A Directory Application Level Firewall - the Guardian DSA
|
|
|
- Loreen Garrison
- 10 years ago
- Views:
Transcription
1 A Directory Application Level Firewall - the Guardian DSA David W CHADWICK & Andrew J YOUNG University of Salford, IS Institute, University of Salford, Salford, M5 4WT, England Abstract The Internet White Pages Service has been slow to materialise for many reasons. One of them is the security concerns that organisations have, over allowing the public to gain access to either their Intranet or their directory database. The Guardian DSA is a firewall application proxy for X.500 and LDAP protocols that is designed to alleviate these fears. Sitting in the firewall system, it filters directory protocol messages passing into and out of the Intranet, allowing security administrators to carefully control the amount of directory information that is released to the outside world. This paper describes the design of our Guardian system, and shows how relatively easy it is to configure its filtering capabilities. Finally the paper describes the working demonstration of the Guardian that was built for the 1997 World Electronic Messaging Association directory challenge. This linked the WEMA directory to the NameFLOW-Paradise Internet directory, and demonstrated some of the powerful filtering capabilities of the Guardian. This paper was originally presented at The Internet Society 1998 Symposium on Network and Distributed Systems Security (NDSS 98), March 10-12, San Diego, California 1. Introduction Experience gained over the last seven years with the Internet White Pages Directory Service (IWPS), has shown that universities and other public institutions are primarily the only organizations that are prepared to publish their entire directories on the Internet. These are the only organizations that have joined the pilot/operational service in any significant numbers. For example, in the UK NameFLOW-Paradise service [1] there are 147 organizations listed, the vast majority of which are universities, research organizations and publicly funded institutions. Only 21 entries are of commercial organizations, and of these, the majority are computer hardware, software and telecommunications suppliers, or consultancy companies specialising in computer communications. Only 2 entries are of commercial organisations whose main businesses are unrelated to IT, e.g. electricity generation. Similarly (although to a lesser extent) in the US IWPS there are 258 organisations listed, 126 being universities, research laboratories or other publicly funded institutions, 82 being commercial organisations whose primary business is related to IT, with only 50 listings being for other types of commercial organisation. This contrasts quite dramatically with the large number of widely varying types of commercial organisation that have a presence on the Web. Given that commercial organizations outnumber universities by over a thousand to one, the former are conspicuous by their absence in the IWPS. Indeed, private discussions with a number of commercial organizations that do operate
2 X.500 or LDAP directories reveal that these organizations are willing to connect to the IWPS in order to retrieve directory information from it, but never to give directory information to it. Those commercial organizations that have joined the IWPS have usually only participated in a half hearted way, by adding no more than a token entry or two. It was this realization, coupled with the growing demand from commercial organizations to have a firewall system, running a number of application proxies, positioned between their corporate Intranet and the Internet, that lead to the development of the Guardian DSA. The Guardian is a firewall directory application proxy, that intercepts all directory protocol messages between the Internet and the organization s Intranet, and only allows through those messages that the local security policy has sanctioned. The Guardian DSA development project started in December 1995, with funding from the EC IV Framework RTD program. The Guardian was originally designed to intercept only X.500 [2] protocols i.e. DAP, DSP, DISP and DOP, but with the recent wide acceptance of the LDAPv2 protocol [3] in the market place, coupled with the rapidly expanding market for stand alone LDAP servers, support for inbound LDAPv2 protocol has also been added to the Guardian. Support for outbound LDAPv2 protocol will be added in The Functionality of the Guardian The Guardian provides two quite distinct services to the private Intranet 1. First and foremost, the Guardian is a directory application proxy designed to run in a security firewall system. It ensures the integrity and confidentiality of directory information on the Intranet, by only allowing properly authorized directory messages to flow into and out of the Intranet. Secondly, the Guardian is the Intranet s directory gateway to the outside world, acting as a connectivity enabler, particularly for standalone LDAP servers. It is in this second context that organizations running LDAP-only directories can gain real administrative benefit. LDAP clients and servers will no longer need to be continually re-configured to learn about other LDAP servers on the Internet - they only ever need to know about their own internal LDAP servers and the Guardian. All new configuration information is added to the Guardian, making it a central point for administration and knowledge management. The Guardian builds up its own world s eye view of the IWPS, and has its own internal skeleton DIT from which it hangs knowledge references to other LDAP and X.500 directory servers. If operating in a purely X.500 context, the knowledge configuration information is extremely simple (one of the Intranet s DSA s must hold a superior reference to the Guardian, and the Guardian must hold a superior reference to NameFlow Paradise). In a mixed LDAP and X.500 context, references to external LDAP servers are also added to the Guardian. The remainder of this paper will concentrate on the security functionality of the Guardian and will describe its powerful filtering capabilities. 1 Like any firewall, the Guardian can sit between any two networks, protected by different security policies. For the purposes of this paper, we only consider the case of the publicly accessible Internet (representing a low security network) and a corporate Intranet (representing a high security network).
3 3. Filtering Rules It is important to realize that the Guardian itself does not hold any directory entry information, but rather holds a set of rules that dictate which directory information (in the form of directory requests and responses) can flow between the Internet and the Intranet. In this respect, it is quite independent of any access control information that may be applied internally to the database holding the directory information. Indeed, it would be possible to operate the local directory service with little or no local access control information, thereby giving employees free access to most of the corporate directory, and to place all the controls in the Guardian, thereby restricting access to everyone else (i.e. the hard shell and soft inner model of security). The rules that drive the Guardian are derived from the overall security policy of the organization. The filtering rules that are configured into the Guardian operate at a number of levels, and are separately configurable for each direction of information flow. One configuration file (ToSecurityDomain.ini) contains the rules for filtering requests originating from the Internet, and the other configuration file (FromSecurityDomain.ini) contains the rules for filtering requests originating from the Intranet. At the highest level, the security administrator configures which protocols e.g. LDAPv2 and DAP, are allowed to pass through the Guardian. At the next level, the security administrator configures which users are allowed to bind with these protocols, and below this, which operations e.g. Search and List, are allowed to pass through the Guardian. So for example, the integrity of Intranet directory information can be protected by forbidding modification operations that originate from the Internet. At the next level, the administrator configures which entries are accessible to which operations, and by which alias names they should be known in the other domain. Below this, the administrator lists which attribute types may be included in particular entries, and at the lowest level, the administrator configures which attribute values are allowed to pass through the Guardian. Thus confidentiality of information is assured by preventing sensitive attributes, entries and even the names of entries from leaking out to the Internet. All filtering rules have a default of DENY everything, so that the administrator has to progressively release the locks in order to let directory information leave the Intranet. Because an application proxy has no inherent way of knowing whether a request has originated from the Internet or the Intranet, the Guardian is configured with the names and addresses of trusted directory servers on both sides of the firewall. Every other directory server is assumed to be un-trusted and residing on the Internet. Note that trusted directory servers on the Internet are still not allowed to receive sensitive information from the Intranet unless an encrypted communication session is employed. Finally, the Guardian will never relay requests within one of the domains, as none of the directory protocols require this functionality. (A consequence of this is that the Guardian will never relay a request from one unknown directory server to another.) 4. User Authentication and Authorization In a distributed directory service, a user may bind to and be authenticated by any directory server, and the servers may pass user requests between themselves (in
4 the X.500 model the DSP is used for this, whereas LDAP currently does not support such a protocol). A configuration parameter informs the Guardian of the minimum level of authentication required for each directory protocol. If the user meets this minimum level, the bind will be accepted, otherwise it will be rejected. In the case where the user does not bind directly to the Guardian, the Guardian needs to know if a particular user was authenticated by a trusted directory server, or by an un-trusted one. Its list of trusted directory servers will tell it this, and if it transpires that the user was authenticated by an un-trusted server, then the Guardian removes the authentication privileges from the user s request and treats him or her as un-authenticated before either rejecting the request or passing the DSP request onto the other network (see Figure 1). If the user was authenticated by a trusted directory server, then his/her level of authentication (simple or strong) is believed and passed on as-is to the other network. If the user binds directly to the Guardian, then his/her credentials are checked. If simple (password based) authentication is used, the Guardian checks the password against its internal list (the passwords are actually stored as attributes of user entries with the equivalent distinguished names). If strong (digital signature based) authentication is used, the Guardian checks the signature for authenticity, and also that there is a chain of trust leading from the public key of a trusted CA to the public key of the user. In this context, our Guardian is shortly due to become a certified user of the ICE-TEL CA infrastructure [4]. If the user s credentials prove to be false or untrustworthy, a configuration parameter directs the Guardian to either reject the bind or downgrade the session to un-authenticated if this level is acceptable. In addition to session authentication, individual directory operations can be digitally signed by a user. The Guardian will check the digital signatures of signed operations, retrieving the CRLs as necessary, and if the signature proves to be false, will either reject or downgrade the operation according to the security policy input by the administrator Authenticating and Authorising Outgoing Operations Some organizations have a requirement to restrict the number of users who are allowed access to the Internet. The security administrator has to configure the Guardian with the distinguished names of users and non-leaf nodes (typically organizational units) that are allowed access to the Internet directory. If the Intranet user is not within this name space his request will be denied. Finally, for authorized users, the DN of the user can either be hidden (for example by replacing with a generic name) or made visible in the requests that flow onto the Internet. An X.500 user will typically bind to his/her local DSA, and the request will be chained to the Guardian by this. In some circumstances the user will need to bind directly to the Guardian, for example, when using LDAP servers, or when external directory servers wish to directly authenticate the user. In these circumstances the Guardian acts as a proxy user. For these outgoing sessions, the Guardian performs DAP-DAP chaining or LDAP-DAP chaining (see Figure 1). Outgoing DAP or LDAP to DSP chaining is not supported. LDAP-LDAP chaining will be added towards the end of 1997, although the same functionality can be obtained now by using the X.500 Enabler from Critical Angle [5].
5 Internet Directory DAP LDAP DAP DSP LDAP Guardian DAP LDAP DSP LDAP Intranet Directory Figure 1. Protocol Chaining Supported by the Guardian 4.2. Authenticating and Authorising Incoming Operations For incoming sessions, a similar situation applies. The Guardian is configured with the list of remote users (DNs of leaf and non-leaf nodes) who are allowed to access the Intranet. It is also possible to give blanket access by using the keyword. Because the Guardian is trusted by the Intranet directory servers, it does not need to act as a proxy for a remote user. The remote user must be authenticated by the Guardian before he/she is allowed access to the Intranet. Consequently the Guardian always performs standard DAP-DSP chaining or LDAP-DSP chaining (see Figure 1) on incoming operations. LDAP-LDAP chaining will be added towards the end of 1997 to support LDAP stand alone directory systems on the Intranet. 5. Processing of Referrals It is important that the names and addresses of the corporate directory servers can be hidden from the Internet, and that only the address of the Guardian server is made known publicly. Referrals to Intranet directory servers would compromise this situation, if they were to be released to the Internet. Consequently, the Guardian always acts on referrals to Intranet servers. Similarly for incoming referrals, there is little point in passing these to the corporate user, since he has no direct path to the Internet. Again, the Guardian will always endeavour to follow incoming referrals, and pass a complete set of directory information back to the user.
6 Protocol Filter User Filter Operation Filter Entry Filter Attribute Type Filter Attribute Value Filter Figure 2. The Filters of the Guardian 6. Configuring the Guardian One of the key factors in security is KISS (keep it simple, stupid). If it is extremely complex to configure a firewall system of any type then it is likely that, sooner or later, a security administrator will make a mistake that compromises the security of the Intranet. Consequently, ease of configuration has been a key design aim for our Guardian. The Guardian acts as a 6 stage filter, progressively refining and reformatting messages that pass through it. The filters act sequentially, as depicted in Figure 2. Configuration of the Guardian involves the specification of two distinct security policies: - the Intranet Access Policy (this specifies the protocols and operations that external users can use to access the internal domain; and the entries, attributes and values that can be returned in outgoing results); and - the Internet Access Policy (this specifies the protocols and operations that internal users can use to access the external domain; and the entries, attributes and values that can be returned in incoming results). To make clear the fact that these two policies are distinct, two configuration files are specified, and each contains specifications for all six filters. The syntax and semantics of each is the same, though it is very likely that the content will be different e.g. see Appendix 1. The Guardian configuration uses a "default deny" principle, which means that anything that is not explicitly enabled will be disabled. Therefore, if both configuration files are empty then the Guardian will not allow any X.500 or LDAP protocols to pass through it in either direction. Additionally, by ensuring that only permitted actions are specified, rather than prohibited actions, the configuration file does not contain any prohibited information and so it can be made public if required. Various other parameters are supported in the configuration files. Briefly these are: a parameter to control the amount of logging, whether to downgrade or reject failed authentications, the list of trusted DSAs, and the action to take if a request attempts to retrieve restricted information (remove from result or return error) Specification of the filters The syntax for each filter is formally defined in Figure 3, where: <specification> ::= description of the items accepted by the filter. The format is specific to each type of filter. <qualifier> ::= a restriction, allowing an item to be accepted under specified conditions. The format is specific to each type of filter. <modifier> ::= description of the item in the namespace of the calling domain (if this is different to the called domain)
7 <filter> ::= '[' <filter_name> ']' <filter_specs> <filter_name> ::= 'Protocols' 'Users' 'Operations' 'Entries' 'Attribute Types' 'Attribute Values' <filter_specs> ::= <filter_spec> [ <filter_specs> ] <filter_spec> ::= [ 'FOR' <branch> ] <allow> <allow> ::= '' 'ONLY' <refinements> 'NONE' <refinements> ::= <refinement> [ ',' <refinements> ] <refinement> ::= <specification> ['(' <qualifier> ')'] [ 'KNOWN AS' <modifier> ] Figure 3. BNF for the filter <branch> ::= boolean condition in terms of previous filters. The format is specific to each type of filter. 7. Examples This section gives an example of each type of filter, and shows some of the capabilities that are possible The [protocols] filter Here, the list of enabled directory protocols is given. [Protocols] ONLY DAP, LDAP(no authentication), DSP(simple) Each protocol may take an optional argument indicating the minimum bind strength of authentication that is acceptable. In this example, a DAP bind must be strongly authenticated (this is the default if no bind strength is mentioned), an anonymous LDAP bind is acceptable and a DSP bind must have at least a password (simple). DISP and DOP are not mentioned, so the Guardian will block any DISP or DOP binds that it receives The [users] filter This specifies the distinguished names of the users who are allowed to bind to the Guardian for each of the above protocols. Distinguished names are specified
8 according to Internet standard [6], with the extension that names may be specified using wild cards. Four forms of wild card are supported: if an RDN of at=* is included in the name then it will match any single valued RDN of attribute type at, e.g. cn is used for commonname etc.; if an RDN of at=** is included in the name then it will match any multivalued RDN of where one part of the RDN is of attribute type at; if an RDN of *=* is included then it will match exactly one RDN of any attribute type; and if an RDN of **=**" is included then it will match one or more RDNs, of any attribute type, up to the end of the name. [Users] FOR Protocol=DAP, LDAP ONLY <cn=a J Young,ou=Information Technology Institute,o=University of Salford,c=GB> (simple) KNOWN AS <cn=a J Young,o=University of Salford via guardian,c=gb> FOR Protocol=DSP ONLY <cn=dsa Manager,cn=DSA,o=University of Salford,c=gb> (strong) Each user DN is followed by two optional parameters. The first indicates the level of authentication that this particular user or group of users must present. If absent, it defaults to that specified for the individual protocols, but can be set to a higher level if the security policy so directs. A lower value will be ignored (as would be the case for DAP in the examples above, since the DAP protocol requires strong authentication). The second parameter, starting with keywords KNOWN AS, allows an alias name for the user to be used in the other domain The [operations] filter Here, we specify which directory operations will be allowed to pass through the Guardian for each group of users. [Operations] FOR User=<cn=DSA Manager,cn=DSA,o=University of Salford,c=gb> ONLY READ(unsigned),LIST(unsigned 20, signed 100),COMPARE Each operation may take an optional argument indicating whether or not it may be unsigned in order to pass through the Guardian. The LIST and SEARCH operations additionally can specify an optional argument giving the maximum number of entries that may be returned in the results (this may be different for signed and unsigned operations). The default value for this is one entry. In this example, READ may be unsigned, COMPARE must be signed (this is the default if no signature requirement is mentioned), and LIST may return more entries if the operation is signed. SEARCH and the modification operations are not mentioned here, and so these operations would not be allowed to pass through the Guardian The [entries] filter Here, we specify which entries will be allowed to pass through the Guardian. In addition to specifying which entries can pass through, it is also possible to specify
9 what their names should be known as in the external domain i.e. a form of aliasing. This is especially useful if an organisation wishes to protect its Intranet DIT structure from being visible on the Internet. [Entries] ONLY <cn=a J Young,ou=Information Technology Institute,o=University of Salford,c=GB> KNOWN AS <cn=a J Young,o=University of Salford via guardian,c=gb>, <cn=d W Chadwick,ou=Information Technology Institute,o=University of Salford,c=GB> KNOWN AS <cn=d W Chadwick,o=University of Salford via guardian,c=gb> In the above example, only two entries (for the authors of this paper) may pass through the filter, and these will be visible in the other domain with their organisational unit affiliations stripped off The [attribute types] filter Here we specify which attribute types will be allowed to pass through the Guardian. The second part of the example is needed if the administrator wishes to override the default-deny stance and say that all attribute types can be released for all allowed entries other than those explicitly named in the first part of the example. [Attribute Types] FOR Entry=<cn=*,ou=Information Technology Institute,o=University of Salford,c=GB> ONLY objectclass, commonname, surname, title, postaladdress, postalcode, telephonenumber, userid, rfc822mailbox, roomnumber, userclass, userpassword, favouritedrink FOR Entry=* 7.6. The [attribute values] filter Here we specify, for each attribute type, the values which are allowed to pass through the Guardian. The example here specifies that all direct dial telephone numbers will be made available in international format, whether they are stored in international, national or internal format. Non-direct dial extensions (these do not start with a 5) will not be released. The second part of the example is needed to over-ride the default-deny stance and say that, for all other allowed attribute types, all values can be released. In the specification of a value, a * may be used to match any number of characters, and a? to match a single character. [Attribute Values] FOR Attribute Type=telephone number ONLY " *", " *" KNOWN AS " *" "5????" KNOWN AS " ????" FOR Attribute Type=*
10 7.7. Specification of local names The configuration file allows the Guardian administrator to define local names for groups of users, and to specify the DNs of users and entries using these short name forms. This makes the specification much easier for the administrator, since he/she does not have to re-enter lots of DNs. As well as allowing for more readable specifications, the mechanism also provides a single place where the names of the group members is defined, thereby making maintenance and audit easier. Local names are defined in an extra section of the tailor file, which is usually located after the filters (though it can be located anywhere). They are specified as follows: [Local naming] NAME <distinguished name>... KNOWN AS <local name> The short local name must not contain a comma, an = or a *. The distinguished name may contain wild cards, as defined earlier in the document. Any number of names may be specified, separated by a comma. An example is: [Local Naming] NAME <cn=a J Young, ou=information Technology Institute, o=university of Salford, c=gb>, <cn=d W Chadwick, ou=information Technology Institute, o=university of Salford, c=gb> KNOWN AS <guardian developers> This allows the Guardian administrator to say: [Users] ONLY <guardian developers>(strong) to restrict use of the Guardian to just the named people, or to say: [Operations] FOR User=<guardian developers> FOR User=* ONLY Read,Compare,List to give the named people higher privileges than other users. If staffing details change then the Guardian filters do not need to be changed. 8. Piloting the Guardian The Guardian was successfully piloted at the EMA meeting in Philadelphia in April 1997, and again at the EEMA meeting in Maastricht in June It is now permanently operational, and demonstrable from our Web site [7]. Because the Internet White Pages Service and NameFLOW-Paradise service use Quipu based X.500 products, that incorporate Internet defined extensions to the X protocols [e.g.8], WEMA decided to set up a parallel infrastructure using products that conform to the LDAPv2 protocol and 1993 X.500 standards. The Guardian is quite happy to talk to both flavours of X.500 products, and in fact does so in our demonstration, with the Salford directory (representing the Intranet) being held
11 in a Quipu DSA, and the WEMA directory infrastructure (representing the Internet) being held in 1993 conformant DSAs. If we were to connect the University of Salford directory to the EEMA infrastructure via the Guardian in the conventional way (Figure 1), then it would only be possible to see a subset of the information contained in the University of Salford directory, as directed by our security policy. Furthermore, it would not be possible to verify the full protection effects of the Guardian, because no-one from the Internet would have access to the unfiltered directory. Consequently, we built a configuration that allows users to see both behind and in front of the firewall, so that they can see for themselves the effect of the Guardian. To do this, we have added subordinate knowledge references to the EEMA GB DSA to point to both the University of Salford operational DSA, and the University of Salford Guardian (see Figure 4). By displaying the contents of the University of Salford operational DSA, one will see the entire directory of the University of Salford. By displaying the contents of the University of Salford via the Guardian DSA, one will only see the entries that our security policy has decided should be available to the public directory The University of Salford Directory There are approximately 26,000 entries held in the University of Salford directory, and these are all held in a single Quipu DSA. The Salford directory tree is structured with departments (organizational units) below the University of Salford entry, and people below the departments, as shown in Figure 5. All people within the University of Salford have access to all of this information from the corporate Intranet. The Guardian has been configured so that the WEMA public directory can only see 3 person entries in the University of Salford directory, and cannot see any of the departments, as shown in Figure 6. EEMA GB DSA University of Salford via Guardian DSA University of Salford DSA Figure 4. The Configuration of the Demonstrator
12 C=GB O=University of Salford.... OU=department name CN= person s name Figure 5. The University of Salford s DIT C=GB O=University of Salford via Guardian CN= person s name Figure 6 The University of Salford s DIT visible to the public This shows the powerful filtering effects of the Guardian, in that not only can it remove leaf entries and subtrees from public view, but it can also remove non-leaf nodes, thereby appearing to alter the structure of the corporate DIT. Finally, the Guardian can rename non-leaf nodes, thereby allowing the private directory and the public directory to use different naming conventions (for example, in our demonstration, the internal name O=University of Salford, is given the name O=University of Salford via Guardian in the public directory). The Guardian thus allows you to gateway between two DITs with different name-spaces. Such capabilities are not normally provided by standard access control lists Attribute Filtering by the Guardian The three entries that are visible via the Guardian have had some of their attributes filtered from public view. If you read the contents of the entry: CN=D W Chadwick, OU=Information Technology Institute, O=University of Salford, C=GB
13 via the operational University of Salford DSA, you will see that the address, Fax number, Telex number and Telephone number attributes are all present. However, if you read the contents of the entry: CN=D W Chadwick, O=University of Salford via Guardian, C=GB via the Guardian, you will see that the Telex number and Fax number attributes have been filtered out. It is also possible to filter particular attribute values, if your security policy so requires. 9. Performance A limited number of performance measurements have been carried out in our laboratory, in which the Salford DIT was searched for SN=Chadwick, both directly and via the Guardian. These have revealed that the deviation in real time performance (as seen by the user agent), for both access routes, is as great as the delay in going via the Guardian. Specifically, for 20 requests sent via both routes, the average time and standard deviation for a response was 15.5±6.5 secs for a direct request and 20.3±7.5 secs for a request sent via the Guardian. We are currently performing additional tests to determine how much of the delay is caused simply because we are chaining via another directory server, and how much is actually caused by the filtering functionality of the Guardian. 10. Conclusion The provision of a Guardian directory application proxy should give organisations that wish to publish only a part of their corporate directory, the confidence to connect their corporate directory service to the Internet White Pages Service, safe in the knowledge that they can fully filter the amount of directory information that leaves their domain. The Guardian implementation built at Salford University provides such a functionality. Furthermore, a major design goal has been to ensure that the two configuration files, used to input the organisation s security policy into the Guardian, are both easy to understand and secure in the way that they operate, using the default deny principle. References [1] Details about the NameFLOW-Paradise service can be obtained from [2] ITU-T X.500 ISO 9594 (1993) The Directory, Parts 1 to 9. [3] Yeong, Howes and Kille. Lightweight Directory Access Protocol, RFC 1777, March 1995 [4] Details about the ICE-TEL project can be found at [5] Details about Critical Angle s X.500 Enabler can be found at [6] Wahl, M., Kille, S., Howes, T. "Lightweight Directory Access Protocol (v3): UTF-8 String Representation of Distinguished Names", RFC2253, December [7] For a live demonstration of the Guardian, see [8] Hardcastle-Kille, S.E. Replication and distributed operations extensions to provide and Internet directory usingx.500, RFC 1276, Nov 1991
14 Appendix 1. Example Configuration Files # This is an example ToSecurityDomain.ini file, # specifying the Intranet Access Policy used in # the EEMA demonstration Guardian (enhanced to # take account of some new features that are not # currently implemented) # This file specifies the protocols and # operations that external users can use to # access the internal domain; and the entries / # attributes / values that can be returned in # results (incoming operations outgoing results) [Protocols] ONLY DSP(simple),LDAP(no authentication) [Users] [Operations] FOR User=<andrew>,<chad> ONLY Read (unsigned), List (unsigned 100, signed 100), Compare(unsigned) FOR User=* ONLY Read (signed), List (signed 100), Compare(signed) [Entries] ONLY <andrew> KNOWN AS <cn=a J Young, o=university of Salford via guardian, c=gb>, <chad> KNOWN AS <cn=d W Chadwick, o=university of Salford via guardian, c=gb> [Attribute Types] FOR Entry=<**=**,o=University of Salford,c=gb> ONLY objectclass, commonname, surname, title, postaladdress, postalcode, telephonenumber, userid, rfc822mailbox, roomnumber, userclass, userpassword, favouritedrink FOR Entry=* ONLY objectclass, commonname, surname, organizationname, countryname, localityname, stateorprovincename, street, title, postaladdress, postalcode, telephonenumber, userid, rfc822mailbox, roomnumber, userclass, lastmodifiedtime, lastmodifiedby, accesscontrollist, associateddomain, businesscategory, description, iattr, masterdsa, slavedsa, userpassword, favouritedrink [Attribute Values] FOR Attribute Type=favouriteDrink ONLY tea, coffee FOR Attribute Type=objectClass ONLY top, person, organizationalperson, newpilotperson, quipuobject, organization, domainrelatedobject, quipunonleafobject, organizationalrole, organizationalunit, country, locality, dsa FOR Attribute Type=telephoneNumber ONLY *, * KNOWN AS *, 5???? KNOWN AS ???? FOR Attribute Type=*
15 # End of filters - the following items are basic configuration items [General] LOGGING "level=exception level=notice file=guardian/intranet.log" AUTHENTICATION downgrade QUERY PROHIBITED ITEM return error [Local Naming] NAME <cn=a J Young, ou=information Technology Institute, o=university of Salford, c=gb> KNOWN AS <andrew> NAME <cn=d W Chadwick, ou=information Technology Institute, o=university of Salford, c=gb> KNOWN AS <chad> # This is an example FromSecurityDomain.ini # file, specifying the Internet Access Policy # used in the EEMA demonstration Guardian # (enhanced to take account of some new features # not currently implemented) # This file specifies the protocols and # operations that internal users can use to # access the external domain; and the entries / # attributes / values that can be returned in # results (outgoing operations incoming results) [Protocols] ONLY DSP [Users] ONLY <c=gb,o=university of Salford, ou= Information Technology Institute, cn=a J Young> (simple) KNOWN AS <c=gb,o=university of Salford via guardian,cn=a J Young> [Operations] [Entries] [Attribute Types] [Attribute Values] # End of filters - the following items are basic configuration items [Trusted DSAs] NAME <cn=university of Salford DSA 1,c=gb> (simple) [General] LOGGING "level=exception level=notice file=guardian/internet.log" AUTHENTICATION downgrade
LDAP Directory Integration with Cisco Unity Connection
CHAPTER 6 LDAP Directory Integration with Cisco Unity Connection The Lightweight Directory Access Protocol (LDAP) provides applications like Cisco Unity Connection with a standard method for accessing
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Security Provider Integration LDAP Server
Security Provider Integration LDAP Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
MATLAB Toolbox implementation for LDAP based Server accessing
SHIV SHAKTI International Journal in Multidisciplinary and Academic Research (SSIJMAR) Vol. 2, No. 3, May-June (ISSN 2278 5973) MATLAB Toolbox implementation for LDAP based Server accessing Prof Manav
Introduction... 1. Installing and Configuring the LDAP Server... 3. Configuring Yealink IP Phones... 30. Using LDAP Phonebook...
Introduction... 1 Installing and Configuring the LDAP Server... 3 OpenLDAP... 3 Installing the OpenLDAP Server... 3 Configuring the OpenLDAP Server... 4 Configuring the LDAPExploreTool2... 8 Microsoft
THREAT MODELLING FOR ACTIVE DIRECTORY
THREAT MODELLING FOR ACTIVE DIRECTORY David Chadwick ISI, University of Salford, Salford, M5 4WT, England. Abstract: Key words: This paper analyses the security threats that can arise against an Active
Deploying ModusGate with Exchange Server. (Version 4.0+)
Deploying ModusGate with Exchange Server (Version 4.0+) Active Directory and LDAP: Overview... 3 ModusGate/Exchange Server Deployment Strategies... 4 Basic Requirements for ModusGate & Exchange Server
EVERYTHING LDAP. Gabriella Davis [email protected]
EVERYTHING LDAP Gabriella Davis [email protected] Agenda What is LDAP? LDAP structure and behavior Domino and LDAP LDAP tools Notes as an LDAP client IBM Lotus Sametime, Quickr, Connections,
FirstClass Directory Services 10 (Build 11)
FirstClass Directory Services 10 (Build 11) Description FCDS only runs on Windows machines. The FirstClass server can be running on any operating system. If your organization uses an LDAP server to maintain
X.500 and LDAP Page 1 of 8
X.500 and LDAP Page 1 of 8 Introduction OCLC has completed its investigation of the two proposed electronic access protocols for the ILL Policies Directory. The first is X.500, a directory protocol standard
How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance
An Oracle Technical White Paper November 2014 How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance Table of Contents Introduction...3 Active Directory LDAP Services...4
Basic Configuration. Key Operator Tools older products. Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work
Where to configure: User Tools Basic Configuration Key Operator Tools older products Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work Administrator Tools newest products
Your Question. Net Report Answer
Your Question Article: 00120 Question: How to Configure External Authentication for Net Report Web Portal Net Report Answer Introduction Security devices can be used to control access to network resources.
LDAP Authentication and Authorization
LDAP Authentication and Authorization What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned to centralized
Embedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): C54x, C73x, C746, C748, C792, C925, C950, E260, E360, E46x, T65x, W850, X264, X36x, X46x, X543, X544, X546, X548,
The following gives an overview of LDAP from a user's perspective.
LDAP stands for Lightweight Directory Access Protocol, which is a client-server protocol for accessing a directory service. LDAP is a directory service protocol that runs over TCP/IP. The nitty-gritty
How To Authenticate On An Xtma On A Pc Or Mac Or Ipad (For A Mac) On A Network With A Password Protected (For An Ipad) On An Ipa Or Ipa (For Mac) With A Log
WatchGuard Certified Training Fireware XTM Advanced Active Directory Authentication Courseware: Fireware XTM and WatchGuard System Manager v11.7 Revised: January 2013 Updated for: Fireware XTM v11.7 Disclaimer
Blue Coat Security First Steps Solution for Integrating Authentication Using LDAP
Solution for Integrating Authentication Using LDAP SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
Your Question. Article: 00065 Question: How do I Configure LDAP with Net Report?
Your Question Article: 00065 Question: How do I Configure LDAP with Net Report? Net Report Answer Introduction This Article explains how to create either an Internal LDAP Server Connection or a Microsoft
Configuring and Using the TMM with LDAP / Active Directory
Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring
CMDBuild Authentication (file auth.conf)
CMDBuild Authentication (file auth.conf) 1 Indice Introduction...3 1. Authentication type selection...3 auth.methods...3 serviceusers...3 force.ws.password.digest...3 2. Header authentication configuration...3
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
LDAP Schema Design. Andrew Findlay Skills 1st Ltd. February 2005 [email protected] http://www.skills-1st.co.uk/
LDAP Schema Design Andrew Findlay Skills 1st Ltd February 2005 [email protected] http://www.skills-1st.co.uk/ Synopsis It is possible to make one LDAP directory serve many applications in
Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory
Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory May 21, 2014 This edition of this document applies to Piston OpenStack 3.0. To send us your comments about this document, e-mail [email protected].
[MS-FSADSA]: Active Directory Search Authorization Protocol Specification
[MS-FSADSA]: Active Directory Search Authorization Protocol Specification Intellectual Property Rights Notice for Open Specifications Documentation Technical Documentation. Microsoft publishes Open Specifications
Active Directory LDAP Quota and Admin account authentication and management
Active Directory LDAP Quota and Admin account authentication and management Version 4.1 Updated July 2014 GoPrint Systems 2014 GoPrint Systems, Inc, All rights reserved. One Annabel Lane, Suite 105 San
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
Administrator Quick Start Guide
Administrator Quick Start Guide - Index 1. Cloud Email Firewall Introduction 2. Licensing model 3. Initial Cloud Email Firewall configuration 3.1 Cloud Email Firewall Inbound email filtering 3.1.1 Domain
Forum of European Supervisory Authorities for Electronic Signatures (FESA) Working Paper on Qualified Certificates for Automatically Signing Systems
Forum of European Supervisory Authorities for Electronic Signatures (FESA) Working Paper on Qualified Certificates for Automatically Signing Systems October 12, 2004 It is a frequently asked question if
Internet infrastructure. Prof. dr. ir. André Mariën
Internet infrastructure Prof. dr. ir. André Mariën 1 Lightweight Directory Access Protocol 2 Object Identifier Representation: dotted decimal OID not intended for end-users Universally unique Example:
Skyward LDAP Launch Kit Table of Contents
04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
Adeptia Suite LDAP Integration Guide
Adeptia Suite LDAP Integration Guide Version 6.2 Release Date February 24, 2015 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 DOCUMENT INFORMATION Adeptia
Troubleshooting Active Directory Server
Proven Practice Troubleshooting Active Directory Server Product(s): IBM Cognos Series 7 Area of Interest: Security Troubleshooting Active Directory Server 2 Copyright Copyright 2008 Cognos ULC (formerly
LISTSERV LDAP Documentation
LISTSERV LDAP Documentation L Soft Sweden AB 2007 28 November 2007 Overview LISTSERV version 15.5 can interface to LDAP servers to authenticate user logins, to insert LDAP attributes in mail merge distributions
Deploying F5 with Microsoft Active Directory Federation Services
F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services
Cloud Email & Web Security. Administrator Quick Start Guide
Administrator Quick Start Guide - Index 1. Cloud Email Firewall Introduction 2. Licensing model 3. Initial Cloud Email Firewall configuration 3.1 Cloud Email Firewall Inbound email filtering 3.1.1 Domain
Utilizing LDAP for User Profile and Corporate Structure Integration
ISI SOLUTIONS WHITE PAPER Utilizing LDAP for User Profile and Corporate Structure Integration By: Mitchell Weiss Director of Product Strategy ISI Telemanagement Solutions, Inc. At A Glance: In cases where
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
Cryoserver Archive Lotus Notes Configuration
Lotus Notes Configuration Version 1.0 December 2007 Forensic & Compliance Systems Ltd +44 (0)800 280 0525 [email protected] www.cryoserver.com Contents INTRODUCTION... 3 SMTP ROUTING TO CRYOSERVER...
Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide
Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without
Writing Access Control Policies for LDAP
Writing Access Control Policies for LDAP 30th January 2009 Andrew Findlay Skills 1st Ltd www.skills 1st.co.uk Synopsis Access Control systems vary from one LDAP server to the next. All of them can implement
Guardian Digital Secure Mail Suite Quick Start Guide
Guardian Digital Secure Mail Suite Quick Start Guide Copyright c 2004 Guardian Digital, Inc. Contents 1 Introduction 1 2 Contacting Guardian Digital 2 3 Purpose of This Document 3 3.1 Terminology...............................
Steps to setup authentication and enrolment through LDAP protocol
Steps to setup authentication and enrolment through LDAP protocol Step 1: Authentication The web user try to get inside Moodle. Moodle will recognize him/her only if his credentials are found inside Accounts
Directory Interface for User Management via LDAP BC-LDAP-USR 6.30 Test Catalog
Directory Interface for User Management via LDAP BC-LDAP-USR 6.30 Test Catalog Version 6.3 Test Catalog Page 1 of 30 Copyright(c) 2005 SAP AG. All rights reserved. Neither this document nor any part of
ProxySG TechBrief LDAP Authentication with the ProxySG
ProxySG TechBrief LDAP Authentication with the ProxySG What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned
User Guide. You will be presented with a login screen which will ask you for your username and password.
User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that
PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1
PANDA CLOUD EMAIL PROTECTION 3.3.0 / Administrator s Manual / 1 Contents 1 INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 5 1.1 WHAT IS PANDA CLOUD EMAIL PROTECTION?... 5 1.2 FUNCTIONALITIES... 5 2 PANDA
LDaemon. This document is provided as a step by step procedure for setting up LDaemon and common LDaemon clients.
LDaemon This document is provided as a step by step procedure for setting up LDaemon and common LDaemon clients. LDaemon... 1 What you should know before installing LDaemon:... 2 ACTIVE DIRECTORY... 2
User Management Resource Administrator. Managing LDAP directory services with UMRA
User Management Resource Administrator Managing LDAP directory services with UMRA Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted
How To Guide. SIP Trunking Configuration Using the SIP Trunk Page
How To Guide SIP Trunking Configuration Using the SIP Trunk Page For the Ingate SIParators and Firewalls using software release 4.9.2 or later. Updated to show features available from release 4.10.x May
Security Provider Integration RADIUS Server
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Configuring LDAP Directory Search on SPA SIP IP Phones
Application Note EDCS-711822 Updated January 2009 Configuring LDAP Directory Search on SPA SIP IP Phones 2009 Cisco Systems, Inc. All rights reserved. This document is Cisco Proprietary Information. Page
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
DEFICIENCIES IN LDAP WHEN USED TO SUPPORT PKI
By David Chadwick DEFICIENCIES IN LDAP WHEN USED TO SUPPORT PKI Problems arise when a protocol initially developed to simplify access to a distributed directory failed to take into account all the uses
Configuration Worksheets for Oracle WebCenter Ensemble 10.3
Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the
Dell KACE K1000 Management Appliance. Service Desk Administrator Guide. Release 5.3. Revision Date: May 13, 2011
Dell KACE K1000 Management Appliance Service Desk Administrator Guide Release 5.3 Revision Date: May 13, 2011 2004-2011 Dell, Inc. All rights reserved. Information concerning third-party copyrights and
KACE Appliance LDAP Reference Guide V1.4
KACE Appliance LDAP Reference Guide V1.4 Brandon Whitman Page 1 The purpose of this guide is to help you with both common and advanced LDAP issues related to the KACE appliances. This guide will give you
LDAP and Integrated Technologies: A Simple Primer Brian Kowalczyk, Kowal Computer Solutions Inc., IL Richard Kerwin, R.K. Consulting Inc.
LDAP and Integrated Technologies: A Simple Primer Brian Kowalczyk, Kowal Computer Solutions Inc., IL Richard Kerwin, R.K. Consulting Inc., IL ABSTRACT SAS Integration Technologies and LDAP(Lightweight
Step-by-Step Guide to Active Directory Bulk Import and Export
Page 1 of 12 TechNet Home > Windows Server TechCenter > Identity and Directory Services > Active Directory > Step By Step Step-by-Step Guide to Active Directory Bulk Import and Export Published: September
Active Directory Sync (AD) How it Works in WhosOnLocation
Active Directory Sync (AD) How it Works in WhosOnLocation 1 P a g e Contents Overview... 3 About AD in WhosOnLocation... 3 The Way It Works... 3 Requirements... 3 How to Setup Active Directory Sync...
Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.
Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,
The Impact of 21 CFR Part 11 on Product Development
The Impact of 21 CFR Part 11 on Product Development Product development has become an increasingly critical factor in highly-regulated life sciences industries. Biotechnology, medical device, and pharmaceutical
Configure Directory Integration
Client Configuration for Directory Integration, page 1 Client Configuration for Directory Integration You can configure directory integration through service profiles using Cisco Unified Communications
How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY
UMHLABUYALINGANA MUNICIPALITY FIREWALL MANAGEMENT POLICY Firewall Management Policy Approval and Version Control Approval Process: Position or Meeting Number: Date: Originator: Recommended by Director
Authentication in OpenStack
Draft Draft entication in OpenStack Jorge L Williams Khaled Hussein Ziad N Sawalha Abstract The purpose of this
Borderware MXtreme. Secure Email Gateway QuickStart Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved
Borderware MXtreme Secure Email Gateway QuickStart Guide Copyright 2005 CRYPTOCard Corporation All Rights Reserved http://www.cryptocard.com Overview MXtreme is a hardened appliance with a highly robust
Enabling SSO between Cognos 8 and WebSphere Portal
Guideline Enabling SSO between Cognos 8 and WebSphere Portal Product(s): Cognos 8 Area of Interest: Security Enabling SSO between Cognos 8 and WebSphere Portal 2 Copyright Your use of this document is
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1
Avaya Solution & Interoperability Test Lab Application Notes for Microsoft Office Communicator Clients with Avaya Communication Manager Phones - Issue 1.1 Abstract These Application Notes describe the
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
Technical Bulletin 005 Revised 2010/12/10
sitesecuresoftware.com Site-Secure Facility & Security Management Software Technical Bulletin 005 Revised 2010/12/10 Search Active Directory from SQL Server 2000-2005 Table of Contents Introduction...
Windows Log Monitoring Best Practices for Security and Compliance
Windows Log Monitoring Best Practices for Security and Compliance Table of Contents Introduction... 3 Overview... 4 Major Security Events and Policy Changes... 6 Major Security Events and Policy Changes
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
Version 9. Active Directory Integration in Progeny 9
Version 9 Active Directory Integration in Progeny 9 1 Active Directory Integration in Progeny 9 Directory-based authentication via LDAP protocols Copyright Limit of Liability Trademarks Customer Support
Case Study and Tutorial: HTTPS Reverse Proxy and Authentication with LDAP
Case Study and Tutorial: HTTPS Reverse Proxy and Authentication with LDAP TR-3361 Niall Doherty January 2005 TECHNICAL REPORT Network Appliance, a pioneer and industry leader in data storage technology,
How To Make A Trustless Certificate Authority Secure
Network Security: Public Key Infrastructure Guevara Noubir Northeastern University [email protected] Network Security Slides adapted from Radia Perlman s slides Key Distribution - Secret Keys What if
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Single Sign-On. Document Scope. Single Sign-On
Single Sign-On Document Scope This document describes how to plan, design, implement, and maintain the Single Sign-On feature in the SonicWALL SonicOS 5.1 Enhanced. This document contains the following
Embedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): MS911de, MX910de, MX911, MX912, XM9145, XM9155, XM9165, CS310, CS410, CS510, CX310, CX410, CX510, M1140, M1145,
EAL4+ Security Target
EAL4+ Security Target Common Criteria: EAL4 augmented with ALC_FLR.3 Version 1.0 21-DEC-10 Document management Document identification Document ID Document title Release authority E14_EAL4_ASE Microsoft
Oracle Communications Unified Communications Suite
Oracle Communications Unified Communications Suite Schema Reference Release 8.0 July 2015 Oracle Communications Unified Communications Suite Schema Reference, Release 8.0 Copyright 2007, 2015, Oracle and/or
Implementation notes on Integration of Avaya Aura Application Enablement Services with Microsoft Lync 2010 Server.
Implementation notes on Integration of Avaya Aura Application Enablement Services with Microsoft Lync 2010 Server. Introduction The Avaya Aura Application Enablement Services Integration for Microsoft
Active Directory Sync (AD) How to Setup
Active Directory Sync (AD) How to Setup 1 P a g e Contents How to Setup Active Directory Sync... 3 Download your AD Script... 3 Configuration... 5 Active Directory Sync F.A.Q... 6 2 P a g e How to Setup
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
HP Device Manager 4.7
Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
