NISHA Node Configuration and Maintenance Manual
|
|
|
- Margery Copeland
- 9 years ago
- Views:
Transcription
1 NISHA Node Configuration and Maintenance Manual NISHA Proxy The NISHA Proxy component requires very little configuration. Based on the NISHA Node being configured, the configuration files need to change. The default configuration installed with the package delivers settings for running the Basic Node. Installation assumes that the CouchDB backend is localized at the same machine. This can be changed by editing the /etc/nginx/sites-enabled/nisha configuration file. Change all occurrences of proxy_pass to reflect where your CouchDB is located and what port it listens on. Restart nginx server after making the change. In case of installation of a Super Node, the configuration has to be changed. Please replace the /etc/nginx/sites-enabled/nisha with contents as in example below: proxy_cache_path /var/lib/nginx/cache levels=1:2 keys_zone=cache:30m max_size=1g; proxy_temp_path /var/lib/nginx/proxy 1 2; proxy_ignore_headers Expires Cache-Control; proxy_cache_use_stale error timeout invalid_header http_502; server { listen 1337; server_name localhost; location / { proxy_pass proxy_intercept_errors on; proxy_redirect off; proxy_set_header Host $host; proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for; break; } } The example also assumes that the Super Node CouchDB is located on the same machine. In case it isn t, please change the proxy_pass line accordingly and restart nginx server. In case of Basic Node installation, the Node s administrator can configure which Super Nodes can be used for searching the network by changing entries in the /etc/nginx/includes/supernodes.conf file.
2 upstream supernodes { server nisha1.cert.pl:1337; server fisha1.govcert.hu:1337; server nisha1.if-is.net:1337; server nisha1.cert.pt:1337; } Removing or adding another supernodes allows to balance traffic from Basic Nodes when searching and publishing in the NISHA Network. NISHA Node Manager The NISHA Node Manager component can be configured via changing settings in the /etc/nisha/nisha-node-manager.properties file. The standard contents of the file are as in the example below: [node-manager] couchdb_port=5984 couchdb_nisha_user=nisha couchdb_http_socket_timeout=20000 couchdb_admin_user=admin couchdb_nisha_password= couchdb_admin_password= node_description=nisha Basic Node couchdb_host=localhost The file is read by the web configuration utility during restart of the tomcat7 web application server. The following settings have to be set accordingly as during the installation process: couchdb_admin_user Username of the CouchDB administrator. Usually admin. couchdb_nisha_user Username of the CouchDB user for the NISHA Network. Usually nisha. couchdb_admin_password Please set the password of the user admin. couchdb_nisha_password Please set the password of the user nisha. couchdb_host Please set FQDN where the CouchDB server is installed. Leave localhost in case it is the same machine couchdb_port Please set the port CouchDB is listening on. Usually it has value of After changing the values please restart the tomcat7 web application server by issuing command as in example below:
3 service tomcat7 restart NISHA Replicator The NISHA Replicator component can be configured via changing settings in the /etc/nisha/nisha-replicator.properties file. The standard contents of the file are as in the example below: [replicator] couchdb_host = localhost couchdb_port = 5984 node_id = couchdb_admin_user = admin couchdb_admin_password = couchdb_nisha_user = nisha couchdb_nisha_password = couchdb_http_socket_timeout=20000 replicationintervalinmills=4000 The file is read by the web configuration utility during restart of the nisha-replicator service. The following settings have to be set accordingly as during the installation process: node_id This setting is responsible for identification of a NISHA Node. It has to be set to the URL describing connection to the node. This usually has for of <FQDN>:<port>, where FQDN is the full domain name of the node and port is the port to the nisha-proxy component (usually it has value of 1337). couchdb_admin_user Username of the CouchDB administrator. Usually admin. couchdb_nisha_user Username of the CouchDB user for the NISHA Network. Usually nisha. couchdb_admin_password Please set the password of the user admin. couchdb_nisha_password Please set the password of the user nisha. couchdb_host Please set FQDN where the CouchDB server is installed. Leave localhost in case it is the same machine couchdb_port Please set the port CouchDB is listening on. Usually it has value of replicationintervalinmills This setting describes how often the replication process will be triggered. Typical value is 4 sec. You can change it to you needs. The greater the value, the longer it will take to push new data from the Node to the NISHA Network. After changing the values please restart the nisha-replicator service by issuing command as in example below:
4 service nisha-replicator restart NISHA Node Hardening It is important to harden access to the NISHA Node. Each Node is a responsibility of an institution owning the Node. It is advised to filter access to the Node and allow only connections made from local Portal and other Nodes in the NISHA Network. To facilitate this task please use the iptables tool shipped with the Debian Linux distribution. Please allow connections only from other Nodes in the NISHA Network to ports: 1337 The port is used to connect to the NISHA Network Proxy component. It is used to post and search for content in the Network This port is used to check whether the NISHA Replicator component is working and active. In case this port is not reachable, the Node is treated as not working and disconnected from the NISHA Network. NISHA Node First configuration The NISHA Node after installation is in inactive state. It has to be activated by one of NISHA Super Nodes and be assigned a role of either Super or Basic Node. Node s and Network configuration is handled by the NISHA Node Manager component which is a web-based configuration tool. It can be accessed by a web browser under the URL
5 The first time the NISHA Manager is accessed we need to configure local data describing the NISHA Node. Please continue to the Configure local data page. This page allows configuration of several settings relevant for proper operation of the NISHA Node. These are: Node Domain Name The domain name (FQDN) of the Node. Port The port number on which the NISHA Proxy component is listening for connections. Description A short description of the Node. Location
6 A short description of location the Node is in. For example country or city. Operator Id A first operator username. Password A password for the operator. of the operator. After saving the configuration, the Node is ready to be added to the NISHA Network. Node maintenance The section describes a typical operator work regarding NISHA Node maintenance. To access the configuration UI please login with credentials configured in previous step. The configuration UI presents several options:
7 Configuration section The Configuration link leads to the same configuration screen as the first configuration of a Node. The Contact link leads to a screen where an operator can update contact information. This is only for informational purposes. The Logged operator link on the main page leads to a similar screen where an operator can update password and contact information. NISHA Network section The section allows to configure and maintain information about NISHA Network. The New Node link leads to a page allowing adding new NISHA Node to the network. This only works if the management interface operates on the NISHA Super Node.
8 When adding a new Node to the network a Super Node operator has to provide a FQDN of the NISHA Node, port it listens on and its assigned role. The state should be left as ACTIVE. The new NISHA Node has to be configured before adding it to the NISHA Network. The Network update section provides information about all NISHA Nodes configured in the network. A Super Node operator can then view details of a particular Node, remove it or update its configuration, e.g. change its state in the NISHA Network.
9 The section Alerts holds information about problems occurring in the NISHA Network. These are related to communication problems between nodes and allow operators to monitor network state. Alerts serve only informative purpose and can be easily dismissed if found not relevant anymore.
10 Messages section NISHA Node Manager is equipped with basic functionality allowing for inter-network communication between operators of NISHA Nodes. This system relies on NISHA Network infrastructure and does not require any configuration and can be used by operators out-ofthe-box. The system allows to send multicast (just chosen recipients) or broadcast (all nodes) messages. Users can also attach files to messages and save them for later use as drafts.
11 The NISHA Node Manager provides Inbox and Outbox for messages, where operators can see communication between them as it happens on the Network. The Inbox works also as a task list in case the message requires special attention and allows to mark messages as done. Inbox view: Outbox view:
12 The special broadcast messages have their own inbox to distinguish them from Node-to- Node communication. Resources section This section allows browsing through resources in the whole NISHA Network. This view is intended only to search for specific articles and perform operations on them. Currently only one operation is supported, named Invalidate. It allows to mark articles as not to be used in publishing. This serves as a mechanism for removing unwanted content from the network without actually deleting the content. Only Super Node operators are capable of invalidating articles in the NISHA Network.
13 Summary The NISHA Node Manager is a simple tool allowing basic interaction with the NISHA Network and easing the process of building own network capable of handling article and message exchange between Nodes and Portals. The tool has to be installed on Nodes to configure them. Interface on Basic Nodes has similar but reduced capabilities to reflect Node s role in the NISHA Network.
Configuration Worksheets for Oracle WebCenter Ensemble 10.3
Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the
Pexip Infinity Reverse Proxy Deployment Guide
Pexip Infinity Reverse Proxy Deployment Guide Introduction About the Pexip App and reverse proxies The Pexip App for mobile devices such as ios phones and tablets enables conference participants to extend
Running Nginx as Reverse Proxy server
Running Nginx as Reverse Proxy server October 30 2011 This is a tutorial on running Nginx as a reverse proxy server. It covers all basics of using Nginx as a reverse proxy server. By Ayodhyanath Guru www.jafaloo.com
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
Using the VCDS Application Monitoring Tool
CHAPTER 5 This chapter describes how to use Cisco VQE Client Configuration Delivery Server (VCDS) Application Monitoring Tool (AMT). VCDS is a software component installed on each VQE Tools server, the
Pcounter Web Administrator User Guide - v2014-09-08. Pcounter Web Administrator User Guide Version 1.0
Pcounter Web Administrator User Guide - v2014-09-08 Pcounter Web Administrator User Guide Version 1.0 Table of Contents Table of Contents... 2 Overview... 3 Installation Prerequisites and Requirements...
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.2.0.XXX (DRAFT Document) Requirements and Implementation Guide (Rev5-113009) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis
Secure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.
Enabling Integrated Windows Authentication For CitectSCADA Web Client Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.xx Summary: What is the difference between Basic Authentication and Windows
CYAN SECURE WEB HOWTO. NTLM Authentication
CYAN SECURE WEB HOWTO June 2008 Applies to: CYAN Secure Web 1.4 and above NTLM helps to transparently synchronize user names and passwords of an Active Directory Domain and use them for authentication.
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable
Dragonframe License Manager User Guide Version 1.2.2
Dragonframe License Manager User Guide Version 1.2.2 The Dragonframe License Manager (DFLM) provides floating license management for Dragonframe 3.0 and above. You must contact support ([email protected])
CumuLogic Load Balancer Overview Guide. March 2013. CumuLogic Load Balancer Overview Guide 1
CumuLogic Load Balancer Overview Guide March 2013 CumuLogic Load Balancer Overview Guide 1 Table of Contents CumuLogic Load Balancer... 3 Architectural Overview of CumuLogic Load Balancer... 4 How to Use
Sophos Mobile Control Installation guide. Product version: 3.5
Sophos Mobile Control Installation guide Product version: 3.5 Document date: July 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...10 4 External
Mobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: [email protected] Information in this document is subject to change without notice. Companies names
2.2.1. Astaro User Portal: Getting Software and Certificates...13. 2.2.2. Astaro IPsec Client: Configuring the Client...14
1. Introduction... 2 2. Remote Access via IPSec... 2 2.1. Configuration of the Astaro Security Gateway... 2 2.2. Configuration of the Remote Client...13 2.2.1. Astaro User Portal: Getting Software and
TECHNICAL REFERENCE. Version 1.0 August 2013
TECHNICAL REFERENCE Version 1.0 August 2013 Technical Reference IPWeb 1.0 Copyright EVS Broadcast Equipment S.A. Copyright 2013. All rights reserved. Disclaimer The information in this manual is furnished
Welcome to Collage (Draft v0.1)
Welcome to Collage (Draft v0.1) Table of Contents Welcome to Collage (Draft v0.1)... 1 Table of Contents... 1 Overview... 2 What is Collage?... 3 Getting started... 4 Searching for Images in Collage...
Configuring Web services
Configuring Web services (Week 13, Tuesday 11/14/2006) Abdou Illia, Fall 2006 1 Learning Objectives Install Internet Information Services programs Configure FTP sites Configure Web sites 70-216:8 @0-13:16/28:39
White Paper DEPLOYING WDK APPLICATIONS ON WEBLOGIC AND APACHE WEBSERVER CLUSTER CONFIGURED FOR HIGH AVAILABILITY AND LOAD BALANCE
White Paper DEPLOYING WDK APPLICATIONS ON WEBLOGIC AND APACHE WEBSERVER CLUSTER CONFIGURED FOR HIGH AVAILABILITY AND LOAD BALANCE Abstract This White Paper provides information to deploy WDK based applications
QliqDIRECT Active Directory Guide
QliqDIRECT Active Directory Guide QliqDIRECT is a Windows Service with Active Directory Interface. QliqDIRECT resides in your network/server and communicates with Qliq cloud servers securely. QliqDIRECT
REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series
DEPLOYMENT GUIDE Version 1.1. Deploying F5 with Oracle Application Server 10g
DEPLOYMENT GUIDE Version 1.1 Deploying F5 with Oracle Application Server 10g Table of Contents Table of Contents Introducing the F5 and Oracle 10g configuration Prerequisites and configuration notes...1-1
How to install IDA floating licenses on a Windows server
How to install IDA floating licenses on a Windows server To be able to use the IDA floating licenses, you need to first configure a license management server, FlexNet license manager in our case. The workstations
Implementing Reverse Proxy Using Squid. Prepared By Visolve Squid Team
Implementing Reverse Proxy Using Squid Prepared By Visolve Squid Team Introduction What is Reverse Proxy Cache About Squid How Reverse Proxy Cache work Configuring Squid as Reverse Proxy Configuring Squid
BusinessObjects Enterprise XI Release 2
BusinessObjects Enterprise XI Release 2 How to configure an Internet Information Services server as a front end to a WebLogic application server Overview Contents This document describes the process of
deploying meteor with meteor up
deploying meteor with meteor up reference http://code.krister.ee/hosting-multiple-instances-of-meteor-on-digitalocean/ https://rtcamp.com/tutorials/nodejs/node-js-npm-install-ubuntu/ https://gentlenode.com/journal/meteor-19-deploying-your-applications-in-asnap-with-meteor-up-mup/41
Portal User Guide. Customers. Version 1.1. May 2013 http://www.sharedband.com 1 of 5
Portal User Guide Customers Version 1.1 May 2013 http://www.sharedband.com 1 of 5 Table of Contents Introduction... 3 Using the Sharedband Portal... 4 Login... 4 Request password reset... 4 View accounts...
EQUELLA. Clustering Configuration Guide. Version 6.0
EQUELLA Clustering Configuration Guide Version 6.0 Document History Document No. Reviewed Finalised Published 1 17/10/2012 17/10/2012 17/10/2012 October 2012 edition. Information in this document may change
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
AVG Business Secure Sign On Active Directory Quick Start Guide
AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and
Administrative Guide VtigerCRM Microsoft Exchange Connector (Exchange Server 2010)
Administrative Guide VtigerCRM Microsoft Exchange Connector (Exchange Server 2010) Table of Contents Introduction...3 Requirements...4 Installation...5 Vtiger Server Component...5 Exchange Server Component...6
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
SpringCM Troubleshooting Guide for Salesforce
SpringCM Troubleshooting Guide for Salesforce July 2013 TABLE OF CONTENTS FAQS:... 3 WHY DID I NOT RECEIVE A SPRINGCM ACTIVATION EMAIL?... 3 WHY DON T MY SALESFORCE USERS HAVE ACCESS TO SPRINGCM?... 3
SonicWALL Email Security Quick Start Guide. Version 4.6
SonicWALL Email Security Quick Start Guide Version 4.6 Quick Start Guide - Introduction This document guides you through the most basic steps to set up and administer SonicWALL Email Security. For more
Configure Cisco Unified Customer Voice Portal
Cisco Unified Customer Voice Portal Configuration, page 1 Configure Gateways, page 1 Transfer Unified CVP Scripts and Media Files, page 2 Unified Customer Voice Portal Licenses, page 2 Configure SNMP,
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
IBM WebSphere Application Server Communications Enabled Applications Setup guide
Copyright IBM Corporation 2009, 2011 All rights reserved IBM WebSphere Application Server Communications Enabled Applications Setup guide What this exercise is about... 1 Lab requirements... 2 What you
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
NETASQ ACTIVE DIRECTORY INTEGRATION
NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos
White Paper. Installation and Configuration of Fabasoft Folio IMAP Service. Fabasoft Folio 2015 Update Rollup 3
White Paper Fabasoft Folio 2015 Update Rollup 3 Copyright Fabasoft R&D GmbH, Linz, Austria, 2016. All rights reserved. All hardware and software names used are registered trade names and/or registered
Sophos Mobile Control Installation guide. Product version: 3
Sophos Mobile Control Installation guide Product version: 3 Document date: January 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...4 3 Set up Sophos Mobile Control...16 4 External
EVS Broadcast Equipment S.A. Copyright 2013. All rights reserved.
Copyright EVS Broadcast Equipment S.A. Copyright 2013. All rights reserved. Disclaimer The information in this manual is furnished for informational use only and subject to change without notice. While
App Orchestration 2.5
App Orchestration 2.5 Configuring SSL for App Orchestration 2.5 Prepared by: Andy Zhu Last Updated: July 25, 2014 Contents Introduction... 3 Configure SSL on the App Orchestration configuration server...
Install an SSL Certificate onto SilverStream. Sender Recipient Attached FIles Pages Date. Development Internal/External None 5 6/16/08
Technical Note Sender Recipient Attached FIles Pages Date Development Internal/External None 5 6/16/08 This technical note explains how to generate a Certificate Signing Request (CSR) and install an SSL
Deploying Intellicus Portal on IBM WebSphere
Deploying Intellicus Portal on IBM WebSphere Intellicus Web-based Reporting Suite Version 4.5 Enterprise Professional Smart Developer Smart Viewer Intellicus Technologies [email protected] www.intellicus.com
vcenter Chargeback User s Guide vcenter Chargeback 1.0 EN-000186-00
vcenter Chargeback 1.0 EN-000186-00 You can find the most up-to-date technical documentation on the VMware Web site at: http://www.vmware.com/support/ The VMware Web site also provides the latest product
How To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal 1.1.3 On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (
Avaya one X Portal 1.1.3 Lightweight Directory Access Protocol (LDAP) over Secure Socket Layer (SSL) Configuration This document provides configuration steps for Avaya one X Portal s 1.1.3 communication
Sophos Mobile Control Installation guide. Product version: 3.6
Sophos Mobile Control Installation guide Product version: 3.6 Document date: November 2013 Contents 1 Introduction...3 2 The Sophos Mobile Control server...5 3 Set up Sophos Mobile Control...11 4 External
How To Connect A Gemalto To A Germanto Server To A Joniper Ssl Vpn On A Pb.Net 2.Net 3.5.1 (Net 2) On A Gmaalto.Com Web Server
Application Note: Integrate Juniper SSL VPN with Gemalto SA Server [email protected] October 2007 www.gemalto.com Table of contents Table of contents... 2 Overview... 3 Architecture... 5 Configure
VOIP-500 Series Phone CUCM 8.0.3a Integration Guide
I. Introduction This provides general instructions for integration of the VOIP-500 Series Phone with a Cisco Call Manager installation. It is recommended to read this instruction set completely before
SyncThru TM Web Admin Service Administrator Manual
SyncThru TM Web Admin Service Administrator Manual 2007 Samsung Electronics Co., Ltd. All rights reserved. This administrator's guide is provided for information purposes only. All information included
How To Install An Org Vm Server On A Virtual Box On An Ubuntu 7.1.3 (Orchestra) On A Windows Box On A Microsoft Zephyrus (Orroster) 2.5 (Orner)
Oracle Virtualization Installing Oracle VM Server 3.0.3, Oracle VM Manager 3.0.3 and Deploying Oracle RAC 11gR2 (11.2.0.3) Oracle VM templates Linux x86 64 bit for test configuration In two posts I will
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
User Guide. Cloud Gateway Software Device
User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).
Using MailStore to Archive MDaemon Email
Using MailStore to Archive MDaemon Email This guide details how to archive all inbound and outbound email using MailStore, as well as archiving any emails currently found in the users accounts in MDaemon.
How To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
Introduction to Google Apps for Business Integration
Introduction to Google Apps for Business Integration Overview Providing employees with mobile email access can introduce a number of security concerns not addressed by most standard email security infrastructures.
Managing Qualys Scanners
Q1 Labs Help Build 7.0 Maintenance Release 3 [email protected] Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access
Chapter 8 Monitoring and Logging
Chapter 8 Monitoring and Logging This chapter describes the SSL VPN Concentrator status information, logging, alerting and reporting features. It describes: SSL VPN Concentrator Status Active Users Event
Gigabyte Content Management System Console User s Guide. Version: 0.1
Gigabyte Content Management System Console User s Guide Version: 0.1 Table of Contents Using Your Gigabyte Content Management System Console... 2 Gigabyte Content Management System Key Features and Functions...
Sophos UTM. Remote Access via IPsec. Configuring UTM and Client
Sophos UTM Remote Access via IPsec Configuring UTM and Client Product version: 9.000 Document date: Friday, January 11, 2013 The specifications and information in this document are subject to change without
Prerequisites and Configuration Guide
Prerequisites and Configuration Guide Informatica Support Console (Version 2.0) Table of Contents Chapter 1: Overview.................................................... 2 Chapter 2: Minimum System Requirements.................................
Manual Password Depot Server 8
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
Volume SYSLOG JUNCTION. User s Guide. User s Guide
Volume 1 SYSLOG JUNCTION User s Guide User s Guide SYSLOG JUNCTION USER S GUIDE Introduction I n simple terms, Syslog junction is a log viewer with graphing capabilities. It can receive syslog messages
Configuring Trend Micro Content Security
9 CHAPTER This chapter describes how to configure the CSC SSM using the CSC Setup Wizard in ASDM and the CSC SSM GUI, and includes the following sections: Information About the CSC SSM, page 9-1 Licensing
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Windows Mobile from Vodafone
Windows Mobile from Vodafone 1 Getting Started 2 1.1 Introduction 2 1.2 Conditions 2 1.3 Compatible devices for Windows Mobile solution 2 1.4 Device Configuration 2 1.4.1 Automatic device configuration
Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite. Abstract
Configuring Single Sign-On for Documentum Applications with RSA Access Manager Product Suite Abstract This white paper outlines the deployment and configuration of a Single Sign-On solution for EMC Documentum
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS
White Paper TROUBLESHOOTING RSA ACCESS MANAGER SINGLE SIGN-ON FOR WEB-BASED APPLICATIONS Abstract This white paper explains how to diagnose and troubleshoot issues in the RSA Access Manager single sign-on
System Area Manager. Remote Management
System Area Manager Remote Management Remote Management System Area Manager provides remote management functions for its managed systems, including Wake on LAN, Shutdown, Restart, Remote Console and for
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1
UNIFIED MEETING 5 SECURITY WHITEPAPER [email protected] INTERCALL.COM 800.820.5855 1 As organizations unlock the true potential of meeting over the web as an alternative to costly and timeconsuming travel,
WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560
WatchGuard SSL v3.2 Update 1 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 445469 Revision Date 3 April 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard
Eucalyptus 3.4.2 User Console Guide
Eucalyptus 3.4.2 User Console Guide 2014-02-23 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...4 Install the Eucalyptus User Console...5 Install on Centos / RHEL 6.3...5 Configure
AVG Business SSO Connecting to Active Directory
AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud
How to Configure Active Directory based User Authentication
How to Configure Active Directory based User Authentication You Must Have: Microsoft server with Active Directory configured. Windows 2000 Server is configured as Active Directory server in this example.
Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
Table of Contents. Open-Xchange Authentication & Session Handling. 1.Introduction...3
Open-Xchange Authentication & Session Handling Table of Contents 1.Introduction...3 2.System overview/implementation...4 2.1.Overview... 4 2.1.1.Access to IMAP back end services...4 2.1.2.Basic Implementation
CHAPTER 7 SSL CONFIGURATION AND TESTING
CHAPTER 7 SSL CONFIGURATION AND TESTING 7.1 Configuration and Testing of SSL Nowadays, it s very big challenge to handle the enterprise applications as they are much complex and it is a very sensitive
How To Upgrade To Symantec Mail Security Appliance 7.5.5
Release notes Information Foundation 2007 Symantec Mail Security Appliance 7.5 Copyright 1999-2007 Symantec Corporation. All rights reserved. Before installing or upgrading: Migration issues If you are
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
Configuring the Samsung SDS CellWe EMM cloud connector
Appendix 3 Configuring the Samsung SDS CellWe EMM cloud connector This appendix explains how to use the Samsung SDS CellWe EMM cloud connector configuration program to configure and monitor your cloud
PowerLink for Blackboard Vista and Campus Edition Install Guide
PowerLink for Blackboard Vista and Campus Edition Install Guide Introduction...1 Requirements... 2 Authentication in Hosted and Licensed Environments...2 Meeting Permissions... 2 Installation...3 Configuring
Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide
Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without
Configuration Manual English version
Configuration Manual English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
User Guide - escan for Linux File Server
1 User Guide - escan for Linux File Server 2 I. Required escan for Linux RPMS / Debian packages RPM Package Name File name mwadmin mwav escan escan-rtm mwadmin-x.x-x..i386.rpm mwav-x.x-x.
Accessing the FTP Server - User Manual
CENTRAL BANK OF CYPRUS Accessing the FTP Server - User Manual IT Department, CENTRAL BANK OF CYPRUS TABLE OF CONTENTS 1 EXECUTIVE SUMMARY... 1 1.1 AUDIENCE... 1 1.2 SCOPE... 1 2 CHANGES FROM THE OLD FTP
Active Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: [email protected] Online Support: [email protected] CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
IFS CLOUD UPLINK INSTALLATION GUIDE
IFS CLOUD UPLINK INSTALLATION GUIDE ABSTRACT This guide describes how to install IFS Cloud Uplink. UPLINK VERSION 4.13 PREPARE THE WEB SERVER THAT SERVES IFS EXTENDED SERVER Since the user credentials
