Frequently asked questions
|
|
- Marian Cummings
- 8 years ago
- Views:
Transcription
1 Frequently asked questions
2 FAQ: MicroStrategy 9s/9.5 General What is MicroStrategy 9s? MicroStrategy 9s combines the world s most sophisticated analytics platform with Usher, a revolutionary security platform. It is a recommended security enhancement that will allow organizations to replace traditional user ID and password authentication, eliminating the vulnerability with storing and typing user credentials to access critical systems and information. What is Usher? Usher by MicroStrategy, is a self-service, cloud-based application that allows organizations to implement enterprise-grade cyber security quickly and easily. Usher delivers a simple, seamless, and secure user experience that protects systems integrity across the enterprise. Usher goes beyond securing systems, and addresses four major areas of concern for enterprise security: Increased cyber security for system and application access Seamless access to physical entryways using digital keys Identity verification over the phone or in person 360-degree view of your network Why is MicroStrategy 9s recommended? Many organizations around the world are experiencing increasing pressure from cyber security threats, resulting in a growing number of data breaches. In order to reduce vulnerability to these threats, we recommend the prompt implementation of robust user authentication with MicroStrategy 9s and Usher. What benefits do I get if I upgrade to MicroStrategy 9s? You should upgrade to MicroStrategy 9s to seamlessly and quickly deploy enterprise-ready analytics and enterprise-grade security to your organization. The combination of MicroStrategy 9s and Usher will allow your organization to swiftly replace user IDs and password authentication, eliminating the vulnerability of typing user credentials to access critical systems and information.
3 What new features are added to MicroStrategy 9s? MicroStrategy 9s is entirely focused on delivering enterprise-grade security to the analytics platform. In order to make this the lightest possible upgrade for all MicroStrategy customers, the main feature included as part of this release is to enable Usher as a new authentication method to login to MicroStrategy Analytics projects. These changes require upgrades to the Mobile Server, Web Server, and Intelligence Server. The following functionalities are included as part of this version: Web primary login using Usher QR code Mobile (ios) primary login using app switching Web second-factor authentication using user ID, password, and Usher code When should I upgrade? You should upgrade to MicroStrategy 9s at the earliest possible date in order to start securing your corporate systems and information with Usher. Is Usher included as part of my MicroStrategy maintenance? MicroStrategy 9s includes new features to easily connect to the authentication and login services provided by the Usher service. These new capabilities are included in this release for all MicroStrategy customers currently on maintenance. Separately, MicroStrategy customers can now use the Usher service at no charge as long they remain current on maintenance with MicroStrategy. How much does MicroStrategy Usher cost? The upgrade and implementation of Usher as the authentication method for MicroStrategy projects will be free of cost. By upgrading to MicroStrategy 9s, customers will be able to turn on the Usher configuration, deploy Usher badges, and enable users to securely access MicroStrategy projects. Are there other new capabilities, performance improvements, and bug fixes in MicroStrategy 9s? MicroStrategy 9s is built on the MicroStrategy product line and contains the bug fixes from the latest hotfix version (9.4.1 Hotfix 7). To take advantage of these fixes, it is strongly recommended to update the metadata as well. What is the version or build number for MicroStrategy 9s?
4 Upgrading to MicroStrategy 9s How do I upgrade to MicroStrategy 9s from previous versions? The MicroStrategy 9s upgrade will follow the typical MicroStrategy upgrade process. If upgrading to 9s from a installation, the metadata update is not required, but is strongly recommended to inherit the bug fixes from previous hotfixes If upgrading to 9s from a pre installation, the metadata update is required. Follow the metadata update procedures in the standard upgrade document Web Server, Mobile Server, and Intelligence Server updates should be performed per the standard upgrade documentation. This will require these server components to be installed and then restarted once all installation steps are completed How do I get started with setting up MicroStrategy 9s? Everything you need to know about setting up MicroStrategy 9s is located here: On this link, you will find detailed documentation for download location and instructions for the following: Install or upgrade Export MicroStrategy users Create your Usher network Add your MicroStrategy users to Usher Do I require a new CD key to install MicroStrategy 9s? Yes. The process is the same as a regular upgrade. Log a case with Tech Support to get the new license key. Is MicroStrategy 9s available in languages other than English? MicroStrategy 9s supports Internationalization on the Analytics side. However, Usher capabilities are only available in English. Do you offer any service programs to help me get started with MicroStrategy 9s? Yes. We offer service programs and training to help you upgrade or install MicroStrategy 9s. Contact your sales representative to find out more or contact us at info@microstrategy.com
5 Usher configuration How do you setup Usher to secure a MicroStrategy 9s environment? Your MicroStrategy Analytics implementation needs to be upgraded to MicroStrategy 9s in order to take advantage of secure Usher authentication. The MicroStrategy administrator will export users from MicroStrategy in a CSV file and use the file to generate Usher users. Alternately, administrator can manually create users in Usher. Secure Usher badges are delivered to end users of Usher via and can be used to log into MicroStrategy Web and Mobile. Can I get Usher with MicroStrategy or my current version of MicroStrategy? No, in order to apply Usher s secure authentication to your environment you need to upgrade to MicroStrategy 9s (version 9.5). What are the prerequisites to set up MicroStrategy Usher with 9s? Users need to have the Usher application installed on a supported Android or ios smartphone device Usher requires that all MicroStrategy users have a valid address on a mobile device to obtain their badge Users will not be imported into Usher unless they have a value for every column in the CSV file (First Name, Last Name, , Username, Title) How is an account created in MicroStrategy Usher? In order to start creating and distributing secure Usher badges, the MicroStrategy administrator should visit go.usher.com to create a new network for the organization. Who creates the user accounts? go.usher.com is a self-service portal that will allow the administrator to create users and deploy badges. After setting up MicroStrategy 9s and Usher, if I add a new user to MicroStrategy 9s, will they automatically be loaded into Usher? No. The administrator will have to manually create the user in Usher as well, or re-export the CSV and re-import it into Usher. We are working to make the user sync seamlessly in future releases.
6 Can Usher be enabled at the user level or server level? The Usher secure authentication setting is enabled at the server level and project level, but not at the user level. Can I have Usher enabled for some users and not the others? Usher secure access cannot be disabled for individual users. However, multiple authentication modes can be enabled by the administrator at the server level or project level to allow users to login via standard authentication as well. Can I extend the Usher implementation to my other applications, outside of MicroStrategy? Yes. To learn more please contact us at info@microstrategy.com. User authentication Does MicroStrategy 9s require that I use Usher for authentication? It is not a requirement with MicroStrategy 9s to implement Usher authentication. You will still be able login with standard authentication (user name and passwords) if configured by the administrator. Can I have both modes of authentication available in web the Usher badge and the traditional UID/PWD mechanism? Yes. However, the administrator will need to set this up either at the server level or project level. Will MicroStrategy Usher work with LDAP setup or Active Directory? No, the current version of MicroStrategy Usher will not work with LDAP or Active Directory. MicroStrategy 9s will continue to work with LDAP and Active Directory itself, but the Usher secure authentication is not available in this release.
7 What do I do if I presently integrate and synchronize my MicroStrategy user manager with an LDAP service (such as Windows Active Directory)? MicroStrategy Analytics supports LDAP and it can still be used in MicroStrategy 9s. However, when Usher integration is configured, there is no automatic synchronization between Usher and Analytics if both are connected to the same Active Directory. If new users are added, the administrator will have to import another CSV file to the Usher Network in order to map the users from MicroStrategy Analytics to Usher. What do I do if I presently use a 3rd party single sign-on (SSO) solution to login to MicroStrategy (e.g. Site minder)? The 3rd party SSO support is not affected by the Usher integration included in MicroStrategy 9s. You can continue using your current configuration. However, you cannot use both SSO and Usher at the same time. Does Bluetooth work for MicroStrategy login? No, the current MicroStrategy 9s release does not support login via Bluetooth. Do I always need my phone or can I just login using my UID/PWD alone and skip the Usher authentication? Users will need their phones to login at all times if Usher is configured as the only method of authentication. Administrators have the ability to change the configuration to standard or any other except Usher so you can login using your user ID and password. However, this setting is at the server level or project level and would change for all other users too. What happens if the phone is lost or stolen? In the mobile identity context, losing the phone is often associated with losing your wallet or keys. With Usher however, painstaking traditional measures to rectify a loss no longer apply - such as canceling cards, changing locks, etc. These credentials and keys are software based, and a single administrative action can revoke all Usher privileges for a specific user/phone instantly. This logs the user out of the phone and will not permit further login for the user on that device without explicit permission. Meanwhile, on a replacement smartphone, the user simply installs Usher from the app store and authenticates to instantly restore all badges and credentials.
8 Usher on mobile How does MicroStrategy 9s work on the ipad TM? You are required to have the Usher app installed on the ipad and use the app switching mechanism. Will my phone slow down once I install the Usher by MicroStrategy app? No, Usher is a light mobile application that will not slow down your phone. Does Usher by MicroStrategy take a lot of space on my phone? The Usher application occupies very little space on your mobile device, but space occupation may increase if you enable pre-caching functionalities. Usher s memory usage is comparable to popular mobile applications, such as Facebook, WhatsApp, LinkedIn, etc. What do I do if I presently use MicroStrategy Mobile integrated with Good Dynamics? MicroStrategy 9s does not include a MicroStrategy Mobile app secured by Good Dynamics. What do I do if I presently use a custom login method, configured via the mobile SDK, to login to MicroStrategy Mobile? It will not be affected by the Usher integration. You can continue using the custom login method you have created. Can I configure Usher to login to my MicroStrategy Mobile for Android apps? No. Currently, mobile primary login is only supported on ios devices. Not everyone in my organization has smart phones what happens to them once I turn this server level setting? If the Administrator sets up the login mode to be Usher only then all users will need a smartphone to login via Usher. However, MicroStrategy 9s provides the ability to select multiple login modes at the server and project level. A user without a smartphone can still login to his/her project using standard authentication as long as it s configured by the administrator. microstrategy.com 1850 Towers Crescent Plaza Tysons Corner, VA Copyright All Rights Reserved. COLL
Frequently asked questions
Frequently asked questions For more information, visit Usher.com info@ Toll Free (US ONLY): 888.656.4464 Direct Dial: 703.848.8710 1 What is Usher? Usher is a mobile identity platform designed to provide
More informationEnable and Turn on MicroStrategy 9s for Existing Projects. Mox Weber, Suhrud Atre, and Rakesh Arora
Enable and Turn on MicroStrategy 9s for Existing Projects Mox Weber, Suhrud Atre, and Rakesh Arora MicroStrategy World Tracks This Session is Part of MicroStrategy World Track 06: Enterprise BI I Forward-Looking
More informationANALYTICS WHITE PAPER. MicroStrategy Analytics: Delivering Secure Enterprise Analytics
MicroStrategy Analytics: Delivering Secure Enterprise Analytics Copyright Information All Contents Copyright 2015 MicroStrategy Incorporated. All Rights Reserved. Trademark Information MicroStrategy, MicroStrategy
More informationSecure Your Enterprise with Usher Mobile Identity
Secure Your Enterprise with Usher Mobile Identity Yong Qiao, Vice President of Software Engineering & Chief Security Architect, MicroStrategy Agenda Introduction to Usher Unlock the enterprise Dematerialize
More informationWHITE PAPER Usher Mobile Identity Platform
WHITE PAPER Usher Mobile Identity Platform Security Architecture For more information, visit Usher.com info@usher.com Toll Free (US ONLY): 1 888.656.4464 Direct Dial: 703.848.8710 Table of contents Introduction
More informationUsing Usher at MicroStrategy FAQ
Using Usher at MicroStrategy FAQ We appreciate your support in using Usher at MicroStrategy. Usher is not perfect yet, but it is rapidly making improvements to surpass the use of plastic. We are constantly
More informationOneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
More informationCloud Services MDM. ios User Guide
Cloud Services MDM ios User Guide 10/24/2014 CONTENTS Overview... 3 Supported Devices... 3 System Capabilities... 3 Enrollment and Activation... 4 Download the Agent... 4 Enroll Your Device Using the Agent...
More informationWatchDox Administrator's Guide. Application Version 3.7.5
Application Version 3.7.5 Confidentiality This document contains confidential material that is proprietary WatchDox. The information and ideas herein may not be disclosed to any unauthorized individuals
More informationOnly LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
More informationPowerful analytics. and enterprise security. in a single platform. microstrategy.com 1
Powerful analytics and enterprise security in a single platform microstrategy.com 1 Make faster, better business decisions with easy, powerful, and secure tools to explore data and share insights. Enterprise-grade
More informationSticky Password 7. Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet
Sticky Password 7 Reviewer Guide Introduction Sticky Password 7 is the latest, most advanced, portable, cross platform version of the powerful yet simple password manager and form-filler. Its main goal
More informationNetSuite OpenAir Mobile for Android User Guide Version 1.3
NetSuite OpenAir Mobile for Android User Guide Version 3 General Notices Attributions NetSuite OpenAir includes functionality provided by HighCharts JS software, which is owned by and licensed through
More informationMicroStrategy Course Catalog
MicroStrategy Course Catalog 1 microstrategy.com/education 3 MicroStrategy course matrix 4 MicroStrategy 9 8 MicroStrategy 10 table of contents MicroStrategy course matrix MICROSTRATEGY 9 MICROSTRATEGY
More informationSTRONGER AUTHENTICATION for CA SiteMinder
STRONGER AUTHENTICATION for CA SiteMinder Adding Stronger Authentication for CA SiteMinder Access Control 1 STRONGER AUTHENTICATION for CA SiteMinder Access Control CA SITEMINDER provides a comprehensive
More informationFlexible Identity Federation
Flexible Identity Federation User guide version 1.0.1 Publication History Date Description Revision 2015.09.25 initial release 1.0.0 2015.12.10 minor corrections 1.0.1 Copyright Orange Business Services
More informationMicroStrategy Desktop 10.2. MicroStrategy 10.2: New features overview. microstrategy.com 1
MicroStrategy Desktop 10.2 MicroStrategy 10.2: New features overview. microstrategy.com 1 TABLE OF CONTENTS MicroStrategy Desktop 10.2 Easier integration of custom visualizations 3 BETA Dashboard annotation
More informationMobile Iron User Guide
2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4
More informationMobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords. Mika Devonshire Associate Product Manager
Mobile Identity: Improved Cybersecurity, Easier to Use and Manage than Passwords Mika Devonshire Associate Product Manager 1 Agenda 2 What is Cybersecurity? Quick overview of the core concepts 3 Cybercrime
More informationAVG Business SSO Partner Getting Started Guide
AVG Business SSO Partner Getting Started Guide Table of Contents Overview... 2 Getting Started... 3 Web and OS requirements... 3 Supported web and device browsers... 3 Initial Login... 4 Navigation in
More informationCentrify Cloud Connector Deployment Guide
C E N T R I F Y D E P L O Y M E N T G U I D E Centrify Cloud Connector Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as
More informationEstablishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA
More informationAdvanced Configuration Steps
Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings
More informationDefender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
More informationDrobo How-To Guide Drobo Apps - Configuring ElephantDrive
The Drobo 5N provides simple and affordable network attached storage for the connected home or small office. ElephantDrive is a cloud-based service that provides real-time protection of all, or a subset
More informationUsher Mobile Identity for Higher Education Institutions. Rebecca Parks Associate Product Manager, MicroStrategy
Usher Mobile Identity for Higher Education Institutions Rebecca Parks Associate Product Manager, MicroStrategy Agenda Overview of Mobile Identity Verify Personal ID Login to University Systems Unlock Doors
More informationGoogle Apps Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Google Apps Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of your corporate
More informationWHITEPAPER. SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS
WHITEPAPER SECUREAUTH 2-FACTOR AS A SERVICE 2FaaS EXECUTIVE OVERVIEW 2-Factor as a Service (2FaaS) is a 100% cloud-hosted authentication solution that offers flexible security without compromising user
More informationSingle Sign-on Frequently Asked Questions
Single Sign-on Frequently Asked Questions Q1. What is Single Sign-on? Q2. How does SSO work? Q3. How do I access the SSO portal? Q4. Where can I find help on how to use the SSO portal? Q5. How do I reset
More informationSophos Mobile Control Super administrator guide. Product version: 3
Sophos Mobile Control Super administrator guide Product version: 3 Document date: January 2013 Contents 1 About Sophos Mobile Control...3 2 Super administrator accounts...4 3 The super administrator customer...5
More informationGoogle Identity Services for work
INTRODUCING Google Identity Services for work One account. All of Google Enter your email Next Online safety made easy We all care about keeping our data safe and private. Google Identity brings a new
More informationGuide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation
Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to
More informationRemote Desktop Services User's Guide
Contents Remote Desktop Services Document Revision Control Revision Description Author DATE 1.0 Initial Release Karen M. Hess 3/24/2015 1.1 Added section for viewing mapped drives Karen M. Hess 4/15/2015
More informationSophos Mobile Control Installation guide
Sophos Mobile Control Installation guide Product version: 2.5 Document date: July 2012 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Running
More informationMicroStrategy Analytics Platform
Enterprise-grade business intelligence Effortless self-service analytics MicroStrategy Analytics Platform One comprehensive solution. No compromises. No limits. No dead ends. Advanced big data analytics
More information1. What are the System Requirements for using the MaaS360 for Exchange ActiveSync solution?
MaaS360 FAQs This guide is meant to help answer some of the initial frequently asked questions businesses ask as they try to figure out the who, what, when, why and how of managing their smartphone devices,
More informationAlert Notification of Critical Results (ANCR) Public Domain Deployment Instructions
Alert Notification of Critical Results (ANCR) Public Domain Deployment Instructions Server Prerequisites Internet Information Server (IIS). It may be enabled in Windows Features (see Enabling IIS section).
More informationThe Top 5 Federated Single Sign-On Scenarios
The Top 5 Federated Single Sign-On Scenarios Table of Contents Executive Summary... 1 The Solution: Standards-Based Federation... 2 Service Provider Initiated SSO...3 Identity Provider Initiated SSO...3
More informationUsing Devices. Chapter 3
Chapter 3 Using Devices es The Devices page lists all the devices you have enrolled in the Centrify identity platform and lets you send commands to the devices. Device related tasks that you can perform
More informationAdding Stronger Authentication to your Portal and Cloud Apps
SOLUTION BRIEF Cyphercor Inc. Adding Stronger Authentication to your Portal and Cloud Apps Using the logintc April 2012 Adding Stronger Authentication to Portals Corporate and consumer portals, as well
More informationEMR Link Server Interface Installation
EMR Link Server Interface Installation Version 1.0 ** INTRODUCTION ** If you would like assistance with installation, please contact our preferred support provider at support@bonecomputer.com, or call
More informationLync Online Deployment Guide. Version 1.0
Date 28/07/2014 Table of Contents 1. Provisioning Lync Online... 1 1.1 Operating System Requirements... 1 1.2 Browser Requirements Administrative Centre... 1 2. Obtaining your login Credentials & Logging
More informationSingle Sign-On Portal User Reference (Okta Cloud SSO)
Single Sign-On Portal User Reference (Okta Cloud SSO) Contents Okta Single Sign-on Portal... 3 Initial account creation and configuration... 3 First time manual login to the Okta Single Sign-on Portal...
More informationOverview of Microsoft Enterprise Mobility Suite (EMS) Cloud University
Overview of Microsoft Enterprise Mobility Suite (EMS) Cloud University www.infrontconsulting.com Global #1 on System Center Trusted for over a decade Microsoft Partner of the year 2012, 2013 & 2014 #1
More informationEntrust IdentityGuard Comprehensive
Entrust IdentityGuard Comprehensive Entrust IdentityGuard Comprehensive is a five-day, hands-on overview of Entrust Course participants will gain experience planning, installing and configuring Entrust
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry
GO!Enterprise MDM Device Application User Guide Installation and Configuration for BlackBerry GO!Enterprise MDM Version 4.11.x GO!Enterprise MDM for BlackBerry 1 Table of Contents GO!Enterprise MDM for
More informationConfiguration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
More informationCopyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com
Manual Copyright 2013, 3CX Ltd. http://www.3cx.com E-mail: info@3cx.com Information in this document is subject to change without notice. Companies names and data used in examples herein are fictitious
More informationAndroid App User Guide
www.novell.com/documentation Android App User Guide ZENworks Mobile Management 2.7.x August 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of
More informationMicroStrategy Cloud Reduces the Barriers to Enterprise BI...
MicroStrategy Cloud Reduces the Barriers to Enterprise BI... MicroStrategy Cloud reduces the traditional barriers that organizations face when implementing enterprise business intelligence solutions. MicroStrategy
More informationMulti-Factor Authentication for your Analytics Implementation. Siamak Ziraknejad VP, Product Management
Multi-Factor Authentication for your Analytics Implementation Siamak Ziraknejad VP, Product Management 1 Agenda What is Multi-Factor Authentication & Why is it important The Usher Security Badge Badge
More informationOkta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 info@okta.com 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
More informationEstablishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks
Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks
More informationMobility Manager 9.5. Users Guide
Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks
More informationGRAVITYZONE UNIFIED SECURITY MANAGEMENT. Use Cases for Beta Testers
GRAVITYZONE UNIFIED SECURITY MANAGEMENT Use Cases for Beta Testers Introduction This document provides beta testers with guidelines for testing Bitdefender GravityZone solutions. To send your feedback,
More informationOracle Business Intelligence Enterprise Edition LDAP-Security Administration. White Paper by Shivaji Sekaramantri November 2008
Oracle Business Intelligence Enterprise Edition LDAP-Security Administration White Paper by Shivaji Sekaramantri November 2008 OBIEE LDAP-Security Administration Before You Start... 3 Executive Overview...
More informationProtected Trust Directory Sync Guide
Protected Trust Directory Sync Guide Protected Trust Directory Sync Guide 2 Overview Protected Trust Directory Sync enables your organization to synchronize the users and distribution lists in Active Directory
More informationFileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution.
FileDrawer An Enterprise File Sharing and Synchronization (EFSS) solution. In today s world the potential for ready access to data from virtually any device over any type of network connection creates
More informationMobile Device Management Version 8. Last updated: 17-10-14
Mobile Device Management Version 8 Last updated: 17-10-14 Copyright 2013, 2X Ltd. http://www.2x.com E mail: info@2x.com Information in this document is subject to change without notice. Companies names
More informationDirectory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA 94107. info@okta.
Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta
More informationADDING STRONGER AUTHENTICATION for VPN Access Control
ADDING STRONGER AUTHENTICATION for VPN Access Control Adding Stronger Authentication for VPN Access Control 1 ADDING STRONGER AUTHENTICATION for VPN Access Control A VIRTUAL PRIVATE NETWORK (VPN) allows
More informationSalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy
SalesForce SSO with Active Directory Federated Services (ADFS) v2.0 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House
More informationExchange ActiveSync (EAS)
Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,
More informationA brief on Two-Factor Authentication
Application Note A brief on Two-Factor Authentication Summary This document provides a technology brief on two-factor authentication and how it is used on Netgear SSL312, VPN Firewall, and other UTM products.
More informationConfiguring Single Sign-On from the VMware Identity Manager Service to Office 365
Configuring Single Sign-On from the VMware Identity Manager Service to Office 365 VMware Identity Manager JULY 2015 V1 Table of Contents Overview... 2 Passive and Active Authentication Profiles... 2 Adding
More information000-596. IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam. http://www.examskey.com/000-596.html
IBM 000-596 IBM Security Access Manager for Enterprise Single Sign-On V8.2 Implementation Exam TYPE: DEMO http://www.examskey.com/000-596.html Examskey IBM 000-596 exam demo product is here for you to
More informationAVG Business SSO Connecting to Active Directory
AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud
More informationWhite Paper. Anywhere, Any Device File Access with IT in Control. Enterprise File Serving 2.0
White Paper Enterprise File Serving 2.0 Anywhere, Any Device File Access with IT in Control Like it or not, cloud- based file sharing services have opened up a new world of mobile file access and collaborative
More informationHow To Use Usher For Business
MicroStrategy Enterprise Security Secure your enterprise with MicroStrategy Usher, the revolutionary new enterprise security platform Nearly 90% of IT Security Professionals Are Concerned About A Data
More informationTwo-Factor Authentication
Two-Factor Authentication Two-Factor Authentication is an enhanced security feature for Payentry. It adds an extra layer of protection to ensure only authorized users can gain access to your data. In addition
More informationSAP NetWeaver Fiori. For more information, see "Creating and enabling a trusted provider for Centrify" on page 108-10.
Chapter 108 Configuring SAP NetWeaver Fiori The following is an overview of the steps required to configure the SAP NetWeaver Fiori Web application for single sign-on (SSO) via SAML. SAP NetWeaver Fiori
More informationMcAfee Cloud Single Sign On
Setup Guide Revision B McAfee Cloud Single Sign On COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee
More informationQLIKVIEW MOBILE SECURITY
QLIKVIEW MOBILE SECURITY QlikView Technical Brief Published: March, 2011 qlikview.com QlikView Mobile Security Mobile devices are convenient, versatile and, for many employees, they are indispensable.
More informationNovell Filr 1.0.x Mobile App Quick Start
Novell Filr 1.0.x Mobile App Quick Start February 2014 Novell Quick Start Novell Filr allows you to easily access all your files and folders from your desktop, browser, or a mobile device. In addition,
More informationInstallation and Configuration Guide
Installation and Configuration Guide BlackBerry Resource Kit for BlackBerry Enterprise Service 10 Version 10.2 Published: 2015-11-12 SWD-20151112124827386 Contents Overview: BlackBerry Enterprise Service
More informationConfiguring. SuccessFactors. Chapter 67
Chapter 67 Configuring SuccessFactors The following is an overview of the steps required to configure the SuccessFactors Enterprise Edition Web application for single sign-on (SSO) via SAML. SuccessFactors
More informationActive Directory Integration 855.426.7227. www.onelogin.com twitter.com/onelogin ONELOGIN WHITEPAPER
Active Directory Integration Even as enterprises continue to adopt more cloud applications, Active Directory (AD) and Lightweight Directory Access Protocol (LDAP) still play a critical role in how information
More informationLink and Sync Guide for Hosted QuickBooks Files
Link and Sync Guide for Hosted QuickBooks Files A How-To Guide for Syncing QuickBooks Files Table of Contents Hosted QuickBooks Files Overview:... 2 Rules Overview:... 2 Link and Sync Hosted QuickBooks
More informationConfiguring SuccessFactors
Chapter 117 Configuring SuccessFactors The following is an overview of the steps required to configure the SuccessFactors Enterprise Edition Web application for single sign-on (SSO) via SAML. SuccessFactors
More informationAn Overview of Samsung KNOX Active Directory and Group Policy Features
C E N T R I F Y W H I T E P A P E R. N O V E M B E R 2013 An Overview of Samsung KNOX Active Directory and Group Policy Features Abstract Samsung KNOX is a set of business-focused enhancements to the Android
More informationUP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
More informationApps for every employee
Apps for every employee ipad 12:30 PM 100% Apps for every employee Mobilize everyday processes, remove costly bottlenecks, and accelerate the business. 12:30 PM 100% Apps for expense submission, corporate
More informationWHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices
WHITE PAPER Secure mobile computing and business intelligence on Apple and Android mobile devices MicroStrategy Mobile App Platform Copyright Information All Contents Copyright 2014 MicroStrategy Incorporated.
More informationGO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown
GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of
More informationEmployee Active Directory Self-Service Quick Setup Guide
Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:
More informationMod 2: User Management
Office 365 for SMB Jump Start Mod 2: User Management Chris Oakman Managing Partner Infrastructure Team Eastridge Technology Stephen Hall CEO & SMB Technologist District Computers 1 Jump Start Schedule
More informationUser Management Tool 1.5
User Management Tool 1.5 2014-12-08 23:32:23 UTC 2014 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents User Management Tool 1.5... 3 ShareFile User Management
More informationSchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
More informationColligo Briefcase Enterprise. Administrator s Guide
Enterprise Administrator s Guide CONTENTS Introduction... 2 Target Audience... 2 Overview... 2 Key Features... 2 Platforms Supported... 2 SharePoint Security & Privileges... 2 Deploying Colligo Briefcase...
More informationMulti-Factor Authentication Job Aide
To start your account configuration and begin using Multi-Factor Authentication, log in to the CCHMC Multi-Factor Authentication User Portal at https://mfa.cchmc.org/multifactorauth. For assistance, please
More informationOnline Banking Upgrade FAQs
Frequently Asked Questions Why is Town & Country changing to a new online banking system? When will the change take place? What is different about the new online banking system? Do I have to re-register
More informationSingle Sign On. SSO & ID Management for Web and Mobile Applications
Single Sign On and ID Management Single Sign On SSO & ID Management for Web and Mobile Applications Presenter: Manish Harsh Program Manager for Developer Marketing Platforms of NVIDIA (Visual Computing
More informationAdministering Google Apps & Chromebooks for Education
Administering Google Apps & Chromebooks for Education February 4, 2016 Edward Doan @edwardd / google.com/+edwarddoan customer quotes and snippets It s almost this easy. also highlight customer map? Google
More informationFirePass SSLVPN Client Software Deployment Guide For Windows Mobile 5 and 6 Devices MAN 0263 01
FirePass SSLVPN Client Software Deployment Guide For Windows Mobile 5 and 6 Devices MAN 0263 01 Product Version This manual applies to the F5 SSLV client software provided as part of the FirePass 6.0.2,
More informationWhatsUp Gold v16.3 Installation and Configuration Guide
WhatsUp Gold v16.3 Installation and Configuration Guide Contents Installing and Configuring WhatsUp Gold using WhatsUp Setup Installation Overview... 1 Overview... 1 Security considerations... 2 Standard
More informationAdobe Connect LMS Integration for Blackboard Learn 9
Adobe Connect LMS Integration for Blackboard Learn 9 Install Guide Introduction The Adobe Connect LMS Integration for Blackboard Learn 9 gives Instructors, Teaching Assistants and Course Builders the ability
More informationRich Communication Suite Enabler. plus integration with your existing VoIP services
Rich Communication Suite Enabler plus integration with your existing VoIP services Join the next generation telecom market and offer services that are blend the best features of Skype, Viber and WhatsApp.
More informationVMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationCitrix Virtual Classroom. Deliver file sharing and synchronization services using Citrix ShareFile. Self-paced exercise guide
Deliver file sharing and synchronization services using Citrix ShareFile Self-paced exercise guide Table of Contents Table of Contents... 2 Overview... 3 Exercise 1: Setting up a ShareFile Account... 6
More informationHow to Configure Outlook 2010 E-mail Client for Exchange
LAUSD IT Help Desk How to Configure Outlook 2010 E-mail Client for Exchange (03/04/2012) LAUSD IT Help Desk 333 S. Beaudry Ave. 9 th Floor Phone 213.241.5200 Table of Contents Configure Outlook 2010 for
More information