UFTP AUTHENTICATION SERVICE
|
|
|
- Gordon Ellis
- 9 years ago
- Views:
Transcription
1 UFTP Authentication Service UFTP AUTHENTICATION SERVICE UNICORE Team Document Version: Component Version: Date:
2 UFTP Authentication Service Contents 1 Installation Prerequisites Basic configuration (memory etc) Starting and stopping the service Configuration User authentication Configure the UFTPD server(s) to be accessed Attribute mapping Checking the installation 7 4 Installing the Auth server in an existing UNICORE/X server 7
3 UFTP Authentication Service 1 The UFTP authentication service ("Auth server") is a simple HTTP-based service for authenticating users and initiating UFTP transfers. It is indended to be used with a standalone UFTP client. the Auth server checks the credentials provided by the user, and (if successful) maps the user to a distinguished name (DN). this DN is then assigned further attributes such as the user/group ID used by UFTPD, using the configured UNICORE attribute sources The Auth server is based on the UNICORE Services Environment, and all usual UNICORE features and security configuration options are available as well. For example, the Auth server can be deployed behind a UNICORE Gateway, or it can be configured to use Unity for authenticating users. One Auth server can be used to authenticate transfers for multiple UFTPD servers. This manual focuses on the configuration items specific to the Auth server. If you need more in-depth information on general configuration issues, please refer to the UNICORE/X manual, available via unicore.eu 1 Installation 1.1 Prerequisites The Auth server should be run as a non-root user (e.g. unicore). It requires Java 1.7 UFTPD 2.0 or later The Auth server needs an X.509 certificate and truststore for communicating with UFTPD. Users must be able to access the Auth server s https port. It is possible to deploy the Auth server behind a UNICORE Gateway (7.1 or later). The UFTP Auth service comes with all required scripts and config files to be run standalone. To install, unzip the downloaded package into a directory of your choice. Note You can run the service in an existing UNICORE/X server (version 7.1 or later is required). Please see Section 4 below for details.
4 UFTP Authentication Service Basic configuration (memory etc) The startup.properties configuration file contains basic settings such as the Java command, JVM memory etc. Please review it. The Auth server host and port are configured in the wsrflite.xml configuration file: <!-- example host and port --> <property name="container.host" value="uftp.yoursite.com"/> <property name="container.port" value="9000"/> Also in the wsrflite.xml configuration file, the server s X.509 private key and the truststore settings need to be configured. 1.3 Starting and stopping the service Use the shell scripts in the bin folder to start or stop the service. 2 Configuration The following items need to be configured: user authentication: configure the Auth server to authenticate users using username/password, ssh key or via Unity UFTPD server(s) to be accessed 2.1 User authentication The enabled authentication options and their order are configured in wsrflite.xml (or uas.config), here we use the XML syntax of wsrflite.xml. <property name="container.security.rest.authentication.order" value="file SSHKEY UNITY"/> The available options can be combined! Username-password file To use a file containing username, password and the DN,
5 UFTP Authentication Service 3 <property name="container.security.rest.authentication.order" value="file"/> <property name="container.security.rest.authentication.file.class" value="eu.unicore.services.rest.security. FilebasedAuthenticator"/> <property name="container.security.rest.authentication.file.file" value="conf/rest-users.txt"/> This configures to use the file conf/rest-users.txt. The file format is # # on each line: # username:hash:salt:dn # demouser:<...>:<...>:cn=demo User, O=UNICORE, C=EU i.e. each line gives the username, the hashed password, the salt and the user s DN, separated by colons. To generate entries, i.e. to hash the password correctly, the md5sum utility can be used. For example, if your intended password is test123, you could do $> SALT=$(tr -dc A-Za-z0-9_ < /dev/urandom head -c 16 xargs) $> echo "Salt is ${SALT}" $> echo -n "${SALT}test123" md5sum which will output the salted and hashed password. Here we generate a random string as the salt. Enter these together with the username, and the DN of the user into the password file Unity authentication You can also hook up with Unity, passing on the username/password and retrieving an authentication assertion. <property name="container.security.rest.authentication.order" value="unity"/> <!-- Unity settings --> <property name="container.security.rest.authentication.unity.class" value="eu.unicore.services.rest.security. UnitySAMLAuthenticator"/> <property name="container.security.rest.authentication.unity. address" value=" saml2unicoreidp-soap/authenticationservice"/> <!-- validate the received assertions? --> <property name="container.security.rest.authentication.unity. validate" value="true"/>
6 UFTP Authentication Service SSH Key validation This authentication option is based on the validation of a token using the user s public SSH key. The token will be checked, and if successful, the user will be assigned a distinguished name for later authorisation. To use this option, you need to configure the REST authentication accordingly: <!-- authn --> <property name="container.security.rest.authentication.order" value="sshkey"/> <!-- SSH key settings --> <property name="container.security.rest.authentication.sshkey.class " value="eu.unicore.uftp.authserver.authenticate. SSHKeyAuthenticator"/> <property name="container.security.rest.authentication.sshkey.file" value="conf/ssh-users.txt"/> A file is required (in the example above we use conf/ssh-users.txt) which contains the mappings and the ssh public keys in a simple format: # Example SSH users file used with the SSHKEY authentication method # #format: username:sshkey:dn # demouser:ssh-rsa keydata_was_omitted testkey:cn=demo User, O= UNICORE, C=EU The SSH key is in the same one-line format used in the.ssh/authorized_keys file. You can enter multiple lines per username, to accommodate the case that a user has different SSH keys available. For example # Example SSH users file with multiple keys per user demouser:ssh-rsa <...omitted keydata...>:cn=demo User, O=UNICORE, C =EU demouser:ssh-dss <...omitted keydata...>:cn=demo User, O=UNICORE, C =EU otheruser:ssh-rsa <...omitted keydata...>:cn=other User, O=UNICORE, C=DE 2.2 Configure the UFTPD server(s) to be accessed For each UFTPD server you wish to authenticate users for, you ll need to configure the relevant properties in your container config file
7 UFTP Authentication Service 5 The authservice.servers property is a list of server names. These should be meaningful, since users will need to use them, too. The other properties are used to configure the UFTPD command address and the UFTPD listen address. Please refer to the UFTPD configuration and manual for details. For example, we want to configure two UFTPD servers named "CLUSTER" and "TEST": <!-- configured UFTPD server(s) --> <property name="authservice.servers" value="cluster TEST"/> <property name="authservice.server.cluster.host" value="cluster. your.org"/> <property name="authservice.server.cluster.port" value="64433"/> <property name="authservice.server.cluster.commandhost" value=" cluster.your.org"/> <property name="authservice.server.cluster.commandport" value ="64434"/> <property name="authservice.server.cluster.ssl" value="true"/> <property name="authservice.server.cluster.description" value=" Production UFTPD server on CLUSTER"/> <property name="authservice.server.test.host" value="localhost"/> <property name="authservice.server.test.port" value="64433"/> <property name="authservice.server.test.commandhost" value=" localhost"/> <property name="authservice.server.test.commandport" value ="64434"/> <property name="authservice.server.test.ssl" value="false"/> <property name="authservice.server.test.description" value="test UFTPD server"/> To allow the Auth server access to the command port of UFTPD, you need to add an entry to UFTPD s ACL file. This is explained in the UFTPD manual. 2.3 Attribute mapping After successful authentication, the user is assigned attributes such as the Unix account and group which is used for file access. The Unix account and group are taken from the configured attribute sources (e.g. XUUDB). Since it is possible to access multiple UFTPD servers using a single Auth server, it may be required to configure different attributes for different UFTPD servers. This is easily possible using the file attribute source (map file). It is also possible to control which directories and files that a user can access. This is done by configuring the allowed and/or the forbidden file path patterns. The following map file entry gives a full example. <entry key="cn=demo User,O=UNICORE,C=EU"> <attribute name="role">
8 UFTP Authentication Service 6 <value>user</value> <!-- default Unix account and group --> <attribute name="xlogin"> <value>somebody</value> <attribute name="group"> <value>users</value> <!-- UFTP specific attributes --> <attribute name="uftp.cluster.xlogin"> <value>user1</value> <attribute name="uftp.cluster.group"> <value>hpc</value> <!-- optional rate limit (bytes per second) --> <attribute name="uftp.cluster.ratelimit"> <value>10m</value> <!-- optional includes --> <attribute name="uftp.cluster.includes"> <value>/tmp/*:/work/*</value> <!-- optional excludes --> <attribute name="uftp.cluster.excludes"> <value>/home/*:/etc/*</value> </entry> Here, the "CLUSTER" must match a configured UFTPD server, see also Section 2.2. Available attributes are role: the UNICORE role, usually this will be user xlogin, group: Unix account and group to be used for this user ratelimit: the number of bytes per second (per transfer) can be limited. You can use the units "K", "M", and "G" for kilo, mega or gigabytes, respectively. includes: file path patterns (separated by ":") that are allowed. If not given, all the user s files can be accessed. excludes: file path patterns (separated by ":") that are forbidden. If not given, no files are explicitely excluded.
9 UFTP Authentication Service 7 3 Checking the installation You can check that the server works using a simple HTTP client such as curl to access the Auth server s base URL, provided you have configured username/password authentication. The command $> curl -k \ -H "Accept: application/json" \ -u username:password should produce a JSON document containing information about the configured UFTPD servers, such as {"TEST": { "description": "Default UFTPD server for testing", "gid": "users", "href": " "uid": "somebody" }} Note If you do not get any output, try adding the "-i" option to the curl command, most probably the username/password is incorrect. 4 Installing the Auth server in an existing UNICORE/X server This option is interesting if you are already running a UNICORE installation and want to allow your users a simpler way of transferring files using the standalone UFTP client. This requires UNICORE/X version 7.1 or later! copy the jar files to the lib directory of UNICORE/X copy the XACML policy file 30uftpAuthService.xml to the conf/xacml2policies directory edit wsrflite.xml (or uas.config) and setup user authentication and UFTPD details as described above if you want to place the Auth server behind a UNICORE gateway for easy firewall transversal, you need to configure an entry in the Gateway connections config file, and set the container base URL property in the Auth servers wsrflite.xml
UNICORE UFTPD server UNICORE UFTPD SERVER. UNICORE Team
UNICORE UFTPD server UNICORE UFTPD SERVER UNICORE Team Document Version: 1.0.0 Component Version: 2.3.2 Date: 14 09 2015 UNICORE UFTPD server Contents 1 UNICORE UFTP 1 1.1 UFTP features...................................
How To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
LICENSE4J LICENSE ACTIVATION AND VALIDATION PROXY SERVER USER GUIDE
LICENSE4J LICENSE ACTIVATION AND VALIDATION PROXY SERVER USER GUIDE VERSION 1.6.0 LICENSE4J www.license4j.com Table of Contents Getting Started... 2 Installation... 3 Configuration... 4 Error and Access
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
AklaBox. The Ultimate Document Platform for your Cloud Infrastructure. Installation Guideline
AklaBox The Ultimate Document Platform for your Cloud Infrastructure Installation Guideline Contents Introduction... 3 Environment pre-requisite for Java... 3 About this documentation... 3 Pre-requisites...
Hadoop Data Warehouse Manual
Ruben Vervaeke & Jonas Lesy 1 Hadoop Data Warehouse Manual To start off, we d like to advise you to read the thesis written about this project before applying any changes to the setup! The thesis can be
UFTP High-performance data transfer for UNICORE
Mitglied der Helmholtz-Gemeinschaft UFTP High-performance data transfer for UNICORE Dr. Bernd Schuller, Tim Pohlmann Federated Systems and Data division Jülich Supercomputer Centre Forschungszentrum Jülich
McAfee One Time Password
McAfee One Time Password Integration Module Outlook Web App 2010 Module version: 1.3.1 Document revision: 1.3.1 Date: Feb 12, 2014 Table of Contents Integration Module Overview... 3 Prerequisites and System
ZeroTurnaround License Server User Manual 1.4.0
ZeroTurnaround License Server User Manual 1.4.0 Overview The ZeroTurnaround License Server is a solution for the clients to host their JRebel licenses. Once the user has received the license he purchased,
Magento Search Extension TECHNICAL DOCUMENTATION
CHAPTER 1... 3 1. INSTALLING PREREQUISITES AND THE MODULE (APACHE SOLR)... 3 1.1 Installation of the search server... 3 1.2 Configure the search server for usage with the search module... 7 Deploy the
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
WWPass External Authentication Solution for IBM Security Access Manager 8.0
WWPass External Authentication Solution for IBM Security Access Manager 8.0 Setup guide Enhance your IBM Security Access Manager for Web with the WWPass hardware authentication IBM Security Access Manager
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.
JobScheduler Web Services Executing JobScheduler commands
JobScheduler - Job Execution and Scheduling System JobScheduler Web Services Executing JobScheduler commands Technical Reference March 2015 March 2015 JobScheduler Web Services page: 1 JobScheduler Web
TMS Phone Books Troubleshoot Guide
TMS Phone Books Troubleshoot Guide Document ID: 118705 Contributed by Adam Wamsley and Magnus Ohm, Cisco TAC Engineers. Jan 05, 2015 Contents Introduction Prerequisites Requirements Components Used Related
IUCLID 5 Guidance and Support
IUCLID 5 Guidance and Support Web Service Installation Guide July 2012 v 2.4 July 2012 1/11 Table of Contents 1. Introduction 3 1.1. Important notes 3 1.2. Prerequisites 3 1.3. Installation files 4 2.
PHP Integration Kit. Version 2.5.1. User Guide
PHP Integration Kit Version 2.5.1 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate PHP Integration Kit User Guide Version 2.5.1 December, 2012 Ping Identity Corporation 1001
Configuring. Moodle. Chapter 82
Chapter 82 Configuring Moodle The following is an overview of the steps required to configure the Moodle Web application for single sign-on (SSO) via SAML. Moodle offers SP-initiated SAML SSO only. 1 Prepare
UNICORE REGISTRY MANUAL
UNICORE Registry Manual UNICORE REGISTRY MANUAL UNICORE Team Document Version: 6.4.1 Component Version: 6.4.1 Date: 30 06 2011 This work is co-funded by the EC EMI project under the FP7 Collaborative Projects
SOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
Axway API Gateway. Version 7.4.1
O A U T H U S E R G U I D E Axway API Gateway Version 7.4.1 3 February 2016 Copyright 2016 Axway All rights reserved. This documentation describes the following Axway software: Axway API Gateway 7.4.1
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015. Integration Guide IBM
IBM Campaign and IBM Silverpop Engage Version 1 Release 2 August 31, 2015 Integration Guide IBM Note Before using this information and the product it supports, read the information in Notices on page 93.
Elluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable
LICENSE4J AUTO LICENSE GENERATION AND ACTIVATION SERVER USER GUIDE
LICENSE4J AUTO LICENSE GENERATION AND ACTIVATION SERVER USER GUIDE VERSION 1.6.0 LICENSE4J www.license4j.com Table of Contents Getting Started... 2 Server Roles... 4 Installation... 9 Server WAR Deployment...
IBM WebSphere Application Server V8.5 lab Basic Liberty profile administration using the job manager
IBM WebSphere Application Server V8.5 lab Basic Liberty profile administration using the job manager Scenario You are a system administrator responsible for managing web application server installations.
JOINUS AG. PowerPay Checkout. Magento Module User Manual. Support: [email protected]
PowerPay Checkout Magento Module User Manual Support: [email protected] This document explains installation procedure and configuration options for Joinus AG PowerPay checkout magento payment module.
RHEV 2.2: REST API INSTALLATION
RHEV 2.2: REST API INSTALLATION BY JAMES RANKIN REVISED 02/14/11 RHEV 2.2: REST API INSTALLATION 1 TABLE OF CONTENTS OVERVIEW PAGE 3 JAVA AND ENVIRONMENT VARIABLES PAGE 3 JBOSS INSTALLATION PAGE 5 REST
Introduction... 2. 1. Installing the download utility... 2. 2. Installing Java(TM) 2 Runtime Environment, Standard Edition 1.4.1...
Installing Java Runtime Environment Table of contents Introduction... 2 1. Installing the download utility... 2 2. Installing Java(TM) 2 Runtime Environment, Standard Edition 1.4.1... 4 3. Configuring
User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
User-ID Features PAN-OS New Features Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
1 Reflection ZFE 5. 2 Security Considerations 13. 3 Troubleshooting the Installation 19. Contents 1
1 Reflection ZFE 5 Introducing Reflection ZFE......................................................... 5 Reflection ZFE components.................................................. 5 System requirements..............................................................
Crawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c
Monitoring Oracle Enterprise Performance Management System Release 11.1.2.3 Deployments from Oracle Enterprise Manager 12c This document describes how to set up Oracle Enterprise Manager 12c to monitor
IBM Unica emessage Version 8 Release 6 February 13, 2015. Startup and Administrator's Guide
IBM Unica emessage Version 8 Release 6 February 13, 2015 Startup and Administrator's Guide Note Before using this information and the product it supports, read the information in Notices on page 83. This
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities
CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server
GS1 Trade Sync Connectivity guide
GS1 Trade Sync Connectivity guide Date: 2015-12-01 Version: v1.8 Page: 2/17 Revision history Version Date Description Author 1.0 2013-11-14 Initial version Fernando Pereira 1.1 2014-01-16 Added FTP and
IMPLEMENTING DIRECTORY SERVICES INTEGRATION WITH HELIX MEDIA LIBRARY Revision Date: September 2014
IMPLEMENTING DIRECTORY SERVICES INTEGRATION WITH HELIX MEDIA LIBRARY Revision Date: September 2014 Helix Media Library User Guide Table of Contents Introduction...3 1. Prerequisites...3 2. Running the
Fairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
JMETER - MONITOR TEST PLAN
http://www.tutorialspoint.com JMETER - MONITOR TEST PLAN Copyright tutorialspoint.com In this chapter, we will discuss how to create a Test Plan using JMeter to monitor webservers. The uses of monitor
AmbrosiaMQ-MuleSource ESB Integration
AmbrosiaMQ-MuleSource ESB Integration U1 Technologies AmbrosiaMQ MuleSource ESB Integration 1 Executive Summary... 3 AmbrosiaMQ Installation... 3 Downloading and Running the Installer... 3 Setting the
Novell Access Manager
J2EE Agent Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 J2EE Agent Guide Legal Notices Novell, Inc., makes no representations
Application Security Policy
Purpose This document establishes the corporate policy and standards for ensuring that applications developed or purchased at LandStar Title Agency, Inc meet a minimum acceptable level of security. Policy
Elluminate Live! Access Guide. Page 1 of 7
This guide is provided to Elluminate Live! users to assist them to make a successful connection to an Elluminate Live! session through a proxy firewall. In some cases settings discussed in this document
FireEye App for Splunk Enterprise
FireEye App for Splunk Enterprise FireEye App for Splunk Enterprise Documentation Version 1.1 Table of Contents Welcome 3 Supported FireEye Event Formats 3 Original Build Environment 3 Possible Dashboard
Oracle Fusion Middleware 11gR2: Forms, and Reports (11.1.2.0.0) Certification with SUSE Linux Enterprise Server 11 SP2 (GM) x86_64
Oracle Fusion Middleware 11gR2: Forms, and Reports (11.1.2.0.0) Certification with SUSE Linux Enterprise Server 11 SP2 (GM) x86_64 http://www.suse.com 1 Table of Contents Introduction...3 Hardware and
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
USER GUIDE. Snow Inventory Client for Unix Version 1.1.03 Release date 2015-04-29 Document date 2015-05-20
USER GUIDE Product Snow Inventory Client for Unix Version 1.1.03 Release date 2015-04-29 Document date 2015-05-20 CONTENT ABOUT THIS DOCUMENT... 3 OVERVIEW... 3 OPERATING SYSTEMS SUPPORTED... 3 PREREQUISITES...
SafeNet KMIP and Google Cloud Storage Integration Guide
SafeNet KMIP and Google Cloud Storage Integration Guide Documentation Version: 20130719 Table of Contents CHAPTER 1 GOOGLE CLOUD STORAGE................................. 2 Introduction...............................................................
OneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA
Microsoft Active Directory Oracle Enterprise Gateway Integration Guide
An Oracle White Paper May 2011 Microsoft Active Directory Oracle Enterprise Gateway Integration Guide 1/33 Disclaimer The following is intended to outline our general product direction. It is intended
Tableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
Remote Access API 2.0
VYATTA A BROCADE COMPANY Vyatta System Remote Access API 2.0 REFERENCE GUIDE Vyatta A Brocade Company 130 Holger Way San Jose, CA 95134 www.brocade.com 408 333 8400 COPYRIGHT Copyright 2005 2015 Vyatta,
Tableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
Ellucian Recruiter Installation and Integration. Release 4.1 December 2015
Ellucian Recruiter Installation and Integration Release 4.1 December 2015 Notices Notices Without limitation: Ellucian, Banner, Colleague, and Luminis are trademarks of the Ellucian group of companies
Published. Technical Bulletin: Use and Configuration of Quanterix Database Backup Scripts 1. PURPOSE 2. REFERENCES 3.
Technical Bulletin: Use and Configuration of Quanterix Database Document No: Page 1 of 11 1. PURPOSE Quanterix can provide a set of scripts that can be used to perform full database backups, partial database
SOA Software: Troubleshooting Guide for Agents
SOA Software: Troubleshooting Guide for Agents SOA Software Troubleshooting Guide for Agents 1.1 October, 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks SOA Software,
Click Studios. Passwordstate. Password Discovery, Reset and Validation. Requirements
Passwordstate Password Discovery, Reset and Validation Requirements This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise
Introduction. Before you begin. Installing efax from our CD-ROM. Installing efax after downloading from the internet
Introduction Before you begin Before you begin installing efax, please check the following: You have received confirmation that your application for the efax service has been processed. The confirmation
EMC XDS Repository Connector for ViPR
EMC XDS Repository Connector for ViPR Version 1.8 Installation Guide EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Legal Notice Copyright 2014-2015 EMC Corporation.
AdRadionet to IBM Bluemix Connectivity Quickstart User Guide
AdRadionet to IBM Bluemix Connectivity Quickstart User Guide Platform: EV-ADRN-WSN-1Z Evaluation Kit, AdRadionet-to-IBM-Bluemix-Connectivity January 20, 2015 Table of Contents Introduction... 3 Things
Active Directory Service. Integration Parameters and Implementation
Active Directory Service Integration s and Implementation Revised January, 2014 Table of Contents Overview... 3 Getting Started... 3 Migrating Your Users... 7 Manually Adding or Editing Users with the
24x7 Scheduler Multi-platform Edition 5.2
24x7 Scheduler Multi-platform Edition 5.2 Installing and Using 24x7 Web-Based Management Console with Apache Tomcat web server Copyright SoftTree Technologies, Inc. 2004-2014 All rights reserved Table
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0)
Oracle Fusion Middleware Oracle API Gateway OAuth User Guide 11g Release 2 (11.1.2.4.0) July 2015 Oracle API Gateway OAuth User Guide, 11g Release 2 (11.1.2.4.0) Copyright 1999, 2015, Oracle and/or its
escan SBS 2008 Installation Guide
escan SBS 2008 Installation Guide Following things are required before starting the installation 1. On SBS 2008 server make sure you deinstall One Care before proceeding with installation of escan. 2.
Sample copy. Introduction To WebLogic Server Property of Web 10.3 Age Solutions Inc.
Introduction To WebLogic Server Property of Web 10.3 Age Solutions Inc. Objectives At the end of this chapter, participants should be able to: Understand basic WebLogic Server architecture Understand the
docs.hortonworks.com
docs.hortonworks.com : Security Administration Tools Guide Copyright 2012-2014 Hortonworks, Inc. Some rights reserved. The, powered by Apache Hadoop, is a massively scalable and 100% open source platform
s@lm@n Oracle Exam 1z0-102 Oracle Weblogic Server 11g: System Administration I Version: 9.0 [ Total Questions: 111 ]
s@lm@n Oracle Exam 1z0-102 Oracle Weblogic Server 11g: System Administration I Version: 9.0 [ Total Questions: 111 ] Oracle 1z0-102 : Practice Test Question No : 1 Which two statements are true about java
Configuring User Identification via Active Directory
Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] User Identification Overview User Identification allows you to create security policies based
i2b2: Security Baseline
i2b2: Security Baseline Contents Introduction... 3 CentOS Security Configuration... 4 SSL Configuration... 5 Database Configuration Files... 6 Revision History... 11 2 Introduction This document outlines
1 Recommended Readings. 2 Resources Required. 3 Compiling and Running on Linux
CSC 482/582 Assignment #2 Securing SimpleWebServer Due: September 29, 2015 The goal of this assignment is to learn how to validate input securely. To this purpose, students will add a feature to upload
[1]Oracle Communications Billing and Revenue Management Web Services Manager Release 7.5 E16724-11
[1]Oracle Communications Billing and Revenue Management Web Services Manager Release 7.5 E16724-11 December 2015 Oracle Communications Billing and Revenue Management Web Services Manager, Release 7.5 E16724-11
Experian Secure Transport Service
Experian Secure Transport Service Secure Transport Overview In an effort to provide higher levels of data protection and standardize our file transfer processes, Experian will be utilizing the Secure Transport
This presentation will discuss how to troubleshoot different types of project creation issues with Information Server DataStage version 8.
This presentation will discuss how to troubleshoot different types of project creation issues with Information Server DataStage version 8. Page 1 of 29 The objectives of this module are to list the causes
GravityLab Multimedia Inc. Windows Media Authentication Administration Guide
GravityLab Multimedia Inc. Windows Media Authentication Administration Guide Token Auth Menu GravityLab Multimedia supports two types of authentication to accommodate customers with content that requires
Onset Computer Corporation
Onset, HOBO, and HOBOlink are trademarks or registered trademarks of Onset Computer Corporation for its data logger products and configuration/interface software. All other trademarks are the property
Cyber-Ark Software. Version 4.5
Cyber-Ark Software One-Click Transfer User Guide The Cyber-Ark Vault Version 4.5 All rights reserved. This document contains information and ideas, which are proprietary to Cyber-Ark Software. No part
Stealth OpenVPN and SSH Tunneling Over HTTPS
Stealth OpenVPN and SSH Tunneling Over HTTPS Contents Tunneling OpenVPN and SSH via HTTPS for Windows,MAC and Linux... 1 Benefits of HTTPS Tunneling:... 2 Pre-Requisites:... 3 Part A: Step by Step Instructions
Application Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2
[1]JD Edwards EnterpriseOne Application Interface Services Server for Mobile Enterprise Applications Configuration Guide Tools Release 9.2 E61545-01 October 2015 Describes the configuration of the Application
StreamServe Persuasion SP4
StreamServe Persuasion SP4 Installation Guide Rev B StreamServe Persuasion SP4 Installation Guide Rev B 2001-2009 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent #7,127,520 No part of this document
IBM Cloud Manager with OpenStack. REST API Reference, version 4.1
IBM Cloud Manager with OpenStack REST API Reference, version 4.1 IBM Cloud Manager with OpenStack REST API Reference, version 4.1 Note Before using this information and the product it supports, read the
ADFS 2.0 Application Director Blueprint Deployment Guide
Introduction: ADFS 2.0 Application Director Blueprint Deployment Guide Active Directory Federation Service (ADFS) is a software component from Microsoft that allows users to use single sign-on (SSO) to
Pronestor Room & Catering
Pronestor Room & Catering Module 2 Installation of additional modules Page 2.0 2.9 User import (AD integration) Page 2.1 2.4 o Service Accounts (hosted and on-premises) o Active Directory Structure o Installation
a) Install the SDK into a directory of your choice (/opt/java/jdk1.5.0_11, /opt/java/jdk1.6.0_02, or YOUR_JAVA_HOME_DIR)
HPC Installation Guide This guide will outline the steps to install the Web Service that will allow access to a remote resource (presumably a compute cluster). The Service runs within a Tomcat/Axis environment.
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
RSA SecurID Token User Guide February 12, 2015
RSA SecurID Token User Guide Page i Table of Contents Section I How to request an RSA SecurID token... 1 Section II Setting your RSA SecurID PIN... 6 Section III Setting up PuTTY on your Windows workstation
Umbraco Courier 2.0. Installation guide. Per Ploug Hansen 5/24/2011
Umbraco Courier 2.0 Installation guide Per Ploug Hansen 5/24/2011 Table of Contents Introduction... 3 Revision History... 3 Installing Courier 2 using a package... 4 Manual Courier installation... 5 Installing
Using sftp in Informatica PowerCenter
Using sftp in Informatica PowerCenter Applies to: Informatica PowerCenter Summary This article briefs about how to push/pull files using SFTP program in Informatica PowerCenter. Author Bio Author(s): Sukumar
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
EMC Clinical Archiving
EMC Clinical Archiving Version 1.7 Installation Guide EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Legal Notice Copyright 2014-2015 EMC Corporation. All Rights
imhosted Web Hosting Knowledge Base
imhosted Web Hosting Knowledge Base CGI, Perl, Sendmail Category Contents CGI, Perl, Sendmail 1 What directory do I upload my CGI scripts to? 1 What is CGI? 1 What is Perl? 1 Do you allow CGI to run on
TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER. Configuring your Update Server
TECHNICAL NOTE SETTING UP A STRM UPDATE SERVER AUGUST 2012 STRM uses system configuration files to provide useful characterizations of network data flows. Updates to the system configuration files, available
Process Integrator Deployment on IBM Webspher Application Server Cluster
White Paper Process Integrator Deployment on IBM Webspher Application Server Cluster A user guide for deploying Process integrator on websphere application server 7.0.0.9 cluster Abstract This paper describes
AdWhirl Open Source Server Setup Instructions
AdWhirl Open Source Server Setup Instructions 11/09 AdWhirl Server Setup Instructions The server runs in Amazon s web cloud. To set up the server, you need an Amazon Web Services (AWS) account and the
LAE 5.1. Windows Server Installation Guide. Version 1.0
LAE 5.1 Windows Server Installation Guide Copyright THE CONTENTS OF THIS DOCUMENT ARE THE COPYRIGHT OF LIMITED. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS THEREOF MAY NOT BE REPRODUCED IN ANY FORM WITHOUT
SECURE FTP CONFIGURATION SETUP GUIDE
SECURE FTP CONFIGURATION SETUP GUIDE CONTENTS Overview... 3 Secure FTP (FTP over SSL/TLS)... 3 Connectivity... 3 Settings... 4 FTP file cleanup information... 5 Troubleshooting... 5 Tested FTP clients
