Administrator's Guide
|
|
|
- Rosa Lyons
- 10 years ago
- Views:
Transcription
1 Active Directory Module 1.2 for CMS Administrator's Guide Rev Active Directory Module 1.2 for CMS Administrator's Guide How to install, configure, and use the AD module
2 Table of Contents Chapter 1 Introduction... 3 Chapter 2 Installation and Configuration Installing and Configuring the Active Directory Module Prerequisites Installing the Sitecore Package Modifying the Config Files Users and Roles Managing Users and Roles Firewall Modification Chapter 3 Advanced Profile Configuration Configuring the Profile Provider Configuring the Custom Properties Extending the Sitecore Template Mapping the AD Display Name Attribute to the Full Name Property in Sitecore Chapter 4 Other Features Custom Filter Create new AD entity pipelines Single Sign-on Prerequisites Feature Usage The Status Page Debug Mode Connecting to Multiple Domains Cache Settings Additional LDAP.config Settings Directory Notification Nested Groups (Indirect Membership) User Permissions Read-only Limited Read-write Change Password Full Read-write File List Minimum properties of AD objects FAQs Developers Notes The timeout alert can occur in an AD containing 1,000,000 users Sorting in Windows Page 2 of 40
3 Chapter 1 Introduction Sitecore CMS 7 and Sitecore Experience Platform 8 (Sitecore XP) provide a solid, self-contained security model, based on the ASP.NET 2.0 provider model. Enterprise solutions may require a more complex security infrastructure. Many organizations have already set up a domain in some directory services, for instance, Active Directory. The Sitecore CMS Active Directory module integrates the Active Directory domain with your Sitecore CMS solution. You can integrate the AD domain users and groups into Sitecore CMS as Sitecore users and Sitecore roles immediately after you install and configure the module. Furthermore, you can use custom properties from Active Directory to extend the user profiles in Sitecore. This document describes how to install, configure, and use of the Active Directory module. We recommended that you read the Low-level Sitecore Security and Custom Providers article before reading this document. This manual contains the following chapters: Chapter 1 Introduction This introduction to the manual. Chapter 2 Installation and Configuration This chapter describes how to install and configure the Active Directory module. Chapter 3 Advanced Profile Configuration This chapter describes how to configure the most important feature in the Active Directory module. Chapter 4 Other Features This chapter describes some of the other features in the module. Page 3 of 40
4 Chapter 2 Installation and Configuration This chapter describes how to install and configure the Active Directory module. Unlike other Sitecore CMS modules, the Active Directory module requires you to manually modify the web.config file. This chapter contains the following sections: Installing and Configuring the Active Directory Module Users and Roles Page 4 of 40
5 2.1 Installing and Configuring the Active Directory Module The Sitecore Active Directory module is distributed as a Sitecore Package. You must also modify some configuration files Prerequisites Active Directory requires that port 389 is open by default: 389 for client communications 445 for Active Directory Profile Provider Note For more information about Active Directory Profile Provider, see the Advanced Profile Configuration chapter Installing the Sitecore Package The Active Directory module is distributed as a Sitecore package. To install the package: 1. In the Sitecore desktop click Sitecore, Development Tools, Installation Wizard. 2. The Installation Wizard will guide you through the installation process Modifying the Config Files After you install the package, you must modify some configuration files to complete the installation. You must modify: The /App_Config/connectionStrings.config file. The domains.config.xml file. The system.web and sitecore/switchingproviders sections of the web.config file. Adding a Connection String to the Active Directory Domain If you have decided to use the Active Directory module, you must have an appropriate Active Directory domain to connect with. In most cases this is a company domain which stores the entire security infrastructure of your company. In the main /App_Config/connectionstrings.config file, add a connection string to the <connectionstrings> section. The connectionstrings.config file can look like this: <connectionstrings> <add name="managersconnstring" connectionstring="ldap://testsrv/ou=managers,dc=testdomain,dc=sitecore,dc=net" /> </connectionstrings> In this example, Managers is just a sample organization unit. Replace it with the name of a real OU. You can define a number of connection strings in the <connectionstrings> element. Page 5 of 40
6 Each connection string is defined by the <add> tag. This element has a number of attributes, but we only use two: Attribute Name connectionstring Description The name of the connection string. Any entity using this connection string will address it by this name. The connection string itself. The Active Directory module supports the LDAP format of the connection strings: Each string starts with the prefix LDAP:// The prefix is followed by the server name, which the component should connect to. The slash / must follow the domain name. The last part of the connection string must contain the full path to the Active Directory container that the users and groups should be extracted from. Important To avoid some exceptions and for greater stability, specify the Active Directory server name as a Fully Qualified Domain Name (FQDN) with the port number. It should look like this: ADServer.domain.name:389. The connection string is a path that looks like this: LDAP://ADServer.domain.name:389/OU=Managers,DC=ADDomain,DC=company,DC=com In this example, we assume that you have an Organization Unit called Managers in your organization and you wish to make the members of this unit available in Sitecore CMS. We also assume that the Active Directory server name is ADServer and that it is located in the ADDomain.company.com domain. In this case the connection string looks like this: LDAP://ADServer/OU=Managers,DC=ADDomain,DC=company,DC=com If you want to use a sub unit, for example, Support Managers, the connection string is: LDAP://ADServer/OU=Support Managers,OU=Managers,DC=ADDomain,DC=company,DC=com If you want to use the entire domain, specify the following connection string: LDAP://ADServer/DC=ADDomain,DC=company,DC=com For more information about the format of the LDAP connection string, see the article LDAP ADsPath on MSDN. If you re using SQLite, you must make the same changes in the /App_Config/connectionstringssqlite.config file. Note The LDAP prefix is case sensitive. You should use only capital letters when writing the LDAP prefix. For example: <add name="scofus" connectionstring="ldap://root:389/ou=users,ou=locations,dc=sitecore,dc=net"/> - this string will work. <add name="scofus" connectionstring="ldap://root:389/ou=users,ou=locations,dc=sitecore,dc=net"/> - this string WILL NOT work. Page 6 of 40
7 Configuring the ASP.NET Security Providers The Active Directory module is based on the ASP.NET security model architecture. The module therefore contains a set of basic providers that you can use to manage users, roles, and profile properties: Service Membership provider Role provider Profile provider Description Provides a set of operations to get, create, update, and delete the users. You can also perform some other operations, like validating the user (username and password) and changing a user s password. For more information about the membership service, visit the MSDN library. Provides a set of operations to get, create, delete roles, add users to, and remove users from roles. For more information about the roles service, visit MSDN library. Provides a set of operations to get/set the properties of the user profile, as well as different actions for the profile objects (delete/find profiles, and so on.) For more information about the profile service, visit MSDN library. Configuring the Membership Provider Open the web.config file, search for the <membership> element in the <system.web> section and paste the following code the order is not important: <add name="ad" type="lightldap.sitecoreadmembershipprovider" connectionstringname="managersconnstring" applicationname="sitecore" minrequiredpasswordlength="1" minrequirednonalphanumericcharacters="0" requiresquestionandanswer="false" requiresunique ="false" connectionusername="[put the username here]" connectionpassword="[put the password here]" connectionprotection="secure" attributemapusername="samaccountname" enablesearchmethods="true" /> The following table explains every attribute of this provider definition: Attribute name type connectionstringname applicationname Description The provider name. In general, this can be any string value that is unique within the set of membership providers. However, because some of the configuration is done automatically, this particular element requires the name ad in order to leave everything unchanged. The full name of the provider class. The name of the connection string. In our example, it is ManagersConnString. A standard attribute of any provider that defines the area of visibility of the provider data. It should be sitecore in our example. See the MSDN documentation for details. Page 7 of 40
8 Attribute minrequiredpasswordlength Description The minimum number of characters required in a user password. The default value is 1. minrequirednonalphanumericcharacters The minimum number of non-alphanumeric characters required in a user password. The default value is 0. requiresquestionandanswer requiresunique connectionusername connectionpassword connectionprotection attributemapusername enablesearchmethods Defines whether the provider requires question and answer to be set for the user passwords. The default value is false. Defines whether the provider requires each user to have a unique address. The default value is false. The user name. To connect to the Active Directory domain, you should specify a user who has sufficient rights to perform the necessary operations. The provider uses these credentials when it connects to the AD domain. The user password. A system attribute of the provider. Must be set to Secure (default value). This attribute defines which Active Directory attribute is to be used as the user name. The user has to explicitly set the "attributemapusername" property to "userprincipalname if you use "userprincipalname" as the user names. The user has to explicitly set the "attributemapusername" property to "samaccountname" if you use "samaccountname" as the user names. Enables the search functionality of the provider when set to true (default value). Important If a user is not locked out when they keep entering incorrect credentials, verify that the Account Lockout policy is set correctly in the AD domain you use. To enable the reset password functionality, you must specify the enablepasswordreset attribute and set its value to true in the configuration. Furthermore, the provider requires the mapping of several attributes to the Active Directory properties. For more information, take a look at the MSDN article on this topic. You should also verify that the new password meets the requirements of the domain security policy for passwords in your AD domain. The connectionprotection attribute set to Secure requires that you add one more element to the <system.web> section. You can place it anywhere inside this section: <!-- Machine key attributes --> <machinekey validationkey="bddfe367cd36aaa81e195761befb ff7b8e34e42c0dea b b211719adef C76F3F3A556BC61A5FC8C9F28F958CB1D3BD8EF DB6" decryptionkey="0dac68d020b8193df0fcee1baf7a07b4b0d40dcd3e5ba90d" validation="sha1" /> Page 8 of 40
9 This key is used to encrypt and decrypt the data that is transferred between the client and the Active Directory server. You can either paste this key into your web.config file or generate another unique key at: or If you logged in to the Sitecore CMS shell before performing the.config modifications described earlier, you may receive an error such as Padding is not valid. This is a consequence of adding a system key and changing the connection protection level. To remove this error, delete all your browser cookies. If this doesn t help, restart the browser. Configuring the Role Provider Open the web.config file, search for the <rolemanager> element in the <system.web> section and paste the following definition inside it (the order is not important): <add name="ad" type="lightldap.sitecoreadroleprovider" connectionstringname="managersconnstring" applicationname="sitecore" username="[put the username here]" password="[put the password here]" attributemapusername="samaccountname" cachesize="2mb" /> The following table explains specific attributes of this definition: Attribute cachesize Description Defines the size of the role cache. The default value is 2 MB. The other attributes of this element are described in the previous table and also apply to the role provider. Note The user has to explicitly set the "attributemapusername" property to "userprincipalname if you use "userprincipalname" as the user names. The user has to explicitly set the "attributemapusername" property to "samaccountname" if you use "samaccountname" as the user names. Configuring the Profile Provider (Optional) The Active Directory module provides an option to store additional properties in the Active Directory domain. The configuration has extra steps apart from configuring the provider in web.config. For more information, see the section Advanced Profile Configuration. If you do not intend to extend the user profile with custom attributes from the Active Directory, you can skip the section Advanced Profile Configuration. Note The user has to explicitly set the "attributemapusername" property to "userprincipalname if you use "userprincipalname" as the user names. The user has to explicitly set the "attributemapusername" property to "samaccountname" if you use "samaccountname" as the user names. Activating Switching Providers To make the system aware of an extra source of users and roles, the switching mechanism must be activated. Page 9 of 40
10 To activate the switching mechanism: In web.config file, in <system.web> section, browse for <membership> element and find the provider called sitecore and set its realprovidername attribute to switcher. In web.config file, in <system.web> section, browse for <rolemanager> element find the provider inside called sitecore and set its realprovidername attribute to switcher. The result is the same as modifying the defaultprovider attribute for the root element of the service (membership or rolemanager). The CMS system requires the providers called sitecore. For more information, see the article Low-Level Sitecore CMS Security and Custom Providers. Adding a New Domain Open the App_Config/Security/Domains.config.xml file and add the following line to the root element: <domain name="ad" ensureanonymoususer="false"/> Adding the Domain-Provider Mappings Open web.config file, and in of <sitecore> section, browse to the <switchingproviders> element. It contains three groups: <membership>, <rolemanager> and <profile>: Add the following line to the <membership> group the order is not important: <provider providername="ad" storefullnames="false" wildcard="*" domains="ad" /> Add the following line to the <rolemanager> group the order is not important: <provider providername="ad" storefullnames="false" wildcard="*" domains="ad" /> [Optional] Add the following line to the <profile> group. It must be the first definition in this group: <provider providername="ad" storefullnames="false" wildcard="*" domains="ad" /> For more information about this feature, see the section Advanced Profile Configuration. The only difference the order makes is to the sequence in which the users and roles are listed in the Sitecore CMS 6 security tools. For instance, if you put the ad membership mapping before the sql one, then you ll see the Active Directory users listed in the User Manager before the default Sitecore CMS ones. Page 10 of 40
11 2.2 Users and Roles Warning Any changes made in Sitecore CMS to the active directory users are done in LIVE mode. The changes are applied immediately to the real Active Directory objects. The only exception is user lockout; in this case the users are locked out locally from Sitecore CMS and remain active in the Active Directory domain. After you have configured the module, open Sitecore CMS, and log into the Sitecore Desktop as an administrator. Click Sitecore, Security Tools, Role Manager to open the Role Manager. You can see the roles from Active Directory along with the Sitecore CMS roles. The ad\ prefix means that the roles belong to the Sitecore domain called ad. Each Sitecore CMS domain can be served via a single provider. For more details on this, see the Low-Level Sitecore CMS Security and Custom Providers article. Start the User Manager and you can see a list of the Active Directory users. Note You may experience a delay before the Role Manager or the User Manager opens compared to before the Active Directory module was installed. The delay can vary depending on the number of entities in the Active Directory domain. The greater the number of users and roles in the AD, the longer is the delay Managing Users and Roles You can make any changes to the users that are fetched from the Active Directory domain, in the same way as you can change ordinary Sitecore CMS users. You use the standard Role Manager or User Manager for this. For instance, if you want a user called ad\john to log in to the Sitecore CMS desktop, you should add this user to the sitecore\sitecore Client Users role. After you do this, you can log in to the Sitecore desktop as ad\john. Note You must specify the full username (with the domain name) when you log in. To allow any user who is a member of an Active Directory role to log in to Sitecore, you should add this role to the sitecore\sitecore Client Users role. In this case, the Roles-In-Roles functionality will do the job. Page 11 of 40
12 There is a limitation however, to add a user to the Active Directory role, the user must already exist in the same Active Directory domain. As a result, a user from Sitecore CMS cannot be added to the role from Active Directory. But you can use the Roles-In-Roles functionality to work around this limitation. Add the necessary Sitecore CMS users to the Sitecore CMS role, and then add this role to the Active Directory role. The Roles-In-Roles service works on top of the ASP.NET providers, thereby making this scenario possible. Creating users/roles To create a user/role in Active Directory, you should select the appropriate domain (ad in our case) in the New User or the New Role dialog box. User Specific Operations The Change Password, Enable, and Lock operations are applied to the Active Directory users in the same way as to they are applied to regular Sitecore CMS users. Page 12 of 40
13 2.3 Firewall Modification The LDAP "Well-known" ports have been established as 389 for LDAP and 636 for LDAP SSL. The Active Directory providers attempt to connect to Active Directory using SSL. If SSL fails, a second attempt to connect to Active Directory using sign-and-seal will be made. If both attempts fail, the providers instance will throw a ProviderException exception. Active Directory requires either port 389 or 636 to be opened. Microsoft SMB/CIFS port 445 is required to be opened for Active Directory Profile Provider. Page 13 of 40
14 Chapter 3 Advanced Profile Configuration The Active Directory module allows you to store the custom properties of a user profile in the attributes of the corresponding domain user object. For example, in Active Directory you have a telephone number for each user and you want this information to be visible for each user in Sitecore CMS. This chapter contains the following sections: Configuring the Profile Provider Configuring the Custom Properties Extending the Sitecore Template Page 14 of 40
15 3.1 Configuring the Profile Provider To change the profile provider, you must add a profile provider definition. To change the profile provider: 1. Open the web.config file, in the <system.web> section, locate the <profile> element. 2. Paste the following provider definition inside the profile/providers element (the order is not important): <add name="ad" type="lightldap.sitecoreadprofileprovider" connectionstringname="managersconnstring" applicationname="sitecore" username="[put the username here]" password="[put the password here]" sitecoremapdomainname="[domain name]" /> The following table explains attributes of this definition: Attribute Description sitecoremapdomainname Specifies the Sitecore security domain handled by the current profile provider. By default, it is equal to the provider name. 3. Change the defaultprovider attribute of the <profile> element to switcher. 4. During the general configuration process, you must have created a mapping for this profile provider just as you would for any other service. 5. In your main web.config file, locate the switchingproviders/profile element and insert the following line: <provider providername="ad" storefullnames="false" wildcard="*" domains="ad" /> Technical Note This element must be listed first in this section. The SQL server provider, which is the default for the profile service, has been designed to be very flexible. As such, if it can t find the appropriate profile property, it considers this property to be a custom property and stores it in the Custom table. As a result, if the SQL Server is listed first in this section, it will always handle all the properties. The definition of the AD provider must therefore be listed first in this section to allow the AD provider to handle its properties and supply the information from the AD domain. Page 15 of 40
16 3.2 Configuring the Custom Properties Any custom property, which you wish to extend the profile with, should be defined in the <properties> group of the <profile> element. In our example, we should place the telephonenumber property there. So, browse to the <profile> element in the <system.web> section of web.config file, locate the <properties> group inside this element, and add the following line (the order is not important): <add type="system.string" name="telephone" customproviderdata="ad unicode string telephonenumber" /> The following table explains each attribute of this definition: Attribute Name Type customproviderdata Description A unique name of the property. The.NET type of the property. This is the type the property will have in the ASP.NET environment. This parameter must always be System.String for ad profile properties. Sitecore works with all properties in the same way as the string type. Any data required for the provider serving this property. In our example, ad means that this property is handled by the ad provider. The unicode string defines the native type of the property in Active Directory and telephonenumber specifies the name of the corresponding Active Directory attribute. In general, this attribute can be of any form. The ad provider expects a pipe separator to be placed between the attribute parts. The Active Directory module expects the customproviderdata to use the following format: ad [native type name] [ad native name]. The native type name is the type of the property in Active Directory. The following basic types are supported: unicode string boolean integer large integer If anything else is specified, the unicode string type is used as a fallback. The last optional ad native name part is the real name of the corresponding property in Active Directory. If it is omitted, the value falls back to the name attribute. Note The Active Directory module does not support reflecting the custom Active Directory attributes to the Sitecore CMS roles. Sitecore CMS security is based on the.net security model, and this underlying engine does not have the facility to have custom attributes as profiles for the CMS roles. Such reflection is not supported in the Active Directory module, as well as in the Sitecore CMS. Page 16 of 40
17 3.3 Extending the Sitecore Template After you have defined the custom properties in the web.config file, you should extend the Sitecore template to make those properties accessible from the Sitecore CMS security applications. To extend the Sitecore template: 1. Start Sitecore CMS and log in with the administrator credentials and switch to the core database. 2. Open the Content Editor, and in the content tree navigate to the /sitecore/templates/system/security/user template. 3. Add a new field to this template called telephonenumber (exactly the same as the appropriate property name in web.config). 4. Select the required data type, for example the Single-Line Text type, and mark it as Shared. Note If the new custom property is mapped to a multi-valued attribute, the field must use the Multi- Line Text data type. Otherwise, the value in the field may be saved incorrectly as a multivalued attribute of the AD user. We cannot guarantee that multiple values are stored or displayed in the correct order because of the way that Microsoft has implemented LDAP in Active Directory. For more information, see the description of the issinglevalued property on the following page: Note that this description says: "Multi-valued attributes are unordered; there is no guarantee they will be stored or returned in any specific order." 5. Save your changes and switch to the master database. 6. Open the User Manager and edit any user from the Active Directory domain, for instance, ad\john. Page 17 of 40
18 7. Click the Profile tab 8. Click Change and select a user template. 9. Close this window. If you edit ad\john user again and switch to the Profile tab, you ll see that the profile is extended with the telephonenumber property: The property is filled in with the telephonenumber attribute value from the corresponding Active Directory user. For more information about this feature, see the Low-Level Sitecore CMS Security and Custom Providers article. This article also contains information about the conditions that the provider should satisfy to support the profile extension. Page 18 of 40
19 Assigning the non-default profile to AD users automatically The previous description of how to extend a Sitecore profile template includes a step about assigning the profile item to the user. It is obvious that such a manual operation is not a way to go for hundreds of users. For this purpose, Sitecore allows to set a common profile item on the domain level. Open the /App_Config/Security/Domains.config.xml file and add the following line to the domains element: <domain name="ad" ensureanonymoususer="false" defaultprofileitemid="{ddeda46f-169b-4a DBD3F407AF2E}"/> The defaultprofileitemid attribute defines the profile item that is used for users from the domain if the profile is not set for the user explicitly Mapping the AD Display Name Attribute to the Full Name Property in Sitecore The value from the DisplayName property of the AD user is automatically passed to the default Full Name field. You do not have to extend the user s profile template with a new field for this property the value is displayed in the Edit User dialog box, on the General tab, in the Full Name field: If you want to map another AD property to the Full Name field, you can do it in the App_config/Include/ldap.config file. Set the appropriate value for the LDAP.FullName setting: Note <!-- FULL NAME PROPERTY NAME Determines the full name property mapping. --> <setting name="ldap.fullname" value="ad unicode string displayname" /> Remember that the Advanced profile feature must be configured as described earlier to support this mapping. Page 19 of 40
20 Chapter 4 Other Features The Active Directory module provides some extra features to make security resolution easier. This chapter contains the following sections: Custom Filter Create new AD entity pipelines The Status Page Debug Mode Connecting to Multiple Domains Cache Settings Directory Notification Nested Groups (Indirect Membership) User Permissions File List Minimum properties of AD objects FAQs Developers Notes Page 20 of 40
21 4.1 Custom Filter You are allowed to provide a custom filter that will be applied to all requests to the AD server. It can be set in the provider level. <add name="ad" type="lightldap.sitecoreadmembershipprovider" connectionstringname="managersconnstring" applicationname="sitecore" minrequiredpasswordlength="1" minrequirednonalphanumericcharacters="0" requiresquestionandanswer="false" requiresunique ="false" connectionusername="user" connectionpassword="12345" attributemapusername="samaccountname" enablesearchmethods="true" customfilter="(memberof=cn=test role 1,OU=CRM,DC=VM)" /> The filter syntax is described in the Creating a Query Filter article on MSDN. Using the custom filter, you can plug in all users and roles from several AD containers (OU) to a single domain. The users and roles must have a common attribute for it or be members of a common role. The following sample receives all the users and roles from the sitecore domain controller that are members of the testgroup. Test role is placed under the Groups organizational unit. The customfilter attribute is valid for membership, role and profile provider. customfilter= (memberof=cn=testgroup,ou=groups,dc=devtest,dc=sitecore,dc=net) In the screenshot below you can see the users of the testgroup role in Active Directory Page 21 of 40
22 In this screenshot you can see the users of the testgroup role in the Sitecore User Manager after applying the custom filter Samples The following samples show how to use the custom filter by placing the code in the config file. Select all objects from AD who aren t the part of the testgroup role. The testgroup role is placed under the Groups container: (!(memberof=cn=testgroup,ou=groups,dc=devtest,dc=sitecore,dc=net)) Select all objects from AD whose name starts from test : (name=test*) Select all objects from AD whose attribute displayname starts from One : (displayname=one*) Warning The membership, rolemanager and profile providers that use the common connection string must also use the equal custom filter. Note The custom filter allows filtering such objects as users and roles within a certain range of OU. This range is strictly determined by the principles of work of Active Directory (starting from the OU which you have been already connected to, and down along the tree). Page 22 of 40
23 4.2 Create new AD entity pipelines The Custom filter affects both new and existing users and roles. If you use a custom filter and create new users and roles in Sitecore that do not match the parameters of this custom filter, they will not be visible in Sitecore. You can fix this issue by using two pipelines in the ldap.config file: initializeaduserentry, initializeadroleentry. <initializeaduserentry> <!-- Use the processor if all new user should have a predefiled value in a property. The PropertyName parameter defines the name of the property. The DefaultValue parameter defines the default value of the property. --> <!-- <processor type="lightldap.pipelines.initializeadentry.setpropertyvalue, LightLDAP"> <PropertyName desc="ad property name ">type the property name here</propertyname> <DefaultValue desc="ad property value ">type the default property value here</defaultvalue> </processor> --> <!-- Use the processor if all new roles should be a member of the predefined role. The RoleName parameter defines the name of the main role. --> <!-- <processor type="lightldap.pipelines.initializeadentry.addtorole, LightLDAP"> <RoleName desc="ad group">type role name here</rolename> </processor> --> <processor type="lightldap.pipelines.initializeadentry.commitchanges, LightLDAP"/> </initializeaduserentry> <initializeadroleentry> <!-- Use the processor if all new user should have a predefiled value in a property. The PropertyName parameter defines the name of the property. The DefaultValue parameter defines the default value of the property. --> <!-- <processor type="lightldap.pipelines.initializeadentry.setpropertyvalue, LightLDAP"> <PropertyName desc="ad property name ">type the property name here</propertyname> <DefaultValue desc="ad property name ">type the default property value here</defaultvalue> </processor> --> <!-- Use the processor if all new roles should be a member of the predefined role. The RoleName parameter defines the name of the main role. --> <!-- <processor type="lightldap.pipelines.initializeadentry.addtorole, LightLDAP"> <RoleName desc="ad group">type role name here</rolename> </processor> --> <processor type="lightldap.pipelines.initializeadentry.commitchanges, LightLDAP"/> </initializeadroleentry> The LightLDAP.Pipelines.InitializeAdEntry.SetPropertyValue allows you to initialize the property of a user or role with a predefined value. The LightLDAP.Pipelines.InitializeAdEntry.AddToRole allows you to add a user or role to the main role. Page 23 of 40
24 4.3 Single Sign-on In most cases, if an organization has the domain controller set up, the workstations are usually included into this domain. Imagine that you have established a connection between the Managers organization unit and your Sitecore CMS installation. This means that the members of this organization unit are now able to work in Sitecore CMS according to their roles. Naturally, these users wish to be logged in to Sitecore CMS automatically. When users start Sitecore CMS, they are definitely logged in to their organization domain. This feature is called Single Sign-on and the Active Directory module supports this it Prerequisites There are some prerequisites for using this functionality: The workstation must be a member of the appropriate domain. The anonymous access must be disabled to the /sitecore/admin/ldaplogin.aspx page and the Integrated Windows security mode must be turned on. To disable anonymous access in IIS: 1. Open IIS. 2. Expand the target website. 3. Navigate to the /sitecore/admin folder and select the LDAPLogin.aspx page. 4. Right-click the LDAPLogin.aspx page and then click Properties. 5. In the LDAPLogin.aspx Properties dialog box, click the File Security tab and clear the Anonymous access checkbox. The IIS configuration should look similar to this: Page 24 of 40
25 IIS 7 Configuration Note IIS 7 does not support mixed authentication mode. Hence you cannot have several authentication types enabled on the /sitecore/admin/ldaplogin.aspx page. To use Windows Authentication, you must disable all other authentications and enable Windows Authentication for this page. To configure IIS 7: 1. Open IIS. 2. Expand the target website. 3. Navigate to the /sitecore/admin folder and in the context menu select Switch to Content View. 4. Select the LDAPLogin.aspx page and click on Switch to Features View. 5. In the right-hand pane click on the Authentication. 6. Disable all the authentications and enable the Windows Authentication one. The configuration should look similar to the following screenshot: Feature Usage When the prerequisites are satisfied, you can log in to Sitecore CMS with your system account without manually providing your user credentials. Enter the following URL in your browser: Note You can still login in the usual way by opening the default Sitecore shell login page ( If you forget to verify the prerequisites and your machine appears not to be in a domain or anonymous access has not been removed from the login page, the system will not let you log in, displaying the Page 25 of 40
26 reason of the refusal: Some errors may occur when the system begins to analyze the user credentials. For instance, if the domain name is correct, and you are a member of the Active Directory domain, but you re not a member of the Managers organization unit which is plugged into Sitecore, you ll receive the following warning: The real domain name might differ from the domain name entered in Sitecore CMS. For instance, you may be a user of the Active Directory domain called Company.com, but this domain is plugged into Sitecore CMS as ad (which is done by default). In this case, the system won t reject your attempt to log in, but it will iterate the existing Sitecore CMS domains in an attempt to find the appropriate user. If the user cannot be found, the following warning is displayed: When the user is found in the Active Directory domain, but doesn t have enough permissions to log in to Sitecore CMS (the user is not included in the sitecore\sitecore Client Users role), the system will Page 26 of 40
27 reject the log in attempt and display the following message: Finally, if everything is fine and the user is allowed to log in, you ll be logged in automatically and redirected to the Sitecore CMS desktop. The page redirects you to a user's StartURL. Please check the following method: //LightLDAP.LDAPLogin private string GetStartUrl(User user) { string text = WebUtil.GetCookieValue("sitecore_starturl"); if (user!= null) { text = StringUtil.GetString(new string[] { user.profile.starturl, text }); } return StringUtil.GetString(new string[] { text, "/sitecore/shell/applications/clientusesoswindows.aspx" }); } By default, a user s StartUrl file (user.profile.starturl) is empty (StartURL.png). Therefore, the clientusesoswindows.aspx file is used. The page redirects you to the Content Editor if your user has access to it: <%@ Page language="c#" AutoEventWireup="false" %> <%@ Import namespace="sitecore.data.items"%> <% Sitecore.Configuration.State.Client.UsesBrowserWindows = true; Sitecore.Configuration.State.Client.NoDesktop = true; Item item = Sitecore.Context.Database.Items["/sitecore/content/Applications/Content Editor"]; if (item!= null && item.access.canread()) { Response.Redirect("/sitecore/shell/Applications/Content editor.aspx"); } Response.Redirect("/sitecore/login/default.aspx?sc_error=You do not have access to the Content Editor."); %> Note If you are in debug mode, you ll first see the entire list of roles that you are a member of in Sitecore CMS. The Login button will be enabled allowing you to login then. You can read more about debug mode later in this article. Page 27 of 40
28 4.4 The Status Page As an additional option for troubleshooting potential security problems, the module has a special status page. To open this status page, use this URL: The status page should look something like this: This page contains basic information about the domains and security providers. You can see each domain listed here and the providers which handle these domains. It also contains some high level status information about each provider: If the status is ON, the provider is functioning and can serve the requests. If the status is OFF, the provider has refused a simple request and the system has marked it as broken. Depending on the problem, it may not be possible to display the Status page. Sometimes the entire application will fail to start if there is an error in the provider configuration. But this is the first step that you should take when troubleshooting the Active Directory module configuration or the security provider s definition. When a provider is flagged as being Off, it is not functioning and its configuration should be adjusted. The next troubleshooting step is to examine the log file. Developer s Note The status page performs a simple call to any method of the appropriate provider, which doesn t require valid input parameters, to make a decision if the provider works. For instance, the GetAllUsers()method is called for the membership provider. If the method throws an exception, the status is automatically set to OFF. Page 28 of 40
29 4.5 Debug Mode The Active Directory module contains a debug mode in which more detailed information is written to the log file and is displayed on a login page. This method is also called verbose logging in some systems. Using debug mode, the administrator can examine the detailed log files to locate a potential problem. It is also quite helpful for the technical support the detailed log files contain enough information to identify the type and place of the error. To enable debug mode: Open the /App_Config/Include/ldap.config file, locate the LDAP.Debug setting and set it to true. This setting is set to false by default. When the changes to the pluggable.config file are applied immediately, the next request to the module will dump much more information to the Sitecore CMS log file. The LDAP.Debug setting applies to the entire module. However, there is also an option to enable this mode for the Single Sign-on feature only. To enable this mode for the Single Sign-on feature only, append the following query string parameter to the login page URL:?debug=true. When you try to log in in debug mode, you are presented with membership information about your account. This information includes the direct and indirect roles the user is a member of. You can login by clicking Log me in: Page 29 of 40
30 4.6 Connecting to Multiple Domains The Active Directory module and the Sitecore security model allow you connect to as many AD domains as you wish. You may want to the managers in your company headquarters and the developers in your regional office to access one Sitecore CMS installation. To connect to multiple domains this, you must configure one or more sets of providers in the web.config file: Add a connection string to the new AD domain. Add a membership provider definition. Add a role provider definition. Add a profile provider definition (if you wish to share the user profile). Add a new Sitecore CMS domain and point it to the new set of providers. For more information about configuring extra security providers, see the article Low-Level Sitecore CMS Security and Custom Providers. Page 30 of 40
31 4.7 Cache Settings The module caches some information to improve the performance. The cache settings are defined in the App_Config/include/ldap.config file: LDAP.Caching.UserCache determines the cache size for the user information. LDAP.Caching.MemberOfCache determines the cache size for the memberof information. LDAP.Caching.MembersCache determines the cache size for the members information Additional LDAP.config Settings The /App_Config/Include/ldap.config file contains some additional settings: LDAP.EnableSorting whether or not sorting is enabled. The default value is false. Sorting doesn t work on Windows Server LDAP.SortKey the name of the AD attribute that is used for sorting AD users. This setting influences the performance of AD. The more different values for this field that are in AD the more time it takes the AD server to sort requested users. The default value is the codepage. LDAP.SizeLimit the maximum number of users that AD returns for the * search. The User Manager only shows the number of users specified in LDAP.SizeLimit for each AD domain. The setting has been added to improve the performance. The default value is Narrowing down the search criteria will help find a particular user. LDAP.FindSizeLimit the maximum number of users that AD returns for other searches. The User Manager only shows the number of users specified in LDAP.FindSizeLimit for each AD domain. The setting has been added to improve performance. The default value is 100. LDAP.SettingsPropertyValueFactory by default the AD module allows you to work with boolean, unicode string, and integer types of AD properties from the user profile. You can implement a class that allows you to use more AD property types. LDAP.ReconnectPeriod the period when the module restores a broken notification connection. To keep the actual cache data the module is notified by the AD server about any changes. LDAP.NotificationTimeOut the timeout of notification connections. LDAP.DeleteScope whether or not the module is allowed to delete AD objects from the whole AD tree or just under in the connection string Organization Unit (one level). Page 31 of 40
32 4.8 Directory Notification The module uses the DirectoryNotificationControl ( aspx) to be notified when changes are made to an object in the Active Directory Domain Services. If all the changes in the AD are made by the Sitecore application, you can disable this feature. Set the usenotification= false attribute for all the AD Role, Profile and Membership providers listed in the web.config file: <add name="ad" type="lightldap.sitecoreadmembershipprovider" connectionstringname="managersconnstring" applicationname="sitecore" minrequiredpasswordlength="1" minrequirednonalphanumericcharacters="0" requiresquestionandanswer="false" requiresunique ="false" connectionusername="[put the username here]" connectionpassword="[put the password here]" connectionprotection="secure" attributemapusername="samaccountname" enablesearchmethods="true" usenotification= false /> <add name="ad" type="lightldap.sitecoreadroleprovider" connectionstringname="managersconnstring" applicationname="sitecore" username="[put the username here]" password="[put the password here]" usenotification= false /> <add name="ad" type="lightldap.sitecoreadprofileprovider" connectionstringname="managersconnstring" applicationname="sitecore" username="[put the username here]" password="[put the password here]" sitecoremapdomainname="[domain name]" usenotification= false /> Page 32 of 40
33 4.9 Nested Groups (Indirect Membership) The Sitecore Active Directory module supports indirect membership. For example, if you have a user called John, who is a member of the Professional Service group, which in turn is a member of a parent group called Solution Department. To allow John to log in to Sitecore, you must enable the indirect membership feature and add the Solution Department group to the sitecore\sitecore Client Users default role. To enable indirect membership: 1. Open the /App_Config/Include/ldap.config file. 2. Set the value of the LDAP.IncludeIndirectMembership to True. Note It is appropriate to use the indirect membership feature to allow users to log in to Sitecore. However, if you enable indirect membership, the Sitecore security tools will not display a complete list of the roles that a user is a member of or a complete list of the users that are members of a role. The Sitecore security tools will only display a list of the roles that a user is a direct member of and the users that are direct members of a role. The IsUserInRole method is used to verify role membership. It returns True if the user is a member of the role in question and if indirect membership is turned on, it also takes the parent roles into consideration. Page 33 of 40
34 4.10 User Permissions The module uses credentials to communicate with the AD server. It does not always require Write access. To set the necessary permissions, open the Properties dialog box for the organization unit in question. You can use one of the following access levels to improve your configuration: Read-only. Limited Read-write. Change Password. Full Read-write Read-only This access level allows you to: Read users/roles. Reading profile properties. Minimum required permissions: List contents. Read all properties Limited Read-write This access level includes read-only operations and allows you to: Modify profile properties. Perform password operations. Modifying . Page 34 of 40
35 Add an AD user to an AD role. Minimum required permissions: List contents. Read all properties. Write all properties Change Password This access level requires these additional permissions: Read all properties. Change password. Reset password. You must also add some permission to an AD container (the Authenticated Users role): List contents. Read all properties. Important If any of those permissions is not set, you will see the following exception: Exception Details: System.DirectoryServices.DirectoryServicesCOMException: There is no such object on the server Full Read-write This access level includes read-write access and allows you to: Change passwords. Create users/roles. Delete users/roles. The minimum required permissions are: List contents. Read all properties. Write all property. Create group objects. Delete group objects. Create user objects. Delete user objects. All extended rights. Page 35 of 40
36 4.11 File List The module package only contains files. No items or security entities are included. The entire list is: /bin/lightldap.dll (the main assembly of the module). /bin/lightldapclient.dll (the client assembly of the module). /App_Config/Include/ldap.config (the pluggable configuration file of the module). /sitecore/admin/ldaplogin.aspx (the login page for the Single Sign-On feature). /sitecore/admin/providerstatus.aspx (the statistics page of the provider status). Page 36 of 40
37 4.12 Minimum properties of AD objects The AD user must have the following obligatory properties: securityidentifier userprincipalname samaccountname comment whencreated mail pwdlastset UserAccountControl, msdsuseraccountcontrolcomputed cn, DN, objectcategory, objectclass isdeleted, lastknownparent, lockouttime, primarygroupid, pwdlastset, tokengroups, usnchanged, usncreated The AD group must have the following obligatory properties: samaccountname cn, primarygrouptoken, whencreated, usncreated, usnchanged Page 37 of 40
38 4.13 FAQs This section contains the frequently asked questions about the AD module. Q I m trying to create a user in the Active Directory domain from Sitecore CMS, but the CMS says that it can t create the user. I m filling in all the required fields, but still no luck. What is the reason? A One possible reason is that the user already exists. If the User Manager does not contain this user, you are probably only plugging a single organization unit into Sitecore CMS and not the entire Active Directory domain. In this case, the user probably exists in another organization unit. When you create a user, the module verifies the uniqueness of the user name in the entire domain. Q When I create a user in the Active Directory domain from Sitecore CMS, I don t specify a value for the Comment field. But when the user is created, I can see the please enter a comment here message in the field. Why is it filled in automatically? Can I prevent this? A You may also occur when you update the user and leave the Comment field blank. The Sitecore CMS Active Directory provider is based on the default Microsoft Active Directory provider, which requires the comment not to be blank when updating the user information. That is why it is populated with the default value if you leave it blank. You can enter a comment at any time. Q I have created a user and I can see that their title and department values are set to undefined. Why? A That is because you have set the requiresquestionandanswer attribute of the provider definition element to True. You should also have placed the additional attributes for mapping the password question and answer to the AD attributes there. For example, if you have mapped them to the title and department attributes. When you create the user and the configuration requires a password question and answer, these fields can t be left empty or null. They are therefore set to undefined in this case. To avoid this behavior, change the attribute requiresquestionandanswer to False. Q I have renamed a user and it lost its security assignments immediately. But when I rename it back, it obtains its old assignments back. Where the trick is? A This behavior reflects the way.net security treats the username. The fully-qualified username plays the role of a unique identifier. Due to the fact that this name is used to store security settings for items in Sitecore CMS, renaming a user is similar to creating a new user. The general recommendation is not to rename users which have got any security assignments. Q How can I access the profile properties which come from the Active Directory? A As other profile properties, these properties can be addressed in the following way: user.profile[ property_name ] = property_value ; This line assumes that the user is an object of class Sitecore.Security.Accounts.User. Page 38 of 40
39 Q I would like to reflect some group attributes of Active Directory to the role in Sitecore. Is this possible? A The Active Directory module does not support this scenario. Neither does in Sitecore CMS, because Sitecore security is based on the.net security model, and this underlying engine doesn t provide an option to have profiles for the roles. Page 39 of 40
40 4.14 Developers Notes The timeout alert can occur in an AD containing 1,000,000 users You can receive the timeout alert when you search for a user in an Active Directory that contains more than 1,000,000 users. Workaround: Add the serverpagetimelimit attribute to the membership definition: <add name="ad" type="lightldap.sitecoreadmembershipprovider" connectionstringname="managersconnstring" applicationname="sitecore" minrequiredpasswordlength="1" minrequirednonalphanumericcharacters="0" requiresquestionandanswer="false" requiresunique ="false" connectionusername="[put the username here]" connectionpassword="[put the password here]" connectionprotection="secure" attributemapusername="samaccountname" enablesearchmethods="true" serverpagetimelimit = 5 /> This attribute defines the time limit to use when the server searches for an individual page of results. The default value is -1 second and this means that Active Directory will search for the user until all the users have been analyzed Sorting in Windows 2008 If the LDAP.EnableSorting attribute is set to True, the User Manager shows the following error: The server does not support the requested critical extension. Sorting must be disabled on Windows Page 40 of 40
How To Configure The Active Directory Module In Sitecore Cms 6.2.2 (For A Web.Com User)
Active Directory Module for CMS 6.2-6.5 Administrator's Guide Rev. 120620 Active Directory Module for CMS 6.2-6.5 Administrator's Guide How to install, configure, and use the AD module Table of Contents
Administrator's Guide
Active Directory Module AD Module Administrator's Guide Rev. 090923 Active Directory Module Administrator's Guide Installation, configuration and usage of the AD module Table of Contents Chapter 1 Introduction...
Microsoft Dynamics CRM Security Provider Module
Microsoft Dynamics CRM Security Provider Module for Sitecore 6.6-8.0 CRM Security Provider Rev: 2015-04-15 Microsoft Dynamics CRM Security Provider Module for Sitecore 6.6-8.0 Developer's Guide A developer's
Single sign-on for ASP.Net and SharePoint
Single sign-on for ASP.Net and SharePoint Author: Abhinav Maheshwari, 3Pillar Labs Introduction In most organizations using Microsoft platform, there are more than one ASP.Net applications for internal
E-Commerce Installation and Configuration Guide
E-Commerce Installation and Configuration Guide Rev: 2012-02-17 Sitecore E-Commerce Services 1.2 E-Commerce Installation and Configuration Guide A developer's guide to installing and configuring Sitecore
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
Sitecore Ecommerce Enterprise Edition Installation Guide Installation guide for administrators and developers
Installation guide for administrators and developers Table of Contents Chapter 1 Introduction... 2 1.1 Preparing to Install Sitecore Ecommerce Enterprise Edition... 2 1.2 Required Installation Components...
PriveonLabs Research. Cisco Security Agent Protection Series:
Cisco Security Agent Protection Series: Enabling LDAP for CSA Management Center SSO Authentication For CSA 5.2 Versions 5.2.0.245 and up Fred Parks Systems Consultant 3/25/2008 2008 Priveon, Inc. www.priveonlabs.com
Web Deployment on Windows 2012 Server. Updated: August 28, 2013
Web Deployment on Windows 2012 Server Updated: August 28, 2013 Table of Contents Install IIS on Windows 2012... 3 Install Sage 300 ERP...16 Create Web Deployment User...17 Sage 300 ERP Services...22 Web
Low-level CMS Security and Custom Providers
Sitecore CMS 6 Low-level CMS Security and Custom Providers Rev. 130708 Sitecore CMS 6 Low-level CMS Security and Custom Providers An introduction to low-level security and custom security provider concepts
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
v.2.5 2015 Devolutions inc.
v.2.5 Contents 3 Table of Contents Part I Getting Started 6... 6 1 What is Devolutions Server?... 7 2 Features... 7 3 System Requirements Part II Management 10... 10 1 Devolutions Server Console... 11
E-Commerce Installation and Configuration Guide
E-Commerce Installation and Configuration Guide Rev: 2011-05-19 Sitecore E-Commerce Fundamental Edition 1.1 E-Commerce Installation and Configuration Guide A developer's guide to installing and configuring
Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72. User Guide
Richmond SupportDesk Web Reports Module For Richmond SupportDesk v6.72 User Guide Contents 1 Introduction... 4 2 Requirements... 5 3 Important Note for Customers Upgrading... 5 4 Installing the Web Reports
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2
Password Reset Server Installation Guide Windows 8 / 8.1 Windows Server 2012 / R2 Last revised: November 12, 2014 Table of Contents Table of Contents... 2 I. Introduction... 4 A. ASP.NET Website... 4 B.
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER ADMINISTRATOR S GUIDE Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment
Security API Cookbook
Sitecore CMS 6 Security API Cookbook Rev: 2010-08-12 Sitecore CMS 6 Security API Cookbook A Conceptual Overview for CMS Developers Table of Contents Chapter 1 Introduction... 3 Chapter 2 User, Domain,
NETWRIX ACCOUNT LOCKOUT EXAMINER
NETWRIX ACCOUNT LOCKOUT EXAMINER ADMINISTRATOR S GUIDE Product Version: 4.1 July 2014. Legal Notice The information in this publication is furnished for information use only, and does not constitute a
SharePoint Integration Framework Developers Cookbook
Sitecore CMS 6.3 to 6.6 and SIP 3.2 SharePoint Integration Framework Developers Cookbook Rev: 2013-11-28 Sitecore CMS 6.3 to 6.6 and SIP 3.2 SharePoint Integration Framework Developers Cookbook A Guide
FocusOPEN Deployment & Configuration Guide
FocusOPEN Deployment & Configuration Guide Revision: 7 Date: 13 September 2010 Contents A. Overview...2 B. Target Readership...2 C. Prerequisites...2 D. Test Installation Instructions...2 1. Download the
Administration Guide. . All right reserved. For more information about Specops Password Sync and other Specops products, visit www.specopssoft.
Administration Guide. All right reserved. For more information about Specops Password Sync and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Password Sync is a trademark
McAfee One Time Password
McAfee One Time Password Integration Module Outlook Web App 2010 Module version: 1.3.1 Document revision: 1.3.1 Date: Feb 12, 2014 Table of Contents Integration Module Overview... 3 Prerequisites and System
Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...
Post Installation Guide for Primavera Contract Management 14.1 July 2014 Contents About the Contract Management Post Installation Administrator's Guide... 5 Viewing and Modifying Contract Management Settings...
NETWRIX EVENT LOG MANAGER
NETWRIX EVENT LOG MANAGER QUICK-START GUIDE FOR THE ENTERPRISE EDITION Product Version: 4.0 July/2012. Legal Notice The information in this publication is furnished for information use only, and does not
Tool Tip. SyAM Management Utilities and Non-Admin Domain Users
SyAM Management Utilities and Non-Admin Domain Users Some features of SyAM Management Utilities, including Client Deployment and Third Party Software Deployment, require authentication credentials with
BUILDER 3.0 Installation Guide with Microsoft SQL Server 2005 Express Edition January 2008
BUILDER 3.0 Installation Guide with Microsoft SQL Server 2005 Express Edition January 2008 BUILDER 3.0 1 Table of Contents Chapter 1: Installation Overview... 3 Introduction... 3 Minimum Requirements...
Team Foundation Server 2012 Installation Guide
Team Foundation Server 2012 Installation Guide Page 1 of 143 Team Foundation Server 2012 Installation Guide Benjamin Day [email protected] v1.0.0 November 15, 2012 Team Foundation Server 2012 Installation
Password Manager Windows Desktop Client
Password Manager Windows Desktop Client EmpowerID provides an extension that allows organizations to plug into Password Manager to customize the Windows logon experience beyond that supplied by the standard
Advanced Event Viewer Manual
Advanced Event Viewer Manual Document version: 2.2944.01 Download Advanced Event Viewer at: http://www.advancedeventviewer.com Page 1 Introduction Advanced Event Viewer is an award winning application
Sophos UTM Web Application Firewall for Microsoft Exchange connectivity
How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014
DESLock+ Basic Setup Guide Version 1.20, rev: June 9th 2014 Contents Overview... 2 System requirements:... 2 Before installing... 3 Download and installation... 3 Configure DESLock+ Enterprise Server...
Okta/Dropbox Active Directory Integration Guide
Okta/Dropbox Active Directory Integration Guide Okta Inc. 301 Brannan Street, 3rd Floor San Francisco CA, 94107 [email protected] 1-888- 722-7871 1 Table of Contents 1 Okta Directory Integration Edition for
OTP Server. Integration module. Nordic Edge AD Membership Provider for Microsoft ASP.NET. Version 1.0, rev. 6. Nordic Edge 2009-02-25
OTP Server Integration module Nordic Edge AD Membership Provider for Microsoft ASP.NET Version 1.0, rev. 6 Nordic Edge 2009-02-25 Summary: Installation guide for a Custom ISS web site www.nordicedge.se
Click Studios. Passwordstate. Installation Instructions
Passwordstate Installation Instructions This document and the information controlled therein is the property of Click Studios. It must not be reproduced in whole/part, or otherwise disclosed, without prior
1. Product Information
ORIXCLOUD BACKUP CLIENT USER MANUAL LINUX 1. Product Information Product: Orixcloud Backup Client for Linux Version: 4.1.7 1.1 System Requirements Linux (RedHat, SuSE, Debian and Debian based systems such
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Virto Active Directory Service for SharePoint. Release 4.1.2. Installation and User Guide
Virto Active Directory Service for SharePoint Release 4.1.2 Installation and User Guide 2 Table of Contents OVERVIEW... 3 SYSTEM REQUIREMENTS... 4 OPERATING SYSTEM... 4 SERVER... 4 BROWSER... 5 INSTALLATION...
LepideAuditor Suite for File Server. Installation and Configuration Guide
LepideAuditor Suite for File Server Installation and Configuration Guide Table of Contents 1. Introduction... 4 2. Requirements and Prerequisites... 4 2.1 Basic System Requirements... 4 2.2 Supported Servers
Online Backup Client User Manual Linux
Online Backup Client User Manual Linux 1. Product Information Product: Online Backup Client for Linux Version: 4.1.7 1.1 System Requirements Operating System Linux (RedHat, SuSE, Debian and Debian based
Kentico CMS 7.0 Intranet Administrator's Guide
Kentico CMS 7.0 Intranet Administrator's Guide 2 Kentico CMS 7.0 Intranet Administrator's Guide Table of Contents Introduction 5... 5 About this guide Getting started 7... 7 Installation... 11 Accessing
Integrating LANGuardian with Active Directory
Integrating LANGuardian with Active Directory 01 February 2012 This document describes how to integrate LANGuardian with Microsoft Windows Server and Active Directory. Overview With the optional Identity
Security Provider Integration LDAP Server
Security Provider Integration LDAP Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names
DataCove DT Active Directory Authentication In Active Directory (AD) authentication mode, the server uses NTLM v2 and LDAP protocols to authenticate users residing in Active Directory. The login procedure
AGILEXRM REFERENCE ARCHITECTURE
AGILEXRM REFERENCE ARCHITECTURE 2012 AgilePoint, Inc. Table of Contents 1. Introduction 4 1.1 Disclaimer of warranty 4 1.2 AgileXRM components 5 1.3 Access from PES to AgileXRM Process Engine Database
aims sql server installation guide
aims sql server installation guide Document Version: 4000 February 2015 CONTENTS AIMS Installation Guide... 3 Installing the AIMS Software... 4 Pre-Requisites... 4 Installation... 4 Shortcuts... 4 Directory
RecoveryVault Express Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
SIMS Multi-user Installation Instructions
SIMS Multi-user Installation Instructions 2011 SIMS Software TABLE OF CONTENTS REQUIREMENTS... 3 COMMON REQUIREMENTS... 3 DATABASE REQUIREMENTS... 3 SERVER REQUIREMENTS... 3 INSTALLING SIMS CLIENT... 5
econtrol 3.5 for Active Directory & Exchange Administrator Guide
econtrol 3.5 for Active Directory & Exchange Administrator Guide This Guide Welcome to the econtrol 3.5 for Active Directory and Exchange Administrator Guide. This guide is for system administrators and
Managing Identities and Admin Access
CHAPTER 4 This chapter describes how Cisco Identity Services Engine (ISE) manages its network identities and access to its resources using role-based access control policies, permissions, and settings.
NETWRIX FILE SERVER CHANGE REPORTER
NETWRIX FILE SERVER CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 3.3 April/2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
Basic Configuration. Key Operator Tools older products. Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work
Where to configure: User Tools Basic Configuration Key Operator Tools older products Program/Change LDAP Server (page 3 of keyop tools) Use LDAP Server must be ON to work Administrator Tools newest products
Sitecore Security Hardening Guide
Sitecore CMS 6.5-6.6 Sitecore Security Hardening Guide Rev: 2012-09-19 Sitecore CMS 6.5-6.6 Sitecore Security Hardening Guide Recommendations for making Sitecore more secure Table of Contents Chapter 1
Bitrix Site Manager ASP.NET. Installation Guide
Bitrix Site Manager ASP.NET Installation Guide Contents Introduction... 4 Chapter 1. Checking for IIS Installation... 5 Chapter 2. Using An Archive File to Install Bitrix Site Manager ASP.NET... 7 Preliminary
Online Backup Linux Client User Manual
Online Backup Linux Client User Manual Software version 4.0.x For Linux distributions August 2011 Version 1.0 Disclaimer This document is compiled with the greatest possible care. However, errors might
System Administration Training Guide. S100 Installation and Site Management
System Administration Training Guide S100 Installation and Site Management Table of contents System Requirements for Acumatica ERP 4.2... 5 Learning Objects:... 5 Web Browser... 5 Server Software... 5
Ingenious Testcraft Technical Documentation Installation Guide
Ingenious Testcraft Technical Documentation Installation Guide V7.00R1 Q2.11 Trademarks Ingenious, Ingenious Group, and Testcraft are trademarks of Ingenious Group, Inc. and may be registered in the United
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Online Backup Client User Manual
For Linux distributions Software version 4.1.7 Version 2.0 Disclaimer This document is compiled with the greatest possible care. However, errors might have been introduced caused by human mistakes or by
Active Directory Requirements and Setup
Active Directory Requirements and Setup The information contained in this document has been written for use by Soutron staff, clients, and prospective clients. Soutron reserves the right to change the
Version 1.0. 2012 Devolutions inc.
Version 1.0 2 Remote Desktop Manager Server (Version 1.0) Table of Contents Foreword Part I Getting Started 0 4 1 What is... Remote Desktop Manager Server? 4 2 Features... 5 3 System... Requirements 6
Cache Configuration Reference
Sitecore CMS 6.2 Cache Configuration Reference Rev: 2009-11-20 Sitecore CMS 6.2 Cache Configuration Reference Tips and Techniques for Administrators and Developers Table of Contents Chapter 1 Introduction...
IMPLEMENTING DIRECTORY SERVICES INTEGRATION WITH HELIX MEDIA LIBRARY Revision Date: September 2014
IMPLEMENTING DIRECTORY SERVICES INTEGRATION WITH HELIX MEDIA LIBRARY Revision Date: September 2014 Helix Media Library User Guide Table of Contents Introduction...3 1. Prerequisites...3 2. Running the
IIS SECURE ACCESS FILTER 1.3
OTP SERVER INTEGRATION MODULE IIS SECURE ACCESS FILTER 1.3 Copyright, NordicEdge, 2006 www.nordicedge.se Copyright, 2006, Nordic Edge AB Page 1 of 14 1 Introduction 1.1 Overview Nordic Edge One Time Password
GoDaddy (CentriqHosting): Data driven Web Application Deployment
GoDaddy (CentriqHosting): Data driven Web Application Deployment Process Summary There a several steps to deploying an ASP.NET website that includes databases (for membership and/or for site content and
Configure Directory Integration
Client Configuration for Directory Integration, page 1 Client Configuration for Directory Integration You can configure directory integration through service profiles using Cisco Unified Communications
safend a w a v e s y s t e m s c o m p a n y
safend a w a v e s y s t e m s c o m p a n y SAFEND Data Protection Suite Installation Guide Version 3.4.5 Important Notice This guide is delivered subject to the following conditions and restrictions:
Quick Introduction... 3. System Requirements... 3. Main features... 3. Getting Started... 4. Connecting to Active Directory... 4
Users' Guide Thank you for evaluating and purchasing AD Bulk Users 4! This document contains information to help you get the most out of AD Bulk Users, importing and updating large numbers of Active Directory
3 Setting up Databases on a Microsoft SQL 7.0 Server
3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other
Reference and Troubleshooting: FTP, IIS, and Firewall Information
APPENDIXC Reference and Troubleshooting: FTP, IIS, and Firewall Information Although Cisco VXC Manager automatically installs and configures everything you need for use with respect to FTP, IIS, and the
Administrator s and Developer s Guide
E-Mail Campaign Manager Administrator s and Developer s Guide Rev: 2013-11-22 E-Mail Campaign Manager for Sitecore CMS 6.5 Administrator s and Developer s Guide A Quick Start Guide and Configuration Reference
NetWrix Exchange Change Reporter
NetWrix Exchange Change Reporter Version 7 Administrator s Guide Contents NetWrix Exchange Change Reporter Administrator s Guide 1. INTRODUCTION... 4 1.1 KEY FEATURES... 5 1.2 LICENSING... 6 1.3 HOW IT
Team Foundation Server 2013 Installation Guide
Team Foundation Server 2013 Installation Guide Page 1 of 164 Team Foundation Server 2013 Installation Guide Benjamin Day [email protected] v1.1.0 May 28, 2014 Team Foundation Server 2013 Installation Guide
Delegated Administration Quick Start
Delegated Administration Quick Start Topic 50200 Delegated Administration Quick Start Updated 22-Oct-2013 Applies to: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere,
Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory
Integrating PISTON OPENSTACK 3.0 with Microsoft Active Directory May 21, 2014 This edition of this document applies to Piston OpenStack 3.0. To send us your comments about this document, e-mail [email protected].
Manual Password Depot Server 8
Manual Password Depot Server 8 Table of Contents Introduction 4 Installation and running 6 Installation as Windows service or as Windows application... 6 Control Panel... 6 Control Panel 8 Control Panel...
CIFS Permissions Best Practices Nasuni Corporation Natick, MA
Nasuni Corporation Natick, MA Overview You use permissions to control user access to data. There are two basic considerations when using permissions to control user access to data: Which users have access
Lepide Software. LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software
Lepide Software LepideAuditor for File Server [CONFIGURATION GUIDE] This guide informs How to configure settings for first time usage of the software Lepide Software Private Limited, All Rights Reserved
Kentico CMS 7.0 Windows Azure Deployment Guide
Kentico CMS 7.0 Windows Azure Deployment Guide 2 Kentico CMS 7.0 Windows Azure Deployment Guide Table of Contents Introduction 4... 4 About this guide Installation and deployment 6... 6 Overview... 6 Architecture...
Entrust Managed Services PKI
Entrust Managed Services PKI Entrust Managed Services PKI Windows Smart Card Logon Configuration Guide Using Web-based applications Document issue: 1.0 Date of Issue: June 2009 Copyright 2009 Entrust.
Table of Contents INTRODUCTION... 2 HOME PAGE... 3. Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG...
Table of Contents INTRODUCTION... 2 HOME PAGE... 3 Announcements... 7 Personalize & Change Password... 8 Reminders... 9 SERVICE CATALOG... 11 Raising a Service Request... 12 Edit the Service Request...
How To Test Your Web Site On Wapt On A Pc Or Mac Or Mac (Or Mac) On A Mac Or Ipad Or Ipa (Or Ipa) On Pc Or Ipam (Or Pc Or Pc) On An Ip
Load testing with WAPT: Quick Start Guide This document describes step by step how to create a simple typical test for a web application, execute it and interpret the results. A brief insight is provided
Interworks. Interworks Cloud Platform Installation Guide
Interworks Interworks Cloud Platform Installation Guide Published: March, 2014 This document contains information proprietary to Interworks and its receipt or possession does not convey any rights to reproduce,
EPiServer Operator's Guide
EPiServer Operator's Guide Abstract This document is mainly intended for administrators and developers that operate EPiServer or want to learn more about EPiServer's operating environment. The document
Hansoft LDAP Integration
Hansoft LDAP Integration The Hansoft LDAP Integration synchronizes Hansoft resources to user accounts in an LDAP directory server, such as Windows Active Directory. It matches accounts on login names and
FTP Service Reference
IceWarp Server FTP Service Reference Version 10 Printed on 12 August, 2009 i Contents FTP Service 1 V10 New Features... 2 FTP Access Mode... 2 FTP Synchronization... 2 FTP Service Node... 3 FTP Service
Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide
Page 1 of 243 Team Foundation Server 2010, Visual Studio Ultimate 2010, Team Build 2010, & Lab Management Beta 2 Installation Guide (This is an alpha version of Benjamin Day Consulting, Inc. s installation
TIBCO Spotfire Web Player 6.0. Installation and Configuration Manual
TIBCO Spotfire Web Player 6.0 Installation and Configuration Manual Revision date: 12 November 2013 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED
DriveLock Quick Start Guide
Be secure in less than 4 hours CenterTools Software GmbH 2012 Copyright Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless otherwise
Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2
Secret Server Installation Windows 8 / 8.1 and Windows Server 2012 / R2 Table of Contents Table of Contents... 1 I. Introduction... 3 A. ASP.NET Website... 3 B. SQL Server Database... 3 C. Administrative
Web Security Service
Webroot Web Security Service Desktop Web Proxy Configuration Guide Webroot Software, Inc. 385 Interlocken Crescent Suite 800 Broomfield, CO 80021 www.webroot.com Desktop Web Proxy Configuration Guide September
NETWRIX USER ACTIVITY VIDEO REPORTER
NETWRIX USER ACTIVITY VIDEO REPORTER ADMINISTRATOR S GUIDE Product Version: 1.0 January 2013. Legal Notice The information in this publication is furnished for information use only, and does not constitute
DEPLOYMENT GUIDE Version 2.1. Deploying F5 with Microsoft SharePoint 2010
DEPLOYMENT GUIDE Version 2.1 Deploying F5 with Microsoft SharePoint 2010 Table of Contents Table of Contents Introducing the F5 Deployment Guide for Microsoft SharePoint 2010 Prerequisites and configuration
QUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
Active Directory LDAP Quota and Admin account authentication and management
Active Directory LDAP Quota and Admin account authentication and management Version 4.1 Updated July 2014 GoPrint Systems 2014 GoPrint Systems, Inc, All rights reserved. One Annabel Lane, Suite 105 San
CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM. User Guide
CRM Migration Manager 3.1.1 for Microsoft Dynamics CRM User Guide Revision D Issued July 2014 Table of Contents About CRM Migration Manager... 4 System Requirements... 5 Operating Systems... 5 Dynamics
Sophos for Microsoft SharePoint startup guide
Sophos for Microsoft SharePoint startup guide Product version: 2.0 Document date: March 2011 Contents 1 About this guide...3 2 About Sophos for Microsoft SharePoint...3 3 System requirements...3 4 Planning
