IBM MQ Connection Authentication
|
|
|
- Irene Fleming
- 10 years ago
- Views:
Transcription
1 IBM MQ Connection Authentication Morag Hughson Agenda Requests for nhancement Connection Authentication Configuration Application Changes (or not) Protecting your password across a network User Repositories
2 Request for nhancement (22568) Request for nhancement (30709)
3 Connection Authentication What is it? Application (User4) MQCX User3 + pwd3 he ability for an application to provide a user ID and password Client Local Bindings ome configuration in the queue manager to act upon said user ID and password etwork A user repository that knows whether the user ID and password are a valid combination Application (User2) QMgr MQCX User1 + pwd1 Inter process Q1 Authority Checks User Repository Connection Authentication What is it? otes his picture shows the landscape we re going to use to discuss various patterns and then the changes in Webphere MQ V8 in order to support these patterns. Just to ensure everyone is familiar with the parts on the diagram we ll briefly look at them first from left to right. n the left of this picture we see applications making connections, one as a client and one using local bindings. hese applications could be using a variety of different APIs to connect to the queue manager, but all have the ability to provide a user ID and a password. he user ID that the application is running under (the classic user ID presented to Webphere MQ) may be different from the user ID provided by the application along with its password, so we illustrate both on the diagram. In the middle we have a queue manager with configuration commands and managing the opening of resources and the checking of authority to those resources. here are lots of different resources in Webphere MQ that an application may require authority to, in this diagram we are just going to use the example of opening a queue for output, but the same applies to all others. n the right we have a representation of a user repository i.e. containing user IDs and passwords, more on this later.
4 Configuration Application (User4) MQCX User3 + pwd3 etwork CHCK PIAL RQUIRD RQDADM MQRC AUHRIZD (2035) ALR DFI QMGR CAUH(U.PW) AUHIF(U.PW) AUHYP(xxxxxx) FAILDLAY(1) CHCKLCL(PIAL) CHCKCL(RQUIRD) RFRH CURIY YP(CAUH) Application (User2) QMgr MQCX User1 + pwd1 Inter process MQRC_ (0) Configuration otes We ll start with the basic configuration side of things. How do I turn on this connection authentication feature on the queue manager. n the queue manager object there is a new attribute called CAUH (short for connection authentication) which points to an object name. he object name it refers to is an authentication information object one of two new types. here are two existing types of authentication information objects from earlier releases of Webphere MQ, these original two types cannot be used in the CAUH field. he two new types are similar in quite a few of the basic attributes so we will look at those first. We ll come back to more of the attributes later. We show here a new authentication information object which has two fields to turn on user ID and password checking, CHCKLCL (Check Local connections) and CHCKCL (Check Client connections). Changes to the configuration of this must be refreshed for the queue manager to pick them up. Both of these fields have the same set of attributes, allowing for a strictness of checking. You can switch it off entirely with ; set it to PIAL to ensure that if a user ID and password are provided by an application then they must be a valid pair, but that it is not mandatory to provide them a useful migration setting perhaps; set it to RQUIRD to mandate that all applications provide a user ID and password; and, only on Distributed, RQDADM which says that privileged users must supply a valid user ID and password, but non-privileged users are treated as per the PIAL setting. Any application that does not supply a user ID and password when required to, or supplies an incorrect combination even when it is optional will be told 2035 (MQRC AUHRIZD)..B. When password checking is turned off using then invalid passwords will not be detected.
5 Connection Failure Delay ALR DFI QMGR CAUH(U.PW) AUHIF(U.PW) AUHYP(xxxxxx) FAILDLAY(1) CHCKLCL(PIAL) CHCKCL(RQUIRD) RFRH CURIY YP(CAUH) Application (User2) QMgr MQCX User1 + pwd1 Connection seconds MQRC AUHRIZD (2035) Connection Failure Delay - otes Any failed authentications will be held for the number of seconds in the FAILDLAY attribute before the error is returned to the application just some protection against a busy loop from an application repeatedly connecting.
6 Configuration Granularity Application (User4) MQCX User3 + pwd3 Clear etwork CHCKCL AQMGR RQUIRD RQDADM MQRC AUHRIZD (2035) DFI AUHIF(U.PW) AUHYP(xxxxxx) CHCKCL(PIAL) CHLAUH( * ) YP(ADDRMAP) ADDR( * ) URRC(CHAL) CHCKCL(RQUIRD) CHLAUH( * ) YP(LPRMAP) LPR( C=* ) URRC(CHAL) CHCKCL(AQMGR) User's Digital Certificate Application (User2) CA ig MQCX User1 + pwd1 L/L etwork QMgr MQRC_ (0) Configuration Granularity otes In addition to the two fields that turn this on overall for client and locally bound applications, there are enhancements to the CHLAUH rules so that more specific configuration can be made using CHCKCL. You can set the overall CHCKCL value to PIAL, and then upgrade it to be more stringent for certain channels by setting CHCKCL to RQUIRD or RQDADM on the CHLAUH rule. By default, CHLAUH rules will run with CHCKCL(AQMGR) so this granularity does not have to be used.
7 Relationship to Authorization Application (User4) MQCX User3 + pwd3 MQP ALR QMGR CAUH(U.PWD) DFI AUHIF(U.PWD) AUHYP(xxxxxx) CHCKLCL(PIAL) CHCKCL(RQUIRD) ADPCX(Y) etwork Application (User2) MQCX User1 + pwd1 MQP Inter process QMgr Q1 Authority Checks Authority Records Q1: User1 +put Q1: User2 +none Q1: User3 +get Q1: User4 +none Relationship to Authorization otes o we have seen that we can configure our queue manager to mandate user IDs and passwords are provided by certain applications. We know that the user ID that the application is running under may not be the same user ID that was presented by the application along with a password. o what is the relationship of these user IDs to the ones used for the authorization checks when the application, for example, opens a queue for output. here are two choices, in fact, controlled by an attribute on the authentication information object ADPCX. You can choose to have applications provide a user ID and password for the purposes of authenticating them at connection time, but then have them continue to use the user ID that they are running under for authorization checks. his may be a useful stepping stone when migrating, or even a desirable mode to run in, perhaps with client connections, because authorization checks are being done using an assigned MCAUR based on IP address or L/L certificate information. Alternatively, you can choose the applications to have all subsequent authorization checks made under the user ID that you authenticated by password by selecting to adopt the context as the applications context for the rest of the life of the connection. If the user ID presented for authentication by password is the same user ID that the application is also running under, then of course this setting has no effect.
8 Adopting User - Interaction with CHLAUH Method Client machine user ID flowed to server otes his will be over-ridden by anything else. Rarely do you want to trust an unauthenticated client side user ID. MCAUR set on VRC channel definition MCAUR set by ADPCX(Y) MCAUR set by CHLAUH rule MCAUR set by ecurity xit A handy trick to ensure that the client flowed ID is never used is to define the MCAUR as rubbish and then anything that is not set appropriately by one of the next methods cannot connect. he queue manager wide setting to adopt the password authenticated user ID as the MCAUR will over-ride either of the above. o allow more granular control of MCAUR setting, rather than relying on the above queue manager wide setting, you can of course use CHLAUH rules Although CHLAUH gets the final say on whether a connection is blocked (security exit not called in that case), the security exit does get called with the MCAUR CHLAUH has decided upon, and can change it. Adopting User - Interaction with CHLAUH - otes here are numerous ways that the running user can be set for a VRC channel, i.e. the user which is representing the client application when it is running on the queue manager machine. he ADPCX(Y ) attribute that we just saw is yet another one. How do all these different ways of setting the MCAUR on the VRC interact. here is an order of events and certain ways of setting the MCAUR over-ride others. he table shows the order.
9 Application changes Application (User4) MQCX User3 + pwd3 Code changes Procedural MQCP on MQCX classes MQnvironment JM/XM createconnection XApen string etwork Alternatively xits can provide MQCP Client side security exit Provided Client side Pre-conn exit Application (User2) QMgr MQCX User1 + pwd1 Inter process Application changes otes ince Webphere MQ V6.0, an application has been able to provide a user ID and password (in the Connection ecurity Parameters (MQCP) structure in the MQC) at MQCX time. hese were passed to a user written plug-point in the AM on distributed to be checked. If the application was running client bound, this user ID and password were also passed to the client side and server side security exits for processing and can be used for setting the MCAUser attribute of a channel instance. he security exit is called with xitreason MQXR_C_PARM for this processing. his pre-existing feature of the MQI is being used to provide the user ID and password to the queue manager for checking. Previously a custom Authorization ervice was required to check this (or a security exit if the applications were connecting as clients), now the bject Authority Manager (AM) supplied with the queue manager and the z/ ecurity component within the queue manager will deal with these user IDs and passwords. Whether z/ or distributed, the component that deals with the user IDs and passwords will call out to a facility outside of MQ to do the check more on that later. In Webphere MQ V8 this will be available in all our interfaces listed, even where some of those were not made available in the Webphere MQ V6 timeframe when the programming interface was originally provided. In prior releases the MQCP had no architected limits on the user ID and password strings that were provided by the application. When using them with these MQ provided features there are limits which apply to the use of these features, but if you are only passing them to your own exits, those limits do not apply. he XApen string has also been updated to allow the provision of a user ID and password. ometimes of course, it can be hard to get changes into applications, so the user ID and password can be provided using an exit instead of changing the code. Client side security exits or the pre-connect exit, can make changes to the MQC before it is sent to the queue manager, and the security exit in fact is designed to allow the setting of the MQCP since V6 (so clients do not need to be updated to the new version in order to use this).
10 Procedural MQI changes MQCP structure Connection ecurity Parameters User ID and password MQC structure Connection ptions Webphere MQ V6 Passed to AM (Dist only) Also passed to ecurity xit Both z/ and Distributed MQXR_C_PARM MQC cno = {MQC_DFAUL}; cno.version = MQC_VRI_5; cno.ecurityparmsptr = &csp; MQCX(QMame, &cno, &hconn, &CompCode, &Reason); Webphere MQ V8 Acted upon by the queue manager (all platforms) MQCP csp = {MQCP_DFAUL}; csp.authenticationype = MQCP_AUH_UR_ID_AD_PWD; csp.cpuseridptr = "hughson"; csp.cpuseridlength = 7; /* Max: MQ_CLI_UR_ID_LGH */ csp.cppasswordptr = "passw0rd"; csp.cppasswordlength = 8; /* Max: MQ_CP_PAWRD_LGH */ bject riented MQ classes changes MQnvironment.properties = new Hashtable(); MQnvironment.userID = "hughson"; MQnvironment.password ="passw0rd"; ystem.out.println("connecting to queue manager"); MQQueueManager qmgr = new MQQueueManager(QMame); JM/XM classes changes cf = getcf(); ystem.out.println("creating the Connection with UID and Password"); Connection conn = cf.createconnection("hughson", "passw0rd");
11 Using it from the MQ xplorer GUI Using it from the MQ xplorer GUI otes he Webphere MQ xplorer GUI is an MQ Java application, so since there is a programming interface for MQ Java to supply a user ID and password, the xplorer GUI can use this. o configure the xplorer to use a user ID and password on a connection to a queue manager (whether local or client connection), select Connection Details->Properties from the rightmouse context menu on the queue manager. In the dialog that appears, choose UserId. his panel is the same for both local or client connections in Webphere MQ V8, although the Properties dialog will have less selections for other things in the local case. xplorer has a password cache which will need to be enabled in order to use passwords. If you have never used it before there will be a link on this panel to take you through it. he other interesting item here is the User identification compatibility mode check box. his is for those of you who have been using ecurity exits with the xplorer in the past. he Java client previously did not use the MQCP structure to supply its user ID and password in previous releases, and there are many exits written that have discovered where the user ID and password were provided instead. In order to retain compatibility for this, the Java client has two modes. It can run in compatibility mode and maintain what you had before, or it can run with the V8 mode and use the MQCP. he check box shown is how you set that property in the xplorer GUI. For other Java applications, you need to set property to indicate you are happy to use the MQCP method. At the queue manager, if no MQCP is sent by a client, but the user ID and password are provided in this alternate method that was utilised by Java Clients, the V8 queue manager will accept this and drive the same password check as is used for the MQCP provided passwords.
12 Using MQCP from Java Client Java client (not local bindings) has two ways to send password FAP Flow MQCP structure FAP Flow Mechanism used by many customer security exits Retained as default Restricted to 8 characters user IDs and passwords ot protection by password protection algorithm Used by Connection Authentication if seen and no MQCP found MQCP structure Used by Java Client when property set on-default Allows longer user IDs and passwords Can be protection by password protection algorithm MQ Classes for Java set the property MQConstants.U_MQCP_AUHICAI_PRPRY to true in the properties hashtable passed to the com.ibm.mq.mqqueuemanager constructor. MQ Classes for JM set the property JMConstants.UR_AUHICAI_MQCP to true on the appropriate connection factory prior to creating the connection Globally set the ystem Property "com.ibm.mq.cfg.jmqi.usemqcpauthentication" to a value indicating true, for example by adding "-Dcom.ibm.mq.cfg.jmqi.useMQCPauthentication=Y" to the command line Using MQCP from Java - otes We saw on a previous page the example code you might use to provide the user ID and password from a Java classes application or a JM application. his is actually nothing new. Java clients have been able to send a user ID and password across the channel FAP before. his part of the FAP was very restrictive though, it only allowed or 8 character user IDs and 8 character passwords. And, of course, it was only for clients. he MQCP interface was designed not to have such limitations. here are quite a number of customers pre-v8 who have security exits written to pull the user ID and password sent by Java clients in this way. Because of this, we could not change the default of the Java clients over to use the MQCP or all these security exits would have to be changed. o by default, Java clients continue to send the user ID and password as this restrictive FAP flow. n the queue manager end, if we receive a user ID and password in this FAP flow, and no MQCP structure, we will use the user ID and password in the FAP flow for Connection Authentication, so you don t have to make any changes in order to remove a security exit that is checking the user ID and password in this way. However, there are benefits to using the MQCP structure, including password protection and the increased length of the fields, so when you are ready to change over to use MQCP instead of the FAP flow in a Java client, you need to set the system property.
13 Client side ecurity xit mqccred.ini AllQueueManagers: User=abc password=newpw QueueManager: ame=qma User=user1 password=passw0rd ool: runmqccred mqccred.ini AllQueueManagers: User=abc PW=%^&aervrgtsr QueueManager: ame=qm1 User=user1 PW=H&^dbgfh File permissions Application MQC xit: mqccred etwork xit can be used by clients from V7.0.1 and later (by copying from a V8 installation) QMgr QM1 Client side ecurity xit otes o make changes to applications, especially the very prevalent client attached applications where we see the strongest use case for using user ID and password, is difficult for customers. o aid with this issue, Webphere MQ V8 provides a client side security exit which can set the user ID and password instead of making changes in the application to do this. he exit runs at the CLC end of the channel and pulls the user ID and the password from a file. his file is controlled by means of file permissions. If the exit discovers that the file permissions are too open, it will cause a failure thus ensuring that this important part of protecting the passwords does not go unnoticed. he file is additionally obfuscated from casual browsers. he algorithm for this obfuscation is not published, and neither is the source of the exit. he exit will be built in such a way that it can be picked up from a V8 installation and copied to a V7.0.1 client installation (or later). ote that using a client installation of < V8 will mean you have the password flowed in the clear. nly V8 and later at both ends will provide the ability to protect the flowed password without the need to use L/L. Along with the exit, we also supply a tool which is used to obfuscate the file containing the passwords. ee blog post:- q_v8_mqccred_exit
14 Protecting your password across a network Use L/L Perhaps with anonymous clients If no L/L If both ends are V8 MQ Code will protect the password so not sent in the clear Application MQC etwork QMgr QM1 If client is < V8 o MQ password protection Consider L/L Protecting your password across a network otes When an application connects to a Webphere MQ V8 queue manager across the network, i.e. making a client connection, the password it sends for connection authentication purposes travels across the network from the client application to the queue manager for checking. his password should be protected as it does so, so that network sniffers cannot obtain your password. For best possible protection, you can of course use L/L. You might imagine using anonymous L/L, i.e. the client does not have a certificate, since you are using user ID and password as the means by which to verify the identity of the client application. If you do not use L/L, and your client is at V8.0 or later, the Webphere MQ product code will protect your password so that it is not sent in the clear. A good reason to get your clients upgraded to V8! If your Webphere MQ Client is at a version earlier than V8.0, it can still send user ID and passwords (since the MQCP structure has been around since V6) but the password will not be protected, so you should consider using L/L.
15 MQ amples/ools that can use it MQ xplorer (earlier page) runmqsc ew -u parameter and password prompt C samples amqscnxc ew -u parameter and password prompt amqsput(c), amqsget(c) and amqsbcg(c) Positional parameters Use MQAMP_UR_ID=<userid> to provide user ID and cause password prompt JM samples JmsProducer and JmsConsumer ew -u and -w parameters to supply user ID and password respectively 5724-H72 (C) Copyright IBM Corp. 1994, nter password: ******** tarting MQC for queue manager 1. C:\>set MQAMP_UR_ID=hughson C:\>amqsput Q1 1 ample AMQPU0 start nter password: passw0rd target queue is Q1 Message ext Password hidden BWAR! Password not hidden MQ amples/ools that can use it - otes here are various tools and samples that are part of MQ where you can supply a user ID and password when they connect to MQ. We already saw the screenshots of MQ xplorer on an earlier page. he runmqsc tool, which in MQ V8 can run as a client or as a locally bound connection, has been updated to take a new parameter -u, which supplies your user ID, and then prompt you for a password. his password prompt will also hide your password as you type it so no-one can look over you shoulder! Various samples have also been updated, in varying ways, to allow you to provide a user ID and password when using them. We ve tried to update the samples we thought were most likely to be used by our customers, without updating every single one. he samples don t contain code to hide the password when it is being typed in. his was code that would detract from the purpose of the sample which is to show how to write MQ applications. ee blog posts:- _can_use_user_id_and_password qsc
16 rror notification Application (User4) Application MQRC AUHRIZD (2035) MQCX User3 + pwd3 MQRC AUHRIZD (2035) Administrator rror message YM.ADMI.QMGR.V ALR QMGR AUHRV(ABLD) Monitoring ool ot Authorized vent message (ype 1 Connect) MQRQ_C AUHRIZD (existing) Connection not authorized. MQRQ_CP AUHRIZD (new) User ID and password not authorized. Additional field to existing connect event MQCACF_CP_UR_IDIFIR rror notification otes When an application provides a user ID and password which fail the password check, the application is returned the standard MQ security error, 2035 MQRC AUHRIZD. he MQ administrator will see this reported in the error log and can therefore see that the application was rejected due to the user ID and password failing the check, rather than, for example, a lack of connection authority (+connect). A monitoring tool can also be notified of this failure if authority events are on - ALR QMGR AUHRV(ABLD) via an event message to the YM.ADMI.QMGR.V queue. his ot Authorized event is a ype 1 Connect event and provides all the same fields as the existing ype 1 event, along with one, additional field, the MQCP user ID provided. he password is not provided in the event message. his means that there are two user IDs in the event message, the one the application is running as and the one the application presented for user ID and password checking.
17 rror Messages Incorrect password Distributed - AMQ5534: User ID 'hughson' authentication failed Followed by AMQ5542 (giving hint for why) z/ MR - RACF ICH408I message r equivalent for other xternal ecurity Managers Issue DIPLAY CURIY for current CAUH settings Missing password Distributed - AMQ5540: Application 'D:\nttools\q.exe' did not supply a user ID and password z/ MR - CQH045 cpf csect app-identifier did not provide a password app-identifier has different contents for locally bound app and client app. Missing password due to CHLAUH CHCKCL upgrade Distributed - AMQ9791: he client application did not supply a user ID and password. z/ CHI - CQX791I cpf csect Client application app-name from address ip-address did not supply a user ID and password, Detail: conndetails rror Messages - otes his feature introduces some new error messages that it is helpful to be aware of to allow you to work out why your application is receiving an MQRC AUHRIZD (2035) reason code. ee also blog post:- ogging_mq_v8_connection_authentication_on_z_os
18 User Repositories DFI AUHIF(U.) AUHYP(IDPW) DFI AUHIF(U.LDAP) AUHYP(IDPWLDAP) CAM( ldap1(389),ldap2(389) ) LDAPUR( C=QMGR1 ) LDAPPWD( passw0rd ) CCMM(Y) etwork LDAP erver (Dist only) Application (User2) MQCX User1 + pwd1 QMgr n z/ passphrases can be used / User Repository (z/ + Dist) User Repositories otes o far we have spoken about user ID and password authentication without mentioning what is actually doing the authentication. We ve also shown that there is a new type of authentication information object without showing you the object type. Here we introduce two new object types of authentication information objects. he first type is used to indicate that the queue manager is going to use the local / to authentication the user ID and password. his type is IDPW. his includes the use of password phrases on z/ he second type is used to indicate that the queue manager is going to use an LDAP server to authenticate the user ID and password. his type is IDPWLDAP and is not applicable on z/. nly one type can be chosen for the queue manager to use by naming the appropriate authentication information object in the queue manager s CAUH attribute. We have already covered everything there is to say about the configuration of the / as the user repository as the common attributes are all there is for the /. here is more to say about the LDAP server as an option though. ome of the LDAP server configuration attributes are probably fairly obvious. he CAM is how the queue manager knows where the LDAP server is, and CCMM controls whether connectivity to the LDAP server will be done using L/L or not. he LDAPUR and LDAPPWD attributes are how the queue manager binds to the LDAP server so that it can look-up information about user records. It is likely this may be a public area of an LDAP server, so these attributes may not be needed. It is worth highlighting that the CAM field can be used to provide additional addresses to connect to for the LDAP server in a comma-separated list. his can aid with redundancy if the LDAP server does not provide such itself.
19 ecure connection to an LDAP erver QM's Digital Certificate CA ig LKYR ALR QMGR CAUH(U.LDAP) LFIP() UIB() CRLABL( ibmwebspheremqqm1 ) LKYR('var/mqm/qmgrs/QM1/ssl/key') DFI AUHIF(U.LDAP) AUHYP(IDPWLDAP) CCMM(Y) CAM( ldapserver(389) ) etwork LDAP erver DIPLAY QMAU LDAPC ecure connection to an LDAP erver otes Unlike on channels, there is no LCIPH parameter to turn on the use of L/L for the communication with the LDAP server. In this case MQ is acting as a client to the LDAP server so much of the configuration will be done at the LDAP server. ome existing parameters in MQ will be used to configure how that connection will work as shown on this slide. he overall switch to choose L/L communication or not, we already saw on the previous page CCMM. In addition to this attribute, we will also pay attention to the queue manager attributes LFIP and UIB to restrict the set of cipher specs that will be chosen. he certificate that will be used to identify the queue manager to the LDAP server will be the queue manager certificate, either ibmwebspheremq<qmgrname> or the newly added CRLABL attribute which we ll talked about in an earlier section of this presentation. Certificate revocation will be checked by using the CP servers that are named in the AuthorityInfoAccess (AIA) certificate extensions. his can be turned off by using the qm.ini L stanza attribute CPCheckxtensions. Connection to an LDAP erver is made as a network connection (which is why you may wish to consider using a secure connection). he status of this connection from the queue manager to the LDAP server is shown in DIPLAY QMAU.
20 LDAP User Repository c=uk objectclass=country objectclass=organization o=ibm LDAP erver cn=useradm ou=users objectclass=organizationunit cn=jbloggs objectclass=inetrgperson DFI AUHIF(U.LDAP) AUHYP(IDPWLDAP) CAM( ldapserver(389) ) CLAUR( inetrgperson ) BADU( ou=users,o=ibm,c=uk ) URFILD( cn ) Application provides URFILD BADU Application cn=useradm,ou=users,o=ibm,c=uk MQCX User + pwd cn=useradm useradm Adds cn= Adds ou=users,o=ibm,c=uk Adds ou=users,o=ibm,c=uk LDAP User Repository otes When using an LDAP user repository there is some more configuration to be done on the queue manager other than just to tell the queue manager where the LDAP repository resides. User IDs records defined in an LDAP server have a hierarchical structure in order to uniquely identify them. o an application could connect to the queue manager and present its user ID as being the fully qualified hierarchical user ID. his however is a lot to provide and it would be simpler if we could configure the queue manager to say, assume all user IDs that are presented are found in this area of the LDAP server and add that qualification onto anything you see. his is what the BADU attribute is for. It identifies the area in the LDAP hierarchy that all the user IDs are to be found. r to look at it another way, the queue manager will add the BADU value to the user ID presented by an application to fully qualify it before looking it up in the LDAP server. Additionally, your application may only want to present the user ID without providing the LDAP attribute name, e.g. C=. his is what the URFILD is for. Any user ID presented to a queue manager without an equals sign (=) will have the attribute and the equals sign pre-pended to it, and the BADU value post-pended to it before looking it up in the LDAP server. his may be a useful migratory aid when moving from / user IDs to LDAP user IDs as the application could very well be presenting the same string in both cases, thus avoiding any change to the application.
21 Relationship to Authorization LDAP DFI AUHIF(U.LDAP) AUHYP(IDPWLDAP) CAM( ldap(389) ) ADPCX(Y) HRUR( sn ) QMgr etwork Application MQCX cn=useradm MQP Q1 Authority Checks Authority Records Q1: mqmadm +put LDAP erver Relationship to Authorization LDAP - otes We spoke earlier about the ability to adopt the authenticated user ID as the context for this connection. o how does this work if you are using LDAP as the user repository but your authorization is being done using / user IDs? We need to get a user to represent the LDAP user that has been presented, as an / user ID. We find this from the LDAP user record. his can be any field that is defined in the user record, perhaps something like the short name field (sn=) that is a mandatory part of the definition of the inetrgperson class, or perhaps something defined more specifically for the purpose such as a user ID (uid=) field. he queue manager will use that information to determine what / user ID will be used as the context for this connection. You configure it using HRUR to say what the field to locate in the user record is.
22 Migration / Defaults AUHIF(YM.DFAUL.AUHIF.IDPW) AUHYP(IDPW) CHCKLCL(PIAL) CHCKCL(RQDADM) FAILDLAY(1) DCR( ) ALDA( ) ALIM( ) Defaults Migrated queue manager CAUH( ) ew queue manager CAUH( ) QMgr Q1 Migration / Defaults otes By default, a migrated queue manager will find that CAUH is blank and therefore connection authentication is switched off. A brand new queue manager created with the Webphere MQ V8 binaries will find that the CAUH field points to the YM.DFAUL.AUHIF.IDPW authentication information object.
23 ummary - Connection Authentication Application provides User ID and password in MQCP r uses mqccred exit supplied Queue Manager checks password against or LDAP ALR QMGR CAUH( CHCK.PWD ) DFI AUHIF( CHCK.PWD ) AUHYP(IDPW IDPWLDAP) CHCKLCL( PIAL RQUIRD RQDADM) CHCKCL( PIAL RQUIRD RQDADM) ADPCX(Y) + various LDAP attributes RFRH CURIY YP(CAUH) Password protection is provided when L/L not in use Both ends of client channel are V8 or above
End to End Security of My Queue Manager on z/os
nd to nd ecurity of My Queue Manager on z/ Lyn lkins [email protected] Mitch Johnson [email protected] ession # 17821 Abstract IBM MQ has a wealth of security options, starting from an authentication
MQ SSL/TLS Channels Including V8 changes
MQ L/L Channels Including V8 changes Morag Hughson [email protected] Agenda MQ Configuration asks With some minor V8 updates Major new feature in MQ V8 ew ew in in V8 V8 Associating a certificate with
Keeping Your MQ Service Up and Running Queue Manager Clustering [z/os & distributed] Morag Hughson [email protected] (Session # 9516)
Keeping Your MQ ervice Up and Running Queue Manager Clustering [z/ & distributed] Morag Hughson [email protected] (ession # 9516) Agenda he purpose of clustering Defining a cluster Clustering concepts
Keeping WebSphere MQ Channels Up and Running
Keeping Webphere MQ s Up and Running Morag Hughson [email protected] Keeping Webphere MQ s Up and Running - Preface his document is provided by IBM as recommendations based on IBM's expert knowledge of
How Secure are your Channels? By Morag Hughson
How Secure are your Channels? By Morag Hughson Building Blocks So, you ve gone to great lengths to control who has access to your queues, but would you care if someone could see the contents of your messages
WebSphere MQ Queue Manager Clustering
IBM oftware Group Webphere oftware Queue Manager Clustering Morag Hughson [email protected] 2013 IBM Corporation Queue Manager Clustering his presentation is not a basic introduction to Queue Manager
Monitoring and Auditing WebSphere MQ
Monitoring and Auditing Webphere MQ Morag Hughson [email protected] ession # 8720 Monitoring and Auditing Webphere MQ his session will provide illustrations and insight on the various techniques and capabilities
Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide
Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without
End to end security for WebSphere MQ
End to end security for WebSphere MQ An Introduction to WebSphere MQ Advanced Message Security T.Rob Wyatt ([email protected]) Conference materials may not be reproduced in whole or in part without
EVALUATION ONLY. WA2088 WebSphere Application Server 8.5 Administration on Windows. Student Labs. Web Age Solutions Inc.
WA2088 WebSphere Application Server 8.5 Administration on Windows Student Labs Web Age Solutions Inc. Copyright 2013 Web Age Solutions Inc. 1 Table of Contents Directory Paths Used in Labs...3 Lab Notes...4
IBM WebSphere Application Server Version 7.0
IBM WebSphere Application Server Version 7.0 Centralized Installation Manager for IBM WebSphere Application Server Network Deployment Version 7.0 Note: Before using this information, be sure to read the
Gigabyte Content Management System Console User s Guide. Version: 0.1
Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...
Handle Tool. User Manual
User Manual Corporation for National Research Initiatives Version 2 November 2015 Table of Contents 1. Start the Handle Tool... 3 2. Default Window... 3 3. Console... 5 4. Authentication... 6 5. Lookup...
TIBCO Runtime Agent Domain Utility User s Guide Software Release 5.8.0 November 2012
TIBCO Runtime Agent Domain Utility User s Guide Software Release 5.8.0 November 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
Unicenter Workload Control Center r1 SP4. Server Status Troubleshooting Guide
Unicenter Workload Control Center r1 SP4 Server Status Troubleshooting Guide Table of Contents 1 Introduction 3 2 Information Page 3 3 Server Status Portlet 3 3.1 Configuration User Usage... 3 3.2 Troubleshooting
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
PriveonLabs Research. Cisco Security Agent Protection Series:
Cisco Security Agent Protection Series: Enabling LDAP for CSA Management Center SSO Authentication For CSA 5.2 Versions 5.2.0.245 and up Fred Parks Systems Consultant 3/25/2008 2008 Priveon, Inc. www.priveonlabs.com
Managing CA-Signed Certificates
Managing CA-Signed Certificates T.Rob Wyatt, IoPT Consulting [email protected] Managing CA Certificates for MQ - Intermediate So you want to enable SSL on your MQ channels using a commercial Certificate
Avalanche Remote Control User Guide. Version 4.1.3
Avalanche Remote Control User Guide Version 4.1.3 ii Copyright 2012 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway, Suite 200 South Jordan, Utah 84095
SteelEye Protection Suite for Linux v8.2.0 WebSphere MQ / MQSeries Recovery Kit. Administration Guide
SteelEye Protection Suite for Linux v8.2.0 WebSphere MQ / MQSeries Recovery Kit Administration Guide October 2013 This document and the information herein is the property of SIOS Technology Corp. (previously
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0
Enhanced Connector Applications SupportPac VP01 for IBM WebSphere Business Events 3.0.0 Third edition (May 2012). Copyright International Business Machines Corporation 2012. US Government Users Restricted
Coveo Platform 7.0. Microsoft Dynamics CRM Connector Guide
Coveo Platform 7.0 Microsoft Dynamics CRM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing
LDAP User Guide PowerSchool Premier 5.1 Student Information System
PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson
Windows XP Exchange Client Installation Instructions
WINDOWS XP with Outlook 2003 or Outlook 2007 1. Click the Start button and select Control Panel: 2. If your control panel looks like this: Click Switch to Classic View. 3. Double click Mail. 4. Click show
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
WebSphere MQ Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 WebSphere MQ Oracle Enterprise Gateway Integration Guide 1 / 30 Disclaimer The following is intended to outline our general product direction. It is intended for information
Nintex Workflow 2013 Help
Nintex Workflow 2013 Help Last updated: Wednesday, January 15, 2014 1 Workflow Actions... 7 1.1 Action Set... 7 1.2 Add User To AD Group... 8 1.3 Assign Flexi Task... 10 1.4 Assign To-Do Task... 25 1.5
WS_FTP Server. User s Guide. Software Version 3.1. Ipswitch, Inc.
User s Guide Software Version 3.1 Ipswitch, Inc. Ipswitch, Inc. Phone: 781-676-5700 81 Hartwell Ave Web: http://www.ipswitch.com Lexington, MA 02421-3127 The information in this document is subject to
WebSphere Business Monitor
WebSphere Business Monitor Administration This presentation will show you the functions in the administrative console for WebSphere Business Monitor. WBPM_Monitor_Administration.ppt Page 1 of 21 Goals
SAS Business Data Network 3.1
SAS Business Data Network 3.1 User s Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2014. SAS Business Data Network 3.1: User's Guide. Cary,
Business Process Management IBM Business Process Manager V7.5
Business Process Management IBM Business Process Manager V7.5 Federated task management for BPEL processes and human tasks This presentation introduces the federated task management feature for BPEL processes
Subversion Server for Windows
Subversion Server for Windows VisualSVN Team VisualSVN Server: Subversion Server for Windows VisualSVN Team Copyright 2005-2008 VisualSVN Team Windows is a registered trademark of Microsoft Corporation.
Configuring Single Sign-on for WebVPN
CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using
Configure Outlook 2013 to connect to Hosted Exchange
Configure Outlook 2013 to connect to Hosted Exchange Anglia IT Solutions Hosted Exchange supports: Windows XP, 7 and 8 Microsoft Office 2007 / 2010 / 2013 These instructions describe how to setup Outlook
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset)
Gigabyte Management Console User s Guide (For ASPEED AST 2400 Chipset) Version: 1.4 Table of Contents Using Your Gigabyte Management Console... 3 Gigabyte Management Console Key Features and Functions...
NovaBACKUP Storage Server User Manual NovaStor / April 2013
NovaBACKUP Storage Server User Manual NovaStor / April 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject to change
Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal
Guideline Enabling Single-Sign-On between IBM Cognos 8 BI and IBM WebSphere Portal Product(s): IBM Cognos 8 BI Area of Interest: Security Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
VPN Client User s Guide. 9235966 Issue 2
VPN Client User s Guide 9235966 Issue 2 Copyright 2004 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the
Integrating Mac OS X 10.6 with Active Directory. 1 April 2010
Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active
NASA Workflow Tool. User Guide. September 29, 2010
NASA Workflow Tool User Guide September 29, 2010 NASA Workflow Tool User Guide 1. Overview 2. Getting Started Preparing the Environment 3. Using the NED Client Common Terminology Workflow Configuration
Setting Up Person Accounts
Setting Up Person Accounts Salesforce, Summer 15 @salesforcedocs Last updated: June 30, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
Cryoserver Archive Lotus Notes Configuration
Lotus Notes Configuration Version 1.0 December 2007 Forensic & Compliance Systems Ltd +44 (0)800 280 0525 [email protected] www.cryoserver.com Contents INTRODUCTION... 3 SMTP ROUTING TO CRYOSERVER...
Enabling SSO between Cognos 8 and WebSphere Portal
Guideline Enabling SSO between Cognos 8 and WebSphere Portal Product(s): Cognos 8 Area of Interest: Security Enabling SSO between Cognos 8 and WebSphere Portal 2 Copyright Your use of this document is
LISTSERV LDAP Documentation
LISTSERV LDAP Documentation L Soft Sweden AB 2007 28 November 2007 Overview LISTSERV version 15.5 can interface to LDAP servers to authenticate user logins, to insert LDAP attributes in mail merge distributions
McAfee SMC Installation Guide 5.7. Security Management Center
McAfee SMC Installation Guide 5.7 Security Management Center Legal Information The use of the products described in these materials is subject to the then current end-user license agreement, which can
Dell KACE K1000 Management Appliance. Service Desk Administrator Guide. Release 5.3. Revision Date: May 13, 2011
Dell KACE K1000 Management Appliance Service Desk Administrator Guide Release 5.3 Revision Date: May 13, 2011 2004-2011 Dell, Inc. All rights reserved. Information concerning third-party copyrights and
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
HTTP Reverse Proxy Scenarios
Sterling Secure Proxy HTTP Reverse Proxy Scenarios Version 3.4 Sterling Secure Proxy HTTP Reverse Proxy Scenarios Version 3.4 Note Before using this information and the product it supports, read the information
PRiSM Security. Configuration and considerations
PRiSM Security Configuration and considerations Agenda Security overview Authentication Adding a User Security Groups Security Roles Asset Roles Security Overview Three Aspects of Security Authentication
mguard Device Manager Release Notes Version 1.6.1
mguard Device Manager Release Notes Version 1.6.1 Innominate Security Technologies AG Rudower Chaussee 13 12489 Berlin Germany Phone: +49 30 921028 0 Fax: +49 30 921028 020 [email protected] http://www.innominate.com/
SonicWALL Global Management System Configuration Guide Standard Edition
SonicWALL Global Management System Configuration Guide Standard Edition Version 2.3 Copyright Information 2002 SonicWALL, Inc. All rights reserved. Under copyright laws, this manual or the software described
TestNav 8 User Guide for PARCC
TestNav 8 User Guide for PARCC Copyright 2014, Pearson Education, Inc. Published March 6, 2014 TestNav 8 User Guide for PARCC 1 TestNav 8 User Guide for PARCC Revision History What is TestNav? Technical
Creating Home Directories for Windows and Macintosh Computers
ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory
Drop Shipping. Contents. Overview 2. Quick Tips 3. Basic Setup 4. Drop Ship Options 5. File Pickup Options 6. E-Mail Messages 8
Contents Overview 2 Quick Tips 3 Basic Setup 4 Drop Ship Options 5 File Pickup Options 6 E-Mail Messages 8 The Drop Shipments Log 9 Maxum Development Corp. Overview One very common file transfer task is
Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN-10233 June 2009
Application Note AN-10233 June 2009 ShoreTel 9: Active Directory Integration This application note outlines the configuration required to prepare a customer s Microsoft Active Directory environment for
Alliance Key Manager A Solution Brief for Technical Implementers
KEY MANAGEMENT Alliance Key Manager A Solution Brief for Technical Implementers Abstract This paper is designed to help technical managers, product managers, and developers understand how Alliance Key
Embedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): C54x, C73x, C746, C748, C792, C925, C950, E260, E360, E46x, T65x, W850, X264, X36x, X46x, X543, X544, X546, X548,
Using DC Agent for Transparent User Identification
Using DC Agent for Transparent User Identification Using DC Agent Web Security Solutions v7.7, 7.8 If your organization uses Microsoft Windows Active Directory, you can use Websense DC Agent to identify
PASS4TEST. IT Certification Guaranteed, The Easy Way! http://www.pass4test.com We offer free update service for one year
PASS4TEST IT Certification Guaranteed, The Easy Way! \ http://www.pass4test.com We offer free update service for one year Exam : C9530-410 Title : IBM MQ V8.0, System Administration Vendor : IBM Version
Installation Guide. Before We Begin: Please verify your practice management system is compatible with Dental Collect Enterprise.
Installation Guide Before We Begin: Please verify your practice management system is compatible with Dental Collect Enterprise. Compatibility List: https://www.sikkasoft.com/pms-fs-supported-by-spu/ NOTE:
KeyControl Installation on Amazon Web Services
KeyControl Installation on Amazon Web Services Contents Introduction Deploying an initial KeyControl Server Deploying an Elastic Load Balancer (ELB) Adding a KeyControl node to a cluster in the same availability
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
VERALAB LDAP Configuration Guide
VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
EVERYTHING LDAP. Gabriella Davis [email protected]
EVERYTHING LDAP Gabriella Davis [email protected] Agenda What is LDAP? LDAP structure and behavior Domino and LDAP LDAP tools Notes as an LDAP client IBM Lotus Sametime, Quickr, Connections,
Rebasoft Auditor Quick Start Guide
Copyright Rebasoft Limited: 2009-2011 1 Release 2.1, Rev. 1 Copyright Notice Copyright 2009-2011 Rebasoft Ltd. All rights reserved. REBASOFT Software, the Rebasoft logo, Rebasoft Auditor are registered
How To Login To The Mft Internet Server (Mft) On A Pc Or Macbook Or Macintosh (Macintosh) With A Password Protected (Macbook) Or Ipad (Macro) (For Macintosh) (Macros
TIBCO MFT Internet Server User Guide Software Release 7.2.4 October 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE
User Guide to the Snare Agent Management Console in Snare Server v7.0
User Guide to the Snare Agent Management Console in Snare Server v7.0 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect Alliance Pty Ltd shall not be liable for errors
Rational Rational ClearQuest
Rational Rational ClearQuest Version 7.0 Windows Using Project Tracker GI11-6377-00 Rational Rational ClearQuest Version 7.0 Windows Using Project Tracker GI11-6377-00 Before using this information, be
Using the Push Notifications Extension Part 1: Certificates and Setup
// tutorial Using the Push Notifications Extension Part 1: Certificates and Setup Version 1.0 This tutorial is the second part of our tutorials covering setting up and running the Push Notifications Native
Installation and Administration Guide
Installation and Administration Guide BlackBerry Enterprise Transporter for BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-11-06 SWD-20141106165936643 Contents What is BES12?... 6 Key features
Open Directory. Contents. Before You Start 2. Configuring Rumpus 3. Testing Accessible Directory Service Access 4. Specifying Home Folders 4
Contents Before You Start 2 Configuring Rumpus 3 Testing Accessible Directory Service Access 4 Specifying Home Folders 4 Open Directory Groups 6 Maxum Development Corp. Before You Start Open Directory
To enable an application to use external usernames and passwords, you need to first configure CA EEM to use external directories.
Most clients utilize an external directory tool, such as Microsoft Active Directory, to provide authentication. CA Embedded Entitlements Manager (EEM) can be configured to integrate with the same external
AutoDownload: SQL Server and Network Trouble Shooting
AutoDownload: SQL Server and Network Trouble Shooting AutoDownload uses Microsoft s SQL Server database software. Since 2005 when AutoDownload was first released Microsoft have also released new versions
Discovery Guide. Secret Server. Table of Contents
Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...
Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies
Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright
MULTIFUNCTIONAL DIGITAL SYSTEMS. Operator s Manual for AddressBook Viewer
MULTIFUNCTIONAL DIGITAL SYSTEMS Operator s Manual for AddressBook Viewer 2008, 2009 TOSHIBA TEC CORPORATION All rights reserved Under the copyright laws, this manual cannot be reproduced in any form without
The Social Accelerator Setup Guide
The Social Accelerator Setup Guide Welcome! Welcome to the Social Accelerator setup guide. This guide covers 2 ways to setup SA. Most likely, you will want to use the easy setup wizard. In that case, you
How to Configure Dynamic DNS on a Virtual Access Router
How to Configure Dynamic DNS on a Virtual Access Router Issue 1.0 Date 03 April 2012 Table of contents 1 About this document... 3 1.1 Scope... 3 1.2 Readership... 3 1.3 Terminology... 3 2 Introduction...
Embedded Web Server Security
Embedded Web Server Security Administrator's Guide September 2014 www.lexmark.com Model(s): MS911de, MX910de, MX911, MX912, XM9145, XM9155, XM9165, CS310, CS410, CS510, CX310, CX410, CX510, M1140, M1145,
Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal
Integrating Autotask Service Desk Ticketing with the Cisco OnPlus Portal This Application Note provides instructions for configuring Apps settings on the Cisco OnPlus Portal and Autotask application settings
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Installation and Configuration Guide
Installation and Configuration Guide BlackBerry Resource Kit for BlackBerry Enterprise Service 10 Version 10.2 Published: 2015-11-12 SWD-20151112124827386 Contents Overview: BlackBerry Enterprise Service
Snare Agent Management Console User Guide to the Snare Agent Management Console in Snare Server v6
User Guide to the Snare Agent Management Console in Snare Server v6 InterSect Alliance International Pty Ltd Page 1 of 14 Intersect Alliance International Pty Ltd. All rights reserved worldwide. Intersect
WORKING IN TEAMS WITH CASECOMPLETE AND MICROSOFT VISUAL SOURCE SAFE. Contents
WORKING IN TEAMS WITH CASECOMPLETE AND MICROSOFT VISUAL SOURCE SAFE Contents Working in Teams with CaseComplete... 2 Need an introduction to how version control works?... 2 Exclusive Checkout... 3 Multiple
PloneSurvey User Guide (draft 3)
- 1 - PloneSurvey User Guide (draft 3) This short document will hopefully contain enough information to allow people to begin creating simple surveys using the new Plone online survey tool. Caveat PloneSurvey
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
Integrating WebSphere Portal V8.0 with Business Process Manager V8.0
2012 Integrating WebSphere Portal V8.0 with Business Process Manager V8.0 WebSphere Portal & BPM Services [Page 2 of 51] CONTENTS CONTENTS... 2 1. DOCUMENT INFORMATION... 4 1.1 1.2 2. INTRODUCTION... 5
Configuring the Redundancy Feature in a Spectralink IP-DECT Server 6500
Configuring the Redundancy Feature in a Spectralink IP-DECT Server 6500 Configuring the Redundancy Feature in a Spectralink IP-DECT Server 6500 Application Note Page 1 Introduction The redundancy feature
Oracle BI EE 11g - Security Auditing
Oracle BI EE 11g - Security Auditing Venkatakrishnan J Agenda Overview of BI EE Security Authentication Authorization Security Endpoints Overview Weblogic & EM BI Server Presentation Server - How is Web
Virtual CD v10. Network Management Server Manual. H+H Software GmbH
Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual
TIBCO Silver Fabric Continuity User s Guide
TIBCO Silver Fabric Continuity User s Guide Software Release 1.0 November 2014 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
Job Aid: Directory Application
Job Aid: Directory Application Issue 1.1 August 26, 2010 Purpose This job aid provides instructions for administering the Directory Application in the Avaya Aura Communication Manager 6.0 template. Revisions
Populating Your Domino Directory (Or ANY Domino Database) With Tivoli Directory Integrator. Marie Scott Thomas Duffbert Duff
Populating Your Domino Directory (Or ANY Domino Database) With Tivoli Directory Integrator Marie Scott Thomas Duffbert Duff Agenda Introduction to TDI architecture/concepts Discuss TDI entitlement Examples
Ipswitch WS_FTP Server
Ipswitch WS_FTP Server User s Guide Software Version 5.0 Ipswitch, Inc Ipswitch Inc. Web: http://www.ipswitch.com 10 Maguire Road Phone: 781.676.5700 Lexington, MA Fax: 781.676.5710 02421 Copyrights The
Enabling Single-Sign-On on WebSphere Portal in IBM Cognos ReportNet
Guideline Enabling Single-Sign-On on WebSphere Portal in IBM Cognos ReportNet Product(s): IBM Cognos ReportNet Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
BUILDER 3.0 Installation Guide with Microsoft SQL Server 2005 Express Edition January 2008
BUILDER 3.0 Installation Guide with Microsoft SQL Server 2005 Express Edition January 2008 BUILDER 3.0 1 Table of Contents Chapter 1: Installation Overview... 3 Introduction... 3 Minimum Requirements...
