Frequently asked questions

Size: px
Start display at page:

Download "Frequently asked questions"

Transcription

1 Frequently asked questions

2 FAQ: MicroStrategy 9s/9.5 General What is MicroStrategy 9s? MicroStrategy 9s combines the world s most sophisticated analytics platform with Usher, a revolutionary security platform. It is a recommended security enhancement that will allow organizations to replace traditional user ID and password authentication, eliminating the vulnerability with storing and typing user credentials to access critical systems and information. What is Usher? Usher by MicroStrategy, is a self-service, cloud-based application that allows organizations to implement enterprise-grade cyber security quickly and easily. Usher delivers a simple, seamless, and secure user experience that protects systems integrity across the enterprise. Usher goes beyond securing systems, and addresses four major areas of concern for enterprise security: Increased cyber security for system and application access Seamless access to physical entryways using digital keys Identity verification over the phone or in person 360-degree view of your network Why is MicroStrategy 9s recommended? Many organizations around the world are experiencing increasing pressure from cyber security threats, resulting in a growing number of data breaches. In order to reduce vulnerability to these threats, we recommend the prompt implementation of robust user authentication with MicroStrategy 9s and Usher. What benefits do I get if I upgrade to MicroStrategy 9s? You should upgrade to MicroStrategy 9s to seamlessly and quickly deploy enterprise-ready analytics and enterprise-grade security to your organization. The combination of MicroStrategy 9s and Usher will allow your organization to swiftly replace user IDs and password authentication, eliminating the vulnerability of typing user credentials to access critical systems and information.

3 What new features are added to MicroStrategy 9s? MicroStrategy 9s is entirely focused on delivering enterprise-grade security to the analytics platform. In order to make this the lightest possible upgrade for all MicroStrategy customers, the main feature included as part of this release is to enable Usher as a new authentication method to login to MicroStrategy Analytics projects. These changes require upgrades to the Mobile Server, Web Server, and Intelligence Server. The following functionalities are included as part of this version: Web primary login using Usher QR code Mobile (ios) primary login using app switching Web second-factor authentication using user ID, password, and Usher code When should I upgrade? You should upgrade to MicroStrategy 9s at the earliest possible date in order to start securing your corporate systems and information with Usher. Is Usher included as part of my MicroStrategy maintenance? MicroStrategy 9s includes new features to easily connect to the authentication and login services provided by the Usher service. These new capabilities are included in this release for all MicroStrategy customers currently on maintenance. Separately, MicroStrategy customers can now use the Usher service at no charge as long they remain current on maintenance with MicroStrategy. How much does MicroStrategy Usher cost? The upgrade and implementation of Usher as the authentication method for MicroStrategy projects will be free of cost. By upgrading to MicroStrategy 9s, customers will be able to turn on the Usher configuration, deploy Usher badges, and enable users to securely access MicroStrategy projects. Are there other new capabilities, performance improvements, and bug fixes in MicroStrategy 9s? MicroStrategy 9s is built on the MicroStrategy product line and contains the bug fixes from the latest hotfix version (9.4.1 Hotfix 7). To take advantage of these fixes, it is strongly recommended to update the metadata as well. What is the version or build number for MicroStrategy 9s?

4 Upgrading to MicroStrategy 9s How do I upgrade to MicroStrategy 9s from previous versions? The MicroStrategy 9s upgrade will follow the typical MicroStrategy upgrade process. If upgrading to 9s from a installation, the metadata update is not required, but is strongly recommended to inherit the bug fixes from previous hotfixes If upgrading to 9s from a pre installation, the metadata update is required. Follow the metadata update procedures in the standard upgrade document Web Server, Mobile Server, and Intelligence Server updates should be performed per the standard upgrade documentation. This will require these server components to be installed and then restarted once all installation steps are completed How do I get started with setting up MicroStrategy 9s? Everything you need to know about setting up MicroStrategy 9s is located here: On this link, you will find detailed documentation for download location and instructions for the following: Install or upgrade Export MicroStrategy users Create your Usher network Add your MicroStrategy users to Usher Do I require a new CD key to install MicroStrategy 9s? Yes. The process is the same as a regular upgrade. Log a case with Tech Support to get the new license key. Is MicroStrategy 9s available in languages other than English? MicroStrategy 9s supports Internationalization on the Analytics side. However, Usher capabilities are only available in English. Do you offer any service programs to help me get started with MicroStrategy 9s? Yes. We offer service programs and training to help you upgrade or install MicroStrategy 9s. Contact your sales representative to find out more or contact us at info@microstrategy.com

5 Usher configuration How do you setup Usher to secure a MicroStrategy 9s environment? Your MicroStrategy Analytics implementation needs to be upgraded to MicroStrategy 9s in order to take advantage of secure Usher authentication. The MicroStrategy administrator will export users from MicroStrategy in a CSV file and use the file to generate Usher users. Alternately, administrator can manually create users in Usher. Secure Usher badges are delivered to end users of Usher via and can be used to log into MicroStrategy Web and Mobile. Can I get Usher with MicroStrategy or my current version of MicroStrategy? No, in order to apply Usher s secure authentication to your environment you need to upgrade to MicroStrategy 9s (version 9.5). What are the prerequisites to set up MicroStrategy Usher with 9s? Users need to have the Usher application installed on a supported Android or ios smartphone device Usher requires that all MicroStrategy users have a valid address on a mobile device to obtain their badge Users will not be imported into Usher unless they have a value for every column in the CSV file (First Name, Last Name, , Username, Title) How is an account created in MicroStrategy Usher? In order to start creating and distributing secure Usher badges, the MicroStrategy administrator should visit go.usher.com to create a new network for the organization. Who creates the user accounts? go.usher.com is a self-service portal that will allow the administrator to create users and deploy badges. After setting up MicroStrategy 9s and Usher, if I add a new user to MicroStrategy 9s, will they automatically be loaded into Usher? No. The administrator will have to manually create the user in Usher as well, or re-export the CSV and re-import it into Usher. We are working to make the user sync seamlessly in future releases.

6 Can Usher be enabled at the user level or server level? The Usher secure authentication setting is enabled at the server level and project level, but not at the user level. Can I have Usher enabled for some users and not the others? Usher secure access cannot be disabled for individual users. However, multiple authentication modes can be enabled by the administrator at the server level or project level to allow users to login via standard authentication as well. Can I extend the Usher implementation to my other applications, outside of MicroStrategy? Yes. To learn more please contact us at info@microstrategy.com. User authentication Does MicroStrategy 9s require that I use Usher for authentication? It is not a requirement with MicroStrategy 9s to implement Usher authentication. You will still be able login with standard authentication (user name and passwords) if configured by the administrator. Can I have both modes of authentication available in web the Usher badge and the traditional UID/PWD mechanism? Yes. However, the administrator will need to set this up either at the server level or project level. Will MicroStrategy Usher work with LDAP setup or Active Directory? No, the current version of MicroStrategy Usher will not work with LDAP or Active Directory. MicroStrategy 9s will continue to work with LDAP and Active Directory itself, but the Usher secure authentication is not available in this release.

7 What do I do if I presently integrate and synchronize my MicroStrategy user manager with an LDAP service (such as Windows Active Directory)? MicroStrategy Analytics supports LDAP and it can still be used in MicroStrategy 9s. However, when Usher integration is configured, there is no automatic synchronization between Usher and Analytics if both are connected to the same Active Directory. If new users are added, the administrator will have to import another CSV file to the Usher Network in order to map the users from MicroStrategy Analytics to Usher. What do I do if I presently use a 3rd party single sign-on (SSO) solution to login to MicroStrategy (e.g. Site minder)? The 3rd party SSO support is not affected by the Usher integration included in MicroStrategy 9s. You can continue using your current configuration. However, you cannot use both SSO and Usher at the same time. Does Bluetooth work for MicroStrategy login? No, the current MicroStrategy 9s release does not support login via Bluetooth. Do I always need my phone or can I just login using my UID/PWD alone and skip the Usher authentication? Users will need their phones to login at all times if Usher is configured as the only method of authentication. Administrators have the ability to change the configuration to standard or any other except Usher so you can login using your user ID and password. However, this setting is at the server level or project level and would change for all other users too. What happens if the phone is lost or stolen? In the mobile identity context, losing the phone is often associated with losing your wallet or keys. With Usher however, painstaking traditional measures to rectify a loss no longer apply - such as canceling cards, changing locks, etc. These credentials and keys are software based, and a single administrative action can revoke all Usher privileges for a specific user/phone instantly. This logs the user out of the phone and will not permit further login for the user on that device without explicit permission. Meanwhile, on a replacement smartphone, the user simply installs Usher from the app store and authenticates to instantly restore all badges and credentials.

8 Usher on mobile How does MicroStrategy 9s work on the ipad TM? You are required to have the Usher app installed on the ipad and use the app switching mechanism. Will my phone slow down once I install the Usher by MicroStrategy app? No, Usher is a light mobile application that will not slow down your phone. Does Usher by MicroStrategy take a lot of space on my phone? The Usher application occupies very little space on your mobile device, but space occupation may increase if you enable pre-caching functionalities. Usher s memory usage is comparable to popular mobile applications, such as Facebook, WhatsApp, LinkedIn, etc. What do I do if I presently use MicroStrategy Mobile integrated with Good Dynamics? MicroStrategy 9s does not include a MicroStrategy Mobile app secured by Good Dynamics. What do I do if I presently use a custom login method, configured via the mobile SDK, to login to MicroStrategy Mobile? It will not be affected by the Usher integration. You can continue using the custom login method you have created. Can I configure Usher to login to my MicroStrategy Mobile for Android apps? No. Currently, mobile primary login is only supported on ios devices. Not everyone in my organization has smart phones what happens to them once I turn this server level setting? If the Administrator sets up the login mode to be Usher only then all users will need a smartphone to login via Usher. However, MicroStrategy 9s provides the ability to select multiple login modes at the server and project level. A user without a smartphone can still login to his/her project using standard authentication as long as it s configured by the administrator. microstrategy.com 1850 Towers Crescent Plaza Tysons Corner, VA Copyright All Rights Reserved. COLL

Frequently asked questions

Frequently asked questions Frequently asked questions For more information, visit Usher.com info@ Toll Free (US ONLY): 888.656.4464 Direct Dial: 703.848.8710 1 What is Usher? Usher is a mobile identity platform designed to provide

More information

Enable and Turn on MicroStrategy 9s for Existing Projects. Mox Weber, Suhrud Atre, and Rakesh Arora

Enable and Turn on MicroStrategy 9s for Existing Projects. Mox Weber, Suhrud Atre, and Rakesh Arora Enable and Turn on MicroStrategy 9s for Existing Projects Mox Weber, Suhrud Atre, and Rakesh Arora MicroStrategy World Tracks This Session is Part of MicroStrategy World Track 06: Enterprise BI I Forward-Looking

More information

ANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics

ANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics MicroStrategy Analytics: Delivering Secure Enterprise Analytics Copyright Information All Contents Copyright 2015 MicroStrategy Incorporated. All Rights Reserved. Trademark Information MicroStrategy, MicroStrategy

More information

Secure Your Enterprise with Usher Mobile Identity

Secure Your Enterprise with Usher Mobile Identity Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction to Usher Unlock the enterprise Dematerialize

More information

WHITE PAPER Usher Mobile Identity Platform

WHITE PAPER Usher Mobile Identity Platform WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction

More information

Using Usher at MicroStrategy FAQ

Using Usher at MicroStrategy FAQ Using Usher at MicroStrategy FAQ We appreciate your support in using Usher at MicroStrategy. Usher is not perfect yet, but it is rapidly making improvements to surpass the use of plastic. We are constantly

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

Cloud Services MDM. ios User Guide

Cloud Services MDM. ios User Guide Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...

More information

WatchDox Administrator's Guide. Application Version 3.7.5

WatchDox Administrator's Guide. Application Version 3.7.5 Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals

More information

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.

Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them. This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and

More information

Powerful analytics. and enterprise security. in a single platform. microstrategy.com 1

Powerful analytics. and enterprise security. in a single platform. microstrategy.com 1 Powerful analytics and enterprise security in a single platform microstrategy.com 1 Make faster, better business decisions with easy, powerful, and secure tools to explore data and share insights. Enterprise-grade

More information

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet

Sticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal

More information

NetSuite OpenAir Mobile for Android User Guide Version 1.3

NetSuite OpenAir Mobile for Android User Guide Version 1.3 NetSuite OpenAir Mobile for Android User Guide Version 3 General Notices Attributions NetSuite OpenAir includes functionality provided by HighCharts JS software, which is owned by and licensed through

More information

MicroStrategy Course Catalog

MicroStrategy Course Catalog MicroStrategy Course Catalog 1 microstrategy.com/education 3 MicroStrategy course matrix 4 MicroStrategy 9 8 MicroStrategy 10 table of contents MicroStrategy course matrix MICROSTRATEGY 9 MICROSTRATEGY

More information

STRONGER AUTHENTICATION for CA SiteMinder

STRONGER AUTHENTICATION for CA SiteMinder STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive

More information

Flexible Identity Federation

Flexible Identity Federation Flexible Identity Federation User guide version 1.0.1 Publication History Date Description Revision 2015.09.25 initial release 1.0.0 2015.12.10 minor corrections 1.0.1 Copyright Orange Business Services

More information

MicroStrategy Desktop 10.2. MicroStrategy 10.2: New features overview. microstrategy.com 1

MicroStrategy Desktop 10.2. MicroStrategy 10.2: New features overview. microstrategy.com 1 MicroStrategy Desktop 10.2 MicroStrategy 10.2: New features overview. microstrategy.com 1 TABLE OF CONTENTS MicroStrategy Desktop 10.2 Easier integration of custom visualizations 3 BETA Dashboard annotation

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager

Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime

More information

AVG Business SSO Partner Getting Started Guide

AVG Business SSO Partner Getting Started Guide AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in

More information

Centrify Cloud Connector Deployment Guide

Centrify Cloud Connector Deployment Guide C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as

More information

Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks

Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Defender 5.7 - Token Deployment System Quick Start Guide

Defender 5.7 - Token Deployment System Quick Start Guide Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register

More information

Drobo How-To Guide Drobo Apps - Configuring ElephantDrive

Drobo How-To Guide Drobo Apps - Configuring ElephantDrive The Drobo 5N provides simple and affordable network attached storage for the connected home or small office. ElephantDrive is a cloud-based service that provides real-time protection of all, or a subset

More information

Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy

Usher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy Usher Mobile Identity for Higher Education Institutions Rebecca Parks Associate Product Manager, MicroStrategy Agenda Overview of Mobile Identity Verify Personal ID Login to University Systems Unlock Doors

More information

Google Apps Deployment Guide

Google Apps Deployment Guide CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate

More information

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS

WHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user

More information

Single Sign-on Frequently Asked Questions

Single Sign-on Frequently Asked Questions Single Sign-on Frequently Asked Questions Q1. What is Single Sign-on? Q2. How does SSO work? Q3. How do I access the SSO portal? Q4. Where can I find help on how to use the SSO portal? Q5. How do I reset

More information

Sophos Mobile Control Super administrator guide. Product version: 3

Sophos Mobile Control Super administrator guide. Product version: 3 Sophos Mobile Control Super administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...3 2 Super administrator accounts...4 3 The super administrator customer...5

More information

Google Identity Services for work

Google Identity Services for work INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new

More information

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to

More information

Remote Desktop Services User's Guide

Remote Desktop Services User's Guide Contents Remote Desktop Services Document Revision Control Revision Description Author DATE 1.0 Initial Release Karen M. Hess 3/24/2015 1.1 Added section for viewing mapped drives Karen M. Hess 4/15/2015

More information

Sophos Mobile Control Installation guide

Sophos Mobile Control Installation guide Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running

More information

MicroStrategy Analytics Platform

MicroStrategy Analytics Platform Enterprise-grade business intelligence Effortless self-service analytics MicroStrategy Analytics Platform One comprehensive solution. No compromises. No limits. No dead ends. Advanced big data analytics

More information

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?

1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution? MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,

More information

Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions

Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions Server Prerequisites Internet Information Server (IIS). It may be enabled in Windows Features (see Enabling IIS section).

More information

The Top 5 Federated Single Sign-On Scenarios

The Top 5 Federated Single Sign-On Scenarios The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3

More information

Using Devices. Chapter 3

Using Devices. Chapter 3 Chapter 3 Using Devices es The Devices page lists all the devices you have enrolled in the Centrify identity platform and lets you send commands to the devices. Device related tasks that you can perform

More information

Adding Stronger Authentication to your Portal and Cloud Apps

Adding Stronger Authentication to your Portal and Cloud Apps SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well

More information

EMR Link Server Interface Installation

EMR Link Server Interface Installation EMR Link Server Interface Installation Version 1.0 ** INTRODUCTION ** If you would like assistance with installation, please contact our preferred support provider at support@bonecomputer.com, or call

More information

Lync Online Deployment Guide. Version 1.0

Lync Online Deployment Guide. Version 1.0 Date 28/07/2014 Table of Contents 1. Provisioning Lync Online... 1 1.1 Operating System Requirements... 1 1.2 Browser Requirements Administrative Centre... 1 2. Obtaining your login Credentials & Logging

More information

Single Sign-On Portal User Reference (Okta Cloud SSO)

Single Sign-On Portal User Reference (Okta Cloud SSO) Single Sign-On Portal User Reference (Okta Cloud SSO) Contents Okta Single Sign-on Portal... 3 Initial account creation and configuration... 3 First time manual login to the Okta Single Sign-on Portal...

More information

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University

Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University www.infrontconsulting.com Global #1 on System Center Trusted for over a decade Microsoft Partner of the year 2012, 2013 & 2014 #1

More information

Entrust IdentityGuard Comprehensive

Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry

GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com

Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious

More information

Android App User Guide

Android App User Guide www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of

More information

MicroStrategy Cloud Reduces the Barriers to Enterprise BI...

MicroStrategy Cloud Reduces the Barriers to Enterprise BI... MicroStrategy Cloud Reduces the Barriers to Enterprise BI... MicroStrategy Cloud reduces the traditional barriers that organizations face when implementing enterprise business intelligence solutions. MicroStrategy

More information

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management

Multi-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management Multi-Factor Authentication for your Analytics Implementation Siamak Ziraknejad VP, Product Management 1 Agenda What is Multi-Factor Authentication & Why is it important The Usher Security Badge Badge

More information

Okta/Dropbox Active Directory Integration Guide

Okta/Dropbox Active Directory Integration Guide Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for

More information

Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks

Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

GRAVITYZONE UNIFIED SECURITY MANAGEMENT. Use Cases for Beta Testers

GRAVITYZONE UNIFIED SECURITY MANAGEMENT. Use Cases for Beta Testers GRAVITYZONE UNIFIED SECURITY MANAGEMENT Use Cases for Beta Testers Introduction This document provides beta testers with guidelines for testing Bitdefender GravityZone solutions. To send your feedback,

More information

Oracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008

Oracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008 Oracle Business Intelligence Enterprise Edition LDAP-Security Administration White Paper by Shivaji Sekaramantri November 2008 OBIEE LDAP-Security Administration Before You Start... 3 Executive Overview...

More information

Protected Trust Directory Sync Guide

Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide 2 Overview Protected Trust Directory Sync enables your organization to synchronize the users and distribution lists in Active Directory

More information

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.

FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates

More information

Mobile Device Management Version 8. Last updated: 17-10-14

Mobile Device Management Version 8. Last updated: 17-10-14 Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names

More information

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta. Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta

More information

ADDING STRONGER AUTHENTICATION for VPN Access Control

ADDING STRONGER AUTHENTICATION for VPN Access Control ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows

More information

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy

SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House

More information

Exchange ActiveSync (EAS)

Exchange ActiveSync (EAS) Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,

More information

A brief on Two-Factor Authentication

A brief on Two-Factor Authentication Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.

More information

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365

Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding

More information

000-596. IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam. http://www.examskey.com/000-596.html

000-596. IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam. http://www.examskey.com/000-596.html IBM 000-596 IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam TYPE: DEMO http://www.examskey.com/000-596.html Examskey IBM 000-596 exam demo product is here for you to

More information

AVG Business SSO Connecting to Active Directory

AVG Business SSO Connecting to Active Directory AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud

More information

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0

White Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0 White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative

More information

How To Use Usher For Business

How To Use Usher For Business MicroStrategy Enterprise Security Secure your enterprise with MicroStrategy Usher, the revolutionary new enterprise security platform Nearly 90% of IT Security Professionals Are Concerned About A Data

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication Two-Factor Authentication is an enhanced security feature for Payentry. It adds an extra layer of protection to ensure only authorized users can gain access to your data. In addition

More information

SAP NetWeaver Fiori. For more information, see "Creating and enabling a trusted provider for Centrify" on page 108-10.

SAP NetWeaver Fiori. For more information, see Creating and enabling a trusted provider for Centrify on page 108-10. Chapter 108 Configuring SAP NetWeaver Fiori The following is an overview of the steps required to configure the SAP NetWeaver Fiori Web application for single sign-on (SSO) via SAML. SAP NetWeaver Fiori

More information

McAfee Cloud Single Sign On

McAfee Cloud Single Sign On Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

QLIKVIEW MOBILE SECURITY

QLIKVIEW MOBILE SECURITY QLIKVIEW MOBILE SECURITY QlikView Technical Brief Published: March, 2011 qlikview.com QlikView Mobile Security Mobile devices are convenient, versatile and, for many employees, they are indispensable.

More information

Novell Filr 1.0.x Mobile App Quick Start

Novell Filr 1.0.x Mobile App Quick Start Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide BlackBerry Resource Kit for BlackBerry Enterprise Service 10 Version 10.2 Published: 2015-11-12 SWD-20151112124827386 Contents Overview: BlackBerry Enterprise Service

More information

Configuring. SuccessFactors. Chapter 67

Configuring. SuccessFactors. Chapter 67 Chapter 67 Configuring SuccessFactors The following is an overview of the steps required to configure the SuccessFactors Enterprise Edition Web application for single sign-on (SSO) via SAML. SuccessFactors

More information

Active Directory Integration 855.426.7227. www.onelogin.com twitter.com/onelogin ONELOGIN WHITEPAPER

Active Directory Integration 855.426.7227. www.onelogin.com twitter.com/onelogin ONELOGIN WHITEPAPER Active Directory Integration Even as enterprises continue to adopt more cloud applications, Active Directory (AD) and Lightweight Directory Access Protocol (LDAP) still play a critical role in how information

More information

Link and Sync Guide for Hosted QuickBooks Files

Link and Sync Guide for Hosted QuickBooks Files Link and Sync Guide for Hosted QuickBooks Files A How-To Guide for Syncing QuickBooks Files Table of Contents Hosted QuickBooks Files Overview:... 2 Rules Overview:... 2 Link and Sync Hosted QuickBooks

More information

Configuring SuccessFactors

Configuring SuccessFactors Chapter 117 Configuring SuccessFactors The following is an overview of the steps required to configure the SuccessFactors Enterprise Edition Web application for single sign-on (SSO) via SAML. SuccessFactors

More information

An Overview of Samsung KNOX Active Directory and Group Policy Features

An Overview of Samsung KNOX Active Directory and Group Policy Features C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android

More information

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management

More information

Apps for every employee

Apps for every employee Apps for every employee ipad 12:30 PM 100% Apps for every employee Mobilize everyday processes, remove costly bottlenecks, and accelerate the business. 12:30 PM 100% Apps for expense submission, corporate

More information

WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices

WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices MicroStrategy Mobile App Platform Copyright Information All Contents Copyright 2014 MicroStrategy Incorporated.

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of

More information

Employee Active Directory Self-Service Quick Setup Guide

Employee Active Directory Self-Service Quick Setup Guide Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:

More information

Mod 2: User Management

Mod 2: User Management Office 365 for SMB Jump Start Mod 2: User Management Chris Oakman Managing Partner Infrastructure Team Eastridge Technology Stephen Hall CEO & SMB Technologist District Computers 1 Jump Start Schedule

More information

User Management Tool 1.5

User Management Tool 1.5 User Management Tool 1.5 2014-12-08 23:32:23 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.5... 3 ShareFile User Management

More information

SchoolBooking SSO Integration Guide

SchoolBooking SSO Integration Guide SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,

More information

Colligo Briefcase Enterprise. Administrator s Guide

Colligo Briefcase Enterprise. Administrator s Guide Enterprise Administrator s Guide CONTENTS Introduction... 2 Target Audience... 2 Overview... 2 Key Features... 2 Platforms Supported... 2 SharePoint Security & Privileges... 2 Deploying Colligo Briefcase...

More information

Multi-Factor Authentication Job Aide

Multi-Factor Authentication Job Aide To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please

More information

Online Banking Upgrade FAQs

Online Banking Upgrade FAQs Frequently Asked Questions Why is Town & Country changing to a new online banking system? When will the change take place? What is different about the new online banking system? Do I have to re-register

More information

Single Sign On. SSO & ID Management for Web and Mobile Applications

Single Sign On. SSO & ID Management for Web and Mobile Applications Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing

More information

Administering Google Apps & Chromebooks for Education

Administering Google Apps & Chromebooks for Education Administering Google Apps & Chromebooks for Education February 4, 2016 Edward Doan @edwardd / google.com/+edwarddoan customer quotes and snippets It s almost this easy. also highlight customer map? Google

More information

FirePass SSLVPN Client Software Deployment Guide For Windows Mobile 5 and 6 Devices MAN 0263 01

FirePass SSLVPN Client Software Deployment Guide For Windows Mobile 5 and 6 Devices MAN 0263 01 FirePass SSLVPN Client Software Deployment Guide For Windows Mobile 5 and 6 Devices MAN 0263 01 Product Version This manual applies to the F5 SSLV client software provided as part of the FirePass 6.0.2,

More information

WhatsUp Gold v16.3 Installation and Configuration Guide

WhatsUp Gold v16.3 Installation and Configuration Guide WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard

More information

Adobe Connect LMS Integration for Blackboard Learn 9

Adobe Connect LMS Integration for Blackboard Learn 9 Adobe Connect LMS Integration for Blackboard Learn 9 Install Guide Introduction The Adobe Connect LMS Integration for Blackboard Learn 9 gives Instructors, Teaching Assistants and Course Builders the ability

More information

Rich Communication Suite Enabler. plus integration with your existing VoIP services

Rich Communication Suite Enabler. plus integration with your existing VoIP services Rich Communication Suite Enabler plus integration with your existing VoIP services Join the next generation telecom market and offer services that are blend the best features of Skype, Viber and WhatsApp.

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide

Citrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide Deliver file sharing and synchronization services using Citrix ShareFile Self-paced exercise guide Table of Contents Table of Contents... 2 Overview... 3 Exercise 1: Setting up a ShareFile Account... 6

More information

How to Configure Outlook 2010 E-mail Client for Exchange

How to Configure Outlook 2010 E-mail Client for Exchange LAUSD IT Help Desk How to Configure Outlook 2010 E-mail Client for Exchange (03/04/2012) LAUSD IT Help Desk 333 S. Beaudry Ave. 9 th Floor Phone 213.241.5200 Table of Contents Configure Outlook 2010 for

More information