Implementation Guide for protecting
|
|
- Esther Edwards
- 8 years ago
- Views:
Transcription
1 Implementation Guide for protecting Remote Web Workplace (RWW) Outlook Web Access (OWA) 2003 SharePoint 2003 IIS Web Sites with BlackShield ID Copyright 2010 CRYPTOCard Inc.
2 Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of CRYPTOCard. Trademarks BlackShield ID, BlackShield ID SBE and BlackShield ID Pro are either registered trademarks or trademarks of CRYPTOCard Inc. All other trademarks and registered trademarks are the property of their owners. Additional Information, Assistance, or Comments CRYPTOCard s technical support specialists can provide assistance when planning and implementing CRYPTOCard in your network. In addition to aiding in the selection of the appropriate authentication products, CRYPTOCard can suggest deployment procedures that provide a smooth, simple transition from existing access control systems and a satisfying experience for network users. We can also help you leverage your existing network equipment and systems to maximize your return on investment. CRYPTOCard works closely with channel partners to offer worldwide Technical Support services. If you purchased this product through a CRYPTOCard channel partner, please contact your partner directly for support needs. To contact CRYPTOCard directly: International Voice: North America Toll Free: support@cryptocard.com For information about obtaining a support contract, see our Support Web page at Related Documentation Refer to the Support & Downloads section of the CRYPTOCard website for additional documentation and interoperability guides: Publication History Date Changes Version January 26, 2009 Document created 1.0 July 9, 2009 Copyright year updated 1.1 October 16, 2009 Minor updates 1.2 BlackShield ID Implementation guide for IIS,SharePoint,OWA,RWW i
3 Table of Contents Overview... 1 Applicability... 1 Assumptions... 2 Operation... 2 Preparation and Prerequisites... 2 Configuration... 3 Protecting Microsoft Remote Web Workplace...3 Protecting Microsoft Outlook Web Access (OWA) using forms-based authentication...3 Protecting Microsoft Outlook Web Access (OWA) using basic authentication...4 Protecting Microsoft Share Point...5 Protecting custom virtual directories...6 GrIDsure Tokens... 7 Outlook Web Access Forms based authentication...7 SharePoint...9 Troubleshooting BlackShield ID Implementation guide for IIS,SharePoint,OWA,RWW ii
4 Overview By default Remote Web Workplace, Outlook Web Access and SharePoint requires that a user provide a correct user name and password to successfully logon. This document describes the steps necessary to augment this logon mechanism with strong authentication by adding a requirement to provide a one-time password generated by a CRYPTOCard token using the BlackShield ID Agent IIS ( Agent ). The BlackShield ID IIS Agent allows two-factor authentication of users accessing IIS web sites, including Microsoft Remote Web Workplace Microsoft Outlook Web Access (Basic & Web forms) Microsoft Share Point Any virtual directory you have created Applicability Summary Product Name Microsoft Internet Information Server 6.0 Vendor Site Supported Application Software Remote Web Workplace 2003 Outlook Web Access 2003 Microsoft SharePoint 2003 IIS Virtual Directories Authentication Method Supported BlackShield ID Pro Agent functionality BlackShield ID Pro Agent Authentication Mode New PIN Mode Web Site Protection One-time password Challenge-response / Next Tokencode BlackShield ID Pro static password User-changeable Alphanumeric 3-16 digit PIN User-changeable Numeric 3-16 digit PIN Server-changeable Alphanumeric 3-16 digit PIN Server-changeable Numeric 3-16 digit PIN Virtual Directories BlackShield ID Implementation guide for IIS,SharePoint,OWA,RWW 1
5 This integration guide is applicable to: CRYPTOCard Server Authentication Server Version BlackShield ID Small Business Edition 1.2+ Professional Edition 2.3+ CRYPTOCard Agent Agent BlackShield ID Authentication Agent for IIS Version 2.x Operating System 32-bit Windows 2003 Assumptions BlackShield ID has been installed and configured and a Test user account can be selected in the Assignment Tab. Operation The BlackShield ID Agent for IIS modifies the logon pages for Remote Web Workplace, Outlook Web Access, and Sharepoint. It adds an additional field labeled OTP (One-Time Password) to the logon pages. The user will enter in their regular credentials as well as an OTP after the plug-in has been enabled. Preparation and Prerequisites 1. Ensure you can successfully authenticate to the given service using a static username and password prior to enabling BlackShield ID protection. 2. If you are using a generated key file, ensure to place it in the appropriate key file directory within the agent s installation directory. BlackShield ID Implementation guide for IIS,SharePoint,OWA,RWW 2
6 Configuration Protecting Microsoft Remote Web Workplace 1. Open the Internet Information Services (IIS) Manager. It can be started by clicking Start Administrative Tools Internet Information Services (IIS) Manager. 2. Expand the first node in the left hand pane, which is the name of your web server (local computer). 3. Expand Web Sites. 4. Expand Default Web Site. 5. Right click the virtual directory Remote, and select Properties. 6. Select the CRYPTOCard tab. 7. Select Enable BlackShield Authentication for this virtual directory 8. From the drop down menu, select the option for RWW, which has its path ending in iis agent\rww\authisapi.dll. 9. Select OK. RWW is now protected. To verify, right click the virtual directory Remote and select Browse. A modified logon form should appear with an OTP field added. Protecting Microsoft Outlook Web Access (OWA) using forms-based authentication 1. Open the Internet Information Services (IIS) Manager. It can be started by clicking Start Administrative Tools Internet Information Services (IIS) Manager. 2. Expand the first node in the left hand pane, which is the name of your web server (local computer). 3. Expand Web Sites. 4. Expand Default Web Site. 5. Expand ExchWeb. 6. Right click the virtual directory bin, and select Properties. 7. Select the CRYPTOCard tab. 8. Select Enable BlackShield Authentication for this virtual directory 9. From the drop down menu, select the option for OWA, which has its path ending in iis agent\owa\authisapi.dll. 10. Select OK. BlackShield ID Implementation guide for IIS,SharePoint,OWA,RWW 3
7 OWA is now protected. To verify, right click the virtual directory Exchange and select Browse. A modified logon form should appear with an OTP field added. Protecting Microsoft Outlook Web Access (OWA) using basic authentication The IIS agent is installed to protect OWA using forms authentication by default, however, it can be reconfigured to use Basic authentication by following the steps below if your Exchange Server is not using Forms authentication. 1. Open the Internet Information Services (IIS) Manager. It can be started by clicking Start Administrative Tools Internet Information Services (IIS) Manager. 2. Expand the first node in the left hand pane, which is the name of your web server (local computer). 3. Expand Web Sites. 4. Right click Default Web Site and select Properties. 5. Select the CRYPTOCard tab. 6. Select Enable BlackShield Authentication for this virtual directory 7. From the drop down menu, select the option for OWA, which has it's path ending in iis agent\owa\authisapi.dll. 8. Select Preconfigured application from the set of radio buttons below 9. From its drop down menu, select Exchange (Cryptocard_template_exchange.xml). 10. Select OK. 11. Expand Default Web Site. 12. Expand ExchWeb. 13. Right click the virtual directory bin, and select Properties. 14. Select the CRYPTOCard tab. 15. Select Enable BlackShield Authentication for this virtual directory 16. From the drop down menu, select the option for OWA, which has it's path ending in iis agent\owa\authisapi.dll. 17. Select OK. OWA is now protected. To verify, right click the virtual directory Exchange and select Browse. A modified logon form should appear with an OTP field added. BlackShield ID Implementation guide for IIS,SharePoint,OWA,RWW 4
8 Protecting Microsoft Share Point 1. Open the Internet Information Services (IIS) Manager. It can be started by clicking Start Administrative Tools Internet Information Services (IIS) Manager. 2. Expand the first node in the left hand pane, which is the name of your web server (local computer). 3. Expand Web Sites. 4. Expand the name of your SharePoint web site. By default, the name of this site is often companyweb 5. Right click the virtual directory _vti_bin, and select Properties. 6. Select the CRYPTOCard tab. 7. Select Enable BlackShield Authentication for this virtual directory 8. From the drop down menu, select the option for Sharepoint, which has it's path ending in iis agent\sharepoint\authisapi.dll. 9. Select Preconfigured application from the set of radio buttons below 10. Select OK. Sharepoint is now protected. To verify, right click the name of your Sharepoint web site (companyweb) and select Browse. The default BlackShield logon form should appear. Note: In order to allow Microsoft authentication to succeed through the BlackShield Sharepoint logon form, it is necessary to enable both anonymous access and basic authentication for the Sharepoint application. If this is not done, the user will be able to authenticate against BlackShield but the authentication to Sharepoint will fail. Follow the steps below to accomplish this: 1. Open the Internet Information Services (IIS) Manager. It can be started by clicking Start Administrative Tools Internet Information Services (IIS) Manager. 2. Expand the first node in the left hand pane, which is the name of your web server (local computer). 3. Expand Web Sites. 4. Right click the name of your SharePoint web site and select Properties. By default, the name of this site is often company web 5. Select the Directory Security tab. 6. Select the Edit button under the Authentication and Access Control section. 7. Select Enable Anonymous Access at the top of the screen, do not change the user name or password. BlackShield ID Implementation guide for IIS,SharePoint,OWA,RWW 5
9 8. Unselect Integrated Windows Authentication. 9. Select Basic Authentication. 10. Click OK. 11. Click Yes to the popup dialog. 12. Click OK to exit the properties tab. Protecting custom virtual directories 1. Open the Internet Information Services (IIS) Manager. It can be started by clicking Start Administrative Tools Internet Information Services (IIS) Manager. 2. Expand the first node in the left hand pane, which is the name of your web server (local computer). 3. Expand Web Sites. 4. Locate the virtual directory you wish to protect and select Properties. 5. Select the CRYPTOCard tab. 6. Select Enable BlackShield Authentication for this virtual directory 7. From the drop down menu, select the option for default, which has it's path ending in iis agent\default\authisapi.dll. 8. Select New custom application from the set of radio buttons below 9. Select Configure Select OK. 11. Select OK. Your custom virtual directory is now protected. To verify, right click the name of the virtual directory and select Browse. The default BlackShield logon form should appear. BlackShield ID Implementation guide for IIS,SharePoint,OWA,RWW 6
10 GrIDsure Tokens GrIDsure tokens provide an end-user the ability to generate a one-time password without requiring the end-user to have any additional hardware or software applications. GrIDsure presents the end-user with a grid of cells containing random characters, from which the end-user selects their personal identification pattern (PIP). Each time the end-user needs to authenticate the trid will display a random/unique set of characters. The end-user then just needs to remember their PIP and provide the specific characters within those cells that make up their PIP in order to authenticate and log on. For the purpose of this guide, only the demonstration of GrIDsure tokens being used will be shown. A more detailed explanation of how GrIDsure tokens work can be obtained in the GrIDsure specific token guide. Outlook Web Access Forms based authentication 1. Using a web browser, browse to the OWA logon site. 2. Enter your Microsoft user name and Microsoft password. 3. Leave the OTP field empty. 4. Click Log On BlackShield ID Implementation guide for IIS,SharePoint,OWA,RWW 7
11 5. Using your PIP, enter in your OTP within the OTP field. Note: In this example the OTP has been revealed for demonstration purposes. 6. Click the Logon button. BlackShield ID Implementation guide for IIS,SharePoint,OWA,RWW 8
12 SharePoint 1. Using a web browser, browse to the SharePoint logon site. Note: Normally a web browser pop up would appear. However, once protected with CRYPTOCard a web based logon page will appear. 2. Enter in your Microsoft user name and Microsoft password. 3. Leave the OTP field empty. 4. Click the Log On button. 5. Using your PIP, enter in your OTP within the OTP field. Note: In this example the OTP has been revealed for demonstration purposes. 6. Click the Log On button. BlackShield ID Implementation guide for IIS,SharePoint,OWA,RWW 9
13 Troubleshooting Symptom: I access my service s logon page, but I don t see the addition of the OTP (One- Time password) field to enter my token code. Possible Causes: You have not chosen the correct logon page. Solution: Redo the instructions for protecting your chosen service, and ensure you select the correct template from the appropriate pull down. BlackShield ID Implementation guide for IIS,SharePoint,OWA,RWW 10
Implementation Guide for. Juniper SSL VPN SSO with OWA. with. BlackShield ID
Implementation Guide for Juniper SSL VPN SSO with OWA with BlackShield ID Copyright 2009 CRYPTOCard Inc. http:// www.cryptocard.com Copyright Copyright 2009, CRYPTOCard All Rights Reserved. No part of
More informationBlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
More informationBlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
More informationJuniper SSL VPN Authentication QUICKStart Guide
Juniper SSL VPN Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights
More informationStrong Authentication for Juniper Networks SSL VPN
Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationBlackShield ID PRO. Steel Belted RADIUS 6.x. Implementation Guide. Copyright 2008 to present CRYPTOCard Corporation. All Rights Reserved
BlackShield ID PRO Steel Belted RADIUS 6.x Implementation Guide Copyright 2008 to present CRYPTOCard Corporation. All Rights Reserved License and Warranty Information CRYPTOCard and its affiliates retain
More informationStrong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationStrong Authentication for Microsoft TS Web / RD Web
Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationCisco VPN Concentrator Implementation Guide
Cisco VPN Concentrator Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationApache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
More informationBlackShield ID MP Token Guide. for Java Enabled Phones
BlackShield ID MP Token Guide for Java Enabled Phones Copyright 2010 CRYPTOCard Inc. http:// www.cryptocard.com Trademarks CRYPTOCard and the CRYPTOCard logo are registered trademarks of CRYPTOCard Corp.
More informationCisco ASA Authentication QUICKStart Guide
Cisco ASA Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved.
More informationStrong Authentication for Cisco ASA 5500 Series
Strong Authentication for Cisco ASA 5500 Series with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationStrong Authentication for Juniper Networks
Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright
More informationAgent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
More informationCheck Point FW-1/VPN-1 NG/FP3
Check Point FW-1/VPN-1 NG/FP3 Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationConfiguration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationJuniper Networks SSL VPN Implementation Guide
Juniper Networks SSL VPN Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationBlackShield ID Best Practice
BlackShield ID Best Practice Implementation Guide for a Complex Network Document Scope This document is designed to demonstrate best practice when implementing and rolling out a two-factor authentication
More informationConfiguration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06
SafeNet Authentication Service Configuration Guide 1.06 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationConfiguration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web App. Technical Manual Template
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationProtecting Juniper SA using Certificate-Based Authentication. Quick Start Guide
Protecting Juniper SA using Certificate-Based Authentication Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
More informationIntegration Guide. SafeNet Authentication Service. VMWare View 5.1
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationConfiguring IBM Cognos Controller 8 to use Single Sign- On
Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright
More informationActive Directory Synchronization Agent for CRYPTO-MAS1.7
Active Directory Synchronization Agent for CRYPTO-MAS1.7 Rev 2.0 Copyright 2010 to present CRYPTOCard Corporation. All Rights Reserved http://www.cryptocard.com Revision History Version Date Description
More informationLDAP Synchronization Agent Configuration Guide
LDAP Synchronization Agent Configuration Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights
More informationHELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE
HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationInstallation Guide. SafeNet Authentication Service
SafeNet Authentication Service Installation Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationRohos Logon Key for Windows Remote Desktop logon with YubiKey token
Rohos Logon Key for Windows Remote Desktop logon with YubiKey token Step-by-Step Integration Guide. Tesline-Service S.R.L. 10 Calea Iesilor str., Chisinau, MD-2069, Moldova. Tel: +373-22-740-242 www.rohos.com
More informationConfiguration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.
Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationDefender EAP Agent Installation and Configuration Guide
Defender EAP Agent Installation and Configuration Guide Introduction A VPN is an extension of a private network that encompasses links across shared or public networks like the Internet. VPN connections
More informationMcAfee One Time Password
McAfee One Time Password Integration Module Outlook Web App 2010 Module version: 1.3.1 Document revision: 1.3.1 Date: Feb 12, 2014 Table of Contents Integration Module Overview... 3 Prerequisites and System
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationCreating IBM Cognos Controller Databases using Microsoft SQL Server
Guideline Creating IBM Cognos Controller Databases using Microsoft SQL Product(s): IBM Cognos Controller 8.1 or higher Area of Interest: Financial Management 2 Copyright Copyright 2008 Cognos ULC (formerly
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationEnabling Kerberos SSO in IBM Cognos Express on Windows Server 2008
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials
More informationDIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
More informationCreating a User Profile for Outlook 2013
Creating a User Profile for Outlook 2013 This document tells you how to create a user profile for Outlook 2013 on your computer (also known as the Outlook client). This is necessary, for example, when
More informationSELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form
More informationWelcome Guide for MP-1 Token for Microsoft Windows
Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made
More informationWindows XP Exchange Client Installation Instructions
WINDOWS XP with Outlook 2003 or Outlook 2007 1. Click the Start button and select Control Panel: 2. If your control panel looks like this: Click Switch to Classic View. 3. Double click Mail. 4. Click show
More informationRemote Logging Agent Configuration Guide
Remote Logging Agent Configuration Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Synchronization Agent Configuration Guide Copyright
More informationDIGIPASS Authentication for Check Point Security Gateways
DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and
More informationBlackShield Authentication Service
BlackShield Authentication Service Guide for Users of CRYPTOCard MP-1 Software Tokens on Smart Phones Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright Copyright 2011.
More informationTechnical Note. Configuring Outlook Web Access with Secure WebMail Proxy for eprism
Technical Note Configuring Outlook Web Access with Secure WebMail Proxy for eprism Information in this document is subject to change without notice. This document may be distributed freely only in whole,
More informationSAM Context-Based Authentication Using Juniper SA Integration Guide
SAM Context-Based Authentication Using Juniper SA Integration Guide Revision A Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete
More informationProduct Guide Addendum. SafeWord Check Point User Management Console Version 2.1
Product Guide Addendum SafeWord Check Point User Management Console Version 2.1 Copyright 2005 Secure Computing Corporation. All rights reserved. No part of this publication may be reproduced, transmitted,
More informationRSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
More informationHELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE
HELP DOCUMENTATION E-SSOM DEPLOYMENT GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
More informationNovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
More informationDIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
More informationDigitalPersona Pro. Password Manager. Version 5.x. Application Guide
DigitalPersona Pro Password Manager Version 5.x Application Guide 1996-2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware
More informationCitrix Systems, Inc.
Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change
More informationIngenious Testcraft Technical Documentation Installation Guide
Ingenious Testcraft Technical Documentation Installation Guide V7.00R1 Q2.11 Trademarks Ingenious, Ingenious Group, and Testcraft are trademarks of Ingenious Group, Inc. and may be registered in the United
More informationLDAP Synchronization Agent Configuration Guide for
LDAP Synchronization Agent Configuration Guide for Powerful Authentication Management for Service Providers and Enterprises Version 3.x Authentication Service Delivery Made EASY LDAP Synchronization Agent
More informationStrong Authentication for Microsoft Windows Logon
Strong Authentication for Microsoft Windows Logon with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationAgent Configuration Guide for Microsoft Windows Logon
Agent Configuration Guide for Microsoft Windows Logon Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All
More informationEntrust Managed Services PKI
Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.
More informationCitrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
More informationDIGIPASS Authentication for Check Point Connectra
DIGIPASS Authentication for Check Point Connectra With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 21 Disclaimer Disclaimer of Warranties and Limitations
More informationWhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationEmail Client Configuration Secure Socket Layer. Information Technology Services 2010
Email Client Configuration Secure Socket Layer Information Technology Services 2010 Table of Contents A. Apple Mail [Mac OSX Leopard]... 1 1. POP SSL Secure Settings... 1 2. IMAP SSL Secure Settings...
More informationInstallation Guide. . All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Inventory and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Inventory is a trademark owned by Specops Software.
More informationUsing etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
More informationNTP Software File Auditor for Windows Edition
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
More informationHow to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
More informationAccessing Derbyshire County Council s Outlook Web Access (OWA) Service. Smart Phone App version
Accessing Derbyshire County Council s Outlook Web Access (OWA) Service Smart Phone App version Contents About this guide... 2 Before accessing Outlook Web Access... 3 Accessing Outlook Web Access (OWA)
More informationWhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationIntegration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Salesforce
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationIMS Health Secure Outlook Web Access Portal. Quick Setup
IMS Health Secure Outlook Web Access Portal Purpose: This service has been developed to allow access to the IMS Health email system for staff that can not access the email system through VPN which is preferred
More informationDigipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide
Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations
More informationXcalibur Global Version 1.2 Installation Guide Document Version 3.0
Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.
More informationEntrust Managed Services PKI Administrator Guide
Entrust Managed Services PKI Entrust Managed Services PKI Administrator Guide Document issue: 3.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark or a registered
More informationDigipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Getting Started
Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Getting Started Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of
More informationMicrosoft Dynamics GP 2010. SQL Server Reporting Services Guide
Microsoft Dynamics GP 2010 SQL Server Reporting Services Guide April 4, 2012 Copyright Copyright 2012 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationDefender Configuring for Use with GrIDsure Tokens
Defender Configuring for Use with GrIDsure Tokens Introduction The GrIDsure token can be used to protect any website hosted on Internet Information Server (IIS). This guide provides information for the
More informationELM Server Exchange Edition Virtual Archive Mailbox version 5.5
ELM Server Exchange Edition Virtual Archive Mailbox version 5.5 Copyright 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc., registered in the U.S. and/or other countries.
More informationOutlook 2010 Setup Guide (POP3)
Versions Addressed: Microsoft Office Outlook 2010 Document Updated: 8/31/2012 Copyright 2012 Smarsh, Inc. All rights Purpose: This document will assist the end user in configuring Outlook 2010 to access
More informationHOTPin Integration Guide: DirectAccess
1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility
More informationUse the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.
Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. 1. Click the Windows Start button, then Control Panel How-To-WCC-Secure-Windows-7-11/4/2010-4:09
More informationOrganization Name National Institutional Facilitation Technologies (Pvt.) Ltd. Business Division Name Information Security Solutions (NIFTeTRUST)
Organization Name National Institutional Facilitation Technologies (Pvt.) Ltd. Business Division Name Information Security Solutions (NIFTeTRUST) Document Name Digital ID Installation Guide (Microsoft
More informationUsing Outlook Web Access (OWA) & Remote Web Workplace
Using Outlook Web Access (OWA) & Remote Web Workplace October 6, 2008 Neil G. Levy Phone -732-446-9950 x111 Fax 732-879-0325 neil@freedomtec.com Outlook Web Access (OWA) To access your Outlook/Exchange
More informationOUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010
OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2010 CONTENTS What is Outlook Anywhere? Before you begin How do I configure Outlook Anywhere with Outlook 2010? How do I use Outlook Anywhere? I already
More informationDIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
More informationSafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
More informationIntegration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationDefender 5.7. Remote Access User Guide
Defender 5.7 Remote Access User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationConnector for Microsoft Dynamics Configuration Guide for Microsoft Dynamics SL
Microsoft Dynamics Connector for Microsoft Dynamics Configuration Guide for Microsoft Dynamics SL Revised August, 2012 Find updates to this documentation at the following location: http://www.microsoft.com/download/en/details.aspx?id=10381
More informationKeyAdvantage System DMS Integration. Software User Manual
KeyAdvantage System DMS Integration Software User Manual ii Copyright Disclaimer Trademarks and patents Intended use EMC Directive Regulatory 2013 United Technologies Corporation. All rights reserved.
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter
INTEGRATION GUIDE DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained
More informationMicrosoft IAS and NPS Agent Configuration Guide
Microsoft IAS and NPS Agent Configuration Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Agent IAS and NPS (Microsoft) Configuration
More informationWindows VPN and Epic Installation Instructions
Windows VPN and Epic Installation Instructions Contents Read Me First... 2 Windows 8 VPN installation instructions... 3 Windows 7 VPN installation instructions... 5 BIGIPEdge FAT Client installation instructions...
More informationBusinessObjects Enterprise XI Release 2
BusinessObjects Enterprise XI Release 2 How to configure an Internet Information Services server as a front end to a WebLogic application server Overview Contents This document describes the process of
More informationIntegration Guide. SafeNet Authentication Service. Using RADIUS Protocol for Cisco ASA
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copy right 2013 Saf enet, Inc. All rights reserv ed. 1 Document Information
More informationSetting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationSecurity Assertion Markup Language (SAML) Site Manager Setup
Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and
More information