VMware Horizon Workspace Security Features WHITE PAPER
|
|
|
- Briana Armstrong
- 10 years ago
- Views:
Transcription
1 VMware Horizon Workspace WHITE PAPER
2 Table of Contents... Introduction Horizon Workspace vapp Security Virtual Machine Security Hardening Authentication Activation Horizon Configurator... 6 Authentication Tokens Horizon Service Data Encryption Horizon Data Sharing and Security File Sharing Using Public Links Internal Folder Sharing External Sharing... 8 Horizon Workspace ios Client Security Access and Authentication... 9 Transit Data Security Content Security Encryption... 9 Setting Up the Encryption Files Marked Favorite File Previews and Encryption Flow... 9 Using the Open With Menu Policies Application Passcode Policy Open With Control Remote Wipe Protection Against Jailbreak Horizon Android Client Security Access and Authentication Transit Data Security Content Security Encryption Setting up the Encryption Files Marked Favorite File Previews and Encryption Flow Using the Open With Menu WHITE PAPER / 2
3 Policies Application Passcode Open With Control Remote Wipe Protection Against Jailbreak Horizon Client Security on Windows and Macintosh Access and Authentication Transit Data Security Content Security Encryption Policies Remote Wipe Protection Against Device Theft About the Authors WHITE PAPER / 3
4 Introduction Today s workers want the freedom to work from anywhere, at any time, using a variety of devices including laptops, home computers, tablets, and mobile phones. Corporate management and IT departments want to give them that freedom if the devices can be properly secured. VMware Horizon Workspace provides the level of security and control over corporate data and applications needed to meet the stringent requirements of corporate policies and comply with industry standards and regulatory mandates. It delivers an integrated workspace that gives end users secure access to their applications, data, and desktops from any of their devices while enabling IT to easily manage entitlement and policy controls. For the administrator, the result is simpler, centralized, policy-based management. For end users, the benefit is the liberating experience of anytime, anywhere access to any authorized resource from virtually any device. Simply put, VMware Horizon Workspace can transform security from a source of risk and worry into a source of strategic advantage and business empowerment. This document details the enterprise-grade security features provided by VMware Horizon Workspace and provides recommendations for taking full advantage of its security capabilities. WHITE PAPER / 4
5 Horizon Workspace vapp Security VMware deploys Horizon Workspace as a virtual appliance (vapp) within the customer datacenter. The Horizon Workspace vapp consists of five different virtual appliances: Horizon Gateway, Horizon Configurator, Horizon Connector, Horizon Service, and Horizon Data. The following are the key security considerations and recommendations for Horizon Workspace vapp security. Virtual Machine Security Hardening SUSE Linux is the underlying operating system for the Horizon Workspace virtual appliances, which are hardened to bare-minimum requirements. All virtual machines follow the VMware security hardening guidelines: Remove unnecessary software packages (RPM packages) Close network ports and disable runlevel system services Close network ports and disable xinetd services Review inittab and boot scripts Restrict system access from servers and networks Secure SSH Secure Postfix Secure sendmail Secure NFS Copy files using SSH without providing login prompts Tune security parameters available at kernel Enforce stronger passwords Restrict use of previous passwords Restrict direct login access for system and shared accounts Restrict SU access to system and shared accounts Prevent accidental denial of service All components of the Horizon Workspace vapp undergo routine in-house and external security testing. The vapp is deployed inside the customer network with an external proxy or load balancer, which forwards all requests via SSL (port 443) to the Horizon Gateway virtual appliance. Horizon Gateway is the component that receives all Web and API traffic over SSL and proxies the request to the individual virtual machines. We recommend that you configure the external proxy to exclude /admin URLs so the administrator console is not exposed to external attack. Horizon Workspace is configured with the Horizon Configurator virtual appliance using a Web UI over SSL. Use Horizon Configurator as the component for bootstrapping the setup and configuration of the other virtual appliances (Horizon Connector, Horizon Service, Horizon Gateway, and Horizon Data). Horizon Configurator uses SSL REST APIs to configure Horizon Connector. WHITE PAPER / 5
6 Authentication Use Horizon Configurator to set up Horizon Connector with Active Directory information, which authenticates and synchronizes users. The setup requires an Active Directory-based DN (distinguished name) and a nonadministrative credential. Active Directory can be configured with SSL as follows: Username and Password Validation Perform an LDAP bind with credentials provided over SSL on the Horizon Connector login page. RSA SecurID Use RSA APIs to validate the username and passcode against the internal RSA Access Manager. The login page is on Horizon Connector. Kerberos Configure the connector with Active Directory Service principal credentials. Horizon Workspace provides the ability to prompt users for stronger authentication credentials based on their location. For example, if users are on the local network, the Kerberos (desktop login) ticket can be used to provide access. 1 However, if the user is outside the network, strong authentication such as RSA SecurID is needed. This is configured by the administrator who defines which range of IP addresses authenticate with specific Horizon Connectors. The administrator sets up Horizon Connector to provide the appropriate authentication type, including username and password, Kerberos, or RSA SecurID. Activation Activate Horizon Workspace with an encoded activation string sent by Horizon Connector over SSL REST APIs. The activation string is sent to Horizon Service over SSL REST APIs, where it is validated against the activation code sent by Horizon Connector. On successful validation, Horizon Connector is provided an OAuth 2.0 token. (For more information about OAuth tokens and standards, visit the OAuth Web site.) The OAuth token is used for subsequent communication between Horizon Connector and Horizon Service over SSL. Horizon Configurator Horizon Configurator makes API calls over SSL to Horizon Service using the OAuth token. Horizon Configurator also updates the SSL certificate information for Horizon Gateway. Horizon Configurator calls APIs to manage the identity provider record associated with Horizon Connector. Horizon Configurator also provides an attribute map to the Horizon Service, which can be used for creating access control groups within Horizon Service. Authentication Tokens Two kinds of tokens are used for authentication depending on whether a user is logging in from a Web browser or Horizon Agent. The first is the Suite token, delivered to the user s browser after the user successfully authenticates. The other is the OAuth token, delivered to the Horizon Client after successful authentication. With a Suite token session timeout, the time-to-live (TTL) is set by default to 8 hours. The administrator can change this by referring to the VMware Horizon Workspace documentation. With OAuth token timeout and refresh where the client or device is registered as an OAuth Client, two kinds of tokens exist: Access token and Refresh token. Access tokens by nature are short-lived and Refresh tokens are long-lived. Devices registered with Horizon Service use the OAuth template to receive the Access and Refresh tokens, and the TTL for each token is part of the template. The default value for the Refresh token is one year, for the Access token, one hour. The administrator can change this by referring to the VMware Horizon Workspace documentation. 1. See the documentation for each Web browser for information on how to configure the browser to support Kerberos. WHITE PAPER / 6
7 Horizon Service Data Encryption Sensitive information such as OAuth credential secrets and signing certificates are encrypted and stored in Horizon Workspace as illustrated below. Horizon Server Sees no Encryption Keys Security Officer has access to Physically Secured Encryption Service Master Keys Database Administrators have access to User Database Key Database Figure 1: Security Credentials Are Stored Encrypted in Horizon Workspace The User Database stores all user data. Sensitive data is encrypted in the User Database. The Key Database stores the keys for decrypting the data. All the keys in the Key Database are encrypted with a master key. Both these databases can be managed by a regular DBA, and can use standard backup, restore, and disaster recovery processes. The master keys are stored on the hard drive of the servers that make up the Encryption Service. These servers are the only servers to read and write to the Key Database and never allow unencrypted keys to be released. All communication to the Encryption Service is through SSL, requiring both client and server certificates. The encryption service provides UUID key identifiers to match the encrypted BLOB of data with the key needed to decrypt it. The Encryption Service API uses these keys to look up the encrypted keys from the database and perform an encryption or decryption operation. The Encryption Service provides a mechanism for reliable key changes. If keys for an organization are updated, each record is converted and saved along with the new key ID, which is stored in the same transaction. Even if a failure occurs partway through a transaction, each piece of data contains a reference to the key needed to decrypt it. When the system recovers, the key conversion will be able to complete successfully. Decrypted keys never leave the Encryption Service. Its API provides operations for encrypting, decrypting, and versioning keys, but never provides access to the key material. This way, an attacker who has gained root access on a Horizon Workspace server can never have enough information to perform an offline attack on the database itself. WHITE PAPER / 7
8 Horizon Data Sharing and Security Horizon Data gives IT administrators single-dashboard control, allowing internal users to access and synchronize data while limiting external users to the data in folders that the internal users designate. File Sharing Using Public Links Horizon Data allows users to share their documents as public links. Anyone with access to the public link has access to the content. The URLs are randomly generated long strings that are protected from brute-force attacks. The content accessed using shared links is securely transferred over SSL. This public sharing can be enabled or disabled by administrators at Account or Class of Service (COS) levels. Sharing expiration can also be set up by administrators at Account or COS levels. Internal Folder Sharing Folders can be shared among provisioned users (internal) using read, read/write or read/write/share permissions. Administrators can set up expiration policies for internal shares. External Sharing Content can be shared with company employees who are not provisioned for data, as well as with external collaborators who are not part of the company. This is referred to as external sharing. Upon sharing, external users receive an invitation with a self-provisioning login link. The username is the ID of the external user. External users self-select a password, which is stored in a local LDAP bundled with the Horizon Data virtual appliance. Upon login, external users have access only to the folders shared with them and can manipulate the data only within those contexts. External users have access only via a Web client. External users cannot be administrators of the folder; only read and read/write permissions can be granted to them. To recover a forgotten password, the external user receives an similar to the initial share invitation with a URL for the login page. The URL is time-sensitive and will expire if the password is not reset within the set period. Administrators can turn external sharing off at the Account or COS level. Administrators can configure selective domains for blacklisting or white-listing of access. Administrators can also set the expiration policy for the shares to be automatically revoked upon the end of such a period. These settings are made at the Account or COS level. WHITE PAPER / 8
9 Horizon Workspace ios Client Security When users access data through their own devices running ios, the data is encrypted and all communications are through SSL. Access and Authentication Horizon Workspace authenticates entitled end users with a standards-based OAuth 2.0 protocol and their AD credentials or RSA SecurID. Administrators can set up the session timeouts and other authentication token related configurations from the Horizon Workspace administrator console. Transit Data Security All communications to the Horizon Workspace server are secured by using SSL. Content Security The only content stored persistently in the Horizon Workspace ios native application are files marked Favorite and cached for offline access. The files selected for preview or Open With are also temporarily stored on the disk. The next section provides details on encryption to secure content stored on the device at any time. Encryption The encryption algorithm is AES 256 with a key length of 32 bytes. Setting Up the Encryption The first time the application is installed and loaded, it checks for an encryption flag. If the flag indicates that no key has been generated then any cached files are removed. A random key is generated using the built-in Cocoa libraries and immediately put in the keychain. The random generator guarantees that practically no two users will ever have the same key. The application is now set with an empty cache and a unique, strong encryption key that is stored securely in the keychain. Files Marked Favorite When a Favorite file is cached for offline usage, it is encrypted instantly after download. File Previews and Encryption Flow For preview, downloaded files must be presented in their unencrypted state to be displayed by the ios previewer. Before the preview, the file is briefly in the unencrypted stage. Upon successful preview loading, it is immediately encrypted and written back to disk. A flag will track and indicate any unencrypted files. If this flag is found, the application immediately removes any unencrypted files, which must be downloaded again. Using the Open With Menu Similar to the above process, the file must be briefly decrypted for a third-party program to load. As soon as the user selects a program to open the file, it is decrypted and a flag is set to capture this state. If the program successfully loads the file, it is encrypted once again and the flag is removed. If the third-party program cannot successfully report loading the file, then the Horizon Workspace application will check the flag, find the files in decrypted state and immediately remove them, thereby requiring a fresh download. WHITE PAPER / 9
10 Policies The following considerations and recommendations are offered to administrators to help optimize the use of Horizon Workspace for ios device security. Application Passcode Policy To protect against data theft from lost or stolen devices, administrators can require end users to set an application passcode. The application passcode must be a minimum of four characters and both numbers and letters are allowed. After a user sets a passcode, he or she has the option to select the inactivity period. Whenever the inactivity period is exceeded the application locks itself and prompts the user to enter the passcode. Whether an application is in the background, the user is inactive within the application, or the application has been restarted, this passcode enforcement can effectively prevent data theft in the event of device loss. Open With Control In order to protect the data from leaving the Horizon Workspace application, administrators can disallow the Open With option. This will effectively prevent Horizon Workspace data from leaking to unsanctioned applications. Remote Wipe Administrators and end users can remotely wipe the Horizon Workspace application and all its content. Note that this will not wipe the device, only the content in the Horizon Workspace application. When the application connects to the server, it receives the remote wipe command and removes all the content. The end user will have to enter server information and valid credentials to re-link to the Horizon Workspace server. Protection Against Jailbreak If the device is rooted, the keys in the keychain are compromised, creating a potential threat. To protect against jailbreak, do not root the device. WHITE PAPER / 10
11 Horizon Android Client Security When users access data through their own Android devices, the data is encrypted and all communications are through SSL. Access and Authentication Entitled end users are authenticated using OAuth 2.0 based on their AD credentials. The session timeouts and other authentication token related configurations can be set up from the Horizon Workspace administrator console. Transit Data Security All communications to the Horizon Workspace server are secured by using SSL. Content Security The Android platform supports storing secure and insecure files. Android refers to secure file storage as internal storage. It is limited to small files and key-value pairs, and is not appropriate for storing large files. Insecure storage is referred to as external storage. It is implemented on removable flash storage (SD cards), or internal flash storage on modern devices. Insecure storage may be used to store large amounts of data. All data in insecure storage on an Android device is readable by any application. It is accessible from a desktop computer by mounting the device as USB mass storage, or via MTP on modern devices that support it. Android guidelines insist that you not store sensitive data in insecure storage. The Horizon Workspace Android native application stores files marked Favorite for offline access, transient cached content for previews, and metadata related to files and folders. All content stored in the application is always encrypted. The next section provides details on encryption to secure content stored on the device at any time. Encryption The encryption algorithm is AES 256 with a key length of 32 bytes. Setting up the Encryption When the application is initially installed and loaded, it generates a random key using the standard library included in the Android SDK. The key is immediately put in secure storage. The random generator assures that no two users will ever have the same key. Files Marked Favorite Files that are marked Favorite are cached on the device for offline access. These files are encrypted and written to the disk as they are read from the server. The content is always in an encrypted state. File Previews and Encryption Flow For Android file preview, the data server converts files to images. The preview does not require downloading original files. All image files are cached to disk in an encrypted state. Using the Open With Menu To support Open With functionality, Android holds data in insecure storage, unencrypted, for a very brief period of time. Upon a successful read from another application, the unencrypted content is immediately deleted. In Android, applications access external content based on URIs (uniform resource identifiers). For example, when a user opens a Horizon Workspace document in an external application, Horizon Workspace decrypts the file and provides a URI to access the content. In order to protect against URI caching, Horizon Workspace expires the URIs after a short time window. This prevents applications from caching and reusing the URI to the content. WHITE PAPER / 11
12 Policies The following considerations and recommendations are offered to administrators to help optimize the use of Horizon Workspace for Android device security. Application Passcode To protect against data theft from lost or stolen devices, administrators can require end users to set an application passcode. The passcode must be numeric with a minimum of four digits. After a user sets a passcode, he or she has the option to select the inactivity period. Whenever the inactivity period is exceeded, the application locks itself and prompts the user to enter the passcode. Whether an application is in the background, the user is inactive within the application, or the application has been restarted, this passcode enforcement can effectively prevent data theft in the event of device loss. Open With Control In order to protect data from leaving the Horizon Workspace application, administrators can disallow the Open With option. This will effectively prevent Horizon Workspace data from leaking to unsanctioned applications. Remote Wipe Administrators and end users can remotely wipe the Horizon Workspace application and all its content. Note that this will not wipe the device, only the content in the Horizon Workspace application. When the application connects to the server, it receives the Remote Wipe command and removes all the content. The end user will have to enter their server information and valid credentials to re-link to the Horizon Workspace server. Protection Against Jailbreak If the device is rooted, the keys stored in its secure memory can be compromised, creating a potential threat. To protect against jailbreak do not root the device. WHITE PAPER / 12
13 Horizon Client Security on Windows and Macintosh Encrypted desktops are required if users access their data through their own laptop running Windows or the Mac OS. Access and Authentication Entitled end users are authenticated using OAuth2.0 based on their AD credentials. The session timeouts and other authentication token related configurations can be set up from the Horizon Workspace administrator console. Transit Data Security All communications to the Horizon Workspace server are secured by using SSL. Content Security Currently the Horizon folder in Mac OS or Windows is just like any other folder on the end user s system. If a customer requires an endpoint laptop to be encrypted, then they must perform disk encryption. This ensures that the Horizon Workspace content is encrypted as well. Encryption Enterprises can use third-party software to encrypt the disks. Policies The following considerations and recommendations are offered to administrators to help optimize the use of Horizon Workspace for Windows and Macintosh device security. Remote Wipe Administrators and end users can remotely unlink and remove the Horizon Workspace content from the device. Protection Against Device Theft Enterprise laptops are commonly required to be password-protected. In the event of theft, VMware relies on password protection at the OS level. WHITE PAPER / 13
14 About the Authors Vijay Pawar, Product Line Manager, Horizon Product Management at VMware, and Arvind Soni, Senior Product Manager, Horizon Product Management at VMware, wrote this document. VMware, Inc Hillview Avenue Palo Alto CA USA Tel Fax Copyright 2013 VMware, Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. VMware products are covered by one or more patents listed at VMware is a registered trademark or trademark of VMware, Inc. in the United States and/or other jurisdictions. All other marks and names mentioned herein may be trademarks of their respective companies. Item No: VMW-SG-HORIZONWKSPSECURITY-USLET WEB
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
VMware Virtual Desktop Manager User Authentication Guide
Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
VMware Identity Manager Connector Installation and Configuration
VMware Identity Manager Connector Installation and Configuration VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Salesforce1 Mobile Security Guide
Salesforce1 Mobile Security Guide Version 1, 1 @salesforcedocs Last updated: December 8, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark of salesforce.com,
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 2
RSA Authentication Manager 7.1 Security Best Practices Guide Version 2 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
When enterprise mobility strategies are discussed, security is usually one of the first topics
Acronis 2002-2014 Introduction When enterprise mobility strategies are discussed, security is usually one of the first topics on the table. So it should come as no surprise that Acronis Access Advanced
vcloud Director User's Guide
vcloud Director 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
VMware vcenter Support Assistant 5.1.1
VMware vcenter.ga September 25, 2013 GA Last updated: September 24, 2013 Check for additions and updates to these release notes. RELEASE NOTES What s in the Release Notes The release notes cover the following
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Security Guide vcenter Operations Manager for Horizon View 1.5 TECHNICAL WHITE PAPER
Security Guide vcenter Operations Manager for Horizon View 1.5 TECHNICAL WHITE PAPER Contents Introduction... 2 Surface Area... 3 SSL Configuration... 5 Authentication... 6 Adapter... 6 Broker Agent...
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
Setting Up Resources in VMware Identity Manager
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Copyright 2012 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Request Manager Installation and Configuration Guide
Request Manager Installation and Configuration Guide vcloud Request Manager 1.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
VMware vcenter Log Insight Getting Started Guide
VMware vcenter Log Insight Getting Started Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace
INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
Configuring Multiple ACE Management Servers VMware ACE 2.0
Technical Note Configuring Multiple ACE Management Servers VMware ACE 2.0 This technical note describes how to configure multiple VMware ACE Management Servers to work together. VMware recommends this
activecho Driving Secure Enterprise File Sharing and Syncing
activecho Driving Secure Enterprise File Sharing and Syncing activecho Overview In today s enterprise workplace, employees are increasingly demanding mobile and collaborative solutions in order to get
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Cloud Director User's Guide
Cloud Director 1.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
ipad in Business Security
ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security
Offline Data Transfer to VMWare vcloud Hybrid Service
Offline Data Transfer to VMWare vcloud Hybrid Service vcloud Connector 2.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
Security Guide. BlackBerry Enterprise Service 12. for ios, Android, and Windows Phone. Version 12.0
Security Guide BlackBerry Enterprise Service 12 for ios, Android, and Windows Phone Version 12.0 Published: 2015-02-06 SWD-20150206130210406 Contents About this guide... 6 What is BES12?... 7 Key features
Upgrading Horizon Workspace
Horizon Workspace 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.0.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox
Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox VMware Identity Manager SEPTEMBER 2015 V1 Configuring Single Sign-On from VMware Identity Manager to Dropbox Table of Contents
Ensuring the security of your mobile business intelligence
IBM Software Business Analytics Cognos Business Intelligence Ensuring the security of your mobile business intelligence 2 Ensuring the security of your mobile business intelligence Contents 2 Executive
Getting Started with ESXi Embedded
ESXi 4.1 Embedded vcenter Server 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent
VMware vsphere Data Protection Evaluation Guide REVISED APRIL 2015
VMware vsphere Data Protection REVISED APRIL 2015 Table of Contents Introduction.... 3 Features and Benefits of vsphere Data Protection... 3 Requirements.... 4 Evaluation Workflow... 5 Overview.... 5 Evaluation
SafeGuard Enterprise Web Helpdesk
SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk
User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
An Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
How To Secure An Rsa Authentication Agent
RSA Authentication Agents Security Best Practices Guide Version 3 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks RSA,
INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
Mobile App User's Guide
Mobile App User's Guide Copyright Statement Copyright Acronis International GmbH, 2002-2012. All rights reserved. "Acronis", "Acronis Compute with Confidence", "Acronis Recovery Manager", "Acronis Secure
Guidance End User Devices Security Guidance: Apple OS X 10.9
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.9 Published 23 January 2014 Contents 1. Changes since previous guidance 2. Usage Scenario 3. Summary of Platform Security 4. How the Platform
Reconfiguration of VMware vcenter Update Manager
Reconfiguration of VMware vcenter Update Manager Update 1 vcenter Update Manager 4.1 This document supports the version of each product listed and supports all subsequent versions until the document is
SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
iphone in Business How-To Setup Guide for Users
iphone in Business How-To Setup Guide for Users iphone is ready for business. It supports Microsoft Exchange ActiveSync, as well as standards-based services, delivering email, calendars, and contacts over
iphone in Business Security Overview
iphone in Business Security Overview iphone can securely access corporate services and protect data on the device. It provides strong encryption for data in transmission, proven authentication methods
VMware Horizon FLEX 1.5 WHITE PAPER
WHITE PAPER Table of Contents What Is VMware Horizon FLEX?... 3 Terminology for Horizon FLEX.... 4 Key Benefits of Horizon FLEX... 4 Deploying Horizon FLEX.... 5 Tested Host Operating Systems for Horizon
Deploying iphone and ipad Security Overview
Deploying iphone and ipad Security Overview ios, the operating system at the core of iphone and ipad, is built upon layers of security. This enables iphone and ipad to securely access corporate services
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
End User Devices Security Guidance: Apple OS X 10.10
GOV.UK Guidance End User Devices Security Guidance: Apple OS X 10.10 Published Contents 1. Changes since previous guidance 2. Usage scenario 3. Summary of platform security 4. How the platform can best
Kony Mobile Application Management (MAM)
Kony Mobile Application Management (MAM) Kony s Secure Mobile Application Management Feature Brief Contents What is Mobile Application Management? 3 Kony Mobile Application Management Solution Overview
RSA Authentication Manager 7.1 Security Best Practices Guide. Version 5
RSA Authentication Manager 7.1 Security Best Practices Guide Version 5 Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com. Trademarks
vsphere Replication for Disaster Recovery to Cloud
vsphere Replication for Disaster Recovery to Cloud vsphere Replication 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
RSA SecurID Ready Implementation Guide
RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 18, 2006 Product Information Partner Name Microsoft Web Site http://www.microsoft.com/isaserver Product Name Internet
VMware vcenter Log Insight Administration Guide
VMware vcenter Log Insight Administration Guide vcenter Log Insight 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
Endpoint Security VPN for Windows 32-bit/64-bit
Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected
VMware Identity Manager Integration with Active Directory Federation Services 2.0
VMware Identity Manager Integration with Active Directory Federation Services 2.0 VMware Identity Manager J ULY 2015 V 2 Table of Contents Active Directory Federation Services... 2 Configuring AD FS Instance
SafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
Upgrading VMware Identity Manager Connector
Upgrading VMware Identity Manager Connector VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Copyright 2013 Trend Micro Incorporated. All rights reserved.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
Installing and Configuring vcenter Multi-Hypervisor Manager
Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1 This document supports the version of each product listed and supports all subsequent
vsphere Security ESXi 6.0 vcenter Server 6.0 EN-001466-04
ESXi 6.0 vcenter Server 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
Sharp Remote Device Manager (SRDM) Server Software Setup Guide
Sharp Remote Device Manager (SRDM) Server Software Setup Guide This Guide explains how to install the software which is required in order to use Sharp Remote Device Manager (SRDM). SRDM is a web-based
Installing and Configuring vcenter Support Assistant
Installing and Configuring vcenter Support Assistant vcenter Support Assistant 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Xperia TM. Read about how Xperia TM devices can be administered in a corporate IT environment
Xperia TM in Business Mobile Device Management Read about how Xperia TM devices can be administered in a corporate IT environment Device management clients Xperia TM T3 Exchange ActiveSync The my Xperia
What s New in Propalms VPN 3.5?
What s New in Propalms VPN 3.5? Contents Improved Management Console Interface... 2 Inline Help on Management Console... 2 Graphical Dashboard on Management Console... 2 Multiple Authentication Server
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
OnCommand Performance Manager 1.1
OnCommand Performance Manager 1.1 Installation and Setup Guide For Red Hat Enterprise Linux NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501
RemotelyAnywhere. Security Considerations
RemotelyAnywhere Security Considerations Table of Contents Introduction... 3 Microsoft Windows... 3 Default Configuration... 3 Unused Services... 3 Incoming Connections... 4 Default Port Numbers... 4 IP
Sophos SafeGuard Native Device Encryption for Mac Administrator help. Product version: 7
Sophos SafeGuard Native Device Encryption for Mac Administrator help Product version: 7 Document date: December 2014 Contents 1 About SafeGuard Native Device Encryption for Mac...3 1.1 About this document...3
WatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
Sophos Mobile Control Administrator guide. Product version: 3.6
Sophos Mobile Control Administrator guide Product version: 3.6 Document date: November 2013 Contents 1 About Sophos Mobile Control...4 2 About the Sophos Mobile Control web console...7 3 Key steps for
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Proof of Concept Guide
Proof of Concept Guide Version 4.0 Published: OCT-2013 Updated: 2005-2013 Propalms Ltd. All rights reserved. The information contained in this document represents the current view of Propalms Ltd. on the
VMware Workspace Portal Reference Architecture
VMware Workspace Portal 2.1 TECHNICAL WHITE PAPER Table of Contents Executive Summary.... 3 Overview.... 4 Hardware Components.... 5 VMware vsphere.... 5 VMware Workspace Portal 2.1.... 5 VMware Horizon
VMware vcenter Log Insight Security Guide
VMware vcenter Log Insight Security Guide vcenter Log Insight 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
vsphere Replication for Disaster Recovery to Cloud
vsphere Replication for Disaster Recovery to Cloud vsphere Replication 5.8 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
Mobile Admin Security
Mobile Admin Security Introduction Mobile Admin is an enterprise-ready IT Management solution that generates significant cost savings by dramatically increasing the responsiveness of IT organizations facing
Explore the VMware Horizon 6 Toolbox Auditing and Remote Assistance Capabilities
Explore the VMware Horizon 6 Toolbox Auditing and Remote Assistance Capabilities VMware Horizon Toolbox 1.5 WHITE PAPER Table of Contents Downloading Horizon Toolbox.... 3 Auditing Tab.... 4 Auditing Sessions...
BYOD Guidance: BlackBerry Secure Work Space
GOV.UK Guidance BYOD Guidance: BlackBerry Secure Work Space Published 17 February 2015 Contents 1. About this guidance 2. Summary of key risks 3. Secure Work Space components 4. Technical assessment 5.
Endpoint Security Client for Mac
Endpoint Security Client for Mac E80.60 User Guide 23 December 2014 Classification: [Protected] 2014 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are
RSA SecurID Software Token 1.0 for Android Administrator s Guide
RSA SecurID Software Token 1.0 for Android Administrator s Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
VMware Horizon FLEX User Guide
Horizon FLEX 1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
PowerChute TM Network Shutdown Security Features & Deployment
PowerChute TM Network Shutdown Security Features & Deployment By David Grehan, Sarah Jane Hannon ABSTRACT PowerChute TM Network Shutdown (PowerChute) software works in conjunction with the UPS Network
Product Manual. MDM On Premise Installation Version 8.1. Last Updated: 06/07/15
Product Manual MDM On Premise Installation Version 8.1 Last Updated: 06/07/15 Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland Tel: + 41 52 632 0411 Fax: + 41 52 672 2010 www.parallels.com
Ensuring Enterprise Data Security with Secure Mobile File Sharing.
A c c e l l i o n S e c u r i t y O v e r v i e w Ensuring Enterprise Data Security with Secure Mobile File Sharing. Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite
User Guide. Version R91. English
AuthAnvil User Guide Version R91 English August 25, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
Unifying Information Security. Implementing TLS on the CLEARSWIFT SECURE Email Gateway
Unifying Information Security Implementing TLS on the CLEARSWIFT SECURE Email Gateway Contents 1 Introduction... 3 2 Understanding TLS... 4 3 Clearswift s Application of TLS... 5 3.1 Opportunistic TLS...
ACE Management Server Deployment Guide VMware ACE 2.0
Technical Note ACE Management Server Deployment Guide VMware ACE 2.0 This technical note provides guidelines for the deployment of VMware ACE Management Servers, including capacity planning and best practices.
MaaS360 Mobile Enterprise Gateway
MaaS360 Mobile Enterprise Gateway Administrator Guide Copyright 2014 Fiberlink, an IBM Company. All rights reserved. Information in this document is subject to change without notice. The software described
VMware vsphere Data Protection 6.0
VMware vsphere Data Protection 6.0 TECHNICAL OVERVIEW REVISED FEBRUARY 2015 Table of Contents Introduction.... 3 Architectural Overview... 4 Deployment and Configuration.... 5 Backup.... 6 Application
Reconfiguring VMware vsphere Update Manager
Reconfiguring VMware vsphere Update Manager vsphere Update Manager 5.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
EMC Data Protection Search
EMC Data Protection Search Version 1.0 Security Configuration Guide 302-001-611 REV 01 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published April 20, 2015 EMC believes
SOA Software API Gateway Appliance 7.1.x Administration Guide
SOA Software API Gateway Appliance 7.1.x Administration Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software, Inc. Other product names,
Advanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
Security Architecture Whitepaper
Security Architecture Whitepaper 2015 by Network2Share Pty Ltd. All rights reserved. 1 Table of Contents CloudFileSync Security 1 Introduction 1 Data Security 2 Local Encryption - Data on the local computer
Migrating to vcloud Automation Center 6.1
Migrating to vcloud Automation Center 6.1 vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
VMware vsphere Data Protection Advanced 5.5
Data Protection Advanced 5.5 EMC Data Domain Integration TECHNICAL WHITE PAPER Table of Contents Data Domain Configuration... 4 Architecture Overview.... 4 vsphere Data Protection Advanced Client Support....
