Cloud Portal Guest Invitations 4.0



Similar documents
Release Notes. CTERA Portal 4.1. July CTERA Portal 4.1 Release Notes 1

Cloud Attached Storage

Cloud Attached Storage

CTERA Agent Sync Edition for Windows

Backing Up and Restoring Microsoft Hyper-V Server Virtual Machines. Cloud Attached Storage. February 2014 Version 4.0

Release Notes. CTERA Portal 4.0. November CTERA Portal 4.0 Release Notes 1

Cloud Attached Storage 5.0

How To Install Ctera Agent On A Pc Or Macbook With Acedo (Windows) On A Macbook Or Macintosh (Windows Xp) On An Ubuntu (Windows 7) On Pc Or Ipad

Cloud Attached Storage

Migrating Your Windows File Server to a CTERA Cloud Gateway. Cloud Attached Storage. February 2015 Version 4.1

Release Notes. Cloud Attached Storage

Backing Up the CTERA Portal Using Veeam Backup & Replication. CTERA Portal Datacenter Edition. May 2014 Version 4.0

CTERA Agent for Mac OS-X

Cloud Attached Storage 3.1 EA

Release Notes. CTERA Portal May CTERA Portal Release Notes 1

CTERA Agent for Windows

CTERA Agent File Sync and Share for Mac

CTERA Agent for Linux

User Guide. CTERA Agent. August 2011 Version 3.0

CTERA Agent for Windows

CTERA Agent for Mac OS-X

Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive

Adding Signer Authentication to an Envelope

Remote Storage Area (RSA) Basics

Two-Factor Authentication

Configuring Single Sign-on from the VMware Identity Manager Service to Dropbox

CTERA End-to-End Security. Whitepaper by CTERA Networks

WatchDox for Mac User Guide

Setting up VMware ESXi for 2X VirtualDesktopServer Manual

Patient Portal. Accessing the Patient Portal. How to Begin: Enter first and last name, date of birth and create a user name and password.

SafeNet Authentication Manager 8.2 and Windows Azure. Quick Start Guide

Cloud Attached Storage

How to Configure Guest Management on the DWC-1000

Access to Webmail services via a Non Trust Computer

NTP Software File Auditor for Windows Edition

Installation Guide. SafeNet Authentication Service

Omniquad Exchange Archiving

Integration Guide. Duo Security Authentication

Microsoft IAS and NPS Agent Configuration Guide

Endpoint Security VPN for Windows 32-bit/64-bit

StarWind iscsi SAN Software: Challenge-Handshake Authentication Protocol (CHAP) for Authentication of Users

Archiving User Guide Outlook Plugin. Manual version 3.1

Implementing SSL Offload with JAGUAR Ver.1.0

Juniper SSL VPN Authentication QUICKStart Guide

Cloud Authentication. Getting Started Guide. Version

VeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.

This document shows new Citrix users how to set up and log in to their Citrix account.

Welcome to Your FCSL Student Web Portal. Course Schedule Students can view and search course schedules and view class details.

Two Factor Authentication - USER GUIDE

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e

Receiving Secure s

Initial DUO 2 Factor Setup, Install, Login and Verification

WatchDox for Windows. User Guide. Version 3.9.5

SafeNet Cisco AnyConnect Client. Configuration Guide

Parallels Panel. Parallels Small Business Panel 10.2: User's Guide. Revision 1.0

Using the Payment Processing Feature

Configuring Single Sign-on from the VMware Identity Manager Service to WebEx

NTP Software File Reporter Analysis Server

WatchDox SharePoint Beta Guide. Application Version 1.0.0

ClickView Digital Signage User Manual

Why Use Blackboard Content System to Store Documents One Time

Strong Authentication for Juniper Networks SSL VPN

CA VPN Client. User Guide for Windows

USER GUIDE 2014 AGILE NETWORK, LLC ALL RIGHTS RESERVED

FortiAuthenticator Agent for Microsoft IIS/OWA. Install Guide

A Step-By-Step Guide

Configuring Single Sign-on from the VMware Identity Manager Service to AirWatch Applications

Fax User Guide 07/31/2014 USER GUIDE

Remote Access End User Reference Guide for SHC Portal Access

Two-Factor Authentication

BlackShield ID Agent for Remote Web Workplace

Pipeliner CRM Phaenomena Guide Getting Started with Pipeliner Pipelinersales Inc.

Quick Start User Guide

WatchDox Administrator's Guide. Application Version 3.7.5

Welcome to ncrypted Cloud!

Azure Multi-Factor Authentication. KEMP LoadMaster and Azure Multi- Factor Authentication. Technical Note

Citrix Receiver. Configuration and User Guide. For Windows Users

WatchDox for Windows User Guide. Version 3.9.0

Secure File Transfer Guest User Guide Updated: 5/8/14

Two-Factor Authentication

Advanced Configuration Steps

StarWind iscsi SAN: Configuring HA File Server for SMB NAS February 2012

Cisco ASA Authentication QUICKStart Guide

Dell Mobile Management. Apple Device Enrollment Program

ELM Server Exchange Edition Virtual Archive Mailbox version 5.5

RedBlack CyBake Online Customer Service Desk

Manual POLICY PATROL SECURE FILE TRANSFER

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Using Internet or Windows Explorer to Upload Your Site

Mac OS X User Manual Version 2.0

ProxySG TechBrief Downloading & Configuring Web Filter

Using YSU Password Self-Service

SFTP Server User Login Instructions. Open Internet explorer and enter the following url:

How to install and use the File Sharing Outlook Plugin

Citrix Receiver. Configuration and User Guide. For Macintosh Users

Customizing Remote Desktop Web Access by Using Windows SharePoint Services Stepby-Step

RSA SecurID Software Token 1.0 for Android Administrator s Guide

NovaBACKUP Remote Workforce Version 12.5 Cloud Restore


Transcription:

Release Notes Cloud Portal Guest Invitations 4.0 January 2014 Cloud Portal Guest Invitations 4.0 Release Notes Copyright sentence ( 2014, CTERA Networks. All rights reserved)

1 Release Contents Copyright 2009-2014 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written permission from CTERA Network Ltd. Information in this document is subject to change without notice and does not represent a commitment on part of CTERA Networks Ltd. CTERA, C200, C400, C800, P1200, CloudPlug, NEXT3, Cloud Attached Storage, and Virtual Cloud Drive are trademarks, service marks, or registered trademarks of CTERA Networks Ltd. All other product names mentioned herein are trademarks or registered trademarks of their respective owners. The products described in this document are protected by U.S. patents, foreign patents, or pending applications. 2 Cloud Portal Guest Invitations 4.0 Release Notes

1 Release Contents About This Release Guest invitations are special time-limited URLs containing a secret code that grants the recipient the ability to view a specific file or folder on a Cloud Drive, and to optionally collaborate on those items. In CTERA Portal 4.0, guest invitations include the following highlights: Two-factor authentication Public link Invitation Access and Authentication Logging Two-Factor Authentication In previous versions, CTERA Portal administrators could require invitation recipients to authenticate to the CTERA Portal using their username and password, before they could access shared file/folders. This provided a single layer of protection against unintended recipients accessing the guest invitation URL. CTERA Portal 4.0 supports two-factor authentication for guest invitations. In addition to requiring recipients to authenticate to the CTERA Portal, it is possible to send them a random, 6-digit numeric passcode via email, which they must enter in order to access the shared file/folder. To enable two-factor authentication, a CTERA Portal administrator visits the Settings > Invitations page, clicks Settings, and selects Verify with Email and/or Verify with Text Message. Cloud Portal Guest Invitations 4.0 Release Notes 3

1 Release Contents When a portal user wants to share file/folder using two-factor authentication, they access their Cloud Drive, browse to the desired file/folder, and click Invite Guest. 4 Cloud Portal Guest Invitations 4.0 Release Notes

Release Contents 1 In the Protection Level field, the user selects Verify by Email, fills in the rest of the fields, and clicks Invite. The recipient will receive an email invitation with a link to the shared file/folder As well as an email with a passcode. Cloud Portal Guest Invitations 4.0 Release Notes 5

1 Release Contents When the recipient clicks on the link in the invitation, a popup window will prompt them for the passcode. The recipient can only view the shared file/folder after entering the passcode. Protection against Brute Force and DoS Attacks Two-factor authentication is protected against brute force attacks: The user is given five tries to enter the code, after which the code is disabled. In addition, rate limits are employed to restrict the number of authentication requests, so as to protect against denial of service attacks. Bypass of Two-Factor Authentication On private computers, after successfully authenticating using two-factor authentication, the user is given the option of setting their computer as "Trusted". When this option is selected, a 256-bit, unique random key is stored on the user's computer, allowing the user to bypass twofactor authentication challenges and avoid answering challenges from the same device for the next 30 days. 6 Cloud Portal Guest Invitations 4.0 Release Notes

Release Contents 1 Public Link In addition to two-factor authentication, it is possible to include a public link in guest invitations. To enable public links, a CTERA Portal administrator visits the Settings > Invitations page, clicks Settings, and then selects Public Link. When a portal user wants to share file/folder, they access their Cloud Drive, browse to the desired file/folder, and click Invite Guest. Then in the Protection Level field, they select Public Link. The recipient will receive an invitation with a public link to the shared file/folder. CTERA administrators can easily copy the link when viewing the invitation in the CTERA Portal's Settings > Invitations page. Cloud Portal Guest Invitations 4.0 Release Notes 7

1 Release Contents Invitation Access and Authentication Logging All accesses to invitations, as well as successful or failed two-factor authentication attempts, are logged in the CTERA Portal Access Log. 8 Cloud Portal Guest Invitations 4.0 Release Notes