1 Proposed PIN P rotection Protection in Banner General 8.0

Size: px
Start display at page:

Download "1 Proposed PIN P rotection Protection in Banner General 8.0"

Transcription

1 Proposed PIN Protection in Proposed PIN Protection in Banner General 8.0 1

2 2 Proposed PIN Protection in Banner General 8.0 ~These Enhancements are under These Enhancements are under Development and may be modified prior to release~

3 Introduction Banner PIN enhancements for Banner 8.0 are currently being developed in response to the growing demand from institutions to protect PIN information in the database NOTE: This enhancement is currently under development. Data Structures and User Interface may be adjusted further prior to release. 3

4 Agenda Overview of Requirements Proposed Enhanced Characteristics of PINs Proposed PIN Encryption Methodology Proposed PIN Reset Mechanism Proposed PIN initial notification mechanism Self Service and Internet Native Banner Changes Summary Question and Answer Session 4

5 Overview 5

6 Overview The Banner General Team is developing Self Service PIN enhancements for Banner 8.0 Requirements for the project include: Enhance the characteristics of PINs to meet industry standards for strong passwords Store PINs in the database as Cryptographic Hash Provide a PIN reset mechanism that is based on providing answers to questions specific to the individual 6

7 Proposed Enhanced Characteristics i of PINs 7

8 Proposed Enhanced Characteristics of PINs Allow minimum PIN length to be configurable by the institution Allow maximum PIN length to be configurable by the institution Allow the institution to designate if an alpha and/or numeric character is required in PIN Ability to restrict re-using PINs (can be set to 0 to turn off this functionality) 8

9 Proposed PIN Encryption Proposed PIN Encryption Terminology and Methodology 9

10 PIN Encryption Terminology Cryptographic Hash Function A hash function with certain additional security properties to make it suitable for use as a primitive in various information security applications, such as authentication and message integrity. A hash function takes a long string (or 'message') of any length as input and produces a fixed length string as output, sometimes termed a message digest or a digital fingerprint. One-Way Hash Function Takes a variable-length input string, the data, and converts it to a fixed-length (generally smaller) output string called a Hash Value Original value cannot be recreated Hash Value Serves as a unique identifier (like a fingerprint) of the input data Can be used to verify whether data has been changed or not Salt Additional text appended to a password before hashing to make the password more random making decryption even enmorediffic difficult Salted Hash The hashed value generated from the original value appended with a salt. i.e. if the password was 'ABC' and the salt was '123' we would generate the hash on ABC123' HASH_SH1 Is a Secure Hash Algorithm (SHA) which produces a 160-bit hash Oracle package DBMS_CRYPTO New for Oracle 10g 10

11 Proposed PIN Encryption Methodology PINs will be stored as a Cryptographic Hash New package GSPCRPT will handle: Procedure for Generating Salt DBMS random function will be used for generating random string Procedure for Salted Hash DBMS_CRYPTO Package SHA-1 Hashing Third Party APIs being modified to handle PIN Hashing and Salt Login Packages being modified to handle PIN Hashing PINs will be converted to Hash Value and compared to the Hash stored in the DB 11

12 Proposed PIN Reset Mechanism 12

13 PIN Reset Mechanism Institutions choose number of questions which must be answered to reset PIN Questions and Answers will have a configurable minimum length (on GUAPPRF) Answers will be salted and hashed to increase security New Encryption Package (GSPCRPT) will handle procedure for salting and hashing of answers using DBMS_CRYPTO Package If a user forgets their PIN User is required to answer questions If Answers are correctly provided, PIN reset is forced User must enter a new PIN and confirm by re-entering 13

14 Initial PIN Notification Mechanism Instead of storing PIN as clear text, PIN is stored as salted hash When PIN is initially set, it is stored as a salted hash. Since we cannot retrieve that value, when we need to deliver the value to a user, the PIN will be reset again and the reset function will deliver the unhashed value via the API to a letter generation functionality (either baseline or homegrown) Initial generation of PIN will insert a record in GURMAIL to indicate that this user has not yet received a PIN Running letter generation will cause the reset function to run again and will deliver the reset value to the.lis file to be used in letters. Two additional Letter Code fields have been added d to GUAPPR. This will allow the institution to specify which letter and/or gets sent to a user when the Admin changes the password or the User changes the password. By providing these separate fields, the institution can send a letter containing i the new PIN if the Admin has set the PIN or they can choose to send a different letter which does not contain the PIN if the PIN has been set by the user. This would alert the user that their PIN has been changed via SS to be sure it was changed by the real user. 14

15 15 Self Service and Internet Native Banner Changes

16 Self Service Changes All packages in Web Tailor/Forms currently call Third Party API for Create and Update Third party API will be modified to store PIN as Salted Hash Self-Service GOATPAD GB_THIRD_PARTY (API) P_CREATE P_UPDATE GSPCRPT (Hash Function) GOBTPAC (Table) DBMS_CRYPTO HASH_SHA 1 16

17 Self Service Changes Login Packages (twbkwbis / twbklogn) will be modified Combine password, Salt and convert to a Hashed Value Gobtpac_pin is retrieved from gobtpac as a hash h value and the two hashes are compared If comparison does not match then Login page is displayed d again for ID/Password re-entry Login Page ID/Password twbkwbis. P_ValLogin GB_THIRD_PARTY F_get_hash GOBTPAC (TABLE) Hash Compare 17

18 Self Service Changes Security Question page will be modified to allow users to choose a predetermined question from a drop down list or create their own question Number of Questions required is configurable Minimum Question and Answer length are configurable 18

19 INB Changes - GUAPPRF Configurable PIN preferences to be added: Minimum Length Maximum Length Digit Required Character Required Restrict Re-Use of Pin (when not being reset by a process or when reset value is set via inb) Configurable Question and Answer preferences to be added: Number of Questions Minimum Question Length Minimum Answer Length Allow User Defined Questions 19

20 INB Changes - GUAPPRF 20

21 INB Changes - GUAPPRF Addition of letter code fields to give institution the ability to send a different letter via hard copy and/or when the PIN is reset by the administrator or the user 21

22 INB Changes - GOATPAD/GOBTPAC Two New Fields for PIN on GOATPAD PIN is shown as ****** to user User must enter identical PIN in both fields If both PINs match, call Third Party API to add salt and hash the PIN Option to create GURMAIL record or not Create a separate tab/block for question/answer so that tab level security can be applied Answers are salted hash Answers displayed as ******** 22

23 23

24 New Data Structure - GOBQSTN New table to store list of questions Table will store Question ID Description Web Display Indicator 24

25 New Data Structure GOBANSR New table will store PIN responses for Self-Service User can either create their own questions or they can choose question from GOBQSTN Table will store PIDM ID of Question Editable Question Hashed Answer Salt 25

26 Modified Data Structures GOBTPAC New column gobtpac_salt Increase length of GOBTPAC_PINPIN GORPAUD Increase length of GORPAUD_PIN PIN GUBPPRF New columns added to GUBPPRF to set new rules for creating PINs Minimum Length Maximum Length Character Required Number Required Restrict Re-use 26

27 Summary PIN Enhancements Available in Banner 8.0 Enhanced Protection for PIN PIN Stored as Salted Hash Answers Stored as Salted Hash More Flexible Settings for Creation of PIN More Flexible Question and Answer Settings Initial PIN or reset PIN to user will be delivered via reset function and GURMAIL record 27

28 Questions & Answers 28

29 Thank You! Cyndy Bunte Rajesh Kumar Les von Holstein Please complete the online class evaluation form Course ID 1351 SunGard, the SunGard logo, Banner, Campus Pipeline, Luminis, PowerCAMPUS, Matrix, and Plus are trademarks or registered trademarks of SunGard Data Systems Inc. or its subsidiaries in the U.S. and other countries. Third-party names and marks referenced herein are trademarks or registered trademarks of their respective owners SunGard. All rights reserved. 29

Banner 8/ Luminis 4 Change Overview. September 24, 2009

Banner 8/ Luminis 4 Change Overview. September 24, 2009 Banner 8/ Luminis 4 Change Overview September 24, 2009 www.sigcorp.com What information will be covered? Banner 8 changes which impact Luminis 4 What information will NOT be covered? Specific Banner 8

More information

Banner Student. Introductions. Course Goals. Name Organization Title/function Job responsibilities Banner experience Expectations

Banner Student. Introductions. Course Goals. Name Organization Title/function Job responsibilities Banner experience Expectations Banner Student Population Selection Introductions Name Organization Title/function Job responsibilities Banner experience Expectations 2 Course Goals This course is intended to teach you to identify key

More information

Highlights from DW4.0.0

Highlights from DW4.0.0 CONNECT TO COMMUNITY. At SunGard Summit, come together as a community dedicated to education. Highlights from DW4.0.0 Presented by: Mark C. Wysoski SunGard Higher Education March 23, 2009 Course ID 0137

More information

Overview Of Banner 7 Channels

Overview Of Banner 7 Channels Overview Of Banner 7 Channels John Morgan, SunGard SCT, Banner Architect Evaluation Code 310 Rock Eagle 2004, Thu., Oct. 21, 3:00 PM Topics of Discussion Introduction to Channels for Banner Overview of

More information

SQL Server Reporting Services

SQL Server Reporting Services SQL Server Reporting Services Presented by: Victoria Katona and Vijay Vasu Arcadia University April 4, 2006 8:30 am 9:30 am April 2-5 Orlando, Florida Session Rules of Etiquette Please turn off your cell

More information

Imagination To Realization

Imagination To Realization Imagination To Realization Introduction to HTML DB (HOT) Presented by: Bih-Shya Gau SunGard Higher Education Monday, April 3, 2006 3:30 5:30 pm April 2-5 Orlando, Florida Session Rules of Etiquette Please

More information

Banner Job Submission 1

Banner Job Submission 1 Welcome to SunGard Banner General Job Submission Introductions Name Organization Title/function Job responsibilities Banner experience Expectations 2 Course Goals This course is intended to teach you to

More information

Banner 8 Security Enhancements Part 1

Banner 8 Security Enhancements Part 1 Banner 8 Security Enhancements Part 1 Presented by: Les von Holstein SunGard Higher Education Tuesday, March 22, 2011 10:00 11:00 Session ID 4582 Focus Group Thank You! George Mason University Georgia

More information

RSA NetWitness Logs. MySQL Enterprise. Event Source Log Configuration Guide. Last Modified: Wednesday, November 15, 2017

RSA NetWitness Logs. MySQL Enterprise. Event Source Log Configuration Guide. Last Modified: Wednesday, November 15, 2017 RSA NetWitness Logs Event Source Log Configuration Guide MySQL Enterprise Last Modified: Wednesday, November 15, 2017 Event Source Product Information: Vendor: MySQL Event Source: MySQL Enterprise Versions:

More information

HIGHER EDUCATION. What can we help you achieve? Workflow Process Modeling Workflow 4.3 Workbook

HIGHER EDUCATION. What can we help you achieve? Workflow Process Modeling Workflow 4.3 Workbook HIGHER EDUCATION What can we help you achieve? Workflow Process Modeling Workflow 4.3 Workbook January 2007 Confidential Business Information --------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

More information

VMware AirWatch and Office 365 Application Data Loss Prevention Policies

VMware AirWatch and Office 365 Application Data Loss Prevention Policies VMware AirWatch and Office 365 Application Data Loss Prevention Policies Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

RSA NetWitness Logs. Trend Micro OfficeScan and Control Manager. Event Source Log Configuration Guide. Last Modified: Thursday, November 30, 2017

RSA NetWitness Logs. Trend Micro OfficeScan and Control Manager. Event Source Log Configuration Guide. Last Modified: Thursday, November 30, 2017 RSA NetWitness Logs Event Source Log Configuration Guide Trend Micro OfficeScan and Control Manager Last Modified: Thursday, November 30, 2017 Event Source Product Information: Vendor: Trend Micro Event

More information

Welcome to SunGard SCT Banner. Introductions. Course Goals. Name Organization Title/function Job responsibilities SCT Banner experience Expectations

Welcome to SunGard SCT Banner. Introductions. Course Goals. Name Organization Title/function Job responsibilities SCT Banner experience Expectations Welcome to SunGard SCT Banner SEVIS Introductions Name Organization Title/function Job responsibilities SCT Banner experience Expectations 2 Course Goals This course is intended to provide you with the

More information

STUDENT Student Self-Service

STUDENT Student Self-Service STUDENT Student Self-Service Document Number: Department: Contact Name: Email: Phone: Version: Last Update: March 28, 2006 Module Name Confidential Business Information This documentation is proprietary

More information

Registration Quick Reference Card for Employees/Associates

Registration Quick Reference Card for Employees/Associates Registration Quick Reference Card for Employees/Associates Welcome! Register an account with ADP to access the services offered by your organization. Using an Organizational Registration Code On your ADP

More information

Imagination To Realization

Imagination To Realization Imagination To Realization Trigger Writing for Fun and Profit Presented by: Larry Holder Database Administrator The University of Tennessee at Martin April 4, 2006 10:30 11:30 am April 2-5 Orlando, Florida

More information

How to Activate Student Log in to the student Registration system (also known as My Community Education or Banner ).

How to Activate Student Log in to the student Registration system (also known as My Community Education or Banner ). How to Activate Student E-Mail 1. Log in to the student Registration system (also known as My Community Education or Banner ). 2. The new account notice shows at the top of the screen once signed in. Click

More information

Security in Confirmit Software - Individual User Settings

Security in Confirmit Software - Individual User Settings Security in Confirmit Software - Individual User Settings Unclassified. Copyright 2017 Confirmit. All Rights Reserved Page 1 of 5 1 Using HTTPS in Confirmit Horizons SSL certificates are installed for

More information

RSA NetWitness Logs. Symantec Critical Systems Protection. Event Source Log Configuration Guide

RSA NetWitness Logs. Symantec Critical Systems Protection. Event Source Log Configuration Guide RSA NetWitness Logs Symantec Critical Systems Protection Last Modified: Monday, July 24, 2017 Event Source Product Information: Vendor: Symantec Event Source: Critical Systems Protection, Data Center Security

More information

Introduction. The Login Page. ADP Workforce Now Navigating in ADP Workforce Now for Managers, Supervisors, and Employees

Introduction. The Login Page. ADP Workforce Now Navigating in ADP Workforce Now for Managers, Supervisors, and Employees ADP Workforce Now Navigating in ADP Workforce Now for Managers, Supervisors, and Employees Introduction In this self-study, you will learn how to navigate in ADP Workforce Now. The features that you will

More information

Administrator IT Guide. Samsung Knox Configure Shared Device

Administrator IT Guide. Samsung Knox Configure Shared Device Administrator IT Guide Samsung Knox Configure Shared Device July 2017 Samsung Knox TM shared device A Samsung Knox shared device enables multiple users, or employees, to access the same device without

More information

RSA NetWitness Logs. Event Source Log Configuration Guide

RSA NetWitness Logs. Event Source Log Configuration Guide RSA NetWitness Logs Event Source Log Configuration Guide EMC VNX (formerly CLARiiON) Last Modified: Friday, May 12, 2017 Event Source Product Information: Vendor: EMC Event Source: VNX / CLARiiON Platforms/Versions:

More information

Banner Student. Introductions. Course Goals. Name Organization Title/function Job responsibilities Banner experience Expectations

Banner Student. Introductions. Course Goals. Name Organization Title/function Job responsibilities Banner experience Expectations Banner Student Tape Load Processing Introductions Name Organization Title/function Job responsibilities Banner experience Expectations 2 Course Goals This course is intended to provide you with the necessary

More information

Registration Quick Reference Card for Employees/Associates

Registration Quick Reference Card for Employees/Associates Registration Quick Reference Card for Employees/Associates Contents Registration... 2 Activate Your Email Address... 8 Activate Your Mobile Phone... 8 Forgot Your User ID/Password?... 9 ADP and the ADP

More information

User Guide. IronKey Workspace Models: W700 Updated: September 2013 IRONKEY WORKSPACE W700 USER GUIDE

User Guide. IronKey Workspace Models: W700 Updated: September 2013 IRONKEY WORKSPACE W700 USER GUIDE User Guide IronKey Workspace Models: W700 Updated: September 2013 PAGE 1 Thank you for your interest in IronKey Workspace W700 by Imation. Imation s Mobile Security Group is committed to creating and developing

More information

Microsoft Intune App Protection Policies Integration. VMware Workspace ONE UEM 1811

Microsoft Intune App Protection Policies Integration. VMware Workspace ONE UEM 1811 Microsoft Intune App Protection Policies Integration VMware Workspace ONE UEM 1811 Microsoft Intune App Protection Policies Integration You can find the most up-to-date technical documentation on the VMware

More information

Administrative Guide

Administrative Guide Administrative Guide Admin Home: Wiley Digital Archives (WDA) Admin pages. Please login using the admin name and password assigned to the institution 1. The first screen shows information about the institution,

More information

RSA NetWitness Logs. Cisco Wireless LAN Controller. Event Source Log Configuration Guide

RSA NetWitness Logs. Cisco Wireless LAN Controller. Event Source Log Configuration Guide RSA NetWitness Logs Event Source Log Configuration Guide Cisco Wireless LAN Controller Last Modified: Thursday, May 11, 2017 Event Source Product Information: Vendor: Cisco Event Source: Wireless LAN Controller

More information

PowerSchool Users Guide for Parents/Guardians

PowerSchool Users Guide for Parents/Guardians PowerSchool Users Guide for Parents/Guardians Introduction PowerSchool's Parent Portal is a tool specifically developed for parents and students that integrates into the PowerSchool Student Information

More information

Banner General Release Guide. Release 9.3 September 2016

Banner General Release Guide. Release 9.3 September 2016 Banner General Release Guide Release 9.3 September 2016 Notices Notices Without limitation: Ellucian, Banner, Colleague, and Luminis are trademarks of the Ellucian group of companies that are registered

More information

VA DAP App ios Users Guide

VA DAP App ios Users Guide VA DAP App ios Users Guide Table of Contents Getting Started with the VA DAP App... 1 Installing the VA DAP App... 1 Logging into the App and Opening Components... 1 Logging out of the VA DAP App... 2

More information

Registration Quick Reference Card for Employees/Associates

Registration Quick Reference Card for Employees/Associates Registration Quick Reference Card for Employees/Associates Contents Registration... 2 Activate Your Email Address... 9 Activate Your Mobile Phone... 9 Forgot Your User ID/Password?... 10 Disclaimers: Employee

More information

Access Online. Navigation Basics. User Guide. Version 2.2 Cardholder and Program Administrator

Access Online. Navigation Basics. User Guide. Version 2.2 Cardholder and Program Administrator Access Online Navigation Basics User Guide Version 2.2 Cardholder and Program Administrator Contents Introduction... 1 Access Online Overview... 2 How We Gather and Manage Transaction Data in Access Online...

More information

Configure Settings and Customize Notifications on FindIT Network Probe

Configure  Settings and Customize  Notifications on FindIT Network Probe Configure Email Settings and Customize Email Notifications on FindIT Network Probe Objective Cisco FindIT Network Probe equips a network administrator with indispensable tools that help securely monitor

More information

RSA NetWitness Logs. Trend Micro InterScan Messaging Security Suite. Event Source Log Configuration Guide. Last Modified: Tuesday, April 25, 2017

RSA NetWitness Logs. Trend Micro InterScan Messaging Security Suite. Event Source Log Configuration Guide. Last Modified: Tuesday, April 25, 2017 RSA NetWitness Logs Event Source Log Configuration Guide Trend Micro InterScan Messaging Security Suite Last Modified: Tuesday, April 25, 2017 Event Source Product Information: Vendor: Trend Micro Event

More information

Protecting SugarCRM with SafeNet Authentication Manager

Protecting SugarCRM with SafeNet Authentication Manager Protecting SugarCRM with SafeNet Authentication Manager Version 8.2 Integration Guide Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document

More information

SSH PK Authentication and Auto login configuration for Chassis Management Controller

SSH PK Authentication and Auto login configuration for Chassis Management Controller SSH PK Authentication and Auto login configuration for Chassis Management Controller Dell technical white paper Dell Engineering May 2016 Author: Elangovan G Revisions Date August 2013 May 2016 Description

More information

BANNER ENTERPRISE IDENTITY SERVICES RELEASE AND UPGRADE GUIDE. Release 8.1.4, Revision 1 July 2011

BANNER ENTERPRISE IDENTITY SERVICES RELEASE AND UPGRADE GUIDE. Release 8.1.4, Revision 1 July 2011 BANNER ENTERPRISE IDENTITY SERVICES RELEASE AND UPGRADE GUIDE Release 8.1.4, Revision 1 July 2011 Trademark, Publishing Statement and Copyright Notice SunGard or its subsidiaries in the U.S. and other

More information

Admin System for User Management

Admin System for User Management Admin System for User Management Contents ADMIN SYSTEM FOR USER MANAGEMENT... 1 CALLING UP AND ACTIVATING USER MANAGEMENT... 1 THE MAIN USER MANAGEMENT WINDOW... 2 Admin System for User Management Calling

More information

Banner Workflow Release Guide. Release 8.3 February 27, 2015

Banner Workflow Release Guide. Release 8.3 February 27, 2015 Banner Workflow Release Guide Release 8.3 February 27, 2015 Without limitation: Ellucian, Banner, Colleague, and Luminis are trademarks of the Ellucian group of companies that are registered in the U.S.

More information

Registration Quick Reference Card for Employees/Associates

Registration Quick Reference Card for Employees/Associates Registration Quick Reference Card for Employees/Associates This document reflects enhancements included in the Fall 2016 release! Contents Registration... 2 Activate Your Email Address... 7 Activate Your

More information

Integration Guide. Dell EMC Data Domain Operating System and Gemalto KeySecure. DD OS and Gemalto KeySecure Integration. Version 6.

Integration Guide. Dell EMC Data Domain Operating System and Gemalto KeySecure. DD OS and Gemalto KeySecure Integration. Version 6. Dell EMC Data Domain Operating System and Gemalto KeySecure Version 6.1 DD OS and Gemalto KeySecure Integration P/N 302-003-978 REV 01 June 2017 This document describes how to configure Gemalto KeySecure

More information

FIPS Security Policy. for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module

FIPS Security Policy. for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module FIPS 140-2 Security Policy for Marvell Semiconductor, Inc. Solaris 2 Cryptographic Module Hardware Version: 88i8925, 88i8922, 88i8945, and 88i8946 Firmware Version: Solaris2-FIPS-FW-V1.0 Document Version:

More information

RSA NetWitness Logs. IBM Domino. Event Source Log Configuration Guide. Last Modified: Thursday, October 19, 2017

RSA NetWitness Logs. IBM Domino. Event Source Log Configuration Guide. Last Modified: Thursday, October 19, 2017 RSA NetWitness Logs Event Source Log Configuration Guide IBM Domino Last Modified: Thursday, October 19, 2017 Event Source Product Information: Vendor: IBM (Lotus) Event Source: Lotus Domino Versions:

More information

Configuring Cisco VPN Concentrator to Support Avaya 96xx Phones Issue 1.0. Issue th October 2009 ABSTRACT

Configuring Cisco VPN Concentrator to Support Avaya 96xx Phones Issue 1.0. Issue th October 2009 ABSTRACT Avaya CAD-SV Configuring Cisco VPN Concentrator to Support Avaya 96xx Phones Issue 1.0 Issue 1.0 30th October 2009 ABSTRACT These Application Notes describe the steps to configure the Cisco VPN 3000 Concentrator

More information

Banner General Common Matching Training Workbook

Banner General Common Matching Training Workbook Banner General Common Matching Training Workbook September 2007 Release 7.5 HIGHER EDUCATION What can we help you achieve? Confidential Business Information -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

More information

Red Hat 3scale 2.3 Accounts

Red Hat 3scale 2.3 Accounts Red Hat 3scale 2.3 Accounts How to manage admin and member rights and invite teammates to use the admin portal. Last Updated: 2019-03-07 Red Hat 3scale 2.3 Accounts How to manage admin and member rights

More information

UNIT - IV Cryptographic Hash Function 31.1

UNIT - IV Cryptographic Hash Function 31.1 UNIT - IV Cryptographic Hash Function 31.1 31-11 SECURITY SERVICES Network security can provide five services. Four of these services are related to the message exchanged using the network. The fifth service

More information

PePWave Mesh Connector User Manual

PePWave Mesh Connector User Manual PePWave Mesh Connector User Manual Document Rev. 1.0 Jun-07 COPYRIGHT & TRADEMARKS Specifications are subject to change without notice. Copyright 1999-2007 PePWave Ltd. All Rights Reserved. PePWave and

More information

Authorized Send User s Guide for imagerunner Machines Version 4.1

Authorized Send User s Guide for imagerunner Machines Version 4.1 Canon Authorized Send User s Guide for imagerunner Machines Version 4.1 08011-41-UD1-003 This page is intentionally left blank. 2 Authorized Send User s Guide for imagerunner Machines Contents Preface...5

More information

Getting Started with the Aloha Community Template for Salesforce Identity

Getting Started with the Aloha Community Template for Salesforce Identity Getting Started with the Aloha Community Template for Salesforce Identity Salesforce, Winter 18 @salesforcedocs Last updated: November 30, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved.

More information

RSA NetWitness Logs. Sophos Enterprise Console Last Modified: Friday, July 21, Event Source Log Configuration Guide

RSA NetWitness Logs. Sophos Enterprise Console Last Modified: Friday, July 21, Event Source Log Configuration Guide RSA NetWitness Logs Event Source Log Configuration Guide Sophos Enterprise Console Last Modified: Friday, July 21, 2017 Event Source Product Information: Vendor: Sophos Event Source: Enterprise Console,

More information

Welcome to SunGard SCT Banner. Introductions. Course Goals

Welcome to SunGard SCT Banner. Introductions. Course Goals Welcome to SunGard SCT Banner Location Management/Housing Introductions Name Organization Title/function Job responsibilities SunGard SCT Banner experience Expectations 2 Course Goals The goal of this

More information

Admin Table is oftr Caoto ntr e s U ntsser Guide Table of Contents Introduction Accessing the Portal

Admin Table is oftr Caoto ntr e s U ntsser Guide Table of Contents Introduction Accessing the Portal Administrator s Table of Contents User Guide Table of Contents Introduction 3 Accessing the Portal 3 Create User Accounts 4 Enable / Disable User Accounts 5 Manage Users from an LDAP Server 5 User Roles

More information

Banner Self-Service Student Admissions Training Workbook

Banner Self-Service Student Admissions Training Workbook Banner Self-Service Student Admissions Training Workbook May 2006 Release 7.3 HIGHER EDUCATION What can we help you achieve? Confidential Business Information -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

More information

2016 TaxSlayer Pro Desktop. Logging in to the Program Usernames/Passwords

2016 TaxSlayer Pro Desktop. Logging in to the Program Usernames/Passwords 2016 TaxSlayer Pro Desktop Logging in to the Program Usernames/Passwords Contents Logging in to the Program... 2 First Time Logging In... 2 Forgot Username/Password Preparer... 4 Logging in as ADMIN...

More information

SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE

SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE SELF SERVICE RESET PASSWORD MANAGEMENT ARCHITECTURE GUIDE Copyright 1998-2017 Tools4ever B.V. All rights reserved. No part of the contents of this user guide may be reproduced or transmitted in any form

More information

RSA NetWitness Logs. IBM Tivoli Identity Manager. Event Source Log Configuration Guide. Last Modified: Monday, March 06, 2017

RSA NetWitness Logs. IBM Tivoli Identity Manager. Event Source Log Configuration Guide. Last Modified: Monday, March 06, 2017 RSA NetWitness Logs Event Source Log Configuration Guide IBM Tivoli Identity Manager Last Modified: Monday, March 06, 2017 Event Source Product Information: Vendor: IBM Event Source: Tivoli Identity Manager

More information

Passwords. CS 166: Introduction to Computer Systems Security. 3/1/18 Passwords J. Liebow-Feeser, B. Palazzi, R. Tamassia, CC BY-SA 2.

Passwords. CS 166: Introduction to Computer Systems Security. 3/1/18 Passwords J. Liebow-Feeser, B. Palazzi, R. Tamassia, CC BY-SA 2. Passwords CS 166: Introduction to Computer Systems Security 1 Source: https://shop.spectator.co.uk/wp-content/uploads/2015/03/open-sesame.jpg 2 Password Authentication 3 What Do These Passwords Have in

More information

QUICK START: SYMANTEC ENDPOINT PROTECTION FOR AMAZON EC2

QUICK START: SYMANTEC ENDPOINT PROTECTION FOR AMAZON EC2 QUICK START: SYMANTEC ENDPOINT PROTECTION FOR AMAZON EC2 Quick Start Guide for Using Symantec Endpoint Protection for Amazon EC2 Quick Start Guide for Using Symantec Endpoint Protection for Amazon EC2

More information

How to Login, Logout and Manage Password (QRG)

How to Login, Logout and Manage Password (QRG) How to Login, Logout and Manage Password (QRG) This Quick Reference Guide covers the following topics: 1. How to login in to the DCC. How to change (reset) your password 3. What to do if you have forgotten

More information

Security Service tools user IDs and passwords

Security Service tools user IDs and passwords IBM Systems - iseries Security Service tools user IDs and passwords Version 5 Release 4 IBM Systems - iseries Security Service tools user IDs and passwords Version 5 Release 4 Note Before using this information

More information

IBM Clinical Development

IBM Clinical Development IBM Clinical Development New User Help Effective: 26 January 2018 Copyright IBM corporation. 2017. IBM Clinical Development 2 TOPICS > > > Click the green icon to jump to the section or use the PDF page

More information

Registration and Login

Registration and Login Registration and Login When a parent accesses txconnect, the following Login page is displayed. The parent needs to register as a new user. How to Register as a New User The registration process is self-administered,

More information

Account Management Settings section. Service Request Settings section

Account Management Settings section. Service Request Settings section WebEx Site Configuration Audit Log The following settings are included in the CSV export of changes to the Configuration > Common Site Settings > Options page of WebEx Site Administration. Account Management

More information

EMC Clariion SAN storage system

EMC Clariion SAN storage system Configuring and Monitoring Dell Configuring and Monitoring an EqualLogic PS Series SAN Storage EMC Clariion SAN storage system eg Enterprise v5.6 eg Enterprise v5.2 Restricted Rights Legend The information

More information

About This Guide. Audience Database administrators should use this guide.

About This Guide. Audience Database administrators should use this guide. P6 EPPM Manual Installation Guide (Oracle Database) for On-Premises Version 17 November 2017 Contents About This Guide... 5 Oracle Database Manual Configuration Overview... 7 Oracle Database Installation...

More information

Computer Security 3/20/18

Computer Security 3/20/18 Authentication Identification: who are you? Authentication: prove it Computer Security 08. Authentication Authorization: you can do it Protocols such as Kerberos combine all three Paul Krzyzanowski Rutgers

More information

STEPHEN F. AUSTIN STATE UNIVERSITY. Banner. General BANNER NAVIGATION GUIDE

STEPHEN F. AUSTIN STATE UNIVERSITY. Banner. General BANNER NAVIGATION GUIDE STEPHEN F. AUSTIN STATE UNIVERSITY Banner General BANNER NAVIGATION GUIDE Revised December 14, 2011 Confidential Business Information This learning guide is based upon SunGard Higher Education Banner documentation.

More information

RingCentral Office. New Admin Setup

RingCentral Office. New Admin Setup RingCentral Office New Admin Setup RingCentral Office New Admin Setup Table of Contents 2 Welcome to RingCentral 2 Activate Your Account 3 Your Account Security 4 Create Your Password 5 Set Your PIN 6

More information

Configuring the Avaya B179 SIP Conference Phone with Avaya Aura Communication Manager 5.X and Avaya Aura Session Manager 6.X v1.0.

Configuring the Avaya B179 SIP Conference Phone with Avaya Aura Communication Manager 5.X and Avaya Aura Session Manager 6.X v1.0. Configuring the Avaya B179 SIP Conference Phone with Avaya Aura Communication Manager 5.X and Avaya Aura Session Manager 6.X v1.0 Abstract These Application Notes describe the steps to configure the Avaya

More information

YubiKey Smart Card Minidriver User Guide. Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n

YubiKey Smart Card Minidriver User Guide. Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n YubiKey Smart Card Minidriver User Guide Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n Copyright 2017 Yubico Inc. All rights reserved. Trademarks

More information

Protect My Ministry Integrated Background Checks for Fellowship One

Protect My Ministry Integrated Background Checks for Fellowship One Protect My Ministry Integrated Background Checks for Fellowship One The Only Background Check Solution Utilizing the Newest Fellowship One API Integration and User Guide 2005-2012 Protect My Ministry Support:

More information

Computer Security. 08. Authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08. Authentication. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08. Authentication Paul Krzyzanowski Rutgers University Spring 2018 1 Authentication Identification: who are you? Authentication: prove it Authorization: you can do it Protocols such

More information

Customer Online Support Demonstration. 1

Customer Online Support Demonstration.  1 Customer Online Support Demonstration 1 Introduction SATHYA is committed to simplifying and improving your support experience. As we launch our enhanced online case management capabilities, you will see

More information

Printer Driver User Guide

Printer Driver User Guide PRINT COPY SCAN FAX TASKalfa 0i TASKalfa i Printer Driver User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change

More information

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018

Distributed Systems. 25. Authentication Paul Krzyzanowski. Rutgers University. Fall 2018 Distributed Systems 25. Authentication Paul Krzyzanowski Rutgers University Fall 2018 2018 Paul Krzyzanowski 1 Authentication For a user (or process): Establish & verify identity Then decide whether to

More information

SecureDoc Disk Encryption Cryptographic Engine

SecureDoc Disk Encryption Cryptographic Engine SecureDoc Disk Encryption Cryptographic Engine Security Policy Abstract: This document specifies Security Policy enforced by the SecureDoc Cryptographic Engine compliant with the requirements of FIPS 140-2

More information

Installation Guide EPMWARE. Version 1.0. EPMWARE, Inc. Published: August, 2015

Installation Guide EPMWARE. Version 1.0. EPMWARE, Inc. Published: August, 2015 Installation Guide EPMWARE Version 1.0 EPMWARE, Inc. Published: August, 2015 Information in this document, including URL and other Internet Web site references, is subject to change without notice. Unless

More information

User Management in Resource Manager

User Management in Resource Manager CHAPTER 8 This section describes how to manage user profiles. Topics in this section include: Overview of User Management, page 8-1 Using User Management, page 8-1 Overview of User Management In Resource

More information

Taming Banner 7 on Oracle 10g

Taming Banner 7 on Oracle 10g SUNGARD SUMMIT 2007 sungardsummit.com 1 Taming Banner 7 on Oracle 10g Presented by: Scott Harden University of Illinois March 20, 2007 Course ID: 58 A Community of Learning Session Rules of Etiquette Please

More information

REST API Operations. 8.0 Release. 12/1/2015 Version 8.0.0

REST API Operations. 8.0 Release. 12/1/2015 Version 8.0.0 REST API Operations 8.0 Release 12/1/2015 Version 8.0.0 Table of Contents Business Object Operations... 3 Search Operations... 6 Security Operations... 8 Service Operations... 11 Business Object Operations

More information

Defender Desktop Login GrIDsure Token User Guide

Defender Desktop Login GrIDsure Token User Guide Desktop Login GrIDsure Token User Guide Introduction This guide describes what the user will see when using Desktop Login with GrIDsure tokens. The logon procedure will vary slightly depending on the platform

More information

CS November 2018

CS November 2018 Authentication Distributed Systems 25. Authentication For a user (or process): Establish & verify identity Then decide whether to allow access to resources (= authorization) Paul Krzyzanowski Rutgers University

More information

CALNET 3 AT&T Billing Consolidator SM

CALNET 3 AT&T Billing Consolidator SM CALNET 3 AT&T Billing Consolidator SM What s new October, 2015 2015 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T

More information

Regions OnePass USER GUIDE. It s time to expect more. Regions Bank Member FDIC Revised

Regions OnePass USER GUIDE. It s time to expect more. Regions Bank Member FDIC Revised Regions OnePass USER GUIDE It s time to expect more. Regions Bank Member FDIC Revised 051616 User Guide Table of Contents Section I. Regions OnePass Basics 3 What Is Regions OnePass? 3 Minimum Browser

More information

Configure IBM Rational Synergy with 3 rd Party LDAP Server. Release

Configure IBM Rational Synergy with 3 rd Party LDAP Server. Release Configure IBM Rational Synergy with 3 rd Party LDAP Server. Release 7.2.1.7 Author: Rooble Babu Madeckal March 29, 2018 This edition applies to IBM Rational Synergy version 7.2.1.7, and to all subsequent

More information

Configuring and Delivering Salesforce as a managed application to XenMobile Users with 3 rd Party SAML IDP (Identity Provider)

Configuring and Delivering Salesforce as a managed application to XenMobile Users with 3 rd Party SAML IDP (Identity Provider) Solution Guide ios Managed Configuration Configuring and Delivering Salesforce as a managed application to XenMobile Users with 3 rd Party SAML IDP (Identity Provider) Solution Guide Citrix.com Solutions

More information

Managing Personally Identifiable Information in P6 Professional

Managing Personally Identifiable Information in P6 Professional P6 Professional Administration Guide Version 17 April 2018 Contents About This Guide... 5 Managing Personally Identifiable Information in P6 Professional... 5 About Consent Notices... 5 About Personally

More information

KEPServerEX V6 Install Guide

KEPServerEX V6 Install Guide KEPServerEX V6 Install Guide Last updated April, 2018 www.kepware.com 1 2018 PTC, Inc. All Rights Reserved. Table of Contents 1. Installing KEPServerEX V6 on a Clean Machine... 1 2. Upgrading from Version

More information

Table of Contents. Page 3

Table of Contents. Page 3 Owner Portal Guide Page 2 Welcome! Welcome to the National Rental Services (NRS) Owner Portal Guide. This guide reviews the features, services and settings associated with the NRS Owner Portal including:

More information

Web Server Admin Guide. Version

Web Server Admin Guide. Version Web Server Admin Guide Version 2018.2 Copyrights 1996-2018 Perforce Software, Inc. and its subsidiaries. All rights reserved. Defect Scribe, Helix ALM, Helix ALM Suite, Helix Issue Management, Helix Requirements

More information

Banner Advancement Advanced Gift and Pledge Processing Training Workbook

Banner Advancement Advanced Gift and Pledge Processing Training Workbook Banner Advancement Advanced Gift and Pledge Processing Training Workbook May 2006 Release 7.3 HIGHER EDUCATION What can we help you achieve? Confidential Business Information -------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

More information

YubiKey Smart Card Minidriver User Guide. Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n

YubiKey Smart Card Minidriver User Guide. Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n YubiKey Smart Card Minidriver User Guide Installation and Usage YubiKey 4, YubiKey 4 Nano, YubiKey 4C, YubiKey 4C Nano, YubiKey NEO, YubiKey NEO-n Copyright 2017 Yubico Inc. All rights reserved. Trademarks

More information

Oracle Eloqua Legacy Authenticated Microsites and Contact Users. Configuration Guide

Oracle Eloqua Legacy Authenticated Microsites and Contact Users. Configuration Guide Oracle Eloqua Legacy Authenticated Microsites and Contact Users Configuration Guide 2019 Oracle Corporation. All rights reserved 04-Jan-2019 Contents 1 Authenticated microsites 3 2 Creating authenticated

More information

SECURE FILE TRANSFER PROTOCOL. EventTracker v8.x and above

SECURE FILE TRANSFER PROTOCOL. EventTracker v8.x and above SECURE FILE TRANSFER PROTOCOL EventTracker v8.x and above Publication Date: January 02, 2019 Abstract This guide provides instructions to configure SFTP logs for User Activities and File Operations. Once

More information

D&B360 Batch for Oracle On Demand CRM

D&B360 Batch for Oracle On Demand CRM DUN & BRADSTREET D&B360 Batch for Oracle On Demand CRM Informatica Upgrade Guide PREPARED ON FRIDAY, MARCH 27, 2015 D&B, Dun & Bradstreet, DUNSRight Quality Process, D-U-N-S Number, www.dnb.com, WorldBase

More information

Proxy Access Management Guide for Students

Proxy Access Management Guide for Students Proxy Access Management Guide for Students This guide explains how College of Charleston students share limited access to certain academic and financial aid information with a parent or legal guardian.

More information

penelope case management software AUTHENTICATION GUIDE v4.4 and higher

penelope case management software AUTHENTICATION GUIDE v4.4 and higher penelope case management software AUTHENTICATION GUIDE v4.4 and higher Last modified: August 9, 2016 TABLE OF CONTENTS Authentication: The basics... 4 About authentication... 4 SSO authentication... 4

More information

Reference manual Integrated database authentication

Reference manual Integrated database authentication BUSINESS SOFTWARE Reference manual Integrated database authentication Installation and configuration ii This document is intended for Agresso Business World Consultants and customer Super Users, and thus

More information