This document contains information about the ElectricAccelerator integration with Kerberos. Topics include: Overview 2.
|
|
- Suzan Chapman
- 8 years ago
- Views:
Transcription
1 Electric Cloud ElectricAccelerator version 6.2 Technical Notes Kerberos Integration December 2012 This document contains information about the ElectricAccelerator integration with Kerberos. Topics include: Overview 2 Prerequisites 2 Using the emake Client 2 Using the Agent 3 Addressing Error and Warning Messages 4 Troubleshooting and Getting Help 7 1
2 Overview Overview You can configure ElectricAccelerator to use the Kerberos security protocol to authenticate initial connections from emake client programs to agent services. To assist with auditing, you can also configure agents to log these authentication events and the build steps that were run. In authenticated mode, UNIX/Linux build steps run as the authenticated user only. For example, if an emake client authenticates with Kerberos principal then build steps run as user even if the emake client runs as a different user on its machine. In order for emake to authenticate itself under UNIX/Linux, you must first run kinit. Agents require keytab access to the relevant Kerberos host principal. Windows authentication is based on domain users. The emake client must be run by a domain user, and you must configure agents to run as domain users. Windows agents do not impersonate emake client users but will log authentication events and build steps if desired. In order to highlight security gaps caused by misconfiguration, you must either enable authentication throughout the cluster, or prohibit it throughout the cluster. Agents and the emake client will refuse to fall back to unauthenticated mode, because doing so hides gaps in security. Instead, mismatches between emake client and agent security configurations will fail builds until corrected. When you configure an agent to require authentication, you authorize a specific Kerberos domain to use that agent. Principals in other Kerberos domains remain unauthorized. Note: Kerberos integration supports x86 and SPARC Solaris 10 (Update 9 is required). Prerequisites Kerberos implementation of GSSAPI For Linux systems, you must install a Kerberos implementation of GSSAPI on the agent and emake client machines. The package names may start with krb5-libs on Red Hat systems, or krb5-user on Ubuntu systems. For 64-bit emake systems, Electric Cloud recommends installing both 32-bit and 64-bit variants, so that both 32- bit and 64-bit emake can use the library. On Linux, ElectricAccelerator supports the MIT Kerberos 5 implementation of GSSAPI. Other implementations of GSSAPI are not supported/tested by Electric Cloud. Using the emake Client Logging in On Windows systems, you must log in with a domain account. For UNIX/Linux systems, you must run kinit to log in to your Kerberos domain. Enabling authentication Authentication is both enabled and required by this command line option: --emake-agent-security=auth Alternatively, you can add that command line option to $EMAKEFLAGS or set EMAKE_AGENT_SECURITY=auth in your environment. For security debug logging, use --emake-debug=y 2
3 Using the Agent Using the Agent erunner service Do not install the erunner service; it is not secure. Without the erunner service, single point cluster upgrades are not supported. Agent users On Windows systems, agent users must be domain accounts named ECloudInternalUser1, ECloudInternalUser2,... You must explicitly override the default choice, which is to use local accounts with those names. Enabling authentication and security tracing Enable authentication and security tracing by running: On UNIX/Linux: On Windows: ecconfig -emakesecurity "auth DOMAIN.COM" -trace security ecconfig -args "-emakesecurity \"auth DOMAIN.COM\" -trace security" Replace DOMAIN.COM with the uppercase Kerberos domain that is authorized to use the agent. For verbose security details, replace -trace security with -trace securitydetails. Restart the agents after making this change. Note: As a side effect of enabling authentication, the agent console port will be disabled. Rerun ecconfig after upgrading After upgrading ElectricAccelerator, you must rerun the ecconfig command to re-enable Kerberos authentication and security tracing. Restart agents after running ecconfig. Kerberos host principals that include fully qualified domain names On UNIX/Linux, if the Kerberos host principal for an agent host includes the host s fully qualified domain name (instead of its host name only), then add the corresponding text (depending on your ElectricAccelerator version) to <installdir>/<arch>/bin/runagent.local on that agent host: For ElectricAccelerator 6.0.x or 5.5, add set ::args(-myhost) [info hostname]-[expr {$args(-efsid) + 1}] For ElectricAccelerator 6.1 or later, add set args(-myhost) [hostname -fqdn] If the runagent.local file does not yet exist, then create it. Whether or not the file previously existed, restart the agents after making this change. MIT Kerberos 5 keytab location On Linux systems, if you want the agents to use an MIT Kerberos 5 keytab that is not in the default location, then use ecconfig to instruct the agent where to find it; for example: ecconfig -keytab /etc/ecagent.keytab Restart the agents after making this change. 3
4 Addressing Error and Warning Messages Customizing the agent and/or host names the agent reports to the Cluster Manager You want to change the agent name, host name, or both names that the agent reports to the Cluster Manager. Changing the host name By default, the host name reported to the Cluster Manager is the name of the host on which the agent runs, without any domain name qualification. Adding: set args(-myhost) somehostname to runagent.local overrides the default name, where "somehostname" is a host name of your choice, and may be qualified if desired. If you need to send the fully qualified form of the hostname: set args(-myhost) [hostname -fqdn] Changing the agent name By default, the agent name reported to the Cluster Manager is the same as the host name that is reported to the Cluster Manager (as specified by -myhost, above, or defaulted), but followed by a minus sign and the agent number. The agent name uniquely identifies the agent process, as opposed to the agent host machine. Generally, you would need to change the agent name only if the default is not suitable, which may be the case if -myhost was set to an unusual value. Adding: set args(-myname) somehostname-$::gagentnumber to runagent.local overrides the default, where "somehostname" is a host name of your choice. Electric Cloud recommends ending the agent name with a minus sign followed by the agent number. The code in runagent.local can access the agent number through the Tcl global variable named ::gagentnumber. Addressing Error and Warning Messages This section details error and warning messages associated with Kerberos usage in ElectricAccelerator. EC1171: [agent]: [agentprincipal]: Security Error:... Emake failed in its preparations to authenticate itself to the agent, or the agent failed mutual authentication. (This error is detected on the emake side.) There are any number of reasons that this sort of failure might occur. The most common example is that, under UNIX/Linux, the user may have neglected to run Kerberos kinit. Check the error text for clues as to which stage of authentication failed. On UNIX/Linux, the portion of the message after the GSSAPI Minor Status code but before the text \naborting build. was generated by the GSSAPI library. Similarly, on Windows, the portion of the message after the SSPI Error code but before the \naborting build. was generated by the Windows SSPI library. EC1172: Unknown security mode for agent communications: "[option]" The argument to --emake-agent-security= is invalid. Check the text of the error message for a list of available modes, and choose one. 4
5 Addressing Error and Warning Messages EC1173:... Emake failed to initialize needed security facilities. Check the text of the error message to determine what failed. Check for the following messages in particular: Failed to load GSSAPI message In this case, there was a problem loading the UNIX/Linux GSSAPI shared object library provided by Kerberos. On Linux systems, first verify that Kerberos is installed. See "Prerequisites" on page 2 for suggested package name prefixes. On 64-bit systems, verify that 64-bit and 32-bit GSSAPI shared object libraries are installed. On UNIX/Linux, if Kerberos has been installed, then add the directory containing its GSSAPI shared object library to the LD_LIBRARY_PATH environment variable. Alternatively, if you do not wish to modify LD_LIBRARY_PATH, or such modification does not solve the problem, then instead set the ECLOUD_GSSAPI_LIBRARY environment variable to the filename of the Kerberos GSSAPI shared object library that is to be used. Use only the filename; if that does not work, use an absolute path. (See man dlopen for more details concerning library search.) You can even set ECLOUD_GSSAPI_LIBRARY to a space-separated list of candidate shared object library names. Emake ignores ECLOUD_GSSAPI_LIBRARY on Windows. WARNING: Unable to start session: Failed to load GSSAPI:... On UNIX/Linux systems, if you see this message in an agent log, then you may need to instruct ecagent where to find a Kerberos implementation of GSSAPI. The underlying issue is the same as for the emake client EC1173: Failed to load GSSAPI message. The response, however, is slightly different in the agent context. Linux Kerberos installation is the same as for "EC1173:..." on page 5 above. If Kerberos is installed and the agent still cannot find GSSAPI, then specify the filename of the GSSAPI shared object library with: ecconfig -gssapi "libgssapi-a.so /some/directory/libgssapi-b.so" The argument to -gssapi has the same form and meaning as does the value of ECLOUD_GSSAPI_LIBRARY; see "EC1173:..." on page 5 above. Restart the agents after making this change. EC2128: agent reports: [Security Error: authentication rejected]; aborting build The agent has rejected an attempt by the emake client to authenticate itself. Various causes are possible. Check the agent logs for details for security reasons, the agent intentionally withholds those details from the emake client. Security Error: gss_accept_sec_context: GSSAPI Minor Status 0x2: No such file or directory In particular, if on Linux you see this error message in the agent log, then you may need to install a keytab or instruct the agent where to find it; see "MIT Kerberos 5 keytab location" on page 3 for details. On UNIX/Linux, if the agent log message mentions a GSSAPI Minor Status code, then the rest of the message was generated by the GSSAPI library. Similarly, on Windows, if the agent log message mentions an SSPI Error code, then the rest of the message was generated by the Windows SSPI library. EC2129: agent reports: [Security Error: authentication required]; aborting build The agent requires authentication for this emake client connection. Enable authentication on the emake client. 5
6 Addressing Error and Warning Messages EC2130: agent reports: [Security Error: authentication not offered]; aborting build An agent does not offer authentication for emake client connections. Enable authentication on all agents. EC2132: (from [agent]) Security Warning: unavailable user XXX; instead setting user AAA and groups BBB,CCC The UNIX/Linux user ID available to the emake client is not allowed for the authenticated user on an agent machine involved in the build. First, check that the principal used in authentication (typically the argument to kinit) matches the UNIX/Linux user account that is running emake. If it does not match, then rerun kinit (or similar) with a principal that does match the UNIX/Linux user account (or switch to a different UNIX/Linux user account and rerun kinit). If the principal and user match, then log in as that user on both the emake client machine and the agent machine, run id in both accounts, and compare the results to see if they match. If they do not match, then change the user ID on one of the machines to match the other and reconcile the groups as well in order to avoid EC2133 and EC2134. Be sure that all agent machines match each other, too, or you will get the same error with a different agent machine. You can also check to see if there is some type of setuid/sudo wrapper around emake. EC2133 Security Warning: unavailable primary group YYY; instead setting user AAA and groups BBB,CCC This is similar to EC2132, except that in this case the user ID matches, but the primary group ID requested by emake is not available to that user on an agent machine. Either grant membership in the group on all agent machines, or change to a different primary group on the emake client. In the latter case, if you keep the original primary group in the supplementary group list, then you may encounter EC2134. EC2134 Security Warning: unavailable supplementary groups YYY,ZZZ; instead setting user AAA and groups BBB,CCC This is similar to EC2132, except that in this case the user ID matches, and the primary group ID requested by emake is available to that user, but one or more supplementary group IDs requested by emake is not available to that user on an agent machine. See also EC2133, which is for an unavailable primary group ID. Either grant membership in the group on all agent machines, or deny membership on the emake client. "Unknown code krb5..." appearing in security error messages This type of message appears to result from a bug in the 64-bit MIT Kerberos 5 implementation of GSSAPI, not from any flaw in Electric Cloud products. (The bug appears to be that an unsigned 32-bit GSSAPI minor status is zero-padded to create a 64-bit MIT Kerberos 5 error code, instead of being sign-extended as MIT Kerberos 5 expects, and therefore certain codes are not found in the error string table, thus leading to generic error strings.) To work around this bug, either run in 32-bit mode or look up the MIT Kerberos 5 error numbers on the web. In the latter case, you may find it easiest to use the full code just after GSSAPI Minor Status. Also refer to the following Red Hat bug report about this issue: 6
7 Troubleshooting and Getting Help Troubleshooting and Getting Help Contacting Technical Support: Before you contact our technical support staff, please have the following information available. Your name, title, company name, phone number, fax number, and address Operating system and version number Product name and release version Problem description Hours: 8AM - 5PM PST (Monday-Friday, except Holidays) Phone: , Option #2 support@electric-cloud.com Copyright Electric Cloud, Inc. All rights reserved. Electric Cloud believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED AS IS. ELECTRIC CLOUD, INC. MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Use, copying, and distribution of any Electric Cloud software described in this publication requires an applicable software license. Trademarks Electric Cloud, ElectricAccelerator, ElectricCommander, ElectricInsight, and Electric Make are registered trademarks or trademarks of Electric Cloud, Incorporated. Electric Cloud products ElectricAccelerator, ElectricCommander, ElectricInsight, and Electric Make are commonly referred to by their short names Accelerator, Commander, Insight, and emake throughout various types of Electric Cloud product-specific documentation. All other trademarks used herein are the property of their respective owners. 7
ElectricCommander. Technical Notes MS Visual Studio Add-in Integration version 1.5.0. version 3.5 or higher. October 2010
ElectricCommander version 3.5 or higher Technical Notes MS Visual Studio Add-in Integration version 1.5.0 October 2010 This document contains information about the ElectricCommander integration with the
More informationTable 1 shows the LDAP server configuration required for configuring the federated repositories in the Tivoli Integrated Portal server.
Configuring IBM Tivoli Integrated Portal server for single sign-on using Simple and Protected GSSAPI Negotiation Mechanism, and Microsoft Active Directory services Document version 1.0 Copyright International
More informationRSA Security Analytics Netflow Collection Configuration Guide
RSA Security Analytics Netflow Collection Configuration Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks
More informationRSA Security Analytics Netflow Collection Configuration Guide
RSA Security Analytics Netflow Collection Configuration Guide Copyright 2010-2015 RSA, the Security Division of EMC. All rights reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks
More informationSubversion Server for Windows
Subversion Server for Windows VisualSVN Team VisualSVN Server: Subversion Server for Windows VisualSVN Team Copyright 2005-2008 VisualSVN Team Windows is a registered trademark of Microsoft Corporation.
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationNovell Access Manager
J2EE Agent Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 J2EE Agent Guide Legal Notices Novell, Inc., makes no representations
More informationThis presentation will discuss how to troubleshoot different types of project creation issues with Information Server DataStage version 8.
This presentation will discuss how to troubleshoot different types of project creation issues with Information Server DataStage version 8. Page 1 of 29 The objectives of this module are to list the causes
More information2 Downloading Access Manager 3.1 SP4 IR1
Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1
More informationSOA Software: Troubleshooting Guide for Agents
SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,
More informationPATROL Console Server and RTserver Getting Started
PATROL Console Server and RTserver Getting Started Supporting PATROL Console Server 7.5.00 RTserver 6.6.00 February 14, 2005 Contacting BMC Software You can access the BMC Software website at http://www.bmc.com.
More informationDell Compellent Storage Center
Dell Compellent Storage Center Active Directory Integration Best Practices Guide Dell Compellent Technical Solutions Group January, 2013 THIS BEST PRACTICES GUIDE IS FOR INFORMATIONAL PURPOSES ONLY, AND
More informationTROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS
White Paper TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS Abstract This white paper explains how to diagnose and troubleshoot issues in the RSA Access Manager single sign-on
More informationGuide to SASL, GSSAPI & Kerberos v.6.0
SYMLABS VIRTUAL DIRECTORY SERVER Guide to SASL, GSSAPI & Kerberos v.6.0 Copyright 2011 www.symlabs.com Chapter 1 Introduction Symlabs has added support for the GSSAPI 1 authentication mechanism, which
More informationUse Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
More informationEMC Celerra Network Server
EMC Celerra Network Server Release 5.6.47 Using Windows Administrative Tools with Celerra P/N 300-004-139 REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com
More informationJive Connects for Microsoft SharePoint: Troubleshooting Tips
Jive Connects for Microsoft SharePoint: Troubleshooting Tips Contents Troubleshooting Tips... 3 Generic Troubleshooting... 3 SharePoint logs...3 IIS Logs...3 Advanced Network Monitoring... 4 List Widget
More informationCommand Line Interface User Guide for Intel Server Management Software
Command Line Interface User Guide for Intel Server Management Software Legal Information Information in this document is provided in connection with Intel products. No license, express or implied, by estoppel
More informationArchitecting the Future of Big Data
Hive ODBC Driver User Guide Revised: July 22, 2013 2012-2013 Hortonworks Inc. All Rights Reserved. Parts of this Program and Documentation include proprietary software and content that is copyrighted and
More information2 Installing Privileged User Manager 2.3
NetIQ Privileged User Manager 2.3.2 Release Notes January, 2013 1 Documentation The following sources provide information about Privileged User Manager: Privileged User Manager 2.3 Documentation Site (http://www.novell.com/documentation/
More informationUser Source and Authentication Reference
User Source and Authentication Reference ZENworks 11 www.novell.com/documentation Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
More informationScheduling in SAS 9.3
Scheduling in SAS 9.3 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2011. Scheduling in SAS 9.3. Cary, NC: SAS Institute Inc. Scheduling in SAS 9.3
More informationWhat s New in Centrify Server Suite 2015
C E N T R I F Y S E R V E R S U I T E 2 0 1 5 W H A T S N E W What s New in Centrify Server Suite 2015 Centrify Server Suite Standard Edition Hadoop support Big Data adoption by industry is around 25%
More informationFramework 8.1. External Authentication. Reference Manual
Framework 8.1 External Authentication Reference Manual The information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent of Genesys
More informationIntegration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess
SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,
More informationSOA Software: Troubleshooting Guide for WebSphere Application Server Agent
SOA Software: Troubleshooting Guide for WebSphere Application Server Agent SOA Software: Troubleshooting Guide for WebSphere Application Server Agent 1 SOA Software Troubleshooting Guide for WebSphere
More informationAltiris Monitor Pack for Servers 7.1 SP2 from Symantec Release Notes
Altiris Monitor Pack for Servers 7.1 SP2 from Symantec Release Notes Altiris Monitor Pack for Servers 7.1 SP2 from Symantec Release Notes The software described in this book is furnished under a license
More informationInformatica Corporation Proactive Monitoring for PowerCenter Operations Version 3.0 Release Notes May 2014
Contents Informatica Corporation Proactive Monitoring for PowerCenter Operations Version 3.0 Release Notes May 2014 Copyright (c) 2012-2014 Informatica Corporation. All rights reserved. Installation...
More informationEnabling Active Directory Authentication with ESX Server 1
1 Enabling Active Directory Authentication with ESX Server 1 This document provides information about how to configure ESX Server to use Active Directory for authentication. ESX Server system includes
More informationwww.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Policy Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
More informationSETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM
SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM Abstract This paper explains how to setup Active directory service on windows server 2008.This guide also explains about how to install
More informationRelease Notes P/N e4-1896-01
EMC Legato NetWorker Module for Lotus Release 3.0 Release Notes P/N e4-1896-01 January 26, 2006 These release notes contain supplemental information about EMC Legato NetWorker Module for Lotus (NML) release
More informationCA Spectrum and CA Embedded Entitlements Manager
CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically
More informationSAP HANA Client Installation and Update Guide
PUBLIC SAP HANA Platform SPS 12 Document Version: 1.0 2016-05-11 Content 1 Introduction....3 1.1 Supported Platforms.... 3 1.2 Software Download.... 4 2 SAP HANA Client on UNIX or Linux....7 2.1 Planning
More informationEMC Clinical Archiving
EMC Clinical Archiving Version 1.7 Installation Guide EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Legal Notice Copyright 2014-2015 EMC Corporation. All Rights
More informationBorderware Firewall Server Version 7.1. VPN Authentication Configuration Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved
Borderware Firewall Server Version 7.1 VPN Authentication Configuration Guide Copyright 2005 CRYPTOCard Corporation All Rights Reserved http://www.cryptocard.com Overview The BorderWare Firewall Server
More informationVeritas Operations Manager Release Notes. 3.0 Rolling Patch 1
Veritas Operations Manager Release Notes 3.0 Rolling Patch 1 Veritas Operations Manager Release Notes The software described in this book is furnished under a license agreement and may be used only in
More informationWhite Paper. Fabasoft Folio Environment Variables. Fabasoft Folio 2015 Update Rollup 2
White Paper Fabasoft Folio Environment Variables Fabasoft Folio 2015 Update Rollup 2 Copyright Fabasoft R&D GmbH, Linz, Austria, 2015. All rights reserved. All hardware and software names used are registered
More informationMigrating to vcloud Automation Center 6.1
Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
More informationUsing EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
More informationDameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
More informationSetting up Single Sign-On (SSO) with SAP HANA and SAP BusinessObjects XI 4.0
Setting up Single Sign-On (SSO) with SAP HANA and SAP BusinessObjects XI 4.0 February 8, 2013 Version 1.0 Vishal Dhir Customer Solution Adoption (CSA) www.sap.com TABLE OF CONTENTS INTRODUCTION... 3 What
More informationRed Hat Directory Server 8.0 Release Notes
Red Hat Directory Server 8.0 Release Notes Red Hat Documentation Team Copyright 2008 Red Hat, Inc. Copyright You need to override this in your local ent file Red Hat. This material may only be distributed
More informationHealthstone Monitoring System
Healthstone Monitoring System Patrick Lambert v1.1.0 Healthstone Monitoring System 1 Contents 1 Introduction 2 2 Windows client 2 2.1 Installation.............................................. 2 2.2 Troubleshooting...........................................
More informationCloudera ODBC Driver for Apache Hive Version 2.5.16
Cloudera ODBC Driver for Apache Hive Version 2.5.16 Important Notice 2010-2015 Cloudera, Inc. All rights reserved. Cloudera, the Cloudera logo, Cloudera Impala, Impala, and any other product or service
More informationWebSphere Application Server security auditing
Copyright IBM Corporation 2008 All rights reserved IBM WebSphere Application Server V7 LAB EXERCISE WebSphere Application Server security auditing What this exercise is about... 1 Lab requirements... 1
More informationRemote Control 5.1.2. Tivoli Endpoint Manager - TRC User's Guide
Tivoli Remote Control 5.1.2 Tivoli Endpoint Manager - TRC User's Guide Tivoli Remote Control 5.1.2 Tivoli Endpoint Manager - TRC User's Guide Note Before using this information and the product it supports,
More informationKerberos: Single Sign On for BS2000
Kerberos: Single Sign On for BS2000 Issue April 2011 Pages 6 Overview A Single Sign On system (SSO system) is a system which permits an automatic and convenient, i.e. nonrecurring, logon to various resources
More informationRebasoft Auditor Quick Start Guide
Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered
More informationInfor Cloud Printing Service Administration Guide
Infor Cloud Printing Service Administration Guide Copyright 2015 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and contains confidential
More informationIBM WebSphere Partner Gateway V6.2.1 Advanced and Enterprise Editions
IBM WebSphere Partner Gateway V6.2.1 Advanced and Enterprise Editions Integrated SFTP server 2011 IBM Corporation The presentation gives an overview of integrated SFTP server feature IntegratedSFTPServer.ppt
More informationSlide Index. Technical Support Training
MessageStats 7.1 Slide Index Learning Objectives- Slide 3 Product Overview- Slides 4-5 Common Issues- Slides 6-7 Troubleshooting Checklist- Slides 9-23 Common Error Messages- Slide 24 29 MessageStats Report
More informationAvira AntiVir MailGate 3.2 Release Notes
Release Notes 1. Features 1.1 Assigning recipient addresses to groups either by using Active Directory or a plain text file 1.1.1 Using a Active Directory server MailGate communicates with Active Directory
More informationRWL Tech Note Wireless 802.1x Authentication with Windows NPS
Wireless 802.1x Authentication with Windows NPS Prepared by Richard Litchfield HP Networking Solution Architect Hewlett-Packard Australia Limited 410 Concord Road Rhodes NSW 2138 AUSTRALIA Date Prepared:
More informationInstallation and Configuration Guide Simba Technologies Inc.
Simba Microsoft SQL Server ODBC Installation and Configuration Guide Simba Technologies Inc. September 10, 2015 Copyright 2015 Simba Technologies Inc. All Rights Reserved. Information in this document
More informationConfiguring Apache HTTP Server With Pramati
Configuring Apache HTTP Server With Pramati 45 A general practice often seen in development environments is to have a web server to cater to the static pages and use the application server to deal with
More informationIntegrated Citrix Servers
Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights
More informationManaging the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N 300-011-843 REV A01 January 14, 2011
Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N 300-011-843 REV A01 January 14, 2011 This document contains information on these topics: Introduction... 2 Terminology...
More informationIBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
More informationArchitecting the Future of Big Data
Hive ODBC Driver User Guide Revised: July 22, 2014 2012-2014 Hortonworks Inc. All Rights Reserved. Parts of this Program and Documentation include proprietary software and content that is copyrighted and
More informationAG MacOS Standalone Array Client Administration Guide
AG MacOS Standalone Array Client Administration Guide Copyright Statement Copyright Statement Copyright 2015 Array Networks, Inc., 1371 McCarthy Blvd, Milpitas, California 95035, USA. All rights reserved.
More informationInfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x
InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x Active Innovations, Inc. Copyright 1998 2015 www.inforouter.com Installing the LDAP Authentication Web Service
More informationGDC Data Transfer Tool User s Guide. NCI Genomic Data Commons (GDC)
GDC Data Transfer Tool User s Guide NCI Genomic Data Commons (GDC) Contents 1 Getting Started 3 Getting Started.......................................................... 3 The GDC Data Transfer Tool: An
More informationThe Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group ofir@sys-security.com http://www.sys-security.com September 2002
More informationHP Data Protector Integration with Autonomy IDOL Server
HP Data Protector Integration with Autonomy IDOL Server Introducing e-discovery for HP Data Protector environments Technical white paper Table of contents Summary... 2 Introduction... 2 Integration concepts...
More informationSendMIME Pro Installation & Users Guide
www.sendmime.com SendMIME Pro Installation & Users Guide Copyright 2002 SendMIME Software, All Rights Reserved. 6 Greer Street, Stittsville, Ontario Canada K2S 1H8 Phone: 613-831-4023 System Requirements
More informationVeritas Cluster Server Database Agent for Microsoft SQL Configuration Guide
Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Windows 2000, Windows Server 2003 5.0 11293743 Veritas Cluster Server Database Agent for Microsoft SQL Configuration Guide Copyright
More informationZenoss Resource Manager ZenUp Installation and Administration
Zenoss Resource Manager ZenUp Installation and Administration Zenoss Resource Manager ZenUp Installation and Administration Copyright 2014 Zenoss, Inc. All rights reserved. Redistribution or duplication
More informationField Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names
DataCove DT Active Directory Authentication In Active Directory (AD) authentication mode, the server uses NTLM v2 and LDAP protocols to authenticate users residing in Active Directory. The login procedure
More informationIBM SmartCloud Workload Automation - Software as a Service. Agent Installation and Uninstallation Messages
IBM SmartCloud Workload Automation - Software as a Service Agent Installation and Uninstallation Messages IBM SmartCloud Workload Automation - Software as a Service Agent Installation and Uninstallation
More informationBest Practices Guide for NerveCenter System and Security Administrators. Windows and UNIX Version 5.x Version 6.x. July 2011 NCBPSA5200-05
Best Practices Guide for NerveCenter System and Security Administrators Windows and UNIX Version 5.x Version 6.x July NCBPSA5200-05 Copyright Portions Copyright 1989- LogMatrix, Inc. / OpenService, Inc.
More informationHow To Install Acronis Backup & Recovery 11.5 On A Linux Computer
Acronis Backup & Recovery 11.5 Server for Linux Update 2 Installation Guide Copyright Statement Copyright Acronis International GmbH, 2002-2013. All rights reserved. Acronis and Acronis Secure Zone are
More informationLANDESK Service Desk. Desktop Manager
LANDESK Service Desk Desktop Manager LANDESK SERVICE DESK DESKTOP MANAGER GUIDE This document contains information, which is the confidential information and/or proprietary property of LANDESK Software,
More informationCentrify Single Sign-On
Centrify Single Sign-On Configuring Integration with SAP December 2014 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject to
More informationSymantec Managed PKI. Integration Guide for ActiveSync
Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement and may be used
More informationActive Directory Rights Management Service Integration Guide
Active Directory Rights Management Service Integration Guide Preface Preface 2013 SafeNet, Inc. All rights reserved. Part Number: 007-011230-001 (Rev F, 07/2013) All intellectual property is protected
More informationWebsense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
More informationIntegration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Apache HTTP Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationUser Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory
Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property
More informationInstallation Guide Supplement
Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,
More informationContents CHAPTER 1 IMail Utilities
Contents CHAPTER 1 IMail Utilities CHAPTER 2 Collaboration Duplicate Entry Remover... 2 CHAPTER 3 Disk Space Usage Reporter... 3 CHAPTER 4 Forward Finder... 4 CHAPTER 5 IMAP Copy Utility... 5 About IMAP
More informationUse QNAP NAS for Backup
Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information
More informationRelease Notes P/N 300-012-130 Rev A01
EMC HomeBase Version 6.5 Release Notes P/N 300-012-130 Rev A01 March 17, 2011 These release notes contain supplemental information about EMC HomeBase Server and Agent Release 6.5. Topics include: Revision
More informationUser Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1
The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)
More informationTIBCO Spotfire Server Migration. Migration Manual
TIBCO Spotfire Server Migration Migration Manual Revision date: 26 October 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE
More informationEMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager
EMC ViPR Controller Add-in for Microsoft System Center Virtual Machine Manager Version 2.3 Installation and Configuration Guide 302-002-080 01 Copyright 2013-2015 EMC Corporation. All rights reserved.
More informationScheduling in SAS 9.4 Second Edition
Scheduling in SAS 9.4 Second Edition SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2015. Scheduling in SAS 9.4, Second Edition. Cary, NC: SAS Institute
More informationEMC Data Domain Operating System 4.6 5.1 Retention Lock Software User s Guide
EMC Data Domain Operating System 4.6 5.1 Retention Lock Software User s Guide Backup Recovery Systems Division Data Domain LLC 2421 Mission College Boulevard, Santa Clara, CA 95054 866-WE-DDUPE; 408-980-4800
More informationAcronis Backup & Recovery 10 Server for Linux. Installation Guide
Acronis Backup & Recovery 10 Server for Linux Installation Guide Table of contents 1 Before installation...3 1.1 Acronis Backup & Recovery 10 components... 3 1.1.1 Agent for Linux... 3 1.1.2 Management
More informationwww.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013
www.novell.com/documentation SSL VPN Server Guide Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
More informationInstallation and Configuration Guide
www.novell.com/documentation Installation and Configuration Guide GroupWise Coexistence Solution for Exchange November 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect
More informationConfiguring HP Integrated Lights-Out 3 with Microsoft Active Directory
Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory HOWTO, 2 nd edition Introduction... 2 Integration using the Lights-Out Migration Utility... 2 Integration using the ilo web interface...
More informationFlight Workflow User's Guide. Release 12.0.0
Flight Workflow User's Guide Release 12.0.0 Copyright 2015 Signiant Inc. All rights reserved. Contents CHAPTER 1 Flight Introduction 4 FlightUploadReference 4 FlightDownloadReference 4 Cloud Storage Configuration
More informationSage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012. October 2013
Sage HRMS 2014 Sage Employee Self Service Tech Installation Guide for Windows 2003, 2008, and 2012 October 2013 This is a publication of Sage Software, Inc. Document version: October 17, 2013 Copyright
More informationManaging Linux Computers Using System Center 2012 R2 Configuration Manager
prajwaldesai.com http://prajwaldesai.com/managing-linux-computers-using-system-center-2012-r2-configuration-manager/ Managing Linux Computers Using System Center 2012 R2 Configuration Manager In this post
More informationSetup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
More informationDIGIPASS Authentication for Windows Logon Getting Started Guide 1.1
DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or
More informationez Agent Administrator s Guide
ez Agent Administrator s Guide Copyright This document is protected by the United States copyright laws, and is proprietary to Zscaler Inc. Copying, reproducing, integrating, translating, modifying, enhancing,
More information