Configuring identity platform settings
|
|
|
- Byron Lloyd
- 10 years ago
- Views:
Transcription
1 Chapter 1 Configuring identity platform settings You use the Cloud Manager Settings page to configure the following Centrify identity platform options. Before you develop your identity platform deployment plan, review these options. Some of them may be necessary to support certain mobile devices (for example, the Apple Push Notification Service certificate for ios devices and Samsung KNOX Workspace license key for Samsung KNOX Workspace devices) while others are optional (Account Customization and Exchange ActiveSync Server Settings). Modifying a setting requires specific Cloud Manager administrative rights.the third column lists the required rights. To learn more about the roles and rights required to make these changes see "Assigning applications to and removing them from roles" on page 1-5. Setting Account Customization Android for Work APNS Certificate Apple Configurator Apple DEP Configuration Authentication Profiles Why you use this setting Customize the user portal and Cloud Manager login prompts and messages to incorporate your organizations brand and logos. See "Customizing identity platform user interfaces" on page 1-4. Android for Work specific settings, such as domain mapping. See "Mapping Domains" on page Get or renew an Apple Push Notification Service (APNS) certificate so users can enroll ios- and OS X-based devices. See "Generating an APNS certificate" on page Notes: You must upload an APNS certificate to Cloud Manager before users can enroll these devices. If the certificate expires, users cannot enroll devices and enrolled ios devices have service restrictions. Install a base security policy on ios devices to pre-configure the mobile device manager and simplify device enrollment. See "Preparing ios devices for mass deployment" on page Add your Centrify identity platform account as an MDM server in the Apple Device Enrollment Program, upload token, and set the initial enrollment profile. See "Linking to the Apple Device Enrollment Program" on page Define the required authentication mechanisms such as password, confirmation code, mobile authenticator, etc. You use the authentication profile when you create your authentication rule or when you are configuring Server Suite authentication. See "Creating authentication profiles" on page 1-9. Role or rights needed to modify these settings Sysadmin role Sysadmin role Device Management rights or Sysadmin role Device Management rights or Sysadmin role Sysadmin role Sysadmin role 1
2 Setting Cloud Connectors Corporate IP Range Device Policy Management Directory Services Exchange ActiveSync Server Settings External Users Idle User Session Timeout Licenses Why you use this setting Display the list of Centrify cloud connectors, configure Integrated Windows Authentication settings, and add or delete a Centrify cloud connector. See "Configuring cloud connectors" on page 1-7. Specify the public IP addresses you want to include within the corporate intranet. The Centrify identity platform uses these addresses for Integrated Windows Authentication and application multifactor authentication. See "Setting Corporate IP ranges" on page Select either Active Directory group policy or the Centrify cloud policy service as the source for mobile device policies. If you use the Centrify cloud policy service you also use this tab to select the default Active Directory certificate service or the Centrify cloud CA to generate user certificates. See "Selecting the policy service for device policy management" on page Add LDAP as your directory service and view existing configured directory services. See "Adding LDAP as a Directory Service" on page Configure the identity platform to block access for devices that are not enrolled. See "Enabling quarantining" on page Allow your customers to use their social media credentials for single sign-on access to applications. See "Managing external users" on page Enable a timeout and set the time period to log out inactive users from Cloud Manager and Centrify user portal. See "Enabling automatic log out from the Centrify user portal and Cloud Manager" on page Enter your Samsung KNOX Workspace license key. See "Entering the Samsung KNOX license key" on page Role or rights needed to modify these settings Sysadmin role to modify all settings Register proxies permission to add a cloud connector Sysadmin role Sysadmin role Sysadmin role Device Management rights or Sysadmin role Sysadmin role Sysadmin role Sysadmin role Login suffix Create a list of the login suffixes (the name that in the full user name) that users enter to log in to Cloud Manager and the Centrify user portal and enroll devices. Users that do not have a login suffix in this list cannot log in to the portals or enroll a device. See "Using login suffixes" on page Sysadmin role Cloud Manager user s guide 2
3 Setting Mobile Device Management Partner Management Provisioning Why you use this setting Select whether you use Centrify identity platform for mobile device management or single sign-on only. If you select the Centrify identity platform for mobile device management and you have devices that have the Universal Mobile Device Management Client (UMC), you can also enable a service that synchronizes the login suffixes you create with the Samsung Enterprise Gateway. See "Configuring mobile device management or single sign-on only" on page Allows you to add business partners so that you can share your Centrify tenant (Centrify Identity Service/Centrify Privilege Service) with your partners. Partner federation is achieved through SAML, where your tenant serves as the host (the Service Provider in SAML terms), and your business partners access the tenant and its associated resources by passing a SAML token obtained from their Identity Provider (IDP). See "Managing Business Partner Federation" on page Run application user provisioning synchronization, configure the provisioning report options, and specify daily synchronizations. See User provisioning overview in the Application Configuration help for the details. Role or rights needed to modify these settings Sysadmin role Sysadmin role SafeNet KeySecure Configuration Security Settings Server Suite Authentication Tenant URLs Configure communication between the Centrify cloud and the SafeNet KeySecure appliance if you want to use KeySecure to store Centrify privilege service account passwords. Select whether to securely capture users' passwords at login to support account mapping options for user password apps or to provision user passwords to supported applications. Unless it s required for related features, Centrify recommends leaving this option disabled. See Managing security settings for more information. Add or select an authentication profile to use for multi-factor authentication on Centrify-managed Linux and UNIX computers. The authentication profile determines the authentication mechanism from which users can select how they are authenticated. See "Preparing authentication profiles for Server Suite authentication" on page Create a URL that is specific to your company so that your users can easily remember the Centrify Cloud URL. Any existing URLs will be redirected to the one marked Default URL. URLs requirements Always begin with an alphabet Maximum of 63 characters Can only contain alphabets, numbers, and dashes (-) Sysadmin role Sysadminrole Sysadmin role Sysadmin role Chapter 1 Configuring identity platform settings 3
4 Customizing identity platform user interfaces Customizing identity platform user interfaces You use the Account Customization option to change the background color and images displayed in your organization's Centrify user portal and Cloud Manager login prompts. In addition, you use this tab to specify the company name in your organization's implementation of the Centrify applications and specify the welcome screen text and company logo displayed when a user enrolls an ios device. You can restore the defaults for most options by clicking the Reset button. The exception is the Account Name field Reset does not change this field s contents. Note The first time a user logs in to the user portal or Cloud Manager, the default colors might be displayed. However, as soon as they complete user authentication and in each subsequent login the customized colors and images are displayed. The following properties are available for customizing: Property To do this General Options Portal ribbon color Set the color for the narrow banner across the top of the login prompts. Enter the color s hexadecimal color number or use the Select Color drop-down list to specify the color. Do not use RGB values to specify the color. Device Enrollment options Login Image Portal Image Welcome Text Company Name Change the image that appears in the login prompts. Click the Browse button to select the image file. The image size is 137 pixels wide by 35 pixels high. Cloud Manager automatically scales the image you upload to these dimensions, using the height as the base property. If your image cannot be scaled down exactly to 137x35, Cloud Manager crops the width to be consistent with the equivalent aspect ratio. Change the image in the user portal and Cloud Manager banners. Click the Browse button to select the image file. The image size is 160 pixels wide by 36 pixels high. Cloud Manager automatically scales the image you provide to these dimensions, using the height as the base property. If your image cannot be scaled down exactly to 160x36, Cloud Manager crops the width to be consistent with the equivalent aspect ratio. Enter the text to display in the welcome screen when a user enrolls an ios device. The text is only displayed in the ios version of the Centrify applicationwhen the user enrolls the device. The Welcome Text is not used when users enroll an Android device. Enter the name of your organization as you want it to appear on the Centrify application. The Account Name is displayed just above the user name in the application s home screen. Cloud Manager user s guide 4
5 Customizing identity platform user interfaces Property customization Configuring the Cloud Manager and Centrify User Portal login screens To configure the Cloud Manager and the User Portal windows and portal login screens: 1 In Cloud Manager, click Settings. 2 Click Account Customization. 3 Select the Portal Ribbon Color. To select a specific color, enter the color s hexadecimal color code. Do not enter the color s RGB value. To use a pre-configured color, click the Select Color drop-down list and select the color. 4 Browse to and select the image file for the Login Image and click Open. 5 Browse to and select the image file for the Portal Image and click Open. 6 Set the company name displayed in the Centrify application home screens. In the Company Name field, enter the name you want to appear. 7 Click Save to exit. Company logo MFA Challenge Device Enrollment Bulk User Import Report Invite User Invite User with OTP Directory Synchronization Report Configuring the device welcome and home screens To configure the device s welcome screen properties and home screen company name: 1 In Cloud Manager, click Settings. To do this 2 Click the Account Customization tab. Browse to and select the logo displayed on the welcome screen when the user enrolls an ios device. Cloud Manager automatically scales the image you provide to a square. If the image is not square, it crops the image from the left side, removing pixels from the right side. The company logo is not used when the user enrolls an Android device. Click the option to modify the letter sent for each communication with end users Company logo Browse to and select the logo displayed in the messages. Chapter 1 Configuring identity platform settings 5
6 Customizing identity platform user interfaces 3 Enter the text that you want to appear in the welcome text in the Centrify applicationwhen the user enrolls the device. You can enter up to 2048 characters. 4 Fill in the Company Name field with the name you want displayed in the home screen in the Centrify application. 5 Browse to and select the image file for the Company Logo and click Open. 6 Click Save to exit. Customizing the messages contents and logos The identity platform uses messages to simplify login and device enrollment for users. In addition, it sends an after you use bulk enrollment or directory synchronization to indicate the results. You can customize the wording and styles for all of these messages. To modify a message scroll down to Customization and double-click the template. The pop up window has two tabs: Preview: Shows the message as it will appear to the reader. Script Editor: Contains the html tags and content. Use this tab to change the wording and modify the text styles. Click OK to save your changes. To restore the template to its original content, right-click the template and click Reset. Click the Browse button underneath Image to upload a logo or other image to replace the <img src> in the template. The templates are used for the following events: Template Name MFA Challenge Device Enrollment Used for this purpose An message sent to users when they log in to the user portal or Cloud Manager when you enable authentication policy controls and select Confirmation code as one of the multifactor authentication options (see "Authentication - Setting authentication policy controls" on page 1-7). When users get this , they click here to supply the second factor and complete the log in. Do not change href='{authlink}'. An SMS message sent to the user s mobile phone number to help them enroll the device in the identity platform when you Invite users and select Send SMS invites for device enrollment (see "Sending invitations to users" on page 1-14) When users get this message on their phone, the click the link to download and install the Centrify application. Do not change {EnrollLink}. Cloud Manager user s guide 6
7 Configuring cloud connectors Template Name Bulk User Import Report Invite User Invite User with OTP Directory Synchronization Report Used for this purpose An message sent after a bulk enroll that indicates how many accounts were created out of the total requested and lists the names from the file for whom accounts could not be created (see "Bulk import user accounts" on page 1-12). Do not change {CreatedUsers}, {TotalUsers}, or {FailedSummary}. An sent to the users you selected in the Invite users procedure to simplify logging in to the user portal (see "Sending invitations to users" on page 1-14). Note: This message is sent only to users who have an Active Directory/LDAP account. This message uses the user s company account (that is, Active Directory/ LDAP) credentials to authenticate the user. Do not change href='{loginlink}'. An sent to the users you selected in the Invite users procedure to simplify logging in to the user portal (see "Sending invitations to users" on page 1-14). The user can also use this message to enroll a device. Note: This message is sent only to users who have a identity platform user service account. This message contains the users user service account name and uses it and a a one-time passcode to authenticate the user. If the user chooses enroll a device, the link takes them to the Add Device screen in the user portal. Do not change the following: login name: {UserName} href='{loginlink}' href='{uploadlink}' An message sent to the recipients specified in the address for report delivery field in the Cloud Manager Settings > Provisioning page. The includes information for new users or a change in status to existing users that are synchronized with the source directory for specified applications. The message is sent once a synchronization job is complete. The progress of the job can be viewed in the Job History page (Status column). Do not change the following: {{ReportURL}} {{AllProvJobsURL}} {{PreviewReport}} Also see Application Configuration Help for more information on the job history for provisioned jobs. Configuring cloud connectors The Cloud Connectors tab lists the Centrify cloud connectors you have installed. You rightclick an entry to perform the following operations: Chapter 1 Configuring identity platform settings 7
8 Configuring cloud connectors Change the cloud connector log file settings. Ping the cloud connector. This confirms that the Centrify Identity Service can communicate with the cloud connector. Configure or disable the web server see "Configuring the Web Server" on page 1-8. Delete the cloud connector see "Deleting a cloud connector" on page Enable/Disable Active Directory proxy service, LDAP proxy service, and App Gateway service. You also use this tab to initiate the procedure for adding a new cloud connector see "Adding a cloud connector" on page The columns indicate the following: Column header Cloud connector Forest Version Last ping Hostname AD Proxy LDAP Proxy App Gateway Status Indicates The name of the computer The domain name for the domain controller to which the cloud connector is joined. The version of the cloud connector software. You can configure the cloud connector to update automatically see "Configuring the cloud connector to install updates automatically" on page 1-4 The last time the identity platform successfully pinged the cloud connector. The DNS short name. You can also enter a fully qualified domain name to the IE local intranet zone. See "Configuring the Web Server" on page 1-8 to change this name. Whether the Active Directory proxy service is enabled or disabled in the cloud connector You use the Active Directory proxy service to authenticate identity platform users who have Active Directory accounts. Whether the LDAP proxy service is enabled or disabled in the cloud connector You use the LDAP proxy service to authenticate identity platform users who have LDAP accounts. Whether the App Gateway service is enabled or disabled. The App Gateway service provides remote access and single sign on to web applications provided by internal web servers (see "Adding internal web applications" on page 1-26). Active indicates that the Centrify Identity Service can communicate with the cloud connector. Inactive indicates that the identity platform cannot communicate with the cloud connector. Configuring the Web Server The Centrify identity platform supports the use of Integrated Windows authentication (IWA) and Office 365 clients to provide silent authentication for Active Directory/LDAP Cloud Manager user s guide 8
9 Configuring cloud connectors users when they log in to Cloud Manager or the Centrify user portal. You can enable and disable this feature by clicking on the cloud connector listing. When Web Server is enabled (the default), the browser uses the current user's Active Directory/LDAP information to prove its knowledge of the password through a cryptographic exchange with the in-process web server built into the cloud cloud connector. If you disable Web Server, users cannot be authenticated by IWA or Office 365 clients. Note Integrated Windows authentication may require additional configuration within some browsers. See "Configuring browsers for silent authentication" on page 1-1 to see if your browser requires additional configuration. To use Integrated Windows Authentication for silent authentication, users must specify their login suffix in the portal URL in the following form: Cloud Manager: Centrify user portal: where <suffix > is the login suffix you created for their account (see "Using login suffixes" on page 1-33). You can also set conditions for logging into these portals. For example, you can enable access policy controls that require the user to be inside the corporate IP range to use Integrated Windows authentication see "Setting Integrated Windows authentication (IWA)" on page This section also describes how you can use an Integrated Windows Authentication connection as a strong authentication factor in your access control policy. To configure the cloud connector web server settings: 1 Open Cloud Manager, click Settings, and click Cloud Connectors. 2 Double-click the cloud connector listing. You can modify the following settings: Setting or property Enable web server IWA Negotiation Uses HTTPS Port DNS Hostname IWA Detection Timeout Change to do the following The default value r is Enabled. This setting supports Integrated Windows Authentication and Office clients. If you disable the web server, you cannot change the DNS Hostname, HTTP Port Number and HTTPS Port number values. Selecting this checkbox forces communication to the cloud connector via HTTPS. There must be a trusted cloud connector host certificate when you use HTTPS for IWA negotiations. The default is the cloud connector s host computer s name. You can enter a DNS short name here or the fully qualified domain name in the IE local intranet zone. The length of time Integrated Windows Authentication (IWA) will wait for response from the cloud connector. The default is 10 seconds. Chapter 1 Configuring identity platform settings 9
10 Configuring cloud connectors Setting or property Change to do the following HTTP Port Number The default port is 80. Port 80 is the standard port. If you change the port number to a nonstandard number (for example, 111), Firefox and Chrome may require additional configuration because these browsers block some nonstandard ports. Do not change the port number unless you know the implications. HTTPS Port Number The default port is Port 8443 is the standard port. If you change the port number to a nonstandard number, Firefox and Chrome may require additional configuration because these browsers block some non-standard ports. Do not change the port number unless you know about the implications. cloud connector Host Certificate The default is no certificate for the cloud connector is loaded in the identity platform. Click Upload to upload a certificate created for the cloud connector into the identity platform. Click Download to download a cloud connector certificate you have previously uploaded. Click Download your IWA root CA certificate to save a copy of the certificate from the IWA root CA. 3 Click OK. To disable Integrated Windows authentication and Office 365 clients: 1 Open Cloud Manager, click Settings, and click Cloud Connectors. 2 Double-click the cloud connector listing. 3 Unselect the Enable Web Server option. 4 Click OK. Adding a cloud connector You use the Cloud Connectors tab to download the Centrify Cloud Management Suite package. You use the installation wizard in this package to install a Centrify cloud connector. See "Installing Centrify cloud connectors and administrator consoles" on page 1-1 for more about installing cloud connectors. Note Your role must have the Register cloud connectors administrative right to download the Centrify Cloud Management Suite package and register the cloud connector. To download the Centrify Cloud Management Suite package: 1 Open Cloud Manager, click Settings, and then click Cloud Connectors. Cloud Manager user s guide 10
11 Adding LDAP as a Directory Service 2 Click Add cloud connector. 3 Click 64-bit to download the cloud connector package corresponding to the host computer s processor architecture. 4 Unzip the package and copy the installation wizard to the host computer Go to "Running the Centrify Cloud Management Suite installer" on page 1-10 to run the wizard. Deleting a cloud c connector You can delete an inactive cloud connectors. You cannot delete an active cloud connector. An inactive cloud connector is one that is offline. To take a cloud connector offline, open the Centrify Cloud Connector Configuration Program on the computer, click the cloud connector tab, and click Stop. When the cloud connector is offline, there is no communication between it and the identity platform. To delete a cloud connector, right click the listing and click Delete. Alternatively, you can click the check box and click Delete. The cloud connector listing is removed from the page. Deleting a cloud connector removes the listing from the Cloud Manager page. It does not, however, uninstall the Centrify cloud connector software from the computer. You can reactivate the cloud connector by re-registering it. Adding LDAP as a Directory Service LDAP communicates with the Centrify cloud connector over TLS/SSL on port 636. As part of the client/server handshake between the cloud connector and the LDAP server, the LDAP server must present the cloud connector with an X.509 certificate. To establish a trust relationship between the cloud connector and the LDAP server, you must install the CA certificate that issued the LDAP server s Server Authentication certificate on the machine running the cloud connector (specifically, the Local Computer Trusted Root Certification Authorities certificate store). To add LDAP for the cloud connector: 1 Log in to Cloud Manager as a system administrator, click Settings, Directory Service, Add LDAP. 2 Provide the required information. For the DNS Hostname, you must provide a fully qualified domain name. See "Using login suffixes" on page 1-33 for more information on login suffixes. 3 Click Connectors and select the cloud connector to use with this service or let the LDAP server find an available cloud connector. Chapter 1 Configuring identity platform settings 11
12 Adding LDAP as a Directory Service 4 Click Save. Troubleshooting -- LDAP server unavailable Issue I'm unable to configure the LDAP server in Cloud Manager. I get the error message, "LDAP server is unavailable". Possible Explanations The DNS name cannot be resolved by the cloud connector machine. There is no network route to the LDAP server from the cloud connector machine, possible because of firewall rules or other routing issues. The LDAP server is not listening on port 636. Verification Steps Perform the following steps to verify the possible explanations: 1 From the cloud connector machine, confirm that the DNS name can be resolved with nslookup. 2 If the above confirmation is successful, confirm that there is a network path to the LDAP server by telneting to it on port 636. If the screen goes blank, it means we can connect. Use ctrl ] and type quite to exit. Solutions If the name cannot be resolved, try to enter the name in the hosts table or use the IP address of the machine. If the latter, you will likely need to un-check Verify Server Certificate in Cloud Manager, Settings, Directory Services, Add LDAP Directory. If the server is NOT listening on port 636, append the port to the DNS hostname; for example: <dns hostname>:3269 Note: We only support LDAP over SSL. We do not support clear LDAP. Cloud Manager user s guide 12
13 Managing Business Partner Federation Managing Business Partner Federation Business Partner Federation allows you to share your Centrify tenant (Centrify Identity Service/Centrify Privilege Service) with your business partners. Federation is achieved through SAML, where your tenant serves as the host (the Service Provider in SAML terms), and your business partners access the tenant and its associated resources by passing a SAML token obtained from their Identity Provider (IDP). By establishing this trust relationship, you can provide access to the resources that you want to share, while your partners are responsible for management of their users. Partners can use any IDP (a Centrify tenant or an external IDP) that supports SAML. Partners are responsible for the following: Providing you with their IDP metadata. Providing you with the group attribute value(s) that they will pass in their SAML tokens. See "Understanding group attribute values to roles mapping" on page Configuring their IDP to pass SAML tokens to you: If your partner is using an external IDP, see our support Knowledge Base article for ADFS configuration information. If your partner is using another Centrify tenant, they can easily do this by deploying the Centrify B2B SAML application. See Creating a Custom SAML application. Service Providers (SPs) are responsible for the following: Providing the SP metadata to your partner. See "Providing the Service Provider metadata" on page Adding the partner in Cloud Manager. See "Adding a partner" on page You will need the IDP metadata and the group attribute value from your partner before you can complete this task. Assigning your groups to roles in Cloud Manager. See "Assigning host groups to roles" on page Understanding group attribute values to roles mapping As part of managing their users, partners typically assign them role-based values (also known as group attribute values), such as Sales Managers, Service Managers, etc. However, we do not have visibility into their user directories and one partner may name the value "Sales Managers" while another partner may name it "SalesTeamManagers". To organize these group attribute values, we have created a group construct in the federated directory service. As the systems administrator in the host tenant, you can create groups (for example "Mgrs-Sales" group) in which to map the group attribute values (for example the "Sales Managers" and "SalesTeamManagers" values). This group can then be added to roles in your tenant. The diagram below demonstrates this flow. Chapter 1 Configuring identity platform settings 13
14 Managing Business Partner Federation Adding a partner You add the partner in Cloud Manager to enable sharing on your end. You will need the group attribute values and IDP metadata from your partner to finish the configuration. To create a partner: 1 Log in to Cloud Manager. 2 Click Settings > Partner Management > Add. 3 Enter a unique partner name. 4 SAML 2.0 is automatically selected because we currently only support this federation type. 5 Click Add associated with the Domain Name field to enter a unique domain name. This domain name will be used as the login suffix for all partner users. It allows Centrify to recognize users as coming from a specific IDP and redirects them accordingly. For example, you may want to use the business partner company name (for example companyabc.com) as the domain name. 6 Click Add to add the domain name to the table. 7 Click Group Mappings > Add to create a mapping of the group attribute values (i.e. partner roles for other Centrify tenants, or groups for partners using ADFS) to your groups. 8 Enter the partner role (tenant-to-tenant) or ADFS group (ADFS federation) into the Group Attribute Value column, then either select an existing group in the Group Name column or enter a new name. You do this to map the partner roles/adfs groups (information you should have received from your partner) to your groups. Each group needs to be a member of at least one role in your tenant. See "Assigning host groups to roles" on page Click Inbound Metadata to configure IDP settings (using the IDP metadata you received from your partner) for this partner using one of the following options: a b Option 1: Upload the IDP configuration from URL. To use this option, paste the Identity Provider SAML Metadata URL provided by your partner. Option 2: Upload IDP configuration from a file. If your partner provided the Identity Provider SAML Metadata in an XML file, you can upload it here. Cloud Manager user s guide 14
15 Managing Business Partner Federation c Option 3: Manually Configuration. Manually enter the relevant information. Assigning host groups to roles For the host groups (those listed in the Group Name column of the Settings > Partner Management > Group Mappings page) to have access to relevant applications and rights, you need to assign them to the relevant roles. To assign the groups to roles: 1 Log in to Cloud Manager. 2 Click Roles and select an existing role or create a new one. 3 Click Members > Add and search for the group. Groups from federated services have the 4 Select the group and click Add. 5 Click Save. Providing the Service Provider metadata icon associated. Provide your partner with your service provider metadata. To get the service provider metadata: 1 Click Settings in Cloud Manager. 2 Click Partner Management. If you have not started creating the partner profile, then click Add to access the necessary information. If you have an existing partner, you can look at that partner's information for the service provider metadata. This information stays consistent across all partners. In other words, you provide the same metadata information to all your partners. 3 Click Outbound Metadata and use one of the three options to get the metadata information. Chapter 1 Configuring identity platform settings 15
16 Managing external users Managing external users You can enable your external users (such as customers or temporary contractors) to use their existing social media credentials to access assigned applications via the Centrify user portal or your own portal. Additionally, you can customize the user experience by rebranding the access request page with our company name and logo. When users access their application using the Centrify user portal, users can do the following: Access assigned applications Add applications to the Apps page View their account information and user portal activity history When users log in, they are automatically added to the Everybody role and External Users group upon log in. This group can then be added to roles and you assign applications to the roles. See "Configuring social media access without customized branding" on page 1-16 for information about using the Centrify user portal without your company branding. See "Customizing the external user experience" on page 1-16 for information about rebranding the access request page and redirecting users to your own portal. Configuring social media access without customized branding You can enable your external users to use their existing social media credentials for singlesign-on access to assigned applications via the Centrify user portal. These instructions do not include any customization or branding. Users will see the Centrify name and logo on the access request page. To configure social media access to the Centrify user portal without customized branding: 1 Log in to Cloud Manager and click Settings, External Users. 2 Select the social identity that you want users to have from the user portal. 3 Click Save. Customizing the external user experience You can customize the social media log in experience by rebranding the access request page (see screenshot below) to display your company logo and name. Additionally, if your company has its own portal for application access, you can redirect users to that portal after they log in using their social media credentials. Cloud Manager user s guide 16
17 Managing external users The high-level procedures for customizing the social media log in experience are: 1 Use the social media developer toolkit to create a social media application with your organization's branding. You need to create an application for each of the social identity that you want users to have access. Instructions differ based on the social identity: Facebook -- See "Creating a Facebook application" on page Google -- See "Creating a Google application" on page LinkedIn -- See "Creating a LinkedIn application" on page Microsoft -- See "Creating a Microsoft application" on page Use Centrify Cloud Manager to configure the integration to your social media application (for a branded access request page) and redirect to your company portal (if you have your own portal). See "Configuring the integration to your social media application" on page Creating a Facebook application You need to create a Facebook application if you want users to see your company name and logo when they choose to log in using their Facebook credentials. To create a Facebook application: 1 Create a Facebook account and log in. 2 Register as a developer if you have not done so. 3 Navigate to developers.facebook.com. 4 Click My Apps and select Add a New App. 5 Click www Website, specify a name for the application, and click Create New Facebook App ID. 6 Select Skip and Create App ID. The Create a New App ID page displays. Chapter 1 Configuring identity platform settings 17
18 Managing external users 7 In the Display Name field, enter your company name. This is the name that will appear on the access request page where it completes a sentence similar to <Your company name> would like to access some of your Facebook information. 8 Select Productivity in the Category drop down. 9 Click Create App ID. The following configuration page displays: 10 Click Settings on the side panel. 11 On the Basic tab, specify the Contact and click Save Changes. 12 On the Advanced tab, enter your Centrify Identity Service pod URI into the Valid OAuth redirect URIs field and click Save Changes. For example, enter 13 Click App Details on the side panel. 14 Enter a description that includes your pod name in the Short Description field. For example, Company XYZ - Pod In the Contact Info section, enter your company information for the following: Privacy Policy URL -- For example Terms of Service URL -- For example User Support URL -- For example Marketing URL -- For example 16 In the Icons section, upload your company logo using the appropriate size. This logo will appear on the access request page when users log in. 17 Click Save Changes. 18 Click Status & Review on the side panel. 19 Toggle Yes for the Do you want to make this app and all its live features available to the general public? question. Cloud Manager user s guide 18
19 Managing external users 20 Confirm the selection to make the application public. 21 Click Dashboard on the side panel. 22 Copy/paste the App ID and App Secret for future use in the Cloud Manager. You will need this information when you configure the integration to your social media application. See "Configuring the integration to your social media application" on page Creating a Google application You need to create a Google application if you want users to see your company name and logo when they choose to log in using their Google credentials. To create a Google application: 1 Create a Google account and log in. 2 Navigate to The Google Developers Console page displays. 3 In the Select a project drop down, select Create a project. The New Project page displays. 4 Enter a project name that includes your pod name. For example, Project XYZ - Pod Respond to the other fields as appropriate. 6 Click Create. You must agree to the terms of service to enable this button. 7 Click the side panel expander icon (three stacked lines) to expand the side bar. 8 Click API Manager and Overview. The Overview page displays. 9 In the Social APIs section, click Google+ API. 10 Click Enable API. 11 Click Credentials in the side panel. 12 In the New Credentials drop down, select OAuth Client ID. 13 Click the Configure consent screen button. 14 In the Product name shown field, enter the your product/company name. Chapter 1 Configuring identity platform settings 19
20 Managing external users This is the name that will appear on the access request page where it completes a sentence similar to <Your company name> would like to access some of your Google information. 15 Enter your company URL into the Homepage URL field. 16 Enter the URL where your company logo resides. This logo will appear on the access request page when users log in. 17 Enter the Privacy policy URL and Terms of service URL for your company. 18 Click Save. The Create client ID page displays. 19 Select Web application as the application type. 20 Enter your Centrify Identity Service pod URI into the Authorized redirect URIs field and click Create. For example, enter The OAuth client window displays. 21 Copy/paste the Client ID and Client Secret for future use in the Cloud Manager. You will need this information when you configure the integration to your social media application. See "Configuring the integration to your social media application" on page Creating a LinkedIn application You need to create a LinkedIn application if you want users to see your company name and logo when they choose to log in using their LinkedIn credentials. To create a LinkedIn application: 1 Create a LinkedIn account and log in. 2 Navigate to 3 Click My Apps. 4 Click Create Application. 5 Enter your company name. This is the name that will appear on the access request page where it completes a sentence similar to <Your company name> would like to access some of your LinkedIn information. 6 Enter your application name into the Name field. Cloud Manager user s guide 20
21 Managing external users 7 Enter a description that includes your pod name in the Description field. For example, Company XYZ - Pod Click the Select File to Upload button to upload your company logo. This logo will appear on the access request page when users log in. 9 Provide the remaining required information as appropriate. 10 Click Submit. The Test Applications page displays. 11 In the Default Application Permissions area, enable the r_basicprofile and r_ address check boxes. 12 Enter your Centrify Identity Service pod URI into the Authorized Redirect URLs field and click Add. For example, enter 13 Click Update. 14 Copy/paste the Client ID and Client Secret for future use in the Cloud Manager. You will need this information when you configure the integration to your social media application. See "Configuring the integration to your social media application" on page Click Settings in the side panel. 16 Select Live in the Application Status drop down. 17 Click Update. Creating a Microsoft application You need to create a Microsoft application if you want users to see your company name and logo when they choose to log in using their Microsoft credentials. Note: The first few steps of this procedure may vary if you already have a Microsoft account and Windows Live ID. To create a Microsoft application: 1 Create a Microsoft account and log in. 2 Navigate to 3 Read the information in the Before You Register section then click Register to obtain a Windows Live ID. 4 Click the application management site link in step 1 of the procedure. 5 Enter you application name. Chapter 1 Configuring identity platform settings 21
22 Managing external users This is the name that will appear on the access request page where it completes a sentence similar to <Your company name> would like to access some of your Microsoft information. 6 Set the language and click I accept. The application configuration page opens. 7 Click Basic Information in the side panel. 8 Click the Browse button to upload your company logo. This logo will appear on the access request page when users log in. 9 Enter the following URL information: Terms of Service URL -- For example Privacy URL -- For example 10 Click Save. 11 Click API Settings in the side panel. 12 Enter your Centrify Identity Service pod URI into the Redirect URLs field and click Add. For example, enter 13 Click Save. 14 Click App Settings in the side panel. 15 Copy/paste the Client ID and Client Secret for future use in the Cloud Manager. You will need this information when you configure the integration to your social media application. See "Configuring the integration to your social media application" on page Configuring the integration to your social media application After you have created the social media applications, you now have the necessary information to configure the integration to those applications. To configure the integration to your social media application: 1 Log in to Cloud Manager and click Settings, External Users. 2 Select the social identity that you want users to have from the user portal. 3 Select the Use custom settings link associated with the relevant social identity. The <social identity> Custom Settings page opens. 4 Select the Use Custom Integration check box. Cloud Manager user s guide 22
23 Enabling quarantining 5 Enter the application ID from your social media application into the OAuth Application ID text box. 6 Enter the application secret from your social media application into the OAuth Application Secret text box. 7 Click Save. If your company does not have its own portal for application access, then you are done. If your company does have its own portal for application access, then continue to the next step. 8 (Optional) If your company has its own portal for application access, click Add in the Additional OAuth Trusted Redirect URIs to enter the redirect URI then click Add again. This step is only required if your company has its own portal for application access and you want users to get redirected to this portal after they log in using their social media identity. 9 Click Save. Enabling quarantining You use the Exchange ActiveSync Server Settings option to enable automatic quarantining of user accounts for ios and Android devices when a device is not enrolled.while the device is quarantined, its user has limited access to the Exchange server account s , calendar, contacts, and Notes folders. When a device is enrolled, its user has full access to the folders. The identity platform uses the standard Quarantine and Allow List Exchange ActiveSync access states to block access except to those who enroll their device. When the device is enrolled, the cloud connector adds it to the Allowed List; when the device is unenrolled, the cloud connector removes it from this list. If you are unfamiliar with the quarantine and allow access states go to technet.microsoft.com for an introduction. If you have multiple Exchange servers, you enable automatic quarantining on a server-byserver basis. As soon as you enable this feature on a server, account access from all of the mobile devices that use that Exchange server is blocked until users enroll their devices. To specify an Exchange or Office365 server for quarantining: 1 Open Cloud Manager, select Settings, click Exchange ActiveSync Server Settings, and click the Add button. 2 Select the either Exchange 2010 or Office365 as your server type. Cloud Manager displays the Exchange Server Creation dialog box. Chapter 1 Configuring identity platform settings 23
24 Enabling quarantining 3 Enter the host name (the URL for the Exchange Web Services endpoint for your server) for the connection endpoint. For Exchange servers the connection endpoint has this form: For Office 365 the connection endpoint has this form: 4 Select Use Basic Authentication if you enabled Basic Authentication rather than Windows Authentication. (Office 365 always uses Basic Authentication.) 5 Enter the user name and password for an account that has permission to modify the Exchange or Office 365 server settings. 6 Click OK. To manually remove a quarantine from an account: 1 Log in to the computer on which you installed the Centrify cloud connector. 2 Find the device ID of the quarantined device. The device ID is generated by the mail client (for example, ios Mail or Touchdown). You unblock a device by adding its device ID to a list of devices that are not quarantined. The following PowerShell script retrieves the device ID Get-ActiveSyncDeviceStatistics -mailbox <username> where {$_.DeviceAccessState -eq 'Quarantined'} select DeviceID 3 Add the device ID to the list of devices that are allowed access. Cloud Manager quarantines all devices when you enable blocking except for those devices identified in -ActiveSyncAllowedDeviceIDs. Use the following PowerShell script to update the list. Set-CasMailBox -identity <username> -ActiveSyncAllowedDeviceIds <device IDs> To specify multiple devices, separate each device ID with a comma. To re-enable blocking, update the list again but remove the device ID. Note This procedure is required for Exchange Servers only if you want to use the account quarantining feature. Quarantining blocks user access to the account when the device is not enrolled in the Centrify identity platform. See "Enabling quarantining" on page 1-23 for the details. Skip this procedure if you do not plan to enable quarantining. Blocking is available to Exchange 2010 and Office 365 servers. It is not available to Exchange 2007 servers.exchanges 2010 servers must have SP1 installed. You must enable Remote PowerShell on the Exchange or Office 365 server. After you enable Remote PowerShell, the Exchange server creates an Internet Information Services (IIS) application named PowerShell. You need to enable an authentication method for this Cloud Manager user s guide 24
25 Preparing ios devices for mass deployment application. (By default no authentication method is selected.) Use the following procedure to enable an authentication method for the PowerShell application. To enable the authentication method for the PowerShell application: 1 Start IIS Manager. 2 On the left pane, select Site > Default Web Site > PowerShell. 3 On the right pane, select IIS > Authentication, right-click, click and select Open Feature. 4 Select either Windows Authentication or Basic Authentication, right-click, and select Enable. If you select Basic Authentication, be sure to select the check box when you enable the Exchange server in the Cloud Manger settings. 5 Back up your original settings. In this case, you would use a PowerShell script to extract the original settings. Preparing ios devices es for mass deployment You use the Apple Configurator option to preconfigure ios devices with a base security policy before you distribute them to your users.the Apple Configuration page provides a wizard which builds ios profiles that contain the base security policy settings and stores them in a zip file. You then import the zip file into Apple Configurator to install the profiles in the devices. During the profile installation process, the devices are also enrolled in the identity platform. See Apple Configurator Help for more information about this program. When the user enrolls the device, the identity platform installs additional profiles which contain the remainder of the policy settings for the device. If the user logs out of the identity platform, the additional policy profiles are removed and only the base security policy profiles remain in place. You create the full mobile device policy for the ios devices before you use this wizard. You can use either the Active Directory Group Policy Object Editor to create a group policy object or Cloud Manager to create a policy set. Which tool you use depends upon whether you use Active Directory or Centrify cloud policy service to define the mobile device policies (see "Selecting the policy service for device policy management" on page 1-39). See "Common Mobile Settings" on page 1-2, "ios Settings" on page 1-4, and "OS X and ios Settings" on page 1-8 for a summary of the mobile device policies for ios devices. The identity platform creates multiple profiles to install the full set of policies in the device. The profiles are listed in the device s Settings > General > Profiles screen. The Apple Configurator wizard builds the base security policy profiles from the passcode and restrictions policies from the group policy object or policy set you created. In addition, Chapter 1 Configuring identity platform settings 25
26 Preparing ios devices for mass deployment the base security policy profiles contain the wi-fi profiles you created in the Common Mobile Settings, excluding any WEP or WPA/WPA2 Enterprise profiles. Notes Preconfiguring ios devices is a Centrify identity platform licensed feature. However, pre-configuring is also available for 30 days after receiving your customer ID during your Centrify Identity Service evaluation period. If your license expires, you can no longer pre-configure ios devices for bulk enrollment. When you receive preconfigured devices back from users, instruct them to click the Logout button on the Settings screen in the Centrify application. This removes the additional policy profiles installed when the user logged in. This process leaves the base security policy profiles installed using Apple Configurator in place. The wizard s user interface is different for Active Directory and Centrify user service directory services. The interface displayed depends upon whether you selected Active Directory group policy or Centrify cloud policy service on the Device Policy Management page on the Settings page in Cloud Manager (see "Selecting the policy service for device policy management" on page 1-39). Setting up the Mac computer and devices Before you begin this procedure install the Apple Configurator on your Mac running OS X version 10.6 or later. You can get Apple Configurator from the Mac App store. If you are using the same Mac to run the Apple Configurator wizard, it must be enrolled in the identity platform too. In addition, the ios devices you will be preconfiguring must have Internet access so that they can enroll in the identity platform after the base security profiles are installed. To configure the Mac computer and devices: 1 Connect each device to the Mac computer using each device s USB cable. 2 Confirm that each device has Internet access. 3 Launch Apple Configurator on the Mac computer. 4 Set each device to Supervised Device mode. This prevents a user interaction from interrupting the procedure. 5 Go to one of the following to complete the process: Active Directory group policy: "Download profiles from a group policy object" on page 1-27 Centrify cloud policy service: "Download profiles from a Centrify cloud policy service policy set" on page 1-28 Cloud Manager user s guide 26
27 Preparing ios devices for mass deployment Download profiles from a group policy object You use this procedure only if you are using Active Directory group policy for device policy management (see "Selecting the policy service for device policy management" on page 1-39) This procedure installs the base security policy profiles in the ios devices from the group policy object linked to an organizational unit. Before you begin the procedure, do the following: Create an Active Directory organizational unit for these devices. Create the group policy object for these devices and link it to the organizational unit you created for these ios device. Specify the organizational unit when you configure the device enrollment settings in the policy set for the ios device users see "Device Enrollment Settings - Enabling users to enroll devices" on page 1-5. To install the base security policy profiles: 1 Open Cloud Manager and click Settings. 2 Click Apple Configurator. 3 In Step 1, select the organizational unit associated with the policy set for the role with the accounts for the users who will be enrolling the devices. The drop-down list contains only the organizational units you have specified in the the device enrollment settings. 4 Perform Step 2. Click Download to create and download the file mass_enrollment.zip containing the base security policy settings. 5 Unpack mass_enrollment.zip and transfer the files to a location from which you can import them into Apple Configurator. 6 Perform Step 3. Follow the Apple Configurator instructions to import the files and then use the Apple Configurator Prepare function to install the profiles in the devices. After the profiles have been installed, each device initiates contact with the identity platform to enroll the devices. When enrollment completes, the device is listed in the Active Directory organizational unit you selected and on the Devices page in Cloud Manager. The computer object name in the Active Directory listing contains companyowned. 7 When you hand over the devices, instruct the users to install the Centrify application and log in to the identity platform to install the additional profiles with the remaining policy settings. Chapter 1 Configuring identity platform settings 27
28 Generating an APNS certificate Download profiles from a Centrify cloud policy service policy set The following procedure installs the base security policy profiles in the ios devices from the policy sets assigned to one or more roles. Before you begin the procedure, do the following: Create roles for all the users who will be enrolling these ios devices and add the user accounts to the roles. Create one or more policy sets for these devices. Apply the policy set(s) to the role(s). To install the base security policy: 1 Open Cloud Manager and click Settings. 2 Click Apple Configurator. 3 In Step 1, select the role or roles that contain the accounts for the users who will be enrolling the devices. 4 Perform Step 2. Click Download to create and download the zip file mass_enrollment.zip containing the base security policy settings. 5 Unpack mass_enrollment.zip and transfer the files to a location from which you can import them into Apple Configurator. 6 Perform Step 3. Follow the Apple Configurator instructions to import the files and then use the Apple Configurator Prepare function to install the profiles in the devices. After the profiles have been installed, each device initiates contact with the identity platform to enroll the devices. When enrollment completes, the device is listed on the Devices page in Cloud Manager. 7 When you hand over the devices, instruct the users to install the Centrify application and log in to the identity platform to install the additional profiles with the remaining policy settings. Generating an APNS certificate For the Centrify identity platform to communicate securely with Apple ios devices and OS X devices, both the Centrify identity platform and the devices and computers need a trusted, SSL certificate that is signed by both Centrify identity platform and Apple certification authorities. This certificate is called an Apple Push Notification Service (APNS) certificate. This section describes how to get and renew this certificate and upload it to the Centrify identity platform. Cloud Manager user s guide 28
29 Generating an APNS certificate What to do before creating or updating an APNS certificate To get you APNS certificate you need to have the following: The proper Cloud Manager permissions. Only the users who are authorized to manage enrolled devices can create or update APNS certificates. This includes administrators in the sysadmin role and roles that can manage devices. An Internet connection. An itunes App Store Apple ID that can be used to obtain updated APNS certificates from Apple. You need to use this same Apple ID in the future to renew your APNS certificate. It might make future updates simplest if you create a generic Apple ID to use solely for APNS certificate creation. How often you should create an APNS certificate You need to create an APNS certificate once before users start enrolling devices. After that, you ll need to renew it every year. You do not need to re-enroll devices after updating an APNS certificate. The expiration date for the APNS certificate you are using is listed at the top of the page. You can find more information about APNS certificates on Apple s website: What happens when the APNS certificate expires If the APNS certificate expires, users can no longer enroll devices. In addition, the services available to enrolled ios devices is limited as follows: Users and administrators cannot send commands to the devices from the user portal and Cloud Manager. Administrators cannot install native applications. Initially, enrolled devices remain enrolled and Status in the user portal and Cloud Manager shows Enrolled. In addition, users can open the Centrify application and launch the web applications with silent authentication. However, at the end of the Mark unresponsive devices as Unreachable threshold (see "Device Management Settings - Monitoring enrolled devices" on page 1-4) the status changes to Unreachable, and the user can no longer open the Centrify application. The default threshold is 14 days. Chapter 1 Configuring identity platform settings 29
30 Generating an APNS certificate Creating an APNS certificate You use Cloud Manager to generate and download the Certificate Signing Request file, and then upload that file to the Apple Push Certificates Portal. Apple generates the completed APNS certificate, which you then upload to Cloud Manager. The following figure illustrates the procedure. To create or update your APNS certificate for ios devices: 1 In Cloud Manager, click Settings. 2 Click APNS Certificate. If you haven t yet uploaded an APNS certificate to the identity platform, the expiration date at the top of the page appears as unconfigured. 3 Click Generate Request to create the Certificate Signing Request (CSR) file. Cloud Manager downloads the CSR file mdm_csr.pem to your system. Depending on your web browser s settings, your web browser may automatically save the file in a predetermined location or it may prompt you to save the file. 4 Create the APNS certificate: a b c Click the link to and login to your Apple itunes App Store account. This opens the Apple Push Certificates Portal. This page contains all of the APNS certificates you have created under this account. Click Create a Certificate. Read and accept the terms and conditions. Cloud Manager user s guide 30
31 Generating an APNS certificate d e Click Choose File to select the Certificate Signing Request (mdm_csr.pem) file just generated and then Upload to import the file into the Apple Push Certificates Portal. Click Download. Depending on your web browser s settings, your web browser may automatically save the file in a predetermined location or it may prompt you to save the file. The certificate created by Apple is named MDM_Centrify Corporation_Certificate.pem. 5 Click Upload Apple Response and select the APNS certificate just downloaded. Renewing an APNS Certificate The expiration date for an APNS certificate is shown at the top of the page. You can renew it any time before the expiration. The new certificate is valid for one year from the date of renewal. To renew an APNS certificate: 1 In Cloud Manager, click Settings. 2 Click APNS Certificate. Make note of the certificate s expiration date. You will need this date when you renew the certificate on the Apple Push Certificates Portal. 3 Click Generate Request to create the Certificate Signing Request (CSR) file. Cloud Manager downloads the CSR file mdm_csr.pem to your system. Depending on your web browser s settings, your web browser may automatically save the file in a predetermined location or it may prompt you to save the file. 4 Click the link to and login to your Apple itunes App Store account. This opens the Apple Push Certificates Portal. This page contains all of the APNS certificates you have created under this account. 5 Click Renew for the certificate with the expiration date that matches the date on the APNS Certificates page in Cloud Manager. 6 Click Choose File to select the Certificate Signing Request (mdm_csr.pem) file just generated and then Upload to import the file into the Apple Push Certificates Portal. 7 Click Download. Depending on your web browser s settings, your web browser may automatically save the file in a predetermined location or it may prompt you to save the file. The certificate created by Apple is named MDM_Centrify Corporation_Certificate.pem. 8 Click Upload Apple Response and select the APNS certificate just downloaded. Chapter 1 Configuring identity platform settings 31
32 Entering the Samsung KNOX license key The Current Expiration Date at the top of the page should show the new date. Entering the Samsung KNOX license key The Samsung Licenses page lists your Samsung KNOX license keys and lets you add more keys. If your users will be enrolling Samsung KNOX devices, you need one license key per Centrify Identity Platform account and a license for each device you want to enroll. The columns contain the license key, the date the license was issued, the date it expires, the total licenses purchased, the number of licenses in use (Activations), and the current state of the license key. There are three license key states: Active: The license is validated with license management server. Terminated: License is terminated and is no longer available. Registration on a new device is not allowed. Inactive: Registration on a new device is not allowed. You get the license key from your mobile service vendor when you purchase the initial set of licenses. If you purchase additional licenses, you continue to use the same license key. To add a Samsung KNOX license key: 1 Open Cloud Manager and click Settings. 2 Under Settings, click Samsung Licenses. 3 Click Add. 4 Enter the license key and click Add License. The identity platform validates your license key. Enabling automatic log out from the Centrify user portal and Cloud Manager You can automatically log out users from Cloud Manager or the user portal after a period of inactivity. You enable this policy using the Idle User Session Timeout tab and then set the inactivity time period. The default is five minutes. This policy has no effect on mobile device users. To enable automatic user log out: 1 Open Cloud Manager and click Settings. 2 Click Idle user Session Timeout. 3 Select Automatically log out idle users. Cloud Manager user s guide 32
33 Using login suffixes 4 Enter the time period. 5 Click Save Changes. Using login suffixes fixes The login suffix is that part of the login name that For example, if the login name is [email protected], the login suffix is acme.com. The login suffix identifies for the identity platform which ID repository has the user s account when the user logs in to the identity platform portals or enrolls a device. If the login suffix is not listed on this page, the user cannot be authenticated. Normally, the Centrify identity platform automatically creates a default login suffix for your organization based on the login suffix in the work account entered in the Centrify identity platform sign-up form. However, if that login suffix is already in use, the identity platform appends a one- or two-digit number to the end. For example, if the address entered when the identity platform account had the login suffix acme.com but acme.com was already used by another organization, the identity platform would create the login suffix acme.com.4. You can create more login suffixes for Centrify user service accounts. You assign a new user service to a login suffix when you create the account. Cloud specific information For Centrify cloud users, the customer ID in the URL can be a tenant ID or a login suffix. However, if you use a login suffix and the user name that is specified is a short name (without a login suffix), then the customer ID in the URL must be a login suffix. The login suffix should not look like a tenant ID. The following are examples of using a short name (without login suffix) user name to log in to the Centrify Identity Service URL User name used Restrictions for logging in is a short name with- out a login suffix jane You must have a user account [email protected]. jane You must have a user account jane@myorg jane Even though AAA0001 is a valid login suffix, this log in fails because the customer ID in the URL looks like a tenant ID. For this log in to succeed, the user name should have a login suffix (for example jane@aaa0001). Chapter 1 Configuring identity platform settings 33
34 Using login suffixes Active Directory specific information If you are using an Active Directory domain as an ID repository, the identity platform adds the following login suffixes when the cloud connector is installed: The login suffix in the installer s account name. This allows the administrator to log in to Cloud Manager right after installing the cloud connector. Note If the login suffix in the cloud connector installer s account is already in use in the Centrify identity platform, an error message is displayed and you cannot use that domain name as a login suffix. (This occurs rarely but can happen.) Contact support if this happens to your account. The domain name of the domain controller to which the host computer for the cloud connector is joined. If that domain controller is part of a tree or forest, the identity platform adds a login suffix for all other domains in the tree or forest it can locate. If you have users with Active Directory accounts in domains in a tree or forest that was not found or users who log in with their Office 365 account, you must add those login suffixes before these users can log in to Cloud Manager or the Centrify user portal, and enroll a device. You can also create an alias for an Active Directory domain name. You would use an alias to simplify login for users with a long or complicated Active Directory login suffix. See "Creating an alias for long Active Directory domain names" on page 1-35 for the details. You cannot create an alias for Centrify user service login suffixes. Creating a login suffix You can create as many login suffixes as you want for Centrify user service accounts. The login suffix can be composed of any of the UTF8 alphanumeric characters plus the symbols + (plus), - (dash), _ (underscore), and. (period). You can, but are not bound to, use the form label.label for your login suffixes; however, a login suffix can be composed of a single label for example, ABCCorp. Login suffixes must be unique in the Centrify identity platform (not just within your identity platform account). If you enter a login suffix that is already in use, you get an error message. You can select any login suffix when you create new user service accounts. To create a login suffix: 1 Open Cloud Manager and click Settings. 2 Click Login Suffix. Cloud Manager user s guide 34
35 Using login suffixes 3 Click Add. 4 Enter the suffix in the text box and click Save. Deleting a login suffix You cannot delete a login suffix that has any user accounts. Cloud Manager displays an error message if you try to delete a login suffix that still has user accounts. To delete a login suffix, remove all of its user accounts. Modifying a login suffix You can rename a login suffix. If you do, the accounts that had the original login suffix are automatically updated to the new one. Be sure to notify the users affected that they have a new login suffix. They will not be able to log in using the original suffix. To modify a login suffix: 1 Open Cloud Manager and click Settings. 2 Click Login Suffix. 3 Right-click the login suffix and click Modify. 4 Make your changes in the text box and click Save. Creating an alias for long Active Directory domain names Best practice dictates that you use a login suffix for Active Directory users that they are already using. For example, if they re using your organization s domain name to open their account, it would help them remember their identity platform user name if you used the same login suffix. However, this is not a requirement. For example, if you have a long or complex Active Directory domain name, you can create a mapped login suffix for Active Directory accounts using the Advanced option. For example, if your login suffix is abc.bigcorp.com, you could define another login suffix, such as abc. A user could then log in to the user portal using just <username>@abc. To map an Active Directory login suffix: 1 Open Cloud Manager and click Settings. 2 Click Login Suffix. 3 Click Add. 4 Enter the alias in the Login suffix text box. 5 Expand Advanced. Chapter 1 Configuring identity platform settings 35
36 Linking to the Apple Device Enrollment Program 6 Reset the Keep Login Suffix and Mapped Suffix the same checkbox. 7 Backspace over the login suffix in the text box below the checkbox and enter the Active Directory domain name. 8 Click Save. Linking to the Apple Device Enrollment Program You use this setting to link the Centrify identity platform as an MDM server in the Apple Device Enrollment Program, upload the Centrify identity platform token, and define the initial profile configuration settings. The Device Enrollment Program is an Apple Deployment Program that helps businesses and education institutions easily deploy and manage ipad and iphone devices and Mac computers. When you use the Device Enrollment Program and the device has a network connection, the Apple Device Enrollment Program server installs an initial profile in specified devices. You use the Apple DEP Configuration page in Cloud Manager to define the initial profile s configuration settings, including the device enrollment options, your user support phone number, and the device setup items the user must complete when they first receive the device. Depending upon which enrollment options you select, the Centrify application can be automatically installed on the device. Thus, users do not need to install it from the Apple App Store. To use the Apple Device Enrollment program, you need to enroll your organization first. Go to to learn about the program and to enroll your organization. Return to this section after you have completed enrollment, reviewed the restrictions, and configured your account. Linking to the Apple Device Enrollment Program is a two part process from the Cloud Manager: Creating a link between the Centrify identity platform and the Apple Device Enrollment Program. In this step you create a service token for the Centrify identity platform and upload it to Cloud Manager. Configuring the initial profile. These options and properties are displayed on this page after you successfully upload the service token. The profile is installed only in the devices that are assigned to the Apple Device Enrollment program. This profile does not replace the profiles that are installed by the Centrify application after the user enrolls the device in the Centrify identity platform. The profile you define in this procedure just controls the user s device set up options. Cloud Manager user s guide 36
37 Linking to the Apple Device Enrollment Program Important: When the serial number for a new device is added to the Apple Device Enrollment Program server, you must click the Push Profile button in Cloud Manager, Settings, Apple DEP Configuration. As a rule of thumb, you should wait 24 hours after you assign the device before giving it to the user to enroll. To create the link to the Apple Device Enrollment program: 1 Open Cloud Manager and click Settings. 2 Click Apple DEP Configuration. 3 Generate a public key. Click Download to generate the public key. In most browsers, this file is written to your Downloads folder. 4 Login to your Apple Device Enrollment Program account at Click the link and enter your user name and password. 5 Create server token file. In your Apple Device Enrollment Program screen, click Add an MDM server and specify the file with the public key you just created. The server token file is downloaded by your browser. In most browsers, this file is written to your Downloads folder. 6 In Cloud Manager, upload the server token file. Click Upload and specify the file just downloaded. Once the file has been uploaded, the Apple DEP Configuration page expands to add the Configuration settings. To configure the initial profile: 1 Enter the profile name. 2 Select the Device enrollment options Minimally, you should select Make device supervised and Require device enrollment. When you select these options, users can enroll with the Active Directory/LDAP or Centrify user service user name and password and the Centrify application and Company Apps applications are installed automatically on the device. (Otherwise, the user would have to install the Centrify application from the Apple App Store.) 3 Enter the Customer support phone number. Chapter 1 Configuring identity platform settings 37
38 Setting Corporate IP ranges This is the number for your IT or Help department that you want your users to call if they have a problem or are confused while enrolling the device. 4 Enter a Department or location. 5 Select which setup items to skip when the user enrolls the device. By default, the user is prompted for all of the setup items. Check the items you do not require. 6 Click Save. Setting Corporate IP ranges You use the Corporate IP Range feature to define IP ranges for your internal network and external network. Connections that are made from inside the corporate IP range have the following privileges: Active Directory users can log in to Cloud Manager and the Centrify user portal with silent authentication. (This requires Integrated Windows authentication see "Configuring cloud connectors" on page 1-7.) If you enable authentication policy controls, these users can be exempt from the additional authentication requirements. (See "Authentication - Setting authentication policy controls" on page 1-7 for the details.) There are two identity platform features that look to the Corporate IP range: Silent authentication for Cloud Manager and user portal logins: If the computers address is outside the IP range you specify here, Active Directory users are prompted to enter their credentials. This feature is not available to users with cloud accounts. If you do not specify a range, all IP addresses are treated as possibly inside your network. Note This feature uses Integrated Windows authentication. See "Configuring cloud connectors" on page 1-7 for more about Integrated Windows authentication. multifactor login authentication: Users logging in to the portals from computer s with an address that is outside the IP range are prompted to provide an additional authentication factor. If you do not specify an IP range, all IP addresses are treated as outside your network and all users including those users within your network are prompted for an additional authentication factor. See "Authentication - Setting authentication policy controls" on page 1-7 for the details on multifactor authentication. To specify external IP addresses for silent authentication and access control: 1 Open Cloud Manager and click Settings. Cloud Manager user s guide 38
39 Selecting the policy service for device policy management 2 Click Corporate IP Range. 3 Click the Add button. 4 Enter an IP address or a range of addresses in the form <network>/<subnet mask>. Cloud Manager shows your current external IP address under the text box. 5 Click OK Repeat to specify additional addresses or ranges. Selecting the policy service for device policy management You use Device Policy Management to select whether you use Centrify cloud policy service or Active Directory Group Policy Management to set device configuration policies. After you select the policy management tool, you can set the policy update schedule and certificate authority. Note You must select the Centrify identity platform for mobile device management if you want to set the mobile device policies and install them in the device (see "Configuring mobile device management or single sign-on only" on page 1-43). When you select the Centrify cloud policy service, you use policy sets created in Cloud Manager to set device configuration policies.when you use Active Directory group policy you create group policy objects and edit them with the Group Policy Management Editor to set device configuration policies. See "Managing device configuration policies" on page 1-21 for the details. You use roles to apply the policies to sets of users by linking the group policy object to an Active Directory organizational unit and then specify that organizational unit in the device enrollment settings. Both methods provide largely the same policies see "List of device configuration policies" on page 1-1 for a summary of the policies available in each one.the method you select depends upon the types of accounts (Centrify user service or Active Directory) used for enrolling devices. Use the following guidelines to select the proper method for your organization: You have devices enrolled by users with the following types of accounts Both users with cloud and Active Directory accounts Only users with Active Directory accounts Only users with cloud accounts Select this method Centrify cloud policy service Either Active Directory or Centrify cloud policy service Centrify cloud policy service Notes If you select Active Directory, the Centrify identity platform does not install the policies in devices enrolled by users with cloud accounts. Select the method that is most convenient to you. Chapter 1 Configuring identity platform settings 39
40 Selecting the policy service for device policy management Note If you select Active Directory group policy, you still use policy sets to configure the Device Management Settings, Device Enrollment Settings, Account Security Policies, and Application Policies. You use the group policy object just to set the device configuration policies Selecting the Centrify cloud policy service If you select Centrify cloud policy service, the identity platform uses the policy sets assigned to each role to set the device configuration policies. See "Using Cloud Manager to set device configuration policies" on page 1-22 for the details. When you select the Centrify cloud policy service, you configure the policy push delay and select the certification authority. The policy push delay specifies the number of minutes the Centrify identity platform waits from the time you saved the policy set to push the changes to the devices. You can use either the Active Directory Certificate Service or the Centrify cloud CA to generate user and computer certificates to authenticate users and devices for wi-fi connections, respectively. The certificates are created and installed on the device when the user enrolls the device. Click Use Active Directory Certificate Service for PKI client authentication to use the default certification authority you configured in your Active Directory Certificate Service. (You can use the default certification authority only.) If you select this option, you need to create user and computer templates on the default certification authority. There may be some additional configuration required in the cloud connector as well. See "Using Active Directory certificates in devices for authentication" on page 1-17 for the details. Click Use Tenant Certificate Authority for PKI client authentication to use the Centrify cloud CA for your identity platform account (tenant) to generate user and computer certificates instead. You do not need to create templates when you select this option. The Centrify Identity Service includes a Centrify cloud CA for each customer identity platform. When you select the tenant certification authority, it generates certificates that can be used to authenticate users for wi-fi and VPN connections and Exchange ActiveSync server log ins. The certificates are automatically generated and installed for users who are a member of a role that has a wi-fi, VPN, or Exchange server profile in the Centrify cloud policy service in which certificates are used for authentication. The certificates are installed automatically when the user enrolls the device. Click the Download button to download the certificate for the Centrify cloud CA for your account for installation in the Exchange server, wi-fi access point, or VPN server or concentrator. The certificate is self-signed. See the following sections to configure the use of Centrify cloud CA certificates: "Configuring Exchange profiles" on page 1-40 "Configuring VPN profiles" on page 1-45 Cloud Manager user s guide 40
41 Selecting the policy service for device policy management "Configuring Wi-Fi profiles" on page 1-48 To select Centrify cloud policy service for device policy management: 1 Open Cloud Manager and click Settings. 2 Click Device Policy Management. 3 Click Cloud Policy Service. 4 Click the text box and enter the number of minutes for the policy push delay. 5 Click the radio button to select the certification authority. 6 Optional: If you need to install the certificate for your Centrify cloud CA in a wi-fi access point, VPN server or concentrator, or Exchange ActiveSync server, click Download to download the certificate file. 7 Click Save. Selecting Active Directory group policy p If you select Active Directory group policy, the identity platform uses the group policy object you linked to the organizational unit specified in the Device Enrollment Settings for each role to set the device configuration policies. See "Using the Group Policy Management Editor to set mobile device policies" on page 1-23 to specify the organizational unit; see "Configuring group policy objects and organizational units" on page 1-42 to link the group policy object to the organizational unit. When you select the Active Directory group policy, you set the update interval and select the certification authority used to generate certificates for users and devices when they enroll on the Settings page. The update interval sets how often the identity platform polls the domain controller for changes to the group policy objects. If the identity platform finds a group policy object has changed, it pushes the policy changes to the devices. Otherwise, it takes no action. The certification authority you select generates certificates that can be used to authenticate users for wi-fi and VPN connections and Exchange ActiveSync server log ins. The certificates are automatically generated and installed for users who are a member of a role that has a wi-fi, VPN, or Exchange server profile in the group policy object linked to their organizational unit. The certificates are installed automatically when the user enrolls the device. When you install the cloud connector, it searches the Active Directory forest for the certification authorities you have configured in your Active Directory Certificate Service. You can select any certificate authority it finds to generate certificates. Note When you use an Active Directory certification authority, you need to create user and computer templates on the certification authority you select. There may be some additional Chapter 1 Configuring identity platform settings 41
42 Selecting the policy service for device policy management configuration required in the cloud connector as well. See "Using Active Directory certificates in devices for authentication" on page 1-17 for the details. To select Active Directory for device policy management: 1 Open Cloud Manager and click Settings. 2 Click Device Policy Management. 3 Click Active Directory group policy. 4 Set the update interval. Enter the number of minutes to set the period between polling events. 5 Select the certificate authority. If you do not want to use the default certification authority, use the drop-down menu to select another. 6 Click Save. Configuring group policy objects and organizational units When you use Active Directory group policy to set device configuration policies, you use group policy objects that you edit with the Group Policy Management Editor to set the policies. Next, you link that group policy object to an organizational unit. Finally, you specify the organizational unit to use for a given policy set when you configure the Device Enrollment Settings (see "Device Enrollment Settings - Enabling users to enroll devices" on page 1-5). The organizational unit you specify in the Device Enrollment Settings is also the organizational unit in which the identity platform stores the Active Directory record when the user enrolls the device. You can use this record in Active Directory Users and Computers to get information about the device and send it commands. See "Using Active Directory Users and Computers to manage devices" on page 1-8 for the details. When you select Active Directory group policy, you should plan on how you are going to apply the group policy objects to Centrify user service roles before you create the policy sets and assign them to the roles. Once you have your roles and policies planned, you use the following procedure to apply them to individual users devices: 1 Create a separate organizational unit for each role. 2 Create the group policy object for that role and set the policies. 3 Link the group policy object to the organizational unit. 4 Specify the organizational unit when you set the Device Enrollment Settings for the policy set (see "Device Enrollment Settings - Enabling users to enroll devices" on page 1-5). Cloud Manager user s guide 42
43 Configuring mobile device management or single sign-on only 5 Assign the policy set to the role. 6 Add the users to the role. You can use multiple roles or policy sets to apply different policies to users. In this case the rules for hierarchical policies are applied see"using hierarchical policy sets" on page 1-3. Configuring mobile device management or single sign-on only You use the Mobile Device Management settings to: Select the Centrify identity platform for mobile device management. Enable Samsung KNOX UMC. By default, the Centrify identity platform is selected to provide mobile device management. When you use the Centrify identity platform for mobile device management, it allows you to do the following: Define mobile device policies that the Centrify identity platform automatically installs in the devices (see "Managing device configuration policies" on page 1-21). Send commands from Cloud Manager to the device (see "Using the device management commands" on page 1-11) Note When you use the Centrify identity platform for mobile device management, the device owner can also send many of the same commands to the devices from the Centrify user portal. Deploy native ios and Android mobile applications to the devices from Cloud Manager. Simplify device enrollment for users with Samsung KNOX devices that have the Universal Mobile Device Management Client (UMC) installed (see "Enabling Samsung KNOX UMC login suffix updates" on page 1-45 for the details). In addition, the identity platform provides more details about enrolled devices in user portal and the user portal. If you already have mobile device management from another provider in place, you can configure the Centrify identity platform for single sign-on only. When you configure the Centrify identity platform for single sign-on only, it provides the following services: You can create policy sets to set the following policies: Device Management Settings Device Enrollment Settings Account Security policies for authentication, password reset, and password settings. Application policies. You can assign web applications to the user portal. Chapter 1 Configuring identity platform settings 43
44 Configuring mobile device management or single sign-on only You can assign web applications with single sign-on to users with Android, KNOXenabled devices, and ios devices. Users must install the Centrify application on the device to open the web applications from the device. Optionally, users can also assign web applications to their devices from the user portal. You manage this option using the Application policies see "Managing Application policies" on page 1-20 You can have only one mobile device management provider. You cannot have some devices managed by the Centrify identity platform and other devices managed by another mobile device management provider. When you use another service for mobile device management, Centrify identity platform does not provide the following services: If you installed the Centrify cloud connector, the Centrify Mobile and Installed Applications tabs are not added to the device s Active Directory Properties. This means you cannot send the device management commands to a device from Active Directory Users and Computers. The Centrify Mobile tab is not added to the user s Active Directory Properties. This tab lists the devices enrolled by the user and lets you send commands to the devices. Group policy profiles are not installed on the devices. On Android devices, the Centrify application does not have a Setup screen. Users can still install the Centrify application on their devices and get single sign-on to the web applications you assign to them. However, they are limited to which commands they can send to the device (see "Using the device management commands" on page 1-11). Disabling Centrify identity platform mobile device management You use Mobile Device Management on the Settings page in Cloud Manager to select whether or not you use the Centrify identity platform for mobile device management. To disable the Centrify identity platform for mobile device management: 1 Open Cloud Manager and click Settings. 2 Click Mobile Device Management. 3 Reset Use the identity platform for mobile device management. (The box should not be checked.) 4 Click Save. Cloud Manager user s guide 44
45 Managing security settings Enabling Samsung KNOX UMC login suffix updates When you select the Centrify identity platform for mobile device management and you have Samsung Workspace devices equipped with the Samsung KNOX Universal Mobile Device Management Client (UMC), you should set Enable Samsung KNOX UMC to simplify device enrollment for users. For these users, installing the Centrify application and enrolling their devices uses a different procedure than users with Android and Samsung devices that are not equipped with the UMC. See "Working with UMC supported KNOX devices" on page 1-26 for the details. When you enable this setting, the identity platform automatically registers and synchronizes the login suffixes you have created. The simplified enrollment is provided to all users whose login suffix is registered in the Samsung Enterprise Gateway. The update is typically made within a minute after you add, delete, or modify the login suffix. To update the Samsung Enterprise Gateway with your login suffix changes: 1 Open Cloud Manager and click the Settings tab. 2 Click Mobile Device Management and set Enable Samsung KNOX UMC. 3 Click Save. Managing security settings You use the security settings to capture users passwords using strong encryption that is unique to your company. Capturing users passwords securely By default, the Centrify identity platform does not capture users passwords. However, you might want to capture users passwords to support account mapping options for user password apps or to provision user passwords to supported applications. To capture users passwords, enable Securely capture users passwords at login. Once this option is enabled, the Centrify identity platform captures users passwords the next time they log in. Unless capturing users passwords is required for a specific feature, Centrify recommends leaving this feature disabled. Tip Preparing authentication profiles for Server Suite authentication With Centrify Server Suite, you can require multi-factor authentication for two distinct situations: Chapter 1 Configuring identity platform settings 45
46 Preparing authentication profiles for Server Suite authentication As part of the login process so that users who are attempting to log on through PAM applications must provide two forms of authentication before they are granted access. As part of a re-authentication process so that users who are attempting to use command rights with elevated privileges or in a restricted shell must provide a password and another form of authentication or two forms of authentication other than a password before they can execute the selected command. To configure the types of authentication challenges allowed in each situation, you can prepare one or more authentication profiles. If you have already configured authentication profiles for other purposes, you can reuse those profiles for Server Suite authentication or add new profiles specifically for the computers you manage through Server Suite. You can prepare one profile to use for both login access and for the use elevated privileges or you can prepare separate profiles for each situation. For more information about multi-factor authentication for Centrify Server Suite, see the Multi-factor Authentication Quick Start Guide in the Centrify Server Suite Documentation folder. To prepare authentication profiles specifically for Server Suite authentication 1 Log on to the cloud instance, then click Settings. 2 Click Server Suite Authentication. 3 For Server Authentication Profile, display the list of existing profiles and select a profile to use or click Add New Profile. If you want to specify the authentication challenges that are presented and from which a user can select when logging on, select Add New Profile. Type the authentication profile name. Select the types of authentication to present for the first challenge. Select the types of authentication to present for the second challenge. Click OK. You should note that only the authentication challenges that are applicable for a user can be presented. For example, you might select Phone call and confirmation code in the authentication profile, but these challenges are only valid if users have both a phone number and address stored for their accounts. If users only have a phone number and not an address stored, they will receive a phone call to complete the authentication process rather than be prompted to select an authentication option. If users have both a phone number and an address stored, they will be prompted to select which form of authentication to use. 4 For Elevated Privileges Profile, display the list of existing profiles and select a profile to use or click Add New Profile. Cloud Manager user s guide 46
47 Preparing authentication profiles for Server Suite authentication You can use the same profile for server access and elevated privileges. However, if you want to specify different authentication challenges from which a user can select when executing commands, select Add New Profile. As with the Server Authentication Profile, you can select multiple types of authentication to present for the first and second challenges. However, only the authentication challenges that are applicable for a user can be presented when the user attempts to execute commands with elevated privileges (dzdo) or in a restricted shell (dzsh). 5 Click Save. Chapter 1 Configuring identity platform settings 47
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Managing users. Account sources. Chapter 1
Chapter 1 Managing users The Users page in Cloud Manager lists all of the user accounts in the Centrify identity platform. This includes all of the users you create in the Centrify for Mobile user service
Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles
Appendix 1 Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles This section explains how you use the Cloud Management Suite installation wizard for the following purposes: To
AVG Business SSO Partner Getting Started Guide
AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in
SAP NetWeaver Fiori. For more information, see "Creating and enabling a trusted provider for Centrify" on page 108-10.
Chapter 108 Configuring SAP NetWeaver Fiori The following is an overview of the steps required to configure the SAP NetWeaver Fiori Web application for single sign-on (SSO) via SAML. SAP NetWeaver Fiori
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
AVG Business SSO Connecting to Active Directory
AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud
http://docs.trendmicro.com
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Kaspersky Lab Mobile Device Management Deployment Guide
Kaspersky Lab Mobile Device Management Deployment Guide Introduction With the release of Kaspersky Security Center 10.0 a new functionality has been implemented which allows centralized management of mobile
Centrify Cloud Management Suite
Centrify Cloud Management Suite Installation and Configuration Guide April 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Managing policies. Chapter 7
Chapter 7 Managing policies You use the Policies tab in Admin Portal to create policy sets for roles. A policy set lets you configure the following categories of policies: Mobile Device Policies Use to
Connected Data. Connected Data requirements for SSO
Chapter 40 Configuring Connected Data The following is an overview of the steps required to configure the Connected Data Web application for single sign-on (SSO) via SAML. Connected Data offers both IdP-initiated
Flexible Identity Federation
Flexible Identity Federation Administration guide version 1.0.1 Publication history Date Description Revision 2015.09.24 initial release 1.0.0 2015.12.11 minor updates 1.0.1 Copyright Orange Business Services
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Telstra Mobile Device Management (T MDM) Getting Started Guide
Telstra Mobile Device Management (T MDM) Getting Started Guide Welcome Thank you for your interest in T MDM and Welcome! In this guide we will take you through the steps to enrolling your first device
Configuring. Moodle. Chapter 82
Chapter 82 Configuring Moodle The following is an overview of the steps required to configure the Moodle Web application for single sign-on (SSO) via SAML. Moodle offers SP-initiated SAML SSO only. 1 Prepare
For details about using automatic user provisioning with Salesforce, see Configuring user provisioning for Salesforce.
Chapter 41 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
SAML single sign-on configuration overview
Chapter 46 Configurin uring Drupal Configure the Drupal Web-SAML application profile in Cloud Manager to set up single sign-on via SAML with a Drupal-based web application. Configuration also specifies
Using Devices. Chapter 3
Chapter 3 Using Devices es The Devices page lists all the devices you have enrolled in the Centrify identity platform and lets you send commands to the devices. Device related tasks that you can perform
SP-initiated SSO for Smartsheet is automatically enabled when the SAML feature is activated.
Chapter 87 Configuring Smartsheet The following is an overview of the steps required to configure the Smartsheet Web application for single sign-on (SSO) via SAML. Smartsheet offers both IdP-initiated
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Sophos Mobile Control SaaS startup guide. Product version: 6
Sophos Mobile Control SaaS startup guide Product version: 6 Document date: January 2016 Contents 1 About this guide...4 2 About Sophos Mobile Control...5 3 What are the key steps?...7 4 Change your password...8
Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
SAP NetWeaver AS Java
Chapter 75 Configuring SAP NetWeaver AS Java SAP NetWeaver Application Server ("AS") Java (Stack) is one of the two installation options of SAP NetWeaver AS. The other option is the ABAP Stack, which is
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Sharepoint server SSO
Configuring g on-premise Sharepoint server SSO Chapter 99 You can now provide single sign-on to your on-premise Sharepoint server applications. This section includes the following topics: "An overview
Mobility Manager 9.0. Installation Guide
Mobility Manager 9.0 Installation Guide LANDESK MOBILITY MANAGER Copyright 2002-2012, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or
Manual POLICY PATROL SECURE FILE TRANSFER
Manual POLICY PATROL SECURE FILE TRANSFER MANUAL Policy Patrol Secure File Transfer This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software
LifeSize Control TM Deployment Guide
LifeSize Control TM Deployment Guide July 2011 LifeSize Control Deployment Guide 2 LifeSize Control This guide is for network administrators who use LifeSize Control to manage video and voice communications
Sophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM. This guide provides information on...
Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM This guide provides information on...... APNs Requirements Tips on Enrolling in the ios Developer Enterprise Program...
Administration Guide. BlackBerry Enterprise Service 12. Version 12.0
Administration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2015-01-16 SWD-20150116150104141 Contents Introduction... 9 About this guide...10 What is BES12?...11 Key features of BES12...
APNS Certificate generating and installation
APNS Certificate generating and installation Quick Guide for generating and installing an Apple APNS Certificate Version: x.x MobiDM Quick Guide for APNS Certificate Page 1 Index 1. APPLE APNS CERTIFICATE...
Installation and Configuration Guide
Installation and Configuration Guide BlackBerry Resource Kit for BlackBerry Enterprise Service 10 Version 10.2 Published: 2015-11-12 SWD-20151112124827386 Contents Overview: BlackBerry Enterprise Service
HOTPin Integration Guide: DirectAccess
1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
OneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
Okta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 [email protected] 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
User Guide. Time Warner Cable Business Class Cloud Solutions Control Panel. Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007
Chapter Title Time Warner Cable Business Class Cloud Solutions Control Panel User Guide Hosted Microsoft Exchange 2007 Hosted Microsoft SharePoint 2007 Version 1.1 Table of Contents Table of Contents...
Getting Started Guide: Getting the most out of your Windows Intune cloud
Getting Started Guide: Getting the most out of your Windows Intune cloud service Contents Overview... 3 Which Configuration is Right for You?... 3 To Sign up or Sign in?... 4 Getting Started with the Windows
Administering Jive for Outlook
Administering Jive for Outlook TOC 2 Contents Administering Jive for Outlook...3 System Requirements...3 Installing the Plugin... 3 Installing the Plugin... 3 Client Installation... 4 Resetting the Binaries...4
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
An overview of configuring WebEx for single sign-on. To configure the WebEx application for single-sign on from the cloud service (an overview)
Chapter 83 WebEx This chapter includes the following sections: An overview of configuring WebEx for single sign-on Configuring WebEx for SSO Configuring WebEx in Cloud Manager For more information about
QuickStart Guide for Mobile Device Management
QuickStart Guide for Mobile Device Management Version 8.5 Inventory Configuration Security Management Distribution JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made
Avaya Video Conferencing Manager Deployment Guide
Avaya Video Conferencing Manager Deployment Guide August 2011 Avaya Video Conferencing Manager Deployment Guide 2 Avaya Video Conferencing Manager This guide is for network administrators who use Avaya
Comodo Mobile Device Manager Software Version 1.0
Comodo Mobile Device Manager Software Version 1.0 Installation Guide Guide Version 1.0.041114 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.CMDM Setup... 3 1.1.System
Sophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
Sophos Mobile Control Installation guide. Product version: 3.6
Sophos Mobile Control Installation guide Product version: 3.6 Document date: November 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...5 3 Set up Sophos Mobile Control...11 4 External
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
Eucalyptus 3.4.2 User Console Guide
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
SAML single sign-on configuration overview
Chapter 34 Configurin guring g Clarizen Configure the Clarizen Web-SAML application profile in Cloud Manager to set up single sign-on via SAML with Clarizen. Configuration also specifies how the application
Configuring. SuccessFactors. Chapter 67
Chapter 67 Configuring SuccessFactors The following is an overview of the steps required to configure the SuccessFactors Enterprise Edition Web application for single sign-on (SSO) via SAML. SuccessFactors
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
Sophos Mobile Control Installation guide
Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running
http://www.trendmicro.com/download
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Configuring Salesforce
Chapter 94 Configuring Salesforce The following is an overview of how to configure the Salesforce.com application for singlesign on: 1 Prepare Salesforce for single sign-on: This involves the following:
QuickStart Guide for Mobile Device Management. Version 8.6
QuickStart Guide for Mobile Device Management Version 8.6 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF
Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM. This guide provides information on...
Generating an Apple Push Notification Service Certificate for use with GO!Enterprise MDM This guide provides information on...... APNs Requirements Tips on Enrolling in the ios Developer Enterprise Program...
Sophos Mobile Control Startup guide. Product version: 3.5
Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile
Request Manager Installation and Configuration Guide
Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
How To Use Senior Systems Cloud Services
Senior Systems Cloud Services In this guide... Senior Systems Cloud Services 1 Cloud Services User Guide 2 Working In Your Cloud Environment 3 Cloud Profile Management Tool 6 How To Save Files 8 How To
ManageEngine Desktop Central. Mobile Device Management User Guide
ManageEngine Desktop Central Mobile Device Management User Guide Contents 1 Mobile Device Management... 2 1.1 Supported Devices... 2 1.2 What Management Operations you can Perform?... 2 2 Setting Up MDM...
Installation Guide for Pulse on Windows Server 2012
MadCap Software Installation Guide for Pulse on Windows Server 2012 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
AvePoint Meetings 3.2.2 for SharePoint On-Premises. Installation and Configuration Guide
AvePoint Meetings 3.2.2 for SharePoint On-Premises Installation and Configuration Guide Issued August 2015 Table of Contents About AvePoint Meetings for SharePoint... 4 System Requirements... 5 2 System
POLICY PATROL MFT. Manual
POLICY PATROL MFT Manual MANUAL Policy Patrol MFT This manual, and the software described in this manual, are copyrighted. No part of this manual or the described software may be copied, reproduced, translated
Citrix Access Gateway Plug-in for Windows User Guide
Citrix Access Gateway Plug-in for Windows User Guide Access Gateway 9.2, Enterprise Edition Copyright and Trademark Notice Use of the product documented in this guide is subject to your prior acceptance
Office 365 deploym. ployment checklists. Chapter 27
Chapter 27 Office 365 deploym ployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of
How to Obtain an APNs Certificate for CA MDM
How to Obtain an APNs Certificate for CA MDM Contents How to Obtain an APNs Certificate for CA MDM Verify Prerequisites Obtaining Root and Intermediate Certificates Create a Certificate Signing Request
WhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
Table of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...
Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...
HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services
1 HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
Installation Guide for Pulse on Windows Server 2008R2
MadCap Software Installation Guide for Pulse on Windows Server 2008R2 Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software
2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Administration Guide. WatchDox Server. Version 4.8.0
Administration Guide WatchDox Server Version 4.8.0 Published: 2015-11-01 SWD-20151101091846278 Contents Introduction... 7 Getting started... 11 Signing in to WatchDox... 11 Signing in with username and
Entrust Managed Services PKI
Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.
Security Provider Integration RADIUS Server
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Installing GFI MailSecurity
Installing GFI MailSecurity Introduction This chapter explains how to install and configure GFI MailSecurity. You can install GFI MailSecurity directly on your mail server or you can choose to install
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
WhatsUp Gold v16.2 Installation and Configuration Guide
WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
Microsoft Office 365 Using SAML Integration Guide
Microsoft Office 365 Using SAML Integration Guide Revision A Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Cloud Services MDM. Control Panel Provisioning Guide
Cloud Services MDM Control Panel Provisioning Guide 10/24/2014 CONTENTS Overview... 2 Accessing MDM in the Control Panel... 3 Create the MDM Instance in the Control Panel... 3 Adding a New MDM User...
Managing users. Account sources. Chapter 2
Chapter 2 Managing users The Users page in Admin Portal lists all of the user accounts in the Samsung cloud service. This includes all of the users you create in the service and, if you are using Active
Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication
Authentication in XenMobile 8.6 with a Focus on Client Certificate Authentication Authentication is about security and user experience and balancing the two goals. This document describes the authentication
