Emulating single signon with newlook
|
|
|
- Bryce Little
- 10 years ago
- Views:
Transcription
1 Emulating single signon with newlook
2 contents Emulating Single Sign On (SSO)... 3 IBM i Requirements... 3 Screen Flow... 3 newlook Solution... 3 Other Considerations... 3 IBM i Requirements... 4 A Super User profile... 4 Several designated user profiles... 4 Capability to call a program from the sign on screen... 4 A CL program to switch users... 4 Screen Flow... 5 newlook Solution Requirements... 6 Retrieve Super User Profile and Password... 6 Retrieve Designated User Profile... 6 Connect to the IBM i system... 6 Sign On to the IBM i system... 6 Identify the designated user... 6 Start the designated user initial program/menu... 6 Other Considerations... 7 What the user will see Changing the super user password looksoftware Last updated 13-Apr-12 Page 2 of 7
3 Emulating Single SignOn (SSO) This document includes an overview of a design that can be used to build a solution with newlook to emulate SSO. The sections in this document are: IBM i Requirements What is needed on the IBM i to build this solution. Screen Flow How the green screens will work to access the user s initial program/menu. newlook Solution Requirements The design of the solution required to be built with newlook. Other Considerations Additional topics of interest. looksoftware Last updated 13-Apr-12 Page 3 of 7
4 IBM i Requirements These are the minimum objects required on the IBM i side to support this solution. A Super User profile This user profile does not need to be able to sign on to an interactive session, and does not require to be authorized to applications or data. It must have *USE and *READ authority to all the designated user profiles that will be used in this solution. Several designated user profiles These user profiles are the normal users who currently sign on to the IBM i. The Super User must have *USE and *READ authority to all these designated user profiles. Capability to call a program from the sign on screen The program name on the Sign On screen will be used to start an interactive session. This functionality must be available for the super user profile. A CL program to switch users This program will be called from the sign on screen when newlook uses the Super User to sign on. Its purpose is to collect the user name from a green screen prompt, and switch the job to use that designated user name as the current user. The core of that CL program will be contain functionality similar to this: /*********************************/ PGM PARM(&USERNAME) DCL VAR(&USERNAME) TYPE(*CHAR) LEN(10) DCL VAR(&PASSWORD) TYPE(*CHAR) LEN(50) VALUE('*NOPWD') DCL VAR(&HANDLE) TYPE(*CHAR) LEN(12) DCL VAR(&ERRCODE) TYPE(*CHAR) LEN(8) VALUE(X' ') CALL PGM(QSYGETPH) PARM(&USERNAME &PASSWORD &HANDLE &ERRCODE) CALL PGM(QWTSETP) PARM(&HANDLE) ENDPGM /*********************************/ Modifications to this base code will include: error handling a green screen display to collect a user profile name. calling/transferring to the user profile s initial program The two key programs are the APIs named QSYGETPH and QWTSETP - More details for the two APIs can be found here: looksoftware Last updated 13-Apr-12 Page 4 of 7
5 Screen Flow This is the process that will be used by newlook to sign on to the user s first program/menu. newlook will be following this screen flow in order to emulate SSO. After the initial connection, the Sign On screen will be displayed. The Super User and password will be entered, along with the name of the program to perform the user switch. That program will ask for the designated user name, it will be entered, and the CL program will perform the user switch and call the initial program for the designated user. looksoftware Last updated 13-Apr-12 Page 5 of 7
6 newlook Solution Requirements These steps need to be coded inside the newlook Solution to emulate SSO. Retrieve Super User Profile and Password The Super User profile and password need to be determined. These could be retrieved from a locally cached encrypted file, or hard- coded into a newlook macro or script. Retrieve Designated User Profile It must be determined where the user profile name is to be retrieved from. If the user profile is the Windows user name then this can be retrieved programmatically and is the easiest to implement. If the designated user profile is not the same as the Windows user name then a translation table may be required to look up the IBM i user profile name to be used. If the smartclient is being launched from within another existing application then it may be possible for that application to provide the user profile as an input variable to the smartclient. Connect to the IBM i system A 5250 telnet connection will be made to the IBM i partition. Sign On to the IBM i system At the Sign on screen, the Super User and Password will be filled in with the retrieved values (or from internal hard coded values), and the name of the Switch User program will be filled into the Program name field. Enter will then be pressed to continue. Identify the designated user The Switch User program will now ask for the designated User Profile, and it will be filled in from the retrieved values. Enter will then be pressed to continue. The designated user profile will be stored into newlook memory for later use. Start the designated user initial program/menu The Switch User program can retrieve the initial program and library, or initial menu, from the designated user profile and will transfer control to that program or menu. looksoftware Last updated 13-Apr-12 Page 6 of 7
7 Other Considerations What the user will see. Once the user has clicked on the icon on their desktop, the newlook solution should open using the smartframe, if possible. The first screen that appears will be their initial program or menu, as defined in their IBM i user profile definition. All screen navigation will be invisible to the user. Changing the super user password. The Super User profile name and password must be stored somewhere so the newlook solution can retrieve it. It is possible to store it inside a newlook macro or script, or another solution might be to store it in a locally cached encrypted file. In any case, changing the Super User profile will require a change to the newlook solution. suite 9 / 622 ferntree gully rd wheelers hill vic 3150 australia acn : tel: +61 (0) fax: +61 (0) [email protected] web: looksoftware Last updated 13-Apr-12 Page 7 of 7
Enterprise Security Interests Require SSL with telnet server from outside the LAN
Create and Use an SSL on Goals Provide secure and encrypted 5250 data stream conversations with the server (including authentication) use a digital certificate we create with Digital Manager Show a client
Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption!
Encrypting*a*Windows*7*Hard*Disk* with%bitlocker%disk%encryption Thisdocumentcontainsthenecessarystepstoencryptthecontentsofaharddrive usingbitlockerandwindows7. Thefollowinginstructionsarederivedfromdocumentationat:
ClickView app for iphone and ipad User manual for admins/teachers
ClickView app for iphone and ipad User manual for admins/teachers Table of Contents How to download and install the ClickView app... 3 How to configure Single Sign-On (SSO) on the ClickView app... 5 How
GTS Software Pty Ltd. Remote Desktop Services
GTS Software Pty Ltd Remote Desktop Services Secure web access to GTS Software applications CONTENTS Overview... 2 What GTS can provide with Remote Desktop Services... 2 Main Features... 3 RD Web Access...
Single Sign-On Access Management A Technical Framework on Access Management Systems
Single Sign-On Access Management A Technical Framework on Access Management Systems Polaris Software Lab Ltd., 766, Anna Salai, Chennai, INDIA 600 006 Single Sign-On Access Management Service This paper
Active Directory Integration for Greentree
App Number: 010044 Active Directory Integration for Greentree Last Updated 14 th February 2013 Powered by: AppsForGreentree.com 2013 1 Table of Contents Features... 3 Options... 3 Important Notes... 3
14.1. bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë
14.1 bs^ir^qfkd=obcib`qflk= Ñçê=emI=rkfuI=~åÇ=léÉåsjp=eçëíë bî~äì~íáåö=oéñäéåíáçå=ñçê=emi=rkfui=~åç=lééåsjp=eçëíë This guide walks you quickly through key Reflection features. It covers: Getting Connected
The State of System i Security & The Top 10 OS/400 Security Risks. Copyright 2006 The PowerTech Group, Inc
The State of System i Security & The Top 10 OS/400 Security Risks Copyright 2006 The PowerTech Group, Inc Agenda Introduction The Top Ten» Unprotected Network Access» Powerful Users» Weak or Compromised
Data Backup Procedure for Mac Users (Mac OS 10.4)
Data Backup Procedure for Mac Users (Mac OS 10.4) Teachers and Staff: It is important that you backup your documents before you leave for the summer. YOU are responsible for backing up your files. Please
INTRODUCTION TO ATRIUM... 2 SYSTEM REQUIREMENTS... 2 TECHNICAL DETAILS... 2 LOGGING INTO ATRIUM... 3 SETTINGS... 4 NAVIGATION PANEL...
INTRODUCTION TO ATRIUM... 2 SYSTEM REQUIREMENTS... 2 TECHNICAL DETAILS... 2 LOGGING INTO ATRIUM... 3 SETTINGS... 4 CONTROL PANEL... 4 ADDING GROUPS... 6 APPEARANCE... 7 BANNER URL:... 7 NAVIGATION... 8
Version 3.2 Release Note. V3.2 Release Note
Version 3.2 Release Note V3.2 Release Note Welcome to v3.2 of RM Unify We are pleased to detail the release of RM Unify v3.2. This release brings with it Chromebook single sign-on, allowing users with
INSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY
INSTALLATION INSTRUCTIONS FOR UKSSOGATEWAY 1) Install the UKSSOGateway application on the desktop: The UKSSOGateway application passes information from the myuk portal to launch the FESClient. The FESClient
NetSuite OpenAir Mobile for Android User Guide Version 1.3
NetSuite OpenAir Mobile for Android User Guide Version 3 General Notices Attributions NetSuite OpenAir includes functionality provided by HighCharts JS software, which is owned by and licensed through
i5/os and related software Distributing software
System i and System p i5/os and related software Distributing software Version 6 Release 1 System i and System p i5/os and related software Distributing software Version 6 Release 1 Note Before using
Using the Educator Dashboard
Reference Guide Using the Educator Dashboard What s Inside How to Create Accounts Get to Know the Educator Dashboard How to Manage Licenses and Create Educators How to Give Accommodations to Students First
Remote Access VPN SSL VPN Access via Internet Explorer
The following instructions will allow you to access your company network remotely, via your Internet Explorer web browser. 1. Launch Internet Explorer and choose Internet Options from the Tools menu. 2.
Installation and configuration of Real-Time Monitoring Tool (RTMT)
Installation and configuration of Real-Time Monitoring Tool (RTMT) How to install and upgrade RTMT, page 1 Services, servlets, and service parameters on server, page 5 Navigation of RTMT, page 6 Nonconfigurable
Insolvency System. For further information and assistance please contact ABR Customer Service. 1300 366 402 [email protected] www.abr.com.
For further information and assistance please contact ABR Customer Service 1300 366 402 [email protected] www.abr.com.au TABLE OF CONTENTS INSOLVENCY SYSTEM...3 ACCESSING ABR...3 INSOLVENCY BROWSE...6
Instructions for Registering for a Miradi Account & Installing Miradi Software
Instructions for Registering for a Miradi Account & Installing Miradi Software www.miradi.org/download Version: March 2015 Introduction The following slides guide users through the process for registering
Remote Desktop Web Access. Using Remote Desktop Web Access
Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off
Microsoft Office 365 with MailDefender
(PC) for Microsoft Office 365 with MailDefender V1.0 Contents 1 Logging in to the Office 365 Portal... 3 1.1 Outlook Web Access Exchange & Lync... 3 1.2 Team Site SharePoint Online... 3 2 Configuring your
Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos
Password Power 8 Plug-In for Lotus Domino Single Sign-On via Kerberos PistolStar, Inc. PO Box 1226 Amherst, NH 03031 USA Phone: 603.547.1200 Fax: 603.546.2309 E-mail: [email protected] Website:
VIVIDESK Desktops can be accessed with a Macintosh Computer by one of two methods:
VIVIDESK Desktops can be accessed with a Macintosh Computer by one of two methods: 1. If you have Macintosh OS version IX, then VIVIDESK is best viewed using Windows emulation software. 2. If you have
Interact for Microsoft Office
Interact for Microsoft Office Installation and Setup Guide Perceptive Content Version: 7.0.x Written by: Product Knowledge, R&D Date: October 2014 2014 Perceptive Software. All rights reserved Perceptive
This manual will illustrate how to integrate your WordPress Blog or website with the Docebo Learning Management System.
This manual will illustrate how to integrate your WordPress Blog or website with the Docebo Learning Management System. Direct Log in: The Docebo LMS offers a login box that can be added to you WordPress
Securing Your User Profiles Against Abuse
Securing Your User Profiles Against Abuse Dan Riehl IT Security and Compliance Group, LLC Cilasoft Security Solutions - US Operations [email protected] Areas of Potential User Profile Abuse What
Performance Navigator Installation
Midrange Performance Group / Performance Navigator Business Partner Installation / SOS / Capacity Planning Guide Aug 1, 2011 Overview Performance Navigator provides three main functions for the IBM i platform:
SOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
Integration Overview. Web Services and Single Sign On
Integration Overview Web Services and Single Sign On Table of Contents Overview...3 Quick Start 1-2-3...4 Single Sign-On...6 Background... 6 Setup... 6 Programming SSO... 7 Web Services API...8 What is
PUBLIC Password Manager for SAP Single Sign-On Implementation Guide
SAP Single Sign-On 2.0 SP1 Document Version: 1.0 2015-10-02 PUBLIC Password Manager for SAP Single Sign-On Implementation Guide Content 1 Password Manager....4 2 Password Manager Installation Guide....5
How to set up Outlook Anywhere on your home system
How to set up Outlook Anywhere on your home system The Outlook Anywhere feature for Microsoft Exchange Server 2007 allows Microsoft Office Outlook 2007 and Outlook 2003 users to connect to their Outlook
PCLaw Data Import Module
Contents PCLaw Data Import Module About the Data Import Module Before You Begin Starting the Data Import Module Importing Clients and Matters Importing Contacts Importing Calendar and Telephone Events
How to use SURA in three simple steps:
How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.
Using the Content Distribution Manager GUI
CHAPTER 3 Using the Content Distribution Manager GUI The Content Distribution Manager is the central location from which much of the work of creating and managing ACNS networks and hosted content can be
Instructions: Configuring Outlook 2003 with Exchange 2010 on the FIUMail
Instructions: Configuring Outlook 2003 with Exchange 2010 on the FIUMail Environment Some users have been using Outlook 2003 with their IMAP or POP account, and already have a profile set up. For those
Guidelines for Using the Web Help Desk
BURBANK SCHOOL DISTRICT 111 Guidelines for Using the Web Help Desk Technology Department 1/7/2013 The purpose of this document is to provide guidance on how to navigate the Burbank School District 111
Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012
Using Bitlocker to Encrypt your Flash Drive Information Technology Services July 27, 2012 Contact the ITS Helpdesk at 402-559-7700 or [email protected] with questions. How it works Basically, BitLocker
Administering Jive for Outlook
Administering Jive for Outlook TOC 2 Contents Administering Jive for Outlook...3 System Requirements...3 Installing the Plugin... 3 Installing the Plugin... 3 Client Installation... 4 Resetting the Binaries...4
Centrify Mobile Authentication Services
Centrify Mobile Authentication Services SDK Quick Start Guide 7 November 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under and are subject
Get Smart Card Ready. How to Recover Your Old (Expired) Certificates
How to Recover Your Old (Expired) Certificates If you want to read signed or encrypted email messages that you sent or received using a nowexpired certificate, you first need to recover that certificate
Using the Secure District File Retrieval System to Access 2008 AYP Accountability Reports
Using the Secure District File Retrieval System to Access 2008 AYP Accountability Reports Office of Research and Statistics Mississippi Department of Education Revised October 6, 2008 Traditionally, the
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
Managing Documents in the Citrix XenApp Remote Desktop
Introduction Managing Documents in the Citrix XenApp Remote Desktop What is a Citrix XenApp Remote Desktop? It is a virtualized instance of MS Windows with only enough software to run TAS in a controlled
Macs are not directly compatible with Noetix.
Those that use Macintosh computers to access Noetix cannot directly access Noetix through http://www.sandiego.edu/noetix. If one is on a Mac and goes to Noetix directly in a web browser, the page is likely
Configuring Email on Mobile Devices
1 Configuring Email on Mobile Devices Contents Android IMAP... 3 Android - POP3... 7 iphone IMAP... 10 iphone - POP3... 13 2 Android IMAP The look and feel of each Android device can be different based
Security Service tools user IDs and passwords
System i Security Service tools user IDs and passwords Version 5 Release 4 System i Security Service tools user IDs and passwords Version 5 Release 4 Note Before using this information and the product
PassKey Manager. Schoolwires Centricity
Schoolwires Centricity Table of Contents Introduction... 1 What Provides... 1 What Does Not Provide... 1 Definitions for... 1 Manage PassKeys in Site Manager... 2 Access... 2 Create PassKeys... 2 Create
Citrix Password Manager Using the Account Self-Service Feature. Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition
Citrix Password Manager Using the Account Self-Service Feature Citrix Password Manager 4.6 with Service Pack 1 Citrix XenApp 5.0, Platinum Edition 2 Citrix Password Manager - Account Self-Service Copyright
Kallidus User Guide. Step-by-step instructions for users of the Eversheds Learning Management System (LMS)
Kallidus User Guide Step-by-step instructions for users of the Eversheds Learning Management System (LMS) 1 Signing into the Learning Management System (LMS)... 3 Forgotten your password?... 3 Amending
KeePass Getting Started on Windows
KeePass Getting Started on Windows This guide includes the initial installation of KeePass 2.x on a Windows PC, creating your first password database, testing the software and entering your first accounts.
Time Stamp. Instruction Booklet
Time Stamp Instruction Booklet Time Stamp Introductions Time stamp is a useful solution for backing up and restoring system, it backs up the entire computer system to the Backup Zone. Time Stamp is used
AVAYA LEARNING CENTER END USER GUIDE-PART 1. 1 August 2013 v1
AVAYA LEARNING CENTER END USER GUIDE-PART 1 ACCESS AVAYA LEARNING CENTER To access the Avaya Learning Center: www.avaya-learning.com LOGGING IN SSO ACCESS Users will be prompted to enter their Avaya Secure
Feith Document Database Version 8.1 Install Guide
Feith Document Database Version 8.1 Install Guide Feith Document Database Version 8.1 Install Guide Copyright 2011 Feith Systems and Software, Inc. All Rights Reserved. No part of this publication may
How to Install a Network-Licensed Version of IBM SPSS Statistics 19
How to Install a Network-Licensed Version of IBM SPSS Statistics 19 Important: IBM SPSS Statistics 19 requires either Windows XP Professional or later. IBM SPSS Statistics 19 installs from a DVD and your
Network Edition Download / Installation Instructions
Network Edition Download / Installation Instructions This document includes download/installation instructions for installing PlanGuru v6 on a network server. To facilitate this process, we recommend that
Egress Switch Administration Panel. User Guide
Egress Switch Administration Panel User Guide November 2015 Confidentiality Statement This document contains information confidential and proprietary to Egress Software Technologies. It shall not be disclosed
StarWind iscsi SAN & NAS: Configuring HA Storage for Hyper-V October 2012
StarWind iscsi SAN & NAS: Configuring HA Storage for Hyper-V October 2012 TRADEMARKS StarWind, StarWind Software and the StarWind and the StarWind Software logos are trademarks of StarWind Software which
PowerDMS SYNC Overview
PowerDMS SYNC Overview What is PowerDMS SYNC? The PowerDMS SYNC tool allows you to: create users in bulk within PowerDMS update users automatically with a scheduled sync How does PowerDMS SYNC work? PowerDMS
How To Restore Your Data On A Backup By Mozy (Windows) On A Pc Or Macbook Or Macintosh (Windows 2) On Your Computer Or Mac) On An Pc Or Ipad (Windows 3) On Pc Or Pc Or Micro
Online Backup by Mozy Restore Common Questions Document Revision Date: June 29, 2012 Online Backup by Mozy Common Questions 1 How do I restore my data? There are five ways of restoring your data: 1) Performing
educ Office 365 email: Remove & create new Outlook profile
Published: 29/01/2015 If you have previously used Outlook the with the SCC/SWO service then once you have been moved into Office 365 your Outlook will need to contact the SCC/SWO servers one last time
How to create a portable encrypted USB Key using TrueCrypt
How to create a portable encrypted USB Key using TrueCrypt INTRODUCTION TrueCrypt Traveler Mode provides secure encryption for programs/files on portable devices such as USB Memory keys. It uses strong
Section 5 Configuring the Partition for Enterprise Output Manager (EOM)
Section 5 Configuring the Partition for Enterprise Output Manager (EOM) The Enterprise Output Manager (EOM) partition runs on an enterprise partition platform (EPP) and is intended for running the product.
Quick Start Guide. Microsoft Access 2013 looks different from previous versions, so we created this guide to help you minimize the learning curve.
Quick Start Guide Microsoft Access 2013 looks different from previous versions, so we created this guide to help you minimize the learning curve. Change the screen size or close a database Click the Access
Samsung KNOX EMM Authentication Services. SDK Quick Start Guide
Samsung KNOX EMM Authentication Services SDK Quick Start Guide June 2014 Legal notice This document and the software described in this document are furnished under and are subject to the terms of a license
Online Backup and Recovery Manager Setup for Microsoft Windows.
Online Backup and Recovery Manager Setup for Microsoft Windows. Backup Wizard Default Interface Recovery Wizard Online Backup and Recovery Manager Setup Backup Wizard After installing and launching the
Remote Access End User Guide (Cisco VPN Client)
Remote Access End User Guide (Cisco VPN Client) Contents 1 INTRODUCTION... 3 2 AUDIENCE... 3 3 CONNECTING TO N3 VPN (N3-12-1) OR EXTENDED VPN CLIENT... 3 4 DISCONNECTING FROM N3 VPN (N3-12-1) AND EXTENDED
DSG SoftPhone & USB Phone Series User Guide
DSG SoftPhone & USB Phone Series User Guide Table of Contents Overview Before You Start Installation Step 1. Installing DSG SoftPhone Step 2. Installing USB Phone Step 3. System Check First Time Use Step
Net 2. NetApp Electronic Library. User Guide for Net 2 Client Version 6.0a
Net 2 NetApp Electronic Library User Guide for Net 2 Client Version 6.0a Table of Contents 1 INTRODUCTION AND KEY FEATURES... 3 SOME OF THE KEY FEATURES INCLUDE:... 3 INSTALLATION PREREQUISITES:... 3 2
Citrix for Mac Installation
While some MCPS applications run on Macintosh computers, other applications do not function properly. One method to get these applications (such as Outlook and Special Education s O/SS) is to add a mini-program
Connecting To SOM Network Drives With Windows XP
Connecting To SOM Network Drives With Windows XP The first step to take is to make sure that you are using the UCSF VPN client when you connect. If you do not have a VPN username and password, you will
Centrify Mobile Authentication Services for Samsung KNOX
Centrify Mobile Authentication Services for Samsung KNOX SDK Quick Start Guide 3 October 2013 Centrify Corporation Legal notice This document and the software described in this document are furnished under
ELR (Educational Lending Right) School Library Survey Matching Program for Amlib Installation and User Guide
ELR (Educational Lending Right) School Library Survey Matching Program for Amlib Installation and User Guide 2013 OCLC (UK) Ltd ALL RIGHTS RESERVED. Permission is granted to electronically copy and to
For paid computer support call 604-518-6695 http://www.netdigix.com [email protected]
Setting up your vpn connection on windows 2000 or XP in continuation from installing x.509 certificate on windows (please do not continue if you have not installed your x.509 certificate): Instructions
B&SC Office 365 Email
B&SC Office 365 Email Microsoft Office 365 In its continuous efforts to provide the highest quality student experience, Bryant & Stratton College is giving students access to a new tool for accessing email.
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643)
MCTS Guide to Microsoft Windows Server 2008 Applications Infrastructure Configuration (Exam # 70-643) Chapter Four Windows Server 2008 Remote Desktop Services, Part 1 Objectives Describe the Remote Desktop
How to Setup OSX Mail to POP an Exchange Account
How to Setup OSX Mail to POP an Exchange Account (Revised 04/27/11) LAUSD IT Help Desk 333 S. Beaudry Ave. 9 th Floor Phone 213.241.5200 Opening OS X Mail application The following instructions are written
KI6501 Data Manager. Software User Manual
KI6501 Data Manager Software User Manual CONTENTS 1. Installation of USB Virtual COM Port driver software... 2 2. Installation of KI6501 Manager Software... 2 3. Connecting KI6501 to PC (Personal Computer)
VPN: Virtual Private Network Setup Instructions
VPN: Virtual Private Network Setup Instructions Virtual Private Network (VPN): For e-journals and web-based databases, plus applications like EndNote's Online Search (formerly "Connect") and business systems.
1. Open the preferences screen by opening the Mail menu and selecting Preferences...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
PC Agent Quick Start. Open the Agent. Autonomy Connected Backup. Version 8.8. Revision 0
T E C H N I C A L N O T E Autonomy Connected Backup Version 8.8 PC Agent Quick Start Revision 0 Use this document as a quick reference for common Connected Backup PC Agent tasks. If the Agent is not on
Joining a Meeting. Before You Join a Meeting
When a meeting host schedules a meeting or starts an instant meeting by using the Meet Now option, the host and all invitees receive an email invitation with the meetings details. When it's time to join
LifeCyclePlus Version 1
LifeCyclePlus Version 1 Last updated: 2014-04-25 Information in this document is subject to change without notice. Companies, names and data used in examples herein are fictitious unless otherwise noted.
Log-in made easy. MB Advantage Single Sign-On Now Available to DealerTrack.
Log-in made easy. MB Advantage Single Sign-On Now Available to DealerTrack. New Feature Now, you can effortlessly access DealerTrack right from the MB Advantage Portal. Within MB Advantage, simply click
Manually Configuring Windows Vista for Wireless PittNet
Technology Help Desk 412 624-HELP [4357] http://technology.pitt.edu Manually Configuring Windows Vista for Wireless PittNet If you are not able to connect to Wireless PittNet using our automated wizard,
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1.
This presentation covers virtual application shared services supplied with IBM Workload Deployer version 3.1. WD31_VirtualApplicationSharedServices.ppt Page 1 of 29 This presentation covers the shared
You may have been given a download link on your trial software email. Use this link to download the software.
BackupVault / Attix5 Server Quickstart Guide This document takes about 5 minutes to read and will show you how to: Download the software Install the Attix5 Professional Backup software Backup your files
Welcome (slide 1) Welcome to the Florida Department of Education Single Sign-On tutorial for federated user login and navigation.
LOGIN AND NAVIGATION FOR FEDERATED USERS Welcome (slide 1) Welcome to the Florida Department of Education Single Sign-On tutorial for federated user login and navigation. These tutorials are designed to
NSave Table of Contents
NSave Table of Contents Introduction to NSave for Desktops 2 CPP Installation Instructions 3 Backing up your Computer 8 Restoring Files to your Computer 10 Settings 13 History 14 Destinations 15 1 Introduction
How to Attach Files in Blackboard Learn Email, Messages, Discussions, and Assignments
E-Mail 1. Launch the Email by clicking the icon from the Menu frame found on the left side of the screen. 2. From within the Send Email page, click the "Select Users" link. If you click any links above
There are also IBM Knowledge Base documents available on the internet at the following location. Search for SMTP to view the relevant documents:
Technical Document Document No: 14-02001 Document Title: Configuring Email on the AS/400 Category: Hints, Tips & FAQ Functional Area: Miscellaneous - Email OS/400 Release: V4.3 Document Description: E-Mail
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
Sophos SafeGuard File Encryption for Mac Quick startup guide. Product version: 6.1
Sophos SafeGuard File Encryption for Mac Quick startup guide Product version: 6.1 Document date: January 2014 Contents 1 About SafeGuard File Encryption for Mac...3 2 First use...4 3 Working with SafeGuard
TxEIS on Internet Explorer 7
TxEIS on Internet Explorer 7 General Set Up Recommendations: Several modifications will need to be made to the computer settings in Internet Explorer to ensure TxEIS runs smoothly, reports pop up as desired,
ParishSOFT Remote Installation
Table of Contents Setting up Remote Solution Windows 7 or Vista... 1 Connecting to ParishSOFT... 1 Accessing Your database... 3 Switching to your parish database... 4 Setting up Accounts for users... 5
Attix5 Pro. Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition. V6.0 User Manual for Mac OS X
Attix5 Pro Your guide to protecting data with Attix5 Pro Desktop & Laptop Edition V6.0 User Manual for Mac OS X Copyright Notice and Proprietary Information All rights reserved. Attix5, 2011 Trademarks
Managing Qualys Scanners
Q1 Labs Help Build 7.0 Maintenance Release 3 [email protected] Managing Qualys Scanners Managing Qualys Scanners A QualysGuard vulnerability scanner runs on a remote web server. QRadar must access
Quick Start Guide. Microsoft Access 2013 looks different from previous versions, so we created this guide to help you minimize the learning curve.
Quick Start Guide Microsoft Access 2013 looks different from previous versions, so we created this guide to help you minimize the learning curve. Change the screen size or close a database Click the Access
