Dualog Connection Suite LDAP Server. User Manual and Configuration Guide

Size: px
Start display at page:

Download "Dualog Connection Suite LDAP Server. User Manual and Configuration Guide"

Transcription

1 Dualog Connection Suite LDAP Server User Manual and Configuration Guide Author Vidar Berg Date 10.Nov 2010 Description Revision Number User manual for setting up and maintaining the Dualog Connection Suite DHCP Server. 1.0 Initial document 2.0 Changed doc template Dualog AS (Head Office) Alkeveien 14 N-9015 Tromsø Norway

2 1 Table of Contents 2 Introduction The protocol Features Known limitations Configuration Configuring basics TCP Server Port Access rights to the address books Configuring the client(s) Basics The hostname and port Base DN Bind DN Secure tunnel Configuring maximum time and size Connecting to the LDAP server Searching the directory Performing the search Entries to use for search The % wildcard... 8 Page 2 of 8

3 2 Introduction Dualog LDAP Server allows 3 rd party clients access to the Dualog Connection Suite address book and user accounts. The protocol enabling this is LDAP. In Connection Suite, LDAP is used to let WebMail access the Address Book and list of Connection Suite Users when adding recipients to an . Similarly, Outlook and other clients can be configured for the same purpose. 2.1 The protocol LDAP (Lightweight Directory Access Protocol) is a protocol supported by most major clients out there. It is a directory service that supplies a common interface for looking up names and addresses. 2.2 Features Read access to the Dualog Connection Suite user accounts. Read access to the personal-, ship-, and company global address book stored in Dualog Connection Suite. Searching the Dualog Connection Suite user accounts and address book. 2.3 Known limitations The Dualog LDAP server does not let the user write, modify or add new users to the Dualog Connection Suite address book. Only English letters are supported. addresses can be up to 256 characters long. Page 3 of 8

4 3 Configuration 3.1 Configuring basics TCP Server Port IANA (Internet Assigned Numbers Authority) has specified LDAP to run on TCP port 389. This is the default and will be satisfactory in most cases. In cases where the Dualog LDAP server must run together with other LDAP servers or if something else speaks for running the Dualog LDAP on a different port it can be configured in the Connection Suite user interface. The configuration interface can be found under Config -> System -> Current system in the vessel configuration. On the shore side interface ( it can be found under Remote Config > System -> Current system Access rights to the address books For a user to gain access to the Dualog LDAP server the user must provide his/her Dualog Connection Suite credentials. The Dualog LDAP server then enforces the access restrictions applied by Dualog Connection Suite. These restrictions can be applied either to a user group or to a single user. In addition to the address books, every user in Dualog Connection Suite will have access to the addresses of the other crew members in the same company Functions that affect the Dualog LDAP server Webmail Address book (personal address book) Page 4 of 8

5 Webmail Ship address book Webmail Company address book Note: To configure access rights for user groups you must use the shore side interface ( 3.2 Configuring the client(s) Basics Most clients have an option for adding an LDAP address book. The general settings that must be configured for using LDAP are: Hostname and port Base DN Bind DN Secure TSL/SPA (often a checker) In addition most clients can configure maximum number of responses and maximum number of seconds a search can go on for The hostname and port To be able to connect to the LDAP server the client needs the IP address, port and connection method. The hostname is the IP address of the computer running Dualog Connection Suite; it will always be the same as the address of the mail server. The port is by default 389, but it can be configured differently - consult your IT manager if 389 doesn t work. The Dualog LDAP server always uses clear text passwords and does not understand secure tunnel mechanisms Base DN The Base DN is the starting point for the client in the LDAP address book. If it is empty, the Dualog LDAP server starts at the root but beware, some clients insert their own small tag if the base DN field is empty. (I.e. Microsoft Outlook Express inserts Country=<your country> ) The Dualog LDAP Hierarchy Root of Dualog LDAP Server User accounts Personal address book Ship address book Global address book If the root entry is selected the Dualog LDAP will return results from all the four subcategories Base DNs in Dualog LDAP Server Part of Directory Root User accounts Personal address book Ship address book Global address book Base DN dc=dualog,dc=net ou=staff ou=personaladdressbook ou=shipaddressbook ou=globaladdressbook Page 5 of 8

6 3.2.4 Bind DN In LDAP terminology Bind DN is the same as username. Bind DN must be the username ( address) of the user accessing the LDAP. This will be the same username that you would use when configuring the account. Some clients also let you configure the password while other clients ask for the password when you first send a request to the LDAP server. Please note: The Dualog LDAP server will reject any requests from unauthorized clients Secure tunnel The Dualog LDAP server uses clear text for password authentication. Any attempt at authenticating using TLS, SSL or SPA will result in failure to log on Configuring maximum time and size Maximum time and size of search results are two optional parameters that can be configured. It is recommended to configure some values here to avoid too wide searches to consume unnecessary resources from the Dualog Connection Suite server. Page 6 of 8

7 4 Connecting to the LDAP server When the 3 rd party client attempts to connect to the Dualog LDAP Server the Bind DN (username) will already be ready. The password will always be the same password as for the Dualog Connection Suite account. Note: Only stationary users and users with a valid hire on the vessel can access the Dualog LDAP Server. Page 7 of 8

8 5 Searching the directory 5.1 Performing the search When the client has been authorized the Dualog LDAP Server will start handling search requests. Please note: All search requests are handled case insensitive. 5.2 Entries to use for search The Dualog LDAP Server uses Dualog Connection Suite as base for all the search results created. In this database only and full name are stored. Searches performed on other attributes will end up with no search result. Supported attributes: cn (short for Common Name and represents the full name) displayname (same as cn included for compatibility) mail ( address) 5.3 The % wildcard The Dualog LDAP Server only has one wildcard when searching. % can be used to list every entry in the address book. The % can also be used inside a search. (I.e. master%@vessel.dualog.net to list all address book entries starting with master for the domain vessel.dualog.net) Page 8 of 8

ACS 5.x: LDAP Server Configuration Example

ACS 5.x: LDAP Server Configuration Example ACS 5.x: LDAP Server Configuration Example Document ID: 113473 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Directory Service Authentication Using

More information

How to Set Up External CA VPN Certificates

How to Set Up External CA VPN Certificates To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA

More information

Configuring Embedded LDAP Authentication

Configuring Embedded LDAP Authentication HP Restricted Configuring Embedded LDAP Authentication configure Configuring Embedded LDAP Authentication For HP product models: LaserJet 4345mfp, LaserJet 9040mfp, LaserJet 9050mfp, LaserJet 9500mfp,

More information

Dualog Connection Suite Hardware and Software Requirements

Dualog Connection Suite Hardware and Software Requirements Dualog Connection Suite Hardware and Software Requirements Author: Dualog QA Department Description: Environmental requirements and recommendations running Dualog Connection Suite and Dualog Services Revision

More information

ISBG May LDAP: It s Time. Gabriella Davis - Technical Director The Turtle Partnership

ISBG May LDAP: It s Time. Gabriella Davis - Technical Director The Turtle Partnership ISBG May 2015 LDAP: It s Time Gabriella Davis - Technical Director The Turtle Partnership gabriella@turtlepartnership.com What Is LDAP? Lightweight Directory Access Protocol Standard language for reading

More information

Dualog Connection Suite

Dualog Connection Suite Dualog Connection Suite Release information version 2.36 What s new? Dualog - Product Management Department 31 August 2017 How Dualog delivers Connection Suite Services Services delivered through products

More information

SEARCH GUARD ACTIVE DIRECTORY & LDAP AUTHENTICATION floragunn GmbH - All Rights Reserved

SEARCH GUARD ACTIVE DIRECTORY & LDAP AUTHENTICATION floragunn GmbH - All Rights Reserved SEARCH GUARD ACTIVE DIRECTORY & LDAP AUTHENTICATION 01. LDAP VS ACTIVE DIRECTORY LDAP (Lightweight Directory Access Protocol) an open, vendor-neutral, industry standard application protocol for accessing

More information

Picture to . How-To: ROBIN Tech Note. Version: ENG Datum:

Picture to  . How-To: ROBIN Tech Note. Version: ENG Datum: ROBIN Tech Note Version: 1.0.2 ENG Datum: 7-06-2018 How-To: Picture to e-mail gf2 About this Tech Note This Tech Note is meant for the following Robin products: C03050 - C03058 : Proline SV C03071 - C03074

More information

Configuring EAP-FAST CHAPTER

Configuring EAP-FAST CHAPTER CHAPTER 3 This chapter explains how to configure EAP-FAST module settings, such as connection settings, user credentials, and authentication methods. The following topics are covered in this chapter: Accessing

More information

How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT

How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT Table of Contents TABLE OF CONTENTS 1 BACKGROUND 2 WINDOWS SERVER CONFIGURATION STEPS 2 CONFIGURING USER AUTHENTICATION 3 ACTIVE DIRECTORY

More information

Novell OpenLDAP Configuration

Novell OpenLDAP Configuration Novell OpenLDAP Configuration To access the GoPrint Novell e-directory LDAP Connector configuration screen navigate to: Accounts Authentication Connectors GoPrint provides two connector options, Standard

More information

Authenticating Cisco VCS accounts using LDAP

Authenticating Cisco VCS accounts using LDAP Authenticating Cisco VCS accounts using LDAP Cisco TelePresence Deployment Guide Cisco VCS X6 D14526.04 February 2011 Contents Contents Document revision history... 3 Introduction... 4 Usage... 4 Cisco

More information

LDAP Configuration Guide

LDAP Configuration Guide LDAP Configuration Guide Publication date: 11/8/2017 www.xcalar.com Copyright 2017 Xcalar, Inc. All rights reserved. Table of Contents About this guide 3 Configuring LDAP 4 Before you start 5 Configuring

More information

How do I configure my LPL client to use SSL for incoming mail?

How do I configure my LPL  client to use SSL for incoming mail? How do I configure my LPL email client to use SSL for incoming mail? When you begin using your modern graphical email client program (e.g., Thunderbird, Mac Mail, Outlook), it will present a series of

More information

Cisco Expressway Authenticating Accounts Using LDAP

Cisco Expressway Authenticating Accounts Using LDAP Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4

More information

Sophos UTM Web Application Firewall For: Microsoft Exchange Services

Sophos UTM Web Application Firewall For: Microsoft Exchange Services How to configure: Sophos UTM Web Application Firewall For: Microsoft Exchange Services This guide explains how to configure your Sophos UTM 9.3+ to allow access to the relevant Microsoft Exchange services

More information

Password Change and Mail Client Configuration Guide for sltnet.lk/slt.lk Mail Server

Password Change and Mail Client Configuration Guide for sltnet.lk/slt.lk Mail Server User Guide Password Change and Mail Client Configuration Guide for sltnet.lk/slt.lk Mail Server 2018/05/10 LEGAL INFORMATION Copyright 2018 Sri Lanka Telecom Plc All rights reserved. We reserve the right

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

LDAP Synchronization

LDAP Synchronization LDAP Synchronization Version 1.6 Corresponding Software Version Celonis 4.3 This document is copyright of the Celonis SE. Distribution or reproduction are only permitted by written approval of the Celonis

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.2 D14465.07 June 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

Yong Peng High School System Documentation PC Section

Yong Peng High School System Documentation PC Section Yong Peng High School System Documentation PC Section Kent Ong Date: 26 May 2008 System Engineer Revision 1 Liew Toh Seng System Consultant Table of Contents Preface...1 Network Configuration (Manual Configuration)...1

More information

Grandstream Networks, Inc. LDAP Configuration Guide

Grandstream Networks, Inc. LDAP Configuration Guide Grandstream Networks, Inc. Table of Contents INTRODUCTION... 4 LDAP SERVER CONFIGURATION... 5 LDAP PHONEBOOK... 6 Access the Default Phonebook DN... 6 Add a New Phonebook DN... 7 Add contacts to Phonebook

More information

How to Set Up VPN Certificates

How to Set Up VPN Certificates For the VPN service, you can use either self-signed certificates or certificates that are generated by an external CA. In this article: Before You Begin Before you set up VPN certificates, verify that

More information

Configuring LDAP. Finding Feature Information

Configuring LDAP. Finding Feature Information This chapter describes how to configure the Lightweight Directory Access Protocol (LDAP) on Cisco NX-OS devices. This chapter includes the following sections: Finding Feature Information, page 1 Information

More information

inode Fax Relay Agent Integrated with Windows Fax Services

inode Fax Relay Agent Integrated with Windows Fax Services inode Fax Relay Agent Integrated with Windows Fax Services Users Guide 2008 Dataways Communications inode Fax Relay Agent v1.2.2 October 2008 inode Fax Relay Agent 1.2.2, Published October 2008. Copyright

More information

LDAP/AD v1.0 User Guide

LDAP/AD v1.0 User Guide LDAP/AD v1.0 User Guide For v6.5 systems Catalog No. 11-808-615-01 Important changes are listed in Document revision history at the end of this document. UTC 2017. throughout the world. All trademarks

More information

Configure Settings and Customize Notifications on FindIT Network Probe

Configure  Settings and Customize  Notifications on FindIT Network Probe Configure Email Settings and Customize Email Notifications on FindIT Network Probe Objective Cisco FindIT Network Probe equips a network administrator with indispensable tools that help securely monitor

More information

Configuring Cisco Unified Presence for Integration with Microsoft Exchange Server

Configuring Cisco Unified Presence for Integration with Microsoft Exchange Server CHAPTER 4 Configuring Cisco Unified Presence for Integration with Microsoft Exchange Server Revised: November 30, 2012 Configuring the Presence Gateway on Cisco Unified Presence for Microsoft Exchange

More information

Authenticating and Importing Users with AD and LDAP

Authenticating and Importing Users with AD and LDAP Purpose This document describes how to integrate with Active Directory (AD) or Lightweight Directory Access Protocol (LDAP). This allows user authentication and validation through the interface. This is

More information

Area Access Manager User Guide

Area Access Manager User Guide Area Access Manager User Guide PERPETUAL INNOVATION Lenel OnGuard 2012 Area Access Manager User Guide, product version 6.5 This guide is part 2 of a 2-document suite, item number DOC-800, revision 2.003,

More information

LDAP Directory Integration

LDAP Directory Integration LDAP Server Name, Address, and Profile Configuration, on page 1 with Cisco Unified Communications Manager Task List, on page 1 for Contact Searches on XMPP Clients, on page 6 LDAP Server Name, Address,

More information

Administration Guide

Administration Guide Administration Guide Version 2.0 November, 2015 Biscom, Inc. 321 Billerica Rd. Chelmsford, MA 01824 tel 978-250-1800 fax 978-250-4449 CONTENTS 1. Initial Configuration and Settings...1 1.1 Application...

More information

Authenticating and Importing Users with Active Directory and LDAP

Authenticating and Importing Users with Active Directory and LDAP Purpose This document describes how to integrate Nagios with Active Directory (AD) or Lightweight Directory Access Protocol (LDAP) to allow user authentication and validation with an AD or LDAP infrastructure

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

Active Directory Integration and Interaction with Connect ONSITE

Active Directory Integration and Interaction with Connect ONSITE Application Note - AN17026 MT App Note 17026 (AN 17026) October, 2017 Active Directory Integration and Interaction with Connect ONSITE Description: This Application Note describes how Microsoft Active

More information

Polycom RealPresence Mobile for Android Phone

Polycom RealPresence Mobile for Android Phone Help 3.3 January 2015 3725-69926-004/A Polycom RealPresence Mobile for Android Phone Copyright 2015, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another

More information

Managing Authentication and Identity Services

Managing Authentication and Identity Services You can create access policies based on user identity rather than IP addresses. To enable identity-based services, you configure policies and options to obtain user identity, and then use identity objects

More information

Authorized Send Installation and Configuration Guide Version 3.5

Authorized Send Installation and Configuration Guide Version 3.5 Canon Authorized Send Installation and Configuration Guide Version 3.5 08011-35-UD2-004 This page is intentionally left blank. 2 Authorized Send Installation and Configuration Guide Contents Preface...5

More information

F5 BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.2

F5 BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.2 F5 BIG-IQ Centralized Management: Licensing and Initial Setup Version 5.2 Table of Contents Table of Contents BIG-IQ System Introduction...5 About BIG-IQ Centralized Management... 5 How do I navigate

More information

Import Users From LDAP Directory

Import Users From LDAP Directory LDAP Synchronization Overview, page 1 LDAP Synchronization Prerequisites, page 3 LDAP Synchronization Configuration Task Flow, page 3 LDAP Synchronization Overview Lightweight Directory Access Protocol

More information

7.2. Visitor Management Host User Guide

7.2. Visitor Management Host User Guide 7.2 Visitor Management Host User Guide Lenel OnGuard 7.2 Visitor Management Host User Guide This guide is item number DOC-802, revision 6.005, October 2015 2015 United Technologies Corporation. All rights

More information

LDAP Configuration Guide

LDAP Configuration Guide LIVEACTION, INC. LDAP Configuration Guide CONFIGURATION LiveAction, Inc. 3500 Copyright WEST BAYSHORE 2016 LiveAction, ROAD Inc. All rights reserved. LiveAction, LiveNX, LiveUX, the LiveAction Logo and

More information

CRM Integration LDAP 06/01/2016

CRM Integration LDAP 06/01/2016 CRM Integration LDAP 06/01/2016 CRM Integration LDAP Page 0 CRM Integration Contents Intro... 2 Configuration... 2 Connection... 2 Fields... 2 Show Contact... 3 Testing... 4 CRM Integration LDAP Page 1

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

TrueSight Capacity Optimization 10.x - LDAP Integration with Microsoft Active Directory. January 2017

TrueSight Capacity Optimization 10.x - LDAP Integration with Microsoft Active Directory. January 2017 TrueSight Capacity Optimization 10.x - LDAP Integration with Microsoft Active Directory January 2017 If you plan to use Capacity Views, or other views provided by TrueSight Presentation Server, don t waste

More information

How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity

How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity How to configure the UTM Web Application Firewall for Microsoft Remote Desktop Gateway connectivity This article explains how to configure your Sophos UTM to allow access Microsoft s Remote Desktop Gateway

More information

LDAP Directory Integration

LDAP Directory Integration LDAP Server Name, Address, and Profile Configuration, page 1 with Cisco Unified Communications Manager Task List, page 1 for Contact Searches on XMPP Clients, page 6 LDAP Server Name, Address, and Profile

More information

Authenticating and Importing Users with AD and LDAP

Authenticating and Importing Users with AD and LDAP Purpose This document describes how to integrate with Active Directory (AD) or Lightweight Directory Access Protocol (LDAP). This allows user authentication and validation through the interface. This is

More information

F5 BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.1

F5 BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.1 F5 BIG-IQ Centralized Management: Licensing and Initial Setup Version 5.1 Table of Contents Table of Contents BIG-IQ System Introduction...5 About BIG-IQ System Management...5 About secure communication

More information

S/MIME LDAP address book Secure address book virtual appliance admin setup manual

S/MIME LDAP address book Secure  address book virtual appliance admin setup manual S/MIME LDAP address book Secure email address book virtual appliance admin setup manual Company KeyTalk IT Security BV Author MR van der Sman Creation date 31 August 2018 Last updated 25 January 2019 Product

More information

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources Workspace ONE UEM v9.6 Have documentation feedback? Submit a Documentation Feedback

More information

Configuring Netscape or Thunderbird Mail

Configuring Netscape or Thunderbird Mail April 2004 Configuring Desktop Messaging Configuring Netscape or Thunderbird Mail Introduction This section describes how to configure Netscape Mail 6.2x or later for use with Desktop Messaging. Before

More information

Visitor Management Host User Guide

Visitor Management Host User Guide Visitor Management Host User Guide PERPETUAL INNOVATION Lenel OnGuard 2010 Visitor Management Host User Guide, product version 6.4 This guide is item number DOC-802, revision 1.038, April 2010 Copyright

More information

LAB: Configuring LEAP. Learning Objectives

LAB: Configuring LEAP. Learning Objectives LAB: Configuring LEAP Learning Objectives Configure Cisco ACS Radius server Configure a WLAN to use the 802.1X security protocol and LEAP Authenticate with an access point using 802.1X security and LEAP

More information

Authenticating Devices

Authenticating Devices Authenticating Devices Cisco TelePresence Deployment Guide Cisco VCS X6.1 D14819.01 May 2011 Contents Contents Document revision history... 4 Introduction... 5 Local database... 6 Configuration... 6 H.350

More information

Infoblox Authenticated DHCP

Infoblox Authenticated DHCP Infoblox Authenticated DHCP Unified Visitor Management amigopod Technical Note Revision 1.1 5 July 2010 United States of America +1 (888) 590-0882 Europe, Middle East & Asia +34 91 766 57 22 Australia

More information

Migrating from IBM Lotus Domino to Zimbra Collaboration Suite

Migrating from IBM Lotus Domino to Zimbra Collaboration Suite Migrating from IBM Lotus Domino to Zimbra Collaboration Suite The Zimbra Collaboration Suite (ZCS) Migration Wizard for Lotus Domino is used to migrate IBM Lotus Domino server email accounts to the Zimbra

More information

ForeScout CounterACT. Configuration Guide. Version 4.1

ForeScout CounterACT. Configuration Guide. Version 4.1 ForeScout CounterACT Network Module: VPN Concentrator Plugin Version 4.1 Table of Contents About the VPN Concentrator Plugin... 3 What to Do... 3 Requirements... 3 CounterACT Requirements... 3 Supported

More information

Copyright

Copyright This video looks at Claim Based/Identity Based systems using Active Directory Federation Services as an example. An example of a claim based system is where the user logs into a system like a web page

More information

Integrating YuJa Enterprise Video Platform with LDAP / Active Directory

Integrating YuJa Enterprise Video Platform with LDAP / Active Directory Integrating YuJa Enterprise Video Platform with LDAP / Active Directory 1. Overview This document is intended to guide users on how to integrate Single Sign-On (SSO) capabilities using LDAP/Active Directory

More information

An LDAP server may implement its own schema or a standard schema defined as in RFC Mainstream implementations of LDAP include Netscape

An LDAP server may implement its own schema or a standard schema defined as in RFC Mainstream implementations of LDAP include Netscape Spectrum Software, Inc. 11445 Johns Creek Pkwy. Suite 300 Duluth, GA 30097 www.spectrumscm.com Subject: LDAP Support for SpectrumSCM Original Issue Date: April 26 th, 2003 Update Date: December 13 th,

More information

F5 BIG-IQ Centralized Management: Local Traffic & Network Implementations. Version 5.4

F5 BIG-IQ Centralized Management: Local Traffic & Network Implementations. Version 5.4 F5 BIG-IQ Centralized Management: Local Traffic & Network Implementations Version 5.4 Table of Contents Table of Contents Managing Local Traffic Profiles...7 How do I manage LTM profiles in BIG-IQ?...7

More information

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page. Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator

More information

Security Provider Integration LDAP Server

Security Provider Integration LDAP Server Security Provider Integration LDAP Server 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

Configuring Connector

Configuring Connector CHAPTER 4 Revised: October 7, 2010 Overview This chapter describes how to configure Connector, how to enable Acceptable Usage Policy (AUP) support, and how to configure your users' Web browser to use Connector.

More information

Creating Column Profiles on LDAP Data Objects

Creating Column Profiles on LDAP Data Objects Creating Column Profiles on LDAP Data Objects Copyright Informatica LLC 1993, 2017. Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying,

More information

Adding a POP/IMAP

Adding a POP/IMAP Adding a POP/IMAP Email POP and IMAP are used for webmail (i.e. your company does not have an exchange server). POP and IMAP are two different protocols but are added the same way. The settings are split

More information

Administration Guide. 05 Apr TM and copyright Imagicle spa

Administration Guide. 05 Apr TM and copyright Imagicle spa Administration Guide 05 Apr 2019 TM and copyright 2010-2019 Imagicle spa Table of Contents Administration Guide...1/5 Jabber Gadgets Setup...1/5 Administration Guide Jabber Gadgets Setup The Imagicle Gadget

More information

Forescout. Plugin. Configuration Guide. Version 2.2.4

Forescout. Plugin. Configuration Guide. Version 2.2.4 Forescout Core Extensions Module: External Classifier Plugin Version 2.2.4 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/

More information

3.9.0 January A. Polycom RealPresence Mobile for Apple iphone

3.9.0 January A. Polycom RealPresence Mobile for Apple iphone USER GUIDE 3.9.0 January 2018 3725-69928-009A Polycom RealPresence Mobile for Apple iphone Contents Polycom RealPresence Mobile Modes of Operation... 3 Getting Started with RealPresence Mobile... 4 Get

More information

SchoolBooking LDAP Integration Guide

SchoolBooking LDAP Integration Guide SchoolBooking LDAP Integration Guide Before you start This guide has been written to help you configure SchoolBooking to connect to your LDAP server. Please treat this document as a reference guide, your

More information

Prototype PKD Interface Specification

Prototype PKD Interface Specification Prototype PKD Interface Specification 2nd Edition 2 March 2005 Ministry of Economy, Trade and Industry New Media Development Association History: 2 March, 2005 by H.Shimada P10: Modification of 6 Tree

More information

Deploying F5 with Microsoft Active Directory Federation Services

Deploying F5 with Microsoft Active Directory Federation Services F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services

More information

How to install DBXL in a load balanced

How to install DBXL in a load balanced Page 1 of 11 Product: Database Accelerator (DBXL) How to install DBXL in a load balanced Title: scenario Below you will find an outline of this document s contents. The information in this document applies

More information

DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION. Gabriella Davis The Turtle Partnership

DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION. Gabriella Davis The Turtle Partnership DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION Gabriella Davis The Turtle Partnership In This Session Review possible use cases for multiple directories Understand security implications

More information

ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager. Integration Handbook

ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager. Integration Handbook ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager Integration Handbook Document Version 1.1 Released July 11, 2012 ActivIdentity 4TRESS AAA Web Tokens and F5 APM Integration Handbook

More information

Deploying F5 with Microsoft Active Directory Federation Services

Deploying F5 with Microsoft Active Directory Federation Services F5 Deployment Guide Deploying F5 with Microsoft Active Directory Federation Services This F5 deployment guide provides detailed information on how to deploy Microsoft Active Directory Federation Services

More information

maxecurity Product Suite

maxecurity Product Suite maxecurity Product Suite Domain Administrator s Manual Firmware v2.2 ii Table of Contents BASICS... 1 Understanding how maxecurity products work in your company... 1 Getting started as a Domain Administrator...

More information

MailEnable Connector for Microsoft Outlook

MailEnable Connector for Microsoft Outlook MailEnable Connector for Microsoft Outlook Version 1.41 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for

More information

CN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance.

CN Assignment I. 1. With an example explain how cookies are used in e-commerce application to improve the performance. CN Assignment I 1. With an example explain how cookies are used in e-commerce application to improve the performance. In an e-commerce application, when the user sends a login form to the server, the server

More information

Sugar Corporate 6.4 Administration Guide

Sugar Corporate 6.4 Administration Guide Sugar Corporate 6.4 Administration Guide Sugar Corporate 6.4 Administration Guide Admin Wizard Users Sugar Connect System Email Developer Tools Products and Quotes Bug Tracker Forecasts Contract Types

More information

CounterACT User Directory Plugin

CounterACT User Directory Plugin Version 6.1.2 and Above Table of Contents About the User Directory Plugin... 3 Endpoint User Details... 3 Verify Endpoint Authentication... 3 User Directory Inventory... 4 HTTP Login Action... 5 HTTP Sign

More information

IPv6 Support for LDAP

IPv6 Support for LDAP The Lightweight Directory Access Protocol (LDAP) is an application protocol for accessing and maintaining distributed directory information services over an IP network. The feature module describes the

More information

Avaya Converged Platform 130 Series. idrac9 Best Practices

Avaya Converged Platform 130 Series. idrac9 Best Practices Avaya Converged Platform 130 Series idrac9 Best Practices Release 4.0 December 2018 2018 Avaya Inc. All Rights Reserved Notice While reasonable efforts were made to ensure that the information in this

More information

In this article I will show you how to enable Outlook Web Access with forms based authentication in Exchange Server 2007 Beta 2.

In this article I will show you how to enable Outlook Web Access with forms based authentication in Exchange Server 2007 Beta 2. Exchange 2007 Outlook Web Access Written by Marc Grote - mailto:grotem@it-training-grote.de Abstract In this article I will show you how to enable Outlook Web Access with forms based authentication in

More information

File services. Domains, DNS DHCP. Server Scripts. Intranet and Extranets. Web services. HNC COMPUTING - Network Concepts

File services. Domains, DNS DHCP. Server Scripts. Intranet and Extranets. Web services. HNC COMPUTING - Network Concepts File services Domains, DNS 1 DHCP Server Scripts Intranet and Extranets Web services HNC COMPUTING - Network Concepts A domain is a logical grouping of networked computers that share a central directory

More information

Genesys Interaction Recording Solution Guide. Deploying SpeechMiner for GIR

Genesys Interaction Recording Solution Guide. Deploying SpeechMiner for GIR Genesys Interaction Recording Solution Guide Deploying SpeechMiner for GIR 7/19/2018 Contents 1 Deploying SpeechMiner for GIR 1.1 Installing SpeechMiner 1.2 Upgrading SpeechMiner 1.3 Configuring SpeechMiner

More information

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page. Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator

More information

The LDAP plugin for Fuel documentation

The LDAP plugin for Fuel documentation The LDAP plugin for Fuel documentation Release 3.0-3.0.0-1 Mirantis Inc. July 07, 2016 CONTENTS 1 Plugin Guide 1 1.1 LDAP plugin for Fuel.......................................... 1 1.2 Release notes /

More information

Novell Identity Manager

Novell Identity Manager Role Mapping Administrator User Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 1.0 August 28, 2009 www.novell.com Novell Identity Manager Role Mapping Administrator 1.0 User GuideNovell Identity

More information

Search for Mail Step 3 Click the Accounts button.

Search for Mail Step 3 Click the  Accounts button. Manually Set Up E-mail with Microsoft Outlook Learn how to configure Microsoft Outlook 2003, 2007, 2010, 2013, or 2016 for use with your 1&1 Mail Basic account using the IMAP Protocol. Follow the instructions

More information

Enterprise Steam Installation and Setup

Enterprise Steam Installation and Setup Enterprise Steam Installation and Setup Release H2O.ai Mar 01, 2017 CONTENTS 1 Installing Enterprise Steam 3 1.1 Obtaining the License Key........................................ 3 1.2 Ubuntu Installation............................................

More information

Mail & Deploy Reference Manual. Version 2.0.5

Mail & Deploy Reference Manual. Version 2.0.5 Mail & Deploy Reference Manual Version 2.0.5 Introduction TABLE OF CONTENTS Introduction... 4 General Introduction... 5 Architecture... 6 Server... 6 Repository... 6 Client... 6 Contact Us... 7 Server...

More information

Implementing Security in Windows 2003 Network (70-299)

Implementing Security in Windows 2003 Network (70-299) Implementing Security in Windows 2003 Network (70-299) Level 1 Authorization & Authentication 2h 20m 20s 1.1 Group Strategy 1.2 Group Scopes 1.3 Built-in Groups 1.4 System or Special Groups 1.5 Administrating

More information

MailEnable Connector for Microsoft Outlook

MailEnable Connector for Microsoft Outlook MailEnable Connector for Microsoft Outlook Version 1.36 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for

More information

Webthority can provide single sign-on to web applications using one of the following authentication methods:

Webthority can provide single sign-on to web applications using one of the following authentication methods: Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,

More information

Configuring Security Features on an External AAA Server

Configuring Security Features on an External AAA Server CHAPTER 3 Configuring Security Features on an External AAA Server The authentication, authorization, and accounting (AAA) feature verifies the identity of, grants access to, and tracks the actions of users

More information

How to Configure the Barracuda VPN Client for Windows

How to Configure the Barracuda VPN Client for Windows How to Configure the Barracuda VPN Client for Windows Barracuda VPN Control is the user interface of the VPN Client for Windows for configuring VPN profiles and Barracuda VPN adapter settings as well as

More information

Integrating a directory server

Integrating a directory server Integrating a directory server Knox Manage provides a directory service that integrates a client's directory server through a Lightweight Directory Access Protocol (LDAP)-based Active Directory service

More information

ForeScout CounterACT. Configuration Guide. Version 6.3

ForeScout CounterACT. Configuration Guide. Version 6.3 ForeScout CounterACT Authentication Module: User Directory Plugin Version 6.3 Table of Contents About the User Directory Plugin... 4 Endpoint User Details... 4 Endpoint Authentication... 5 User Directory

More information