StoneGate SSL VPN Technical Note Setting Up BankID
|
|
|
- Joy Wilkerson
- 9 years ago
- Views:
Transcription
1 StoneGate SSL VPN Technical Note 2071 Setting Up BankID
2 Table of Contents Introduction page 3 Overview page 3 StoneGate BankID Authentication Methods page 6 Installing StoneGate BankID Authentication Methods..... page 6 Configuring StoneGate BankID Authentication Method.... page 7 Configuring StoneGate BankID Signer Method page 9 Feedback page 10 Table of Contents 2
3 Introduction This technical note covers all aspects of the installation and configuration of BankID for StoneGate SSL VPN 1.0. Changes since the previous revision (SG_SVTN_2071_ ) are marked in the left margin with a change bar as seen here to the left of this paragraph. Note This technical note will not cover installation and configuration of Nexus MultiID Server. For information on installation and configuration, please read the documentation provided with Nexus MultiID Server. Prerequisite This technical note assumes a thorough understanding of StoneGate SSL VPN administration and especially of authentication methods. Use the further reading listed below to gain the required knowledge. Further Reading More information on StoneGate SSL VPN administration can be found in the StoneGate SSL VPN Administrator s Guide, the Online Help, and the Technical Note repository provided with the product. Another source of information is the Stonesoft Support site, which can be found at For more information on related subjects, visit the following Web resources: Overview BankID is a service that offers secure electronic identification and signature on the Internet. One of the driving forces behind BankID is changed legislature. Electronic signatures are now legally binding in the EU. The BankID service has been developed by a number of large banks for use by members of the public, authorities, companies, and other organizations. Many governments and municipalities are beginning to offer 24/7 services, which generally presupposes a secure electronic identification and signature system such as that offered by BankID. An example of this is the Swedish National Tax Board as well as the Swedish Social Insurance Agency. Their Web sites are now fully operational and both offer their customers access to BankID. When an application in a BankID-associated organization needs to authenticate an access request by a user, a challenge/response procedure is initiated. The request is forwarded to an authentication server and a challenge is generated and returned to the client. The client sends a response that is interpreted by the authentication server and the client certificate is verified. A control question is sent to the Certificate Authority to further verify the validity of the client certificate. When all controls check out, the user is authenticated. This interaction flow is illustrated below. Introduction 3
4 Illustration 1 Challenge/Response Procedure 1. The user requests access to the system 2. The system generates a challenge for the user to sign 3. The user signs the challenge using the BankID certificate and responds to the challenge with the signed challenge 4. The system validates the signed challenge 5. The system performs a revocation check by sending an OCSP (Online Certificate Status Protocol) request to the Certificate Authority 6. The Certificate Authority responds with the certificate status 7. The system either grants or denies the user access to the system depending on the validation result The system in the interaction flow above denotes both StoneGate SSL VPN and Nexus MultiID Server. Clients The BankID client is called CBT (Crypto-Based Transactions) and is developed by IBM. CBT is Java-based and the only client requirement is a Java runtime environment. This requirement is met by all current Windows, Mac OS, and Linux systems (as of ). Users do not have to install the client, they simply accept the download the first time it is requested in a session. To limit the download times the CBT is divided in three packages: Order Used by the Internet bank when ordering and installing BankID Administration Used by the Internet bank to import and export BankID Usage Users identify and sign documents for authorities and companies StoneGate SSL VPN supports five types of Public Key Infrastructure (PKI) clients, which are introduced in the sections below. IBM CBT The IBM CBT client runs as a Java applet and has two templates. One authentication template, IbmCbtAuth, and a sign template IbmCbtSign. These templates are delivered with StoneGate SSL VPN and are placed in the folder /data/portwise/access-point/files/built-in-files/wwwroot/wa/authmech/. Overview 4
5 StoneGate SSL VPN supports IBM CBT by default. If a previous version is used the IbmCbtAuth and IbmCbtSign templates need to be edited. Replace 3_2_5 with 3_2_0 where applicable in the example below. Illustration 2 Template for IBM CBT <applet vspace= 175 hspace= 63 width= 430 height= 140 mayscript code= com.ibm.cbt_bidt_3_2_5.thinclient.logonapplet.class archive= /wa/authmech/cbt_bidt_3_2_5_sign.jar name= LoginApplet > <param name= scriptable value= true /> <param name= mayscript value= true /> <param name= cabbase value= /wa/authmech/cbt_bidt_3_2_5_sign.cab /> <param name= locale value= sv /> <param name= adddata value= [$challenge] /> </applet> VeriSign PTA StoneGate SSL VPN supports VeriSign PTA version 3. The VeriSign PTA client can be used in both authentication and signing. SmartTrust StoneGate SSL VPN supports SmartTrust version 3. SmartTrust uses SSL authentication in the same manner as for example the User Certificate authentication method. Nexus StoneGate SSL VPN supports Nexus version 4. Nexus uses SSL authentication in the same manner as for example the User Certificate authentication method. Support for this client in authentication and signing has been added in StoneGate SSL VPN. Netmaker NetID StoneGate SSL VPN supports Netmaker NetID version 4. Netmaker NetID uses SSL authentication in the same manner as for example the User Certificate authentication method. Support for this client in authentication and signing has been added in StoneGate SSL VPN. Nexus MultiID Server The Nexus MultiID Server supports all Swedish Certificate Authorities and PKI clients and it is certified by Finansiell ID-Teknik AB (BankID) and TeliaSonera AB. It should be noted that the Nexus MultiID Server can be installed and configured independently of the back-end security solution. The Nexus MultiID Server also contains an application programming interface (API) for easy integration with existing or new Web applications. Please consult the available documentation from Nexus regarding the API. StoneGate SSL VPN supports Nexus MultiID Server Note Nexus MultiID Server is not yet supported on the Solaris 10 operating system. Please contact Nexus for more information on availability of Nexus MultiID Server for Solaris 10. Overview 5
6 StoneGate BankID Authentication Methods The reason for using BankID and Nexus MultiID server in combination with StoneGate SSL VPN is the tight connection to the StoneGate SSL VPN user management and access control functionality. The StoneGate BankID solution consists of two authentication methods: BankID and BankID Signer. BankID Signer, however, is not used for authentication. As the name suggests it is used for signing text using StoneGate SSL VPN with a Nexus MultiID server as authentication service. StoneGate SSL VPN supports the Swedish e-legitimation. The BankID Signer must be accessed with text and a URL to the resource responsible for the signing process. Below is an example of how to access the BankID Signer and in this example, the signing resource is an external application. The signing resource is located at URL and the text to sign is test to sign this text. The signing resource sends a http post to point>/wa/auth?authmech=<configured BankID Signer display name> with the post parameters location= and text=test to sign this text. The BankID Signer will then perform the signing operation and return the result to the specified location with the parameters status=<ok, fail or error> and, if configured, signature=<the signature>. This solution is able to redirect error and result parameters to the resource responsible for the signing process. Further processing can then be performed by the resource. For more information on setting up BankID Signer, see section in section Configuring StoneGate BankID Authentication Method on page 7. Installing StoneGate BankID Authentication Methods Before you can start configuring a BankID authentication method you need to install and configure a Nexus MultiID Server. For information on how to install and configure Nexus MultiID Server, consult the documentation provided with your Nexus MultiID Server. Install Nexus MultiID Server API After the Nexus MultiID Server is installed and configured, you need to install the Nexus MultiID Server API to the StoneGate Policy Service. To install the Nexus API in StoneGate SSL VPN 1. Start the API installation by stopping the StoneGate Policy Service through the Linux command line by running the command /opt/portwise/policy-service/bin/policy-service.sh stop. You can connect to the command line through the administration port using an SSH client. Log in as user root. Password is set through the basic Web console. Consult the Appliance Installation Guide for your appliance if you need information on how to access the command line or on how to change the password. 2. Copy the nms_server.jar from your Nexus MultiID Server installation folder. Copy the file to /opt/portwise/policy-service/lib/. 3. Start the StoneGate Policy Service by running the command /opt/portwise/policy-service/bin/policy-service.sh start. Copy Clients to Administration Service You also need to copy the PKI client software to the Administration Service before you can start configuring BankID. This will enable the Administration Service to distribute the various clients when required. Copy the client files to /data/portwise/administration-service/files/access-point/custom-files/wwwroot/wa/authmech/. StoneGate BankID Authentication Methods 6
7 Configuring StoneGate BankID Authentication Method In this section, you create an authentication method that uses BankID. Follow the steps below to create and configure the BankID authentication method. Replace any placeholder information with your corresponding information where appropriate. To configure StoneGate BankID 1. Login to the StoneGate SSL VPN Administrator. 2. Select Manage System in the main menu and click Authentication Methods in the left-hand menu. 3. Click the Add Authentication Method link to create a new authentication method. 4. Select BankID from the list and click Next. 5. On the General Settings page, enter BankID as display name. 6. Click the Add the Authentication Method Server link. Enter the settings below (refer to your Nexus MultiID Server documentation for details): Example Host: <Nexus MultiID server IP address> Port: 8899 Service Identifier: Use default settings for remaining server settings. 7. Click Next to add the authentication method server. 8. Click Next to display the Extended Properties page. 9. Click the Add Extended Properties link. 10.Enter extended properties for applicable certificates/pki clients using the following examples: TABLE 1 Extended Properties for authentication method BankID Client Extended Property Key All IBM CBT VeriSign PTA SmartTrust Nexus Netmaker NetID BankID user attribute BankID certificate attribute Allow unknown user ID Enable IBM CBT Enable VeriSign PTA Enable SmartTrust Enable Nexus Enable Netmaker NetID cn cn true Configuring StoneGate BankID Authentication Method 7
8 TABLE 1 Extended Properties for authentication method BankID (Continued) Client SmartTrust CA Netmaker NetID CA Extended Property Key SmartTrust CA Name Netmaker NetID CA Name The display name of the CA Certificate that is issuer of the user certificates used for this client (Optional, if set only user certificates issued by this CA are presented to the end user else all the end user s certificates are presented) The display name of the CA Certificate that is issuer of the user certificates used for this client (Optional, if set only user certificates issued by this CA are presented to the end user else all the end user s certificates are presented) 11.Finish the wizard and click Publish to publish the new configuration. Note The mapping between user and certificate in the table above uses the LDAP attribute cn for matching user and certificate. It is possible to use other attributes to match users and certificates. The extended property key Allow unknown user ID may change how the mapping occurs. For more information, please read the section Allow Unknown User ID below. Allow Unknown User ID The optional extended property key Allow unknown user ID can be used to allow user with certificate to authenticate without having to be present in the directory service. This concept is useful in installation where there are an unknown number of users that need access and it is infeasible to add them to the directory service. Note When using the option Allow unknown user ID it is not possible to use group membership, SSO credentials, etc. The following examples will demonstrate the different settings involving extended property key Allow unknown user ID, user attribute, and certificate attribute. In example 1 below, the mapping of the user will occur and obtained user ID will be used, TABLE 2 Allow unknown user ID - Example 1 Extended Property Key BankID user attribute BankID certificate attribute Allow unknown user ID cn cn false In example 2 below, the user ID will be set to the Subject DN from the certificate. TABLE 3 Allow unknown user ID - Example 2 Extended Property Key BankID user attribute BankID certificate attribute Allow unknown user ID <no set> <no set> true Configuring StoneGate BankID Authentication Method 8
9 In example 3 below, the user ID will be set to the CN from the certificate. TABLE 4 Allow unknown user ID - Example 3 Extended Property Key BankID user attribute BankID certificate attribute Allow unknown user ID <no set> cn true In example 4 below, a mapping attempt will try to obtain the user ID and use that. If it mapping fails, an attempt will be made to set the user ID to the value set in the extended property key BankID certificate attribute. If that also fails, the user ID will be set to the Subject DN from the certificate. TABLE 5 Allow unknown user ID - Example 4 Extended Property Key BankID user attribute BankID certificate attribute Extended Property Key Allow unknown user ID <set> <set> true Configuring StoneGate BankID Signer Method In this section you will create an authentication method that will use BankID Signer. Follow the steps below to create and configure the BankID Signer authentication method. Substitute any placeholder information with your corresponding information where appropriate. 1. Select Manage System in the main menu and click Authentication Methods in the left-hand menu. 2. Click the Add Authentication Method link. 3. Select BankID Signer and click Next. 4. On the General Settings page enter BankID Signer as the display name. 5. Click the Add an Authentication Method Server link. Enter the settings below (please refer to your Nexus MultiID server documentation for details): Example Host: <Nexus MultiID server IP address> Port: 8899 Service Identifier: Use the default settings for the remaining server settings. 6. Click Next to add the authentication method server. 7. Click Next to display the Extended Property page. 8. Click the Add Extended Properties link. Configuring StoneGate BankID Signer Method 9
10 9. Enter extended properties for applicable certificates/pki clients using the following examples: TABLE 6 Extended Properties for authentication method BankID Signer Certificate Used Extended Property Key IBM CBT VeriSign PTA SmartTrust Nexus Netmaker NetID Return signature Enable IBM CBT Enable VeriSign PTA Enable SmartTrust Enable Nexus Enable Netmaker NetID Return signature true or false, depending on whether or not the signature should be displayed 10.Finish the wizard and click Publish to publish the new configuration. Feedback Stonesoft is always interested in feedback from our users. For comments regarding Stonesoft s products, contact [email protected]. For comments regarding this technical note, contact [email protected]. Feedback 10
11 Trademarks and Patents Stonesoft, the Stonesoft logo and StoneGate are all trademarks or registered trademarks of Stonesoft Corporation. Multi-link technology, multi-link VPN, and the StoneGate clustering technology-as well as other technologies included in StoneGate-are protected by patents or pending patent applications in the U.S. and other countries. All other trademarks or registered trademarks are property of their respective owners. SSL VPN Powered by PortWise Copyright and Disclaimer Copyright Stonesoft Corporation. All rights reserved. These materials, Stonesoft products and related documentation are protected by copyright and other laws, international treaties and conventions. All rights, title and interest in the materials, Stonesoft products and related documentation shall remain with Stonesoft and its licensors. All registered or unregistered trademarks in these materials are the sole property of their respective owners. No part of this document or related Stonesoft products may be reproduced in any form, or by any means without written authorization of Stonesoft Corporation. Stonesoft provides these materials for informational purposes only. They are subject to change without notice and do not represent a commitment on the part of Stonesoft. Stonesoft assumes no liability for any errors or inaccuracies that may appear in these materials or for incompatibility between different hardware components, required BIOS settings, NIC drivers, or any NIC configuration issues. Use these materials at your own risk. Stonesoft does not warrant or endorse any third party products described herein. THESE MATERIALS ARE PROVIDED "AS-IS." STONESOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO, THE INFORMA- TION CONTAINED HEREIN. IN ADDITION, STONESOFT MAKES NO EXPRESS OR IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE OR USE WITH RESPECT THE INFORMATION CONTAINED IN THESE MATERIALS. IN NO EVENT SHALL STONESOFT BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL OR INCIDENTAL DAMAGES, INCLUD- ING, BUT NOT LIMITED TO, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING FROM THE USE OF THESE MATERIALS, EVEN IF ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH DAMAGES. SG_SVTN_2071_ Stonesoft Corp. Itälahdenkatu 22a FIN Helsinki Finland tel fax Stonesoft Inc Crown Pointe Parkway Suite 900 Atlanta, GA USA tel fax
StoneGate SSL VPN Technical Note 2068. Adding Bundled Certificates
StoneGate SSL VPN Technical Note 2068 Adding Bundled Certificates Table of Contents Introduction................................... page 3 Overview..................................... page 3 Splitting
Remote Firewall Deployment
StoneGate How-To Remote Firewall Deployment StoneGate Firewall 3.0 and Management Center 3.5 Table of Contents The Scenario............................... page 3 Adjusting the Access Rules and NAT rules..........
Using Microsoft Active Directory Server and IAS Authentication
StoneGate How-To Using Microsoft Active Directory Server and IAS Authentication StoneGate Firewall/VPN 3.0.7 and Management Center 4.1 Table of Contents Basic Scenario...page 3 Configuring a Windows 2003
StoneGate Firewall/VPN How-To Evaluating StoneGate FW/VPN in VMware Workstation
StoneGate Firewall/VPN How-To Evaluating StoneGate FW/VPN in VMware Workstation Created: February 14, 2008 Table of Contents Introduction to Evaluating StoneGate FW/VPN in VMware Workstation... 1 Prerequisites...
StoneGate SSL VPN Technical Note 2076. Setting Up Sygate On-Demand
StoneGate SSL VPN Technical Note 2076 Setting Up Sygate On-Demand Table of Contents Introduction................................... page 3 Overview..................................... page 3 Sygate On-Demand
StoneGate SSL VPN Technical Note 2081. Setting Up SSO with Citrix Presentation Server
StoneGate SSL VPN Technical Note 2081 Setting Up SSO with Citrix Presentation Server Table of Contents Introduction................................... page 3 Overview.....................................
Release Notes for Version 1.5.207
Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4
StoneGate SSL VPN Technical Note 2069. Setting Up WPA Authentication
StoneGate SSL VPN Technical Note 2069 Setting Up WPA Authentication Table of Contents Introduction................................... page 3 Overview..................................... page 3 How WPA
VPNC Interoperability Profile
StoneGate Firewall/VPN 4.2 and StoneGate Management Center 4.2 VPNC Interoperability Profile For VPN Consortium Example Scenario 1 Introduction This document describes how to configure a StoneGate Firewall/VPN
StoneGate SSL VPN Technical Note 2086. Setting up ActiveSync
StoneGate SSL VPN Technical Note 2086 Setting up ActiveSync Table of Contents Introduction................................... page 3 Overview..................................... page 3 Enabling Device
RELEASE NOTES. StoneGate Firewall/VPN v2.2.11 for IBM zseries
RELEASE NOTES StoneGate Firewall/VPN v2.2.11 for IBM zseries Copyright 2006 Stonesoft Corp. All rights reserved. All trademarks or registered trademarks are property of their respective owners. Disclaimer:
StoneGate IPsec VPN Client Release Notes for Version 4.3.0
StoneGate IPsec VPN Client Release Notes for Version 4.3.0 Created: August 11, 2008 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility...
INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
VPN CLIENT ADMINISTRATOR S GUIDE
STONEGATE IPSEC VPN 5.1 VPN CLIENT ADMINISTRATOR S GUIDE V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then
GTA SSO Auth. Single Sign-On Service. Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: [email protected] Web: www.gta.com
GTA SSO Auth Single Sign-On Service SSOAuth201208-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: [email protected] Web: www.gta.com
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
VPN CLIENT USER S GUIDE
STONEGATE IPSEC VPN 5.1 VPN CLIENT USER S GUIDE V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current
FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide
FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide FortiAuthenticator Agent for Microsoft IIS/OWA Install Guide February 5, 2015 Revision 1 Copyright 2015 Fortinet, Inc. All rights reserved.
Installing the BlackBerry Enterprise Server Management Software on an administrator or remote computer
Installing the BlackBerry Enterprise Server Management Software on an administrator or Introduction Some administrators want to install their administrative tools on their own Windows 2000 computer. This
CA NetQoS Performance Center
CA NetQoS Performance Center Install and Configure SSL for Windows Server 2008 Release 6.1 (and service packs) This Documentation, which includes embedded help systems and electronically distributed materials,
Microsoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
Symantec Managed PKI. Integration Guide for ActiveSync
Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement and may be used
Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management
IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo
ADS Integration Guide
ADS Integration Guide Document version 9402-1.0-18/10/2006 Cyberoam ADS Integration Guide IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of
SSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks
SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the
Disaster Recovery. Websense Web Security Web Security Gateway. v7.6
Disaster Recovery Websense Web Security Web Security Gateway v7.6 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA Published 2011 The products and/or methods
Intrusion Detection and Analysis for Active Response - Version 1.2. Installation Guide
Intrusion Detection and Analysis for Active Response - Version 1.2 Installation Guide Copyright 2001 2005 Stonesoft Corp. Stonesoft Corp. All rights reserved. No part of this book may be reproduced or
NetMotion Mobility XE
Implementation Guide (Version 5.4) Copyright 2012 Deepnet Security Limited Copyright 2012, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
Citrix XenServer Workload Balancing 6.5.0 Quick Start. Published February 2015 1.0 Edition
Citrix XenServer Workload Balancing 6.5.0 Quick Start Published February 2015 1.0 Edition Citrix XenServer Workload Balancing 6.5.0 Quick Start Copyright 2015 Citrix Systems. Inc. All Rights Reserved.
Radius Integration Guide Version 9
Radius Integration Guide Version 9 Document version 9402-1.0-18/10/2006 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but
Strong Authentication for Juniper Networks SSL VPN
Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
GTA SSO Auth. Single Sign-On Service. Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: [email protected] Web: www.gta.com
GTA SSO Auth Single Sign-On Service SSOAuth200912-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: [email protected] Web: www.gta.com
RSA Two Factor Authentication
RSA Two Factor Authentication VERSION: 1.0 UPDATED: MARCH 2014 Copyright 2002-2014 KEMP Technologies, Inc. All Rights Reserved. Page 1 / 16 Copyright Notices Copyright 2002-2014 KEMP Technologies, Inc..
INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505
INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this
Adeptia Suite LDAP Integration Guide
Adeptia Suite LDAP Integration Guide Version 6.2 Release Date February 24, 2015 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 DOCUMENT INFORMATION Adeptia
Application Note. Gemalto s SA Server and OpenLDAP
Application Note Gemalto s SA Server and OpenLDAP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall
Installing the IPSecuritas IPSec Client
Mac Install Installing the IPSecuritas IPSec Client IPSecuritasMac201003-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
Adeptia Suite 6.2. Application Services Guide. Release Date October 16, 2014
Adeptia Suite 6.2 Application Services Guide Release Date October 16, 2014 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 Document Information DOCUMENT INFORMATION
SMC INSTALLATION GUIDE
STONEGATE 5.3 SMC INSTALLATION GUIDE S TONEGATE MANAGEMENT CENTER Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current end-user
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
System Center Virtual Machine Manager 2012 R2 Plug-In. Feature Description
System Center Virtual Machine Manager 2012 R2 Plug-In Feature Description VERSION: 6.0 UPDATED: MARCH 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies
CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com 7300-1.
CYBEROAM - ADS INTEGRATION GUIDE VERSION: 7 7300-1.0-9/20/2005 2 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented
TIBCO Silver Fabric Continuity User s Guide
TIBCO Silver Fabric Continuity User s Guide Software Release 1.0 November 2014 Two-Second Advantage Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
DameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note
KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies
Strong Authentication for Juniper Networks
Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2
Stonesoft Firewall/VPN 5.4 Windows Server 2008 R2 End-User Authentication Using Active Directory and Network Policy Server C ONTENTS Introduction to NPS Authentication with AD... 2 Registering the NPS
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
Application Note. Intelligent Application Gateway with SA server using AD password and OTP
Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto
VOIP-500 Series Phone CUCM 8.0.3a Integration Guide
I. Introduction This provides general instructions for integration of the VOIP-500 Series Phone with a Cisco Call Manager installation. It is recommended to read this instruction set completely before
AIMS Installation and Licensing Guide
AIMS Installation and Licensing Guide Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Toll Free: 800-609-8610 Direct: 925-217-5170 FAX: 925-217-0853 Email: [email protected] Limited Warranty
Integrated Citrix Servers
Installation Guide Supplement for use with Integrated Citrix Servers Websense Web Security Websense Web Filter v7.5 1996-2010, Websense, Inc. 10240 Sorrento Valley Rd., San Diego, CA 92121, USA All rights
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm
Cyberoam Configuration Guide for VPNC Interoperability Testing using DES Encryption Algorithm Document Version:2.0-12/07/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be
TIBCO Enterprise Administrator Release Notes
TIBCO Enterprise Administrator Release Notes Software Release 2.2.0 March 2015 Two-Second Advantage 2 Important SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED
IBM WEBSPHERE LOAD BALANCING SUPPORT FOR EMC DOCUMENTUM WDK/WEBTOP IN A CLUSTERED ENVIRONMENT
White Paper IBM WEBSPHERE LOAD BALANCING SUPPORT FOR EMC DOCUMENTUM WDK/WEBTOP IN A CLUSTERED ENVIRONMENT Abstract This guide outlines the ideal way to successfully install and configure an IBM WebSphere
How To Use Libap With A Libap Server With A Mft Command Center And Internet Server
MFT Command Center/Internet Server LDAP Integration Guide Ver sio n 7.1.1 September 7, 2011 Documentation Information MFT LDAP Integration Guide Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES
CA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
CORPORATE HEADQUARTERS Elitecore Technologies Ltd. 904 Silicon Tower, Off. C.G. Road, Ahmedabad 380015, INDIA www.cyberoam.com
CYBEROAM LDAP INTEGRATION GUIDE VERSION: 7 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing, but is presented without warranty of
Application Note. Citrix Presentation Server through a Citrix Web Interface with OTP only
Application Note Citrix Presentation Server through a Citrix Web Interface with OTP only ii Preface All information herein is either public information or is the property of and owned solely by Gemalto
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
RealPresence Platform Director
RealPresence CloudAXIS Suite Administrators Guide Software 1.3.1 GETTING STARTED GUIDE Software 2.0 June 2015 3725-66012-001B RealPresence Platform Director Polycom, Inc. 1 RealPresence Platform Director
HOTPin Integration Guide: Google Apps with Active Directory Federated Services
HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
An Oracle White Paper September 2013. Oracle WebLogic Server 12c on Microsoft Windows Azure
An Oracle White Paper September 2013 Oracle WebLogic Server 12c on Microsoft Windows Azure Table of Contents Introduction... 1 Getting Started: Creating a Single Virtual Machine... 2 Before You Begin...
DualShield Authentication Platform
Quick Start Guide (Version 5.7) Copyright 2013 Deepnet Security Limited Copyright 2013, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
version 1.0 Installation Guide
version 1.0 Installation Guide Copyright 2001 2004 Stonesoft Corp. Stonesoft Corp. All rights reserved. No part of this book may be reproduced or transmitted in any form or by any means, electronic or
Managed Services PKI 60-day Trial Quick Start Guide
Entrust Managed Services PKI Managed Services PKI 60-day Trial Quick Start Guide Document issue: 3.0 Date of issue: Nov 2011 Copyright 2011 Entrust. All rights reserved. Entrust is a trademark or a registered
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration
Dell One Identity Cloud Access Manager 8.0 - How to Configure vworkspace Integration February 2015 This guide describes how to configure Dell One Identity Cloud Access Manager to communicate with a Dell
Parallels Business Automation 5.5
Parallels Business Automation 5.5 Trustwave SSL Plug-in Configuration Guide Revision 1.2 (June 20, 2014) Copyright 1999-2014 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels
How To Login To The Mft Internet Server (Mft) On A Pc Or Macbook Or Macintosh (Macintosh) With A Password Protected (Macbook) Or Ipad (Macro) (For Macintosh) (Macros
TIBCO MFT Internet Server User Guide Software Release 7.2.4 October 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE
ADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal 1.1.3 On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (
Avaya one X Portal 1.1.3 Lightweight Directory Access Protocol (LDAP) over Secure Socket Layer (SSL) Configuration This document provides configuration steps for Avaya one X Portal s 1.1.3 communication
Thales nshield HSM. ADRMS Integration Guide for Windows Server 2008 and Windows Server 2008 R2. www.thales-esecurity.com
Thales nshield HSM ADRMS Integration Guide for Windows Server 2008 and Windows Server 2008 R2 www.thales-esecurity.com Version: 1.0 Date: 11 June 2012 Copyright 2012 Thales e-security Limited. All rights
IBM Security SiteProtector System Migration Utility Guide
IBM Security IBM Security SiteProtector System Migration Utility Guide Version 3.0 Note Before using this information and the product it supports, read the information in Notices on page 5. This edition
Sample Configuration: Cisco UCS, LDAP and Active Directory
First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
Table 1 shows the LDAP server configuration required for configuring the federated repositories in the Tivoli Integrated Portal server.
Configuring IBM Tivoli Integrated Portal server for single sign-on using Simple and Protected GSSAPI Negotiation Mechanism, and Microsoft Active Directory services Document version 1.0 Copyright International
SafeNet Authentication Service
SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have
Installing the Shrew Soft VPN Client
Windows Install Installing the Shrew Soft VPN Client ShrewVPNWindows201003-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:
Sametime Version 9. Integration Guide. Integrating Sametime 9 with Domino 9, inotes 9, Connections 4.5, and WebSphere Portal 8.0.0.
Sametime Version 9 Integration Guide Integrating Sametime 9 with Domino 9, inotes 9, Connections 4.5, and WebSphere Portal 8.0.0.1 Edition Notice Note: Before using this information and the product it
EVault Endpoint Protection 7.0 Single Sign-On Configuration
Revision: This manual has been provided for Version 7.0 (July 2014). Software Version: 7.0 2014 EVault Inc. EVault, A Seagate Company, makes no representations or warranties with respect to the contents
Stonesoft Corp. Stonegate Firewall and VPN
Stonesoft Corp. Stonegate Firewall and VPN RSA SecurID Ready Implementation Guide Last Modified: February 2, 2011 Partner Information Product Information Partner Name Stonesoft Corp. Web Site www.stonesoft.com
IBM TRIRIGA Anywhere Version 10 Release 4. Installing a development environment
IBM TRIRIGA Anywhere Version 10 Release 4 Installing a development environment Note Before using this information and the product it supports, read the information in Notices on page 9. This edition applies
Active Directory Synchronization with Lotus ADSync
Redbooks Paper Active Directory Synchronization with Lotus ADSync Billy Boykin Tommi Tulisalo The Active Directory Synchronization tool, or ADSync, allows Active Directory administrators to manage (register,
INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass
INTEGRATION GUIDE DIGIPASS Authentication for F5 FirePass Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security
Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
Installation Guide. SafeNet Authentication Service
SafeNet Authentication Service Installation Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Using Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12
M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.
CA Spectrum and CA Service Desk
CA Spectrum and CA Service Desk Integration Guide CA Spectrum 9.4 / CA Service Desk r12 and later This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter
Symantec Mobile Management for Configuration Manager
Symantec Mobile Management for Configuration Manager Replication Services Installation Guide 7.5 Symantec Mobile Management for Configuration Manager: Replication Services Installation Guide The software
ncipher Modules Integration Guide for Axway Validation Authority Server 4.11 (Responder) www.thales-esecurity.com
ncipher Modules Integration Guide for Axway Validation Authority Server 4.11 (Responder) www.thales-esecurity.com Version: 1.0 Date: 30 May 2012 Copyright 2012 Thales e-security Limited. All rights reserved.
IBM Security QRadar Version 7.1.0 (MR1) Replacing the SSL Certificate Technical Note
IBM Security QRadar Version 7.1.0 (MR1) Technical Note Note: Before using this information and the product that it supports, read the information in Notices and Trademarks on page 5 Copyright IBM Corp.
EMC NetWorker. Security Configuration Guide. Version 8.2 SP1 302-001-577 REV 02
EMC NetWorker Version 8.2 SP1 Security Configuration Guide 302-001-577 REV 02 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published February, 2015 EMC believes the information
Setting Up Resources in VMware Identity Manager
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
