Local Accounts and Privileges in Likewise Storage Server Rafal Szczesniak EMC Isilon
|
|
|
- Francis Lindsey
- 10 years ago
- Views:
Transcription
1 Local Accounts and Privileges in Likewise Storage Server Rafal Szczesniak EMC Isilon
2 Introduction to LSASS Likewise Security and Authentication Subsystem Service Identity mapping Name SID/UID/GID Authentication Security Local Accounts Local Privileges 2
3 LSASS Overview 3
4 Local Accounts 4
5 What is an authentication provider? 5
6 Authentication Provider API Resolving LSA_SECURITY_OBJECTs Checking group memberships Authentication Modifying the underlying database contents (add/query/update/delete accounts) 6
7 Authentication Providers teamwork Each provider has its chance until operation succeeds ERROR_NOT_HANDLED I don t know what you re asking for or I don t know how to do that Operation fails if one of providers returns some specific error code or all of them say not handled 7
8 The Local Provider 8
9 Local Provider Supports local user and group accounts Supports well-known provisioned accounts (BUILTIN domain) BUILTIN\Administrators a way of making someone a superuser in the local system Potentially any other provisioned account as needed 9
10 Local Provider (contd.) The provider does not store objects itself, storage layer handles this task Validation layer (thin but expanding) Sam API Storage and more extensive validation layer - SamDb API Default implementation utilises external database for local accounts storage Provisioned upon the first local provider start 10
11 SAM database 11
12 SAM database Three types of object types stored: Domain User Local Group One internal object class Foreign Security Principal (for representing foreign SIDs) Windows account information stored Unix account information is optional (if account is unix-enabled) 12
13 SAM database (contd.) SamDb API provides basic operations Find/Enumerate Add/Update/Delete Get/Set Membership Query/Set Security Default SamDb implementation utilises sqlite backend for database operations thread-safe transaction-protected Sam API called by local provider and rpc server 13
14 SAM database (backend details) Three SQL tables SamDb Objects Local group memberships Database state (version and id counters) Each SamDb* call turned into SQL statement Executed as root (security checks are up to the caller) 14
15 Local Interface Lsa client library (lsa/lsa.h) - common for accessing all authentication providers LsaOpenServer to get the connection handle LsaFindObjects to return the security object(s) LsaOpenEnumObjects, LsaEnumObjects, LsaCloseEnum to enumerate objects LsaAddUser2, LsaModifyUser2, LsaDeleteUser2 LsaCloseServer to close the connection 15
16 RPC interface Interface described in [MS-SAMR] (\pipe\samr) UserInfo and AliasInfo types accessible via ACCOUNT_HANDLE from builtin and local domains SamrLookupName, SamrLookupRid SamrEnumUsers, SamrEnumAliases SamrCreateUser, SamrOpenUser SamrQueryUserInfo, SamrSetUserInfo SamrClose 16
17 RPC interface (contd.) 17
18 RPC interface (contd.) Interface described in [MS-LSAT] (\pipe\lsarpc) Name/SID resolver accessible via POLICY_HANDLE LsarLookupName[23] LsarLookupSid[2] 18
19 RPC interface (contd.) 19
20 Privileges 20
21 What are the privileges for? Securing functionality that cannot be protected with Security Descriptors Security by-pass for certain (typically systemlevel) operations Apply to the local system only Can be granted to any security object identifable by a SID (e.g. domain user accounts) 21
22 What are the privileges for? (contd.) Examples: SeChangeTimeZonePrivilege SeRemoteShutdownPrivilege SeBackupPrivilege ISI_PRIV_HTTP ISI_PRIV_SMB 22
23 Privileges and Lsa Accounts 23
24 Privileges and Lsa Accounts No multiple-provider model All LsaPriv* client calls are handled by the Privileges (and Lsa Accounts) server 24
25 Privileges Storage 25
26 Privileges Stored in in-memory hash table mapping privilege names to values The database is initialised from two sources: Builtin (hardcoded) table Registry key The privilege value is represented by LUID (Locally Unique Identifier) in fact a 64-bit number 26
27 Lsa Accounts Storage 27
28 Lsa Accounts Lsa Account attributes: Account SID Privileges granted (fixed-size array) System Access Rights granted Security Descriptor Lsa Account is not the same as Local Account 28
29 Lsa Accounts (contd.) Stored in in-memory hash table holding LSA_ACCOUNT objects indexed by Lsa Account SID Hash table initialised from the registry database after the privileges table is ready All LSA_ACCOUNT updates in the hash table end up in the registry database as well 29
30 System Access Rights Bitmask controlling how the local system can be accessed Allow or Deny: Interactive access Network access Remote Interactive access Limited use right now since Likewise server is accessed primarily via SMB/SMB2 (network access) 30
31 Local Interface Employs Account Rights concept referring to Privileges and System Account Rights collectively by their unique names (see [MS- LSAD]) LsaPrivsAddAccountRights LsaPrivsEnumAccountRights LsaPrivsRemoveAccountRights 31
32 RPC Interface Interface described in [MS-LSAD] (\pipe\lsarpc) Functionality accessible via LSAR_ACCOUNT_HANDLE: LsaCreateAccount, LsaOpenAccount LsaAddPrivilegesToAccount, LsaRemovePrivilegesFromAccount LsaGetSystemAccessAccount, LsaSetSystemAccessAccount... as well as POLICY_HANDLE and Account Rights semantics 32
33 RPC Interface 33
34 The Big Picture 34
35 The Big Picture What do other parts of the system need Map Names/SIDs/UIDs/GIDs Create ACCESS_TOKEN Query group memberships What parts? LWIO I/O service and foundation for the multi-protocol fileserver SRVSVC SMB server configuration service Potentially every new service 35
36 LwMapSecurity Interface 36
37 Access Token Doing security checks with Security Descriptors requires the Access Token representing a user requesting an access Access Token includes (among others): TOKEN_GROUPS (all group memberships) TOKEN_PRIVILEGES (privileges granted) Can be created from user name, SID, UID, GID, login principal or security context LwMapSecurityCreateAccessTokenFrom* 37
38 Access Token (contd.) Before using, privileges in Access Token have to be enabled Only a few are enabled by default (in the database) Checking required privileges is possible by calling RtlPrivilegeCheck (just like RtlAccessCheck for security descriptor checks) 38
39 Name/SID information Other compontents often need to identify a security object (e.g. user, group, machine) Security object can be found by its name, SID, GID, UID LwMapSecurityGetSidFromName, LwMapSecurityGetNameFromSid LwMapSecurityGetSidFromId, LwMapSecurityGetIdFromSid 39
40 Thank you! Questions? Rafal Szczesniak 40
IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE
White Paper IDENTITIES, ACCESS TOKENS, AND THE ISILON ONEFS USER MAPPING SERVICE Abstract The OneFS user mapping service combines a user s identities from different directory services into a single access
Windows Security. CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger. www.cse.psu.edu/~tjaeger/cse497b-s07/
Windows Security CSE497b - Spring 2007 Introduction Computer and Network Security Professor Jaeger www.cse.psu.edu/~tjaeger/cse497b-s07/ Windows Security 0 to full speed No protection system in early versions
Windows Server 2008/2012 Server Hardening
Account Policies Enforce password history 24 Maximum Password Age - 42 days Minimum Password Age 2 days Minimum password length - 8 characters Password Complexity - Enable Store Password using Reversible
MSRPC NULL sessions. Exploitation and protection. Jean-Baptiste Marchand <[email protected]>
MSRPC NULL sessions Exploitation and protection Jean-Baptiste Marchand Jean-Baptiste Marchand Agenda - 2 - Introduction to NULL sessions NULL sessions internals Tools to
ONEFS MULTIPROTOCOL SECURITY UNTANGLED
White Paper ONEFS MULTIPROTOCOL SECURITY UNTANGLED Abstract This paper describes the role that identity management, authentication, and access control play in the security system of the EMC Isilon OneFS
Security Content Update Release Notes for CCS 11.0. 2013-1 Update
Security Content Update Release Notes for CCS 11.0 2013-1 Update Security Content Update 2013-1 Release Notes Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
Windows servers. NT networks
Windows servers The NT security model NT networks Networked NT machines can be: Primary Domain controller Centralizes user database/authentication Backup Domain controller Domain member Non-domain member
Web. Security Options Comparison
Web 3 Security Options Comparison Windows Server 2003 provides a number of Security Options that can be applied within the scope of managing a GPO. Most are the same as those available in Windows 2000.
Allion Ingrasys Europe. NAStorage. Security policy under a UNIX/LINUX environment. Version 2.01
Allion Ingrasys Europe NAStorage Security policy under a UNIX/LINUX environment Version 2.01 Security policy under a UNIX/LINUX environment Start Enabling a Unix/Linux Network (NFS Protocol) Adding a UNIX
A COMPARISON BETWEEN THE SAMBA3 AND LIKEWISE LWIOD FILE SERVERS
A COMPARISON BETWEEN THE SAMBA3 AND LIKEWISE LWIOD FILE SERVERS May 7, 2010 Outline Overview Architecture Feature Set Administrator Perspective Developer Perspective Overview 18 years development GPLv3
Unifying Authorization Models
Unifying Authorization Models Merging /etc/group and 'Domain Users' Gerald Carter Centeris [email protected] http://www.samba.org/ Slide 1 Copyright G. Carter, 2006 Outline http://samba.org/~jerry/slides/lwny07_2up.pdf
These notes are for upgrading the Linko Version 9.3 MS Access database to a SQL Express 2008 R2, 64 bit installations:
These notes are for upgrading the Linko Version 9.3 MS Access database to a SQL Express 2008 R2, 64 bit installations: This document substitutes for STEPS TWO and THREE of the upgrade Game Plan Webpage
PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES
M-FILES CORPORATION PROTECTING DATA IN TRANSIT WITH ENCRYPTION IN M-FILES VERSION 8 24 SEPTEMBER 2014 Page 1 of 8 CONTENTS 1. Overview... 3 2. Encryption of Data in Transit in M-Files... 4 HTTPS... 4 RPC
About Microsoft Windows Server 2003
About Microsoft Windows Server 003 Windows Server 003 (WinK3) requires extensive provisioning to meet both industry best practices and regulatory compliance. By default the Windows Server operating system
NAStorage. Administrator Guide. Security Policy Of NAStorage Under UNIX/LINUX Environment
NAStorage Administrator Guide Security Policy Of NAStorage Under UNIX/LINUX Environment Version 1.00 10/01/2002 Prepared by: Leon Hsu TS Engineer Ingrasys Technology Inc. E-mail: [email protected] UNIX/LINUX
How to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005
Microsoft Auditing Events for Windows 2000/2003 Active Directory. By Ed Ziots Version 1.6 9/20/2005 Revision 1.3: Cleaned up resources and added additional detail into each auditing table. Revision 1.4:
Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA
Handling POSIX attributes for trusted Active Directory users and groups in FreeIPA Alexander Bokovoy May 21th, 2015 Samba Team / Red Hat 0 A crisis of identity (solved?) FreeIPA What is
Windows security for n00bs part 1 Security architecture & Access Control
Grenoble INP Ensimag _ (in)security we trust _!! SecurIMAG 2011-05-12 Windows security for n00bs part 1 Security architecture & Access Control Description: whether you are in favor or against it, the Windows
EMC Celerra Network Server
EMC Celerra Network Server Release 5.6.47 Using Windows Administrative Tools with Celerra P/N 300-004-139 REV A02 EMC Corporation Corporate Headquarters: Hopkintons, MA 01748-9103 1-508-435-1000 www.emc.com
SYMANTEC BACKUPEXEC2010 WITH StorTrends
SYMANTEC BACKUPEXEC2010 WITH StorTrends 1 Index 1. Introduction 3 2. Test Environment 3 3. System Requirement 4 4. Storage Requirement 4 5. Installation of Symantec Backup EXEC 2010 4 6. Installing Backup
Before deploying SiteAudit it is recommended to review the information below. This will ensure efficient installation and operation of SiteAudit.
SiteAudit Knowledge Base Deployment Check List June 2012 In This Article: Platform Requirements Windows Settings Discovery Configuration Before deploying SiteAudit it is recommended to review the information
Objectives. Windows 7 Security. Desktop OS Market Share. Windows Background. CS140M Fall 2014. Lake
Objectives Windows 7 Security By Al Fall 2014 CS 140M LBCC Background Windows Security Architecture Windows Vulnerabilities Means of Evaluating Metrics System Hardening Windows Defenses OS Security Capabilities
Using Single Sign-on with Samba. Appendices. Glossary. Using Single Sign-on with Samba. SonicOS Enhanced
SonicOS Enhanced Using Single Sign-on with Samba Using Single Sign-on with Samba Introduction Recommended Versions Caveats SonicWALL Single Sign-on in Windows SonicWALL Single Sign-on with Samba Checking
Computer Security: Principles and Practice
Computer Security: Principles and Practice Chapter 24 Windows and Windows Vista Security First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Windows and Windows Vista Security
USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE
White Paper USING USER ACCESS CONTROL LISTS (ACLS) TO MANAGE FILE PERMISSIONS WITH A LENOVO NETWORK STORAGE DEVICE CONTENTS Executive Summary 1 Introduction 1 Audience 2 Terminology 2 Windows Concepts
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
CIS 551 / TCOM 401 Computer and Network Security
CIS 551 / TCOM 401 Computer and Network Security Spring 2007 Lecture 3 1/18/07 CIS/TCOM 551 1 Announcements Email project groups to Jeff (vaughan2 AT seas.upenn.edu) by Jan. 25 Start your projects early!
White Paper BMC Remedy Action Request System Security
White Paper BMC Remedy Action Request System Security June 2008 www.bmc.com Contacting BMC Software You can access the BMC Software website at http://www.bmc.com. From this website, you can obtain information
Windows Security Environment
Motivation Popularity, widespread use of Windows Big surface, big impact Protection via user/kernel architecture and CPU modes Multiple-users environment, same physical resources Easy to install < security
Configuring and Using the TMM with LDAP / Active Directory
Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring
EMC VNXe Series. Security Configuration Guide. Version 3.1 302-000-198 REV 04
EMC VNXe Series Version 3.1 Security Configuration Guide 302-000-198 REV 04 Copyright 2014-2015 EMC Corporation. All rights reserved. Published in USA. Published July, 2015 EMC believes the information
Using Windows Administrative Tools on VNX
EMC VNX Series Release 7.0 Using Windows Administrative Tools on VNX P/N 300-011-833 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2011 -
IMF Tune Quarantine & Reporting Running SQL behind a Firewall. WinDeveloper Software Ltd.
IMF Tune Quarantine & Reporting Running SQL behind a Firewall WinDeveloper Software Ltd. 1 Basic Setup Quarantine & Reporting Web Interface must be installed on the same Windows Domain as the SQL Server
Implementing a SAS Metadata Server Configuration for Use with SAS Enterprise Guide
Implementing a SAS Metadata Server Configuration for Use with SAS Enterprise Guide Step 1: Setting Up Required Users and Groups o Windows Operating Systems Only Step 2: Installing Software Using the SAS
Avatier Identity Management Suite
Avatier Identity Management Suite Migrating AIMS Configuration and Audit Log Data To Microsoft SQL Server Version 9 2603 Camino Ramon Suite 110 San Ramon, CA 94583 Phone: 800-609-8610 925-217-5170 FAX:
User Setup for SQL Security
User Setup for SQL Security This section describes SQL security needed for MoversSuite and Microsoft Dynamics GP users. SQL Security for MoversSuite Users MoversSuite integrates with Windows Authentication
Managing Access Control in PresSTORE
Managing Access Control in PresSTORE This article describes the functions to limit access for users in PresSTORE and discusses some scenarios as examples how to to configure non-administrator restore functions.
The Win32 Network Management APIs
The Win32 Network Management APIs What do we have in this session? Intro Run-Time Requirements What's New in Network Management? Windows 7 Windows Server 2003 Windows XP Network Management Function Groups
FreeIPA Cross Forest Trusts
Alexander Bokovoy Andreas Schneider May 10th, 2012 1 FreeIPA What is FreeIPA? Cross Forest Trusts 2 Samba 3 Demo Talloc Tutorial Pavel Brezina wrote Talloc tutorial! http://talloc.samba.org/
6231B: Maintaining a Microsoft SQL Server 2008 R2 Database
6231B: Maintaining a Microsoft SQL Server 2008 R2 Database Course Overview This instructor-led course provides students with the knowledge and skills to maintain a Microsoft SQL Server 2008 R2 database.
EMC ISILON MULTIPROTOCOL DATA ACCESS WITH A UNIFIED SECURITY MODEL
White Paper EMC ISILON MULTIPROTOCOL DATA ACCESS WITH A UNIFIED SECURITY MODEL Abstract This paper explains how the unified security model of EMC Isilon OneFS 6.5.5 resolves mismatches between the permissions
Windows Server 2003 default services
Windows Server 2003 default services To view a description for a particular service, hover the mouse pointer over the service in the Name column. The descriptions included here are based on Microsoft documentation.
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes
STEALTHbits Technologies, Inc. StealthAUDIT v5.1 System Requirements and Installation Notes June 2011 Table of Contents Overview... 3 Installation Overview... 3 Hosting System Requirements... 4 Recommended
Active Directory and Linux Identity Management
Active Directory and Linux Identity Management Published by the Open Source Software Lab at Microsoft. December 2007. Special thanks to Chris Travers, Contributing Author to the Open Source Software Lab.
SANS Institute First Five Quick Wins
#1 QUICK WIN- APPLICATION WHITELISTING SANS Critical Controls: #2: Inventory of Authorized and Unauthorized Software 1) Deploy application whitelisting technology that allows systems to run software only
Tool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
Security Options... 1
Effective Server Security Options Period: Last 20 week(s) Generated: For: Brian Bartlett [email protected] By: Ecora Auditor Professional 4.5 - Windows Module 4.5.8010.20310 Using: Customized FFR Definition
Solaris CIFS Service CIFS. Alan Wright [email protected]
Solaris CIFS Service CIFS Alan Wright [email protected] Solaris CIFS Service Windows Interoperability opensolaris First-class Solaris Citizen kernel based protocol (a la NFS) file system (vfs and zfs) support
84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff
84-01-31 Windows NT Server Operating System Security Features Carol A. Siegel Payoff This article is designed to provide security administrators with a security checklist for going live with Windows NT.
SAMBA VI: As a Domain Controller
Page 1 of 8 DocIndex Search Main - DocIndex - Connectivity SAMBA VI: As a Domain Controller Running A Linux Primary Domain Controller Joining Windows Machines To The Domain Making Your Life Easier Going
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
ESM s management across multi-platforms eliminates the need for various account managers.
DetectIT & Axent s ESM Product Description Axent s Enterprise Security Manager (ESM) provides enterprise-wide, multi-platform management that simplifies and centralizes the administration of security.
User Rights. 7.5.15 vjj 1
User Rights 7.5.15 vjj 1 User Rights některá oprávnění nelze (snadno) vyjádřit pomocí přístupových práv k objektům user rights 7.5.15 vjj 2 7.5.15 vjj 3 User Rights User rights fall into two general categories:
Univention Corporate Server. Operation of a Samba domain based on Windows NT domain services
Univention Corporate Server Operation of a Samba domain based on Windows NT domain services 2 Table of Contents 1. Components of a Samba domain... 4 2. Installation... 5 3. Services of a Samba domain...
How To Configure Vnx 7.1.1 (Vnx) On A Windows-Only Computer (Windows) With A Windows 2.5 (Windows 2.2) (Windows 3.5) (Vnet) (Win
EMC é VNX dm Series Release 7.1 Configuring VNX dm User Mapping P/N 300-013-811 Rev 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright â 2009-2012
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite. www.lepide.com/2020-suite/
Achieving PCI COMPLIANCE with the 2020 Audit & Control Suite 7. Restrict access to cardholder data by business need to know PCI Article (PCI DSS 3) Report Mapping How we help 7.1 Limit access to system
Installing Kaspersky Security Center 10.0 on Microsoft Windows Server 2012 Core Mode
Installing Kaspersky Security Center 10.0 on Microsoft Windows Server 2012 Core Mode Version Date Editor Comments 1.0 17 th January 2012 Pavel Polyansky Initial version. Introduction Server Core is a minimal
Security White Paper The Goverlan Solution
Security White Paper The Goverlan Solution The Goverlan Administration Suite (which includes the following modules: Administration & Diagnostics, Remote Control, Scope Actions, and WMIX) is a powerful
FILE SYSTEM AUDITING WITH EMC ISILON AND EMC COMMON EVENT ENABLER
FILE SYSTEM AUDITING WITH EMC ISILON AND EMC COMMON EVENT ENABLER Abstract This guide outlines best practices to configure a File System Audit solution in SMB and NFS environments with EMC Isilon, And
CONFIGURING ACTIVE DIRECTORY IN LIFELINE
White Paper CONFIGURING ACTIVE DIRECTORY IN LIFELINE CONTENTS Introduction 1 Audience 1 Terminology 1 Test Environment 2 Joining a Lenovo network storage device to an AD domain 3 Importing Domain Users
6WRUP:DWFK. Policies for Dedicated SQL Servers Group
OKENA 71 Second Ave., 3 rd Floor Waltham, MA 02451 Phone 781 209 3200 Fax 781 209 3199 6WRUP:DWFK Policies for Dedicated SQL Servers Group The sample policies shipped with StormWatch address both application-specific
CIS 551 / TCOM 401 Computer and Network Security. Spring 2005 Lecture 4
CIS 551 / TCOM 401 Computer and Network Security Spring 2005 Lecture 4 Access Control: The Big Picture Objects - resources being protected E.g. files, devices, etc. Subjects - active entities E.g. processes,
Implementing Alternate Data Streams in Likewise Storage Services Wei Fu <[email protected]> Software Engineer Likewise Software
Implementing Alternate Data Streams in Likewise Storage Services Wei Fu Software Engineer Likewise Software Outline Introduction to Likewise Storage Services What is an ADS (Alternative
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
About the Authors Fundamentals p. 1 Introduction to LDAP and Active Directory p. 3 A Brief History of Directory Services p. 3 Definition of LDAP p.
Listings p. xv Tables p. xix Foreword p. xxi Preface p. xxiii Acknowledgments p. xxix About the Authors p. xxxi Fundamentals p. 1 Introduction to LDAP and Active Directory p. 3 A Brief History of Directory
Cloud Services ADM. Agent Deployment Guide
Cloud Services ADM Agent Deployment Guide 10/15/2014 CONTENTS System Requirements... 1 Hardware Requirements... 1 Installation... 2 SQL Connection... 4 AD Mgmt Agent... 5 MMC... 7 Service... 8 License
Likewise Open Installation and Administration Guide
Likewise Open Installation and Administration Guide Last updated: March 30, 2011. Abstract This guide describes how to install and manage Likewise Open, an open source version of the Likewise agent that
Using NFS v4 ACLs with Samba in a multiprotocol environment
Using NFS v4 ACLs with Samba in a multiprotocol environment Alexander Werth IBM 2009 IBM Corporation Using NFS v4 ACLs with Samba in a multiprotocol environment Use multiple protocols with different authorization
Introduction to Computer Security
Introduction to Computer Security Windows Security Pavel Laskov Wilhelm Schickard Institute for Computer Science Microsoft Windows Family Tree Key security milestones: NT 3.51 (1993): network drivers and
Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley
Likewise Enterprise Using Likewise Enterprise to Boost Compliance with Sarbanes-Oxley IMPROVE SOX COMPLIANCE WITH CENTRALIZED ACCESS CONTROL AND AUTHENTICATION With Likewise Enterprise, you get one user,
Comprehensive List of XenDesktop Event Log Entries
Comprehensive List of XenDesktop Event Log Entries VDA Events 1200 Error Exception '%1' of type '%2' while starting the service. The service will now stop. When VDA fails to initialise or start. Renaming
SQL Server Automated Administration
SQL Server Automated Administration To automate administration: Establish the administrative responsibilities or server events that occur regularly and can be administered programmatically. Define a set
CSE331: Introduction to Networks and Security. Lecture 34 Fall 2006
CSE331: Introduction to Networks and Security Lecture 34 Fall 2006 Announcements Problem with Crypto.java Look for a new Crypto.java file later today Project 4 is due Dec. 8th at midnight. Homework 3 is
ADO and SQL Server Security
ADO and SQL Server Security Security is a growing concern in the Internet/intranet development community. It is a constant trade off between access to services and data, and protection of those services
SQL Tuning and Maintenance for the Altiris Deployment Server express database.
Article ID: 22953 SQL Tuning and Maintenance for the Altiris Deployment Server express database. Question Now Deployment Server is installed how do I manage the express database? Topics that will be covered
FreeIPA 3.3 Trust features
FreeIPA 3.3 features Sumit Bose, Alexander Bokovoy March 2014 FreeIPA and Active Directory FreeIPA and Active Directory both provide identity management solutions on top of the Kerberos infrastructure
PRiSM Security. Configuration and considerations
PRiSM Security Configuration and considerations Agenda Security overview Authentication Adding a User Security Groups Security Roles Asset Roles Security Overview Three Aspects of Security Authentication
Synthetic Application Monitoring
Synthetic Application Monitoring... Andrew Martin Senior Technical Consultant Contents End User Experience Monitoring - Synthetic Transactions 3 Argent and Synthetic Transactions 3 Web Based Application
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
OPAS Prerequisites. Prepared By: This document contains the prerequisites and requirements for setting up OPAS.
OPAS Prerequisites This document contains the prerequisites and requirements for setting up OPAS. Prepared By: Luke Swords Principal Consultant 24/06/2015 Version 1.0 Contact Information Infront Consulting
Xerox DocuShare Security Features. Security White Paper
Xerox DocuShare Security Features Security White Paper Xerox DocuShare Security Features Businesses are increasingly concerned with protecting the security of their networks. Any application added to a
General DBA Best Practices
General DBA Best Practices An Accelerated Technology Laboratories, Inc. White Paper 496 Holly Grove School Road West End, NC 27376 1 (800) 565-LIMS (5467) / 1 (910) 673-8165 1 (910) 673-8166 (FAX) E-mail:
Getting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
SerNet. Samba Status Update. Munich 13. March 2008. Volker Lendecke SerNet Samba Team. Network Service in a Service Network
Samba Status Update Munich 13. March 2008 Volker Lendecke SerNet Samba Team 03/2008, Volker Lendecke, SerNet Service Network GmbH, Seite 1 Volker Lendecke Co-founder SerNet - Service Network GmbH Free
Manipulating Microsoft SQL Server Using SQL Injection
Manipulating Microsoft SQL Server Using SQL Injection Author: Cesar Cerrudo ([email protected]) APPLICATION SECURITY, INC. WEB: E-MAIL: [email protected] TEL: 1-866-9APPSEC 1-212-947-8787 INTRODUCTION
How to Create a Delegated Administrator User Role / To create a Delegated Administrator user role Page 1
Managing user roles in SCVMM How to Create a Delegated Administrator User Role... 2 To create a Delegated Administrator user role... 2 Managing User Roles... 3 Backing Up and Restoring the VMM Database...
User Migration Tool. Note. Staging Guide for Cisco Unified ICM/Contact Center Enterprise & Hosted Release 9.0(1) 1
The (UMT): Is a stand-alone Windows command-line application that performs migration in the granularity of a Unified ICM instance. It migrates only Unified ICM AD user accounts (config/setup and supervisors)
Installation Guide NetIQ AppManager
Installation Guide NetIQ AppManager April 2016 www.netiq.com/documentation Legal Notice NetIQ AppManager is covered by United States Patent No(s): 05829001, 05986653, 05999178, 06078324, 06397359, 06408335.
WirelessOffice Administrator LDAP/Active Directory Support
Emergin, Inc. WirelessOffice Administrator LDAP/Active Directory Support Document Version 6.0R02 Product Version 6.0 DATE: 08-09-2004 Table of Contents Objective:... 3 Overview:... 4 User Interface Changes...
Managing Celerra for the Windows Environment
Managing Celerra for the Windows Environment P/N 300-002-679 Rev A01 March 2006 Contents Introduction..................................................3 Windows and multiprotocol documentation....................3
Redpaper Axel Buecker Kenny Chow Jenny Wong
Redpaper Axel Buecker Kenny Chow Jenny Wong A Guide to Authentication Services in IBM Security Access Manager for Enterprise Single Sign-On Introduction IBM Security Access Manager for Enterprise Single
NTP Software File Auditor for NAS, EMC Edition
NTP Software File Auditor for NAS, EMC Edition Installation Guide June 2012 This guide provides a short introduction to the installation and initial configuration of NTP Software File Auditor for NAS,
IBM Security Identity Manager Version 6.0. Security Guide SC14-7699-02
IBM Security Identity Manager Version 6.0 Security Guide SC14-7699-02 IBM Security Identity Manager Version 6.0 Security Guide SC14-7699-02 Note Before using this information and the product it supports,
Server Installation Procedure - Load Balanced Environment
Server Installation Procedure - Load Balanced Environment 1. Introduction This document explains a step-by-step procedure in case BackupAgent BV performs an installation of the BackupAgent Server Software
EventSentry Overview. Part I Introduction 1 Part II Setting up SQL 2008 R2 Express 2. Part III Setting up IIS 9. Part IV Installing EventSentry 11
Contents I EventSentry Overview Part I Introduction 1 Part II Setting up SQL 2008 R2 Express 2 1 Downloads... 2 2 Installation... 3 3 Configuration... 7 Part III Setting up IIS 9 1 Installation... 9 Part
