Set-up an Identity Provider
|
|
|
- Shon Carroll
- 9 years ago
- Views:
Transcription
1 Set-up an Identity Provider Dr. Marco Fargetta Italian Institute for Nuclear Physics (INFN) Bucaramanga (Colombia), November 27, 2012
2 In this tutorial we refer to the Shibboleth IdP Official documentation on-line NOTE: these slides will not replace the official documentation
3 IdPs provide users identities to external services Do not store credentials
4 Credentials must be accessible by the IdP Authentication information can be differently managed
5 The first step is to create or use ax credentials database We use LDAP in this tutorial
6 Configure an LDAP server with several test account Many OS have tool to create and manage an LDAP server Many alternatives available: Apache Directory Studio GQ JXplorer
7 Download and install last version of the Shibboleth Identity Provider Installation is straightforward
8 Install a Java servlet container to run the IdP Many servlet container supported (tomcat 6 is recommended)
9 All the communications run over ssl Configure the servlet container Deploy the idp using a Context Deployment Fragment
10 IdP context <Context docbase="_path/idp/war/idp.war" privileged="true" antiresourcelocking="false" antijarlocking="false" unpackwar="false" swallowoutput="true" /> Put the context in TOMCAT CONF/Catalina/localhost/idp.xml
11 Configuration
12 Retrieve user attributes Configure the attribute to retrieve and the storage Modify the file attribute-resolver.xml
13 Connect the attribute source <resolver:dataconnector id="myldap" xsi:type="dc:ldapdirectory" ldapurl="ldap://directory.ct.infn.it" basedn="ou=people,dc=local" principal="cn=idp,ou=people,dc=local" principalcredential="******"> <dc:filtertemplate> <![CDATA[ (cn=\$requestcontext.principalname) ]]> </dc:filtertemplate> </resolver:dataconnector>
14 Attribute Example <resolver:attributedefinition xsi:type="ad:simple" id=" " sourceattributeid="mail"> <resolver:dependency ref="myldap" /> <resolver:attributeencoder xsi:type="enc:saml1string" name="urn:mace:dir:attribute-def:mail"/> <resolver:attributeencoder xsi:type="enc:saml2string" name="urn:oid: " friendlyname="mail" /> </resolver:attributedefinition>
15 Define the attributes you want provide Normal policy is: as less as possible Modify the file attribute-filter.xml
16 Simple filter <afp:attributefilterpolicy id="attributetoanyone"> <afp:policyrequirementrule xsi:type="basic:any"/> <afp:attributerule attributeid=" "> <afp:permitvaluerule xsi:type="basic:any"/> </afp:attributerule> </afp:attributefilterpolicy>
17 A more complex example <afp:attributefilterpolicy id="attributetoansp"> <afp:policyrequirementrule xsi:type="basic:attributerequesterstring" value=" <afp:attributerule attributeid="edupersonaffiliation"> <afp:permitvaluerule xsi:type="basic:or"> <Rule xsi:type="basic:attributevaluestring" value="affiliate" ignorecase="true"/> <Rule xsi:type="basic:attributevaluestring" value="employee" ignorecase="true"/> </PermitValueRule> </afp:attributerule> </afp:attributefilterpolicy>
18 Users must be authenticated by the IdP More options available: Remote System, LDAP, Kerberos, etc... The authentication to use configured as an handler Set in handler.xml
19 Authentication with Username and Password against LDAP available out-of-the-box The LDAP can be different from the attributes LDAP Configuration in login.config
20 LDAP login configuration edu.vt.middleware.ldap.jaas.ldaploginmodule required ldapurl="ldap://directory.ct.infn.it" basedn="ou=people,dc=local" tls="true" userfilter="cn={0}";
21 IdP has to know in advance the service using it Metadata must be exchanged with all the SPs or federations An IdP can enable multiple federations and/or resources
22 Handler to generate metadata available IdP and SP metadata should be configured Modify the file relying-party.xml
23 IdP Metadata Configuration <metadata:metadataprovider id="idpmd" xsi:type="metadata:resourcebackedmetadataprovider"> <metadata:metadataresource xsi:type="resource:filesystemresource" file="_path_/idp-metadata.xml"/> </metadata:metadataprovider>
24 Federation Metadata Config <metadata:metadataprovider id="myfed" xsi:type="metadata:filebackedhttpmetadataprovider" metadataurl=" backingfile="_path/gridp.xml" disregardsslcertificate="true">
25 Trusted communications among IdP, SP and users Data sharing over ssl Metadata signed by server
26 ssl configured in the servlet container Certificate to sign metadata defined in relying-party.xml Update the metadata when change the certificate
27 Logging system very important to find configuration problem Log output configurable Modify the file logging.xml
28 The login page of the IdP can be customised The code to modify in the installation package Modify the file src/main/webapp/login.jsp in the installation directory
29 Run the installation again Take care to not overwrite configure files when requested
30
31 Task for today Install an IdP to add in a federation: 1 Define your users database 2 Configure the IdP 3 Exchange metadata 4 Customise interface
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected]
Shibboleth Identity Provider (IdP) Sebastian Rieger [email protected] Gesellschaft für wissenschaftliche Datenverarbeitung mbh Göttingen, Germany CLARIN AAI Hands On Workshop, 25.02.2009, Oxford
Shibboleth Configuration from 100,000 Feet, in 15 Minutes or Less! Steve Thorpe Systems Programmer / Analyst MCNC
Shibboleth Configuration from 100,000 Feet, in 15 Minutes or Less! Steve Thorpe Systems Programmer / Analyst MCNC Helpful Skill Sets Include Basic Knowledge Of: Your OS: Linux or Windows Experience using
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
MicroStrategy Intelligence Server Configuration Table of contents
MicroStrategy Intelligence Server Configuration Table of contents 1 Introduction... 2 1.1 Checklist...2 2 Connection to Metadata... 2 3 Connection to Knoa Databases... 10 1 Introduction This section configures
Identity Management in Liferay Overview and Best Practices. Liferay Portal 6.0 EE
Identity Management in Liferay Overview and Best Practices Liferay Portal 6.0 EE Table of Contents Introduction... 1 IDENTITY MANAGEMENT HYGIENE... 1 Where Liferay Fits In... 2 How Liferay Authentication
CORISECIO. Quick Installation Guide Open XML Gateway
Quick Installation Guide Open XML Gateway Content 1 FIRST STEPS... 3 2 INSTALLATION... 3 3 ADMINCONSOLE... 4 3.1 Initial Login... 4 3.1.1 Derby Configuration... 5 3.1.2 Password Change... 6 3.2 Logout...
SSO Plugin. Release notes. J System Solutions. http://www.javasystemsolutions.com Version 3.6
SSO Plugin Release notes J System Solutions Version 3.6 JSS SSO Plugin v3.6 Release notes What's new... 3 Improved Integrated Windows Authentication... 3 BMC ITSM self service... 3 Improved BMC ITSM Incident
Shibboleth N-Tier Support. Chad La Joie [email protected]
Shibboleth N-Tier Support Chad La Joie [email protected] Agenda Use Case Terminology Shibboleth Solution Future Effort Resources 2 Use Case Current use case comes from University of Chicago University
Integration of Shibboleth and (Web) Applications
workshop Integration of Shibboleth and (Web) Applications MPG-AAI Workshop Clarin Centers Prague 2009 2009-11-06 (Web) Application Protection Models Classical Application behind Shibboleth Standard Session
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Federation At Fermilab. Al Lilianstrom National Laboratories Information Technology Summit May 2015
Federation At Fermilab Al Lilianstrom National Laboratories Information Technology Summit May 2015 About Fermilab Since 1967, Fermilab has worked to answer fundamental questions and enhance our understanding
Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions
Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions Server Prerequisites Internet Information Server (IIS). It may be enabled in Windows Features (see Enabling IIS section).
Please return this document to [email protected] when complete.
Section 1 to be completed prior to quote Please return this document to [email protected] when complete. 1. Institution Name: 2. OCLC has selected an institution domain name for this server. This is
SSO Plugin. Integration for Jasper Server. J System Solutions. http://www.javasystemsolutions.com Version 3.6
SSO Plugin Integration for Jasper Server J System Solutions Version 3.6 JSS SSO Plugin Integration with Jasper Server Introduction... 3 Jasper Server user administration... 4 Configuring SSO Plugin...
Running Multiple Shibboleth IdP Instances on a Single Host
CESNET Technical Report 6/2013 Running Multiple Shibboleth IdP Instances on a Single Host IVAN NOVAKOV Received 10.12.2013 Abstract The article describes a way how multiple Shibboleth IdP instances may
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
TypingMaster Intra. LDAP / Active Directory Installation. Technical White Paper (2009-9)
TypingMaster Intra LDAP / Active Directory Installation Technical White Paper (2009-9) CONTENTS Contents... 2 TypingMaster Intra LDAP / Active Directory White Paper... 3 Background INFORMATION... 3 Overall
4cast Server Specification and Installation
4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system
VMware Identity Manager Integration with Active Directory Federation Services 2.0
VMware Identity Manager Integration with Active Directory Federation Services 2.0 VMware Identity Manager J ULY 2015 V 2 Table of Contents Active Directory Federation Services... 2 Configuring AD FS Instance
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
ipad or iphone with Junos Pulse and Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
SchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
StreamServe Persuasion SP5 Control Center
StreamServe Persuasion SP5 Control Center User Guide Rev C StreamServe Persuasion SP5 Control Center User Guide Rev C OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other international patents
Training module 2 Installing VMware View
Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
JMETER - MONITOR TEST PLAN
http://www.tutorialspoint.com JMETER - MONITOR TEST PLAN Copyright tutorialspoint.com In this chapter, we will discuss how to create a Test Plan using JMeter to monitor webservers. The uses of monitor
External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845
JusticeConnect AVL for Windows SETUP GUIDE
JusticeConnect AVL for Windows SETUP GUIDE 1 Table of Contents JusticeConnect AVL Procure Software... 3 JusticeConnect AVL Deploy Software... 3 JusticeConnect AVL First Time Setup... 4 JusticeConnect AVL
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210
Programming on the Web(CSC309F) Tutorial: Servlets && Tomcat TA:Wael Aboelsaadat
Programming on the Web(CSC309F) Tutorial: Servlets && Tomcat TA:Wael Aboelsaadat Acknowledgments : This tutorial is based on a series of articles written by James Goodwill about Tomcat && Servlets. 1 Tomcat
StreamServe Persuasion SP5 StreamStudio
StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B StreamServe Persuasion SP5 StreamStudio Administrator s Guide Rev B OPEN TEXT CORPORATION ALL RIGHTS RESERVED United States and other
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
Crawl Proxy Installation and Configuration Guide
Crawl Proxy Installation and Configuration Guide Google Enterprise EMEA Google Search Appliance is able to natively crawl secure content coming from multiple sources using for instance the following main
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Configuring User Identification via Active Directory
Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] User Identification Overview User Identification allows you to create security policies based
BMC Software Webinars 2013 Atrium Single Sign On (Atrium SSO)
BMC Software Webinars 2013 Atrium Single Sign On (Atrium SSO) An introduction Vincent Lasfargues Atrium Customer Engineering Contributors: John Stamps, Murali Balijepally, Karl Miller, Rahul Vedak, Volodymyr
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
Security Provider Integration Kerberos Authentication
Security Provider Integration Kerberos Authentication 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are
UNIX PINE Setup process to access Exchange Mail Account
This document describes how to set up Pine using the UMCE Login Service to access your Exchange email account. 1. Use SSH software to connect to the Login Service (login.itd.umich.edu). At the Unix prompt,
VERALAB LDAP Configuration Guide
VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to
Apple Pro Training Series. OS X Server. Essentials. Arek Dreyer. and Ben Greisler
Apple Pro Training Series OS X Server Essentials Arek Dreyer and Ben Greisler Table of Contents Configuring and Monitoring OS X Server Lesson 1 About This Guide 3 Learning Methodology 4 Lesson Structure
MICROSTRATEGY 9.3 Supplement Files Setup Transaction Services for Dashboard and App Developers
NOTE: You can use these instructions to configure instructor and student machines. Software Required Microsoft Access 2007, 2010 MicroStrategy 9.3 Microsoft SQL Server Express 2008 R2 (free from Microsoft)
PingFederate. Identity Menu Builder. User Guide. Version 1.0
Identity Menu Builder Version 1.0 User Guide 2011 Ping Identity Corporation. All rights reserved. Identity Menu Builder User Guide Version 1.0 April, 2011 Ping Identity Corporation 1099 18th Street, Suite
IUCLID 5 Guidance and Support
IUCLID 5 Guidance and Support Web Service Installation Guide July 2012 v 2.4 July 2012 1/11 Table of Contents 1. Introduction 3 1.1. Important notes 3 1.2. Prerequisites 3 1.3. Installation files 4 2.
Eylean server deployment guide
Eylean server deployment guide Contents 1 Minimum software and hardware requirements... 2 2 Setting up the server using Eylean.Server.Setup.exe wizard... 2 3 Manual setup with Windows authentication -
Avalanche Site Edition
Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,
Identikey Server Windows Installation Guide 3.1
Identikey Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
OpenSSO: Simplify Your Single-Sign-On Needs. Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com
OpenSSO: Simplify Your Single-Sign-On Needs Sang Shin Java Technology Architect Sun Microsystems, inc. javapassion.com 1 Agenda Enterprise security needs What is OpenSSO? OpenSSO features > > > > SSO and
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
External Authentication with CiscoSecure ACS. Authenticating Users Using. SecurAccess Server. by SecurEnvoy
External Authentication with CiscoSecure ACS Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business
For details for obtaining this later version; see the Known issues & Limitations, section at the end of this document.
Note: This is the version of Entourage which comes as part of the Microsoft Office 2008 for Mac suite. Microsoft has now released Entourage 2008 Web Services Edition, in our testing this later version
JOSSO 2.4. Internet Information Server (IIS) Tutorial
JOSSO 2.4 Internet Information Server (IIS) Tutorial JOSSO 2.4 : Internet Information Server (IIS) Tutorial 1. Introduction... 1 2. Prerequisites... 2 3. Defining Identity Appliance Elements... 3 3.1.
SAML-Based SSO Solution
About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,
An Advanced Fallback Authentication Framework for SAS 9.4 and SAS Visual Analytics
Paper SAS102-2014 An Advanced Fallback Authentication Framework for SAS 9.4 and SAS Visual Analytics Zhiyong Li, SAS Institute; Mike Roda, SAS Institute ABSTRACT SAS 9.4 and SAS Visual Analytics (VA) support
Configure Single Sign on Between Domino and WPS
Configure Single Sign on Between Domino and WPS What we are doing here? Ok now we have the WPS server configured and running with Domino as the LDAP directory. Now we are going to configure Single Sign
Security Provider Integration Kerberos Server
Security Provider Integration Kerberos Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Workspot Configuration Guide for the Cisco Adaptive Security Appliance
Workspot Configuration Guide for the Cisco Adaptive Security Appliance Workspot, Inc. 1/27/2015 Cisco ASA and Workspot Overview The Cisco Adaptive Security Appliance (ASA) provides organizations with secure,
Computer Services Documentation
Computer Services Documentation Shibboleth Documentation {Shibboleth & Google Apps Integration} John Paul Szkudlapski June 2010 Note: These case studies, prepared by member organisations of the UK federation,
External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy
External authentication with Fortinet Fortigate UTM appliances Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
Integrating SAP BusinessObjects with Hadoop. Using a multi-node Hadoop Cluster
Integrating SAP BusinessObjects with Hadoop Using a multi-node Hadoop Cluster May 17, 2013 SAP BO HADOOP INTEGRATION Contents 1. Installing a Single Node Hadoop Server... 2 2. Configuring a Multi-Node
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
Windows Azure Multi-Factor Authentication
Windows Azure Multi-Factor Authentication Netop develops and sells software solutions that enable swift, secure and seamless transfer of video, screens, sounds and data between two or more computers over
Q&A Session for Understanding Atrium SSO Date: Thursday, February 14, 2013, 8:00am Pacific
Q: Is the challenge required or can pass through authentication be used with regard to automatic login after you login to your corporate domain? A: You can configure the system to pass on the challenge
Mozilla Thunderbird: Setup & Configuration Learning Guide
Mozilla Thunderbird: Setup & Configuration Learning Guide Exchange Email at Tufts Below you will find some nomenclature to help familiarize you with the Tufts email system. Term UTLN Email Address Exchange
Configuring Thunderbird with UEA Exchange 2007:
Configuring Thunderbird with UEA Exchange 2007: This document covers Thunderbird v10.0.2 please contact [email protected] if you require an upgrade. Mail Account Setup. Step 1: Open Thunderbird, you should
DIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations
Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS)
w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Configuration for Active Directory Federation Services (ADFS) To set up ADFS so that your employees can access Egnyte using their ADFS credentials,
NetIQ Identity Manager Setup Guide
NetIQ Identity Manager Setup Guide July 2015 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Protected Trust Directory Sync Guide
Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide 2 Overview Protected Trust Directory Sync enables your organization to synchronize the users and distribution lists in Active Directory
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
Perceptive Experience Single Sign-On Solutions
Perceptive Experience Single Sign-On Solutions Technical Guide Version: 2.x Written by: Product Knowledge, R&D Date: January 2016 2016 Lexmark International Technology, S.A. All rights reserved. Lexmark
Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO
Configuring EPM System 11.1.2.1 for SAML2-based Federation Services SSO Scope... 2 Prerequisites Tasks... 2 Procedure... 2 Step 1: Configure EPM s WebLogic domain for SP Federation Services... 2 Step 2:
SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit
SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit Note: SecureAware version 3.7 and above contains all files and setup configuration needed to use Microsoft IIS as a front end web server. Installing
PUBLIC Secure Login for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP04 Document Version: 1.0-2014-10-28 PUBLIC Secure Login for SAP Single Sign-On Implementation Guide Table of Contents 1 What Is Secure Login?....8 1.1 System Overview.... 8 1.1.1
How do I use Citrix Staff Remote Desktop
How do I use Citrix Staff Remote Desktop September 2014 Initial Log On In order to login into the new Citrix system, you need to go to the following web address. https://remotets.tees.ac.uk/ Be sure to
Quality Center LDAP Guide
Information Services Quality Assurance Quality Center LDAP Guide Version 1.0 Lightweight Directory Access Protocol( LDAP) authentication facilitates single sign on by synchronizing Quality Center (QC)
AAF boost. AAF boost 2014 report for AAF EXAMPLE ORGANISATION
2014 AAF boost 2014 report for AAF EXAMPLE ORGANISATION This report focuses on the following 4 key areas to help boost your connection to the federation: Assurance; Awareness of federation tools; Your
EMC Documentum Content Services for SAP Repository Manager
EMC Documentum Content Services for SAP Repository Manager Version 6.0 Installation Guide P/N 300 005 500 Rev A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000 www.emc.com
Avigilon Control Center System Integration Guide
Avigilon Control Center System Integration Guide with STENTOFON AlphaCom INT-STENTOFON-B-Rev3 Copyright 2013 Avigilon. All rights reserved. No copying, distribution, publication, modification, or incorporation
Active Directory Requirements and Setup
Active Directory Requirements and Setup The information contained in this document has been written for use by Soutron staff, clients, and prospective clients. Soutron reserves the right to change the
Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta
Zendesk SSO with Cloud Secure using MobileIron MDM Server and Okta Configuration Guide Product Release Document Revisions Published Date 1.0 1.0 May 2016 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San
About Me. #ccceu. @shapeblue. Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack
Software Architect with ShapeBlue Specialise in. 3 rd party integrations and features in CloudStack About Me KVM, API, DB, Upgrades, SystemVM, Build system, various subsystems Contributor and Committer
WebNow Single Sign-On Solutions
WebNow Single Sign-On Solutions Technical Guide ImageNow Version: 6.7. x Written by: Product Documentation, R&D Date: June 2015 2012 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
Snow Active Directory Discovery
Product Snow Active Directory Discovery Version 1.0 Release date 2014-04-29 Document date 2014-04-29 Snow Active Directory Discovery Installation & Configuration Guide Page 2 of 9 This document describes
Administration Guide. BlackBerry Resource Kit for BlackBerry Enterprise Service 10. Version 10.2
Administration Guide BlackBerry Resource Kit for BlackBerry Enterprise Service 10 Version 10.2 Published: 2015-11-12 SWD-20151112124107981 Contents Overview: BlackBerry Enterprise Service 10... 8 Overview:
UPGRADING TO XI 3.1 SP6 AND SINGLE SIGN ON. Chad Watson Sr. Business Intelligence Developer
UPGRADING TO XI 3.1 SP6 AND SINGLE SIGN ON Chad Watson Sr. Business Intelligence Developer UPGRADING TO XI 3.1 SP6 What Business Objects Administrators should consider before installing a Service Pack.
SSO Plugin. J System Solutions. Upgrading SSO Plugin 3x to 4x - BMC AR System & Mid Tier. http://www.javasystemsolutions.com
SSO Plugin Upgrading SSO Plugin 3x to 4x - BMC AR System & Mid Tier J System Solutions JSS SSO Plugin Upgrading 3x to 4x Introduction... 3 [Prerequisite] Generate a new license... 4 [Prerequisite] Download
Accessing the Media General SSL VPN
Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your
SSO Plugin. Case study: Integrating with Ping Federate. J System Solutions. http://www.javasystemsolutions.com. Version 4.0
SSO Plugin Case study: Integrating with Ping Federate J System Solutions Version 4.0 JSS SSO Plugin v4.0 Release notes Introduction... 3 Ping Federate Service Provider configuration... 4 Assertion Consumer
CRASH IDP Hardware/Software Recommendation
CRASH IDP Hardware/Software Recommendation Crash Reporting and Analysis for Safer Highways (CRASH) CRASH Identity Provider Recommendation VERSION 1.6 Revision Date: January 7, 2013 Table of Contents Section
Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning
Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux
Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names
DataCove DT Active Directory Authentication In Active Directory (AD) authentication mode, the server uses NTLM v2 and LDAP protocols to authenticate users residing in Active Directory. The login procedure
NetBeat NAC Version 9.2 Build 4 Release Notes
NetBeat NAC Version 9.2 Build 4 Release Notes NetBeat NAC Appliance version 9.2 Build 4 includes the following: Windows Server 2012 Active Directory Support Active Directory Integration NetBeat NAC Appliance
360 Online authentication
360 Online authentication Version October 2015 This document will help you set up a trust for authentication of 360 Online users between Azure Access Control Service and either Office 365 or Active Directory
DEPLOYMENT ROADMAP March 2015
DEPLOYMENT ROADMAP March 2015 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and may
