Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory
|
|
- Nathan Parks
- 8 years ago
- Views:
Transcription
1 Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory
2 May 21, 2014 This edition of this document applies to Piston OpenStack 3.0. To send us your comments about this document, We look forward to hearing from you. When you send information to Piston Cloud Computing, Inc., you grant Piston Cloud Computing, Inc. a nonexclusive right to use or distribute the information in any way it believes appropriate without incurring any obligation to you. Copyright Piston Cloud Computing, Inc All rights reserved. US Government Users Restricted Rights - Use, duplication or disclosure restricted by GSA ADP Schedule Contract with Piston Cloud Computing, Inc. 2
3 Table of Contents Understanding Active Directory and Piston OpenStack... 4 Satisfying Prerequisites Modifying the Active Directory Schema...7 Planning Your LDAP Objects Configuring and Installing Piston OpenStack Configuring Piston OpenStack...14 Installing Piston OpenStack...20 Creating Objects in Active Directory Creating Users in Active Directory...21 Creating Piston OpenStack Objects in ADSI Edit...22 Validating the Integration Appendix A: Example LDAP Objects Appendix B: Example LDAP Configuration
4 Understanding Active Directory and Piston OpenStack This technical support bulletin describes how to integrate the Keystone authentication service with Microsoft Active Directory. Active Directory implements Lightweight Directory Access Protocol (LDAP) distributed-directory services, Kerberos authentication services, and Domain Name Service (DNS) distributed-naming services to manage objects such as users and computers in an enterprise. Integrating Keystone with Active Directory enables you to maintain user information in a single enterprise-wide repository to perform authentication and authorization of users in your Piston OpenStack cloud. Active Directory has three partitions also referred to as naming contexts in which it stores information: The domain partition contains users, groups, contacts, computers, organizational units, and other types of objects The schema partition contains classes and attribute definitions that describe the objects The configuration partition includes configuration data for services, partitions, and sites Active Directory stores objects hierarchically. Most companies, for instance, are broken up into organizational units such as Marketing, Sales, Business Development, and so on in order to group employees by their job function. Users are the entities that use the virtual machines and compute, networking, and storage services provided by a Piston OpenStack installation. Their ability to perform actions is based on permissions defined by roles. Users can be a member of multiple projects and have different roles within each. In this document users are represented by the organizationalperson object class, though other object classes can be used. Projects are high level groupings that group zero or more users and own resources such as block storage in Ceph and virtual machines in Nova. In the context of integrating Active Directory and Piston OpenStack, the groupofnames object class is used to represent projects, which are also referred to as tenants. 4
5 Roles are groupings of user or service privileges that specify the actions a user can perform in the context of the project. In this document roles are represented by the organizationalrole object class, though other object classes can be used. If you are using Active Directory you will probably have many users in your project. This document is not a comprehensive guide to implementing Active Directory, but for the purposes of the examples shown in the document you will create the objects shown in Figure 1: Active Directory Objects on page 6. 5
6 Figure 1: Active Directory Objects 6
7 Satisfying Prerequisites Important Make sure that the LDAP server does not have any of the projects or roles to be used for the Piston OpenStack cloud configured prior to successfully installing your cluster. Note that if you have to reinstall the cluster and any roles or projects exist already, the reinstallation process will fail. If you have to reinstall your cluster please contact Piston Advanced Technical Support. If you are using the hostname to connect to the Active Directory Domain Controller for LDAP then DNS must be able to resolve the hostname. You can also specify an Internet Protocol (IP) address for the Uniform Resource Locator (URL). Entering a root domain name should also work so long as the DNS Service (SRV) records exist that direct the Keystone service to a valid Active Directory server. Do the following to determine the IP address of your Active Directory server 1. Select Start > Server Manager. 2. Select DNS. 3. The Server column displays the name of the server; the fully-qualified domain name would be that value combined with the domain name, such as: ad01.example.com 4. The IPv4 Address column displays the IP address of the server, such as: Either value can be used to configure Piston OpenStack for integration with Active Directory. Modifying the Active Directory Schema Active Directory Service Interfaces (ADSI) is a set of Component Object Model (COM) interfaces in Active Directory that presents a single tool to manage multiple distributed resources. 7
8 In Active Directory the organizationalunit object class contains the User object class it is said to be a possible superior. This relationship is maintained through an attribute of the User object named posssuperiors, which is set to a value that contains organizationalunit as well as any other object classes that are above the User class in the relational hierarchy. In order to integrate Keystone with Active Directory the groupofnames class must be configured as a possible superior of the organizationrole class. Do the following: 1. Select Start > Administrative Tools. 2. Double-click ADSI Edit. 3. Select ADSI Edit. 4. Select Action > Connect to from the menu bar. 5. Make sure the Select a well known Naming Context radio button is enabled, then select Schema from the drop-down menu. 6. Click OK. 7. Expand Schema. 8. Select the appropriate schema. 9. Select the CN=Organizational-Role class; it should appear approximately three-quarters of the way down the list by default. 10. Select Action > Properties from the menu bar. 11. If the posssuperiors attribute is displayed, select it then click Edit; if it is not, do the following: A. Click Filter. B. Click Show only attributes that have values to de-select it. C. Select the posssuperiors attribute, then click Edit. 12. Type groupofnames in the Value to add field, then click Add. 13. Click OK to close the Multi-valued String Editor dialog. 14. Click OK to close the CN=Organizational-Role Properties dialog. 8
9 Notes Moving groupofnames objects that contain child objects such as organizationalrole objects within the Active Directory Users and Computers snap-in will result in child objects not displaying properly in any Microsoft Management Console (MMC) snap-ins. Changing the schema of the organizationalrole object to enable groupofnames as a possible superior must be done before creating any groupofnames objects or else MMC snap-ins will not display them as containers and it will therefore it be impossible to add organizationalrole objects to them. 9
10 Planning Your LDAP Objects To integrate Active Directory with Piston OpenStack you must configure Piston OpenStack first as described in Configuring and Installing Piston OpenStack on page 14 and then create the users and organizational units as described in Creating Objects in Active Directory on page 21. To facilitate this process, plan the objects you will be creating. In Table 1: Environment-Specific LDAP Properties on page 10, the values in the column named Property on page 10 are configuration options you will have to provide values for during the process described in Configuring and Installing Piston OpenStack on page 14. The column named Description on page 10 describes how you will determine what values to set each property to. Record the planned value in the column named Value in Your Environment on page 10 for use in Configuring and Installing Piston OpenStack on page 14. Table 1: Environment-Specific LDAP Properties Property Description Value in Your Environment url Record here the value ldap:// followed by the name or IP address of your Active Directory Server Example: ldap://
11 Property Description Value in Your Environment bind_dn Record here the distinguished name of a user account that has the permissions required to search the appropriate Active Directory tree Example: CN=ldapadmin,CN=Users, DC=EXAMPLE,DC=COM bind_password suffix Record here the password for the user specified for bind_dn on page 11 Set this to the distinguished name of the domaindns object in your Active Directory tree Example: DC=EXAMPLE,DC=COM 11
12 Property Description Value in Your Environment dumb_member The member attribute of groupofnames objects is required, making it impossible to have an empty group; if any groups in the tree are empty you will need to specify a dummy member to be automatically added Record here the distinguished name of a dummy user Example: CN=dumbmember, CN=Users,DC=EXAMPLE, DC=COM user_tree_dn Record here the distinguished name of the Users container Example: CN=Users,DC=EXAMPLE, DC=COM 12
13 Property Description Value in Your Environment user_objectclass Set this to the name of the object class that represents users Example: organizationalperson inetorgperson tenant_tree_dn Record here the distinguished name of the organizationalunit object you will create to represent projects Example: OU=Projects, OU=OpenStack, DC=EXAMPLE,DC=COM role_tree_dn Record here the distinguished name of the organizationalunit object you will create to represent projects Example: OU=Roles, OU=OpenStack, DC=EXAMPLE,DC=COM 13
14 Configuring and Installing Piston OpenStack Configuring Piston OpenStack Edit the cloud.conf file on your Piston CloudKey so that it is configured to use Active Directory. Appendix B: Example LDAP Configuration on page 36 contains a sample section, though the structure will be different in your environment. Table 2: LDAP Configuration Properties on page 14 describes the properties and what to set them to; some values are unique to your environment and were recorded in Table 1: Environment-Specific LDAP Properties on page 10. Do the following: 1. In the [auth] section set the type property to the value ldap: type=ldap 2. Set the properties in the [ldap_auth] section according to the recommendations made in Table 2: LDAP Configuration Properties on page 14: Table 2: LDAP Configuration Properties Property Description Value allow_self_signed_certs If you have created your own Secure Socket Layer (SSL) certificate using a program such as OpenSSL, set this property to True True If not, set this property to False 14
15 Property Description Value url Set this to the value planned for in Table 1: Environment- Specific LDAP Properties on page 10 ldap:// bind_dn bind_password suffix use_dumb_member Set this to the value planned for in Table 1: Environment- Specific LDAP Properties on page 10 Set this to the value planned for in Table 1: Environment- Specific LDAP Properties on page 10 Set this to the value planned for in Table 1: Environment- Specific LDAP Properties on page 10 The member attribute of the groupofnames object is required, making it impossible to have an empty group; if a group is empty, set this property to true to have a dummy member added CN=ldapadmin,CN=Users, DC=EXAMPLE,DC=COM DC=EXAMPLE,DC=COM True 15
16 Property Description Value dumb_member query_scope Set this to the value planned for in Table 1: Environment- Specific LDAP Properties on page 10 Set this to the value one to configure the LDAP query scope for only one level CN=dumbmember,CN=Users, DC=EXAMPLE,DC=COM one user_tree_dn user_objectclass Set this to the value sub to configure the LDAP query scope for a subtree Set this to the value planned for in Table 1: Environment- Specific LDAP Properties on page 10 Set this to the value planned for in Table 1: Environment- Specific LDAP Properties on page 10 CN=Users,DC=EXAMPLE, DC=COM organizationalperson user_id_attribute In this document users are of type organizationalperson Set this to the name of the attribute that uniquely identifies a user in the person object class cn 16
17 Property Description Value user_name_attribute user_mail_attribute user_enabled_attribute user_enabled_mask Set this to the name of the attribute that identifies the name of a user in the user object class Set this to the name of the attribute that identifies the address of a user in the user object class Set this to the name of the attribute in the user object class that identifies whether or not a user is disabled Set this to 2 to indicate the bit that the value stored in the LDAP server represents enabled as a bit on an integer rather than a boolean cn mail useraccountcontrol 2 A value of 0 indicates the mask is not used. user_enabled_default Set this to the value user_attribute_ignore Set this to a commadelimited list of attributes in the user object class to be ignored during update operations password,tenant_id, tenants 17
18 Property Description Value tenant_tree_dn tenant_objectclass tenant_id_attribute tenant_member_ attribute tenant_desc_attribute tenant_enabled_ attribute Set this to the value planned for in Table 1: Environment- Specific LDAP Properties on page 10 Set this to the object class that represents projects Set this to the name of the attribute that uniquely identifies a project in the project object class Set this to the name of the attribute that identifies the name of a project in the project object class Set this to the name of the attribute that describes a project in the project object class Set this to the name of the attribute that specifies if a project is enabled or not in the project object class OU=Projects, OU=OpenStack, DC=EXAMPLE,DC=COM groupofnames cn displayname description extensionname 18
19 Property Description Value tenant_attribute_ignore role_tree_dn role_objectclass role_id_attribute role_name_attribute role_member_attribute modify_users Set this to a commadelimited list of attributes in the project object class to be ignored during update operations Set this to the value planned for in Table 1: Environment- Specific LDAP Properties on page 10 Set this to the name of the object class that represents roles Set this to the name of the attribute that uniquely identifies a role in the role object class Set this to the name of the attribute that identifies the name of the attribute that will be displayed in Dashboard Set this to the name of the attribute that identifies the membership of the users that occupy the role Set this to the value true OU=Roles,OU=OpenStack, DC=EXAMPLE,DC=COM organizationalrole cn displayname roleoccupant True 19
20 Property Description Value modify_tenants modify_roles Set this to the value true Set this to the value true True True 3. Save and close the file. Installing Piston OpenStack Make sure that all of the nodes and switches in your environment are powered off, then insert the CloudKey into your Arista switch or your boot node and power them on. The CloudBoot process begins and should take between 10 and 20 minutes, depending on the number of nodes in your cloud. 20
21 Creating Objects in Active Directory Have the Active Directory administrator use the Active Directory Users and Computers interface to create users for your Piston OpenStack, and use ADSI Edit to create projects and roles. If you are performing an installation of Piston OpenStack and are not familiar with the Active Directory tools, perform the instructions in the following sections: Creating Users in Active Directory on page 21 Creating Piston OpenStack Objects in ADSI Edit on page 22 Note that this document should not be used as an authoritative resource on creating objects in Active Directory; see the Microsoft Active Directory documentation. Creating Users in Active Directory Use the Active Directory Users and Computers interface to create users for your Piston OpenStack. Do the following: 1. Select the user container in the console tree that equates to the value you specified for the user_ tree_dn configuration parameter, such as the default Users container. 2. Do the following to create a user as a project member: A. Select Action > New > User from the menu bar. B. Type a value in the Full name field. C. Type a value in the User logon name field. D. Click Next. E. Type a value in the Password field. F. Type the same value in the Confirm password field. G. Click the User must change password at next logon checkbox to disable it. H. Click Next. I. Click Finish. 21
22 3. Select the users container again, then repeat the actions performed in step 2 to create a user that will have administrative privileges. Creating Piston OpenStack Objects in ADSI Edit Next use the ADSI Editor to create the necessary objects. Appendix A: Example LDAP Objects on page 33 contains a sample LDIF of these objects, though the structure will be different in your environment. You will create an organizationalunit object to contain all your OpenStack objects, as well as organizationalunit objects for your OpenStack projects and roles. You will also create organizationalrole objects to represent the roles of administrator and basic project member, specifying values for their cn and displayname attributes, and setting their roleoccupant attribute to the distinguishedname of the appropriate user in your Active Directory Users container. And you will create groupofnames objects for projects and roles in their respective organizationalunit objects. Do the following: 1. In ADSI Editor, select ADSI Edit. 2. Select Action > Connect to from the menu bar. 3. Make sure the Select a well known Naming Context radio button is enabled, then select Default naming context from the drop-down menu. 4. Click OK. 5. Expand Default naming context. 6. Expand the folder for the domaindns object. 7. Do the following to create an organizationalunit object to contain the organizational units for projects and roles: A. Select the folder for the domaindns object B. Select Action > New > Object from the menu bar. C. Select organizationalunit in the Select a class list, then click Next. D. At the ou attribute dialog, type a name for the organizational unit in the Value field, then click Next. E. Click Finish. 22
23 F. Confirm that the object appears as in Figure 2: OU=OpenStack Properties on page 23. Figure 2: OU=OpenStack Properties 8. Do the following to create an organizationalunit object named Roles that belongs to the OpenStack organizational unit: A. Select the OpenStack object created in step 7. B. Repeat the instructions in step 7 to create another organizationalunit object; specify Roles for the value of the ou attribute. C. Confirm that the object appears as in Figure 6: OU=Projects Properties on page
24 Figure 3: OU=Roles Properties 9. Do the following to create an organizationalrole object named Role_admin that belongs to the Roles organizational unit: A. Select the Roles organizational unit created in step 8. B. Select Action > New > Object from the menu bar. C. Select organizationalrole in the Select a class list, then click Next. D. At the cn attribute dialog, type Role_admin in the Value field, then click Next. E. Click Finish. F. Select the Role_admin organizational role, then select Action > Properties from the menu bar. G. Select the displayname attribute, then click Edit. H. Type admin in the Value field, click Add, then click OK. 24
25 I. In Active Directory Users and Computers, select the user account that has administrative privileges. J. Select Action > Properties from the menu bar. K. Select the Attribute Editor tab. L. Select the distinguishedname attribute, then click View. M. Copy the value in the Value field. N. Click OK, then click OK again. O. In ADSI Edit, select the roleoccupant attribute, then click Edit. P. Paste the copied distinguished name in the Value to add field, then click Add. Q. Click OK, then click OK again. R. Confirm that the object appears as in Figure 4: CN=Role_admin Properties on page 25. Figure 4: CN=Role_admin Properties 25
26 10. Repeat the actions performed in step 9 on page 24 to create a basic project member, with the following distinctions: -- At the cn attribute dialog, specify Role_member in the Value field -- Set the displayname attribute to the value _member_ -- Set the roleoccupant attribute to the distinguished name of the non-administrative user 11. Confirm that the object appears as in Figure 5: CN=Role_member Properties on page 26. Figure 5: CN=Role_member Properties 12. Do the following to create an organizationalunit object named Projects that belongs to the OpenStack organizational unit: A. Select the OpenStack object created in step 7. B. Repeat the instructions in step 7 to create another organizationalunit object; specify Projects for the value of the ou attribute. 26
27 C. Confirm that the object appears as in Figure 6: OU=Projects Properties on page 27. Figure 6: OU=Projects Properties 13. Do the following to create a groupofnames object named Project_admin that belongs to the Projects organizational unit: A. Select the Projects organizational unit you created in step 10. B. Select Action > New > Object from the menu bar. C. Select groupofnames in the Select a class list, then click Next. D. At the cn attribute dialog, type Project_admin in the Value field, then click Next. E. At the member attribute dialog, type the distinguished name of the administrative user in the Value field. F. Click Next. G. Click Finish. 27
28 H. Confirm that the object appears as in Figure 7: CN=Project_admin Properties on page 28. Figure 7: CN=Project_admin Properties 14. Do the following to create an organizationalrole object named Role_admin belonging to the Project_admin group of names object: A. Select the Project_admin group of names object created in step 13. B. Select Action > New > Object from the menu bar. C. Select organizationalrole in the Select a class list, then click Next. D. At the cn attribute dialog, type Role_admin in the Value field, then click Next. E. Click Finish. 28
29 F. Select the Role_admin organizational role, then select Action > Properties from the menu bar. G. Select the displayname attribute, then click Edit. H. Type admin in the Value to add field, then click Add. I. Select the roleoccupant attribute, then click Edit. J. Type the distinguished name of the administrative user in the Value to add field, then click Add. K. Confirm that the object appears as in Figure 8: CN=Role_admin Properties on page 29. Figure 8: CN=Role_admin Properties L. Click OK, then click OK again. 15. Repeat the actions performed in step 13 on page 27 to create a groupofnames object for non-administrative members, with the following distinctions: 29
30 -- At the cn attribute dialog, specify Project_x in the Value field -- Set the displayname attribute to a value such as x -- At the member attribute dialog, type the distinguished name of the non-administrative user in the Value field 16. Confirm that the object appears as in Figure 9: CN=Project_x Properties on page 30. Figure 9: CN=Project_x Properties 17. Repeat the actions performed in step 14 on page 28 to create an organizationalrole object for non-administrative members: -- At the cn attribute dialog, specify Role_member in the Value field -- Set the displayname attribute to _member_ -- Set the roleoccupant attribute to the distinguished name of the non-administrative user 18. Confirm that the object appears as in Figure 10: CN=Role_member Properties on page
31 Figure 10: CN=Role_member Properties 31
32 Validating the Integration Do the following to validate that Piston OpenStack is successfully integrated with Active Directory: 1. In a web browser, navigate to the address of the Piston OpenStack dashboard. 2. Type the name of an Active Directory user in your Piston OpenStack organizational unit in the User Name field. 3. Type the password for the username in the Password field. 4. Click Sign In. Figure 11: Login Screen Dashboard displays the Overview tab. 32
33 Appendix A: Example LDAP Objects // LDAP User used for logging into/reading Active Directory via LDAP dn: CN=dumbmemberuser,CN=Users,DC=EXAMPLE,DC=COM objectclass: organizationalperson cn: dumbmemberuser name: dumbmemberuser mail: // Example Piston Admin user that will be used to log in to Dashboard dn: CN=pistonadmin,CN=Users,DC=EXAMPLE,DC=COM objectclass: organizationalperson cn: pistonadmin name: pistonadmin mail: // organizationalunit, organizationalrole, groupofnames structure dn: OU=OpenStack,DC=EXAMPLE,DC=COM objectclass: organizationalunit ou: OpenStack name: OpenStack dn: OU=Roles,OU=OpenStack,DC=EXAMPLE,DC=COM objectclass: organizationalunit ou: Roles name: Roles dn: CN=Role_admin,OU=Roles,OU=OpenStack,DC=EXAMPLE,DC=COM objectclass: organizationalrole cn: Role_admin roleoccupant: CN=pistonadmin,CN=Users,DC=EXAMPLE,DC=COM name: Role_admin displayname: admin 33
34 dn: CN=Role_member,OU=Roles,OU=OpenStack,DC=EXAMPLE,DC=COM objectclass: organizationalrole cn: Role_member roleoccupant: CN=user_X,CN=Users,DC=EXAMPLE,DC=COM name: member displayname: _member_ dn: OU=Projects,OU=OpenStack,DC=EXAMPLE,DC=COM objectclass: organizationalunit ou: Projects name: Projects dn: CN=Project_admin,OU=Projects,OU=OpenStack,DC=EXAMPLE,DC=COM objectclass: groupofnames cn: Project_admin member: CN=pistonadmin,CN=Users,DC=EXAMPLE,DC=COM name: Project_admin displayname: admin dn: CN=Role_admin,CN=Project_admin,OU=Projects,OU=OpenStack,DC=EXAMPLE,DC=COM objectclass: organizationalrole cn: Role_admin roleoccupant: CN=pistonadmin,CN=Users,DC=EXAMPLE,DC=COM name: Role_admin displayname: admin dn: CN=Project_x,OU=Projects,OU=OpenStack,DC=EXAMPLE,DC=COM objectclass: groupofnames cn: Project_x member: CN=user_X,CN=Users,DC=EXAMPLE,DC=COM name: Project_x displayname: x 34
35 dn: CN=Role_member,CN=Project_member,OU=Projects,OU=OpenStack,DC=EXAMPLE,DC=COM objectclass: organizationalrole cn: Role_member roleoccupant: CN=user_X,CN=Users,DC=EXAMPLE,DC=COM name: Role_member displayname: _member_ 35
36 Appendix B: Example LDAP Configuration [auth] type=ldap [ldap_auth] # Permit ldap server to have self signed cert allow_self_signed_certs = True # Url of ldap server url = ldap://nameoripaddressofldapserver # ldap server credentials bind_dn = CN=username,CN=Users,DC=EXAMPLE,DC=COM bind_password = password suffix = DC=EXAMPLE,DC=COM use_dumb_member = True dumb_member = CN=dumbmemberusername,CN=Users,DC=EXAMPLE,DC=COM user_tree_dn = CN=Users,DC=EXAMPLE,DC=COM user_objectclass = organizationalperson user_id_attribute = cn user_name_attribute = cn user_mail_attribute = mail user_enabled_attribute = useraccountcontrol user_enabled_mask = 2 user_enabled_default = 512 user_attribute_ignore = password,tenant_id,tenants tenant_tree_dn = ou=projects,ou=openstack,dc=example,dc=com tenant_objectclass = groupofnames tenant_id_attribute = cn tenant_member_attribute = member tenant_name_attribute = displayname tenant_desc_attribute = description tenant_enabled_attribute = extensionname 36
37 tenant_attribute_ignore = role_tree_dn = ou=roles,ou=openstack,dc=example,dc=com role_objectclass = organizationalrole role_id_attribute = cn role_name_attribute = displayname role_member_attribute = roleoccupant modify_users = True modify_tenants = True modify_roles = True 37
rackspace.com/cloud/private
TM rackspace.com/cloud/private Rackspace Private Cloud Active v 4.0 (2013-06-25) Copyright 2013 Rackspace All rights reserved. This document is intended to assist Rackspace Private Cloud customers in updating
More informationConfiguring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
More informationHow To Authenticate On An Xtma On A Pc Or Mac Or Ipad (For A Mac) On A Network With A Password Protected (For An Ipad) On An Ipa Or Ipa (For Mac) With A Log
WatchGuard Certified Training Fireware XTM Advanced Active Directory Authentication Courseware: Fireware XTM and WatchGuard System Manager v11.7 Revised: January 2013 Updated for: Fireware XTM v11.7 Disclaimer
More informationUpgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.
Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,
More informationManaging Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
More informationVMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationSonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
More informationTroubleshooting Active Directory Server
Proven Practice Troubleshooting Active Directory Server Product(s): IBM Cognos Series 7 Area of Interest: Security Troubleshooting Active Directory Server 2 Copyright Copyright 2008 Cognos ULC (formerly
More informationConfiguring and Using the TMM with LDAP / Active Directory
Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring
More informationLDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation
LDAP Implementation AP561x KVM Switches All content in this presentation is protected 2008 American Power Conversion Corporation LDAP Implementation Does not require LDAP Schema to be touched! Uses existing
More informationSample Configuration: Cisco UCS, LDAP and Active Directory
First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
More informationEntrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
More informationConfiguring idrac6 for Directory Services
Configuring idrac6 for Directory Services Instructions for Setting Up idrac6 with Active Directory, Novell, Fedora, OpenDS and OpenLDAP Directory Services. A Dell Technical White Paper Dell Product Group
More informationUsing LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
More informationField Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names
DataCove DT Active Directory Authentication In Active Directory (AD) authentication mode, the server uses NTLM v2 and LDAP protocols to authenticate users residing in Active Directory. The login procedure
More informationConfiguring Microsoft Active Directory for Integration with NextPage NXT 3 Access Control
Configuring Microsoft Active Directory for Integration with NextPage NXT 3 Access Control This document explains how to configure Microsoft Active Directory for integration with NXT 3 access control. Step
More informationSharePoint AD Information Sync Installation Instruction
SharePoint AD Information Sync Installation Instruction System Requirements Microsoft Windows SharePoint Services V3 or Microsoft Office SharePoint Server 2007. License management Click the trial link
More informationIntroduction... 1. Installing and Configuring the LDAP Server... 3. Configuring Yealink IP Phones... 30. Using LDAP Phonebook...
Introduction... 1 Installing and Configuring the LDAP Server... 3 OpenLDAP... 3 Installing the OpenLDAP Server... 3 Configuring the OpenLDAP Server... 4 Configuring the LDAPExploreTool2... 8 Microsoft
More informationNSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
More informationHow To Enable A Websphere To Communicate With Ssl On An Ipad From Aaya One X Portal 1.1.3 On A Pc Or Macbook Or Ipad (For Acedo) On A Network With A Password Protected (
Avaya one X Portal 1.1.3 Lightweight Directory Access Protocol (LDAP) over Secure Socket Layer (SSL) Configuration This document provides configuration steps for Avaya one X Portal s 1.1.3 communication
More informationChapter 3 Authenticating Users
Chapter 3 Authenticating Users Remote users connecting to the SSL VPN Concentrator must be authenticated before being allowed to access the network. The login window presented to the user requires three
More informationWebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
More informationIntegrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
More informationThe following gives an overview of LDAP from a user's perspective.
LDAP stands for Lightweight Directory Access Protocol, which is a client-server protocol for accessing a directory service. LDAP is a directory service protocol that runs over TCP/IP. The nitty-gritty
More informationUser Management Resource Administrator. Managing LDAP directory services with UMRA
User Management Resource Administrator Managing LDAP directory services with UMRA Copyright 2005, Tools4Ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted
More informationCA SiteMinder. Directory Configuration - OpenLDAP. r6.0 SP6
CA SiteMinder Directory Configuration - OpenLDAP r6.0 SP6 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationConfiguring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip
Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the
More informationVMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationSkyward LDAP Launch Kit Table of Contents
04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know
More informationSetting up LDAP settings for LiveCycle Workflow Business Activity Monitor
Adobe Enterprise & Developer Support Knowledge Article ID: c4715 bc Setting up LDAP settings for LiveCycle Workflow Business Activity Monitor In addition to manually creating users and user permissions,
More informationInstallation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
More informationHP Device Manager 4.7
Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...
More informationPRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE
PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are
More informationDeploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
More informationCustomer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview
Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the
More informationTool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
More informationUsing Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
More informationModule 1: Introduction to Active Directory Infrastructure
Module 1: Introduction to Active Directory Infrastructure Contents Overview 1 Lesson: The Architecture of Active Directory 2 Lesson: How Active Directory Works 10 Lesson: Examining Active Directory 19
More informationHow To Integrate An Ipm With Airwatch With Big Ip On A Server With A Network (F5) On A Network With A Pb (Fiv) On An Ip Server On A Cloud (Fv) On Your Computer Or Ip
F5 Networks, Inc. F5 Recommended Practices for BIG-IP and AirWatch MDM Integration Contents Introduction 4 Purpose 5 Requirements 6 Prerequisites 6 AirWatch 6 F5 BIG-IP 6 Network Topology 7 Big-IP Configuration
More informationModule 4: Implementing User, Group, and Computer Accounts
Module 4: Implementing User, Group, and Computer Accounts Contents Overview 1 Lesson: Introduction to Accounts 2 Lesson: Creating and Managing Multiple Accounts 8 Lesson: Implementing User Principal Name
More informationUltimus and Microsoft Active Directory
Ultimus and Microsoft Active Directory May 2004 Ultimus, Incorporated 15200 Weston Parkway, Suite 106 Cary, North Carolina 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: documents@ultimus.com
More informationStarTeam/CaliberRM LDAP QuickStart Manager 2009. Administration Guide
StarTeam/CaliberRM LDAP QuickStart Manager 2009 Administration Guide Borland Software Corporation 8310 N Capital of Texas Bldg 2, Ste 100 Austin, TX 78731 USA http://www.borland.com Borland Software Corporation
More informationBlackShield ID. QUICKStart Guide. Integrating Active Directory Lightweight Services
QUICKStart Guide Integrating Active Directory Lightweight Services 2010 CRYPTOCard Corp. All rights reserved. http://www.cryptocard.com Trademarks CRYPTOCard, CRYPTO Server, CRYPTO Web, CRYPTO Kit, CRYPTO
More informationActive Directory integration with CloudByte ElastiStor
Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level
More informationPriveonLabs Research. Cisco Security Agent Protection Series:
Cisco Security Agent Protection Series: Enabling LDAP for CSA Management Center SSO Authentication For CSA 5.2 Versions 5.2.0.245 and up Fred Parks Systems Consultant 3/25/2008 2008 Priveon, Inc. www.priveonlabs.com
More informationQuality Center LDAP Guide
Information Services Quality Assurance Quality Center LDAP Guide Version 1.0 Lightweight Directory Access Protocol( LDAP) authentication facilitates single sign on by synchronizing Quality Center (QC)
More informationHow To Install Ctera Agent On A Pc Or Macbook With Acedo (Windows) On A Macbook Or Macintosh (Windows Xp) On An Ubuntu 7.5.2 (Windows 7) On Pc Or Ipad
Deploying CTERA Agent via Microsoft Active Directory and Single Sign On Cloud Attached Storage September 2015 Version 5.0 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document
More information1 Introduction. Windows Server & Client and Active Directory. www.exacq.com
Windows Server & Client and Active Directory 1 Introduction For an organization using Active Directory (AD) for user management of information technology services, integrating exacqvision into the AD infrastructure
More informationADFS Integration Guidelines
ADFS Integration Guidelines Version 1.6 updated March 13 th 2014 Table of contents About This Guide 3 Requirements 3 Part 1 Configure Marcombox in the ADFS Environment 4 Part 2 Add Relying Party in ADFS
More informationModule 3: Implementing an Organizational Unit Structure
Module 3: Implementing an Organizational Unit Structure Contents Overview 1 Lesson: Creating and Managing Organizational Units 2 Lesson: Delegating Administrative Control of Organizational Units 13 Lesson
More informationLAB 1: Installing Active Directory Federation Services
LAB 1: Installing Active Directory Federation Services Contents Lab: Installing and Configuring Active Directory Federation Services... 2 Exercise 1: installing and configuring Active Directory Federation
More information800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410
800-782-3762 www.stbernard.com Active Directory 2008 Implementation Version 6.410 Contents 1 INTRODUCTION...2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION...3 2.1 Supported Deployment
More informationCreate, Link, or Edit a GPO with Active Directory Users and Computers
How to Edit Local Computer Policy Settings To edit the local computer policy settings, you must be a local computer administrator or a member of the Domain Admins or Enterprise Admins groups. 1. Add the
More informationUser Source and Authentication Reference
User Source and Authentication Reference ZENworks 11 www.novell.com/documentation Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
More informationSophos Mobile Control Super administrator guide. Product version: 3
Sophos Mobile Control Super administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...3 2 Super administrator accounts...4 3 The super administrator customer...5
More information523 Non-ThinManager Components
28 Non-ThinManager Components Microsoft Terminal Servers play an important role in the ThinManager system. It is recommended that you become familiar with the documentation provided by Microsoft about
More informationCisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
More informationStep-by-Step Guide to Active Directory Bulk Import and Export
Page 1 of 12 TechNet Home > Windows Server TechCenter > Identity and Directory Services > Active Directory > Step By Step Step-by-Step Guide to Active Directory Bulk Import and Export Published: September
More informationSonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
More informationDeploying ModusGate with Exchange Server. (Version 4.0+)
Deploying ModusGate with Exchange Server (Version 4.0+) Active Directory and LDAP: Overview... 3 ModusGate/Exchange Server Deployment Strategies... 4 Basic Requirements for ModusGate & Exchange Server
More informationWindows 2000 Active Directory Configuration Guide
Windows 2000 Active Directory Configuration Guide 24-4-2003 1 Windows 2000 Active Directory Configuration Guide Table of Contents Chapter 1 Introduction 2 1 About Metatude 2 2 About this manual 3 3 The
More informationUsing LDAP with Sentry Firmware and Sentry Power Manager (SPM)
Using LDAP with Sentry Firmware and Sentry Power Manager (SPM) Table of Contents Purpose LDAP Requirements Using LDAP with Sentry Firmware (GUI) Initiate a Sentry GUI Session Configuring LDAP for Active
More informationRoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
More informationManaging User Accounts
Managing User Accounts This chapter includes the following sections: Configuring Local Users, page 1 Active Directory, page 2 Viewing User Sessions, page 6 Configuring Local Users Before You Begin You
More informationKACE Appliance LDAP Reference Guide V1.4
KACE Appliance LDAP Reference Guide V1.4 Brandon Whitman Page 1 The purpose of this guide is to help you with both common and advanced LDAP issues related to the KACE appliances. This guide will give you
More informationPineApp Surf-SeCure Quick
PineApp Surf-SeCure Quick Installation Guide September 2010 WEB BASED INSTALLATION SURF-SECURE AS PROXY 1. Once logged in, set the appliance s clock: a. Click on the Edit link under Time-Zone section.
More informationCLEO NED Active Directory Integration. Version 1.2.0
CLEO NED Active Directory Integration Version 1.2.0 CLEO NED Active Directory Integration Manual v1.2.0 Copyright c 2010 Lancaster University Network Services Limited. All rights reserved. Microsoft, Windows,
More informationInstallation and Configuration Guide
Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
More informationAD Schema Update IPBrick iportalmais
AD Schema Update IPBrick iportalmais October 2006 2 Copyright c iportalmais All rights reserved. October 2006. The information in this document can be changed without further notice. The declarations,
More informationF-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
More informationAdeptia Suite LDAP Integration Guide
Adeptia Suite LDAP Integration Guide Version 6.2 Release Date February 24, 2015 343 West Erie, Suite 440 Chicago, IL 60654, USA Phone: (312) 229-1727 x111 Fax: (312) 229-1736 DOCUMENT INFORMATION Adeptia
More informationDESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
More informationIntroduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
More informationThe Windows Server 2003 Environment. Introduction. Computer Roles. Introduction to Administering Accounts and Resources. Lab 2
Islamic University of Gaza College of Engineering Computer Department Computer Networks Lab Introduction to Administering Accounts and Resources Prepared By: Eng.Ola M. Abd El-Latif Mar. /2010 0 :D Objectives
More informationXenDesktop Implementation Guide
Consulting Solutions WHITE PAPER Citrix XenDesktop XenDesktop Implementation Guide Pooled Desktops (Local and Remote) www.citrix.com Contents Contents... 2 Overview... 4 Initial Architecture... 5 Installation
More informationSCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION
SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION Table of content ScopTel with Active Directory... 3 Software Features... 3 Software Compatibility... 3 Requirements... 3 ScopTel Configuration... 4 Prerequisites...
More informationUnifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
More informationDashboard Admin Guide
MadCap Software Dashboard Admin Guide Pulse Copyright 2014 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document
More informationTechnical Bulletin 005 Revised 2010/12/10
sitesecuresoftware.com Site-Secure Facility & Security Management Software Technical Bulletin 005 Revised 2010/12/10 Search Active Directory from SQL Server 2000-2005 Table of Contents Introduction...
More informationECAT SWE Exchange Customer Administration Tool Web Interface User Guide Version 6.7
ECAT SWE Exchange Customer Administration Tool SWE - Exchange Customer Administration Tool (ECAT) Table of Contents About this Guide... 3 Audience and Purpose... 3 What is in this Guide?... 3 CA.mail Website...
More informationHow To Take Advantage Of Active Directory Support In Groupwise 2014
White Paper Collaboration Taking Advantage of Active Directory Support in GroupWise 2014 Flexibility and interoperability have always been hallmarks for Novell. That s why it should be no surprise that
More informationSafewhere*PasswordReset
Safewhere*PasswordReset User Guideline 1.0 Page 1 Safewhere*PasswordReset Contents Safewhere*PasswordReset... 2 1. System Requirements... 3 2. Introduction... 3 3. Glossary... 3 4. PasswordReset installer...
More informationUsing LDAP for User Authentication
Using LDAP for User Authentication Product version: 4.50 Document version: 1.1 Document creation date: 03-06-05 Purpose This technical note describes how to configure and set up EPiServer to use an LDAP
More informationHow To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
More informationNAS 206 Using NAS with Windows Active Directory
NAS 206 Using NAS with Windows Active Directory Connect your NAS to a Windows Active Directory domain A S U S T O R C O L L E G E COURSE OBJECTIVES Upon completion of this course you should be able to:
More informationModular Messaging. Release 3.0 / 3.1. Diminished Permissions for Exchange.
Modular Messaging Release 3.0 / 3.1 Diminished Permissions for Exchange. Issue 1 March 2007 2006-2007 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information
More informationActive Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 Mar 2014 Copyright 2014 CionSystems Inc., All Rights Reserved Page 1 2014 CionSystems Inc. ALL RIGHTS RESERVED. This guide may not
More informationEnterprise Apple Xserve Wiki and Blog using Active Directory. Table Of Contents. Prerequisites 1. Introduction 1
Table Of Contents Prerequisites 1 Introduction 1 Making the Xserve an Open Directory Master 2 Binding the Xserve to Active Directory 3 Creating a Certificate 3 Setting up Apache Web Server 4 Applying the
More informationSynchronizer Installation
Synchronizer Installation Synchronizer Installation Synchronizer Installation This document provides instructions for installing Synchronizer. Synchronizer performs all the administrative tasks for XenClient
More informationContent Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
More informationLepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
More informationXenClient Enterprise Synchronizer Installation Guide
XenClient Enterprise Synchronizer Installation Guide Version 5.1.0 March 26, 2014 Table of Contents About this Guide...3 Hardware, Software and Browser Requirements...3 BIOS Settings...4 Adding Hyper-V
More informationInstalling Samsung SDS CellWe EMM cloud connectors and administrator consoles
Appendix 1 Installing Samsung SDS CellWe EMM cloud connectors and administrator consoles This section explains how you use the Cloud Management Suite installation wizard for the following purposes: To
More informationConfiguring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
More informationSecurity Assertion Markup Language (SAML) Site Manager Setup
Security Assertion Markup Language (SAML) Site Manager Setup Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and
More informationConfiguring Controller 8.2 to use Active Directory authentication
Proven Practice Configuring Controller 8.2 to use Active Directory authentication Product(s): Controller 8.2 Area of Interest: Infrastructure Configuring Controller 8.2 to use Active Directory authentication
More informationManaging User Accounts
Managing User Accounts This chapter includes the following sections: Active Directory, page 1 Configuring Local Users, page 3 Viewing User Sessions, page 5 Active Directory Active Directory is a technology
More informationHOTPin Integration Guide: DirectAccess
1 HOTPin Integration Guide: DirectAccess Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; Celestix assumes no responsibility
More informationAD RMS Step-by-Step Guide
AD RMS Step-by-Step Guide Microsoft Corporation Published: March 2008 Author: Brian Lich Editor: Carolyn Eller Abstract This step-by-step guide provides instructions for setting up a test environment to
More information