Qualys API Release Notes

Size: px
Start display at page:

Download "Qualys API Release Notes"

Transcription

1 Qualys API Release Notes Version 8.3 November 15, 2014 Qualys 8.3 includes improvements to the Qualys API, giving you more ways to integrate your programs and API calls with Qualys Vulnerability Management (VM) and Qualys Policy Compliance (PC). Looking for our API user guides? Just log in to your Qualys account and go to Help > Resources. What s New New Authentication Vault API v2 Tell me about the base URL Our documentation and sample code use the API server URL for Qualys US Platform 1. Do you have another base URL? If yes please use it instead. Account Login Qualys US Platform 1 Qualys US Platform 2 Qualys EU Platform Qualys Private Cloud Platform Base URL Copyright 2014 by Qualys, Inc. All Rights Reserved.

2 New Authentication Vault API v2 The new Vault API (/api/2.0/fo/vault) allows you to manage authentication vaults for authentication records that use them. Using this API you can list vaults, create new vaults, update and view vault settings, and delete vaults. Permissions: Managers, Unit Managers and Scanners can view vaults and their settings. Managers can perform more functions (create, update, delete). Unit Managers can perform these functions if they are granted the permission Create/edit authentication records/vaults. List vaults Use the parameter action=list to list the vaults defined in your account. API request: curl -u "USERNAME:PASSWD" -H "X-Requested-With: curl" -d "action=list" " XML output: <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE AUTH_VAULT_LIST_OUTPUT SYSTEM " <AUTH_VAULT_LIST_OUTPUT> <RESPONSE> <DATETIME> T13:55:57Z</DATETIME> <STATUS>Success</STATUS> <COUNT>13</COUNT> <AUTH_VAULTS> <AUTH_VAULT> <TITLE> <![CDATA[added failover ip]]> </TITLE> <VAULT_TYPE> <![CDATA[Cyber-Ark PIM Suite]]> </VAULT_TYPE> <LAST_MODIFIED> <DATETIME> T12:05:21Z</DATETIME> <BY>quays_rn1</BY> </LAST_MODIFIED> <ID>1421</ID> </AUTH_VAULT> <AUTH_VAULT> <TITLE> <![CDATA[added failover ip1]]> Qualys API Release Notes 2

3 </TITLE> <VAULT_TYPE> <![CDATA[Cyber-Ark PIM Suite]]> </VAULT_TYPE> <LAST_MODIFIED> <DATETIME> T06:43:44Z</DATETIME> <BY>quays_rn1</BY> </LAST_MODIFIED> <ID>1441</ID> </AUTH_VAULT> <AUTH_VAULT> <TITLE> <![CDATA[Blue]]> </TITLE> <VAULT_TYPE> <![CDATA[CA Access Control]]> </VAULT_TYPE> <LAST_MODIFIED> <DATETIME> T05:26:32Z</DATETIME> <BY>quays_rn1</BY> </LAST_MODIFIED> <ID>1406</ID> </AUTH_VAULT> </AUTH_VAULTS> </RESPONSE> </AUTH_VAULT_LIST_OUTPUT> s: action=list echo_request={0 1} title={value} type={value} modified={date} (Required) (Optional) Set to 1 to show (echo) the request s input parameters (names and value) in the XML output. (Optional) Include vaults matching this title. (Optional) Include a certain vault type only. A valid value is: Cyber-Ark PIM Suite Thycotic Secret Server Quest Vault CA Access Control Hitachi ID PAM Lieberman ERPM (Optional) Include vaults modified on or after a certain date/time, in this format: YYYY-MM-DD[THH:MM:SSZ] (UTC/GMT). Qualys API Release Notes 3

4 orderby={value} sortorder={asc desc} limit={value} (Optional) Sort the vaults list by certain data. One of: id, title, system_name, last_modified, last_modified_by. A date must be specified in YYYYMM- DD[THH:MM:SSZ] format (UTC/GMT). (Optional) The sort order, used when the request includes the orderby parameter. One of: asc (for ascending order) or desc (for descending order). (Optional) The maximum number of vault records processed for the request, starting at the record number specified by the offset parameter. These parameters must be specified together: limit and offset. When not specified, default limit is set to 1,000 vault records. You can specify a value less than or greater than the default. offset={value} It s possible to specify limit=0 for no limit. In this case the output is not paginated and all records are returned in a single output. Warning: This is not recommended since it may generate a very large output and processing large XML files can consume a lot of resources on the client side. (Optional) The starting vault record number, used only when the request includes the limit parameter. More sample requests: 1) List all vaults, order vaults by system name curl -H "X-Requested-With:API" -u "USERNAME:PASSWD" -d "action=list&orderby=system_name" " 2) List all vaults, order vaults by title in descending order curl -H "X-Requested-With:API" -u "USERNAME:PASSWD" -d "action=list&sortorder=desc&title" " 3) List only 9th and 10th vault records curl -H "X-Requested-With:API" -u "USERNAME:PASSWD" -d "action=list&limit=2&offset=9" " Qualys API Release Notes 4

5 Create a new vault Use the parameter action=create. s: action=create title={value} type={value} comments={value} {vault settings} (Required) (Required) The vault title. (Required) The vault type. A valid value is: Cyber-Ark PIM Suite Thycotic Secret Server Quest Vault CA Access Control Hitachi ID PAM Lieberman ERPM (Optional) User defined comments. Tell me about vault settings API request: curl -u "USERNAME:PASSWD" -H "X-Requested-With: curl" -X "POST" -d "title=my+vault&type=cyber-ark+pim+suite&server_address= &p ort=1858&safe=mysafe1&username=someusername&password=somepasswd" " XML output: <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE SIMPLE_RETURN SYSTEM " <SIMPLE_RETURN> <RESPONSE> <DATETIME> T14:13:28Z</DATETIME> <TEXT>Success</TEXT> <ITEM_LIST> <ITEM> <KEY>ID</KEY> <VALUE> </VALUE> </ITEM> </ITEM_LIST> </RESPONSE> </SIMPLE_RETURN> Qualys API Release Notes 5

6 Update vault settings Use the parameter action=update. s: action=update id={value} title={value} comments={value} {vault settings} (Required) (Required) A vault ID. (Optional) A new title to replace the existing title. (Optional) User defined comments. Tell me about vault settings API request: curl -u "USERNAME:PASSWD" -H "X-Requested-With: curl" -X "POST" -d "id= &server_address= " " XML output: <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE SIMPLE_RETURN SYSTEM " <SIMPLE_RETURN> <RESPONSE> <DATETIME> T14:13:28Z</DATETIME> <TEXT>Success</TEXT> <ITEM_LIST> <ITEM> <KEY>ID</KEY> <VALUE> </VALUE> </ITEM> </ITEM_LIST> </RESPONSE> </SIMPLE_RETURN> View vault settings Use the parameter action=view. action=view id={value} (Required) (Required) A vault ID. Qualys API Release Notes 6

7 API request: curl -u "USERNAME:PASSWD" -H "X-Requested-With: curl" "id= " " XML output: <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE VAULT_OUTPUT SYSTEM " <VAULT_OUTPUT> <RESPONSE> <DATETIME> T14:25:04Z</DATETIME> <VAULT_QUEST> <TITLE> <![CDATA[My vault]]> </TITLE> <COMMENTS> <![CDATA[Some comments]]> </COMMENTS> <VAULT_TYPE> <![CDATA[Thycotic Secret Server]]> </VAULT_TYPE> <CREATED_ON> T14:13:28Z</CREATED_ON> <OWNER>acme_ab1</OWNER> <LAST_MODIFIED> <DATETIME> T14:13:28Z</DATETIME> <BY>acme_ab1</BY> </LAST_MODIFIED> <USERNAME> <![CDATA[acme_ab1]]> </USERNAME> <URL> <![CDATA[ </URL> <DOMAIN> <![CDATA[corp-test.com]]> </DOMAIN> <ID> </ID> </VAULT_QUEST> </RESPONSE> </VAULT_OUTPUT> Qualys API Release Notes 7

8 Delete a vault Use the parameter action=delete. action=view id={value} (Required) (Required) A vault ID. API request: curl -u "USERNAME:PASSWD" -H "X-Requested-With: curl" -d "id=43463" " XML output: <?xml version="1.0" encoding="utf-8"?> <!DOCTYPE SIMPLE_RETURN SYSTEM " <SIMPLE_RETURN> <RESPONSE> <DATETIME> T14:13:28Z</DATETIME> <TEXT>Success</TEXT> <ITEM_LIST> <ITEM> <KEY>Status</KEY> <VALUE>Deleted</VALUE> </ITEM> </ITEM_LIST> </RESPONSE> </SIMPLE_RETURN> Qualys API Release Notes 8

9 Tell me about vault settings The vault settings differ per vault type. CA Access Control ca_url={value} (Required for new vault) The HTTP or HTTPS URL of the CA Access Control web services, an API interface to your CA Access Control Enterprise Management installation. Note that the web services URL is different from the web management URL. Sample web services URL: WS6/ac ca_api_username={value} ca_ssl_verify={1 0} ca_web_username={value} ca_web_password={value} Cyber-Ark PIM Suite server_address={value} port={value} safe={value} username={value} password={value} Sample web management URL: (Required for new vault) The name of a user that is granted GetAccountPassword API permissions. (Required for new vault) When set to 1, our service will verify the SSL certificate of the web server to make sure the certificate is valid and trusted. When set to 0 our service will not verify the certificate of the web server. (Optional) The web user name used to access Basic Authentication of the CA Access Control web server. (Optional) The web password used to access Basic Authentication of the CA Access Control web server. (Required for new vault) The IP address of the vault server that stores system login credentials to be used. (Optional) The port the vault server is running on. The port must be in the range 1025 to For a new vault the port is set to 1858 by default, if the port parameter is not specified. (Required for new vault) The name of the digital password safe. The safe name can contain a maximum of 28 characters (leading and/or trailing space in the input value will be removed). These special characters cannot be included in a safe name: \ / : *? " < >. (Required for new vault) The username for an account with access to your Cyber-Ark PIM Suite environment. (Required for new vault) The password for an account with access to your Cyber-Ark PIM Suite environment. Qualys API Release Notes 9

10 Hitachi ID PAM url={value} username={value} password={value} ssl_verify={1 0} Lieberman ERPM url={value} domain={value} username={value} password={value} ssl_verify={1 0} Quest Vault server_address={value} port={value} username={value} (Required for new vault) The HTTP or HTTPS URL of the Hitachi ID PAM webservices. (Required for new vault) The username (ID) for the Hitachi ID PAM user account. To allow Qualys scanners to connect using this account, this user must have the following settings under Administrator information in the Hitachi ID Management Suite: 1) the privilege OTP IDAPI caller and 2) the value entered in the IP address with CIDR bitmask field must include the Qualys scanner IP addresses. (Required for new vault) The password for the Hitachi ID PAM user account. (Required for new vault) When set to 1, our service will verify the SSL certificate of the web server to make sure the certificate is valid and trusted. When set to 0 our service will not verify the certificate of the web server. (Required for new vault) The HTTP or HTTPS URL of the Lieberman ERPM server. (Optional) A domain name if your Lieberman ERPM server is part of a domain. (Required for new vault) The username for the Lieberman ERPM server account. (Required) The password for the Lieberman ERPM server account. (Required for new vault) Our service will verify the SSL certificate of the web server to make sure the certificate is valid and trusted, unless you set ssl_verify=0. For a new vault the default is set to 1 (i.e. verify). (Required for new vault) The IP address of the vault server, Quest One Privileged Password Manager. (Optional) The listing port of the vault server. For a new vault the port is set to 22 by default, if the port parameter is not specified. (Required for new vault) The username to be used for SSH authentication. We recommend you create a dedicated user account for Qualys scanning. Using Quest/Dell 2.4 or higher, enter the key for the API user account you've created for use with our service. We support both API and CLI keys but recommend use of an API key. Qualys API Release Notes 10

11 access_key={value} Thycotic Secret Server url={value} username={value} password={value} domain={value} (Required for new vault) The DSA private key in PEM format for SSH authentication. (Required for new vault) The HTTP or HTTPS URL of the Secret Server webservices. The URL may contain a maximum of 256 characters, and must not contain multibyte characters. (Required for new vault) The username for a Secret Server user. This user must have access to the secret names to be used for authentication. (Required for new vault) The password for a Secret Server user. (Optional) Specify a fully qualified domain name if Secret Server is integrated with Active Directory. The domain may contain a maximum of 128 characters, and must not contain any multibyte characters. Qualys API Release Notes 11

Tenable for CyberArk

Tenable for CyberArk HOW-TO GUIDE Tenable for CyberArk Introduction This document describes how to deploy Tenable SecurityCenter and Nessus for integration with CyberArk Enterprise Password Vault. Please email any comments

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

Managing Qualys Scanners

Managing Qualys Scanners Q1 Labs Help Build 7.0 Maintenance Release 3 documentation@q1labs.com Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access

More information

Qualys PC/SCAP Auditor

Qualys PC/SCAP Auditor Qualys PC/SCAP Auditor Getting Started Guide August 3, 2015 COPYRIGHT 2011-2015 BY QUALYS, INC. ALL RIGHTS RESERVED. QUALYS AND THE QUALYS LOGO ARE REGISTERED TRADEMARKS OF QUALYS, INC. ALL OTHER TRADEMARKS

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

Qualys API V1. User Guide. Version 8.6

Qualys API V1. User Guide. Version 8.6 Qualys API V1 User Guide Version 8.6 September 30, 2015 Copyright 2002-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide

IBM Security QRadar SIEM Version 7.1.0 MR1. Vulnerability Assessment Configuration Guide IBM Security QRadar SIEM Version 7.1.0 MR1 Vulnerability Assessment Configuration Guide Note: Before using this information and the product that it supports, read the information in Notices and Trademarks

More information

NETASQ ACTIVE DIRECTORY INTEGRATION

NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos

More information

Creating an ESS instance on the Amazon Cloud

Creating an ESS instance on the Amazon Cloud Creating an ESS instance on the Amazon Cloud Copyright 2014-2015, R. James Holton, All rights reserved (11/13/2015) Introduction The purpose of this guide is to provide guidance on creating an Expense

More information

Web Application Firewall

Web Application Firewall Web Application Firewall Getting Started Guide August 3, 2015 Copyright 2014-2015 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Protected Trust Setup Guide for Brother MFC Devices

Protected Trust Setup Guide for Brother MFC Devices Protected Trust Setup Guide for Brother MFC Devices Summary Protected Trust Email Encryption is a versatile secure email service. This guide details three use cases between Protected Trust and your Brother

More information

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3

White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3 White Paper Fabasoft Folio 2015 Update Rollup 3 Copyright Fabasoft R&D GmbH, Linz, Austria, 2016. All rights reserved. All hardware and software names used are registered trade names and/or registered

More information

Asset Management and Tagging API v1. User Guide Version 2.3

Asset Management and Tagging API v1. User Guide Version 2.3 Asset Management and Tagging API v1 User Guide Version 2.3 February 18, 2014 Copyright 2013-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of

More information

Setup Corporate (Microsoft Exchange) Email. This tutorial will walk you through the steps of setting up your corporate email account.

Setup Corporate (Microsoft Exchange) Email. This tutorial will walk you through the steps of setting up your corporate email account. Setup Corporate (Microsoft Exchange) Email This tutorial will walk you through the steps of setting up your corporate email account. Microsoft Exchange Email Support Exchange Server Information You will

More information

Contents. 2 Alfresco API Version 1.0

Contents. 2 Alfresco API Version 1.0 The Alfresco API Contents The Alfresco API... 3 How does an application do work on behalf of a user?... 4 Registering your application... 4 Authorization... 4 Refreshing an access token...7 Alfresco CMIS

More information

EMC ViPR Controller. ViPR Controller REST API Virtual Data Center Configuration Guide. Version 2.3.0.0 302-002-070 01

EMC ViPR Controller. ViPR Controller REST API Virtual Data Center Configuration Guide. Version 2.3.0.0 302-002-070 01 EMC ViPR Controller Version 2.3.0.0 ViPR Controller REST API Virtual Data Center Configuration Guide 302-002-070 01 Copyright 2013-2015 EMC Corporation. All rights reserved. Published in USA. Published

More information

Startup guide for Zimonitor

Startup guide for Zimonitor Page 1 of 5 Startup guide for Zimonitor This is a short introduction to get you started using Zimonitor. Start by logging in to your version of Zimonitor using the URL and username + password sent to you.

More information

IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM

IBM Security QRadar Version 7.2.5. Vulnerability Assessment Configuration Guide IBM IBM Security QRadar Version 7.2.5 Vulnerability Assessment Configuration Guide IBM Note Before using this information and the product that it supports, read the information in Notices on page 93. Product

More information

Eucalyptus 3.4.2 User Console Guide

Eucalyptus 3.4.2 User Console Guide Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure

More information

SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.

SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7. Enabling Integrated Windows Authentication For CitectSCADA Web Client Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.xx Summary: What is the difference between Basic Authentication and Windows

More information

UFTP AUTHENTICATION SERVICE

UFTP AUTHENTICATION SERVICE UFTP Authentication Service UFTP AUTHENTICATION SERVICE UNICORE Team Document Version: 1.1.0 Component Version: 1.1.1 Date: 17 11 2014 UFTP Authentication Service Contents 1 Installation 1 1.1 Prerequisites....................................

More information

Policy Compliance. Getting Started Guide. January 22, 2016

Policy Compliance. Getting Started Guide. January 22, 2016 Policy Compliance Getting Started Guide January 22, 2016 Copyright 2011-2016 by Qualys, Inc. All Rights Reserved. Qualys and the Qualys logo are registered trademarks of Qualys, Inc. All other trademarks

More information

Two Factor Authentication in SonicOS

Two Factor Authentication in SonicOS Two Factor Authentication in SonicOS 1 Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION indicates potential damage

More information

/ Preparing to Manage a VMware Environment Page 1

/ Preparing to Manage a VMware Environment Page 1 Configuring Security for a Managed VMWare Enviroment in VMM Preparing to Manage a VMware Environment... 2 Decide Whether to Manage Your VMware Environment in Secure Mode... 2 Create a Dedicated Account

More information

HTTP Reverse Proxy Scenarios

HTTP Reverse Proxy Scenarios Sterling Secure Proxy HTTP Reverse Proxy Scenarios Version 3.4 Sterling Secure Proxy HTTP Reverse Proxy Scenarios Version 3.4 Note Before using this information and the product it supports, read the information

More information

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014

QualysGuard WAS. Getting Started Guide Version 3.3. March 21, 2014 QualysGuard WAS Getting Started Guide Version 3.3 March 21, 2014 Copyright 2011-2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.

More information

Use Enterprise SSO as the Credential Server for Protected Sites

Use Enterprise SSO as the Credential Server for Protected Sites Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured

More information

4. Getting started: Performing an audit

4. Getting started: Performing an audit 4. Getting started: Performing an audit Introduction Security scans enable systems administrators to identify and assess possible risks within a network. Through GFI LANguard N.S.S. this is performed automatically,

More information

vcommander will use SSL and session-based authentication to secure REST web services.

vcommander will use SSL and session-based authentication to secure REST web services. vcommander REST API Draft Proposal v1.1 1. Client Authentication vcommander will use SSL and session-based authentication to secure REST web services. 1. All REST API calls must take place over HTTPS 2.

More information

Secure Messaging Server Console... 2

Secure Messaging Server Console... 2 Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating

More information

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015

QualysGuard WAS. Getting Started Guide Version 4.1. April 24, 2015 QualysGuard WAS Getting Started Guide Version 4.1 April 24, 2015 Copyright 2011-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc.

More information

Active Directory Authentication Integration

Active Directory Authentication Integration Active Directory Authentication Integration This document provides a detailed explanation of how to integrate Active Directory into the ipconfigure Installation of a Windows 2003 Server for network security.

More information

Copyright Pivotal Software Inc, 2013-2015 1 of 10

Copyright Pivotal Software Inc, 2013-2015 1 of 10 Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10

More information

Vulnerability Scan Results in XML

Vulnerability Scan Results in XML Vulnerability Scan Results in XML Vulnerability scan results may be downloaded in XML format from the scan history list. The vulnerability scan results in XML format contains the same content as the vulnerability

More information

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security

CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by

More information

SmarterMeasure Inbound Single Sign On (SSO) Version 1.3 Copyright 2010 SmarterServices, LLC / SmarterServices.com PO Box 220111, Deatsville, AL 36022

SmarterMeasure Inbound Single Sign On (SSO) Version 1.3 Copyright 2010 SmarterServices, LLC / SmarterServices.com PO Box 220111, Deatsville, AL 36022 SmarterMeasure Inbound Single Sign On (SSO) Version 1.3 Copyright 2010 SmarterServices, LLC / SmarterServices.com PO Box 220111, Deatsville, AL 36022 Contents 1. Revision History... 3 2. Overview... 3

More information

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support

SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory

More information

How to Configure Captive Portal

How to Configure Captive Portal How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,

More information

Managing Software and Configurations

Managing Software and Configurations 55 CHAPTER This chapter describes how to manage the ASASM software and configurations and includes the following sections: Saving the Running Configuration to a TFTP Server, page 55-1 Managing Files, page

More information

User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks

User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks User-ID Features PAN-OS New Features Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/

More information

Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks

Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA

More information

Qualys API. Network Support Qualys Version 8.2

Qualys API. Network Support Qualys Version 8.2 Qualys API Network Support Qualys Version 8.2 August 6, 2014 Copyright 2014 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys, Inc. All other

More information

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure

Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Quick Start Guide: Utilizing Nessus to Secure Microsoft Azure Introduction Tenable Network Security is the first and only solution to offer security visibility, Azure cloud environment auditing, system

More information

MadCap Software. Upgrading Guide. Pulse

MadCap Software. Upgrading Guide. Pulse MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished

More information

Contents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10

Contents. Before You Install... 3. Server Installation... 5. Configuring Print Audit Secure... 10 Installation Guide Contents Before You Install... 3 Server Installation... 5 Configuring Print Audit Secure... 10 Configuring Print Audit Secure to use with Print Audit 6... 15 Licensing Print Audit Secure...

More information

Asset Management and Tagging API v2. User Guide Version 2.9

Asset Management and Tagging API v2. User Guide Version 2.9 Asset Management and Tagging API v2 User Guide Version 2.9 July 15, 2015 Copyright 2013-2015 by Qualys, Inc. All Rights Reserved. Qualys, the Qualys logo and QualysGuard are registered trademarks of Qualys,

More information

PaperCut Payment Gateway Module - PayPal Payflow Link - Quick Start Guide

PaperCut Payment Gateway Module - PayPal Payflow Link - Quick Start Guide PaperCut Payment Gateway Module - PayPal Payflow Link - Quick Start Guide This guide is designed to supplement the Payment Gateway Module documentation and provides a guide to installing, setting up, and

More information

Fairsail. Implementer. Fairsail to Active Directory Synchronization. Version 1.0 FS-PS-FSAD-IG-201310--R001.00

Fairsail. Implementer. Fairsail to Active Directory Synchronization. Version 1.0 FS-PS-FSAD-IG-201310--R001.00 Fairsail Implementer Fairsail to Active Directory Synchronization Version 1.0 FS-PS-FSAD-IG-201310--R001.00 Fairsail 2013. All rights reserved. This document contains information proprietary to Fairsail

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

Ciphermail Gateway PDF Encryption Setup Guide

Ciphermail Gateway PDF Encryption Setup Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Gateway PDF Encryption Setup Guide March 6, 2014, Rev: 5454 Copyright c 2008-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Portal 4 3 PDF encryption

More information

Installation & Configuration Guide User Provisioning Service 2.0

Installation & Configuration Guide User Provisioning Service 2.0 Installation & Configuration Guide User Provisioning Service 2.0 NAVEX Global User Provisioning Service 2.0 Installation Guide Copyright 2015 NAVEX Global, Inc. NAVEX Global is a trademark/service mark

More information

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE

TRIPWIRE PURECLOUD. TRIPWIRE PureCloud USER GUIDE TRIPWIRE PURECLOUD TRIPWIRE PureCloud USER GUIDE 2001-2015 Tripwire, Inc. All rights reserved. Tripwire and ncircle are registered trademarks of Tripwire, Inc. Other brand or product names may be trademarks

More information

How to Configure Active Directory based User Authentication

How to Configure Active Directory based User Authentication How to Configure Active Directory based User Authentication You Must Have: Microsoft server with Active Directory configured. Windows 2000 Server is configured as Active Directory server in this example.

More information

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy

External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy External authentication with Astaro AG Astaro Security Gateway UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010

More information

Oracle Identity Manager, Oracle Internet Directory

Oracle Identity Manager, Oracle Internet Directory Oracle Identity Manager (OIM) is a user provisioning system. It defines properties for how users and groups get authorized to access compute and content resources across the enterprise. Identity Management

More information

SAML 2.0 SSO Deployment with Okta

SAML 2.0 SSO Deployment with Okta SAML 2.0 SSO Deployment with Okta Simplify Network Authentication by Using Thunder ADC as an Authentication Proxy DEPLOYMENT GUIDE Table of Contents Overview...3 The A10 Networks SAML 2.0 SSO Deployment

More information

Matrix Technical Support Mailer 33 COSEC Integrate (Import from Active Directory)

Matrix Technical Support Mailer 33 COSEC Integrate (Import from Active Directory) Matrix Technical Support Mailer 33 COSEC Integrate (Import from Active Directory) Dear Friends, This technical mailer will help you to understand the Integrate application which is available from COSEC

More information

Configuring Global Protect SSL VPN with a user-defined port

Configuring Global Protect SSL VPN with a user-defined port Configuring Global Protect SSL VPN with a user-defined port Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be Global Protect SSL VPN Overview This document gives you an overview on how to configure

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

RoomWizard Synchronization Software Manual Installation Instructions

RoomWizard Synchronization Software Manual Installation Instructions 2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System

More information

The data between TC Monitor and remote devices is exchanged using HTTP protocol. Monitored devices operate either as server or client mode.

The data between TC Monitor and remote devices is exchanged using HTTP protocol. Monitored devices operate either as server or client mode. 1. Introduction TC Monitor is easy to use Windows application for monitoring and control of some Teracom Ethernet (TCW) and GSM/GPRS (TCG) controllers. The supported devices are TCW122B-CM, TCW181B- CM,

More information

NetBrain Security Guidance

NetBrain Security Guidance NetBrain Security Guidance 1. User Authentication and Authorization 1.1. NetBrain Components NetBrain Enterprise Server includes five components: Customer License Server (CLS), Workspace Server (WSS),

More information

How to configure the TopCloudXL WHMCS plugin (version 2+) Update: 16-09-2015 Version: 2.2

How to configure the TopCloudXL WHMCS plugin (version 2+) Update: 16-09-2015 Version: 2.2 èè How to configure the TopCloudXL WHMCS plugin (version 2+) Update: 16-09-2015 Version: 2.2 Table of Contents 1. General overview... 3 1.1. Installing the plugin... 3 1.2. Testing the plugin with the

More information

Free Multi-Factor Authentication. Using Email and SMS in Enterprise/Random Password Manager (E/RPM)

Free Multi-Factor Authentication. Using Email and SMS in Enterprise/Random Password Manager (E/RPM) Free Multi-Factor Authentication Using Email and SMS in Enterprise/Random Password Manager (E/RPM) The controlled release of sensitive credentials in a privileged identity management (PIM) system requires

More information

000-284. Easy CramBible Lab DEMO ONLY VERSION 000-284. Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0

000-284. Easy CramBible Lab DEMO ONLY VERSION 000-284. Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0 Easy CramBible Lab 000-284 Test284,IBM WbS.DataPower SOA Appliances, Firmware V3.6.0 ** Single-user License ** This copy can be only used by yourself for educational purposes Web: http://www.crambible.com/

More information

Kentico CMS security facts

Kentico CMS security facts Kentico CMS security facts ELSE 1 www.kentico.com Preface The document provides the reader an overview of how security is handled by Kentico CMS. It does not give a full list of all possibilities in the

More information

Integrating a Hitachi IP5000 Wireless IP Phone

Integrating a Hitachi IP5000 Wireless IP Phone November, 2007 Avaya Quick Edition Integrating a Hitachi IP5000 Wireless IP Phone This application note explains how to configure the Hitachi IP5000 wireless IP telephone to connect with Avaya Quick Edition

More information

Qualys API Limits. July 10, 2014. Overview. API Control Settings. Implementation

Qualys API Limits. July 10, 2014. Overview. API Control Settings. Implementation Qualys API Limits July 10, 2014 Overview The Qualys API enforces limits on the API calls a customer can make based on their subscription settings, starting with Qualys version 6.5. The limits apply to

More information

File Share Navigator Online 1

File Share Navigator Online 1 File Share Navigator Online 1 User Guide Service Pack 3 Issued November 2015 Table of Contents What s New in this Guide... 4 About File Share Navigator Online... 5 Components of File Share Navigator Online...

More information

Fairsail REST API: Guide for Developers

Fairsail REST API: Guide for Developers Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,

More information

FileMaker Server 14. FileMaker Server Help

FileMaker Server 14. FileMaker Server Help FileMaker Server 14 FileMaker Server Help 2007 2015 FileMaker, Inc. All Rights Reserved. FileMaker, Inc. 5201 Patrick Henry Drive Santa Clara, California 95054 FileMaker and FileMaker Go are trademarks

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide

BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry

More information

Phone Inventory 1.0 (1000) Installation and Administration Guide

Phone Inventory 1.0 (1000) Installation and Administration Guide Phone Inventory 1.0 (1000) Installation and Administration Guide 2010 VoIP Integration June 23, 2010 Table of Contents Product Overview... 3 Requirements... 3 Application Requirements... 3 Call Manager...

More information

AVG Business Secure Sign On Active Directory Quick Start Guide

AVG Business Secure Sign On Active Directory Quick Start Guide AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and

More information

PageScope Enterprise Suite

PageScope Enterprise Suite 5 PageScope Enterprise Suite Setup & Configuration Guide Date : 09/12/2008 Written by: Tony Gliatta, Vartkes Tashjian, Rob Posenato Location: CEC Lab, HQ Ramsey, NJ Step by Step Installation Field Guide

More information

Lab 8.3.1.2 Configure Basic AP Security through IOS CLI

Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Lab 8.3.1.2 Configure Basic AP Security through IOS CLI Estimated Time: 30 minutes Number of Team Members: Students will work in teams of two. Objective In this lab, the student will learn the following

More information

Working Folder Linkage Setup Guide

Working Folder Linkage Setup Guide For models listed below, see the respective "Working Foloder Linkage Setup Guide". wfs-mfp-installguide-09_en.pdf - ApeosPort-IV C5570/C4470/C3371/C3370/C2270 - ApeosPort-IV C7780/C6680/C5580 - ApeosPort-IV

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

login timeout 30 access list ALL line 20 extended permit ip any any port 9053 interval 15 passdetect interval 30

login timeout 30 access list ALL line 20 extended permit ip any any port 9053 interval 15 passdetect interval 30 logging enable logging console 4 logging timestamp logging trap 5 logging buffered 4 logging device id hostname logging host 10.0.128.240 udp/514 format emblem logging host 10.0.143.24 udp/514 login timeout

More information

Axway API Gateway. Version 7.4.1

Axway API Gateway. Version 7.4.1 O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1

More information

Web Service Integration

Web Service Integration Web Service Integration API s (Application Programming Interface) ver. 2 2011-04-05 IMPORTANT: This document is ONLY an annex to the sms.pt integration. Please read the sms.pt Web Service Integration for

More information

How to Use Print from E-mail Register the printer

How to Use Print from E-mail Register the printer How to Use Print from E-mail Register the printer 1 Registering the printer to Print from E-mail Register your printer to Print from E-mail in three steps below. When the printer is properly registered,

More information

NetMotion + YubiRADIUS Quick Start Guide

NetMotion + YubiRADIUS Quick Start Guide NetMotion + YubiRADIUS Quick Start Guide March 22, 2013 NetMotion + YubiRADIUS Quick Start Guide 2012 Yubico. All rights reserved. Page 1 of 7 Introduction Disclaimer Yubico is the leading provider of

More information

Using LDAP Authentication in a PowerCenter Domain

Using LDAP Authentication in a PowerCenter Domain Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,

More information

Device LinkUP + Desktop LP Guide RDP

Device LinkUP + Desktop LP Guide RDP Device LinkUP + Desktop LP Guide RDP Version 2.1 January 2016 Copyright 2015 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

TECHNICAL NOTE Stormshield Network Firewall AUTOMATIC BACKUPS. Document version: 1.0 Reference: snentno_autobackup

TECHNICAL NOTE Stormshield Network Firewall AUTOMATIC BACKUPS. Document version: 1.0 Reference: snentno_autobackup Stormshield Network Firewall Document version: 1.0 Reference: snentno_autobackup CONTENTS INTRODUCTION 3 OPERATION 3 Storing in the Mystormshield.eu client area 3 Storing on a customized server 3 FIREWALL

More information

VMware Identity Manager Connector Installation and Configuration

VMware Identity Manager Connector Installation and Configuration VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document

More information

Configuration Backup and Restore. Dgw v2.0 May 14, 2015. www.media5corp.com

Configuration Backup and Restore. Dgw v2.0 May 14, 2015. www.media5corp.com Dgw v2.0 May 14, 2015 www.media5corp.com Table of Contents Configuration Backup and Restore... 3 File Servers... 4 Configuring the FTP Server...4 Configuring the TFTP Server...4 Configuring the HTTP Server...

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

Mobile Device Management Solution Hexnode MDM

Mobile Device Management Solution Hexnode MDM Mobile Device Management Solution Hexnode MDM Frequently Asked Questions www.hexnode.com Frequently Asked Questions How is Hexnode MDM license calculated?...4 Which ports do I need to open for Hexnode

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this

More information

SCENARIO EXAMPLE. Case study of an implementation of Swiss SafeLab M.ID with Citrix. Redundancy and Scalability

SCENARIO EXAMPLE. Case study of an implementation of Swiss SafeLab M.ID with Citrix. Redundancy and Scalability SCENARIO EXAMPLE Case study of an implementation of Swiss SafeLab M.ID with Citrix Redundancy and Scalability Informations about the following case study The following example shows an installation of

More information

Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3

Secure Transfers. Contents. SSL-Based Services: HTTPS and FTPS 2. Generating A Certificate 2. Creating A Self-Signed Certificate 3 Contents SSL-Based Services: HTTPS and FTPS 2 Generating A Certificate 2 Creating A Self-Signed Certificate 3 Obtaining A Signed Certificate 4 Enabling Secure Services 5 A Note About Ports 5 Connecting

More information

App Orchestration 2.5

App Orchestration 2.5 App Orchestration 2.5 Configuring SSL for App Orchestration 2.5 Prepared by: Andy Zhu Last Updated: July 25, 2014 Contents Introduction... 3 Configure SSL on the App Orchestration configuration server...

More information

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access

DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations

More information

Shipping Services Files (SSF) Secure File Transmission Account Setup

Shipping Services Files (SSF) Secure File Transmission Account Setup Company This template is provided to document all of the materials and information needed for configuring secure file transmission for Shipping Services Files. Version 1.3 Page 1 of 5 1. Enter Date Submitted:

More information

Security Analytics Engine 1.0. Help Desk User Guide

Security Analytics Engine 1.0. Help Desk User Guide 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

FireEye App for Splunk Enterprise

FireEye App for Splunk Enterprise FireEye App for Splunk Enterprise FireEye App for Splunk Enterprise Documentation Version 1.1 Table of Contents Welcome 3 Supported FireEye Event Formats 3 Original Build Environment 3 Possible Dashboard

More information

How to Migrate to MailEnable using the Migration Console

How to Migrate to MailEnable using the Migration Console How to Migrate to MailEnable using the Migration Console Contents 1. OVERVIEW... 2 2. MAILENABLE MIGRATION CONSOLE... 2 3. SELECT THE MIGRATION APPROACH... 2 Server Migration... 2 Domain Migration... 3

More information