Hardening Security in ASP.NET Applications & Services. Rick G. Garibay
|
|
|
- Elaine McKinney
- 10 years ago
- Views:
Transcription
1 Hardening Security in ASP.NET Applications & Services Rick G. Garibay
2 Agenda Identities & Resources Security Design & Deployment Models Gatekeepers & Gates Resource Access Models Authentication Authorization.NET Principals & Identities Demo - WindowsPrincipal, WindowsIdentity PrincipalPermissionAttribute Demo - Implementing Trusted Subsystem Model within the Intranet
3 About Me St. Edwards Graduate! U.S. Army Veteran Microsoft Certified Application Developer -.NET Framework Microsoft Certified Professional 7+ years professional experience developing Microsoft solutions for the retail and financial services industry Architect, Program Manager for ESS, a Microsoft Gold Partner ISV in Phoenix, AZ Speaker, leadership team Phoenix.NET User Group Get this deck and code samples at
4 Question What are your design goals? Availability Reliability Scalability Interoperability Performance Security is not optional.
5 Identities & Resources Who will access resources? Original caller s identity Process identity Service account Custom identity What will your identity access? Files, folders Applications, Services Databases Objects, methods
6 Security Design & Deployment Models Security begins with good design Authentication Boundary Authorization Boundary
7 Security Design & Deployment Models Standalone Web/Application Server Model
8 Security Design & Deployment Models Distributed Web and Application Model
9 Gatekeepers & Gates Gatekeeper Gates Logon rights Local & domain policies Windows ACL TCP/IP filtering IP Security Authentication (Anonymous, Basic, Digest, Integrated, Certificate) IIS IP address and domain name filtering. Web permissions NTFS permissions URL Authorization ASP.NET File Authorization Principal Permission Demands.NET Roles Windows (NTLM / Kerberos) authentication COM+ Enterprise Services Enterprise Services (COM+) roles Impersonation levels Web Services Remoting ADO.NET SQL Server Uses gates provided by IIS and ASP.NET Uses gates provided by the host. If hosted in ASP.NET it uses the gates provided by IIS and ASP.NET. If hosted in a Windows service, then you must develop a custom solution. Connection strings. Credentials may be explicit (SQL Server Authentication) or you may use Windows authentication (Trusted/SSPI) Server logins Database logins Database object permissions
10 Resource Access Models - Impersonation & Delegation Impersonation Win32 thread takes on the identity of the user or system (WindowsIdentity.GetCurrent()) Delegation Take the impersonated identity of the client and flow the identity downstream. Pros Provides for very tight control of resources. Facilitates granular auditing. Impersonation is easy to implement. Cons Can introduce severe maintenance overhead. Delegation is not trivial to implement. Significant scalability impacts can arise.
11 Resource Access Models - Trusted Subsystem Model Authenticate users Map users to roles Authorize based on role membership Access downstream resource manager using a fixed trusted identity Pros Very scalable (connection pooling). Minimal administrative effort to maintain. Users do not have access to resources. Cons Limited auditing Risk of further reaching consequences in event of breach.
12 Authentication What is authentication? ASP.NET Authentication Modes Windows Forms Passport None <system.web> <authentication mode="windows"/> <identity impersonate="false"/> // Default </system.web>
13 Authentication Windows Mode Windows Authentication Mechanisms Basic Digest Integrated Windows Authentication Certificate Anonymous
14 Authentication ASP.NET Authentication Modes Forms Very extensible Passport Single Sign On Limited implementations None IIS and NTFS will do the right thing regardless of this setting
15 ASP.NET Authentication Considerations Authentication Type IE Required Forms No Passport No Integrated Windows (Kerberos or NTLM) Yes Basic No Digest Yes Certificate No
16 More ASP.NET Authentication Considerations Authentication Type Anonymous Basic Digest Integrated Windows Client Certificates Supports Delegation Depends Yes No Depends Depends Notes If the anonymous account (by default IUSR_MACHINE) is configured in IIS as a local account, it cannot be delegated unless the local (Web server) and remote computer have identical local accounts (with matching usernames and passwords). If the anonymous account is a domain account it can be delegated. If Basic authentication is used with local accounts, it can be delegated if the local accounts on the local and remote computers are identical. Domain accounts can also be delegated. Integrated Windows authentication either results in NTLM or Kerberos (depending upon the version of operating system on client and server computer). NTLM does not support delegation. Kerberos supports delegation with a suitably configured environment. Can be delegated if used with IIS certificate mapping and the certificate is mapped to a local account that is duplicated on the remote computer or is mapped to a domain account. This works because the credentials for the mapped account are stored on the local server and are used to create an Interactive logon session (which has network credentials). Active Directory certificate mapping does not support delegation.
17 Identity Matrix 1 IIS Anonymous Authentication
18 Identity Matrix IIS Windows Integrated Authentication
19 Authorization What is authorization? Authorization Strategies Role-based (Intra-application or process) Operations such as viewing a web page or enabling a button. Class or Method level using System.Security.Permissions.PrincipalPermissionAttribute attribute. [PrincipalPermissionAttribute(SecurityAction.Demand, Authenticated=true, Role=@ Domain\HRGeneralists")] public bool IncreaseSalary(float percentincrease); { } m_currentsalary + = (m_currentsalary * percentincrease)
20 Authorization & Authorization Strategies Resource-based (extra-application or process) NTFS file resources Database resources Business Services (SOAP, Remoting, WCF, etc) Who will access resources? Original caller s identity Process identity Service Account Custom identity
21 Tying Authentication & Authorization Together IIS Authentication Basic Digest Integrated Windows Certificate Anonymous ASP.NET Authentication Windows Forms Passport None Authentication Windows (SSPI) SQL Server Authentication/Authorization (COM+) RPC/COM+ Roles, NTFS Permissions Authorization NTFS IIS Permissions.NET Roles.NET Principal Authorization Logins Permissions Roles
22 Principals IPrincipal Interface (System.Security.Principal) public interface IPrincipal(); { } IIdentity Identity {get;} bool IsInRole(string role);
23 Identities IIdentity Interface (System.Security.Principal) public interface IIdentity(); { } string Name {get;} string auhenticationtype {get;} bool isauthenticated {get;}
24 System.Security.Principal Principal & Identity Classes in.net
25 RGG1 Authentication Context Win32 Thread System.Security.Principal.WindowsIdentity.GetCurrent() // Always ensure safe cast IIdentity identity = WindowsIdentity.GetCurrent(); // Access Members... NET Thread System.Web.HttpContext.User System.Threading.Thread.CurrentPrincipal // the following lines are functionaly equivelent string m_username = HttpContext.Current.User.Identity.Name; m_username = Thread.CurrentPrincipal.Identity.Name // Always ensure safe cast IPrincipal principal = HttpContext.Current.User // Access Members...
26 Slide 25 RGG1 Rick G. Garibay, 4/27/2006
27 Demo WindowsPrincipal and WindowsIdentity
28 Implementing Trusted Subsystem Model within the Intranet ASP.NET SOAP Web Services SQL Server Trust Boundary
29 Demo - Implementing Trusted Subsystem Model within the Intranet
30 Other Important Security Topics Secure Communication Applications are no longer islands unto themselves. Application security is meaningless if the your messages are wide open. Familiarize yourself with mechanisms for authenticating, authorizing and encrypting messages that cross process boundaries, especially in B2B scenarios. Code Access Security Addresses a different kind of security problem.
31 References
Microsoft Solutions for Security and Compliance Microsoft Identity and Access Management Series
Microsoft Solutions for Security and Compliance Microsoft Identity and Access Management Series Developing Identity-Aware ASP.NET Applications 2006 Microsoft Corporation. This work is licensed under the
Security IIS Service Lesson 6
Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and
TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual
TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
4cast Server Specification and Installation
4cast Server Specification and Installation Version 2015.00 10 November 2014 Innovative Solutions for Education Management www.drakelane.co.uk System requirements Item Minimum Recommended Operating system
TIBCO Spotfire Platform IT Brief
Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily
Windows IIS Server hardening checklist
General Windows IIS Server hardening checklist By Michael Cobb Do not connect an IIS Server to the Internet until it is fully hardened. Place the server in a physically secure location. Do not install
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
Enabling single sign-on for Cognos 8/10 with Active Directory
Enabling single sign-on for Cognos 8/10 with Active Directory Overview QueryVision Note: Overview This document pulls together information from a number of QueryVision and IBM/Cognos material that are
Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.
Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. 1. Click the Windows Start button, then Control Panel How-To-WCC-Secure-Windows-7-11/4/2010-4:09
Table Of Contents. - Microsoft Windows - WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS XP PROFESSIONAL...10
Table Of Contents - - WINDOWS SERVER 2003 MAINTAINING AND MANAGING ENVIRONMENT...1 WINDOWS SERVER 2003 IMPLEMENTING, MANAGING & MAINTAINING...6 WINDOWS XP - IMPLEMENTING & SUPPORTING MICROSOFT WINDOWS
AGILEXRM REFERENCE ARCHITECTURE
AGILEXRM REFERENCE ARCHITECTURE 2012 AgilePoint, Inc. Table of Contents 1. Introduction 4 1.1 Disclaimer of warranty 4 1.2 AgileXRM components 5 1.3 Access from PES to AgileXRM Process Engine Database
How-to: Single Sign-On
How-to: Single Sign-On Document version: 1.02 nirva systems [email protected] nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features
SQL Server Hardening
Considerations, page 1 SQL Server 2008 R2 Security Considerations, page 4 Considerations Top SQL Hardening Considerations Top SQL Hardening considerations: 1 Do not install SQL Server on an Active Directory
Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide
Deploying Remote Desktop Connection Broker with High Availability Step-by-Step Guide Microsoft Corporation Published: May 2010 Abstract This guide describes the steps for configuring Remote Desktop Connection
HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP
HOW TO CONFIGURE SQL SERVER REPORTING SERVICES IN ORDER TO DEPLOY REPORTING SERVICES REPORTS FOR DYNAMICS GP When you install SQL Server you have option to automatically deploy & configure SQL Server Reporting
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names
DataCove DT Active Directory Authentication In Active Directory (AD) authentication mode, the server uses NTLM v2 and LDAP protocols to authenticate users residing in Active Directory. The login procedure
Propalms TSE Quickstart Guide
Propalms TSE Quickstart Guide TSE 6.5 on Windows Server 2003 Propalms Ltd. Published February 2011 Overview This guide walks you through installing the first server in a Propalms TSE Team. Once complete
Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions
Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions Server Prerequisites Internet Information Server (IIS). It may be enabled in Windows Features (see Enabling IIS section).
Configuring Windows Server 2008 Network Infrastructure
Configuring Windows Server 2008 Network Infrastructure Course Number: 70-642 Certification Exam This course is preparation for the Microsoft Technical Specialist (TS) exam, Exam 70-642: TS: Windows Server
Installing, Configuring, and Managing a Microsoft Active Directory
Installing, Configuring, and Managing a Microsoft Active Directory Course Outline Part 1: Configuring and Managing Active Directory Domain Services Installing Active Directory Domain Services Managing
Management Center. Installation and Upgrade Guide. Version 8 FR4
Management Center Installation and Upgrade Guide Version 8 FR4 APPSENSE MANAGEMENT CENTER INSTALLATION AND UPGRADE GUIDE ii AppSense Limited, 2012 All rights reserved. part of this document may be produced
Installing and configuring Microsoft Reporting Services
Installing and configuring Microsoft Reporting Services Every company, big or small has to use various tools to retrieve data from their Databases. IT departments receive many different requests for data
Introducing the FirePass and Microsoft Exchange Server configuration
Deployment Guide Deploying Microsoft Exchange Server/Outlook Web Access and F5 s FirePass Controller Introducing the FirePass and Microsoft Exchange Server configuration Welcome to the FirePass Exchange
Creating a User Profile for Outlook 2013
Creating a User Profile for Outlook 2013 This document tells you how to create a user profile for Outlook 2013 on your computer (also known as the Outlook client). This is necessary, for example, when
Masterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5)
Masterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5) by Paula Januszkiewicz (3 days) Paula Januszkiewicz Paula Januszkiewicz is the world-known Security Expert. Loves to perform Penetration
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
Mixed Authentication Setup
Mixed Authentication Setup Version 8.2 January 1, 2016 For the most recent version of this document, visit our documentation website. Table of Contents 1 Overview 3 2 IIS installed components 3 2.1 Creating
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
Configuring Claims Based FBA with Active Directory store 1
Configuring Claims Based FBA with Active Directory store 1 Create a new web application in claims based authentication mode 1. From Central Administration, Select Manage Web Applications and then create
Okta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 [email protected] 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
Microsoft Corporation. Project Server 2010 Installation Guide
Microsoft Corporation Project Server 2010 Installation Guide Office Asia Team 11/4/2010 Table of Contents 1. Prepare the Server... 2 1.1 Install KB979917 on Windows Server... 2 1.2 Creating users and groups
Centralized Oracle Database Authentication and Authorization in a Directory
Centralized Oracle Database Authentication and Authorization in a Directory Paul Sullivan [email protected] Principal Security Consultant Kevin Moulton [email protected] Senior Manager,
ITAR Compliant Data Exchange
ITAR Compliant Data Exchange Managing ITAR Data Across Collaborative Project Teams WebSpace Customers Aerospace & Defense Manufacturing High Tech & Contract Manufacturing Automotive Manufacturing Medical/
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip
Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the
v.2.5 2015 Devolutions inc.
v.2.5 Contents 3 Table of Contents Part I Getting Started 6... 6 1 What is Devolutions Server?... 7 2 Features... 7 3 System Requirements Part II Management 10... 10 1 Devolutions Server Console... 11
WorkEngine Pre-Deployment Checklist
01.06.2011.01 Contents 1.0 Installer s Knowledge Pre-requisites... 1 2.0 Software Prerequisites... 1 3.0 Required Information Prior to Installation... 3 4.0 Client Desktop (Optional)... 4 1.0 Installer
USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity
USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of
Training module 2 Installing VMware View
Training module 2 Installing VMware View In this second module we ll install VMware View for an End User Computing environment. We ll install all necessary parts such as VMware View Connection Server and
Application Note. ShoreTel 9: Active Directory Integration. Integration checklist. AN-10233 June 2009
Application Note AN-10233 June 2009 ShoreTel 9: Active Directory Integration This application note outlines the configuration required to prepare a customer s Microsoft Active Directory environment for
Quickstart guide to Authentication
Quickstart guide to Authentication Introduction WebTitan provides the option to define how users authenticate themselves to WebTitan before accessing external web sites. By default, authentication is disabled,
How to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
How To Secure Your Data Center From Hackers
Xerox DocuShare Private Cloud Service Security White Paper Table of Contents Overview 3 Adherence to Proven Security Practices 3 Highly Secure Data Centers 4 Three-Tier Architecture 4 Security Layers Safeguard
Netwrix Auditor. Role-Based Access. Version: 7.1 10/27/2015
Netwrix Auditor Role-Based Access Version: 7.1 10/27/2015 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from Netwrix Corporation
Defender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
AuthXAccess Administration User Interface
Market Situation Laboratory directors have a critical need to provide agency wide access to their extranet applications. As these applications are served up to geographically dispersed users, the burden
Configuring, Managing and Maintaining Windows Server 2008-based Servers
Course 6419B: Configuring, Managing and Maintaining Windows Server 2008-based Servers OVERVIEW About this Course This five-day instructor-led course provides students with the knowledge and skills that
1. Please login to the Own Web Now Support Portal (https://support.ownwebnow.com) with your email address and a password.
Web Hosting Introduction The purpose of this Startup Guide is to familiarize you with Own Web Now's Web Hosting. Own Web Now offers two web hosting platforms, one powered by Linux / PHP and the other powered
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark
Symantec Enterprise Security Manager Baseline Policy Manual for CIS Benchmark For Windows Server 2008 Domain Controllers Version: 3.0.0 Symantec Enterprise Security Manager Baseline Policy Manual for
IIS 6: The Complete Reference
IIS 6: The Complete Reference Hethe Henrickson Scott Hofmann HLllHB DarmStddt McGraw-Hill/Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City urn1111 iiurnii, f H 15905980 Seoul Singapore
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord. PremierAccess. App Note. December 2001
Securing access to Citrix applications using Citrix Secure Gateway and SafeWord PremierAccess App Note December 2001 DISCLAIMER: This White Paper contains Secure Computing Corporation product performance
Parallels Plesk Panel
Parallels Plesk Panel Copyright Notice Parallels Holdings, Ltd. c/o Parallels International GMbH Vordergasse 49 CH8200 Schaffhausen Switzerland Phone: +41 526320 411 Fax: +41 52672 2010 Copyright 1999-2011
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment
NE-2273B Managing and Maintaining a Microsoft Windows Server 2003 Environment Summary Duration Vendor Audience 5 Days Microsoft IT Professionals Published Level Technology 05 October 2005 200 Microsoft
Windows Server 2008/2012 Server Hardening
Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible
Microsoft Dynamics GP Release
Microsoft Dynamics GP Release Workflow Installation and Upgrade Guide February 17, 2011 Copyright Copyright 2011 Microsoft. All rights reserved. Limitation of liability This document is provided as-is.
Course 6419B: Configuring, Managing and Maintaining Windows Server 2008-based Servers
Course 6419B: Configuring, Managing and Maintaining Windows Server 2008-based Servers Length: Delivery Method: 5 Days Instructor-led (classroom) About this Course This five-day instructor-led course provides
Cloud Services ADM. Agent Deployment Guide
Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Note that if at any time during the setup process you are asked to login, click either Cancel or Work Offline depending upon the prompt.
USC Marshall School of Business Academic Information Services Configuring Outlook 2010 RPC Over HTTP Protocol For Windows 7 Home Computers or Wireless Laptops The steps in this document cover how to configure
Masterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5)
Masterclass: Internet Information Services Management (IIS 8.5 / 8 / 7.5) CQURE Academy (3 days) Trainer: Grzegorz Tworek Grzegorz has extensive experience on Virtualization, Security, Infrastructure and
JapanCert 専 門 IT 認 証 試 験 問 題 集 提 供 者
JapanCert 専 門 IT 認 証 試 験 問 題 集 提 供 者 http://www.japancert.com 1 年 で 無 料 進 級 することに 提 供 する Exam : 70-643 Title : Windows Server 2008 Applications Infrastructure, Configuring Vendors : Microsoft Version :
MS 6419 Configuring, Managing and Maintaining Windows Server 2008-based Servers
MS 6419 Configuring, Managing and Maintaining Windows Server 2008-based Servers Description: Days: 5 Prerequisites: This five-day instructor-led course provides students with the knowledge and skills that
XIA Configuration Server
XIA Configuration Server XIA Configuration Server v7 Installation Quick Start Guide Monday, 05 January 2015 1 P a g e X I A C o n f i g u r a t i o n S e r v e r Contents Requirements... 3 XIA Configuration
Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview
Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network
70 299 Implementing and Administering Security in a Microsoft Windows Server 2003 Network Course Number: 70 299 Length: 1 Day(s) Course Overview This course is part of the MCSA training.. Prerequisites
Version 1.0. 2012 Devolutions inc.
Version 1.0 2 Remote Desktop Manager Server (Version 1.0) Table of Contents Foreword Part I Getting Started 0 4 1 What is... Remote Desktop Manager Server? 4 2 Features... 5 3 System... Requirements 6
Blackbaud NetCommunity Configuration Overview
Blackbaud NetCommunity Configuration Overview Table of Contents The NetCommunity Server Service Oriented Architecture... 1 Security Considerations... 2 Windows Server 2003/2008 Considerations... 3 Performance
Hardening IIS Servers
8 Hardening IIS Servers Overview This chapter focuses on the guidance and procedures required to harden the IIS servers in your environment. To provide comprehensive security for Web servers and applications
Accessing the Media General SSL VPN
Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your
Secret Server Installation Windows Server 2012
Table of Contents Introduction... 2 ASP.NET Website... 2 SQL Server Database... 2 Administrative Access... 2 Prerequisites... 2 System Requirements Overview... 2 Additional Recommendations... 3 Beginning
Security and Kerberos Authentication with K2 Servers
Security and Kerberos Authentication with K2 Servers SECURITY RIGHTS AND STEP-BY-STEP INSTRUCTIONS FOR CONFIGURING KERBEROS FOR K2 [BLACKPEARL] January 10 Learn about the security rights required by K2
SafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
SharePoint Integration Framework Developers Cookbook
Sitecore CMS 6.3 to 6.6 and SIP 3.2 SharePoint Integration Framework Developers Cookbook Rev: 2013-11-28 Sitecore CMS 6.3 to 6.6 and SIP 3.2 SharePoint Integration Framework Developers Cookbook A Guide
Configuring Managing and Maintaining Windows Server 2008 Servers (6419B)
Configuring Managing and Maintaining Windows Server 2008 Servers (6419B) Who Should Attend This course is intended for Windows Server administrators who operate Windows Servers on a daily basis and want
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.
Enabling Integrated Windows Authentication For CitectSCADA Web Client Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.xx Summary: What is the difference between Basic Authentication and Windows
PC-Duo Web Console Installation Guide
PC-Duo Web Console Installation Guide Release 12.1 August 2012 Vector Networks, Inc. 541 Tenth Street, Unit 123 Atlanta, GA 30318 (800) 330-5035 http://www.vector-networks.com Copyright 2012 Vector Networks
Implementation Guide. Version 10
Implementation Guide Version 10 Synthesis Enterprise Portal Implementation Guide Part Identification: RPIGSEP10 ReliaSoft Corporation Worldwide Headquarters 1450 South Eastside Loop Tucson, Arizona 85710-6703,
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Last revised: November 12, 2014 Table of Contents Table of Contents... 2 I. Introduction... 4 A. ASP.NET Website... 4 B.
Toolbox 3.3 Client-Server Configuration. Quick configuration guide. User manual. For the latest news. and the most up-todate.
User manual Toolbox 3.3 Client-Server Configuration Quick configuration guide For the latest news and the most up-todate information, please consult the Document history Version Comment Version 1.0 30/10/2010,
Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet
Step-by-Step Guide to Setup Instant Messaging (IM) Workspace Datasheet CONTENTS Installation System requirements SQL Server setup Setting up user accounts Authentication mode Account options Import from
Securing SQL Server. Protecting Your Database from. Second Edition. Attackers. Denny Cherry. Michael Cross. Technical Editor ELSEVIER
Securing SQL Server Second Edition Protecting Your Database from Attackers Denny Cherry Technical Editor Michael Cross AMSTERDAM BOSTON HEIDELBERG LONDON ELSEVIER NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
SQL Server Setup for Assistant/Pro applications Compliance Information Systems
SQL Server Setup for Assistant/Pro applications Compliance Information Systems The following document covers the process of setting up the SQL Server databases for the Assistant/PRO software products form
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
SIMS Multi-user Installation Instructions
SIMS Multi-user Installation Instructions 2011 SIMS Software TABLE OF CONTENTS REQUIREMENTS... 3 COMMON REQUIREMENTS... 3 DATABASE REQUIREMENTS... 3 SERVER REQUIREMENTS... 3 INSTALLING SIMS CLIENT... 5
Virto Password Reset Web Part for SharePoint. Release 3.1.0. Installation and User Guide
Virto Password Reset Web Part for SharePoint Release 3.1.0 Installation and User Guide 2 Table of Contents OVERVIEW... 3 SYSTEM REQUIREMENTS... 3 OPERATING SYSTEM... 3 SERVER... 3 BROWSER... 4 INSTALLATION...
Configuring Security Features of Session Recording
Configuring Security Features of Session Recording Summary This article provides information about the security features of Citrix Session Recording and outlines the process of configuring Session Recording
How To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
SINGLE SIGN-ON FOR MTWEB
SINGLE SIGN-ON FOR MTWEB FOR MASSTRANSIT ENTERPRISE WINDOWS SERVERS WITH DIRECTORY SERVICES INTEGRATION Group Logic, Inc. November 26, 2008 Version 1.1 CONTENTS Revision History...3 Feature Highlights...4
Microsoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
How to Join QNAP NAS to Microsoft Active Directory (AD)
How to Join QNAP NAS to Microsoft Active Directory (AD) What is Active Directory? Active Directory is a Microsoft directory used in Windows environments to centrally store, share, and manage the information
SharePoint 2013 Logical Architecture
SharePoint 2013 Logical Architecture This document is provided "as-is". Information and views expressed in this document, including URL and other Internet Web site references, may change without notice.
SafeGuard Enterprise Installation guide
SafeGuard Enterprise Installation guide Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard Enterprise Overview...3 2 SafeGuard Enterprise components...4 3 Getting started...6 4 Setting
