Apple Technical White Paper. Best Practices for Integrating OS X Lion with Active Directory
|
|
|
- Lucas Douglas
- 10 years ago
- Views:
Transcription
1 Best Practices for Integrating OS X Lion with Active Directory Updated November 1, 2011
2 Contents Apple s Built-In Solution... 3 How to Integrate OS X with Active Directory... 4 Enterprise Integration Challenges... 6 Deployment Strategies... 7 Home Directories... 9 Conclusion Appendix A: Modifying the Active Directory Schema to Support Mac Systems Appendix B: Managing Users and Policies on OS X With Workgroup Manager and Active Directory with Extended Schema Appendix C: Third-Party Add-On Solutions
3 Apple s Built-In Solution Directory services are a core component of enterprise computing environments that allow organizations to centralize information about users, groups, and computing resources. In addition to consolidating resources and simplifying system management, directory services also provide benefits to users by enabling them to access enterprise resources from anywhere on the network with a single set of credentials. The full effectiveness of directory services is seen when a single directory services infrastructure is used across all the desktop, notebook, and server systems within a network. A key advantage to this single-directory approach is that it allows organizations to centralize management of user, group and computing accounts. This approach alleviates problems caused by the proliferation of proprietary directory services solutions. Apple s implementation of a centralized directory service is called Open Directory. Integrated into the foundations of OS X Lion, Open Directory is responsible for providing directory and network authentication services for both OS X clients and OS X Server. Open Directory uses open standard protocols such as LDAP, Kerberos, and SASL. Although Apple provides its own native directory services platform through Open Directory, OS X supports access to a variety of other platforms including Microsoft s Active Directory. While every Active Directory installation is different, OS X integrates well with the vast majority of them with minimal effort. OS X offers Active Directory integration through a directory service. With this support, the user doesn t need to maintain a separate directory or separate user records to support OS X systems. Users can move between different computers while still adhering to enterprise policies for strong authentication and password-protected access to network resources. When fully integrated with Active Directory, OS X offers a complete managed environment where users can: Access any Mac in the integrated environment using the same credentials they would use to access Windows PCs. Be fully controlled by the Active Directory password policies. Have single sign-on access to Active Directory resources via Kerberos. Users can have network-based home directories, local home directories, or a combination of the two called Portable Home Directories, which are similar to roaming profiles on Windows. Users can be subject to client management policies enforced from the directory. For example, IT staff can specify that the screen saver requires a password via a policy from Active Directory. Apple s support for Active Directory extends to OS X Server as well. Integrating a server is just as easy as integrating a client system in fact, the process is essentially the same. This allows Windows-based departments to take advantage of file sharing, web services such as wikis and blogs, and other services in OS X Server while using their existing Active Directory infrastructure for identification 3
4 and authentication. Secure network services (including network home directories) hosted on OS X Server also support single sign-on for both OS X and Windows clients. Address Book and Mail The Address Book application in OS X Lion provides a flexible and convenient way to store contact information. Address Book can use common network technologies, such as LDAP, to query servers for contact information. This allows a Mac to look up contact information stored within Active Directory. Users can configure the use of an LDAP server (such as an Active Directory domain controller) even if their Mac hasn t been integrated into the Active Directory domain. Users can select the Directory Services group in Address Book and search for a user by name or address. Once the appropriate contact(s) have been located, users can then drag them into their local Address Book, which can be helpful if users who don t have permission to change Active Directory records want to add or modify information about a contact. Address Book is integrated with Mail, ichat, and other applications in OS X. This allows these other applications to access the same set of contact information available to Address Book. Mail, for example, will search Active Directory for contact information as users type a contact s name and will offer matching contacts for autocompletion of the address (provided addresses are included in Active Directory for user accounts). Address Book also offers the option for displaying phone numbers in large type for easy dialing, mapping of addresses using Google Maps, and easy copying of a correctly formatted address block ( Copy Mailing Label ). Additional information can be added to user accounts within Active Directory such as an instant messaging username or a blog address using Microsoft s management tools (or, if the environment is fully integrated, using Apple s Workgroup Manager). This information will appear in Address Book along with other contact information. How to Integrate OS X with Active Directory Computer accounts Each Mac system has a unique computer account in Active Directory. If you clone a system or integrate NetBoot with Active Directory, all of the cloned systems are assigned the same computer account. This means that it s important to take care when changing a computer account, as any change will break authentication from all systems using that account. Getting Started Using these simple steps, you can configure a Mac client to use DNS and Active Directory to determine the geometry of your Active Directory domain, find the nearest domain controller, and create a new computer account in the domain if there is not an existing one with the computer ID that you have chosen. On the Mac client, open the Accounts Pane within System Preferences, available from the Apple menu. Select Login Options, and then click Join under Network Account Server. Enter the name of your Active Directory domain. The sheet will expand so that you can enter any additionally required information. The computer s account in Active Directory will reflect the Client Computer ID make sure it reads correctly before proceeding. 4
5 Enter the user name and password of a user who has permission to join clients. This does not need to be an admin user you may assign the privilege to any user. If you need to specify advanced options or a custom OU, click Directory Utility. If the standard options are fine, click OK, and the Mac will be bound to Active Directory. Command Line Configuration The functionality of the Directory Access graphical user interface is also accessible from the command line interface with the dsconfigad command. For example, the following command would join a system to Active Directory: dsconfigad -preferred ads01.example.com -a COMPUTERNAME domain example.com -u administrator -p "password" Once you have bound a system to the domain, you can use dsconfigad to set the administrative options that are available in Directory Access: dsconfigad -alldomains enable -groups domain [email protected], enterprise [email protected] When using dsconfigad in a script, you must include the cleartext password that was used to join to the domain. Typically, an Active Directory user with no other admin privileges is delegated the responsibility of joining clients to the domain. This user name and password pair is stored in the script. In-depth Directory Service Information Start by enabling directory services debug logging: odutil set log debug Now when you attempt to join Active Directory, you can look at the log to see what is occurring: /var/log/opendirectoryd.log When you have accomplished a successful join, use the same command to disable the debug logging: odutil set log default It may also be helpful to examine a packet trace of the client attempting to join to the domain. By default, the traffic is encrypted. To disable encryption: /usr/sbin/dsconfigad -packetencrypt disable To reenable: /usr/sbin/dsconfigad -packetencrypt allow When capturing traffic for the following ports: UDP 53 TCP 88 TCP 389 TCP/UDP DNS - Kerberos - LDAP - Kerberos Password Changes (KPasswd) 5
6 TCP Global Catalog (LDAP) For example, to capture traffic over the built-in Ethernet connection to a file called capture.out, you could use the following syntax for tcpdump: tcpdump K -i en0 -s 0 -w capture.out port 88 or port 464 or port 53 or port 389 or port 3268 Enterprise Integration Challenges DNS service Since Active Directory relies on DNS SRV service records, the Mac client must be using the same DNS servers as all of the Windows clients on the network. Use the dig command to test that the Mac can read the proper DNS records. In the following example, replace example.com with the DNS of your Active Directory domain: dig -t SRV _ldap._tcp.example.com This should return the IP address of your domain controller. If it doesn t, your Mac systems are not using the same server for DNS as the Active Directory clients, or your DNS server is misconfigured. OS X client will attempt to dynamically update DNS records hosted by Active Directory, both the forward (A) and reverse (PTR) records. Passwords Since OS X Lion leverages Kerberos, it inherently supports Active Directory password policies and enforces restrictions on the length and complexity of passwords on client systems. Mac users can also change their passwords using the Accounts preference pane in OS X. Windows Server Versions Joining a Mac system to Active Directory has been successfully tested with Windows Server 2000, 2003, 2003R2, 2008, and 2008R2. The domain can be in either native or mixed mode without any change in the functionality of the OS X clients. In the days leading up to password expiration, users are notified that their password is about to expire, during login and other authentication events. This gives them the opportunity to change their password in Active Directory which will reset the expiration timer using the Accounts preference pane on the Mac client. When the password is within 24 hours of expiration, users cannot complete login until they have changed their password. When a Mac system is bound to Active Directory, it sets a computer account password that is then stored in the System keychain. This computer account password is automatically changed by the client. The default is every 14 days, but you can use the dsconfigad command-line tool to set any interval that your policy requires. Single Sign-On Apple and Microsoft both support Kerberos to provide a secure single sign-on environment. When integrated into an Active Directory environment, OS X uses Kerberos exclusively for all authentication activities. The use of Microsoft s NT LAN Manager (NTLM) suite of protocols, including both NTLMv1 and NTLMv2, can be prohibited on the network as needed, with no impact on Mac computers or services provided by OS X Server within the Active Directory environment. 6
7 When a user logs into a Mac using their Active Directory account, the Active Directory domain controller automatically issues a Kerberos Ticket- Granting Ticket (TGT). When the user attempts to use any service on the domain that supports Kerberos authentication, the TGT generates a ticket for that service, without requiring the user to authenticate again. You can use the Kerberos administration tools on a Mac to view tickets currently issued to a user both from the command line, where klist will display the current tickets, or by using the graphical Ticket Viewer utility located at /System/Library/CoreServices/Ticket Viewer.app, which allows you to view and work with Kerberos tickets. Site awareness Open Directory is site aware, able to use DNS service records and site information stored within Active Directory to locate and communicate with the most appropriate domain controllers (typically ones that are in close proximity in multi-site networks). By querying Active Directory for site information and polling the site s domain controllers, a Mac integrated in Active Directory can find not only the closest domain controllers but also the ones that respond the quickest. Using this information, Open Directory chooses domain controllers and Global Catalogs and communicates with them until a network change occurs, or until a domain controller stops responding. Namespace Support OS X offers the option of supporting multiple users with the same short names (or login names) that exist in different domains within the Active Directory forest. By enabling namespace support, using the dsconfigad command-line tool, a user in one domain can have the same short name as a user in a secondary domain. Both users will have to log in using the name of their domain followed by their short names (DOMAIN\short name), similar to logging in to a Windows PC. Signed Connections Open Directory is able to both sign and encrypt the LDAP connections used to communicate with Active Directory. Along with the signed Server Message Block (SMB) support that is present in OS X, you should have no need to downgrade your site s security policy to accommodate Mac clients. The signed and encrypted LDAP connections also eliminate any need to use LDAP over Secure Sockets Layer (SSL). If your site requires SSL connections, you can configure Open Directory to use SSL using the following command: /usr/sbin/dsconfigad -packetencrypt ssl Note that the certificates used on the domain controllers must be trusted for SSL encryption to be successful. If the domain controller certificates are not well-known certificates whose roots are installed by default in the System keychain, you must install and trust the root certificate in the System keychain. To manually install the root certificate, import it in Keychain Utility in /Applications/Utilities, or use the security command, as follows: /usr/bin/security add-trusted-cert -d -p basic -k /Library/ Keychains/System.keychain <path to certificate file> Deployment Strategies Managed Preferences OS X Lion offers a complete managed client environment where every aspect of the Mac user experience can be restricted or controlled. Although technically different from the way Windows group policies are implemented in Active Directory, the effect is very similar. When fully integrated, a user s access to any OS X components can be restricted and 7
8 their user environment (including OS X features as well as third-party applications) can be preset or completely controlled. Depending on the level of management your organization requires and the level of integration you want to use, there are several options for implementing client management for Mac computers: Do nothing Open Directory automatically enables authentication to Active Directory, including full support of password policies. It also allows you to set up network home directories for Mac users contained in Active Directory. Although this doesn t allow for client management, it does offer a fully functional environment in which standard users can be configured as nonadmin users on Mac clients. This allows you to ensure that they will not be able to change any system settings. Managed Client for OS X (Managed Preferences) Because Windows and OS X handle preferences differently, the Mac is unable to use Group Policy Objects (GPOs) in Active Directory. Instead, Apple has a system called Managed Preferences that accomplishes the same task. Managed Preferences can be stored locally on Mac clients that have been integrated into Active Directory, but this makes updates difficult because it involves each individual computer. It s also possible to host the Managed Preferences objects in Active Directory, which requires you to extend the schema. Another solution is to configure a secondary LDAP directory using OS X Server and Apple s Open Directory. In this scenario, clients still use Active Directory for user authentication, while Open Directory supplies Managed Preferences only. Use Profile Manager Profile Manager allows an administrator to configure policies outside of a directory service. In this scenario, a user would either opt-in to service configuration and policy settings via web interface or join the client to a profile manager server. The user would then authenticate against Active Directory, and the policies and settings would already exist locally on the Mac client. If the Mac is bound to a profile server, any changes to policies are triggered by an Apple Push notification, after which the Mac contacts the Profile Manager service to update policies and settings. Extend the Active Directory schema to handle management By adding Apple-specific attributes and object classes to the Active Directory schema, your Active Directory system can support all OS X management policies. Just use the management tools you would use to manage user and computer accounts stored on OS X Server and select the Active Directory domain as the target directory system. The details from this process are included in Appendix A and B. Use a dual directory This scenario adds OS X Server to the solution. Mac clients integrate with Active Directory and with an Open Directory domain hosted by OS X Server. In this scenario, clients still use Active Directory for user authentication, while Open Directory supplies client management only (often referred to as Manager Preferences). Active Directory users and groups are nested inside Open Directory groups. OS X further enhances this scenario with augmented records that allow information from a secondary directory to be added to information directly from Active Directory for the same record. This solution does not require any change to the Active Directory schema, but does require OS X Server. 8
9 Distributed File System (DFS) OS X Lion also supports home directories and mounting of file shares via DFS. The Universal Naming Convention (UNC) path is the same as the SMB path, but if the name is hosted in a DFS namespace, the share will be mounted correctly. AFP network homes It s also possible to use an afp:// URL for your home directories. In Active Directory, the URL remains in the standard UNC. On the Mac, however, you can allow the client to translate the SMB path into an AFP path. Use a third-party solution Products from Centrify, PowerBroker, Thursby, and Quest allow Managed Preferences to be stored in the Active Directory domain without requiring you to extend the schema. With the Thursby solution, you use OS X tools to create user preferences, while the Windows-based Centrify solution enables you to manage all the preferences using native Active Directory tools. PowerBroker Identity Services Enterprise Edition allows you to use both native Active Directory tools as well as Workgroup Manager to manage arbitrary preferences for many applications. QAS from Quest provides native Active Directory tool support as well as management for arbitrary preferences using preference manifests within the Active Directory Group Policy Editor. Home Directories Regardless of your strategy for Managed Preferences, you can set up users with local homes, network homes, or a combination of the two called Portable Home Directories, which are similar to roaming profiles on Windows. Local With the default configuration of Apple s Active Directory in Directory Services, the user s home stays on the local system, without any change to the user record in Active Directory. If a network home is defined in the user record, that share will mount on the desktop when the user logs in. Network To define a network home in the Mac user s Active Directory record, use a URL in the form of \\server\share\user just as you would for a Windows user. When interpreted by the Active Directory configuration on the Mac, the server name will be added to the Active Directory domain, forming a URL: smb://server.ad.domain/share/user. Note: If the user s domain is different from the domain of the user s home folder, it may be necessary to put the fully qualified name of the server in the URL. So, instead of //server/share/user, you would use // server.userad.domain/share/home. Using a Mac friendly naming convention does not affect the Windows systems on the network. The Mac user s network home can be hosted on either OS X Server or on a Windows server, using either AFP or SMB. You can even host home directories for both OS X and Windows clients on OS X Server, providing Mac services over AFP and Windows services over SMB. Portable Home Directory In this scenario, the Active Directory user record and the network home are cached locally on the client system, making it ideal for managing laptop users when they are away from the network. According to a sync policy, 9
10 the local system synchronizes with the remote home folder. For laptops, this typically happens when they reconnect to the network. Portable Home Directories can also be useful for managing desktop users. You decide how often the client syncs and what files are included in the sync and allow them to operate offline the rest of the time. Conclusion Apple s support for Active Directory within OS X Lion enables Mac clients and servers to integrate smoothly into existing Active Directory environments and provides the option of deploying a single directory services infrastructure that can support both Mac and Windows clients. Because OS X and Windows handle preferences differently, the Mac uses Managed Preferences to accomplish the same task as Group Policy Objects in Active Directory. Managed Preferences objects can be hosted in Active Directory, which requires you to extend the schema. To learn more about extending the schema, refer to Appendix A: Modifying the Active Directory Schema to Support Mac System. And to integrate Mac computers into an existing Active Directory infrastructure using a combination of Workgroup Manager and Active Directory with extended schema, refer to Appendix B: Managing Users and Policies on OS X With Workgroup Manager and Active Directory with Extended Schema. If you have any questions about the best practices discussed in this paper, or any other aspect of integrating OS X systems with Active Directory, please contact your Apple representative or Apple Authorized Reseller for assistance. 10
11 Appendix A: Modifying the Active Directory Schema to Support Mac Systems Most Windows administrators are familiar with client management and directory services in the form of Active Directory Group Policy Objects (GPOs). By joining Mac computers to an existing Active Directory domain, you can also provide user authentication and policy directly to Mac computers centrally from Active Directory. This is an important capability given the growing adoption and popularity of the Mac within enterprises. Group Policies that are well planned and executed can significantly ease setup, security, and support processes for new users and computers.. This appendix provides step-by-step instructions for extending the Active Directory schema to manage Mac systems. Background Just as Group Policies are a product of Active Directory, Managed Preferences are a product of Open Directory. Active Directory can be extended with Open Directory objects and attributes so that Mac computers can be integrated into an environment in which user and group records stored in Active Directory can have Managed Preferences associated with them, combining the best of both worlds. To support Mac systems using Active Directory, Mac computers must be bound to the existing Active Directory infrastructure. Active Directory can also be used to store managed client preferences directly in Active Directory attributes, which requires modification of the Active Directory schema. Once the schema is modified, Open Directory in OS X can read the managed client preferences and apply them. Then administrators can use Workgroup Manager, a free user management tool from Apple, to populate the managed client settings within Active Directory. This white paper explains how to update the Active Directory schema to support the Mac. Extending the schema for Apple-specific objects and attributes allows an organization to leverage its current Active Directory infrastructure without additional software for Mac computers. OS X systems can then be fully managed for security and organizational policy using a single directory service. To integrate Mac computers into Active Directory, you need to start with built-in Windows-based tools to apply the initial schema modifications. After the schema modifications have been applied, you can use Workgroup Manager on a Mac to store policies in Active Directory that will be enforced on any Mac computers bound to Active Directory. When joining OS X to Active Directory, OS X will authenticate against Active Directory. However, OS X does not recognize any Active Directory policies other than password policies. When Mac OS X is bound to Open Directory on OS X Server, it uses Managed Preferences from Open Directory to natively implement additional policies that are stored as XML files within Open Directory. For OS X to store and recognize objects and attributes within Active Directory, the Mac computers must be joined to 11
12 Active Directory, the Active Directory schema must be extended, and the administrator must populate Managed Preferences inside these objects and attributes. Once the Active Directory schema is extended, it will replicate any changes to the schema throughout the entire Active Directory forest. Active Directory Schema Analyzer To help integrate Mac computers into an existing Active Directory infrastructure, Microsoft provides the Active Directory Schema Analyzer, which connects to a preexisting directory service such as Open Directory and compares that schema to the schema in Active Directory. The Active Directory Schema Analyzer then generates custom LDAP Data Interchange Format (LDIF) files that can be used to modify the schema in Active Directory. By using the Active Directory Schema Analyzer to generate the schema modifications versus using stock LDIF files, system administrators will be made aware of any recent updates to the Active Directory schema from Apple, Microsoft, or third parties. For example, in Windows Server 2003, the RFC 2307 object classes and attributes were added to the Active Directory schema and were no longer required to be added for Managed Preferences. Requirements The following list outlines the components required to use the Active Directory Schema Analyzer to generate LDIF files and modify the schema in Active Directory: OS X Server v10.7 or later promoted to an Open Directory Master OS X v10.7 or later with Workgroup Manager installed to test schema modifications Windows XP with Service Pack 2 with.net Framework 2.0 or later installed A test Active Directory domain controller with the specified organization s current schema with Windows Server 2003 R2 schema or greater Creating the LDIF Schema Modifications Using the Active Directory Schema Analyzer to generate the required schema modifications is the first step in connecting Mac computers to both Active Directory and Open Directory. The following example shows how to accomplish this task. 1. On the Windows XP computer, download and install Microsoft s Active Directory Application Mode (ADAM) directory services toolset. While ADAM provides much greater functionality than the Active Directory Schema Analyzer tool, it is the only tool required for generating the schema modifications. Note that ADAM does not currently run in Windows Vista or Windows If you do not have.net Framework 2.0 or later installed, it must be installed in order to launch Active DirectorySchemaAnalyzer. 12
13 3. Choose Start > All Programs > ADAM> ADAM Tools Command Prompt. 4. Select the Active Directory Schema Analyzer tool by entering Active DirectorySchemaAnalyzer and pressing Return. 5. Choose File > Load Target Schema and enter the DNS name of the Open Directory Master. 6. Select Simple bind type and leave the other fields blank. Select a server type of Automatic and click OK. 7. Choose File > Load Base Schema. Enter the DNS name of the Active Directory domain controller, the Active Directory user name and password (an administrator s credentials are not required), and the domain where the Active Directory user s account resides. Select Secure bind type to enable the domain text box. Select server type of Active Directory and click OK. 8. Choose Schema > Hide Present Elements. The object classes and attributes contained in Open Directory, but absent from Active Directory, will be shown. Expand the Classes folder and then select the following classes and attributes. Note that you should not select all of the attributes because the other attributes may already be included within Active Directory or are not needed. For example, a user in Active Directory is composed of the following objectclasses: User, Person, and OrganizationalPerson. The User objectclass already contains the usercertificate and jpegphoto attributes, so you do not need to include them in the apple-user objectclass. By adding appleuser to the objectclasses of the User objectclass in Active Directory, Apple-specific attributes will be added to a User. The object classes and attributes that are added are nearly all apple- specific. The OS X Directory Data appendix in the OS X Server Open Directory Administration guide describes the object classes and attributes selected in the following list. [+] apple-computer-list [+] subclassof: top [X] posssuperior: top [+] rdnattid: cn [+] maycontain: apple-computer-list-groups [+] maycontain: apple-computers [X] maycontain: apple-generateduid [+] maycontain: apple-keyword [+] maycontain: apple-mcxflags [+] maycontain: apple-mcxsettings [X] mustcontain: cn Make sure that any other nonspecific attributes are deselected (contain an x in the checkbox). The only checkboxes that should be selected within the classes are shown above. When selecting schema classes and attributes, be sure to enable the desired class and then click to disable undesired attributes within a class. 13
14 For example, for the apple-computer-list, select apple-computer-list and then deselect maycontain: apple-generateduid, posssuperior: top, maycontain: apple-generateduid, and mustcontain: cn. The following is a list of objectclasses and attributes to select. Make sure that all of the objectclasses and attributes are selected, and deselect any attributes that are not contained in the list. apple-computer apple-computer-list apple-configuration apple-group subclassof: top rdnattid: cn maycontain: apple-category maycontain: apple-computer-list-groups maycontain: apple-hwuuid maycontain: apple-keyword maycontain: apple-mcxflags maycontain: apple-mcxsettings maycontain: apple-networkview maycontain: apple-service-url maycontain: apple-xmlplist maycontain: macaddress subclassof: top rdnattid: cn maycontain: apple-computer-list-groups maycontain: apple-computers maycontain: apple-keyword maycontain: apple-mcxflags maycontain: apple-mcxsettings subclassof: top rdnattid: cn maycontain: apple-data-stamp maycontain: apple-keyword maycontain: apple-xmlplist subclassof: top rdnattid: cn maycontain: apple-group-homeowner maycontain: apple-group-homeurl maycontain: apple-keyword maycontain: apple-mcxflags maycontain: apple-mcxsettings maycontain: apple-user-picture 14
15 apple-user mount subclassof: top rdnattid: cn maycontain: apple-imhandle maycontain: apple-keyword maycontain: apple-mcxflags maycontain: apple-mcxsettings maycontain: apple-user-authenticationhint maycontain: apple-user-class maycontain: apple-user-homequota maycontain: apple-userhomesoftquota maycontain: apple-user-mailattribute maycontain: apple-user-picture maycontain: apple-user-printattribute maycontain: apple-webloguri subclassof: top rdnattid: cn maycontain: mountdirectory maycontain: mountdumpfrequency maycontain: mountoption maycontain: mountpassno maycontain: mounttype 9. Choose File > Create LDIF File and save the LDIF file. This LDIF file contains all the schema modifications required for Active Directory. 10. Verify that you receive the message, LDIF file created: 27 attributes, 6 classes, 0 property sets, 0 updated present elements. If you did not export 27 attributes and 6 classes, recheck your selections and export again. Modifying the Resulting LDIF File Once you export the LDIF file from Active Directory Schema Analyzer, the file must be modified. Some of the object classes need to be changed, and some object classes require additional prefixes. You also need to specify where in Active Directory the required objects can be created. Updating objectclasscategory. The LDIF file from the Active Directory Schema Analyzer results in all objectclasses being assigned an attribute objectclasscategory with a value of 1. An objectclasscategory of 1 means that the object is a structural type, and an objectclasscategory of 3 is an auxiliary type. Structural objectclasses can be used to make objects within Active Directory, while 15
16 auxiliary objectclasses can only be used to extend a structural object (or other auxiliary objects). User, Group, and Computer objectclasses exist within Active Directory already, so the Apple associated objectclasses that extend Users, Groups, and Computers need to be changed to the objectclasscategory of 3 (auxiliary). 1. Open the LDIF file in Wordpad. 2. Find the apple-user, apple-group, and apple-computer objectclasses in the Classes section of the LDIF file and change the objectclasscategory to 3, as shown for the apple-user objectclass: # Class: apple-user dn: cn=cls-apple-user,cn=schema,cn=configuration,dc=x changetype: ntdsschemaadd objectclass: classschema governsid: ldapdisplayname: apple-user admindescription: apple user account objectclasscategory: 3 3. To effectively use auxiliary objectclasses, they need to be associated with current objectclasses in Active Directory. At the end of the LDIF file, add the following three sections to extend the User, Computer, and Group objectclasses in Active Directory with the apple-user, apple-computer, and apple-group auxiliary classes: # Add the new class to the user object dn: CN=User,CN=Schema,CN=Configuration,DC=X changetype: modify add: auxiliaryclass auxiliaryclass: apple-user - # Add the new class to the computer object dn: CN=Computer,CN=Schema,CN=Configuration,DC=X changetype: modify add: auxiliaryclass auxiliaryclass: apple-computer - # Add the new class to the group object dn: CN=Group,CN=Schema,CN=Configuration,DC=X changetype: modify add: auxiliaryclass auxiliaryclass: apple-group - Note: After each - line above, there must be a blank line, or the schema modifications will fail. 4. Save the LDIF file, but do not close the document. 16
17 Updating Prefixes. The Active Directory Schema Analyzer adds a prefix of cls to all object classes and attr to all attributes. Because most of the object classes and attributes already have the apple- prefix, you need to remove the attr- and cls- prefix: 1. If you closed it after the previous action, open the LDIF file with Wordpad in Windows. 2. In the Edit menu, select Replace. 3. Search for dn: cn=cls- and replace it with dn: cn= (do not specify the quotes). 4. Search for dn: cn=attr- and replace it with dn: cn= (do not specify the quotes). Microsoft recommends that all vendor-specific object classes and attributes include a prefix with the vendor s name. The majority of object classes and attributes already include the apple- prefix; however, the mount object class does not have a prefix and should be updated with the apple- prefix. Each of the following lines lists the addition of the apple- prefix to the start of the dn: Replace: dn: cn=mountdirectory,cn=schema,cn=configuration,dc=x With: dn: cn=apple-mountdirectory,cn=schema,cn=configuration,dc=x Replace: ldapdisplayname: mountdirectory With: ldapdisplayname: apple-mountdirectory Replace: dn: cn=mountdumpfrequency,cn=schema,cn=configuration,dc=x With: dn: cn=applemountdumpfrequency,cn=schema,cn=configuration,dc=x Replace: With: ldapdisplayname: mountdumpfrequency ldapdisplayname: apple-mountdumpfrequency Replace: dn: cn=mountoption,cn=schema,cn=configuration,dc=x With: dn: cn=apple-mountoption,cn=schema,cn=configuration,dc=x Replace: With: ldapdisplayname: mountoption ldapdisplayname: apple-mountoption Replace: dn: cn=mountpassno,cn=schema,cn=configuration,dc=x With: dn: cn=apple-mountpassno,cn=schema,cn=configuration,dc=x Replace: With: ldapdisplayname: mountpassno ldapdisplayname: apple-mountpassno 17
18 Replace: dn: cn=mounttype,cn=schema,cn=configuration,dc=x With: dn: cn=apple-mounttype,cn=schema,cn=configuration,dc=x Replace: ldapdisplayname: mounttype With: ldapdisplayname: apple-mounttype Replace: dn: cn=mount,cn=schema,cn=configuration,dc=x With: dn: cn=apple-mount,cn=schema,cn=configuration,dc=x Replace: With: ldapdisplayname: mount ldapdisplayname: apple-mount 5. Save the LDIF file, but do not close the document. Updating posssuperiors Active Directory includes an attribute within each object class that specifies what parent an object can have in the directory. This does not apply to auxiliary classes; it applies only to the object classes used to create objects within the directory. You need to specify where the objects can be created by specifying the posssuperiors attribute. For all apple object classes that can be used to create objects in Active Directory, specify posssuperiors of organizationunit and container. If you wish to specify where objects can be created, find the following object classes, remove any posssuperiors if they exist, and add organizationalunit and container as values for the posssuperiors attribute. The posssuperiors attributes can go anywhere within the appropriate object class sections. apple-computer-list posssuperiors: organizationalunit posssuperiors: container apple-configuration apple-mount posssuperiors: organizationalunit posssuperiors: container posssuperiors: organizationalunit posssuperiors: container Verifying the LDIF File To ensure that the LDIF file was correctly created, verify the following information: 18
19 apple-user, apple-group, and apple-computer have an objectclasscategory of 3. The Attributes section contains 27 attributes, and all attributes have an attributeid that starts with The Classes section contains 6 classes, and all governsids start with All attributes and classes have an apple- prefix in their dn and ldapdisplayname. After each - line, there is a blank line. Every objectclass that does not have an objectclasscategory of 3 has organizationalunit and container as posssuperiors. Note: It is critical that there be exactly 27 attributes and six classes, and that all attributes and classes have the Apple prefix. If this is not true, do not proceed until you have resolved these issues. If macaddress is in the list of attributes to be created, you may be using Windows Server 2000 or Windows Server macaddress was included in Windows Server 2003R2 and later, and is required for this whitepaper (note that Windows Server 2003 SP2 is not the same as Windows Server 2003R2). macaddress should be included in the apple-computer objectclass, but should not be listed under the Attributes section. This means that the apple-computer objectclass will have the macaddess attribute associated with it, but the macaddress attribute is not created when doing this schema modification. macaddress should already exist in Windows Server 2003R2 and later. Updating the Schema on a Domain Controller in the Forest The LDIF file created in the previous section can now be used to update the schema on a domain controller. The schema changes will be replicated to the rest of the forest during the next replication cycle. A domain controller must have the Flexible Single Master Operations (FSMO) role in order to apply schema modifications. See for information on how to view and transfer FSMO roles. The LDIF file can then be imported using the ldifde command. 1. Copy the LDIF file created in the previous section to the domain controller where you plan to implement the Active Directory schema modifications. 2. On the domain controller that has been designated the schema master, import the LDIF file using the ldifde command. The following command assumes that the LDIF file is named apple-mods.ldf and the domain name of the domain controller is EXAMPLE.COM: ldifde /j. /k /i /f apple-mods.ldf /v /c DC=X DC=EXAMPLE,DC=COM Note that /k will ignore errors if objectclasses or attributes already exist in the schema, /i will perform an import, /f specifies the file to import, /v is verbose output, /c will replace DC=X with the correctly formatted distinguishing name for the domain, and /j will send a copy of the output 19
20 to ldif.err and ldif.log in the current directory. Also do not change DC=X, as it produces the formatting required to use the /c option. Additional Changes Indexing and replicating to the Global Catalog When an OS X system searches Active Directory for policy applied directly on a computer account or as part of a computer list, it looks for the MAC address and apple-hwuuid attribute in computer accounts in the Global Catalog. It searches for the MAC address of the primary interface of the system (usually the built-in Ethernet port or wireless port on a MacBook Air computer). The system does not have to communicate with Active Directory over this network port. The MAC address attribute is populated in a computer account when a Mac computer is bound to Active Directory. Because a Mac will periodically search for policy applied to its computer account, the MAC address attribute should be indexed within Active Directory to improve search time and reduce overhead on domain controllers. Indexing the macaddress and apple-hwuuid attributes within Active Directory will provide greater responsiveness to searches and reduce CPU overhead on domain controllers. Also, since the Global Catalog is searched for the macaddress and apple-hwuuid, those attributes must be replicated to the Global Catalog in order for them to be found. Additionally, if you are populating uidnumber and gidnumber in user accounts and manually mapping those attributes, uidnumber and gidnumber must be indexed and replicated to the Global Catalog as well. Visit for more information. Verifying the Changes Once the schema modifications are complete, Workgroup Manager can create policy on Users, Groups, Computers, and Computer Lists. Use the following steps to verify that the schema modifications were successfully applied: 1. In Active Directory Users and Computers, create a security Group and populate it with Active Directory users who log in to Mac computers. 2. On an OS X client with Workgroup Manager installed, join Active Directory. If the client was bound before the schema changes were applied, you need to refresh the settings by either rebooting or restarting Open Directory on the client: sudo killall opendirectoryd 3. Launch Workgroup Manager, but do not authenticate. Click Cancel at the authentication window. 4. In the Server menu, select View Directories. 5. In the small globe in the upper right corner of the Workgroup Manager window, select Other. Select Active Directory and All Domains (or your specific domain if that is how you have configured the settings when joining Active Directory). 6. Select the Group tab and find the Group you created in step 1. 20
21 7. Click the Preferences button and select the System Preferences icon. 8. In the upper right corner, click the lock button and authenticate as an Active Directory Administrator who has write access to attributes of this Active Directory Group. 9. Change the Manage radio button to Always, click Show None, and click Apply. 10. Log out of the Mac and log in as an Active Directory user who is a member of the Group created in step 1. Go to System Preferences and note that all System Preferences panes are dimmed. Support Once the schema modifications have been applied to Active Directory, the AppleCare Protection Plan, a unique service and support solution that extends the complimentary coverage on the Mac, can assist you in integrating OS X clients into Active Directory. AppleCare representatives can help you validate the Apple-specific schema extensions. If there are any discrepancies, they can identify them. AppleCare personnel can also help you apply policy using Workgroup Manager to an Active Directory extended schema. Note that AppleCare does not offer support for creating the schema modifications or extending the Active Directory schema. If you need assistance, Microsoft can provide support for extending the Active Directory schema. 21
22 Appendix B: Managing Users and Policies on OS X With Workgroup Manager and Active Directory with Extended Schema To provide and enforce policies such as restricting access to specific applications or specifying when users screen savers activate without installing additional software, administrators can modify the Active Directory schema to support OS X Lion. This appendix is a how-to guide for system administrators who want to use a combination of Workgroup Manager and Active Directory with extended schema to authenticate Mac users and apply policies to their actions, thereby fully integrating Mac computers into an existing Active Directory infrastructure. Managed Preferences, Apple s own comprehensive client management architecture, are typically stored as records in Open Directory, the native directory services in OS X Server. However, to fully integrate Mac systems into Active Directory, administrators can store OS X policy information directly within Active Directory. OS X Server is not required to create Managed Preference-based policy in Active Directory. The easiest way to accomplish this is with Workgroup Manager, a free user management tool from Apple. Workgroup Manager can be used to create Computer Lists in Active Directory and to apply policy to Users, Groups, Computers, and Computer Lists. Users, Groups, and Computers can be created in Active Directory using standard Microsoft tools. Workgroup Manager is one of the OS X Server Administration Tools and comes with OS X Server. Download the latest version of the OS X Server Administration Tools at downloads. Connecting Workgroup Manager to Active Directory By joining Mac computers to an existing Active Directory domain, you can provide user authentication and policy directly to Mac computers centrally from Active Directory. Workgroup Manager communicates with Active Directory through the Active Directory configuration in Directory Services. To join Mac systems to Active Directory: 1. Open Directory Utility in /System/Library/CoreServices. 2. Click the Services button. 3. If the lock in the lower left corner is not selected, click the lock and enter a local administrator s user name and password. 4. Enter the Active Directory domain, for example: corp.example.com. 5. In the Computer ID field, enter the computer name. 6. Click Bind. Enter the user name and password of an Active Directory account that has the right to join computers to the domain. If the computer account is to be created in a different OU in Active Directory, the level at which administrative powers are commonly delegated, change the Computer OU. 22
23 7. Click OK to join. 8. Quit Directory Utility. After joining Active Directory, use Workgroup Manager to view and edit Mac-specific policy in Active Directory. To connect to Active Directory with Workgroup Manager: 1. Launch Workgroup Manager from /Applications/Server. It will prompt for authentication details. Click Cancel because the connection is not directly to Active Directory, but rather through the Active Directory configuration of Open Directory. 2. In the Server menu, choose View Directories. Ignore any warning messages about connecting to a local configuration database. 3. In the upper left corner, notice the domain selection globe. Select this globe and choose Other... Choose Active Directory > All Domains (or your specific domain). The Users from within Active Directory should now appear in the user list, and Workgroup Manager should now be able to view data from within Active Directory. Workgroup Manager can be used to apply policy to users, groups, computers, and computer lists. When using Workgroup Manager with Active Directory, users and groups can be created using Active Directory tools such as Active Directory Users and Computers. Workgroup Manager is then used to apply policy to these objects. Workgroup Manager should be used to create computer lists, a guest computer account, and to add computers to computer lists. These objects are created at the root of the domain in a container called OS X. The following section outlines the steps required to optimize Workgroup Manager to work with Active Directory. Limiting Search Results When Workgroup Manager is first launched, it displays the Accounts section and the Users tab. It also displays a list of Users. In many Active Directory environments, the maximum number of Users that can be displayed is If you have a large number of Users, you may want to limit the number of displayed Users to the requested records. The following steps will help to limit the search results to only the requested records: 1. In Workgroup Manager, choose Preferences in the Workgroup Manager menu. 2. Select the checkbox next to Limit search results to requested records (use * to show all). 3. Close the Preferences window. Note that the list of Users is empty. To display a specific group of Users, enter a term in the search box above the User list. To view all Users, search by entering * in the search box. 23
24 Interface The Workgroup Manager interface has two major sections: Accounts and Preferences. Under each section, there are four tabs: Users, Groups, Computers, and Computer Lists. The tabs determine the object, and the section determines the action being applied. Creating Users, Groups, and Computers As a standard practice, creating Users and Groups should be accomplished with Active Directory Users and Computers or another Windows-based tool. Workgroup Manager can then be used to apply policies to existing Users and Groups. Creating computer accounts When a Mac system is joined to Active Directory, a computer account is created that specifies the computer name in the settings specified when joining Active Directory, followed by $. If the computer account was created in Active Directory prior to joining, or a Mac was not cleanly unbound, the computer name will be changed to match the computer account name found in Active Directory by searching for the MAC address of the primary interface. Creating a Computer List using Workgroup Manager OS X can manage computers using Computer Lists. The following example shows how to create a Computer List using Workgroup Manager: 1. Open Workgroup Manager and click Cancel when the authentication dialog appears. 2. Choose Server > View Directories from the menu bar. 3. Under the small globe in the upper left corner, select Other... and then select the Active Directory Node. 4. Click the lock in the upper right corner and authenticate as an Active Directory administrator. 5. Select the Computers Groups tab. 6. Click Add Group Managing Policy with Managed Preferences Workgroup Manager can create policy on Users, Groups, Computers, and Computer Lists. The following examples illustrate how to set policy at the User and the Computer level. These settings can also be applied to a User Group or Computer List. For more information on Managed Preference settings not specifically related to Active Directory, see the OS X Server User Management guide at 24
25 Common User-Level Settings Application restrictions. Workgroup Manager can be used to manage common user settings such as restricting access to specific applications. The following example illustrates how to accomplish this task. 1. Open Workgroup Manager and click the user in question. Although this policy will be deployed to a test user, it could just as easily be deployed to a Group or Computer List. 2. Authenticate to the directory using the Lock icon at the top of the right side of the screen. 3. Click the user and then click the Preferences button in the toolbar. 4. Once the Managed Preferences screen is open, click the Applications icon to set the application restriction. This will bring up the screen used to configure the policy. Click the Folders button at the top, then select the Applications tab in the Restrict which applications are allowed to launch section. 5. In this example, John Doe will only be allowed to open applications in the /Applications folder, but not from his home folder. To add the Applications folder to the list of allowed applications, click the Always radio button in the Manage field, and check the Restrict which applications are allowed to launch box. Next, click the plus button (+) to select /Applications and add it to Allow applications within these folders. In the Disallow applications within these folders section, select the current home folder. Workgroup Manager will add ~/ to the disallowed folders. 6. Log in as John Doe to a workstation that has been bound to Active Directory. Attempt to drag an application to your home folder and launch it to test whether or not the policy was implemented correctly. Screen Savers Due to corporate policy or auditing requirements, it is important to specify when users screen savers activate and whether or not a password is required to deactivate screen savers. To specify screen saver settings, do the following: 1. Select a Computer, or Computer List in Workgroup Manager and click Preferences. 2. Click the Details tab and select Screen Saver. 3. Click the Pencil icon to edit the Screen Saver preferences. 4. Select Always and click the disclosure triangle next to Always. 5. Click New Key to add a new managed preference. 6. Change the New Item to Require Password and set the value to true. 7. Select Often and click the disclosure triangle next to it. 25
26 8. Click New Key to add a new managed preference. 9. Change the New Item to Idle Time and set the value to the number of seconds of idle time until the screen saver activates. Note that the idle time is an Often setting that the user can override by changing the value in the Screen Saver system preference. If users should not be able to override this setting, use Managed Preferences to prevent user access to the Screen Saver Preference pane. Login window disclaimer and appearance Many companies require that a disclaimer such as Unauthorized use is not permitted appear in the login window. To implement this disclaimer: 1. Go to the Login section of Overview in Workgroup Manager. 2. Select the Window tab and add the disclaimer text that will appear in the Login window. Note that this setting only applies at the Computer and Computer List level, since User-level settings would not apply when a user is not logged in. Alternatively, you can use create a policy banner following support.apple.com/kb/ht4788. If you would like to include graphics or the policy banner is long, this may be the preferred option. Mobile accounts Mobile accounts allow a user s credentials to be cached at login and enable the user to authenticate when off the corporate network. These settings are specified in the Mobility section under the Account Creation tab. You can also specify whether to encrypt the user s home directory with FileVault in this same section. FileVault encrypts the information in a user s home folder. The data in the home folder is encrypted so that information is secure if a computer is lost or stolen. Volume mounting at login The home directory specified in the user s Active Directory profiles will automatically be mounted. If there are other file shares that need to be mounted at login, they can be specified in the Login section under Items. The volume can either be mounted via the Finder or created using a Favorite. To create a Favorite: 1. In the Finder, choose Connect to Server in the Go menu. 2. Enter the URL for the share (for example: smb:// winserver.example.com/share/docs). 3. Do not click Connect. Click + to add as a Favorite. 4. Drag the newly created Favorite from ~/Library/Favorites to the Items list in Workgroup Manager. 5. Select Mount Sharepoint with user s name and password if required. 26
27 Restricting access to external storage To safeguard intellectual property, many organizations have a policy to deny use of CDs, DVDs, USB flash drives, or USB/FireWire external hard drives to prevent users from copying files. It is also easy to use Workgroup Manager to apply a policy that prevents or limits external media from mounting. Restricting access to login window To prevent certain users from logging in to a computer, select a Computer or Computer List in Workgroup Manager and then go to the Login preferences. In the Access tab, add the users you want to allow or deny to the Access Control list. Managing the Dock You may also want to prepopulate the Dock with commonly used applications and allow users either to modify the Dock or to pin certain applications to the Dock. Even if some applications are pinned, users can be allowed to add and remove other items from the Dock. To manage a user s Dock: 1. Select a User, Group, Computer, or Computer List in Workgroup Manager and click Preferences. 2. Click the Overview tab and then select Dock. 3. Under Dock Items, select Once if you want to apply the settings but allow the user to change the settings, or Always if you want to force the settings to remain. 4. Add the Applications and Documents and Folders to the lists provided, and select Merge with User s Dock to keep the user s current Dock settings. Managing applications Many application preferences can be managed. If an application has a manifest, it can be selected using the core services bundle mentioned in the Screen savers section. However, an application s preferences can be managed even if it does not have a manifest. To manage application preferences: 1. Select the preference from ~/Library/Preferences in the Preference editor in Workgroup Manager. 2. Remove any values and keys that do not need to be managed, and modify the ones that need to be managed. 3. In the following example, the preference for the format of a new document in TextEdit will be changed from rich text to plain text: 4. Open TextEdit and change the preference for New Documents to Plain Text. This will ensure that the preference key is stored in the 27
28 preference file. Be sure to quit TextEdit so that the preference file is saved to disk. 5. Select a User, Group, Computer, or Computer List in Workgroup Manager and click Preferences. 6. Authenticate by clicking the lock in the upper right corner. 7. Select the Details tab. 8. Click + to import the preference. 9. Select the TextEdit application in /Applications. Since the application does not have a preference manifest (a list of preferences that can be managed for that application), the preference file will be imported. 10. Click the Pencil icon to edit the newly imported preferences. 11. Disclose the triangle for Often, and remove all lines except RichText by selecting them and clicking Delete. 12. Set the value for RichText to false. 13. Force the preference by dragging the RichText line to the Always section. 14. Click Apply Now. 15. Log in as a user whose policy is affected by this setting. Open TextEdit and verify that the default format for a new document in TextEdit preferences is Plain Text. Change it to Rich Text, quit and relaunch TextEdit, and verify that the setting was changed back to Plain Text. User Information Once OS X is bound to Active Directory, Active Directory is automatically added to the Contacts Search Path in Directory Utility. This allows the Address Book and Mail features in OS X to automatically search for user information in Active Directory. The schema modifications add extra fields to user information, but the majority of information such as telephone numbers, addresses, and are accessed from standard Active Directory attributes. Normally, these are set within the General and Address tabs in the Properties of an Active Directory user s profile. Mail Mail allows users to send, receive, and organize messages. It is fully integrated with Address Book to look up contacts and autocomplete addresses to messages. If a computer is joined to Active Directory and the Contacts search policy in the Active Directory configuration is specified, autocompletion will search Active Directory for contact information. Users typing an address into an message will now have addresses automatically completed for them. This only works for users who have a populated attribute within Active Directory. 28
29 Address Book Address Book provides a flexible and convenient way to store contact information. Because Address Book is integrated with Mail, ichat, and other applications, users can enter contact information once and have instant access to it from multiple applications. Address Book can also be used to look up contact information in a directory service, such as Active Directory. Users can click the Directory group and search on a user s name or address. If the computer is bound to Active Directory, contact information in Active Directory will be found. Users can then drag the contact into their local Address Book. Address Book also provides options for displaying phone numbers in large type for easy dialing, mapping addresses with Google Maps, or easy copying of a correctly formatted address block (Copy Mailing Label). All of these features can be accessed by searching on Active Directory Users and double-clicking the user s name. Using Workgroup Manager, you can also specify a chat or weblog address within Active Directory. This information will appear in Address Book along with the other contact information. To add chat or weblog addresses to Active Directory Users: 1. In Workgroup Manager, select the Active Directory domain. 2. Select the User tab and Account Section and find an Active Directory user. 3. Select the user and then select the Info tab. 4. Authenticate by clicking the lock in the upper right corner and entering an Active Directory administrator s user name and password. 5. Add a chat or weblog URL and click Save. You can also select multiple users and enter a URL for a chat or weblog address. Workgroup Manager will automatically add the user s short name at the end of each URL when you click Save. Printers Printers advertised in Active Directory can be discovered and added easily to OS X. To discover a published printer, do the following: 1. Open System Preferences and select Print & Fax. 2. Click + to add a printer. 3. The printers that are advertised in Active Directory should appear under Default. Select a printer and then click Add. 29
30 Appendix C: Third-Party Add-On Solutions If your deployment requires DFS shares or GPOs, you can choose a thirdparty product to extend the capabilities of the Apple solution. Group Logic ExtremeZ-IP. With this Apple Filing Protocol (AFP) server for Windows servers, Mac clients can access files on a Windows server using the native filesharing protocol, AFP. Centrify DirectControl. This Active Directory plug-in enables OS X to use Active Directory GPOs without requiring any schema modification.. PowerBroker Identity Services Enterprise Edition. This Active Directory plug-in enables OS X to use Active Directory GPOs and Workgroup Manager without requiring any schema modification. Thursby ADmitMac. This directory services Active Directory plug-in and SMB client supports DFS shares. Objective Development Sharity. This SMB client supports DFS shares. 30
31 Apple Inc Apple Inc. All rights reserved. Apple, the Apple logo, AppleCare, FileVault, Finder, FireWire, ichat, Mac, Mac OS, and OS X are trademarks of Apple Inc., registered in the U.S. and other countries. UNIX is a registered trademark of The Open Group in the U.S. and other countries. OS X version 10.7 Lion is an Open Brand UNIX 03 Registered Product. Other company and product names mentioned herein are trademarks of their respective companies. Mention of third-party products is for informational purposes only and constitutes neither an endorsement nor a recommendation. Apple assumes no responsibility with regard to the performance or use of these products. All understandings, agreements, or warranties, if any, take place directly between the vendors and the prospective users. Every effort has been made to ensure that the information in this manual is accurate. Apple is not responsible for printing or clerical errors. Because Apple periodically releases new versions and updates to its software, images shown in this white paper may be different from what you see on your screen
Modifying the Active Directory Schema to Support Mac Systems
Modifying the Active Directory Schema to Support Mac Systems Strategies and Best Practices for Planning, Testing, and Deploying the Mac Successfully in Your Enterprise October 2009 2 Contents Page 3 Page
Best Practices: Integrating Mac OS X with Active Directory. Technical White Paper April 2009
Best Practices: Integrating Mac OS X Technical White Paper April 2009 2 Contents Page 3 Page 5 Page 9 Page 10 Page 11 Page 12 Apple s Built-In Solution How to Integrate Mac OS X Getting Started dsconfigad
Apple Technical White Paper Best Practices for Integrating OS X with Active Directory
Best Practices for Integrating OS X with Active Directory OS X Mountain Lion v10.8 Contents Introduction... 3 How to Integrate OS X with Active Directory... 4 Enterprise Integration Challenges... 7 Deployment
Apple Technical White Paper Best Practices for Integrating OS X with Active Directory
Best Practices for Integrating OS X with Active Directory OS X Mavericks v10.9 Contents Introduction... 4 How to Integrate OS X with Active Directory... 5 Enterprise Integration Challenges... 8 Deployment
Best Practices: Integrating Mac OS X with Active Directory. Technical White Paper September 2007
Best Practices: with Active Directory Technical White Paper September 2007 Contents Page 3 Page 4 Page 8 Page 10 Page 11 Page 13 Apple s Built-In Solution How to Integrate Mac OS X with Active Directory
Apple Technical White Paper Best Practices for Integrating OS X with Active Directory
Best Practices for Integrating OS X with Active Directory OS X Yosemite v10.10 December 2014 Contents Introduction to directory services support in OS X... 3 OS X and Active Directory... 4 Impact of mobility...
Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac
Making it easy to deploy, integrate and manage Macs, iphones and ipads in a Windows environment. Centralized Mac Home Directories On Windows Servers: Using Windows To Serve The Mac 2011 ENTERPRISE DEVICE
Mac OS X and Directory Services Integration
Mac OS X and Directory Services Integration Neha Setia 1 and Tarun Dalal 2 1 M.Tech Scholor, CBS Group of Institutions, CSE Department, MDU Rohtak, India [email protected] 2 Assistant Professor, CBS
Charles Firth [email protected]. Managing Macs in a Windows World
Charles Firth [email protected] Managing Macs in a Windows World Prerequisites Familiarity with Windows Active Directory networks Interest in Macintosh OSX integration and support Basic understanding
Enterprise Apple Xserve Wiki and Blog using Active Directory. Table Of Contents. Prerequisites 1. Introduction 1
Table Of Contents Prerequisites 1 Introduction 1 Making the Xserve an Open Directory Master 2 Binding the Xserve to Active Directory 3 Creating a Certificate 3 Setting up Apache Web Server 4 Applying the
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Troubleshooting Active Directory Server
Proven Practice Troubleshooting Active Directory Server Product(s): IBM Cognos Series 7 Area of Interest: Security Troubleshooting Active Directory Server 2 Copyright Copyright 2008 Cognos ULC (formerly
Integrating Mac OS X 10.6 with Active Directory. 1 April 2010
Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Open Directory. Apple s standards-based directory and network authentication services architecture. Features
Open Directory Apple s standards-based directory and network authentication services architecture. Features Scalable LDAP directory server OpenLDAP for providing standards-based access to centralized data
Centralized Mac Home Directories with ExtremeZ-IP
APPLICATION NOTE Centralized Mac Home Directories with ExtremeZ-IP Published: July 2009 Abstract Organizations wanting to integrate Mac OS X systems into their Windows-based enterprise network will most
Optimization in a Secure Windows Environment
WHITE PAPER Optimization in a Secure Windows Environment A guide to the preparation, configuration and troubleshooting of Riverbed Steelhead appliances for Signed SMB and Encrypted MAPI September 2013
Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
DeployStudio Server Quick Install
DeployStudio Server Quick Install v1.7.0 The DeployStudio Team [email protected] Requirements OS X 10.7.5 to 10.11.1 DeployStudioServer_v1.7.x.pkg and later NetBoot based deployment 100 Mb/s switched
This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network.
This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network. Prerequisites for Network Registration: 1. In order to
Virtual CD v10. Network Management Server Manual. H+H Software GmbH
Virtual CD v10 Network Management Server Manual H+H Software GmbH Table of Contents Table of Contents Introduction 1 Legal Notices... 2 What Virtual CD NMS can do for you... 3 New Features in Virtual
MobileStatus Server Installation and Configuration Guide
MobileStatus Server Installation and Configuration Guide Guide to installing and configuring the MobileStatus Server for Ventelo Mobilstatus Version 1.2 June 2010 www.blueposition.com All company names,
1 Introduction. Ubuntu Linux Server & Client and Active Directory. www.exacq.com Page 1 of 14
Ubuntu Linux Server & Client and Active Directory 1 Introduction For an organization using Active Directory (AD) for user management of information technology services, integrating exacqvision into the
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
The safer, easier way to help you pass any IT exams. Exam : 9L0-518. OS X Server Essentials 10.8 Exam. Title : Version : Demo 1 / 6
Exam : 9L0-518 Title : OS X Server Essentials 10.8 Exam Version : Demo 1 / 6 1.In Server app, which procedure will configure OS X Server to let members of a specific group use the Messages service? A.
Active Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
Creating Home Directories for Windows and Macintosh Computers
ExtremeZ-IP Active Directory Integrated Home Directories Configuration! 1 Active Directory Integrated Home Directories Overview This document explains how to configure home directories in Active Directory
Quadro Configuration Console User's Guide. Table of Contents. Table of Contents
Epygi Technologies Table of Contents Table of Contents About This User s Guide... 3 Introducing the Quadro Configuration Console... 4 Technical Specification... 6 Requirements... 6 System Requirements...
Active Directory Compatibility with ExtremeZ-IP. A Technical Best Practices Whitepaper
Active Directory Compatibility with ExtremeZ-IP A Technical Best Practices Whitepaper About this Document The purpose of this technical paper is to discuss how ExtremeZ-IP supports Microsoft Active Directory.
Configuring Active Directory Binding for OS X (10.4.x) within Miami Dade Schools
Configuring Active Directory Binding for OS X (10.4.x) within Miami Dade Schools 1) Login to the Mac OS X (10.4.x) workstation with a local administrative account. 2) Open (double-click) the hard drive
Deploying System Center 2012 R2 Configuration Manager
Deploying System Center 2012 R2 Configuration Manager This document is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS, IMPLIED, OR STATUTORY, AS TO THE INFORMATION IN THIS DOCUMENT.
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
PC Power Down. MSI Deployment Guide
PC Power Down MSI Deployment Guide 1. Introduction 1.1. Outline The client software for PC Power Down can be pushed out across a network, saving the effort of individually visiting each computer to install
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
BlackShield ID. QUICKStart Guide. Integrating Active Directory Lightweight Services
QUICKStart Guide Integrating Active Directory Lightweight Services 2010 CRYPTOCard Corp. All rights reserved. http://www.cryptocard.com Trademarks CRYPTOCard, CRYPTO Server, CRYPTO Web, CRYPTO Kit, CRYPTO
How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free
Setting Up a Macintosh For Use In The Medical Center The purpose of this document is to provide some assistance and direction to the users of Macintosh computers in The Medical Center network environment.
Integration Guide. SafeNet Authentication Service. Integrating Active Directory Lightweight Services
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section
Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing Installation Section Purpose: We are setting up a server in ASU s specific environment. Power on the Server Insert the CD Hold
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
Wazza s QuickStart 17. Leopard Server - Blogs & Wikis
Wazza s QuickStart 17. Leopard Server - Blogs & Wikis About this Document This document is the 17th in a series of documents describing the process of installing and configuring a Mac OS X 10.5 Server
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
Step-by-Step Guide to Active Directory Bulk Import and Export
Page 1 of 12 TechNet Home > Windows Server TechCenter > Identity and Directory Services > Active Directory > Step By Step Step-by-Step Guide to Active Directory Bulk Import and Export Published: September
Configuration Guide. BlackBerry Enterprise Service 12. Version 12.0
Configuration Guide BlackBerry Enterprise Service 12 Version 12.0 Published: 2014-12-19 SWD-20141219132902639 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12...
Cloud Server powered by Mac OS X. Getting Started Guide. Cloud Server. powered by Mac OS X. AKJZNAzsqknsxxkjnsjx Getting Started Guide Page 1
Getting Started Guide Cloud Server powered by Mac OS X Getting Started Guide Page 1 Getting Started Guide: Cloud Server powered by Mac OS X Version 1.0 (02.16.10) Copyright 2010 GoDaddy.com Software, Inc.
Wazza s QuickStart 10. Leopard Server - Managing Preferences
Wazza s QuickStart 10. Leopard Server - Managing Preferences About this Document This document is the 10th in a series of documents describing the process of installing and configuring a Mac OS X 10.5
GlobalSCAPE DMZ Gateway, v1. User Guide
GlobalSCAPE DMZ Gateway, v1 User Guide GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054 Technical
1 Introduction. Windows Server & Client and Active Directory. www.exacq.com
Windows Server & Client and Active Directory 1 Introduction For an organization using Active Directory (AD) for user management of information technology services, integrating exacqvision into the AD infrastructure
Wazza s QuickStart 1. Leopard Server - Install & Configure DNS
Wazza s QuickStart 1. Leopard Server - Install & Configure DNS About this Document This document is the first in a series of documents describing the process of installing and configuring a Mac OS X 10.5
For Active Directory Installation Guide
For Active Directory Installation Guide Version 2.5.2 April 2010 Copyright 2010 Legal Notices makes no representations or warranties with respect to the contents or use of this documentation, and specifically
Implementing, Managing, and Maintaining a Microsoft Windows Server 2003 Network Infrastructure
Question Number (ID) : 1 (jaamsp_mngnwi-025) Lisa would like to configure five of her 15 Web servers, which are running Microsoft Windows Server 2003, Web Edition, to always receive specific IP addresses
ReadyNAS Remote. User Manual. June 2013 202-11078-03. 350 East Plumeria Drive San Jose, CA 95134 USA
User Manual June 2013 202-11078-03 350 East Plumeria Drive San Jose, CA 95134 USA Support Thank you for selecting this NETGEAR product. After installing your device, locate the serial number on the label
6) Click the lock in the lower left corner of the Directory Utility Window and authenticate with the local administrator account s credentials.
Configuring Active Directory Binding for OS X (10.5.x) within Miami Dade Schools Directory Utility determines which directory services a Mac OS X computer uses and how it connects to specific directory
800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410
800-782-3762 www.stbernard.com Active Directory 2008 Implementation Version 6.410 Contents 1 INTRODUCTION...2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION...3 2.1 Supported Deployment
NETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
Windows Services. Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features
Windows Services Support Windows and mixed-platform workgroups with high-performance, affordable network services. Features File and print services Integrated Samba 3 for native SMB/CIFS protocol support
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0
Parallels Panel Parallels Small Business Panel 10.2: User's Guide Revision 1.0 Copyright Notice ISBN: N/A Parallels 660 SW 39 th Street Suite 205 Renton, Washington 98057 USA Phone: +1 (425) 282 6400 Fax:
Mac OS X Directory Services
Mac OS X Directory Services Agenda Open Directory Mac OS X client access Directory services in Mac OS X Server Redundancy and replication Mac OS X access to other directory services Active Directory support
Other documents in this series are available at: servernotes.wazmac.com
Wazza s Snow Leopard Server QuickStart 14. Win XP - Workgroup Setup About the Document This document is the fourteenth in a series of documents describing the process of installing and configuring a Mac
ecopy ShareScan v4.3 Pre-Installation Checklist
ecopy ShareScan v4.3 Pre-Installation Checklist This document is used to gather data about your environment in order to ensure a smooth product implementation. The Network Communication section describes
BlackBerry Enterprise Service 10. Version: 10.2. Configuration Guide
BlackBerry Enterprise Service 10 Version: 10.2 Configuration Guide Published: 2015-02-27 SWD-20150227164548686 Contents 1 Introduction...7 About this guide...8 What is BlackBerry Enterprise Service 10?...9
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
Administering FileVault 2 on OS X Lion with the Casper Suite. Technical Paper July 2012
Administering FileVault 2 on OS X Lion with the Casper Suite Technical Paper July 2012 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that
NetIQ Advanced Authentication Framework - MacOS Client
NetIQ Advanced Authentication Framework - MacOS Client Installation Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 About MacOS Client 4 System Requirements
How To Manage Storage With Novell Storage Manager 3.X For Active Directory
www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect
SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM
SETTING UP ACTIVE DIRECTORY (AD) ON WINDOWS 2008 FOR DOCUMENTUM @ EROOM Abstract This paper explains how to setup Active directory service on windows server 2008.This guide also explains about how to install
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual
2X ApplicationServer & LoadBalancer & VirtualDesktopServer Manual 2X VirtualDesktopServer Contents 1 2X VirtualDesktopServer Contents 2 URL: www.2x.com E-mail: [email protected] Information in this document
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
DriveLock Quick Start Guide
Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Preparing for GO!Enterprise MDM On-Demand Service
Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules
Installation and Setup: Setup Wizard Account Information
Installation and Setup: Setup Wizard Account Information Once the My Secure Backup software has been installed on the end-user machine, the first step in the installation wizard is to configure their account
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
Getting Started Guide
Getting Started Guide CensorNet Professional Copyright CensorNet Limited, 2007-2011 This document is designed to provide information about the first time configuration and testing of the CensorNet Professional
HDA Integration Guide. Help Desk Authority 9.0
HDA Integration Guide Help Desk Authority 9.0 2011ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic logo and Point,Click,Done! are trademarks and registered trademarks of ScriptLogic
WatchGuard SSL v3.2 Update 1 Release Notes. Introduction. Windows 8 and 64-bit Internet Explorer Support. Supported Devices SSL 100 and 560
WatchGuard SSL v3.2 Update 1 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 445469 Revision Date 3 April 2014 Introduction WatchGuard is pleased to announce the release of WatchGuard
ReadyNAS Remote Troubleshooting Guide NETGEAR
ReadyNAS Remote Troubleshooting Guide NETGEAR June 2010 Symptom: I cannot see any shares from my PC This symptom can be caused by a variety of reasons. To diagnose the problem, please make sure your are
Deploying ModusGate with Exchange Server. (Version 4.0+)
Deploying ModusGate with Exchange Server (Version 4.0+) Active Directory and LDAP: Overview... 3 ModusGate/Exchange Server Deployment Strategies... 4 Basic Requirements for ModusGate & Exchange Server
Wazza s QuickStart 13. Leopard Server - Windows Domain
Wazza s QuickStart 13. Leopard Server - Windows Domain About the Document This document is the 13th in a series of documents describing the process of installing and configuring a Mac OS X 10.5 Server
Other documents in this series are available at: servernotes.wazmac.com
Wazza s Snow Leopard Server QuickStart 2. Configuring DNS About this Document This document is the second in a series of documents describing the process of installing and configuring a Mac OS X 10.6 Server
PriveonLabs Research. Cisco Security Agent Protection Series:
Cisco Security Agent Protection Series: Enabling LDAP for CSA Management Center SSO Authentication For CSA 5.2 Versions 5.2.0.245 and up Fred Parks Systems Consultant 3/25/2008 2008 Priveon, Inc. www.priveonlabs.com
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Managing Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
Instructions for Adding a MacOS 10.4.x Client to ASURITE
Instructions for Adding a MacOS 10.4.x Client to ASURITE Before beginning, it would be prudent not to have an account with the same username and password as your Active Directory account. For DHCP Workstations:
1. Installation Overview
Quick Install Guide 1. Installation Overview Thank you for selecting Bitdefender Business Solutions to protect your business. This document enables you to quickly get started with the installation of Bitdefender
safend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
Contents. Platform Compatibility. Directory Connector SonicWALL Directory Services Connector 3.1.7
Directory Connector SonicWALL Directory Services Connector 3.1.7 Contents Platform Compatibility... 1 New Features... 2 Known Issues... 3 Resolved Issues... 4 Overview... 7 About SonicWALL Single Sign-On
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
