Configuring Sponsor Authentication
|
|
|
- Helen McDowell
- 10 years ago
- Views:
Transcription
1 CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five options available: Local User Authentication Create local sponsor accounts directly on the Cisco NAC Guest Server. See Configuring Local Sponsor Authentication, page 4-1. Active Directory Authentication Authenticate sponsors against an existing Active Directory (AD) implementation. See Configuring Active Directory (AD) Authentication, page 4-6. LDAP Authentication Authenticate sponsors against a Lightweight Directory Access Protocol (LDAP) server. See Configuring LDAP Authentication, page RADIUS Authentication Authenticate sponsors against a RADIUS server. See Configuring RADIUS Authentication, page Active Directory Single Sign-On This option uses Kerberos between the client s web browser and the Cisco NAC Guest Server to automatically authenticate a sponsor against an Active Directory Domain Controller. See Configuring Active Directory Single Sign-On, page You can configure multiple authentication servers in the Cisco NAC Guest Server as well as the order in which the authentication servers are used to authenticate sponsors. For details, see Configuring Sponsor Authentication Settings, page Configuring Local Sponsor Authentication Local authentication allows you to set up sponsor user accounts directly on the Cisco NAC Guest Server. You can do the following with local authentication: Add New Local User Account Edit Existing User Account Delete Existing User Account Add New Local User Account From the administration interface, select Authentication > Sponsors > Local User Database from the menu as shown in Figure
2 Configuring Local Sponsor Authentication Chapter 4 Figure 4-1 Local Users Step 2 Click the Add User button to bring up the local sponsor configuration page as shown in Figure 4-2. Figure 4-2 Add Local User In the Add a Local User Account page, enter all the sponsor user credentials: First Name Type the first name of the sponsor. Last Name Type the last name of the sponsor. Type address of the sponsor. Group Select the group for the sponsor account from the dropdown. Chapter 5, Configuring Sponsor User Groups provides further details on groups. 4-2
3 Chapter 4 Configuring Local Sponsor Authentication Step 4 Username Type the user name for the sponsor account. Password Type the password for the sponsor account. Confirm Retype the password for the sponsor account Click the Add User button. If there are any errors, the account is not added and an error message is displayed at the top of the page. If successfully added, a success message is displayed at the top of the page and you can add additional user accounts. Edit Existing User Account You can modify the settings of local sponsor accounts that are already created. From the administration interface, select Authentication > Sponsors and click the Local User Database tab as shown in Figure 4-3. Figure 4-3 Local Users to Edit Step 2 Select the user from the list and click the underlined username. In the Edit a Local User Account page, edit the user credentials as shown in Figure
4 Configuring Local Sponsor Authentication Chapter 4 Figure 4-4 Edit Local User Account First Name Edit the first name for the sponsor account. Last Name Edit the last name for the sponsor account. Edit the address of the sponsor. Group Select the group for the sponsor account from the dropdown. Chapter 5, Configuring Sponsor User Groups provides further details on groups. Note Leaving the Password and Repeat Password fields empty retains the existing password. Step 4 Password Change the password for the sponsor account. Confirm Retype the changed password for the sponsor account. Click the Save Settings button. If there are any errors, the account is not changed and an error message is displayed at the top of the page. If successfully changed, a success message is displayed at the top of the page and you can make additional changes to the same user account. Delete Existing User Account You can delete existing sponsor user accounts from the administration interface. From the administration interface, select Authentication > Sponsors and then click the Local User Database tab as shown in Figure
5 Chapter 4 Configuring Local Sponsor Authentication Figure 4-5 Select User to Delete Step 2 A list of local users appears on the page. Choose the user you wish to delete by clicking the bin icon to the right of the Group Name field. Confirm deletion of the user at the prompt. If successfully deleted, a success message is displayed at the top of the page and you can perform additional local user account operations. 4-5
6 Configuring Active Directory (AD) Authentication Chapter 4 Configuring Active Directory (AD) Authentication Active Directory authentication authenticates sponsor users to the Guest Server using their existing AD user accounts. The sponsors need not have another set of user names and passwords to authenticate to the Guest Server. It also enables the administrator to quickly roll out Guest Access because there is no need to create and manage additional local sponsor accounts. Active Directory authentication allows you to do the following: Add Active Directory Domain Controller Edit Existing Domain Controller Delete Existing Domain Controller Entry AD authentication supports authentication against multiple domain controllers. The domain controllers can be part of the same Active Directory to provide resilience, or they can be in different Active Directories. The Guest Server can authenticate sponsor users from separate domains, even where no trust relationship is configured. All Active Directory authentication is performed against individual domain controller entries. A domain controller entry consists of 6 items: Server Name A text description to identify the domain controller. As a best practice, Cisco recommends identifying the domain controller and the account suffix in this field (although it can be set to anything that you choose). User Account Suffix Every user in Active Directory has a full user logon name which appears as username@domain. Typing suffix (including symbol) in this field allows sponsor users not to have to enter their full user logon name. Domain Controller IP Address The IP address of the domain controller authenticated by the sponsor user. Base DN The root of the Active Directory. This allows an LDAP search to be performed to find the user group of the sponsor. AD Username The user account that has permissions to search the AD. This allows an LDAP search for the user group of the sponsor. AD Password The password for the user account that has permissions to search the AD. To allow you to authenticate different user account suffixes against the same domain controller, you can create multiple domain controller entries with the same IP address and different user Account suffixes. The Server Name, User Account Suffix, and Base DN need to be different in each entry. To provide resilience in the event of a domain controller failure, you can enter multiple entries for the same User Account Suffix with different Domain Controller IP Addresses. The Server Name needs to be different in each entry. The Guest Server attempts to authenticate sponsors against each Domain Controller entry according to the Authentication Order specified in Settings, page
7 Chapter 4 Configuring Active Directory (AD) Authentication Add Active Directory Domain Controller From the administration interface, select Authentication > Sponsors > Active Directory Servers from the menu as shown in Figure 4-6. Figure 4-6 Active Directory Authentication Step 2 Click the Add Domain Controller button. In the Add Active Directory Domain Controller page, enter all the details for authenticating against a specific AD Domain Controller as shown in Figure 4-7. Figure 4-7 Add Active Directory Domain Controller Server Name Type a text description of the AD Server Name and account suffix for the domain controller. For example: CCA.CISCO.COM. User Account Suffix Type the User Account Suffix and include the For Every AD user has a full user logon name that appears as username@domain. To allow sponsors to type their user logon name alone, type part (including symbol) in this field. Domain Controller Type the IP address or DNS name for the domain controller. This is the IP address of the DC authenticated by the sponsor. 4-7
8 Configuring Active Directory (AD) Authentication Chapter 4 Step 4 Step 5 Base DN Type the Base Distinguished Name (DN) of the domain controller. This is the name of the root of the directory tree. It is used so that when group searches are performed, the Guest Server knows from where to start. An example of the base DN for the domain cca. cisco.com is DC=cca,DC=cisco,DC=com. Username Type a username that has permissions to search the Active Directory using LDAP. This allows the Guest Server to find out details about users such as the list of groups to which they belong. Password In addition to the AD Username, type the password for that account. Confirm Retype the password for confirmation. Enabled Check the checkbox to enable the Guest Server to use this AD server to authenticate sponsors. If not checked, the AD server will not be used. Click the Test Connection button to verify that the settings are correct for the domain controller. Test Connection authenticates with the specified AD Username and Password to verify the settings. Success or failure status is returned by Active Directory Connection Successful or Active Directory Connection Failed messages. Click the Add Domain Controller button to add the Domain Controller button. If successfully added, a confirmation message is displayed at the top of the page. Edit Existing Domain Controller Step 2 From the administration interface, select Authentication > Sponsor > Active Directory Servers from the menu as shown in Figure 4-6. Select the Active Directory Domain Controller from the list and click the underlined domain name to select and edit the domain controller as shown in Figure 4-8. Figure 4-8 Select Domain Controller to Edit In the Edit Active Directory Domain Controller page as shown in Figure 4-9, edit the details for authenticating against this AD domain controller. 4-8
9 Chapter 4 Configuring Active Directory (AD) Authentication Figure 4-9 Edit Active Directory Domain Controller Step 4 Modify settings as needed: User Account Suffix Edit the User Account Suffix and include the for Every AD user has a full user logon name that appears as username@domain. To allow sponsors not to have to type their full user logon name, type part (including symbol) in this field. Domain Controller Edit the IP address for the domain controller. This is the IP address of the DC against which the sponsor authenticates. Base DN Edit the Base Distinguished Name (DN) of the domain controller. This is the name of the root of the directory tree. It is used so that when group searches are performed, the Guest Server knows from where to start. An example of the base DN for the domain cca. cisco.com is DC=cca,DC=cisco,DC=com. AD Username Edit the username that has permissions to search the Active Directory using LDAP. This allows the Guest Server find out details about users such as the list of groups to which they belong. Note If you do not want to change the password, leave the Password and Confirm fields empty to retain the existing password. Step 5 Password Edit the password for that AD user account that has search permissions. Confirm Retype the password to make sure it is correct. Enabled Check this checkbox to enable the Guest Server to use this AD server to authenticate sponsors. If not checked, the AD server will not be used. Click the Test Connection button to verify that the settings are correct for the domain controller. Test Connection authenticates with the specified AD Username and Password to verify the settings. Success or failure status is returned by Active Directory Connection Successful or Active Directory Connection Failed messages. 4-9
10 Configuring LDAP Authentication Chapter 4 Step 6 Click the Save Settings button. Delete Existing Domain Controller Entry From the administration interface, select Authentication > Sponsor > Active Directory Servers from the menu. Step 2 Click the underlined name of the domain controller from the list as shown in Figure Figure 4-10 Delete Domain Controller entries Step 4 Delete the domain controller by clicking the bin icon to the right of the Status field. Confirm deletion of the Domain Controller at the prompt. If there are any errors, the DC is not changed and an error message is displayed at the top of the page. If successfully deleted, a success message is displayed at the top of the page and you can perform additional Domain Controller operations. Configuring LDAP Authentication LDAP authentication authenticates sponsor users to the Guest Server using their existing LDAP user accounts. The sponsors need not have another set of user names and passwords to authenticate to the Guest Server. It also enables the administrator to quickly roll out Guest Access because there is no need to create and manage additional local sponsor accounts. LDAP authentication allows you to do the following: Add an LDAP Server Edit an Existing LDAP Server Delete an Existing LDAP Server Entry LDAP authentication supports authentication against multiple LDAP Servers. An LDAP server entry consists of multiple items: LDAP Server Name A text description to identify the LDAP Server. LDAP Server URL This is the URL to access the LDAP server such as ldap://ldap.cisco.com. Version The LDAP version to use (version 1, 2 or 3). Base DN This is the Distinguished Name of the container object where an LDAP search to find the user begins, such as OU=Engineering,O=Cisco. 4-10
11 Chapter 4 Configuring LDAP Authentication User Search Filter The User Search Filter defines how user entries are named in the LDAP server. For example, you can define them as uid (uid=%username%) or cn (cn=%username%). Group Mapping There are two main methods that LDAP servers use for assigning users to groups: 1. Storing the group membership in an attribute of the user object. With this method, the user object has one or more attributes that list the groups to which the user belongs. If your LDAP server uses this method of storing group membership, you need to enter the name of the attribute which holds the groups of which the user is a member. 2. Storing the user membership in an attribute of the group object. With this method, there is a group object that contains a list of the users who are members of the group. If your LDAP server uses this method, you need to specify the group to check under the LDAP mapping section of a User Group for which you want to match the user. To determine the method to be used, Cisco recommends checking the LDAP documentation for your server or using an LDAP browser available at to check the attributes of the server. Username The user account that has permissions to search the LDAP server. This is needed so that the Cisco NAC Guest Server can search for the user account and group mapping information. Password The password for the user account that has permissions to search the LDAP server. To provide resilience in the event of an LDAP server failure, you can enter multiple entries for high availability LDAP servers pointing to the same database. The Server name and URL need to be different in each entry. The Guest Server attempts to authenticate sponsors against each LDAP server entry in the order specified by Authentication Order, as detailed in Settings, page To verify that you have the correct LDAP credentials for connecting to your LDAP server, Cisco recommends testing an LDAP browser available at Add an LDAP Server From the administration interface, select Authentication > Sponsors > LDAP Servers from the menu as shown in Figure Figure 4-11 LDAP Authentication Step 2 Click the Add LDAP Server button. In the Add LDAP Server page, enter all the details for authenticating against a specific LDAP server as shown in Figure
12 Configuring LDAP Authentication Chapter 4 Figure 4-12 Add LDAP Server LDAP Server Name Type a text description of the LDAP Server Name. For example: Cisco LDAP - ldap.cisco.com. LDAP Server URL Enter the URL for accessing the LDAP server, such as ldap://ldap.cisco.com or ldaps://ldap.cisco.com. Version The version of LDAP supported by the server (version 1, 2 or 3). Base DN This is the Distinguished Name of the container object from which an LDAP search to find the user is started, such as OU=Users,O=Cisco.com or OU=Engineering,O=Cisco. User Search Filter The User Search Filter defines how user entries are named in the LDAP server. For example you can define them to be uid (uid=%username%) or cn (cn=%username%). The %USERNAME% should be placed where the username will be inserted in a search. Group Mapping There are two main methods that LDAP servers use for assigning users to groups: 1. Storing the group membership in an attribute of the user object. With this method the user object has one or more attributes that list the groups of which the user is a member. If your LDAP server uses this method of storing group membership, you need to enter the name of the attribute which holds the groups of which the user is a member. This attribute may be called something like groupmembership, memberof, or group. 2. Storing the user membership in an attribute of the group object. With this method there is a group object that contains a list of the users who are members of the group. If your LDAP server uses this method, you need to specify the group to check under the LDAP mapping section of a User Group to which you want to match the user. To determine the method to be used, Cisco recommends checking the LDAP documentation for your server or using an LDAP browser like the one available at to check the attributes of the server. 4-12
13 Chapter 4 Configuring LDAP Authentication Step 4 Username The user account that has permissions to search the LDAP server. This is needed so that the Cisco NAC Guest Server can search for the user account and group mapping information. Password The password for the user account that has permissions to search the LDAP server. Confirm Repeat the password for confirmation. Enabled Check the checkbox to enable the Guest Server to use this LDAP server to authenticate sponsors. If not checked, the LDAP server will not be used. Click the Add LDAP Server button to successfully save the settings. Edit an Existing LDAP Server Step 2 From the administration interface, select Authentication > Sponsor > LDAP Servers from the menu. Select the LDAP Server you wish to edit from the list and click the underlined domain of that server as shown in Figure Figure 4-13 Select LDAP Server to Edit In the LDAP Server page as shown in Figure 4-14, edit the details for authenticating against this LDAP server. 4-13
14 Configuring LDAP Authentication Chapter 4 Figure 4-14 Edit LDAP Server Settings Step 4 Modify settings as needed: LDAP Server URL Enter the URL for accessing the LDAP server, such as ldap://ldap.cisco.com or ldaps://ldap.cisco.com. Version The version of LDAP supported by the server (version 1, 2 or 3). Base DN This is the Distinguished Name of the container object where an LDAP search to find the user will be started from, such as OU=Users,O=Cisco.com or OU=Engineering,O=Cisco. User Search Filter The User Search Filter defines how user entries are named in the LDAP server. For example you can define them to be uid (uid=%username%) or cn (cn=%username%). The %USERNAME% should be placed where the username will be inserted in a search. Group Mapping There are two main methods that LDAP servers use for assigning users to groups: 1. Storing the group membership in an attribute of the user object. With this method the user object has one or more attributes that list the groups of which the user is a member. If your LDAP server uses this method of storing group membership, you need to enter the name of the attribute which holds the groups of which the user is a member. This attribute may be called something like groupmembership, memberof, or group. 2. Storing the user membership in an attribute of the group object. With this method there is a group object that contains a list of the users who are members of the group. If your LDAP server uses this method, you need to specify the group to check under the LDAP mapping section of a User Group to which you want to match the user. 4-14
15 Chapter 4 Configuring LDAP Authentication To determine the method to be used, Cisco recommends checking the LDAP documentation for your server or using an LDAP browser like the one available at to check the attributes of the server. Username The user account that has permissions to search the LDAP server. This is needed so that the Cisco NAC Guest Server can search for the user account and group mapping information. Password The password for the user account that has permissions to search the LDAP server. Confirm Repeat the password for confirmation. Note If you do not want to change the password, leave the Password and Confirm fields empty to retain the existing password. Step 5 Step 6 Enabled Check the checkbox to enable the Guest Server to use this LDAP server to authenticate sponsors. If not checked, the LDAP server will not be used. Click the Test Connection button to verify that the settings are correct for the LDAP server. The Test Connection will bind with the username and password specified to the LDAP server to verify that it can bind successfully. Success or failure status is returned by LDAP Connection Successful or LDAP Connection Failed messages. Click the Save Settings button. Delete an Existing LDAP Server Entry From the administration interface, select Authentication > Sponsor > LDAP Servers from the menu. Step 2 Select the LDAP Server from the list as shown in Figure Figure 4-15 Delete LDAP Server entries Step 4 A list of LDAP Servers appears on the choose the server you wish to delete by clicking the bin icon to the right of the Status field. Confirm deletion of the LDAP Server at the prompt. If there are any errors, the LDAP Server is not changed and an error message is displayed at the top of the page. If successfully deleted, a success message is displayed at the top of the page and you can perform additional LDAP Server operations. 4-15
16 Configuring RADIUS Authentication Chapter 4 Configuring RADIUS Authentication RADIUS authentication authenticates sponsor users to the Cisco NAC Guest Server using their existing RADIUS user accounts. The sponsors need not have another set of user names and passwords to authenticate to the Guest Server. It also enables the administrator to quickly roll out Guest Access because there is no need to create and manage additional local sponsor accounts. RADIUS authentication allows you to do the following: Add a RADIUS Server Edit an Existing RADIUS Server Delete an Existing RADIUS Server Entry Add a RADIUS Server From the administration interface, select Authentication > Sponsors > RADIUS Servers from the menu as shown in Figure Figure 4-16 RADIUS Authentication Step 2 Click the Add RADIUS Server button. In the Add RADIUS Server page, enter all the details for authenticating against a specific RADIUS server as shown in Figure Figure 4-17 Add RADIUS Server Server Name Type a text description of the RADIUS Server Name. For example: Cisco RADIUS - radius.cisco.com. 4-16
17 Chapter 4 Configuring RADIUS Authentication Step 4 Server IP Address Enter the IP address or domain name of the RADIUS server. Port Enter the UDP port used to connect to the RADIUS server. The common ports for RADIUS authentication are ports 1645 or RADIUS Secret The shared secret used to secure the communications between the Cisco NAC Guest Server and the RADIUS server. Confirm Repeat the shared secret for confirmation. Enabled Check the checkbox to enable the Guest Server to use this RADIUS server to authenticate sponsors. If not checked, the RADIUS server will not be used. Click the Save button. Edit an Existing RADIUS Server Step 2 From the administration interface, select Authentication > Sponsor > RADIUS Servers from the menu. Select the RADIUS server from the list and click the underlined name of the server you wish to edit as shown in Figure Figure 4-18 Select RADIUS Server to Edit In the Edit RADIUS Server Details page as shown in Figure 4-19, edit the details for authenticating against this RADIUS server. Figure 4-19 Edit RADIUS Server Settings 4-17
18 Configuring RADIUS Authentication Chapter 4 Step 4 Modify settings as needed: Server IP Address Enter the IP address or domain name of the RADIUS server. Port Enter the UDP port used to connect to the RADIUS server. The common ports for RADIUS authentication are ports 1645 or RADIUS Secret The shared secret used to secure the communications between the Cisco NAC Guest Server and the RADIUS server. Note If you do not want to change the shared secret, leave the Secret and Confirm fields to retain the existing shared secret. Step 5 Enabled Check the checkbox to enable the Guest Server to use this RADIUS server to authenticate sponsors. If not checked, the RADIUS server will not be used. Click the Save Settings button. Delete an Existing RADIUS Server Entry From the administration interface, select Authentication > Sponsor > RADIUS Servers from the menu. Step 2 Select the RADIUS server from the list as shown in Figure Figure 4-20 Delete RADIUS Server Entries Step 4 A list of RADIUS Servers appears on the page. Click the bin icon to the right of the Status field to delete the server. Confirm deletion of the RADIUS server at the prompt. If there are any errors, the RADIUS server is not changed and an error message is displayed at the top of the page. If successfully deleted, a success message is displayed at the top of the page and you can perform additional RADIUS operations. 4-18
19 Chapter 4 Settings Settings Changing the Order of Authentication Servers When a sponsor authenticates against the Cisco NAC Guest Server, the Guest Server tries each authentication server that has been defined, in order, until it successfully authenticates a sponsor. If none of the authentication servers can authenticate the sponsor, an error message is returned. As you can define many different authentication servers of different kinds, you can order them in any way you want on a server-by-server basis. From the administration interface, select Authentication > Sponsor > Authentication Order from the menu as shown in Figure Figure 4-21 Authentication Order Step 2 The first server to be authenticated against is at the top of the list and the last one at the bottom. Select the server that you want to re-order from the list and click either the move up or move down button. Perform this action with all the servers until they are in the correct order. To save the authentication order click the Change Order button. Session Timeouts A sponsor that logs in to the Cisco NAC Guest Server is logged out after a period of inactivity. You can set the inactivity period through the Session Timeout Settings page. Note The Session Timeout defined here applies to both the Sponsor and Administration interfaces. See Admin Session Timeout, page From the administration interface, select Authentication > Sponsor > Settings from the menu as shown in Figure
20 Configuring Active Directory Single Sign-On Chapter 4 Figure 4-22 Session Timeout Step 2 Enter the Session Timeout value in minutes (default is 10 minutes). When sponsors are inactive for this amount of time, their sessions expire and the next action they perform takes them to the login page. Click the Save Settings button to save the session timeout. Configuring Active Directory Single Sign-On The Active Directory Single Sign-On (AD SSO) feature uses Kerberos between the client s web browser and the Cisco NAC Guest Server to automatically authenticate a sponsor against an Active Directory Domain Controller. An Active Directory Domain Controller in the same domain as the single sign on configuration must have been previously configured as described in Configuring Active Directory (AD) Authentication, page 4-6. Starting from NAC Guest Server 2.0.4, the following environments are supported: Windows 2003 Server Windows 2008 R2 Server Microsoft Windows 2003 client with Internet Explorer 6, 7, 8, and 9 Note The AD SSO requires DES encryption, which is disabled by default on Windows 2008 R2 Server. If you are using Windows 2008 R2 Server, you should enable the DES encryption manually to use AD SSO. Starting from NAC Guest Server 2.1.0, the following environments are supported: Functional level Windows 2012 in Windows 2012 server Functional level Windows 2008 R2 in Windows 2012 server Functional level Windows 2008 in Windows 2012 server Functional level Windows 2003 in Windows 2012 server Functional level Windows 2008 in Windows 2008 R2 server Functional level Windows 2003 in Windows 2008 R2 server Functional level Windows 2000 in Windows 2008 R2 server 4-20
21 Chapter 4 Configuring Active Directory Single Sign-On Requirements for Active Directory Single Sign-On The following requirements must be met for Active Directory Single Sign-On to be configured successfully: DNS must be configured and working on the Cisco NAC Guest Server DNS must be configured and working on the Domain Controller. Both of the following DNS entries for the Cisco NAC Guest Server must be defined: A record PTR record Both of the following DNS entries for the Domain Controller must be defined: A record PTR record Cisco NAC Guest Server time settings must be synchronized with the Active Directory Domain. If any of these setting are not met, then AD SSO configuration will fail. Note Cisco strongly recommends to configure NTP so that time is synchronized with the Active Directory Domain. Single Sign-On will fail if the time on the Cisco NAC Guest Server time differs by more than 5 minutes from the client or the domain. Step 2 Configure an Active Directory Server as described in Configuring Active Directory (AD) Authentication, page 4-6. An Active Directory Server is needed so that users performing Single Sign-On can be correctly mapped against a sponsor group. The Active Directory Server must be in the same domain as the Single Sign-On configuration. From the administration interface, select Authentication > AD Single Sign-On from the left menu as shown in Figure
22 Mapping User Group with AD SSO Chapter 4 Figure 4-23 Active Directory Single Sign-On Step 4 Step 5 Step 6 Step 7 Step 8 Step 9 Check the Enable AD Single Sign On checkbox to enable AD SSO. Type the Active Directory Domain Name for the domain for which you want to enable SSO. Type the Fully Qualified Domain Name of the Active Directory Domain Controller. The Cisco NAC Guest Server needs to be able to resolve both A and PTR records for the Domain Controller. Type the Fully Qualified Domain Name of the NAC Guest Server. The NAC Guest Server needs to be able to resolve both A and PTR records for itself with DNS. Type an AD Administrator Username for the Domain, this account is used for adding the NAC Guest Server to the domain and creating its computer account. Type the Password for the AD Administrator and retype it in the Confirm field. Click Save. The NAC Guest Server will join to the domain, create a computer account and turn on Active Directory Single Sign on. Mapping User Group with AD SSO To map a user group with AD SSO, you need to configure the Active Directory Server as Auth Server and then map the AD group with Sponsor User Group. Choose Authentications > Sponsors > Active Directory Servers. Step 2 Add a new domain controller. Click Test Connection to ensure that have configured the domain controller. Step 4 Add a new user group as described in Adding Sponsor User Groups, page 5-2. Step 5 Select No in the Create Bulk Accounts dropdown. 4-22
23 Chapter 4 Configuring AD SSO on Multiple Domains Step 6 Step 7 In the Active Directory Mapping, ensure that you are selecting the right user group as described in Mapping to Active Directory Groups, page You can verify that the user is placed in the Sponser group by checking the Audit Logs as described in Audit Logs, page Configuring AD SSO on Multiple Domains Starting from NAC Guest Server Release 2.0.4, you can configure AD SSO on multiple domains. In the following example, the NAC Guest Server is already present in the domain cca.cisco.com. This section explains how to enable AD SSO for a different domain child.cca.cisco.com present in the same forest, cca.cisco.com. Before configuring the SSO section, ensure that the "A" and "PTR" records exist for the domain controller and NAC Guest Server. From the administration interface, select Authentication > AD Single Sign-On from the left menu as shown in Figure Figure 4-24 Server Settings for Multiple Domain Step 2 Step 4 Step 5 Check the Enable AD Single Sign On checkbox to enable AD SSO. Type the Active Directory Domain Name as CHILD.CCA.CISCO.COM. Type the Fully Qualified Domain Name of the Active Directory Domain Controller. Type the Fully Qualified Domain Name of the NAC Guest Server as ngs.cca.cisco.com. 4-23
24 Configuring AD SSO on Multiple Forests Chapter 4 Step 6 Type an AD Administrator Username for the Domain. Step 7 Type the Password for the AD Administrator and retype it in the Confirm field. Step 8 Click Save. Step 9 Once the domain is configured, you get a success message as shown in Figure Figure 4-25 Configuration Successful for Multi-Domain Setup Verifying the Configuration for Multiple Domain From the user machine, log into the domain. In this example, this machine is part of the child.cca.cisco.com domain. Ensure that the NAC Guest Server is part of local intranet and auto-login is turned on. In the web browser, enter the domain name. You should be automatically logged in to the domain with the credentials. Note Use the FQDN for the NAC Guest Server to test SSO from the browser. The IP address does not work. Configuring AD SSO on Multiple Forests Starting from NAC Guest Server Release 2.0.4, you can configure AD SSO on multiple forests. In the following example, the NAC Guest Server is already present in the forest cca.cisco.com. This section explains how to enable AD SSO for a different domain chn-acsdev.com present in a different forest. Before configuring the SSO section, ensure that the "A" and "PTR" records exist for the domain controller and NAC Guest Server. Note AD SSO is supported in cross-forest configurations with two-way trust established between the forests. 4-24
25 Chapter 4 Configuring AD SSO on Multiple Forests From the administration interface, select Authentication > AD Single Sign-On from the left menu as shown in Figure Figure 4-26 Server Settings for Multiple Forest Step 2 Check the Enable AD Single Sign On checkbox to enable AD SSO. Type the Active Directory Domain Name as CHN-ACSDEV.COM. Step 4 Type the Fully Qualified Domain Name of the Active Directory Domain Controller. Step 5 Type the Fully Qualified Domain Name of the NAC Guest Server as ngs.cca.cisco.com. Step 6 Type an AD Administrator Username for the Domain. Step 7 Type the Password for the AD Administrator and retype it in the Confirm field. Step 8 Click Save. Step 9 Once the domain is configured, you get a success message as shown in Figure
26 Troubleshooting the AD SSO Configuration Chapter 4 Figure 4-27 Configuration Successful for Multi-Forest Setup Verifying the Configuration for Multiple Forest From the user machine, log into the domain. In this example, the machine is part of the chn-acsdev.com domain. Ensure that the NAC Guest Server is part of local intranet and auto-login is turned on. In the web browser, enter the domain name. You should be automatically logged in to the domain with the credentials. Note Use the FQDN for the NAC Guest Server to test SSO from the browser. The IP address does not work. Troubleshooting the AD SSO Configuration This section describes the error messages in the logs and tips to troubleshoot the issues that may occur during the configuration. Error: Domain format incorrect / Domain Controller must be a FQDN, not an IP address The domain has not been entered in a correct format, for example: CCA.CISCO.COM. Error: Hostname must be a FQDN, not an IP address The hostname of the NAC Guest server cannot be an IP address it must be a Fully Qualified Domain Name, example: nac.cca.cisco.com. 4-26
27 Chapter 4 Troubleshooting the AD SSO Configuration Error: Cannot determine IP address for Domain Controller Error: Cannot get DNS A record for Domain Controller Error: Cannot get DNS A record for hostname Error: Cannot get DNS PTR record for Domain Controller IP address Error: Cannot get DNS PTR record for hostname IP address The above errors occur when there is an issue with DNS configuration. Error: Failed to create computer account for this server on the Domain Controller. See application log for details Error: Invalid username/password The administrator username or password is not correct. View the application log for full details of the error. Error: Invalid Domain or cannot resolve network address for DC There is a DNS problem on the AD server. Error: Domain Controller time does not match this server's time Ensure that the server times match. It is recommended to use NTP to synchronize server times. Error: The DC cannot determine the hostname for the Guest server by reverse lookup. There may be an issue with your DNS configuration. The above error may be due to DNS configuration issue on the AD server. 4-27
28 Troubleshooting the AD SSO Configuration Chapter
Management, Logging and Troubleshooting
CHAPTER 15 This chapter describes the following: SNMP Configuration System Logging SNMP Configuration Cisco NAC Guest Server supports management applications monitoring the system over SNMP (Simple Network
PriveonLabs Research. Cisco Security Agent Protection Series:
Cisco Security Agent Protection Series: Enabling LDAP for CSA Management Center SSO Authentication For CSA 5.2 Versions 5.2.0.245 and up Fred Parks Systems Consultant 3/25/2008 2008 Priveon, Inc. www.priveonlabs.com
Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names
DataCove DT Active Directory Authentication In Active Directory (AD) authentication mode, the server uses NTLM v2 and LDAP protocols to authenticate users residing in Active Directory. The login procedure
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication
Configuring the Cisco ISA500 for Active Directory/LDAP and RADIUS Authentication This application note describes how to authenticate users on a Cisco ISA500 Series security appliance. It includes these
Enabling single sign-on for Cognos 8/10 with Active Directory
Enabling single sign-on for Cognos 8/10 with Active Directory Overview QueryVision Note: Overview This document pulls together information from a number of QueryVision and IBM/Cognos material that are
Dell Compellent Storage Center
Dell Compellent Storage Center Active Directory Integration Best Practices Guide Dell Compellent Technical Solutions Group January, 2013 THIS BEST PRACTICES GUIDE IS FOR INFORMATIONAL PURPOSES ONLY, AND
800-782-3762 www.stbernard.com. Active Directory 2008 Implementation. Version 6.410
800-782-3762 www.stbernard.com Active Directory 2008 Implementation Version 6.410 Contents 1 INTRODUCTION...2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION...3 2.1 Supported Deployment
How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Skyward LDAP Launch Kit Table of Contents
04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
Siteminder Integration Guide
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
LDAP User Guide PowerSchool Premier 5.1 Student Information System
PowerSchool Premier 5.1 Student Information System Document Properties Copyright Owner Copyright 2007 Pearson Education, Inc. or its affiliates. All rights reserved. This document is the property of Pearson
1 Introduction. Windows Server & Client and Active Directory. www.exacq.com
Windows Server & Client and Active Directory 1 Introduction For an organization using Active Directory (AD) for user management of information technology services, integrating exacqvision into the AD infrastructure
How-to: Single Sign-On
How-to: Single Sign-On Document version: 1.02 nirva systems [email protected] nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features
PineApp Surf-SeCure Quick
PineApp Surf-SeCure Quick Installation Guide September 2010 WEB BASED INSTALLATION SURF-SECURE AS PROXY 1. Once logged in, set the appliance s clock: a. Click on the Edit link under Time-Zone section.
How to Logon with Domain Credentials to a Server in a Workgroup
How to Logon with Domain Credentials to a Server in a Workgroup Johan Loos [email protected] Version 1.0 Authentication Overview Basically when you logon to a Windows Server you can logon locally using
Security Provider Integration RADIUS Server
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Managing Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
User Management: Configuring Authentication Servers
7 CHAPTER User Management: Configuring Authentication Servers This chapter describes how to set up external authentication sources, configure Active Directory Single Sign-On (SSO), VLAN ID or attribute-based
Only LDAP-synchronized users can access SAML SSO-enabled web applications. Local end users and applications users cannot access them.
This chapter provides information about the Security Assertion Markup Language (SAML) Single Sign-On feature, which allows administrative users to access certain Cisco Unified Communications Manager and
Security Provider Integration Kerberos Authentication
Security Provider Integration Kerberos Authentication 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.1 D14465.06 December 2013 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
NetIQ Advanced Authentication Framework - MacOS Client
NetIQ Advanced Authentication Framework - MacOS Client Installation Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 About MacOS Client 4 System Requirements
Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip
Configuring Color Access on the WorkCentre 7120 Using Microsoft Active Directory Customer Tip October 21, 2010 Overview This document describes how to limit access to color copying and printing on the
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
1 Introduction. Ubuntu Linux Server & Client and Active Directory. www.exacq.com Page 1 of 14
Ubuntu Linux Server & Client and Active Directory 1 Introduction For an organization using Active Directory (AD) for user management of information technology services, integrating exacqvision into the
Configuring and Using the TMM with LDAP / Active Directory
Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
OneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support
SonicOS Enhanced 3.2 LDAP Integration with Microsoft Active Directory and Novell edirectory Support Document Scope This document describes the integration of SonicOS Enhanced 3.2 with Lightweight Directory
Getting Started Guide
Getting Started Guide CensorNet Professional Copyright CensorNet Limited, 2007-2011 This document is designed to provide information about the first time configuration and testing of the CensorNet Professional
Dynamic DNS How-To Guide
Configuration Guide Dynamic DNS How-To Guide Overview This guide will show you how to set up a Dynamic DNS host name under the D-Link DDNS service with your D-Link ShareCenter TM. Dynamic DNS is a protocol
CA Performance Center
CA Performance Center Single Sign-On User Guide 2.4 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is
Customer Tips. Configuring Color Access on the WorkCentre 7328/7335/7345 using Windows Active Directory. for the user. Overview
Xerox Multifunction Devices Customer Tips February 13, 2008 This document applies to the stated Xerox products. It is assumed that your device is equipped with the appropriate option(s) to support the
Upgrading User-ID. Tech Note PAN-OS 4.1. 2011, Palo Alto Networks, Inc.
Upgrading User-ID Tech Note PAN-OS 4.1 Revision B 2011, Palo Alto Networks, Inc. Overview PAN-OS 4.1 introduces significant improvements in the User-ID feature by adding support for multiple user directories,
Smart Card Authentication Client. Administrator's Guide
Smart Card Authentication Client Administrator's Guide April 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Smart Card Authentication Client...4 Configuring printer settings for use
Integrating Webalo with LDAP or Active Directory
Integrating Webalo with LDAP or Active Directory Webalo can be integrated with an external directory to identify valid Webalo users and then authenticate them to the Webalo appliance. Integration with
Quality Center LDAP Guide
Information Services Quality Assurance Quality Center LDAP Guide Version 1.0 Lightweight Directory Access Protocol( LDAP) authentication facilitates single sign on by synchronizing Quality Center (QC)
Deploying RSA ClearTrust with the FirePass controller
Deployment Guide Deploying RSA ClearTrust with the FirePass Controller Deploying RSA ClearTrust with the FirePass controller Welcome to the FirePass RSA ClearTrust Deployment Guide. This guide shows you
Security Provider Integration Kerberos Server
Security Provider Integration Kerberos Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER
Integrating VMware Horizon Workspace and VMware Horizon View TECHNICAL WHITE PAPER Table of Contents Introduction.... 3 Requirements.... 3 Horizon Workspace Components.... 3 SAML 2.0 Standard.... 3 Authentication
How To Install Ctera Agent On A Pc Or Macbook With Acedo (Windows) On A Macbook Or Macintosh (Windows Xp) On An Ubuntu 7.5.2 (Windows 7) On Pc Or Ipad
Deploying CTERA Agent via Microsoft Active Directory and Single Sign On Cloud Attached Storage September 2015 Version 5.0 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document
HP Device Manager 4.7
Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...
Introduction to Directory Services
Introduction to Directory Services Overview This document explains how AirWatch integrates with your organization's existing directory service such as Active Directory, Lotus Domino and Novell e-directory
NeoMail Guide. Neotel (Pty) Ltd
NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Certificate Management
Certificate Management This guide provides information on...... Configuring the GO!Enterprise MDM server to use a Microsoft Active Directory Certificate Authority... Using Certificates from Outside Sources...
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Active Directory Requirements and Setup
Active Directory Requirements and Setup The information contained in this document has been written for use by Soutron staff, clients, and prospective clients. Soutron reserves the right to change the
Dell KACE K1000 System Management Appliance Version 5.4. Service Desk Administrator Guide
Dell KACE K1000 System Management Appliance Version 5.4 Service Desk Administrator Guide October 2012 2004-2012 Dell Inc. All rights reserved. Reproduction of these materials in any manner whatsoever without
Chapter 3 Authenticating Users
Chapter 3 Authenticating Users Remote users connecting to the SSL VPN Concentrator must be authenticated before being allowed to access the network. The login window presented to the user requires three
NETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
Configuration Guide BES12. Version 12.3
Configuration Guide BES12 Version 12.3 Published: 2016-01-19 SWD-20160119132230232 Contents About this guide... 7 Getting started... 8 Configuring BES12 for the first time...8 Configuration tasks for managing
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
Scan to E-mail Quick Setup Guide
Xerox WorkCentre M118i Scan to E-mail Quick Setup Guide 701P42574 This guide provides a quick reference for setting up the Scan to E-mail feature on the Xerox WorkCentre M118i. It includes procedures for:
Borderware MXtreme. Secure Email Gateway QuickStart Guide. Copyright 2005 CRYPTOCard Corporation All Rights Reserved
Borderware MXtreme Secure Email Gateway QuickStart Guide Copyright 2005 CRYPTOCard Corporation All Rights Reserved http://www.cryptocard.com Overview MXtreme is a hardened appliance with a highly robust
Defender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
Use Enterprise SSO as the Credential Server for Protected Sites
Webthority HOW TO Use Enterprise SSO as the Credential Server for Protected Sites This document describes how to integrate Webthority with Enterprise SSO version 8.0.2 or 8.0.3. Webthority can be configured
Configuration Guide BES12. Version 12.2
Configuration Guide BES12 Version 12.2 Published: 2015-07-07 SWD-20150630131852557 Contents About this guide... 8 Getting started... 9 Administrator permissions you need to configure BES12... 9 Obtaining
Authentication Methods
Authentication Methods Overview In addition to the OU Campus-managed authentication system, OU Campus supports LDAP, CAS, and Shibboleth authentication methods. LDAP users can be configured through the
User's Guide. Product Version: 2.5.0 Publication Date: 7/25/2011
User's Guide Product Version: 2.5.0 Publication Date: 7/25/2011 Copyright 2009-2011, LINOMA SOFTWARE LINOMA SOFTWARE is a division of LINOMA GROUP, Inc. Contents GoAnywhere Services Welcome 6 Getting Started
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
Active Directory LDAP Quota and Admin account authentication and management
Active Directory LDAP Quota and Admin account authentication and management Version 4.1 Updated July 2014 GoPrint Systems 2014 GoPrint Systems, Inc, All rights reserved. One Annabel Lane, Suite 105 San
www.nexuswebsites.co.uk Professional Mailbox Email Software Setup Guide
Professional Mailbox Email Software Setup Guide Table of contents Before you start... 2 Setting up Outlook 2010... 2 Using Autodiscover to configure Outlook 2010... 2 The Autodiscover wizard has not worked...
Multi-factor Authentication using Radius
Multi-factor Authentication using Radius Netop develops and sells software solutions that enable swift, secure and seamless transfer of video, screens, sounds and data between two or more computers over
Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory
Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory May 21, 2014 This edition of this document applies to Piston OpenStack 3.0. To send us your comments about this document, e-mail [email protected].
LDaemon. This document is provided as a step by step procedure for setting up LDaemon and common LDaemon clients.
LDaemon This document is provided as a step by step procedure for setting up LDaemon and common LDaemon clients. LDaemon... 1 What you should know before installing LDaemon:... 2 ACTIVE DIRECTORY... 2
www.stbernard.com Active Directory 2008 Implementation Guide Version 6.3
800 782 3762 www.stbernard.com Active Directory 2008 Implementation Guide Version 6.3 Contents 1 INTRODUCTION... 2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION... 3 2.1 Supported
Polycom RealPresence Resource Manager System Getting Started Guide
[Type the document title] Polycom RealPresence Resource Manager System Getting Started Guide 8.0 August 2013 3725-72102-001B Polycom Document Title 1 Trademark Information POLYCOM and the names and marks
SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit
SecureAware on IIS8 on Windows Server 2008/- 12 R2-64bit Note: SecureAware version 3.7 and above contains all files and setup configuration needed to use Microsoft IIS as a front end web server. Installing
Managing Users and Identity Stores
CHAPTER 8 Overview ACS manages your network devices and other ACS clients by using the ACS network resource repositories and identity stores. When a host connects to the network through ACS requesting
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory
Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory HOWTO, 2 nd edition Introduction... 2 Integration using the Lights-Out Migration Utility... 2 Integration using the ilo web interface...
SCADA Security. Enabling Integrated Windows Authentication For CitectSCADA Web Client. Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.
Enabling Integrated Windows Authentication For CitectSCADA Web Client Applies To: CitectSCADA 6.xx and 7.xx VijeoCitect 6.xx and 7.xx Summary: What is the difference between Basic Authentication and Windows
Active Directory integration with CloudByte ElastiStor
Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level
BlackBerry Enterprise Service 10. Universal Device Service Version: 10.2. Administration Guide
BlackBerry Enterprise Service 10 Universal Service Version: 10.2 Administration Guide Published: 2015-02-24 SWD-20150223125016631 Contents 1 Introduction...9 About this guide...10 What is BlackBerry
Using LDAP with Sentry Firmware and Sentry Power Manager (SPM)
Using LDAP with Sentry Firmware and Sentry Power Manager (SPM) Table of Contents Purpose LDAP Requirements Using LDAP with Sentry Firmware (GUI) Initiate a Sentry GUI Session Configuring LDAP for Active
How To Authenticate On An Xtma On A Pc Or Mac Or Ipad (For A Mac) On A Network With A Password Protected (For An Ipad) On An Ipa Or Ipa (For Mac) With A Log
WatchGuard Certified Training Fireware XTM Advanced Active Directory Authentication Courseware: Fireware XTM and WatchGuard System Manager v11.7 Revised: January 2013 Updated for: Fireware XTM v11.7 Disclaimer
How to Access Coast Wi-Fi
How to Access Coast Wi-Fi Below is a summary of the information required to configure your device to connect to the coast-wifi network. For further assistance in configuring your specific device, continue
PingFederate. IWA Integration Kit. User Guide. Version 2.6
PingFederate IWA Integration Kit Version 2.6 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate IWA Integration Kit User Guide Version 2.6 March, 2012 Ping Identity Corporation
Getting Started with Clearlogin A Guide for Administrators V1.01
Getting Started with Clearlogin A Guide for Administrators V1.01 Clearlogin makes secure access to the cloud easy for users, administrators, and developers. The following guide explains the functionality
Entrust Managed Services PKI. Configuring secure LDAP with Domain Controller digital certificates
Entrust Managed Services Entrust Managed Services PKI Configuring secure LDAP with Domain Controller digital certificates Document issue: 1.0 Date of issue: October 2009 Copyright 2009 Entrust. All rights
Group Management Server User Guide
Group Management Server User Guide Table of Contents Getting Started... 3 About... 3 Terminology... 3 Group Management Server is Installed what do I do next?... 4 Installing a License... 4 Configuring
Active Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: [email protected] Online Support: [email protected] CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
VERALAB LDAP Configuration Guide
VERALAB LDAP Configuration Guide VeraLab Suite is a client-server application and has two main components: a web-based application and a client software agent. Web-based application provides access to
1.6 HOW-TO GUIDELINES
Version 1.6 HOW-TO GUIDELINES Setting Up a RADIUS Server Stonesoft Corp. Itälahdenkatu 22A, FIN-00210 Helsinki Finland Tel. +358 (9) 4767 11 Fax. +358 (9) 4767 1234 email: [email protected] Copyright
The following process allows you to configure exacqvision permissions and privileges for accounts that exist on an Active Directory server:
Ubuntu Linux Server & Client and Active Directory 1 Configuration The following process allows you to configure exacqvision permissions and privileges for accounts that exist on an Active Directory server:
SchoolBooking SSO Integration Guide
SchoolBooking SSO Integration Guide Before you start This guide has been written to help you configure SchoolBooking to operate with SSO (Single Sign on) Please treat this document as a reference guide,
Remote Authentication and Single Sign-on Support in Tk20
Remote Authentication and Single Sign-on Support in Tk20 1 Table of content Introduction:... 3 Architecture... 3 Single Sign-on... 5 Remote Authentication... 6 Request for Information... 8 Testing Procedure...
NETASQ ACTIVE DIRECTORY INTEGRATION
NETASQ ACTIVE DIRECTORY INTEGRATION NETASQ ACTIVE DIRECTORY INTEGRATION RUNNING THE DIRECTORY CONFIGURATION WIZARD 2 VALIDATING LDAP CONNECTION 5 AUTHENTICATION SETTINGS 6 User authentication 6 Kerberos
IPedge Feature Desc. 5/25/12
OVERVIEW IPedge Enterprise Manager Active Directory Sync (ADSync) is a feature that automatically configures telephone users in the IPedge system based on data entry in the Active Directory service. Active
TopEase Single Sign On Windows AD
TopEase Single Sign On Windows AD Version Control: Version Status Datum / Kurzzeichen Begründung 1.0 Final 09.09.12 / gon New template and logo Copyright: This document is the property of Business-DNA
Customer Tips. Basic E-mail Configuration and Troubleshooting. for the user. Overview. Basic Configuration. Xerox Multifunction Devices.
Xerox Multifunction Devices Customer Tips November 24, 2003 This document applies to these Xerox products: x WC Pro 32/40 Color x WC Pro 65/75/90 x WC Pro 35/45/55 WC M35/M45/M55 x DC 555/545/535 x DC
SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION
SCOPTEL WITH ACTIVE DIRECTORY USER DOCUMENTATION Table of content ScopTel with Active Directory... 3 Software Features... 3 Software Compatibility... 3 Requirements... 3 ScopTel Configuration... 4 Prerequisites...
Single Sign-On in SonicOS Enhanced 4.0
Single Sign-On in SonicOS Enhanced 4.0 Document Scope This document describes how to plan, design, implement, and maintain the Single Sign-On feature in the SonicWALL SonicOS Enhanced 4.0. This document
qliqdirect Active Directory Guide
qliqdirect Active Directory Guide qliqdirect is a Windows Service with Active Directory Interface. qliqdirect resides in your network/server and communicates with qliqsoft cloud servers securely. qliqdirect
