Humboldt State University Request for Quote # Identity Management System
|
|
|
- Blanche Stone
- 10 years ago
- Views:
Transcription
1 Humboldt State University Request for Quote # Identity Management System Addendum #1 The following changes, omissions and/or additions to the Request for Quote Documents shall apply to proposals made for and to the execution of the various parts of the work affected thereby and all other conditions shall remain the same. In case of conflict between Request for Proposal Documents and this Addendum, this Addendum shall govern. Table of Contents Section A: The RFQ Table of Contents incorrectly identified the Vendor Checklist as A.7 and omitted the listing for the Evaluation Criteria. The Table of Contents should have identified the Evaluation Criteria as A.7 and the Vendor Checklist as A.8. The section heading numbers and content were correctly identified in the body of the RFQ as A.7 Evaluation Criteria and A.8 Vendor Checklist B.1 Executive Summary: The final sentence of this section has been corrected from The vendor checklist contained in Section A.7 should follow the Executive Summary. to The vendor checklist contained in Section A.8 should follow the Executive Summary. A.4 Schedule of Events: The deadline for vendor responses is unchanged; all responses are due by Wednesday, April 17, 2013 at 4:00pm. Questions submitted by various prospective proposers: The University s response to each question is as follows: 1. We would like to know more in detail about payment option. If this bid is rewarded to my company, how would HSU pay us? Such as, are you going to pay us monthly bases, quarterly, based on level of completion, or after the completion? Also, we would like to know if there is any pre-bid meeting. Payments will be made based on the terms agreed to in the final contract and associated terms and conditions. If you have payment requirements or preferences, include them with your response to the RFQ. There will not be a pre-bid meeting, but all questions submitted by 4/4/13 will be included in an addendum to the RFQ and sent to all potential vendors on 4/8/ Section A.8 Vendor Checklist: Document Set-Up - The headings listed below are missing from the checklist. Is this purposeful? B.2 Profile ( the sub-sets are displayed: (B.2.1 & B.2.2) B.2 is the heading for B.2.1 & B.2.2; there is nothing to respond to for B.2 alone. HSU_IDM RFQ Addendum 1.docx Page 1
2 C.2 General Characteristics (seems no response is required to this section) C.2 is informational to the vendor to take into consideration when proposing their solution. C.4 Specific Requirements ( the sub-sets are displayed: C.4.1 & C.4.2) C.4 is the introduction to sections C.4.1 & C.4.2; there is nothing to respond to for C.4 alone. D.2 Proposed Schedule Paragraph 3 in section D.1 Proposed Implementation Plan notes that At a minimum, the proposed plan should include a Project Schedule and Timeline including estimated start and end dates, milestones, and accompanying written explanation for complete project implementation Therefore, the information on your proposed schedule should be part of your response to section D.1; section D.2 just reiterates schedule information contained in the project scope and other details informational to the vendor to take into consideration when proposing their solution. D.3 Acceptance Testing D.3 is informational to the vendor to take into consideration when proposing their solution. 3. User Provisioning a. Of the resources to be managed, how are they administered? i. Distributed among departments? No. ii. Geographical areas? No. iii. Centralized IT group? Yes. b. Are employees granted access to systems based on job roles/classifications (i.e. all Level I accounts immediately receive these four standard access )? Yes, initial provisioning to standard accounts (OpenLDAP, Active Directory, Kerberos, Google Apps, Web Servers, Databases) is fully automated based on affiliation. c. Are new employees, students granted access to systems based on a per platform/application need? Initial automated provisioning is all to the same set of systems. Additional provisioning is based upon appropriateness for the role and responsibilities of the position. d. Are the provisioning/de-provisioning processes standard for all resources or do they differ by application? This currently differs by application but our goal in this process is to develop a standard process across all resources. i. If non-standard, please list the resources that are different: In some cases provisioning is done manually in the local system. HSU_IDM RFQ Addendum 1.docx Page 2
3 e. Do you currently have conventions for creating new user accounts for each of the managed platforms/applications (i.e. Lastname, Firstinitial)? FirstInitialMidddleInitialLastInitialNextup# eg, mam87 i. Are new ID s consistent across all platforms? Yes, although users may have additional special privilege accounts that start with the username and have an appended _xxx indicating the type of account and privilege. ii. If not, is this an objective for the project? N/A f. When an employee leaves the company, what is the current process used to remove their access rights from the IT systems? Deprovision report, list of access For Active Directory, Kerberos, and Databases - Where no active affiliations remain, accounts are locked nightly and deleted after 40 days. Access to many systems is provided through a synchronized set of groups in Active Directory and OpenLDAP. Group Membership changes are performed every 4 hours and calculated and rebuilt nightly. Affiliation attributes are also stored in OpenLDAP edupersonaffiliation attributes which are calculated and updated nightly. Other systems which use local groups use manual processes for deprovisioning. Former employees are allowed to keep access to and self-service portals which rely on OpenLDAP for authentication. 4. Identity Data Synchronization Yes, Identity Data including users and groups is in scope and should be synchronized across all directories and target systems. a. Are there exception cases, complex scenarios, or other cases that fall outside a simple synchronization/copy scenario? There are some exception cases that may need to be handled manually. b. Are there rules which require specific accounts to be filtered? No. 5. Password Management a. How will initial passwords be assigned? Random One Time Passwords (OTP) are sent to prospective students home address via US mail. New employee random OTPs are sent via to the address provided to Human Resources during on-boarding. OTPs may not be used to access any system other than the password management interface. OTPs are human readable and must be locked after 5 failed attempts. b. How should subsequent passwords be assigned? Existing campus password strength, re-use, and complexity requirements must be enforced by the password management interface. 6. Reconciliation/Data Correlation HSU_IDM RFQ Addendum 1.docx Page 3
4 a. For the applications and systems that will be managed by the Identity Manager product, are the account names consistent across the platforms? Yes. i. If not, is there a key common to all resources that may be used as a correlation key for linking accounts to an individual? N/A ii. If so, what is the correlation key? Peoplesoft HCM/SA EmplID number. 7. Business Processes and Rules a. Are processes established concerning provisioning workflow? Yes. i. If so, are the processes documented? (Please provide sample workflow diagrams if available) Workflow diagrams are not available at this time. b. Is integration with a problem management (help desk) application required? No. i. If so, which application and what version? We use Kace, but integration is not required at this time. 8. Role Management a. Do you have IT or Business roles defined in your organization? Yes. i. If so, how do you provision these roles today? Through standard provisioning processes using affiliations that are calculated from PeopleSoft. 9. Identity Certification a. Are you currently performing identity certification? No. i. at what frequency? N/A ii. is it manual or automated process N/A b. How do you perform remediation? (e.g. Closed-Loop) N/A 10. Policy Enforcement a. Do you have existing IAM policy that needs to be enforced? N/A b. Do the need to be enforced at provisioning time? N/A c. Are detective scans sufficient to meet your requirements? N/A 11. Technical Infrastructure HSU_IDM RFQ Addendum 1.docx Page 4
5 a. What is the platform(s) on which the Identity Manager product will be installed (product/version)? Dependent on selected product. i. Application Server? Dependent on selected product. ii. Operating System? RHEL 6.3 or Windows server 2008R2/2012 are preferred iii. Database? Oracle 11G is preferred b. What application (include version) will be used for notifications/workflow approval requests? Google Apps for Education 12. Is automated provisioning in scope for this project? If so, please provide detailed requirements for provisioning as section A.2 references replacing an existing provisioning but section C does not provide detail. Yes, initial provisioning is fully automated based on affiliations calculated from data in PeopleSoft. Standard accounts are created in the IdM and populated to the main directories (OpenLDAP, Active Directory, Kerberos) and placed into relevant groups in OpenLDAP and Active Directory. Additionally, accounts are created in our hosted Google Apps for Education domain via Google's Java based API. Further self-service provisioning of web accounts and personal MySQL Databases is also possible for users with eligible affiliations. 13. In section C.4.2 Preferred Requirements, number 1 & 3, can you please provide more detail, specifically around the business goals? (1) Faculty and student governance groups hold elections on a recurring basis using Account Center; (3) Policies internal to the CSU require that we be able to audit our Identity Management system and directories for accuracy. 14. Please confirm the number of end users in scope for the following categories: 7200 is HSU s FTE (Full Time Equivalent) student population per IPEDs. See current headcount below: a. Students 9723 b. Applicants c. Alumni (w/ unexpired passwords) d. Faculty, staff & administration 2293* e. Contractors 42 f. Volunteers included in * above g. Guests 45 h. Former Students/Graduates see alumni i. Former Employees 100 (who are not also current/former students) j. Special purpose accounts (departmental, web, calendar resources) ~ What is the authoritative source of data for each of the defined categories of end users: a. Students Peoplesoft HR/SA HSU_IDM RFQ Addendum 1.docx Page 5
6 b. Applicants Peoplesoft HR/SA c. Alumni Not really tracked, just former student in HR/SA d. Faculty, staff & administration Peoplesoft HR/SA e. Contractors Current IDM system (Account Center) f. Volunteers Peoplesoft HR/SA g. Former Students/Graduates Peoplesoft HR/SA h. Former Employees Peoplesoft HR/SA i. Guests Current IDM system (Account Center) 16. To what degree will the CSU Accessibility Requirements effect the decision making process for this RFQ? Review of accessibility is required for all purchases greater than $15,000. Should the product that most meets our functionality requirements not be accessible, we will be required to develop an equally effective alternative access method and will negotiate with the vendor to develop a roadmap to becoming fully accessible. 17. Please list the other companies that have been invited to participate in this RFQ. VENDOR NAME CONTACT PHONE Advanced Integrated Systems Vera Russell [email protected] Aegis Identity Software, Inc Janet Yarbrough [email protected] AlphaCorp Security Brian Minner [email protected] Bid Ocean, Inc Sherry Ramer [email protected] Brooks Company Dick Brooks [email protected] Carillon Information Security, Patrick Dube [email protected] Inc. Cloupid, Inc. Ryan Champion [email protected] Column Technologies Matt Moore [email protected] Courion Brad Frost [email protected] (508) Dell Inc Cheryl Gardner [email protected] Enable-IT Dennis Rex [email protected] Fischer Gary O'Neill [email protected] FYA Construction James Appleton [email protected] Global Technology Solutions, Kamal Deep [email protected] Inc. Government Technology Kameron Militano [email protected] Solutions GreMark Consultancy, Inc. Gregor Mark [email protected] HEAVENLY TECHNOLOGIES RON BRANDON ron.brandon@heavenlytechnologies net Heritage Global Solutions, Inc. Nicole Buchan [email protected] HSU_IDM RFQ Addendum 1.docx Page 6
7 HOMEFRONT LIGHTING INC TOM TREPANIER Innovative Federal Operations Larry Wick Group, LLC itab ALEX LIM KDJA Services LLC Karen Adams Lasting Impressions Katie Fuller MAXIMUS FEDERAL Franklin Smithson SERVICES mhc ram kumar Microsoft Eric Smith Multicard, Inc. Lindy DeCastro Onvia Kevin Green Oracle Dan Rupinski Smart Tools Byron Siu SUMEDHA Global Computing Manohar Mandadi Sypherlink, Inc. Charlisa Marcum Visionary Integration Professionals (VIP) Kelly Skelton In A2, scope is defined to be serving 7000 Students. The RFP then notes that the solution must also serve applicants, alumni, faculty, staff, guests, contractors, and volunteers (for a total of eight customer populations). So that we can present the requested complete proposal, please provide the approximate number of people in each population and the number of major groups within each. If possible, summarize the requestable resource access required for each population is HSU s FTE (Full Time Equivalent) student population per IPEDs. See current headcount below: a. Students 9723 b. Applicants c. Alumni (w/ unexpired passwords) d. Faculty, staff & administration 2293* e. Contractors 42 f. Volunteers included in * above g. Guests 45 h. Former Students/Graduates see alumni i. Former Employees 100 (who are not also current/former students) j. Special purpose accounts (departmental, web, calendar resources) ~ What are the acceptable platforms available and supported by HSU for hosting the application (OS, DB, etc.). For example, are Windows Server 2008 on VMware ESX and MS SQL 2008 R2 available for hosting the IdM system? VMWare ESX HSU_IDM RFQ Addendum 1.docx Page 7
8 Redhat Enterprise Linux 6 Windows Server 2008R2 or 2012 Oracle 11G MSSQL 20. Are there any other inputs besides those listed we should consider, including 1 - Scheduled queries to PeopleSoft HR PeopleSoft Student PeopleSoft Finance Accounts for guests and contractors are created locally in Identity Management System. 2 - Can you please confirm the versions of all integrated PeopleSoft modules? PeopleSoft versions are currently at version Any web self service functions? Please refer to the RFQ, section C.4.1, item #1 21. So that we can replace as-built functions, if possible please list existing input scripts by function which query PeopleSoft HR, Student, and Financial systems. This detail will be provided to the selected vendor. Please detail the process by which existing input scripts will be replicated using your solution. 22. Are screen shots available for all existing web self service functions so that we can make sure we factor the features and functions you will require we replicate in our proposed solution? Please provide in your response a description of the web self service functions available in the current shipping release of your solution. 23. Are there any other output targets we should consider in addition to those listed, including: AD OpenLDAP Kerberos MySQL Oracle Linux (via listener API) Google (via Java API) No, not for this proposal. If you have a full list of output targets that your solution natively supports, please include it with your response. a. Can you please confirm the versions of all in-scope target resources? AD = Win 2008R2 Servers Active Directory Functional Level 2008 OpenLDAP = Red Hat Enterprise Linux Server release 5.5 (Tikanga) OpenLDAP v 2.3 Kerberos = Red Hat Enterprise Linux Server release 5.9 (Tikanga) Kerberos 5 release MySQL = Red Hat Enterprise Linux Server release 6.4 (Santiago) Red Hat Enterprise Linux Server release 6.4 (Santiago) mysql Ver Distrib , for redhat-linuxgnu (x86_64) using readline 5.1 Oracle = Red Hat Enterprise Linux Server release 5.8 (Tikanga) Oracle Linux = Red Hat Enterprise Linux Server release 6.4 (Santiago HSU_IDM RFQ Addendum 1.docx Page 8
9 Google = Google Apps for Education 24. Please detail number of each target directory and system (for example if there is more than one AD Forest, how many MySQL instances must be supported, etc.) There is one AD Forest. There is one MySQL instance that accounts are provisioned to and one Oracle instance that accounts are provisioned to 25. Please provide details on the target Linux environment, including number of hosts, number of groups and roles supported (so that we can scope effort for the complexity of your environment), and if a directory (such as NIS, NIS+, or LDAP) or if native OS authentication is used today by your as built "listener API interface" currently in use. Currently only our production web server is provisioned via the listener API. Authentication to the Linux server still happens via Kerberos, but the Identity Management System sends over the username of the approved web developer who is to be added and the web site name to the web server via a TCP connection to the listener. The listener process then performs a useradd function to create an account for the new developer, adds them to the group with permission to write to the directory that site lives in, and creates a symbolic link from the user s home directory to that web directory. Other Linux systems use Kerberos authentication with local accounts and group membership for authorization. 26. For C.2.3, describe and quantify the identity management staff who shall be trained and expected to support the system. If available, a link to an organization chart would be ideal. To accurately scope training required, please include a technical summary of the skills for the key internal support staff for the IdM application. The org chart is available at: Primary operational responsibility for Identity Management is with the Enterprise Data Management group. Within that group, Peter Johnson and Jeff Stebbins, who are both programmers and database administrators will need to be trained to support the system. 27. For C Describe the functional requirements and security architecture (specifically authentication accepted by security policy) for the requested SMS password reset functionality. The desired SMS functionality would be for users who have forgotten their password, but have previously entered an SMS number into the IDM system, one password recovery option would be to text the user a temporary one-time password or token to that number that they could use to verify their identity and move forward to resetting their password. 28. For C what platforms are most desirable / common for mobile support (for example, Android tablets, Android phones, IOS tablets, IOS phones, etc.), and is there a mobile device management (MDM) security layer available? If MDM is not available and an open BYOD policy is supported, what authentication standards are required by security policy? If an MDM is implemented, what is the scope (for example Faculty and Staff only). ios phones and tablets, Android phones and tablets, Windows mobile phones and tablets are the most common and desirable. There is no MDM layer. Wireless Network access is authenticated via LDAP by Bradford Impulse Point Network Access Control 29. Regarding C Beyond the listed directories (OpenLDAP, Kerberos, MySQL, Oracle, Linux (via listener API) and Google (via Java API)), are there any additional systems that would need integration within the PW Reset workflow? How are Linux PWs managed? Linux systems authenticate via Kerberos. MS Active Directory is also listed in C.4.1 and should be included HSU_IDM RFQ Addendum 1.docx Page 9
10 30. For C Please list attributes required to manage contractor accounts within IdM, and list systems of reference which should be considered outputs (if any). dn: uid=xxx,cn=users,dc=humboldt,dc=edu uid: xxx uidnumber: xx departmentnumber: xx telephonenumber: xx gidnumber: xx calstateedupersonassurancelevel: 1 calstateedupersonorg: humboldt calstateedupersonprincipalname: xxx homedirectory: xxx userhomequota: xxx sn: Last Name givenname: First Name displayname: First Last Name cn: First Last Name mailhost: smtp server edupersonprimaryaffiliation: Contractor/Consultant calstateedupersonprimaryaffiliation: Contractor/Consultant humboldtedupersonidnumber: ID number humboldtedupersonoperid: xxxx calstateedupersonferpaflag: N edupersonaffiliation: Contractor calstateedupersonaffiliation: Contractor objectclass: inetorgperson objectclass: HSUPerson objectclass: person objectclass: eduperson objectclass: top objectclass: organizationalperson objectclass: inetlocalmailrecipient objectclass: posixaccount objectclass: HSU-Quota objectclass: hsuatistatus objectclass: calstateeduperson userpassword: hash HsuAccountLastUpdated: Regarding C Please document what is required and desirable for Eduperson and CalState Eduperson schema support. See Addendum 1 Exhibit A Person Affiliation Term Map and Addendum 1 Exhibit B calstateedu Attributes for a general overview of eduperson and Calstate Eduperson. HSU supports the first two levels moving from left to right on the map. Further detail is available at: For C Please provide a link to documentation on CAS Single Sign On (including version implemented) and version details for your implementation of Shibboleth SSO. Are either of these extended into mobile operating systems and/or browsers? CAS is currently Shibboleth is currently shibboleth-identityprovider version Both work with all mobile HSU_IDM RFQ Addendum 1.docx Page 10
11 browsers we have tested with and both feed from OpenLDAP, so they should not need direct provisioning from the IDM system 33. Regarding C Please enumerate and describe the functional requirements preferred for the "election" function. Is this a secure survey type of application? Yes, elections function as a secure survey. A defined group (i.e. students or faculty) are presented with a survey where each office or position is a question and the nominated candidates are answers. Each member of that group can answer the survey once. 34. For C Is the expectation that the Vendor or University will be responsible for software distribution and support of Microsoft GINA extensions to AD bound computers? If Vendor responsibility, how many systems are in scope, and what OS versions should be supported? If GINA extensions are required, HSU would be responsible for distribution. Please specify in your response if this type of modification would be required for your solution. 35. Regarding C Does the requested functionality include performing SMS emergency notifications or just collecting numbers for a bulk notification system. If the expectation is for the IdM system to perform emergency notifications, what is the required performance (messages per second)? Just collecting numbers for a bulk notification system 36. How many environments are available of all target systems (for example DEV, TST, PRD)? Development and Production 37. So that we can factor in all software, directory and database interfaces necessary for implementation, what is the desired mean time to repair (MTR) and repair point objective (RPO) for the IdM system? What high-availability data center resources are available? The Identity Management System is considered mission critical, requiring 24/7 service. In the data center we have load balancers and a seven node VMWare cluster available. 38. If the proposed product is not VPAT compatible, is that an automatic exclusion from consideration? The Identity Management System will run in the background and is bassed on user passwords, authentication to AD, etc. Therefore we have not previously gone through the VPAT certification process as there is no interaction required from an end-user other than normal password input. Review of accessibility is required for all our purchases greater than $15,000. Should the product that most meets our functionality requirements not be accessible, we will be required to develop an equally effective alternative access method and will negotiate with the vendor to develop a roadmap to becoming fully accessible. Service password reset functionality needs to be accessible as this solution must be able to serve our disabled student population. Please see section B.5 (Compliance) in the RFQ for further details of the VPAT process. HSU_IDM RFQ Addendum 1.docx Page 11
12 39. Will only providing one Higher Education reference be an automatic exclusion from consideration? Identity Management Systems are relatively new to the Higher Education Industry, therefore referencing two Higher Education references may be a challenge. There are many private sector references available. As noted in section B.3 (System Reference Accounts) of the RFQ, reference accounts must include at least two higher education accounts. 40. Item D.3 references an Acceptance Test. However there is no definition of what this test will entail, or the length of the test. Can vendor s propose a Proof of Concept versus an Acceptance Test? This will minimize risk for Humboldt as the POC would take place before the actual purchase of the Identity Management System. A proof of concept is already outlined in Section. A6 as part of the proposal process. The Acceptance Test mentioned in section D.3. is intended to be part of the sign off process after implementation by the selected vendor. 41. E1 Price Quote. Will Humboldt pay for the software and services based on key Milestones? ie Pay for the software at the beginning of the project and pay for the implementation, installation and training in phases? Yes, this will be formalized during contract negotiations with the selected vendor. While HSU has typically paid for any software licenses upon receipt and any consulting or training as the work is performed and invoiced in past IT contract, payments will be made based on the terms agreed to in this final contract and associated terms and conditions. If you have payment requirements or preferences, include them with your response to the RFQ. 42. It is our goal to create and negotiate mutually acceptable master product agreements (MPA) that our end customers can utilize for future orders. Vendor s MPA is specific to the provision of its software products & services and contains the necessary licensing terms and conditions related to product & services, therefore Vendor prefers to propose and negotiate its standard license/service terms and conditions. Is Humboldt willing to take into consideration Vendor s terms, provided such terms are modified accordingly to address customer s concerns or requirements? As noted in Section B.5 (Compliance) all contracts will be drawn to comply with both CRL063 CSU General Provisions for Information Technology Acquisitions and CSU Supplementary Provisions for Information Technology Acquisitions. Responding vendors are expected to return red-lined copies with their RFQ response, indicating any areas of question or suggested edits. You are welcome to also include a copy of your terms and conditions with your response. HSU_IDM RFQ Addendum 1.docx Page 12
13 Exhibit A: Person Affiliation Term Map
14 Attribute Table - calstateeduperson schema RFQ # Exhibit B version OID (for calstateedu attributes) See Note 1 below attibute type multi-value description Multivalue list of attributes that can NOT be made available to the public. Values = all, meaning all attributes blocked, or a list of attribute names that are calstateedupersonrestrictflag required Y blocked calstateedupersonguid required N A globaly unique 128-bit number represented by a 32 hex character string. This number is a unique identifier for this directory entry, not a unique identifier for the person identified in this entry. See Note 2 below (deleted) OID will not be re-used calstateedupersonaffiliation suggested Y Further refinement of edupersonaffiliation (values = foundation, retired, asi (associated students)) need more input, examples and hints on how to use these. This is a controlled list of values, that can be extended after further discussion calstateedupersonmajor suggested Y Preferred name of the major to be used when displaying entries calstateedupersonmajorcode suggested Y CSU standard major codes calstateedupersonprimaryaffiliation suggested N Further refinement of edupersonprimaryaffiliation (values = foundation, retired, asi (associated students)) need more input, examples and hints on how to use these. This is a controlled list of values, that can be extended after further discussion calstateedupersonstateid suggested N The California ID, a California Drivers License number is the same as a California ID. This can NOT be a state ID from another state calstateedupersonlibraryid suggested N Library identification number assigned according to CSU Library standard calstateedupersonssn suggested N Social Security Number or Taxpayer ID Number calstateedupersonbirthdate suggested N Birth date (YYYYMMDD) e.g calstateedupersonsystemid suggested N A ten character identifier assigned by the CSU system to identify an individual person. Any instance of identity for the same person in any CSU identity system will have the same unique calstateedupersonsystemid. cn required Y First name, suggested middle name or initials, last name, generation qualifier, no title displayname required N Preferred name of the person to be used when displaying entries edupersonaffiliation required Y Everyone is at least a (member or affiliate) member can also be employee, student, or alum employee can be faculty or staff edupersonorgdn required N The DN (in DC naming) of the campus givenname required N First Name mail required N Preferred address for the TO field of to be sent to this person o required 2 Both long and short form of o sn required N Last name commuri suggested Y Labeled URI containing an LDAP URL identifying the directory containing the referenced commobject instance. See commobject specification. description suggested See description in eduperson (200604) edupersonentitlement suggested See description in eduperson (200604) edupersonnickname suggested See description in eduperson (200604) edupersonprimaryorgunitdn suggested See description in eduperson (200604) edupersonorgunitdn suggested See description in eduperson (200604) edupersonprimaryaffiliation suggested See description in eduperson (200604) edupersonprincipalname suggested See description in eduperson (200604) edupersonscopedaffiliation suggested See description in eduperson (200604) edupersontargetedid suggested See description in eduperson (200604) facsimiletelephonenumber suggested See description in eduperson (200604) initials suggested See description in eduperson (200604) jpegphoto suggested See description in eduperson (200604) l suggested See description in eduperson (200604) labeleduri suggested See description in eduperson (200604) manager suggested See description in eduperson (200604) mobile suggested See description in eduperson (200604) Page 1
15 Attribute Table - calstateeduperson schema RFQ # Exhibit B OID (for calstateedu attributes) See Note 1 below attibute type multi-value description ou suggested See description in eduperson (200604) pager suggested See description in eduperson (200604) postaladdress suggested See description in eduperson (200604) postalcode suggested See description in eduperson (200604) postofficebox suggested See description in eduperson (200604) preferredlanguage suggested See description in eduperson (200604) version roomnumber suggested Use this field to hold both building and room number secretary suggested See description in eduperson (200604) seealso suggested See description in eduperson (200604) st suggested See description in eduperson (200604) street suggested See description in eduperson (200604) telephonenumber suggested See description in eduperson (200604) Note international format. title suggested See description in eduperson (200604) uid suggested See description in eduperson (200604) userpassword deferred See description in eduperson (200604) usercertificate deferred See description in eduperson (200604) usersmimecertificate deferred See description in eduperson (200604) Note 1 Note 2 LDAP schema extensions require object identifiers (OID) and names for each of the new objectclasses and attributes. We recommend that each campus obtain an OID for use with their directory at The Chancellor s Office has obtained an OID ( ) for use with the common systemwide definitions. The Technical Architecture Group will manage the CSU system OID. The attribute, calstateedupersonguid, is a unique identifier for the directory instance in which it appears, not an identifier for the person whose identity is described. It is implemented as a time based Global UID (GUID). The algorithm used for generating the GUID guarantees uniqueness, even over time. The GUID is a 128-bit number represented by a 32 hex character string. An example of a GUID is: 7db589fe-9e65-11d5-bbfa d2ae61. The GUID is not considered a string that a person is going to remember or even keep somewhere. It is primarily for use internally within applications. The algorithm for generating this identifier is based on the hardware address of the generating machine and the time in nano-seconds. It is recommended that campuses share best practices and/or implementations. A document explaining this algorithm can be found at Page 2
16 Attribute Table - calstateeduorg OID attribute type multi-value description l required N city o required 2 Both long and short form of o ou required HSU IDM RFQ # Exhibit B version postaladdress required full postal address with "$" to mark line breaks (Cal N Poly $ 1 Grand Avenue $ San Luis Obispo CA 93407) postalcode required N zip code st required N 2 letter state abreviation street required N street address telephonenumber required N " (no dashes)" cn suggested See eduorg (200210) description suggested See eduorg (200210) eduorghomepageuri suggested See eduorg (200210) eduorgidentityauthnpolicyuri suggested See eduorg (200210) eduorglegalname suggested See eduorg (200210) eduorgsuperioruri suggested See eduorg (200210) eduorgwhitepagesuri suggested See eduorg (200210) facsimiletelephonenumber suggested See eduorg (200210) postofficebox suggested See eduorg (200210) seealso suggested See eduorg (200210) Page 3
KACE Appliance LDAP Reference Guide V1.4
KACE Appliance LDAP Reference Guide V1.4 Brandon Whitman Page 1 The purpose of this guide is to help you with both common and advanced LDAP issues related to the KACE appliances. This guide will give you
Single Sign On at Colorado State. Ron Splittgerber
Single Sign On at Colorado State Ron Splittgerber Agenda Identity Management Authentication Authorization The Problem The Solution: Federation Trust Between Institutions Trust Between Institution and Federal
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
MACE-Dir SAML Attribute Profiles
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 MACE-Dir SAML Attribute Profiles April 2008 Document identifier: internet2-mace-dir-saml-attributes-200804a Location: http://middleware.internet2.edu/dir Editors:
How To Create A Financial Aid Independent Verification System At Hsu
Humboldt State University Request for Quote #20101124 Imaging and Document Management Software Solution Addendum #1 The following changes, omissions and/or additions to the Request for Quote Documents
The Integration of LDAP into the Messaging Infrastructure at CERN
The Integration of LDAP into the Messaging Infrastructure at CERN Ray Jackson CERN / IT-IS Group 29 Nov 2000 16:00 CERN IT Auditorium, bldg. 31, 3-005 A bit about me Technical Student Sep 1997-1998 in
Open Source Identity Management
Open Source Management OpenAlt 2015 Radovan Semančík November 2015 Ing. Radovan Semančík, PhD. Software architect Co-owner of Evolveum (open source company) Architect of midpoint project Apache committer
Authentication Authorization Infrastructure
Authentication Authorization Infrastructure Jan Du Caju LUDIT - KULeuvenNet AAI update ldap kerberos Shibboleth LDAP end user ldap servers (in fail-over without password hashes): ldap.kuleuven.be (point
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Novell to Microsoft Conversion: Identity Management Design & Plan
Novell to Microsoft Conversion: Identity Management Design & Plan Presented To: 3/2/2011 1215 Hamilton Lane, Suite 200 Naperville, IL 60540 www.morantechnology.com Voice & Fax: 877-212-6379 Version History
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
User Management Resource Administrator. Managing LDAP directory services with UMRA
User Management Resource Administrator Managing LDAP directory services with UMRA Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted
Password Management Guide
www.novell.com/documentation Management Guide Identity Manager 4.0.2 June 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
TG Web. Technical FAQ
TG Web Technical FAQ About this FAQ We encourage you to contact us if. You can't find the information you're looking for. You would like to discuss your specific testing requirements in more detail. You
Novell Identity Manager
Password Management Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 3.6.1 June 05, 2009 www.novell.com Identity Manager 3.6.1 Password Management Guide Legal Notices Novell, Inc. makes no representations
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5
Shibboleth User Verification Customer Implementation Guide 2015-03-13 Version 3.5 TABLE OF CONTENTS Introduction... 1 Purpose and Target Audience... 1 Commonly Used Terms... 1 Overview of Shibboleth User
The School Board of Palm Beach
Project Change Request Customer Name: County, Florida Customer Number: 6873401 The School Board of Palm Beach Reference Agreement: Florida State Term Software contract: 252-008-05-ACS Contract #: CFTJQOP
Identity Management in Quercus. CampusIT_QUERCUS
Identity Management in Quercus Student Interaction. Simplified CampusIT_QUERCUS Document information Document version 1.0 Document title Identity Management in Quercus Copyright All rights reserved. No
NetIQ Identity Manager
NetIQ Identity Manager Management Guide October 2014 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR A
Aurora Hosted Services Hosted AD, Identity Management & ADFS
22/09/2013 Aurora Hosted Services Hosted AD, Identity Management & ADFS 1 Service Overview - Hosted Identity Management Core provides a fully managed solution hosted in Azure and connected directly to
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources
Federated Identity: Leveraging Shibboleth to Access On and Off Campus Resources Paul Riddle University of Maryland Baltimore County EDUCAUSE Mid-Atlantic Regional Conference January 16, 2008 Copyright
INFORMATION TECHNOLOGY SERVICES A GUIDE TO SUCCESSFUL SOFTWARE ACQUISITION
INFORMATION TECHNOLOGY SERVICES A GUIDE TO SUCCESSFUL SOFTWARE ACQUISITION The ITS Project Office has prepared this set of guidelines to help staff and faculty navigate the HSU software acquisition process.
UNIL Administration. > Many databases and applications:
Directories at UNIL UNIL Administration > Many databases and applications: > ResHus: contracts with Etat de Vaud > SAP: other contracts > Immat: students > Physical persons in a single table > Moral persons
Georgia Tech Active Directory Policy
Georgia Tech Active Directory Policy Policy No: None Rev 1.1 Last Revised: April 18, 2005 Effective Date: 02/27/2004 Last Review Date: April 2005 Next Review Date: April 2006 Status Draft Under Review
P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc.
P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. Product Category: Password Management/Provisioning Validation Date: TBD Product Abstract M-Tech software streamlines
IDENTITY MANAGEMENT ROLLOUT: IN A HURRY. Jason Blackader, UNIX Systems Administrator
IDENTITY MANAGEMENT ROLLOUT: IN A HURRY Jason Blackader, UNIX Systems Administrator Undergraduate, Graduate, Continuing Ed Industrial Design, Communication Design, Design Sciences, Arts & Media Two Campuses
STRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
DirX Identity V8.5. Secure and flexible Password Management. Technical Data Sheet
Technical Data Sheet DirX Identity V8.5 Secure and flexible Password Management DirX Identity provides a comprehensive password management solution for enterprises and organizations. It delivers self-service
aaps algacom Account Provisioning System
aaps algacom Account Provisioning System Simple web interface, data integrity checks and customizable policies allow account administration without specific skills Account provisioning against Active Directory
Administration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
YubiRADIUS Deployment Guide for corporate remote access. How to Guide
YubiRADIUS Deployment Guide for corporate remote access How to Guide May 15, 2012 Introduction Disclaimer Yubico is the leading provider of simple, open online identity protection. The company s flagship
Canadian Access Federation: Trust Assertion Document (TAD)
Participant Name: University of Lethbridge 1. Purpose A fundamental requirement of Participants in the Canadian Access Federation is that they assert authoritative and accurate identity attributes to resources
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Security with LDAP. Andrew Findlay. February 2002. Skills 1st Ltd www.skills-1st.co.uk. [email protected]
Security with LDAP Andrew Findlay Skills 1st Ltd www.skills-1st.co.uk February 2002 Security with LDAP Applications of LDAP White Pages NIS (Network Information System) Authentication Lots of hype How
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
QuickStart Guide for Managing Mobile Devices. Version 9.2
QuickStart Guide for Managing Mobile Devices Version 9.2 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF
Measurably reducing risk through collaboration, consensus & practical security management. 2013 CIS Security Benchmarks 1
Measurably reducing risk through collaboration, consensus & practical security management 2013 CIS Security Benchmarks 1 Background City University of New York s Rights and Benefits as a CIS Security Benchmarks
Password Management Buyer s Guide. FastPass Password Manager V 3.3 Enterprise & Service Provider Editions
Password Management Buyer s Guide FastPass Password Manager V 3.3 Enterprise & Service Provider Editions FastPassCorp 2010 FPC0 FastPassCorp 2010. Page 1 Requirements for Password Management including
Apache Syncope OpenSource IdM
Apache Syncope OpenSource IdM Managing Identities in Enterprise Environments Version 1.3 / 2012-07-26 Apache Syncope OpenSource IdM by http://syncope.tirasa.net/ is licensed under a Creative Commons Attribution
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory. Overview August 2008
Manage Oracle Database Users and Roles Centrally in Active Directory or Sun Directory Overview August 2008 Introduction... 3 Centralizing DataBase Account Management using Existing Directories with OVD...
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
HP Service Manager. Software Version: 9.40 For the supported Windows and Linux operating systems. Application Setup help topics for printing
HP Service Manager Software Version: 9.40 For the supported Windows and Linux operating systems Application Setup help topics for printing Document Release Date: December 2014 Software Release Date: December
RFP BOR-1511 Federated Identity Services - Response to Questions / Answers
Q # 1 RFP BOR-1511 Federated Identity Services - Response to Questions / Answers Under Technical Requirements the following requirement is listed: 2. The solution is cloud-based softwareas-a-service, requiring
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
IAM, Enterprise Directories and Shibboleth (oh my!)
IAM, Enterprise Directories and Shibboleth (oh my!) Gary Windham Senior Enterprise Systems Architect University Information Technology Services [email protected] What is IAM? Identity and Access
University of Maine System Active Directory Services - RFP# 2016-027 ADDENDUM #01
QUESTIONS 1. On page 12 of the RFP, it mentions the use of a Custom Identity Management (IdM) solution. Could you please share with us the platform and nature of the IdM System or any other relevant details,
Technology Consulting
Dallas Area Rapid Transit Authority Dallas, Texas EHIBIT H STATEMENT OF WORK Technology Consulting Purpose Dallas Area Rapid Transit (DART) is seeking a master service agreement with two qualified Contractors
Business and Process Requirements Business Requirements mapped to downstream Process Requirements. IAM UC Davis
Business and Process Requirements Business Requirements mapped to downstream Process Requirements IAM UC Davis IAM-REQ-1 Authorization Capabilities The system shall enable authorization capabilities that
identity management in Linux and UNIX environments
Whitepaper identity management in Linux and UNIX environments EXECUTIVE SUMMARY In today s IT environments everything is growing, especially the number of users, systems, services, applications, and virtual
Identity and Access Management (IAM) Roadmap DRAFT v2. North Carolina State University
Identity and Access Management (IAM) Roadmap DRAFT v2 North Carolina State University April, 2010 Table of Contents Executive Summary... 3 IAM Dependencies... 4 Scope of the Roadmap... 4 Benefits... 4
Project Management RFQ 90058. Common Financial System: Security Consultant. Introduction. Environment Overview. The Common Financial System (CFS)
www.calstate.edu Common Financial System: Security Consultant Introduction The California State University (CSU), Office of the Chancellor seeks to identify a consulting partner for its Oracle Enterprise
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider)
Williamson County Technology Services Technology Project Questionnaire for Vendor (To be filled out withprospective solution provider) General Project Questions Please provide the proposed timeline estimate:
CUSTOMER SAP Afaria Overview
SAP Afaria 7 SP15 Document Version: 1.0 2016-06-13 CUSTOMER Content 1 Afaria Overview....3 1.1 About Afaria....3 1.2 Afaria Access and Support....4 1.3 Finding Information....5 2 Afaria Architecture....7
OFFICE OF KNOWLEDGE, INFORMATION, AND DATA SERVICES (KIDS) DIVISION OF ENTERPRISE DATA
OFFICE OF KNOWLEDGE, INFORMATION, AND DATA SERVICES (KIDS) DIVISION OF ENTERPRISE DATA Technical Guide Active Directory/Infinite Campus Integration in the KETS Environment Version 1.3 February 24, 2015
Active Directory at the University of Michgan. The Michigan Way Since 2000
Active Directory at the University of Michgan The Michigan Way Since 2000 Introductions Who I am: Christina Fleming (cmhf) Who you are: Your Name Your Department How long have you worked with AD? What
PrinterOn Print Management Overview
PrinterOn Print Management Overview Table of Contents 1. PrinterOn and Print Management Overview... 4 1.1. Combined PrinterOn and Print Management Capabilities... 5 1.1.1. Comprehensive Workflow Tracking
Centralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan [email protected] Principal Security Consultant Kevin Moulton [email protected] Senior Manager,
identity management identified
DARRELL FUHRIMAN identity management identified Based in Portland, Oregon, Darrell has been managing UNIX systems for nearly thirteen years in a wide variety of environments. This fall he will be changing
Active Directory Synchronization Tool Architecture and Design
Active Directory Synchronization Tool Architecture and Design Revised on: March 31, 2015 Version: 1.01 Hosting Controller www.hostingcontroller.com Contents Proprietary Notice... 1 1. Introduction... 2
econtrol 3.5 for Active Directory & Exchange Administrator Guide
econtrol 3.5 for Active Directory & Exchange Administrator Guide This Guide Welcome to the econtrol 3.5 for Active Directory and Exchange Administrator Guide. This guide is for system administrators and
Request for Proposal MDM0031012338. Offeror s Questions for RFP for Virtual Private Network Solution (VPN)
Request for Proposal MDM0031012338 Offeror s Questions for RFP for Virtual Private Network Solution (VPN) 1. How much throughput must the VPN support long-term? Answer: 10 GB firewall, 4 GB 3DES/AES VPN
Migrating application users and passwords with Password Manager
Migrating application users and passwords with Password Manager 2015 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Migrating Users 1 3 Initializing Passwords 2 4 Maintaining
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Outline 1. What is authentication? a. General Informations 2. Authentication Systems in Linux a. Local
NetWrix Account Lockout Examiner Version 4.0 Administrator Guide
NetWrix Account Lockout Examiner Version 4.0 Administrator Guide Table of Contents Concepts... 1 Product Architecture... 1 Product Settings... 2 List of Managed Domains and Domain Controllers... 2 Email
Cloudwork Dashboard User Manual
STUDENTNET Cloudwork Dashboard User Manual Make the Cloud Yours! Studentnet Technical Support 10/28/2015 User manual for the Cloudwork Dashboard introduced in January 2015 and updated in October 2015 with
: IBM Tivoli Identity Manager V4.5 Implenentation
Exam : IBM 000-797 Title : IBM Tivoli Identity Manager V4.5 Implenentation Version : R6.1 Prepking - King of Computer Certification Important Information, Please Read Carefully Other Prepking products
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Administration Guide BES12. Version 12.3
Administration Guide BES12 Version 12.3 Published: 2015-10-30 SWD-20151028105551254 Contents Introduction... 11 About this guide...12 How to use this guide... 13 Steps to administer BES12... 13 Examples
ShoreTel Active Directory Import Application
INSTALLATION & USER GUIDE ShoreTel Active Directory Import Application ShoreTel Professional Services Introduction The ShoreTel Active Directory Import Application allows customers to centralize and streamline
Managing users. Account sources. Chapter 1
Chapter 1 Managing users The Users page in Cloud Manager lists all of the user accounts in the Centrify identity platform. This includes all of the users you create in the Centrify for Mobile user service
SNOW LICENSE MANAGER (7.X)... 3
SYSTEM REQUIREMENTS Products Snow License Manager Snow Automation Platform Snow Device Manager Snow Inventory Server, IDR, IDP Mobile Information Server Client for Windows Client for Linux Client for Unix
Workday Mobile Security FAQ
Workday Mobile Security FAQ Workday Mobile Security FAQ Contents The Workday Approach 2 Authentication 3 Session 3 Mobile Device Management (MDM) 3 Workday Applications 4 Web 4 Transport Security 5 Privacy
How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance
An Oracle Technical White Paper November 2014 How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance Table of Contents Introduction...3 Active Directory LDAP Services...4
STATE OF NEW YORK IT Transformation. Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses
STATE OF NEW YORK IT Transformation Request For Information (RFI) Enterprise Identity and Access Management Consolidated Questions and Responses June 8, 2012 Appendix B Consolidated Vendor Questions with
NetIQ Identity Manager Setup Guide
NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Server Software Installation Guide
Server Software Installation Guide This guide provides information on...... The architecture model for GO!Enterprise MDM system setup... Hardware and supporting software requirements for GO!Enterprise
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
Sophos Mobile Control Administrator guide. Product version: 3
Sophos Mobile Control Administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for managing
Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
