RSA Identity Governance and Lifecycle Collector Data Sheet For IBM Tivoli Directory Server

Size: px
Start display at page:

Download "RSA Identity Governance and Lifecycle Collector Data Sheet For IBM Tivoli Directory Server"

Transcription

1 RSA Identity Governance and Lifecycle Collector Data Sheet For IBM Tivoli Directory Server Version 1.2 June

2 Contact Information RSA Link at contains a knowledgebase that answers common questions and provides solutions to known problems, product documentation, community discussions, and case management. Trademarks RSA, the RSA Logo, and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other trademarks used herein are the property of their respective owners. For a list of RSA trademarks, go to License Agreement This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person. No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability. This software is subject to change without notice and should not be construed as a commitment by EMC. Third-Party Licenses This product may include software developed by parties other than RSA. The text of the license agreements applicable to third-party software in this product may be viewed on the product documentation page on RSA SecurCare Online. By using this product, a user of this product agrees to be fully bound by terms of the license agreements. Note on Encryption Technologies This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption technologies, and current use, import, and export regulations should be followed when using, importing or exporting this product. Distribution Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 2

3 Contents Revision History... 5 Purpose... 6 Supported Software... 6 Identity Data Collector... 7 Prerequisites... 7 Manage Endpoint Credentials Using Password Vault... 7 Configuration... 7 Collector Description... 7 Connection Configuration... 8 Select types of identity data to collect... 9 Map Collector Attributes to User Attributes... 9 Account Data Collector Prerequisites Configuration Collector Description Connection Configuration Select types of account data to collect Mapping for account and user account attributes Mapping for Group attributes Edit User Resolution Rules Edit Member Account Resolution Rules Edit Sub-Group Resolution Rules Entitlement Data Collector Prerequisites Configuration Collector Description Connection Configuration Select types of entitlement data to collect

4 Case 1: Select Users & Enable Collect Groups as Application Roles Case 2: Select Accounts & Enable Collect Groups as Application Roles Case 3: Select Users and Disable Collect Groups as Application Roles Case 4: Select Accounts and Disable Collect Groups as Application Roles Copyrights Trademarks

5 Revision History Revision Number Version 1.0 Version 1.1 Version 1.2 Description IBM Tivoli Directory Server Added instructions for configuring the password vault with RSA Identity Governance and Lifecycle IBM Tivoli Directory Server Identity Data Collector Added instructions for configuring the password vault with RSA Identity Governance and Lifecycle IBM Tivoli Directory Server Account Data Collector and Entitlement Data Collector 5

6 Purpose This data sheet provides the configuration information required to create a new IBM Tivoli Directory Server Identity Data Collector, Account Data Collector and Entitlement Data Collector. Supported Software RSA Identity Management and Governance and later RSA Via Lifecycle and Governance and later RSA Identity Governance and Lifecycle and later Application: IBM Tivoli Directory Server 6.1 and later 6

7 Identity Data Collector Prerequisites Manage Endpoint Credentials Using Password Vault To use a third-party password vault to manage endpoint credentials, perform the following steps. 1. Configure the password vault according to the third-party provider s instructions. 2. Create a new password vault profile in the RSA Identity Governance and Lifecycle system for retrieving the IBM Tivoli Directory password from the vault. See the RSA Identity Governance and Lifecycle Help for more information about creating a password vault profile. Ensure that an IBM Tivoli Directory account has been created at the configured password vault for storing the password. Note: To use the dynamic password feature, step 1 must be completed. If a third-party password vault is not configured, configure the collector with a static password. Configuration The configuration of the Identity data Collector is completed through a number of screens. This section helps you to fill in the values for each screen. Collector Description The following table lists the parameters on the Collector Description screen, while creating the Collector. Collector Name IBM Tivoli Directory Server Identity Data Collector Description IBM Tivoli Directory Server Identity Data Collector Data Source Type IBM Tivoli Directory Server Agent AveksaAgent 7

8 Directory Directory name under which Data Collector is being created e.g. IBM Tivoli Directory Status Active Copy from N/A Scheduled N/A Connection Configuration The following table lists the parameters on the Configuration Information screen, while creating the Collector. For more information about using static or dynamic passwords during collector creation and in the configuration wizard, refer to Manage Endpoint Credentials Using a Password Vault in the prerequisites section. Host <Host name or IP address of the server> Port <Port number of the server (Default non-ssl port: 389 and SSL port: 636)> Bind DN Static Password Dynamic Password <The DN of the ITDS user needed to bind to the directory (for example, cn=orcladmin)> Select this option to provide the password statically/manually. Enter the password for the IBM Tivoli Directory administrator in the area provided. Select this option to use a configured password vault to manage the endpoint credentials. After you select this option, either select a previously configured password vault profile from the drop-down menu, or click Create Profile to add a new password vault profile to use with this connector. RSA Identity Governance and Lifecycle uses this profile to retrieve the appropriate credentials from the password vault during collector deployment and 8

9 connection tests. Disable Paging <Want to enable paging or not (Default: false)> Page Size <Page Size must not exceed MaxPageSize attribute in IBM Tivoli Directory Server. (Default: 1000)> Use SSL <Whether SSL should be used to connect or not. By default, traffic is transmitted unsecured. You can make traffic confidential and secure by using Secure Sockets Layer (SSL) technology. Before you configure SSL at your end, you must first make sure that LDAP over SSL (also known as LDAPS or LDAP over TLS) is enabled on your LDAP server. LDAP connections are not enabled by default. SSL should be used if you wish to add users with passwords or to change their domain passwords> Skip Certificate Validation <Whether Certificate validation should be skipped or not. (Default: false)> WARNING: NOT RECOMMENDED as it skips certificate chain validation Select Certificate <Lists down the certificates fetched from the server. Selected certificate will be appeared in PEM format in Certificate field> Certificate <Certificate retrieved from IBM Tivoli Directory Server in PEM format> Note: Keep this field blank if one wants to use default truststore of JVM or Server Select types of identity data to collect The following table lists the parameters for the select types of identity data to collect. Users <Enable the check-box to collect user identities. (Default: true)> Map Collector Attributes to User Attributes The following table lists the parameters on the Map Collector Attribute to User Attributes screen, while creating the Collector. 9

10 User Base DN <Base DN of the ITDS user from where user identities are to be collected. (for e.g.: ou=testusers,dc=aveksa,dc=com)> User Search Scope <Define the search scope for collection. (for e.g., sub-tree or one level)> User Search filter <Searches the users based on the provided filter e.g. (objectclass=inetorgperson), (&(objectclass=orcluser)(objectclass=orcluserv2)) etc.> User ID <Any unique value for the users. (Default: cn)> Business Unit Id <Business Unit Id> Backup Supervisor <Backup Supervisor> Address <mail attribute of the user> First Name <givenname attribute of the user> Is Terminated <Is terminated attribute of the user> Last Name <sn attribute of the user> Termination Date <Termination date of the user> Title <title attribute of the user e.g. title, dn etc.> Unique Id <uid attribute of the user> Account Data Collector Prerequisites The following software must be installed on your network before configuring the collector: 10

11 IBM Tivoli Directory Server (ITDS) Configuration The configuration of the Account data Collector is completed through a number of screens. This section helps you to fill in the values for each screen. Collector Description The following table lists the parameters on the Collector Description screen, while creating the Collector. Collector Name IBM Tivoli Directory Server Account Data Collector Description IBM Tivoli Directory Server s Account Data Collector Data Source Type Ldap Agent AveksaAgent Directory Directory name under which Account Data Collector is being created e.g. ITDS, Ldap Directory etc. While creating directory, make sure that radio buttons Allow Account Disabling and Allow Account Locking should be clicked to option Yes Status Active Copy from N/A Scheduled N/A Connection Configuration The following table lists the parameters on the Configuration Information screen, while creating the Collector. For more information about using static or dynamic passwords during collector creation and in the configuration wizard, refer to Manage Endpoint Credentials Using a Password Vault. 11

12 Host <Host name or IP address of the server> Port <Port number of the server (Default non-ssl port: 389 and SSL port: 636)> Bind DN <The DN of the ITDS user needed to bind to the directory (for example, cn=orcladmin)> Static Password Dynamic Password Select this option to provide the password statically/manually. Enter the password for the IBM Tivoli Directory administrator in the area provided. Select this option to use a configured password vault to manage the endpoint credentials. After you select this option, either select a previously configured password vault profile from the drop-down menu, or click Create Profile to add a new password vault profile to use with this connector. RSA Identity Governance and Lifecycle uses this profile to retrieve the appropriate credentials from the password vault during collector deployment and connection tests. Disable Paging <Want to enable paging or not (Default: false)> Page Size <Page Size must not exceed MaxPageSize attribute in IBM Tivoli Directory Server. (Default: 1000)> Use SSL <Whether SSL should be used to connect or not. By default, traffic is transmitted unsecured. You can make traffic confidential and secure by using Secure Sockets Layer (SSL) technology. Before you configure SSL at your end, you must first make sure that LDAP over SSL (also known as LDAPS or LDAP over TLS) is enabled on your LDAP server. LDAP connections are not enabled by default. SSL should be used if you wish to add users with passwords or to change their domain passwords> Skip Certificate <Whether Certificate validation should be skipped or not. (Default: 12

13 Validation false)> WARNING: NOT RECOMMENDED as it skips certificate chain validation Select Certificate <Lists down the certificates fetched from the server. Selected certificate will be appeared in PEM format in Certificate field> Certificate <Certificate retrieved from IBM Tivoli Directory Server in PEM format> Note: Keep this field blank if one wants to use default truststore of JVM or Server Select types of account data to collect The following table lists the parameters for the select types of identity data to collect. Accounts <Enable the check-box to collect accounts. (Default: false)> User Account Mappings <Enable the check-box to collect user account mappings. (Default: false)> Groups <Enable the check-box to collect groups. (Default: false)> Mapping for account and user account attributes The following table lists the parameters on the Mapping for account and user account attributes screen. Account Base DN <Base DN of the ITDS account from where accounts are to be collected. (for e.g.: ou=testusers,dc=aveksa,dc=com)> Account Search Scope <Define the search scope for collection. (for e.g., sub-tree or one level)> 13

14 Account Search filter <Searches the accounts based on the provided filter (for e.g. (objectclass=inetorgperson))> Account ID <Any unique value for the accounts. (Default: cn)> Account Disabled ibm-pwdaccountlocked Account Locked ibm-pwdaccountlocked External id Dn User ID <Any unique value for the users. (Default: dn)> Mapping for Group attributes The following table lists the parameters on the Mapping for group attributes screen. Group Base DN <Base DN for group starting from where groups are to be collected. (for e.g.: ou=testgroups,dc=aveksa,dc=com)> Group Search Scope <Define the search scope for collection. (for e.g., sub-tree or one level)> Group Search filter <Searches the groups based on the provided filter. (Default: (objectclass=groupofnames))> Collect Primary Group Members <enable the check-box if primary group member collection is desired. (Default: false)> Group ID/Name <Any unique value for the groups. (Default: cn)> Member of Group <member attribute for group. (Default: member)> 14

15 External Id distinguishedname Owner <Attribute to map to the group owner> Edit User Resolution Rules The following table lists the parameters on the Edit user resolution rules screen. Target Collector <Any created LDAP IDC. (Default: Users)> User Attribute <Unique attribute for mapping. (Default: User Id)> Edit Member Account Resolution Rules The following table lists the parameters on the Edit member account resolution rules screen. Target Collector <ITDS Account Data Collector> Account Attribute < External id > Edit Sub-Group Resolution Rules The following table lists the parameters on the Edit subgroup resolution rules screen. Target Collector <ITDS Account Data Collector> Group Attribute < External id > 15

16 Entitlement Data Collector Prerequisites The following software must be installed on your network before configuring the collector: IBM Tivoli Directory Server (ITDS) Configuration The configuration of the Entitlement data collector is completed through a number of screens. This section helps you to fill in the values for each screen. Collector Description The following table lists the parameters on the Collector Description screen, while creating the Collector. Collector Name IBM Tivoli Directory Server Entitlement Data Collector Description IBM Tivoli Directory Server s Entitlement Data Collector Data Source Type Ldap Agent AveksaAgent Directory Directory name under which Entitlement Data Collector is being created e.g. ITDS, Ldap Directory etc. While creating directory, make sure that radio buttons Allow Account Disabling and Allow Account Locking should be clicked to option Yes Status Active Copy from N/A Scheduled N/A 16

17 Connection Configuration The following table lists the parameters displayed on the Configuration Information screen during collector creation. For more information about using static or dynamic passwords during collector creation and in the configuration wizard, refer to Manage Endpoint Credentials Using a Password Vault Host <Host name or IP address of the server> Port <Port number of the server (Default non-ssl port: 389 and SSL port: 636)> Bind DN Static Password Dynamic Password <The DN of the ITDS user needed to bind to the directory (for example, cn=orcladmin)> Select this option to provide the password statically/manually. Enter the password for the IBM Tivoli Directory administrator in the area provided. Select this option to use a configured password vault to manage the endpoint credentials. After you select this option, either select a previously configured password vault profile from the drop-down menu, or click Create Profile to add a new password vault profile to use with this connector. RSA Identity Governance and Lifecycle uses this profile to retrieve the appropriate credentials from the password vault during collector deployment and connection tests. Disable Paging <Want to enable paging or not (Default: false)> Page Size <Page Size must not exceed MaxPageSize attribute in IBM Tivoli Directory Server. (Default: 1000)> Use SSL <Whether SSL should be used to connect or not. By default, traffic is transmitted unsecured. You can make traffic confidential and secure by using Secure Sockets Layer (SSL) technology. Before you configure SSL at your end, you must first make sure that LDAP over SSL (also known as 17

18 LDAPS or LDAP over TLS) is enabled on your LDAP server. LDAP connections are not enabled by default. SSL should be used if you wish to add users with passwords or to change their domain passwords> Skip Certificate Validation <Whether Certificate validation should be skipped or not. (Default: false)> WARNING: NOT RECOMMENDED as it skips certificate chain validation Select Certificate <Lists down the certificates fetched from the server. Selected certificate will be appeared in PEM format in Certificate field> Certificate <Certificate retrieved from IBM Tivoli Directory Server in PEM format> Note: Keep this field blank if one wants to use default truststore of JVM or Server Select types of entitlement data to collect Case 1: Select Users & Enable Collect Groups as Application Roles User Data Attribute Modeling Options User Base DN <Base DN of the ITDS user from where users are to be collected. (for e.g.: ou=testusers,dc=aveksa,dc=com)> User Search Scope <Define the search scope for collection. (for e.g., sub-tree or one level)> User Search filter <Searches the users based on the provided filter (for e.g. (objectclass=inetorgperson))> User ID <Any unique value for the users. (Default: cn)> Custom Attributes <The attribute names specified in 'Collect attribute value as resource' and 'Collect attribute value as application role' will be stored as the custom attribute selected> Collect attribute name values as resource-action pairs 18

19 Attributes To Extract <List of attributes to extract> Collect attribute value as resource Attributes To Extract <List of attributes to extract> Collect attribute value as application role Attributes To Extract <List of attributes to extract> Note: At least one of the above listed three MUST be selected. Mapping for group attributes Group Base DN <Base DN for group starting from where groups are to be collected. (for e.g.: ou=testgroups,dc=aveksa,dc=com)> Group Search Scope <Define the search scope for collection. (for e.g., sub-tree or one level)> Group Search filter <Searches the groups based on the provided filter. (Default: (objectclass= groupofnames))> Group ID/Name <Any unique value for the groups. (Default: cn)> Member of Group <member attribute for group. (Default: member)> 19

20 Entitled User Evaluation Associated Identity Collector <Created LDAP Identity Collector> Entitled user value evaluates to <User Id> Case 2: Select Accounts & Enable Collect Groups as Application Roles Account Data Attribute Modeling Options Account Base DN <Base DN of the ITDS account starting from where accounts are to be collected. (for e.g.: ou=testusers,dc=aveksa,dc=com)> Account Search Scope <Define the search scope for collection. (for e.g., sub-tree or one level)> Account Search filter <Searches the accounts based on the provided filter>(for e.g. (objectclass=inetorgperson)) Account ID <Any unique value for the accounts. (Default: cn)> Custom Attributes <The attribute names specified in 'Collect attribute value as resource' and 'Collect attribute value as application role' will be stored as the custom attribute selected> Collect attribute name values as resource-action pairs Attributes To Extract <List of attributes to extract> 20

21 Collect attribute value as resource Attributes To Extract <List of attributes to extract> Collect attribute value as application role Attributes To Extract <List of attributes to extract> Note: At least one of the above listed three MUST be selected. Mapping for group attributes Group Base DN <Base DN for group starting from where groups are to be collected. (for e.g.: ou=testgroups,dc=aveksa,dc=com)> Group Search Scope <Define the search scope for collection. (for e.g., sub-tree or one level)> Group Search filter <Searches the groups based on the provided filter. (Default: (objectclass=groupofnames))> Group ID/Name <Any unique value for the groups. (Default: cn)> Member of Group <member attribute for group. (Default: member)> 21

22 Account Evaluation Associated Account Collector <Created LDAP Account Collector> Account value evaluates to <Account Name> Case 3: Select Users and Disable Collect Groups as Application Roles User Data Attribute Modeling Options User Base DN <Base DN of the ITDS user from where users are to be collected. (for e.g.: ou=testusers,dc=aveksa,dc=com)> User Search Scope <Define the search scope for collection. (for e.g., sub-tree or one level)> User Search filter <Searches the users based on the provided filter>(for e.g. (objectclass=inetorgperson)) User ID <Any unique value for the users. (Default: cn)> Custom Attributes <The attribute names specified in 'Collect attribute value as resource' and 'Collect attribute value as application role' will be stored as the custom attribute selected> Collect attribute name values as resource-action pairs 22

23 Attributes To Extract <List of attributes to extract> Collect attribute value as resource Attributes To Extract <List of attributes to extract> Collect attribute value as application role Attributes To Extract <List of attributes to extract> Note: At least one of the above listed three MUST be selected. Entitled User Evaluation Associated Identity Collector <Created LDAP Identity Collector> Entitled user value evaluates to <User Id> Case 4: Select Accounts and Disable Collect Groups as Application Roles Account Data Attribute Modeling Options 23

24 Account Base DN <Base DN of the ITDS account starting from where accounts are to be collected. (for e.g.: ou=testusers,dc=aveksa,dc=com)> Account Search Scope <Define the search scope for collection. (for e.g., sub-tree or one level)> Account Search filter <Searches the accounts based on the provided filter>(for e.g. (objectclass=inetorgperson)) Account ID <Any unique value for the accounts. (Default: cn)> Custom Attributes <The attribute names specified in 'Collect attribute value as resource' and 'Collect attribute value as application role' will be stored as the custom attribute selected> Collect attribute name values as resource-action pairs Attributes To Extract <List of attributes to extract> Collect attribute value as resource Attributes To Extract <List of attributes to extract> Collect attribute value as application role Attributes To Extract <List of attributes to extract> Note: At least one of the above listed three MUST be selected. 24

25 Account Evaluation Associated Account Collector <Created LDAP Account Collector> Account value evaluates to <Account Name> Copyrights Copyright 2017 EMC Corporation. All Rights Reserved. Published in the USA. Trademarks RSA, the RSA Logo, and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other trademarks used herein are the property of their respective owners. For a list of EMC trademarks, go to 25

RSA Identity Governance and Lifecycle Collector Data Sheet For Open LDAP

RSA Identity Governance and Lifecycle Collector Data Sheet For Open LDAP RSA Identity Governance and Lifecycle Collector Data Sheet For Open LDAP Version 1.1 July 2017 Table of Contents RSA Identity Governance and Lifecycle Collector Datasheet for Open LDAP Purpose... 4 Supported

More information

RSA Archer GRC Application Guide

RSA Archer GRC Application Guide RSA Archer GRC Application Guide Version 1.2 vember 2017 Contact Information RSA Link at https://community.rsa.com contains a knowledgebase that answers common questions and provides solutions to known

More information

RSA Identity Governance and Lifecycle Data Sheet for IBM Tivoli Directory Server Connector

RSA Identity Governance and Lifecycle Data Sheet for IBM Tivoli Directory Server Connector RSA Identity Governance and Lifecycle Data Sheet for IBM Tivoli Directory Server Connector Version 1.1 March 2017 Contents PURPOSE... 4 SUPPO RTED SOFTWARE... 4 PREREQUISITES... 4 CONFIGURATION... 6 General...

More information

Lieberman Software Rapid Enterprise Defense Identity Management Application Guide

Lieberman Software Rapid Enterprise Defense Identity Management Application Guide Lieberman Software Rapid Enterprise Defense Identity Management Application Guide Contact Information RSA Link at https://community.rsa.com contains a knowledgebase that answers common questions and provides

More information

RSA Authentication Manager 7.1 Help Desk Administrator s Guide

RSA Authentication Manager 7.1 Help Desk Administrator s Guide RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

Trademarks. License Agreement. Third-Party Licenses. Note on Encryption Technologies. Distribution

Trademarks. License Agreement. Third-Party Licenses. Note on Encryption Technologies. Distribution Copyright 2017 EMC Corporation. All Rights Reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries.

More information

CRYPTOCard Migration Agent for CRYPTO-MAS

CRYPTOCard Migration Agent for CRYPTO-MAS CRYPTOCard Migration Agent for CRYPTO-MAS Version 1.0 2009 CRYPTOCard Corp. All rights reserved. http://www.cryptocard.com Trademarks CRYPTOCard and the CRYPTOCard logo are registered trademarks of CRYPTOCard

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for Tableau Server All information herein is either public information or is the property of

More information

RSA Identity Governance and Lifecycle Connector Data Sheet for Oracle Internet Directory

RSA Identity Governance and Lifecycle Connector Data Sheet for Oracle Internet Directory Connector Data Sheet for Oracle Internet Directory Version 1.2 vember 2017 Oracle Internet Directory Connector Datasheet Table of Contents Purpose... 4 Supported Software... 4 Prerequisites... 4 CONFIGURATION...

More information

RSA Identity Governance and Lifecycle Collector Data Sheet for Zendesk

RSA Identity Governance and Lifecycle Collector Data Sheet for Zendesk RSA Identity Governance and Lifecycle Collector Data Sheet for Zendesk Version 1.1 December 2017 Contents Purpose... 4 Supported Software... 4 Prerequisites... 4 Account Data Collector... 4 Configuration...

More information

RSA Authentication Manager 7.1 Migration Guide

RSA Authentication Manager 7.1 Migration Guide RSA Authentication Manager 7.1 Migration Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo are

More information

RSA Identity Governance and Lifecycle Connector Data Sheet for OpenLDAP

RSA Identity Governance and Lifecycle Connector Data Sheet for OpenLDAP Connector Data Sheet for OpenLDAP Version 1.2 vember 2017 Table of Contents Purpose... 4 Supported Software... 4 Prerequisites... 4 SSL communication... 4 Manage Endpoint Credentials Using a Password Vault...

More information

RSA Authentication Manager 8.0 Security Configuration Guide

RSA Authentication Manager 8.0 Security Configuration Guide RSA Authentication Manager 8.0 Security Configuration Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm

More information

RSA Authentication Manager 7.1 Administrator s Guide

RSA Authentication Manager 7.1 Administrator s Guide RSA Authentication Manager 7.1 Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA

More information

RSA Identity Governance and Lifecycle Data Sheet for IBM DB2 Database

RSA Identity Governance and Lifecycle Data Sheet for IBM DB2 Database RSA Identity Governance and Lifecycle Data Sheet for IBM DB2 Database Version 2.1 July 2017 CONTENTS RSA Identity Governance and Lifecycle Data Sheet for IBM DB2 Database... 1 REVISION HISTORY... 3 PURPOSE...

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager Integration Guide Using RADIUS Protocol for F5 BIG-IP Access Policy Manager All information herein is either public information or is the property of and owned solely by

More information

RSA ACE/Agent 5.0 for PAM Installation and Configuration Guide

RSA ACE/Agent 5.0 for PAM Installation and Configuration Guide RSA ACE/Agent 5.0 for PAM Installation and Configuration Guide Contact Information See our Web sites for regional Customer Support telephone and fax numbers. RSA Security Inc. RSA Security Ireland Limited

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager Integration Guide Using SafeNet Authentication Manager as an Identity Provider for F5 BIG- IP Access Policy Manager All information herein is either public information or

More information

RSA Authentication Manager 6.1 to 8.0 Migration Guide

RSA Authentication Manager 6.1 to 8.0 Migration Guide RSA Authentication Manager 6.1 to 8.0 Migration Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm Trademarks

More information

RSA Identity Governance and Lifecycle Connector Data Sheet for SQL Server

RSA Identity Governance and Lifecycle Connector Data Sheet for SQL Server RSA Identity Governance and Lifecycle Connector Data Sheet for SQL Server 1 Contents PURPOSE... 3 SUPPORTED SOFTWARE... 3 PREREQUISITES... 3 MANAGE ENDPOINT CREDENTIALS USING A PASSWORD VAULT... 4 CONFIGURATION...

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

RSA Identity Governance and Lifecycle Connector Data Sheet for IBM Tivoli Identity Manager 5.1

RSA Identity Governance and Lifecycle Connector Data Sheet for IBM Tivoli Identity Manager 5.1 Connector Data Sheet for IBM Tivoli Identity Manager 5.1 Version 1.1 October 2017 Connector Data Sheet for ITIM 5.1 Table of Contents Revision History 3 Purpose 4 Supported Software 4 Prerequisites 4 Configuration

More information

RSA Identity Governance and Lifecycle Generic SOAP Web Service Connector Application Guide. Generic SOAP Web Service Connector Application Guide

RSA Identity Governance and Lifecycle Generic SOAP Web Service Connector Application Guide. Generic SOAP Web Service Connector Application Guide Generic SOAP Web Service Connector Application Guide Version 1.3 Nov 2017 1 Contents Revision History... 4 Preface... 5 Audience... 5 In This Guide... 5 Configuring SSL client certificate based authentication...

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

One Identity Quick Connect for Base Systems 2.4. Administrator Guide

One Identity Quick Connect for Base Systems 2.4. Administrator Guide One Identity Quick Connect for Base Systems 2.4 Administrator Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

RSA NetWitness Logs. McAfee Endpoint Encryption. Event Source Log Configuration Guide. Last Modified: Friday, June 02, 2017

RSA NetWitness Logs. McAfee Endpoint Encryption. Event Source Log Configuration Guide. Last Modified: Friday, June 02, 2017 RSA NetWitness Logs Event Source Log Configuration Guide McAfee Endpoint Encryption Last Modified: Friday, June 02, 2017 Event Source Product Information: Vendor: McAfee Event Source: Endpoint Encryption

More information

Instant HR Auditor Installation Guide

Instant HR Auditor Installation Guide Instant HR Auditor Installation Guide Fall, 2015 Page 1 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software

More information

Avaya Converged Platform 130 Series. idrac9 Best Practices

Avaya Converged Platform 130 Series. idrac9 Best Practices Avaya Converged Platform 130 Series idrac9 Best Practices Release 4.0 December 2018 2018 Avaya Inc. All Rights Reserved Notice While reasonable efforts were made to ensure that the information in this

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for SonicWALL Secure Remote Access All information herein is either public information or is

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

Intel Small Business Extended Access. Deployment Guide

Intel Small Business Extended Access. Deployment Guide Intel Small Business Extended Access Deployment Legal Notices and Disclaimers Disclaimers INTEL CORPORATION MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE

More information

RSA Identity Governance and Lifecycle Collector Data Sheet for IBM Notes

RSA Identity Governance and Lifecycle Collector Data Sheet for IBM Notes RSA Identity Governance and Lifecycle Collector Data Sheet for IBM Notes Version 1.3 Jan 2018 Contents Purpose... 4 Supported Software... 4 Prerequisites... 4 JBoss... 4 WildFly... 4 WebSphere... 5 WebLogic...

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have

More information

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Tableau Server

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Tableau Server SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Novell Identity Manager

Novell Identity Manager Role Mapping Administrator User Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 1.0 August 28, 2009 www.novell.com Novell Identity Manager Role Mapping Administrator 1.0 User GuideNovell Identity

More information

Security Guide Release 4.0

Security Guide Release 4.0 [1]Oracle Communications Session Monitor Security Guide Release 4.0 E89197-01 November 2017 Oracle Communications Session Monitor Security Guide, Release 4.0 E89197-01 Copyright 2017, Oracle and/or its

More information

RSA Identity Governance and Lifecycle Connector Data Sheet for Ubuntu Linux

RSA Identity Governance and Lifecycle Connector Data Sheet for Ubuntu Linux RSA Identity Governance and Lifecycle Connector Data Sheet for Ubuntu Linux Version 1.1 October 2017 1 Table of Contents Purpose... 4 Supported Software... 4 Prerequisites... 5 Configuration... 5 General...

More information

RSA Identity Governance and Lifecycle Connector Data Sheet for Debian Linux

RSA Identity Governance and Lifecycle Connector Data Sheet for Debian Linux RSA Identity Governance and Lifecycle Connector Data Sheet for Debian Linux Version 1.1 October 2017 Table of Contents Purpose... 4 Supported Software... 4 Prerequisites... 4 Configuration... 5 General...

More information

RSA Identity Governance and Lifecycle Microsoft Exchange Connector Application Guide. Microsoft Exchange Connector Application Guide

RSA Identity Governance and Lifecycle Microsoft Exchange Connector Application Guide. Microsoft Exchange Connector Application Guide Microsoft Exchange Connector Application Guide Version 1.2 April 2017 1 License Agreement This software and the associated documentation are proprietary and confidential to EMC, are furnished under license,

More information

PeopleFluent OrgPublisher HTML5 Installation and Configuration Guide

PeopleFluent OrgPublisher HTML5 Installation and Configuration Guide July 30, 2017 Document Version Number: 1.0 Copyright 2017, PeopleFluent. All Rights Reserved. Contents Contents Preface...1 Audience... 1 Intent... 1 Before You Begin... 1 Document Revision... 1 Document

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have and keep

More information

IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic

IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic IBM Security IBM Security SiteProtector System Configuring Firewalls for SiteProtector Traffic Version 2.9 Note Before using this information and the product it supports, read the information in Notices

More information

License Server Installation Guide. Version 14.1

License Server Installation Guide. Version 14.1 License Server Installation Guide Version 14.1 Datawatch Corporation makes no representation or warranties with respect to the contents of this manual or the associated software and especially disclaims

More information

EMC Storage Monitoring and Reporting

EMC Storage Monitoring and Reporting EMC Storage Monitoring and Reporting Version 4.0 Upgrading to ViPR SRM P/N 302-002-733 REV 03 Copyright 2016 EMC Corporation. All rights reserved. Published in the USA. Published September 2016 EMC believes

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA

Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA Design Guide Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA VMware vsphere 5.1 for up to 2000 Virtual Desktops EMC VSPEX Abstract This guide describes required components and a configuration

More information

Oracle Hospitality Simphony Venue Management Installation Guide Release 3.10 E March 2018

Oracle Hospitality Simphony Venue Management Installation Guide Release 3.10 E March 2018 Oracle Hospitality Simphony Venue Management Installation Guide Release 3.10 E89837-02 March 2018 Copyright 2002, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

SafeNet Authentication Service Agent for Microsoft Outlook Web App. Installation and Configuration Guide

SafeNet Authentication Service Agent for Microsoft Outlook Web App. Installation and Configuration Guide SafeNet Authentication Service Agent for Microsoft Outlook Web App Installation and Configuration Guide All information herein is either public information or is the property of and owned solely by Gemalto

More information

Oracle Cloud Using the Google Calendar Adapter. Release 17.3

Oracle Cloud Using the Google Calendar Adapter. Release 17.3 Oracle Cloud Using the Google Calendar Adapter Release 17.3 E68599-09 October 2017 Oracle Cloud Using the Google Calendar Adapter, Release 17.3 E68599-09 Copyright 2015, 2017, Oracle and/or its affiliates.

More information

RSA Via L&G Collector Data Sheet for Office365

RSA Via L&G Collector Data Sheet for Office365 RSA Via L&G Collector Data Sheet for Office365 Table of Contents Purpose 3 Supported Software 3 Account Data Collector 4 Prerequisites 4 Configuration 5 Configuration Information 5 Limitations/ Requirements

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book] Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document

More information

Host Access Management and Security Server Administrative Console Users Guide. August 2016

Host Access Management and Security Server Administrative Console Users Guide. August 2016 Host Access Management and Security Server Administrative Console Users Guide August 2016 2016 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for RadiantOne Cloud Federation Service (CFS) All information herein is either public information

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

Register ME. Administrator's Guide

Register ME. Administrator's Guide Register ME Administrator's Guide May 2013 www.lexmark.com Contents 2 Contents Overview...3 Configuring Lexmark Register ME...4 Configuring application settings...4 Verifying that the application is configured

More information

Mail Extension User Guide

Mail Extension User Guide Version 1.1 July 2017 Copyright 2017 PTC Inc. and/or Its Subsidiary Companies. All Rights Reserved. User and training guides and related documentation from PTC Inc. and its subsidiary companies (collectively

More information

Symantec Protection Center Getting Started Guide. Version 2.0

Symantec Protection Center Getting Started Guide. Version 2.0 Symantec Protection Center Getting Started Guide Version 2.0 Symantec Protection Center Getting Started Guide The software described in this book is furnished under a license agreement and may be used

More information

MyCreditChain Terms of Use

MyCreditChain Terms of Use MyCreditChain Terms of Use Date: February 1, 2018 Overview The following are the terms of an agreement between you and MYCREDITCHAIN. By accessing, or using this Web site, you acknowledge that you have

More information

Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E June 2016

Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E June 2016 Oracle Hospitality OPERA Cloud Services Security Guide Release 1.20 E69079-01 June 2016 Copyright 2016, Oracle and/or its affiliates. All rights reserved. This software and related documentation are provided

More information

SafeNet Authentication Service (SAS) Service Provider Billing and Reporting Guide

SafeNet Authentication Service (SAS) Service Provider Billing and Reporting Guide SafeNet Authentication Service (SAS) Service Provider Billing and Reporting Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Compatibility Guide All information herein is either public information or is the property of and owned solely by Gemalto. and/or its subsidiaries who shall have and keep

More information

Understanding the LDAP Binding Component

Understanding the LDAP Binding Component Understanding the LDAP Binding Component Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 820 6573 Dec 2008 Copyright 2008 Sun Microsystems, Inc. 4150 Network Circle, Santa

More information

Oracle Cloud Using the Google Calendar Adapter with Oracle Integration

Oracle Cloud Using the Google Calendar Adapter with Oracle Integration Oracle Cloud Using the Google Calendar Adapter with Oracle Integration E85501-05 January 2019 Oracle Cloud Using the Google Calendar Adapter with Oracle Integration, E85501-05 Copyright 2017, 2019, Oracle

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

HYCU SCOM Management Pack for F5 BIG-IP

HYCU SCOM Management Pack for F5 BIG-IP HYCU SCOM Management Pack for F5 BIG-IP Product version: 5.3 Product release date: March 2018 Document edition: Second Legal notices Copyright notice 2015-2018 HYCU. All rights reserved. This document

More information

Secure Held Print Jobs. Administrator's Guide

Secure Held Print Jobs. Administrator's Guide Secure Held Print Jobs Administrator's Guide April 2013 www.lexmark.com Contents 2 Contents Overview... 3 Configuring Secure Held Print Jobs...4 Configuring and securing the application... 4 Using Secure

More information

Avaya Meeting Exchange Web Portal 5.0 Release Notes

Avaya Meeting Exchange Web Portal 5.0 Release Notes Avaya Meeting Exchange Web Portal 5.0 Release Notes 04-602190 Issue 1 August 2007 2007 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have and keep

More information

Using Client Security with Policy Director

Using Client Security with Policy Director IBM Client Security Solutions Using Client Security with Policy Director Client Security Software Version 1.2 June 2000 1 Before using this information and the product it supports, be sure to read Appendix

More information

Oracle Hospitality Cruise AffairWhere Security Guide Release E April 2017

Oracle Hospitality Cruise AffairWhere Security Guide Release E April 2017 Oracle Hospitality Cruise AffairWhere Security Guide Release 2.2.5 E85968-01 April 2017 Copyright 2006, 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

One Identity Starling Two-Factor Desktop Login 1.0. Administration Guide

One Identity Starling Two-Factor Desktop Login 1.0. Administration Guide One Identity Starling Two-Factor Desktop Login 1.0 Administration Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Oracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC

Oracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC Oracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC Version 10.1.0.0 Documentation Part Number: E55027-01 June, 2014 Copyright 2009, 2014, Oracle and/or its affiliates.

More information

INSTALLATION GUIDE Spring 2017

INSTALLATION GUIDE Spring 2017 INSTALLATION GUIDE Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and

More information

Installing and Upgrading Avaya Aura System Manager

Installing and Upgrading Avaya Aura System Manager Installing and Upgrading Avaya Aura System Manager Beta Release 5.2 November 2009 2009 Avaya Inc. All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document

More information

Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E

Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E96343-01 May 2018 Copyright 2010, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Compatibility Guide All information herein is either public information or is the property of and owned solely by Gemalto. and/or its subsidiaries who shall have and keep

More information

Oracle Enterprise Manager Ops Center. Overview. What You Need. Create Oracle Solaris 10 Zones 12c Release 3 ( )

Oracle Enterprise Manager Ops Center. Overview. What You Need. Create Oracle Solaris 10 Zones 12c Release 3 ( ) Oracle Enterprise Manager Ops Center Create Oracle Solaris 10 Zones 12c Release 3 (12.3.0.0.0) E60027-01 June 2015 This guide provides an end-to-end example for how to use Oracle Enterprise Manager Ops

More information

HYCU SCOM Management Pack for F5 BIG-IP

HYCU SCOM Management Pack for F5 BIG-IP USER GUIDE HYCU SCOM Management Pack for F5 BIG-IP Product version: 5.5 Product release date: August 2018 Document edition: First Legal notices Copyright notice 2015-2018 HYCU. All rights reserved. This

More information

IBM Tivoli Directory Server Version 5.2 Client Readme

IBM Tivoli Directory Server Version 5.2 Client Readme IBM Tivoli Directory Server Version 5.2 Client Readme GI11-4150-00 IBM Tivoli Directory Server Version 5.2 Client Readme GI11-4150-00 Note Before using this information and the product it supports, read

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

IP Office IP Office ContactStore 7.8

IP Office IP Office ContactStore 7.8 ContactStore 7.8 15-601037 Issue 3a - (21 May 2009) 2009 Avaya All Rights Reserved. Notice While reasonable efforts were made to ensure that the information in this document was complete and accurate at

More information

One Identity Manager 8.0. Administration Guide for Connecting to a Universal Cloud Interface

One Identity Manager 8.0. Administration Guide for Connecting to a Universal Cloud Interface One Identity Manager 8.0 Administration Guide for Connecting to a Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Lotus IBM Lotus Virtual Classroom. Version Installation Guide G

Lotus IBM Lotus Virtual Classroom. Version Installation Guide G Lotus IBM Lotus Virtual Classroom Version 1.1.2 Installation Guide G210-1900-00 Terms of Use Disclaimer THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. WHILE

More information

Contents About This Guide... 5 Installing P6 Professional API... 7 Authentication Modes... 9 Legal Notices... 14

Contents About This Guide... 5 Installing P6 Professional API... 7 Authentication Modes... 9 Legal Notices... 14 P6 Professional Integration API Configuration Guide for On-Premises Version 17 July 2017 Contents About This Guide... 5 Installing P6 Professional API... 7 What is the P6 Professional API?... 7 System

More information

Oracle Hospitality Cruise Fine Dining System Security Guide Release E

Oracle Hospitality Cruise Fine Dining System Security Guide Release E Oracle Hospitality Cruise Fine Dining System Security Guide Release 9.0.2.29 E99054-01 August 2018 Copyright 2015, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

Intelligent Customer Routing Release Notes

Intelligent Customer Routing Release Notes Intelligent Customer Routing Release Notes Release 7.0 Issue 1.0 December 2013 Release Notes 1 2013 Avaya Inc. All Rights Reserved Notice While reasonable efforts were made to ensure that the information

More information

AUTHORIZED DOCUMENTATION. Using ZENworks with Novell Service Desk Novell Service Desk February 03,

AUTHORIZED DOCUMENTATION. Using ZENworks with Novell Service Desk Novell Service Desk February 03, AUTHORIZED DOCUMENTATION Using ZENworks with Novell Service Desk 6.5.4 Novell Service Desk 6.5.4 February 03, 2012 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with

More information

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later

Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving and later Enterprise Vault Setting up Exchange Server and Office 365 for SMTP Archiving 12.1 and later Enterprise Vault : Setting up Exchange Server and Office 365 for SMTP Archiving Last updated: 2018-06-18. Legal

More information

SafeNet Authentication Client

SafeNet Authentication Client SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the

More information

Enterprise Vault Requesting and Applying an SSL Certificate and later

Enterprise Vault Requesting and Applying an SSL Certificate and later Enterprise Vault Requesting and Applying an SSL Certificate 10.0.3 and later Enterprise Vault : Requesting and Applying an SSL Certificate Last updated: 2018-04-12. Legal Notice Copyright 2018 Veritas

More information

Oracle Hospitality Cruise Meal Count System Security Guide Release 8.3 E

Oracle Hospitality Cruise Meal Count System Security Guide Release 8.3 E Oracle Hospitality Cruise Meal Count System Security Guide Release 8.3 E99233-01 August 2018 Copyright 2015, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

IBM Endpoint Manager for OS Deployment Linux OS provisioning using a Server Automation Plan

IBM Endpoint Manager for OS Deployment Linux OS provisioning using a Server Automation Plan IBM Endpoint Manager IBM Endpoint Manager for OS Deployment Linux OS provisioning using a Server Automation Plan Document version 1.0 Michele Tomassi Copyright International Business Machines Corporation

More information

Cisco Expressway Authenticating Accounts Using LDAP

Cisco Expressway Authenticating Accounts Using LDAP Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4

More information

White Paper: Configuring SSL Communication between IBM HTTP Server and the Tivoli Common Agent

White Paper: Configuring SSL Communication between IBM HTTP Server and the Tivoli Common Agent White Paper: Configuring SSL Communication between IBM HTTP Server and the Tivoli Common Agent IBM Tivoli Provisioning Manager Version 7.2.1 Document version 0.1 Lewis Lo IBM Tivoli Provisioning Manager,

More information

Creating Resources on the ZFS Storage Appliance

Creating Resources on the ZFS Storage Appliance Oracle Enterprise Manager Ops Center Creating Non-Global Zones Using a SAN Storage Library 12c Release 3 (12.3.0.0.0) E65613-01 October 2015 This guide provides an end-to-end example for how to use Oracle

More information

Avaya Call Redirection Manager Snap-in Reference

Avaya Call Redirection Manager Snap-in Reference Avaya Call Redirection Manager Snap-in Reference Release 1.1 March 2016 2016 Avaya Inc. All Rights Reserved. Notice While reasonable efforts have been made to ensure that the information in this document

More information

Using ZENworks with Novell Service Desk

Using ZENworks with Novell Service Desk www.novell.com/documentation Using ZENworks with Novell Service Desk Novell Service Desk 7.1 April 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or

More information

SUSE Manager Roadmap OS Lifecycle Management from the Datacenter to the Cloud

SUSE Manager Roadmap OS Lifecycle Management from the Datacenter to the Cloud SUSE Manager Roadmap OS Lifecycle Management from the Datacenter to the Cloud Joachim Werner Senior Product Manager joe@suse.com Jeff Lindholm Sales Engineer Jlindholm@suse.com SUSE and Linux Workloads

More information