This document contains information about the ElectricAccelerator integration with Kerberos. Topics include: Overview 2.

Size: px
Start display at page:

Download "This document contains information about the ElectricAccelerator integration with Kerberos. Topics include: Overview 2."

Transcription

1 Electric Cloud ElectricAccelerator version 6.2 Technical Notes Kerberos Integration December 2012 This document contains information about the ElectricAccelerator integration with Kerberos. Topics include: Overview 2 Prerequisites 2 Using the emake Client 2 Using the Agent 3 Addressing Error and Warning Messages 4 Troubleshooting and Getting Help 7 1

2 Overview Overview You can configure ElectricAccelerator to use the Kerberos security protocol to authenticate initial connections from emake client programs to agent services. To assist with auditing, you can also configure agents to log these authentication events and the build steps that were run. In authenticated mode, UNIX/Linux build steps run as the authenticated user only. For example, if an emake client authenticates with Kerberos principal then build steps run as user even if the emake client runs as a different user on its machine. In order for emake to authenticate itself under UNIX/Linux, you must first run kinit. Agents require keytab access to the relevant Kerberos host principal. Windows authentication is based on domain users. The emake client must be run by a domain user, and you must configure agents to run as domain users. Windows agents do not impersonate emake client users but will log authentication events and build steps if desired. In order to highlight security gaps caused by misconfiguration, you must either enable authentication throughout the cluster, or prohibit it throughout the cluster. Agents and the emake client will refuse to fall back to unauthenticated mode, because doing so hides gaps in security. Instead, mismatches between emake client and agent security configurations will fail builds until corrected. When you configure an agent to require authentication, you authorize a specific Kerberos domain to use that agent. Principals in other Kerberos domains remain unauthorized. Note: Kerberos integration supports x86 and SPARC Solaris 10 (Update 9 is required). Prerequisites Kerberos implementation of GSSAPI For Linux systems, you must install a Kerberos implementation of GSSAPI on the agent and emake client machines. The package names may start with krb5-libs on Red Hat systems, or krb5-user on Ubuntu systems. For 64-bit emake systems, Electric Cloud recommends installing both 32-bit and 64-bit variants, so that both 32- bit and 64-bit emake can use the library. On Linux, ElectricAccelerator supports the MIT Kerberos 5 implementation of GSSAPI. Other implementations of GSSAPI are not supported/tested by Electric Cloud. Using the emake Client Logging in On Windows systems, you must log in with a domain account. For UNIX/Linux systems, you must run kinit to log in to your Kerberos domain. Enabling authentication Authentication is both enabled and required by this command line option: --emake-agent-security=auth Alternatively, you can add that command line option to $EMAKEFLAGS or set EMAKE_AGENT_SECURITY=auth in your environment. For security debug logging, use --emake-debug=y 2

3 Using the Agent Using the Agent erunner service Do not install the erunner service; it is not secure. Without the erunner service, single point cluster upgrades are not supported. Agent users On Windows systems, agent users must be domain accounts named ECloudInternalUser1, ECloudInternalUser2,... You must explicitly override the default choice, which is to use local accounts with those names. Enabling authentication and security tracing Enable authentication and security tracing by running: On UNIX/Linux: On Windows: ecconfig -emakesecurity "auth DOMAIN.COM" -trace security ecconfig -args "-emakesecurity \"auth DOMAIN.COM\" -trace security" Replace DOMAIN.COM with the uppercase Kerberos domain that is authorized to use the agent. For verbose security details, replace -trace security with -trace securitydetails. Restart the agents after making this change. Note: As a side effect of enabling authentication, the agent console port will be disabled. Rerun ecconfig after upgrading After upgrading ElectricAccelerator, you must rerun the ecconfig command to re-enable Kerberos authentication and security tracing. Restart agents after running ecconfig. Kerberos host principals that include fully qualified domain names On UNIX/Linux, if the Kerberos host principal for an agent host includes the host s fully qualified domain name (instead of its host name only), then add the corresponding text (depending on your ElectricAccelerator version) to <installdir>/<arch>/bin/runagent.local on that agent host: For ElectricAccelerator 6.0.x or 5.5, add set ::args(-myhost) [info hostname]-[expr {$args(-efsid) + 1}] For ElectricAccelerator 6.1 or later, add set args(-myhost) [hostname -fqdn] If the runagent.local file does not yet exist, then create it. Whether or not the file previously existed, restart the agents after making this change. MIT Kerberos 5 keytab location On Linux systems, if you want the agents to use an MIT Kerberos 5 keytab that is not in the default location, then use ecconfig to instruct the agent where to find it; for example: ecconfig -keytab /etc/ecagent.keytab Restart the agents after making this change. 3

4 Addressing Error and Warning Messages Customizing the agent and/or host names the agent reports to the Cluster Manager You want to change the agent name, host name, or both names that the agent reports to the Cluster Manager. Changing the host name By default, the host name reported to the Cluster Manager is the name of the host on which the agent runs, without any domain name qualification. Adding: set args(-myhost) somehostname to runagent.local overrides the default name, where "somehostname" is a host name of your choice, and may be qualified if desired. If you need to send the fully qualified form of the hostname: set args(-myhost) [hostname -fqdn] Changing the agent name By default, the agent name reported to the Cluster Manager is the same as the host name that is reported to the Cluster Manager (as specified by -myhost, above, or defaulted), but followed by a minus sign and the agent number. The agent name uniquely identifies the agent process, as opposed to the agent host machine. Generally, you would need to change the agent name only if the default is not suitable, which may be the case if -myhost was set to an unusual value. Adding: set args(-myname) somehostname-$::gagentnumber to runagent.local overrides the default, where "somehostname" is a host name of your choice. Electric Cloud recommends ending the agent name with a minus sign followed by the agent number. The code in runagent.local can access the agent number through the Tcl global variable named ::gagentnumber. Addressing Error and Warning Messages This section details error and warning messages associated with Kerberos usage in ElectricAccelerator. EC1171: [agent]: [agentprincipal]: Security Error:... Emake failed in its preparations to authenticate itself to the agent, or the agent failed mutual authentication. (This error is detected on the emake side.) There are any number of reasons that this sort of failure might occur. The most common example is that, under UNIX/Linux, the user may have neglected to run Kerberos kinit. Check the error text for clues as to which stage of authentication failed. On UNIX/Linux, the portion of the message after the GSSAPI Minor Status code but before the text \naborting build. was generated by the GSSAPI library. Similarly, on Windows, the portion of the message after the SSPI Error code but before the \naborting build. was generated by the Windows SSPI library. EC1172: Unknown security mode for agent communications: "[option]" The argument to --emake-agent-security= is invalid. Check the text of the error message for a list of available modes, and choose one. 4

5 Addressing Error and Warning Messages EC1173:... Emake failed to initialize needed security facilities. Check the text of the error message to determine what failed. Check for the following messages in particular: Failed to load GSSAPI message In this case, there was a problem loading the UNIX/Linux GSSAPI shared object library provided by Kerberos. On Linux systems, first verify that Kerberos is installed. See "Prerequisites" on page 2 for suggested package name prefixes. On 64-bit systems, verify that 64-bit and 32-bit GSSAPI shared object libraries are installed. On UNIX/Linux, if Kerberos has been installed, then add the directory containing its GSSAPI shared object library to the LD_LIBRARY_PATH environment variable. Alternatively, if you do not wish to modify LD_LIBRARY_PATH, or such modification does not solve the problem, then instead set the ECLOUD_GSSAPI_LIBRARY environment variable to the filename of the Kerberos GSSAPI shared object library that is to be used. Use only the filename; if that does not work, use an absolute path. (See man dlopen for more details concerning library search.) You can even set ECLOUD_GSSAPI_LIBRARY to a space-separated list of candidate shared object library names. Emake ignores ECLOUD_GSSAPI_LIBRARY on Windows. WARNING: Unable to start session: Failed to load GSSAPI:... On UNIX/Linux systems, if you see this message in an agent log, then you may need to instruct ecagent where to find a Kerberos implementation of GSSAPI. The underlying issue is the same as for the emake client EC1173: Failed to load GSSAPI message. The response, however, is slightly different in the agent context. Linux Kerberos installation is the same as for "EC1173:..." on page 5 above. If Kerberos is installed and the agent still cannot find GSSAPI, then specify the filename of the GSSAPI shared object library with: ecconfig -gssapi "libgssapi-a.so /some/directory/libgssapi-b.so" The argument to -gssapi has the same form and meaning as does the value of ECLOUD_GSSAPI_LIBRARY; see "EC1173:..." on page 5 above. Restart the agents after making this change. EC2128: agent reports: [Security Error: authentication rejected]; aborting build The agent has rejected an attempt by the emake client to authenticate itself. Various causes are possible. Check the agent logs for details for security reasons, the agent intentionally withholds those details from the emake client. Security Error: gss_accept_sec_context: GSSAPI Minor Status 0x2: No such file or directory In particular, if on Linux you see this error message in the agent log, then you may need to install a keytab or instruct the agent where to find it; see "MIT Kerberos 5 keytab location" on page 3 for details. On UNIX/Linux, if the agent log message mentions a GSSAPI Minor Status code, then the rest of the message was generated by the GSSAPI library. Similarly, on Windows, if the agent log message mentions an SSPI Error code, then the rest of the message was generated by the Windows SSPI library. EC2129: agent reports: [Security Error: authentication required]; aborting build The agent requires authentication for this emake client connection. Enable authentication on the emake client. 5

6 Addressing Error and Warning Messages EC2130: agent reports: [Security Error: authentication not offered]; aborting build An agent does not offer authentication for emake client connections. Enable authentication on all agents. EC2132: (from [agent]) Security Warning: unavailable user XXX; instead setting user AAA and groups BBB,CCC The UNIX/Linux user ID available to the emake client is not allowed for the authenticated user on an agent machine involved in the build. First, check that the principal used in authentication (typically the argument to kinit) matches the UNIX/Linux user account that is running emake. If it does not match, then rerun kinit (or similar) with a principal that does match the UNIX/Linux user account (or switch to a different UNIX/Linux user account and rerun kinit). If the principal and user match, then log in as that user on both the emake client machine and the agent machine, run id in both accounts, and compare the results to see if they match. If they do not match, then change the user ID on one of the machines to match the other and reconcile the groups as well in order to avoid EC2133 and EC2134. Be sure that all agent machines match each other, too, or you will get the same error with a different agent machine. You can also check to see if there is some type of setuid/sudo wrapper around emake. EC2133 Security Warning: unavailable primary group YYY; instead setting user AAA and groups BBB,CCC This is similar to EC2132, except that in this case the user ID matches, but the primary group ID requested by emake is not available to that user on an agent machine. Either grant membership in the group on all agent machines, or change to a different primary group on the emake client. In the latter case, if you keep the original primary group in the supplementary group list, then you may encounter EC2134. EC2134 Security Warning: unavailable supplementary groups YYY,ZZZ; instead setting user AAA and groups BBB,CCC This is similar to EC2132, except that in this case the user ID matches, and the primary group ID requested by emake is available to that user, but one or more supplementary group IDs requested by emake is not available to that user on an agent machine. See also EC2133, which is for an unavailable primary group ID. Either grant membership in the group on all agent machines, or deny membership on the emake client. "Unknown code krb5..." appearing in security error messages This type of message appears to result from a bug in the 64-bit MIT Kerberos 5 implementation of GSSAPI, not from any flaw in Electric Cloud products. (The bug appears to be that an unsigned 32-bit GSSAPI minor status is zero-padded to create a 64-bit MIT Kerberos 5 error code, instead of being sign-extended as MIT Kerberos 5 expects, and therefore certain codes are not found in the error string table, thus leading to generic error strings.) To work around this bug, either run in 32-bit mode or look up the MIT Kerberos 5 error numbers on the web. In the latter case, you may find it easiest to use the full code just after GSSAPI Minor Status. Also refer to the following Red Hat bug report about this issue: 6

7 Troubleshooting and Getting Help Troubleshooting and Getting Help Contacting Technical Support: Before you contact our technical support staff, please have the following information available. Your name, title, company name, phone number, fax number, and address Operating system and version number Product name and release version Problem description Hours: 8AM - 5PM PST (Monday-Friday, except Holidays) Phone: , Option #2 support@electric-cloud.com Copyright Electric Cloud, Inc. All rights reserved. Electric Cloud believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. ELECTRIC CLOUD, INC. MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any Electric Cloud software described in this publication requires an applicable software license. Trademarks Electric Cloud, ElectricAccelerator, ElectricCommander, ElectricInsight, and Electric Make are registered trademarks or trademarks of Electric Cloud, Incorporated. Electric Cloud products ElectricAccelerator, ElectricCommander, ElectricInsight, and Electric Make are commonly referred to by their short names Accelerator, Commander, Insight, and emake throughout various types of Electric Cloud product-specific documentation. All other trademarks used herein are the property of their respective owners. 7

ElectricCommander. Technical Notes MS Visual Studio Add-in Integration version 1.5.0. version 3.5 or higher. October 2010

ElectricCommander. Technical Notes MS Visual Studio Add-in Integration version 1.5.0. version 3.5 or higher. October 2010 ElectricCommander version 3.5 or higher Technical Notes MS Visual Studio Add-in Integration version 1.5.0 October 2010 This document contains information about the ElectricCommander integration with the

More information

Table 1 shows the LDAP server configuration required for configuring the federated repositories in the Tivoli Integrated Portal server.

Table 1 shows the LDAP server configuration required for configuring the federated repositories in the Tivoli Integrated Portal server. Configuring IBM Tivoli Integrated Portal server for single sign-on using Simple and Protected GSSAPI Negotiation Mechanism, and Microsoft Active Directory services Document version 1.0 Copyright International

More information

RSA Security Analytics Netflow Collection Configuration Guide

RSA Security Analytics Netflow Collection Configuration Guide RSA Security Analytics Netflow Collection Configuration Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks

More information

RSA Security Analytics Netflow Collection Configuration Guide

RSA Security Analytics Netflow Collection Configuration Guide RSA Security Analytics Netflow Collection Configuration Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks

More information

Subversion Server for Windows

Subversion Server for Windows Subversion Server for Windows VisualSVN Team VisualSVN Server: Subversion Server for Windows VisualSVN Team Copyright 2005-2008 VisualSVN Team Windows is a registered trademark of Microsoft Corporation.

More information

CA Performance Center

CA Performance Center CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is

More information

Novell Access Manager

Novell Access Manager J2EE Agent Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 J2EE Agent Guide Legal Notices Novell, Inc., makes no representations

More information

This presentation will discuss how to troubleshoot different types of project creation issues with Information Server DataStage version 8.

This presentation will discuss how to troubleshoot different types of project creation issues with Information Server DataStage version 8. This presentation will discuss how to troubleshoot different types of project creation issues with Information Server DataStage version 8. Page 1 of 29 The objectives of this module are to list the causes

More information

2 Downloading Access Manager 3.1 SP4 IR1

2 Downloading Access Manager 3.1 SP4 IR1 Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1

More information

SOA Software: Troubleshooting Guide for Agents

SOA Software: Troubleshooting Guide for Agents SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,

More information

PATROL Console Server and RTserver Getting Started

PATROL Console Server and RTserver Getting Started PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.

More information

Dell Compellent Storage Center

Dell Compellent Storage Center Dell Compellent Storage Center Active Directory Integration Best Practices Guide Dell Compellent Technical Solutions Group January, 2013 THIS BEST PRACTICES GUIDE IS FOR INFORMATIONAL PURPOSES ONLY, AND

More information

TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS

TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS White Paper TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS Abstract This white paper explains how to diagnose and troubleshoot issues in the RSA Access Manager single sign-on

More information

Guide to SASL, GSSAPI & Kerberos v.6.0

Guide to SASL, GSSAPI & Kerberos v.6.0 SYMLABS VIRTUAL DIRECTORY SERVER Guide to SASL, GSSAPI & Kerberos v.6.0 Copyright 2011 www.symlabs.com Chapter 1 Introduction Symlabs has added support for the GSSAPI 1 authentication mechanism, which

More information

Use Enterprise SSO as the Credential Server for Protected Sites

Use Enterprise SSO as the Credential Server for Protected Sites Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured

More information

EMC Celerra Network Server

EMC Celerra Network Server EMC Celerra Network Server Release 5.6.47 Using Windows Administrative Tools with Celerra P/N 300-004-139 REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com

More information

Jive Connects for Microsoft SharePoint: Troubleshooting Tips

Jive Connects for Microsoft SharePoint: Troubleshooting Tips Jive Connects for Microsoft SharePoint: Troubleshooting Tips Contents Troubleshooting Tips... 3 Generic Troubleshooting... 3 SharePoint logs...3 IIS Logs...3 Advanced Network Monitoring... 4 List Widget

More information

Command Line Interface User Guide for Intel Server Management Software

Command Line Interface User Guide for Intel Server Management Software Command Line Interface User Guide for Intel Server Management Software Legal Information Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel

More information

Architecting the Future of Big Data

Architecting the Future of Big Data Hive ODBC Driver User Guide Revised: July 22, 2013 2012-2013 Hortonworks Inc. All Rights Reserved. Parts of this Program and Documentation include proprietary software and content that is copyrighted and

More information

2 Installing Privileged User Manager 2.3

2 Installing Privileged User Manager 2.3 NetIQ Privileged User Manager 2.3.2 Release Notes January, 2013 1 Documentation The following sources provide information about Privileged User Manager: Privileged User Manager 2.3 Documentation Site (http://www.novell.com/documentation/

More information

User Source and Authentication Reference

User Source and Authentication Reference User Source and Authentication Reference ZENworks 11 www.novell.com/documentation Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Scheduling in SAS 9.3

Scheduling in SAS 9.3 Scheduling in SAS 9.3 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. Scheduling in SAS 9.3. Cary, NC: SAS Institute Inc. Scheduling in SAS 9.3

More information

What s New in Centrify Server Suite 2015

What s New in Centrify Server Suite 2015 C E N T R I F Y S E R V E R S U I T E 2 0 1 5 W H A T S N E W What s New in Centrify Server Suite 2015 Centrify Server Suite Standard Edition Hadoop support Big Data adoption by industry is around 25%

More information

Framework 8.1. External Authentication. Reference Manual

Framework 8.1. External Authentication. Reference Manual Framework 8.1 External Authentication Reference Manual The information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent of Genesys

More information

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,

More information

SOA Software: Troubleshooting Guide for WebSphere Application Server Agent

SOA Software: Troubleshooting Guide for WebSphere Application Server Agent SOA Software: Troubleshooting Guide for WebSphere Application Server Agent SOA Software: Troubleshooting Guide for WebSphere Application Server Agent 1 SOA Software Troubleshooting Guide for WebSphere

More information

Altiris Monitor Pack for Servers 7.1 SP2 from Symantec Release Notes

Altiris Monitor Pack for Servers 7.1 SP2 from Symantec Release Notes Altiris Monitor Pack for Servers 7.1 SP2 from Symantec Release Notes Altiris Monitor Pack for Servers 7.1 SP2 from Symantec Release Notes The software described in this book is furnished under a license

More information

Informatica Corporation Proactive Monitoring for PowerCenter Operations Version 3.0 Release Notes May 2014

Informatica Corporation Proactive Monitoring for PowerCenter Operations Version 3.0 Release Notes May 2014 Contents Informatica Corporation Proactive Monitoring for PowerCenter Operations Version 3.0 Release Notes May 2014 Copyright (c) 2012-2014 Informatica Corporation. All rights reserved. Installation...

More information

Enabling Active Directory Authentication with ESX Server 1

Enabling Active Directory Authentication with ESX Server 1 1 Enabling Active Directory Authentication with ESX Server 1 This document provides information about how to configure ESX Server to use Active Directory for authentication. ESX Server system includes

More information

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM

SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM Abstract This paper explains how to setup Active directory service on windows server 2008.This guide also explains about how to install

More information

Release Notes P/N e4-1896-01

Release Notes P/N e4-1896-01 EMC Legato NetWorker Module for Lotus Release 3.0 Release Notes P/N e4-1896-01 January 26, 2006 These release notes contain supplemental information about EMC Legato NetWorker Module for Lotus (NML) release

More information

CA Spectrum and CA Embedded Entitlements Manager

CA Spectrum and CA Embedded Entitlements Manager CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically

More information

SAP HANA Client Installation and Update Guide

SAP HANA Client Installation and Update Guide PUBLIC SAP HANA Platform SPS 12 Document Version: 1.0 2016-05-11 Content 1 Introduction....3 1.1 Supported Platforms.... 3 1.2 Software Download.... 4 2 SAP HANA Client on UNIX or Linux....7 2.1 Planning

More information

EMC Clinical Archiving

EMC Clinical Archiving EMC Clinical Archiving Version 1.7 Installation Guide EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Legal Notice Copyright 2014-2015 EMC Corporation. All Rights

More information

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved

Borderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved Borderware Firewall Server Version 7.1 VPN Authentication Configuration Guide Copyright 2005 CRYPTOCard Corporation All Rights Reserved http://www.cryptocard.com Overview The BorderWare Firewall Server

More information

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1

Veritas Operations Manager Release Notes. 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes The software described in this book is furnished under a license agreement and may be used only in

More information

White Paper. Fabasoft Folio Environment Variables. Fabasoft Folio 2015 Update Rollup 2

White Paper. Fabasoft Folio Environment Variables. Fabasoft Folio 2015 Update Rollup 2 White Paper Fabasoft Folio Environment Variables Fabasoft Folio 2015 Update Rollup 2 Copyright Fabasoft R&D GmbH, Linz, Austria, 2015. All rights reserved. All hardware and software names used are registered

More information

Migrating to vcloud Automation Center 6.1

Migrating to vcloud Automation Center 6.1 Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience

Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

Setting up Single Sign-On (SSO) with SAP HANA and SAP BusinessObjects XI 4.0

Setting up Single Sign-On (SSO) with SAP HANA and SAP BusinessObjects XI 4.0 Setting up Single Sign-On (SSO) with SAP HANA and SAP BusinessObjects XI 4.0 February 8, 2013 Version 1.0 Vishal Dhir Customer Solution Adoption (CSA) www.sap.com TABLE OF CONTENTS INTRODUCTION... 3 What

More information

Red Hat Directory Server 8.0 Release Notes

Red Hat Directory Server 8.0 Release Notes Red Hat Directory Server 8.0 Release Notes Red Hat Documentation Team Copyright 2008 Red Hat, Inc. Copyright You need to override this in your local ent file Red Hat. This material may only be distributed

More information

Healthstone Monitoring System

Healthstone Monitoring System Healthstone Monitoring System Patrick Lambert v1.1.0 Healthstone Monitoring System 1 Contents 1 Introduction 2 2 Windows client 2 2.1 Installation.............................................. 2 2.2 Troubleshooting...........................................

More information

Cloudera ODBC Driver for Apache Hive Version 2.5.16

Cloudera ODBC Driver for Apache Hive Version 2.5.16 Cloudera ODBC Driver for Apache Hive Version 2.5.16 Important Notice 2010-2015 Cloudera, Inc. All rights reserved. Cloudera, the Cloudera logo, Cloudera Impala, Impala, and any other product or service

More information

WebSphere Application Server security auditing

WebSphere Application Server security auditing Copyright IBM Corporation 2008 All rights reserved IBM WebSphere Application Server V7 LAB EXERCISE WebSphere Application Server security auditing What this exercise is about... 1 Lab requirements... 1

More information

Remote Control 5.1.2. Tivoli Endpoint Manager - TRC User's Guide

Remote Control 5.1.2. Tivoli Endpoint Manager - TRC User's Guide Tivoli Remote Control 5.1.2 Tivoli Endpoint Manager - TRC User's Guide Tivoli Remote Control 5.1.2 Tivoli Endpoint Manager - TRC User's Guide Note Before using this information and the product it supports,

More information

Kerberos: Single Sign On for BS2000

Kerberos: Single Sign On for BS2000 Kerberos: Single Sign On for BS2000 Issue April 2011 Pages 6 Overview A Single Sign On system (SSO system) is a system which permits an automatic and convenient, i.e. nonrecurring, logon to various resources

More information

Rebasoft Auditor Quick Start Guide

Rebasoft Auditor Quick Start Guide Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered

More information

Infor Cloud Printing Service Administration Guide

Infor Cloud Printing Service Administration Guide Infor Cloud Printing Service Administration Guide Copyright 2015 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and contains confidential

More information

IBM WebSphere Partner Gateway V6.2.1 Advanced and Enterprise Editions

IBM WebSphere Partner Gateway V6.2.1 Advanced and Enterprise Editions IBM WebSphere Partner Gateway V6.2.1 Advanced and Enterprise Editions Integrated SFTP server 2011 IBM Corporation The presentation gives an overview of integrated SFTP server feature IntegratedSFTPServer.ppt

More information

Slide Index. Technical Support Training

Slide Index. Technical Support Training MessageStats 7.1 Slide Index Learning Objectives- Slide 3 Product Overview- Slides 4-5 Common Issues- Slides 6-7 Troubleshooting Checklist- Slides 9-23 Common Error Messages- Slide 24 29 MessageStats Report

More information

Avira AntiVir MailGate 3.2 Release Notes

Avira AntiVir MailGate 3.2 Release Notes Release Notes 1. Features 1.1 Assigning recipient addresses to groups either by using Active Directory or a plain text file 1.1.1 Using a Active Directory server MailGate communicates with Active Directory

More information

RWL Tech Note Wireless 802.1x Authentication with Windows NPS

RWL Tech Note Wireless 802.1x Authentication with Windows NPS Wireless 802.1x Authentication with Windows NPS Prepared by Richard Litchfield HP Networking Solution Architect Hewlett-Packard Australia Limited 410 Concord Road Rhodes NSW 2138 AUSTRALIA Date Prepared:

More information

Installation and Configuration Guide Simba Technologies Inc.

Installation and Configuration Guide Simba Technologies Inc. Simba Microsoft SQL Server ODBC Installation and Configuration Guide Simba Technologies Inc. September 10, 2015 Copyright 2015 Simba Technologies Inc. All Rights Reserved. Information in this document

More information

Configuring Apache HTTP Server With Pramati

Configuring Apache HTTP Server With Pramati Configuring Apache HTTP Server With Pramati 45 A general practice often seen in development environments is to have a web server to cater to the static pages and use the application server to deal with

More information

Integrated Citrix Servers

Integrated Citrix Servers Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights

More information

Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N 300-011-843 REV A01 January 14, 2011

Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N 300-011-843 REV A01 January 14, 2011 Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N 300-011-843 REV A01 January 14, 2011 This document contains information on these topics: Introduction... 2 Terminology...

More information

IBM WebSphere Application Server Version 7.0

IBM WebSphere Application Server Version 7.0 IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the

More information

Architecting the Future of Big Data

Architecting the Future of Big Data Hive ODBC Driver User Guide Revised: July 22, 2014 2012-2014 Hortonworks Inc. All Rights Reserved. Parts of this Program and Documentation include proprietary software and content that is copyrighted and

More information

AG MacOS Standalone Array Client Administration Guide

AG MacOS Standalone Array Client Administration Guide AG MacOS Standalone Array Client Administration Guide Copyright Statement Copyright Statement Copyright 2015 Array Networks, Inc., 1371 McCarthy Blvd, Milpitas, California 95035, USA. All rights reserved.

More information

InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x

InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x Active Innovations, Inc. Copyright 1998 2015 www.inforouter.com Installing the LDAP Authentication Web Service

More information

GDC Data Transfer Tool User s Guide. NCI Genomic Data Commons (GDC)

GDC Data Transfer Tool User s Guide. NCI Genomic Data Commons (GDC) GDC Data Transfer Tool User s Guide NCI Genomic Data Commons (GDC) Contents 1 Getting Started 3 Getting Started.......................................................... 3 The GDC Data Transfer Tool: An

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group ofir@sys-security.com http://www.sys-security.com September 2002

More information

HP Data Protector Integration with Autonomy IDOL Server

HP Data Protector Integration with Autonomy IDOL Server HP Data Protector Integration with Autonomy IDOL Server Introducing e-discovery for HP Data Protector environments Technical white paper Table of contents Summary... 2 Introduction... 2 Integration concepts...

More information

SendMIME Pro Installation & Users Guide

SendMIME Pro Installation & Users Guide www.sendmime.com SendMIME Pro Installation & Users Guide Copyright 2002 SendMIME Software, All Rights Reserved. 6 Greer Street, Stittsville, Ontario Canada K2S 1H8 Phone: 613-831-4023 System Requirements

More information

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide

Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright

More information

Zenoss Resource Manager ZenUp Installation and Administration

Zenoss Resource Manager ZenUp Installation and Administration Zenoss Resource Manager ZenUp Installation and Administration Zenoss Resource Manager ZenUp Installation and Administration Copyright 2014 Zenoss, Inc. All rights reserved. Redistribution or duplication

More information

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names

Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names DataCove DT Active Directory Authentication In Active Directory (AD) authentication mode, the server uses NTLM v2 and LDAP protocols to authenticate users residing in Active Directory. The login procedure

More information

IBM SmartCloud Workload Automation - Software as a Service. Agent Installation and Uninstallation Messages

IBM SmartCloud Workload Automation - Software as a Service. Agent Installation and Uninstallation Messages IBM SmartCloud Workload Automation - Software as a Service Agent Installation and Uninstallation Messages IBM SmartCloud Workload Automation - Software as a Service Agent Installation and Uninstallation

More information

Best Practices Guide for NerveCenter System and Security Administrators. Windows and UNIX Version 5.x Version 6.x. July 2011 NCBPSA5200-05

Best Practices Guide for NerveCenter System and Security Administrators. Windows and UNIX Version 5.x Version 6.x. July 2011 NCBPSA5200-05 Best Practices Guide for NerveCenter System and Security Administrators Windows and UNIX Version 5.x Version 6.x July NCBPSA5200-05 Copyright Portions Copyright 1989- LogMatrix, Inc. / OpenService, Inc.

More information

How To Install Acronis Backup & Recovery 11.5 On A Linux Computer

How To Install Acronis Backup & Recovery 11.5 On A Linux Computer Acronis Backup & Recovery 11.5 Server for Linux Update 2 Installation Guide Copyright Statement Copyright Acronis International GmbH, 2002-2013. All rights reserved. Acronis and Acronis Secure Zone are

More information

LANDESK Service Desk. Desktop Manager

LANDESK Service Desk. Desktop Manager LANDESK Service Desk Desktop Manager LANDESK SERVICE DESK DESKTOP MANAGER GUIDE This document contains information, which is the confidential information and/or proprietary property of LANDESK Software,

More information

Centrify Single Sign-On

Centrify Single Sign-On Centrify Single Sign-On Configuring Integration with SAP December 2014 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject to

More information

Symantec Managed PKI. Integration Guide for ActiveSync

Symantec Managed PKI. Integration Guide for ActiveSync Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement and may be used

More information

Active Directory Rights Management Service Integration Guide

Active Directory Rights Management Service Integration Guide Active Directory Rights Management Service Integration Guide Preface Preface 2013 SafeNet, Inc. All rights reserved. Part Number: 007-011230-001 (Rev F, 07/2013) All intellectual property is protected

More information

Websense Support Webinar: Questions and Answers

Websense Support Webinar: Questions and Answers Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user

More information

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Apache HTTP Server

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Apache HTTP Server SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory

User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property

More information

Installation Guide Supplement

Installation Guide Supplement Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,

More information

Contents CHAPTER 1 IMail Utilities

Contents CHAPTER 1 IMail Utilities Contents CHAPTER 1 IMail Utilities CHAPTER 2 Collaboration Duplicate Entry Remover... 2 CHAPTER 3 Disk Space Usage Reporter... 3 CHAPTER 4 Forward Finder... 4 CHAPTER 5 IMAP Copy Utility... 5 About IMAP

More information

Use QNAP NAS for Backup

Use QNAP NAS for Backup Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information

More information

Release Notes P/N 300-012-130 Rev A01

Release Notes P/N 300-012-130 Rev A01 EMC HomeBase Version 6.5 Release Notes P/N 300-012-130 Rev A01 March 17, 2011 These release notes contain supplemental information about EMC HomeBase Server and Agent Release 6.5. Topics include: Revision

More information

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1

User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1 The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)

More information

TIBCO Spotfire Server Migration. Migration Manual

TIBCO Spotfire Server Migration. Migration Manual TIBCO Spotfire Server Migration Migration Manual Revision date: 26 October 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE

More information

EMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager

EMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager EMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager Version 2.3 Installation and Configuration Guide 302-002-080 01 Copyright 2013-2015 EMC Corporation. All rights reserved.

More information

Scheduling in SAS 9.4 Second Edition

Scheduling in SAS 9.4 Second Edition Scheduling in SAS 9.4 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. Scheduling in SAS 9.4, Second Edition. Cary, NC: SAS Institute

More information

EMC Data Domain Operating System 4.6 5.1 Retention Lock Software User s Guide

EMC Data Domain Operating System 4.6 5.1 Retention Lock Software User s Guide EMC Data Domain Operating System 4.6 5.1 Retention Lock Software User s Guide Backup Recovery Systems Division Data Domain LLC 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800

More information

Acronis Backup & Recovery 10 Server for Linux. Installation Guide

Acronis Backup & Recovery 10 Server for Linux. Installation Guide Acronis Backup & Recovery 10 Server for Linux Installation Guide Table of contents 1 Before installation...3 1.1 Acronis Backup & Recovery 10 components... 3 1.1.1 Agent for Linux... 3 1.1.2 Management

More information

www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013

www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Installation and Configuration Guide

Installation and Configuration Guide www.novell.com/documentation Installation and Configuration Guide GroupWise Coexistence Solution for Exchange November 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect

More information

Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory

Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory HOWTO, 2 nd edition Introduction... 2 Integration using the Lights-Out Migration Utility... 2 Integration using the ilo web interface...

More information

Flight Workflow User's Guide. Release 12.0.0

Flight Workflow User's Guide. Release 12.0.0 Flight Workflow User's Guide Release 12.0.0 Copyright 2015 Signiant Inc. All rights reserved. Contents CHAPTER 1 Flight Introduction 4 FlightUploadReference 4 FlightDownloadReference 4 Cloud Storage Configuration

More information

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013

Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013 Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright

More information

Managing Linux Computers Using System Center 2012 R2 Configuration Manager

Managing Linux Computers Using System Center 2012 R2 Configuration Manager prajwaldesai.com http://prajwaldesai.com/managing-linux-computers-using-system-center-2012-r2-configuration-manager/ Managing Linux Computers Using System Center 2012 R2 Configuration Manager In this post

More information

Setup Guide Access Manager 3.2 SP3

Setup Guide Access Manager 3.2 SP3 Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE

More information

DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1

DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1 DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or

More information

ez Agent Administrator s Guide

ez Agent Administrator s Guide ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,

More information