PowerBroker Identity Services. Programmer's Guide
|
|
|
- Rachel Bryan
- 10 years ago
- Views:
Transcription
1 PowerBroker Identity Services Programmer's Guide
2 Contents Introduction 3 Turning On Scripting 4 Simple Scripting with VBScript 5 Scripting with C# or VB.NET 8 Advanced Topics 9 Programming Reference 10 ILikewiseIdentity 10 ILikewiseCell 10 ILikewiseUser 13 ILikewiseGroup 13 ILikewiseNISMapEntry 14 BeyondTrust November
3 Introduction Introduction PowerBroker Identity Services joins Unix, Linux, and Mac OS X computers to Active Directory so that you can centrally manage all your computers from one source, authenticate users with the highly secure Kerberos 5 protocol, control access to resources, and apply group policies to non-windows computers. The result: Vastly simplified account management, improved security, reduced infrastructure costs, streamlined operations, and easier regulatory compliance. PowerBroker Identity Services provides graphical tools to manage Linux and Unix information in Active Directory. However, it can be useful to access and modify the information programmatically. For this purpose, PowerBroker Identity Services provides scripting objects that can be used by any programming language that supports the Microsoft Common Object Model, or COM. The scripting objects provide dual interfaces that can be used by languages that use COM early binding, such as C++ and C#, and by languages that use Idispatch, such as VBScript and Jscript. This document describes the PowerBroker Identity Services scripting objects and explains how to use them. BeyondTrust November
4 Turning On Scripting Turning On Scripting Before you can use PBIS scripting objects, you must first register the PBIS DLL that provides this functionality. This DLL, LikewiseIdentity.dll, is placed in the PBIS installation directory, typically, c:\program files\centeris\likewiseidentity. Register the DLL by using the Microsoft.NET regasm utility: Regasm c:\program files\centeris\likewiseidentity\likewiseidentity.dll Note: If your system can not find regasm, you may need to use it from %windir%\microsoft.net\framework\v or to add this directory to your path. BeyondTrust November
5 Simple Scripting with VBScript Simple Scripting with VBScript To access the PBIS scripting objects from VBScript (using either cscript.exe or wscript.exe), you must first use CreateObject to create an instance of the main PBIS object: Dim olwimain Set olwimain = CreateObject("Likewise.Identity") Once you have this object, your first step is to connect to the Active Directory domain that you want to access. There are two ways of doing this: Dim olwi Set olwi = olwimain.initialize olwi.connect "LDAP://server/dc=yourdomain,dc=com" ' Alternatively ' olwi.connectex "LDAP://server/dc=yourdomain,dc=com", "username", "password" The first form of Connect uses your current login credentials whereas the second form allows you to pass in an alternate set of credentials. If you need to make changes to Active Directory, it's essential that you have sufficient privileges to do so. Regardless of which form you use, at this point, you now have an object (olwi) that is connected to PBIS and is ready to access information. This object implements the ILikewiseIdentity interface. This interface allows you to access and manipulate PowerBroker cells. You can get a list of all the cells in a domain or a particular cell in the domain as follows: Dim listcells Dim ocell Set listcells = olwi.getcells() For each ocell in listcells ' Do something with ocell Next Set ocell = olwi.getcell("ou=engineering") Note that when accessing a specific cell, you have to provide the Active Directory canonical name (cn) of the cell. Other Likewise scripting objects will follow this pattern. You will specify canonical names that Likewise will interpret relative to the distinguished name (dn) that you specified when connecting to your domain. To create or delete a cell, do this: Set ocell = olwi.createcell("ou=accounting") olwi.deletecell acell Note that to delete a cell, you provide a cell object rather than its canonical name. Cell objects implement the ILikewiseCell interface. This interface provides several properties that let you get/set information about the cell and several methods to let you access and manipulate the users and groups that have been enabled. BeyondTrust November
6 Simple Scripting with VBScript ' Get various cell properties sdisplayname = ocell.displayname bisdefaultcell = ocell.isdefaultcell nnextuid = ocell.nextuid nnextgid = ocell.nextgid sdefaulthomedir = ocell.defaulthomedirectory sdefaultshell = ocell.defaultloginshell Dim listusers Set listusers = ocell.getusers() Dim listgroups Set listgroups = ocell.getgroups() You can set these properties to make changes to a cell. Note that the PBIS objects, in a style similar to Microsoft ADSI (Active Directory Scripting Interface) objects, require that you call a method to explicitly commit your changes: ' Change the default login shell to use bash and the default home dir ocell.defaultloginshell = "/bin/bash" ocell.defaulthomedir = "/local/%d/%u" ocell.commitchanges Property changes are not written to Active Directory until you call CommitChanges. This pattern improves performance by delaying Active Directory LDAP write operations until requested. As with the main object, cell objects let you request all the users and groups enabled in the cell or let you access specific ones. Additionally, methods are provided to let you enable and disable users and groups in a cell: ' Fetch a particular user Dim ouser Set ouser = ocell.getuser("cn=bob Smith,cn=Users") ' Enable a new user, specifying "Domain Users" as her primary group sdu = "cn=domain Users,cn=Users" Set ouser = ocell.enableuser("cn=jane Done,cn=Users", sdu) ' Enable a new user, with an explicit UID Set ouser = ocell.enableuserex("cn=clark Kent,cn=Users", sdu, 127) ' Disable a user ocell.disableuser ouser ' Fetch a particular group Dim ogroup Set ogroup = ocell.getgroup(sdu) ' Enable a group letting Likewise assign a new GID Set ogroup = ocell.enablegroup("cn=enterprise Admins,cn=Users") ' This time, specify an explicit GID Set ogroup = ocell.enablegroupex("cn=printer Operators,cn=Users", 444) ' Disable a group ocell.disablegroup ogroup BeyondTrust November
7 Simple Scripting with VBScript User and Group objects implement the ILikewiseUser and ILikewiseGroup interfaces (respectively). These follow similar patterns: ' Fetch some user properties sdisplayname = ouser.displayname ssid = ouser.sid nuid = ouser.uid ngid = ouser.gid sloginname = ouser.loginname ' Actually, the *alias* name shomedir = ouser.homedirectory sloginshell = ouser.loginshell sgecos = ouser.gecos ' Change the user comment field ouser.gecos = "A fine user of Likewise" ouser.commitchanges ' Fetch some group properties sdisplayname = ogroup.displayname ssid = ogroup.sid ngid = ogroup.gid sgecos = ogroup.gecos sgroupalias = ogroup.groupalias ' Change the GID for the group ogroup.gid = 723 ogroup.commitchanges BeyondTrust November
8 Scripting with C# or VB.NET Scripting with C# or VB.NET To programmatically access PBIS with a.net language, you don't need to go through the IDispatch mechanism described in Simple Scripting with VBScript, page 5. Rather than using the LikewiseIdentity.DLL library, you can reference the Likewise DSUtil.DLL library directly. This library is found in the same PBIS installation directory. Note that LWUnifiedProvider.dll should be referenced as well in order for DSUtil.dll to function properly. The DSUtil library exposes the LikewiseIdentity class. This is the actual implementer of the ILikewiseIdentity interface described earlier. In C#: using System; using Centeris.Likewise.Auth; namespace ScriptTest { class Program { static void Main(string[] args) { // create an instance of LikewiseIdentity ILikewiseIdentity lwi = new LikewiseIdentity(); // connect to AD lwi.connect("ldap://dc=yourdomain,dc=com");... // Proceed as with VBScript examples } } } BeyondTrust November
9 Advanced Topics Advanced Topics It is important to keep in mind that the PBIS objects are associated with other objects in Active Directory. An Identity cell object is associated with an AD organizational unit. PBIS user and group objects are associated with Active Directory objects of the same name. Note that the PBIS objects are not the same as the AD objects with which they are associated. Identity objects exist in parallel with the actual AD objects. Occasionally, it might be necessary to access the AD objects associated with Identity objects. Each Identity object provides a property that lets you do this: ' Access the AD user object associated with the Identity user object Dim oadsiuser Set oadsiuser = ouser.user ' Access the AD group object associated with the Identity group object Dim oadsigroup Set oadsigroup = ogroup.group ' Access the AD organizational unit object associated with the Identity cell object Dim oadsiou Set oadsiou = ocell.ou With access to the associated AD objects, you can now use ADSI properties and methods to manipulate the objects. The specifics of these operations are not described here. See the Microsoft documentation and such books as the O'Reilly series on Active Directory: Richard, Joe, Robbie Allen, and Alistair G. Lowe-Norris. Active Directory. Sebastopol, CA: O'Reilly, Allen, Robbie. Active Directory Cookbook. Sebastopol, CA: O'Reilly, BeyondTrust November
10 Programming Reference Programming Reference This section describes the objects and interfaces that are provided by PBIS. ILikewiseIdentity Properties (none) Methods void Connect(string sldappath) void ConnectEx(string sldappath, string susername, string spassword) These methods connect the Likewise object to a particular Active Directory domain. The first form uses the current login credentials whereas the second form specifies explicit credentials. In both forms, sldappath is a full LDAP distinguished name (dn) identifying the directory to which the object should connect (for example, "LDAP://mydc/dc=mydomain,dc=com"). IEnumerable GetCells() This method retrieves a collection of all the cells defined in a domain. The collection can be traversed by using an interator (such as For Each in VBScript). Each returned cell object implements the ILikewiseCell interface. ILikewiseCell GetCell(string soupath) Retrieves an ILikewiseCell object for a particular cell identified by soupath. soupath is the canonical name of the organizational unit with which the cell is associated (for example, "ou=accounting,ou=western Region"). ILikewiseCell CreateCell(string soupath); ILikewiseCell CreateCellEx(string soupath, uint nnextuid, uint nnextgid, string sdefaultshell, string sdefaulthomedirectory) These methods create a new cell in a domain. In both forms, the soupath is the canonical name of the organizational unit with which the cell is to be associated. In the first form, PBIS will automatically set the NextUID, NetGID, DefaultShell, and DefaultHomeDirectory properties of the new cell as per the defaults. In the second form, these properties are set explicitly. bool DeleteCell(ILikewiseCell lwc) Deletes a cell from a domain. The cell to be deleted is identified by the lwc argument. Note that this is not a canonical name a cell must first be "gotten" with GetCell before it can be deleted. ILikewiseCell Properties string DisplayName (Read only) Contains the displayable name of the cell. This is actually the displayname attribute of the organizational unit with which the cell is associated. object OU (Read only) BeyondTrust November
11 Programming Reference Returns ADSI object of the organizational unit with which the cell is associated. string GuidOU (Read only) Returns the GUID of the organizational unit with which the cell is associated. uint NextUID (Read/write) uint NextGID (Read/write) These properties contain the next user ID and group ID that will be automatically allocated to users and groups (respectively) enabled in the cell. bool IsDefaultCell (Read only) This read-only property is set to true if the cell is default cell for the domain. The default cell is associated with the top-most domain object rather than with any particular organizational unit. string DefaultHomeDirectory (Read/write) Contains the default home directory that will be applied to any new users enabled in the cell. The value of this property should use "%D" and "%U" as placeholders for the user's domain and user name. For example, setting this property to "/home/%d/%u" (its default value) means that the user will have his home directory set to "/home/mydomain/joe". string DefaultLoginShell (Read/write) Contains the default shell program that will be applied to any new users enabled in the cell. By default, this is set to "/bin/bash". List<string> LinkedCells (Read) Returns the list of cells to which this one is linked. The PBIS Agent searches linked cells for UID, GID and other information after searching the current cell. The cells are searched in order with a match stopping the search operation. This implies that linked cells that appear earlier in the list take precedence over ones later in the list. The list contains the GUIDs for the linked cells. Although the property is read-only, the returned list can be modified. Methods bool CommitChanges() Writes any modified property values out to Active Directory. If you have changed any property settings, you must call this method to make those changes permanent. IEnumerable GetUsers() Returns a collection of all the users enabled in the cell. Each of the objects in the enumeration implements the ILikewiseUser interface. ILikewiseUser GetUser(string scnuser) Returns an ILikewiseUser object for the object identified by the scnuser argument. This argument should be the AD canonical name of the user, for example, "cn=joe Smith,cn=Users". ILikewiseUser EnableUser(string scnuser, string scnprimarygroup) ILikewiseUser EnableUserEx(string scnuser, string scnprimarygroup, uint nuid) BeyondTrust November
12 Programming Reference These methods enable a user to access computers in the cell. The user is identified by the AD canonical name in the scnuser argument. The scnprimarygroup argument identifies an AD group that has been previously enabled in the cell. The user's Linux/Unix primary group ID will be set to the GID of this enabled group. The first form of this method lets PBIS automatically assign a UID in the cell to the user. The second form specifies an explicit UID. bool DisableUser(ILikewiseUser lwu) This method disables a user in a cell, disallowing access to Linux/Unix computers in the organizational unit with which the cell is associated. The lwu argument specifies an ILikewiseUser object previously obtained with GetUsers or GetUser. ArrayList GetGroups() Returns a collection of all the groups enabled in the cell. Each of the objects in the enumeration implements the ILikewiseGroup interface. ILikewiseGroup GetGroup(string scngroup) Returns an ILikewiseGroup object for the object identified by the scngroup argument. This argument should be the AD canonical name of the group, for example, "cn=domain Admins,cn=Users". ILikewiseGroup EnableGroup(string scngroup) ILikewiseGroup EnableGroupEx(string scngroup, uint ngid) These methods enable the use of an AD group within a PowerBroker cell. Enabling a group assigns it a group ID in that cell. The first form of this method lets PBIS automatically assign a GID. The second form specifies the GID explicitly. In both forms, the scngroup argument should be set to the canonical name of the AD group that is to be enabled in the cell (for example, "cn=enterprise Admins,cn=Users"). Note that enabling a group in a cell does not automatically enable the users that are members of the group. bool DisableGroup(ILikewiseGroup lwg) This method disables a group in a cell. The lwg argument specifies an ILikewiseGroup object previously obtained with GetGroups or GetGroup. ArrayList GetNISMapNames() Returns a collection of the names (strings) of all the NIS Maps defined in the cell. ArrayList GetNISMapEntries(string smapname) Returns a collection of the entries in the specified NIS Map defined in the cell. Each item in the collection implements the ILikewiseNISMapEntry interface. ILikewiseNISMapEntry GetNISMapEntry(string smapname, string smapkey) Returns a specific entry in the specified NIS Map defined in the cell. bool CreateNISMap(string smapname) Creates a new NIS Map with the specified name in the cell. ILikewiseNISMapEntry CreateNISMapEntry(string smapname, string skeyname, string svalue) Creates an entry in the specified NIS Map in the cell. The entry is given the specified key name and value. bool DeleteNISMap(string smapname) Deletes the NIS Map with the specified name in the cell. BeyondTrust November
13 Programming Reference bool DeleteNISMapEntry(string smapname, string skeyname) Deletes a NIS Map entry with the specified key name from the specified NIS Map in the cell. ILikewiseUser Properties string DisplayName (Read only) Contains the displayable name of the user. This is actually the displayname attribute of the AD user object with which the ILikewiseUser object is associated. object User (Read only) Returns ADSI object of the AD user object with which this ILikewiseUser object is associated. string SID (Read only) Returns the SID of the AD user object with which this ILikewiseUser object is associated. uint UID (Read/write) uint GID (Read/write) These properties contain the UID and GID of the user as assigned within the cell from which this ILikewiseUser object was obtained. string LoginName (Read/write) This property contains the Linux/UNIX login name of the user as set within the cell from which this ILikewiseUser object was obtained. If this is left blank, the login name will be the same as the samaccountname of the user which which this ILikewiseUser object is associated. If it is not blank, the LoginName is considered an "alias" for the user. string HomeDirectory (Read/write) Contains the home directory for the user as set within the cell from which this IlikewiseUser object was obtained. Note that this property must not contain any spaces (even if the user's name contains them). string LoginShell (Read/write) Contains the Linux/Unix shell that will be started initially when the user logs on to a Linux/Unix computer in the cell. string GECOS (Read/write) Contains the GECOS "comment" field associated with the user within the current cell. Methods bool CommitChanges() Writes any modified property values out to Active Directory. If you have changed any property settings, you must call this method to make those changes permanent. ILikewiseGroup Properties string DisplayName (Read only) BeyondTrust November
14 Programming Reference Contains the displayable name of the group. This is actually the displayname attribute of the AD group object with which the ILikewiseGroup object is associated. object Group (Read only) Returns ADSI object of the AD group object with which this ILikewiseGroup object is associated. string SID (Read only) Returns the SID of the AD group object with which this ILikewiseGroup object is associated. uint GID (Read/write) This properties contains the GID of the group as assigned within the cell from which this ILikewiseGroup object was obtained. string GECOS (Read/write) Contains the GECOS "comment" field associated with the group within the current cell. string GroupAlias (Read/write) Contains the group alias of the group. Group aliases are when mapping an AD group to a different group name on UNIX/Linux. Methods bool CommitChanges() Writes any modified property values out to Active Directory. If you have changed any property settings, you must call this method to make those changes permanent. ILikewiseNISMapEntry Properties: string DisplayName (Read only) Contains the displayable key name of the entry. string Value (Read/Write) Contains the value of the entry. Object Object (Read only) Returns ADSI object of the AD object with which this ILikewiseNISMapEntry object is associated. Methods bool CommitChanges() Writes any modified property values out to Active Directory. If you've changed any property settings, you must call this method to make those changes permanent. BeyondTrust November
Identity and Access Management Integration with PowerBroker. Providing Complete Visibility and Auditing of Identities
Identity and Access Management Integration with PowerBroker Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 4 BeyondTrust
Step-by-Step Guide to Bulk Import and Export to Active Directory
All Products Support Search microsoft.com Guide Windows 2000 Home Windows 2000 Worldwide Search This Site Go Advanced Search Windows 2000 > Technical Resources > Step-by-Step Guides Step-by-Step Guide
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance
An Oracle Technical White Paper November 2014 How to Use Microsoft Active Directory as an LDAP Source with the Oracle ZFS Storage Appliance Table of Contents Introduction...3 Active Directory LDAP Services...4
Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard
White Paper Using PowerBroker Identity Services to Comply with the PCI DSS Security Standard Abstract This document describes how PowerBroker Identity Services Enterprise and Microsoft Active Directory
Step-by-Step Guide to Active Directory Bulk Import and Export
Page 1 of 12 TechNet Home > Windows Server TechCenter > Identity and Directory Services > Active Directory > Step By Step Step-by-Step Guide to Active Directory Bulk Import and Export Published: September
Automating System Administration with Perl
O'REILLY Beijing Cambridge Farnham Köln Sebastopol Taipei Tokyo SECOND EDITION Automating System Administration with Perl David N. Blank-Edelman Table of Contents Preface xv 1. Introduction 1 Automation
FreeIPA 3.3 Trust features
FreeIPA 3.3 features Sumit Bose, Alexander Bokovoy March 2014 FreeIPA and Active Directory FreeIPA and Active Directory both provide identity management solutions on top of the Kerberos infrastructure
IPA Identity, Policy, Audit Karl Wirth, Red Hat Kevin Unthank, Red Hat
IPA Identity, Policy, Audit Karl Wirth, Red Hat Kevin Unthank, Red Hat What is IPA? A) India Pale Ale B) Identity, Policy, and Audit C) An open source project D) A Red Hat solution offering E) All of the
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
Configuring and Using the TMM with LDAP / Active Directory
Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring
PowerBroker Identity Services. Administration Guide
PowerBroker Identity Services Administration Guide Revision/Update Information: September 2014 Corporate Headquarters 5090 N. 40th Street Phoenix, AZ 85018 Phone: 1 818-575-4000 COPYRIGHT NOTICE Copyright
Active Directory and Linux Identity Management
Active Directory and Linux Identity Management Published by the Open Source Software Lab at Microsoft. December 2007. Special thanks to Chris Travers, Contributing Author to the Open Source Software Lab.
Step- by- Step guide to extend Credential Sync between IBM WebSphere Portal 8.5 credential vault and Active Directory 2012 using Security Directory
Step- by- Step guide to extend Credential Sync between IBM WebSphere Portal 8.5 credential vault and Active Directory 2012 using Security Directory Integrator (ex TDI) on Red- Hat (part 3) Summary STEP-
How To Use Blackberry Web Services On A Blackberry Device
Development Guide BlackBerry Web Services Microsoft.NET Version 12.1 Published: 2015-02-25 SWD-20150507151709605 Contents BlackBerry Web Services... 4 Programmatic access to common management tasks...
Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies
Guideline Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies Product(s): IBM Cognos 8 BI Area of Interest: Security Integrating IBM Cognos 8 BI with 3rd Party Auhtentication Proxies 2 Copyright
Cross-Realm Trust Interoperability, MIT Kerberos and AD
Cross-Realm Trust Interoperability, MIT Kerberos and AD Dmitri Pal Sr. Engineering Manager Red Hat Inc. 10/27/2010 1 INTERNAL ONLY PRESENTER NAME What is our focus? Traditional view on Kerberos interoperability
How To Set Up An Openfire With Libap On A Cdd (Dns) On A Pc Or Mac Or Ipad (Dnt) On An Ipad Or Ipa (Dn) On Your Pc Or Ipo (D
1 of 8 2/6/2012 8:52 AM Home OpenFire XMPP (Jabber) Server OpenFire Active Directory LDAP integration Sat, 01/05/2010-09:49 uvigii Contents 1. Scenario 2. A brief introduction to LDAP protocol 3. Configure
WirelessOffice Administrator LDAP/Active Directory Support
Emergin, Inc. WirelessOffice Administrator LDAP/Active Directory Support Document Version 6.0R02 Product Version 6.0 DATE: 08-09-2004 Table of Contents Objective:... 3 Overview:... 4 User Interface Changes...
Using VBScript to Automate User and Group Administration
Using VBScript to Automate User and Group Administration Exam Objectives in this Chapter: Create and manage groups Create and modify groups by using automation Create and manage user accounts Create and
Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal
Guideline Enabling Single Signon with IBM Cognos ReportNet and SAP Enterprise Portal Product(s): IBM Cognos ReportNet Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
Active Directory LDAP Quota and Admin account authentication and management
Active Directory LDAP Quota and Admin account authentication and management Version 4.1 Updated July 2014 GoPrint Systems 2014 GoPrint Systems, Inc, All rights reserved. One Annabel Lane, Suite 105 San
Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger. www.cse.psu.edu/~tjaeger/cse497b-s07/
Windows Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ Windows Security 0 to full speed No protection system in early versions
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
LDAP and Integrated Technologies: A Simple Primer Brian Kowalczyk, Kowal Computer Solutions Inc., IL Richard Kerwin, R.K. Consulting Inc.
LDAP and Integrated Technologies: A Simple Primer Brian Kowalczyk, Kowal Computer Solutions Inc., IL Richard Kerwin, R.K. Consulting Inc., IL ABSTRACT SAS Integration Technologies and LDAP(Lightweight
Revolution R Enterprise DeployR 7.1 Enterprise Security Guide. Authentication, Authorization, and Access Controls
Revolution R Enterprise DeployR 7.1 Enterprise Security Guide Authentication, Authorization, and Access Controls The correct bibliographic citation for this manual is as follows: Revolution Analytics,
IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE
White Paper IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE Abstract The OneFS user mapping service combines a user s identities from different directory services into a single access
Active Directory Implemenation
Active Directory Implemenation For PowerBuilder, Appeon Web & Appeon Mobile Powered by Sponsored by An Actual Implementation Case Study! By Chris Pollach President: Software Tool & Die Inc. Ottawa, Canada
PowerBroker Identity Services. Group Policy Guide
PowerBroker Identity Services Group Policy Guide Revision/Update Information: May 2014 Corporate Headquarters 5090 N. 40th Street Phoenix, AZ 85018 Phone: 1 818-575-4000 COPYRIGHT NOTICE Copyright 2014
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Outline 1. What is authentication? a. General Informations 2. Authentication Systems in Linux a. Local
LDAP User Guide PowerSchool Premier 5.1 Student Information System
PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson
Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names
DataCove DT Active Directory Authentication In Active Directory (AD) authentication mode, the server uses NTLM v2 and LDAP protocols to authenticate users residing in Active Directory. The login procedure
Skyward LDAP Launch Kit Table of Contents
04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know
Windows PowerShell Cookbook
Windows PowerShell Cookbook Lee Holmes O'REILLY' Beijing Cambridge Farnham Koln Paris Sebastopol Taipei Tokyo Table of Contents Foreword Preface xvii xxi Part I. Tour A Guided Tour of Windows PowerShell
How To Use Directcontrol With Netapp Filers And Directcontrol Together
Application Note Using DirectControl with Network Appliance Filers Published: June 2006 Abstract This Application Note describes the integration between Network Appliance servers and Centrify DirectControl
ECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7
ECAT SWE Exchange Customer Administration Tool SWE - Exchange Customer Administration Tool (ECAT) Table of Contents About this Guide... 3 Audience and Purpose... 3 What is in this Guide?... 3 CA.mail Website...
Security Provider Integration LDAP Server
Security Provider Integration LDAP Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Adeptia Suite LDAP Integration Guide
Adeptia Suite LDAP Integration Guide Version 6.2 Release Date February 24, 2015 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 DOCUMENT INFORMATION Adeptia
Integrating Mac OS X 10.6 with Active Directory. 1 April 2010
Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active
Sample Configuration: Cisco UCS, LDAP and Active Directory
First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
Security with LDAP. Andrew Findlay. February 2002. Skills 1st Ltd www.skills-1st.co.uk. [email protected]
Security with LDAP Andrew Findlay Skills 1st Ltd www.skills-1st.co.uk February 2002 Security with LDAP Applications of LDAP White Pages NIS (Network Information System) Authentication Lots of hype How
Authoring for System Center 2012 Operations Manager
Authoring for System Center 2012 Operations Manager Microsoft Corporation Published: November 1, 2013 Authors Byron Ricks Applies To System Center 2012 Operations Manager System Center 2012 Service Pack
PriveonLabs Research. Cisco Security Agent Protection Series:
Cisco Security Agent Protection Series: Enabling LDAP for CSA Management Center SSO Authentication For CSA 5.2 Versions 5.2.0.245 and up Fred Parks Systems Consultant 3/25/2008 2008 Priveon, Inc. www.priveonlabs.com
Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley
Likewise Enterprise Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley IMPROVE SOX COMPLIANCE WITH CENTRALIZED ACCESS CONTROL AND AUTHENTICATION With Likewise Enterprise, you get one user,
Understanding and Using NetInfo. Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network
Understanding and Using NetInfo Includes information on setting up Mac OS X Server and NetInfo to increase the power of your Mac OS X network K Apple Computer, Inc. 2001 Apple Computer, Inc. All rights
SMART Directory Sync 4.3.0.1. Known Limitations
SMART Directory Sync 4.3.0.1 Known Limitations September 2015 Table of Contents Known Limitations 4.3.0.1... 3 AD to AD... 3 AD to AD Group Sync... 3 AD to AD User Sync... 3 AD to Domino... 3 AD to Domino
Using LDAP with Sentry Firmware and Sentry Power Manager (SPM)
Using LDAP with Sentry Firmware and Sentry Power Manager (SPM) Table of Contents Purpose LDAP Requirements Using LDAP with Sentry Firmware (GUI) Initiate a Sentry GUI Session Configuring LDAP for Active
Planning LDAP Integration with EMC Documentum Content Server and Frequently Asked Questions
EMC Documentum Content Server and Frequently Asked Questions Applied Technology Abstract This white paper details various aspects of planning LDAP synchronization with EMC Documentum Content Server. This
Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide
Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without
Version 9. Active Directory Integration in Progeny 9
Version 9 Active Directory Integration in Progeny 9 1 Active Directory Integration in Progeny 9 Directory-based authentication via LDAP protocols Copyright Limit of Liability Trademarks Customer Support
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
NETASQ ACTIVE DIRECTORY INTEGRATION
NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos
ONEFS MULTIPROTOCOL SECURITY UNTANGLED
White Paper ONEFS MULTIPROTOCOL SECURITY UNTANGLED Abstract This paper describes the role that identity management, authentication, and access control play in the security system of the EMC Isilon OneFS
IPBrick - Member of AD domain IPBrick iportalmais
IPBrick - Member of AD domain IPBrick iportalmais March 2009 2 Copyright c iportalmais All rights reserved. March 2009. The information in this document can be changed without further notice. The declarations,
Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal
Guideline Enabling Single Signon with IBM Cognos 8 BI MR1 and SAP Enterprise Portal Product: IBM Cognos 8 BI Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated).
P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc.
P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. Product Category: Password Management/Provisioning Validation Date: TBD Product Abstract M-Tech software streamlines
Troubleshooting Active Directory Server
Proven Practice Troubleshooting Active Directory Server Product(s): IBM Cognos Series 7 Area of Interest: Security Troubleshooting Active Directory Server 2 Copyright Copyright 2008 Cognos ULC (formerly
PowerCAMPUS Portal and Active Directory
SUNGARD SUMMIT 2007 sungardsummit.com 1 PowerCAMPUS Portal and Active Directory Presented by: Chad Sexton PowerCAMPUS Portal Development March 21, 2007 A Community of Learning Overview SunGard Higher Education
FileCruiser. VA2600 SR1 Quick Configuration Guide
FileCruiser VA2600 SR1 Quick Configuration Guide Contents About this guide 1 Setup FileCruiser 2 Get IP address 2 Login to the Administration Portal 3 Basic configuration with Setup Wizard 4 Step 1: Configure
What s New in Centrify Server Suite 2014
CENTRIFY SERVER SUITE 2014 WHAT S NEW What s New in Centrify Server Suite 2014 The new Centrify Server Suite 2014 introduces major new features that simplify risk management and make regulatory compliance
How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free
Setting Up a Macintosh For Use In The Medical Center The purpose of this document is to provide some assistance and direction to the users of Macintosh computers in The Medical Center network environment.
Ultimus and Microsoft Active Directory
Ultimus and Microsoft Active Directory May 2004 Ultimus, Incorporated 15200 Weston Parkway, Suite 106 Cary, North Carolina 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: [email protected]
Single Sign-On for Kerberized Linux and UNIX Applications
Likewise Enterprise Single Sign-On for Kerberized Linux and UNIX Applications AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise facilitates the
Microsoft Visual Basic Scripting Edition and Microsoft Windows Script Host Essentials
Microsoft Visual Basic Scripting Edition and Microsoft Windows Script Host Essentials 2433: Microsoft Visual Basic Scripting Edition and Microsoft Windows Script Host Essentials (3 Days) About this Course
ACE Names and UID/GID/SIDs
ACE Names and UID/GID/SIDs Mapping NFSv4 ACE Names to Internal Identifiers Or How to Deal with Users and Groups From Muitple Domains on POSIX and Multi-Protocol File Servers and Clients [email protected]
PowerBroker Identity Services. Installation Guide
PowerBroker Identity Services Installation Guide Revision/Update Information: July 2014 Corporate Headquarters 5090 N. 40th Street Phoenix, AZ 85018 Phone: 1 818-575-4000 COPYRIGHT NOTICE Copyright 2014
Windows Server 2003 Logon Scripts Paul Flynn
Creating logon scripts You can use logon scripts to assign tasks that will be performed when a user logs on to a particular computer. The scripts can carry out operating system commands, set system environment
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows
Interoperability Update: Red Hat Enterprise 7 beta and Microsoft Windows Mark Heslin Principal Systems Engineer Red Hat Systems Engineering Dmitri Pal Senior Engineering Manager Red Hat Software Engineering
Avaya CM Login with Windows Active Directory Services
Avaya CM Login with Windows Active Directory Services Objective 2 Installing Active Directory Services on a Windows 2003 Server 2 Installing Windows Service for UNIX on Windows 2003 Active Directory Server
Getting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE
White Paper USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE CONTENTS Executive Summary 1 Introduction 1 Audience 2 Terminology 2 Windows Concepts
NDK: Novell edirectory Core Services. novdocx (en) 24 April 2008. Novell Developer Kit. www.novell.com NOVELL EDIRECTORY TM CORE SERVICES.
NDK: Novell edirectory Core Services Novell Developer Kit www.novell.com June 2008 NOVELL EDIRECTORY TM CORE SERVICES Legal Notices Novell, Inc. makes no representations or warranties with respect to the
Configuring Controller 8.2 to use Active Directory authentication
Proven Practice Configuring Controller 8.2 to use Active Directory authentication Product(s): Controller 8.2 Area of Interest: Infrastructure Configuring Controller 8.2 to use Active Directory authentication
Enabling single sign-on for Cognos 8/10 with Active Directory
Enabling single sign-on for Cognos 8/10 with Active Directory Overview QueryVision Note: Overview This document pulls together information from a number of QueryVision and IBM/Cognos material that are
The Integration of LDAP into the Messaging Infrastructure at CERN
The Integration of LDAP into the Messaging Infrastructure at CERN Ray Jackson CERN / IT-IS Group 29 Nov 2000 16:00 CERN IT Auditorium, bldg. 31, 3-005 A bit about me Technical Student Sep 1997-1998 in
WHITE PAPER. Home Directories on Snap Server GuardianOS
WHITE PAPER Home Directories on Snap Server GuardianOS Introduction Home directories have become commonplace in today s corporate computing environments. Home directories present a central location for
Configuration Worksheets for Oracle WebCenter Ensemble 10.3
Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the
SOFTWARE BEST PRACTICES
1 of 7 Abstract MKS Integrity Server LDAP (Lightweight Directory Access Protocol) implementations vary depending on the environment they are being placed into. The configuration of the corporate LDAP implementation
Chapter 3 Authenticating Users
Chapter 3 Authenticating Users Remote users connecting to the SSL VPN Concentrator must be authenticated before being allowed to access the network. The login window presented to the user requires three
Apple Technical White Paper Best Practices for Integrating OS X with Active Directory
Best Practices for Integrating OS X with Active Directory OS X Yosemite v10.10 December 2014 Contents Introduction to directory services support in OS X... 3 OS X and Active Directory... 4 Impact of mobility...
LDAP-UX Client Services B.04.10 with Microsoft Windows Active Directory Administrator's Guide
LDAP-UX Client Services B.04.10 with Microsoft Windows Active Directory Administrator's Guide HP-UX 11i v1, v2 and v3 HP Part Number: J4269-90074 Published: E0407 Edition: Edition 6 Copyright 2007 Hewlett-Packard
Active Directory and DirectControl
WHITE PAPER CENTRIFY CORP. Active Directory and DirectControl APRIL 2005 The Right Choice for Enterprise Identity Management and Infrastructure Consolidation ABSTRACT Microsoft s Active Directory is now
Security Provider Integration Kerberos Server
Security Provider Integration Kerberos Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation
Integrating Red Hat Enterprise Linux 6 with Microsoft Active Directory Presentation Agenda Overview Components Considerations Configurations Futures Summary What is needed? Thorough understanding components,
Tool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite
WHITE PAPER CENTRIFY CORP. MARCH 2009 Securing VMware Virtual Infrastructure with Centrify's Identity and Access Management Suite Securing and auditing administrative access to the Virtual Infrastructure
Apple Technical White Paper Best Practices for Integrating OS X with Active Directory
Best Practices for Integrating OS X with Active Directory OS X Mountain Lion v10.8 Contents Introduction... 3 How to Integrate OS X with Active Directory... 4 Enterprise Integration Challenges... 7 Deployment
EMC NetWorker. Security Configuration Guide. Version 8.2 SP1 302-001-577 REV 02
EMC NetWorker Version 8.2 SP1 Security Configuration Guide 302-001-577 REV 02 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published February, 2015 EMC believes the information
EMC Celerra Network Server
EMC Celerra Network Server Release 5.6.48 Configuring and Managing CIFS on Celerra P/N 300-007-526 REV A04 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com Copyright
Configuring Microsoft Active Directory 2003 for Net Naming. An Oracle White Paper September 2008
Configuring Microsoft Active Directory 2003 for Net Naming An Oracle White Paper September 2008 NOTE: The following is intended to outline our general product direction. It is intended for information
User Identification (User-ID) Tips and Best Practices
User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using
Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section
Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing Installation Section Purpose: We are setting up a server in ASU s specific environment. Power on the Server Insert the CD Hold
Self-Service Active Directory Group Management
Self-Service Active Directory Group Management 2015 Hitachi ID Systems, Inc. All rights reserved. Hitachi ID Group Manager is a self-service group membership request portal. It allows users to request
