VINTELA AUTHENTICATION SERVICES
|
|
|
- Hester Gardner
- 10 years ago
- Views:
Transcription
1 VINTELA AUTHENTICATION SERVICES Troubleshooting Training, Level I Last printed 10/26/2006 3:07:00 PM
2 VAS Troubleshooting Training, Level I VAS Troubleshooting Training, Level I : Outline and Purpose : Overview...3 LDAP... 3 Kerberos:... 3 NSS:...3 PAM:... 4 LAM:... 4 NIS: : Using the vastool Application and Common Commands : The Steps of a vastool join : Integration Points : Files Installed, Location, and Purpose : Unix Personality Mode : The vasd Daemon Process : Troubleshooting: Kerberos : Troubleshooting: Loading Information into the Cache from AD : Troubleshooting: Providing Information to the System from the Cache : Troubleshooting: Authentication Issues : Troubleshooting: NIS : Finding and reporting bugs File: VAS Troubleshooting Training Page: 2
3 1: Outline and Purpose This document is meant for front line support: People who support multiple systems/programs, and need a primer on some basic issues and resolutions when dealing with the VAS product. For issues that are beyond this document, it will provide what information to gather for those that will do advanced troubleshooting (outlined in the second document in this series) It also includes an overview of the major components VAS uses to provide the AD (Active Directory) information and authentication to the *nix system. The focus will be on maintaining an existing installation of VAS that previously worked, though an overview of the join process will be given. It does not involve a lot of understanding debug logs, only a few certain things from debug will be utilized. 2: Overview LDAP: Lightweight Directory Access Protocol. This is how external machines access information stored in Active Directory. Search options include a filter, base, URI, and depth. For VAS, the main use will be searching AD using LDAP, as defined in RFC 2254 ( ). Kerberos: The mythical three-headed dog guarding the gates of hell. Or in this case, a set of protocols and specifications for securely authenticating using a trusted third party. This means an AD KDC (Kerberos Domain Controller, each DC in AD is one) which is trusted by both the user and the service the user is accessing (like logging into a computer). For troubleshooting, commands will be given that help verify this trusted relationship is set up properly. NSS: Name Service switch. Used on a *nix system to obtain user/group information. getpwnam, getgrgid are examples of the relevant system calls. This provides Identity: who a user is, information about the account, group memberships. NSS can also provide other information, like services, hosts, netgroups, etc. The default location for the information is the files backend (backend is the name for a database source for NSS). The files backend includes File: VAS Troubleshooting Training Page: 3
4 files such as /etc/passwd for users, /etc/group for groups, /etc/services for services information, and so on. Other possible repositories are NIS, LDAP (using an openldap implementation like PADL), vas3 (VAS s nss module) or any other custom NSS backend. PAM: Pluggable Authentication Module. This provides Authentication. Is a user is who they claim to be and should they have access to this system? Controlled by /etc/pamd.conf in the Unix systems, and files in the /etc/pam.d/ directory on Linux. When an authentication happens it has a service name, and that name is matched to an entry in /etc/pam.conf, or a file with the same name in /etc/pam.d/. If there is no match it uses the OTHER or other entry for processing. LAM: Loadable Authentication Module. Also known as I&A, Identification and Authorization. AIX s nss/pam implementation. Controlled mainly by the file /etc/security/user by adding VAS to the default: SYSTEM line. Then /usr/lib/security/methods.cfg is where the library location for VAS is specified. NIS: Network Information Services. A networked based back-end for NSS. Normally a system used the files backend, which is comprised of local files on the machine to access information. Files like /etc/passwd, /etc/group, /etc/services. NIS allows that information to come from a central network location, removing the need to sync multiple local files when information changes. 3: Using the vastool Application and Common Commands /opt/quest/bin/vastool is a general tool for setting up, maintaining, test, and use a VAS installation. General format: /opt/quest/bin/vastool [authentication] <command> [options] For example, here is using vastool to do an AD query of LDAP information: /opt/quest/bin/vastool u host/ search (cn=test_user) File: VAS Troubleshooting Training Page: 4
5 This is using the host/ object, also known as the computer object. It consists of a Computer object in AD, with proper SPN (serviceprincipalname) that corresponds to the *nix machines hostname/fqdn, and a local /etc/opt/quest/vas/host.keytab that is a Kerberos keytab. The keytab is a key to unlocking tickets meant for the computer object s service. Each individual machine can use the word host/. VAS takes that, and makes a proper SPN from that, by filling in host/<fqdn>@<domain>. The host.keytab file is readable only by root, so when using u host/ for authentication on a vastool command, root access is needed. Next is the command, search. That is used to query ldap information from AD. It requires a valid search filter, the (cn=test_user). That is saying to return any object in AD that has a cn (standing for canonical name, the actual name is cn ) that is test_user exactly. Some example of other valid searches: ( (cn=test_user)(uid=test_user)) Searches for anything with either cn or uid of test_user (&(objectcategory=person)([email protected])) Searches for and user with the specified User Principal Name. The first option of a search command (aside from flags) is the filter. Anything after that are interpreted as attribute names to search. If none are given, all attributes are returned. If only specific ones are required, they can be listed as so: vastool u host/ search (cn=test_user) uidnumber gidnumber gecos unixhomedirectory logonshell That will return the unix attributes if they are enabled for the test_user object. The search command is useful for verifying information in AD when dealing with information not being cached. Another useful command is the list command. vastool list c user <username> vastool list f user <username> vastool list users username> vastool list c group <groupname> vastool list f group <groupname> vastool list groups File: VAS Troubleshooting Training Page: 5
6 These all pull from the VAS s local cache of information. With c, it is only form the cache. With f, it is forced to update with the latest AD information. With either, then internal algorithms determine if it is cache only, or updated from AD, depending on age of the entry, and who is calling. Only root can use the f option. This is useful for issues where the information isn t provided to the system, this command helps determine if VAS even known the information in question. The last command (it has many more, vastool h, or man vastool for more) for troubleshooting at this time is the nss command. vastool nss getpwnam <username> This command gives an interface for asking the system through NSS about uses. These are the same types of commands programs use, so if a program doesn t know about a user, the nss command is used to see if the system knows about the user. The possibilities are: getpwnam <user name>, getgrnam <group name>, getpwuid <users uid>, getgrgid <group s gid>, getgrent, getpwent, and on AIX only, getgrset <username> for a list of GID s of groups they are a member of. These commands should return /etc/passwd and /etc/group entry style responses: <name>:<password hash>:<uid>:<gid>:<gecos>:<homedir>:<shell> If the password hash is not :VAS:, then something else is likely providing the information, as in an /etc/passwd entry, or NIS. If it is *LK*, or a hash, then VAS could be providing it and the account is locked, or configured to provide password hashes to NSS. File: VAS Troubleshooting Training Page: 6
7 4: The Steps of a vastool join This section can be considered optional. It helps show how VAS pulls together the various parts to provide the AD -> *nix functionality. Here is a basic join: sethe:/home/sethe # /opt/quest/bin/vastool -u administrator -w Test1234 join -f baka.dev Checking whether computer is already joined to a domain... no Configuring forest root... baka.dev... OK Configuring site... Default-First-Site-Name... OK Selecting server to use for join... baka-dc.baka.dev... OK Stopping VAS client daemon: vasd... OK Joining computer to the domain as host/sethe.vintela.com... OK Joined using computer object "CN=sethe,CN=Computers,DC=baka,DC=dev"... OK Writing vas.conf... OK Populating misc cache... OK Detecting Schema Configuration... OK Preparing to apply Group Policy... OK Applying VAS Related Group Policy Settings... OK Loading users cache:... OK Loading groups cache:... OK Loading Domain Info cache:... OK Configuring Name Service Switch... OK Configuring PAM Authentication... OK Starting VAS client daemon: vasd... OK sethe:/home/sethe # Step by step: Checking whether computer is already joined to a domain... no Checking current status. If the machine isn t joined, then a f flag ( force ) isn t needed. If it is joined, and f is not specified, it will fail. Configuring forest root... baka.dev... OK Vas needs to know the forest root, as certain information can only be found there, like a complete list of domains, and some server specific information. Configuring site... Default-First-Site-Name... OK Vas will follow sites. Sites are a programmatic way of determining which server to communicate with. They are set up in AD, and link subnets to specific servers. Selecting server to use for join... baka-dc.baka.dev... OK Vastool tries to pick a global catalog, as some information is needed from there, and if it isn t on the server we generate the host object at, it might not have the object yet. File: VAS Troubleshooting Training Page: 7
8 Stopping VAS client daemon: vasd... OK As the information is changing, stop the vasd process. Joining computer to the domain as host/sethe.vintela.com... OK Information on the SPN ( service principal name ) being used. Joined using computer object "CN=sethe,CN=Computers,DC=baka,DC=dev"... OK Location of the created computer object in AD. Written /etc/opt/quest/vas/host.keytab. Writing vas.conf... OK This takes information from the join, and puts it in vas.conf. Any command line settings ( workstation mode, UPM, search bases, etc. ) Populating misc cache... OK A cache of information, like domain joined, forest root, site, and other information in vas.conf, stored in a format with faster access then vas.conf. Detecting Schema Configuration... OK Where vas decided to use RFC 2307 or SFU for the unix attributes for users. Preparing to apply Group Policy... OK Testing for VGP. Applying VAS Related Group Policy Settings... OK Running vgptool apply before loading users/groups, so any AD GPO configured settings are applied. Loading users cache:... OK This is running vasd, something like /opt/quest/sbin/vasd xugs ( u for users, g for groups, and x form domain info ) Loading groups cache:... OK Continuation of above. Loading Domain Info cache:... OK Continuation of above. Configuring Name Service Switch... OK Equivalent to running vastool configure nss, this adds vas3 to /etc/nsswitch.conf on the passwd and group lines. Configuring PAM Authentication... OK File: VAS Troubleshooting Training Page: 8
9 Equivalent to vastool configure pam, this adds a pam_vas.so entry for auth session password and account. Starting VAS client daemon: vasd... OK Starts up the vasd process in daemon mode, just like running /etc/init.d/vasd start 5: Integration Points All the local files, and a bit of explanation on what files on a machine VAS will modify to integrate. For most systems, it is the files /etc/nsswitch.conf, and /etc/pam.conf. In /etc/nsswitch.conf, vastool join ( or vastool configure nss ) adds the word vas3 after the files entry, before any other entries. Location is important, it determines which modules are asked first. If an entry is not found, then the next entry is tested. It is not recommend that VAS is first. VAS will try very hard to find users it doesn t have cached. If the module with information is beyond VAS, then VAS will be doing unnecessary work attempting to locate those users/groups. For example, if there are still a number of NIS users on the system, then a setting of passwd: files nis vas3 should give the best performance. In /etc/pam.conf, there are sections for the individual services. Or on Linux, in the /etc/pam.d/ directory, files are made, each one named for a service. On Linux as well, most services drop through to a central point, either /etc/pam.d/system- * or /etc/pam.d/common-* depending on RedHat or Suse. Except other, which is denied by default. If a new application is not working, it might have to have its own unique file made in /etc/pam.d/. At this level of troubleshooting, all that needs to be checked is if there is a pam_vas entry for the service being used. On AIX, /etc/security/user is modified, adding VAS to the SYSTEM = line, and 3 lines for the VAS library into /usr/lib/security/methods.cfg. File: VAS Troubleshooting Training Page: 9
10 6: Files Installed, Location, and Purpose. For the first document in this series, only basic locations will be listed: In /etc/init.d/ are placed the init scripts for controlling the daemons. /sbin/init.d on HP, and /etc/rc.d/init.d/ on AIX. The /etc/opt/quest/vas directory holds configuration information, and the keytab files for a vas installation. All executables, daemons, libraries, and helper programs are placed in /opt/quest/bin, /opt/quest/sbin, /opt/quest/lib, and /opt/quest/libexec respectively. 7: Unix Personality Mode With the R2 version of Windows 2003, and the inclusion of the RFC_2307 schema extensions, it is possible to have posix accounts ( Personalities ) for users and groups. These allow a separation of the actual AD User account from the user information. With this, a single AD user can have multiple sets of unix information. These accounts are separated into OUs (organization units) and a *nix server is joined specifying a specific OU. So on that machine, a user has the identity available from that OU. Main purpose is for migrating information form multiple NIS domains before all the information is rationalized across the different domains. (i.e. bob on the DB machine had a uid of 612, on the backup server was 532, needs to keep that, while using the same password from a single AD account. ) Any given *nix machine can only see the information from the joined OU ( Primary Container ) and any Secondary containers. 8: The vasd Daemon Process All updates to the cache for VAS happen through the vasd process. It needs to be running to respond to requests for new/updated information, and for authentications to go to AD instead of be disconnected. File: VAS Troubleshooting Training Page: 10
11 It runs in a parent/child model. vasd, once started, forks. The child process reads host.keytab, and then drops permissions to daemon. The parent monitors the child, and handles maintenance tasks. The child works on handling requests form nss_vas and pam_vas to update information. To make sure it is running properly, run ps ef grep vas This should show all the vas-related process, including vasd. There should only be two processes, one a child of the other. The parent running as root, and the child running as daemon. There should be no defunct processes. If there are any issues, it can be restarted with the command: /etc/init.d/vasd restart (Linux, Solaris ) /etc/rc.d/init.d/vasd restart ( AIX ) /sbin/inid.t/vasd restart ( HPUX ) If that doesn t resolve the issue, escalate. 9: Troubleshooting: Kerberos The first thing to check on any machine with issues (beyond checking vasd ) is the following command (run as root): /opt/quest/bin/vastool u host/ auth S host/ This command verifies many things: Time is properly synced with AD. Kerberos is time-sensitive, and cannot be off by more than 5 minutes. The computer object in AD exists. The host.keytab authenticates the host/ service to AD. The computer object is not disabled, and can authenticate. The computer object has a valid SPN entry. A ticket for host/ as a service can be obtained. The ticket can be unlocked by the host.keytab entry for the service. The computer object service can handle an authentication. If the command fails for any of those reasons, it can stop the local *nix machine form working properly, dropping it into disconnected mode. File: VAS Troubleshooting Training Page: 11
12 Disconnected mode means the machine can only work off of what is currently cached. Any changes to AD will not be reflected. Authentication will only work for users who either logged in before (a SHA hash of the password is stored for this purpose), or those set up in vas.conf under the perm-disconnected-users entry. Except for syncing the time, all of these issues can be handled by re-joining the server to AD. If that is not possible, next best is having someone with AD access reset the computer object, by right-clicking on it in AD, and selecting Reset Account. Then run the following command: /opt/quest/bin/vastool u host/ -w `hostname cut d. f1` passwd rk /etc/opt/quest/vas/host.keytab This won t fix issues with SPN, as without permissions those can t be change. It will fix issues where the keytab is out of sync with AD (preauth failed messages ). 10: Troubleshooting: Loading Information into the Cache from AD All of this troubleshooting centers around information and authentication. There are 5 major parts: 1) Information is in AD. 2) Information is queried from AD, and put into the local cache. 3) The information in the local cache is made available to the system. 4) Authentication. 5) System allowing the user in. This section covers parts 1 and 2, and how to determine if that is where the issue is. First step is to determine if the information is available to the system. vastool nss <command relevant to the information> Since we are in this section, it doesn t show up. File: VAS Troubleshooting Training Page: 12
13 So the next step is to see if the information is in the cache. vastool list c user group <name> Again, since we are in this section, it doesn t show up. Next step is to try and force it. Maybe something just changed in AD that makes the information available ( the user was unix enabled, and it had just now replicated to the DC VAS is talking with. ). vastool list f user group <name> If it was just AD delay, it would show up now. But if it isn t, a few thing to check first: vastool u host/ search (userprincipalname=<name>@*) Need to be root. Also, if another attribute for naming is being used, that should be used instead of cn=. For example, if vas.conf had a [vasd] entry of username-attr-name = samaccountname, then search by samaccountname ( AD is case insensitive, name Name NAME all mean the same to AD ). By default, VAS uses userprincipalname for a users logon name ( trimmed at ). If it is a Personality, then the UID attributes. Look for the unix attributes all set on the user/group (groups just have gidnumber ). Another thing to check is location. If a user-search-path/group-search-path is set in vas.conf, then the user/group needs to be in that path to be loaded. (Users who log in should be found, groups might not be, depends on VAS version). By this point it should be narrowed to three possibilities: 1) Information doesn t exist in AD. Get the information populated in AD 2) Information exists in AD, but isn t getting into the cache. Time to escalate this to the team that handles in-depth issues. 3) The information was in AD, and is now in the cache. nothing more to do, just needed to wait. File: VAS Troubleshooting Training Page: 13
14 11: Troubleshooting: Providing Information to the System from the Cache This section covers if the information is in the local cache, but the vastool nss commands are not returning it. This involves using NSS debug. Run the nss command, like this: NSS_VAS_STDERR_DEBUG=1 /opt/quest/bin/vastool nss getxxyyy <value> This will print information of the nss_vas layer as it processes the request. The majority of the middle is nss_vas talking to vasd through IPC, telling it to do an update. Look near the end for a message about why it isn t returned. An error 2 is ENOENT, not found, and shouldn t happen if it is in the cache. If this is the case, make sure the names being used match what VAS is using for the name attribute. Error 16 is EBUSY, the database is busy. Run fusr /var/opt/quest/vas/vasd/* Get the name of each of the processes listed, and escalate that information. Error 13 is EPERM, permissions denied. Check the permissions on the databases and directories leading up to them: ls la /var/opt/quest /var/opt/quest/vas /var/opt/quest/vas/vasd The /var/opt/quest/vas/vasd and files vas_ident.vdb and vas_misc.vdb should be readable by world. This issue is seen when users can t get nss information, but as root, the information is seen. Another possibility is nss_vas is deciding to not return the information due to OS limitations. Users/groups with UID/GIDs larger then the system can handle. A group with a membership list larger then the OS supplied buffer can handle (with 8 character length names, about 531 on Solaris. HP is also affected, AIX and Linux are not.). File: VAS Troubleshooting Training Page: 14
15 12: Troubleshooting: Authentication Issues Authentication is a complex process, the common and easily seeable issues will be discussed. The first step of authentication is making sure the user exists, so verifying the previous two sections should be done first. The one exception is when a user can log into a system, and use some, but not all tools. For example, they can telnet onto a system, but can t ssh. The method that doesn t work should be verified to be pam enabled, This can be done by running ldd against the binary. For example, with sshd, run: ldd /usr/local/bin/sshd ( if sshd was located in /usr/local/bin ) On HPUX, use the dump command: dump H /usr/local/bin/sshd Look for the pam library. If it isn t there, it is highly likely the program isn t pam enabled, so can t interact with VAS for authentication. In the case of SSHD, it is possible for it to be configured to not use PAM. The easiest method to check an authentication issue is to as root, su to the user, no -. If you can get a shell, you have eliminated the information not being present to the system, and that the information is accepted by the system. Then exit, and su - <username>. This runs through the users profiles, and also hits the home directory for the operating systems that care. If that worked, again, su - <username> and have the user enter their password. If that works, investigate how the user is logging in that is denied, as apposed to the system in general not letting the user in. su tends to be the simplest authentication method, and is great for investigating the issue if it can show it. Once it has been determined the application should be using PAM, and that the user s information is available to the system, the next step is to see what pam_vas is reporting about the user. Examine the /etc/syslog.conf file for an auth (authpriv on Linux ) entry. A common one is /var/log/auth. If there isn t one, have the sys admin set up a syslog capture for that. File: VAS Troubleshooting Training Page: 15
16 Examine the file pointed to and look for an entry like this: Sep 28 20:23:30 sethe su: pam_vas: Authentication <failed> for <Active Directory> user: <tu-1-b> account: service: <su> reason: <invalid password> Sep 27 11:40:28 sethe su: pam_vas: Authentication <failed disconnected> for <Active Directory> user: <tu-2-b> account: service: <su> reason: <invalid password> Sep 27 21:01:18 sethe su: pam_vas: Authentication <succeeded> for <Active Directory> user: <tu-1-b> account: service: <su> reason: <N/A> There are four possibilities: 1) The entry doesn t exist. Or doesn t exist for the time being investigated. Make sure the application is PAM enabled. SSHD can decide a given user is invalid, and lets them try to log in, saying it failed, when it didn t do any authentication. More advanced then this document, run sshd in debug, or enable it, and look for when it decided the user was illegal (the term it uses for a user that will never successfully authenticate). 2) An entry and the cause is apparent. Like the account is disabled, or outside logon hours, or local policy (users.allow) denies the user. a. If the reason is invalid password, have the user validate their password by running: /opt/quest/bin/vastool u <username> kinit. That does just the AD authentication using Kerberos. b. If local policy, run vastool user checkaccess <username> /. 3) The reason given in the log says internal error. In this case, the issue will need to be escalated, as further debugging will be needed to find the issue. 4) The entry says it succeeded. As for the last case, just because the pam_vas layer said to let the user in doesn t mean they got in. At this point, the OS still needs to allow the user. For all operating systems this means the users shell must exist, work, and for some applications like ftp, be listed in /etc/shells. For some operating systems the users home directory must exist (pam_vas tries to make it by default), and be owned by the user. For AIX, the users GID MUST resolve to a group. An su would with the message Unable to set terminal ownership for this issue. File: VAS Troubleshooting Training Page: 16
17 13: Troubleshooting: NIS VAS can provide NIS information through vasypd, a NIS server application that gets it information from AD. The first step is to determine if a nis client is properly running. ypwhich ypwhich m The first will show the yp server being talked to and the second the available maps. If the first fails, check for the vasypd process, same as you would for vasd. It runs the same parent/child model. If it isn t running, or doesn t have two processes, restart it. /etc/init.d/vasypd restart (Linux, Solaris ) /etc/rc.d/init.d/vasypd restart ( AIX ) /sbin/inid.t/vasypd restart ( HPUX ) If that doesn t fix the issue, the sys admin for that machine should be brought in to get it configured properly. If the ypwhich m doesn t list all the expected maps, the vasypd cache can be flushed by running /opt/quest/sbin/vasypd x If that doesn t fix the issue, escalate. If the issue is with an individual issue, treat as the same as a missing map. Flush vasypd, and if that doesn t fix the issue, escalate. 14: Finding and reporting bugs So, after doing the troubleshooting, and eliminating configuration or information issues, there is still a problem. Likely found a bug, or a configuration issue that needs more investigation. Now need to distill it to its essential components so when it is reported to higher support internally, or Quest support, only the essentials are sent. First off, is it reproducible? Can there be established a series of steps that will reliably produce the issue? This doesn t mean if it doesn t always happen, it isn t a bug, but it is hard to do any work on a bug that can t be reproduced when needed. File: VAS Troubleshooting Training Page: 17
18 That usually means not all aspects of the bug are known, and some other influencing factor has yet to be identified. Once it is reproducible, if the machine is cleaned and re-installed/joined with VAS, can it be reproduced? If not, there is probably a series of steps over time that contributes to the issue. Next step is to eliminate the extraneous. If there are many vas.conf settings, which ones can be turned off (or on) and still have the issue appear? Now, if it is an issue with a Personality, turning off UPM mode will make it go away, but isn t useful information for debugging. But if it is a user not able to log in, and it is found that turning off lowercase-name fixes the issue, that fact is very relevant. I would highly suggest obtaining the snapshot script from Quest Support, and include the output in each bug report. It gathers various information about a system and configuration files, to aid someone in investigating an issue. Always send steps to reproduce, as accurate as possible. Sometimes, the issue can look like VAS, but ends up being caused outside VAS. For example: On Solaris, VAS users with the /bin/csh shell were getting a crash whenever they tried to expand a tilde ~ to a username, like echo ~tu-1-b. The core trace showed deep into the vas cache. The final fix ended up being patching tcsh (what provides csh, patch level 13+ if you are interested), as csh had an issue where it was trashing its own internal stack, messing up some VAS items attached. Finally, check the KB Articles at Search Knowledge Base, and select the Product: Vintela Authentication Service. Put in a few key words related to the issue, and it is possible the issue is known and documented. File: VAS Troubleshooting Training Page: 18
Vintela Authentication from SCO Release 2.2. System Administration Guide
Vintela Authentication from SCO Release 2.2 System Administration Guide November 19, 2003 COPYRIGHT (c) Copyright 2003 Vintela, Inc. All Rights Reserved. (c) Copyright 2003 The SCO Group, Inc. Vintela
Installation and Configuration Guide. Version 2.6.47
Installation and Configuration Guide Version 2.6.47 Copyright c 2003-2005 Vintela, Inc. All Rights Reserved. Legal Notice Vintela documents are protected by the copyright laws of the United States and
Vintela Authentication from SCO Release 2.2. Installation Guide
Vintela Authentication from SCO Release 2.2 Installation Guide November 19, 2003 COPYRIGHT (c) Copyright 2003 Vintela, Inc. All Rights Reserved. (c) Copyright 2003 The SCO Group, Inc. Vintela documents
Windows Security and Directory Services for UNIX using Centrify DirectControl
SOLUTION GUIDE CENTRIFY CORP. SEPTEMBER 2005 Windows Security and Directory Services for UNIX using Centrify DirectControl With Centrify, you can now fully leverage your investment in Active Directory
Integrating HP-UX 11.x Account Management and Authentication with Microsoft Windows 2000 White Paper
Integrating HP-UX 11.x Account Management and Authentication with Microsoft Windows 2000 White Paper! Printed in: U.S.A. Copyright 2001 Hewlett-Packard Company Legal Notices The information in this document
How To Configure the Oracle ZFS Storage Appliance for Quest Authentication for Oracle Solaris
How To Configure the Oracle ZFS Storage Appliance for Quest Authentication for Oracle Solaris January 2014; v1.3 By Andrew Ness This article describes how to configure Quest Authentication Services in
Integrating Lustre with User Security Administration. LAD 15 // Chris Gouge // 2015 Sep
Integrating Lustre with User Security Administration LAD 15 // Chris Gouge // 2015 Sep Topics User Security in Linux POSIX Permissions The Requirement for Upcall in Lustre Upcall Utilities Overview Upcall
Integration with Active Directory. Jeremy Allison Samba Team
Integration with Active Directory Jeremy Allison Samba Team Benefits of using Active Directory Unlike the earlier Microsoft Windows NT 4.x Domain directory service which used proprietary DCE/RPC calls,
Security with LDAP. Andrew Findlay. February 2002. Skills 1st Ltd www.skills-1st.co.uk. [email protected]
Security with LDAP Andrew Findlay Skills 1st Ltd www.skills-1st.co.uk February 2002 Security with LDAP Applications of LDAP White Pages NIS (Network Information System) Authentication Lots of hype How
Active Directory and Linux Identity Management
Active Directory and Linux Identity Management Published by the Open Source Software Lab at Microsoft. December 2007. Special thanks to Chris Travers, Contributing Author to the Open Source Software Lab.
LDAP-UX Client Services B.04.10 with Microsoft Windows Active Directory Administrator's Guide
LDAP-UX Client Services B.04.10 with Microsoft Windows Active Directory Administrator's Guide HP-UX 11i v1, v2 and v3 HP Part Number: J4269-90074 Published: E0407 Edition: Edition 6 Copyright 2007 Hewlett-Packard
Using Active Directory as your Solaris Authentication Source
Using Active Directory as your Solaris Authentication Source The scope of this paper is to document how a newly installed Solaris 10 server can be configured to use an Active Directory directory service
RHEL Clients to AD Integrating RHEL clients to Active Directory
RHEL Clients to AD Integrating RHEL clients to Active Directory Presenter Dave Sullivan Sr. TAM, Red Hat 2013-09-03 Agenda Review Dmitri Pal and Simo Sorce Preso Legacy RHEL hook to AD RHEL Direct--->sssd--->AD
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist.
Introduction to Linux (Authentication Systems, User Accounts, LDAP and NIS) Süha TUNA Res. Assist. Outline 1. What is authentication? a. General Informations 2. Authentication Systems in Linux a. Local
Avaya CM Login with Windows Active Directory Services
Avaya CM Login with Windows Active Directory Services Objective 2 Installing Active Directory Services on a Windows 2003 Server 2 Installing Windows Service for UNIX on Windows 2003 Active Directory Server
Websense Support Webinar: Questions and Answers
Websense Support Webinar: Questions and Answers Configuring Websense Web Security v7 with Your Directory Service Can updating to Native Mode from Active Directory (AD) Mixed Mode affect transparent user
Authentication in a Heterogeneous Environment
Authentication in a Heterogeneous Environment Integrating Linux (and UNIX and Mac) Identity Management in Microsoft Active Directory Mike Patnode VP of Technology Centrify Corporation [email protected]
Identity Management based on FreeIPA
Identity Management based on FreeIPA SLAC 2014 Thorsten Scherf Red Hat EMEA What is an Identity Management System (IdM) An IdM system is a set of services and rules to manage the users of an organization
Integrating UNIX and Linux with Active Directory. John H Terpstra
Integrating UNIX and Linux with Active Directory John H Terpstra CTO, PrimaStasys Inc. [email protected] Slide 1 Agenda Definition of the Integration Problem Technical Background Review of Solution Choices
Interoperability Update: Red Hat Enterprise Linux 7 beta and Microsoft Windows
Interoperability Update: Red Hat Enterprise 7 beta and Microsoft Windows Mark Heslin Principal Systems Engineer Red Hat Systems Engineering Dmitri Pal Senior Engineering Manager Red Hat Software Engineering
Enabling Active Directory Authentication with ESX Server 1
1 Enabling Active Directory Authentication with ESX Server 1 This document provides information about how to configure ESX Server to use Active Directory for authentication. ESX Server system includes
System Security Services Daemon
System Security Services Daemon System Security Services Daemon Manages communication with centralized identity and authentication stores Provides robust, predictable caching for network accounts Can cache
Using Logon Agent for Transparent User Identification
Using Logon Agent for Transparent User Identification Websense Logon Agent (also called Authentication Server) identifies users in real time, as they log on to domains. Logon Agent works with the Websense
Using RADIUS Agent for Transparent User Identification
Using RADIUS Agent for Transparent User Identification Using RADIUS Agent Web Security Solutions Version 7.7, 7.8 Websense RADIUS Agent works together with the RADIUS server and RADIUS clients in your
PowerBroker Identity Services. Administration Guide
PowerBroker Identity Services Administration Guide Revision/Update Information: September 2014 Corporate Headquarters 5090 N. 40th Street Phoenix, AZ 85018 Phone: 1 818-575-4000 COPYRIGHT NOTICE Copyright
RSA ACE/Agent 5.2 for UNIX Installation and Configuration Guide
RSA ACE/Agent 5.2 for UNIX Installation and Configuration Guide Contact Information See our web sites for regional Customer Support telephone and fax numbers. RSA Security Inc. RSA Security Ireland Limited
Integrating Mac OS X 10.6 with Active Directory. 1 April 2010
Integrating Mac OS X 10.6 with Active Directory 1 April 2010 Introduction Apple Macintosh Computers running Mac OS X 10.6 can be integrated with the Boston University Active Directory to allow use of Active
Likewise Security Benefits
Likewise Enterprise Likewise Security Benefits AUTHOR: Manny Vellon Chief Technology Officer Likewise Software Abstract This document describes how Likewise improves the security of Linux and UNIX computers
FreeIPA 3.3 Trust features
FreeIPA 3.3 features Sumit Bose, Alexander Bokovoy March 2014 FreeIPA and Active Directory FreeIPA and Active Directory both provide identity management solutions on top of the Kerberos infrastructure
Unifying Authorization Models
Unifying Authorization Models Merging /etc/group and 'Domain Users' Gerald Carter Centeris [email protected] http://www.samba.org/ Slide 1 Copyright G. Carter, 2006 Outline http://samba.org/~jerry/slides/lwny07_2up.pdf
Active Directory LDAP Quota and Admin account authentication and management
Active Directory LDAP Quota and Admin account authentication and management Version 4.1 Updated July 2014 GoPrint Systems 2014 GoPrint Systems, Inc, All rights reserved. One Annabel Lane, Suite 105 San
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
Plan 9 Authentication in Linux
Plan 9 Authentication in Linux Ashwin Ganti University of Illinois at Chicago [email protected] ABSTRACT This paper talks about the implementation of the Plan 9 authentication mechanisms for Linux. As
Red Hat Enterprise ipa
Red Hat Enterprise ipa Introduction Red Hat Enterprise IPA enables your organization to comply with regulations, reduce risk, and become more efficient. Simply and centrally manage your Linux/Unix users
This presentation will discuss how to troubleshoot different types of project creation issues with Information Server DataStage version 8.
This presentation will discuss how to troubleshoot different types of project creation issues with Information Server DataStage version 8. Page 1 of 29 The objectives of this module are to list the causes
Vintela Authentication Services
Vintela Authentication Services Using One Time Passwords with VAS and RSA SecurID written by Quest Software, Inc. John Bowers White Paper Copyright Microsoft, MS, MS-DOS, MS-Mail, MS-Proxy, Exchange, Microsoft
SUSE Manager 1.2.x ADS Authentication
Best Practice www.suse.com SUSE Manager 1.2.x ADS Authentication How to use MS-ADS authentiction (Version 0.7 / March 2 nd 2012) P r e f a c e This paper should help to integrate SUSE Manager to an existing
Allowing Linux to Authenticate to a Windows 2003 AD Domain. Prepared by. Thomas J. Munn, CISSP 11-May-06
Allowing Linux to Authenticate to a Windows 2003 AD Domain Prepared by Thomas J. Munn, CISSP 11-May-06 Table of Contents: Table of Contents:... 2 Introduction... 3 Requirements... 4 Installing the Necessary
SSSD Active Directory Improvements
FreeIPA Training Series SSSD Active Directory Improvements Jakub Hrozek January 2013 Contents of the presentation 1.Overview of Active Directory related improvements 2.Range attributes support 3.Mapping
Nevepoint Access Manager 1.2 BETA Documentation
Nevepoint Access Manager 1.2 BETA Documentation Table of Contents Installation...3 Locating the Installation Wizard URL...3 Step 1: Configure the Administrator...4 Step 2: Connecting to Primary Connector...4
Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory
Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory HOWTO, 2 nd edition Introduction... 2 Integration using the Lights-Out Migration Utility... 2 Integration using the ilo web interface...
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
Secure Shell Demon setup under Windows XP / Windows Server 2003
Secure Shell Demon setup under Windows XP / Windows Server 2003 Configuration inside of Cygwin $ chgrp Administrators /var/{run,log,empty} $ chown Administrators /var/{run,log,empty} $ chmod 775 /var/{run,log}
Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA
Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA Alexander Bokovoy May 21th, 2015 Samba Team / Red Hat 0 A crisis of identity (solved?) FreeIPA What is
How to monitor AD security with MOM
How to monitor AD security with MOM A article about monitor Active Directory security with Microsoft Operations Manager 2005 Anders Bengtsson, MCSE http://www.momresources.org November 2006 (1) Table of
Best Practices Guide for NerveCenter System and Security Administrators. Windows and UNIX Version 5.x Version 6.x. July 2011 NCBPSA5200-05
Best Practices Guide for NerveCenter System and Security Administrators Windows and UNIX Version 5.x Version 6.x July NCBPSA5200-05 Copyright Portions Copyright 1989- LogMatrix, Inc. / OpenService, Inc.
NetSpective Logon Agent Guide for NetAuditor
NetSpective Logon Agent Guide for NetAuditor The NetSpective Logon Agent The NetSpective Logon Agent is a simple application that runs on client machines on your network to inform NetSpective (and/or NetAuditor)
Using Kerberos to Authenticate a Solaris TM 10 OS LDAP Client With Microsoft Active Directory
Using Kerberos to Authenticate a Solaris TM 10 OS LDAP Client With Microsoft Active Directory Wajih Ahmed and Baban Kenkre March 2008 (Updated May 2008) Sun Microsystems, Inc. Please note: This configuration
DB2 - LDAP. To start with configuration of transparent LDAP, you need to configure the LDAP server.
http://www.tutorialspoint.com/db2/db2_ldap.htm DB2 - LDAP Copyright tutorialspoint.com Introduction LDAP is Lightweight Directory Access Protocol. LDAP is a global directory service, industry-standard
Univention Corporate Server. Extended domain services documentation
Univention Corporate Server Extended domain services documentation 2 Table of Contents 1. Integration of Ubuntu clients into a UCS domain... 4 1.1. Integration into the LDAP directory and the SSL certificate
1 Introduction. Ubuntu Linux Server & Client and Active Directory. www.exacq.com Page 1 of 14
Ubuntu Linux Server & Client and Active Directory 1 Introduction For an organization using Active Directory (AD) for user management of information technology services, integrating exacqvision into the
Building Open Source Identity Management with FreeIPA. Martin Kosek [email protected] http://www.oss4b.it/
Building Open Source Identity Management with FreeIPA Martin Kosek [email protected] http:/// OSS4B 2013 - Open Source Software for Business 19-20 September 2013, Monash University Prato Centre Prato,
800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410
800-782-3762 www.stbernard.com Active Directory 2008 Implementation Version 6.410 Contents 1 INTRODUCTION...2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION...3 2.1 Supported Deployment
Cisco Setting Up PIX Syslog
Table of Contents Setting Up PIX Syslog...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1 Components Used...1 How Syslog Works...2 Logging Facility...2 Levels...2 Configuring
Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide
Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without
Creating an LDAP Directory
Systems and Network Management 1 Background Creating an LDAP Directory The ldap protocol is a standard for network directories. Some proprietary directory servers have been based on ldap, for example,
PriveonLabs Research. Cisco Security Agent Protection Series:
Cisco Security Agent Protection Series: Enabling LDAP for CSA Management Center SSO Authentication For CSA 5.2 Versions 5.2.0.245 and up Fred Parks Systems Consultant 3/25/2008 2008 Priveon, Inc. www.priveonlabs.com
IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE
White Paper IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE Abstract The OneFS user mapping service combines a user s identities from different directory services into a single access
User Service and Directory Agent: Configuration Best Practices and Troubleshooting
User Service and Directory Agent: Configuration Best Practices and Troubleshooting Websense Support Webinar March 2011 web security data security email security Support Webinars 2009 Websense, Inc. All
Configuration Guide for SAS 9.4 Foundation for UNIX Environments
Configuration Guide for SAS 9.4 Foundation for UNIX Environments Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2016. Configuration Guide for SAS
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.)
Fundamentals of UNIX Lab 16.2.6 Networking Commands (Estimated time: 45 min.) Objectives: Develop an understanding of UNIX and TCP/IP networking commands Ping another TCP/IP host Use traceroute to check
Tracking Network Changes Using Change Audit
CHAPTER 14 Change Audit tracks and reports changes made in the network. Change Audit allows other RME applications to log change information to a central repository. Device Configuration, Inventory, and
Going in production Winbind in large AD domains today. Günther Deschner [email protected]. (Red Hat / Samba Team)
Going in production Winbind in large AD domains today Günther Deschner [email protected] (Red Hat / Samba Team) Agenda To go where no one has gone before Winbind scalability Find Domain Controllers Active Directory
SSL Tunnels. Introduction
SSL Tunnels Introduction As you probably know, SSL protects data communications by encrypting all data exchanged between a client and a server using cryptographic algorithms. This makes it very difficult,
LDAP and Integrated Technologies: A Simple Primer Brian Kowalczyk, Kowal Computer Solutions Inc., IL Richard Kerwin, R.K. Consulting Inc.
LDAP and Integrated Technologies: A Simple Primer Brian Kowalczyk, Kowal Computer Solutions Inc., IL Richard Kerwin, R.K. Consulting Inc., IL ABSTRACT SAS Integration Technologies and LDAP(Lightweight
Configuring Active Directory Single Sign-On (AD SSO)
9 CHAPTER Configuring Active Directory Single Sign-On (AD SSO) This chapter describes how to configure Active Directory (AD) Single Sign-On (SSO) for the Cisco NAC Appliance. Topics include: Overview,
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
Windows Server 2003 Active Directory: Perspective
Mary I. Hubley, MaryAnn Richardson Technology Overview 25 September 2003 Windows Server 2003 Active Directory: Perspective Summary The Windows Server 2003 Active Directory lies at the core of the Windows
LDAP and Active Directory Guide
LDAP and Active Directory Guide Contents LDAP and Active Directory Guide...2 Overview...2 Configuring for LDAP During Setup...2 Deciding How to Use Data from LDAP... 2 Starting the Setup Tool... 3 Configuring
Unified Authentication, Authorization and User Administration An Open Source Approach. Ted C. Cheng, Howard Chu, Matthew Hardin
Unified Authentication, Authorization and User Administration An Open Source Approach Introduction Ted C. Cheng, Howard Chu, Matthew Hardin {tedcheng,hyc,mhardin}@symas.com Authentication, authorization,
v7.8.2 Release Notes for Websense Content Gateway
v7.8.2 Release Notes for Websense Content Gateway Topic 60086 Web Security Gateway and Gateway Anywhere 12-Mar-2014 These Release Notes are an introduction to Websense Content Gateway version 7.8.2. New
Lecture 10 - Authentication
Lecture 10 - Authentication CMPSC 443 - Spring 2012 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse443-s12/ Kerberos: What to know 1) Alice T rent : {Alice + Bob
Configure Samba with ACL and Active Directory integration Robert LeBlanc ([email protected]) BioAg Computer Support, Brigham Young University
Configure Samba with ACL and Active Directory integration Robert LeBlanc ([email protected]) BioAg Computer Support, Brigham Young University This document uses Debain Linux 3.1 (Sarge) on x86 hardware.
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
Installation Steps for PAN User-ID Agent
Installation Steps for PAN User-ID Agent If you have an Active Directory domain, and would like the Palo Alto Networks firewall to match traffic to particular logged-in users, you can install the PAN User-ID
Active Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
ONEFS MULTIPROTOCOL SECURITY UNTANGLED
White Paper ONEFS MULTIPROTOCOL SECURITY UNTANGLED Abstract This paper describes the role that identity management, authentication, and access control play in the security system of the EMC Isilon OneFS
Attunity RepliWeb PAM Configuration Guide
Attunity RepliWeb PAM Configuration Guide Software Version 5.2 For Linux and UNIX operating systems June 28, 2012 RepliWeb, Inc., 6441 Lyons Road, Coconut Creek, FL 33073 Tel: (954) 946-2274, Fax: (954)
Incremental Backup Script. Jason Healy, Director of Networks and Systems
Incremental Backup Script Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Incremental Backup Script 5 1.1 Introduction.............................. 5 1.2 Design Issues.............................
Administration Guide. . All right reserved. For more information about Specops Password Sync and other Specops products, visit www.specopssoft.
Administration Guide. All right reserved. For more information about Specops Password Sync and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Password Sync is a trademark
1 Introduction. Windows Server & Client and Active Directory. www.exacq.com
Windows Server & Client and Active Directory 1 Introduction For an organization using Active Directory (AD) for user management of information technology services, integrating exacqvision into the AD infrastructure
User and Group-Based Reporting in TRITON - Web Security: Best Practices and Troubleshooting
User and Group-Based Reporting in TRITON - Web Security: Best Practices and Troubleshooting Websense Support Webinar March 2012 web security data security email security Support Webinars 2012 Websense,
BusinessObjects 4.0 Windows AD Single Sign on Configuration
TUBusinessObjects 4.0 Single Sign OnUT BusinessObjects 4.0 Single Sign On also called SSO with Windows AD requires few steps to take. Most of the steps are dependent on each other. Certain steps cannot
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
Samba. Samba. Samba 2.2.x. Limitations of Samba 2.2.x 1. Interoperating with Windows. Implements Microsoft s SMB protocol
Samba Samba Interoperating with Windows Nick Urbanik Copyright Conditions: GNU FDL (seehttp://www.gnu.org/licenses/fdl.html) A computing department Implements Microsoft s SMB protocol
IceWarp to IceWarp Server Migration
IceWarp to IceWarp Server Migration Registered Trademarks iphone, ipad, Mac, OS X are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, Outlook and Windows Phone
Introduction to Operating Systems
Introduction to Operating Systems It is important that you familiarize yourself with Windows and Linux in preparation for this course. The exercises in this book assume a basic knowledge of both of these
Migration of Windows Intranet domain to Linux Domain Moving Linux to a Wider World
Journal of Basic and Applied Engineering Research pp. 55-59 Krishi Sanskriti Publications http://www.krishisanskriti.org/jbaer.html Migration of Windows Intranet domain to Linux Domain Moving Linux to
Desktop : Ubuntu 10.04 Desktop, Ubuntu 12.04 Desktop Server : RedHat EL 5, RedHat EL 6, Ubuntu 10.04 Server, Ubuntu 12.04 Server, CentOS 5, CentOS 6
201 Datavoice House, PO Box 267, Stellenbosch, 7599 16 Elektron Avenue, Technopark, Tel: +27 218886500 Stellenbosch, 7600 Fax: +27 218886502 Adept Internet (Pty) Ltd. Reg. no: 1984/01310/07 VAT No: 4620143786
Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley
Likewise Enterprise Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley IMPROVE SOX COMPLIANCE WITH CENTRALIZED ACCESS CONTROL AND AUTHENTICATION With Likewise Enterprise, you get one user,
Integrated Approach to User Account Management
Mission Critical Enterprise Systems Symposium 2006 Integrated Approach to User Account Management Kesselman, Glenn and Smith, William Lockheed Martin Mission Services Quest Software Public Sector October
Linuxdays 2005, Samba Tutorial
Linuxdays 2005, Samba Tutorial Alain Knaff [email protected] Summary 1. Installing 2. Basic config (defining shares,...) 3. Operating as a PDC 4. Password synchronization 5. Access control 6. Samba
Agency Pre Migration Tasks
Agency Pre Migration Tasks This document is to be provided to the agency and will be reviewed during the Migration Technical Kickoff meeting between the ICS Technical Team and the agency. Network: Required
Administration Guide NetIQ Privileged Account Manager 3.0.1
Administration Guide NetIQ Privileged Account Manager 3.0.1 December 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use
Discovery Guide. Secret Server. Table of Contents
Secret Server Discovery Guide Table of Contents Introduction... 3 How Discovery Works... 3 Active Directory / Local Windows Accounts... 3 Unix accounts... 3 VMware ESX accounts... 3 Why use Discovery?...
Workflow Templates Library
Workflow s Library Table of Contents Intro... 2 Active Directory... 3 Application... 5 Cisco... 7 Database... 8 Excel Automation... 9 Files and Folders... 10 FTP Tasks... 13 Incident Management... 14 Security
Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing. Installation Section
Instructions for Adding a MacOS 10.4.x Server to ASURITE for File Sharing Installation Section Purpose: We are setting up a server in ASU s specific environment. Power on the Server Insert the CD Hold
User Management / Directory Services using LDAP
User Management / Directory Services using LDAP Benjamin Wellmann [email protected] May 14, 2010 1 Introduction LDAP or Lightweight Directory Access Protocol is a protocol for querying and modifying data
UserGuide ReflectionPKIServicesManager
UserGuide ReflectionPKIServicesManager User Guide Reflection PKI Services Manager version 1.3.1 Copyrights and Notices Copyright 2015 Attachmate Corporation. All rights reserved. No part of the documentation
