Cloud Portal Guest Invitations 4.0

Size: px
Start display at page:

Download "Cloud Portal Guest Invitations 4.0"

Transcription

1 Release Notes Cloud Portal Guest Invitations 4.0 January 2014 Cloud Portal Guest Invitations 4.0 Release Notes Copyright sentence ( 2014, CTERA Networks. All rights reserved)

2 1 Release Contents Copyright CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission from CTERA Network Ltd. Information in this document is subject to change without notice and does not represent a commitment on part of CTERA Networks Ltd. CTERA, C200, C400, C800, P1200, CloudPlug, NEXT3, Cloud Attached Storage, and Virtual Cloud Drive are trademarks, service marks, or registered trademarks of CTERA Networks Ltd. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. patents, foreign patents, or pending applications. 2 Cloud Portal Guest Invitations 4.0 Release Notes

3 1 Release Contents About This Release Guest invitations are special time-limited URLs containing a secret code that grants the recipient the ability to view a specific file or folder on a Cloud Drive, and to optionally collaborate on those items. In CTERA Portal 4.0, guest invitations include the following highlights: Two-factor authentication Public link Invitation Access and Authentication Logging Two-Factor Authentication In previous versions, CTERA Portal administrators could require invitation recipients to authenticate to the CTERA Portal using their username and password, before they could access shared file/folders. This provided a single layer of protection against unintended recipients accessing the guest invitation URL. CTERA Portal 4.0 supports two-factor authentication for guest invitations. In addition to requiring recipients to authenticate to the CTERA Portal, it is possible to send them a random, 6-digit numeric passcode via , which they must enter in order to access the shared file/folder. To enable two-factor authentication, a CTERA Portal administrator visits the Settings > Invitations page, clicks Settings, and selects Verify with and/or Verify with Text Message. Cloud Portal Guest Invitations 4.0 Release Notes 3

4 1 Release Contents When a portal user wants to share file/folder using two-factor authentication, they access their Cloud Drive, browse to the desired file/folder, and click Invite Guest. 4 Cloud Portal Guest Invitations 4.0 Release Notes

5 Release Contents 1 In the Protection Level field, the user selects Verify by , fills in the rest of the fields, and clicks Invite. The recipient will receive an invitation with a link to the shared file/folder As well as an with a passcode. Cloud Portal Guest Invitations 4.0 Release Notes 5

6 1 Release Contents When the recipient clicks on the link in the invitation, a popup window will prompt them for the passcode. The recipient can only view the shared file/folder after entering the passcode. Protection against Brute Force and DoS Attacks Two-factor authentication is protected against brute force attacks: The user is given five tries to enter the code, after which the code is disabled. In addition, rate limits are employed to restrict the number of authentication requests, so as to protect against denial of service attacks. Bypass of Two-Factor Authentication On private computers, after successfully authenticating using two-factor authentication, the user is given the option of setting their computer as "Trusted". When this option is selected, a 256-bit, unique random key is stored on the user's computer, allowing the user to bypass twofactor authentication challenges and avoid answering challenges from the same device for the next 30 days. 6 Cloud Portal Guest Invitations 4.0 Release Notes

7 Release Contents 1 Public Link In addition to two-factor authentication, it is possible to include a public link in guest invitations. To enable public links, a CTERA Portal administrator visits the Settings > Invitations page, clicks Settings, and then selects Public Link. When a portal user wants to share file/folder, they access their Cloud Drive, browse to the desired file/folder, and click Invite Guest. Then in the Protection Level field, they select Public Link. The recipient will receive an invitation with a public link to the shared file/folder. CTERA administrators can easily copy the link when viewing the invitation in the CTERA Portal's Settings > Invitations page. Cloud Portal Guest Invitations 4.0 Release Notes 7

8 1 Release Contents Invitation Access and Authentication Logging All accesses to invitations, as well as successful or failed two-factor authentication attempts, are logged in the CTERA Portal Access Log. 8 Cloud Portal Guest Invitations 4.0 Release Notes

Release Notes. CTERA Portal 4.1. July 2014. CTERA Portal 4.1 Release Notes 1

Release Notes. CTERA Portal 4.1. July 2014. CTERA Portal 4.1 Release Notes 1 Release Notes CTERA Portal 4.1 July 2014 CTERA Portal 4.1 Release Notes 1 1 Release Contents Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any

More information

Cloud Attached Storage

Cloud Attached Storage Performing a Bare-Metal Restore Cloud Attached Storage January 2014 Version 4.0 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by

More information

Cloud Attached Storage

Cloud Attached Storage Backing Up and Restoring SQL Server Databases Cloud Attached Storage February 2014 Version 4.0 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in

More information

CTERA Agent Sync Edition for Windows

CTERA Agent Sync Edition for Windows Quick Walkthrough CTERA Agent Sync Edition for Windows November 2012 Version 3.2 2012, CTERA Networks. All rights reserved. 1 Install CTERA Agent for Windows Tip For more detailed information, refer to

More information

Backing Up and Restoring Microsoft Hyper-V Server Virtual Machines. Cloud Attached Storage. February 2014 Version 4.0

Backing Up and Restoring Microsoft Hyper-V Server Virtual Machines. Cloud Attached Storage. February 2014 Version 4.0 Backing Up and Restoring Microsoft Hyper-V Server Virtual Machines Cloud Attached Storage February 2014 Version 4.0 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document

More information

Release Notes. CTERA Portal 4.0. November 2013. CTERA Portal 4.0 Release Notes 1

Release Notes. CTERA Portal 4.0. November 2013. CTERA Portal 4.0 Release Notes 1 Release Notes CTERA Portal 4.0 November 2013 CTERA Portal 4.0 Release Notes 1 1 Release Contents Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced

More information

Cloud Attached Storage 5.0

Cloud Attached Storage 5.0 Release Notes Cloud Attached Storage 5.0 March 2015 2015 Cloud Attached Storage 5.0 Release Notes 1 1 Release Contents Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document

More information

How To Install Ctera Agent On A Pc Or Macbook With Acedo (Windows) On A Macbook Or Macintosh (Windows Xp) On An Ubuntu 7.5.2 (Windows 7) On Pc Or Ipad

How To Install Ctera Agent On A Pc Or Macbook With Acedo (Windows) On A Macbook Or Macintosh (Windows Xp) On An Ubuntu 7.5.2 (Windows 7) On Pc Or Ipad Deploying CTERA Agent via Microsoft Active Directory and Single Sign On Cloud Attached Storage September 2015 Version 5.0 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document

More information

Cloud Attached Storage

Cloud Attached Storage Using CTERA Agent in VDI mode Cloud Attached Storage November 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by

More information

Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1

Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1 Migrating Your Windows File Server to a CTERA Cloud Gateway Cloud Attached Storage February 2015 Version 4.1 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document may be

More information

Release Notes. Cloud Attached Storage 2.5.32

Release Notes. Cloud Attached Storage 2.5.32 Release Notes Cloud Attached Storage 2.5.32 January 2011 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Backing Up the CTERA Portal Using Veeam Backup & Replication. CTERA Portal Datacenter Edition. May 2014 Version 4.0

Backing Up the CTERA Portal Using Veeam Backup & Replication. CTERA Portal Datacenter Edition. May 2014 Version 4.0 Backing Up the CTERA Portal Using Veeam Backup & Replication CTERA Portal Datacenter Edition May 2014 Version 4.0 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

Cloud Attached Storage 3.1 EA

Cloud Attached Storage 3.1 EA Release Notes Cloud Attached Storage 3.1 EA March 2012 Cloud Attached Storage 3.1 EA Release Notes 1 1 Release Contents Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document

More information

Release Notes. CTERA Portal 3.2.43. May 2013. CTERA Portal 3.2.43 Release Notes 1

Release Notes. CTERA Portal 3.2.43. May 2013. CTERA Portal 3.2.43 Release Notes 1 Release Notes CTERA Portal 3.2.43 May 2013 CTERA Portal 3.2.43 Release Notes 1 1 Release Contents Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows May 2012 Version 3.1 Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

CTERA Agent File Sync and Share for Mac

CTERA Agent File Sync and Share for Mac Quick Walkthrough for Mac August 2014 Version 4.1 2014, CTERA Networks. All rights reserved. For more detailed information, refer to the for Mac User Guide, available at http://www.ctera.com/support. 1

More information

CTERA Agent for Linux

CTERA Agent for Linux User Guide CTERA Agent for Linux September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

User Guide. CTERA Agent. August 2011 Version 3.0

User Guide. CTERA Agent. August 2011 Version 3.0 User Guide CTERA Agent August 2011 Version 3.0 Copyright 2009-2011 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission

More information

CTERA Agent for Windows

CTERA Agent for Windows User Guide CTERA Agent for Windows September 2013 Version 4.0 Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without

More information

CTERA Agent for Mac OS-X

CTERA Agent for Mac OS-X User Guide CTERA Agent for Mac OS-X June 2014 Version 4.1 Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means

More information

Adding Signer Authentication to an Envelope

Adding Signer Authentication to an Envelope DocuSign Quick Start Guide Adding Signer Authentication to an Envelope Overview An important DocuSign feature is the ability to verify the identity of a recipient before they can access documents in an

More information

Remote Storage Area (RSA) Basics

Remote Storage Area (RSA) Basics Remote Storage Area (RSA) Basics Table of Contents Remote Storage Area Overview... 3 What is Remote Storage Area?... 3 Who has access to RSA?... 3 How much space is available?... 3 Basic RSA Use... 4 How

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication The two-factor authentication system provides an additional level of security when signing in to Ryerson web applications via Ryerson s Central Authentication Service. When you

More information

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox VMware Identity Manager SEPTEMBER 2015 V1 Configuring Single Sign-On from VMware Identity Manager to Dropbox Table of Contents

More information

CTERA End-to-End Security. Whitepaper by CTERA Networks

CTERA End-to-End Security. Whitepaper by CTERA Networks CTERA End-to-End Security Whitepaper by CTERA Networks Copyright 2009-2012 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

WatchDox for Mac User Guide

WatchDox for Mac User Guide WatchDox for Mac User Guide Version 2.3.0 Confidentiality This document contains confidential material that is proprietary to WatchDox. The information and ideas herein may not be disclosed to any unauthorized

More information

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Setting up VMware ESXi for 2X VirtualDesktopServer Manual Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples

More information

Patient Portal. Accessing the Patient Portal. How to Begin: Enter first and last name, date of birth and create a user name and password.

Patient Portal. Accessing the Patient Portal. How to Begin: Enter first and last name, date of birth and create a user name and password. Patient Portal How to Begin: If you provided an email address when you registered as a patient, you can expect an email after your discharge that will be sent directly from CPSI, our Electronic Health

More information

SafeNet Authentication Manager 8.2 and Windows Azure. Quick Start Guide

SafeNet Authentication Manager 8.2 and Windows Azure. Quick Start Guide SafeNet Authentication Manager 8.2 and Windows Azure Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate. SafeNet,

More information

Cloud Attached Storage 3.2.47

Cloud Attached Storage 3.2.47 Release Notes Cloud Attached Storage 3.2.47 May 2013 Cloud Attached Storage 3.2.47 Release Notes 1 1 Release Contents Copyright 2009-2013 CTERA Networks Ltd. All rights reserved. No part of this document

More information

How to Configure Guest Management on the DWC-1000

How to Configure Guest Management on the DWC-1000 Configuration Guide How to Configure Guest Management on the DWC-1000 Overview This guide describes how to configure and customize a billing profile and generate temporary user account on the D-Link DWC-1000

More information

Access to Webmail services via a Non Trust Computer

Access to Webmail services via a Non Trust Computer Access to Webmail services via a Non Trust Computer Aintree Outlook Web Access has been provided via the AppGate SSL Portal, this service can be accessed from any computer on the Internet. Two factor SMS

More information

NTP Software File Auditor for Windows Edition

NTP Software File Auditor for Windows Edition NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor

More information

Installation Guide. SafeNet Authentication Service

Installation Guide. SafeNet Authentication Service SafeNet Authentication Service Installation Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Omniquad Exchange Archiving

Omniquad Exchange Archiving Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith

More information

Integration Guide. Duo Security Authentication

Integration Guide. Duo Security Authentication Integration Guide Duo Security Authentication Revised: 21 January 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration

More information

Microsoft IAS and NPS Agent Configuration Guide

Microsoft IAS and NPS Agent Configuration Guide Microsoft IAS and NPS Agent Configuration Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Agent IAS and NPS (Microsoft) Configuration

More information

Endpoint Security VPN for Windows 32-bit/64-bit

Endpoint Security VPN for Windows 32-bit/64-bit Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users

StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011.

More information

Email Archiving User Guide Outlook Plugin. Manual version 3.1

Email Archiving User Guide Outlook Plugin. Manual version 3.1 Email Archiving User Guide Outlook Plugin Manual version 3.1 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith Road Hammersmith London W14 8TH United Kingdom Omniquad

More information

Implementing SSL Offload with JAGUAR Ver.1.0

Implementing SSL Offload with JAGUAR Ver.1.0 JAG C TB SSL Offload v1.0 E Implementing SSL Offload with JAGUAR Ver.1.0 T e c h n i c a l B r i e f What is SSL Offload with JAGUAR 5000 Reverse Proxy? JAGUAR 5000 can change HTTP Web Server s service

More information

Juniper SSL VPN Authentication QUICKStart Guide

Juniper SSL VPN Authentication QUICKStart Guide Juniper SSL VPN Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights

More information

Cloud Authentication. Getting Started Guide. Version 2.1.0.06

Cloud Authentication. Getting Started Guide. Version 2.1.0.06 Cloud Authentication Getting Started Guide Version 2.1.0.06 ii Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government. END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010

More information

This document shows new Citrix users how to set up and log in to their Citrix account.

This document shows new Citrix users how to set up and log in to their Citrix account. Citrix Set up Set up and Log in to Citrix Objective: This document shows new Citrix users how to set up and log in to their Citrix account. Procedure This document shows you how to set up and log in to

More information

Welcome to Your FCSL Student Web Portal. Course Schedule Students can view and search course schedules and view class details.

Welcome to Your FCSL Student Web Portal. Course Schedule Students can view and search course schedules and view class details. Welcome to Your FCSL Student Web Portal Course Schedule Students can view and search course schedules and view class details. Online Registration Online registration allows students to register for courses

More information

Two Factor Authentication - USER GUIDE

Two Factor Authentication - USER GUIDE Two Factor Authentication - USER GUIDE Two Factor Authentication (or 2FA) is a two step verification process that provides an extra layer of security for you when accessing your account within Online Services.

More information

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple

More information

Receiving Secure Emails

Receiving Secure Emails Receiving Secure Emails This document explains how you can access emails that have been sent to you through CyberArk s Secure Email system in several simple steps. When you receive a secure email, you

More information

Initial DUO 2 Factor Setup, Install, Login and Verification

Initial DUO 2 Factor Setup, Install, Login and Verification Please read this entire document it contains important instructions that will help you with the setup and maintenance of your DUO account. PLEASE NOTE: Use of a smartphone is the fastest and simplest way

More information

WatchDox for Windows. User Guide. Version 3.9.5

WatchDox for Windows. User Guide. Version 3.9.5 WatchDox for Windows User Guide Version 3.9.5 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to

More information

SafeNet Cisco AnyConnect Client. Configuration Guide

SafeNet Cisco AnyConnect Client. Configuration Guide SafeNet Cisco AnyConnect Client Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and

More information

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0 Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:

More information

Using the Payment Processing Feature

Using the Payment Processing Feature DocuSign Quick Start Guide Using the Payment Processing Feature Overview There might be times when you want to send an envelope where you can send an offer, close the deal and collect the cash all in one

More information

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx Configuring Single Sign-on from the VMware Identity Manager Service to WebEx VMware Identity Manager SEPTEMBER 2015 V 2 Configuring Single Sign-On from VMware Identity Manager to WebEx Table of Contents

More information

NTP Software File Reporter Analysis Server

NTP Software File Reporter Analysis Server NTP Software File Reporter Analysis Server Installation Guide Version 7.5 - September 2015 This guide provides quick instructions for installing NTP Software File Reporter Analysis Server from an administrator

More information

WatchDox SharePoint Beta Guide. Application Version 1.0.0

WatchDox SharePoint Beta Guide. Application Version 1.0.0 Application Version 1.0.0 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

ClickView Digital Signage User Manual

ClickView Digital Signage User Manual ClickView Digital Signage User Manual Table of Contents 1. What is ClickView Digital Signage?... 3 2. Where do I find ClickView Digital Signage?... 3 2.1. To find ClickView Digital Signage... 3 3. How

More information

Why Use Blackboard Content System to Store Documents One Time

Why Use Blackboard Content System to Store Documents One Time Set Up Blackboard Drive to Store and Access Assessment Plans and Related Documents This document will walk you through installing the Blackboard Drive application and then configuring it to access the

More information

Strong Authentication for Juniper Networks SSL VPN

Strong Authentication for Juniper Networks SSL VPN Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

CA VPN Client. User Guide for Windows 1.0.2.2

CA VPN Client. User Guide for Windows 1.0.2.2 CA VPN Client User Guide for Windows 1.0.2.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your

More information

USER GUIDE 2014 AGILE NETWORK, LLC ALL RIGHTS RESERVED

USER GUIDE 2014 AGILE NETWORK, LLC ALL RIGHTS RESERVED Customer Portal USER GUIDE 2014 AGILE NETWORK, LLC ALL RIGHTS RESERVED Customer Portal TABLE OF CONTENTS Customer Support Process 3 Logging-in to Your Account... 4 Navigating the Portal. 5 Maintaining

More information

FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide

FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide February 5, 2015 Revision 1 Copyright 2015 Fortinet, Inc. All rights reserved.

More information

A Step-By-Step Guide

A Step-By-Step Guide ONLINE SUPPORT SYSTEM A Step-By-Step Guide Contents About This Guide...3 Who Should Read This Guide...3 Overview...4 Login...5 Report a Problem...7 View Existing Tickets...9 Request a Modification...10

More information

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to AirWatch Applications

More information

Fax User Guide 07/31/2014 USER GUIDE

Fax User Guide 07/31/2014 USER GUIDE Fax User Guide 07/31/2014 USER GUIDE Contents: Access Fusion Fax Service 3 Search Tab 3 View Tab 5 To E-mail From View Page 5 Send Tab 7 Recipient Info Section 7 Attachments Section 7 Preview Fax Section

More information

Remote Access End User Reference Guide for SHC Portal Access

Remote Access End User Reference Guide for SHC Portal Access Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication This document describes SonicWALL s implementation of two-factor authentication for SonicWALL SSL-VPN appliances. This document contains the following sections: Feature Overview

More information

BlackShield ID Agent for Remote Web Workplace

BlackShield ID Agent for Remote Web Workplace Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,

More information

Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com

Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner. 2015 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner 05 Pipelinersales Inc. www.pipelinersales.com Getting Started with Pipeliner Learn How to Get Started with Pipeliner Sales CRM Application. CONTENT. Setting up Pipeliner

More information

Quick Start User Guide

Quick Start User Guide The global standard for esignature Quick Start User Guide Using Templates Overview This guide provides an overview of how to use a template when creating and sending an envelope. Templates help streamline

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Welcome to ncrypted Cloud!

Welcome to ncrypted Cloud! Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption) to secure files stored in the

More information

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

Citrix Receiver. Configuration and User Guide. For Windows Users

Citrix Receiver. Configuration and User Guide. For Windows Users Citrix Receiver Configuration and User Guide For Windows Users rev: 26.01.2016 https://access.sap.com/ TABLE OF CONTENTS Introduction... 3 Installation... 3 Accessing our portal... 3 Accessing from SAP

More information

WatchDox for Windows User Guide. Version 3.9.0

WatchDox for Windows User Guide. Version 3.9.0 Version 3.9.0 Notice Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals or

More information

Secure File Transfer Guest User Guide Updated: 5/8/14

Secure File Transfer Guest User Guide Updated: 5/8/14 Secure File Transfer Guest User Guide Updated: 5/8/14 TABLE OF CONTENTS INTRODUCTION... 3 ACCESS SECURE FILE TRANSFER TOOL... 3 REGISTRATION... 4 SELF REGISTERING... 4 REGISTER VIA AN INVITATION SENT BY

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013 The information contained

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012

StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012 StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software logos are trademarks of StarWind Software which

More information

Cisco ASA Authentication QUICKStart Guide

Cisco ASA Authentication QUICKStart Guide Cisco ASA Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved.

More information

Dell Mobile Management. Apple Device Enrollment Program

Dell Mobile Management. Apple Device Enrollment Program Dell Mobile Management Contents Dell Mobile Management 3 Setting up the 3 DMM Device Deployment Program Prerequisites 4 Configure Apple VPP Token in DMM 5 Download Apple VPP Token 5 Assign VPP App Licenses

More information

ELM Server Exchange Edition Virtual Archive Mailbox version 5.5

ELM Server Exchange Edition Virtual Archive Mailbox version 5.5 ELM Server Exchange Edition Virtual Archive Mailbox version 5.5 Copyright 2016 Lexmark. All rights reserved. Lexmark is a trademark of Lexmark International, Inc., registered in the U.S. and/or other countries.

More information

RedBlack CyBake Online Customer Service Desk

RedBlack CyBake Online Customer Service Desk RedBlack CyBake Online Customer Service Desk Publication Date: June 2014 Copyright Copyright 2014 RedBlack Software Ltd. All rights reserved. Complying with all applicable copyright laws is the responsibility

More information

Manual POLICY PATROL SECURE FILE TRANSFER

Manual POLICY PATROL SECURE FILE TRANSFER Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software

More information

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to

More information

Using Internet or Windows Explorer to Upload Your Site

Using Internet or Windows Explorer to Upload Your Site Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting

More information

Mac OS X User Manual Version 2.0

Mac OS X User Manual Version 2.0 Mac OS X User Manual Version 2.0 Welcome to ncrypted Cloud! ncrypted Cloud is a Privacy, Security, and Collaboration application that uses Industry Standard Encryption Technology (AES-256 bit encryption)

More information

ProxySG TechBrief Downloading & Configuring Web Filter

ProxySG TechBrief Downloading & Configuring Web Filter ProxySG TechBrief Downloading & Configuring Web Filter What is Content Filtering? URL filtering is the process of limiting a user s Web site access through a policy that is associated with a specific URL

More information

Using YSU Password Self-Service

Using YSU Password Self-Service Using YSU Password Self-Service Using YSU Password Self-Service Password Self-Service Web Interface Required Items: YSU (MyYSU) Directory account, Web browser This guide will assist you with using the

More information

SFTP Server User Login Instructions. Open Internet explorer and enter the following url: https://sftp.sae.org

SFTP Server User Login Instructions. Open Internet explorer and enter the following url: https://sftp.sae.org SFTP Server User Login Instructions Open Internet explorer and enter the following url: https://sftp.sae.org You will be prompted for a user id and password as such. Please enter your account id and password.

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Citrix Receiver. Configuration and User Guide. For Macintosh Users

Citrix Receiver. Configuration and User Guide. For Macintosh Users Citrix Receiver Configuration and User Guide For Macintosh Users rev: 25.03.2015 https://access.sap.com/ TABLE OF CONTENTS Introduction... 3 Installation... 3 Accessing our portal... 3 Accessing from SAP

More information

Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step

Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step Guide Microsoft Corporation Published: July 2009 Updated: September 2009 Abstract Remote Desktop Web Access (RD Web

More information

RSA SecurID Software Token 1.0 for Android Administrator s Guide

RSA SecurID Software Token 1.0 for Android Administrator s Guide RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

NovaBACKUP Remote Workforce Version 12.5 Cloud Restore

NovaBACKUP Remote Workforce Version 12.5 Cloud Restore NovaBACKUP Remote Workforce Version 12.5 Cloud Restore NovaStor / November 2011 Rev 20111114 2011 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and

More information

http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx

http://docs.trendmicro.com/en-us/enterprise/safesync-for-enterprise.aspx Trend Micro Incorporated reserves the right to make changes to this document and to the product described herein without notice. Before installing and using the product, review the readme files, release

More information