintosh OS 10.5 Server November 6, 2008 Group Logic, Inc. 1100 North Glebe Road, Suite 800 Arlington, VA 22201 Phone: 703-528-1555 Fax: 703-528-3296 E-mail:
70-640. Microsoft - 70-640 Windows Server 2008 Active Directory, Configuring
Microsoft - 70-640 Windows Server 2008 Active Directory, Configuring 1 QUESTION: 1 You have a single Active Directory domain. All domain controllers run Windows Server 2008 and are configured as DNS servers.
Generating an Apple Enterprise MDM Certificate
Good Mobile Control Server Generating an Apple Enterprise MDM Certificate Updated 09/30/11 Overview... 1 Generating Your Apple Certificate Using a Mac... 1 Generating Your Apple Certificate Using Windows...
Clearswift Information Governance
Clearswift Information Governance Implementing the CLEARSWIFT SECURE Encryption Portal on the CLEARSWIFT SECURE Email Gateway Version 1.10 02/09/13 Contents 1 Introduction... 3 2 How it Works... 4 3 Configuration
Configure Single Sign on Between Domino and WPS
Configure Single Sign on Between Domino and WPS What we are doing here? Ok now we have the WPS server configured and running with Domino as the LDAP directory. Now we are going to configure Single Sign
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware
RSA Authentication Manager 7.1 to 8.1 Migration Guide: Upgrading RSA SecurID Appliance 3.0 On Existing Hardware Contact Information Go to the RSA corporate website for regional Customer Support telephone
McAfee Cloud Identity Manager
NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
Monitoring App V eg Enterprise v6
Monitoring App V eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced or
Title: Documentation for the Pi-UPS-Monitor-App
Title: Documentation for the Pi-UPS-Monitor-App Version: 0.01 Date: 09.01.14 Table of Content 1. PURPOSE, OR WHAT PIUSVMONITOR DOES...3 2. PACKAGE CONTENTS...4 3. INSTALLATION...5 4. USAGE...6 5. CONSOLE
UFTP AUTHENTICATION SERVICE
UFTP Authentication Service UFTP AUTHENTICATION SERVICE UNICORE Team Document Version: 1.1.0 Component Version: 1.1.1 Date: 17 11 2014 UFTP Authentication Service Contents 1 Installation 1 1.1 Prerequisites....................................
CRYPTOLogon Agent. for Windows Domain Logon Authentication. Deployment Guide. Copyright 2002-2003, CRYPTOCard Corporation, All Rights Reserved.
CRYPTOLogon Agent for Windows Domain Logon Authentication Deployment Guide Table of Contents 1. OVERVIEW... 1 1.1 SINGLE AUTHENTICATION MODE (MS-GINA REPLACEMENT)... 1 1.2 DUAL AUTHENTICATION MODE (MS-GINA
User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1
The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)
How to Order and Install Odette Certificates. Odette CA Help File and User Manual
How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 20.07.2015 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you
INFORMATION TECHNOLOGY CONTROLS
CHAPTER 14 INFORMATION TECHNOLOGY CONTROLS SCOPE This chapter addresses requirements common to all financial accounting systems and is not limited to the statewide financial accounting system, ENCOMPASS,
PREPARED BY: AUDIT PROGRAM Author: Lance M. Turcato. APPROVED BY: Logical Security Operating Systems - Generic. Audit Date:
A SYSTEMS UNDERSTANDING A 1.0 Organization Objective: To ensure that the audit team has a clear understanding of the delineation of responsibilities for system administration and maintenance. A 1.1 Determine
Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
Unicenter Workload Control Center r1 SP4. Server Status Troubleshooting Guide
Unicenter Workload Control Center r1 SP4 Server Status Troubleshooting Guide Table of Contents 1 Introduction 3 2 Information Page 3 3 Server Status Portlet 3 3.1 Configuration User Usage... 3 3.2 Troubleshooting
KMIP installation Guide. DataSecure and KeySecure Version 6.1.2. 2012 SafeNet, Inc. 007-012120-001
KMIP installation Guide DataSecure and KeySecure Version 6.1.2 2012 SafeNet, Inc. 007-012120-001 Introduction This guide provides you with the information necessary to configure the KMIP server on the
Advanced Administration
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Advanced Administration Guide Published: 2014-09-10 SWD-20140909133530796 Contents 1 Introduction...11 About this guide...12 What
Configuring Microsoft Active Directory for Oracle Net Naming. An Oracle White Paper April 2014
Configuring Microsoft Active Directory for Oracle Net Naming An Oracle White Paper April 2014 Configuring Microsoft Active Directory for Oracle Net Naming Introduction... 3 Steps to Configure Active Directory...
prefer to maintain their own Certification Authority (CA) system simply because they don t trust an external organization to
If you are looking for more control of your public key infrastructure, try the powerful Dogtag certificate system. BY THORSTEN SCHERF symmetric cryptography provides a powerful and convenient means for
Creating an ESS instance on the Amazon Cloud
Creating an ESS instance on the Amazon Cloud Copyright 2014-2015, R. James Holton, All rights reserved (11/13/2015) Introduction The purpose of this guide is to provide guidance on creating an Expense
Entrust Certificate Services. Java Code Signing. User Guide. Date of Issue: December 2014. Document issue: 2.0
Entrust Certificate Services Java Code Signing User Guide Date of Issue: December 2014 Document issue: 2.0 Copyright 2009-2014 Entrust. All rights reserved. Entrust is a trademark or a registered trademark
Microsoft IAS and NPS Agent Configuration Guide
Microsoft IAS and NPS Agent Configuration Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Agent IAS and NPS (Microsoft) Configuration
Document Management Getting Started Guide
Document Management Getting Started Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive Software, Inc. All other
Server Account Management
Server Account Management Setup Guide Contents: About Server Account Management Setting Up and Running a Server Access Scan Addressing Server Access Findings View Server Access Scan Findings Act on Server
Using LDAP with Sentry Firmware and Sentry Power Manager (SPM)
Using LDAP with Sentry Firmware and Sentry Power Manager (SPM) Table of Contents Purpose LDAP Requirements Using LDAP with Sentry Firmware (GUI) Initiate a Sentry GUI Session Configuring LDAP for Active
Flight Workflow User's Guide. Release 12.0.0
Flight Workflow User's Guide Release 12.0.0 Copyright 2015 Signiant Inc. All rights reserved. Contents CHAPTER 1 Flight Introduction 4 FlightUploadReference 4 FlightDownloadReference 4 Cloud Storage Configuration
Yubico PIV Management Tools
Yubico PIV Management Tools Active Directory Smart Card Logon using the YubiKey NEO or NEO-n Document Version 1.0 April 15, 2015 Yubico PIV Management Tools 2015 Yubico. All rights reserved. Page 1 of
How to Order and Install Odette Certificates. Odette CA Help File and User Manual
How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 24.02.2014 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you
Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N 300-011-843 REV A01 January 14, 2011
Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N 300-011-843 REV A01 January 14, 2011 This document contains information on these topics: Introduction... 2 Terminology...
Digital Signatures on iqmis User Access Request Form
Digital Signatures on iqmis User Access Request Form When a user clicks in the User Signature block on the iqmis Access Form, the following window appears: Click Save a Copy and rename it with your name,
Policy and Profile Reference Guide
BlackBerry Enterprise Service 10 BlackBerry Device Service Version: 10.2 Policy and Profile Reference Guide Published: 2014-06-16 SWD-20140616165002982 Contents 1 About this guide... 10 2 New IT policy
Security Guide vcenter Operations Manager for Horizon View 1.5 TECHNICAL WHITE PAPER
Security Guide vcenter Operations Manager for Horizon View 1.5 TECHNICAL WHITE PAPER Contents Introduction... 2 Surface Area... 3 SSL Configuration... 5 Authentication... 6 Adapter... 6 Broker Agent...
WHMCS LUXCLOUD MODULE
èè WHMCS LUXCLOUD MODULE Update: 02.02.2015 Version 2.0 This information is only valid for partners who use the WHMCS module (v2.0 and higher). 1.1 General overview 1.2 Installing the plugin Go to your
How to Order and Install Odette Certificates. Odette CA Help File and User Manual
How to Order and Install Odette Certificates Odette CA Help File and User Manual 1 Release date 28.07.2014 Contents Preparation for Ordering an Odette Certificate... 3 Step 1: Prepare the information you
English ETERNUS CS800 S3. Backup Exec OST Guide
English ETERNUS CS800 S3 Backup Exec OST Guide Edition April 2012 Comments Suggestions Corrections The User Documentation Department would like to know your opinion on this manual. Your feedback helps
SafeNet KMIP and Google Cloud Storage Integration Guide
SafeNet KMIP and Google Cloud Storage Integration Guide Documentation Version: 20130719 Table of Contents CHAPTER 1 GOOGLE CLOUD STORAGE................................. 2 Introduction...............................................................
OneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
UM8000 Voicemail System Administration Guide
UM8000 Voicemail System Administration Guide CUSTOMER INFORMATION: Phone System (SV8100) IP Address: User Name: Password: Voicemail (UM8000) IP Address: Login ID: Password: Logging into the Voice Mail
CA Nimsoft Monitor. Probe Guide for NT Event Log Monitor. ntevl v3.8 series
CA Nimsoft Monitor Probe Guide for NT Event Log Monitor ntevl v3.8 series Legal Notices Copyright 2013, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and
MBAM Self-Help Portals
MBAM Self-Help Portals Authoring a self-help portal workflow for BitLocker Recovery Using Microsoft BitLocker Administration and Monitoring (MBAM) Technical White Paper Published: September 2011 Priyaa
Enterprise Content Management System Monitor 5.1 Security Considerations Revision 1.1. 2014-06-23 CENIT AG Brandner, Marc
Enterprise Content Management System Monitor 5.1 Security Considerations Revision 1.1 2014-06-23 CENIT AG Brandner, Marc INTRODUCTION... 3 SSL SECURITY... 4 ACCESS CONTROL... 9 SERVICE USERS...11 Introduction
Remote Administration
Windows Remote Desktop, page 1 pcanywhere, page 3 VNC, page 7 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2008 R2 from a range of devices over
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
User Management Tool 1.6
User Management Tool 1.6 2014-12-08 23:32:48 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.6... 3 ShareFile User Management
CAPIX Job Scheduler User Guide
CAPIX Job Scheduler User Guide Version 1.1 December 2009 Table of Contents Table of Contents... 2 Introduction... 3 CJS Installation... 5 Writing CJS VBA Functions... 7 CJS.EXE Command Line Parameters...
Powershell Management for Defender
Powershell Management for Defender 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
SECO Whitepaper. SuisseID Smart Card Logon Configuration Guide. Prepared for SECO. Publish Date 19.05.2010 Version V1.0
SECO Whitepaper SuisseID Smart Card Logon Configuration Guide Prepared for SECO Publish Date 19.05.2010 Version V1.0 Prepared by Martin Sieber (Microsoft) Contributors Kunal Kodkani (Microsoft) Template
Resco Mobile CRM Security
Resco Mobile CRM Security Out-of-the-box Security 1. Overview The Resco Mobile CRM application (client) communicates directly with the Dynamics CRM server. The communication uses standard Dynamic CRM Web
FIGURE 33.5. Selecting properties for the event log.
1358 CHAPTER 33 Logging and Debugging Customizing the Event Log The properties of an event log can be configured. In Event Viewer, the properties of a log are defined by general characteristics: log path,
DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0
DEFENSE INFORMATION SYSTEMS AGENCY JOINT INTEROPERABILITY TEST COMMAND FORT HUACHUCA, ARIZONA DEPARTMENT OF DEFENSE PUBLIC KEY INFRASTRUCTURE EXTERNAL CERTIFICATION AUTHORITY MASTER TEST PLAN VERSION 1.0
Marriott Enrollment Server for Web User Guide V1.4
Marriott Enrollment Server for Web User Guide V1.4 Page 1 of 26 Table of Contents TABLE OF CONTENTS... 2 PREREQUISITES... 3 ADMINISTRATIVE ACCESS... 3 RNACS... 3 SUPPORTED BROWSERS... 3 DOWNLOADING USING
ITA Mail Archive Setup Guide
This version of ITA Mail Archive is optimized to archive emails on both Microsoft Exchange 2000 and 2003 and 2007 servers. It is highly recommended that ITA Mail Archive should run on a server other than
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
Xerox Multifunction Devices. Verify Device Settings via the Configuration Report
Xerox Multifunction Devices Customer Tips March 15, 2007 This document applies to these Xerox products: X WC 4150 X WCP 32/40 X WCP 35/45/55 X WCP 65/75/90 X WCP 165/175 X WCP 232/238 X WCP 245/255 X WCP
Certificates for computers, Web servers, and Web browser users
Entrust Managed Services PKI Certificates for computers, Web servers, and Web browser users Document issue: 3.0 Date of issue: June 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
Command Line Interface User Guide for Intel Server Management Software
Command Line Interface User Guide for Intel Server Management Software Legal Information Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel
Configuring Logging. Information About Logging CHAPTER
52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page
HP LeftHand SAN Solutions
HP LeftHand SAN Solutions Support Document Installation Manuals Installation and Setup Guide Health Check Legal Notices Warranty The only warranties for HP products and services are set forth in the express
Certificate technology on Pulse Secure Access
Certificate technology on Pulse Secure Access How-to Guide Published Date July 2015 Contents Introduction: 3 Creating a Certificate signing request (CSR): 3 Import Intermediate CAs: 5 Using Trusted Client
etrust Audit Using the Recorder for Check Point FireWall-1 1.5
etrust Audit Using the Recorder for Check Point FireWall-1 1.5 This documentation and related computer software program (hereinafter referred to as the Documentation ) is for the end user s informational
Source Code Management for Continuous Integration and Deployment. Version 1.0 DO NOT DISTRIBUTE
Source Code Management for Continuous Integration and Deployment Version 1.0 Copyright 2013, 2014 Amazon Web Services, Inc. and its affiliates. All rights reserved. This work may not be reproduced or redistributed,
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
Lieberman Software. RSA SecurID Ready Implementation Guide. Account Reset Console. Partner Information. Last Modified: March 20 th, 2012
RSA SecurID Ready Implementation Guide Last Modified: March 20 th, 2012 Partner Information Product Information Partner Name Web Site Product Name Lieberman Software Corporation www.liebsoft.com Version
Upgrading Software Using the Online Installer
Upgrading Software Using the Online Installer Last Updated: December 8, 2009 This chapter provides the procedures for upgrading from a previous software version of the Cisco Integrated Storage System module
Certificate technology on Junos Pulse Secure Access
Certificate technology on Junos Pulse Secure Access How-to Introduction:... 1 Creating a Certificate signing request (CSR):... 1 Import Intermediate CAs: 3 Using Trusted Client CA on Juno Pulse Secure
Documentum Developer Program
Program Enabling Logging in DFC Applications Using the com.documentum.fc.common.dflogger class April 2003 Program 1/5 The Documentum DFC class, DfLogger is available with DFC 5.1 or higher and can only
Junos Pulse. Windows In-Box Junos Pulse Client Quick Start Guide. Published: 2013-10-18. Copyright 2013, Juniper Networks, Inc.
Junos Pulse Windows In-Box Junos Pulse Client Quick Start Guide Published: 2013-10-18 Juniper Networks, Inc. 1194 North Mathilda Avenue Sunnyvale, California 94089 USA 408-745-2000 www.juniper.net All
ESM s management across multi-platforms eliminates the need for various account managers.
DetectIT & Axent s ESM Product Description Axent s Enterprise Security Manager (ESM) provides enterprise-wide, multi-platform management that simplifies and centralizes the administration of security.
HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Application Setup help topics for printing
HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Application Setup help topics for printing Document Release Date: December 2014 Software Release Date: December
Guide to Your Telephone Service
Guide to Your Telephone Service OPTIONS AND FEATURES AVAILABLE WITH EPLUS BROADBAND TELEPHONE SERVICE 422-7500 Table of Contents Included in this guide is a comprehensive list of features and services
Preface. Limitations. Disclaimers. Technical Support. Luna SA and IBM HTTP Server/IBM Web Sphere Application Server Integration Guide
Luna SA and IBM HTTP Server/IBM Web Sphere Application Server Integration Guide Preface Preface 2012 SafeNet, Inc. All rights reserved. Part Number: 007-012077-001 (Rev B, 06/2012) All intellectual property
The Impact of 21 CFR Part 11 on Product Development
The Impact of 21 CFR Part 11 on Product Development Product development has become an increasingly critical factor in highly-regulated life sciences industries. Biotechnology, medical device, and pharmaceutical
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
