JobScheduler Security
|
|
- Arlene Morton
- 8 years ago
- Views:
Transcription
1 JobScheduler - Job Execution and Scheduling System JobScheduler Security March 2015 March 2015 JobScheduler Security page: 1
2 JobScheduler Security - Contact Information Contact Information Software- und Organisations-Service GmbH Giesebrechtstr. 15 D Berlin Germany Telephone +49 (0) Telefax +49 (0) Mail info@sos-berlin.com Web Last Updated: 03/20/ :00 PM This documentation is based on JobScheduler Version Copyright SOS GmbH Berlin. All rights reserved. All trademarks or registered trademarks are the property of their respective holders. All information and materials in this book are provided "as is" and without warranty of any kind. All information in this document is subject to change without further notice. This product includes software developed by the Apache Software Foundation ( We would appreciate any feedback you have, or suggestions for changes and improvements; please forward your comments to info@sos-berlin.com. March 2015 JobScheduler Security page: 2
3 JobScheduler Security - Table of Contents Table of Contents 1 Installation Configuration of shiro Authentication and Authorization with JID JobScheduler command rest service Glossary March 2015 JobScheduler Security page: 3
4 JobScheduler Security - Installation 1 Installation The SOS Security Server is running as a servlet in a jetty webserver. You can use a running JobScheduler Instance to start a jetty webservice. To enable the SOS Security Server you have to modify the file $scheduler_data/config/web.xml To enable the JobScheduler command rest service plugin in JobScheduler, please add the plugin in the plugin section of the file $scheduler_data/config/scheduler.xml After the <security> element: <plugins> <plugin java_class="com.sos.scheduler.engine.plugins.jetty.jettyplugin"> <plugin.config/> </plugin> <plugin java_class="com.sos.jobscheduler.tools.webservices.soscommandsecurityplugin"> <plugin.config/> </plugin> </plugins> Example: Activating Jetty plugin in JobScheduler To enable the JobScheduler Security Server in the Jetty webservice running in a JobScheduler instance please add this in the file web.xml. <servlet> <servlet-name>jersey REST Service</servlet-name> <servlet-class>com.sun.jersey.spi.container.servlet.servletcontainer</servlet-class> <init-param> <param-name>com.sun.jersey.config.property.packages</param-name> <param-value>com.sos.auth.rest</param-value> </init-param> <load-on-startup>0</load-on-startup> </servlet> <servlet-mapping> <servlet-name>jersey REST Service</servlet-name> <url-pattern>/rest/*</url-pattern> </servlet-mapping> Example: Activating JobScheduler security service in web.xml You also need a file shiro.ini in the classpath of the JobScheduler instance. The most basic shiro.ini file is [users] root = root, all [roles] all = sos:products Example: Basic shiro.ini file With this file you define a user root with the password root and the role all. The role all has all permissions starting with sos:products. To add the file to the class_path, please open the file $scheduler_home/config/factory.ini. Locate the class_path definition March 2015 JobScheduler Security page: 4
5 JobScheduler Security - Installation [java] class_path = c:/shiroini;c:/development/products/jobscheduler/jobscheduler-web-services/target/jobscheduler-web-services jar;$ {SCHEDULER_HOME}/lib/*.jar;${SCHEDULER_HOME}/lib/hibernate/*.jar;${SCHEDULER_HOME}/lib/jetty_ext/*.jar;${SCHEDULER_HOME }/lib/log/nop/*.jar;${scheduler_home}/lib/log/logback/*.jar Example: Class_path in the file factory.ini Please add a directory to the class_path, e.g. c:\shiroini. Save the file shiro.ini into this directory and restart JobScheduler To check whether the service is running you can use this url (Please use the actual values for host and port The answer should be <SOSPermissionShiro/> Example: Basic shiro.ini file To enable the login in JID there must be a record in the table scheduler_instances with the following values If there are more than one record in the table scheduler_instances with is_command_webservice=1 the first one found will be used. If it is not possible to connect to this JobScheduler instance or if the security server specified in this instance is not available, the next JobScheduler instance with is_command_webservice=1 will be used. The $scheduler_data\config\scheduler.xml file of this JobScheduler instance must define a parameter to setup the JobScheduler security server. <param name="security_server_address" value=" Example: Enabling the login in JID March 2015 JobScheduler Security page: 5
6 JobScheduler Security - Configuration of shiro 2 Configuration of shiro shiro will be configured with the file shiro.ini found in the class_path. This file specifies the realm with which the authentication and the authorization will be done. Authentication The authentication will be done by a user name password combination. Authentication method There are three available authentication methods authentication against a database authentication against ldap authentication against a shiro.ini file Configuration with Hibernate To enable the Hibernate Realm, the following shiro.ini must be found in the classpath [main] hibernaterealm = com.sos.dialog.auth.soshibernateauthorizingrealm hibernaterealm.hibernateconfigurationfile=c:\users\nn\documents\sos-berlin.com\jobscheduler\scheduler_current\config\hi bernate.cfg.xml securitymanager.realms = $hibernaterealm cachemanager = org.apache.shiro.cache.memoryconstrainedcachemanager securitymanager.cachemanager = $cachemanager Example: shiro.ini for Hibernate realm The information containing users, roles and right are stored in the following tables March 2015 JobScheduler Security page: 6
7 JobScheduler Security - Configuration of shiro Table with user and passwords. CREATE TABLE SOS_USER ( "ID" NUMBER(9,0), "SOS_USER_NAME" VARCHAR2(250 BYTE), "SOS_USER_PASSWORD" VARCHAR2(250 BYTE), primaray key("id") ) /*MD5 Hash*/ Directly assigned rights to roles or users. CREATE TABLE SOS_USER_RIGHT ( "ID" NUMBER(9,0), "ROLE_ID" NUMBER(9,0), "USER_ID" NUMBER(9,0), "SOS_USER_RIGHT" VARCHAR2(250), primaray key("id") ) Table with roles CREATE TABLE SOS_USER_ROLE ( "ID" NUMBER(9,0), "SOS_USER_ROLE" VARCHAR2(250 BYTE), primaray key("id") ) Assignment of roles to users CREATE TABLE SOS_USER2ROLE ( "ID" NUMBER(9,0), "USER_ID" NUMBER(9,0), "ROLE_ID" NUMBER(9,0), primaray key("id") ) Example: Database tables for Hibernate realm Configuration with LDAP To enable the Realm LDAP, the following shiro.ini must be found in the classpath In the LDAP Realm it is not possible to assign rights directly to an user. The user in LDAP will have a password which is be used for authentication. The user also will be assigned to shiro role. The mapping between shiro role and permissions is specified in the shiro.ini file. The [roles] section specifies the assignment of rights to roles March 2015 JobScheduler Security page: 7
8 JobScheduler Security - Configuration of shiro [main] ldaprealm = com.sos.dialog.auth.sosldapauthorizingrealm ldaprealm.userdntemplate = cn={0},ou=ehp,cn=manager,dc=my-domain,dc=com ldaprealm.searchbase = ou=ehp,cn=manager,dc=my-domain,dc=com ldaprealm.contextfactory.url = ldap://<server>:<port> ldaprealm.groupnameattribute=cn ldaprealm.usernameattribute=sn #Mapping of a ldap group to roles. You can assign more than one role with the seperator sign ldaprealm.grouprolesmap = "<user1>":"<role1> <role2>", \ "<user2>":"<role>" rolepermissionresolver = com.sos.dialog.auth.sospermissionresolveradapter rolepermissionresolver.ini = $inirealm ldaprealm.rolepermissionresolver = $rolepermissionresolver securitymanager.realms = $ldaprealm cachemanager = org.apache.shiro.cache.memoryconstrainedcachemanager securitymanager.cachemanager = $cachemanager securitymanager.sessionmanager.globalsessiontimeout = [roles] <role1> = <permission1>, <permission2> <role2> = <permission1>, <permission2> Example: shiro.ini for LDAP realm Configuration with Ini File It is possible to specify users, roles and passwords in the shiro.ini file without using ldap or a database. The list of users in the section [users] asssigns each user a password (first item after assign sign) and a list of roles. In the section [roles] is a list of roles which have a comma seperated list of permissions. March 2015 JobScheduler Security page: 8
9 JobScheduler Security - Configuration of shiro [users] root = secret, jobscheduler_dashboard_admin ur = ur, joc, joe joe = joe, joe, jid guest = guest [roles] admin = sos:products:jid:joe,sos:products:jid:joc,sos:products:jid:events jobscheduler_dashboard_admin = sos:products:jid:* joc = sos:products:jid:joc joc_admin = sos:products:jid:joc:* joe = sos:products:jid:joe events = sos:products:jid:events jobnet = sos:products:jid:jobnet March 2015 JobScheduler Security page: 9
10 JobScheduler Security - Configuration of shiro Example: shiro.ini for INIFILE realm March 2015 JobScheduler Security page: 10
11 JobScheduler Security - Authentication and Authorization with JID 3 Authentication and Authorization with JID Authentication The authentication will be done by a user name password combination. When starting JID there comes up a form with two fields to identify against the underlying authentication method Authorization A user in JID can have severall roles. Each role can be assigned several rights. With hibernate realm it is also possible to assign rights explicitly to a user. JID knows the roles: JID: To be able to start JID JOE: To see the JOE view JOC: To see the JOC view EVENTS: To see the Events view JOBNET: To see the Jobnet view You can assign additional rights to the following roles. admin joc_admin jobeditor controller workingplan JID knows the rights sos:product:jid:execute To be able to start JID sos:product:jid:joetab:show To see the JOE view sos:product:jid:joctab:show To see the JOC view sos:product:jid:eventtab:show To see the Events view sos:product:jid:jobnettab:show To see the Jobnet view sos:product:jid:jobstart To be able to start jobs and job chains Rights can be specified with wildcards. The right sos:products:jid:* includes all rights starting with sos:products:jid: You can enable a wanted function in JID either by assigning a role or a right to a user. A right can be assigned directly to a user (only hibernate realm) or indirectly to a user by assigning the right to a role which is then assigned to the user. Configure the JobScheduler Security Server The authentication and authorization will be done by the JobScheduler Security Server. This is a REST webservice that can run in a Jetty webserver e.g. within a JobScheduler instance. in the dashboard.cmd sh start script you have to specify the adress of the jetty server March 2015 JobScheduler Security page: 11
12 JobScheduler Security - Authentication and Authorization with JID -scheduler_id= The $scheduler_data\config\scheduler.xml file of the given scheduler_id must contain the parameter to find the security server to use. where host is the host name of the jetty server and port is the port for the jetty server will be read from the table scheduler_instances. The $scheduler_data\config\scheduler.xml file of this JobScheduler instance must define a parameter to setup the JobScheduler security server. <param name="security_server_address" value=" Example: Enabling the login in JID March 2015 JobScheduler Security page: 12
13 JobScheduler Security - JobScheduler command rest service 4 JobScheduler command rest service When the JobScheduler command Restservice is enabled you can execute commands using rest service urls with http post. The command executer needs a valid login done in the SOS Security server. T h e c o m m a n d e x e c u t e r p l u g i n w i l l b e i n s t a l l e d b y a d d i n g t h e p l u g i n i n t h e f i l e $scheduler_data/config/scheduler.xml <plugin java_class="com.sos.jobscheduler.tools.webservices.soscommandsecurityplugin"> <plugin.config/> </plugin> Example: Activating Command Executer plugin in JobScheduler Here is a list of known commands /plugin/security/login /plugin/security/logout /plugin/security/is_enabled /plugin/security/start_job /plugin/security/modify_order /plugin/security/add_order /plugin/security/job_chain /plugin/security/job_chain_modify /plugin/security/job_chain_node_modify /plugin/security/kill_task /plugin/security/modify_job /plugin/security/modify_spooler /plugin/security/process_class /plugin/security/process_class_remove /plugin/security/consumes /plugin/security/remove_job_chain /plugin/security/remove_order /plugin/security/lock /plugin/security/lock_remove /plugin/security/terminate Parameters March 2015 JobScheduler Security page: 13
14 JobScheduler Security - JobScheduler command rest service Command: /start_job job at force name params Command: /modify_order job_chain order action at end_state priority setback state suspended title params runtime Command: /add_order job_chain order at end_state priority replace state title web_service params runtime Command: /job_chain distributed max_orders name orders_recoverable title visible Command: /job_chain_modify job_chain state Command: /job_chain_node_modify job_chain action state Command: /kill_task id immediately job Command: /modify_job job cmd Command: /modify_spooler cmd March 2015 JobScheduler Security page: 14
15 JobScheduler Security - JobScheduler command rest service timeout Command: /process_class scheduler_id name remote_scheduler replace max_processes Command: /process_class_remove process_class Command: /remove_job_chain job_chain Command: /remove_order job_chain order Command: /lock max_non_exclusive name Command: /lock_remove lock Command: /terminate all_schedulers continue_exclusive_operation restart timeout Command: /login user password Command: /logout Example: Parameters for Command Executer The command executer uses the security server configured with the param security_server_address in the file $scheduler_data/config/scheduler.xml The answer of the command executer is xml March 2015 JobScheduler Security page: 15
16 JobScheduler Security - JobScheduler command rest service <sos_security_webservice_answer> <isenabled>true</isenabled> <jobscheduleranswer/> <message> user: root, password: ********, resource: --> authenticated </message> <resource> </resource> <sessionid>607932d aa4c-d a61a</sessionid> <user>root</user> </sos_security_webservice_answer> Example: Answer of the command executer The login provides a session id which must be used with all commands to get the authorization for the command March 2015 JobScheduler Security page: 16
17 JobScheduler Security - Glossary Glossary Job Chains Jobs JOC (JobScheduler Operations Center) JOE (JobScheduler Object Editor) Orders A series of jobs that process orders one after the other. The JobScheduler starts the jobs in a job chain automatically, once a order has been started for the chain. Job chains allow a number of orders to be processed in parallel, by starting multiple instances of jobs (tasks). Programs and scripts that are executed by the JobScheduler have to be embedded in jobs. Jobs can contain either start executable files or contain job scripts that use the JobScheduler program interface. More than one instance of a job (task) may run at any one time, should this be required to scale performance. There are two types of jobs: standalone and order jobs. Whereas order jobs are started by orders within a job chain, standalone jobs can be started independently: either manually, scheduled or by directory monitoring. Standalone jobs cannot be run in job chains. JOC (JobScheduler Operations Center) is the JobScheduler interface for monitoring and controlling JobScheduler objects such as jobs, job chains and orders. JOC is opened in a web browser using the address where [scheduler_host] and [scheduler_port] are the host name and the TCP ports number of the JobScheduler (e.g. JOE is the JobScheduler Object Editor. This is used to configure JobScheduler objects (jobs, job chains, orders, schedules, process classes and locks). JOE is started using the script: $SCHEDULER_HOME \bin\jobeditor.cmd (Windows ) $SCHEDULER_HOME /bin/jobeditor.sh (Unix ) Orders activate the processing of job chains. Orders may also contain parameters for the jobs in a job chain. Every job in a job chain has access to the order parameters. Order parameters overwrite job parameters of the same name. Orders can be started according to time. An order processes the jobs in a job chain one after the other. Orders can be configured so that, if a error in processing a job occurs, the order... is removed from the job chain; continues with a further job in the chain; continues with the job that caused the initial error being repeated stands still - that is the order processing is suspended until it is restarted manually. March 2015 JobScheduler Security page: 17
18 JobScheduler Security - Glossary Schedules Time-based starting of jobs or orders can either be directly specified for each job or order or can be delegated to a schedule. Individual jobs or orders are then referred to this schedule. This means that if several jobs or orders have the same start parameters, these need only be specified once in the schedule. In addition, one schedule can be replaced by another for a particular period of time, thereby increasing the flexibility of setting job and order start parameters. March 2015 JobScheduler Security page: 18
How To Use The Jobscheduler On A Linux Box 2.5.2.2 (Jid) On A Pcode (Jio) Or Macbook 2.2 On A Microsoft Powerbook 2 (For A Freebie
JobScheduler - Job Execution and Scheduling System JobScheduler Information Dashboard Work Plan and History March 2015 March 2015 JobScheduler page: 1 JobScheduler - Contact Information Contact Information
More informationJobScheduler Installation by Copying
JobScheduler - Job Execution and Scheduling System JobScheduler Installation by Copying Deployment of multiple JobSchedulers on distributed servers by copying a template JobScheduler March 2015 March 2015
More informationJobScheduler - Quickstart
JobScheduler - Job Execution and Scheduling System JobScheduler - Quickstart An Introduction to Job Scheduling March 2015 March 2015 JobScheduler - Quickstart page: 1 JobScheduler - Quickstart - Contact
More informationJobScheduler Web Services Executing JobScheduler commands
JobScheduler - Job Execution and Scheduling System JobScheduler Web Services Executing JobScheduler commands Technical Reference March 2015 March 2015 JobScheduler Web Services page: 1 JobScheduler Web
More informationJOB SCHEDULER. Managed Jobs. Technical Documentation March 2009. Job Automation
Job Automation Managed Jobs JOB SCHEDULER Technical Documentation March 2009 Software- und Organisations-Service GmbH Giesebrechtstr. 15 10629 Berlin Germany Telephone +49 30 86 47 90-0 Telefax +49 30
More informationJobScheduler - Amazon AMI Installation
JobScheduler - Job Execution and Scheduling System JobScheduler - Amazon AMI Installation March 2015 March 2015 JobScheduler - Amazon AMI Installation page: 1 JobScheduler - Amazon AMI Installation - Contact
More informationJobScheduler Events Definition and Processing
JobScheduler - Job Execution and Scheduling System JobScheduler Events Definition and Processing Reference March 2015 March 2015 JobScheduler Events page: 1 JobScheduler Events - Contact Information Contact
More informationMySQL Job Scheduling
JobScheduler - Job Execution and Scheduling System MySQL Job Scheduling MySQL automation March 2015 March 2015 MySQL Job Scheduling page: 1 MySQL Job Scheduling - Contact Information Contact Information
More informationJobScheduler. Architecture and Mode of Operation. Software for Open Source
JobScheduler Architecture and Mode of Operation JobScheduler worldwide Software- und Organisations-Service GmbH www.sos-berlin.com Contents Components Supported Platforms & Databases Architecture Job Configuration
More informationCrontabFile Converter
JobScheduler - Job Execution and Scheduling System CrontabFile Converter Users Manual July 2014 July 2014 CrontabFile Converter page: 1 CrontabFile Converter - Contact Information Contact Information Software-
More informationJobScheduler - Installation Guide
JobScheduler - Job Execution and Scheduling System JobScheduler - Installation Guide Installation and Configuration March 2015 March 2015 JobScheduler - Installation Guide page: 1 JobScheduler - Installation
More informationArchitecture and Mode of Operation
Software- und Organisations-Service Open Source Scheduler Architecture and Mode of Operation Software- und Organisations-Service GmbH www.sos-berlin.com Scheduler worldwide Open Source Users and Commercial
More informationJobScheduler Events Definition and Processing
JobScheduler - Job Execution and Scheduling System JobScheduler Events Definition and Processing Referenz März 2015 März 2015 JobScheduler Events Seite: 1 Impressum Impressum Software- und Organisations-Service
More informationJobScheduler and Script Languages
JobScheduler - Job Execution and Scheduling System JobScheduler and Script Languages scripting with the package javax.script March 2015 March 2015 JobScheduler and Script Languages page: 1 JobScheduler
More informationHow To Login To The Mft Internet Server (Mft) On A Pc Or Macbook Or Macintosh (Macintosh) With A Password Protected (Macbook) Or Ipad (Macro) (For Macintosh) (Macros
TIBCO MFT Internet Server User Guide Software Release 7.2.4 October 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE
More informationConfiguring Nex-Gen Web Load Balancer
Configuring Nex-Gen Web Load Balancer Table of Contents Load Balancing Scenarios & Concepts Creating Load Balancer Node using Administration Service Creating Load Balancer Node using NodeCreator Connecting
More informationProduct Training Services. Training Options and Procedures for JobScheduler and YADE
Product Services Product Services Options and Procedures for JobScheduler and YADE 2 Contents Product Services JobScheduler Levels Level: JobScheduler Operations Level: JobScheduler Installation Level:
More informationOpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
More informationOpenLane 5.3 supports a distributed architecture with either an Oracle 8i SQL database or a Sybase database. Refer to: Oracle Integration on page 2.
OpenLane 5.3 Distributed Database Configuration Quick Start Instructions Document Number 7800-A2-GZ43-30 September 2000 Distributed Databases OpenLane 5.3 supports a distributed architecture with either
More informationLDAP User Guide PowerSchool Premier 5.1 Student Information System
PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson
More informationIUCLID 5 Guidance and Support
IUCLID 5 Guidance and Support Web Service Installation Guide July 2012 v 2.4 July 2012 1/11 Table of Contents 1. Introduction 3 1.1. Important notes 3 1.2. Prerequisites 3 1.3. Installation files 4 2.
More informationCA Spectrum and CA Service Desk
CA Spectrum and CA Service Desk Integration Guide CA Spectrum 9.4 / CA Service Desk r12 and later This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter
More informationTypingMaster Intra. LDAP / Active Directory Installation. Technical White Paper (2009-9)
TypingMaster Intra LDAP / Active Directory Installation Technical White Paper (2009-9) CONTENTS Contents... 2 TypingMaster Intra LDAP / Active Directory White Paper... 3 Background INFORMATION... 3 Overall
More informationAskCody Connect Connect your Outlook or AD to AskCody s solutions seamlessly. Everything included!
AskCody Connect Connect your Outlook or AD to AskCody s solutions seamlessly. Everything included! Integrate the solutions from AskCody with your existing calendar system and create a complete, dynamic
More informationConfiguring BEA WebLogic Server for Web Authentication with SAS 9.2 Web Applications
Configuration Guide Configuring BEA WebLogic Server for Web Authentication with SAS 9.2 Web Applications This document describes how to configure Web authentication with BEA WebLogic for the SAS Web applications.
More informationFortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide
FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide February 5, 2015 Revision 1 Copyright 2015 Fortinet, Inc. All rights reserved.
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationINTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
More informationConfiguring the Palo Alto Firewall for use with Juniper Steel-Belted RADIUS.
Configuring the Palo Alto Firewall for use with Juniper Steel-Belted RADIUS. Prepared for Palo Alto Networks by James Costello Armada Data Solutions Palo Alto Networks Partner 970 Peachtree Industrial
More informationIntegration Guide. SafeNet Authentication Service. Oracle Secure Desktop Using SAS RADIUS OTP Authentication
SafeNet Authentication Service Integration Guide Oracle Secure Desktop Using SAS RADIUS OTP Authentication Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013
More informationAdmin Quick Start Guide
Getting Started TIBCO Slingshot Admin Quick Start Guide v1.8.1 1. September 2, 2011 Configuring Slingshot Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
More informationMigration from Control-M to JobScheduler in a TWS Landscape. SOS Software GmbH Berlin, Germany
Migration from Control-M to JobScheduler in a TWS Landscape SOS Software GmbH Berlin, Germany Content basic conditions I & II previous landscape (Control-M) current landscape (JobScheduler) basic data
More informationTIBCO Runtime Agent Domain Utility User s Guide Software Release 5.8.0 November 2012
TIBCO Runtime Agent Domain Utility User s Guide Software Release 5.8.0 November 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
More informationFileMaker Server 11. FileMaker Server Help
FileMaker Server 11 FileMaker Server Help 2010 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker is a trademark of FileMaker, Inc. registered
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
More informationHow To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net 3.5.1 (Net 2) On A Gmaalto.Com Web Server
Application Note: Integrate Juniper SSL VPN with Gemalto SA Server SASolutions@gemalto.com October 2007 www.gemalto.com Table of contents Table of contents... 2 Overview... 3 Architecture... 5 Configure
More informationTECHNICAL NOTE SETTING UP A STRM UPDATE SERVER. Configuring your Update Server
TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER AUGUST 2012 STRM uses system configuration files to provide useful characterizations of network data flows. Updates to the system configuration files, available
More informationIBM WEBSPHERE LOAD BALANCING SUPPORT FOR EMC DOCUMENTUM WDK/WEBTOP IN A CLUSTERED ENVIRONMENT
White Paper IBM WEBSPHERE LOAD BALANCING SUPPORT FOR EMC DOCUMENTUM WDK/WEBTOP IN A CLUSTERED ENVIRONMENT Abstract This guide outlines the ideal way to successfully install and configure an IBM WebSphere
More informationHP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Collaboration Guide
HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Collaboration Guide Document Release Date: December 2014 Software Release Date: December 2014 Legal Notices
More informationBusinessObjects Enterprise XI Release 2
BusinessObjects Enterprise XI Release 2 How to configure an Internet Information Services server as a front end to a WebLogic application server Overview Contents This document describes the process of
More informationwww.novell.com/documentation Administration Guide GroupWise Mobility Service 2.1 February 2015
www.novell.com/documentation Administration Guide GroupWise Mobility Service 2.1 February 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this
More informationCA SiteMinder. SAML Affiliate Agent Guide. 6.x QMR 6
CA SiteMinder SAML Affiliate Agent Guide 6.x QMR 6 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationPolycom RealPresence Resource Manager System Getting Started Guide
[Type the document title] Polycom RealPresence Resource Manager System Getting Started Guide 8.0 August 2013 3725-72102-001B Polycom Document Title 1 Trademark Information POLYCOM and the names and marks
More informationAPIS CARM NG Quick Start Guide for MS Windows
APIS CARM NG Quick Start Guide for MS Windows The information contained in this document may be changed without advance notice and represents no obligation on the part of the manufacturer. The software
More informationEMC Documentum Content Services for SAP Repository Manager
EMC Documentum Content Services for SAP Repository Manager Version 6.0 Installation Guide P/N 300 005 500 Rev A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com
More informationConfiguring IBM WebSphere Application Server 7.0 for Web Authentication with SAS 9.3 Web Applications
Configuration Guide Configuring IBM WebSphere Application Server 7.0 for Web Authentication with SAS 9.3 Web Applications Configuring the System for Web Authentication This document explains how to configure
More informationLepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1
Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of
More informationJMETER - MONITOR TEST PLAN
http://www.tutorialspoint.com JMETER - MONITOR TEST PLAN Copyright tutorialspoint.com In this chapter, we will discuss how to create a Test Plan using JMeter to monitor webservers. The uses of monitor
More informationWebLogic Server: Installation and Configuration
WebLogic Server: Installation and Configuration Agenda Application server / Weblogic topology Download and Installation Configuration files. Demo Administration Tools: Configuration
More informationCA Nimsoft Unified Management Portal
CA Nimsoft Unified Management Portal HTTPS Implementation Guide 7.6 Document Revision History Document Version Date Changes 1.0 June 2014 Initial version for UMP 7.6. CA Nimsoft Monitor Copyright Notice
More informationArchitecture and Mode of Operation
Open Source Scheduler Architecture and Mode of Operation http://jobscheduler.sourceforge.net Contents Components Platforms & Databases Architecture Configuration Deployment Distributed Processing Security
More informationPowerLink for Blackboard Vista and Campus Edition Install Guide
PowerLink for Blackboard Vista and Campus Edition Install Guide Introduction...1 Requirements... 2 Authentication in Hosted and Licensed Environments...2 Meeting Permissions... 2 Installation...3 Configuring
More informationSecuring SAS Web Applications with SiteMinder
Configuration Guide Securing SAS Web Applications with SiteMinder Audience Two application servers that SAS Web applications can run on are IBM WebSphere Application Server and Oracle WebLogic Server.
More informationDeploying EMC Documentum WDK Applications with IBM WebSEAL as a Reverse Proxy
Deploying EMC Documentum WDK Applications with IBM WebSEAL as a Reverse Proxy Applied Technology Abstract This white paper serves as a detailed solutions guide for installing and configuring IBM WebSEAL
More informationCanto Integration Platform (CIP)
Canto Integration Platform (CIP) Getting Started Guide Copyright 2013, Canto GmbH. All rights reserved. Canto, the Canto logo, the Cumulus logo, and Cumulus are registered trademarks of Canto, registered
More informationCisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
More informationUFTP AUTHENTICATION SERVICE
UFTP Authentication Service UFTP AUTHENTICATION SERVICE UNICORE Team Document Version: 1.1.0 Component Version: 1.1.1 Date: 17 11 2014 UFTP Authentication Service Contents 1 Installation 1 1.1 Prerequisites....................................
More informationPaperCut Payment Gateway Module Realex Realauth Redirect Quick Start Guide
PaperCut Payment Gateway Module Realex Realauth Redirect Quick Start Guide This guide is designed to supplement the Payment Gateway Module documentation and provides a guide to installing, setting up,
More informationTIBCO Spotfire Statistics Services Installation and Administration Guide. Software Release 5.0 November 2012
TIBCO Spotfire Statistics Services Installation and Administration Guide Software Release 5.0 November 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH
More informationSophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
More informationTableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
More informationManagement, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
More informationSophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
More informationTIBCO Slingshot User Guide
TIBCO Slingshot User Guide v1.8.1 Copyright 2008-2010 TIBCO Software Inc. ALL RIGHTS RESERVED. Page 1 September 2, 2011 Documentation Information Slingshot Outlook Plug-in Important Information SOME TIBCO
More informationlinux20 (R12 Server) R12.0.4 Single Node SID - TEST linux1 (10gAS Server) Oracle 10gAS (10.1.2.2) with OID SID - asinf server name
Integrate Oracle Applications R12 with Oracle Internet Directory and SSO ----------------------------------------------------------------------------------------- High Level Steps --------------------
More informationCA SiteMinder. Agent for IIS Installation Guide. r12.0 SP3
CA SiteMinder Agent for IIS Installation Guide r12.0 SP3 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationHow To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal 1.1.3 On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (
Avaya one X Portal 1.1.3 Lightweight Directory Access Protocol (LDAP) over Secure Socket Layer (SSL) Configuration This document provides configuration steps for Avaya one X Portal s 1.1.3 communication
More informationMIGS Payment Client Installation Guide. EGate User Manual
MIGS Payment Client Installation Guide EGate User Manual April 2004 Copyright The information contained in this manual is proprietary and confidential to MasterCard International Incorporated (MasterCard)
More informationActive Directory Requirements and Setup
Active Directory Requirements and Setup The information contained in this document has been written for use by Soutron staff, clients, and prospective clients. Soutron reserves the right to change the
More informationMicrosoft Active Directory Oracle Enterprise Gateway Integration Guide
An Oracle White Paper May 2011 Microsoft Active Directory Oracle Enterprise Gateway Integration Guide 1/33 Disclaimer The following is intended to outline our general product direction. It is intended
More informationCA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationRemoteTM Web Server User Guide. Copyright 2008-2014 Maxprograms
RemoteTM Web Server User Guide Copyright 2008-2014 Maxprograms Contents 3 Contents Introduction...5 Requirements...5 Installation...7 Email Server Configuration...7 Users Management...8 Create User...8
More informationWorkshop for WebLogic introduces new tools in support of Java EE 5.0 standards. The support for Java EE5 includes the following technologies:
Oracle Workshop for WebLogic 10g R3 Hands on Labs Workshop for WebLogic extends Eclipse and Web Tools Platform for development of Web Services, Java, JavaEE, Object Relational Mapping, Spring, Beehive,
More informationUsing EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience
Using EMC Unisphere in a Web Browsing Environment: Browser and Security Settings to Improve the Experience Applied Technology Abstract The Web-based approach to system management taken by EMC Unisphere
More informationGetting Started Guide Polycom RealPresence Resource Manager System, Appliance Edition
Getting Started Guide Polycom RealPresence Resource Manager System, Appliance Edition 8.2.0 July 2014 3725-72102-001G Copyright 2014, Polycom, Inc. All rights reserved. No part of this document may be
More informationWhite Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3
White Paper Fabasoft Folio 2015 Update Rollup 3 Copyright Fabasoft R&D GmbH, Linz, Austria, 2016. All rights reserved. All hardware and software names used are registered trade names and/or registered
More informationInstalling Management Applications on VNX for File
EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
More informationSubversion Server for Windows
Subversion Server for Windows VisualSVN Team VisualSVN Server: Subversion Server for Windows VisualSVN Team Copyright 2005-2008 VisualSVN Team Windows is a registered trademark of Microsoft Corporation.
More informationJOBSCHEDULER. Job Scheduling. Technical Description March 2015. Job Automation
Job Automation Job Scheduling JOBR Technical Description March 2015 Software- und Organisations-Service GmbH Giesebrechtstr. 15 10629 Berlin Germany Telephone +49 30 86 47 90-0 JobScheduler 2 Contact Information
More informationFileMaker Server 14. FileMaker Server Help
FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks
More informationINSTALLATION GUIDE VERSION
INSTALLATION GUIDE VERSION 4.1 2014 Copyright 2008 2014. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means electronic or mechanical, for any purpose
More information<Insert Picture Here> Hudson Security Architecture. Winston Prakash. Click to edit Master subtitle style
Hudson Security Architecture Click to edit Master subtitle style Winston Prakash Hudson Security Architecture Hudson provides a security mechanism which allows Hudson Administrators
More informationIDENTIKEY Server Windows Installation Guide 3.2
IDENTIKEY Server Windows Installation Guide 3.2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
More informationSophos Mobile Control Installation guide. Product version: 3.6
Sophos Mobile Control Installation guide Product version: 3.6 Document date: November 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...5 3 Set up Sophos Mobile Control...11 4 External
More informationPolar Help Desk Installation Guide
Polar Help Desk Installation Guide Copyright (legal information) Copyright Polar 1995-2005. All rights reserved. The information contained in this document is proprietary to Polar and may not be used or
More informationWhite Paper. Fabasoft Folio Thin Client Support. Fabasoft Folio 2015 Update Rollup 2
White Paper Fabasoft Folio Thin Client Support Fabasoft Folio 2015 Update Rollup 2 Copyright Fabasoft R&D GmbH, Linz, Austria, 2015. All rights reserved. All hardware and software names used are registered
More informationMICROSOFT ISA SERVER 2006
OTP SERVER INTEGRATION MODULE MICROSOFT ISA SERVER 2006 Copyright, NordicEdge, 2010 www.nordicedge.se Copyright, 2010, NordicEdge AB Page 1 of 10 1 Introduction 1.1 OTP Server Overview Nordic Edge OTP
More informationWeb Server Manual. Mike Burns (netgeek@speakeasy.net) Greg Pettyjohn (gregp@ccs.neu.edu) Jay McCarthy (jay.mccarthy@gmail.com) November 20, 2006
Web Server Manual Mike Burns (netgeek@speakeasy.net) Greg Pettyjohn (gregp@ccs.neu.edu) Jay McCarthy (jay.mccarthy@gmail.com) November 20, 2006 Copyright notice Copyright c 1996-2006 PLT Permission is
More informationInstalling and Using the Zimbra Reporting Tool
Installing and Using the Zimbra Reporting Tool October 2014 Legal Notices Copyright 2005-2014 Zimbra, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual
More informationInstallation Guide Supplement
Installation Guide Supplement for use with Microsoft ISA Server and Forefront TMG Websense Web Security Websense Web Filter v7.5 1996 2010, Websense Inc. All rights reserved. 10240 Sorrento Valley Rd.,
More informationCA Workload Automation Agent for Databases
CA Workload Automation Agent for Databases Implementation Guide r11.3.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the
More informationHP Service Manager. Collaboration Guide. For the Supported Windows and UNIX operating systems. Software Version: 9.31
HP Service Manager For the Supported Windows and UNIX operating systems Software Version: 9.31 Collaboration Guide Document Release Date: October 2012 Software Release Date: October 2012 Legal Notices
More informationXerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
More informationTIBCO Administrator User s Guide. Software Release 5.7.1 March 2012
TIBCO Administrator User s Guide Software Release 5.7.1 March 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY
More informationHTTP connections can use transport-layer security (SSL or its successor, TLS) to provide data integrity
Improving File Sharing Security: A Standards Based Approach A Xythos Software White Paper January 2, 2003 Abstract Increasing threats to enterprise networks coupled with an ever-growing dependence upon
More informationSINGLE SIGN-ON SETUP T ECHNICAL NOTE
T ECHNICAL NOTE Product: Create!archive 6.2.1 Last modified: October 5, 2007 12:03 pm Created by: Development SINGLE SIGN-ON SETUP This Technical Note contains the following sections: Summary Create!archive
More informationDEPLOYING EMC DOCUMENTUM BUSINESS ACTIVITY MONITOR SERVER ON IBM WEBSPHERE APPLICATION SERVER CLUSTER
White Paper DEPLOYING EMC DOCUMENTUM BUSINESS ACTIVITY MONITOR SERVER ON IBM WEBSPHERE APPLICATION SERVER CLUSTER Abstract This white paper describes the process of deploying EMC Documentum Business Activity
More informationConfiguring and Monitoring FTP Servers
Configuring and Monitoring FTP Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
More informationSimple Scan to Email Setup Guide
Simple Scan to Email Setup Guide Document Centre 555/545/535 Dc04cc0336 Scan to Email Scanning to email from a Xerox DC 555/545/535 requires the support of external email services on a network. These services
More information