Before the first run of a node, it is recommended to check the settings of the embedded database for better performances.

Size: px
Start display at page:

Download "Before the first run of a node, it is recommended to check the settings of the embedded database for better performances."

Transcription

1 Node settings Before the first run of a node Database configuration Other settings SSL cipher suites and protocols configuration Modify the granularity of evolution of the Time Machine latest knowledge time Modify the Time Machine live lag time Modify the maximum number of rows displayed in pagelets and instance editor Modify the maximum number of instances in constants and threshold level editors and for dashboard parameters instances Modify the maximum number of paths in selection popup Modify the duration of indicator recomputation beyond which a warning popup is shown Modify the interval between automatic checkpoints Modify the default rhythm and lag to trigger computings Modify the default number of days for which to allow data absorption in the future Recomputing settings Purge scheduling Scheduler settings HTTP settings HTTPS settings Web session timeout Web context root and reverse proxy settings Deactivate inactive accounts Data integration Authentication settings JMX server settings High volume daily memory flush (titanium-temporal) Branding HTML5 Dashboards UI Before the first run of a node Database configuration Before the first run of a node, it is recommended to check the settings of the embedded database for better performances. Persistence parameter Update the field com.systar.titanium.initialperiodvalidtimeend in (Value is a date). com.systar.titanium.initialperiodvalidtimeend= t00:00: Example 1: if the node is set up on simply put this date. Example 2: the node is set up on , but past data up to is injected, then configure the date for optimal performances Once the node has started at least once (and so has some saved data), this parameter can no longer be changed. High volume If your application will collect a high volume of data, it is recommended to update the following parameters in to 256MB memtable: com.systar.titanium.memtable.globalmaxsize=4g com.systar.titanium.memtable.individualmaxsize=256m

2 Also, in this case, it is best to have a 31 GB or 48+ GB JVM heap configuration. Don't configure a heap size between 32GB and 47GB since it will be less efficient than using a 31GB heap. -Xmx31G conf/jvm.conf Other settings SSL cipher suites and protocols configuration Location: fields in Parameter Description

3 com.systar.platform.ciphersuites.included Comma-separated list of SSL cipher suites to include. The order of this list is important because it enables the server to select first the most secure cipher suite. This is the default value used for: org.apache.felix.https.jetty.ciphersuites.included com.systar.boson.jmx.ssl.ciphersuites.included Default value TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_RSA_WITH_AES_256_GCM_SHA384 TLS_DHE_DSS_WITH_AES_256_GCM_SHA384 TLS_RSA_WITH_AES_256_GCM_SHA384 TLS_ECDHE_ECDSA_WITH_AES_256_CBC_SHA384 TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA384 TLS_DHE_RSA_WITH_AES_256_CBC_SHA256 TLS_DHE_DSS_WITH_AES_256_CBC_SHA256 TLS_RSA_WITH_AES_256_CBC_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_RSA_WITH_AES_128_GCM_SHA256 TLS_DHE_DSS_WITH_AES_128_GCM_SHA256 TLS_RSA_WITH_AES_128_GCM_SHA256 TLS_ECDHE_ECDSA_WITH_AES_128_CBC_SHA256 TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_RSA_WITH_AES_128_CBC_SHA256 TLS_DHE_DSS_WITH_AES_128_CBC_SHA256 TLS_RSA_WITH_AES_128_CBC_SHA256 TLS_EMPTY_RENEGOTIATION_INFO_SCSV For more information and all available values, see supported cipher suites. Note: Although it is recommended to use the included cipher suites, it is also possible to combine them with excluded cipher suites using: org.apache.felix.https.jetty.ciphersuites.excluded com.systar.boson.jmx.ssl.ciphersuites.excluded The resulting setting is computed by first including cipher suites and then excluding. As a result, if a cipher suite is in both the included and the excluded list, it will be excluded. com.systar.platform.protocols.included Comma-separated list of SSL protocols to exclude. This is the default value used for: org.apache.felix.https.jetty.protocols.included com.systar.boson.jmx.ssl.protocols.included TLSv1.2 Default value Note: You can also combine included protocols with excluded using: org.apache.felix.https.jetty.protocols.excluded com.systar.boson.jmx.ssl.protocols.excluded The resulting setting is computed by first including protocols and then excluding. As a result, if a protocol is in both the included and the excluded list, it will be excluded.

4 Modify the granularity of evolution of the Time Machine latest knowledge time Location: field com.systar.nitrogen.dashboards.timemachine.mostcurrentttgranularity in Default value is: 3000 (3 seconds) Value is in milliseconds. Zero or negative values will be ignored. com.systar.nitrogen.dashboards.timemachine.mostcurrentttgranularity=3000 Modify the Time Machine live lag time Location: field com.systar.nitrogen.dashboards.timemachine.absorptiondelay in Default value is: (1 minute) Value is in milliseconds com.systar.nitrogen.dashboards.timemachine.absorptiondelay=30000 Modify the maximum number of rows displayed in pagelets and instance editor Pagelets consist of the activity pagelet and query pagelets (datagrid, image map, and Instance pagelets). You can use parameters for the query pagelets and the search by criteria pagelet. Location: field com.systar.carbon.queryservice.limitedresultnumber in Default value is: 500 com.systar.carbon.queryservice.limitedresultnumber=500 Modify the maximum number of instances in constants and threshold level editors and for dashboard parameters instances Location field com.systar.carbon.dataservices.limitedresultnumber in Default value is 50 com.systar.carbon.dataservices.limitedresultnumber=50

5 Modify the maximum number of paths in selection popup Location: field com.systar.carbon.dataservices.maxnumberofpaths in Default value is: 5 com.systar.carbon.dataservices.maxnumberofpaths=5 Modify the duration of indicator recomputation beyond which a warning popup is shown Location: field com.systar.oxygen.configurationeditor.durationbeforewarning in Type: Optional Default value when not set: P2D (2 days) com.systar.oxygen.configurationeditor.durationbeforewarning=p2d Format of durationbeforewarning follows ISO_8601 (wikipedia) For example, P2Y10M14DT20H13M45S means 2 years, 10 months, 14 days, 20 hours, 13 minutes, 45 seconds (care about the "T" separator) Modify the interval between automatic checkpoints Location: field com.systar.calcium.automaticcheckpointcreationinterval in Default value is: 1800 com.systar.calcium.automaticcheckpointcreationinterval=1800 The value is expressed in seconds, use 0 (zero) to disable the functionality. Modify the default rhythm and lag to trigger computings Location: fields com.systar. krypton.scheduler.collector.defaultcomputingrhythm(scalar unit), com.systar.kypton.scheduler.collector.defaultcomputinglag.(scalar unit) in com.systar.krypton.scheduler.collector.defaultcomputingrhythm.scalar=1 com.systar.krypton.scheduler.collector.defaultcomputingrhythm.unit=minutes com.systar.krypton.scheduler.collector.defaultcomputinglag.scalar=2 com.systar.krypton.scheduler.collector.defaultcomputinglag.unit=seconds Possible values for defaultcomputingrhythm.unit and defaultcomputinglag.unit are : seconds, minutes, hours, days.

6 Modify the default number of days for which to allow data absorption in the future This setting dictates the maximum number of days in the future when data is still absorbed. Absorptions that exceed this limit are rejected. If no value is set in a default of 366 days will be used. com.systar.calcium.futureabsorptionrejectthresholdindays=366 Recomputing settings Located in Field com.systar.krypton.scheduler.latedatahandler.maximumnumberofevents Indicates the number of past events you must receive before a recomputing in the past is triggered. Default value is Can be deactivated by setting it to 0. Field com.systar. krypton.scheduler.latedatahandler.maximumtimetolive Indicates the maximum age of a past event before a recomputing is triggered. Unit is millisecond. Default value is (15 minutes). This means the node won't wait more than 15 minutes before a recomputing is triggered. Can be deactivated by setting it to 0. com.systar.krypton.scheduler.latedatahandler.maximumnumberofevents= com.systar.krypton.scheduler.latedatahandler.maximumtimetolive= Purge scheduling Location: field com.systar.titanium.purge.periodic.full in You must specify a reference instant, a duration scalar and a duration type (days, weeks, months, etc.). All items are comma separated. Default value is 1 run per day at 01:00. com.systar.titanium.purge.periodic.full= t01:00:00.000,1,days Scheduler settings Located in Field com.systar.krypton.scheduler.maximumjobduration.(scalar unit) Indicates the maximum computation batch window. This affects the recomputing and the catch-up. The rule of thumbs to set these value is to calculate the smallest computed attribute rhythm divided by percentage of memory used in live. For instance, if you use 33% of memory in live and your computings are rhythmed at one minute, you should set it at 3 minutes. Default value is 1 hour. Valid units are minutes and hours (always use the plural form even if the number of unit is 1).

7 com.systar.krypton.scheduler.maximumjobduration.scalar=1 com.systar.krypton.scheduler.maximumjobduration.unit=hours HTTP settings To change the HTTP settings, modify the following parameter in : org.osgi.service.http.port=8080 Parameters: Parameter org.osgi.service.http.port Description The port used for servlets and resources available via HTTP. org.osgi.service.http.host Restrict access to the HTTP service to a certain host name or IP address. org.apache.felix.http.enable Flag to enable the use of HTTP. The default value is true. com.systar.boson.http.1_0.enable Flag to enable HTTP/ 1.0 requests. The default value is false. HTTPS settings HTTPS and HTTP listening can be activated/deactivated independently (that is HTTP only, HTTPS only, or both HTTP and HTTPS). If both are activated, connections to HTTP will be redirected to HTTPS. To change the settings, modify the following parameters in : org.apache.felix.https.enable=true org.osgi.service.http.port.secure=443 org.apache.felix.https.keystore=<absolute path to key store> org.apache.felix.https.keystore.password=<key store password> Parameters: Parameter Description org.apache.felix.https.enable Flag to enable the use of HTTPS. The default value is false. If it's set to redirected to HTTPS. org.apache.felix.http.enable Flag to enable the use of HTTP. The default value is true. org.osgi.service.http.port.secure The port used for servlets and resources available via HTTPS.

8 org.apache.felix.https.keystore The name of the file containing the key store. It's recommanded to use an dir>/conf directory, then use the ${com.systar.platform.conf.d For example: org.apache.felix.http.keystore=${com.sy org.apache.felix.https.keystore.password org.apache.felix.https.jetty.ciphersuites.included The password for the key store. Comma-separated list of SSL cipher suites to include. All HTTPS request p referenced on this list. Default values are the same as com.systar.platform.ciphersuite org.apache.felix.https.jetty.ciphersuites.excluded Comma-separated list of SSL cipher suites to exclude. All HTTPS request referenced on this list. By default, no cipher suites are excluded. org.apache.felix.https.jetty.protocols.included Comma-separated list of SSL protocols to include. All HTTPS request proc on this list. Default values are the same as com.systar.platform.protocols.i org.apache.felix.https.jetty.protocols.excluded Comma-separated list of SSL protocols to exclude. All HTTPS request pro this list. By default, no protocols are excluded. com.systar.boson.http.hstsmaxage HSTS setting ( specifying the number of se the UA regards the host (from whom the message was received) as a Kno value is strictly superior to 0. The default value is (for 6 months). See How to create a key store for HTTPS communication? to know how to create a key store for HTTPS. The key store for the HTTPS communication must contain only one key. If several keys exist in the key store, the node will not start. Web session timeout By default, the Web session timeout is set to milliseconds (i.e. 20 minutes). After 20 minutes of inactivity, the session is de-authenticated, forcing the user to authenticate to use the application. Inactivity is when the Decision Insight tab is closed. The Web session timeout cannot be lower than milliseconds (i.e. 1 minute). To change the web session timeout, add the following parameter to com.systar.photon.application.sessiontimeout= Web context root and reverse proxy settings By default, the web context root is /, that is the URL to connect to the Web application is You may want to change the web context root so that the URL becomes for example. To change the web context root, modify the following parameter in

9 com.systar.boson.http.contextroot=/bam The value of com.systar.boson.http.contextroot must start with a / character. Decision Insight can also be installed behind a reverse proxy. Only the following schemes are currently supported: Without context path Public URL http[s]://<proxy hostname>:<proxy port> Examples Internal URL http[s]://<node hostname>:<node port> Examples Reverse proxy configuration Example for Apache configured as reverse proxy: <Location /> Order allow,deny Allow from all ProxyPass ProxyPassReverse </Location> platform.properties com.systar.boson.http.proxyurl = com.systar.boson.http.contextr oot=/ org.osgi.service.http.port=808 0 With a context path The context path must be identical in the public and internal URL

10 Public URL http[s]://<proxy hostname>:<proxy port>/<context path> Examples /bam Internal URL http[s]://<node hostname>:<node port>/<context path> Examples Reverse proxy configuration Example for Apache configured as reverse proxy: <Location /bam> Order allow,deny Allow from all ProxyPass hostname>:8080/bam ProxyPassReverse hostname>:8080/bam </Location> platform.properties com.systar.boson.http.proxyurl = com.systar.boson.http.contextr oot=/bam org.osgi.service.http.port=808 0 Deactivate inactive accounts Property Default value Description com.systar.cobalt.security.user.maximuminactiveinterval 0 Maximum idle duration (in days) of inactive users before their account is deactivated. Value 0 means the functionnality is deactivated. Known limitation on primary/replica clusters: To ensure users sending Webservice or JMX calls directly to a replica node are always active, they must also send requests to the primary node so the maximum idle duration between two requests is never reached on that server.

11 Data integration General settings Property Default value Description com.systar.aluminium.log.file.maxfilesize (10Mb) Maximum size of a data integration file before rolling to another one (in bytes) com.systar.aluminium.log.file.maxbackupindex 9 Maximum number of backup log file before deleting them com.systar.aluminium.log.memory.maxsize (1Mb) Maximum size of the in-memory logs (in bytes) com.systar.aluminium.mappings.exchangecachepermapping 5 Number of exchanges to cache per Mapping, only the latest ones are stored. Value 0 means no cache at all, the maximum value is com.systar.aluminium.contexts.manualstoptimeout 300 Delay after which a routing context is forcibly stopped when a user request to stop a routing context (in seconds) com.systar.aluminium.contexts.platformshutdowntimeout 30 Delay after which routing contexts are forcibly stopped when the node shuts downs (in seconds) com.systar.aluminium.contexts.autostart true Set to false in order to disable routing contexts automatic startup The properties are configured in. Example: com.systar.gluon.nodeid=1 com.systar.gluon.clusterid= com.systar.aluminium.log.file.maxfilesize= Encryption settings To encrypt data integration properties, configure the following: The key store. The cryptographic RSA keys. When the key store is configured, some of the data is written in the database in an encrypted manner. The rest of the data in the database is not. Currently, only the data integration part of Decision Insight supports cryptographic capabilities (to store values of password properties in an encrypted form). Property Mandatory / Forbidden / Optional Description

12 com.systar.aluminium.crypto.keystore Mandatory if com.systar.aluminium.crypto.keysto repassword is set. Forbidden otherwise. The absolute path to operty. For example: com.sys com.systar.aluminium.crypto.keystorepassword Mandatory if com.systar.aluminium.crypto.keysto re is set. Forbidden otherwise. The password of the com.systar.aluminium.crypto.keystoretype Optional. The type of the key com.systar.aluminium.crypto.keystoreprovider Optional. The provider of the k com.systar.aluminium.crypto.keyalias com.systar.aluminium.crypto.keypassword Mandatory if com.systar.aluminium.crypto.keysto re is configured. Forbidden otherwise. Mandatory if com.systar.aluminium.crypto.keysto re is configured. Forbidden otherwise. The alias of the cryp The password of the The properties are configured in. Example: com.systar.gluon.nodeid=1 com.systar.gluon.clusterid= com.systar.aluminium.crypto.keystore=c:/app/crypto.keystore com.systar.aluminium.crypto.keystorepassword=some-p@ssword! com.systar.aluminium.crypto.keyalias=aluminium com.systar.aluminium.crypto.keypassword=loremipsum Useful information is available in on. For information about how to create a keystore and cryptographic RSA keys, see KeyStore Manager user guide. Decision Insight supports only RSA keys. Authentication settings LDAP To configure such an authentication, create or edit the conf/photon-authentication/settings.xml XML file. For more information, see Configuring User Directories (LDAP).

13 Single sign-on (SSO) To configure the SSO authentication, modify the com.systar.photon.application.auth.ssomode and com.systar.photon.application.auth.sso RoleProvisioning properties in according to Configure Single sign-on (SSO). Admin account management The built-in admin account is enabled by default, but for security reasons, you might want to disable it. To do this, set the com.systar.cobalt.se curity.admin.enabled property in to false. JMX server settings Except if specified during the installation, JMX connector is disabled by default with the port number configuration. See below: Port number To configure the listening JMX port, modify the com.systar.boson.jmx.port property in. If this property is missing, empty( default configuration), equal to 0 or negative, the JMX connector is disabled. Otherwise, the node listens to JMX connections on the specified port: com.systar.boson.jmx.port=1090 Network interface By default, the node listens for the JMX connection only on the local network interface ( ), that is, a connection can be established only from within the server hosting the node. To configure the node so that it listens on a different network interface, modify the com.systar.boson.jmx.interface property in conf/platform.properties: com.systar.boson.jmx.interface= SSL encryption By default, the node does not encrypt the JMX communication and credentials are sent unencrypted over the wire. To secure the JMX connection using SSL, create a key store with a certificate and modify the following properties in conf/platform.propert ies as follows. com.systar.boson.jmx.ssl.enable=true com.systar.boson.jmx.ssl.keystore=<absolute path to key store> com.systar.boson.jmx.ssl.keystorepassword=<key store password> com.systar.boson.jmx.ssl.ciphersuites.excluded=<cipersuites> Parameters: Parameter Description

14 com.systar.boson.jmx.ssl.enable Flag to enable the use of SSL encryption. The default value is false. com.systar.boson.jmx.ssl.keystore The absolute path to the key store file. T o use a path relative to the <node dir f.dir} property. For example: com.systar.boson.jmx.ssl.keystore=${com.sy com.systar.boson.jmx.ssl.password com.systar.boson.jmx.ssl.ciphersuites.included The password for the key store. Comma-separated list of SSL cipher suites to include. All requests processed by this list. Default values are the same as com.systar.platform.ciphersuites.in com.systar.boson.jmx.ssl.ciphersuites.excluded Comma-separated list of SSL cipher suites to exclude. All request processed by list. By default, no cipher suites are excluded. com.systar.boson.jmx.ssl.protocols.included Comma-separated list of SSL protocols to include. All requests processed by cli this list. Default values are the same as com.systar.platform.protocols.inclu com.systar.boson.jmx.ssl.protocols.excluded Comma-separated list of SSL protocols to exclude. All requests processed by cl list. By default, no protocols are excluded. To create the certificate and key store, see How to create a key store for HTTPS communication? When the JMX connection is encrypted with SSL and you try to connect to the node using jconsole, you might not be able to connect because jconsole does not trust the certificate installed on the server. In this case, you should add the certificate to the default trust store commonly named cacert or you should provide a key store containing the certificate to jconsole. To add a certificate to a key store (including the default trust store), see KeyStore Manager user guide. To start jconsole using a custom key store, use the following command line: jconsole -J-Djavax.net.ssl.trustStore=<path to key store> -J-Djavax.net.ssl.trustStorePassword=<key store password> High volume daily memory flush (titanium-temporal) This setting is disabled by default. If you have a high volume of daily collected data and computations not wider than the current day, you can activate this mode to force flushing all memory data once a day. For instance, flushing all memory data every day at 23h59 (node time), in order to start the next day with a fresh new empty memory. (Memory data will be still flushed when the titanium max memory size is reached). To activate this option, set the com.systar.titanium.periodicflush.enabled field to true in.

15 com.systar.titanium.periodicflush.enabled=true You can also configure the time at which the flush is triggered by setting the following parameters in default settings are 23:59.. The com.systar.titanium.periodicflush.hour=23 com.systar.titanium.periodicflush.minute=59 Branding It is possible to replace the Axway logo with your own logo. For more information, see How to change the branding? Change the product name The product name is displayed in various locations, including the login page title or the Web services documentation. To change it, for each node in your deployment, edit the file and modify the following line: com.systar.platform.label=acme Monitoring Hide the Powered By Axway Decision Insight label To hide the Powered By Axway Decision Insight message that appears in the bottom-right corner of the login page screen, for each node in your deployment edit the configuration file and add the following line: com.systar.photon.application.auth.hidepoweredbymention=true HTML5 Dashboards UI HTML5 User interface is enabled by default. It can be accessed at the URL <node URL>/ui (ex: The classic User Interface remains accessible at the URL <node URL>/app. To disable the HTML5 User interface and make it not accessible by users, edit the file and add the following line: com.systar.helium.html.ui.enabled=false

Perceptive Matching Engine

Perceptive Matching Engine Perceptive Matching Engine Advanced Design and Setup Guide Version: 1.0.x Written by: Product Development, R&D Date: January 2018 2018 Hyland Software, Inc. and its affiliates. Table of Contents Overview...

More information

SmartSense Configuration Guidelines

SmartSense Configuration Guidelines 1 SmartSense Configuration Guidelines Date of Publish: 2018-07-12 http://docs.hortonworks.com Contents SmartSense configuration guidelines...3 HST server...3 HST agent... 9 SmartSense gateway... 12 Activity

More information

Licensing the Application CHAPTER

Licensing the Application CHAPTER CHAPTER 5 Licensing Application, Configuring E-mail, Cisco.com, Proxy Settings, RCP, SCP Settings, Security, Backup, Authentication Settings and Idle Timeout Settings, Browser and Server Security Mode

More information

Configuring Caching Services

Configuring Caching Services CHAPTER 8 This chapter describes how to configure conventional caching services (HTTP, FTP [FTP-over-HTTP caching and native FTP caching], HTTPS, and DNS caching) for centrally managed Content Engines.

More information

Requirements from the. Functional Package for Transport Layer Security (TLS)

Requirements from the. Functional Package for Transport Layer Security (TLS) Requirements from the Functional Package for Transport Layer Security (TLS) Version: 1.0 2018-12-17 National Information Assurance Partnership Revision History Version Date Comment Introduction Purpose.

More information

Securing VMware NSX-T J U N E 2018

Securing VMware NSX-T J U N E 2018 Securing VMware NSX-T J U N E 2018 Securing VMware NSX Table of Contents Executive Summary...2 NSX-T Traffic [Control, Management, and Data]...3 NSX Manager:...7 NSX Controllers:...9 NSX Edge:...10 NSX-T

More information

How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT

How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT Ta Table of Contents Table of Contents TA TABLE OF CONTENTS 1 TABLE OF CONTENTS 1 BACKGROUND 2 CONFIGURATION STEPS 2 Create a SSL

More information

FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry.

FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION VERSION 9 Setup Guide This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE Fusion Registry: 9.2.x Document

More information

Antivirus Solution Guide. NetApp Clustered Data ONTAP 8.2.1

Antivirus Solution Guide. NetApp Clustered Data ONTAP 8.2.1 Antivirus Solution Guide NetApp Clustered Data ONTAP 8.2.1 Contents Abstract... 4 Audience... 4 Purpose and Scope... 4 Introduction... 4 Antivirus Solution Architecture... 5 Components of the Vscan/AV

More information

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM)

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...

More information

Okta Integration Guide for Web Access Management with F5 BIG-IP

Okta Integration Guide for Web Access Management with F5 BIG-IP Okta Integration Guide for Web Access Management with F5 BIG-IP Contents Introduction... 3 Publishing SAMPLE Web Application VIA F5 BIG-IP... 5 Configuring Okta as SAML 2.0 Identity Provider for F5 BIG-IP...

More information

Operational User Guidance and Preparative

Operational User Guidance and Preparative Operational User Guidance and Preparative Procedures Pulse Secure, LLC Document Version 0.4 March 2018 Document Version 1.6.4 Pulse Secure, LLC Page 1 of 86 Pulse Secure, LLC 2700 Zanker Road, Suite 200

More information

NetIQ Identity Manager Jobs Guide. February 2017

NetIQ Identity Manager Jobs Guide. February 2017 NetIQ Identity Manager Jobs Guide February 2017 Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use restrictions, U.S. Government restricted rights, patent

More information

Orbix Release Notes

Orbix Release Notes Orbix 6.3.9 Release Notes Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 2017. All rights reserved. MICRO FOCUS, the Micro Focus

More information

Antivirus Solution Guide for Clustered Data ONTAP: Symantec

Antivirus Solution Guide for Clustered Data ONTAP: Symantec Technical Report Antivirus Solution Guide for Clustered Data ONTAP: Symantec Saurabh Singh and Brahmanna Chowdary Kodavali, NetApp July 2016 TR-4304 Abstract An antivirus solution is key for enterprises

More information

vrealize Orchestrator Load Balancing

vrealize Orchestrator Load Balancing vrealize Orchestrator Load Balancing Configuration Guide Version 7.0.x T E C H N I C A L W H I T E P A P E R M A Y 2 0 1 6 V E R S I O N 1. 0 Table of Contents Introduction... 4 Load Balancing Concepts...

More information

Data Structure Mapping

Data Structure Mapping This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.2., page 1 Supported

More information

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator)

Interface Reference. McAfee Application Control Windows Interface Reference Guide. Add Installer page. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Interface Reference Guide (McAfee epolicy Orchestrator) Interface Reference Add Installer page Add an existing installer to the McAfee epo repository. Table 1

More information

Open XML Gateway User Guide. CORISECIO GmbH - Uhlandstr Darmstadt - Germany -

Open XML Gateway User Guide. CORISECIO GmbH - Uhlandstr Darmstadt - Germany - Open XML Gateway User Guide Conventions Typographic representation: Screen text and KEYPAD Texts appearing on the screen, key pads like e.g. system messages, menu titles, - texts, or buttons are displayed

More information

Data Structure Mapping

Data Structure Mapping This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from, Release 5.5 or later to Cisco ISE, Release 2.3., page 1 Supported Data Objects for

More information

Data Structure Mapping

Data Structure Mapping This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.3., on page 1 Supported

More information

SSL Report: sharplesgroup.com ( )

SSL Report: sharplesgroup.com ( ) 1 of 5 26/06/2015 14:28 Home Projects Qualys.com Contact You are here: Home > Projects > SSL Server Test > sharplesgroup.com SSL Report: sharplesgroup.com (176.58.116.26) Assessed on: Fri, 26 Jun 2015

More information

Novell Access Manager

Novell Access Manager Setup Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 Setup Guide Legal Notices Novell, Inc., makes no representations or warranties

More information

SSL Report: printware.co.uk ( )

SSL Report: printware.co.uk ( ) 1 of 5 26/06/2015 14:27 Home Projects Qualys.com Contact You are here: Home > Projects > SSL Server Test > printware.co.uk SSL Report: printware.co.uk (194.143.166.5) Assessed on: Fri, 26 Jun 2015 12:53:08

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry

More information

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page. Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator

More information

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4 vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4 vrealize Operations Manager Customization and Administration Guide You can find the most up-to-date technical

More information

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER CHAPTER 8 Date: 4/23/09 This topic describes the steps required to configure your ACE (both the ACE module and the ACE appliance) as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination.

More information

System Administration

System Administration Most of SocialMiner system administration is performed using the panel. This section describes the parts of the panel as well as other administrative procedures including backup and restore, managing certificates,

More information

ZENworks 2017 Audit Management Reference. December 2016

ZENworks 2017 Audit Management Reference. December 2016 ZENworks 2017 Audit Management Reference December 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,

More information

Ciphermail Webmail Messenger Administration Guide

Ciphermail Webmail Messenger Administration Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail Webmail Messenger Administration Guide October 27, 2017, Rev: 8630 Copyright 2013-2017, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 4 2 Admin login

More information

FileCruiser. Administrator Portal Guide

FileCruiser. Administrator Portal Guide FileCruiser Administrator Portal Guide Contents Administrator Portal Guide Contents Login to the Administration Portal 1 Home 2 Capacity Overview 2 Menu Features 3 OU Space/Team Space/Personal Space Usage

More information

Vendor: IBM. Exam Code: C Exam Name: IBM Security Identity Manager V6.0 Implementation. Version: Demo

Vendor: IBM. Exam Code: C Exam Name: IBM Security Identity Manager V6.0 Implementation. Version: Demo Vendor: IBM Exam Code: C2150-197 Exam Name: IBM Security Identity Manager V6.0 Implementation Version: Demo Question No : 1 Which is true for the relationship between provisioning policies, services, and

More information

Cox Business Online Backup Administrator Guide. Version 2.0

Cox Business Online Backup Administrator Guide. Version 2.0 Cox Business Online Backup Administrator Guide Version 2.0 2012 by Cox Communications. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic,

More information

Oracle B2B 11g Technical Note. Technical Note: 11g_006 Security. Table of Contents

Oracle B2B 11g Technical Note. Technical Note: 11g_006 Security. Table of Contents Oracle B2B 11g Technical Note Technical Note: 11g_006 Security This technical note lists the security options available in Oracle B2B Table of Contents Users... 2 Roles... 2 Step 1: Create the user in

More information

Server Installation Guide

Server Installation Guide Server Installation Guide Server Installation Guide Legal notice Copyright 2018 LAVASTORM ANALYTICS, INC. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS HEREOF MAY NOT BE REPRODUCED OR DISTRIBUTED IN ANY

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 14 Create an Identity Rule, page 15 Manage a Realm, page 17 Manage an Identity

More information

User Manual. Admin Report Kit for IIS (ARKIIS)

User Manual. Admin Report Kit for IIS (ARKIIS) User Manual Admin Report Kit for IIS (ARKIIS) Table of Contents 1 Admin Report Kit for Internet Information Server-(ARKIIS)... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements...

More information

Citrix Exam 1Y0-253 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: 6.0 [ Total Questions: 186 ]

Citrix Exam 1Y0-253 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: 6.0 [ Total Questions: 186 ] s@lm@n Citrix Exam 1Y0-253 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: 6.0 [ Total Questions: 186 ] Question No : 1 Scenario: An administrator needs to deliver production

More information

Logging into the Firepower System

Logging into the Firepower System The following topics describe how to log into the Firepower System: Firepower System User Accounts, on page 1 User Interfaces in Firepower Management Center Deployments, on page 3 Logging Into the Firepower

More information

Tenant Administration

Tenant Administration vcloud Automation Center 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions

More information

Installation and Configuration Worksheet for AquaLogic Ensemble 1.0 MP2

Installation and Configuration Worksheet for AquaLogic Ensemble 1.0 MP2 Installation and uration Worksheet for AquaLogic Ensemble 1.0 MP2 This document contains worksheets for installing and configuring AquaLogic Ensemble 1.0. Print this document and use it to gather the host

More information

CHAPTER. Introduction

CHAPTER. Introduction CHAPTER 1 Cisco Unified Communications Manager (formerly Cisco Unified CallManager) serves as the software-based call-processing component of the Cisco Unified Communications family of products. A wide

More information

SSL/TLS Security Assessment of e-vo.ru

SSL/TLS Security Assessment of e-vo.ru SSL/TLS Security Assessment of e-vo.ru Test SSL/TLS implementation of any service on any port for compliance with industry best-practices, NIST guidelines and PCI DSS requirements. The server configuration

More information

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

VMware AirWatch Google Sync Integration Guide Securing Your  Infrastructure VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

Eucalyptus User Console Guide

Eucalyptus User Console Guide Eucalyptus 3.4.1 User Console Guide 2013-12-11 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...5 Install the Eucalyptus User Console...6 Install on Centos / RHEL 6.3...6 Configure

More information

Administration Guide

Administration Guide Administration Guide Version 2.0 November, 2015 Biscom, Inc. 321 Billerica Rd. Chelmsford, MA 01824 tel 978-250-1800 fax 978-250-4449 CONTENTS 1. Initial Configuration and Settings...1 1.1 Application...

More information

Elastic Load Balance. User Guide. Issue 14 Date

Elastic Load Balance. User Guide. Issue 14 Date Issue 14 Date 2018-02-28 Contents Contents 1 Overview... 1 1.1 Basic Concepts... 1 1.1.1 Elastic Load Balance... 1 1.1.2 Public Network Load Balancer...1 1.1.3 Private Network Load Balancer... 2 1.1.4

More information

Setting Up the Server

Setting Up the Server Managing Licenses, page 1 Cross-launch from Prime Collaboration Provisioning, page 5 Integrating Prime Collaboration Servers, page 6 Single Sign-On for Prime Collaboration, page 7 Changing the SSL Port,

More information

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 15 Create an Identity Rule, page 15 Manage a Realm, page 20 Manage an Identity

More information

F5 BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.2

F5 BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.2 F5 BIG-IQ Centralized Management: Licensing and Initial Setup Version 5.2 Table of Contents Table of Contents BIG-IQ System Introduction...5 About BIG-IQ Centralized Management... 5 How do I navigate

More information

Assuming you have Icinga 2 installed properly, and the API is not enabled, the commands will guide you through the basics:

Assuming you have Icinga 2 installed properly, and the API is not enabled, the commands will guide you through the basics: Icinga 2 Contents This page references the GroundWork Cloud Hub and the Icinga 2 virtualization environment. 1.0 Prerequisites 1.1 Enable the API The Icinga 2 system you run needs to have the API feature

More information

Sophos Mobile as a Service

Sophos Mobile as a Service startup guide Product Version: 8 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses...5 Check your licenses...6

More information

SSL Report: cartridgeworld.co.uk ( )

SSL Report: cartridgeworld.co.uk ( ) 1 of 5 26/06/2015 14:21 Home Projects Qualys.com Contact You are here: Home > Projects > SSL Server Test > cartridgeworld.co.uk SSL Report: cartridgeworld.co.uk (95.138.147.104) Assessed on: Fri, 26 Jun

More information

Source, Sink, and Processor Configuration Values

Source, Sink, and Processor Configuration Values 3 Source, Sink, and Processor Configuration Values Date of Publish: 2018-12-18 https://docs.hortonworks.com/ Contents... 3 Source Configuration Values...3 Processor Configuration Values... 5 Sink Configuration

More information

CloudLink SecureVM. Administration Guide. Version 4.0 P/N REV 01

CloudLink SecureVM. Administration Guide. Version 4.0 P/N REV 01 CloudLink SecureVM Version 4.0 Administration Guide P/N 302-002-056 REV 01 Copyright 2015 EMC Corporation. All rights reserved. Published June 2015 EMC believes the information in this publication is accurate

More information

Change and Configuration Management Administration

Change and Configuration Management Administration CHAPTER 7 Change and Configuration Management Administration These topics provide administrative information on Change and Configuration Management: Configuring Global Settings for Configuration Management,

More information

Administering vrealize Log Insight. September 20, 2018 vrealize Log Insight 4.7

Administering vrealize Log Insight. September 20, 2018 vrealize Log Insight 4.7 Administering vrealize Log Insight September 20, 2018 4.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

BIG-IP Access Policy Manager : Implementations. Version 12.1

BIG-IP Access Policy Manager : Implementations. Version 12.1 BIG-IP Access Policy Manager : Implementations Version 12.1 Table of Contents Table of Contents Web Access Management...11 Overview: Configuring APM for web access management...11 About ways to time out

More information

IBM Education Assistance for z/os V2R1

IBM Education Assistance for z/os V2R1 IBM Education Assistance for z/os V2R1 Items: TLS V1.2 Suite B RFC 5280 Certificate Validation Element/Component: Cryptographic Services - System SSL Material is current as of June 2013 Agenda Trademarks

More information

Sophos Mobile SaaS startup guide. Product version: 7.1

Sophos Mobile SaaS startup guide. Product version: 7.1 Sophos Mobile SaaS startup guide Product version: 7.1 Contents 1 About this guide...4 2 What are the key steps?...5 3 Change your password...6 4 Change your login name...7 5 Activate SMC Advanced licenses...8

More information

pinremote Manual Version 4.0

pinremote Manual Version 4.0 pinremote Manual Version 4.0 Page 1 Table of content 1 Introduction... 4 2 Setup... 5 2.1 Requirements server... 5 2.2 Requirements client... 5 2.3 Setup process... 6 2.3.1 Single Server... 8 2.3.2 Cluster...

More information

Data Structure Mapping

Data Structure Mapping This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.1., page 1 Migrated

More information

Managing GSS Devices from the GUI

Managing GSS Devices from the GUI CHAPTER 1 This chapter describes how to configure and manage your Global Site Selector Manager (GSSM) and Global Site Selector (GSS) devices from the primary GSSM graphical user interface. It includes

More information

Real-Time Dashboard Integration Bomgar Remote Support

Real-Time Dashboard Integration Bomgar Remote Support Real-Time Dashboard Integration Bomgar Remote Support 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

Configuring SAML-based Single Sign-on for Informatica Web Applications

Configuring SAML-based Single Sign-on for Informatica Web Applications Configuring SAML-based Single Sign-on for Informatica Web Applications Copyright Informatica LLC 2017. Informatica LLC. Informatica, the Informatica logo, Informatica Big Data Management, and Informatica

More information

UCS Manager Communication Services

UCS Manager Communication Services Communication Protocols, page 1 Communication Services, page 1 Non-Secure Communication Services, page 3 Secure Communication Services, page 5 Network-Related Communication Services, page 12 Communication

More information

Managing Users and Configuring Role-Based Access Control

Managing Users and Configuring Role-Based Access Control Managing s and Configuring Role-Based Access Control This section describes how to manage users in Prime Central, including defining users and passwords and configuring role-based access control (RBAC).

More information

Release Notes McAfee Vulnerability Manager 7.5.8

Release Notes McAfee Vulnerability Manager 7.5.8 Release Notes McAfee Vulnerability Manager 7.5.8 About this release Resolved issues Installation instructions Known issues Find product documentation About this release This document contains important

More information

Barracuda Firewall Release Notes 6.5.x

Barracuda Firewall Release Notes 6.5.x Please Read Before Upgrading Before installing the new firmware version, back up your configuration and read all of the release notes that apply to the versions that are more current than the version that

More information

F5 Azure Cloud Try User Guide. F5 Networks, Inc. Rev. September 2016

F5 Azure Cloud Try User Guide. F5 Networks, Inc. Rev. September 2016 F5 Azure Cloud Try User Guide F5 Networks, Inc. Rev. September 2016 Azureinfo@f5.com Table of Contents Introduction... 3 F5 Web Application Firewall Solution, (WAF) Review... 3 Configuring SSO/Pre-authentication

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, page 1 Cisco ISE Administrators, page 1 Cisco ISE Administrator Groups, page 3 Administrative Access to Cisco ISE, page 11 Role-Based

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 2 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on

More information

Snapt Accelerator Manual

Snapt Accelerator Manual Snapt Accelerator Manual Version 2.0 pg. 1 Contents Chapter 1: Introduction... 3 Chapter 2: General Usage... 3 Accelerator Dashboard... 4 Standard Configuration Default Settings... 5 Standard Configuration

More information

Installation and Configuration Worksheet for AquaLogic Ensemble 1.0

Installation and Configuration Worksheet for AquaLogic Ensemble 1.0 Installation and uration Worksheet for AquaLogic Ensemble 1.0 This document contains worksheets for installing and configuring AquaLogic Ensemble 1.0. Print this document and use it to gather the host

More information

Webthority can provide single sign-on to web applications using one of the following authentication methods:

Webthority can provide single sign-on to web applications using one of the following authentication methods: Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,

More information

VMware vrealize Operations for Horizon Security. VMware vrealize Operations for Horizon 6.5

VMware vrealize Operations for Horizon Security. VMware vrealize Operations for Horizon 6.5 VMware vrealize Operations for Horizon Security VMware vrealize Operations for Horizon 6.5 VMware vrealize Operations for Horizon Security You can find the most up-to-date technical documentation on the

More information

Blue Coat Security First Steps Solution for Controlling HTTPS

Blue Coat Security First Steps Solution for Controlling HTTPS Solution for Controlling HTTPS SGOS 6.5 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks

More information

Read the following information carefully, before you begin an upgrade.

Read the following information carefully, before you begin an upgrade. Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing

More information

Nimsoft Cloud User Experience

Nimsoft Cloud User Experience Page 1 of 13 Nimsoft Cloud User Experience Nimsoft Monitor Solutions v7.2 Introduction The Purpose of this HOWTO guide: This HOWTO guide will get you started with Nimsoft Cloud User Experience (CUE) performance

More information

Configuring Cisco TelePresence Manager

Configuring Cisco TelePresence Manager CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,

More information

Dell License Manager Version 1.2 User s Guide

Dell License Manager Version 1.2 User s Guide Dell License Manager Version 1.2 User s Guide Notes, Cautions, and Warnings NOTE: A NOTE indicates important information that helps you make better use of your computer. CAUTION: A CAUTION indicates either

More information

Sophos Mobile. super administrator guide. Product Version: 8

Sophos Mobile. super administrator guide. Product Version: 8 Sophos Mobile super administrator guide Product Version: 8 Contents About this guide... 1 Document conventions... 1 Super administrator... 2 Super administrator tasks...2 Super administrator customer...

More information

AppSpider Enterprise. Getting Started Guide

AppSpider Enterprise. Getting Started Guide AppSpider Enterprise Getting Started Guide Contents Contents 2 About AppSpider Enterprise 4 Getting Started (System Administrator) 5 Login 5 Client 6 Add Client 7 Cloud Engines 8 Scanner Groups 8 Account

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

Configuring SSL CHAPTER

Configuring SSL CHAPTER 7 CHAPTER This chapter describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section

More information

Connection Broker Advanced Connections Management for Multi-Cloud Environments. Security Review

Connection Broker Advanced Connections Management for Multi-Cloud Environments. Security Review Connection Broker Advanced Connections Management for Multi-Cloud Environments Security Review Version 8.2 December 2017 Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley

More information

BIG-IP System: SSL Administration. Version

BIG-IP System: SSL Administration. Version BIG-IP System: SSL Administration Version 13.1.0 Table of Contents Table of Contents About SSL Administration on the BIG-IP System...7 About SSL administration on the BIG-IP system... 7 Device Certificate

More information

Using the Prime Performance Manager Web Interface

Using the Prime Performance Manager Web Interface 3 CHAPTER Using the Prime Performance Manager Web Interface The following topics provide information about using the Cisco Prime Performance Manager web interface: Accessing the Prime Performance Manager

More information

Oracle Enterprise Manager. 1 Before You Install. System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0

Oracle Enterprise Manager. 1 Before You Install. System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0 Oracle Enterprise Manager System Monitoring Plug-in for Oracle Unified Directory User's Guide Release 1.0 E24476-01 October 2011 The System Monitoring Plug-In for Oracle Unified Directory extends Oracle

More information

Data Structure Mapping

Data Structure Mapping This appendix provides information about the data objects that are migrated, partially migrated, and not migrated from Cisco Secure ACS, Release 5.5 or later to Cisco ISE, Release 2.1., on page 1 Migrated

More information

The following topics provide more information on user identity. Establishing User Identity Through Passive Authentication

The following topics provide more information on user identity. Establishing User Identity Through Passive Authentication You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user

More information

Introduction to Change and Configuration Management

Introduction to Change and Configuration Management CHAPTER 1 Introduction to Change and Configuration Management Cisco Prime Network Change and Configuration Management provides tools that allow you to manage the software and device configuration changes

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER 7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:

More information

Installing and Configuring VMware vrealize Orchestrator

Installing and Configuring VMware vrealize Orchestrator Installing and Configuring VMware vrealize Orchestrator vrealize Orchestrator 7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Oracle Endeca Server. Administrator's Guide. Version January 2016

Oracle Endeca Server. Administrator's Guide. Version January 2016 Oracle Endeca Server Administrator's Guide Copyright and disclaimer Copyright 2003, 2016, Oracle and/or its affiliates. All rights reserved. Oracle and Java are registered trademarks of Oracle and/or its

More information

Google Sync Integration Guide. VMware Workspace ONE UEM 1902

Google Sync Integration Guide. VMware Workspace ONE UEM 1902 Google Sync Integration Guide VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information