Configuring and Monitoring SiteMinder Policy Servers
|
|
- Wilfred King
- 8 years ago
- Views:
Transcription
1 Configuring and Monitoring SiteMinder Policy Servers eg Enterprise v5.6
2 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced or disclosed to others without the prior permission of eg Innovations, Inc. eg Innovations, Inc. makes no warranty of any kind with regard to the software and documentation, including, but not limited to, the implied warranties of merchantability and fitness for a particular purpose. Trademarks Microsoft Windows, Windows NT, Windows 2000, Windows 2003 and Windows 2008 are either registered trademarks or trademarks of Microsoft Corporation in United States and/or other countries. The names of actual companies and products mentioned herein may be the trademarks of their respective owners. Copyright 2012 eg Innovations, Inc. All rights reserved.
3 Table of Contents CONFIGURING AND MONITORING SITEMINDER POLICY SERVERS...1 CONFIGURING AND MONITORING THE SITEMINDER POLICY SERVER MODEL CONFIGURING AN SITEMINDER POLICY SERVER TO WORK WITH THE EG ENTERPRISE SUITE ADMINISTERING THE EG MANAGER TO WORK WITH THE SMPOLICYSERVER MONITORING THE SITEMINDER POLICY SERVER...9 CONFIGURING AND MONITORING THE SITEMINDER 1VIEW SERVER ADMINISTERING THE EG ENTERPRISE SUITE TO MONITOR THE SITEMINDER 1VIEW SERVER MONITORING THE SITEMINDER 1VIEW SERVER...13 CONCLUSION...14
4 Table of Figures Figure 1.1: Opening the Siteminder Policy Server Management Console...2 Figure 1.2: Enabling audit logging...3 Figure 1.3: Selecting the Siteminder Policy server to be monitored...4 Figure 1.4: Managing the selected Siteminder Policy server...4 Figure 1.5: Configuring the SM Admin test...5 Figure 1.6: Configuring the SM Services test...6 Figure 1.7: Opening the Siteminder Policy Server Management Console...8 Figure 1.8: Viewing the service ports...9 Figure 2.1: Adding the Siteminder 1view server to be monitored...11 Figure 2.2: A list of unconfigured tests for the Siteminder 1view server...11 Figure 2.3: Configuring the SM Agent Authentication test...11
5 Configuring and Monitoring the Siteminder Policy Servers Configuring and Monitoring SiteMinder Policy Servers SiteMinder is a platform for secure portal, extranet, and intranet management. It meets key authentication, authorization, and personalization requirements for building and managing secure Web sites. A SiteMinder installation consists of two main components: the SiteMinder Policy Server and the SiteMinder Agent. The Policy Server manages the access control policies established by an administrator. These policies define which resources are protected and which users or user groups are allowed access to resources. Using policies, administrators can set time constraints on resource availability and IP address constraints on the client attempting access. The Policy Server runs on an NT or UNIX system and performs key security and portal management operations. To meet the security needs of each environment, the Policy Server supports a range of authentication methods and uses existing directory services to authenticate users. By supporting a wide range of authentication methods, the Policy Server provides flexibility and security for a diverse set of users. A SiteMinder Agent integrates with a Web server, a Web application server, or a custom application to enforce access control based on pre-defined policies. eg Enterprise provides different ways of monitoring the SiteMinder environment. For instance, eg agents can be deployed on each of the systems hosting a Web agent. Since every Web agent writes operational statistics to a local log file, the eg agent deployed on a Web agent host parses the log files and reads the desired performance data. Alternatively, the eg agent can be deployed on the Policy server itself. In this case, the eg agent uses SNMP to draw meaningful performance metrics from a component named SiteMinder OneView Monitor, which is hosted by the Policy server. This component identifies performance bottlenecks and provides information about resource usage in a SiteMinder deployment by collecting operational data from the Policy server and the Web agent. Each machine that hosts a monitored component includes an OneView agent, which sends operational data to the OneView Monitor. Depending upon the mode of monitoring that best suits their needs, users can adopt either one of the following monitoring models presented by the eg Enterprise suite: the Siteminder Policy model where monitoring is done by parsing log files, or the Siteminder 1view model, where monitoring is done using the SiteMinder OneView monitor This document discusses how to configure and monitor both the models. 1
6 Configuring and Monitoring the Siteminder Policy Server Model Chapter 1 Configuring and Monitoring the Siteminder Policy Server Model 1.1 Configuring an Siteminder Policy Server to work with the eg Enterprise suite To ensure that the eg Enterprise suite extracts the required performance metrics from the Siteminder Policy server model, the audit logging capability of the server needs to be enabled. To achieve this, do the following: 1. Open the "SiteMinder Policy Server Management Console" using the menu sequence depicted by Figure 1.1. Figure 1.1: Opening the Siteminder Policy Server Management Console 2. Click on the Settings tab to open it. 2
7 Configuring and Monitoring the Siteminder Policy Server Model Figure 1.2: Enabling audit logging 3. In the Audit Logging section present at the bottom of this tab (see Figure 1.2), click on the Audit User Activity and Audit Administrative Activity check boxes. 4. Then, select the Text File option, and specify the full path to the log file that is to be used for audit logging. Ensure that the same path is specified against the PATH parameter of the SmAdminTest, SmAuthTest, and SmAzTest, respectively. 5. Finally, click the Apply button and then the OK button to register the changes. 1.2 Administering the eg Manager to work with the SMPolicyServer To achieve the above, do the following: 1. Log into the eg administrative interface. 2. If a Siteminder Policy server is already discovered, then directly proceed towards managing it using the COMPONENTS - MANAGE/UNMANAGE page (Infrastructure -> Components -> Manage/Unmanage). However, if it is yet to be discovered, then run discovery (Infrastructure -> Components -> Discover) to get it discovered or add the component manually using the ADD/MODIFY COMPONENTS page (Infrastructure -> Components -> Add/Modify). Remember that components manually added are managed automatically. Discovered components, however, are managed using the COMPONENTS - MANAGE/UNMANAGE page. Figure 1.3 and Figure 1.4 clearly illustrate the process of managing the Siteminder Policy server. For more details on managing components, refer to Configuring and Monitoring Web Servers document. 3
8 Configuring and Monitoring the Siteminder Policy Server Model Figure 1.3: Selecting the Siteminder Policy server to be monitored Figure 1.4: Managing the selected Siteminder Policy server 6. Next, try to sign out of the eg administrative interface. 7. A LIST OF UNCONFIGURED TESTS listing the Siteminder tests requiring manual configuration, will appear. Click on the SM Admin test to configure it. Doing so will reveal the SM Admin 4
9 Configuring and Monitoring the Siteminder Policy Server Model test configuration page (see Figure 1.5). Figure 1.5: Configuring the SM Admin test 8. In this page, specify the following: a. TEST PERIOD - How often should the test be executed b. HOST - The host for which the test is to be configured c. PORT The port number of the administration service in the SMPolicyServer d. LOGOPTION - The default value of the LOGOPTION parameter is "logfile". This is because, the test collects measures by parsing the log files. e. PATH - The full path to the log file from which measures are collected. For example, "D:\Progra~1\Netegrity\SiteMinder\Log\smaccess.log". The path specified here should be the same as that specified in the Text File text box of Figure 1.2. f. AGENTNAMES A list of agent names separated by a comma g. DETAILED DIAGNOSIS - To make diagnosis more efficient and accurate, the eg Enterprise system embeds an optional detailed diagnostic capability. With this capability, the eg agents can be configured to run detailed, more elaborate tests as and when specific problems are detected. To enable the detailed diagnosis capability of this test for a particular component, choose the On option against DETAILED DIAGNOSIS. To disable the capability, click on the Off option. The option to selectively enable/disable the detailed diagnosis capability will be available only if the following conditions are fulfilled: The eg manager license should allow the detailed diagnosis capability Both the normal and abnormal requencies configured for the detailed diagnosis measures should not be Finally, click on the Update button of Figure Try to signout of the administrative interface again, and this time, you will be prompted to configure the SM Services test. Clicking on the test name will open the corresponding test configuration page (see Figure 1.6). 5
10 Configuring and Monitoring the Siteminder Policy Server Model Figure 1.6: Configuring the SM Services test 11. The SM Services test measures the availability of the Siteminder Policy server s services, and the time taken by the server for performing authentication and authorization checks. In the test configuration page that appears (see Figure 1.6), specify the following: a. TEST PERIOD - How often should the test be executed b. HOST - The host for which the test is to be configured. c. PORT The port at which the server listens d. TIMEOUT - The duration (in seconds) for which the test should wait for a response from the SMPolicyServer services e. AUTHENTICATIONPORT - The port number of the Authentication Service of the SMPolicyServer f. AUTHORIZATIONPORT - The port number of the Authorization Service of the SMPolicyServer g. ACCOUNTINGPORT - The port number of the Accounting service of the SMPolicyServer h. ADMINPORT - The port number of the Administration service of the SMPolicyServer i. AGENTNAME - The name of the configured webagent in the policy server user interface j. SHAREDSECREAT - The shared secreat assigned to the specified web agent k. RESOURCE - The resource, which is protected by the above configured web agent and requires username and password for authentication. Example: "/transpolar/inventory/3inventorysignon.htm". While specifying the resource value, ensure that it does not contain the IP address of the host machine. An example for a wrong resource value would be: " 6
11 Configuring and Monitoring the Siteminder Policy Server Model l. ACTION The action that needs to be checked. Example: "GET m. USERNAME - A valid USERNAME having permissions for the specified resource and configured action n. PASSWORD - The password for the above user o. JARFILEPATH - The full path to the directory in which the "smjavaagentapi.jar" file is present p. DETAILED DIAGNOSIS - To make diagnosis more efficient and accurate, the eg Enterprise system embeds an optional detailed diagnostic capability. With this capability, the eg agents can be configured to run detailed, more elaborate tests as and when specific problems are detected. To enable the detailed diagnosis capability of this test for a particular component, choose the On option against DETAILED DIAGNOSIS. To disable the capability, click on the Off option. The option to selectively enable/disable the detailed diagnosis capability will be available only if the following conditions are fulfilled: The eg manager license should allow the detailed diagnosis capability Both the normal and abnormal requencies configured for the detailed diagnosis measures should not be Finally, click on the Update button in Figure 1.6 to register the changes. 13. Signout of the eg administrative interface. To know the Administration, Accounting, Authorization, and Authentication ports of the SMPolicyServer, do the following: 1. Open the SiteMinder Policy Server Management Console using the menu sequence depicted by Figure 1.7 below: 7
12 Configuring and Monitoring the Siteminder Policy Server Model Figure 1.7: Opening the Siteminder Policy Server Management Console 2. Click on the Settings tab in the SiteMinder Policy Server Management Console to view the TCP ports of the SMPolicyServer services (see Figure 1.8). 8
13 Configuring and Monitoring the Siteminder Policy Server Model Admin Port Authorization Port Authentication Port Accounting Port Figure 1.8: Viewing the service ports 1.3 Monitoring the Siteminder Policy Server To monitor the Siteminder Policy Server, do the following: 1. Login as a monitor / supermonitor user. 2. Click on the Components option in the menu bar, and select the Servers option from the Components menu. 3. From the COMPONENT LIST, click on the Siteminder Policy Server being monitored. 9
14 Configuring and Monitoring the SiteMinder 1view Server Chapter 2 Configuring and Monitoring the Siteminder 1view Server 2.1 Administering the eg Enterprise suite to Monitor the Siteminder 1view Server To achieve the above, do the following: 1. Log into the eg administrative interface. 2. If an Siteminder 1view server is already discovered, then directly proceed towards managing it using the COMPONENTS - MANAGE/UNMANAGE page (Infrastructure -> Components -> Manage/Unmanage). However, if it is yet to be discovered, then run discovery (Infrastructure -> Components -> Discover) to get it discovered or add the component manually using the ADD/MODIFY COMPONENTS page (Infrastructure -> Components -> Add/Modify). Remember that components manually added are managed automatically. Discovered components, however, are managed using the COMPONENTS - MANAGE/UNMANAGE page. Figure 2.1 clearly illustrates the process of adding the Siteminder 1view server. For more details on managing components, refer to Configuring and Monitoring Web Servers document. 10
15 Configuring and Monitoring the SiteMinder 1view Server Figure 2.1: Adding the Siteminder 1view server to be monitored 3. Next, try to sign out of the eg administrative interface. 4. A LIST OF UNCONFIGURED TESTS listing the SiteMinder tests requiring manual configuration, will appear (see Figure 2.2). Figure 2.2: A list of unconfigured tests for the Siteminder 1view server 5. Click on the SM Agent Authentication test to configure it. This test tracks every critical step in the request authorization cycle of a Web agent, beginning with the Web agent's attempt to login to the Siteminder 1view server, through the request validation process, and finally, authorization. In the process, it indicates if any serious errors/failures have occurred at any stage. 6. Clicking on the test will reveal the test's configuration page (see Figure 2.3). Figure 2.3: Configuring the SM Agent Authentication test 11
16 Configuring and Monitoring the SiteMinder 1view Server 7. In this page, specify the following: TEST PERIOD - How often should the test be executed HOST - The host for which the test is to be configured PORT The port number of the Siteminder 1view server SNMPPORT - The port number at which the Siteminder 1view exposes its SNMP MIB. The default is 161. SNMPVERSION By default, the eg agent supports SNMP version 1. Accordingly, the default selection in the SNMPVERSION list is v1. However, if a different SNMP framework is in use in your environment, say SNMP v2 or v3, then select the corresponding option from this list. SNMPCOMMUNITY The SNMP community name that the test uses to communicate with the target device. This parameter is specific to SNMP v1 and v2 only. Therefore, if the SNMPVERSION chosen is v3, then this parameter will not appear. USERNAME This parameter appears only when v3 is selected as the SNMPVERSION. SNMP version 3 (SNMPv3) is an extensible SNMP Framework which supplements the SNMPv2 Framework, by additionally supporting message security, access control, and remote SNMP configuration capabilities. To extract performance statistics from the MIB using the highly secure SNMP v3 protocol, the eg agent has to be configured with the required access privileges in other words, the eg agent should connect to the MIB using the credentials of a user with access permissions to be MIB. Therefore, specify the name of such a user against the USERNAME parameter. AUTHPASS Specify the password that corresponds to the above-mentioned USERNAME. This parameter once again appears only if the SNMPVERSION selected is v3. CONFIRM PASSWORD Confirm the AUTHPASS by retyping it here. AUTHTYPE This parameter too appears only if v3 is selected as the SNMPVERSION. From the AUTHTYPE list box, choose the authentication algorithm using which SNMP v3 converts the specified USERNAME and PASSWORD into a 32-bit format to ensure security of SNMP transactions. You can choose between the following options: o o MD5 Message Digest Algorithm SHA Secure Hash Algorithm ENCRYPTFLAG This flag appears only when v3 is selected as the SNMPVERSION. By default, the eg agent does not encrypt SNMP requests. Accordingly, the ENCRYPTFLAG is set to NO by default. To ensure that SNMP requests sent by the eg agent are encrypted, select the YES option. ENCRYPTTYPE If the ENCRYPTFLAG is set to YES, then you will have to mention the encryption type by selecting an option from the ENCRYPTTYPE list. SNMP v3 supports the following encryption types: o o DES Data Encryption Standard AES Advanced Encryption Standard ENCRYPTPASSWORD Specify the encryption password here. CONFIRM PASSWORD Confirm the encryption password by retyping it here. SNMPCOMMUNITY - The community string of the Siteminder 1view server TIMEOUT The duration (in seconds) for which this test will wait for a response from 12
17 Configuring and Monitoring the SiteMinder 1view Server the Siteminder 1view server; beyond the stated period, the test will time out; the default period is 30 seconds. 8. Finally, click on the Update button of Figure Signout of the eg administrative interface. 2.2 Monitoring the Siteminder 1view Server To monitor the Siteminder 1view server, do the following: 1. Login as a monitor / supermonitor user. 2. Click on the Components option in the menu bar, and select the Servers option from the Components menu. 3. From the COMPONENT LIST, click on the Siteminder 1view server being monitored. 13
18 Conclusion Chapter 3 Conclusion This document has described in detail the steps for configuring and monitoring the Siteminder Policy Servers. For details of how to administer and use the eg Enterprise suite of products, refer to the user manuals. We will be adding new measurement capabilities into the future versions of the eg Enterprise suite. If you can identify new capabilities that you would like us to incorporate in the eg Enterprise suite of products, please contact support@eginnovations.com. We look forward to your support and cooperation. Any feedback regarding this manual or any other aspects of the eg Enterprise suite can be forwarded to feedback@eginnovations.com. 14
Configuring and Monitoring Citrix Access Gateway-Linux Servers. eg Enterprise v5.6
Configuring and Monitoring Citrix Access Gateway-Linux Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice.
More informationConfiguring and Monitoring Bluecoat AntiVirus
Configuring and Monitoring Bluecoat AntiVirus eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationConfiguring and Monitoring Citrix Branch Repeater
Configuring and Monitoring Citrix Branch Repeater eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of
More informationConfiguring and Monitoring Hitachi SAN Servers
Configuring and Monitoring Hitachi SAN Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationHow To Configure A Microsoft Virtual Server 2005 2005 On A Microsoul.Com (Windows) 2005 (Windows 2005) (Windows Vvirtual) (Powerpoint) (Msof) (Evil) (Microsoul) (Amd
Configuring and Monitoring Virtual Server 2005 eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationConfiguring and Monitoring Citrix Environments
Configuring and Monitoring Citrix Environments eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationeg Enterprise v5.2 Clariion SAN storage system eg Enterprise v5.6
EMC Configuring Clariion and SAN and Monitoring Monitoring storage an system EMC an eg Enterprise v5.2 Clariion SAN storage system eg Enterprise v5.6 Restricted Rights Legend The information contained
More informationMonitoring Traffic manager
Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
More informationConfiguring and Monitoring SNMP Generic Servers. eg Enterprise v5.6
Configuring and Monitoring SNMP Generic Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationMonitoring the HP Blade Servers
Monitoring the HP Blade Servers eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be
More informationMonitoring DoubleTake Availability
Monitoring DoubleTake Availability eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may
More informationMonitoring Sonic Firewall
Monitoring Sonic Firewall eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
More informationMonitoring QNAP NAS system
Monitoring QNAP NAS system eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
More informationConfiguring and Monitoring SharePoint Servers
Configuring and Monitoring SharePoint Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationMonitoring Coyote Point Equalizers
Monitoring Coyote Point Equalizers eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may
More informationMonitoring Network Elements
Monitoring Network Elements eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be
More informationConfiguring and Monitoring FTP Servers
Configuring and Monitoring FTP Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
More informationConfiguring and Monitoring Database Servers
Configuring and Monitoring Database Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationConfiguring and Monitoring Event Logs
Configuring and Monitoring Event Logs eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
More informationMonitoring the Hitachi Storage Devices
Monitoring the Hitachi Storage Devices eg Enterprise Version 6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationMonitoring the BlackBerry Enterprise Server
Monitoring the BlackBerry Enterprise Server eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationConfiguring and Monitoring the Client Desktop Component
Configuring and Monitoring the Client Desktop Component eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part
More informationConfiguring and Monitoring HP EVA StorageWorks Array
Configuring and Monitoring HP EVA StorageWorks Array eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part
More informationConfiguring and Monitoring the Xen Desktop Broker. eg Enterprise v5.6
Configuring and Monitoring the Xen Desktop Broker eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of
More informationMonitoring Veeam Backup Server. eg Enterprise v6
Monitoring Veeam Backup Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be
More informationManagement, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
More informationMonitoring App V eg Enterprise v6
Monitoring App V eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced or
More informationConfiguring and Montiroing Messaging Servers
Configuring and Montiroing Messaging Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this
More informationHow To Create An Easybelle History Database On A Microsoft Powerbook 2.5.2 (Windows)
Introduction EASYLABEL 6 has several new features for saving the history of label formats. This history can include information about when label formats were edited and printed. In order to save this history,
More informationMonitoring the Citrix Provisioning Server. eg Enterprise v6.0
Monitoring the Citrix Provisioning Server eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
More informationConfiguring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip
Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the
More informationMonitoring Event Logs
Monitoring Event Logs eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
More informationConfiguring and Monitoring AS400 Servers. eg Enterprise v5.6
Cnfiguring and Mnitring AS400 Servers eg Enterprise v5.6 Restricted Rights Legend The infrmatin cntained in this dcument is cnfidential and subject t change withut ntice. N part f this dcument may be reprduced
More informationCA Spectrum and CA Performance Center
CA Spectrum and CA Performance Center Integration Guide CA Spectrum Release 9.3 - CA Performance Center r2.3.00 This Documentation, which includes embedded help systems and electronically distributed materials,
More informationCustomer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview
Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the
More informationMonitoring Nginx Server
Monitoring Nginx Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
More informationMonitoring the Oracle VM Server
Monitoring the Oracle VM Server eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationuh6 efolder BDR Guide for Veeam Page 1 of 36
efolder BDR for Veeam Hyper-V Continuity Cloud Guide Setup Continuity Cloud Import Backup Copy Job Restore Your VM uh6 efolder BDR Guide for Veeam Page 1 of 36 INTRODUCTION Thank you for choosing the efolder
More informationCA Unified Infrastructure Management Server
CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for
More informationMonitoring Open VPN Access Server
Monitoring Open VPN Access Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may
More informationCA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
More informationNovaBACKUP xsp Version 15.0 Upgrade Guide
NovaBACKUP xsp Version 15.0 Upgrade Guide NovaStor / November 2013 2013 NovaStor, all rights reserved. All trademarks are the property of their respective owners. Features and specifications are subject
More informationPRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE
PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are
More informationSiteminder Integration Guide
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
More informationNetwork FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
More informationMonitoring the NTP Server. eg Enterprise v6.0
Monitoring the NTP Server eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
More informationMonitoring IBM HMC Server. eg Enterprise v6
Monitoring IBM HMC Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
More informationUsing Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
More informationHP Device Manager 4.6
Technical white paper HP Device Manager 4.6 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Configuring User Authentication...
More informationStarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users
StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011.
More informationCA SiteMinder. Web Agent Installation Guide for IIS 12.51
CA SiteMinder Web Agent Installation Guide for IIS 12.51 This Documentation, which includes embedded help systems and electronically distributed materials (hereinafter referred to as the Documentation
More informationCA Spectrum and CA Embedded Entitlements Manager
CA Spectrum and CA Embedded Entitlements Manager Integration Guide CA Spectrum Release 9.4 - CA Embedded Entitlements Manager This Documentation, which includes embedded help systems and electronically
More informationConfiguring and Monitoring Mail Servers
Configuring and Monitoring Mail Servers eg Enterprise v5.6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
More informationHP IMC Firewall Manager
HP IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW102-20120420 Legal and notice information Copyright 2012 Hewlett-Packard Development Company, L.P. No part of this
More informationHow to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
More informationDefender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
More informationHOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP
HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP When you install SQL Server you have option to automatically deploy & configure SQL Server Reporting
More informationCA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationMonitoring the Oracle VDI Broker. eg Enterprise v6
Monitoring the Oracle VDI Broker eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may
More informationScan to E-mail Quick Setup Guide
Xerox WorkCentre M118i Scan to E-mail Quick Setup Guide 701P42574 This guide provides a quick reference for setting up the Scan to E-mail feature on the Xerox WorkCentre M118i. It includes procedures for:
More informationTool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
More informationHow To Manage Storage With Novell Storage Manager 3.X For Active Directory
www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect
More informationHP A-IMC Firewall Manager
HP A-IMC Firewall Manager Configuration Guide Part number: 5998-2267 Document version: 6PW101-20110805 Legal and notice information Copyright 2011 Hewlett-Packard Development Company, L.P. No part of this
More informationShadowControl ShadowStream
ShadowControl ShadowStream Revision 1.3 4/12/2012 Table of Contents Introduction... 3 Download ShadowStream Server... 3 Installation... 4 Configuration... 5 Creating Users... 6 Testing the User Rights...
More informationHow To Login To The Mft Internet Server (Mft) On A Pc Or Macbook Or Macintosh (Macintosh) With A Password Protected (Macbook) Or Ipad (Macro) (For Macintosh) (Macros
TIBCO MFT Internet Server User Guide Software Release 7.2.4 October 2014 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE
More informationHow-to: Single Sign-On
How-to: Single Sign-On Document version: 1.02 nirva systems info@nirva-systems.com nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features
More informationMonitoring Symantec Backup Server. eg Enterprise v6
Monitoring Symantec Backup Server eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may
More informationLDAP User Guide PowerSchool Premier 5.1 Student Information System
PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson
More informationHallpass Instructions for Connecting to Mac with a Mac
Hallpass Instructions for Connecting to Mac with a Mac The following instructions explain how to enable screen sharing with your Macintosh computer using another Macintosh computer. Note: You must leave
More informationIntegrate Check Point Firewall
Integrate Check Point Firewall EventTracker Enterprise Publication Date: Oct.26, 2015 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract The purpose of this document is
More informationTSM for Windows Installation Instructions: Download the latest TSM Client Using the following link:
TSM for Windows Installation Instructions: Download the latest TSM Client Using the following link: ftp://ftp.software.ibm.com/storage/tivoli-storagemanagement/maintenance/client/v6r2/windows/x32/v623/
More informationUser Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
More informationDeploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2011 BitDefender 1. Installation Overview Thank you for selecting BitDefender Business Solutions
More informationEMC Data Protection Search
EMC Data Protection Search Version 1.0 Security Configuration Guide 302-001-611 REV 01 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published April 20, 2015 EMC believes
More informationIntegrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
More informationDeploying BitDefender Client Security and BitDefender Windows Server Solutions
Deploying BitDefender Client Security and BitDefender Windows Server Solutions Quick Install Guide Copyright 2010 BitDefender; 1. Installation Overview Thank you for selecting BitDefender Business Solutions
More informationContents Notice to Users
Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote
More informationAdministration Quick Start
www.novell.com/documentation Administration Quick Start ZENworks 11 Support Pack 3 February 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationCA SiteMinder. Web Agent Installation Guide for IIS. r12.5
CA SiteMinder Web Agent Installation Guide for IIS r12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationHP LeftHand SAN Solutions
HP LeftHand SAN Solutions Support Document Applications Notes Best Practices for Using SolarWinds' ORION to Monitor SANiQ Performance Legal Notices Warranty The only warranties for HP products and services
More informationWeb Remote Access. User Guide
Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior
More informationSetting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
More informationMonitoring Quality Virtual Desktop
Monitoring Quality Virtual Desktop eg Enterprise v6.0 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document
More informationAstaro Security Gateway V8. Remote Access via SSL Configuring ASG and Client
Astaro Security Gateway V8 Remote Access via SSL Configuring ASG and Client 1. Introduction This guide contains complementary information on the Administration Guide and the Online Help. If you are not
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide April 2005 Part Number 132-00001-001, Version 1.0 Copyright Notice Copyright 2005 LifeSize Communications. All rights reserved. LifeSize Communications has made every
More informationMicrosoft Dynamics GP 2010. SQL Server Reporting Services Guide
Microsoft Dynamics GP 2010 SQL Server Reporting Services Guide April 4, 2012 Copyright Copyright 2012 Microsoft. All rights reserved. Limitation of liability This document is provided as-is. Information
More informationDocument Exchange Server 2.5
KOFAX Document Exchange Server 2.5 Administrator s Guide for Fujitsu Network Scanners 10001820-000 2008-2009 Kofax, Inc., 16245 Laguna Canyon Road, Irvine, California 92618, U.S.A. All rights reserved.
More informationILTA HANDS ON Securing Windows 7
Securing Windows 7 8/23/2011 Table of Contents About this lab... 3 About the Laboratory Environment... 4 Lab 1: Restricting Users... 5 Exercise 1. Verify the default rights of users... 5 Exercise 2. Adding
More informationParallels Plesk Panel
Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011
More informationPRINT FLEET MANAGER USER MANUAL
PRINT FLEET MANAGER USER MANUAL 1 Disclaimer of warranties and limitation of liabilities ( YES ) reserves all rights in the program as delivered. The program or any portion thereof may not be reproduced
More informationVersion 0.1 June 2010. Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP)
Version 0.1 June 2010 Xerox WorkCentre 7120 Fax over Internet Protocol (FoIP) Thank you for choosing the Xerox WorkCentre 7120. Table of Contents Introduction.........................................
More informationAgent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
More informationDell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More informationSSL... 2 2.1. 3 2.2. 2.2.1. 2.2.2. SSL VPN
1. Introduction... 2 2. Remote Access via SSL... 2 2.1. Configuration of the Astaro Security Gateway... 3 2.2. Configuration of the Remote Client...10 2.2.1. Astaro User Portal: Getting Software and Certificates...10
More informationCisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
More informationEventTracker Enterprise v7.3 Installation Guide
EventTracker Enterprise v7.3 Installation Guide Publication Date: Sep 11, 2012 EventTracker 8815 Centre Park Drive Columbia MD 21045 www.eventtracker.com Abstract This guide will help the users to install
More informationUse QNAP NAS for Backup
Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information
More information