McAfee Cloud Identity Manager Installation Guide For McAfee Cloud Identity Manager v3.1 August 2012

Size: px
Start display at page:

Download "McAfee Cloud Identity Manager Installation Guide For McAfee Cloud Identity Manager v3.1 August 2012"

Transcription

1 McAfee Cloud Identity Manager Installation Guide For McAfee Cloud Identity Manager v3.1 August 2012 Order Number: US

2 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis, McAfee CleanBoot, McAfee DeepSAFE, epolicy Orchestrator, McAfee epo, McAfee EMM, McAfee Enterprise Mobility Management, Foundscore, Foundstone, McAfee NetPrism, McAfee Policy Enforcer, Policy Lab, McAfee QuickClean, Safe Eyes, McAfee SECURE, SecureOS, McAfee Shredder, SiteAdvisor, SmartFilter, McAfee Stinger, McAfee Total Protection, TrustedSource, VirusScan, WaveSecure, and WormTraq are trademarks or registered trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANY YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. McAfee Cloud Identity Manager Installation Guide August Order Number: US

3 Document Revision History Revision Number Description Release Date 003US McAfee Cloud Identity Manager Installation Guide v3.0 May US McAfee Cloud Identity Manager Installation Guide v3.1 August 2012 August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 3

4 McAfee Cloud Identity Manager Installation Guide August Order Number: US

5 Contents 1.0 Introduction to McAfee Cloud Identity Manager Supported Environments Supported Browsers Available Documentation Technical Support Getting Started Setting Up a MySQL Database or System File Installing McAfee CIM as a Service Administrative Privileges Upgrade Options Upgrade Considerations Upgrading Clusters Access the McAfee CIM Management Console Replace the Default SSL Server Certificate with Your Own Locate and Modify an Existing Keystore Alias Using Your Own JRE Configure a Windows Environment for Your JRE Configure a Linux Environment for Your JRE Before Starting McAfee CIM for the First Time Installation Procedures on Windows Install McAfee CIM on Windows Install McAfee CIM on Windows Upgrade Option Install McAfee CIM on Windows Typical Installation Option Install McAfee CIM on Windows Custom Installation Option Start and Stop McAfee CIM on Windows Uninstall McAfee CIM on Windows Backing Up and Restoring an Installation on Windows Back Up an Installation on Windows Restore a Back Up on Windows Installation Procedures on Linux Install McAfee CIM on Linux Install McAfee CIM on Linux Typical Installation Option Install McAfee CIM on Linux Custom Installation Option Start and Stop McAfee CIM on Linux Uninstall McAfee CIM on Linux Backing Up and Restoring an Installation on Linux Back Up an Installation on Linux Restore a Back Up on Linux Cluster Management Configure Clustering in McAfee CIM Troubleshooting Installation Property soae.user.dir is not set Connection to Management Console Fails from Another Computer McAfee CIM Cannot Connect to the MySQL Server August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 5

6 McAfee Cloud Identity Manager Installation Guide August Order Number: US

7 Introduction to McAfee Cloud Identity Manager 1.0 Introduction to McAfee Cloud Identity Manager McAfee Cloud Identity Manager (McAfee CIM) simplifies the management and secures the use of cloud, Software as a Service (SaaS), and web applications for companies and large organizations. Service and application providers can also use McAfee CIM to simplify and improve the authentication process for their customers. McAfee CIM provides support for the following features: Extensible Framework Web Single Sign On (SSO) Multiple Authentication Methods Credential Mapping and User Provisioning Authorization Policies and Access Control Enforcement Event Auditing and Monitoring Connectors for Popular Cloud Services and Applications Web-based Management Console McAfee CIM runs as a stand-alone server and is configured by an administrator using a web-based Management Console accessible from a web browser. For information about installing McAfee CIM as a stand-alone server or as a cluster of servers, see the McAfee Cloud Identity Manager Installation Guide. For information about configuring McAfee CIM in the Management Console, see the McAfee Cloud Identity Manager Administrator s Guide. McAfee CIM provides connectors for many popular cloud services and applications, including Google Apps* and Salesforce.com*. These connectors are built in to McAfee CIM and simplify the deployment of the cloud service or application in an organization. Web SSO requires configuration in the Management Console and in the cloud application s user interface. Instructions for configuring SSO on the cloud application side are included in the documentation set. For customers who have Java*-based or.net* web applications that do not support SAML2 authentication, McAfee CIM provides a custom connector. For information on integrating Java-based and.net web applications with McAfee CIM, see the McAfee Cloud Identity Manager Integration Guide. For software developers who want to write their own cloud service connectors or authentication modules, McAfee CIM provides an SDK. For more information about the SDK, see the McAfee Cloud Identity Manager Developer s Guide. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 7

8 Introduction to McAfee Cloud Identity Manager 1.1 Supported Environments McAfee CIM supports the following environments: Version Architecture IA-32 Intel 64 Linux* OS Red Hat* Enterprise Linux* Server and Advanced Platform 5.0 Windows* OS yes yes Windows Server 2003 Standard Edition* yes yes Windows Server 2003 DataCenter Edition* yes yes Windows Server 2003 Enterprise Edition* yes yes Windows Server 2008* yes yes 1.2 Supported Browsers McAfee CIM provides two types of browser support: Application Portal For end users who seek access to SaaS and web applications through a portal using McAfee CIM identity services, McAfee CIM supports the following desktop and mobile web browsers. Note that McAfee CIM services are running in the background and are not visible to the end user: Desktop browsers Chrome* 16 Firefox* 9 Internet Explorer* 7, 8 and 9 Safari* Mobile browsers Android* 2.0 devices and WebKit* browser ios* devices and Safari browser Management Console The McAfee CIM Management Console is a web-based user interface that provides administrators with a single, central point of management and control through a web browser on a local computer. For Management Console administrators, McAfee CIM supports the following desktop and mobile web browsers: Desktop browsers Firefox 9 Internet Explorer 7, 8 and 9 Mobile browsers None are currently supported. McAfee Cloud Identity Manager Installation Guide August Order Number: US

9 Introduction to McAfee Cloud Identity Manager 1.3 Available Documentation The McAfee CIM documentation set includes the following guides: McAfee Cloud Identity Manager Administrator s Guide The Administrator s Guide is a complete guide to the Management Console and covers the configuration tasks needed to administer McAfee CIM. McAfee Cloud Identity Manager Developer s Guide The Developer s Guide provides information for software developers who want to write custom Java code that extends McAfee CIM functionality. McAfee Cloud Identity Manager Installation Guide The Installation Guide includes the tasks and procedures that you need to install and uninstall McAfee CIM as a stand-alone server on Microsoft Windows and Linux operating system platforms. The guide also includes how to start and stop the McAfee CIM service after it is installed. McAfee Cloud Identity Manager Integration Guide The Integration Guide provides instructions on how to integrate Java-based and.net* web applications that do not support SAML2 authentication with McAfee CIM. Note: In addition to these guides, there are separate guides that document how to configure the different Cloud Connectors. For more information, see the McAfee Cloud Identity Manager Administrator s Guide. 1.4 Technical Support 1.5 For technical assistance, contact McAfee Technical Support by one of the following options: Phone number: Support portal: August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 9

10 Introduction to McAfee Cloud Identity Manager McAfee Cloud Identity Manager Installation Guide August Order Number: US

11 Getting Started 2.0 Getting Started The McAfee Cloud Identity Manager-SSO (McAfee CIM) installation package, which includes Java* Runtime Environment (JRE)* Update 22, is available in the following formats: 32-bit Windows with JVM* 64-bit Windows with JVM 32-bit Linux with JVM 64-bit Linux with JVM Although McAfee CIM is installed with JVM, you can use your own JRE. For information on how to configure the environment for your JRE, see section 2.8 Using Your Own JRE. This guide includes all topics and tasks that you need to get started using the McAfee CIM service on Microsoft Windows and Linux operating system platforms: Setting up a MySQL* database or system file See section 2.1 Setting Up a MySQL Database or System File. Installing McAfee CIM as a Windows or Linux service See section 2.2 Installing McAfee CIM as a Service. Administrative Privileges See section 2.3 Administrative Privileges. Upgrade options See section 2.4 Upgrade Options. Backing up and restoring an installation See sections 3.4 Backing Up and Restoring an Installation on Windows and 4.4 Backing Up and Restoring an Installation on Linux. Installing, uninstalling, starting, and stopping the McAfee CIM service on Windows See section 3.0 Installation Procedures on Windows. Installing, uninstalling, starting, and stopping the McAfee CIM service on Linux See section 4.0 Installation Procedures on Linux. Accessing the Management Console See section 2.5 Access the McAfee CIM Management Console. Replacing the default SSL server certificate with your own See section 2.6 Replace the Default SSL Server Certificate with Your Own. Locating and modifying an existing key store alias See section 2.7 Locate and Modify an Existing Keystore Alias. Using Your Own JRE (Optional) See section 2.8 Using Your Own JRE. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 11

12 Getting Started 2.1 Setting Up a MySQL Database or System File McAfee CIM stores runtime data, such as user information and the auditing log, in a system file or a MySQL database. Storing runtime data in a system file is the default option. Storing runtime data in a MySQL database is the recommended option. You can configure the File or Database setting in the installation wizard or on the Admin tab in the Management Console. For more information about the Management Console, see the McAfee Cloud Identity Manager Administrator s Guide. To download the MySQL database, visit where you can also find installation instructions. The database can be installed on the same server as McAfee CIM or on a separate server. To improve performance when system load is high, install the database on a separate server. During installation of the MySQL database, you create a root account with a password. Make a note of the root password, because you need it when installing McAfee CIM later. After the MySQL database is installed, create a new database for McAfee CIM in MySQL. To create a database named eca360db, open the MySQL client and run the following SQL command: mysql> create database eca360db; If database creation is successful, a message like the following is displayed: Query OK, 1 row affected (0.00 sec) You do not need to create any tables inside eca360db. When McAfee CIM is installed, it automatically creates all the required tables for you. McAfee Cloud Identity Manager Installation Guide August Order Number: US

13 Getting Started 2.2 Installing McAfee CIM as a Service Note: In the installation wizard, you can install McAfee CIM to run as a local service on a Windows or Linux operating system. When McAfee CIM is installed as a service, the operating system automatically starts the McAfee CIM service when the system starts and restarts the McAfee CIM service when it fails because of an error. To minimize down time due to errors, we recommend that you install McAfee CIM as a service. Installing McAfee CIM as a service requires administrative privileges. When installed as a Windows service, McAfee CIM can still be started and stopped manually through the Windows Start menu or by navigating to Services through the Control Panel and locating the McAfee CIM service: Windows Server 2003 and 2008 Control Panel\Administrator Tools\Services Windows Server 2008 R2 Control Panel\System and Security\Administrator Tools\Services There, you can start and stop the service or view the Properties dialog through the context menu and modify the default settings. For example, you can modify the following default values: The Startup type on the General tab is set to Automatic by default. The recovery actions on the Recovery tab are set to Restart the Service by default. Restart service after on the Recovery tab is set to 0 minutes by default. For more information about manually starting and stopping the McAfee CIM service, see the following sections: Windows See section 3.2 Start and Stop McAfee CIM on Windows. Linux See section 4.2 Start and Stop McAfee CIM on Linux. After installing McAfee CIM as a service, you still need to start the service the first time. You can do this by restarting the operating system, which automatically starts the service, or by manually starting the service as described above. Thereafter, the McAfee CIM service is automatically started and restarted and under normal conditions, does not need to be manually started again. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 13

14 Getting Started 2.3 Administrative Privileges The following installation options require administrative privileges: The program installation and user configuration folders are system folders. McAfee CIM is installed as a service. When you select the typical installation option, McAfee CIM is installed on Windows or Linux with a default configuration that includes the following system folders and requires administrative privileges. Default Windows installation folders Program installation: %PROGRAMFILES%\McAfee\CIM\SSO User configuration: %USERPROFILE%\CIM-SSO Default Linux installation folders Program installation: /opt/mcafee/cim/sso User configuration: /opt/mcafee/cim/sso/userdir When administrative privileges are required, you must install, uninstall, start and stop McAfee CIM from the built-in Windows administrator or Linux superuser (root) account. Alternately, on Windows, you can right-click the program and select Run as administrator from the context menu. We recommend that you install McAfee CIM from the administrator s account on Windows and Linux systems. When installing McAfee CIM for evaluation, however, you can select the custom installation option and configure installation folders that do not require administrative privileges. In this case, you can install, uninstall, start, and stop McAfee CIM without administrative privileges. McAfee Cloud Identity Manager Installation Guide August Order Number: US

15 Getting Started 2.4 Upgrade Options When you uninstall an older version of McAfee CIM and install a newer version, you lose all system configuration information. To avoid having to reconfigure your system when you have an older version of McAfee CIM installed and you want to install a newer version, you have the following options: Upgrade Option You can upgrade the older McAfee CIM version to the newer version in the installation wizard. Windows: The Upgrade option is located on the Choose Setup Type step of the installation wizard. Selecting this option adds no complexity to the installation process and is recommended, when available. Linux: To upgrade McAfee CIM, select the Custom installation option in the installation wizard and specify the same program installation and user configuration folders that the existing version uses. Export-Import Option You can export the existing system configuration in the Management Console, uninstall the older version of McAfee CIM, install the newer version of McAfee CIM, and then import the saved system configuration in the Management Console. Note: While the Export-Import advanced configuration option allows you to save and restore the system configuration, it does not save runtime data, such as log files, certificates, and administrator account information, as the back-up and restore utilities do. For more information about these utilities, see sections 3.4 Backing Up and Restoring an Installation on Windows and 4.4 Backing Up and Restoring an Installation on Linux. For more information about the Export-Import option in the Management Console, see the McAfee Cloud Identity Manager Administrator s Guide Upgrade Considerations When upgrading McAfee CIM from an older version to a newer version, please take into account the following important considerations: Upgrading from an McAfee CIM version to a McAfee CIM version The name of the installation directory must stay the same. Upgrading McAfee CIM from v2.5 to v3.0 or greater Before upgrading McAfee CIM from v2.5 to v3.0 or greater, verify that the McAfee Provisioning service is stopped. If the service is running during the upgrade, then McAfee CIM fails to start after the upgrade is complete. Upgrading your custom portal configuration The Upgrade does not include your custom portal configuration. After upgrading, merge your custom login, error, and portal pages with the new version of McAfee CIM Upgrading Clusters Note: There are two ways to upgrade a cluster of McAfee CIM instances: Online upgrade The online upgrade option is only available when upgrading from v2.1 to v2.5 or from v3.1 to v3.2 or greater. To upgrade a cluster online, you upgrade one instance in the cluster while all other instances in the cluster are running. Note: To upgrade a cluster from v2.1 to v3.0 or from v3.0 to v3.1, use the offline upgrade option. Offline upgrade To upgrade a cluster from v2.1 to v3.0 or from v3.0 to v3.1, use the offline upgrade option. When you upgrade a cluster offline, you stop the McAfee CIM service on each node and upgrade each node individually. For more information about managing clusters, see section 5.0 Cluster Management. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 15

16 Getting Started 2.5 Access the McAfee CIM Management Console After starting the McAfee CIM service, you can access the Management Console through a web browser. For a list of supported browsers, see section 1.2 Supported Browsers. When you access the Management Console in your web browser, McAfee CIM saves the host name or IP address that you enter and uses it to generate all McAfee CIM service URLs. So that users on other machines can access McAfee CIM services, we strongly recommend that you take the following steps: 1. Install McAfee CIM on a machine that has a fully qualified domain name (FQDN). 2. Specify the FQDN in the Management Console. Note: Without the FQDN, McAfee CIM uses a local name for the installation machine when generating the service URLs, and users on other machines may not be able to access McAfee CIM services. By specifying the FQDN, you ensure that users on other machines can access McAfee CIM services. For information about configuring the FQDN in the Management Console, see the McAfee Cloud Identity Manager Administrator s Guide. To access the McAfee CIM Management Console 1. Copy and paste the following URL in your web browser: <e360sso-server> Specifies the name of the server on which McAfee CIM is installed. <port_number> Specifies the port number used by McAfee CIM. Default: 8443 The McAfee CIM Login dialog opens. 2. Type the following initial values in the fields on the Login dialog, and click Login. User Name: admin Password: passwd You are logged in to the McAfee CIM Management Console, where you can modify the initial administrator password and create other users. McAfee Cloud Identity Manager Installation Guide August Order Number: US

17 Getting Started 2.6 Replace the Default SSL Server Certificate with Your Own In this procedure, you replace the default self-signed certificate installed with McAfee CIM with a valid certificate signed by a Certificate Authority (CA). McAfee CIM uses an encrypted Java keystore to store the default certificate and provides a command line tool that allows you to replace the default with your own certificate from a PKCS 12 or JKS keystore. Alternately, you can import your own certificate in the installation wizard. Note: PKCS is an acronym for the Public Key Cryptography Standards published by RSA Laboratories. PKCS 12 defines a file format for storing X.509 private keys paired with public key certificates. JKS is an acronym for Java Key Store. JKS files, which also store X.509 certificates and private keys, are used by Java-based applications. If the alias corresponding to your key pair is the hash value of a public key instead of a name, you must locate and modify the alias in the keystore using Java keytool commands. For more information, see section 2.7 Locate and Modify an Existing Keystore Alias. To replace the default SSL server certificate with your own 1. Prepare a PKCS 12 or JKS keystore (with.p12 or.pfx filename extension) which includes the SSL certificate. You can use OpenSSL to generate a self-signed certificate, or you can use a certificate signed by a trusted certificate authority (CA). 2. Open a command window, and change to the following directory: <install_dir>\current\bin <install_dir> Specifies the name of the program installation directory. 3. Run the following Java program: java -jar ReplaceSSLCert.jar -keystore <keystore_filename> -storetype < pkcs12 jks > -storepass <keystore_password> -keypass <certificate_password> -alias <certificate_alias> -keystore <keystore_filename> Specifies the name of the file that holds the keystore. -storetype < pkcs12 jks > Specifies whether the keystore file format is PKCS 12 or JKS. -storepass <keystore_password> Specifies the password assigned to the keystore. -keypass <certificate_password> Specifies the password assigned to the key pair. -alias <certificate_alias> Specifies the name assigned to the key pair when it was created. 4. Restart McAfee CIM. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 17

18 Getting Started 5. To view the certificate, open the Management Console in a web browser. Note: Viewing details depend on the browser. A Firefox example is included here. Firefox example: a. Click the blue area which is outlined in red on the preceding screen shot. The You are connected to... dialog opens. b. Click More Information... The Page Info dialog opens. c. On the Security tab, click View Certificate. The Certificate Viewer dialog opens on the General tab, where information about the default SSL certificate is displayed. McAfee Cloud Identity Manager Installation Guide August Order Number: US

19 Getting Started 2.7 Locate and Modify an Existing Keystore Alias Each key pair in a keystore is identified by a unique alias. If the alias corresponding to your key pair is the hash value of a public key instead of a name, you must locate and modify the alias in the keystore using the following Java keytool commands. 1. To locate the alias of your key pair in the keystore file, run the following command: keytool -list -keystore <keystore_filename> -storetype < pkcs12 jks > -keystore <keystore_filename> Specifies the name of the file that holds the keystore. -storetype < pkcs12 jks > Specifies whether the keystore file format is PKCS 12 or JKS. Note: When the alias is a hash value instead of a name, it is represented by an index number in the output generated by the -list command. 2. To modify the alias of your key pair in the keystone file, run the following command: keytool -changealias -keystore <keystore_filename> -storetype < pkcs12 jks > -alias <index_number> -destalias <alias_name> -keystore <keystore_filename> Specifies the name of the file that holds the keystore. -storetype < pkcs12 jks > Specifies whether the keystore file format is PKCS 12 or JKS. -alias <index_number> Specifies the index number of the alias you want to modify. -destalias <alias_name> Specifies a destination alias or new name for the alias you want to modify. When you replace the default SSL server certificate with your own, you can now reference your key pair with an alias name rather than a hash value. For more information, see section 2.6 Replace the Default SSL Server Certificate with Your Own. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 19

20 Getting Started 2.8 Using Your Own JRE Before installing McAfee CIM and using your own JRE, verify that the following requirements are met: 1. The Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy is applied to your JRE. Note: Note: Note: To securely use your JRE with McAfee CIM, download and install Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Files 6. To download the JCE policy files, visit: html For instructions on how to install the JAR files, see the README.txt file that is included in the download. 2. The environment variables are set on your Windows or Linux operating system platform. For more information, see the following sections: Windows See section Configure a Windows Environment for Your JRE. Linux See section Configure a Linux Environment for Your JRE. We recommend that you save a backup copy of your current environment files before altering the path settings. 3. Your JDK is Update 22 or above. The JAVA_HOME environment variable points to the directory where the correct, supported version of Java is installed. McAfee CIM requires Oracle JDK Update 22 or above. If needed, install the JDK now. To download the JDK, visit: McAfee CIM comes installed with JVM. Therefore, you do not need to download the JDK or use your own JRE. Using your own JRE and configuring a Windows or Linux environment for your JRE are optional. McAfee Cloud Identity Manager Installation Guide August Order Number: US

21 Getting Started Configure a Windows Environment for Your JRE To use your own JRE, set the Windows environment variables and test the settings. To configure a Windows environment for your JRE 1. Go to Start > My Computer > Properties > Advanced > Environment Variables. 2. Add the following new system environment variables: JAVA_HOME Specifies the installation directory of the JDK on your computer. Example: %PROGRAMFILES%\Java\jdk1.6.0_22 Note: JDK is an acronym for Java Development Kit. JRE_HOME Specifies the installation directory of the JRE on your computer. Value: %JAVA_HOME%\jre Note: JRE is an acronym for Java Runtime Environment. 3. Update the following system environment variables: PATH Specifies a semicolon-separated list of paths to search when locating executable files. Add the following value to the PATH variable s list. Value: %JAVA_HOME%\bin CLASSPATH Specifies a semicolon-separated list of paths to search when locating classes that are not Java extensions or part of the Java platform. Add the following value to the CLASSPATH variable s list. Value: %JAVA_HOME%\lib 4. To test your Java settings, open a new command window, and run the following command at the prompt: C:\>java -version If the Java settings are correct, a message like the following is displayed: java version "1.6.0_22" Java(TM) SE Runtime Environment (build 1.6.0_22-b02) Java HotSpot(TM) Server VM (build 1.6.0_22-b02, mixed mode) The Windows environment is configured for your JRE. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 21

22 Getting Started Configure a Linux Environment for Your JRE To use your own JRE, set the Linux environment variables and test the settings. For more information about the environment variables, see section Configure a Windows Environment for Your JRE. To configure a Linux environment for your JRE 1. Open a terminal window, and enter the following command: root@server ~ # export JAVA_HOME=<jdk_install_dir> <jdk_install_dir> Specifies the installation directory of the JDK on your computer. Example: /usr/java/jdk1.6.0_22 2. Enter the following commands: root@server ~ # export JRE_HOME=$JAVA_HOME/jre root@server ~ # export PATH=$JAVA_HOME/bin:$PATH 3. Test your java settings by executing the following command: root@server install # java -version If the Java settings are correct, a message like the following is displayed: java version "1.6.0_22" Java(TM) SE Runtime Environment (build 1.6.0_22-b01) Java HotSpot(TM) Server VM (build 14.2-b01, mixed mode) The Linux environment is configured for your JRE Before Starting McAfee CIM for the First Time If you are using your own JRE, you need to set the ECA360SSO_JAVA variable in the McAfee CIM start script file to your JAVA_HOME path. Locate and open the script file, and update the ECA360SSO_JAVA variable setting to equal your JAVA_PATH. The script files are located and named as follows: Windows: <install_dir>\current\bin\essoenv.cmd Linux: <install_dir>/current/bin/essoenv.sh <install_dir> Specifies the name of the program installation directory. McAfee Cloud Identity Manager Installation Guide August Order Number: US

23 Installation Procedures on Windows 3.0 Installation Procedures on Windows This chapter includes procedures related to installing and uninstalling McAfee CIM on a Windows operating system: Install McAfee CIM on a Windows system See section 3.1 Install McAfee CIM on Windows. Start and Stop McAfee CIM on a Windows system See section 3.2 Start and Stop McAfee CIM on Windows. Uninstall McAfee CIM on a Windows system See section 3.3 Uninstall McAfee CIM on Windows. Back up and restore an McAfee CIM installation on a Windows system See section 3.4 Backing Up and Restoring an Installation on Windows. 3.1 Install McAfee CIM on Windows Note: The installation package includes all McAfee CIM services: Identity and Single Sign-on (SSO) service Provisioning service Built-in OTP server If administrative privileges are required, you must either log in to the Windows built-in administrator account or run the McAfee CIM installer as administrator. For more information, see section 2.3 Administrative Privileges. To install McAfee CIM on Windows 1. Download one of the following installers to a download directory, and start the installer: 32-bit Windows: cim_win32_3.1.exe 64-bit Windows: cim_win64_3.1.exe Note: CIM is an acronym for Cloud Identity Manager. The installation wizard opens on the License Agreement step. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 23

24 Installation Procedures on Windows Figure 1. License Agreement 2. Read the license agreement, select I accept the terms of the License Agreement, and click Next. The Choose Setup Type step opens. McAfee Cloud Identity Manager Installation Guide August Order Number: US

25 Installation Procedures on Windows Figure 2. Choose Setup Type 3. Choose Setup Type Select one of the following options, and click Next: Upgrade An existing McAfee CIM installation is upgraded to the new version being installed, and the system configuration of the older version is retained and automatically upgraded also. An Upgrade is recommended for users who want to install a newer version without having to reconfigure the system. McAfee CIM is upgraded from the existing version to the new version, and the system configuration is saved. Note: For more information about the upgrade option on Windows, see section Install McAfee CIM on Windows Upgrade Option. Typical McAfee CIM is installed with a default configuration. A Typical installation is recommended for most users. The Configure SSL Server Certificate step opens. Note: For more information about a Typical installation, see section Install McAfee CIM on Windows Typical Installation Option. Custom McAfee CIM is installed with a custom configuration. The Custom installation option allows you to customize the installation directory, user configuration directory, license file, storage type (file or MySQL database), Java path, web port, and JMX* port. A Custom installation is recommended for advanced users. The Choose Program Installation Folder step opens. Note: For more information about a Custom installation, see section Install McAfee CIM on Windows Custom Installation Option. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 25

26 Installation Procedures on Windows Install McAfee CIM on Windows Upgrade Option Note: An upgrade retains the system configuration of the existing installation of McAfee CIM. Therefore, in the installation wizard, the upgrade option only consists of a few steps: 1. License Agreement 2. Choose Setup Type 3. Install as Service 4. Installation Summary 5. Installing Installation Complete For more information about upgrading McAfee CIM, see section 2.4 Upgrade Options Install McAfee CIM on Windows Typical Installation Option A typical installation of McAfee CIM on Windows involves the following steps: 1. License Agreement 2. Choose Setup Type 3. Configure SSL Server Certificate 4. Install as Service 5. Installation Summary 6. Installing Installation Complete In this procedure, you have the option of importing your own SSL server X.509 certificate key pair. If you do not import your own SSL certificate in the installation wizard, you can import it later using a command line tool. For more information, see section 2.6 Replace the Default SSL Server Certificate with Your Own. You then review the installation summary and install McAfee CIM. For more information about steps 1 and 2, see section 3.1 Install McAfee CIM on Windows. McAfee Cloud Identity Manager Installation Guide August Order Number: US

27 Installation Procedures on Windows Figure 3. Configure SSL Server Certificate To install McAfee CIM on Windows Typical installation option 1. (Optional) To import an SSL server X.509 certificate key pair: a. Select the Import SSL Server X.509 KeyPair check box. b. Click Browse... to locate the KeyStore File on your computer. c. Type the password assigned to the keystore in the KeyStore Passphrase field, and click Read. The keystore file is read, and all key pair entries in the file are listed on the KeyPair Alias drop-down menu. d. Select the alias from the KeyPair Alias drop-down menu corresponding to the X.509 certificate that you want to import. The alias is the name assigned to the key pair when it was created. In the Management Console, the alias is used to reference the key pair. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 27

28 Installation Procedures on Windows e. Type the password assigned to the selected key pair in the KeyPair Passphrase field, and click View... The SSL Certificate Information pane opens. f. Click OK. The SSL Certificate Information pane closes. g. Click Next. The Install as Service step opens. McAfee Cloud Identity Manager Installation Guide August Order Number: US

29 Installation Procedures on Windows Figure 4. Install as Service 2. (Optional) Select the Install McAfee CIM_SSO as service check box. Note: We recommend that you install McAfee CIM as a Windows service, because Windows restarts the service when it fails, minimizing down time. 3. Click Next. The Installation Summary step opens and displays the custom installation configuration. 4. Review the installation summary, and click Install. 5. Click Done when installation is complete. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 29

30 Installation Procedures on Windows Install McAfee CIM on Windows Custom Installation Option A custom installation of McAfee CIM on Windows involves the following steps: 1. License Agreement 2. Choose Setup Type 3. Choose Program Installation Folder 4. Choose User Configuration Folder 5. Choose Storage Type 6. Configure Database 7. Configure JRE Path 8. Configure Runtime Parameters 9. Configure SSL Server Certificate 10. Install as Service 11. Installation Summary 12. Installing Installation Complete After providing custom settings in this procedure, you have the option of importing your own SSL server X.509 certificate key pair. If you do not import your own SSL certificate in the installation wizard, you can import it later using a command line tool. For more information, see section 2.6 Replace the Default SSL Server Certificate with Your Own. You then review the installation summary and install McAfee CIM. For more information about steps 1 and 2, see section 3.1 Install McAfee CIM on Windows. McAfee Cloud Identity Manager Installation Guide August Order Number: US

31 Installation Procedures on Windows Figure 5. Choose Program Installation Folder To install McAfee CIM on Windows Custom installation option 1. Choose Program Installation Folder Click Choose... to locate and select the installation directory on your computer. Optionally, click Restore Default to restore the default installation location provided by the installer. Note: The installation directory is where all McAfee CIM runtime components and global configurations are installed. Default: %PROGRAMFILES%\McAfee\CIM\SSO 2. Click Next. The Choose User Configuration Folder step opens. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 31

32 Installation Procedures on Windows Figure 6. Choose User Configuration Folder 3. Choose User Configuration Folder Click Choose... to locate and select the user configuration directory on your computer. Optionally, click Restore Default to restore the default user configuration location provided by the installer. Note: The user directory is where all user-specific configurations are installed. Default: %USERPROFILE%\CIM-SSO 4. Click Next. The Choose Storage Type step opens. McAfee Cloud Identity Manager Installation Guide August Order Number: US

33 Installation Procedures on Windows Figure 7. Choose Storage Type 5. Choose Storage Type Select where to store the runtime data, and click Next: File Select the File option to store runtime data in a system file. The Configure JRE Path step opens. MySQL Select the MySQL option to store runtime data in a MySQL database. The Configure Database step opens. Note: You can also select the data storage type in the Management Console. In the Console, select the Database Management option from the Admin tab drop-down menu. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 33

34 Installation Procedures on Windows Figure 8. Configure Database 6. (MySQL) Specify the following connection settings on the Configure Database step, and click Next to continue. DB URL Specifies the URL of the MySQL database. Default: localhost Note: If the port number of the MySQL Server has the default value of 3306, then you can omit the port number when specifying the URL. Otherwise, you must specify the port number in the URL. DB Name Specifies the name of the MySQL database. Default: eca360db DB Root Specifies the name of the root user. Default: root DB Password Specifies the password of the root user. Default: passwd The Configure JRE Path step opens. McAfee Cloud Identity Manager Installation Guide August Order Number: US

35 Installation Procedures on Windows Figure 9. Configure JRE Path 7. Configure JRE Path Select one of the following options, and click Next. Java Path Select this option when using your own JRE. Click Choose... to locate and select the Java Path on your computer. Optionally, click Restore Default to restore the default Java path provided by the installer. The Java path specifies the location of the JDK*. Default: %PROGRAMFILES%\McAfee\CIM\SSO\jre Use Embedded Java Select this option when using the JVM installed with McAfee CIM. The Configure Runtime Parameters step opens. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 35

36 Installation Procedures on Windows Figure 10. Configure Runtime Parameters 8. Configure Runtime Parameters Provide values for the following fields, or accept the default values, and click Next. Web Port Specifies the port number of the McAfee CIM HTTP server. Default: 8443 JMX Port Specifies the Java management port number. Default: 9999 Provisioning Service Port Specifies the port number of the McAfee Provisioning service. Default: 8080 Provisioning Database Port Specifies the port number of the McAfee Provisioning database. Default: 3105 OTP Service Port Specifies the port number of the McAfee CIM OTP service. Default: 3100 Note: This port number is used by the OTP client to request and verify onetime passwords. The Configure SSL Server Certificate step opens. McAfee Cloud Identity Manager Installation Guide August Order Number: US

37 Installation Procedures on Windows Figure 11. Configure SSL Server Certificate 9. (Optional) To import an SSL server X.509 certificate key pair: a. Select the Import SSL Server X.509 KeyPair check box. b. Click Browse... to locate the KeyStore File on your computer. c. Type the password assigned to the keystore in the KeyStore Passphrase field, and click Read. The keystore file is read, and all key pair entries in the file are listed on the KeyPair Alias drop-down menu. d. Select the alias from the KeyPair Alias drop-down menu corresponding to the X.509 certificate that you want to import. The alias is the name assigned to the key pair when it was created. In the Management Console, the alias is used to reference the key pair. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 37

38 Installation Procedures on Windows e. Type the password assigned to the selected key pair in the KeyPair Passphrase field, and click View... The SSL Certificate Information pane opens. f. Click OK. The SSL Certificate Information pane closes. g. Click Next. The Install as Service step opens. McAfee Cloud Identity Manager Installation Guide August Order Number: US

39 Installation Procedures on Windows Figure 12. Install as Service 10. (Optional) Select the Install McAfee CIM-SSO as service check box. Note: We recommend that you install McAfee CIM as a Windows service, because Windows restarts the service when it fails, minimizing down time. 11. Click Next. The Installation Summary step opens and displays the custom installation configuration. 12. Review the installation summary, and click Install. 13. Click Done when installation is complete. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 39

40 Installation Procedures on Windows 3.2 Start and Stop McAfee CIM on Windows Before you start or stop the McAfee CIM service, review the following notes: If administrative privileges are required, you must either log in to the Windows built-in administrator account or start and stop McAfee CIM as administrator. For more information, see section 2.3 Administrative Privileges. If you are using your own JRE and starting the McAfee CIM service for the first time, update the McAfee CIM start script file to use your JAVA_HOME setting. For instructions, see section Before Starting McAfee CIM for the First Time. After you start the McAfee CIM service, you can open the Management Console. To start and stop McAfee CIM on Windows 1. Go to Start > All Programs > McAfee > CIM > SSO. 2. To start the McAfee CIM service, click Start Service. The McAfee CIM service starts. Note: Alternately, you can enter the following command in the command prompt: <install_dir>\current\bin\eca360sso.cmd start <install_dir> Specifies the name of the program installation directory. 3. To stop the McAfee CIM service, click Stop Service. The McAfee CIM service stops. Note: Alternately, you can enter the following command in the command prompt: <install_dir>\current\bin\eca360sso.cmd stop <install_dir> Specifies the name of the program installation directory. McAfee Cloud Identity Manager Installation Guide August Order Number: US

41 Installation Procedures on Windows 3.3 Uninstall McAfee CIM on Windows Before you uninstall the McAfee CIM service, review the following notes: If administrative privileges are required, you must either log in to the Windows built-in administrator account or uninstall McAfee CIM as administrator. For more information, see section 2.3 Administrative Privileges. The uninstall procedure assumes that McAfee CIM is installed on Microsoft Windows as detailed in this chapter. Before uninstalling McAfee CIM, stop the McAfee CIM service, or verify that the service is stopped. To uninstall McAfee CIM on Windows 1. Go to Start > All Programs > McAfee > CIM > SSO. 2. To uninstall the McAfee CIM service, click Uninstall McAfee Cloud Identity Manager. The McAfee CIM uninstaller wizard opens. 3. Click Next. The Uninstall Options step opens. 4. Select one of the following Uninstall options, and click Next: Complete Uninstall Selecting this option removes all features of McAfee CIM that were installed by InstallAnywhere. This option does not remove folders and files created after installation. The Remove All User Data step opens. Uninstall Specific Features Selecting this option allows you to specify which features of McAfee CIM are uninstalled. The Choose Product Features step opens. 5. (Uninstall Specific Features) To confirm that you want to uninstall McAfee CIM, clear the Application check box, and click Next. The Remove All User Data step opens. 6. Select or clear the Remove license file and user configuration file check box, and click Uninstall. All McAfee CIM features or specified features are uninstalled, and the Uninstall Complete step opens. 7. Click Done. The uninstallation wizard closes. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 41

42 Installation Procedures on Windows 3.4 Backing Up and Restoring an Installation on Windows We recommend that you back up the current installation before upgrading to a new version of McAfee CIM. The back-up utility saves the McAfee CIM software and all user configuration and runtime data. In the event that data is lost, it can be restored from the back up. For more information, see the following sections: Back Up an Installation on Windows See section Back Up an Installation on Windows. Restore a Back Up on Windows See section Restore a Back Up on Windows Back Up an Installation on Windows Note: To back up the current installation on Windows, follow the steps in this procedure. The Windows back-up utility is supported for McAfee CIM versions 2.1 and greater. To back up an installation on Windows 1. Log in to Windows as administrator. 2. Stop the McAfee CIM service. 3. Open a command window, and change to the following directory: <install_dir> <install_dir> Specifies the name of the program installation directory. 4. Run the Windows back-up command: current\bin\eca360sso backup -o <backup_dir> <backup_dir> Specifies the user-defined directory where the back up is saved. The installation is saved in the following directory: <backup_dir>\eca_backup-<date&timestamp> <date&timestamp> Specifies the date and time that the installation was backed up in the following format: yyyy-mm-dd.hh.mm. McAfee Cloud Identity Manager Installation Guide August Order Number: US

43 Installation Procedures on Windows Restore a Back Up on Windows Note: To restore an installation from a back up on Windows, follow the steps in this procedure. The Windows restore utility is supported for McAfee CIM versions 2.1 and greater. To restore a back up on Windows 1. Log in to Windows as administrator. 2. Stop the McAfee CIM service. 3. Open a command window, and change to the following directory: <backup_dir>\eca_backup-<date&timestamp> <backup_dir> Specifies the user-defined directory where the back up is located. 4. Verify that the back-up directory includes the following files:.masterdir.userdir cli.jar ECA-backup-masterdir.tgz ECA-backup-userdir.tgz restore.cmd 5. Type the Windows restore command at the command prompt: restore.cmd The installation is restored from the back-up directory. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 43

44 Installation Procedures on Windows McAfee Cloud Identity Manager Installation Guide August Order Number: US

45 Installation Procedures on Linux 4.0 Installation Procedures on Linux This chapter includes procedures related to installing and uninstalling McAfee CIM on a Linux operating system: Install McAfee CIM on a Linux system See section 4.1 Install McAfee CIM on Linux. Start and Stop McAfee CIM on a Linux system See section 4.2 Start and Stop McAfee CIM on Linux. Uninstall McAfee CIM on a Linux system See section 4.3 Uninstall McAfee CIM on Linux. Back up and restore an McAfee CIM installation on a Linux system See section 4.4 Backing Up and Restoring an Installation on Linux. 4.1 Install McAfee CIM on Linux The installation package includes all McAfee CIM services: Identity and Single Sign-on (SSO) service Provisioning service Built-in OTP server Note: If you are using an X Window System* or X11*, the installer runs in GUI mode by default. Otherwise, the installer runs in console mode. To force a start in console mode, use the following command: 32-bit Linux:./cim_linux32_3.1.bin i console 64-bit Linux:./cim_linux64_3.1.bin i console If administrative privileges are required, you must install McAfee CIM as superuser (root). For more information, see section 2.3 Administrative Privileges. To install McAfee CIM on Linux 1. Download one of the following installers to a download directory: 32-bit Linux: cim_linux32_3.1.bin 64-bit Linux: cim_linux64_3.1.bin Note: CIM is an acronym for Cloud Identity Manager. 2. Start the installer by entering one of the following commands: 32-bit Linux: root@server <download_dir> #./cim_linux32_3.1.bin 64-bit Linux: root@server <download_dir> #./cim_linux64_3.1.bin <download_dir> Specifies the name of the download directory. The installation wizard opens on the License Agreement step. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 45

46 Installation Procedures on Linux Note: 3. Read the terms of the license agreement, select I accept the terms in the License Agreement, and click Next. The Choose Setup Type step opens. 4. Choose Setup Type Select one of the following options, and click Next: Typical McAfee CIM is installed with a default configuration. A Typical installation is recommended for most users. The Configure SSL Server Certificate step opens. Note: For more information about a Typical installation on Linux, see section Install McAfee CIM on Linux Typical Installation Option. Custom McAfee CIM is installed with a custom configuration. The Custom installation option allows you to customize the installation directory, user configuration directory, license file, storage type (file or MySQL database), Java path, web port, and JMX port. A Custom installation is recommended for advanced users. The Choose Program Installation Folder step opens. Note: For more information about a Custom installation on Linux, see section Install McAfee CIM on Linux Custom Installation Option. You can upgrade McAfee CIM from version 2.0 or greater by selecting the Custom installation option in the installation wizard and specifying the same program installation and user configuration folders that the existing version uses Install McAfee CIM on Linux Typical Installation Option A typical installation of McAfee CIM on Linux involves the following steps: 1. License Agreement 2. Choose Setup Type 3. Configure SSL Server Certificate 4. Install as Service 5. Installation Summary 6. Installing Installation Complete In this procedure, you have the option of importing your own SSL server X.509 certificate key pair. You then review the installation summary and install McAfee CIM. For more information about steps 1 and 2, see section 4.1 Install McAfee CIM on Linux. McAfee Cloud Identity Manager Installation Guide August Order Number: US

47 Installation Procedures on Linux To install McAfee CIM on Linux Typical installation option 1. (Optional) To import an SSL server X.509 certificate key pair: a. Select the Import SSL Server X.509 KeyPair check box. b. Click Browse... to locate the KeyStore File on your computer. c. Type the password assigned to the keystore in the KeyStore Passphrase field, and click Read. The keystore file is read, and all key pair entries in the file are listed on the KeyPair Alias drop-down menu. d. Select the alias from the KeyPair Alias drop-down menu corresponding to the X.509 certificate that you want to import. The alias is the name assigned to the key pair when it was created. In the Management Console, the alias is used to reference the key pair. e. Type the password assigned to the selected key pair in the KeyPair Passphrase field, and click View... The SSL Certificate Information pane opens. f. Click OK. The SSL Certificate Information pane closes. g. Click Next. The Install as Service step opens. 2. (Optional) Select the Install McAfee CIM_SSO as service check box. Note: We recommend that you install McAfee CIM as a Linux service, because Linux restarts the service when it fails, minimizing down time. 3. Click Next. The Installation Summary step opens and displays the custom installation configuration. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 47

48 Installation Procedures on Linux 4. Review the installation summary, and click Install. 5. Click Done when installation is complete Install McAfee CIM on Linux Custom Installation Option A custom installation of McAfee CIM on Linux involves the following steps: 1. License Agreement 2. Choose Setup Type 3. Choose Program Installation Folder 4. Choose User Configuration Folder 5. Choose Storage Type 6. Configure Database 7. Configure JRE Path 8. Configure Runtime Parameters 9. Configure SSL Server Certificate 10. Install as Service 11. Installation Summary 12. Installing Installation Complete After providing custom settings in this procedure, you have the option of importing your own SSL server X.509 certificate key pair. If you do not import your own SSL certificate in the installation wizard, you can import it later using a command line tool. For more information, see section 2.6 Replace the Default SSL Server Certificate with Your Own. Note: You then review the installation summary and install McAfee CIM. For more information about steps 1 and 2, see section 4.1 Install McAfee CIM on Linux. To upgrade from the existing version of McAfee CIM on Linux to the new version, specify the same program installation and user configuration folders that the existing version uses in the custom installation. To install McAfee CIM on Linux Custom installation option 1. Choose Program Installation Folder Click Choose... to locate and select the installation directory on your computer. Optionally, click Restore Default to restore the default installation location provided by the installer. Note: The installation directory is where all McAfee CIM runtime components and global configurations are installed. Default: /opt/mcafee/cim/sso 2. Click Next. The Choose User Configuration Folder step opens. 3. Choose User Configuration Folder Click Choose... to locate and select the user configuration directory on your computer. Optionally, click Restore Default to restore the default user configuration location provided by the installer. Note: The user directory is where all user-specific configurations are installed. Default: /opt/mcafee/cim/sso/userdir 4. Click Next. The Choose Storage Type step opens. McAfee Cloud Identity Manager Installation Guide August Order Number: US

49 Installation Procedures on Linux 5. Choose Storage Type Select where to store the runtime data, and click Next: File Select the File option to store runtime data in a system file. The Configure JRE Path step opens. MySQL Select the MySQL option to store runtime data in a MySQL database. The Configure Database step opens. Note: You can also select the data storage type in the Management Console. In the Console, select the Database Management option from the Admin tab drop-down menu. 6. (MySQL) Specify the following connection settings on the Database Configuration step, and click Next. DB URL Specifies the URL of the MySQL database. Default: localhost Note: If the port number of the MySQL Server has the default value of 3306, then you can omit the port number when specifying the URL. Otherwise, you must specify the port number in the URL. DB Name Specifies the name of the MySQL database. Default: eca360db DB Root Specifies the name of the root user. Default: root DB Password Specifies the password of the root user. Default: passwd The Configure JRE Path step opens. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 49

50 Installation Procedures on Linux 7. Configure JRE Path Select one of the following options, and click Next. Java Path Select this option when using your own JRE. Click Choose... to locate and select the Java Path on your computer. Optionally, click Restore Default to restore the default Java path provided by the installer. The Java path specifies the location of the JDK. Default: /opt/mcafee/cim/sso/jre Use Embedded Java Select this option when using the JVM installed with McAfee CIM. The Configure Runtime Parameters step opens. 8. Configure Runtime Parameters Specify values for the following runtime parameters, or accept the default values, and click Next. Web Port Specifies the port number of the McAfee CIM HTTP server. Default: 8443 Note: If you do not install McAfee CIM as superuser (root), then you must specify a value for the Web Port that is greater than Otherwise, the McAfee CIM service does not start. This limit is a known restriction on Linux. JMX Port Specifies the Java management port number. Default: 9999 Provisioning Service Port Specifies the port number of the McAfee Provisioning service. Default: 8080 Provisioning Database Port Specifies the port number of the McAfee Provisioning database. Default: 3105 OTP Service Port Specifies the port number of the McAfee CIM OTP service. Default: 3100 Note: This port number is used by the OTP client to request and verify onetime passwords. The Configure SSL Server Certificate step opens. McAfee Cloud Identity Manager Installation Guide August Order Number: US

51 Installation Procedures on Linux 9. (Optional) To import an SSL server X.509 certificate key pair: a. Select the Import SSL Server X.509 KeyPair check box. b. Click Browse... to locate the KeyStore File on your computer. c. Type the password assigned to the keystore in the KeyStore Passphrase field, and click Read. The keystore file is read, and all key pair entries in the file are listed on the KeyPair Alias drop-down menu. d. Select the alias from the KeyPair Alias drop-down menu corresponding to the X.509 certificate that you want to import. The alias is the name assigned to the key pair when it was created. In the Management Console, the alias is used to reference the key pair. e. Type the password assigned to the selected key pair in the KeyPair Passphrase field, and click View... The SSL Certificate Information pane opens. f. Click OK. The SSL Certificate Information pane closes. g. Click Next. The Install as Service step opens. 10. (Optional) Select the Install McAfee CIM_SSO as service check box. Note: We recommend that you install McAfee CIM as a Linux service, because Linux restarts the service when it fails, minimizing down time. 11. Click Next. The Installation Summary step opens and displays the custom installation configuration. 12. Review the installation summary, and click Install. 13. Click Done when installation is complete. August 2012 McAfee Cloud Identity Manager Installation Guide Order Number: US 51

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager BoxNet Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Marketo Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Syncplicity Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager EchoSign Provisioning Connector Guide McAfee Cloud Identity Manager version 3.5 and later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Coupa Cloud Connector Guide McAfee Cloud Identity Manager version 2.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager WebExConnect Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager IdeaScale Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Google Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Firewall Enterprise epolicy Orchestrator Extension

McAfee Firewall Enterprise epolicy Orchestrator Extension Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

McAfee Rogue Database Detection For use with epolicy Orchestrator Software

McAfee Rogue Database Detection For use with epolicy Orchestrator Software McAfee Rogue Database Detection 1.0.0 For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Jive Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Boot Attestation Service 3.5.0

McAfee Boot Attestation Service 3.5.0 Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Boot Attestation Service 3.0.0

Boot Attestation Service 3.0.0 Product Guide Boot Attestation Service 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

Archiving Service. Exchange server setup (2010) Secure Gateway (SEG) Service Administrative Guides

Archiving Service. Exchange server setup (2010) Secure  Gateway (SEG) Service Administrative Guides Secure E-Mail Gateway (SEG) Service Administrative Guides Archiving Service Exchange server setup (2010) 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks

More information

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Content Security Reporter 2.6.x Installation Guide

McAfee Content Security Reporter 2.6.x Installation Guide McAfee Content Security Reporter 2.6.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Migration Guide. McAfee File and Removable Media Protection 5.0.0

Migration Guide. McAfee File and Removable Media Protection 5.0.0 Migration Guide McAfee File and Removable Media Protection 5.0.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK

More information

McAfee epolicy Orchestrator Software

McAfee epolicy Orchestrator Software User Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information

McAfee Content Security Reporter 2.6.x Migration Guide

McAfee Content Security Reporter 2.6.x Migration Guide McAfee Content Security Reporter 2.6.x Migration Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Migration Guide. McAfee Content Security Reporter 2.4.0

Migration Guide. McAfee Content Security Reporter 2.4.0 Migration Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Release Notes (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee MVISION Endpoint 1811 Installation Guide

McAfee MVISION Endpoint 1811 Installation Guide McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Data Protection for Cloud 1.0.1

McAfee Data Protection for Cloud 1.0.1 Product Guide McAfee Data Protection for Cloud 1.0.1 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee Host Intrusion Prevention 8.0

McAfee Host Intrusion Prevention 8.0 Product Guide Self Protection addendum Revision A McAfee Host Intrusion Prevention 8.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel and McAfee logos, McAfee Active Protection,

More information

Installation Guide. McAfee Endpoint Security for Servers 5.0.0

Installation Guide. McAfee Endpoint Security for Servers 5.0.0 Installation Guide McAfee Endpoint Security for Servers 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Hardware Guide. McAfee MVM3200 Appliance

Hardware Guide. McAfee MVM3200 Appliance Hardware Guide McAfee MVM3200 Appliance COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARKS McAfee, the McAfee logo, McAfee Active Protection, McAfee AppPrism, McAfee Artemis,

More information

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee MVISION Endpoint 1808 Installation Guide

McAfee MVISION Endpoint 1808 Installation Guide McAfee MVISION Endpoint 1808 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.2 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0 Installation Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee File and Removable Media Protection Installation Guide

McAfee File and Removable Media Protection Installation Guide McAfee File and Removable Media Protection 5.0.8 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS

More information

Data Loss Prevention Discover 11.0

Data Loss Prevention Discover 11.0 Installation Guide Data Loss Prevention Discover 11.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel

More information

Installation Guide. McAfee Web Gateway Cloud Service

Installation Guide. McAfee Web Gateway Cloud Service Installation Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Client Proxy Installation Guide

McAfee Client Proxy Installation Guide McAfee Client Proxy 2.3.5 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

Product Guide Revision A. McAfee Client Proxy 2.3.2

Product Guide Revision A. McAfee Client Proxy 2.3.2 Product Guide Revision A McAfee Client Proxy 2.3.2 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

Account Management. Administrator Guide. Secure Gateway (SEG) Service Administrative Guides. Revised August 2013

Account Management. Administrator Guide. Secure  Gateway (SEG) Service Administrative Guides. Revised August 2013 Secure E-Mail Gateway (SEG) Service Administrative Guides Account Management Administrator Guide Revised August 2013 * The Directory Services Connector (DSC) feature is not included as a standard feature

More information

Firewall Enterprise epolicy Orchestrator

Firewall Enterprise epolicy Orchestrator Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0 Reference Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Client Proxy Product Guide

McAfee Client Proxy Product Guide McAfee Client Proxy 2.3.5 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.4 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Endpoint Security

McAfee Endpoint Security Migration Guide McAfee Endpoint Security 10.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the

More information

McAfee Policy Auditor 6.2.2

McAfee Policy Auditor 6.2.2 Release Notes McAfee Policy Auditor 6.2.2 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

Installation Guide. McAfee Enterprise Mobility Management 10.1

Installation Guide. McAfee Enterprise Mobility Management 10.1 Installation Guide McAfee Enterprise Mobility Management 10.1 COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security 10.6.0 - Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee MVISION Mobile IBM MaaS360 Integration Guide

McAfee MVISION Mobile IBM MaaS360 Integration Guide McAfee MVISION Mobile IBM MaaS360 Integration Guide Administrator's guide for providing Integration with IBM MaaS360 MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

McAfee MVISION Mobile IBM MaaS360 Integration Guide

McAfee MVISION Mobile IBM MaaS360 Integration Guide McAfee MVISION Mobile IBM MaaS360 Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator)

McAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator) McAfee Drive Encryption 7.2.5 Client Transfer Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.3 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee MVISION Mobile Citrix XenMobile Integration Guide

McAfee MVISION Mobile Citrix XenMobile Integration Guide McAfee MVISION Mobile Citrix XenMobile Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

McAfee MVISION Mobile epo Extension Product Guide

McAfee MVISION Mobile epo Extension Product Guide McAfee MVISION Mobile epo Extension 1809 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Application Control Windows Installation Guide. (Unmanaged)

McAfee Application Control Windows Installation Guide. (Unmanaged) McAfee Application Control 8.1.0 - Windows Installation Guide (Unmanaged) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Endpoint Security Threat Prevention Installation Guide - Linux

McAfee Endpoint Security Threat Prevention Installation Guide - Linux McAfee Endpoint Security 10.5.1 - Threat Prevention Installation Guide - Linux COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud)

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud) McAfee Agent 5.5.0 Interface Reference Guide (McAfee epolicy Orchestrator Cloud) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Application Control Windows Installation Guide

McAfee Application Control Windows Installation Guide McAfee Application Control 8.2.0 - Windows Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Best Practices Guide. Amazon OpsWorks and Data Center Connector for AWS

Best Practices Guide. Amazon OpsWorks and Data Center Connector for AWS Best Practices Guide Amazon OpsWorks and Data Center Connector for AWS COPYRIGHT C opyright 2013 McAfee, I nc. Do not c opy without permission. TRADEMARK ATTRIBUTIONS M cafee, the McAfee logo, McAfee Active

More information

McAfee Investigator Product Guide

McAfee Investigator Product Guide McAfee Investigator Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

Installation Guide. McAfee epolicy Orchestrator Software. Draft for Beta

Installation Guide. McAfee epolicy Orchestrator Software. Draft for Beta Installation Guide McAfee epolicy Orchestrator 5.1.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide McAfee Endpoint Upgrade Assistant 2.3.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.4.0 Product Guide McAfee Endpoint Upgrade Assistant 1.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee MVISION Mobile Threat Detection Android App Product Guide

McAfee MVISION Mobile Threat Detection Android App Product Guide McAfee MVISION Mobile Threat Detection Android App 1809.4.7.0 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6 Gateway Installation and Configuration Guide for On-Premises Version 17 September 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites...

More information

McAfee MVISION Mobile MobileIron Integration Guide

McAfee MVISION Mobile MobileIron Integration Guide McAfee MVISION Mobile MobileIron Integration Guide Administrator's guide for providing Integration with MobileIron MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

McAfee epolicy Orchestrator 5.9.1

McAfee epolicy Orchestrator 5.9.1 Configuration Guide McAfee epolicy Orchestrator 5.9.1 Hosted in Microsoft Azure Cloud Services and Amazon Web Services (AWS) McAfee epolicy Orchestrator 5.9.1 Configuration Guide 1 COPYRIGHT Copyright

More information

McAfee File and Removable Media Protection Product Guide

McAfee File and Removable Media Protection Product Guide McAfee File and Removable Media Protection 5.0.8 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee Endpoint Security Threat Prevention Installation Guide - macos

McAfee Endpoint Security Threat Prevention Installation Guide - macos McAfee Endpoint Security 10.5.5 - Threat Prevention Installation Guide - macos COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Server Installation Guide

Server Installation Guide Server Installation Guide Server Installation Guide Legal notice Copyright 2018 LAVASTORM ANALYTICS, INC. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS HEREOF MAY NOT BE REPRODUCED OR DISTRIBUTED IN ANY

More information

McAfee File and Removable Media Protection 6.0.0

McAfee File and Removable Media Protection 6.0.0 Product Guide McAfee File and Removable Media Protection 6.0.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the

More information

McAfee Enterprise Mobility Management 12.0 Software

McAfee Enterprise Mobility Management 12.0 Software Product Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator 4.6.7-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0 Product Guide McAfee Endpoint Upgrade Assistant 1.5.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Migrating vrealize Automation 6.2 to 7.1

Migrating vrealize Automation 6.2 to 7.1 Migrating vrealize Automation 6.2 to 7.1 vrealize Automation 7.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

McAfee Change Control and McAfee Application Control 8.0.0

McAfee Change Control and McAfee Application Control 8.0.0 Installation Guide McAfee Change Control and McAfee Application Control 8.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are

More information

McAfee Performance Optimizer 2.1.0

McAfee Performance Optimizer 2.1.0 Product Guide McAfee Performance Optimizer 2.1.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the

More information

McAfee Data Exchange Layer Product Guide. (McAfee epolicy Orchestrator)

McAfee Data Exchange Layer Product Guide. (McAfee epolicy Orchestrator) McAfee Data Exchange Layer 4.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Management of Native Encryption 3.0.0

McAfee Management of Native Encryption 3.0.0 Product Guide McAfee Management of Native Encryption 3.0.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

McAfee MVISION Mobile Silverback Integration Guide

McAfee MVISION Mobile Silverback Integration Guide McAfee MVISION Mobile Silverback Integration Guide Administrator's guide for providing Integration with Silverback MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security for Servers 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform Installation Guide McAfee Web Gateway for Riverbed Services Platform COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0) McAfee Endpoint Upgrade Assistant 1.6.0 Product Guide (McAfee epolicy Orchestrator 5.9.0) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee MVISION Mobile AirWatch Integration Guide

McAfee MVISION Mobile AirWatch Integration Guide McAfee MVISION Mobile AirWatch Integration Guide Administrator's guide for providing Integration with AirWatch MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and

More information

McAfee SiteAdvisor Enterprise 3.5.0

McAfee SiteAdvisor Enterprise 3.5.0 Installation Guide McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Upgrade Assistant 2.0.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Migrating vrealize Automation 6.2 to 7.2

Migrating vrealize Automation 6.2 to 7.2 Migrating vrealize Automation 6.2 to 7.2 vrealize Automation 7.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide Revision A McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Enabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface

Enabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface Enabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface Release 7.1 Revised: March 5, 2013 1:53 pm This document describes the

More information

Contents Overview... 5 Upgrading Primavera Gateway... 7 Using Gateway Configuration Utilities... 9

Contents Overview... 5 Upgrading Primavera Gateway... 7 Using Gateway Configuration Utilities... 9 Gateway Upgrade Guide for On-Premises Version 17 August 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Upgrading Primavera Gateway... 7 Prerequisites... 7 Upgrading Existing Gateway Database...

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

McAfee Firewall Enterprise Control Center

McAfee Firewall Enterprise Control Center Installation and Migration Guide Revision B McAfee Firewall Enterprise Control Center COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

1Integrate for ArcGIS Installation Guide. Server Edition

1Integrate for ArcGIS Installation Guide. Server Edition 1Integrate for ArcGIS Installation Guide Server Edition Product version: v 2.1 Document version: v 1.9 Document date: 03/08/2018 Copyright 2018 1Spatial plc and its affiliates. All rights reserved. Other

More information

Installation Guide McAfee Firewall Enterprise (Sidewinder ) on Riverbed Services Platform

Installation Guide McAfee Firewall Enterprise (Sidewinder ) on Riverbed Services Platform Installation Guide McAfee Firewall Enterprise (Sidewinder ) on Riverbed Services Platform version 7.0.1.02 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be

More information

DefendX Software Control-Audit for Hitachi Installation Guide

DefendX Software Control-Audit for Hitachi Installation Guide DefendX Software Control-Audit for Hitachi Installation Guide Version 4.1 This guide details the method for the installation and initial configuration of DefendX Software Control-Audit for NAS, Hitachi

More information

McAfee Change Control and McAfee Application Control 6.1.4

McAfee Change Control and McAfee Application Control 6.1.4 Installation Guide McAfee Change Control and McAfee Application Control 6.1.4 For use with epolicy Orchestrator 4.6.0-5.1.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission.

More information

VMware Horizon JMP Server Installation and Setup Guide. 13 DEC 2018 VMware Horizon 7 7.7

VMware Horizon JMP Server Installation and Setup Guide. 13 DEC 2018 VMware Horizon 7 7.7 VMware Horizon JMP Server Installation and Setup Guide 13 DEC 2018 VMware Horizon 7 7.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you

More information

McAfee Endpoint Security for Servers Product Guide

McAfee Endpoint Security for Servers Product Guide McAfee Endpoint Security for Servers 5.2.0 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information