Two-Factor Authentication
|
|
|
- Vernon Marsh
- 9 years ago
- Views:
Transcription
1 Two-Factor Authentication IT Professional & Customer Service Desk Feature Guide Two-Factor Authentication for Exchange Online Office 365 Dedicated & ITAR-Support Plans April 26, 2013
2 The information contained in this document represents the latest available subject matter available to Microsoft Corporation as of the date of publication. Since Microsoft must respond to changing market conditions, this document should not be interpreted as a commitment of any type on the part of Microsoft. Further, Microsoft cannot guarantee the accuracy of any information presented after the date of publication. The content of this document is proprietary and confidential. The material is intended only for customers of the dedicated and ITAR-support plans of Office 365 for enterprises. This content is provided to you under a Non-Disclosure Agreement and cannot be distributed without the express written permission of Microsoft Corporation. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under copyright, no part of this document may be reproduced, stored in, or introduced into, a retrieval system or transmitted in any form or by any means (electronic, mechanical, photocopying, recording, or otherwise) or for any purpose without the express written permission of Microsoft Corporation. Microsoft may have patents, patent applications, trademarks, copyrights, or other intellectual property rights covering subject matter in this document. Except as expressly provided in any written license agreement from Microsoft; the furnishing of this document does not give you any license to these patents, trademarks, copyrights, or any other intellectual property. Reference for additional information. Descriptions in this document of the products of other companies, if any, are provided only as a convenience. Such references should not be considered an endorsement of a product by Microsoft or as an indication of support provided by Microsoft for a third party product. Microsoft cannot guarantee the accuracy of the third party references since product offerings of these companies may change over time. In addition, the descriptions are intended to be brief highlights to aid understanding rather than as thorough subject matter coverage. For authoritative descriptions of these third party products, please consult their respective manufacturer. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Microsoft and Windows are either registered trademarks of Microsoft Corporation in the United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical, without the expressed written permission of the Microsoft Corporation. 2
3 About this guide 4 What is Two-Factor Authentication? 5 Functional Overview of 2FA within Exchange Online 6 User Authentication Scenario 6 Establishing a 2FA environment for Internet clients 8 Establishing a single sign-on experience for Intranet clients 9 Group Policy Object Configuration Method 9 Modifying the Site to Zone Assignment domain policy 9 Setting Integrated Windows Authentication Attribute 12 Manual Configuration Method 13 Internet Explorer Manual Configuration 13 Manual Configuration for Other Web Browser Types 14 Supporting the 2FA environment 15 User connectivity issues with the 2FA Portal 16 User browses to the wrong URL 16 User browses to a restricted URL 17 User exceeds the maximum number of logon attempts 18 Network Connectivity between 2FA Portal and Authentication Servers 19 Issues and Possible Causes: Outlook Web App Authentication Failed Error 19 Issues and Possible Causes: No Outlook Web App Login Page 20 Supporting Integrated Windows Authentication clients 22 Appendix A: RSA SecureID User Experience 24 Appendix B: Swivel Secure PINsafe User Experience 26 3
4 About this guide The content of this guide describes two-factor authentication (2FA) features for the dedicated and ITAR-support plan offerings of Exchange Online. The information provided represents features and functionality as of the date of publication. The guide addresses the following topics: An overview of 2FA fundamentals Requirements to establish a 2FA environment for Internet clients Steps to implement Integrated Windows Authentication for Intranet clients Support for the 2FA and Integrated Windows Authentication environments Note: The reader of this document is assumed to be an IT Professional or member of a Service Desk staff that has familiarity with the following: Active Directory authentication fundamentals The 2FA solution chosen and deployed by the customer How to configure the Web browser types in use within the customer environment 4
5 What is Two-Factor Authentication? Typical authentication practices that require only a password to access resources may not provide the appropriate level of protection for information that is sensitive or vulnerable. Two-factor authentication (2FA) is an authentication method that applies a stronger means of identifying the user. It requires users to submit two of the following three types of identify proofs: Authenticate using something only you know To access your corporate network you are required to provide a set of credentials that confirms your identity on the network. You satisfy the requirements of the first category when you provide a valid domain username and password. Authenticate using something only you have One option to satisfy the second category is to use a Smartcard and the associated PIN as credentials an Automated Teller Machine (ATM) is this type of experience. Other PIN oriented experiences can involve the submission of a uniquely generated one-time use PIN displayed by a fob device or the use of a personal PIN to decipher a text or numerical string to produce an actual PIN for one-time access use. Authenticate using a part of yourself Another option to satisfy the second category is biometric authentication literally using a part of your body to prove your identity. Some examples include the following: Having your finger scanned to verify your fingerprint. Using an ocular scan to verify your retina or iris. Facial or voice recognition. Customers that subscribe to Exchange Online within a dedicated or ITAR-support plan of Office 365 for enterprises can enable and use the RSA SecurID product of EMC Corporation or the PINsafe product of Swivel Secure. The chosen 2FA solution will involve the use of the Microsoft Forefront Unified Access Gateway (UAG) of the Office 365 environment. The UAG will manage authentication processes and present a forms based authentication page that accepts the Active Directory credentials of the user and a 2FA passcode (RSA) or 2FA one-time password (PINsafe). UAG then manages the authentication processes involving the 2FA backend systems deployed by the customer within their environment. UAG also will provide the pathway to the Exchange Online Client Access server if the validation of authentication credentials is successful. The use of 2FA is not required or provided for an Outlook Web App client on a corporate intranet. A customer can configure Integrated Windows Authentication to allow the Web browser based user to have a single sign-on experience to access Exchange Online. An overview of the authentication processes and a summary of operating environment requirements for 2FA are described below. User environment configuration steps and troubleshooting scenarios also are included. 5
6 Functional Overview of 2FA within Exchange Online The 2FA functional concepts for the RSA SecureID and Swivel Secure PINsafe products are similar. The scenario below provides an overview of the processes to authenticate a Web browser based 2FA user attempting to connect to Outlook Web App of Exchange Online from outside of their corporate network. User Authentication Scenario John is not connected to his corporate network and needs to remotely access Outlook Web App within Exchange Online. Referring to the diagram below, an outline of the authentication steps involved follows. 6
7 1a. To load the page, John s machine queries a public DNS server to resolve the public IP Address associated with the publicly accessible 2FA Portal. The address returned for the portal is a dedicated HTTPS URL namespace. This namespace is separate from URL namespaces that are reserved for services that do not require 2FA such as Exchange Web Services and remote procedure call (RPC) over HTTP. 1b. The 2FA Portal URL is John s machine connects to this site and requests the default page. 1c. The 2FA Portal receives the request and serves a login screen which displays in John s browser. John completes interaction with the 2FA server and provides the following as described below. o RSA SecureID: Username, password, and the RSA passcode (personal four-digit PIN and the six-digit passcode displayed on the RSA fob) see user experience in Appendix A. o Swivel Secure PINsafe: Username, password, and the one time code derived by using a personal PIN see user experience in Appendix B. 2. The 2FA Portal is configured to always pass security code information to a specific 2FA authentication server on Contoso s network. The following security code validation steps are performed: a. The 2FA Portal securely connects to the 2FA Authentication Server in Contoso s corporate environment to verify the security code and authenticate the user. (Red) b. The Authentication Server evaluates the code provided and if confirmed the server returns an authentication response to the 2FA Portal to complete the first authentication factor. (Green) 3. The 2FA Portal connects to a Domain Controller on the Contoso corporate network to verify the Active Directory (AD) username and password of the user. The following domain credential validation steps are performed: a. The 2FA Portal securely connects to a domain controller in the Contoso corporate environment using the Office 365 Managed Domain Active Directory trust to verify the username and password of the user. (Red) b. The Domain Controller verifies the credentials and returns an authentication response to the 2FA Portal. (Green) 4. When the user s identity has been confirmed using the 2FA model, the user is then passed directly to the Client Access server (CAS) via the 2FA Portal. An Outlook Web App session starts on the CAS and loads the user s mailbox. In the background, the 2FA Portal encrypts the credentials and writes them to a cookie. With credentials stored in a cookie, John does not have to manually enter his credentials to access Exchange Online for the duration of the session. When the session ends, the cookie is invalidated and the credentials are no longer cached. 7
8 Establishing a 2FA environment for Internet clients The following outlines the requirements to implement either an RSA SecureID or Swivel Secure PINsafe 2FA solution to support Web browser access to an Exchange Online environment using an Internet based client. 1. To use two-factor authentication with Exchange Online, a customer must provide (a) the RSA SecureID or Swivel Secure PINsafe back-end infrastructure within their on-premises environment and (b) the SSL certificate generated by a public certificate authority for the URL used for two-factor authentication. Microsoft provides, activates, and supports, the components that pass the authentication requests to this back-end infrastructure.. 2. Only the premium (full client) version of Outlook Web App is supported; the use of the light version of Outlook Web App with mobile devices is not supported. 3. Suitable Web browsers for Outlook Web App when used in conjunction with a 2FA solution are described within the Office.com article Software requirements for Office 365 for business. Customers can consider using other browsers supported by their chosen 2FA solution; compatibility testing of these browsers with Office 365 is a customer responsibility. 4. The client Web browser used for Outlook Web App access must have the Outlook Web App URL for Exchange Online listed as a trusted local intranet site within the Web browser. 5. Due to the need for a client system to be joined to the Active Directory account domain of the Customer forest, 2FA functionality cannot be used by Exchange ActiveSync (EAS) devices or any other mobile device. 8
9 Establishing a single sign-on experience for Intranet clients To provide a seamless single sign-on experience for an Intranet based client, specific configuration steps must be followed to enable the user s validated credentials to be passed between the client Web browser and Exchange Online. When this configuration is established, Integrated Windows Authentication will be used to enable the Web browser of the client to interact with the Outlook Web App feature of Exchange Online. The two options available are (1) domain policy set through Group Policy object (GPO) feature of Active Directory or (2) the manual configuration method. Group Policy Object Configuration Method For client systems using the Internet Explorer (IE) Web browser, the Group Policy features of Active Directory can be used to propagate a Site to Zone Assignment domain policy to each IE browser. The domain policy will address the placement of specific site URLs in the Local Intranet zone defined for the browser. Note: To prepare to execute the Site to Zone Assignment domain policy, contact your Service Delivery Manager to obtain the URL for the Outlook Web App URL of your Exchange Online environment. Modifying the Site to Zone Assignment domain policy The Site to Zone Assignment List policy setting associates sites to zones using the following values for the Internet Security zones: (1) Intranet zone, (2) Trusted Sites zone, (3) Internet zone, and (4) Restricted Sites zone. If you set this policy setting to Enabled, you can enter a list of sites and their related zone numbers. The association of a site with a zone ensures that the security settings for the specified zone are applied to the site. 1. Within your Active Directory environment, invoke the Local Group Policy Editor by executing the following: gpedit.msc Open the console tree to expose User Configuration > Administrative Templates > Windows Components > Internet Explorer > Internet Control Panel > Security Page 9
10 2. Double click the Site to Zone Assignment List, check the Enabled option, and click the Show button in the middle left area of the dialogue box. 10
11 3. Within the Show Contents dialogue box, type the URL of the Outlook Web App URL for Exchange Online in the Value name field and type 1 as the Value this represents the Intranet Zone as shown in the following table: Zone Number Zone Name 1 Intranet Zone 2 Trusted Sites zone 3 Internet zone 4 Restricted Sites zone Important: When the Site to Zone Assignment domain policy is enabled and applied, all existing URLs for all zones within Internet Explorer will be overwritten and the user will not be able to apply any changes. If other URL values must be set for other zones, these URLs should be added to the Show Contents dialogue box by following the Local Group Policy Editor procedures described above. The zone assignments for the user will be refreshed when the user logs onto their client system. An administrator can execute the following to have the values immediately applied: gpudate /force 11
12 Setting Integrated Windows Authentication Attribute Within the IE browser, the Enable Integrated Windows Authentication attribute also must be set. By default, this setting is enabled. If a GPO is required to force the attribute to be the correct value, EnableNegotiate is the registry key which must be set to true. The path to the attribute is displayed in the lower border area of the Registry Editor snapshot shown below. When the policy has been applied, the Integrated Windows Authentication attribute should appear as being activated in the Internet Options view of IE as shown below. Note: As noted at the bottom of the snapshot shown, any change to the Enable Integrated Windows Authentication attribute will take effect when IE is restarted. 12
13 Manual Configuration Method The manual configuration method can be used for Internet Explorer (IE) and it must be used for all other Web browser types. The information provided below can be repurposed for end user use. Internet Explorer Manual Configuration The following steps describe the manual configuration method to establish a trust between an IE based client and the Outlook Web App URL for Exchange Online: 1. In your version of IE, select the drop-down leading to Internet Options. Select the Security tab and highlight Local Intranet. Select the Sites button and the Advanced button on the Local Intranet dialogue box that follows. 13
14 2. Within the next layer of the Local Intranet dialogue box, enter the Outlook Web App URL for Exchange Online within the Add this website to the zone field. Click the Add button and then Close or Ok to serially close all dialogue boxes. Manual Configuration for Other Web Browser Types Microsoft does not provide direct support for other Web types. To manually configure a Web browser other than IE, seek guidance from the manufacturer of the Web browser. Note: As indicated above, the client system must be joined to the Active Directory account domain of the Customer forest; client systems that do not utilize Microsoft Windows are unable to meet this requirement. 14
15 Supporting the 2FA environment Issues related to 2FA generally are either user errors or server errors. Customer Helpdesks & IT Pros are expected to identify the source of a 2FA issue, troubleshoot the issue to their level of responsibility, and escalate specific issues to the attention of Microsoft Online Services Support (MOSSUP) as appropriate. Troubleshooting guidance and a summary of support roles and responsibilities are included in this section. Note: Microsoft Online Services Support is unable to reset the password or PIN associated with a user account. Any issue that requires a change to an individual user account, the account s password, or the PIN for the account must be addressed by your internal IT Help Desk. As a quick reference, support guidance is provided within this section for the following issues: User connectivity issues with the 2FA Portal Network Connectivity between 2FA Portal and Authentication Servers The table below provides an overview of support roles and responsibilities involving the customer and Microsoft. 2FA Support Roles and Responsibilities Task Customer Microsoft Account Maintenance Customer 2FA server issue End user Network connectivity issue Entitlement Password reset User education User error 2FA Portal configuration 2FA Portal network connectivity issues 2FA Portal server configuration issue 15
16 User connectivity issues with the 2FA Portal User attempts to browse to the 2FA Website and receives an error. User browses to the wrong URL If a user navigates to the wrong website, a multitude of errors may appear. The user may receive an error stating the Internet Explorer cannot display the webpage: Resolution 1. Evaluate the address the user has typed and, if incorrect, provide correct URL. 16
17 User browses to a restricted URL If a user attempts to access a site on the 2FA server other than the default login site, they may see a You have attempted to access a restricted URL error: Resolution A restricted URL error means the user can in fact access the 2FA Portal but an incorrect URL was used. Suggested troubleshooting steps are the following: 1. Ensure that the user is typing in the correct URL. Verify https is being used. 2. Determine if the issue occurs from multiple network locations. For example, identify if connectivity is possible from a home environment and not a public location. If the connectivity experience varies, a network firewall rule probably is preventing the client machine from reaching the 2FA server. 3. Determine if the user experiences the same problem using another machine. If false, the user s MAC address on their initial machine may be blocked by the network being used. 4. If the access issue persists, escalate the issue to MOSSUP. 17
18 User exceeds the maximum number of logon attempts User receives an error message stating they have exceeded the maximum number of login attempts. Issue is likely due to the end user entering incorrect domain credentials, in correct password and passcode (RSA SecureID) or one time code (Secure Swivel PINsafe), use an incorrect PIN, or a combination of any of these incorrect entries. Users are allowed three (3) attempts to login successfully through the 2FA service. Once this maximum number of attempts is reached, the user s account will appear to be locked in the browser. Resolution If the Outlook Web App login screen displays the User validation error message, the 2FA web page will block any subsequent logons in the current browser session. The user must close all instances of their browser, restart the browser, and attempt to login again. If the user is still unable to login, reset the user s Active Directory account and/or their 2FA authentication account data. 18
19 Network Connectivity between 2FA Portal and Authentication Servers A network connectivity failure between the 2FA Portal and either (a) the Authentication Server of the customer provided 2FA solution (b) the Active Directory domain controller of Office 365, or (c) the Client Access server of Exchange Online will result in users being unable to utilize Outlook Web App. Scenarios (a) and (b) are illustrated in the diagrams below. Issues and Possible Causes: Outlook Web App Authentication Failed Error The user enters the correct password and passcode (RSA SecureID) or one time code (Secure Swivel PINsafe) but receives an Authentication Failed message from Outlook Web App. Incorrect authentication information or connectivity between the 2FA Portal and either the 2FA Authentication Server or the Active Directory domain controller are the likely causes. 2FA Portal and Authentication Server Connection Failure 2FA Portal and Domain Controller Connection Failure 19
20 Resolution 1. Verify that Outlook Web App is accessible from within the corporate network. If Outlook Web App is accessible, either have the use confirm their credential information or reset the user s account. 2. If issue is unresolved, use a test account to attempt 2FA access and/or ask other users to attempt access. 3. If the problem continues to persist, either connectivity between the 2FA Portal and the 2FA Authentication Server or connectivity between the 2FA Portal and the customer's domain controller may be the cause. Escalate the issue to MOSSUP. Issues and Possible Causes: No Outlook Web App Login Page A network connectivity failure between the 2FA Portal and the Client Access server will result in users being able to enter credentials and authenticate but the Outlook Web App mailbox view will not render or display. Network Connectivity Failure between 2FA Portal and Client Access server If the Client Access server is not online or not functioning properly, the logon page will freeze for several seconds. Various Internet Information Service (IIS) errors will appear. The following are the most common: Error Screen The page cannot displayed Error Screen Cannot display the webpage 20
21 Resolution Customer Help Desk or IT Pro staff should attempt to access Outlook Web App from the internal corporate network. If an IIS error appears, escalate the issue to MOSSUP and provide a troubleshooting summary. If access to Outlook Web App is successful, Outlook Web App is assumed to be healthy and connectivity between the 2FA server and Outlook Web App server may be the problem. Also escalate this issue to MOSSUP and provide a troubleshooting summary. 21
22 Supporting Integrated Windows Authentication clients Once Web browser settings have been applied to the client to enable seamless interaction with the Outlook Web App feature of Exchange Online, a single sign on experience for the client will be possible. If a user is prompted for credentials, several aspects of the user s environment should be examined before placing a request with Microsoft for support. Note: As indicated above, Microsoft only provides support for the Internet Explorer Web browser. The instructions provided below are generic and the use of IE is illustrated as an example. Specific error messages, user interface windows, and modification procedures for other Web browsers must be obtained from the manufacturer of the browser. Two forms of authentication failure are the most common: (1) no prompt for credentials and an incomplete authentication process or (2) a prompt for credentials and a successful or unsuccessful manual completion of the authentication steps. If no prompt for credentials occurs, the fault is likely to be the client, network, or Exchange Online environment. If the client and network appear to be operating satisfactorily, a service request can be placed with Microsoft Online Service Support. If a prompt for credentials appears, the configuration of the client system is likely to be incorrect. 22
23 Selecting the Cancel button produces the following: The following procedures should be addressed to attempt to resolve the authentication issue before contacting Microsoft Online Services Support: 1. Confirm that the user has manually entered correct credentials for the correct account domain within the Customer forest. 2. Confirm the client system is connected to the corporate network (Intranet or VPN) and that the client workstation is joined to the correct account domain within the Customer forest (use set USERDOMAIN command within a Command Prompt window on the client system to view domain setting). 3. For an IE user, confirm the Outlook Web App URL for Exchange Online appears in the Intranet Zone for the browser as described above (follow similar verification steps for other browser types). 4. For an IE user, confirm the Integrated Windows Authentication attribute is enabled within IE as described above (follow similar verification steps for other browser types). 5. If the user continues to be prompted for credentials, instruct the user to attempt to use a full Outlook client to access Exchange Online and note the result. If user access is not successful at any point in the steps above, include the result of each verification step in the Service Request placed with Microsoft Online Services Support. 23
24 Appendix A: RSA SecureID User Experience When a user is outside of the corporate network and tries to connect to Outlook Web App protected by an RSA SecureID 2FA solution, a 2FA logon page appears. The following is an outline of the user steps involved to complete the authentication process: 1. The passcode is generate using the user s personal PIN and the token code generated by the RSA SecureID fob as shown in the example below. Personal RSA PIN = 1234 RSA Tokencode= Personal RSA PIN + RSA Tokencode = Passcode The user types in their user name (CONTOSO\jdoe), their password, and passcode ( ). The user clicks Log On. Outlook Web App 2FA Logon Screen 24
25 2. The user name and passcode are sent to the RSA Authentication Manager (Authentication Server) which is the system s authentication engine. If authorized, the user s domain credentials are then verified by a domain controller. 3. When the credentials have been verified, the user is authenticated and has access to their mailbox using Outlook Web App. User Mailbox in Outlook Web App 25
26 Appendix B: Swivel Secure PINsafe User Experience Swivel Secure PINsafe is a 2FA solution based on a choice of single or multi-channel authentication solutions. The key combination used in this solution is the user s PIN (a constant value) and the user s security string (a random value). The PIN is used to extract digits from the security string to produce a one-time token code which is passed by the user to the PINsafe server and processed to complete the 2FA authentication process. When the security string is delivered via the authentication page on a web site, this is referred to as a single channel delivery (all authentication information is presented/entered via the Web browser). If the security string is delivered via an alternate communication method (e.g., an SMS text message to a mobile device) and is then used to produce the token code that is entered via the Web browser session, this method is referred to as multi-channel. The scenario below provides an example of the single channel authentication process from a user prospective. For this example, the user s PIN is The user is presented with the Outlook Web App logon page where he enters DOMAIN\user and tabs into the Password textbox. The Swivel Secure PINsafe Authentication Server then generates a random string and presents the user with an image. 2. The user enters their domain password then determines which number corresponds to their PIN (1234) the result is his one-time password. Based on the image, the user enters 3584 as their one-time password for the session and clicks Log On 26
27 3. When the credentials have been verified, the user is authenticated and has access to their mailbox using Outlook Web App. User Mailbox in Outlook Web App 27
Multi-Factor Authentication for OWA in Exchange Online Dedicated
Multi-Factor Authentication for OWA in Exchange Online Dedicated Applies to: Exchange Online Dedicated Topic Last Modified: 18-Nov-2015 Within the Dedicated and ITAR-support plan offerings of Office 365
Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06
SafeNet Authentication Service Configuration Guide 1.06 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
NetWrix Password Manager. Quick Start Guide
NetWrix Password Manager Quick Start Guide Contents Overview... 3 Setup... 3 Deploying the Core Components... 3 System Requirements... 3 Installation... 4 Windows Server 2008 Notes... 4 Upgrade Path...
HOTPin Integration Guide: DirectAccess
1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
IMS Health Secure Outlook Web Access Portal. Quick Setup
IMS Health Secure Outlook Web Access Portal Purpose: This service has been developed to allow access to the IMS Health email system for staff that can not access the email system through VPN which is preferred
How to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
Personal Archiving in Exchange Online
Personal Archiving in Exchange Online IT Professional & Customer Helpdesk Feature Guide Exchange Online Personal Archiving Feature Guide - 12.3 Release Office 365 Dedicated & ITAR-Support Plans Revised:
RSA SecurID Software Token 1.0 for Android Administrator s Guide
RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
Windows Server Update Services 3.0 SP2 Step By Step Guide
Windows Server Update Services 3.0 SP2 Step By Step Guide Microsoft Corporation Author: Anita Taylor Editor: Theresa Haynie Abstract This guide provides detailed instructions for installing Windows Server
Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web App. Technical Manual Template
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess
SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,
Sage 200 Web Time & Expenses Guide
Sage 200 Web Time & Expenses Guide Sage (UK) Limited Copyright Statement Sage (UK) Limited, 2006. All rights reserved If this documentation includes advice or information relating to any matter other than
User Self-Service Configuration Overview
User Self-Service Configuration Overview Version 8.2 Mobile Service Manager Legal Notice This document, as well as all accompanying documents for this product, is published by Good Technology Corporation
VMware Virtual Desktop Manager User Authentication Guide
Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager
Endpoint Security VPN for Windows 32-bit/64-bit
Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
DPH TOKEN SELF SERVICE SITE INSTRUCTIONS:
DPH TOKEN SELF SERVICE SITE INSTRUCTIONS: The purpose of this document is to provide users with assistance on resolving connection issues with Department of Public Health (DPH) Entrust tokens. These instructions
BlackShield ID Agent for Remote Web Workplace
Agent for Remote Web Workplace 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced,
Configuring IBM Cognos Controller 8 to use Single Sign- On
Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright
Agent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
Hands-On Lab: WSUS. Lab Manual Expediting WSUS Service for XP Embedded OS
Lab Manual Expediting WSUS Service for XP Embedded OS Summary In this lab, you will learn how to deploy the security update to your XP Pro or XP embedded images. You will also learn how to prepare the
Aventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
Administration guide. Océ LF Systems. Connectivity information for Scan-to-File
Administration guide Océ LF Systems Connectivity information for Scan-to-File Copyright 2014, Océ All rights reserved. No part of this work may be reproduced, copied, adapted, or transmitted in any form
CRM Form to Web. Internet Lead Capture. Product Registration Instructions VERSION 1.0 DATE PREPARED: 1/1/2013
CRM Form to Web Internet Lead Capture Product Registration Instructions VERSION 1.0 DATE PREPARED: 1/1/2013 DEVELOPMENT: BRITE GLOBAL, INC. 2013 Brite Global, Incorporated. All rights reserved. The information
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
Technical Brief for Windows Home Server Remote Access
Technical Brief for Windows Home Server Remote Access Microsoft Corporation Published: October, 2008 Version: 1.1 Abstract This Technical Brief provides an in-depth look at the features and functionality
RSA Authentication Manager 8.1 Help Desk Administrator s Guide
RSA Authentication Manager 8.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm
CRM to Exchange Synchronization
CRM to Exchange Synchronization Installation, Configuration and End-User Instructions VERSION 1.0 DATE PREPARED: 9/1/2012 DEVELOPMENT: BRITE GLOBAL, INC. 2012 Brite Global, Incorporated. All rights reserved.
Integration Guide. SafeNet Authentication Service. VMWare View 5.1
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Enterprise Self Service Quick start Guide
Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: [email protected] Online Support: [email protected] 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.
Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services
HOTPin Integration Guide: Microsoft Office 365 with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
Software Token. Installation and User Guide. 2013 MasterCard Proprietary. All rights reserved.
Software Token Installation and User Guide 2013 MasterCard Proprietary. All rights reserved. Contents Overview... 1 Install the RSA Client Desktop Application... 1 Download and Save the RSA Desktop Application...
DigitalPersona Pro. Password Manager. Version 5.x. Application Guide
DigitalPersona Pro Password Manager Version 5.x Application Guide 1996-2012 DigitalPersona, Inc. All Rights Reserved. All intellectual property rights in the DigitalPersona software, firmware, hardware
Allianz Global Investors Remote Access Guide
Allianz Global Investors Remote Access Guide Web Address: http://remote.allianzgi-us.com/ Page 1 of 34 pages Please contact the Service Desk at Table of Contents 1. Introduction to the Remote Access Page
RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide
RSA SecurID Software Token 1.3 for iphone and ipad Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
Active Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: [email protected] Online Support: [email protected] CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
Google Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide
c623242f-20f0-40fe-b5c1-8412a094fdc7 Deploying Personal Virtual Desktops by Using RemoteApp and Desktop Connection Step-by-Step Guide Microsoft Corporation Published: June 2009 Updated: April 2010 Abstract
EventTracker: Support to Non English Systems
EventTracker: Support to Non English Systems Publication Date: April 25, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Introduction This document has been prepared to
SAM Context-Based Authentication Using Juniper SA Integration Guide
SAM Context-Based Authentication Using Juniper SA Integration Guide Revision A Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete
How To Configure A Windows 8.1 On A Windows 7.1.1 (Windows) With A Powerpoint (Windows 8) On A Blackberry) On An Ipad Or Ipad (Windows 7) On Your Blackberry Or Black
Introduction to Cloud-Based Mobile Device Management with Intune Information in this document, including URLs and other Internet Web site references, is subject to change without notice. Unless otherwise
SafeNet Cisco AnyConnect Client. Configuration Guide
SafeNet Cisco AnyConnect Client Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and
CRM to Exchange Synchronization
CRM to Exchange Synchronization Product Registration Instructions VERSION 2.0 DATE PREPARED: 1/1/2013 DEVELOPMENT: BRITE GLOBAL, INC. 2012 Brite Global, Incorporated. All rights reserved. The information
Deploying Remote Desktop IP Virtualization Step-by-Step Guide
Deploying Remote Desktop IP Virtualization Step-by-Step Guide Microsoft Corporation Updated: April 2010 Published: July 2009 Abstract Remote Desktop IP Virtualization provides administrators the ability
9243054 Issue 1. Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation
9243054 Issue 1 Nokia and Nokia Connecting People are registered trademarks of Nokia Corporation VPN Client User s Guide 9243054 Issue 1 Reproduction, transfer, distribution or storage of part or all of
RSA Authentication Manager 8.1 Help Desk Administrator s Guide. Revision 1
RSA Authentication Manager 8.1 Help Desk Administrator s Guide Revision 1 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step
Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step Guide Microsoft Corporation Published: July 2009 Updated: September 2009 Abstract Remote Desktop Web Access (RD Web
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
These instructions will allow you to configure your computer to install necessary software to access mystanwell.com.
HOW TO: ACCESS MYSTANWELL.COM USING WINDOWS WITH MOZILLA FIREFOX What is mystanwell.com? The remote access web site called mystanwell.com allows staff to access Stanwell applications via the Internet using
HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE
HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
User Guide for Avaya Scopia Add-in for Microsoft Outlook for Aura Collaboration Suite
User Guide for Avaya Scopia Add-in for Microsoft Outlook for Aura Collaboration Suite Version 8.3 For Solution 8.3 March 2014 2000-2014 Avaya Inc. All intellectual property rights in this publication are
IBM Client Security Solutions. Client Security User's Guide
IBM Client Security Solutions Client Security User's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix B - Notices and Trademarks, on page 22. First
Protecting Juniper SA using Certificate-Based Authentication. Quick Start Guide
Protecting Juniper SA using Certificate-Based Authentication Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync. Joey Masterson
How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson How to Install Microsoft Mobile Information Server 2002 Server ActiveSync Joey Masterson Copyright Information
CA Spectrum and CA Embedded Entitlements Manager
CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically
TechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.
Secure Remote Access SRA Two-factor Authentication with Quest Defender SonicOS Contents Introduction... 1 System Requirements... 1 Defender Configuration... 2 Dell SonicWALL SRA Configuration... 18 Two-factor
Secure Access Portal. Getting Started Guide for using the Secure Access Portal. August 2011. Information Services
Secure Access Portal Getting Started Guide for using the Secure Access Portal Information Services 1. Introduction The Secure Access Portal enables the authority to provide simple but secure remote access
Microsoft Outlook Web Access 2013 Authenticating Users Using SecurAccess Server by SecurEnvoy
Microsoft Outlook Web Access 2013 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale Reading RG7
Step By Step Guide: Demonstrate DirectAccess in a Test Lab
Step By Step Guide: Demonstrate DirectAccess in a Test Lab Microsoft Corporation Published: May 2009 Updated: October 2009 Abstract DirectAccess is a new feature in the Windows 7 and Windows Server 2008
Strong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
Setup Guide Access Manager 3.2 SP3
Setup Guide Access Manager 3.2 SP3 August 2014 www.netiq.com/documentation Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE
Application Note. Intelligent Application Gateway with SA server using AD password and OTP
Application Note Intelligent Application Gateway with SA server using AD password and OTP ii Preface All information herein is either public information or is the property of and owned solely by Gemalto
HOTPin Integration Guide: Google Apps with Active Directory Federated Services
HOTPin Integration Guide: Google Apps with Active Directory Federated Services Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
Using Exclaimer Signature Manager with Office 365
Using Exclaimer Signature Manager with Office 365 www.exclaimer.com How does Signature Manager Work? Signature Manager takes an email signature template and fills it out for a specific individual using
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
Lab Answer Key for Module 6: Configuring and Managing Windows SharePoint Services 3.0. Table of Contents Lab 1: Configuring and Managing WSS 3.
Lab Answer Key for Module 6: Configuring and Managing Windows SharePoint Services 3.0 Table of Contents Lab 1: Configuring and Managing WSS 3.0 1 Information in this document, including URL and other Internet
Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook
Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: September 30, 2005 Product Information Partner Name Juniper Networks Web Site www.juniper.net Product Name NetScreen SA Version
Integration Guide. SafeNet Authentication Service. Using SAS with Web Application Proxy. Technical Manual Template
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
VPN Client User s Guide. 9235966 Issue 2
VPN Client User s Guide 9235966 Issue 2 Copyright 2004 Nokia. All rights reserved. Reproduction, transfer, distribution or storage of part or all of the contents in this document in any form without the
McAfee One Time Password
McAfee One Time Password Integration Module Outlook Web App 2010 Module version: 1.3.1 Document revision: 1.3.1 Date: Feb 12, 2014 Table of Contents Integration Module Overview... 3 Prerequisites and System
Troubleshooting File and Printer Sharing in Microsoft Windows XP
Operating System Troubleshooting File and Printer Sharing in Microsoft Windows XP Microsoft Corporation Published: November 2003 Updated: August 2004 Abstract File and printer sharing for Microsoft Windows
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Strong Authentication for Cisco ASA 5500 Series
Strong Authentication for Cisco ASA 5500 Series with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
BlackShield ID Agent for Terminal Services Web and Remote Desktop Web
Agent for Terminal Services Web and Remote Desktop Web 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication
DualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited
DualShield for Implementation Guide (Version 5.2) Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks DualShield Unified Authentication, MobileID,
External Partner and Customer Login Instructions via myngc Portal
External Partner and Customer Login Instructions via myngc Portal https://www.myngc.com Purpose The purpose of this document is to provide the Northrop Grumman Corporation (NGC) external partners and customers
Deploying Remote Desktop Web Access with Remote Desktop Connection Broker Step-by- Step Guide
Deploying Remote Desktop Web Access with Remote Desktop Connection Broker Step-by- Step Guide Microsoft Corporation Updated: April 2010 Published: May 2009 Abstract RemoteApp and Desktop Connection provides
MadCap Software. Upgrading Guide. Pulse
MadCap Software Upgrading Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
MaaS360 On-Premises Cloud Extender
MaaS360 On-Premises Cloud Extender Installation Guide Copyright 2014 Fiberlink Communications Corporation. All rights reserved. Information in this document is subject to change without notice. The software
User Document. Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory
Adobe Acrobat 7.0 for Microsoft Windows Group Policy Objects and Active Directory Copyright 2005 Adobe Systems Incorporated. All rights reserved. NOTICE: All information contained herein is the property
2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
Dell Enterprise Reporter 2.5. Configuration Manager User Guide
Dell Enterprise Reporter 2.5 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365
Dell One Identity Cloud Access Manager 8.0.1 - How to Configure Microsoft Office 365 May 2015 This guide describes how to configure Microsoft Office 365 for use with Dell One Identity Cloud Access Manager
Management Reporter Integration Guide for Microsoft Dynamics AX
Microsoft Dynamics Management Reporter Integration Guide for Microsoft Dynamics AX July 2013 Find updates to this documentation at the following location: http://go.microsoft.com/fwlink/?linkid=162565
SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT WEB INTERFACE GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form
Support for Apple Mac and ios Devices
Support for Apple Mac and ios Devices Published: July 29, 2011 For the latest information, please see Microsoft Office 365. The information contained in this document represents the current view of Microsoft
RSA SecurID Software Token Security Best Practices Guide
RSA SecurID Software Token Security Best Practices Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA, the RSA
Deploying the Workspace Application for Microsoft SharePoint Online
Microsoft Dynamics GP Deploying the Workspace Application for Microsoft SharePoint Online Microsoft Dynamics GP Workspace is a method to enable Microsoft Excel-based dashboards for SharePoint Online. This
PINsafe Multifactor Authentication Solution. Technical White Paper
PINsafe Multifactor Authentication Solution Technical White Paper Abstract PINsafe is a flexible authentication solution that offers a wide range of authentication models. The use of the patented one-time
SECO Whitepaper. SuisseID Smart Card Logon Configuration Guide. Prepared for SECO. Publish Date 19.05.2010 Version V1.0
SECO Whitepaper SuisseID Smart Card Logon Configuration Guide Prepared for SECO Publish Date 19.05.2010 Version V1.0 Prepared by Martin Sieber (Microsoft) Contributors Kunal Kodkani (Microsoft) Template
AD RMS Step-by-Step Guide
AD RMS Step-by-Step Guide Microsoft Corporation Published: March 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide provides instructions for setting up a test environment to
