ExecProtect Armored Office AD FS 2012 R2 with O365 Demo Guide

Size: px
Start display at page:

Download "ExecProtect Armored Office AD FS 2012 R2 with O365 Demo Guide"

Transcription

1 ExecProtect Armored Office How to configure AD FS 2012 R2 with IDC 6.2 on AZURE

2 All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to file patent applications or any other kind of intellectual property protection in connection with such information. Nothing herein shall be construed as implying or granting to you any rights, by license, grant or otherwise, under any intellectual and/or industrial property rights of or concerning any of Gemalto s information. This document can be used for informational, non-commercial, internal and personal use only provided that: The copyright notice below, the confidentiality and proprietary legend and this full warning notice appear in all copies. This document shall not be posted on any network computer or broadcast in any media and no modification of any part of this document shall be made. Use for any other purpose is expressly prohibited and may result in severe civil and criminal liabilities. The information contained in this document is provided AS IS without any warranty of any kind. Unless otherwise expressly agreed in writing, Gemalto makes no warranty as to the value or accuracy of information contained herein. The document could include technical inaccuracies or typographical errors. Changes are periodically added to the information herein. Furthermore, Gemalto reserves the right to make any change or improvement in the specifications data, information, and the like described herein, at any time. Gemalto hereby disclaims all warranties and conditions with regard to the information contained herein, including all implied warranties of merchantability, fitness for a particular purpose, title and non-infringement. In no event shall Gemalto be liable, whether in contract, tort or otherwise, for any indirect, special or consequential damages or any damages whatsoever including but not limited to damages resulting from loss of use, data, profits, revenues, or customers, arising out of or in connection with the use or performance of information contained in this document. Gemalto does not and shall not warrant that this product will be resistant to all possible attacks and shall not incur, and disclaims, any liability in this respect. Even if each product is compliant with current security standards in force on the date of their design, security mechanisms' resistance necessarily evolves according to the state of the art in security and notably under the emergence of new attacks. Under no circumstances, shall Gemalto be held liable for any third party actions and in particular in case of any successful attack against systems or equipment incorporating Gemalto products. Gemalto disclaims any liability with respect to security for direct, indirect, incidental or consequential damages that result from any use of its products. It is further stressed that independent testing and verification by the person using the product is particularly encouraged, especially in any application in which defective, incorrect or insecure functioning could result in damage to persons or property, denial of service or loss of privacy. Copyright 2014 Gemalto N.V. All rights reserved. Gemalto and the Gemalto logo are trademarks and service marks of Gemalto N.V. and/or its subsidiaries and are registered in certain countries. All other trademarks and service marks, whether registered or not in specific countries, are the property of their respective owners.

3 Contents 1 Preface Who Should Read This Book Conventions Glossary Contact Us Microsoft AD FS Microsoft DirSync Microsoft Office Use Case Description Configure AD FS Introduction AD FS Installation Install and Configure Web Application Proxy Configure DirSync Introduction Enable directory synchronization Installation Configuration Gemalto AD FS MFA Provider Installing the AD FS MFA Provider Configuring the Gemalto MFA Provider Configuring the Authentication Policies Configuring IDConfirm User experience... 52

4 1 Preface As today s workforce becomes more and more mobile, the risks associated with taking data outside the protected perimeters of the corporate office are growing. Privileged users such as corporate executives frequently deal with numerous sensitive documents and their laptops are easy targets for theft. If sensitive information like company business plans, intellectual property, client data, financial reports, etc gets into wrong hands, financial and reputation damages when reported are often immeasurable. With ExecProtect Armored Office, privileged users can be assured that their laptops and data are securely protected by the toughest encryption and access credentials in the world. Even if their laptop is lost or stolen, the sensitive information will remain unavailable to all users who fail the multi-factor authentication and authorization. Armored Office is an end-to-end solution that provides organizations with a comprehensive and scalable offer for security authentication and administration that aims to facilitate the migration to strong authentication, ensuring high security and convenience of use. 1.1 Who Should Read This Book This guide is intended for Gemalto s partners and technical consultants to demonstrate in an easy way the proposed use-cases from a Windows 8 client installed on Azure or with local client connected to Execprotect demo environment using VPN. The ExecProtect demo platform remains Gemalto Intellectual property and cannot be provided to customers without Gemalto explicit agreement. 1.2 Conventions The following conventions are used in this document: In this manual, the following highlighting styles are used: Bold Instructions, commands, file names, folder names, key names, icons, menus, menu items, field names, buttons, check boxes, tabs, registry keys and values. Italic Variables that you must replace with a value, book titles, news or emphasized terms. In this manual, hyperlinks are marked as described below: Internal Links Displayed in quotation marks. Click an internal link to jump to a different section. External Links Displayed in blue, underlined text. Click an external link and launch your default browser (or program). In this manual, notes and cautions are marked like this: Notes: Information that further explains a concept or instruction, tips, and tricks.

5 Caution: Information that alerts you to potentially severe problems that might result in loss of data or system failure. 1.3 Glossary AD CS: Active Directory Certificate Services AD DS: Active Directory Domain Services AD FS: Active Directory Federation Service MFA: Multi Factor Authentication OOB: Out Of Band SSO: Single Sign On OTP: One Time Password DirSync: Directory Synchronize O365: Office Contact Us If you need more information that is not found in this guide or if you have any questions, please contact your Gemalto Support or send an to

6 1.5 Microsoft AD FS AD FS is an identity access solution that provides browser-based clients (internal or external to your network) with seamless, "one prompt" access to one or more protected Internet-facing applications, even when the user accounts and applications are located in completely different networks or organizations. When an application is in one network and user accounts are in another network, it is typical for users to encounter prompts for secondary credentials when they attempt to access the application. These secondary credentials represent the identity of the users in the realm where the application resides. The Web server that hosts the application usually requires these credentials so that it can make the most appropriate authorization decision. AD FS makes secondary accounts and their credentials unnecessary by providing trust relationships that you can use to project a user's digital identity and access rights to trusted partners. In a federated environment, each organization continues to manage its own identities, but each organization can also securely project and accept identities from other organizations. Furthermore, you can deploy federation servers in multiple organizations to facilitate business-tobusiness (B2B) transactions between trusted partner organizations. Federated B2B partnerships identify business partners as one of the following types of organization: Resource organization: Organizations that own and manage resources that are accessible from the Internet can deploy AD FS federation servers and AD FS-enabled Web servers that manage access to protected resources for trusted partners. These trusted partners can include external third parties or other departments or subsidiaries in the same organization. Account organization: Organizations that own and manage user accounts can deploy AD FS federation servers that authenticate local users and create security tokens that federation servers in the resource organization use later to make authorization decisions. The process of authenticating multiple domains without the burden of repeated logon actions by users is known as single sign-on (SSO). AD FS provides a Web-based, SSO solution that authenticates users to multiple Web applications over the life of a single browser session. 1.6 Microsoft DirSync Active Directory Synchronization, or DirSync, synchronizes the local Active Directory with the Microsoft Online Services Directory. DirSync lets you control and manage user accounts in the traditional way through Active Directory Users and Computers. In addition, the Global Address List (GAL) can be synchronized between the Local Active Directory and the online environment. The DirSync tool can be downloaded from the Microsoft Online Portal. After DirSync configuration, any user accounts created in the on-premise Active Directory synchronize to the Microsoft Office 365 directory. If a user account update is required, the local Active Directory must perform the update except for the Online Services activation for the account. If an account is created in the cloud, the account does not synchronize to the on-premise environment. Synchronization from online to the on-premise environment does not occur. If a user object is modified in the cloud, the administrator runs the risk of DirSync overwriting that change. DirSync is intended to keep on-premise data synchronized with Microsoft Exchange Online. A three-hour synchronization delay may occur, because by default DirSync runs at three-hour intervals. Synchronization may be manually initiated if required

7 1.7 Microsoft Office 365 Microsoft Office 365 delivers the power of cloud productivity to businesses of all sizes, helping to save time, money and free up valued resources. Office 365 combines the familiar Office desktop suite with cloud-based versions of Microsoft s next-generation communications and collaboration services: Exchange Online, SharePoint Online and Lync Online. Office 365 is simple to use and easy to administer all backed by the robust security and guaranteed reliability you expect from a world-class service provider. Key Microsoft Office 365 Benefits: Anywhere-access to , documents, contacts, and calendars on nearly any device Work seamlessly with Microsoft Office and the other programs your users already count on everyday Business-class features including IT-level phone support, guaranteed 99.9% uptime, georedundancy, and disaster recovery Pay-as-you-go pricing options which give you predictability and flexibility for all or part of your organization Latest version of Business Productivity Online Suite (BPOS), which has millions of business users today

8 2 Use Case Description This infrastructure is designed to meet the need of implementing strong authentication when accessing the Office 365 Web Interface. When setting up the messaging system on Office 365 it is necessary to establish a system of identity federation between your Active Directory domain and Office 365 platform in the cloud. This federation is ensured by the AD FS technology. In a standard installation, when accessing the Web Office 365 portal, it is necessary to authenticate to the AD FS server's domain by entering the login and password of the domain. In the enhanced version, the goal is to add a layer of security by setting up a 2-factor authentication when accessing the Office 365 Web Interface. Prerequisites for Azure Demo Environment The prerequisites are: You need a Microsoft Office 365 Plan E3 Free 30 day trial account; you can register an account here: Demo environment hosted on Microsoft Azure, 30 days trial subscription available on: You will need a public Domain (Registered at Go Daddy or other domain name provider) Also you will need public certificate (in our case provided by gandi.net)

9 Servers description execprotectdns: O.S: Windows Server 2012 R2 Standard Domain: execprotect.info Services: AD DS, AD CS, DNS, AD FS, DirSync oob: O.S: Windows Server 2008 R2 Standard Domain: execprotect.info Services: IDConfirm 6.2 execproproxy: O.S: Windows Server 2012 R2 Standard Domain: execprotect.info Services: AD FS Proxy

10 3 Configure AD FS 3.5 Introduction This section explains the configuration of the AD FS server within the platform; AD FS server is used to implement identity federation with Office 365 servers. Without this configuration, the single sign-on on Microsoft's online platform is not available. 3.6 AD FS Installation Installation of Active Directory Federation Services Start server manager, click add roles and features wizard, select Active Directory Federation Services, then click next.

11 >Next >Next

12 Select Active Directory Federation Services and click Next.Net Framework 4.5 will be installed, next >next

13 > Install After several minutes AD FS role will be installed, now you have to configure it. Open drop down menu with exclamation mark

14 > Next Use Enterprise Admin account or Account you create for this purpose (Current if logged with admin account)

15 Select SSL certificate and name Federation service (write this name, you will need it latter) > Next

16 > Next Specify database

17 > Next > Configure 1. Once the installation is finished, click Finish to exit the installation wizard.

18 3.6.2 Create DNS A Record Now you have to create DNS record for the AD FS instance. In this example we use GO Daddy as public DNS resolver. Once the DNS record has been created and propagated ensure that it resolves correctly. To do so log in to GoDaddy, click on launch Domains Click on your domain: Click DNS Zone files and then EDIT: Click on Quick Add and enter your aliases for sts: Note: In real life scenario whole our infrastructure including AD FS should be located behind Firewall. DNS record should point to Proxy server which reside in DMZ zone. For simplicity, our demo AD FS are exposed to internet, that s why DNS can point direct to AD FS server.

19 To test you settings try to access AD FS login page (In our case FS/ls/idpinitiatedsignon.htm)

20 3.7 Install and Configure Web Application Proxy Installation > Next > Next

21 >Next > Select Remote Access

22 >Next >Next

23 Select Web Application Proxy > Install

24 Check if wizard ends successfully Configuration Now you have to configure Web Application Proxy > Next

25 Type Federation service name and user name and password > Next

26 > Next > Configure

27 After successful configuration please check status in remote Access Management Console

28 3.7.3 Domain association 1. Authenticate to your trial version of Office Click Domains. 3. Under domains, click Manage your website and domains. 4. Click Add a domain and follow the steps

29 Log in to GoDaddy (in case you bought a domain from them)

30 In case you will not be able to verify your domain, please log in to your domain dns management and delete all the TXT records with value similar to v=verifydomain MS= (only if the domain was previously associated with a different O365 account) Then you ll be able to complete the verification Prepare Active Directory Add UPN suffix To enable identity federation domains to be registered, Office 365 should be added as UPN suffixes in the local Active Directory. Users must also have a UPN corresponding to their primary address in Exchange Online. 1. In Administrative Tools, choose Active Directory Domains and Trusts.

31 2. In the console tree right-click on Active Directory Domains and Trusts and then click Properties. 3. Under UPN Suffixes tab, enter yourdomain.com suffix then click add. 4. Click OK when you are finished.

32 3.7.5 SSL Certificate For best results purchase wild card SSL certificate from first level certificate authority like Go Daddy. For this demo, certificate is purchased from Gandi. In this case it s necessary to download intermediate server and install it Configure Internet Information Services (IIS) 1. Open the Internet Services Manager console (IIS). Click Default Web Site. 2. In the right pane click Bindings...

33 3. Click Add... in the new window choose the type https and select your SSL Certificate and click OK. 4. Confirm clicking OK Configure the federation trust with Office Open Microsoft Online Services Module for Windows PowerShell as an administrator. 2.

34 3. Enter the following command: $cred = Get-Credential 4. At the request of identifiers, enter user name and password corresponding to the Office 365 admin user 5. Enter the following command to connect to Office 365: Connect-MsolService -Credential $cred 6. Enter the following command to add the federated domain: Convert-MsolDomainToFederated -DomainName [AD FS DOMAIN] SupportMultipleDomain 7. Make sure that the identity federation has been configured correctly by entering the following command: Get-MsolFederationProperty -DomainName [AD FS DOMAIN] 8. Check the value of fields ActiveClientSignInUrl and PassiveClientSignInUrl they must point to the URL of Public STS: sts.exec-protect.com

35 4 Configure DirSync 4.5 Introduction This section shows the configuration of the DirSync which will synchronize your local Active Directory with Office 365. With this service each user created in Active Directory will automatically be created in Office 365. DirSync requirement: Previously DirSync require to be installed on machine which is not domain controller. That is no longer the case! 4.6 Enable directory synchronization When you set up directory synchronization, you enable this feature for your Office 365 subscription, you must enable it before installing the Directory Synchronization tool, and we recommend that you leave it enabled all the time. 1. Connect to the server with an administrator account. 2. Open Windows Azure Active Directory Module for Windows PowerShell as an administrator. 3. Enter the following command: Set-MsolDirSyncEnabled EnableDirSync $true 4.7 Installation Download of Windows Azure Active Directory Sync Tool 1. Connect to 2. Save the file DirSync.exe Installation of Windows Azure Active Directory Sync Tool 1. Run DirSync.exe previously downloaded. 2. On the Welcome page, click Next.

36 3. Select I accept the terms of the license agreement and click Next. 4. On the Select the installation folder, click Next. 5. Once the installation is complete, click Next.

37 6. On the Finished page, select Start Configuration Wizard now and click Finish. 4.8 Configuration Configure Directory Synchronization Note: Active Directory must be prepared to Office 365 before performing the synchronization of directories 1. Open Directory Sync Configuration Wizard. 2. On the Welcome page, click Next.

38 3. On the Microsoft Online Services Credentials page, enter the name and password of the O365 admin user, then click Next. 4. On the Active Directory Credentials page, provide Active Directory credentials (your users must be member of the enterprise admins to perform this task) 5. Select to synchronize the passwords 6. Click Next.

39 7. Select Enable Password Sync and click Next. 8. Wait the setup ends and click Next. 9. Make sure Synchronize directories now is checked and click the Finish button. The first synchronization will start.

40 4.8.2 Force synchronization directory If you do not want to wait for synchronization recurring, you can force directory synchronization at any time. 1. Navigate to the installation folder of the directory synchronization. (%programfiles%\ Microsoft Azure Active Directory Sync default). 2. Double click to open a DirSyncConfigShell.psc1 Windows PowerShell. 3. In the Windows PowerShell window, type the following command: Start-OnlineCoexistenceSync then press the Enter key. 4.

41 4.8.3 Verify Directory Synchronization The initial synchronization makes a copy of each user and group in the Office 365 directory. After that, the directory synchronization updates the directory with Office 365 changes that you make in your local Active Directory. You can verify the directory synchronization updates of your Office 365 directory using the following methods: Compare directories after synchronization: Check to see if changes to users and groups in the local Active Directory are updated in Office 365 after synchronization. The local Active Directory is the master of all changes on synchronized objects in Office 365. Keep track of event log: The Microsoft Online Services Directory Synchronization writes entries to the event log of the computer directory synchronization, including the beginning and end of a session timing and directory synchronization errors. In the event log, look for entries whose source is the directory synchronization. 1. Connect to Office 365 via the portal 2. Note the properties of the address of a user or group that will be synchronized from the local Active Directory. 3. Connect to the local Active Directory with rights to modify users and groups. 4. In the local Active Directory, make simple but obvious changes in the properties of the address of the user or group that you noted in the Office 365 directory. 5. Force directory synchronization. 6. Check the event log entry The export has completed, then look at the address properties of the user or group in the Office 365 directory. 7. Verify that the changes in AD have been passed in the directory Office 365.

42 5 Gemalto AD FS MFA Provider The Gemalto AD FS MFA Provider enables you to register IDConfirm 1000 as an auxiliary authentication provider in AD FS, thus adding strong authentication to AD FS. Supported IDConfirm 1000 Versions The AD FS MFA Provider can be used with versions 6.2 and 6.3 of IDConfirm System Architecture The Gemalto AD FS MFA Provider is deployed in the company s premises. The IDConfirm 1000 authentication server can be either deployed in the company s premises or in the cloud. The following figure shows the architecture: Authentication Steps When the provided external authentication plug-in is installed, authentication to the AD FS server is performed in two steps, primary and secondary authentication.

43 Primary Authentication Primary authentication uses the standard Windows Logon credentials of the user. The Gemalto AD FS MFA Provider configures internal and external users separately, so that for example it is possible to prompt external users for their Windows Active Directory credentials (User ID and Password), but not internal users. Secondary Authentication The secondary authentication is authentication to the IDConfirm 1000 server using a one-time password (OTP). This can be one of the following options: One-Time Password Device OTP is generated by the device and entered manually by the user. One-Time Password SMS OTP is sent to a mobile phone via an SMS message and then entered manually by the user. IDProve 300 Mobile Passcode This is used for out of band (OOB) authentication. The passcode (OTP) is generated by the IDProve 300 app on a mobile phone. The passcode can be sent by IDProve 300 or entered manually by the user. 5.5 Installing the AD FS MFA Provider System Requirements The following sections describe the operating systems and role pre-requirements you need to use the AD FS MFA provider. You must have administrator rights to the computer on which you are installing the Library. Operating Systems This version of the AD FS MFA provider runs only under Windows Server 2012 R2. Role Pre-requirements Active Directory Federation Services. To install an IDConfirm 1000 AD FS Agent on a Windows Server 2012 R2 x64 system, follow these steps: Locate and double-click IDConfirm_1000_AD FS_AuthenticationServer.msi to start the Gemalto AD FS MFA Provider installation program. The installation program starts, and the Welcome window appears, as shown in Figure below.

44 > Next. The license window appears. Accept the license agreement and click Next. The Destination Folder window appears, Accept the default location shown in the window or click Change to select another location for the installation. When ready, click Next.

45 When ready, click Install. When the installation program is finished, the final window appears Installation Complete Check the Configure IDConfirm 1000 AD FS MFA Provider box and click Finish. 5.6 Configuring the Gemalto MFA Provider You configure the Gemalto AD FS MFA Provider in the dialog box that appears at the end of the installation - as long as you checked the Configure IDConfirm 1000 AD FS MFA Provider box. If you did not check the box, use the configuration Wizard

46 Check the Enable Provider box if you want Gemalto AD FS MFA Provider to be selected as an additional authentication method. In IDConfirm URL enter the URL for the IDConfirm 1000 authentication server. The URL must include the tenant id of the tenant to connect to <idc-tenant>, or <master> if the IDConfirm 1000 authentication server is single tenancy. You can use the Test Connection button to make test that the IDConfirm 1000 server can be reached. In MFA Modes, check the modes that you want to enable as follows: One-Time Password Device for a hardware OTP device to generate the OTP and manually enter the OTP. One-Time Password SMS to send the OTP to a mobile phone via an SMS Message IDProve 300 Mobile Passcode to generate the passcode (OTP) by the IDProve 300 mobile app. In each case, check (or not) the Password Enabled box. Checking the box means that the user will have to enter his or her password during the multi-factor authentication. This option is only relevant if IDConfirm is configured in mixed mode with the database password option. This means that IDConfirm 1000 manages the user s password internally in its database, instead of using user s Active Directory password. Check the Enable IDProve 300 Mobile self registration box if you want the AD FS to include a link that allows the user to register his or her mobile phone. This link will appear if the user chooses Authenticate Using my Mobile Phone in the AD FS window. The link itself appears as Mobile Phone Registration when the user is prompted for the passcode (OTP) Note: The IDConfirm 1000 AD FS MFA Adapter is able to detect if a user does not have a mobile phone registered and will then ask the user if he or she wants to continue with a registration. To trigger this prompt to the user, the IDConfirm 1000 authentication server must be configured to not hide authentication errors.

47 This is done in the authserver.config file by setting the authserver.auth.failure.response.hide property to zero. The Text Resources button, allows you to configure the text labels that appear in the AD FS GUI. It displays the Configure Text Resources window shown in the following figure. Edit the values and click Save. The Restore Defaults button allows you to return to the original settings. Click the Advanced button in the configuration window to display more configuration options in the Advanced Configuration window as shown: Check the Display IDConfirm User Portal URL box if you want the AD FS to include a link to the IDConfirm 1000 User Portal. You can also edit the URL itself.

48 You can optionally modify the authentication timeout for IDProve 300 by changing the value in milliseconds. If you do not want the user to see any error messages generated by IDConfirm 1000, check the box Hide IDConfirm error messages from user. In Event Logging, choose the level of error messages from the Gemalto AD FS MFA provider that you want to display: Error Warning Information Verbose If you want the log to be written to a file, check the box Log to file. The log file is located at c:\users\service_account$\appdata\local\idconfirmad FSv3Provider\IDConfirmAD FSv3Provider.log Where: service_account$ is the name of the account under which the AD FS server is running. When you have finished your advanced configuration, click OK to return to the first Gemalto AD FS MFA Provider Configuration box When you have finished your configuration, click Apply. This applies your configuration and you will be prompted to restart the server and any other AD FS servers in the same farm. The configuration dialog box remains displayed, so you can still make further changes if you wish. When you have completely finished, click OK. The configuration dialog box disappears. 5.7 Configuring the Authentication Policies You also need to configure the authentication policies in the Server Manager. To configure the authentication policies: Start the Server Manager. It is in the task bar From the Tools menu, choose AD FS Management. This opens the AD FS window as shown in the following figure: Under AD FS, choose Authentication Policies. This displays the following:

49 In Primary Authentication, click Edit in the Authentication Methods for Global Settings. These are the settings for the Primary Authentication mentioned earlier In the example shown in the following figure, Forms Authentication is specified for Extranet users, and Windows Authentication is specified for Intranet users. Forms authentication means the user is prompted for the username and password. Windows authentication is transparent to the user the user s windows identity is transferred in the background and is sufficient to authenticate the user.

50 If you change the default settings, click Apply. Otherwise click OK. Go to Multi-factor Authentication, either by clicking the Multi-factor tab or clicking Edit in the Authentication Methods for Global Settings. In the example shown in the following figure, Gemalto AD FS MFA Provider is specified for Extranet and Intranet users. In the lower panel you must check the box Gemalto IDConfirm 1000 MFA Provider. Note: If you checked the Enable Provider box in the configuration wizard, this box is already checked for you.

51 5.8 Configuring IDConfirm 1000 User and mobile policies have to be properly configured on the IDConfirm 1000 authentication server side to allow users to register their mobile devices successfully. You will also need to make sure that the users for AD FS must have the necessary privileges assigned to their roles. For information about managing roles and configuring policies, please refer to the IDConfirm 1000 Customer Care Portal Guide. The IDConfirm 1000 Mobile Authentication Configuration Guide provides additional guidance, particularly for configuring mobile policies.

52 6 User experience Users can Sign In to Office 365 by entering username and password in portal or (redirected to address above) Without implemented AD FS users are authenticated by O365, users need to be created in office 365 portal for each subscription. In our demo with AD FS 2012 R2 and DirSync implemented, users are authenticated by our domain controller.

53 In reality, when user enters username in UPN form before entering password, it will be redirected to custom AD FS page where authentication will be done.. If you already have your phone registered you can type password and send OTP from your mobile. If not, please click on Mobile Phone Registration Prerequisite: You have to download and install the IDProveOTP app on your mobile phone before registration (available on App Store, Google Play and WindowsPhone)

54 Once you have installed the application, use it to scan the QR code. When the registration completes, please Click on the Start Over button below To send OTP from your phone, simply click on Send Passcode (or appropriate icon) button on your phone, and you are logged in to Office365.

55 Send Passcode You are logged in.

Application Note. Intelligent Application Gateway with SA server using AD password and OTP

Application Note. Intelligent Application Gateway with SA server using AD password and OTP Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto

More information

Application Note. Gemalto s SA Server and OpenLDAP

Application Note. Gemalto s SA Server and OpenLDAP Application Note Gemalto s SA Server and OpenLDAP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall

More information

Application Note. SA Server and ADAM

Application Note. SA Server and ADAM Application Note SA Server and ADAM Solution Overview All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and

More information

SafeNet Cisco AnyConnect Client. Configuration Guide

SafeNet Cisco AnyConnect Client. Configuration Guide SafeNet Cisco AnyConnect Client Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and

More information

Application Note. Citrix Presentation Server through a Citrix Web Interface with OTP only

Application Note. Citrix Presentation Server through a Citrix Web Interface with OTP only Application Note Citrix Presentation Server through a Citrix Web Interface with OTP only ii Preface All information herein is either public information or is the property of and owned solely by Gemalto

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

IDGo 800 Minidriver for Windows. User Guide

IDGo 800 Minidriver for Windows. User Guide IDGo 800 Minidriver for Windows User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the sole right to

More information

Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista

Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista Application Note Gemalto Access Client for windows smart card and EFS on Microsoft Windows Vista [email protected] [email protected] November 2007 www.gemalto.com All information herein

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have

More information

SA Server 2.0. Application Note : Evidian SafeKit 7.0.4, Failover

SA Server 2.0. Application Note : Evidian SafeKit 7.0.4, Failover SA Server 2.0 Application Note : Evidian SafeKit 7.0.4, Failover ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries

More information

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008

Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 7 Application Note Gemalto.NET 2.0 Smart Card Certificate Enrollment using Microsoft Certificate Services on Windows 2008 All information herein is either public information or is the property of and owned

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

LAB 2: Identity Management

LAB 2: Identity Management LAB 2: Identity Management Contents Lab 2: Identity Management... 2 Exercise 1: install and configure prerequisites for configuring AD FS... 3 Tasks... 3 Exercise 2: adding and verifying a standard domain

More information

SafeNet Authentication Service Token Validator Proxy Agent. Configuration Guide

SafeNet Authentication Service Token Validator Proxy Agent. Configuration Guide SafeNet Authentication Service Token Validator Proxy Agent Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries

More information

HOTPin Integration Guide: Google Apps with Active Directory Federated Services

HOTPin Integration Guide: Google Apps with Active Directory Federated Services HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as

More information

How To Connect Checkpoint To Gemalto Sa Server With A Checkpoint Vpn And Connect To A Check Point Wifi With A Cell Phone Or Ipvvv On A Pc Or Ipa (For A Pbv) On A Micro

How To Connect Checkpoint To Gemalto Sa Server With A Checkpoint Vpn And Connect To A Check Point Wifi With A Cell Phone Or Ipvvv On A Pc Or Ipa (For A Pbv) On A Micro Application Note: Integrate Check Point IPSec or SSL VPN with Gemalto SA Server [email protected] January 2008 www.gemalto.com All information herein is either public information or is the property

More information

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess

Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,

More information

Business Portal for Microsoft Dynamics GP 2010. Field Service Suite

Business Portal for Microsoft Dynamics GP 2010. Field Service Suite Business Portal for Microsoft Dynamics GP 2010 Field Service Suite Copyright Copyright 2010 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views

More information

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services

HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

SafeNet Authentication Service Agent for Windows Logon. Configuration Guide

SafeNet Authentication Service Agent for Windows Logon. Configuration Guide SafeNet Authentication Service Agent for Windows Logon Configuration Guide All information herein is either public information or is the property of and owned solely by SafeNet Inc. and/or its subsidiaries

More information

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide

Dell One Identity Cloud Access Manager 7.0.2. Installation Guide Dell One Identity Cloud Access Manager 7.0.2 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0

Microsoft Dynamics GP. Workflow Installation Guide Release 10.0 Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of

More information

Test Lab Guide: Creating a Windows Azure AD and Windows Server AD Environment using Azure AD Sync

Test Lab Guide: Creating a Windows Azure AD and Windows Server AD Environment using Azure AD Sync Test Lab Guide: Creating a Windows Azure AD and Windows Server AD Environment using Azure AD Sync Microsoft Corporation Published: December 2014 Author: Mark Grimes Acknowledgements Special thanks to the

More information

Mod 2: User Management

Mod 2: User Management Office 365 for SMB Jump Start Mod 2: User Management Chris Oakman Managing Partner Infrastructure Team Eastridge Technology Stephen Hall CEO & SMB Technologist District Computers 1 Jump Start Schedule

More information

Special thanks to the following people for reviewing and providing invaluable feedback for this document: Joe Davies, Bill Mathers, Andreas Kjellman

Special thanks to the following people for reviewing and providing invaluable feedback for this document: Joe Davies, Bill Mathers, Andreas Kjellman Test Lab Guide: Creating a Microsoft Azure Active Directory and Windows Server Active Directory Environment using Microsoft Azure Active Directory Sync Services Microsoft Corporation Published: December

More information

HOTPin Integration Guide: DirectAccess

HOTPin Integration Guide: DirectAccess 1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility

More information

Migrating Exchange Server to Office 365

Migrating Exchange Server to Office 365 Migrating Exchange Server to Office 365 By: Brien M. Posey CONTENTS Domain Verification... 3 IMAP Migration... 4 Cut Over and Staged Migration Prep Work... 5 Cut Over Migrations... 6 Staged Migration...

More information

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)

Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS) SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Application Note. Gemalto Smart Cards with Citrix XenApp 5.0

Application Note. Gemalto Smart Cards with Citrix XenApp 5.0 Application Note Gemalto Smart Cards with Citrix XenApp 5.0 ii Preface All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries

More information

Microsoft Dynamics GP Release

Microsoft Dynamics GP Release Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.

More information

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0

Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About

More information

SSL VPN Client Installation Guide Version 9

SSL VPN Client Installation Guide Version 9 SSL VPN Client Installation Guide Version 9 Document version 96060-1.0-08/10/2009 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,

More information

Agent Configuration Guide

Agent Configuration Guide SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright

More information

Centrify Cloud Connector Deployment Guide

Centrify Cloud Connector Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as

More information

Google Apps Deployment Guide

Google Apps Deployment Guide CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate

More information

Cloud Authentication. Getting Started Guide. Version 2.1.0.06

Cloud Authentication. Getting Started Guide. Version 2.1.0.06 Cloud Authentication Getting Started Guide Version 2.1.0.06 ii Copyright 2011 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

Configuration Guide. SafeNet Authentication Service AD FS Agent

Configuration Guide. SafeNet Authentication Service AD FS Agent SafeNet Authentication Service AD FS Agent Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document

More information

CA Nimsoft Service Desk

CA Nimsoft Service Desk CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Business Portal for Microsoft Dynamics GP. Key Performance Indicators Release 10.0

Business Portal for Microsoft Dynamics GP. Key Performance Indicators Release 10.0 Business Portal for Microsoft Dynamics GP Key Performance Indicators Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the

More information

Windows Server Update Services 3.0 SP2 Step By Step Guide

Windows Server Update Services 3.0 SP2 Step By Step Guide Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server

More information

Enterprise Self Service Quick start Guide

Enterprise Self Service Quick start Guide Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: [email protected] Online Support: [email protected] 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.

More information

ACTIVID APPLIANCE AND MICROSOFT AD FS

ACTIVID APPLIANCE AND MICROSOFT AD FS ACTIVID APPLIANCE AND MICROSOFT AD FS SAML 2.0 Channel Integration Handbook ActivID Appliance 7.2 July 2013 Released Document Version 1.0 hidglobal.com Table of Contents 1.0 Introduction...3 1.1 Scope

More information

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services

HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services 1 HOTPin Integration Guide: Salesforce SSO with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided

More information

LAB 1: Installing Active Directory Federation Services

LAB 1: Installing Active Directory Federation Services LAB 1: Installing Active Directory Federation Services Contents Lab: Installing and Configuring Active Directory Federation Services... 2 Exercise 1: installing and configuring Active Directory Federation

More information

How to Implement the X.509 Certificate Based Single Sign-On Solution with SAP Netweaver Single Sign-On

How to Implement the X.509 Certificate Based Single Sign-On Solution with SAP Netweaver Single Sign-On How to Implement the X.509 Certificate Based Single Sign-On Solution with SAP Netweaver Single Sign-On How to implement the X.509 certificate based Single Sign-On solution from SAP Page 2 of 34 How to

More information

Defender Delegated Administration. User Guide

Defender Delegated Administration. User Guide Defender Delegated Administration User Guide 2012 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Installation Guide. SafeNet Authentication Service

Installation Guide. SafeNet Authentication Service SafeNet Authentication Service Installation Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Integration Guide. SafeNet Authentication Service. Using SAS with Web Application Proxy. Technical Manual Template

Integration Guide. SafeNet Authentication Service. Using SAS with Web Application Proxy. Technical Manual Template SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Dell Statistica 13.0. Statistica Enterprise Installation Instructions

Dell Statistica 13.0. Statistica Enterprise Installation Instructions Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or

More information

User Guide. BES12 Self-Service

User Guide. BES12 Self-Service User Guide BES12 Self-Service Published: 2016-01-27 SWD-20160127153905522 Contents About BES12 Self-Service...4 Log in to BES12 Self-Service... 4 Forgot your login password?... 4 Change your login password...5

More information

Server Installation Guide ZENworks Patch Management 6.4 SP2

Server Installation Guide ZENworks Patch Management 6.4 SP2 Server Installation Guide ZENworks Patch Management 6.4 SP2 02_016N 6.4SP2 Server Installation Guide - 2 - Notices Version Information ZENworks Patch Management Server Installation Guide - ZENworks Patch

More information

RSA SecurID Software Token 1.0 for Android Administrator s Guide

RSA SecurID Software Token 1.0 for Android Administrator s Guide RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

Dell Enterprise Reporter 2.5. Configuration Manager User Guide

Dell Enterprise Reporter 2.5. Configuration Manager User Guide Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license

More information

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web

BlackShield ID Agent for Terminal Services Web and Remote Desktop Web Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication

More information

CA NetQoS Performance Center

CA NetQoS Performance Center CA NetQoS Performance Center Install and Configure SSL for Windows Server 2008 Release 6.1 (and service packs) This Documentation, which includes embedded help systems and electronically distributed materials,

More information

Dell Statistica Document Management System (SDMS) Installation Instructions

Dell Statistica Document Management System (SDMS) Installation Instructions Dell Statistica Document Management System (SDMS) Installation Instructions 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

WatchDox SharePoint Beta Guide. Application Version 1.0.0

WatchDox SharePoint Beta Guide. Application Version 1.0.0 Application Version 1.0.0 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Business Portal for Microsoft Dynamics GP. Project Time and Expense Administrator s Guide Release 10.0

Business Portal for Microsoft Dynamics GP. Project Time and Expense Administrator s Guide Release 10.0 Business Portal for Microsoft Dynamics GP Project Time and Expense Administrator s Guide Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable

More information

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide

Dell Recovery Manager for Active Directory 8.6. Quick Start Guide Dell Recovery Manager for Active Directory 8.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6

Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 INTEGRATION GUIDE May 2014 3725-75304-001 Rev B Polycom RSS 4000 / RealPresence Capture Server 1.6 and RealPresence Media Manager 6.6 Polycom, Inc. 0 Copyright 2014, Polycom, Inc. All rights reserved.

More information

2X Cloud Portal v10.5

2X Cloud Portal v10.5 2X Cloud Portal v10.5 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise

More information

Omniquad Exchange Archiving

Omniquad Exchange Archiving Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith

More information

BES10 Self-Service. Version: 10.2. User Guide

BES10 Self-Service. Version: 10.2. User Guide BES10 Self-Service Version: 10.2 User Guide Published: 2014-09-10 SWD-20140908171306471 Contents 1 BES10 Self-Service overview... 4 2 Log in to BES10 Self-Service... 5 3 Activating your device...6 Create

More information

System Administration Training Guide. S100 Installation and Site Management

System Administration Training Guide. S100 Installation and Site Management System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5

More information

Windows Azure Pack Installation and Initial Configuration

Windows Azure Pack Installation and Initial Configuration Windows Azure Pack Installation and Initial Configuration Windows Server 2012 R2 Hands-on lab In this lab, you will learn how to install and configure the components of the Windows Azure Pack. To complete

More information

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note KEMP LoadMaster and Azure Multi- Factor Authentication Technical Note VERSION: 1.0 UPDATED: APRIL 2016 Copyright Notices Copyright 2002-2016 KEMP Technologies, Inc.. All rights reserved.. KEMP Technologies

More information

Security Explorer 9.5. About Security Explorer 9.5. New features. June 2014

Security Explorer 9.5. About Security Explorer 9.5. New features. June 2014 June 2014 These release notes provide information about Dell. About New features s Known issues System requirements Product licensing Getting started with Security Explorer Globalization About Dell About

More information

Setting Up and Using the Funambol Outlook Plug-in v7

Setting Up and Using the Funambol Outlook Plug-in v7 Setting Up and Using the Funambol Outlook Plug-in v7 Contents Introduction.......................................... 2 Requirements for Plug-In Use........................... 2 Installing the Funambol

More information

MGC WebCommander Web Server Manager

MGC WebCommander Web Server Manager MGC WebCommander Web Server Manager Installation and Configuration Guide Version 8.0 Copyright 2006 Polycom, Inc. All Rights Reserved Catalog No. DOC2138B Version 8.0 Proprietary and Confidential The information

More information

CaseWare Time. CaseWare Cloud Integration Guide. For Time 2015 and CaseWare Cloud

CaseWare Time. CaseWare Cloud Integration Guide. For Time 2015 and CaseWare Cloud CaseWare Time CaseWare Cloud Integration Guide For Time 2015 and CaseWare Cloud Copyright and Trademark Notice Copyright. 2015 CaseWare International Inc. ( CWI ). All Rights Reserved. Use, duplication,

More information

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide

VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes

More information

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding

More information

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0

Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.

More information

Content Filtering Client Policy & Reporting Administrator s Guide

Content Filtering Client Policy & Reporting Administrator s Guide Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION

More information

9243054 Issue 1. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation

9243054 Issue 1. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation 9243054 Issue 1 Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation VPN Client User s Guide 9243054 Issue 1 Reproduction, transfer, distribution or storage of part or all of

More information

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability

Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability Dell One Identity Cloud Access Manager 8.0.1- How to Configure for High Availability May 2015 Cloning the database Cloning the STS host Cloning the proxy host This guide describes how to extend a typical

More information

Abila Nonprofit Online. Connection Guide

Abila Nonprofit Online. Connection Guide Abila Nonprofit Online This is a publication of Abila, Inc. 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.0 July 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing Disaster Recovery Version 7.0 July

More information

WhatsUp Gold v16.2 Installation and Configuration Guide

WhatsUp Gold v16.2 Installation and Configuration Guide WhatsUp Gold v16.2 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.2 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines

More information

VERITAS Backup Exec TM 10.0 for Windows Servers

VERITAS Backup Exec TM 10.0 for Windows Servers VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software

More information

Security Explorer 9.5. User Guide

Security Explorer 9.5. User Guide 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or nondisclosure agreement.

More information

Introduction to Unified Device Management with Intune and System Center Configuration Manager

Introduction to Unified Device Management with Intune and System Center Configuration Manager Introduction to Unified Device Management with Intune and System Center Configuration Manager Most IT pros and the IT organizations they work for have the challenge of supporting a wide diversity of apps,

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Strong Authentication for Microsoft TS Web / RD Web

Strong Authentication for Microsoft TS Web / RD Web Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

Installing Management Applications on VNX for File

Installing Management Applications on VNX for File EMC VNX Series Release 8.1 Installing Management Applications on VNX for File P/N 300-015-111 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright

More information

Defender 5.7 - Token Deployment System Quick Start Guide

Defender 5.7 - Token Deployment System Quick Start Guide Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register

More information

Microsoft Dynamics GP. Engineering Data Management Integration Administrator s Guide

Microsoft Dynamics GP. Engineering Data Management Integration Administrator s Guide Microsoft Dynamics GP Engineering Data Management Integration Administrator s Guide Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is

More information

SAM Context-Based Authentication Using Juniper SA Integration Guide

SAM Context-Based Authentication Using Juniper SA Integration Guide SAM Context-Based Authentication Using Juniper SA Integration Guide Revision A Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete

More information

Strong Authentication for Microsoft SharePoint

Strong Authentication for Microsoft SharePoint Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard

More information

IPSec VPN Client Installation Guide. Version 4

IPSec VPN Client Installation Guide. Version 4 IPSec VPN Client Installation Guide Version 4 Document version - 1.0-410003-25/10/2007 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,

More information

User Management Tool 1.5

User Management Tool 1.5 User Management Tool 1.5 2014-12-08 23:32:23 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.5... 3 ShareFile User Management

More information

Cloud-Accelerated Hybrid Scenarios with SharePoint and Office 365

Cloud-Accelerated Hybrid Scenarios with SharePoint and Office 365 Cloud-Accelerated Hybrid Scenarios with SharePoint and Office 365 Contents Contents 1 About this guide 3 Overview 9 Authentication and authorization 10 Getting started with identity integration 26 Getting

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.2 November 2015 Last modified: November 3, 2015 2015 Nasuni Corporation All Rights Reserved Document Information Testing

More information