KMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon
|
|
|
- Walter Wood
- 10 years ago
- Views:
Transcription
1 KMx Enterprise: Integration Overview for Member Account Synchronization and Single Signon KMx Enterprise includes two api s for integrating user accounts with an external directory of employee or other user information and to allow Kmx to participate in a singlesignon authentication installation within an enterprise environment. SOAP User Import API: The insert, update, and deactivation or deletion of user accounts is accomplished via the SOAP protocol which exposes a method for posting a batch of user records at a time. The batch consists of a single xml payload, posted as a string parameter to the SOAP method call with instructions and information to act on the associated user records. SOAP UserImport API includes the WSDL discovery language so that developer tool kits can quickly generate and implement the appropriate method calls. The api is usually located on a server with KMx installed at The schema defining the xml to be passed to the userimport method can be located on a server with KMx installed at Flat File User Import: Customers wishing to submit a flat text file to KMx instead of using the SOAP API for user import and synchronization may instead submit a file via ftp to a location specified by KMSI. A windows service will pickup the file and process it for import. The flat file format specification is documented in Appendix 2 of this overview. Single Signon API (SSO): The Single Signon API or SSO uses the HTTP GET protocol to pass a user token, an organization token, a timestamp and a hash code to the api. This allows for a user to authenticate against a portal, or via an LDAP directory in an intranet, or some other vehicle external to KMx then have their browser session directed to KMx already authenticated without being challenged again for a username and password. The SSO API is typically located on the KMx server at A description of how the hash code is calculated to insure that the request was authenticated on the trusted server (LDAP, portal, etc) is included in Appendix A of this document. Separate API s: These two functions are separated to offer KMSI customers the most flexible options available to when planning their deployment and integration strategies. Here are three common scenarios: 1) Batch calls to UserImport with no SSO implementation. A batch process synchronizes user accounts in KMx with an authoritative source such an HRIS system, but users still access KMx via the native KMx authentication interface, and are challenge for a username and password, each time they log in. 2) Run time calls to UserImport then SSO. This scenario works well for integrating KMx with a consumer facing portal. A user logs in to the portal, requests a resource on the Kmx platform, and this immediately initiates a call both api s
2 UserImport first, the SSO. The user account is either created or updated in kmx and then the user is immediately re-directed via SSO to KMx to begin his learning activity. It should be noted that this scenario never deactivates a user account in kmx. It relies on user action to cause an update, and when the user stops using the portal, no further action occurs to cause any further change. This usually isn t a problem in a consumer facing scenario, but can be in an enterprise environment where the training materials are proprietary and continued access by terminated employees represents a security threat or is otherwise undesirable. 3) Batch UserImport for account creation and SSO for authentication In an enterprise where user profile data may be split among many systems, a batch process can periodically query these systems (usually once per day) and compile a profile for KMx then call the UserIMport api to update the appropriate profile(s). Such implementations should be sensitive to recognizing accounts that should be deactivated in KMx and include periodic instructions for this as well (ie include terminated in employees in the batch with instructions to delete their accounts, or write a separate batch to address this need.). Such an enterprise may also have an LDAP directory or other common authentication scheme and wish to use this to provide improved security and convenience to employees. In this scenario, the SSO event may still include a call to update the affected users profile if desired. Example Application KMSI has developed a sample web application that demonstrates the implementation of calls to both API s. It is written in Microsoft ASP.net and VB.net v1.1. It assumes that the trusted source for both of account profile data to pass to the UserImport API and for authentication is Microsoft Active Directory and that the KMx web server is deployed where it has access to the same AD domain(s) as those used to authenticate the users. It is intended as an example only. Error trapping, logging and other production ready elements of a robust application have been omitted in the interests of keeping the sample code as concise as possible. The source code will be made available free of charge to customers to who have a valid KMx Enterprise license and elements of the example may be incorporated in to the final integration at the sole discretion and risk of the customer. The example uses a single web page authenticated under AD to query the AD for user profile details, initiate a batch update of that one user s account, then redirect the user s browser to the SSO api. The example call to the UserImport API should be instructive even to those planning batch update implementations as it includes classes to compile the xml payload that this api requires regardless of the operating context of the client application calling the api. Major elements of the example application:
3 There are two web pages included with the sample application: ShowLoggedInUser.aspx will simply display the first name, last name, full name, , objectguid, and phone number, username, and a recommended password for use with kmx, for the logged in user as authenticated under AD. It is instructive for testing and use of ActiveDirectoryUser class, but should not be incorporated in to any final deployment as it exposes information that might constitute a violation of local security policies. KMxSignonWithAD.aspx This is the actual application sample. It queries the ActiveDirectoryUser Class to get profile details about the logged in user, calls the UserIMport api to update the profile, then redirects the user s browser to the SSO api. Web.config stores authentication and location parameters necessary to complete the api calls. Web Reference/KMxSoapAPI this class was built with Microsoft Visual Studio code generation wizard from the WSDL for the UserImport api and includes the methods to actually invoke the API. ActiveDirectoryUser.vb Class File Provides a very simple set of methods and properties to model a simple user profile from an active directory user account. This class could be extended to query other data sources and compile a comprehensive profile for your integration. CryptoGraphicUtilities.vb Class File Provides utility methods for calculating the MD5 hash code required by the SSO api. KMxUserImportPackager.vb Class File provides methods to compile the xml required by the UserImport API. DocumentsAndReferences Directory Contains a copy of this summary document, a data dictionary for the elements of the xml payload to be compiled in to the UserImport API, and a copy of the XSD schema file KMx uses to validate the UserImport data prior to processing. Data Dictionary The spreadsheet KMxMember Data Dictionary.xls summarizes all of the elements in the member profile that can potentially be imported. It includes a definition for each field, a summary of the data format and value restrictions, and it s multiplicity value, indicating if it is required, optional or how many times it may occur. Most fields are self explanatory however, the directory_services_id and supervisor_directory_services_id merit additional discussion here. directory_services_id This is the foreign key that uniquely identifies an individual within your organization. It must be unique for each person in your
4 organization and should not be expected to change over time. A value like an employee id assigned by an HRIS system or a Global Unique Identifier (GUID) assigned by a Microsoft Active Directory implementation or other unique value is a good choice. Last names, addresses, full or partial social security numbers, or some combination of these tend to be less desirable as they do periodically change over time. supervisor_directory_services_id this field represents the directory_services_id of the individual s immediate supervisor. It must be selected and defined the same way the directory_services_id above is defined, but the value provided will represent the individual s immediate supervisor rather than the individual himself. Providing this information is optional. Doing so allows for reports to be generated that model reporting structures and organizational spans of control. Without, such reporting and analysis will not be possible. It should be provided only if it is being drawn for an application or database such as an HRIS where the information is being regularly maintained so that it is current and accurate.
5 Appendix 1: KMx Enterprise - MD5 Hash Pass-through Authentication Overview What is MD5 hash? MD5 hash is a one-way function that takes bytes as input and output bytes that represent a fingerprint of the input. What does MD5 hash accomplish for our authentication? It ensures that only your website (portal, intranet, etc) can send requests to authenticate a user to the KMx Platform. A user could not type the URL into the browser and be successfully authenticated into the external vendor s website. How does MD5 hash work? The input of the MD5 hash function will be the concatenated string of parameter values you are passing to the KMx Platform plus a Shared Secret. The output of the function will be the hash value (digest) that you will pass to the KMx Platform as an additional parameter. What prevents a user from reusing the same URL? One of the parameters that will be included in the hash input string is a timestamp. This allows the KMx Platform to disregard any requests with timestamps older than a certain time (eg. 5 minutes) How is MD5 hash implemented? Many programming environments include an MD5 hash function in their standard libraries. Other languages have extensions that support MD5 hash. To help in your research of MD5 hash on your platform, consider visiting the following sites. General Info: Cold Fusion: Active Server Pages:
6 JavaScript Requirements A mechanism for passing an authenticated user from a generic portal or other authenticated website to the KMx platform in a safe and secure manor: The website must be authenticated. The message must be authenticated to verify the origin of the message. The website must be secure. No unauthorized parties should be able to access the user information. The website must be resistant to a relay attack. No unauthorized parties should be able to relay the user information to gain access. The website must be expandable. The message must be able to carry arbitrary data. Terms Source Site the site that produces the message. Destination Site the site that receives and processes the message. (The KMx Platform in this case). Message the data that is passed between the source site and the destination site, including raw data and the digest. Raw the original data enclosed in the message. Digest The output of the MD5 hash algorithm Shared Secret A phrase agreed upon by the source and destination that is not transmitted with the message. Authentication The destination site must authenticate the message from the source site. This specification requires the following algorithm based on keyed MD5 hash authentication. The source site and destination site will agree on a secret phrase. The source site assembles the raw data that needs to be passed. The source site appends the secret phrase to the raw data and produces the digest using MD5 hashing algorithm. The source site produces the message with the original data and the digest, but without the secret phrase. The source site sends the message to the destination site. When the destination site receives the message, it extracts the raw data and digest from the message.
7 The destination site appends the secret phrase to the raw data and produces the digest using MD5 hashing algorithm. The resulted digest is compared with the digest in the message. If they are the same, then the message is authenticated. The destination site processes the raw data. Secure Transport When the user clicks the link to the destination site, the browser will be redirected to the destination site URL with the message passed as a query string. The name is data and the value is the message properly encoded. For example: The transport protocol must be secure to protect the data. It is recommended to use HTTPS protocol, or any other secure transport protocol. Message Format The message will be transmitted using HTTP request parameters. The raw data (the input of the MD5 hash function) will be a concatenated string of the values of the request parameters plus a shared secret. The name of the parameters will not be included in the raw data. Parameters Descriptive name HTTP parameter name Description Max Length Concatenation order Profile ID profileid The source site profile identifier 40 1 string for the user. This must be a unique ID and must be the same ID used as directory_services_id when synchronizing user Accounts via the KMx SOAP API (see KMx SOAP for details). Time Stamp timestamp The time stamp is a long integer number of the millisecond from the year 1970 (epoch time) N/A 2 MD5 Hash hash The digest that results from running the MD5 hash function over a concatenated string of the above parameters plus the shared secret. Please see below note regarding MD5 hash format. Access Key Accesskey Integer value assigned by KMx. Necessary to distinguish between N/A N/A N/A N/A
8 multiple organizational accounts on KMx ASP. KMSI will assist with assigning the specific value MD5 Hash: The input value of the MD5 hash algorithm is computed by concatenating the parameter values. The concatenation order column specifies the order of concatenation. The shared secret must be concatenated to the end of the parameter values before calling the function. Typically MD5 hash algorithms output binary data. Since this output does not conform to legal HTTP request parameters characters sets, the MD5 Hash binary output should be encoded as an ASCII string. The simplest encoding is hexadecimal encoding. Another encoding type is Base64, if deemed necessary. Some implementations of the MD5 algorithms return ASCII data rather than binary data; in this case, the implicit encoding type must be discovered so the destination site can use the same encoding for the comparison. (In other words, implementations that return a string value, implicitly encode the return value in Hex or Base64). Example: Profile ID: Date: Wed Aug 18 12:44:58 EDT 2004 Timestamp: Shared Secret: g9ymzvwk 01×tamp= &hash=b895b2f8f0ca021d15fe1b1226dee5e3&accesske y=37
9 Appendix 2 Flat file specification. Customers wishing to take advantage of the user import api of KMx, but who do not whish to compile input data as XML, may alternatively use this file specification to prepare a text file and submit it to KMx via ftp. The KMx background service will then convert the file to xml for submission to the SOAP api. Separator Characters: Record Separator: Each row of the text file will be assumed to represent one record. Rows shall be separated by a carriage return/line feed pair (ascii characters 13 and 10 respectively). Field Separator: The vertical line character, sometimes referred to as the pipe character (ascii value 124) will be used as a field separator between fields within a record. First Row: Authentication Record The first row of the text file will contain the authentication record. The authentication record consists of 3 fields and represents the user credentials of the system administrator under whose profile the import will be processed. Field 1 username: this is the username of a KMx system administrator under whose permission the import is processed. In most cases it is desirable to create a user account in KMx with System Administrator privileges specifically for this purpose rather than using the same account as an actual administrator. This field is required and must appear exactly once in the authentication record. Data type: string with minimum length = 1 and maximum length = 50. Field 2 password: this is the password of the same KMx system administrator represented by the username above. This field is required and must appear exactly once in the authentication record. Data Type: string with minimum length = 1 and maximum length = 50 Field 3 access key: this value will be provided by KMSI and is used to segregate which customer organization the file represents among customer s of KMSI s hosted service. This field is required and must appear exactly once in the authentication record. Data Type: integer. Second and Subsequent Rows: Batch Member Record After the authentication record, each subsequent row is assumed to represent one member (user) record.
10 The member record for a flat text file shall consist of 47 fields as defined in the attached data dictionary. The fields must appear in the order listed in the data dictionary and with the value restrictions indicated in the data dictionary. Blank Values vs. No Value Submitted Of the 40 fields defined in the data dictionary only two have a multiplicity of Exactly 1 meaning they must be specified in the record submitted. These are the command to execute upon the record, and the directory_services_id of the record to operate on. All others are optional. In the XML syntax native to KMx, an optional value may be omitted by simply not listing it in the record. When a value is omitted, it is handled by KMx according to one of two rules: On Insert the KMx default value for this field is applied. On Update the current value for this field is left in tact, regardless of how this value was set (previous import, update by an administrator, update by the user, etc.). If it is intended that instead the XML explicitly set the value in question to a blank string (where permitted by data type) then the optional field is included in the record with the blank value explicitly set. Since a flat file requires every field in the record to be included every time and the field cannot be simply omitted, KMx has established a special value to distinguish between these cases for a flat file import. The value NoValueSubmitted (case sensitive, do not include quotes) may be used for any field in the data dictionary that is listed for multiplicity 0 or 1. It may be submitted regardless of data type to indicate that the optional field is not addressed by the input file and should instead be addressed by KMx according to the same rules as an XML input with the field in question omitted, that is: On Insert the KMx default value for this field is applied. On Update the current value for this field is left in tact, regardless of how this value was set (previous import, update by an administrator, update by the user, etc.). To explicitly set a string value to a blank string (where permitted by data type) customers may submit the field with no data between the separators. A sample flat file is included with the KMx sample integration application.
11 Appendix 3 - Implementing Organizational Hierarchy in KMx Enterprise v3.3 Definitions For purposes of this appendix document the following definitions apply. Organization The superior most organizational unit recognized by KMx. It is modeled by the organization table in the KMx data system and all objects in the KMx system schema are subordinate to it. Company a sub unit of people within an organization, such as a department, division, subsidiary, team, etc. Companies may be defined to be subordinate to one another. Concept of Operations - KMx Enterprise v3.3 will include the ability for enterprise customers to model their organizational hierarchy and structure within the members table holding the user accounts. This will be accomplished by adding a metadata field to each member record called member_company_mask. This field will represent the company to which a member belongs. It will be structured in such a way that it also represents that company s position in the overall organization hierarchy. This extends the current ability of KMx to group members by company and to include any companies subordinate to a particular company. Customers who choose to populate and maintain this structure will in turn be able to group reports according to the company hierarchy and delegate some administrative tasks with access privileges grouped according the same hierarchy. Mask structure the member_company_mask (or simply the mask ) will be constructed by as follows. Every company to be tracked in this manner is assigned its own alphanumeric designator by the customer. This can be any convenient designation desired such as an organizational number assigned by an HRIS system. An individual s mask is the concatenated value from right to left of all company designators for companies superior to his own, plus his own company designator, followed by wild cards to pad the mask to a consistent length for all members. The most superior organizational company, usually the CEO s office, is assumed to be the head of the organization and needs no company designator in the mask. The CEO and his executive staff can be assigned a mask that is simply a string of the wildcard padded to the consistent length for all of the organization s masks. (Please note that this default mask for the CEO will still require its own company record. See the implementation section for more details.) For example, if the World Wide Broadcast Monopoly consists of three divisions, NBC, ABC and CBS, and each division president has multiple department managers reporting
12 to him, who in turn have multiple team leaders reporting to them. This hierarchy can be modeled with a 9 character mask as follows. CEO: CEO s admin assistant NBC Division President NBC Pres admin assistant: Dept Mgr 005 at NBC Dept 005 Members at NBC Team leader 115 at Dept 005 at NBC Team 115 members mask: (9 wildcard characters) mask: (9 wildcard characters) mask: NBC mask: NBC mask: NBC005 mask: NBC005 mask: NBC mask: NBC005115
13 Figure 1 illustrates this example more completely.
14 The following guidelines should be followed when planning the structure and implementation of the mask: 1) Determine the maximum number of tiers of management in the organization. Allocate a fixed number of characters at each tier. Lower tiers, where there are usually more organizational units, may need more characters than upper tiers. 2) The sum of the number of characters allocated at each tier is the fixed length of the mask for all members. Max length 50 characters. 3) The top tier, typically the CEO s office, does not need its own designation and need not consume any characters in the mask. Instead, members of the CEO s office receive a mask that is all wildcard characters. 4) Designators for each management unit may be any alphanumeric string. Any convenient designator such as an organizational id code assigned by an HRIS or similar system may be appropriate. 5) Any manager s mask, at any level, is the concatenated string, from left to right, of his superiors designators, plus his own designator, then padded to the right with wildcard characters. 6) Individual contributors who report to that manager inherit the same mask as the manager. A subordinate supervisor or manager within a manager s span of control requires his own designator for himself and his team members. 7) ALL MASKS FOR THE ENTIRE ORGANIZATION MUST BE THE SAME LENGTH. 8) THE UNDERLINE CHARACTER (ASCII CHARACTER 95) MUST BE USED AS THE WILDCARD TO RIGHT PAD ALL MASKS TO THE DEFINED LENGTH 9) Once the mask pattern is defined, be sure to register all possible mask values as company records in the company table of KMx. This includes a company record for the CEO s mask (all wild cards). This is necessary to support administrative filtering of members and other KMx objects according to the organizational hierarchy in KMx v3.3 and future releases. Implementation Goals - This approach is implemented with the following goals in mind:
15 1) Functionality - To deliver to KMx customers the functionality necessary to administer and report on a members training and learning activity according to the organization hierarchy. 2) Flexibility This approach can be used to model any organizational structure and to maintain that structure with information provided from any number of information sources external to KMx such as SAP, Lawson, Peoplesoft, Oracle HR, or other source of organizational information a customer may select for integration. 3) Performance The mask structure is consistent with KMx s high performance and scalability architecture. It pre-indexes the hierarchy and avoids the need for recursive logic to compile reports or calculate admin access privileges at run time. Implementation Database Schema - KMx v3.3 will extend the database schema as follows to support this new functionality: New Field: members.member_company_mask nvarchar(50) New Field: company.company_mask nvarchar(50) SOAP API The SOAP API for KMx v3.3 will be extended to expose member_company_mask as part of the member profile. This will provide KMx customers the ability to maintain the mask value for individual members. KMx Admin Interface The KMx administrative interface will be extended to expose the company.company_mask field. Optionally customers may also expose the members.member_company_mask field if they wish to access this field directly. This may be quite useful during testing of a new integration. However, customers are cautioned to consider whether those with Personnel Admin rights to KMx should be editing this field manually once in production. The default configuration of KMx v3.3 will not expose members.member_company_mask to the admin interface. Company Table Once the mask pattern is determined and all possible mask values are calculated, they should be registered in the company table of KMx via the administrative interface as follows: Administer Personnel Insert New Company. During initial set up, it may be desirable to have a qualified database administrator load the list of possible values directly to the company table. Be sure to populate the company_name and company_mask fields. Other contact fields about the company are optional. Pricing related fields in the company table represent deprecated functionality and are supported for backward compatibility with earlier versions of KMx only. As new companies are created within the organization or if the organization is restructured, the company table must be updated accordingly.
16 Company Administrators menu - Company administrators access their administrative rights through the student interface. This capability was first introduced in KMx v3.0 and will continue in v3.3 and beyond. Those designated as company administrators (designated by member_auth = 10) who currently have access to only those members directly assigned to the same company, will now inherit the same access to all subordinate companies in addition to their own. Any member of the company can be designated a company administrator by setting member_auth = 10 via the SOAP api, or by using the Review Member Authorization Level dialog in the KMx System Administration menu.
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
There are more security levels in ARCHIBUS, as described bellow.
Glossary: VPA = Virtual Private ARCHIBUS restriction SSO = Single Sign-On LDAP = Lightweight Directory Access Protocol WebCentral = ARCHIBUS Core Engine IIS = Internet Information Services (IIS, formerly
Copyright: WhosOnLocation Limited
How SSO Works in WhosOnLocation About Single Sign-on By default, your administrators and users are authenticated and logged in using WhosOnLocation s user authentication. You can however bypass this and
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard. Architectural Implementation, Patterns and Usage Guidelines
Ameritas Single Sign-On (SSO) and Enterprise SAML Standard Architectural Implementation, Patterns and Usage Guidelines 1 Background and Overview... 3 Scope... 3 Glossary of Terms... 4 Architecture Components...
Jet Data Manager 2012 User Guide
Jet Data Manager 2012 User Guide Welcome This documentation provides descriptions of the concepts and features of the Jet Data Manager and how to use with them. With the Jet Data Manager you can transform
Forumbee Single Sign- On
Forumbee Single Sign- On What is Single Sign- On? In basic terms, Single Sign- On (SSO) allows users of your web site to log into your Forumbee community automatically, without needing to sign up and create
CA Nimsoft Service Desk
CA Nimsoft Service Desk Single Sign-On Configuration Guide 6.2.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
IBM SPSS Collaboration and Deployment Services Version 6 Release 0. Single Sign-On Services Developer's Guide
IBM SPSS Collaboration and Deployment Services Version 6 Release 0 Single Sign-On Services Developer's Guide Note Before using this information and the product it supports, read the information in Notices
Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...
Post Installation Guide for Primavera Contract Management 14.1 July 2014 Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...
Building Secure Applications. James Tedrick
Building Secure Applications James Tedrick What We re Covering Today: Accessing ArcGIS Resources ArcGIS Web App Topics covered: Using Token endpoints Using OAuth/SAML User login App login Portal ArcGIS
Forumbee Single Sign- On
Forumbee Single Sign- On What is Single Sign- On? In basic terms, Single Sign- On (SSO) allows users of your web site to log into your Forumbee community automatically, without needing to sign up and create
Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
Bentley CONNECT Dynamic Rights Management Service
v1.0 Implementation Guide Last Updated: March 20, 2013 Table of Contents Notices...5 Chapter 1: Introduction to Management Service...7 Chapter 2: Configuring Bentley Dynamic Rights...9 Adding Role Services
Denodo Data Virtualization Security Architecture & Protocols
Denodo Data Virtualization Security Architecture & Protocols XLS Security Architecture & Protocols We include hereinafter a description of the security support in the Denodo Platform. The following diagram
Tenrox. Single Sign-On (SSO) Setup Guide. January, 2012. 2012 Tenrox. All rights reserved.
Tenrox Single Sign-On (SSO) Setup Guide January, 2012 2012 Tenrox. All rights reserved. About this Guide This guide provides a high-level technical overview of the Tenrox Single Sign-On (SSO) architecture,
OpenLDAP Oracle Enterprise Gateway Integration Guide
An Oracle White Paper June 2011 OpenLDAP Oracle Enterprise Gateway Integration Guide 1 / 29 Disclaimer The following is intended to outline our general product direction. It is intended for information
Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online
Single Sign-On Guide for Blackbaud NetCommunity and The Patron Edge Online 062212 2012 Blackbaud, Inc. This publication, or any part thereof, may not be reproduced or transmitted in any form or by any
Copyright Pivotal Software Inc, 2013-2015 1 of 10
Table of Contents Table of Contents Getting Started with Pivotal Single Sign-On Adding Users to a Single Sign-On Service Plan Administering Pivotal Single Sign-On Choosing an Application Type 1 2 5 7 10
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
Okta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 [email protected] 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
Building and Using Web Services With JDeveloper 11g
Building and Using Web Services With JDeveloper 11g Purpose In this tutorial, you create a series of simple web service scenarios in JDeveloper. This is intended as a light introduction to some of the
LearningServer for.net Implementation Guide
LearningServer for.net Implementation Guide This document outlines recommended steps for planning and implementing a LearningServer solution. A successful installation and implementation requires the completion
Absorb Single Sign-On (SSO) V3.0
Absorb Single Sign-On (SSO) V3.0 Overview Absorb allows single sign-on (SSO) with third-party systems, regardless of the programming language. SSO is made secure by a series of calls (between Absorb and
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Active Directory Integration with Blue Coat
The Web Security Authority. TM Active Directory Integration with Blue Coat NOTE: This techbrief is applicable when using NTLM under Windows 2000 Server. Introduction Windows 2000 server utilizes Active
Tableau Server Security. Version 8.0
Version 8.0 Author: Marc Rueter Senior Director, Strategic Solutions, Tableau Software June 2013 p2 Today s enterprise class systems need to provide robust security in order to meet the varied and dynamic
How To Use Saml 2.0 Single Sign On With Qualysguard
QualysGuard SAML 2.0 Single Sign-On Technical Brief Introduction Qualys provides its customer the option to use SAML 2.0 Single Sign On (SSO) authentication with their QualysGuard subscription. When implemented,
Setting up single signon with Zendesk Remote Authentication
Setting up single signon with Zendesk Remote Authentication Zendesk Inc. 2 Zendesk Developer Library Introduction Notice Copyright and trademark notice Copyright 2009 2013 Zendesk, Inc. All rights reserved.
Installation & Configuration Guide
Installation & Configuration Guide Bluebeam Studio Enterprise ( Software ) 2014 Bluebeam Software, Inc. All Rights Reserved. Patents Pending in the U.S. and/or other countries. Bluebeam and Revu are trademarks
Fairsail REST API: Guide for Developers
Fairsail REST API: Guide for Developers Version 1.02 FS-API-REST-PG-201509--R001.02 Fairsail 2015. All rights reserved. This document contains information proprietary to Fairsail and may not be reproduced,
Introduction. Connection security
SECURITY AND AUDITABILITY WITH SAGE ERP X3 Introduction An ERP contains usually a huge set of data concerning all the activities of a company or a group a company. As some of them are sensitive information
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Configuring Single Sign-on for WebVPN
CHAPTER 8 This chapter presents example procedures for configuring SSO for WebVPN users. It includes the following sections: Using Single Sign-on with WebVPN, page 8-1 Configuring SSO Authentication Using
Configuring SonicWALL TSA on Citrix and Terminal Services Servers
Configuring on Citrix and Terminal Services Servers Document Scope This solutions document describes how to install, configure, and use the SonicWALL Terminal Services Agent (TSA) on a multi-user server,
SharePoint Integration Framework Developers Cookbook
Sitecore CMS 6.3 to 6.6 and SIP 3.2 SharePoint Integration Framework Developers Cookbook Rev: 2013-11-28 Sitecore CMS 6.3 to 6.6 and SIP 3.2 SharePoint Integration Framework Developers Cookbook A Guide
McAfee Cloud Identity Manager
SAML2 Cloud Connector Guide McAfee Cloud Identity Manager version 1.2 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
SyncTool for InterSystems Caché and Ensemble.
SyncTool for InterSystems Caché and Ensemble. Table of contents Introduction...4 Definitions...4 System requirements...4 Installation...5 How to use SyncTool...5 Configuration...5 Example for Group objects
Authentication and Single Sign On
Contents 1. Introduction 2. Fronter Authentication 2.1 Passwords in Fronter 2.2 Secure Sockets Layer 2.3 Fronter remote authentication 3. External authentication through remote LDAP 3.1 Regular LDAP authentication
Integrating with BarTender Integration Builder
Integrating with BarTender Integration Builder WHITE PAPER Contents Overview 3 Understanding BarTender's Native Integration Platform 4 Integration Builder 4 Administration Console 5 BarTender Integration
Qlik REST Connector Installation and User Guide
Qlik REST Connector Installation and User Guide Qlik REST Connector Version 1.0 Newton, Massachusetts, November 2015 Authored by QlikTech International AB Copyright QlikTech International AB 2015, All
Integration Overview. Web Services and Single Sign On
Integration Overview Web Services and Single Sign On Table of Contents Overview...3 Quick Start 1-2-3...4 Single Sign-On...6 Background... 6 Setup... 6 Programming SSO... 7 Web Services API...8 What is
IP Phone Service Administration and Subscription
CHAPTER 6 IP Phone Service Administration and Subscription Cisco CallManager administrators maintain the list of services to which users can subscribe. These sections provide details about administering
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Managing users. Account sources. Chapter 1
Chapter 1 Managing users The Users page in Cloud Manager lists all of the user accounts in the Centrify identity platform. This includes all of the users you create in the Centrify for Mobile user service
Single Sign-on (SSO) technologies for the Domino Web Server
Single Sign-on (SSO) technologies for the Domino Web Server Jane Marcus December 7, 2011 2011 IBM Corporation Welcome Participant Passcode: 4297643 2011 IBM Corporation 2 Agenda USA Toll Free (866) 803-2145
Secure Authentication and Session. State Management for Web Services
Lehman 0 Secure Authentication and Session State Management for Web Services Clay Lehman CSC 499: Honors Thesis Supervised by: Dr. R. Michael Young Lehman 1 1. Introduction Web services are a relatively
ibolt V3.2 Release Notes
ibolt V3.2 Release Notes Welcome to ibolt V3.2, which has been designed to deliver an easy-touse, flexible, and cost-effective business integration solution. This document highlights the new and enhanced
Configuration Worksheets for Oracle WebCenter Ensemble 10.3
Configuration Worksheets for Oracle WebCenter Ensemble 10.3 This document contains worksheets for installing and configuring Oracle WebCenter Ensemble 10.3. Print this document and use it to gather the
Web Applications Access Control Single Sign On
Web Applications Access Control Single Sign On Anitha Chepuru, Assocaite Professor IT Dept, G.Narayanamma Institute of Technology and Science (for women), Shaikpet, Hyderabad - 500008, Andhra Pradesh,
HP Operations Orchestration Software
HP Operations Orchestration Software Software Version: 9.00 HP Business Availability Center Integration Document Release Date: June 2010 Software Release Date: June 2010 Legal Notices Warranty The only
BUILDER 3.0 Installation Guide with Microsoft SQL Server 2005 Express Edition January 2008
BUILDER 3.0 Installation Guide with Microsoft SQL Server 2005 Express Edition January 2008 BUILDER 3.0 1 Table of Contents Chapter 1: Installation Overview... 3 Introduction... 3 Minimum Requirements...
User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
Integrating Siebel CRM with Microsoft SharePoint Server
Integrating Siebel CRM with Microsoft SharePoint Server www.sierraatlantic.com Headquarters 6522 Kaiser Drive, Fremont CA 94555, USA Phone: 1.510.742.4100 Fax: 1.510.742.4101 Global Development Center
DIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
PingFederate. Salesforce Connector. Quick Connection Guide. Version 4.1
PingFederate Salesforce Connector Version 4.1 Quick Connection Guide 2011 Ping Identity Corporation. All rights reserved. PingFederate Salesforce Quick Connection Guide Version 4.1 June, 2011 Ping Identity
Network FAX Driver. Operation Guide
Network FAX Driver Operation Guide About this Operation Guide This Operation Guide explains the settings for the Network FAX driver as well as the procedures that are required in order to use the Network
Spectrum Technology Platform. Version 9.0. Administration Guide
Spectrum Technology Platform Version 9.0 Administration Guide Contents Chapter 1: Getting Started...7 Starting and Stopping the Server...8 Installing the Client Tools...8 Starting the Client Tools...9
EMC Documentum Content Services for SAP iviews for Related Content
EMC Documentum Content Services for SAP iviews for Related Content Version 6.0 Administration Guide P/N 300 005 446 Rev A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748 9103 1 508 435 1000
Security IIS Service Lesson 6
Security IIS Service Lesson 6 Skills Matrix Technology Skill Objective Domain Objective # Configuring Certificates Configure SSL security 3.6 Assigning Standard and Special NTFS Permissions Enabling and
P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc.
P-Synch by M-Tech Information Technology, Inc. ID-Synch by M-Tech Information Technology, Inc. Product Category: Password Management/Provisioning Validation Date: TBD Product Abstract M-Tech software streamlines
INTEGRATING MICROSOFT DYNAMICS CRM WITH SIMEGO DS3
INTEGRATING MICROSOFT DYNAMICS CRM WITH SIMEGO DS3 Often the most compelling way to introduce yourself to a software product is to try deliver value as soon as possible. Simego DS3 is designed to get you
The increasing popularity of mobile devices is rapidly changing how and where we
Mobile Security BACKGROUND The increasing popularity of mobile devices is rapidly changing how and where we consume business related content. Mobile workforce expectations are forcing organizations to
Manage all your Office365 users and licenses
Manage all your Office365 users and licenses Delegate 365 White Paper Authors: Toni Pohl, Martina Grom Version: 1.2 of December 2014 atwork information technology gmbh. All rights reserved. For information
Siteminder Integration Guide
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
Ultimus and Microsoft Active Directory
Ultimus and Microsoft Active Directory May 2004 Ultimus, Incorporated 15200 Weston Parkway, Suite 106 Cary, North Carolina 27513 Phone: (919) 678-0900 Fax: (919) 678-0901 E-mail: [email protected]
CA Identity Manager. Glossary. r12.5 SP8
CA Identity Manager Glossary r12.5 SP8 This documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational
Single Sign-On Implementation Guide
Salesforce.com: Salesforce Winter '09 Single Sign-On Implementation Guide Copyright 2000-2008 salesforce.com, inc. All rights reserved. Salesforce.com and the no software logo are registered trademarks,
NTP Software VFM Administration Web Site for EMC Atmos
NTP Software VFM Administration Web Site for EMC Atmos User Manual Revision 1.1 - July 2015 This guide details the method for using NTP Software VFM Administration Web Site, from an administrator s perspective.
Firewall Builder Architecture Overview
Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.
Copyright http://support.oracle.com/
Primavera Portfolio Management 9.0 Security Guide July 2012 Copyright Oracle Primavera Primavera Portfolio Management 9.0 Security Guide Copyright 1997, 2012, Oracle and/or its affiliates. All rights reserved.
CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2. Author: Foster Moore Date: 20 September 2011 Document Version: 1.7
CONTRACT MODEL IPONZ DESIGN SERVICE VERSION 2 Author: Foster Moore Date: 20 September 2011 Document Version: 1.7 Level 6, Durham House, 22 Durham Street West PO Box 106857, Auckland City Post Shop, Auckland
Enabling SSO between Cognos 8 and WebSphere Portal
Guideline Enabling SSO between Cognos 8 and WebSphere Portal Product(s): Cognos 8 Area of Interest: Security Enabling SSO between Cognos 8 and WebSphere Portal 2 Copyright Your use of this document is
Configuration Guide BES12. Version 12.1
Configuration Guide BES12 Version 12.1 Published: 2015-04-22 SWD-20150422113638568 Contents Introduction... 7 About this guide...7 What is BES12?...7 Key features of BES12... 8 Product documentation...
Using SQL Server Management Studio
Using SQL Server Management Studio Microsoft SQL Server Management Studio 2005 is a graphical tool for database designer or programmer. With SQL Server Management Studio 2005 you can: Create databases
Cloud Services ADM. Agent Deployment Guide
Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License
Authentication Integration
Authentication Integration VoiceThread provides multiple authentication frameworks allowing your organization to choose the optimal method to implement. This document details the various available authentication
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Microsoft Office 365 Using SAML Integration Guide
Microsoft Office 365 Using SAML Integration Guide Revision A Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.
Integration Client Guide
Integration Client Guide 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
Active Directory Management. Agent Deployment Guide
Active Directory Management Agent Deployment Guide Document Revision Date: June 12, 2014 Active Directory Management Deployment Guide i Contents System Requirements...1 Hardware Requirements...1 Installation...3
User-ID Features. PAN-OS New Features Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
User-ID Features PAN-OS New Features Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 http://www.paloaltonetworks.com/contact/contact/
Trustwave SEG Cloud Customer Guide
Trustwave SEG Cloud Customer Guide Legal Notice Copyright 2015 Trustwave Holdings, Inc. All rights reserved. This document is protected by copyright and any distribution, reproduction, copying, or decompilation
Secure Messaging Server Console... 2
Secure Messaging Server Console... 2 Upgrading your PEN Server Console:... 2 Server Console Installation Guide... 2 Prerequisites:... 2 General preparation:... 2 Installing the Server Console... 2 Activating
Sentinel EMS v7.1 Web Services Guide
Sentinel EMS v7.1 Web Services Guide ii Sentinel EMS Web Services Guide Document Revision History Part Number 007-011157-001, Revision E. Software versions 7.1 and later. Revision Action/Change Date A
NETASQ MIGRATING FROM V8 TO V9
UTM Firewall version 9 NETASQ MIGRATING FROM V8 TO V9 Document version: 1.1 Reference: naentno_migration-v8-to-v9 INTRODUCTION 3 Upgrading on a production site... 3 Compatibility... 3 Requirements... 4
McAfee Cloud Identity Manager
NetSuite Cloud Connector Guide McAfee Cloud Identity Manager version 2.0 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
SQL Server An Overview
SQL Server An Overview SQL Server Microsoft SQL Server is designed to work effectively in a number of environments: As a two-tier or multi-tier client/server database system As a desktop database system
Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft
5.6 Copyright 2014 Jaspersoft Corporation. All rights reserved. Printed in the U.S.A. Jaspersoft, the Jaspersoft logo, Jaspersoft ireport Designer, JasperReports Library, JasperReports Server, Jaspersoft
How-to: Single Sign-On
How-to: Single Sign-On Document version: 1.02 nirva systems [email protected] nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features
Network-Enabled Devices, AOS v.5.x.x. Content and Purpose of This Guide...1 User Management...2 Types of user accounts2
Contents Introduction--1 Content and Purpose of This Guide...........................1 User Management.........................................2 Types of user accounts2 Security--3 Security Features.........................................3
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
Where every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
Setting Up Jive for SharePoint Online and Office 365. Introduction 2
Setting Up Jive for SharePoint Online and Office 365 Introduction 2 Introduction 3 Contents 4 Contents Setting Up Jive for SharePoint Online and Office 365...5 Jive for SharePoint Online System Requirements...5
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé
fåíéêåéí=péêîéê=^çãáåáëíê~íçêûë=dìáçé Internet Server FileXpress Internet Server Administrator s Guide Version 7.2.1 Version 7.2.2 Created on 29 May, 2014 2014 Attachmate Corporation and its licensors.
