Active Directory 2008 Implementation. Version 6.410
|
|
|
- Griselda Wiggins
- 10 years ago
- Views:
Transcription
1 Active Directory 2008 Implementation Version 6.410
2 Contents 1 INTRODUCTION Scope Definition of Terms SERVER CONFIGURATION Supported Deployment Configurations Single AD2008 Domain Controller Two Domain Controllers in Trust Relationship The iprism Active Directory Account Client Active Directory Accounts IPRISM CONFIGURATION To set iprism to use the Domain Controller as its NTP server Verify the existence of an A record CLIENT CONFIGURATION Important Notes Windows Clients Internet Explorer on Windows Firefox on Windows Mac Clients Configuring the Mac Joining a Mac to Active Directory Safari on OS X Firefox on OS X KNOWN ISSUES Kerberos Key Mismatch Other Issues...25 Active Directory 2008 Implementation Guide 1
3 1 Introduction This document is intended to be a comprehensive reference detailing the environments supported when deploying iprism in a Windows 2008 Active Directory environment. 1.1 Scope The information in this document is limited to the version of iprism, deployed in an environment where the iprism appliance is to be integrated with a Microsoft Windows Active Directory 2008 server. 1.2 Definition of Terms The terms included in the table below are used throughout this document. Term/Acronym Description AD2003 Microsoft Active Directory 2003 AD2008 Microsoft Active Directory 2008 DNS Domain Name System: The system by which Internet domain names and addresses are tracked and regulated. Active Directory 2008 Implementation Guide 2
4 2 Server Configuration DNS should be running on the Active Directory Server. To verify this, do the following: Verify this by choosing Start All Programs Administrative Tools Services. Verify that DNS Server has a status of Started. The administrator will need to manually create a DNS A record for the iprism if DNS is running on a server other than the Domain Controller. Ensure that the Time Skew (the time difference between the AD2008 server and any client (PC or iprism)) is less than 5 minutes. If there is a problem, the iprism may be unable to join the Active Directory domain and clients may not be able to authenticate. 2.1 Supported Deployment Configurations To be supported by the iprism software, AD2008 must be deployed in one of the following configurations Single AD2008 Domain Controller In this first scenario, the iprism is joined directly to a single AD2008 domain controller, allowing the iprism to authenticate users against that AD2008 domain. Negotiate authentication is supported (Kerberos with a fallback to NTLM) when the following are true: In any mode where the user is joined to an AD2008 domain, The workstation is a member of the domain or any domain trusted by the domain, And the user is logged in as a member of the domain or any domain trusted by the domain. Whether to use Kerberos or NTLM is determined by the user s browser. There is one exception: Internet Explorer 6, when used in Proxy mode, always uses NTLM and refuses Negotiate authentication mode. This is supported by iprism. Active Directory 2008 Implementation Guide 3
5 2.1.2 Two Domain Controllers in Trust Relationship In this second scenario, the iprism is joined to a domain served by an AD2008 domain controller using Kerberos, and that domain controller has a two-way trust relationship with a second AD2008 or AD2003 domain controller. When iprism is joined to a domain served by an AD2008 domain controller, iprism users may authenticate in the domain served by the AD2008 domain controller. Users may authenticate in any domain trusted by that domain. To authenticate in a trusted domain, a two-way trust must exist. Active Directory 2008 Implementation Guide 4
6 The key trust settings are displayed in the following screenshot. Note that the two-way trust results in external, non-transitive entries in both the outgoing trust and incoming trust lists. Active Directory 2008 Implementation Guide 5
7 Additionally, in the Properties for the trust list entries, the authentication is set to Domain-wide authentication. 2.2 The iprism Active Directory Account An AD2008 user account should be created and have Password never expires checked. No other changes should ever be made. Important: Password never expires should be checked because if a password expires, a domain-wide authentication failure is likely to occur, particularly if the password is that of the user whose account is used to join the domain. To verify that the account has not been modified, the settings on the Account tab can be compared to the correct ones in the following screenshots. Substitute your iprism account name for iprism100h and your own domain for sbsw.m20domain.info. Active Directory 2008 Implementation Guide 6
8 The key information to check on the Account tab is that the User logon name is in the format HTTP/username.domain: Active Directory 2008 Implementation Guide 7
9 2.3 Client Active Directory Accounts User accounts on the Active Directory for use by the clients themselves can be simple user accounts, as per the following example: Active Directory 2008 Implementation Guide 8
10 The minimum requirement is that the accounts are members of the Domain Users group, as shown in the following example: Active Directory 2008 Implementation Guide 9
11 3 iprism Configuration 1. From the iprism home page, select System Settings, then Directory Services. 2. Click Configure & Join. 3. From the Authentication Mode dropdown list, choose Server Your NT Domain, Active Directory Realm, Machine Account, and Domain Controllers will be populated. You can change any of these if necessary. Note: If you change the prepopulated Active Directory Realm, you must use a fully qualified domain name. If you change the Machine Account, you must specify a unique machine account name for iprism. (iprism must establish a machine account on the NT domain.) Active Directory 2008 Implementation Guide 10
12 Note: The account will be created with this name and should be defined so as to not conflict with other machine accounts on the domain. This new account must remain, as created by the Join operation, for the duration of iprism s participation within the domain. If the account is accidentally removed from the NT server, the Join procedure must be repeated again. 5. Type the username and password of the user account that belongs to the Domain Administrator group in the User name and Password fields, respectively. Important: The username must be a member of the Domain Admins group for the AD 2008 domain. This account need not be in the same AD domain as the iprism is joining. However, this account MUST have administrative rights in the AD domain that the iprism is joining. (Permissions may be granted via a trust relationship between domains.) The only allowable formats are as follows: Username (e.g., jdoe) NT Domain\Username (e.g., SALES-ABC\jdoe) Username@ADDomain (e.g., [email protected]) 6. Click Advanced Settings. 7. The fields will be prepopulated based on your authentication settings. You can change any of these if necessary: Active Directory Server IP Port (in the example above, 389). Search User DN needs to be a domain user account. The DN can be in Windows 2003/2008 LDAP format or Windows 2003/2008 UPN format (e.g., [email protected]). Search User Password. Important: It is not recommended that you change the Search User DN or Search User Password fields. The Search Base field is prepopulated, and should be set to the root domain object of the AD forest (e.g., DC=sbsw, DC=m20domain, DC=info). The Search Mask field is prepopulated, and should be set to samaccountname=%1 (preferably) or userprincipalname=%1 The Group Attribute field is prepopulated, and should be set to memberof. Each node will usually have many attributes of information about the user. iprism can run up to two queries to determine a user s profile. If the value in the Group Attribute field is a distinguished name, iprism will perform a second query, searching for the Group Attribute Name. This allows the ability to use groups to define profiles, so you will not have to reconfigure individual users. For example: Query for user <CN=joe, DC=stbernard, DC=com> returns the values memberof = <CN=group1, DC=stbernard, DC=com> memberof = <CN=group2, DC=stbernard, DC=com> The iprism client will then query each memberof group until it finds a valid attribute. Since there is no mapping yet, the first valid attribute is used. iprism can also just retrieve a single attribute to use as the name of an access profile on iprism. This will then be associated with the user for access privileges. If you want to use this feature, configure your AD08 server to provide such information under a specific attribute name, and list that name in the Group Attribute Name field. Active Directory 2008 Implementation Guide 11
13 8. If a Group Attribute Name is defined, iprism will proceed as follows: 1. Authenticate the user using provided credentials 2. Look up the value of the (primary) attribute for the user 3. If the attribute is a DN, look up this DN 4. Search for the secondary (SubQuery) attribute of this DN 5. Use the value of the secondary attribute as the iprism filtering profile name Note : For multi-valued attributes, the first valid match (meaning the value maps to an existing iprism profile) will be used. 9. Select an Encryption Type from the dropdown list. The following Encryption Types are available: TLS/SSL TLS SSL None Note : Unless the AD Server has been set up with a server certificate, select None. 10. Click OK. 11. Bridge (transparent) mode only : Auto-Login Redirection Settings. When using Server 2008, DNS is the only option available for Auto-Login redirection settings. DNS redirection is required for Auto-Login, because iprism uses its fully qualified domain name to generate Kerberos keys during Auto-Login. The name iprism uses for redirection must agree with this name. Setting DNS redirection causes the iprism to use the same name for both its Kerberos keys and for redirection. For more information about how DNS works with Auto-Login, see the iprism Knowledgebase article How do I resolve iprism s IP address using DNS? 12. If your settings are correct, click Join in the Join Domain Settings frame. Important: This may take a few minutes. If there is a problem, you will receive an error message; as long as the progress bar is working, do not click Cancel or assume there is a problem. 13. Click Yes to confirm. 14. Save your configuration by clicking Save. 15. If all settings are correct and the join was successful, under Current Authentication Mode, you will see AD200x - Joined. 16. Set up your clients browsers. For instructions on specific browsers, refer to the following articles in the Knowledgebase: Configuring IE for proxy mode Auto-Login Configuring IE for transparent mode Auto-Login Configuring Firefox Important: Users must proxy to iprism s fully qualified domain name, not the IP address. Active Directory 2008 Implementation Guide 12
14 3.1 To set iprism to use the Domain Controller as its NTP server 1. From the iprism home page, select System Settings, then System Preferences. 2. In the Current Date & Time frame, click Set. 3. In the NTP Server field, type the IP address of the server that handles NTP requests. 3.2 Verify the existence of an A record Verify that the iprism has a valid A record listed in the DNS server used by the clients. (Note: The required A record is for iprism.) If the DNS is not running on the Domain Controller, then a manual A record will need to be created on the DNS Server. For instructions on how to do this, see the iprism Knowledgebase article How do I setup a DNS A-record for iprism?, available at Note: If the machine isn t joined to the same domain, you will be prompted and required to enter your credentials. Active Directory 2008 Implementation Guide 13
15 4 Client Configuration Ensure that the Time Skew (the time difference between the AD2008 server and any client (PC or iprism)) is less than 5 minutes. If there is a problem, the iprism may be unable to join Active Directory and clients may not be able to authenticate. If there is a problem, follow the steps on page 13 to set up the Domain Controller as your NTP server. 4.1 Important Notes If you are using iprism in proxy mode, the Local Intranet Zone setting is not required. If you are using iprism in bridge (transparent) mode, the proxy setting is not required. 4.2 Windows Clients The Client PC must be joined to the same domain as the iprism. The Client must be logged in with a user account that exists on the same domain as the iprism. Active Directory 2008 Implementation Guide 14
16 Ensure that the client PC can resolve the iprism host name via the nslookup command. Active Directory 2008 Implementation Guide 15
17 4.2.1 Internet Explorer on Windows Ensure that Integrated Windows Authentication is enabled on the client: The above setting corresponds to the following registry key: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\EnableNegotiate = DWORD:1 (for Kerberos). Important: Internet Explorer 6 does not support Kerberos in proxy mode (IE 6 only supports Kerberos in bridge (transparent) mode), so ensure that at least version 7 of IE is being used on any client machines that are going to proxy through iprism. Internet Explorer 7 cannot be used on Windows 2000 clients; customers who require proxy support on Windows 2000 must use Firefox. Active Directory 2008 Implementation Guide 16
18 In Internet Explorer, specify the fully qualified domain name of the iprism 1 in the Proxy server section of the Local Area Network (LAN) Settings: 1 If you are using iprism in proxy mode, you can specify either the proxy server s fully qualified domain name or its IP address here. However, if you are using iprism in bridge (transparent) mode, you must use the fully qualified domain name. IP address cannot be used. Active Directory 2008 Implementation Guide 17
19 In Internet Explorer, add the fully qualified domain name of the iprism to the Local intranet zone as follows: Select Tools Internet Options Security Local Intranet Sites Advanced. Type the fully qualified domain name. Click Add. Active Directory 2008 Implementation Guide 18
20 Internet Explorer must be configured for Integrated Authentication. Verify this as follows: Select Tools Internet Options Security Local Intranet Custom Level. Scroll down to the bottom of the list and ensure Automatic logon only in Intranet zone is selected. Active Directory 2008 Implementation Guide 19
21 4.2.2 Firefox on Windows For clients who are using Firefox as their browser: Type about:config in the address bar. Search for the key network.negotiate-auth.trusted-uris. Set the value to the fully qualified domain name of the iprism. Active Directory 2008 Implementation Guide 20
22 4.3 Mac Clients Important Note: Auto-Login is only supported on OS X version Mac clients must be configured and then joined to the same domain as the iprism. To do this, complete the following instructions Configuring the Mac Set the Mac s DNS (System Preferences Network Advanced DNS) to point to the Domain Controller (if the Domain Controller is also the DNS server) or to a DNS server that can resolve the Domain Controller s name. Add the domain name to the search suffixes. Via System Preferences Sharing, set the Mac s hostname to a reasonable value (a valid DNS hostname of 15 characters or less). Under Computer Name, click Edit to edit the hostname. Leave the default suffix.info (or.local) alone if it is there; it will be ignored. Active Directory 2008 Implementation Guide 21
23 Set the Mac s hostname in your DNS server. It s most convenient if your DNS server is also your Domain Controller, but it doesn t have to be Joining a Mac to Active Directory 2008 Open the Applications folder and browse to the Utilities folder. From here, start up the Directory Utility application. Active Directory 2008 Implementation Guide 22
24 Click the + sign to add a directory. When that dialog opens, select Active Directory and you will see the following dialog: Credentials must be provided in the newer [email protected] form. Once joined, you will see the directory listed in the Directory Utility. When logging into the Mac, ensure that you select a user account that exists on the same domain as the iprism. Active Directory 2008 Implementation Guide 23
25 4.3.3 Safari on OS X Launch Safari and surf to a web site. If the client IP address has been configured in the iprism for Auto-Login, a popup dialog will appear asking for your Kerberos password and a checkbox asking whether you want to add it to your keychain. Important Note: Auto-Login is only supported on OS X version Type your password. Check the box if you want to add the password to your keychain. Safari should connect. If you add your password to your keychain, you should not be prompted again Firefox on OS X For clients who are using Firefox as their browser: Type about:config in the address bar. Search for the key network.negotiate-auth.trusted-uris. Set the value to the fully qualified domain name of the iprism. Active Directory 2008 Implementation Guide 24
26 5 Known Issues The following known issues exist in the iprism 6.3/AD2008 environment. 5.1 Kerberos Key Mismatch In some cases, we are seeing a Kerberos key mismatch between clients and the Active Directory server. This problem manifests itself by prompting the client with a login dialog box in the browser (as per Basic authentication) even when Auto-Login has been configured for that client. Logging in with valid credentials allows the client to proceed. Active Directory does not maintain keys that it has generated previously for clients, but rather only the current key that will be given out; once generated, they are gone and there is no way to get at them. Hence the general recommendation is to only ever touch the user account being used for Kerberos from a single place (e.g., by using the ktpass command). There does not appear to be a way to force a client to get rid of its key. It will continue using the "host" key no matter how many times login fails. It will, however, re-fetch the "HTTP" key each time it tries to do a manual login, which is why even when Auto Login fails, manual login still works. The only way to ensure this doesn't happen is to educate users that they should not, under any circumstances, change the password on the iprism Active Directory account. If for some reason the password is changed, then rejoining the domain should fix it going forward (since it will update the key to something that the iprism will have in its keytab). However, any clients that have fetched the key in the meantime will be forced to manually login until such time as they log out (and hence flush their Kerberos cache). 5.2 Other Issues The Administrator will need to Save & Exit the iprism System Configuration tool after joining the AD2008 server and before mapping groups. If you map a group before doing a Save & Exit and logging back into iprism, the group mapping will be saved but cannot be checked or used until after you have completed a Save & Exit. Note: Policy Mapping does not currently work for nested groups. Regarding the Active Directory Local Policy Setting Deny access to this computer from the network, this security setting determines which users are prevented from accessing a computer over the network. This policy setting supersedes the Access this computer from the network policy setting if a user account is subject to both policies. As a result, if it is enabled with domain users, Internet access is unfiltered when Auto-Login is used. Active Directory 2008 Implementation Guide 25
27 Active Directory 2008 Implementation Version St. Bernard Software, Inc. All rights reserved. The St. Bernard Software logo, iprism and iguard are trademarks of St. Bernard Software Inc. All other trademarks and registred trademarks are hereby acknowledged. Corporate Office Avenue of Science San Diego, CA Main Phone: Toll Free: Fax: Web:
www.stbernard.com Active Directory 2008 Implementation Guide Version 6.3
800 782 3762 www.stbernard.com Active Directory 2008 Implementation Guide Version 6.3 Contents 1 INTRODUCTION... 2 1.1 Scope... 2 1.2 Definition of Terms... 2 2 SERVER CONFIGURATION... 3 2.1 Supported
Configuring Sponsor Authentication
CHAPTER 4 Sponsors are the people who use Cisco NAC Guest Server to create guest accounts. Sponsor authentication authenticates sponsor users to the Sponsor interface of the Guest Server. There are five
Field Description Example. IP address of your DNS server. It is used to resolve fully qualified domain names
DataCove DT Active Directory Authentication In Active Directory (AD) authentication mode, the server uses NTLM v2 and LDAP protocols to authenticate users residing in Active Directory. The login procedure
Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory
Configuring HP Integrated Lights-Out 3 with Microsoft Active Directory HOWTO, 2 nd edition Introduction... 2 Integration using the Lights-Out Migration Utility... 2 Integration using the ilo web interface...
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
1 Introduction. Windows Server & Client and Active Directory. www.exacq.com
Windows Server & Client and Active Directory 1 Introduction For an organization using Active Directory (AD) for user management of information technology services, integrating exacqvision into the AD infrastructure
Blue Coat Security First Steps Solution for Integrating Authentication
Solution for Integrating Authentication using IWA Direct SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
SINGLE SIGN-ON FOR MTWEB
SINGLE SIGN-ON FOR MTWEB FOR MASSTRANSIT ENTERPRISE WINDOWS SERVERS WITH DIRECTORY SERVICES INTEGRATION Group Logic, Inc. November 26, 2008 Version 1.1 CONTENTS Revision History...3 Feature Highlights...4
PingFederate. IWA Integration Kit. User Guide. Version 3.0
PingFederate IWA Integration Kit Version 3.0 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate IWA Integration Kit User Guide Version 3.0 April, 2012 Ping Identity Corporation
Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile
User-ID Best Practices
User-ID Best Practices PAN-OS 5.0, 5.1, 6.0 Revision A 2011, Palo Alto Networks, Inc. www.paloaltonetworks.com Table of Contents PAN-OS User-ID Functions... 3 User / Group Enumeration... 3 Using LDAP Servers
Getting Started Guide
Getting Started Guide CensorNet Professional Copyright CensorNet Limited, 2007-2011 This document is designed to provide information about the first time configuration and testing of the CensorNet Professional
CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?
Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008
Enabling Kerberos SSO in IBM Cognos Express on Windows Server 2008 Nature of Document: Guideline Product(s): IBM Cognos Express Area of Interest: Infrastructure 2 Copyright and Trademarks Licensed Materials
Security Provider Integration Kerberos Authentication
Security Provider Integration Kerberos Authentication 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are
PineApp Surf-SeCure Quick
PineApp Surf-SeCure Quick Installation Guide September 2010 WEB BASED INSTALLATION SURF-SECURE AS PROXY 1. Once logged in, set the appliance s clock: a. Click on the Edit link under Time-Zone section.
F-Secure Messaging Security Gateway. Deployment Guide
F-Secure Messaging Security Gateway Deployment Guide TOC F-Secure Messaging Security Gateway Contents Chapter 1: Deploying F-Secure Messaging Security Gateway...3 1.1 The typical product deployment model...4
IIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
How to Join QNAP NAS to Microsoft Active Directory (AD)
How to Join QNAP NAS to Microsoft Active Directory (AD) What is Active Directory? Active Directory is a Microsoft directory used in Windows environments to centrally store, share, and manage the information
www.nexuswebsites.co.uk Professional Mailbox Email Software Setup Guide
Professional Mailbox Email Software Setup Guide Table of contents Before you start... 2 Setting up Outlook 2010... 2 Using Autodiscover to configure Outlook 2010... 2 The Autodiscover wizard has not worked...
How-to: Single Sign-On
How-to: Single Sign-On Document version: 1.02 nirva systems [email protected] nirva-systems.com How-to: Single Sign-On - page 2 This document describes how to use the Single Sign-On (SSO) features
PingFederate. IWA Integration Kit. User Guide. Version 2.6
PingFederate IWA Integration Kit Version 2.6 User Guide 2012 Ping Identity Corporation. All rights reserved. PingFederate IWA Integration Kit User Guide Version 2.6 March, 2012 Ping Identity Corporation
Windows XP Exchange Client Installation Instructions
WINDOWS XP with Outlook 2003 or Outlook 2007 1. Click the Start button and select Control Panel: 2. If your control panel looks like this: Click Switch to Classic View. 3. Double click Mail. 4. Click show
How to Configure Captive Portal
How to Configure Captive Portal Captive portal is one of the user identification methods available on the Palo Alto Networks firewall. Unknown users sending HTTP or HTTPS 1 traffic will be authenticated,
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide
RSA Authentication Manager 7.1 Microsoft Active Directory Integration Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks
Clientless SSL VPN Users
Manage Passwords, page 1 Username and Password Requirements, page 3 Communicate Security Tips, page 3 Configure Remote Systems to Use Clientless SSL VPN Features, page 3 Manage Passwords Optionally, you
How To Install Ctera Agent On A Pc Or Macbook With Acedo (Windows) On A Macbook Or Macintosh (Windows Xp) On An Ubuntu 7.5.2 (Windows 7) On Pc Or Ipad
Deploying CTERA Agent via Microsoft Active Directory and Single Sign On Cloud Attached Storage September 2015 Version 5.0 Copyright 2009-2015 CTERA Networks Ltd. All rights reserved. No part of this document
V Series Rapid Deployment Version 7.5
V Series Rapid Deployment Version 7.5 Table of Contents Module 1: First Boot Module 2: Configure P1 and N interfaces Module 3: Websense Software installation (Reporting Server) Module 4: Post installation
Professional Mailbox Email Software Setup Guide
Professional Mailbox Email Software Setup Guide Table of contents Download and Install Microsoft Outlook 2010 or 2011... 2 Enabling access from email software... 4 Setting up Outlook 2010... 6 Before you
Single Sign On. Configuration Checklist for Single Sign On CHAPTER
CHAPTER 39 The single sign on feature allows end users to log into a Windows client machine on a Windows domain, then use certain Cisco Unified Communications Manager applications without signing on again.
RoomWizard Synchronization Software Manual Installation Instructions
2 RoomWizard Synchronization Software Manual Installation Instructions Table of Contents Exchange Server Configuration... 4 RoomWizard Synchronization Software Installation and Configuration... 5 System
Ensure that your environment meets the requirements. Provision the OpenAM server in Active Directory, then generate keytab files.
This chapter provides information about the feature which allows end users to log into a Windows client machine on a Windows domain, then use certain Cisco Unified Communications Manager applications without
Citrix Access on SonicWALL SSL VPN
Citrix Access on SonicWALL SSL VPN Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through SonicWALL SSL VPN 5.0. It also includes information about configuring
Active Directory integration with CloudByte ElastiStor
Active Directory integration with CloudByte ElastiStor Prerequisite Change the time and the time zone of the Active Directory Server to the VSM time and time zone. Enabling Active Directory at VSM level
Siteminder Integration Guide
Integrating Siteminder with SA SA - Siteminder Integration Guide Abstract The Junos Pulse Secure Access (SA) platform supports the Netegrity Siteminder authentication and authorization server along with
Single Sign On. Configuration Checklist for Single Sign On CHAPTER
CHAPTER 39 The single sign on feature allows end users to log into a Windows client machine on a Windows domain, then use certain Cisco Unified Communications Manager applications without signing on again.
Active Directory Integration
January 11, 2011 Author: Audience: SWAT Team Evaluator Product: Cymphonix Network Composer EX Series, XLi OS version 9 Active Directory Integration The following steps will guide you through the process
NETASQ SSO Agent Installation and deployment
NETASQ SSO Agent Installation and deployment Document version: 1.3 Reference: naentno_sso_agent Page 1 / 20 Copyright NETASQ 2013 General information 3 Principle 3 Requirements 3 Active Directory user
Host Access Management and Security Server
Host Access Management and Security Server Evaluation Guide Host Access Management and Security Server Evaluation Guide 12.2 Copyrights and Notices Copyright 2015 Attachmate Corporation. All rights reserved.
Configuring and Using the TMM with LDAP / Active Directory
Configuring and Using the TMM with LDAP / Active Lenovo ThinkServer April 27, 2012 Version 1.0 Contents Configuring and using the TMM with LDAP / Active... 3 Configuring the TMM to use LDAP... 3 Configuring
Security Provider Integration LDAP Server
Security Provider Integration LDAP Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
Installing and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
NSi Mobile Installation Guide. Version 6.2
NSi Mobile Installation Guide Version 6.2 Revision History Version Date 1.0 October 2, 2012 2.0 September 18, 2013 2 CONTENTS TABLE OF CONTENTS PREFACE... 5 Purpose of this Document... 5 Version Compatibility...
Dell SonicWALL SRA 7.5 Citrix Access
Dell SonicWALL SRA 7.5 Citrix Access Document Scope This document describes how to configure and use Citrix bookmarks to access Citrix through Dell SonicWALL SRA 7.5. It also includes information about
Configuring SSL VPN on the Cisco ISA500 Security Appliance
Application Note Configuring SSL VPN on the Cisco ISA500 Security Appliance This application note describes how to configure SSL VPN on the Cisco ISA500 security appliance. This document includes these
Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions
HOSTING Administrator Control Panel / Quick Reference Guide Page 1 of 9 Outlook Profile Setup Guide Exchange 2010 Quick Start and Detailed Instructions Exchange 2010 Outlook Profile Setup Page 2 of 9 Exchange
Sample Configuration: Cisco UCS, LDAP and Active Directory
First Published: March 24, 2011 Last Modified: March 27, 2014 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
ProxySG TechBrief Enabling Transparent Authentication
ProxySG TechBrief Enabling Transparent Authentication What is Transparent Authentication? Authentication is a key factor when defining a web access policy. When the Blue Coat ProxyxSG is configured for
User Manual. Onsight Management Suite Version 5.1. Another Innovation by Librestream
User Manual Onsight Management Suite Version 5.1 Another Innovation by Librestream Doc #: 400075-06 May 2012 Information in this document is subject to change without notice. Reproduction in any manner
Exchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook
How to configure your Windows PC post migrating to Microsoft Office 365
How to configure your Windows PC post migrating to Microsoft Office 365 1 Contents Purpose... 3 Document Support Boundaries... 3 Examples used in this document... 4 Several different Microsoft Office 365
Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9
Massey University Wireless Network Client Configuration Mac OS X 10.6 10.9 MAC wireless network Requirements Information Technology Services You must have an active Massey username and password (i.e. you
2X Cloud Portal v10.5
2X Cloud Portal v10.5 URL: www.2x.com E-mail: [email protected] Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless otherwise
LDAP Authentication and Authorization
LDAP Authentication and Authorization What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned to centralized
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment
How To - Implement Clientless Single Sign On Authentication in Single Active Directory Domain Controller Environment How To - Implement Clientless Single Sign On Authentication with Active Directory Applicable
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide
WebSpy Vantage Ultimate 2.2 Web Module Administrators Guide This document is intended to help you get started using WebSpy Vantage Ultimate and the Web Module. For more detailed information, please see
CONNECT-TO-CHOP USER GUIDE
CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...
v7.8.2 Release Notes for Websense Content Gateway
v7.8.2 Release Notes for Websense Content Gateway Topic 60086 Web Security Gateway and Gateway Anywhere 12-Mar-2014 These Release Notes are an introduction to Websense Content Gateway version 7.8.2. New
How To - Implement Single Sign On Authentication with Active Directory
How To - Implement Single Sign On Authentication with Active Directory Applicable to English version of Windows This article describes how to implement single sign on authentication with Active Directory
SMART Vantage. Installation guide
SMART Vantage Installation guide Product registration If you register your SMART product, we ll notify you of new features and software upgrades. Register online at smarttech.com/registration. Keep the
Content Filtering Client Policy & Reporting Administrator s Guide
Content Filtering Client Policy & Reporting Administrator s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your system. CAUTION: A CAUTION
Using LDAP Authentication in a PowerCenter Domain
Using LDAP Authentication in a PowerCenter Domain 2008 Informatica Corporation Overview LDAP user accounts can access PowerCenter applications. To provide LDAP user accounts access to the PowerCenter applications,
INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE
INUVIKA OVD VIRTUAL DESKTOP ENTERPRISE MICROSOFT ACTIVE DIRECTORY INTEGRATION Agostinho Tavares Version 1.0 Published 06/05/2015 This document describes how Inuvika OVD 1.0 can be integrated with Microsoft
User-ID. Palo Alto Networks. PAN-OS Administrator s Guide Version 6.0. Copyright 2007-2015 Palo Alto Networks
User-ID Palo Alto Networks PAN-OS Administrator s Guide Version 6.0 Contact Information Corporate Headquarters: Palo Alto Networks 4401 Great America Parkway Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-us
Configuring your email client to connect to your Exchange mailbox
Configuring your email client to connect to your Exchange mailbox Contents Use Outlook Web Access (OWA) to access your Exchange mailbox... 2 Use Outlook 2003 to connect to your Exchange mailbox... 3 Add
LDAP Implementation AP561x KVM Switches. All content in this presentation is protected 2008 American Power Conversion Corporation
LDAP Implementation AP561x KVM Switches All content in this presentation is protected 2008 American Power Conversion Corporation LDAP Implementation Does not require LDAP Schema to be touched! Uses existing
ProxySG TechBrief LDAP Authentication with the ProxySG
ProxySG TechBrief LDAP Authentication with the ProxySG What is LDAP Authentication? Today, the network can include elements such as LANs, WANs, an intranet, and the Internet. Many enterprises have turned
HP Device Manager 4.7
Technical white paper HP Device Manager 4.7 LDAP Troubleshooting Guide Table of contents Introduction... 2 HPDM LDAP-related context and background... 2 LDAP in HPDM... 2 Full domain account name login...
VMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.6 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
Skyward LDAP Launch Kit Table of Contents
04.30.2015 Table of Contents What is LDAP and what is it used for?... 3 Can Cloud Hosted (ISCorp) Customers use LDAP?... 3 What is Advanced LDAP?... 3 Does LDAP support single sign-on?... 4 How do I know
Using LifeSize Systems with Microsoft Office Communications Server 2007
Using LifeSize Systems with Microsoft Office Communications Server 2007 This technical note describes the steps to integrate a LifeSize video communications device with Microsoft Office Communication Server
M86 Web Filter USER GUIDE for M86 Mobile Security Client. Software Version: 5.0.00 Document Version: 02.01.12
M86 Web Filter USER GUIDE for M86 Mobile Security Client Software Version: 5.0.00 Document Version: 02.01.12 M86 WEB FILTER USER GUIDE FOR M86 MOBILE SECURITY CLIENT 2012 M86 Security All rights reserved.
Virtual Appliance for VMware Server. Getting Started Guide. Revision 2.0.2. Warning and Disclaimer
Virtual Appliance for VMware Server Getting Started Guide Revision 2.0.2 Warning and Disclaimer This document is designed to provide information about the configuration and installation of the CensorNet
Setup Guide Revision A. WDS Connector
Setup Guide Revision A WDS Connector COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee CleanBoot, McAfee
DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL
DESKTOP CLIENT CONFIGURATION GUIDE BUSINESS EMAIL Version 2.0 Updated: March 2011 Contents 1. Mac Email Clients... 3 1.1 Configuring Microsoft Outlook 2011... 3 1.2 Configuring Entourage 2008... 4 1.3.
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More. Quick Start with Microsoft Hyper-V
Connection Broker Managing User Connections to Workstations, Blades, VDI, and More Quick Start with Microsoft Hyper-V Version 8.1 October 21, 2015 Contacting Leostream Leostream Corporation http://www.leostream.com
User Management Guide
AlienVault Unified Security Management (USM) 4.x-5.x User Management Guide USM v4.x-5.x User Management Guide, rev 1 Copyright 2015 AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
AVG Business SSO Connecting to Active Directory
AVG Business SSO Connecting to Active Directory Contents AVG Business SSO Connecting to Active Directory... 1 Selecting an identity repository and using Active Directory... 3 Installing Business SSO cloud
User Guide. Cloud Gateway Software Device
User Guide Cloud Gateway Software Device This document is designed to provide information about the first time configuration and administrator use of the Cloud Gateway (web filtering device software).
Setting Up Scan to SMB on TaskALFA series MFP s.
Setting Up Scan to SMB on TaskALFA series MFP s. There are three steps necessary to set up a new Scan to SMB function button on the TaskALFA series color MFP. 1. A folder must be created on the PC and
How To Manage Storage With Novell Storage Manager 3.X For Active Directory
www.novell.com/documentation Installation Guide Novell Storage Manager 4.1 for Active Directory September 10, 2015 Legal Notices Condrey Corporation makes no representations or warranties with respect
1. Navigate to Control Panel and click on User Accounts and Family Safety. 2. Click on User Accounts
This document will guide you through setting up your outgoing server (SMTP) Microsoft Outlook and Windows Live Mail. There is also a section below that guides you through the manual configuration of your
Exchange 2013 mailbox setup guide
Fasthosts Customer Support Exchange 2013 mailbox setup guide This article covers the setup of Exchange 2013 mailboxes in Microsoft Outlook 2013, 2010 and Outlook 2011 for Mac. Contents Exchange 2013 Mailbox
ENABLING SINGLE SIGN-ON: SPNEGO AND KERBEROS Technical Bulletin For Use with DSView 3 Management Software
ENABLING SINGLE SIGN-ON: SPNEGO AND KERBEROS Technical Bulletin For Use with DSView 3 Management Software Avocent, the Avocent logo, The Power of Being There and DSView are registered trademarks of Avocent
New Online Banking Guide for FIRST time Login
New Online Banking Guide for FIRST time Login Step 1: Login Enter your existing Online Banking User ID and Password. Click Log-In. Step 2: Accepting terms and Conditions to Proceed Click on See the terms
Evaluation Guide. iprism Web Security. 800-782-3762 www.edgewave.com V7.000
800-782-3762 www.edgewave.com Welcome to EdgeWave Web Security! This short guide is intended to help administrators set up and test the iprism Web Filtering appliance for evaluation purposes. A more detailed
Configuring User Identification via Active Directory
Configuring User Identification via Active Directory Version 1.0 PAN-OS 5.0.1 Johan Loos [email protected] User Identification Overview User Identification allows you to create security policies based
USG40HE Content Filter Customization
USG40HE Content Filter Customization This guide is designed to help with the setup of the ZyWALL s content filtering feature. Supported Devices USG40HE Firmware version 4.10(AALA.0) or later Overview Content
User Source and Authentication Reference
User Source and Authentication Reference ZENworks 11 www.novell.com/documentation Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
Remote Filtering Client Guide. iprism Web Security. 800-782-3762 www.edgewave.com
Remote Filtering Client Guide iprism Web Security 800-782-3762 www.edgewave.com 2001 2010 St. Bernard Software Inc. All rights reserved. The St. Bernard Software logo, iprism and iguard are trademarks
Active Directory Self-Service FAQ
Active Directory Self-Service FAQ General Information: [email protected] Online Support: [email protected] CionSystems Inc. Mailing Address: 16625 Redmond Way, Ste M106 Redmond, WA. 98052 http://www.cionsystems.com
Polycom RealPresence Resource Manager System Getting Started Guide
[Type the document title] Polycom RealPresence Resource Manager System Getting Started Guide 8.0 August 2013 3725-72102-001B Polycom Document Title 1 Trademark Information POLYCOM and the names and marks
User Identification and Authentication
User Identification and Authentication Vital Security 9.2 Copyright Copyright 1996-2008. Finjan Software Inc.and its affiliates and subsidiaries ( Finjan ). All rights reserved. All text and figures included
How To Configure A Bomgar.Com To Authenticate To A Rdius Server For Multi Factor Authentication
Security Provider Integration RADIUS Server 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.
WatchGuard SSL v3.2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 355419 Revision Date January 28, 2013 Introduction WatchGuard is pleased to announce the release of WatchGuard
User Identification (User-ID) Tips and Best Practices
User Identification (User-ID) Tips and Best Practices Nick Piagentini Palo Alto Networks www.paloaltonetworks.com Table of Contents PAN-OS 4.0 User ID Functions... 3 User / Group Enumeration... 3 Using
Enterprise Apple Xserve Wiki and Blog using Active Directory. Table Of Contents. Prerequisites 1. Introduction 1
Table Of Contents Prerequisites 1 Introduction 1 Making the Xserve an Open Directory Master 2 Binding the Xserve to Active Directory 3 Creating a Certificate 3 Setting up Apache Web Server 4 Applying the
Installation and Configuration Guide
Entrust Managed Services PKI Auto-enrollment Server 7.0 Installation and Configuration Guide Document issue: 1.0 Date of Issue: July 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
Sophos UTM Web Application Firewall for Microsoft Exchange connectivity
How to configure Sophos UTM Web Application Firewall for Microsoft Exchange connectivity This article explains how to configure your Sophos UTM 9.2 to allow access to the relevant Microsoft Exchange services
Page 1 of 11. Setting up VPN on Windows XP. Setting up VPN on Windows XP version 1.2
Page 1 of 11 Setting up VPN on Windows XP Page 2 of 11 Setting up VPN on Windows XP(Professional) Requirements: 1. These instructions are only applicable for a computer that has Windows XP Professional
