Jive Connects for Microsoft SharePoint: Authentication Scenarios
|
|
|
- Buddy Brooks
- 10 years ago
- Views:
Transcription
1 Jive Connects for Microsoft SharePoint: Authentication Scenarios
2
3 Contents Authentication Scenarios... 3 Scenario 1: Authentication Through Impersonation...3 Impersonation Restriction Validation...4
4 Jive Connects for Microsoft SharePoint: Authentication Scenarios Jive Connects for Microsoft SharePoint: Authentication Scenarios - 2
5 Authentication Scenarios Jive Connects for Microsoft SharePoint provides tight integration between SharePoint and Jive. It takes SharePoint s strengths as a content repository with complex workflows and document management and couples it with Jive s social networking capability, intuitive interface, and high adoption rate. One of the major integration components is the ability to seamlessly authenticate a user's credentials and to properly authorize access based on each product's security "trimming" capability. Security "trimming" means to only show a user what they have the abiltity to see and/or interact with. This section focuses on authentication scenarios between Jive and SharePoint. Each scenario represents a real configuration used to demonstrate or test Jive and SharePoint integration. Scenario 1: Authentication Through Impersonation The following configuration describes a demonstration environment configured to use NTLM authentication and Impersonation for web service communication between SharePoint and Jive. This is the simplest authentication configuration between Jive and SharePoint. Individual Server Machines: JS-DC-02.jivedemo.local (Domain Controller) JS-J3-02.jivedemo.local (Jive Server) JS-M7-02.jivedemo.local (MOSS/SharePoint Server) Setting the Authentication Provider in SharePoint Registering a Jive Installation in SharePoint Jive Connects for Microsoft SharePoint: Authentication Scenarios - 3
6 Registering a SharePoint Location in Jive Impersonation Restriction Validation Jive Connects for Microsoft SharePoint: Authentication Scenarios - 4
7 Because the Sharepoint Connector uses impersonation, steps must be taken to restrict impersonation requests such that only authorized requests are performed. The configuration for these restrictions are discussed in: Configuring the Farm For Jive System Properties for SharePoint Integration There are basically two ways to restrict impersonation: by service account and by originating IP address. Restricting by service account is recommended. Restricting by originating IP address can also be done, but if load balancers are used in front of SharePoint or Jive then this can be less useful without extra network configuration. SharePoint Restriction Validation 1. (Optional) Test with validation turned off. a. Validate that no restrictions are set. Review the settings on Configuring the Farm For Jive and verify that: Impersonation is allowed Valid Incoming IP Addresses for Impersonation is blank Valid Incoming Service Accounts for Impersonation is blank b. Test hitting the custom SharePoint web services. 1. Log into SharePoint as a regular user (not a service account). IE or Firefox are ideal browsers for this because the results are easier to see (Chrome does not show results very well). 2. Determine a user you want to impersonate (not the account used above). 3. Change the URL in your browser to the following. Change <user> to the login of the user chosen in the step above (do not include the domain). <site_url>/_layouts/jive/webs.svc/rest/getwebs/<user> For example, getwebs/john.doe 4. You should see results in your browser showing a <webcollection> with more details. If this were to fail due to impersonation restrictions you should see something like: Invalid service account of '<domain>\<user>' for impersonation. Request denied. Invalid user host address of '<ip address>' for impersonation. Request denied. 2. Restrict the service account. a. Update SharePoint configuration to restrict the service account. 1. Navigate to Configuring the Farm For Jive. 2. Add each SharePoint Service account(s) specified in Adding a SharePoint Location to the Valid Incoming Service Accounts field. Hit the check icon to validate that the user is found. 3. Save your changes. 4. Perform an IISRESET (do for all web front ends). b. Test hitting the SharePoint web services with service accounts restricted. 1. Perform all steps under Step 1: (Optional) Test with validation turned off above. This should fail. 2. Perform all steps under Step 1: (Optional) Test with validation turned off above, but log into SharePoint using one of the service accounts. This should succeed. 3. (Optional) Restrict the incoming IP address. a. Update SharePoint configuration to restrict the IP address. 1. Navigate to Configuring the Farm For Jive. 2. Add each Jive server IP address to the Valid Incoming IP Addresses for Impersonation field. Separate each IP address with a newline/return. Note: You may need to add both IPv4 and IPv6 addresses. If you have load balancers in front of SharePoint, this setting should be left blank unless you can setup your network such that Jive->SharePoint requests bypass the load Jive Connects for Microsoft SharePoint: Authentication Scenarios - 5
8 balancers and go direct to a SharePoint server. Otherwise you would need to enter the load balancer IP address here and that would defeat the purpose of this restriction. 3. Save your changes. 4. Perform an IISRESET (do for all web front ends). 4. Test hitting the SharePoint web services with incoming IP addresses restricted. a. Perform all steps under Step 1: (Optional) Test with validation turned off above, but log into SharePoint using one of the service accounts and make sure your browser is not running from a Jive server. This should fail. b. Perform all steps under Step 1: (Optional) Test with validation turned off above, but log into SharePoint using one of the service accounts and make sure your browser is running from a Jive server. This should succeed. Jive Restriction Validation 1. (Optional) Test with validation turned off. a. Validate that no restrictions are set. Review the settings on System Properties for SharePoint Integration and verify that: The system property sharepoint.ip.restrictions is blank or non-existent. The system property sharepoint.serviceaccount.restrictions is blank or non-existent. b. Test hitting the custom Jive web services. 1. Log into Jive as a regular user (not a service account and not a Jive admin account). IE or Firefox are ideal browsers for this because the results are easier to see (Chrome does not show results very well). 2. Determine a user you want to impersonate (not the account used above). 3. Change the URL in your browser to the following. Change <user> to the login of the user chosen in the step above (do not include the domain). <jive_url>/rpc/rest/spintegration/places?username=<user> Example: username=john.doe 4. You should see results in your browser showing a <places> with more details. If this were to fail due to impersonation restrictions you should see something like: User not authorized for this type of request. User was not found in 'sharepoint.serviceaccount.restrictions' and/or requesting IP was not found in 'sharepoint.ip.restrictions'. 2. Restrict the service account. a. Update Jive configuration to restrict the service account. 1. Review configuration settings on System Properties for SharePoint Integration. 2. Create (or update) a property called sharepoint.serviceaccount.restrictions to have the Jive Service account(s) specified in each SharePoint Service account(s) specified in Manage Jive Installations. Separate multiple names with a comma. Do not include domain names. 3. Save your changes. b. Test hitting the Jive web services with service accounts restricted. 1. Perform all steps under Step 1: (Optional) Test with validation turned off above. This should fail. 2. Perform all steps under Step 1: (Optional) Test with validation turned off above, but log into Jive using one of the service accounts. This should succeed. 3. (Optional) Restrict the incoming IP address. a. Update Jive configuration to restrict the IP address. 1. Review configuration settings on System Properties for SharePoint Integration. 2. Create (or update) a property called "sharepoint.ip.restrictions" to have each SharePoint server IP address. Separate each IP address with a comma. Note: You may need to add both IPv4 and IPv6 addresses. If you have load balancers in front of Jive, this setting may not work as well and you may want to go without setting this property. If you can setup your network such that Jive Connects for Microsoft SharePoint: Authentication Scenarios - 6
9 SharePoint->Jive requests bypass the load balancers and go direct to a Jive server it should work fine. Otherwise it may require that you enter the load balancer IP address here and that would defeat the purpose of this restriction. 3. Save your changes. b. Test hitting the Jive web services with incoming IP addresses restricted. Perform all steps under Step 1: (Optional) Test with validation turned off above, but log into Jive using one of the service accounts and make sure your browser is not running from a SharePoint server. This should fail. Perform all steps under Step 1: (Optional) Test with validation turned off above, but log into Jive using one of the service accounts and make sure your browser is running from a SharePoint server. This should succeed. Jive Connects for Microsoft SharePoint: Authentication Scenarios - 7
Jive Connects for Microsoft SharePoint: Troubleshooting Tips
Jive Connects for Microsoft SharePoint: Troubleshooting Tips Contents Troubleshooting Tips... 3 Generic Troubleshooting... 3 SharePoint logs...3 IIS Logs...3 Advanced Network Monitoring... 4 List Widget
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
Jive Connects for Microsoft SharePoint
Jive Connects for Microsoft SharePoint Contents Jive Connects for Microsoft SharePoint...2 ReadMe... 3 Best Practices... 4 Getting Started... 4 Troubleshooting Tips... 5 Generic Troubleshooting...5 Active
c360 SharePoint Integration User Guide Microsoft Dynamics CRM 4.0 compatible c360 Solutions, Inc. [email protected] www.c360.com
c360 SharePoint Integration User Guide Microsoft Dynamics CRM 4.0 compatible c360 Solutions, Inc. [email protected] www.c360.com c360 Solutions All Rights Reserved Contents c360 SharePoint Integration...
Cloud Services. Sharepoint. Admin Quick Start Guide
Cloud Services Sharepoint Admin Quick Start Guide 3/12/2015 ACTIVATION An activation letter will be sent to the email account of your administrator contact. SharePoint will be part of your Cloud Control
Egnyte Single Sign-On (SSO) Installation for OneLogin
Egnyte Single Sign-On (SSO) Installation for OneLogin To set up Egnyte so employees can log in using SSO, follow the steps below to configure OneLogin and Egnyte to work with each other. 1. Set up OneLogin
Remote Desktop Web Access. Using Remote Desktop Web Access
Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off
VERALAB LDAP Configuration Guide
VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to
Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder
Setting up Sharp MX-Color Imagers for Inbound Fax Routing to Email or Network Folder MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, *MX-M850, *MX-M950,
How-to: Single Sign-On
How-to: Single Sign-On Document version: 1.02 nirva systems [email protected] nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features
Active Directory Integration
Active Directory Integration Last updated March 2016 Contents Introduction:... 2 Administration configuration set up:... 2 Configuring for a single OU import... 3 User Importing... 3 Active Directory and
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
Wireless Email Installation Checklist for Novell GroupWise Environments
Overview Wireless Email Installation Checklist for Novell GroupWise Environments This chapter includes a checklist to be completed before you install Wireless Email for Novell GroupWise. By completing
Using ADOBE LIVECYCLE ES4 Connector for MICROSOFT SHAREPOINT
Using ADOBE LIVECYCLE ES4 Connector for MICROSOFT SHAREPOINT Legal notices Legal notices For legal notices, see http://help.adobe.com/en_us/legalnotices/index.html. iii Contents Using the Connector for
OneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
How to Access Coast Wi-Fi
How to Access Coast Wi-Fi Below is a summary of the information required to configure your device to connect to the coast-wifi network. For further assistance in configuring your specific device, continue
Setting Up Jive for SharePoint Online and Office 365. Introduction 2
Setting Up Jive for SharePoint Online and Office 365 Introduction 2 Introduction 3 Contents 4 Contents Setting Up Jive for SharePoint Online and Office 365...5 Jive for SharePoint Online System Requirements...5
Quickstart guide to Configuring WebTitan
Quickstart guide to Configuring WebTitan 1. Install the License Once you have received the evaluation license by e-mail, you log on to WebTitan as follows using a browser as admin/hiadmin. Then navigate
BusinessObjects Enterprise XI Release 2
BusinessObjects Enterprise XI Release 2 How to configure an Internet Information Services server as a front end to a WebLogic application server Overview Contents This document describes the process of
DOCOsoft SharePoint Components
DOCOsoft SharePoint Components 2011 1 Table of Contents Introduction... 3 SharePoint Enhancements... 4 SharePoint Plugin for Outlook... 4 SharePoint Viewer... 7 SharePoint Audit... 9 SharePoint Document
ControlPoint. Advanced Installation Guide. Publication Date: January 12, 2016. Metalogix International GmbH., 2008-2016 All Rights Reserved.
ControlPoint Publication Date: January 12, 2016 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of this software,
Active Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: [email protected] Online Support: [email protected] CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
Deploying Microsoft SharePoint Services with Stingray Traffic Manager DEPLOYMENT GUIDE
Deploying Microsoft SharePoint Services with Stingray Traffic Manager DEPLOYMENT GUIDE Table of Contents Overview... 2 Installation and Initial Configuration of SharePoint services... 3 System Requirements...
Managed Devices - Web Browser/HiView
Managed Devices - Web Browser/HiView All Hirschmann managed devices have a web based GUI interface available for configuration purposes. This is typically the primary means of configuration used for most
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
BarTender Print Portal. Web-based Software for Printing BarTender Documents WHITE PAPER
BarTender Print Portal Web-based Software for Printing BarTender Documents WHITE PAPER Contents Overview 3 Installing Print Portal 4 Configuring Your Installation 4 Supported Printing Technologies 5 Web
Team Foundation Server 2013 Installation Guide
Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day [email protected] v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide
Undergraduate Academic Affairs \ Student Affairs IT Services. VPN and Remote Desktop Access from a Windows 7 PC
Undergraduate Academic Affairs \ Student Affairs IT Services VPN and Remote Desktop Access from a Windows 7 PC Last edited: 4 December 2015 Contents Inform IT Staff... 1 Things to Note... 1 Setting Up
ADFS for. LogMeIn and join.me authentication
ADFS for LogMeIn and join.me authentication ADFS for join.me authentication This step-by-step guide walks you through the process of configuring ADFS for join.me authentication. Set-up Overview 1) Prerequisite:
IBM Aspera Add-in for Microsoft Outlook 1.3.2
IBM Aspera Add-in for Microsoft Outlook 1.3.2 Windows: 7, 8 Revision: 1.3.2.100253 Generated: 02/12/2015 10:58 Contents 2 Contents Introduction... 3 System Requirements... 5 Setting Up... 6 Account Credentials...6
SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.
Enabling Integrated Windows Authentication For CitectSCADA Web Client Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.xx Summary: What is the difference between Basic Authentication and Windows
Setting Up Sharp MX-Color Imagers To Scan To Email
Setting Up Sharp MX-Color Imagers To Scan To Email MX-2300, MX-2600, MX-2700, MX-3100, MX-3501, MX-4501, MX-5500, MX-6200, MX-6201, MX-7000, MX-7001, MX-M850, MX-M950, MX-M1100 Step 1. Click Start > Run
Enterprise Knowledge Platform
Enterprise Knowledge Platform Single Sign-On Integration with Windows Document Information Document ID: EN136 Document title: EKP Single Sign-On Integration with Windows Version: 1.3 Document date: 19
SchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
Junos Pulse VPN Client Installation
Junos Pulse VPN Client Installation Windows 7 Installation p 2-6 Windows 8.1 Installation p 7-11 Macintosh version 10.6 and greater p 12-17 *This vpn appliance is to replace the Legacy SP vpn client Cisco
3rd Party VoIP Phone Setup Guide (Panasonic 500-550b)
3rd Party VoIP Phone Setup Guide (Panasonic 500-550b) We are changing how we add 3rd party VoIP phones to accounts. Going forward, you can simply add a 3rd Party Softphone and use those credentials to
Setting up Hyper-V for 2X VirtualDesktopServer Manual
Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein
Metalogix Replicator. Quick Start Guide. Publication Date: May 14, 2015
Metalogix Replicator Quick Start Guide Publication Date: May 14, 2015 Copyright Metalogix International GmbH, 2002-2015. All Rights Reserved. This software is protected by copyright law and international
AVG Business Secure Sign On Active Directory Quick Start Guide
AVG Business Secure Sign On Active Directory Quick Start Guide The steps below will allow for download and registration of the AVG Business SSO Cloud Connector to integrate SaaS application access and
To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to work with each other.
w w w. e g n y t e. c o m Egnyte Single Sign-On (SSO) Installation for VMware Horizon To set up Egnyte so employees can log in using SSO, follow the steps below to configure VMware Horizon and Egnyte to
Active Directory Integration. Documentation. http://mid.as/ldap v1.02. making your facilities work for you!
Documentation http://mid.as/ldap v1.02 making your facilities work for you! Table of Contents Table of Contents... 1 Overview... 2 Pre-Requisites... 2 MIDAS... 2 Server... 2 AD Users... 3 End Users...
Instructions for Configuring Your Browser Settings and Online Security FAQ s. ios8 Settings for iphone and ipad app
Instructions for Configuring Your Browser Settings and Online Security FAQ s ios8 Settings for iphone and ipad app General Settings The following browser settings and plug-ins are required to properly
How To Set Up Dataprotect
How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact
Wireless Setup for Windows 8
Wireless Setup for Windows 8 Wireless Names KUEMPLOYEE Only Kettering Staff and Faculty can connect to this wireless o Network Access, Internet Access, Printer Access, License Manager KUSTUDENT Active
Defender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
Checkmate 5.5 Self Hosted Quick Start Guide
Checkmate 5.5 Self Hosted Quick Start Guide Introduction Checkmate 5.5 offers a new web interface allowing all users in your environment to seamlessly access all of Checkmate s features by connecting to
How To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
AGILEXRM REFERENCE ARCHITECTURE
AGILEXRM REFERENCE ARCHITECTURE 2012 AgilePoint, Inc. Table of Contents 1. Introduction 4 1.1 Disclaimer of warranty 4 1.2 AgileXRM components 5 1.3 Access from PES to AgileXRM Process Engine Database
Integrating Cisco ISE with GO!Enterprise MDM Quick Start
Integrating Cisco ISE with GO!Enterprise MDM Quick Start GO!Enterprise MDM Version 3.x Overview 1 Table of Contents Overview 3 Getting GO!Enterprise MDM Ready for ISE 5 Grant ISE Access to the GO!Enterprise
Single Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
WorkEngine Pre-Deployment Checklist
01.06.2011.01 Contents 1.0 Installer s Knowledge Pre-requisites... 1 2.0 Software Prerequisites... 1 3.0 Required Information Prior to Installation... 3 4.0 Client Desktop (Optional)... 4 1.0 Installer
Installation and Upgrade Guide
ControlPoint for Office 365 Publication Date: January 12, 2016 All Rights Reserved. This software is protected by copyright law and international treaties. Unauthorized reproduction or distribution of
InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x
InfoRouter LDAP Authentication Web Service documentation for inforouter Versions 7.5.x & 8.x Active Innovations, Inc. Copyright 1998 2015 www.inforouter.com Installing the LDAP Authentication Web Service
Nintex Workflow 2010 Installation Guide. Installation Guide. 2012 Nintex USA LLC, All rights reserved. Errors and omissions excepted.
Installation Guide 2012 Nintex USA LLC, All rights reserved. Errors and omissions excepted. Table of Contents 1. Installing Nintex Workflow 2010... 3 1.1 Run the Installer... 3 1.2 Deploy the Solution
WHITE PAPER. Active Directory and the Cloud
WHITE PAPER Active Directory and the Cloud HyperOffice, 2011 What is Active Directory? What are its benefits? Active Directory (AD) is a directory service created by Microsoft. Active Directory is popularly
Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
IISADMPWD. Replacement Tool v1.2. Installation and Configuration Guide. Instructions to Install and Configure IISADMPWD. Web Active Directory, LLC
IISADMPWD Replacement Tool v1.2 Installation and Configuration Guide Instructions to Install and Configure IISADMPWD Replacement Tool v1.2 Web Active Directory, LLC Contents Overview... 2 Installation
Office 365 deployment checklists
Chapter 128 Office 365 deployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of issues.
Setup Guide Revision A. WDS Connector
Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee
How To Set Up Ops Cser.Com (Pros) For A Pc Or Mac) With A Microsoft Powerbook (Proos) (Prosecco) (Powerbook) (Pros) And Powerbook.Com/
PROS CS (Client-Server) Installation and Basic-configuration Guide Contents PROS CS (Client-Server)... 1 Installation and Basic-configuration Guide... 1 1. Overview... 2 2. Intro... 3 3. UPGRADING from
Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names
DataCove DT Active Directory Authentication In Active Directory (AD) authentication mode, the server uses NTLM v2 and LDAP protocols to authenticate users residing in Active Directory. The login procedure
HarePoint Workflow Extensions for Office 365. Quick Start Guide
HarePoint Workflow Extensions for Office 365 Quick Start Guide Product version 0.91 November 09, 2015 ( This Page Intentionally Left Blank ) HarePoint.Com Table of Contents 2 Table of Contents Table of
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
Migration Strategies and Tools for the HP Print Server Appliance
white paper HP Print Server Appliance 4250 July 2003 Migration Strategies and Tools for the HP Print Server Appliance (Web Jetadmin version 7.2 and above; PSA Firmware version 2.4.x and above) Overview
Infor Xtreme Browser References
Infor Xtreme Browser References This document describes the list of supported browsers, browser recommendations and known issues. Contents Infor Xtreme Browser References... 1 Browsers Supported... 2 Browser
Active Directory Provider User s Guide
Active Directory Provider User s Guide Mike Horton Version 01.00.03 Last Updated: December 28, 2007 Category: DotNetNuke v4.6.0 and greater Information in this document, including URL and other Internet
Paxera Uploader Basic Troubleshooting
Before going further, please check the logs and auto-route queue in the Uploader Control, these logs will say a lot about your problem. You should take care of the following before contacting our Support
Office 365 deploym. ployment checklists. Chapter 27
Chapter 27 Office 365 deploym ployment checklists This document provides some checklists to help you make sure that you install and configure your Office 365 deployment correctly and with a minimum of
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client
SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required
How to use Pcounter for Windows Common Configurations and Options Revised April 30, 2008
The Goal How to use Pcounter for Windows Common Configurations and Options Revised April 30, 2008 The Goal of this document is to provide step by step configuration instructions for Pcounter in some of
Shavlik Patch for Microsoft System Center
Shavlik Patch for Microsoft System Center User s Guide For use with Microsoft System Center Configuration Manager 2012 Copyright and Trademarks Copyright Copyright 2014 Shavlik. All rights reserved. This
Troubleshooting Jive for SharePoint
Troubleshooting Jive for SharePoint Contents 2 Contents Troubleshooting Jive For SharePoint... 3 General Troubleshooting... 3 Diagnosing Connection Problems... 4 Troubleshooting Search... 4 Managing the
SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit
SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit Note: SecureAware version 3.7 and above contains all files and setup configuration needed to use Microsoft IIS as a front end web server. Installing
Getting started with 2c8 plugin for Microsoft Sharepoint Server 2010
Getting started with 2c8 plugin for Microsoft Sharepoint Server 2010... 1 Introduction... 1 Adding the Content Management Interoperability Services (CMIS) connector... 1 Installing the SharePoint 2010
Tableau Server Trusted Authentication
Tableau Server Trusted Authentication When you embed Tableau Server views into webpages, everyone who visits the page must be a licensed user on Tableau Server. When users visit the page they will be prompted
M-CONNECT PRODUCT FILE UPLOAD EXTENSION FOR MAGENTO COMMERCE
M-CONNECT PRODUCT FILE UPLOAD EXTENSION FOR MAGENTO COMMERCE Overview This extension allows admin to upload files to products from Admin Panel products section, it allows you to share more information
USG40HE Content Filter Customization
USG40HE Content Filter Customization This guide is designed to help with the setup of the ZyWALL s content filtering feature. Supported Devices USG40HE Firmware version 4.10(AALA.0) or later Overview Content
Use of Commercial Backup Software with Juris (Juris 2.x w/msde)
Use of Commercial Backup Software with Juris (Juris 2.x w/msde) Juris databases hosted on a Microsoft SQL Server 2000 Desktop Engine (MSDE) instance can be backed up manually through the Juris Management
Using different Security Policies on Group Level for AD within one Portal. SSL-VPN Security on Group Level. Introduction
SSL-VPN Using different Security Policies on Group Level for AD within one Portal SSL-VPN Security on Group Level Introduction Security on the SSL-VPN is done via Policies which allows or denies access
TimeTrade Salesforce Connector Administrator Guide
TimeTrade Salesforce Connector Administrator Guide TimeTrade Systems, Inc. Step- by- step instructions for installing and configuring the Salesforce Connector Installation & Configuration Guide Table of
OPC Server Machine Configuration
OPC Server Machine Configuration General Information For remote OPC Server operation, server must be running under Windows XP Pro, Windows Server 2003, Windows Vista (Business & Ultimate), Windows 7 (Professional
Agent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
XIA Configuration Server
XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration
Request Manager Installation and Configuration Guide
Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Alberni Valley IT Services http://www.avits.ca [email protected]. Virtual domain E-mail information.
Alberni Valley IT Services http://www.avits.ca [email protected] Virtual domain E-mail information. Welcome! This document outlines information necessary for you to send and receive E-mail for your virtual
Windows SharePoint Services Installation Guide
Windows SharePoint Services Installation Guide [email protected] www.schmittdotnet.com Version 1.4 10/11/2010 Copyright and Disclaimers This guide is for informational purposes only. THE AUTHOR
Publish Cisco VXC Manager GUI as Microsoft RDS Remote App
Publish Cisco VXC Manager GUI as Microsoft RDS Remote App This appendix provides a step-by-step guide to publish the Cisco Cisco VXC Manager GUI as a Microsoft Remote Desktop Services (RDS) RemoteApp application.
Fasthosts Internet Parallels Plesk 10 Manual
Fasthosts Internet Parallels Plesk 10 Manual Introduction... 2 Before you begin... 2 Logging in to the Plesk control panel... 2 Securing access to the Plesk 10 control panel... 3 Configuring your new server...
Configuration Task 3: (Optional) As part of configuration, you can deploy rules. For more information, see "Deploy Inbox Rules" below.
Configure the E-mail Router After the E-mail Router has been installed, you can configure several aspects of it. Some of these configuration tasks are mandatory. Others are optional in that you use them
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
How To Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication
How To Configure Windows Server 2008 as a How To Configure Windows Server 2008 as a RADIUS Server with MS-CHAP v2 Authentication RADIUS Server with MS-CHAP v2 Authentication Applicable Version: 10.00 onwards
Portal Recipient Guide
Portal Recipient Guide Lindenhouse Software Limited 2015 Contents 1 Introduction... 4 2 Account Activation... 4 3 Forgotten Password... 9 4 Document signing... 12 5 Authenticating your Device & Browser...
Instructions for Accessing the Hodges University Virtual Lab
Instructions for Accessing the Hodges University Virtual Lab Table of Contents Adding the VLAB as a Trusted Site... 3 Accessing the VLAB using Windows 8... 5 Using Internet Explorer and Windows 8 to Access
Citrix Access on SonicWALL SSL VPN
Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring
EMR Link Server Interface Installation
EMR Link Server Interface Installation Version 1.0 ** INTRODUCTION ** If you would like assistance with installation, please contact our preferred support provider at [email protected], or call
WhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
