How To Authenticate With Ezproxy On A University Campus (For A Non Profit)

Size: px
Start display at page:

Download "How To Authenticate With Ezproxy On A University Campus (For A Non Profit)"

Transcription

1 EZproxy Hosted Frequently Asked Questions Q: What firewall ports would have to be opened to accommodate hosted EZproxy? A: It mostly depends on how you plan to authenticate. For example if you want to authenticate to something like LDAP, you would need to open access for the server to access it. You access your Hosted Server at port 80 or 443. Q: How will authentication work? Would an EZproxy request ping off of our AD server for authentication, or would we have to supply a file of usernames/passwords? A: EZproxy Hosted can authenticate against Active Directory provided that we can access the Active Directory Server through any firewalls and provided that you can provide us with an encrypted (SSL or HTTPS) connection to the Active Directory server. Q: Is it possible to use a Group set-up to create three groups authenticating against three different existing systems (for instance, Active Directory, or whichever system is authenticated against on each campus), and have a single configuration file in which databases are assigned to one or more Groups? If the entries in the config file are at the individual database level, does this allow EZproxy to vary access between two databases provided by the same vendor? A: Yes, this is usually possible. We will need to know some more details to answer in more detail. It's important to note that the entries in the configuration file (including group authentication control) are granular more to the web site level, not as much to the particular journal/article (i.e., single journal in a web site of many journals) level. There are some ways to partially mitigate this but its useful to think of the granularity this way. Q: Currently our EZproxy is set up to work with our campus system (LDAP protocol, I believe). The goal is for each student to have a single logon for all campus services. Of course, we change our passwords periodically, not all at the same time. So.would this work with EZproxy being hosted? If not, can you paint a picture for me of the hosted situation works? A: If they are using LDAP as an authentication source, then we can interoperate with as long as we can access it through the campus firewall and we can access it via HTTPS. If we can access LDAP in this way, there will be no problem with users changing passwords at any time. Since we access LDAP in real-time in this scenario as soon as a password is changed it is active in the EZproxy hosting environment. Q: Will EZproxy accept IP addresses for authentication purposes from NON-SCO COLLEGES? A: Yes

2 Q: Can we also authenticate from the fixed IP s? A: You can authenticate from fixed IPs in other words, allow access based on IP address. Q: Is there an estimated cost if, after a few years, we decide to move all authentication to referring URL? A: To change to referring URL should not incur an extra cost unless we spend many hours configuring it which I don t believe will be the case. Many hours is defined as more then 10. Q: We are about to have an institutional domain name change. How would your service handle this? A: In most cases, since databases are authenticated by IP address, there should be no change (assuming your IP addresses stay the same). In the few cases where referring URLs are used for authentication, we can make those changes for you. The EZproxy Hosting server is on OCLC s domain: <inst name>.idm.oclc.org. Q: I know the hosted EZproxy supports CAS (Central Authentication Services) system. Do we need to make any change (e.g. open the firewall) at the CAS site if we move to hosted EZproxy? A: Yes, the CAS server would need to be available to the EZproxy Hosting server that is in OCLC s network. Q: How can WorldCat Local Metasearch get authenticated if we change to hosted EZproxy? A: We can authenticate via EZproxy which would use CAS. Q: Would we be assigned a permanent unique IP address we could share with our online vendors? A: Yes Q: How quickly could this remote service be implemented? A: We give you a commitment date after we meet to discuss and you have filled out your questionnaire. Q: What interface would I use to connect to hosted EZproxy to modify the config.txt and user.txt files? A: You do not have any direct access to the configuration. We do that for you. For expert users, we are planning a fast deploy method for admins to submit changes. Currently you request changes via to hostedezp@oclc.org.

3 Q: Would I be allowed to upload via FTP or another program a user.txt file every day? Could this upload be scheduled and automated? A: Yes, this is possible. The first version of this is a web upload (i.e., you login and upload your file). Then we move it into the production configuration. This facility is still in development but we anticipate having it working in a few weeks. It should be a matter of minutes from upload to deployment in the production environment. Q: Lastly, we would be able to set up a test of hosted EZproxy first to confirm that it will work in our environment before committing to purchase it? A: We prefer to do something like a 60 day acceptance period. Where we define success criteria up front. We can discuss this on the phone if you like Q: How long does it take to configure? A: Depends on the size of your database. Our EZproxy database is vast and updated regularly, so most of your databases should be compatible to ours. Just to make sure, we set up a time for a conference call with you to discuss configuration details and startup date. Q: How are configuration files updated by customers (institutions) in the hosted service? A: We currently maintain a set of files using SVN to capture all of the configuration settings, and we use SVN's updating process to keep our application servers current. We weren't sure whether this type of setup would be supported in the hosting service, or whether there were any file-uploading capabilities. We also will be using SVN internally for this purpose. We will not have, to start, any config file uploading facilities for the institutions to use. You can send us entire files and if you desire, we can send you a copy of the entire environment (from a config-perspective) we have to help you know what is running in your configuration. Q: Will there be any way to support automated-script-updated configuration files? A: We currently run a script on a daily basis to generate a configuration file for our e-journal/e-book resources based on our hosted knowledge-base data, and we will need to have a way to continue the automated process with a hosted proxy service. (Our knowledge-base data is coming from Serials Solutions.) We would be fine with running the script locally and uploading the resultant file to the hosted proxy service servers, providing there is away to automate that process. This may be possible. We will need to discuss this in some more detail. We do have the facility to

4 upload periodic user/password files. Q: Will we be able to preserve our current proxy-server hostname? Or does subscribing to the service also involve a new OCLC-based hostname? A: There is a new DNS name for the proxy server. Q: How does this work? Will we still be able to configure the file ourselves? A: No, the model is that OCLC configuration staff maintains the configuration file for you. You will send OCLC requests for modification of the configuration. You can either send us an entire config file or the text to put into it. Q: Is there going to be a web admin? A: You will have, upon request access to the /admin interface of your EZproxy instance. Q: Will we upload config files? A: At the start of the service, no. We will be investigating ways to allow experienced admins more streamlined ways to update their config. Q: I noticed in the terms & conditions that there is not a bandwidth allocation. Can you give me an idea of what would be considered excessive? A: The network bandwidth management is managed across our server environments. We don t anticipate bandwidth problems from normal usage. Excessive is when an institution s consumption effects other institutions. Q: What is the cost of configuration time (per hour) beyond the 10 hours provided at start-up? How is this fee assessed and charged? A: The 10 hours of configuration time is for initial configuration not for ongoing requests. Ongoing requests for changes are done without charge unless they will take an excessive amount of time where excessive amount is more than 10 hours. For example, adding a user to a user.txt file (takes a few minutes) is not charged, but a request to add 100 more resources to the configuration file may be charged. We will not charge you without discussing with you beforehand. One way this can be avoided is if you help us research for complex config problems. For example, if a config is not on our supported list but you know what is you can send it to us and we can use it.

5 Q: How do we have new e-resources added to our configuration? What else would local administrators still have to do? A: You request us to do that. Local administrators do not have modified access to the hosted EZproxy system. You can, upon access, have admin access which allows you to view logs. Q: How does problem reporting work - would patrons be able to report problems directly to OCLC, or would they report those to local administrators and then we'd troubleshoot and/or forward them to OCLC? A: We prefer patrons continue to contact local contacts and then the local contacts (administrators) report to OCLC. If you can initially troubleshoot that can be very helpful since sometimes there are local institution nuances to these types of problems. Q: Please provide a list of contracted or testing sites we could contact for references. A: Upon request, we can provide you with some contacts. Q: If that won't work, what are our most efficient/easily supported local installation options given our consortium set-up? i.e., If we can't run one instance using Group configurations, can we run three instances on one server at one campus, or would we have to continue maintaining three instances (one on each campus)? A: I believe you will be able to get 1 server for the three institutions to work. However, for some reason you can't you run 3 copies on one server or three separate instances. It's probably best to run using virtual machines, in other words, run 3 virtual servers on one physical server. Q: Let's say we start with the hosted service, and then we decide to host it locally. Would we be able to get a discount on the software, and how much reconfiguration would we have to do for "linking." Would we have to rewrite all of our links? A: If you were to decide to move from hosting to local deployment, we would give you all the configuration files from the hosting server necessary to configure and run your server. The DNS name of your locally deployed proxy server will be different then the hosted one so you would have to make a pass through your links and substitute the new local name for the previously used, hosted name. Q: Currently our EZproxy is set up to work with our campus system (LDAP protocol, I believe). The goal is for each student to have a single logon for all campus services. Of course, we change our passwords periodically, not all at the same time. So.would this work with EZproxy being hosted? If not, can you paint a picture for me of the hosted situation works?

6 A: If they are using LDAP as an authentication source, then we can interoperate with as long as we can access it through the campus firewall and we can access it via HTTPS. If we can access LDAP in this way, there will be no problem with users changing passwords at any time. Since we access LDAP in real-time in this scenario as soon as a password is changed it is active in the EZproxy hosting environment. Q: Will EZproxy hosted run on server 2008 R2? A: Yes, EZproxy will run on Windows 2008 R2. Q: What is excessive bandwidth? Is there a number? Also, are there breakpoints on the number of users? And is the number of users based on individuals or number of simultaneous users? A: Regarding excessive we don t have a number. We monitor in order to protect delivery of services across all of our network services and users. We will take reasonable measures to protect our services and users against service outages which can be caused by a large variety and constantly changing set of events. Q: Will EZproxy accept IP addresses for authentication purposes from NON-SCO COLLEGES? A: Yes. Q: Can you RESTRICT the access of users coming from these external IP addresses to Millennium only (so that they do not have access to other databases available exclusively to SCO patrons, such as, etc.)? A: Yes. Q: We are about to have an institutional domain name change. How would your service handle this? A: In most cases, since databases are authenticated by IP address, there should be no change (assuming your IP addresses stay the same). In the few cases where referring URLs are used for authentication, we can make those changes for you. The EZproxy Hosting server is on OCLC s domain: <inst name>.idm.oclc.org. Q: Would it cost extra to reconfigure the resources to the new domain name? A: No. Q: When we add or remove databases, is the process of configuration done on your end?

7 A: Yes Q: What is the time frame for changes we might require? A: Our goal is 24-hour turnaround. It does depend on the quantity and complexity of the changes. Q: We have a complex system in place (WAM proxy) with many database records. We need to know if the two systems can be run simultaneously as we change our records to the new proxy URL. We would want to experience as little downtime to our database searching as possible. A: Regarding WAM, you can run them in parallel as you set up the new server. You would register an additional IP address for the new EZproxy Hosting server with your vendors and then cutover when the configuration is done and you are ready. There may be some vendors that require referring URLs that can t be run in parallel. Q: With regard to the SSL certificate that you provide with this service. I assume that the certificate you supply does not reside on our server but on one at OCLC, is that correct? Our server requires an SSL certificate, so I am assuming we still need to provide our own as well correct? A: We supply the SSL certificate for the EZproxy Hosting server. Any other certificates will be supplied by you. Q: As you know, we are using WMS, WorldCat Local, and Worldcat Link Manager. Our patrons will use single login to access their library account and library resources. Will EZproxy patron records come from WMS? Currently WMS has our Pepperdine user names. But it doesn t have our passwords. Will we use CAS or WMS system to authenticate us? Do you know the timeline for the single login? A: EZproxy supports authenticating straight to CAS EZproxy only needs to authenticate it doesn t need any patron information. We can test the configuration but once WMS authenticates to CAS also, there should be single sign-on. Q: Can DNS names be changed at any time? A: Yes. Q: Can we receive usage logs for their institution? And what tools exist to process them? A: Yes, if you want us to supply your logs we can do that. We currently provide reporting or digesting of the logs into a reporting format. There are some s about such programs on the EZproxy Listserv if you are interested in investigating.

Please return this document to ezproxy-anz@oclc.org when complete.

Please return this document to ezproxy-anz@oclc.org when complete. Section 1 to be completed prior to quote Please return this document to ezproxy-anz@oclc.org when complete. 1. Institution Name: 2. OCLC has selected an institution domain name for this server. This is

More information

Authentication Methods

Authentication Methods Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the

More information

Remote Access. A Service Guide for Colleges. An overview of the opt-in Remote Access service provided by Ontario College Library Service

Remote Access. A Service Guide for Colleges. An overview of the opt-in Remote Access service provided by Ontario College Library Service A Service Guide for Colleges An overview of the opt-in Remote Access service provided by Ontario College Library Service Remote Access A Service Guide for Colleges Contents Remote Access Basics... 2 All

More information

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Citrix Secure Gateway - Presentation server Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210

More information

Remote Authentication and Single Sign-on Support in Tk20

Remote Authentication and Single Sign-on Support in Tk20 Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...

More information

Shibboleth and Library Resources

Shibboleth and Library Resources Shibboleth and Library Resources InCommon Library/Shibboleth Project What is the Library/Shibboleth Project? Established 2007 Five universities + Internet2 Campus IT, Library IT, Librarians Adding Shibboleth

More information

WorldCat Navigator: EZproxy Configuration Guide

WorldCat Navigator: EZproxy Configuration Guide WorldCat Navigator: EZproxy Configuration Guide Contents 1. Introduction 2. Obtaining an EZproxy license 3. The EZproxy userobject 4. Configuring EZproxy to allow userobject 5a. Configuring EZproxy for

More information

Setup Corporate (Microsoft Exchange) Email. This tutorial will walk you through the steps of setting up your corporate email account.

Setup Corporate (Microsoft Exchange) Email. This tutorial will walk you through the steps of setting up your corporate email account. Setup Corporate (Microsoft Exchange) Email This tutorial will walk you through the steps of setting up your corporate email account. Microsoft Exchange Email Support Exchange Server Information You will

More information

HP Device Manager 4.7

HP Device Manager 4.7 Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...

More information

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Windows 2003 Server with Routing and Remote Access service Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845

More information

NSi Mobile Installation Guide. Version 6.2

NSi Mobile Installation Guide. Version 6.2 NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...

More information

Authentication and Single Sign On

Authentication and Single Sign On Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication

More information

Security Provider Integration Kerberos Authentication

Security Provider Integration Kerberos Authentication Security Provider Integration Kerberos Authentication 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

Single Sign-on (SSO) technologies for the Domino Web Server

Single Sign-on (SSO) technologies for the Domino Web Server Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145

More information

Configuring User Identification via Active Directory

Configuring User Identification via Active Directory Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos johan@accessdenied.be User Identification Overview User Identification allows you to create security policies based

More information

F-Secure Messaging Security Gateway. Deployment Guide

F-Secure Messaging Security Gateway. Deployment Guide F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4

More information

F-SECURE MESSAGING SECURITY GATEWAY

F-SECURE MESSAGING SECURITY GATEWAY F-SECURE MESSAGING SECURITY GATEWAY DEFAULT SETUP GUIDE This guide describes how to set up and configure the F-Secure Messaging Security Gateway appliance in a basic e-mail server environment. AN EXAMPLE

More information

Integration Guide. Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008

Integration Guide. Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008 Integration Guide Microsoft Active Directory Rights Management Services (AD RMS) Microsoft Windows Server 2008 Integration Guide: Microsoft Active Directory Rights Management Services (AD RMS) Imprint

More information

TIBCO Spotfire Platform IT Brief

TIBCO Spotfire Platform IT Brief Platform IT Brief This IT brief outlines features of the system: Communication security, load balancing and failover, authentication options, and recommended practices for licenses and access. It primarily

More information

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity

USER GUIDE. Lightweight Directory Access Protocol (LDAP) Schoolwires Centricity USER GUIDE Lightweight Directory Access Protocol () Schoolwires Centricity TABLE OF CONTENTS Introduction... 1 Audience and Objectives... 1 Overview... 1 Servers Supported by Centricity... 1 Benefits of

More information

Websense Support Webinar: Questions and Answers

Websense Support Webinar: Questions and Answers Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user

More information

NETASQ SSO Agent Installation and deployment

NETASQ SSO Agent Installation and deployment NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user

More information

Setup and configuration for Intelicode. SQL Server Express

Setup and configuration for Intelicode. SQL Server Express Setup and configuration for Intelicode SQL Server Express Due to overwhelming demand and the increased load on support, we are providing a complete SQL Server installation walkthrough document. SQL Server

More information

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1

Pass Through Proxy. How-to. Overview:..1 Why PTP?...1 Pass Through Proxy How-to Overview:..1 Why PTP?...1 Via an SA port...1 Via external DNS resolution...1 Examples of Using Passthrough Proxy...2 Example configuration using virtual host name:...3 Example

More information

Test Case 3 Active Directory Integration

Test Case 3 Active Directory Integration April 12, 2010 Author: Audience: Joe Lowry and SWAT Team Evaluator Test Case 3 Active Directory Integration The following steps will guide you through the process of directory integration. The goal of

More information

How to Configure Active Directory based User Authentication

How to Configure Active Directory based User Authentication How to Configure Active Directory based User Authentication You Must Have: Microsoft server with Active Directory configured. Windows 2000 Server is configured as Active Directory server in this example.

More information

Preparing for GO!Enterprise MDM On-Demand Service

Preparing for GO!Enterprise MDM On-Demand Service Preparing for GO!Enterprise MDM On-Demand Service This guide provides information on...... An overview of GO!Enterprise MDM... Preparing your environment for GO!Enterprise MDM On-Demand... Firewall rules

More information

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials.

Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. Note: This case study utilizes Packet Tracer. Please see the Chapter 5 Packet Tracer file located in Supplemental Materials. CHAPTER 5 OBJECTIVES Configure a router with an initial configuration. Use the

More information

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de

Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Microsoft Forefront TMG How to use SQL Server 2008 Express Reporting Services Abstract In this

More information

4 - TexShare and HARLiC CARDS http://www.pvamu.edu/pages/3693.asp ( Online Application Form) 5 REMOTE ACCESS TO DATABASES

4 - TexShare and HARLiC CARDS http://www.pvamu.edu/pages/3693.asp ( Online Application Form) 5 REMOTE ACCESS TO DATABASES The Library will email articles if they are in electronic format already. Patrons must complete a Distance Education Materials Request Form in order to receive articles. Please note, however, that we will

More information

Microsoft Exchange Client Access Servers

Microsoft Exchange Client Access Servers F5 Deployment Guide Microsoft Exchange Client Access Servers Welcome to the F5 and Microsoft Exchange 2010 and 2013 Client Access Server deployment guide. Use this document for guidance on configuring

More information

Setting Up Scan to SMB on TaskALFA series MFP s.

Setting Up Scan to SMB on TaskALFA series MFP s. Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and

More information

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F

How To Integrate Watchguard Xtm With Secur Access With Watchguard And Safepower 2Factor Authentication On A Watchguard 2T (V2) On A 2Tv 2Tm (V1.2) With A 2F External Authentication with Watchguard XTM Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington Business Park

More information

Leostream Corporation leostream.com help@leostream.com Share this Whitepaper!

Leostream Corporation leostream.com help@leostream.com Share this Whitepaper! Introduction... 3 Advantages of Providing Remote Access to Personal PC... 4 Disadvantages of Typical Remote Access Solutions in a Corporate Environment... 5 Why Use Leostream for Remote Access... 5 Using

More information

Fasthosts Internet Parallels Plesk 10 Manual

Fasthosts Internet Parallels Plesk 10 Manual Fasthosts Internet Parallels Plesk 10 Manual Introduction... 2 Before you begin... 2 Logging in to the Plesk control panel... 2 Securing access to the Plesk 10 control panel... 3 Configuring your new server...

More information

Setting Up One Search

Setting Up One Search Your teachers and students can take advantage of your school s subscription databases all in one place through Destiny One Search. One Search saves staff and patrons time and effort by letting them search

More information

OnCommand Performance Manager 1.1

OnCommand Performance Manager 1.1 OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501

More information

Using Microsoft Active Directory (AD) with HA3969U in Windows Server

Using Microsoft Active Directory (AD) with HA3969U in Windows Server Using Microsoft Active Directory (AD) with HA3969U in Windows Server Application Note Abstract This application note describes how to use Microsoft Active Directory (AD) service with HA3969U systems in

More information

Active Directory Sync (AD) How it Works in WhosOnLocation

Active Directory Sync (AD) How it Works in WhosOnLocation Active Directory Sync (AD) How it Works in WhosOnLocation 1 P a g e Contents Overview... 3 About AD in WhosOnLocation... 3 The Way It Works... 3 Requirements... 3 How to Setup Active Directory Sync...

More information

Managing Office 365 Identities and Services 20346C; 5 Days, Instructor-led

Managing Office 365 Identities and Services 20346C; 5 Days, Instructor-led Managing Office 365 Identities and Services 20346C; 5 Days, Instructor-led Course Description This is a 5-day Instructor Led Training (ILT) course that targets the needs of IT professionals who take part

More information

Load Balancing & High Availability

Load Balancing & High Availability Load Balancing & High Availability 0 Optimizing System Resources through Effective Load Balancing An IceWarp White Paper October 2008 www.icewarp.com 1 Background Every server is finite. Regardless of

More information

3M Command Center. Installation and Upgrade Guide

3M Command Center. Installation and Upgrade Guide 3M Command Center Installation and Upgrade Guide Copyright 3M, 2015. All rights reserved., 78-8129-3760-1d 3M is a trademark of 3M. Microsoft, Windows, Windows Server, Windows Vista and SQL Server are

More information

10972-Administering the Web Server (IIS) Role of Windows Server

10972-Administering the Web Server (IIS) Role of Windows Server Course Outline 10972-Administering the Web Server (IIS) Role of Windows Server Duration: 5 days (30 hours) Target Audience: This course is intended for IT Professionals already experienced in general Windows

More information

RSA Authentication Manager 8.1 Virtual Appliance Getting Started

RSA Authentication Manager 8.1 Virtual Appliance Getting Started RSA Authentication Manager 8.1 Virtual Appliance Getting Started Thank you for purchasing RSA Authentication Manager 8.1, the world s leading two-factor authentication solution. This document provides

More information

Course 20346: Managing Office 365 Identities and Services

Course 20346: Managing Office 365 Identities and Services Course 20346: Managing Office 365 Identities and Services Overview About this course This is a 5-day Instructor Led Training (ILT) course that targets the needs of IT professionals who take part in evaluating,

More information

1. Please login to the Own Web Now Support Portal (https://support.ownwebnow.com) with your email address and a password.

1. Please login to the Own Web Now Support Portal (https://support.ownwebnow.com) with your email address and a password. Web Hosting Introduction The purpose of this Startup Guide is to familiarize you with Own Web Now's Web Hosting. Own Web Now offers two web hosting platforms, one powered by Linux / PHP and the other powered

More information

Administrator Guide. v 11

Administrator Guide. v 11 Administrator Guide JustSSO is a Single Sign On (SSO) solution specially developed to integrate Google Apps suite to your Directory Service. Product developed by Just Digital v 11 Index Overview... 3 Main

More information

SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION

SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION Table of content ScopTel with Active Directory... 3 Software Features... 3 Software Compatibility... 3 Requirements... 3 ScopTel Configuration... 4 Prerequisites...

More information

Configuring. Moodle. Chapter 82

Configuring. Moodle. Chapter 82 Chapter 82 Configuring Moodle The following is an overview of the steps required to configure the Moodle Web application for single sign-on (SSO) via SAML. Moodle offers SP-initiated SAML SSO only. 1 Prepare

More information

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates

Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights

More information

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER

ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER M-FILES CORPORATION ENABLING RPC OVER HTTPS CONNECTIONS TO M-FILES SERVER VERSION 2.3 DECEMBER 18, 2015 Page 1 of 15 CONTENTS 1. Version history... 3 2. Overview... 3 2.1. System Requirements... 3 3. Network

More information

Training Name Installing and Configuring Windows Server 2012

Training Name Installing and Configuring Windows Server 2012 Training Name Installing and Configuring Windows Server 2012 Exam Code 70 410 At Course Completion After completing this course, students will be able to: Install and configure Windows Server 2012. Describe

More information

Secret Server Qualys Integration Guide

Secret Server Qualys Integration Guide Secret Server Qualys Integration Guide Table of Contents Secret Server and Qualys Cloud Platform... 2 Authenticated vs. Unauthenticated Scanning... 2 What are the Advantages?... 2 Integrating Secret Server

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Click Studios. Passwordstate. Installation Instructions

Click Studios. Passwordstate. Installation Instructions Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior

More information

Managing Office 365 Identities and Services

Managing Office 365 Identities and Services Course 20346B: Managing Office 365 Identities and Services Page 1 of 7 Managing Office 365 Identities and Services Course 20346B: 4 days; Instructor-Led Introduction This is a 4-day Instructor Led Training

More information

DeployStudio Server Quick Install

DeployStudio Server Quick Install DeployStudio Server Quick Install v1.7.0 The DeployStudio Team info@deploystudio.com Requirements OS X 10.7.5 to 10.11.1 DeployStudioServer_v1.7.x.pkg and later NetBoot based deployment 100 Mb/s switched

More information

Configuring Sponsor Authentication

Configuring Sponsor Authentication CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five

More information

WHITE PAPER Citrix Secure Gateway Startup Guide

WHITE PAPER Citrix Secure Gateway Startup Guide WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server

More information

Configuration Guide BES12. Version 12.3

Configuration Guide BES12. Version 12.3 Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing

More information

WiNG5 CAPTIVE PORTAL DESIGN GUIDE

WiNG5 CAPTIVE PORTAL DESIGN GUIDE WiNG5 DESIGN GUIDE By Sriram Venkiteswaran WiNG5 CAPTIVE PORTAL DESIGN GUIDE June, 2011 TABLE OF CONTENTS HEADING STYLE Introduction To Captive Portal... 1 Overview... 1 Common Applications... 1 Authenticated

More information

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Juniper SSL VPN appliance Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

RSA Authentication Manager 8.1 Planning Guide. Revision 1

RSA Authentication Manager 8.1 Planning Guide. Revision 1 RSA Authentication Manager 8.1 Planning Guide Revision 1 Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm Trademarks

More information

V Series Rapid Deployment Version 7.5

V Series Rapid Deployment Version 7.5 V Series Rapid Deployment Version 7.5 Table of Contents Module 1: First Boot Module 2: Configure P1 and N interfaces Module 3: Websense Software installation (Reporting Server) Module 4: Post installation

More information

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications

Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications Websense Web Security Gateway: Integrating the Content Gateway component with Third Party Data Loss Prevention Applications November, 2010 2010 Websense, Inc. All rights reserved. Websense is a registered

More information

VMware vcenter Log Insight Getting Started Guide

VMware vcenter Log Insight Getting Started Guide VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

Copyright 2012 Trend Micro Incorporated. All rights reserved.

Copyright 2012 Trend Micro Incorporated. All rights reserved. Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

Implementing and Supporting Microsoft Windows XP Professional

Implementing and Supporting Microsoft Windows XP Professional Implementing and Supporting Microsoft Windows XP Professional Key Data Course #: 2272C Number of Days: 5 Format: Instructor-led The purpose of this course is to address the implementation and desktop support

More information

How to configure the TopCloudXL WHMCS plugin (version 2+) Update: 16-09-2015 Version: 2.2

How to configure the TopCloudXL WHMCS plugin (version 2+) Update: 16-09-2015 Version: 2.2 èè How to configure the TopCloudXL WHMCS plugin (version 2+) Update: 16-09-2015 Version: 2.2 Table of Contents 1. General overview... 3 1.1. Installing the plugin... 3 1.2. Testing the plugin with the

More information

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream

User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner

More information

CA Unified Infrastructure Management Server

CA Unified Infrastructure Management Server CA Unified Infrastructure Management Server CA UIM Server Configuration Guide 8.0 Document Revision History Version Date Changes 8.0 September 2014 Rebranded for UIM 8.0. 7.6 June 2014 No revisions for

More information

User Guide. You will be presented with a login screen which will ask you for your username and password.

User Guide. You will be presented with a login screen which will ask you for your username and password. User Guide Overview SurfProtect is a real-time web-site filtering system designed to adapt to your particular needs. The main advantage with SurfProtect over many rivals is its unique architecture that

More information

ACE Management Server Deployment Guide VMware ACE 2.0

ACE Management Server Deployment Guide VMware ACE 2.0 Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.

More information

Australian Synchrotron, Storage Gateway

Australian Synchrotron, Storage Gateway Australian Synchrotron, Storage Gateway User Help Manual Version 1.2 Storage Gateway User Help Manual 2 REVISION HISTORY Date Version Description Author 2 May 2008 1.0 Document creation Chris Myers 13

More information

What is the Barracuda SSL VPN Server Agent?

What is the Barracuda SSL VPN Server Agent? The standard communication model for outgoing calls is for the appliance to simply make a direct connection to the destination host. This paradigm does not suit all business needs. The Barracuda SSL VPN

More information

Macintosh Clients and Windows Print Queues

Macintosh Clients and Windows Print Queues Macintosh Clients and Windows Print Queues OS X Maverick, Lion Mountain, Leopard, Tiger, and Panther Pre-Configuration Requirements Ensure Macintosh machines have a valid Host A and PTR records in your

More information

SOA Software API Gateway Appliance 7.1.x Administration Guide

SOA Software API Gateway Appliance 7.1.x Administration Guide SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,

More information

How to configure Client side certificate authentication for authorization-only access / Active Sync URL s

How to configure Client side certificate authentication for authorization-only access / Active Sync URL s How to configure Client side certificate authentication for authorization-only access / Active Sync URL s Juniper Networks, Inc. Overview: Authorization-only access is similar to a reverse proxy. Typically,

More information

How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free

How To Set Up A Macintosh With A Cds And Cds On A Pc Or Macbook With A Domain Name On A Macbook (For A Pc) For A Domain Account (For An Ipad) For Free Setting Up a Macintosh For Use In The Medical Center The purpose of this document is to provide some assistance and direction to the users of Macintosh computers in The Medical Center network environment.

More information

800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410

800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410 800-782-3762 www.stbernard.com Active Directory 2008 Implementation Version 6.410 Contents 1 INTRODUCTION...2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION...3 2.1 Supported Deployment

More information

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services

DEPLOYMENT GUIDE Version 1.0. Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services DEPLOYMENT GUIDE Version 1.0 Deploying the BIG-IP Edge Gateway for Layered Security and Acceleration Services Table of Contents Table of Contents Using the BIG-IP Edge Gateway for layered security and

More information

Deploying the BIG-IP System v11 with Microsoft Exchange 2010 and 2013 Client Access Servers

Deploying the BIG-IP System v11 with Microsoft Exchange 2010 and 2013 Client Access Servers Deployment Guide Deploying the BIG-IP System v11 with Microsoft Exchange 2010 and 2013 Client Access Servers Welcome to the F5 and Microsoft Exchange 2010 and 2013 Client Access Server deployment guide.

More information

Lesson 7 - Website Administration

Lesson 7 - Website Administration Lesson 7 - Website Administration If you are hired as a web designer, your client will most likely expect you do more than just create their website. They will expect you to also know how to get their

More information

Configuration Manual English version

Configuration Manual English version Configuration Manual English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the

More information

CAC/PIV PKI Solution Installation Survey & Checklist

CAC/PIV PKI Solution Installation Survey & Checklist CAC/PIV PKI Solution Installation Survey & Checklist Konica Minolta CAC/PIV Solution Revision: 1.3 Date: 10/19/09 1 Document Overview This document must be completed and used as a checklist or questionnaire

More information

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Cisco VPN 3000 Concentrator Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions

The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Product Datasheet The governance IT needs Easy user adoption Trusted Managed File Transfer solutions Full-featured Enterprise-class IT Solution for Managed File Transfer Organizations today must effectively

More information

NetSpective Global Proxy Configuration Guide

NetSpective Global Proxy Configuration Guide NetSpective Global Proxy Configuration Guide Table of Contents NetSpective Global Proxy Deployment... 3 Configuring NetSpective for Global Proxy... 5 Restrict Admin Access... 5 Networking... 6 Apply a

More information

Information Technology Department Secure File Transfer System User Guide

Information Technology Department Secure File Transfer System User Guide Information Technology Department Secure File Transfer System User Guide Lasted Updated: October 29, 2009 1 Table of Contents 1. Secure FTP Web Application Overview... 3 2. Secure FTP Web Application URL...

More information

Quick Start Guide Getting started with your Hetzner package

Quick Start Guide Getting started with your Hetzner package Welcome to Hetzner! This guide will show you how to setup your domain name, website and email services you have subscribed to. Before getting started, it is important to understand that when you order

More information

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc.

Considerations In Developing Firewall Selection Criteria. Adeptech Systems, Inc. Considerations In Developing Firewall Selection Criteria Adeptech Systems, Inc. Table of Contents Introduction... 1 Firewall s Function...1 Firewall Selection Considerations... 1 Firewall Types... 2 Packet

More information

5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance

5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance 5 Easy Steps to Implementing Application Load Balancing for Non-Stop Availability and Higher Performance DEPLOYMENT GUIDE Prepared by: Jim Puchbauer Coyote Point Systems Inc. The idea of load balancing

More information

P U R D U E U N I V E R S I T Y

P U R D U E U N I V E R S I T Y P U R D U E U N I V E R S I T Y Service Level Agreement (SLA) Between the Identity and Access Management Office (IAMO) and the designated Purdue University administrative or academic group (the Client)

More information

WHMCS LUXCLOUD MODULE

WHMCS LUXCLOUD MODULE èè WHMCS LUXCLOUD MODULE Update: 02.02.2015 Version 2.0 This information is only valid for partners who use the WHMCS module (v2.0 and higher). 1.1 General overview 1.2 Installing the plugin Go to your

More information

Installation & Configuration Guide

Installation & Configuration Guide Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks

More information

FileCloud Security FAQ

FileCloud Security FAQ is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file

More information

Getting Started with PRTG Network Monitor 2012 Paessler AG

Getting Started with PRTG Network Monitor 2012 Paessler AG Getting Started with PRTG Network Monitor 2012 Paessler AG All rights reserved. No parts of this work may be reproduced in any form or by any means graphic, electronic, or mechanical, including photocopying,

More information

IMF Tune Quarantine & Reporting Running SQL behind a Firewall. WinDeveloper Software Ltd.

IMF Tune Quarantine & Reporting Running SQL behind a Firewall. WinDeveloper Software Ltd. IMF Tune Quarantine & Reporting Running SQL behind a Firewall WinDeveloper Software Ltd. 1 Basic Setup Quarantine & Reporting Web Interface must be installed on the same Windows Domain as the SQL Server

More information

Burst Technology bt-loganalyzer SE

Burst Technology bt-loganalyzer SE Burst Technology bt-loganalyzer SE Burst Technology Inc. 9240 Bonita Beach Rd, Bonita Springs, FL 34135 CONTENTS WELCOME... 3 1 SOFTWARE AND HARDWARE REQUIREMENTS... 3 2 SQL DESIGN... 3 3 INSTALLING BT-LOGANALYZER...

More information