User Provisioning. Joiner, Mover, Leaver Protected Networks GmbH
|
|
- Ruby Carr
- 6 years ago
- Views:
Transcription
1 User Provisioning Joiner, Mover, Leaver Protected Networks GmbH
2 User Provisioning as a process: joiner, mover & leaver The flexibility of today s working world requires a well thought through user provisioning process. Whether short term appointments, changes of department or temporary project employees, the expectations of the IT department are immense. IT departments are responsible for securing your network, managing access to resources and keeping an overview of permissions and access rights policies. Protected Networks GmbH designates the user provisioning process into three phases: joiners, movers and leavers, allowing for efficient processes and bespoke solutions. When analyzing the roles involved in our provisioning model, you will notice, that the administrator only fills a supervisory role within the process. This is explicitly desired by many of our customers, since modern Administrators have become more like project managers. Like any leadership role, they are thankful for any standard processes that can be efficiently delegated within their organization. Would you like to schedule a bespoke consulting session regarding the 8MAN implementation in your organization? Please contact our experienced systems engineers for more information. Berlin im June 2017 Publisher Protected Networks GmbH Alt-Moabit Berlin Germany Protected-Networks.com 8MAN.com Support helpdesk@8man.com Knowledge Base Knowledge Management Fabian Fischer / Jörg Brandt T: T: Feedback? Stephan Brack Matthias Schulte-Huxel CEO Protected Networks CSO Protected Networks
3 Liability Notice Information provided in this document may change at any given time and without prior notice. Its provision does not entail any kind of legal obligation at Protected Networks s end. The usage of Protected Networks s software 8MAN is outlined in an End User Licence Agreement (EULA). 8MAN must only be used in accordance with its stipulations. Without prior written consent from Protected Networks this document must not be partially or entirely reproduced, transmitted or translated, be it by electronic, mechanical, manual or optical means. This document should be considered part of a framework consisting of Protected Networks s Terms & Conditions, EULA and Privacy Statement to be found on their website. Copyright 8MAN is the registered trademark of a software solution and its related documents and is the intellectual property of Protected Networks. Protected Networks GmbH Alt-Moabit Berlin Berlin, May 2017 Berlin June 2017
4 Content 1 Process overview The Joiner - Phase HR Department GrantMA: Allowing HR employees to request user account creation from the helpdesk... 9 The Help Desk Creating a mailbox ( enable users) Managing addresses Changing mailbox permissions Managing out of office notices Managing mailbox and size The Management of distribution groups Managing distribution group memberships Managing distribution group permissions Changing the moderation of distribution groups Changing the manager of distribution groups Management (Data Owner) Managing SharePoint permissions Changing folder permissions The Mover - Phase Management (Data Owner) Employee Data Owner: Recertification of existing access rights Requesting file server access rights from Data Owners Help Desk Moving objects in Active Directory Modifying group and user attributes Resetting passwords Unlocking user accounts The Leaver - Phase Helpdesk Deactivating a user account Deleting a user account by using the "soft delete" feature Removing a user and their permissions... 58
5 Index Protected Networks GmbH
6 1. Process overview
7 Process overview 7 The Joiner phase: The joiner phase encompasses the onboarding-process. How quickly can user and account be generated? Has the correct user information been entered? Has the employee been added to all mailing lists? Does the new employee have all of his contacts on his company phone? The joiner phase also shows the new employee how professional and organized his new employer s IT department is. Mistakes can be very expensive and wreak havoc on collaboration with partner organizations or related merger activities. The integration of additional domain or OU information can also be negatively affected. 8MANs role and process optimized workflow allows the trigger for new user creation to be set by the HR department. Help Desk only has to check and approve the requested changes. 8Man utilizes templates, which can be defined by IT and Administrators, in order to maintain the overall permissions concept. Depending on the defined role, new employees will receive a batch of basic permissions. Any additional permissions on file servers and SharePoint can be granted by the responsible managers. These socalled Data Owners control the field of play for their employees thereby ensuring that each role is fit for purpose. The mover phase: 8MAN is a very agile and efficient solution, besting even complex IDM systems in scenarios with wideranging and complex organizational changes. If an employee switches departments, the data owner can simply revoke their access rights. At the latest this will happen during the periodic recertification process of all access rights. The new manager receives a new employee with only basic permissions and can then provide the appropriate access rights for that specific role themselves. If the employee requires additional access rights beyond their new department, they can be easily requested from the appropriate data owner via the 8MATE GrantMA self-service Portal. The user account is managed by help desk during the entire user lifecycle. For location changes he can simply change the OU of the user account or make changes to attributes when modifying name or address information. In addition, 8MAN also helps you manage typical tasks such as password resetting or unlocking accounts. The leaver phase: When the employee leaves the organization, HR informs help desk. Help desk can then decommission the user by using the soft delete (for example during parental leave) or by irrevocably deleting it Protected Networks GmbH
8 2. The Joiner - Phase
9 The Joiner - Phase 2.1 HR Department GrantMA: Allowing HR employees to request user account creation from the helpdesk Background / Value The 8MATE GrantMA self-service portal allows HR employees to create user accounts for new employees. Instead of sending user information to IT, the entry and creation of a new user account are combined into one simple step. IT simply has to approve the request. This process is especially useful for departments with high employee turnover and/or a project oriented approach. Step by step process 1. Enter your user name and password. 2. Click on "Login" Protected Networks GmbH 9
10 10 User Provisioning Click on "New Request". Select "new user" and click on "Request".
11 The Joiner - Phase 11 Enter the relevant information for the new user. Fields indicated in red are mandatory or contain invalid entries. After entering all required information click on "Add to shopping cart" Protected Networks GmbH
12 12 User Provisioning Add additional resources if desired. Click on "Order Basket". 1. You can delete an order entry. 2. You must enter a comment. 3. Start the order.
13 The Joiner - Phase Select "My Requests" to view all requests. 2. Filter by "Open". 3. You can see which approvals are next in line. 4. View additional details. 5. Resend a notification to the approver. 6. Cancel your order Protected Networks GmbH
14 14 User Provisioning 2.2 The Help Desk Creating a mailbox ( enable users) Background / Value If your license agreement includes 8MATE for Exchange you can create Mailboxes ( enable users) with 8MAN. Step by step process 1. Select the desired User or distribution group (type: universal). 2. Right-click on the user. You can do this in the Accounts view. 3. Click on "Enable mailbox" from the context menu. This option is only available if no mailbox has been created yet. 1. Determine the Exchange options. 2. You must enter a comment, for example a ticket number. 3. Start the creation of the mailbox.
15 The Joiner - Phase Managing addresses Background / Value With 8MAN you can assign and remove multiple addresses to mailboxes, distribution groups and contacts. The process is documented automatically. Step by step process Use the search field to find the desired mailbox. Right-click on the Mailbox and select "Edit addresses" from the context menu Protected Networks GmbH
16 16 User Provisioning 1. Add an address or delete an existing one. 2. Select the primary address. 3. Double-click the field where you want to enter or change the address. 4. You must enter a comment, for example the ticket number. 5. Start the process.
17 The Joiner - Phase Changing mailbox permissions Background / Value 8MATE Exchange displays the access rights to Mailboxes in the resource view. Mailbox access rights are shown as follows: "Owner", "Full access", Read Access rights" and "Administrate". Additionally you can also assign the following access rights to individual users: "Full access", "Send as" and "Receive as". Step by step process Use the search field to find the desired mailbox. Right-click on the mailbox and select "Modify access rights" from the context menu Protected Networks GmbH
18 18 User Provisioning 1. Use the search field to find the desired account. 2. Use drag & drop to move the account to an access rights column. 3. Click on "Apply". 1. You must enter a comment, for example a ticket number. 2. Start the access rights change.
19 The Joiner - Phase Managing out of office notices Background / Value 8MAN allows help desk to set out of office notices for employees without gaining access to content. Step by step process Use the search field to find the desired mailbox. Right-click on the mailbox and select "Edit Out of Office" from the context menu Protected Networks GmbH
20 20 User Provisioning 1. Determine the out of office settings. 2. You must enter a comment, for example a ticket number. 3. Start the process.
21 The Joiner - Phase Managing mailbox and size Background / Value Managing mailbox size is a common task for help desk. 8MAN allows you to make these quickly and efficiently. Step by step process Use the search field to find the desired mailbox. Right-click on the Mailbox and select "Edit mailbox and size" from the context menu Protected Networks GmbH
22 22 User Provisioning 1. Click on "Customize" to change the mailbox size. 2. Quickly add 1 GB of storage. The increments can be adjusted in the configuration module. 3. Click on the pen icon to edit the maximum size. 4. You must enter a comment, for example a ticket number. 5. Start the process.
23 The Joiner - Phase The Management of distribution groups Enter topic text here Managing distribution group memberships Background / Value 8MAN allows you to manage the members of distribution groups. This includes the addition and removal of recipients as well as the nesting within other groups (parent child relationships). The process is automatically documented. Step by Step process Use the search field to find the desired distribution group Protected Networks GmbH
24 24 User Provisioning 1. You are focusing on the desired group. 2. Right-click on the group and select "Change group memberships". 1. Find an account. 2. Use drag & drop to move the account to a column, to assign a group membership. 3. You can remove memberships with the "Remove" button. 4. You must enter a comment, for example a ticket number. 5. Click on "Immediately".
25 The Joiner - Phase Managing distribution group permissions Background / Value 8MAN allows you to change who can send s from which distribution groups. As usual, this is automatically documented. The most relevant cases are "Send as" and "Send on behalf". The former is especially sensitive since it is not clearly indicated who actually sent the . With "Send on behalf" on the other hand the "deputy" sender is clearly visible. Step by step process Use the search field to find the desired mailing list. 1. Find the desired distribution group. 2. Right-click on the group and select "Modify access rights" from the context menu Protected Networks GmbH
26 26 User Provisioning 1. Use the search function to find the account. 2. Use drag & drop to assign the desired permission. 3. Select an entry and use the context menu to remove a permission. 4. Click on "Apply". 1. Enter a comment. 2. Start the access rights change.
27 The Joiner - Phase Changing the moderation of distribution groups Background / Purpose With 8MAN you can quickly modify the moderation of distribution groups. The process will be documented automatically. If no moderators are nominated the role is filled out by the manager of the group. Step by step process Use the search field to find the desired distribution group. 1. You are focusing in the desired group. 2. Right-click on a group and select "Edit moderation" Protected Networks GmbH
28 28 User Provisioning 1. Enable or disable the moderation of the distribution group. 2. Use the search field to find accounts. 3. Use drag & drop to move accounts to the column"moderators" or "Sender without moderation" (Whitelist). 4. Determine the workflow for rejected messages. 5. You must enter a comment, for example a ticket number. 6. Start the process.
29 The Joiner - Phase Changing the manager of distribution groups Background / Value 8MAN allows you to quickly change managers for distribution groups. The process is automatically documented. In the default settings, managers are the only ones allowed to change the configuration. Step by step process Use the search field to find the desired distribution group. 1. You are focusing on the desired group. 2. Right-click on the group and select "Edit Manager" Protected Networks GmbH
30 30 User Provisioning 1. Use the search field to find the desired accounts. 2. Use drag & drop to move accounts to the column "Moderators" or "Send without moderation" (Whitelist). 3. You can also remove accounts. 4. You must enter a comment, for example a ticket number. 5. Start the process.
31 The Joiner - Phase Management (Data Owner) Managing SharePoint permissions Background / Value 8MATE for SharePoint integrates all SharePoint resources into 8MAN. This way all analytical and management tasks are centralized with access rights management processes for other resources. You can conveniently view all access rights across your network and make changes quickly and efficiently. Step by step process 1. Select "Resources". 2. Navigate to the desired resource. 3. Right-click on the resource and select "Modify access rights" from the context menu. 1. 8MAN switches to the "Permissions" view. 2. Use the search field to find the desired accounts. 3. Use drag & drop to move an account into an access column to assign access rights. 4. Use the context menu to remove a user. 5. Click on "Apply" Protected Networks GmbH
32 32 User Provisioning 1. Verify planned changes. 2. You must enter a comment. 3. Start the change process.
33 The Joiner - Phase Changing folder permissions Background / Value Access rights should be easy to assign and revoke. You can do this quickly and easily for the employees in your department. You don't need any special knowledge of Active Directory and / or file servers. Simply decide what type of access rights you would like to assign: modify or read and execute. In order to maintain data integrity we recommend assigning change rights only to carefully selected employees. Step by step process 1. Use the search field to find the desired directory. 2. Click on the search result Protected Networks GmbH
34 34 User Provisioning 1. 8MAN switches to the "Resources" view. 2. Select a sub-directory if desired by right-clicking on it. 3. Select "Modify access rights...". 1. 8MAN switches to the "Permissions" view. 2. 8MAN shows you the directory that you are working on. You can change this directory. 3. 8MAN shows you all existing access rights in the categories "Modify" and "Read & execute".
35 The Joiner - Phase Use the search field to find the desired user or group. 2. You can enter the content into the clipboard, for example an 8MAN Text. 8MAN will then find known objects and filter them from the text. 3. Use drag & drop to move the users into a column and assign corresponding access rights. 1. The user is added to the column. 2. Click on "Apply" Protected Networks GmbH
36 36 User Provisioning 1. You must enter a comment. 2. Start the access rights change.
37 The Joiner - Phase Protected Networks GmbH
38 3. The Mover - Phase
39 The Mover - Phase Management (Data Owner) Data Owner: Recertification of existing access rights Background / Value Safety regulations demand for the implementation of the principle of least privilege. This is why data owners must check periodically the access rights situation of their resources. With the re-certification process you obtain the possibility to check and change the access rights situation to your resources. You receive an with the instructions to the re-certification process. Then you decide for each user and resource if the access right should stay or be removed. Your desired changes will be transferred automatically to the administrator. Complementary Services Change file server access rights The process in single steps Click "Recertification" Protected Networks GmbH
40 40 User Provisioning Click on "Start new Recertification". Click on one or more directories. The directories selected are shown on the right. Click on "Start new recertification". You can either accept or remove the permissions. Activate all Users which should keep their permissions first. Click on "Accept". Subdirectories are only displayed, if they contain deviating permissions. Please fill in a comment. Your notes will be saved in the system for documentation.
41 The Mover - Phase 41 Do the same for the permissions you want to remove. Your decision is marked in the colum "action". Click on "Final Execute". The Administrator gets a list of your decisions for implementation. Temporary permissions of user accounts, which are also authorized with a permission that never expires, will become ineffective and not be shown in the marked column above. If you click on "Final execute" your administrator receives almost every time an with your desired changes. This is why we recommend to do the recertification in one go Protected Networks GmbH
42 42 User Provisioning 3.2 Employee Requesting file server access rights from Data Owners Background / Value Employees can request access rights to file server directories from Data Owners by using the 8MATE GrantMA self-service portal. You can configure a variety of different processes and involve the relevant decision makers, depending on your security requirements. Additional Services Creating approval workflows Step by step process 1. Enter your username and password. 2. Click "Login".
43 The Mover - Phase 43 Click "New Request". 8MAN will show the person requesting access to new resources the exact resources that are available to them. Select the desired resource and click on "order" Protected Networks GmbH
44 44 User Provisioning 1. Select an access category. 2. Click "add to shopping cart". Add additional resources if desired. Click on "Order Basket".
45 The Mover - Phase Delete the order entries. 2. Add a recipient to your order. You are able to request access for other users. 3. Remove the recipient. You can also remove yourself and only request access for other users. 4. You must enter a comment. 5. Start the request. Once confirmed, 8MAN shows you an overview of your requests. 1. Open or close the detail view of an order. 2. You can see more details. 3. Resend a notification to the approver. 4. Cancel your order Protected Networks GmbH
46 46 User Provisioning 3.3 Help Desk Moving objects in Active Directory Background / Value 8MAN is able to move objects, meaning user accounts, group accounts and computers from one OU into another. This may be required if one of your users moves location or new group policies are applicable. 8MAN fully documents all movement among OUs. Step by step process 1. Use the search field to find the desired object. 2. Right-click on the object. You can do this in the "Accounts" view. Then select "move object". 1. If required change the login which will be used to move the object. 2. Select a destination path. 3. You must enter a comment. 4. Start the process.
47 The Mover - Phase Modifying group and user attributes Background / Value With 8MAN you can easily manage attributes for users accounts in a flat list. All actions are automatically documented. Step by step process 1. Use the search field to find the desired user or group. 2. Right-click on the user or group. You can do this in the accounts view. 1. Change the desired attributes. 2. You must enter a comment. 3. Start the execution Protected Networks GmbH
48 48 User Provisioning Resetting passwords Background / Value Resetting passwords is one of the most common tasks performed by help desks. 8MAN allows an easy and secure way of resetting passwords. All sensitive actions are documented in the log book. If an employee uses native tools to reset a password and illegally tries to access that user account, the incident is captured with AD Logga. Especially sensitive user accounts can be monitored with 8MATE Alerts. Additional services 8MATE AD Logga: Identifying locked accounts 8MATE Alerts: Monitoring a user account Step by step process 1. Use the search field to find the desired user. 2. Right-click on the user and select "reset user password". You can do this in the accounts view.
49 The Mover - Phase Determine your password options. 2. You must enter a comment, for example "ticket number" or "authorized by". 3. Start the reset process Protected Networks GmbH
50 50 User Provisioning Unlocking user accounts Background / Value Unlocking user accounts is one of the most frequently performed action of most help desks. 8MAN makes the password reset revision proof. All actions are documented in the logbook. Additional Services If employees use native tools to unlock a sensitive account, AD Logga will capture all activity. Especially sensitive accounts can be monitored with 8MATE Alerts. AD Logga: Identifying locked user accounts 8MATE Alerts: Monitoring a user account Step by step process 1. Use the search field to find the desired user or group. 2. Right-click on the user or group and select "Unlock user" from the context menu. You can do this in the accounts view.
51 The Mover - Phase You must enter a comment, for example "ticket number" or "authorized by". 2. Start the unlocking process Protected Networks GmbH
52 52 User Provisioning
53 4. The Leaver - Phase 2017 Protected Networks GmbH
54 54 User Provisioning 4.1 Helpdesk Help desks love working with 8MAN. They can complete their tasks more quickly and all documentation is automatically taken care of by 8MAN Deactivating a user account Background / Value If you deactivate an account with 8MAN, this is equivalent to a normal deactivation in Active Directory. The user account remains in the OU. Additional services Deleting a user with soft delete Step by step process 1. Use the search field to find the desired user. 2. Right-click on the user and select "deactivate account" from the context menu. You can do this in the accounts view.
55 The Leaver - Phase You must enter a comment, for example "ticket number" or "authorized by". 2. Start the execution Protected Networks GmbH
56 56 User Provisioning Deleting a user account by using the "soft delete" feature Background / Value When deleting a user with "soft delete" all of their access rights remain intact. The account is moved to a "Recycle-OU" and deactivated. This account can no longer be used since the "Recycle-OU" is part of a strictly limited group policy. Additional Services Setting the "recycle-ou" Step by step process 1. Use the search field to find the desired user. 2. Right-click on the user and select "soft delete account" from the context menu. You can do this in the accounts view.
57 The Leaver - Phase You must enter a comment, for example "ticket number" or "authorized by". 2. Start the process Protected Networks GmbH
58 58 User Provisioning Removing a user and their permissions Background / Value With 8MAN you can delete the user from AD and remove all of their access rights on the file server in one easy action. Additional Services Removing direct permissions in bulk (8MATE Analyze & Act required) Step by step process 1. Use the search field to find the desired user. 2. Right-click on the user and select "Delete account" from the context menu. You can do this in the accounts view. 1. If required change the credentials to remove the access rights. 1. Activate the option "Remove access rights" to avoid unresolved SIDs on file servers. 2. You must enter a comment, for example "ticket number" or "authorized by". 3. Start the process.
59 The Leaver - Phase Protected Networks GmbH
60 60 User Provisioning
Conduent Access and Identity Management AIM. AIM User Guide. For support call, Dallas Service Desk:
Conduent Access and Identity Management AIM AIM User Guide For support call, Dallas Service Desk: 214-841-8108 Email: Helpdesk.ITO@Atos.net 4/5/2018 7:16 AM V1.2 Novell IDM 4.5 2017 Conduent Business Services,
More informationTalent Acquisition Cloud Implementing Scheduling Center 19A
19A 19A Part Number: F12214-01 Copyright 2019, Oracle and/or its affiliates. All rights reserved Authors: OTAC Information Development Team This software and related documentation are provided under a
More informationConduent Access and Identity Management AIM. AIM User Guide. For support call, Dallas Service Desk:
Conduent Access and Identity Management AIM AIM User Guide For support call, Dallas Service Desk: 214-841-8108 Email: Helpdesk.ITO@Atos.net 12/6/2017 10:51 AM V1.1 Novell IDM 4.5 2017 Conduent Business
More informationOne Identity Manager 8.0. IT Shop Administration Guide
One Identity Manager 8.0 IT Shop Administration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationDocAve Governance Automation Online
DocAve Governance Automation Online Business User Guide Service Pack 9 Cumulative Update 6 Issued December 2017 Table of Contents What s New in this Guide... 5 About DocAve Governance Automation Online...
More informationNETWRIX PASSWORD EXPIRATION NOTIFIER
NETWRIX PASSWORD EXPIRATION NOTIFIER ADMINISTRATOR S GUIDE Product Version: 3.3 January 2013 Legal Notice The information in this publication is furnished for information use only, and does not constitute
More informationOracle Taleo Cloud for Midsize (Taleo Business Edition) Release 17B2. What s New
Oracle Taleo Cloud for Midsize (Taleo Business Edition) Release 17B2 What s New TABLE OF CONTENTS REVISION HISTORY... 3 OVERVIEW... 4 RELEASE FEATURE SUMMARY... 4 TALENT CENTER ENHANCEMENTS... 5 My Offer
More informationIBM Security Identity Manager Version Administration Topics
IBM Security Identity Manager Version 6.0.0.5 Administration Topics IBM Security Identity Manager Version 6.0.0.5 Administration Topics ii IBM Security Identity Manager Version 6.0.0.5: Administration
More informationOne Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide
One Identity Active Roles 7.2 Azure AD and Office 365 Management Administrator Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationEntropy Software General Administration & Configuration
Entropy Software General Administration & Configuration V1.02 1 of 34 Contents 1. Customising your Entropy system... 4 1.1 Entering or editing your Organisation s name into Entropy... 4 1.2 Adding a Watermark...
More informationVodafone Secure Device Manager Administration User Guide
Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure
More informationTzunami Deployer Confluence Exporter Guide
Tzunami Deployer Confluence Exporter Guide Supports extraction of Confluence Enterprise contents and migrate to Microsoft SharePoint using Tzunami Deployer. Version 2.7 Table of Content PREFACE... I INTENDED
More informationTrusted Advisor User Guide. inty CASCADE v 2.9.0
Trusted Advisor User Guide inty CASCADE v 2.9.0 Table of Contents 1. Overview... 2 2. Logging in to inty CASCADE... 2 2.1 Forgotten Password... 4 2.2 Password Complexity... 5 3. Home Page... 7 4. Navigation...
More informationWork 365 Help. User Guide IOTAP MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT.
Work 365 Help User Guide IOTAP MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS DOCUMENT. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the rights under
More informationEmployee Portal. Introduction with Screenshots
Employee Portal Introduction with Screenshots Corporate Payroll Services Employee Portal is a Website that allows employees to access and update their contact information and tax records as well as view
More informationEN Engineering s File Transfer System Client User Manual
EN Engineering s File Transfer System Client User Manual 05/30/2017 1 Contents 1. Introduction & Purpose... 3 2. User Access... 3 2.1. User Accounts... 3 2.2. Logging In to ENsured... 3 2.3. Changing a
More informationEasiShare ios User Guide
Copyright 06 Inspire-Tech Pte Ltd. All Rights Reserved. Page of 44 Copyright 06 by Inspire-Tech Pte Ltd. All rights reserved. All trademarks or registered trademarks mentioned in this document are properties
More information1 Covene Cohesion Administrator Guide A Modular Platform for Video Conferencing Management October 9, 2017
1 Covene Cohesion Administrator Guide A Modular Platform for Video Conferencing Management October 9, 2017 Software Version 4.5 Document Revision 1.0 2017 Covene LLC, All Rights Reserved. Covene, the Covene
More informationContents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10
Cloud Service Administrator's Guide 15 R2 March 2016 Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10 Configuring Settings for Microsoft Internet Explorer...
More informationCourse Outline. Microsoft SharePoint Server 2013 for the Site Owner/Power User Course 55035: 2 days Instructor-Led
Microsoft SharePoint Server 2013 for the Site Owner/Power User Course 55035: 2 days Instructor-Led Introduction This two day class is designed for information workers or power users who serve as SharePoint
More informationOne Identity Manager 8.0. Administration Guide for Connecting to a Universal Cloud Interface
One Identity Manager 8.0 Administration Guide for Connecting to a Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationSalesforce Enterprise Edition Upgrade Guide
Salesforce Enterprise Edition Upgrade Guide Salesforce, Spring 16 @salesforcedocs Last updated: February 11, 2016 Copyright 2000 2016 salesforce.com, inc. All rights reserved. Salesforce is a registered
More informationOne Identity Manager 8.0. Target System Base Module Administration Guide
One Identity Manager 8.0 Target System Base Module Administration Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationGDPR Controls and Netwrix Auditor Mapping
GDPR Controls and Netwrix Auditor Mapping www.netwrix.com Toll-free: 888-638-9749 About GDPR The General Data Protection Regulation (GDPR) is a legal act of the European Parliament and the Council (Regulation
More informationPerson Proxy Information
Person Proxy Information General Proxy Information Proxy: A person authorized to act on the behalf of another A student can designate an individual as his/her proxy to have access to designated pages in
More informationOutlook Desktop Application for Windows
Access Your Email There are two common ways to access your mail: via the Outlook Desktop Application and the Outlook Web Application. This document focuses on how to use the Outlook Desktop Application
More informationAvePoint Cloud Governance. Release Notes
AvePoint Cloud Governance Release Notes Table of Contents New Features and Improvements: June 2018... 2 New Features and Improvements: May 2018... 3 New Features and Improvements: April 2018... 4 New Features
More informationOracle Banking Digital Experience
Oracle Banking Digital Experience Core Corporate Admin User Manual Release 17.2.0.0.0 Part No. E88573-01 July 2017 Core Corporate Admin User Manual July 2017 Oracle Financial Services Software Limited
More informationFive critical features
Five critical features you need for effective Office 365 administration www.manageengine.com/active-directory-360 Table of contents 1. 2. 3. Introduction Office 365 management: Five things you can't do
More informationWorkflow Templates in Compliance 360 Version 2018
Workflow Templates in Compliance 360 Version 2018 Workflow Templates 5 Workflow Elements 6 Workflow Teams 6 Workflow Template Changes 6 Create or Edit a Workflow Template 8 Import and Export Workflow Templates
More informationThe essential toolkit for effective AD management: The Integrations Handbook
The essential toolkit for effective AD management: The Integrations Handbook Introduction IT management becomes unwieldy when technicians work with too many applications, even if they're just executing
More informationmyohportal FAQ 07 September 2017 How do I access myohportal? How do I create an account on myohportal?
myohportal FAQ 07 September 2017 This document provides advice to managers using the new myohportal, on how to interact with OH Assist to submit OH referrals, receive reports and track progress of cases.
More informationSERVICE DESCRIPTION & ADDITIONAL TERMS AND CONDITIONS VERSIEGELTE CLOUD. Service description & additional terms and conditions VERSIEGELTE CLOUD
Service description & additional terms and conditions VERSIEGELTE CLOUD Last revised: March 19, 2018 Page 1 of 10 PUBLICATION DETAILS Published by Telekom Deutschland GmbH Landgrabenweg 151 53227 Bonn
More information1 Corporate Reference Build. 2 Overview. Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications
1 Corporate Reference Build Managing the User Lifecycle Across On-Premises and Cloud-Hosted Applications Expediting IAM deployment and minimizing TCO by adopting best practices. 2 Overview 2018 Hitachi
More informationTzunami Deployer Confluence Exporter Guide
Tzunami Deployer Confluence Exporter Guide Supports extraction of Confluence Enterprise contents and migrate to Microsoft SharePoint using Tzunami Deployer. Version 3.2 Table of Contents PREFACE... II
More informationOracle Banking Digital Experience
Oracle Banking Digital Experience Core Corporate Admin User Manual Release 17.1.0.0.0 Part No. E83887-01 March 2017 Core Corporate Admin User Manual March 2017 Oracle Financial Services Software Limited
More informationOne Identity Password Manager User Guide
One Identity Password Manager 5.8.2 User Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationNetwrix Auditor for SQL Server
Netwrix Auditor for SQL Server Quick-Start Guide Version: 9.5 10/25/2017 Legal Notice The information in this publication is furnished for information use only, and does not constitute a commitment from
More informationADVANTA group.cz Strana 1 ze 24
ADVANTA 2.0 System documentation How to configure the system Advanta Part 1. Quick Start Initial Set- up Document Version 1.2. (System version 2.2.2.h) Advanta allows companies using project management
More informationMobile Android Guide for Users
Mobile Android Guide for Users Version 19.01 SP-WX-MBLAND-UG-201706--R019.01 Sage 2017. All rights reserved. This document contains information proprietary to Sage and may not be reproduced, disclosed,
More informationTIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide
TIBCO Managed File Transfer Internet Server Transfer and File Share Clients User's Guide Software Release 8.1 March 2018 Two-Second Advantage 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES
More informationCA IdentityMinder. Glossary
CA IdentityMinder Glossary 12.6.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational
More informationWorking with Groups, Roles, and Users. Selectica, Inc. Selectica Contract Performance Management System
Selectica, Inc. Selectica Contract Performance Management System Copyright 2008 Selectica, Inc. 1740 Technology Drive, Suite 450 San Jose, CA 95110 http://www.selectica.com World rights reserved. You cannot
More informationHwb+ Summer Rollover Guide
Help File Hwb+ Summer Rollover Guide 2016-2017 Customising My Gadgets 1 H-HWB-008 v1.0 This page is intentionally left blank Hwb+ Summer Rollover 2 H-HWB-401 CONTENTS Introduction... 4 Overview... 5 Provisioning
More informationAuthentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide
Authentication Services ActiveRoles Integration Pack 2.1.x Administration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationOracle. Sales Cloud Securing Incentive Compensation. Release 13 (update 17D)
Oracle Sales Cloud Release 13 (update 17D) Release 13 (update 17D) Part Number E89093-01 Copyright 2011-2017, Oracle and/or its affiliates. All rights reserved. Author: Judy Wood This software and related
More informationAcronis Data Cloud Version 7.8
Acronis Data Cloud Version 7.8 PARTNER'S GUIDE Revision: 10/5/2018 Table of contents 1 About this document...3 2 About Acronis Data Cloud...3 2.1 Services and offerings... 3 2.2 User accounts and tenants...
More informationSchneider Electric License Manager
Schneider Electric License Manager EIO0000001070 11/2012 Schneider Electric License Manager User Manual 12/2012 EIO0000001070.01 www.schneider-electric.com The information provided in this documentation
More informationesign Genie Quick Start Guide
#1 Easiest and Most Collaborative Esignature Software Solution Highlights 1. Electronic Signature Scenarios and User Processes esign Genie Quick Start Guide 2. Create Reusable Templates and Send 3. Create
More informationEmployee self-service guide
Employee self-service guide August 2016 (V.2) Contents Important note... 4 Login... 5 How do I know I am on the correct site and my connection is secure?... 5 How do I login?... 6 Username and password...
More informationONE ID Identity and Access Management System
ONE ID Identity and Access Management System Local Registration Authority User Guide Document Identifier: 2274 Version: 1.8 Page 1 Copyright Notice Copyright 2011, ehealth Ontario All rights reserved No
More informationOne Identity Manager 8.0. Administration Guide for Connecting to Azure Active Directory
One Identity Manager 8.0 Administration Guide for Connecting to Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More information55035: Microsoft SharePoint Server 2013 for the Site Owner/Power User
55035: Microsoft SharePoint Server 2013 for the Site Owner/Power User Description This training class is designed for SharePoint Site Owners, Site Collection Administrators and SharePoint Server Administrators
More informationTable of Contents 1. ABOUT THE GIS PANGEA SYSTEM 5 2. HOME DASHBOARD OVERVIEW MANAGER DASHBOARD OVERVIEW 66
Table of Contents 1. ABOUT THE GIS PANGEA SYSTEM 5 PANGEA SYSTEM REQUIREMENTS 5 PANGEA MOBILE COMPATIBILITY 6 LOGGING IN TO PANGEA 6 MANAGING USER ACCOUNT SECURITY AND DELEGATE INFORMATION 13 ABOUT SESSION
More informationDOCUMENTUM D2. User Guide
DOCUMENTUM D2 User Guide Contents 1. Groups... 6 2. Introduction to D2... 7 Access D2... 7 Recommended browsers... 7 Login... 7 First-time login... 7 Installing the Content Transfer Extension... 8 Logout...
More informationAVAYA LEARNING CENTER END USER GUIDE. Avaya Learning Virtual Campus License Registration Guidelines
AVAYA LEARNING CENTER END USER GUIDE Avaya Learning Virtual Campus License Registration Guidelines 1 Avaya Learning Virtual Campus License Registration Guide November 2015 ENROLLMENT REGISTRATION PROCESS
More informationMessage Manager Administrator Guide
Message Manager Administrator Guide Documentation version: 2.0 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or registered
More informationShared CROMERR Services (SCS) Advanced Services Help Desk User Guide
Shared CROMERR Services (SCS) Advanced Services Help Desk User Guide Table of Contents Table of Contents... i List of Exhibits... ii 1 Introduction... 1 1.1 Document Purpose... 1 1.2 Topics Covered...
More informationKACE GO Mobile App 5.0. Getting Started Guide
KACE GO Mobile App 5.0 Getting Started Guide Table of Contents Using the KACE GO Mobile App...3 Getting Started...3 What features are included in this version of the KACE GO Mobile App?...3 How do I access
More informationWelcome To Account Manager 2.0
Account Manager 2.0 Manage Unlimited FileMaker Servers, Databases, Privileges, and Users Effortlessly! The ultimate tool for FileMaker Database Administrators. Welcome To Account Manager 2.0 What Is Account
More informationMicrosoft SharePoint Server 2013 for the Site Owner/Power User
Course 55035A: Microsoft SharePoint Server 2013 for the Site Owner/Power User Course Details Course Outline Module 1: The Role of the Site Owner This module provides an introduction to the topics covered
More informationCA GovernanceMinder. CA IdentityMinder Integration Guide
CA GovernanceMinder CA IdentityMinder Integration Guide 12.6.00 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationVSP16. Venafi Security Professional 16 Course 04 April 2016
VSP16 Venafi Security Professional 16 Course 04 April 2016 VSP16 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for: Enterprise Security Officers
More informationPerson Proxy Information
Person Proxy Information General Proxy Information Proxy: A person authorized to act on the behalf of another A student can designate an individual as his/her proxy to have access to designated pages in
More informationIdentity and Access Management (IAM) Platform User Guide
Identity and Access Management (IAM) Platform User Guide May 2018 Copyright 2018 Exostar LLC. All rights reserved 1 Contents Introduction... 5 Getting Started... 5 Organization and User ID Information...
More informationEMC Documentum Connector for Microsoft SharePoint Farm Solution
EMC Documentum Connector for Microsoft SharePoint Farm Solution Version 7.2 Content Management Guide EMC Corporation Corporate Headquarters Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Legal Notice
More informationOne Identity Starling Identity Analytics & Risk Intelligence. User Guide
One Identity Starling Identity Analytics & Risk Intelligence User Guide Copyright 2019 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationTzunami Deployer AquaLogic Exporter Guide Supports extraction of Web Components on the server and guides migration to Microsoft SharePoint.
Tzunami Deployer AquaLogic Exporter Guide Supports extraction of Web Components on the server and guides migration to Microsoft SharePoint. Version 2.7 Table of Content PREFACE... I INTENDED AUDIENCE...
More informationCentrify for Dropbox Deployment Guide
CENTRIFY DEPLOYMENT GUIDE Centrify for Dropbox Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of
More informationAVANTUS TRAINING PTE PTE LTD LTD
[MS55035]: Microsoft SharePoint Server 2013 for the Site Owner/Power User Length : 2 days Audience(s) : Information Workers, IT Professionals Level : 200 Technology : Microsoft SharePoint Server 2013 Delivery
More informationFiles.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team
Kennesaw State University Information Technology Services Introduces Files.Kennesaw.Edu Presented by the ITS Technology Outreach Team Last Updated 08/12/13 Powered by Xythos Copyright 2006, Xythos Software
More informationAdmin Guide Hosted Applications
Admin Guide Hosted Applications DOCUMENT REVISION DATE: December, 2010 Hosted Applications Admin Guide / Table of Contents Page 2 of 32 Table of Contents OVERVIEW... 3 1. ABOUT THE GUIDE... 3 1.1 AUDIENCE
More informationAT&T Cloud Solutions Portal. Account and User Management Guide
AT&T Cloud Solutions Portal Account and User Management Guide October 2017 1 Legal Disclaimer The information contained in this document should not be duplicated, transmitted, or disclosed, in whole or
More informationMyOffice Employee. User Guide Release 4.1
MyOffice Employee User Guide Release 4.1 Copyright 1996-2014 Sigma Systems Canada Inc. Last Revision: 2015-06-05 Sigma Systems Canada Inc., Toronto, ON, Canada The Programs (which include both the software
More informationOracle. Human Capital Management Cloud Securing HCM. Release 13 (update 18A)
Oracle Human Capital Management Cloud Release 13 (update 18A) Release 13 (update 18A) Part Number E92236-01 Copyright 2011-2018, Oracle and/or its affiliates. All rights reserved. Authors: Suzanne Kinkead,
More informationNovell Identity Manager
Role Mapping Administrator User Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 1.0 August 28, 2009 www.novell.com Novell Identity Manager Role Mapping Administrator 1.0 User GuideNovell Identity
More informationOracle. Human Capital Management Cloud Securing HCM. Release 13 (update 18B)
Oracle Human Capital Management Cloud Release 13 (update 18B) Release 13 (update 18B) Part Number E94246-02 Copyright 2011-2018, Oracle and/or its affiliates. All rights reserved. Authors: Suzanne Kinkead,
More informationOne Identity Manager Administration Guide for Connecting to SharePoint Online
One Identity Manager 8.0.1 Administration Guide for Connecting to Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationAT&T Business Messaging Account Management
Account Management Administrator User Guide July 2016 1 Copyright 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T
More informationTraining Manual for HR Managers ( Business Unit Admin level)
UK Umbrella Service Ltd online DBS applications Training Manual for HR Managers ( Business Unit Admin level) UK Umbrella Service Ltd Page 1 of 12 1 Accessing the system: From the Log In page: https://ukdbschecks.employmentcheck.org.uk/user_login.php
More informationSharePoint Online for Site Administrators
SharePoint Online for Site Administrators Contents SharePoint Online for Site Administrators... 1 Access Your Office 365 SharePoint Website... 2 Make a New Subsite... 4 Permissions... 5 Edit the members
More informationHP Service Manager. Software Version: 9.41 For the supported Windows and UNIX operating systems. Service catalog help topics for printing
HP Service Manager Software Version: 9.41 For the supported Windows and UNIX operating systems Service catalog help topics for printing Document Release Date: September 2015 Software Release Date: September
More informationEnterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3
Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice
More informationEntitlement Management Implementation Guide
Entitlement Management Implementation Guide Salesforce, Winter 16 @salesforcedocs Last updated: October 16, 2015 Copyright 2000 2015 salesforce.com, inc. All rights reserved. Salesforce is a registered
More informationWebAccess Mobile User Guide
www.novell.com/documentation WebAccess Mobile User Guide GroupWise 2012 September 20, 2012 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this
More informationVMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes
VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes Workspace ONE UEM v9.6 Have documentation feedback? Submit
More informationUser Guide. BlackBerry Workspaces for Windows. Version 5.5
User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing
More informationUniversity Health Network (UHN)
University Health Network (UHN) RESOURCE MATCHING AND REFERRAL (RM&R) AND ONLINE REFERRAL BUSINESS INTELLIGENCE TOOL (ORBIT) Policy Governing User Account Management Version: 4.0 Date: Last modified on
More information"Charting the Course to Your Success!" MOC B Implementing Forefront Identity Manager 2010 Course Summary
Description Course Summary This course introduces and explains the features and capabilities of Microsoft Forefront Identity Manager 2010 (FIM), and provides an overview of the solution scenarios that
More informationAccount Management. Administrator Guide. Secure Gateway (SEG) Service Administrative Guides. Revised August 2013
Secure E-Mail Gateway (SEG) Service Administrative Guides Account Management Administrator Guide Revised August 2013 * The Directory Services Connector (DSC) feature is not included as a standard feature
More informationCAQH Solutions TM EnrollHub TM Provider User Guide Chapter 5 Manage Users. Table of Contents
CAQH Solutions TM EnrollHub TM Provider User Guide Chapter 5 Manage Users Table of Contents 5 MANAGE USERS 2 5.1 PROVIDER USER ROLES 3 5.2 ADD NEW USERS 3 5.3 EDIT EXISTING USERS 5 5.4 DELETE EXISTING
More informationTzunami Deployer Oracle WebCenter Interaction Exporter Guide
Tzunami Deployer Oracle WebCenter Interaction Exporter Guide Supports extraction of Oracle WebCenter Interaction components and migrate to Microsoft SharePoint using Tzunami Deployer Version 2.8 Table
More informationTzunami Deployer FileNet Exporter Guide Supports extraction of FileNet contents and migrate to Microsoft SharePoint using Tzunami Deployer.
Tzunami Deployer FileNet Exporter Guide Supports extraction of FileNet contents and migrate to Microsoft SharePoint using Tzunami Deployer. Version 3.2 Table of Content PREFACE... II INTENDED AUDIENCE...
More informationIdentity and Access Management (IAM) Platform User Guide
Identity and Access Management (IAM) Platform User Guide July 2018 Copyright 2018 Exostar LLC. All rights reserved 1 Version Impacts Date Owner Identity and Access Management View Complete Email Address
More informationAVS Portal Security User Guide
AVS Portal Security User Guide Oregon Department of Human Services 2018 TABLE OF CONTENTS I. ACCESS OVERVIEW...2 II. AVS PORTAL.4 2.1 AVS PORTAL LOGIN. 4 2.2 SECURITY USER PORTAL VIEW..5 2.3 SECURITY USER
More informationGroupWise Connector for Outlook
GroupWise Connector for Outlook June 2006 1 Overview The GroupWise Connector for Outlook* allows you to access GroupWise while maintaining your current Outlook behaviors. Instead of connecting to a Microsoft*
More informationSchneider Electric Floating License Manager
Schneider Electric Floating License Manager EIO0000001078 11/2012 Schneider Electric Floating License Manager User Manual 12/2012 EIO0000001078.01 www.schneider-electric.com The information provided in
More informationMicrosoft SharePoint Server 2013 for the Site Owner/Power User Course 55035: 2 days; Instructor-Led
Course 55035: Microsoft SharePoint Server 2013 for the Site Owner/Power User Page 1 of 8 Microsoft SharePoint Server 2013 for the Site Owner/Power User Course 55035: 2 days; Instructor-Led Overview This
More informationK+S Supplier Portal K+S Supplier Portal
K+S Supplier Portal Version 1.4 English Dated: 09/11/2015 K+S Supplier Portal Contact for questions and difficulties Europe & Asia IT Service Center phone: +49 561 9301-1133 email: itsc@k-plus-s.com North
More informationMessage Manager Administrator Guide for ZA
Message Manager Administrator Guide for ZA Documentation version: 2.0 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved. Symantec and the Symantec Logo are trademarks or
More information