DIGIPASS Authentication for Windows Logon Product Guide 1.1
|
|
|
- Grace Norris
- 10 years ago
- Views:
Transcription
1 DIGIPASS Authentication for Windows Logon Product Guide 1.1
2 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express or implied, including but not limited to warranties of merchantable quality, merchantability of fitness for a particular purpose, or those arising by law, statute, usage of trade or course of dealing. The entire risk as to the results and performance of the product is assumed by you. Neither we nor our dealers or suppliers shall have any liability to you or any other person or entity for any indirect, incidental, special or consequential damages whatsoever, including but not limited to loss of revenue or profit, lost or damaged data of other commercial or economic loss, even if we have been advised of the possibility of such damages or they are foreseeable; or for claims by a third party. Our maximum aggregate liability to you, and that of our dealers and suppliers shall not exceed the amount paid by you for the Product. The limitations in this section shall apply whether or not the alleged breach or default is a breach of a fundamental condition or term, or a fundamental breach. Some states/countries do not allow the exclusion or limitation or liability for consequential or incidental damages so the above limitation may not apply to you. Copyright Copyright 2011 VASCO Data Security, Inc., VASCO Data Security International GmbH. All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted, in any form or by any means, electronic, mechanical, photocopying, recording, or otherwise, without the prior written permission of VASCO Data Security Inc. Trademarks VASCO, Vacman, IDENTIKEY, axsguard, DIGIPASS, and are registered or unregistered trademarks of VASCO Data Security, Inc. and/or VASCO Data Security International GmbH in the U.S. and other countries. Document Version: 1.9
3 Table of Contents Table of Contents 1 Overview Windows Logon with a DIGIPASS What is a DIGIPASS? How does DIGIPASS Authentication for Windows Logon Work? DIGIPASS Authentication for Windows Logon Components Available Guides User Authentication Online One Time Password Authentication Offline One Time Password Authentication Force OTP Use DIGIPASS Authentication for Windows Logon Features Dynamic Component Registration Static Password Static Password Randomization User Locking Deployment What Is Needed? Server Discovery for DIGIPASS Authentication for Windows Logon Client Configuration DIGIPASS Authentication for Windows Logon Client Registration Configuration User Locking Configuration How to Distribute Client Installation Software DIGIPASS Token Assignment DIGIPASS Authentication for Windows Logon With IDENTIKEY Server on Linux Licensing Add License for DIGIPASS Authentication for Windows Logon Technical Support Glossary DIGIPASS Authentication for Windows Logon Product Guide 3
4 Overview 1 Overview 1.1 Windows Logon with a DIGIPASS DIGIPASS Authentication for Windows Logon is a product that allows a User to log on to Windows using a DIGIPASS. DIGIPASS Authentication for Windows Logon integrates seamlessly with the existing Windows logon system. The User ID is entered along with a One Time Password generated by the DIGIPASS. The existing Windows static password is released and passed to the Windows logon system. The DIGIPASS Authentication for Windows Logon product securely stores the Windows static password using strong encryption. 1.2 What is a DIGIPASS? A DIGIPASS Authentication for Windows Logon token is a device for providing One Time Passwords to a User. A DIGIPASS Authentication for Windows Logon token may be provided to each person whom an organization wishes to be able to log into their system using a One Time Password (OTP). The User obtains an OTP from the DIGIPASS Authentication for Windows Logon token to use instead of, or as well as, a static password when logging in. For more information about DIGIPASS Authentication for Windows Logon, refer to the DIGIPASS section of the IDENTIKEYServer Product Guide. DIGIPASS Authentication for Windows Logon Product Guide 4
5 Overview 1.3 How does DIGIPASS Authentication for Windows Logon Work? Image 1: DIGIPASS Authentication for Windows Logon Overview Architecture Components Client PC The client PC contains the DIGIPASS Authentication for Windows Logon client module. Windows Logon Client The Windows Logon client module collects the authentication credentials entered by the User. It performs a DNS lookup to locate the correct IDENTIKEY Server. The Windows Logon client module delegates OTP validation to IDENTIKEY Server. IDENTIKEY Server During advanced installation, the IDENTIKEY Server automatically registers its location with the DNS Server, enabling the Windows Logon client to automatically locate it. The IDENTIKEY Server recieves input from the Windows Logon client and processes the authentication request. It sends the authentication request results back to the client PC. DIGIPASS Authentication for Windows Logon Product Guide 5
6 Overview 1.4 DIGIPASS Authentication for Windows Logon Components DIGIPASS Authentication for Windows Logon consists of Client Components and Server Components. The Client Components are installed on the Client PC and the Server Components are part of IDENTIKEY Server Client Components The Windows Logon Client Module is installed on the Client PC. The Client Module contains: Windows Logon Tray Application For more information, refer to the following sections of the DIGIPASS Authentication for Windows Logon User Manual: Understanding DP Windows Logon Using DP Windows Logon Tray Agent Server Components The DIGIPASS Authentication for Windows Logon Server components are: IDENTIKEY Server Web Administration Interface Active Directory Users and Computers Extension Audit Viewer TCL Command Line Application Password Synchronization Manager (PSM) Refer to the Server Components section of the IDENTIKEY Server Product Guide for more information Communication Protocols All communication between the DIGIPASS Authentication for Windows Logon and IDENTIKEY Server takes place using SEAL, over SSL. 1.5 Available Guides The following DIGIPASS Authentication for Windows Logon guides are available: DIGIPASS Authentication for Windows Logon Product Guide 6
7 Overview DIGIPASS Authentication for Windows Logon Product Guide The Product Guide will introduce you to the features and concepts of DIGIPASS Authentication for Windows Logon and the various options you have for using it. DIGIPASS Authentication for Windows Logon Getting Started Guide The Getting Started Guide will lead you through a standard setup and testing of key DIGIPASS Authentication for Windows Logon features. DIGIPASS Authentication for Windows Logon User Manual For users of DIGIPASS Authentication for Windows Logon. DIGIPASS Authentication for Windows Logon Installation Guide The Installation Guide will help you install and configure DIGIPASS Authentication for Windows Logon to your requirements IDENTIKEY Server Guides The following guides are available for IDENTIKEY Server: Product Guide The Product Guide will introduce the features and concepts of IDENTIKEY Server and the various options you have for using it. Windows Installation Guide Use this guide when planning and working through an installation of IDENTIKEY Server in a Windows environment. Linux Installation Guide Use this guide when planning and working through an installation of IDENTIKEY Server in a Linux environment. Administrator Reference In-depth information required for administration of IDENTIKEY Server. This includes references such as data attribute lists, backup and recovery and utility commands. Getting Started Guide The Getting Started Guide will lead you through a standard setup and testing of key IDENTIKEY Server features. Performance and Deployment Guide Contains information on common deployment models and performance statistics. DIGIPASS Authentication for Windows Logon Product Guide 7
8 Overview Help Files Context-sensitive help accompanies the Administration Web Interface and DIGIPASS Extension for Active Directory Users and Computers. SDK Programmers Guide In-depth information required to develop using the SDK. DIGIPASS Authentication for Windows Logon Product Guide 8
9 User Authentication 2 User Authentication User One Time Password Authentication can be performed either online or offline 2.1 Online One Time Password Authentication For Online OTP Authentication the client machine is connected to the Windows Domain and the DIGIPASS OTP is used to logon to the Windows Domain. Online OTP Authentication is perfomed by the IDENTIKEY Server Process Image 2: Online Authentication Data Flow Online Authentication begins with the User entering their User ID, Password (optional) and OTP. This passes through the Windows Logon client to IDENTIKEY Server. IDENTIKEY Server validates the authentication credentials and generates an authentication result. This Authentication result includes the Windows static password which is used by the Windows Logon Client to perform a Windows domain logon. DIGIPASS Authentication for Windows Logon Product Guide 9
10 User Authentication If Offline Authentication is enabled, IDENTIKEY Server also passes encrypted offline logon data back to the Client PC. The encrypted offline logon data is used in Offline Authentication. See 2.2 Offline One Time Password Authentication for further details about Offline Authentication. 2.2 Offline One Time Password Authentication With Offline One Time Password Authentication the Client machine is not connected to the Windows domain, and the DIGIPASS OTP is used to logon to the local client machine. Offline OTP authentication will authenticate a logon using the Windows Logon client on the Client PC and encrypted offline logon data. This encrypted logon data is generated by IDENTIKEY Server during Online Authentication. See 2.1 Online One Time Password Authentication for further information about Online Authentication. DIGIPASS Authentication for Windows Logon Product Guide 10
11 User Authentication Process Image 3: Offline OTP Authentication Offline OTP Authentication begins with the User entering their User ID, optional Password and OTP. These login credentials pass through the Windows Logon client module. The Windows Logon client module performs the following checks: Is Offline Authentication Data available for the User? Offline Authentication Data is generated after a successful Online Authentication when Offline Authentication is enabled in the Identikey Windows Logon policy. Is the Offline Authentication data still valid? Offline Authentication Data is valid for a limited time for time-based data, or a limited number of logons for event-based data. The time or event limit is defined on the Windows Logon Policy. Does the OTP validation succeed with the Offline Authentication Data? DIGIPASS Authentication for Windows Logon Product Guide 11
12 User Authentication Disable Offline Authentication When Offline Authentication is disabled for a User, be aware of the following: Disabling Offline Authentication for a User means that IDENTIKEY Server will not send any new Encrypted Offline Logon Data to the client PC Disabling Offline Authentication for a User means that the User will still be able to use Offline Authentication from the time that it is disabled until the Encrypted Offline Logon Data has expired OR until the User performs their next Online Authentication. 2.3 Force OTP Use A User may be forced to logon either online or offline using an OTP by utilizing settings in the Windows Logon Client Module. For details on configuring this, refer to the Enforcing DIGIPASS authentication section of the Windows Logon User Manual. DIGIPASS Authentication for Windows Logon Product Guide 12
13 DIGIPASS Authentication for Windows Logon Features 3 DIGIPASS Authentication for Windows Logon Features 3.1 Dynamic Component Registration IDENTIKEY Server requires a client component to be registered for each incoming authentication request. Note Only English ASCII characters are supported for computer names. Names containing non-ascii characters, such as Japanese or Chinese, are not supported with Dynamic Component Registration, Ensure that computer names contain ONLY English ASCII characters. When Dynamic Component Registration (DCR) is enabled in the Identikey Windows Logon policy, IDENTIKEY Server will dynamically create a client component if no client component is found. The registration method depends on the Windows Group Check set in the policy. DIGIPASS Authentication for Windows Logon Product Guide 13
14 DIGIPASS Authentication for Windows Logon Features Image 4: DCR Registration The Windows Logon client component is identified by the following formats: Client machine hostname - If DNS based reverse lookup of an IP address is being used with the DNS suffix not set on the client machine. Fully qualified domain name (FQDN) - If DNS based reverse lookup of an IP address is being used with the DNS suffix set. Note Dynamic Component Registration will fail if a PTR record does not exist on the DNS server for the client machine. A reverse zone must be implemented in order for DCR to function correctly. DIGIPASS Authentication for Windows Logon Product Guide 14
15 DIGIPASS Authentication for Windows Logon Features Group Check To enable Group Check to work correctly in Dynamic Component Registration, the server must be able to reach the client machine. Refer to 4.2.1Hostname Resolution. Also ensure that: The groups named are in the Active Directory domain. Group Check works with Active Directory domain groups only. It will not work with local Windows groups. The group for a client must be defined in the domain that the client will be logging in to. For example, in a parent/child domain setup, if a client is to be used to log in to the child domain, the group must be defined in the child domain. 3.2 Static Password The DIGIPASS Authentication for Windows Logon relies on the Windows static password to perform the Windows logon. It is therefore important that IDENTIKEY Server is always up to date with the current Windows static password for each user. There are two ways to ensure that the static password is up to date: Static Password Synchronization Static Password Randomization Static Password Synchronization Password Synchronization Manager (PSM) is a product that is installed on the Active Directory domain controller which allows a change of the Windows password to be automatically updated on IDENTIKEY Server. The new Windows password will be reflected as the static password on IDENTIKEY Server. If IDENTIKEY Server is not available the synchronization will fail. If the User is not defined on IDENTIKEY Server, only the password on the Domain Controller will be changed. DIGIPASS Authentication for Windows Logon Product Guide 15
16 DIGIPASS Authentication for Windows Logon Features Image 5: Password Synchronization Overview 3.3 Static Password Randomization Overview Static Password Randomization means that the User's Windows static password is replaced by a randomly generated password during logon. The User only enters their User ID and the OTP, and the password is generated in the background. By randomizing the static password, the User is prevented from logging in to Windows on a machine which does not have the DIGIPASS Authentication for Windows Logon installed as the User is unable to enter a correct random password. Static Password Randomization is enabled on the Identikey Windows Logon policy that is being used. DIGIPASS Authentication for Windows Logon Product Guide 16
17 DIGIPASS Authentication for Windows Logon Features Static Password Randomization is only available when Windows Back-End Authentication, or Active Directory Back- End Authentication is enabled. Static Password Randomization is not available for ADAM, Tivoli, or Novell e- Directory Back-End Authentication Password Format The format for the new password will meet the following criteria: Password length default length is 16 characters, but default may be overridden by specifying a password length on the Identikey Windows Logon policy Character set the random password will consist of the following character set: a to z A to Z 0 to 9 printable symbols -!@#%^&*()' +=-_[]\ /?<> Complexity requirements: The random password must not contain the User's User ID or parts of the User's full name that exceed two consecutive characters. The random password must contain characters from three of the four character set components listed above. The password complexity requirements are taken from the Microsoft Windows 2003 Active Directory password requirements and guarantee a successful Windows static password Use Static Password Randomization is used to enforce the use of strong authentication on Windows Logon. This may be for the following reasons: The User will not be able to log on to a Windows machine without using an OTP. The User cannot uninstall the DIGIPASS Authentication for Windows Logon and log on using the Windows Static Password only. Regulatory Compliance. Some regulations specify that a strong password must be defined for Windows Logon. The regulations frequently relate to the length of the password, combination of characters in the password, and the frequency with which it must be changed. By using Static Password Randomization better control can be exerted over the regulatory criteria. Generated random passwords can be longer and much more complex than a static password that a User has to remember. DIGIPASS Authentication for Windows Logon Product Guide 17
18 DIGIPASS Authentication for Windows Logon Features Note When using Active Directory, a Minimum Password Age is set in Active Directory Group Policy Management. If the static password is reset on Active Directory Users and Computers Extension and Password Randomization is enabled on IDENTIKEY Server, the 'User must change password at next logon' checkbox must be checked. This will avoid authentication failure at the next login due to the password being too young. 3.4 User Locking Authentications can fail for a number of reasons. The most obvious is that the User does not have authority to use the product they are trying to authenticate themselves with. Use of incorrect User Ids, passwords, OTPs, or DIGIPASS, will result in Authentication failing, and the offending User Account being locked Online Authentication The number of unsuccessful Online Authentications is limited according to the limit values set on the Identikey Windows Logon policy. If the number of authentications goes beyond that specified, the User will be locked Offline Authentication The number of unsuccessful Offline Authentications is limited, and can be set using Active Directory group policies or using a local registry setting. If the number of authentications goes above that specified in the Active Directory group policy the User will be locked Unlock An error message will appear when a User account has been locked. Follow the instructions in the table below to unlcock the appropriate account in the appropriate location: DIGIPASS Authentication for Windows Logon Product Guide 18
19 DIGIPASS Authentication for Windows Logon Features Error Message What To Do No Offline Authentication Data Back-End Authentication failed DIGIPASS account locked Clear offline authenticaiton data (AD or Web Administration Interface) Check DIGIPASS User Account and unlock if necessary User log on and perform online authenticaion. This will renew the offline authentication data. Check Windows Account and unlock if necessary If unlocking doesn't work, reset password in Windows and IDENTIKEY Server Unlock DIGIPASS User Account A User must be unlocked by an administrator using the Users tab of the Web Administration Interface or Active Directory Users and Computers Extension. DIGIPASS Authentication for Windows Logon Product Guide 19
20 Deployment 4 Deployment Note For any of the following functionality to work, each IDENTIKEY Server must be updated to IDENTIKEY Server 3.1 SR1 or higher. 4.1 What Is Needed? Client Module installed on each Windows machine Valid license on IDENTIKEY Server(s) to which client machines will be connecting IDENTIKEY Server Ports During deployment of IDENTIKEY Server the following ports should be made available: SEAL (SSL) - TCP SEAL (non-ssl) - TCP MDC Server - TCP Live audit - TCP SOAP - TCP 8888 RADIUS Auth - UDP 1812 RADIUS Auth - UDP 1813 Failure to make these ports available to the installer may lead to problems during deployment and configuration Client Ports The following port must be available on the DIGIPASS Authentication for Windows Logon Client: Windows Group Check - TCP DNS Registration All IDENTIKEY Servers should be registered with the DNS server(s). This allows Server Discovery, if enabled, to work correctly. DIGIPASS Authentication for Windows Logon Product Guide 20
21 Deployment 4.2 Server Discovery for DIGIPASS Authentication for Windows Logon Client Configuration Server Discovery is used by the DIGIPASS Authentication for Windows Logon client module to identify the location of the IDENTIKEY Server to be used for authentication. Server Discovery is configured using the Web Administration Interface ->System Configuration ->Server Discovery tab, or the IDENTIKEY Server Configuration application. For more information about configuring the server discovery option, refer to the How to Set Up IDENTIKEY Server Discovery section of the IDENTIKEY Server Administrator Guide Hostname Resolution When Dynamic Client Registration or Server Discovery is being used, the following process is followed to identify the server required: 1. The client checks to see if the name queried is its own. 2. The client then searches a local Hosts file. 3. DNS servers are queried. If the above methods fail then NetBIOS name resolution sequence is used as a backup To aid successful Windows Logon client authentication use one of the following methods: 1. Statically add Hosts to the c:\windows\system32\drivers\etc\hosts file 2. Setup reverse lookup for the network the client belongs to. Entries for the IP address of the clients should already be present. Use nslookup <client ipaddress> to resolve to the hostname of the client 3. Enable the NETBIOS Name Service Discovery port(udp Port 137). In Windows 7, if the firewall is turned on (recommended settings), this port is blocked. To enable this port, Turn on Network Discovery using Network Sharing Center->Advanced sharing settings-><profile being used>, or enable the standard rule named Network Discovery (NB-Name-In) in Windows Firewall Inbound Rules Losing Connection Between the Windows Logon client and IDENTIKEY Server If connection is lost between the Windows Logon client and IDENTIKEY Server when using Server Discovery, the connection will not be re-established automatically. To enable connection to be re-established the DNS cache must be flushed. This will allow the connection to be re-established immediately. Alternatively, the default behaviour may be changed by modifying a Windows registry setting on the client machine (see for further information): DIGIPASS Authentication for Windows Logon Product Guide 21
22 Deployment 1. Locate following key in the registry - HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Services\Dnscache\Parameters 2. On the Edit menu, point to New, and then click REG_DWORD. 3. Type ServerPriorityTimeLimit. 4. Press Enter. 5. On the Edit menu, click Modify. 6. Enter Click OK. 4.3 DIGIPASS Authentication for Windows Logon Client Registration Configuration DIGIPASS Authentication for Windows Logon allows Client components to be registered in two ways: Manually using the Web Administration Interface Client Registration page Dynamically using Dynamic Component Registation (DCR) Manual Component Creation To manually create a DIGIPASS Authentication for Windows Logon client component, use the Web Administration Interface Client Registation page and create a client with client type of IDENTIKEY Windows Logon Client Dynamic Component Registration DIGIPASS Authentication for Windows Logon client components can be registered dynamically on IDENTIKEY Server. DCR must be enabled on the Identikey Windows Logon Policy tab and administered via the Web Administration Interface Policy pages. See Hostname Resolution for information regarding DNS Hostname resolution for DCR. 4.4 User Locking Configuration Online Authentication User Locking can be configured using the Locking Thresholds on the User tab of the Windows Logon policy that is being used. DIGIPASS Authentication for Windows Logon Product Guide 22
23 Deployment Note For further details about the Policy or User settings mentioned below, consult the Help files of the Web Administration Interface Offline Authentication Offline Authentication must first be enabled on the Offline Authentication tab of the Policy or User details on the Web Administration Interface. The Offline Authentication threshold must be set using the Active Directory group policy or local Windows registry settings. 4.5 How to Distribute Client Installation Software Please refer to the Deploying DIGIPASS Authentication for Windows Logon Client Software using Group Polocy section of the DIGIPASS Authentication for Windows Logon Installation Guide for client installation software distribution options. 4.6 DIGIPASS Token Assignment In IDENTIKEY Server, DIGIPASS tokens may be assigned to Users in a number of ways, depending on the requirements of your company: Auto Assignment Self Assingment Manual Assignment Note DIGIPASS records must be imported into the data store before being assigned to Users DUR/Auto Assignment Auto Assignment allows the IDENTIKEY Server to automatically assign an available DIGIPASS when a User performs a Windows logon using DIGIPASS Authentication for Windows Logon. After the DIGIPASS has been assigned it must be delivered to the User. Users can continue to logon with their static password while they wait for their DIGIPASS to be delivered to them. The length of the period during which they can continue to logon with their static password can be configured in the Web Administration Interface or the Active Directory User and DIGIPASS Authentication for Windows Logon Product Guide 23
24 Deployment Computers Extension, and is called the Grace Period. The Windows Logon Client can be configured to notify the end user that a specific DIGIPASS has been assigned. Auto Assignment can be combined with Dynamic User Registration (DUR). This combination allows IDENTIKEY Server to automatically assign an available DIGIPASS when a User account is created using DUR. The correct DIGIPASS must then be delivered to the User. A grace period is usually set, which allows a number of days in which the User may still log in using only their static password. See the IDENTIKEY Server Product Guide for further details about DIGIPASS Auto Assignment and DUR settings Self Assignment Self Assignment allows Users to assign themselves a DIGIPASS via a User Self Management Website when using DIGIPASS Authentication for Windows Logon. This enables DIGIPASS to be distributed within an organisation without any administrative work. The end users will typically assign the provided DIGIPASS themselves as part of the Windows Logon process. See the IDENTIKEY Server Product Guide for further details about Self Assignment and the User Self Management Website Manual Assignment During Manual Assignment a DIGIPASS is assigned to an individual User user by an administrator using the Web Administration Interface or the Active Directory User and Computers Extension. The administrator has the option to specify the grace period during manual assignment. See the IDENTIKEY Server Product Guide for further details about DIGIPASS Manual Assignment. DIGIPASS Authentication for Windows Logon Product Guide 24
25 DIGIPASS Authentication for Windows Logon With IDENTIKEY Server on Linux 5 DIGIPASS Authentication for Windows Logon With IDENTIKEY Server on Linux If you use DIGIPASS Authentication for Windows Logon with IDENTIKEY Server in a Linux environment, then the funcitonality will be mostly the same as that described above. The differences for a Linux environment are as follows: A Windows Back-End is not availabe for a Linux environment. Password Randomization Password Randomization can be used with IDENTIKEY Server in a Linux environment with an Active Directory Back-End. Active Directory MUST be installed with SSL enabled to provide an encrypted connection. Password Randomization will not work in this instance with out an encrypted connection. DIGIPASS Authentication for Windows Logon Product Guide 25
26 Licensing 6 Licensing DIGIPASS Authentication for Windows Logon must be enabled in the license for IDENTIKEY Server. 6.1 Add License for DIGIPASS Authentication for Windows Logon Note IDENTIKEY Server must be upgraded to version 3.1 SR1 or higher before installing the license for DIGIPASS Authentication for Windows Logon. A license that includes DIGIPASS Authentication for Windows Logon can be loaded during IDENTIKEY Server installation or can be loaded afterwards using the Web Administration Interface. See the IDENTIKEY Server Product Guide and the IDENTIKEY Server Administrator Reference for further details about Licensing. DIGIPASS Authentication for Windows Logon Product Guide 26
27 Technical Support 7 Technical Support If you encounter problems with a VASCO product please do the following: 1. Check whether your problem has already been solved and reported in the Knowledge Base at the following URL: 2. If there is no solution in the Knowledge Base, please contact the company which supplied you with the VASCO product. If your supplier is unable to solve your problem, they will automatically contact the appropriate VASCO expert. DIGIPASS Authentication for Windows Logon Product Guide 27
28 Technical Support 7.1 Glossary To understand the way that DIGIPASS Authentication for Windows Logon works, the following concepts must be understood. GINA The GINA is the graphical identification and authentication library used by Microsoft Windows 2003 and XP systems, that handles identification and authentication for login. The standard Microsoft-supplied GINA library can be replaced if other authentication methods are to be used, such as DIGIPASS with IDENTIKEY Server. The VASCO GINA is provided with the client side module for Windows Logon Client Module. Credential Provider Windows Vista and Windows 2008 do not use the GINA model. They both use a Credential Provider which, amongst other things, communicates with authentication providers external to Windows. DIGIPASS Authentication for Windows Logon provides a Credential Provider for Windows Vista and Windows IDENTIKEY Server IDENTIKEY Server is a server product designed to support the deployment, use and administration of VASCO's DIGIPASS technology. It can be easily integrated with existing applications using a Software Developer Kit (SDK). Web Administration Interface The Web Administration Interface is the web-based administration system for IDENTIKEY Server. The Web Administration Interface is used to administer Users, DIGIPASS, Policies, Clients, Back-End, Organization, Reports and System Settings. DIGIPASS A DIGIPASS token is a device for providing One Time Passwords to a User. A DIGIPASS token may be provided to each person whom an organization wishes to be able to log into their system using a One Time Password (OTP). The User obtains an OTP from the DIGIPASS to use instead of, or as well as, a static password when logging in. One Time Password A One Time Password (OTP) is a secure password, generated by a DIGIPASS. An OTP can be used to perform a Windows logon using DIGIPASS Authentication for Windows Logon. Online Authentication During online authentication the user logs in to the Windows Domain using an OTP, the one time password is authenticated by IDENTIKEY Server. DIGIPASS Authentication for Windows Logon Product Guide 28
29 Technical Support Offline Authentication During an offline authentication the user logs on to the client PC using an OTP when the client PC is not connected to the network. The OTP is authenticated locally on the client PC. Time Based OTP One Time Passwords may be time based or event based. A time based DIGIPASS will generate a different OTP for the same input data at different times. The time based OTP relies on the time on the DIGIPASS and the time on IDENTIKEY Server being synchronized to within an acceptable tolerance. Event Based OTP An event based OTP uses a numeric counter which increases every time an OTP is generated. This counter ensures every OTP is unique. The DIGIPASS and IDENTIKEY Server need to have synchronized event counters. A tolerance for the difference between the event counters can be set on the Identikey Windows Logon policy setting. Server PIN A Server PIN may be required in addition to the One Time Password. The Server PIN is entered during login with the OTP - instead of a DIGIPASS PIN, which is entered into the DIGIPASS device. In some cases a new Server PIN may need to be set. Policy Policies define how IDENTIKEY Server processes authentication requests. IDENTIKEY Server contains predefined policies for DIGIPASS Authentication for Windows Logon. DIGIPASS Authentication for Windows Logon Product Guide 29
DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1
DIGIPASS Authentication for Windows Logon Getting Started Guide 1.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or
Identikey Server Getting Started Guide 3.1
Identikey Server Getting Started Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without
Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Getting Started
Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Getting Started Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of
IDENTIKEY Server Windows Installation Guide 3.2
IDENTIKEY Server Windows Installation Guide 3.2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
Identikey Server Windows Installation Guide 3.1
Identikey Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
IDENTIKEY Server Windows Installation Guide 3.1
IDENTIKEY Server Windows Installation Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8
IDENTIKEY Appliance Administrator Guide 3.3.5.0 3.6.8 Disclaimer of Warranties and Limitations of Liabilities Legal Notices Copyright 2008 2015 VASCO Data Security, Inc., VASCO Data Security International
IDENTIKEY Server Product Guide 3.0 3.1
IDENTIKEY Server Product Guide 3.0 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without
IDENTIKEY Server Administrator Reference 3.1
IDENTIKEY Server Administrator Reference 3.1 Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express or
MIGRATION GUIDE. Authentication Server
MIGRATION GUIDE RSA Authentication Manager to IDENTIKEY Authentication Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as
Identikey Server Product Guide 3.0 3.1
Identikey Server Product Guide 3.0 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without
DIGIPASS Authentication for GajShield GS Series
DIGIPASS Authentication for GajShield GS Series With Vasco VACMAN Middleware 3.0 2008 VASCO Data Security. All rights reserved. Page 1 of 1 Integration Guideline Disclaimer Disclaimer of Warranties and
Digipass Plug-In for IAS. IAS Plug-In IAS. Microsoft's Internet Authentication Service. Installation Guide
Digipass Plug-In for IAS IAS Plug-In IAS Microsoft's Internet Authentication Service Installation Guide Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations
Identikey Server Administrator Reference 3.1
Identikey Server Administrator Reference 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
DIGIPASS Authentication for Citrix Access Gateway VPN Connections
DIGIPASS Authentication for Citrix Access Gateway VPN Connections With VASCO Digipass Pack for Citrix 2006 VASCO Data Security. All rights reserved. Page 1 of 31 Integration Guideline Disclaimer Disclaimer
DIGIPASS Authentication for Sonicwall Aventail SSL VPN
DIGIPASS Authentication for Sonicwall Aventail SSL VPN With VASCO IDENTIKEY Server 3.0 Integration Guideline 2009 Vasco Data Security. All rights reserved. PAGE 1 OF 52 Disclaimer Disclaimer of Warranties
Check Point FDE integration with Digipass Key devices
INTEGRATION GUIDE Check Point FDE integration with Digipass Key devices 1 VASCO Data Security Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Outlook Web Access With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
INTEGRATION GUIDE. DIGIPASS Authentication for Juniper SSL-VPN
INTEGRATION GUIDE DIGIPASS Authentication for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data
Identikey Server Performance and Deployment Guide 3.1
Identikey Server Performance and Deployment Guide 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is'
INTEGRATION GUIDE. DIGIPASS Authentication for F5 FirePass
INTEGRATION GUIDE DIGIPASS Authentication for F5 FirePass Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security
Strong Authentication in details
Strong Authentication in details Kuznetsov Alexander Technical Account Manager VASCO Core Activities Overview DIGIPASS DIGIPASS Go Range DIGIPASS E-signature DIGIPASS Reader DIGIPASS for Mobile DIGIPASS
DIGIPASS Authentication for Check Point Security Gateways
DIGIPASS Authentication for Check Point Security Gateways With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 38 Disclaimer Disclaimer of Warranties and
DIGIPASS CertiID. Getting Started 3.1.0
DIGIPASS CertiID Getting Started 3.1.0 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties, or conditions, express
DIGIPASS Authentication for Cisco ASA 5500 Series
DIGIPASS Authentication for Cisco ASA 5500 Series With IDENTIKEY Server 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 20 Disclaimer Disclaimer of Warranties and Limitations
DIGIPASS Authentication for Check Point Connectra
DIGIPASS Authentication for Check Point Connectra With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 21 Disclaimer Disclaimer of Warranties and Limitations
INTEGRATION GUIDE. DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Google Apps using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
DIGIPASS Authentication for SonicWALL SSL-VPN
DIGIPASS Authentication for SonicWALL SSL-VPN With VACMAN Middleware 3.0 2006 VASCO Data Security. All rights reserved. Page 1 of 53 Integration Guideline Disclaimer Disclaimer of Warranties and Limitations
INTEGRATION GUIDE. DIGIPASS Authentication for Cisco ASA 5505
INTEGRATION GUIDE DIGIPASS Authentication for Cisco ASA 5505 Disclaimer DIGIPASS Authentication for Cisco ASA5505 Disclaimer of Warranties and Limitation of Liabilities All information contained in this
Digipass Plug-In for IAS troubleshooting guide. Creation date: 15/03/2007 Last Review: 24/09/2007 Revision number: 3
Digipass Plug-In for IAS troubleshooting guide. Creation date: 15/03/2007 Last Review: 24/09/2007 Revision number: 3 Document type: Whitepaper Security status: EXTERNAL Summary This document explains how
INTEGRATION GUIDE. IDENTIKEY Federation Server for Juniper SSL-VPN
INTEGRATION GUIDE IDENTIKEY Federation Server for Juniper SSL-VPN Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO
INTEGRATION GUIDE. General Radius Config
INTEGRATION GUIDE General Radius Config Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no
INTEGRATION GUIDE. DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter
INTEGRATION GUIDE DIGIPASS Authentication for Office 365 using IDENTIKEY Authentication Server with Basic Web Filter Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained
axsguard Gatekeeper Internet Redundancy How To v1.2
axsguard Gatekeeper Internet Redundancy How To v1.2 axsguard Gatekeeper Internet Redundancy How To v1.2 Legal Notice VASCO Products VASCO data Security, Inc. and/or VASCO data Security International GmbH
DIGIPASS as a Service. Google Apps Integration
DIGIPASS as a Service Google Apps Integration April 2011 Table of Contents 1. Introduction 1.1. Audience and Purpose of this Document 1.2. Available Guides 1.3. What is DIGIPASS as a Service? 1.4. About
INTEGRATION GUIDE. DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for Salesforce using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
SafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
NETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
AD Self-Service Suite for Active Directory
The Dot Net Factory AD Self-Service Suite for Active Directory Version 3.6 The Dot Net Factory, LLC. 2005-2011. All rights reserved. This guide contains proprietary information, which is protected by copyright.
DIGIPASS Authentication for Juniper ScreenOS
DIGIPASS Authentication for Juniper ScreenOS With Vasco VACMAN Middleware 3.0 2007 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 53 Disclaimer Disclaimer of Warranties and Limitations
Digipass for Citrix VM3.0: troubleshooting guide. Creation date: 11/07/2007 Last Review: 30/11/2007 Revision number: 2
Digipass for Citrix VM3.0: troubleshooting guide Creation date: 11/07/2007 Last Review: 30/11/2007 Revision number: 2 Document type: Whitepaper Security status: EXTERNAL Summary This document describes
A dm inistrator Reference
Digipass Plug-In for IAS IAS Plug-In Digipass Extension for Active Directory Users and Computers Administration MMC Interface IAS Microsoft's Internet Authentication Service SBR Funk Steel-Belted RADIUS
Creation date: 09/05/2007 Last Review: 31/01/2008 Revision number: 3
Middleware 3.0 troubleshooting Creation date: 09/05/2007 Last Review: 31/01/2008 Revision number: 3 Document type: Whitepaper Security status: EXTERNAL Summary This document explains how to troubleshoot
INTEGRATION GUIDE. DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007
INTEGRATION GUIDE DIGIPASS Authentication for Microsoft Exchange ActiveSync 2007 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided
SafeGuard Enterprise Web Helpdesk
SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk
Internet Redundancy How To. Version 8.0.0
Internet Redundancy How To Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. 1.2. 1.3. 1.4. About this Document... Examples used in this Guide... Documentation Sources... About the AXS GUARD...
SafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Internet Information Services (IIS)
SafeNet Authentication Service Configuration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
DIGIPASS Authentication for Remote Desktop Web Access User Manual 3.4
DIGIPASS Authentication for Remote Desktop Web Access User Manual 3.4 Disclaimer Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without any other warranties,
Strong Authentication for Juniper Networks
Strong Authentication for Juniper Networks SSL VPN SSO and OWA with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright
Digipass Authentication For IIS Basic 3.2
Digipass Authentication For IIS Basic 3.2 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis, without
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
INTEGRATION GUIDE. DIGIPASS Authentication for VMware Horizon Workspace
INTEGRATION GUIDE DIGIPASS Authentication for VMware Horizon Workspace Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
Agent Configuration Guide
SafeNet Authentication Service Agent Configuration Guide SAS Agent for Microsoft Internet Information Services (IIS) Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
axsguard Gatekeeper Open VPN How To v1.4
axsguard Gatekeeper Open VPN How To v1.4 Legal Notice VASCO Products VASCO Data Security, Inc. and/or VASCO Data Security International GmbH are referred to in this document as 'VASCO'. VASCO Products
INTEGRATION GUIDE. DIGIPASS Authentication for Citrix NetScaler (with AGEE)
INTEGRATION GUIDE DIGIPASS Authentication for Citrix NetScaler (with AGEE) Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is';
Synchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012476-001, Revision A Release Date July 2014 Trademarks All intellectual property
OVERVIEW. DIGIPASS Authentication for Office 365
OVERVIEW DIGIPASS for Office 365 Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security assumes no responsibility
Release Notes. Identikey Server Release Notes 3.1
Release Notes Identikey Server Release Notes 3.1 Disclaimer of Warranties and Limitations of Liabilities Disclaimer of Warranties and Limitations of Liabilities The Product is provided on an 'as is' basis,
INTEGRATION GUIDE. DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server
INTEGRATION GUIDE DIGIPASS Authentication for SimpleSAMLphp using IDENTIKEY Federation Server Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document
DC Agent Troubleshooting
DC Agent Troubleshooting Topic 50320 DC Agent Troubleshooting Web Security Solutions v7.7.x, 7.8.x 27-Mar-2013 This collection includes the following articles to help you troubleshoot DC Agent installation
Enterprise Self Service Quick start Guide
Enterprise Self Service Quick start Guide Software version 4.0.0.0 December 2013 General Information: [email protected] Online Support: [email protected] 1 2013 CionSystems Inc. ALL RIGHTS RESERVED.
Portal Administration. Administrator Guide
Portal Administration Administrator Guide Portal Administration Guide Documentation version: 1.0 Legal Notice Legal Notice Copyright 2013 Symantec Corporation. All rights reserved. Symantec, the Symantec
Hyper-V Installation Guide. Version 8.0.0
Hyper-V Installation Guide Version 8.0.0 Table of Contents 1. Introduction... 1 1.1. About this Document... 1 1.2. Documentation and Training... 1 1.3. About the AXS GUARD... 1 1.3.1. Introduction... 1
Strong Authentication for Microsoft SharePoint
Strong Authentication for Microsoft SharePoint with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
RSA Authentication Manager 7.1 Basic Exercises
RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo
Use QNAP NAS for Backup
Use QNAP NAS for Backup BACKUP EXEC 12.5 WITH QNAP NAS Copyright 2010. QNAP Systems, Inc. All Rights Reserved. V1.0 Document revision history: Date Version Changes Apr 2010 1.0 Initial release Note: Information
How to speed up IDENTIKEY DNS lookup of the Windows Logon DAWL client on Windows 7?
KB 150103 How to speed up IDENTIKEY DNS lookup of the Windows Logon DAWL client on Windows 7? Creation date: 27/05/2013 Last Review: 28/06/2013 Revision number: 2 Document type: How To Security status:
I n s t a lla t io n G u id e
Modify these field values (right-click and select Fields) to change text throughout the document: NOTE: Diagrams may appear or disappear depending on these field settings so BE CAREFUL adding and removing
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
2007 Digipass Pack for OWA 2007 Basic Authentication IIS IIS 6 Module Authentication Server web site Digipass Pack for OWA 2007 Basic Authentication
2007 Digipass Pack for OWA 2007 Basic Authentication IIS IIS 6 Module Authentication Server web site Digipass Pack for OWA 2007 Basic Authentication 3.0 dppack Basic Forms Disclaimer of Warranties and
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Configuration Guide. SafeNet Authentication Service. SAS Agent for Microsoft Outlook Web Access 1.06
SafeNet Authentication Service Configuration Guide 1.06 Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Service Desk R11.2 Upgrade Procedure - Resetting USD passwords and unlocking accounts in etrust Web Admin
Service Desk R11.2 Upgrade Procedure - Resetting USD passwords and unlocking accounts in etrust Web Admin Purpose of document The purpose of this document is to assist users in reset their USD passwords
Dell Statistica 13.0. Statistica Enterprise Installation Instructions
Dell Statistica 13.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under a software license or
Strong Authentication for Juniper Networks SSL VPN
Strong Authentication for Juniper Networks SSL VPN with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
How to Secure a Groove Manager Web Site
How to Secure a Groove Manager Web Site Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise noted, the companies, organizations,
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
Transparent Identification of Users
Transparent Identification of Users Websense Web Security Solutions v7.5, v7.6 Transparent Identification of Users 1996 2011, Websense, Inc. All rights reserved. 10240 Sorrento Valley Rd., San Diego, CA
Microsoft Dynamics GP. Workflow Installation Guide Release 10.0
Microsoft Dynamics GP Workflow Installation Guide Release 10.0 Copyright Copyright 2008 Microsoft Corporation. All rights reserved. Complying with all applicable copyright laws is the responsibility of
Reverse Proxy Guide. Version 2.0 April 2016
Version 2.0 April 2016 Reverse Proxy Guide Copyright 2016 iwebgate. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated
Strong Authentication for Microsoft TS Web / RD Web
Strong Authentication for Microsoft TS Web / RD Web with Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Copyright Copyright 2011. CRYPTOCard
Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Tableau Server
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
Active Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: [email protected] Online Support: [email protected] CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
Apache Server Implementation Guide
Apache Server Implementation Guide 340 March Road Suite 600 Kanata, Ontario, Canada K2K 2E4 Tel: +1-613-599-2441 Fax: +1-613-599-2442 International Voice: +1-613-599-2441 North America Toll Free: 1-800-307-7042
Walton Centre. Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure
Page 1 Walton Centre Access and Authentication (network) Document History Date Version Author Changes 01/10/04 1.0 A Cobain L Wyatt 31/03/05 1.1 L Wyatt Update to procedure Page 2 Table of Contents Section
www.stbernard.com Active Directory 2008 Implementation Guide Version 6.3
800 782 3762 www.stbernard.com Active Directory 2008 Implementation Guide Version 6.3 Contents 1 INTRODUCTION... 2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION... 3 2.1 Supported
Contents Notice to Users
Web Remote Access Contents Web Remote Access Overview... 1 Setting Up Web Remote Access... 2 Editing Web Remote Access Settings... 5 Web Remote Access Log... 7 Accessing Your Home Network Using Web Remote
HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE
HELP DOCUMENTATION SSRPM WEB INTERFACE GUIDE Copyright 1998-2013 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form or by any means
SELF SERVICE RESET PASSWORD MANAGEMENT IMPLEMENTATION GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT IMPLEMENTATION GUIDE Copyright 1998-2015 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form
Networking Best Practices Guide. Version 6.5
Networking Best Practices Guide Version 6.5 Summer 2010 Copyright: 2010, CCH, a Wolters Kluwer business. All rights reserved. Material in this publication may not be reproduced or transmitted in any form
Integration Guide. SafeNet Authentication Service. SAS Using RADIUS Protocol with Microsoft DirectAccess
SafeNet Authentication Service Integration Guide SAS Using RADIUS Protocol with Microsoft DirectAccess Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet,
Web Remote Access. User Guide
Web Remote Access User Guide Notice to Users 2005 2Wire, Inc. All rights reserved. This manual in whole or in part, may not be reproduced, translated, or reduced to any machine-readable form without prior
2 Downloading Access Manager 3.1 SP4 IR1
Novell Access Manager 3.1 SP4 IR1 Readme May 2012 Novell This Readme describes the Novell Access Manager 3.1 SP4 IR1 release. Section 1, Documentation, on page 1 Section 2, Downloading Access Manager 3.1
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
Administrators Help Manual
Administrators Help Manual Lepide Active Directory Self Service Lepide Software Private Limited Page 1 Administrators Help Manual for Active Directory Self-Service Lepide Active Directory Self Service
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
DualShield. for. Microsoft TMG. Implementation Guide. (Version 5.2) Copyright 2011 Deepnet Security Limited
DualShield for Implementation Guide (Version 5.2) Copyright 2011 Deepnet Security Limited Copyright 2011, Deepnet Security. All Rights Reserved. Page 1 Trademarks DualShield Unified Authentication, MobileID,
Remote Management Reference
www.novell.com/documentation Remote Management Reference ZENworks 11 Support Pack 3 2014 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
