1 Proposed PIN P rotection Protection in Banner General 8.0
|
|
- Eric Booth
- 6 years ago
- Views:
Transcription
1 Proposed PIN Protection in Proposed PIN Protection in Banner General 8.0 1
2 2 Proposed PIN Protection in Banner General 8.0 ~These Enhancements are under These Enhancements are under Development and may be modified prior to release~
3 Introduction Banner PIN enhancements for Banner 8.0 are currently being developed in response to the growing demand from institutions to protect PIN information in the database NOTE: This enhancement is currently under development. Data Structures and User Interface may be adjusted further prior to release. 3
4 Agenda Overview of Requirements Proposed Enhanced Characteristics of PINs Proposed PIN Encryption Methodology Proposed PIN Reset Mechanism Proposed PIN initial notification mechanism Self Service and Internet Native Banner Changes Summary Question and Answer Session 4
5 Overview 5
6 Overview The Banner General Team is developing Self Service PIN enhancements for Banner 8.0 Requirements for the project include: Enhance the characteristics of PINs to meet industry standards for strong passwords Store PINs in the database as Cryptographic Hash Provide a PIN reset mechanism that is based on providing answers to questions specific to the individual 6
7 Proposed Enhanced Characteristics i of PINs 7
8 Proposed Enhanced Characteristics of PINs Allow minimum PIN length to be configurable by the institution Allow maximum PIN length to be configurable by the institution Allow the institution to designate if an alpha and/or numeric character is required in PIN Ability to restrict re-using PINs (can be set to 0 to turn off this functionality) 8
9 Proposed PIN Encryption Proposed PIN Encryption Terminology and Methodology 9
10 PIN Encryption Terminology Cryptographic Hash Function A hash function with certain additional security properties to make it suitable for use as a primitive in various information security applications, such as authentication and message integrity. A hash function takes a long string (or 'message') of any length as input and produces a fixed length string as output, sometimes termed a message digest or a digital fingerprint. One-Way Hash Function Takes a variable-length input string, the data, and converts it to a fixed-length (generally smaller) output string called a Hash Value Original value cannot be recreated Hash Value Serves as a unique identifier (like a fingerprint) of the input data Can be used to verify whether data has been changed or not Salt Additional text appended to a password before hashing to make the password more random making decryption even enmorediffic difficult Salted Hash The hashed value generated from the original value appended with a salt. i.e. if the password was 'ABC' and the salt was '123' we would generate the hash on ABC123' HASH_SH1 Is a Secure Hash Algorithm (SHA) which produces a 160-bit hash Oracle package DBMS_CRYPTO New for Oracle 10g 10
11 Proposed PIN Encryption Methodology PINs will be stored as a Cryptographic Hash New package GSPCRPT will handle: Procedure for Generating Salt DBMS random function will be used for generating random string Procedure for Salted Hash DBMS_CRYPTO Package SHA-1 Hashing Third Party APIs being modified to handle PIN Hashing and Salt Login Packages being modified to handle PIN Hashing PINs will be converted to Hash Value and compared to the Hash stored in the DB 11
12 Proposed PIN Reset Mechanism 12
13 PIN Reset Mechanism Institutions choose number of questions which must be answered to reset PIN Questions and Answers will have a configurable minimum length (on GUAPPRF) Answers will be salted and hashed to increase security New Encryption Package (GSPCRPT) will handle procedure for salting and hashing of answers using DBMS_CRYPTO Package If a user forgets their PIN User is required to answer questions If Answers are correctly provided, PIN reset is forced User must enter a new PIN and confirm by re-entering 13
14 Initial PIN Notification Mechanism Instead of storing PIN as clear text, PIN is stored as salted hash When PIN is initially set, it is stored as a salted hash. Since we cannot retrieve that value, when we need to deliver the value to a user, the PIN will be reset again and the reset function will deliver the unhashed value via the API to a letter generation functionality (either baseline or homegrown) Initial generation of PIN will insert a record in GURMAIL to indicate that this user has not yet received a PIN Running letter generation will cause the reset function to run again and will deliver the reset value to the.lis file to be used in letters. Two additional Letter Code fields have been added d to GUAPPR. This will allow the institution to specify which letter and/or gets sent to a user when the Admin changes the password or the User changes the password. By providing these separate fields, the institution can send a letter containing i the new PIN if the Admin has set the PIN or they can choose to send a different letter which does not contain the PIN if the PIN has been set by the user. This would alert the user that their PIN has been changed via SS to be sure it was changed by the real user. 14
15 15 Self Service and Internet Native Banner Changes
16 Self Service Changes All packages in Web Tailor/Forms currently call Third Party API for Create and Update Third party API will be modified to store PIN as Salted Hash Self-Service GOATPAD GB_THIRD_PARTY (API) P_CREATE P_UPDATE GSPCRPT (Hash Function) GOBTPAC (Table) DBMS_CRYPTO HASH_SHA 1 16
17 Self Service Changes Login Packages (twbkwbis / twbklogn) will be modified Combine password, Salt and convert to a Hashed Value Gobtpac_pin is retrieved from gobtpac as a hash h value and the two hashes are compared If comparison does not match then Login page is displayed d again for ID/Password re-entry Login Page ID/Password twbkwbis. P_ValLogin GB_THIRD_PARTY F_get_hash GOBTPAC (TABLE) Hash Compare 17
18 Self Service Changes Security Question page will be modified to allow users to choose a predetermined question from a drop down list or create their own question Number of Questions required is configurable Minimum Question and Answer length are configurable 18
19 INB Changes - GUAPPRF Configurable PIN preferences to be added: Minimum Length Maximum Length Digit Required Character Required Restrict Re-Use of Pin (when not being reset by a process or when reset value is set via inb) Configurable Question and Answer preferences to be added: Number of Questions Minimum Question Length Minimum Answer Length Allow User Defined Questions 19
20 INB Changes - GUAPPRF 20
21 INB Changes - GUAPPRF Addition of letter code fields to give institution the ability to send a different letter via hard copy and/or when the PIN is reset by the administrator or the user 21
22 INB Changes - GOATPAD/GOBTPAC Two New Fields for PIN on GOATPAD PIN is shown as ****** to user User must enter identical PIN in both fields If both PINs match, call Third Party API to add salt and hash the PIN Option to create GURMAIL record or not Create a separate tab/block for question/answer so that tab level security can be applied Answers are salted hash Answers displayed as ******** 22
23 23
24 New Data Structure - GOBQSTN New table to store list of questions Table will store Question ID Description Web Display Indicator 24
25 New Data Structure GOBANSR New table will store PIN responses for Self-Service User can either create their own questions or they can choose question from GOBQSTN Table will store PIDM ID of Question Editable Question Hashed Answer Salt 25
26 Modified Data Structures GOBTPAC New column gobtpac_salt Increase length of GOBTPAC_PINPIN GORPAUD Increase length of GORPAUD_PIN PIN GUBPPRF New columns added to GUBPPRF to set new rules for creating PINs Minimum Length Maximum Length Character Required Number Required Restrict Re-use 26
27 Summary PIN Enhancements Available in Banner 8.0 Enhanced Protection for PIN PIN Stored as Salted Hash Answers Stored as Salted Hash More Flexible Settings for Creation of PIN More Flexible Question and Answer Settings Initial PIN or reset PIN to user will be delivered via reset function and GURMAIL record 27
28 Questions & Answers 28
29 Thank You! Cyndy Bunte Rajesh Kumar Les von Holstein Please complete the online class evaluation form Course ID 1351 SunGard, the SunGard logo, Banner, Campus Pipeline, Luminis, PowerCAMPUS, Matrix, and Plus are trademarks or registered trademarks of SunGard Data Systems Inc. or its subsidiaries in the U.S. and other countries. Third-party names and marks referenced herein are trademarks or registered trademarks of their respective owners SunGard. All rights reserved. 29
Banner 8/ Luminis 4 Change Overview. September 24, 2009
Banner 8/ Luminis 4 Change Overview September 24, 2009 www.sigcorp.com What information will be covered? Banner 8 changes which impact Luminis 4 What information will NOT be covered? Specific Banner 8
More informationBanner Student. Introductions. Course Goals. Name Organization Title/function Job responsibilities Banner experience Expectations
Banner Student Population Selection Introductions Name Organization Title/function Job responsibilities Banner experience Expectations 2 Course Goals This course is intended to teach you to identify key
More informationHighlights from DW4.0.0
CONNECT TO COMMUNITY. At SunGard Summit, come together as a community dedicated to education. Highlights from DW4.0.0 Presented by: Mark C. Wysoski SunGard Higher Education March 23, 2009 Course ID 0137
More informationOverview Of Banner 7 Channels
Overview Of Banner 7 Channels John Morgan, SunGard SCT, Banner Architect Evaluation Code 310 Rock Eagle 2004, Thu., Oct. 21, 3:00 PM Topics of Discussion Introduction to Channels for Banner Overview of
More informationSQL Server Reporting Services
SQL Server Reporting Services Presented by: Victoria Katona and Vijay Vasu Arcadia University April 4, 2006 8:30 am 9:30 am April 2-5 Orlando, Florida Session Rules of Etiquette Please turn off your cell
More informationImagination To Realization
Imagination To Realization Introduction to HTML DB (HOT) Presented by: Bih-Shya Gau SunGard Higher Education Monday, April 3, 2006 3:30 5:30 pm April 2-5 Orlando, Florida Session Rules of Etiquette Please
More informationBanner Job Submission 1
Welcome to SunGard Banner General Job Submission Introductions Name Organization Title/function Job responsibilities Banner experience Expectations 2 Course Goals This course is intended to teach you to
More informationBanner 8 Security Enhancements Part 1
Banner 8 Security Enhancements Part 1 Presented by: Les von Holstein SunGard Higher Education Tuesday, March 22, 2011 10:00 11:00 Session ID 4582 Focus Group Thank You! George Mason University Georgia
More informationRSA NetWitness Logs. MySQL Enterprise. Event Source Log Configuration Guide. Last Modified: Wednesday, November 15, 2017
RSA NetWitness Logs Event Source Log Configuration Guide MySQL Enterprise Last Modified: Wednesday, November 15, 2017 Event Source Product Information: Vendor: MySQL Event Source: MySQL Enterprise Versions:
More informationHIGHER EDUCATION. What can we help you achieve? Workflow Process Modeling Workflow 4.3 Workbook
HIGHER EDUCATION What can we help you achieve? Workflow Process Modeling Workflow 4.3 Workbook January 2007 Confidential Business Information --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
More informationVMware AirWatch and Office 365 Application Data Loss Prevention Policies
VMware AirWatch and Office 365 Application Data Loss Prevention Policies Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationRSA NetWitness Logs. Trend Micro OfficeScan and Control Manager. Event Source Log Configuration Guide. Last Modified: Thursday, November 30, 2017
RSA NetWitness Logs Event Source Log Configuration Guide Trend Micro OfficeScan and Control Manager Last Modified: Thursday, November 30, 2017 Event Source Product Information: Vendor: Trend Micro Event
More informationWelcome to SunGard SCT Banner. Introductions. Course Goals. Name Organization Title/function Job responsibilities SCT Banner experience Expectations
Welcome to SunGard SCT Banner SEVIS Introductions Name Organization Title/function Job responsibilities SCT Banner experience Expectations 2 Course Goals This course is intended to provide you with the
More informationSTUDENT Student Self-Service
STUDENT Student Self-Service Document Number: Department: Contact Name: Email: Phone: Version: Last Update: March 28, 2006 Module Name Confidential Business Information This documentation is proprietary
More informationRegistration Quick Reference Card for Employees/Associates
Registration Quick Reference Card for Employees/Associates Welcome! Register an account with ADP to access the services offered by your organization. Using an Organizational Registration Code On your ADP
More informationImagination To Realization
Imagination To Realization Trigger Writing for Fun and Profit Presented by: Larry Holder Database Administrator The University of Tennessee at Martin April 4, 2006 10:30 11:30 am April 2-5 Orlando, Florida
More informationHow to Activate Student Log in to the student Registration system (also known as My Community Education or Banner ).
How to Activate Student E-Mail 1. Log in to the student Registration system (also known as My Community Education or Banner ). 2. The new account notice shows at the top of the screen once signed in. Click
More informationSecurity in Confirmit Software - Individual User Settings
Security in Confirmit Software - Individual User Settings Unclassified. Copyright 2017 Confirmit. All Rights Reserved Page 1 of 5 1 Using HTTPS in Confirmit Horizons SSL certificates are installed for
More informationRSA NetWitness Logs. Symantec Critical Systems Protection. Event Source Log Configuration Guide
RSA NetWitness Logs Symantec Critical Systems Protection Last Modified: Monday, July 24, 2017 Event Source Product Information: Vendor: Symantec Event Source: Critical Systems Protection, Data Center Security
More informationIntroduction. The Login Page. ADP Workforce Now Navigating in ADP Workforce Now for Managers, Supervisors, and Employees
ADP Workforce Now Navigating in ADP Workforce Now for Managers, Supervisors, and Employees Introduction In this self-study, you will learn how to navigate in ADP Workforce Now. The features that you will
More informationAdministrator IT Guide. Samsung Knox Configure Shared Device
Administrator IT Guide Samsung Knox Configure Shared Device July 2017 Samsung Knox TM shared device A Samsung Knox shared device enables multiple users, or employees, to access the same device without
More informationRSA NetWitness Logs. Event Source Log Configuration Guide
RSA NetWitness Logs Event Source Log Configuration Guide EMC VNX (formerly CLARiiON) Last Modified: Friday, May 12, 2017 Event Source Product Information: Vendor: EMC Event Source: VNX / CLARiiON Platforms/Versions:
More informationBanner Student. Introductions. Course Goals. Name Organization Title/function Job responsibilities Banner experience Expectations
Banner Student Tape Load Processing Introductions Name Organization Title/function Job responsibilities Banner experience Expectations 2 Course Goals This course is intended to provide you with the necessary
More informationRegistration Quick Reference Card for Employees/Associates
Registration Quick Reference Card for Employees/Associates Contents Registration... 2 Activate Your Email Address... 8 Activate Your Mobile Phone... 8 Forgot Your User ID/Password?... 9 ADP and the ADP
More informationUser Guide. IronKey Workspace Models: W700 Updated: September 2013 IRONKEY WORKSPACE W700 USER GUIDE
User Guide IronKey Workspace Models: W700 Updated: September 2013 PAGE 1 Thank you for your interest in IronKey Workspace W700 by Imation. Imation s Mobile Security Group is committed to creating and developing
More informationMicrosoft Intune App Protection Policies Integration. VMware Workspace ONE UEM 1811
Microsoft Intune App Protection Policies Integration VMware Workspace ONE UEM 1811 Microsoft Intune App Protection Policies Integration You can find the most up-to-date technical documentation on the VMware
More informationAdministrative Guide
Administrative Guide Admin Home: Wiley Digital Archives (WDA) Admin pages. Please login using the admin name and password assigned to the institution 1. The first screen shows information about the institution,
More informationRSA NetWitness Logs. Cisco Wireless LAN Controller. Event Source Log Configuration Guide
RSA NetWitness Logs Event Source Log Configuration Guide Cisco Wireless LAN Controller Last Modified: Thursday, May 11, 2017 Event Source Product Information: Vendor: Cisco Event Source: Wireless LAN Controller
More informationPowerSchool Users Guide for Parents/Guardians
PowerSchool Users Guide for Parents/Guardians Introduction PowerSchool's Parent Portal is a tool specifically developed for parents and students that integrates into the PowerSchool Student Information
More informationBanner General Release Guide. Release 9.3 September 2016
Banner General Release Guide Release 9.3 September 2016 Notices Notices Without limitation: Ellucian, Banner, Colleague, and Luminis are trademarks of the Ellucian group of companies that are registered
More informationVA DAP App ios Users Guide
VA DAP App ios Users Guide Table of Contents Getting Started with the VA DAP App... 1 Installing the VA DAP App... 1 Logging into the App and Opening Components... 1 Logging out of the VA DAP App... 2
More informationRegistration Quick Reference Card for Employees/Associates
Registration Quick Reference Card for Employees/Associates Contents Registration... 2 Activate Your Email Address... 9 Activate Your Mobile Phone... 9 Forgot Your User ID/Password?... 10 Disclaimers: Employee
More informationAccess Online. Navigation Basics. User Guide. Version 2.2 Cardholder and Program Administrator
Access Online Navigation Basics User Guide Version 2.2 Cardholder and Program Administrator Contents Introduction... 1 Access Online Overview... 2 How We Gather and Manage Transaction Data in Access Online...
More informationConfigure Settings and Customize Notifications on FindIT Network Probe
Configure Email Settings and Customize Email Notifications on FindIT Network Probe Objective Cisco FindIT Network Probe equips a network administrator with indispensable tools that help securely monitor
More informationRSA NetWitness Logs. Trend Micro InterScan Messaging Security Suite. Event Source Log Configuration Guide. Last Modified: Tuesday, April 25, 2017
RSA NetWitness Logs Event Source Log Configuration Guide Trend Micro InterScan Messaging Security Suite Last Modified: Tuesday, April 25, 2017 Event Source Product Information: Vendor: Trend Micro Event
More informationProtecting SugarCRM with SafeNet Authentication Manager
Protecting SugarCRM with SafeNet Authentication Manager Version 8.2 Integration Guide Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document
More informationSSH PK Authentication and Auto login configuration for Chassis Management Controller
SSH PK Authentication and Auto login configuration for Chassis Management Controller Dell technical white paper Dell Engineering May 2016 Author: Elangovan G Revisions Date August 2013 May 2016 Description
More informationBANNER ENTERPRISE IDENTITY SERVICES RELEASE AND UPGRADE GUIDE. Release 8.1.4, Revision 1 July 2011
BANNER ENTERPRISE IDENTITY SERVICES RELEASE AND UPGRADE GUIDE Release 8.1.4, Revision 1 July 2011 Trademark, Publishing Statement and Copyright Notice SunGard or its subsidiaries in the U.S. and other
More informationAdmin System for User Management
Admin System for User Management Contents ADMIN SYSTEM FOR USER MANAGEMENT... 1 CALLING UP AND ACTIVATING USER MANAGEMENT... 1 THE MAIN USER MANAGEMENT WINDOW... 2 Admin System for User Management Calling
More informationBanner Workflow Release Guide. Release 8.3 February 27, 2015
Banner Workflow Release Guide Release 8.3 February 27, 2015 Without limitation: Ellucian, Banner, Colleague, and Luminis are trademarks of the Ellucian group of companies that are registered in the U.S.
More informationRegistration Quick Reference Card for Employees/Associates
Registration Quick Reference Card for Employees/Associates This document reflects enhancements included in the Fall 2016 release! Contents Registration... 2 Activate Your Email Address... 7 Activate Your
More informationIntegration Guide. Dell EMC Data Domain Operating System and Gemalto KeySecure. DD OS and Gemalto KeySecure Integration. Version 6.
Dell EMC Data Domain Operating System and Gemalto KeySecure Version 6.1 DD OS and Gemalto KeySecure Integration P/N 302-003-978 REV 01 June 2017 This document describes how to configure Gemalto KeySecure
More informationFIPS Security Policy. for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module
FIPS 140-2 Security Policy for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module Hardware Version: 88i8925, 88i8922, 88i8945, and 88i8946 Firmware Version: Solaris2-FIPS-FW-V1.0 Document Version:
More informationRSA NetWitness Logs. IBM Domino. Event Source Log Configuration Guide. Last Modified: Thursday, October 19, 2017
RSA NetWitness Logs Event Source Log Configuration Guide IBM Domino Last Modified: Thursday, October 19, 2017 Event Source Product Information: Vendor: IBM (Lotus) Event Source: Lotus Domino Versions:
More informationConfiguring Cisco VPN Concentrator to Support Avaya 96xx Phones Issue 1.0. Issue th October 2009 ABSTRACT
Avaya CAD-SV Configuring Cisco VPN Concentrator to Support Avaya 96xx Phones Issue 1.0 Issue 1.0 30th October 2009 ABSTRACT These Application Notes describe the steps to configure the Cisco VPN 3000 Concentrator
More informationBanner General Common Matching Training Workbook
Banner General Common Matching Training Workbook September 2007 Release 7.5 HIGHER EDUCATION What can we help you achieve? Confidential Business Information -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
More informationRed Hat 3scale 2.3 Accounts
Red Hat 3scale 2.3 Accounts How to manage admin and member rights and invite teammates to use the admin portal. Last Updated: 2019-03-07 Red Hat 3scale 2.3 Accounts How to manage admin and member rights
More informationUNIT - IV Cryptographic Hash Function 31.1
UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service
More informationPePWave Mesh Connector User Manual
PePWave Mesh Connector User Manual Document Rev. 1.0 Jun-07 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. Copyright 1999-2007 PePWave Ltd. All Rights Reserved. PePWave and
More informationAuthorized Send User s Guide for imagerunner Machines Version 4.1
Canon Authorized Send User s Guide for imagerunner Machines Version 4.1 08011-41-UD1-003 This page is intentionally left blank. 2 Authorized Send User s Guide for imagerunner Machines Contents Preface...5
More informationGetting Started with the Aloha Community Template for Salesforce Identity
Getting Started with the Aloha Community Template for Salesforce Identity Salesforce, Winter 18 @salesforcedocs Last updated: November 30, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved.
More informationRSA NetWitness Logs. Sophos Enterprise Console Last Modified: Friday, July 21, Event Source Log Configuration Guide
RSA NetWitness Logs Event Source Log Configuration Guide Sophos Enterprise Console Last Modified: Friday, July 21, 2017 Event Source Product Information: Vendor: Sophos Event Source: Enterprise Console,
More informationWelcome to SunGard SCT Banner. Introductions. Course Goals
Welcome to SunGard SCT Banner Location Management/Housing Introductions Name Organization Title/function Job responsibilities SunGard SCT Banner experience Expectations 2 Course Goals The goal of this
More informationAdmin Table is oftr Caoto ntr e s U ntsser Guide Table of Contents Introduction Accessing the Portal
Administrator s Table of Contents User Guide Table of Contents Introduction 3 Accessing the Portal 3 Create User Accounts 4 Enable / Disable User Accounts 5 Manage Users from an LDAP Server 5 User Roles
More informationBanner Self-Service Student Admissions Training Workbook
Banner Self-Service Student Admissions Training Workbook May 2006 Release 7.3 HIGHER EDUCATION What can we help you achieve? Confidential Business Information -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
More information2016 TaxSlayer Pro Desktop. Logging in to the Program Usernames/Passwords
2016 TaxSlayer Pro Desktop Logging in to the Program Usernames/Passwords Contents Logging in to the Program... 2 First Time Logging In... 2 Forgot Username/Password Preparer... 4 Logging in as ADMIN...
More informationSELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE
SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE Copyright 1998-2017 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form
More informationRSA NetWitness Logs. IBM Tivoli Identity Manager. Event Source Log Configuration Guide. Last Modified: Monday, March 06, 2017
RSA NetWitness Logs Event Source Log Configuration Guide IBM Tivoli Identity Manager Last Modified: Monday, March 06, 2017 Event Source Product Information: Vendor: IBM Event Source: Tivoli Identity Manager
More informationPasswords. CS 166: Introduction to Computer Systems Security. 3/1/18 Passwords J. Liebow-Feeser, B. Palazzi, R. Tamassia, CC BY-SA 2.
Passwords CS 166: Introduction to Computer Systems Security 1 Source: https://shop.spectator.co.uk/wp-content/uploads/2015/03/open-sesame.jpg 2 Password Authentication 3 What Do These Passwords Have in
More informationQUICK START: SYMANTEC ENDPOINT PROTECTION FOR AMAZON EC2
QUICK START: SYMANTEC ENDPOINT PROTECTION FOR AMAZON EC2 Quick Start Guide for Using Symantec Endpoint Protection for Amazon EC2 Quick Start Guide for Using Symantec Endpoint Protection for Amazon EC2
More informationHow to Login, Logout and Manage Password (QRG)
How to Login, Logout and Manage Password (QRG) This Quick Reference Guide covers the following topics: 1. How to login in to the DCC. How to change (reset) your password 3. What to do if you have forgotten
More informationSecurity Service tools user IDs and passwords
IBM Systems - iseries Security Service tools user IDs and passwords Version 5 Release 4 IBM Systems - iseries Security Service tools user IDs and passwords Version 5 Release 4 Note Before using this information
More informationIBM Clinical Development
IBM Clinical Development New User Help Effective: 26 January 2018 Copyright IBM corporation. 2017. IBM Clinical Development 2 TOPICS > > > Click the green icon to jump to the section or use the PDF page
More informationRegistration and Login
Registration and Login When a parent accesses txconnect, the following Login page is displayed. The parent needs to register as a new user. How to Register as a New User The registration process is self-administered,
More informationAccount Management Settings section. Service Request Settings section
WebEx Site Configuration Audit Log The following settings are included in the CSV export of changes to the Configuration > Common Site Settings > Options page of WebEx Site Administration. Account Management
More informationEMC Clariion SAN storage system
Configuring and Monitoring Dell Configuring and Monitoring an EqualLogic PS Series SAN Storage EMC Clariion SAN storage system eg Enterprise v5.6 eg Enterprise v5.2 Restricted Rights Legend The information
More informationAbout This Guide. Audience Database administrators should use this guide.
P6 EPPM Manual Installation Guide (Oracle Database) for On-Premises Version 17 November 2017 Contents About This Guide... 5 Oracle Database Manual Configuration Overview... 7 Oracle Database Installation...
More informationComputer Security 3/20/18
Authentication Identification: who are you? Authentication: prove it Computer Security 08. Authentication Authorization: you can do it Protocols such as Kerberos combine all three Paul Krzyzanowski Rutgers
More informationSTEPHEN F. AUSTIN STATE UNIVERSITY. Banner. General BANNER NAVIGATION GUIDE
STEPHEN F. AUSTIN STATE UNIVERSITY Banner General BANNER NAVIGATION GUIDE Revised December 14, 2011 Confidential Business Information This learning guide is based upon SunGard Higher Education Banner documentation.
More informationRingCentral Office. New Admin Setup
RingCentral Office New Admin Setup RingCentral Office New Admin Setup Table of Contents 2 Welcome to RingCentral 2 Activate Your Account 3 Your Account Security 4 Create Your Password 5 Set Your PIN 6
More informationConfiguring the Avaya B179 SIP Conference Phone with Avaya Aura Communication Manager 5.X and Avaya Aura Session Manager 6.X v1.0.
Configuring the Avaya B179 SIP Conference Phone with Avaya Aura Communication Manager 5.X and Avaya Aura Session Manager 6.X v1.0 Abstract These Application Notes describe the steps to configure the Avaya
More informationYubiKey Smart Card Minidriver User Guide. Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n
YubiKey Smart Card Minidriver User Guide Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n Copyright 2017 Yubico Inc. All rights reserved. Trademarks
More informationProtect My Ministry Integrated Background Checks for Fellowship One
Protect My Ministry Integrated Background Checks for Fellowship One The Only Background Check Solution Utilizing the Newest Fellowship One API Integration and User Guide 2005-2012 Protect My Ministry Support:
More informationComputer Security. 08. Authentication. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08. Authentication Paul Krzyzanowski Rutgers University Spring 2018 1 Authentication Identification: who are you? Authentication: prove it Authorization: you can do it Protocols such
More informationCustomer Online Support Demonstration. 1
Customer Online Support Demonstration 1 Introduction SATHYA is committed to simplifying and improving your support experience. As we launch our enhanced online case management capabilities, you will see
More informationPrinter Driver User Guide
PRINT COPY SCAN FAX TASKalfa 0i TASKalfa i Printer Driver User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change
More informationDistributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018
Distributed Systems 25. Authentication Paul Krzyzanowski Rutgers University Fall 2018 2018 Paul Krzyzanowski 1 Authentication For a user (or process): Establish & verify identity Then decide whether to
More informationSecureDoc Disk Encryption Cryptographic Engine
SecureDoc Disk Encryption Cryptographic Engine Security Policy Abstract: This document specifies Security Policy enforced by the SecureDoc Cryptographic Engine compliant with the requirements of FIPS 140-2
More informationInstallation Guide EPMWARE. Version 1.0. EPMWARE, Inc. Published: August, 2015
Installation Guide EPMWARE Version 1.0 EPMWARE, Inc. Published: August, 2015 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless
More informationUser Management in Resource Manager
CHAPTER 8 This section describes how to manage user profiles. Topics in this section include: Overview of User Management, page 8-1 Using User Management, page 8-1 Overview of User Management In Resource
More informationTaming Banner 7 on Oracle 10g
SUNGARD SUMMIT 2007 sungardsummit.com 1 Taming Banner 7 on Oracle 10g Presented by: Scott Harden University of Illinois March 20, 2007 Course ID: 58 A Community of Learning Session Rules of Etiquette Please
More informationREST API Operations. 8.0 Release. 12/1/2015 Version 8.0.0
REST API Operations 8.0 Release 12/1/2015 Version 8.0.0 Table of Contents Business Object Operations... 3 Search Operations... 6 Security Operations... 8 Service Operations... 11 Business Object Operations
More informationDefender Desktop Login GrIDsure Token User Guide
Desktop Login GrIDsure Token User Guide Introduction This guide describes what the user will see when using Desktop Login with GrIDsure tokens. The logon procedure will vary slightly depending on the platform
More informationCS November 2018
Authentication Distributed Systems 25. Authentication For a user (or process): Establish & verify identity Then decide whether to allow access to resources (= authorization) Paul Krzyzanowski Rutgers University
More informationCALNET 3 AT&T Billing Consolidator SM
CALNET 3 AT&T Billing Consolidator SM What s new October, 2015 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T
More informationRegions OnePass USER GUIDE. It s time to expect more. Regions Bank Member FDIC Revised
Regions OnePass USER GUIDE It s time to expect more. Regions Bank Member FDIC Revised 051616 User Guide Table of Contents Section I. Regions OnePass Basics 3 What Is Regions OnePass? 3 Minimum Browser
More informationConfigure IBM Rational Synergy with 3 rd Party LDAP Server. Release
Configure IBM Rational Synergy with 3 rd Party LDAP Server. Release 7.2.1.7 Author: Rooble Babu Madeckal March 29, 2018 This edition applies to IBM Rational Synergy version 7.2.1.7, and to all subsequent
More informationConfiguring and Delivering Salesforce as a managed application to XenMobile Users with 3 rd Party SAML IDP (Identity Provider)
Solution Guide ios Managed Configuration Configuring and Delivering Salesforce as a managed application to XenMobile Users with 3 rd Party SAML IDP (Identity Provider) Solution Guide Citrix.com Solutions
More informationManaging Personally Identifiable Information in P6 Professional
P6 Professional Administration Guide Version 17 April 2018 Contents About This Guide... 5 Managing Personally Identifiable Information in P6 Professional... 5 About Consent Notices... 5 About Personally
More informationKEPServerEX V6 Install Guide
KEPServerEX V6 Install Guide Last updated April, 2018 www.kepware.com 1 2018 PTC, Inc. All Rights Reserved. Table of Contents 1. Installing KEPServerEX V6 on a Clean Machine... 1 2. Upgrading from Version
More informationTable of Contents. Page 3
Owner Portal Guide Page 2 Welcome! Welcome to the National Rental Services (NRS) Owner Portal Guide. This guide reviews the features, services and settings associated with the NRS Owner Portal including:
More informationWeb Server Admin Guide. Version
Web Server Admin Guide Version 2018.2 Copyrights 1996-2018 Perforce Software, Inc. and its subsidiaries. All rights reserved. Defect Scribe, Helix ALM, Helix ALM Suite, Helix Issue Management, Helix Requirements
More informationBanner Advancement Advanced Gift and Pledge Processing Training Workbook
Banner Advancement Advanced Gift and Pledge Processing Training Workbook May 2006 Release 7.3 HIGHER EDUCATION What can we help you achieve? Confidential Business Information -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------
More informationYubiKey Smart Card Minidriver User Guide. Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n
YubiKey Smart Card Minidriver User Guide Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n Copyright 2017 Yubico Inc. All rights reserved. Trademarks
More informationOracle Eloqua Legacy Authenticated Microsites and Contact Users. Configuration Guide
Oracle Eloqua Legacy Authenticated Microsites and Contact Users Configuration Guide 2019 Oracle Corporation. All rights reserved 04-Jan-2019 Contents 1 Authenticated microsites 3 2 Creating authenticated
More informationSECURE FILE TRANSFER PROTOCOL. EventTracker v8.x and above
SECURE FILE TRANSFER PROTOCOL EventTracker v8.x and above Publication Date: January 02, 2019 Abstract This guide provides instructions to configure SFTP logs for User Activities and File Operations. Once
More informationD&B360 Batch for Oracle On Demand CRM
DUN & BRADSTREET D&B360 Batch for Oracle On Demand CRM Informatica Upgrade Guide PREPARED ON FRIDAY, MARCH 27, 2015 D&B, Dun & Bradstreet, DUNSRight Quality Process, D-U-N-S Number, www.dnb.com, WorldBase
More informationProxy Access Management Guide for Students
Proxy Access Management Guide for Students This guide explains how College of Charleston students share limited access to certain academic and financial aid information with a parent or legal guardian.
More informationpenelope case management software AUTHENTICATION GUIDE v4.4 and higher
penelope case management software AUTHENTICATION GUIDE v4.4 and higher Last modified: August 9, 2016 TABLE OF CONTENTS Authentication: The basics... 4 About authentication... 4 SSO authentication... 4
More informationReference manual Integrated database authentication
BUSINESS SOFTWARE Reference manual Integrated database authentication Installation and configuration ii This document is intended for Agresso Business World Consultants and customer Super Users, and thus
More information