StoneGate SSL VPN Technical Note Setting Up Sygate On-Demand
|
|
- Sheila Perry
- 7 years ago
- Views:
Transcription
1 StoneGate SSL VPN Technical Note 2076 Setting Up Sygate On-Demand
2 Table of Contents Introduction page 3 Overview page 3 Sygate On-Demand and StoneGate SSL VPN page 3 Configuring Sygate On-Demand page 4 Copying Sygate Configuration to StoneGate page 5 Configuring StoneGate Access Point Default Page page 5 Configuring End-Point Integrity Client Scan page 5 Creating Customized Start Page page 7 Configuring StoneGate SSL VPN Logout Page page 7 Publishing Configuration page 8 Feedback page 8 Table of Contents 2
3 Introduction This technical note covers all aspects of configuring StoneGate SSL VPN and Sygate On-Demand Manager for the purpose of using Sygate On-Demand Virtual Desktop with StoneGate SSL VPN. Changes since the previous revision (SG_SVTN_2076_ ) are marked in the left margin with a change bar as seen here to the left of this paragraph. Note This technical note does not cover installation and general configuration of Sygate On-Demand. For information on installation and general configuration, please read the documentation provided with Sygate On- Demand. Prerequisites This technical note assumes a thorough understanding of StoneGate SSL VPN administration and of Sygate On- Demand. HTML proficiency is also required. Use the further reading to gain the required knowledge. Further Reading More information on StoneGate SSL VPN administration can be found in the StoneGate SSL VPN Administrator s Guide, the Online Help, and the Technical Note repository provided with the product. Another source of information is the Stonesoft Support site, which can be found at For more information on related subjects, visit Overview The Sygate On-Demand application consists of two modules: the Sygate On-Demand Manager and the Sygate On- Demand Agent (SODA). All settings and configurations are specified in the Sygate On-Demand Manager. The Sygate On-Demand Agent reads the settings from the Manager and acts like the secure desktop for the client. The files and settings generated from the Sygate On-Demand Manager are saved in a file system catalog in the SODA installation directory. The files include HTML pages, applets, configurations, components, and libraries. Sygate On-Demand and StoneGate SSL VPN The purpose of using Sygate On-Demand in combination with StoneGate SSL VPN is to take advantage of Sygate On-Demands secure desktop solution, while maintaining the authentication and authorization functionality of StoneGate SSL VPN. The End-Point Integrity solution of StoneGate SSL VPN is enabled to ensure that the Sygate On-Demand Agent is used on the clients. To achieve a secure integration between StoneGate SSL VPN and Sygate On-Demand, the following configuration is required: 1. Configure Sygate On-Demand The Sygate On-Demand Agent is configured to display a customized start page when started successfully and settings for the virtual desktop are specified. 2. Copy Sygate On-Demand Agent files to Administration Service To enable all Access Points to access the Sygate On-Demand Manager configuration, Sygate On-Demand Agent files are copied to the Administration Service. 3. Configure StoneGate SSL VPN Access Point Default page To automatically launch the Sygate On-Demand Agent when users access the Access Point, the default page for the Access Point is configured to correspond to the file that launches the Sygate On-Demand Agent. 4. Configuring End-Point Integrity Client Scan A client scan is configured to verify that the Sygate On-Demand Agent is running when resources are accessed. Introduction 3
4 5. Creating Authentication Method Access Rule An access rule is created to include the authentication methods that will be used to protect the resources. 6. Protect resources Applicable authentication methods are applied to your resources. To eliminate the possibility of users accessing resources directly without launching the Sygate On-Demand Agent, applicable resources are also protected by the End-Point Integrity client scan. 7. Create customized start page A customized start page is created in order to launch the StoneGate SSL VPN Portal in the Sygate On- Demand Agent. 8. Configure StoneGate SSL VPN logout Page The StoneGate SSL VPN logout page is configured to either close the browser or to redirect to the customized start page when users log off from the Application Portal. By utilizing this configuration the end user will have access to the configured StoneGate SSL VPN installation via the Sygate On-Demand Agent. The first contact with the system launches the Sygate On-Demand Agent. The Agent launches a browser displaying the End-Point Integrity scan page. The user clicks the scan button to initiate the client scan. Only if the client scan finds a running SODA process on the client, is the authentication page displayed. The page lists available authentication methods for the user, who then makes a selection and proceeds with authentication as usual. Note Due to the nature of Sygate On-Demand, it is not possible to use dynamic tunnels. Only static tunnels are supported. Please keep that in mind when setting up your system. The steps required are detailed in the following sections. Configuring Sygate On-Demand Use the Sygate On-Demand Manager to configure the Sygate On-Demand Agent to display a customized start page when started successfully. This process will also allow you to specify settings for the virtual desktop. Note Here you specify the URL for a customized start page. The start page is created later (refer to section Create Customized Start Page). In the examples we use the file name /soda/wa_default.html. If you use another file name, remember to enter this name when following the instructions for creating the start page. To configure Sygate On-Demand 1. In Sygate On-Demand Manager configure the following settings for the Virtual Desktop: Enable automatic switch: Select the checkbox Enable back and forward switch: Deselect the checkbox Terminate the Virtual Desktop upon closing the browser that launched the Success URL: Select the checkbox if you want SODA to shutdown automatically when the user closes the Application Portal. If the checkbox is deselected, SODA will still be running when the Application Portal is closed and the user must terminate SODA manually. 2. On the URL tab enter the URL to the client scan logon page: Example URL: Point host>/soda/wa_default.html Using this configuration the Sygate On-Demand Agent will automatically launch a browser with the start page loaded when it is started successfully. Configuring Sygate On-Demand 4
5 Copying Sygate Configuration to StoneGate To copy files and configurations produced by the Sygate On-Demand Manager to the Administration service 1. Create a folder called soda for the SODA files in the folder /data/portwise/administration-service/files/access-point/custom-files/wwwroot/soda/ 2. Copy the contents of the folder <Sygate installation folder>\sygate On-Demand\On-DemandAgent 3. Place the copied files in the folder you created When you publish the configuration in the StoneGate SSL VPN Administrator the Sygate On-Demand Manager captures the files and the configurations are automatically published to all StoneGate SSL VPN Access Points in the network. Configuring StoneGate Access Point Default Page Follow the instructions below to configure the StoneGate SSL VPN Access Point default page with correspond to the file in the previously created soda folder on the StoneGate SSL VPN Administration Service. This is the file that will launch the Sygate On-Demand Agent. To configure the Access Point default page 1. In the StoneGate SSL VPN Administrator, select Manage System in the main menu and click Access Points in the left-hand menu 2. Click the Manage Global Access Point Settings link 3. On the Client Access tab enter the following in Client Access Settings: Default Page: <location and file name of file that launches Sygate On-Demand Agent> Example /soda/index.htm 4. Click Save Using this configuration, the Sygate On-Demand Agent will automatically be launched when the user accesses the StoneGate SSL VPN Access Point. Configuring End-Point Integrity Client Scan You have now configured the Access Point default page to launch the Sygate On-Demand Agent. To protect all resources and authentication methods configured in the system, use a Global Access Rule defining that SODA must be running on the client. To verify that SODA is running, use a Sygate On-Demand Assessment Plug- In. Creating End-Point Integrity Access Rule To create a access rule defining that clients must have a running SODA process to access resources. 1. In StoneGate SSL VPN Administrator select Manage Resource Access in the main menu and click Access Rules in the left-hand menu 2. Click the Add Access Rule link 3. Enter a display name that describes what the End-Point Integrity scan will check Example Display Name: Sygate On-Demand 4. Click the Add Rule link 5. Select Assessment in the list and click Next Copying Sygate Configuration to StoneGate 5
6 6. Click Upload Plug-In and browse to the SygateOnDemand.jar file bundled with the installation 7. Click Upload Plug-In 8. Click Previous 9. Select the Sygate On-Demand Plug-In in the list of available plug-ins and click Next 10.If a newer version of the Sygate On-Demand client software is installed, verify the Process digest, otherwise use the supplied value 11.Define a customized error message or use the Default Message 12.Click Next and finish the wizard Creating Authentication Method Access Rule Follow the instructions below to create an access rule that contains the authentication methods your users may employ after the client scan has been performed. 1. In StoneGate SSL VPN Administrator select Manage Resource Access in the main menu and click Access Rules in the left-hand menu 2. Click the Add Access Rule link 3. Enter a display name that describes that the access rule contains available authentication methods Example Display Name: Authentication methods 4. Click the Add Rule link. 5. Select Authentication methods in the list and click Next. 6. Select the authentication methods you will use in the Available Authentication Methods list. Note Do not select the authentication method Client scan. 7. Click Add. The authentication methods are added to the Selected Authentication Methods list 8. Click Next. A confirmation page is displayed. The access rule is Allow user access when authenticated with <selected authentication methods> 9. Click Next. The rule Allow user access when authenticated with <selected authentication methods> is added to the Authentication methods access rule and displayed on the first page of the wizard 10.Click Next. A confirmation page is displayed for the access rule Authentication methods with the rule Allow user access when authenticated with <selected authentication methods> 11.Click Finish Wizard The access rule Authentication methods is displayed in the Registered Access Rules list on the Manage Access Rules page The next step is to protect your resources with the End-Point Integrity client scan as well as with your authentication methods using Global Access Rules. Protecting Resources Follow the instructions below to protect a resource with the End-Point Integrity Client Scan as well as with the applicable authentication methods. 1. In StoneGate SSL VPN Administrator select Manage Resource Access in the main menu and click Access Rules in the left-hand menu 2. Click the Manage Global Access Rule link 3. Select the Sygate On-Demand rule and the Authentication Access Rule in the list of available access rules 4. Click Add 5. Click Save to save the Global Access Rule The resource is now protected by the End-Point Integrity Client Scan and selected authentication methods. Configuring End-Point Integrity Client Scan 6
7 Creating Customized Start Page The next step is to create a customized HTML start page. When Sygate On-Demand is launched successfully, a browser will be started that displays the customized start page. To create a customized start page 1. Copy the default page from the folder /data/portwise/administration-service/files/access-point/built-in-files/wwwroot/ wa_default.html 2. Paste the copied file in to the newly created soda directory /data/portwise/administration-service/files/access-point/custom-files/wwwroot/soda/ 3. Open the copied HTML file using your preferred HTML editor. 4. Locate this section: <frame src= [$x:welcomepage] id= LoginArea name= LoginArea marginheight= 0 marginwidth= 0 frameborder= 0 /> 5. Replace it with this section: <frame src= /wa/_welcome.html id= LoginArea name= LoginArea marginheight= 0 marginwidth= 0 frameborder= 0 /> 6. Save and close the file. Configuring StoneGate SSL VPN Logout Page The logout page can be configured in one of two ways: either to close the browser when the user logs off from the Application Portal or to redirect the user to the customized start page. Configure Logout Page to Close Browser To configure the logout page to close the browser when the user logs off from the Application Portal 1. Copy the file _logoutpage.html found in the folder /data/portwise/administration-service/files/access-point/built-in-files/wwwroot/wa/ 2. Paste the file in the corresponding custom-files folder depending on your operating system: /data/portwise/administration-service/files/access-point/custom-files/wwwroot/wa/ 3. Open the file _logoutpage.html in your preferred HTML editor 4. Locate this section: function redirect() { window.location.href = / ; } 5. Replace it with this section: function redirect() { window.opener = top; window.close(); } 6. Save and close the file Note When using the line window.opener = top, the browser will close without informing the user. You can exclude the line from the code if you want a message to be displayed, asking the user whether the browser should be closed or not. Creating Customized Start Page 7
8 Configuring Logout Page to Redirect To configure the logout page to redirect the user to the customized start page previously configured. 1. Copy the file _logoutpage.html from the folder /data/portwise/administration-service/files/access-point/custom-files/wwwroot/wa/ 2. Paste the file in the corresponding custom-files folder /data/portwise/administration-service/files/access-point/custom-files/wwwroot/wa/ 3. Open the file _logoutpage.html in your preferred HTML editor. 4. Locate this row: window.location.href = / ; 5. Replace it with this row: window.location.href = /soda/wa_default.html ; 6. Save and close the file. Publishing Configuration For StoneGate SSL VPN Access Point and other services in the StoneGate network to receive the configuration in StoneGate SSL VPN Administrator, and to be able to access the Sygate On-Demand files copied to the StoneGate SSL VPN Administration Service, a publish is required. Publish the configuration by clicking the Publish button in the top menu in StoneGate SSL VPN Administrator. When the configuration has been successfully published it is distributed to all StoneGate services in the network. Note If you perform changes in the Sygate On-Demand Manager configuration in the future, you need to repeat the procedure of copying the Sygate On-Demand files to the StoneGate SSL VPN Administration Service. Remember that a Publish is required in StoneGate SSL VPN Administrator for the StoneGate SSL VPN Access Point to receive the configuration. Feedback Stonesoft is always interested in feedback from our users. For comments regarding Stonesoft s products, contact feedback@stonesoft.com. For comments regarding this technical note, contact documentation@stonesoft.com. Publishing Configuration 8
9 Trademarks and Patents Stonesoft, the Stonesoft logo and StoneGate are all trademarks or registered trademarks of Stonesoft Corporation. Multi-link technology, multi-link VPN, and the StoneGate clustering technology-as well as other technologies included in StoneGate-are protected by patents or pending patent applications in the U.S. and other countries. All other trademarks or registered trademarks are property of their respective owners. SSL VPN Powered by PortWise Copyright and Disclaimer Copyright Stonesoft Corporation. All rights reserved. These materials, Stonesoft products and related documentation are protected by copyright and other laws, international treaties and conventions. All rights, title and interest in the materials, Stonesoft products and related documentation shall remain with Stonesoft and its licensors. All registered or unregistered trademarks in these materials are the sole property of their respective owners. No part of this document or related Stonesoft products may be reproduced in any form, or by any means without written authorization of Stonesoft Corporation. Stonesoft provides these materials for informational purposes only. They are subject to change without notice and do not represent a commitment on the part of Stonesoft. Stonesoft assumes no liability for any errors or inaccuracies that may appear in these materials or for incompatibility between different hardware components, required BIOS settings, NIC drivers, or any NIC configuration issues. Use these materials at your own risk. Stonesoft does not warrant or endorse any third party products described herein. THESE MATERIALS ARE PROVIDED "AS-IS." STONESOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, AS TO, THE INFORMA- TION CONTAINED HEREIN. IN ADDITION, STONESOFT MAKES NO EXPRESS OR IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE OR USE WITH RESPECT THE INFORMATION CONTAINED IN THESE MATERIALS. IN NO EVENT SHALL STONESOFT BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL OR INCIDENTAL DAMAGES, INCLUD- ING, BUT NOT LIMITED TO, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING FROM THE USE OF THESE MATERIALS, EVEN IF ADVISED IN ADVANCE OF THE POSSIBILITY OF SUCH DAMAGES. SG_SVTN_2076_ Stonesoft Corp. Itälahdenkatu 22a FIN Helsinki Finland tel fax Stonesoft Inc Crown Pointe Parkway Suite 900 Atlanta, GA USA tel fax
StoneGate SSL VPN Technical Note 2081. Setting Up SSO with Citrix Presentation Server
StoneGate SSL VPN Technical Note 2081 Setting Up SSO with Citrix Presentation Server Table of Contents Introduction................................... page 3 Overview.....................................
More informationStoneGate SSL VPN Technical Note 2068. Adding Bundled Certificates
StoneGate SSL VPN Technical Note 2068 Adding Bundled Certificates Table of Contents Introduction................................... page 3 Overview..................................... page 3 Splitting
More informationStoneGate SSL VPN Technical Note 2069. Setting Up WPA Authentication
StoneGate SSL VPN Technical Note 2069 Setting Up WPA Authentication Table of Contents Introduction................................... page 3 Overview..................................... page 3 How WPA
More informationStoneGate SSL VPN Technical Note 2071. Setting Up BankID
StoneGate SSL VPN Technical Note 2071 Setting Up BankID Table of Contents Introduction................................... page 3 Overview..................................... page 3 StoneGate BankID Authentication
More informationRemote Firewall Deployment
StoneGate How-To Remote Firewall Deployment StoneGate Firewall 3.0 and Management Center 3.5 Table of Contents The Scenario............................... page 3 Adjusting the Access Rules and NAT rules..........
More informationStoneGate SSL VPN Technical Note 2086. Setting up ActiveSync
StoneGate SSL VPN Technical Note 2086 Setting up ActiveSync Table of Contents Introduction................................... page 3 Overview..................................... page 3 Enabling Device
More informationUsing Microsoft Active Directory Server and IAS Authentication
StoneGate How-To Using Microsoft Active Directory Server and IAS Authentication StoneGate Firewall/VPN 3.0.7 and Management Center 4.1 Table of Contents Basic Scenario...page 3 Configuring a Windows 2003
More informationStoneGate Firewall/VPN How-To Evaluating StoneGate FW/VPN in VMware Workstation
StoneGate Firewall/VPN How-To Evaluating StoneGate FW/VPN in VMware Workstation Created: February 14, 2008 Table of Contents Introduction to Evaluating StoneGate FW/VPN in VMware Workstation... 1 Prerequisites...
More informationVPNC Interoperability Profile
StoneGate Firewall/VPN 4.2 and StoneGate Management Center 4.2 VPNC Interoperability Profile For VPN Consortium Example Scenario 1 Introduction This document describes how to configure a StoneGate Firewall/VPN
More informationStoneGate IPsec VPN Client Release Notes for Version 4.3.0
StoneGate IPsec VPN Client Release Notes for Version 4.3.0 Created: August 11, 2008 Table of Contents What s New... 3 System Requirements... 4 Build Version... 4 Product Binary Checksums... 4 Compatibility...
More informationRelease Notes for Version 1.5.207
Release Notes for Version 1.5.207 Created: March 9, 2015 Table of Contents What s New... 3 Fixes... 3 System Requirements... 3 Stonesoft Appliances... 3 Build Version... 4 Product Binary Checksums... 4
More informationRELEASE NOTES. StoneGate Firewall/VPN v2.2.11 for IBM zseries
RELEASE NOTES StoneGate Firewall/VPN v2.2.11 for IBM zseries Copyright 2006 Stonesoft Corp. All rights reserved. All trademarks or registered trademarks are property of their respective owners. Disclaimer:
More informationStrong Authentication for Juniper Networks SSL VPN
Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationVPN CLIENT USER S GUIDE
STONEGATE IPSEC VPN 5.1 VPN CLIENT USER S GUIDE V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then current
More informationStrong Authentication for Juniper Networks
Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright
More informationOmniquad Exchange Archiving
Omniquad Exchange Archiving Deployment and Administrator Guide Manual version 3.1.2 Revision Date: 20 May 2013 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith
More informationInstalling the BlackBerry Enterprise Server Management Software on an administrator or remote computer
Installing the BlackBerry Enterprise Server Management Software on an administrator or Introduction Some administrators want to install their administrative tools on their own Windows 2000 computer. This
More informationBusiness Process Management IBM Business Process Manager V7.5
Business Process Management IBM Business Process Manager V7.5 Federated task management for BPEL processes and human tasks This presentation introduces the federated task management feature for BPEL processes
More informationDIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
More informationMicrosoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
More informationCA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationAccessing the Media General SSL VPN
Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your
More informationQuick Install Guide. Lumension Endpoint Management and Security Suite 7.1
Quick Install Guide Lumension Endpoint Management and Security Suite 7.1 Lumension Endpoint Management and Security Suite - 2 - Notices Version Information Lumension Endpoint Management and Security Suite
More informationBusiness Portal for Microsoft Dynamics GP. Electronic Document Delivery Release 10.0
Business Portal for Microsoft Dynamics GP Electronic Document Delivery Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is
More informationStrong Authentication for Cisco ASA 5500 Series
Strong Authentication for Cisco ASA 5500 Series with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationClearview Customer Web Access
Clearview Customer Web Access This document outlines the Clearview Process flows for Logging in to Customer Web Access Service Listing o Service Order Desktop o Service Tasks o Viewing Service Schedules
More informationSymantec On-Demand 2.6/ Juniper IVE SSL VPN 5.2 Integration Guide Addendum
Symantec On-Demand 2.6/ Juniper IVE SSL VPN 5.2 Integration Guide Addendum Uploading the Jedi Package: Preventing Virtual Desktop Bypass during User Access to Juniper SSL VPN Appliance Symantec On-Demand
More informationPulse Redundancy. User Guide
Pulse Redundancy User Guide August 2014 Copyright The information in this document is subject to change without prior notice and does not represent a commitment on the part of AFCON Control and Automation
More informationEmail Archiving User Guide Outlook Plugin. Manual version 3.1
Email Archiving User Guide Outlook Plugin Manual version 3.1 Copyright 2012 Omniquad Ltd. All rights reserved. Omniquad Ltd Crown House 72 Hammersmith Road Hammersmith London W14 8TH United Kingdom Omniquad
More informationInstalling and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management
IBM Tivoli Software Maximo Asset Management Installing and Configuring DB2 10, WebSphere Application Server v8 & Maximo Asset Management Document version 1.0 Rick McGovern Staff Software Engineer IBM Maximo
More informationSafeNet Cisco AnyConnect Client. Configuration Guide
SafeNet Cisco AnyConnect Client Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and
More informationBusiness Portal for Microsoft Dynamics GP. Key Performance Indicators Release 10.0
Business Portal for Microsoft Dynamics GP Key Performance Indicators Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the
More informationStrong Authentication for Microsoft TS Web / RD Web
Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationSOLARWINDS ORION. Patch Manager Evaluation Guide for ConfigMgr 2012
SOLARWINDS ORION Patch Manager Evaluation Guide for ConfigMgr 2012 About SolarWinds SolarWinds, Inc. develops and markets an array of network management, monitoring, and discovery tools to meet the diverse
More informationRedBlack CyBake Online Customer Service Desk
RedBlack CyBake Online Customer Service Desk Publication Date: June 2014 Copyright Copyright 2014 RedBlack Software Ltd. All rights reserved. Complying with all applicable copyright laws is the responsibility
More informationMicrosoft Dynamics GP Release
Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
More informationCheck Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
More informationINTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace
INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
More informationBusiness Portal for Microsoft Dynamics GP. Project Time and Expense Administrator s Guide Release 10.0
Business Portal for Microsoft Dynamics GP Project Time and Expense Administrator s Guide Release 10.0 Copyright Copyright 2007 Microsoft Corporation. All rights reserved. Complying with all applicable
More informationINTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass
INTEGRATION GUIDE DIGIPASS Authentication for F5 FirePass Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security
More informationformerly Help Desk Authority 9.1.3 HDAccess Administrator Guide
formerly Help Desk Authority 9.1.3 HDAccess Administrator Guide 2 Contacting Quest Software Email: Mail: Web site: info@quest.com Quest Software, Inc. World Headquarters 5 Polaris Way Aliso Viejo, CA 92656
More informationLepide Exchange Recovery Manager
Configuration Guide Lepide Exchange Recovery Manager Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of Lepide Software Private Limited, with all rights
More informationApplication Note. Intelligent Application Gateway with SA server using AD password and OTP
Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto
More informationVeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
More informationBusiness Portal for Microsoft Dynamics GP 2010. Field Service Suite
Business Portal for Microsoft Dynamics GP 2010 Field Service Suite Copyright Copyright 2010 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information and views
More informationThird Party System Management Integration Solution
Third Party System Management Integration Solution Oracle Hardware Management Connector Update Catalog 1.1 for Microsoft System Center Configuration Manager 2007 A complete list of currently supported
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationMicrosoft Dynamics GP 2010. SQL Server Reporting Services Guide
Microsoft Dynamics GP 2010 SQL Server Reporting Services Guide April 4, 2012 Copyright Copyright 2012 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information
More informationSetting Up and Using the Funambol Outlook Plug-in v7
Setting Up and Using the Funambol Outlook Plug-in v7 Contents Introduction.......................................... 2 Requirements for Plug-In Use........................... 2 Installing the Funambol
More informationSelf Help Guides. Create a New User in a Domain
Self Help Guides Create a New User in a Domain Creating Users & Groups This document is to be used as a guide to creating users and/or groups in a Domain Server environment; 1. Windows Server Domain exists,
More informationXcalibur Global Version 1.2 Installation Guide Document Version 3.0
Xcalibur Global Version 1.2 Installation Guide Document Version 3.0 December 2010 COPYRIGHT NOTICE TRADEMARKS 2010 Chip PC Inc., Chip PC (Israel) Ltd., Chip PC (UK) Ltd., Chip PC GmbH All rights reserved.
More informationSymantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide
Symantec On-Demand Protection 2.6 Juniper IVE SSL VPN 5.2 Integration Guide Symantec On-Demand 2.6/Juniper IVE 5.2 SSL VPN Integration Guide ii Preface Copyright Information: Symantec Corporation Copyright
More informationLepide Active Directory Self Service. Installation Guide. Lepide Active Directory Self Service Tool. Lepide Software Private Limited Page 1
Installation Guide Lepide Active Directory Self Service Tool Lepide Software Private Limited Page 1 Lepide Software Private Limited, All Rights Reserved This User Guide and documentation is copyright of
More informationAvePoint Record Rollback 3.1.2 for Microsoft Dynamics CRM
AvePoint Record Rollback 3.1.2 for Microsoft Dynamics CRM Installation and Configuration Guide Revision F Issued April 2014 1 Table of Contents Overview... 3 Obtaining the Record Rollback Solution Package...
More informationIDGo 800 Minidriver for Windows. User Guide
IDGo 800 Minidriver for Windows User Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep the
More informationConfiguring Active Directory with AD FS and SAML for Brainloop Secure Dataroom Setup Guide
Configuring Active Directory with AD FS and SAML for Brainloop Secure Dataroom Copyright Brainloop AG, 2004-2015. All rights reserved. Document version 1.0 All trademarks referred to in this document are
More informationBlackBerry Web Desktop Manager. Version: 5.0 Service Pack: 4. User Guide
BlackBerry Web Desktop Manager Version: 5.0 Service Pack: 4 User Guide Published: 2012-10-03 SWD-20121003174218242 Contents 1 Basics... 5 Log in to the BlackBerry Web Desktop Manager... 5 Connect your
More information2.0 HOW-TO GUIDELINES
Version 2.0 HOW-TO GUIDELINES Setting up a VPN between a StoneGate cluster and a Cisco PIX firewall TECHN10-6/3/03 Introduction This document highlights a tested method to configure a VPN tunnel between
More informationDIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
More informationSophos Mobile Control as a Service Startup guide. Product version: 3.5
Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator
More informationSymantec Backup Exec 2010 R2. Quick Installation Guide
Symantec Backup Exec 2010 R2 Quick Installation Guide 20047221 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
More informationACT! by Sage. Premium for Workgroups 2007 (9.0) Administrator s Guide to the ACT! Reader Utility
ACT! by Sage Premium for Workgroups 2007 (9.0) Administrator s Guide to the ACT! Reader Utility ACT! by Sage Premium for Workgroups 2007 (9.0) Administrator s Guide to the ACT! Reader Utility Copyright
More informationVERITAS Backup Exec TM 10.0 for Windows Servers
VERITAS Backup Exec TM 10.0 for Windows Servers Quick Installation Guide N134418 July 2004 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software
More informationNetMotion Mobility XE
Implementation Guide (Version 5.4) Copyright 2012 Deepnet Security Limited Copyright 2012, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
More informationTIBCO Spotfire Web Player 6.0. Installation and Configuration Manual
TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
More informationSSL VPN Client Installation Guide Version 9
SSL VPN Client Installation Guide Version 9 Document version 96060-1.0-08/10/2009 IMPORTANT NOTICE Elitecore has supplied this Information believing it to be accurate and reliable at the time of printing,
More informationJuniper SSL VPN Authentication QUICKStart Guide
Juniper SSL VPN Authentication QUICKStart Guide Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights
More informationDualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited
DualShield for Implementation Guide (Version 5.2) Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks DualShield Unified Authentication, MobileID,
More informationDell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure for SSO to SAP NetWeaver using SAML 2.0 May 2015 About this guide Prerequisites and requirements NetWeaver configuration Legal notices About
More informationSetting Up Resources in VMware Identity Manager
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationConfiguring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications
Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications VMware Identity Manager AUGUST 2015 V1 Configuring Single Sign-On from VMware Identity Manager to AirWatch Applications
More informationMicrosoft Exchange Mailbox Creation
Microsoft Exchange Mailbox Creation The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Documentation version
More informationVERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide
VERITAS Backup Exec 9.1 for Windows Servers Quick Installation Guide N109548 Disclaimer The information contained in this publication is subject to change without notice. VERITAS Software Corporation makes
More informationSymantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide
Symantec Integrated Enforcer for Microsoft DHCP Servers Getting Started Guide Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Federal acquisitions: Commercial Software - Government
More informationSymantec Backup Exec TM 11d for Windows Servers. Quick Installation Guide
Symantec Backup Exec TM 11d for Windows Servers Quick Installation Guide September 2006 Symantec Legal Notice Copyright 2006 Symantec Corporation. All rights reserved. Symantec, Backup Exec, and the Symantec
More informationTIBCO Spotfire Automation Services Installation and Configuration
TIBCO Spotfire Automation Services Installation and Configuration Software Release 7.0 February 2015 Updated March 2015 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES
More informationSpam Manager. Quarantine Administrator Guide
Spam Manager Quarantine Administrator Guide Spam Manager Quarantine Administrator Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec,
More informationContents Notice to Users
Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote
More informationStrong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
More informationINTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
More informationConfiguring and Monitoring Event Logs
Configuring and Monitoring Event Logs eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
More informationUsing Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
More informationWeb Remote Access. User Guide
Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior
More informationDeploying the Workspace Application for Microsoft SharePoint Online
Microsoft Dynamics GP Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Workspace is a method to enable Microsoft Excel-based dashboards for SharePoint Online. This
More informationClassroom Management, part of Intel Education User Manual
Classroom Management, part of Intel Education User Manual Disclaimer INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. EXCEPT AS PROVIDED IN INTEL'S TERMS AND CONDITIONS OF SALE
More informationEmbedded Document Accounting Solution (edas) for Cost Recovery. Administrator's Guide
Embedded Document Accounting Solution (edas) for Cost Recovery Administrator's Guide September 2013 www.lexmark.com Contents 2 Contents Overview...4 Getting started...5 Understanding installation requirements...5
More informationBlackBerry Web Desktop Manager. User Guide
BlackBerry Web Desktop Manager User Guide Published: 2012-01-26 SWD-1952106-0126040849-001 Contents 1 About the BlackBerry Web Desktop Manager... 3 About the BlackBerry Business Cloud Services... 3 2 Getting
More informationSSL VPN. Virtual Appliance Installation Guide. Virtual Private Networks
SSL VPN Virtual Appliance Installation Guide Virtual Private Networks C ONTENTS Introduction... 2 Installing the Virtual Appliance... 2 Configuring Appliance Operating System Settings... 3 Setting up the
More informationNetVault : Backup. for Exchange Server. Recovery Manager Integration Guide. Application Plugin Module (APM) version 4.5 MEG-103-4.
NetVault : Backup Application Plugin Module (APM) for Exchange Server version 4.5 Recovery Manager Integration Guide MEG-103-4.5-EN-01 03/31/11 Copyrights NetVault: Backup APM for Exchange Server Recovery
More informationMetaMorph Microscopy Automation & Image Analysis Software Super-Resolution Module
MetaMorph Microscopy Automation & Image Analysis Software Super-Resolution Module Version 7 Installation Instructions July 2013 This document is provided to customers who have purchased Molecular Devices
More informationFoglight Experience Monitor and Foglight Experience Viewer
Foglight Experience Monitor and Foglight Experience Viewer Quest Software, Inc. April 2008 Using the Dell Remote Access Controller Copyright Quest Software, Inc. 2008. All rights reserved. This guide contains
More informationRealPresence Media Manager Blackboard Learn 9.1 Learning Management System Integration Guide
INTEGRATION GUIDE Software 6.5 September 2013 3725-75322-002 Rev A RealPresence Media Manager Blackboard Learn 9.1 Learning Management System Integration Guide RealPresence Media Manager Blackboard Learn
More informationSymantec Backup Exec TM 10d for Windows Servers
Symantec Backup Exec TM 10d for Windows Servers Quick Installation Guide N180808 September 2005 Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation
More informationVPN CLIENT ADMINISTRATOR S GUIDE
STONEGATE IPSEC VPN 5.1 VPN CLIENT ADMINISTRATOR S GUIDE V IRTUAL PRIVATE NETWORKS Legal Information End-User License Agreement The use of the products described in these materials is subject to the then
More informationCitrix Systems, Inc.
Citrix Password Manager Quick Deployment Guide Install and Use Password Manager on Presentation Server in Under Two Hours Citrix Systems, Inc. Notice The information in this publication is subject to change
More informationBackup Exec Cloud Storage for Nirvanix Installation Guide. Release 2.0
Backup Exec Cloud Storage for Nirvanix Installation Guide Release 2.0 The software described in this book is furnished under a license agreement and may be used only in accordance with the terms of the
More informationDIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
More informationTIBCO Spotfire Automation Services 6.5. Installation and Deployment Manual
TIBCO Spotfire Automation Services 6.5 Installation and Deployment Manual Revision date: 17 April 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
More informationInstallation Guide Installing / Licensing / Unlocking Kepware Products
Installation Guide Installing / Licensing / Unlocking Kepware Products License Registration & Unlock online at https://my.kepware.com/mykepware Kepware Technologies is a private software development company
More information