Using Filters in etrust IAM Policies 2

Size: px
Start display at page:

Download "Using Filters in etrust IAM Policies 2"

Transcription

1 Using Filters in etrust IAM Policies Using Filters in etrust IAM Policies 2 1. Policy Filters How to build filters to use in searches? Building Filters Filter Examples of 15

2 Using Filters in etrust IAM Policies 1. Policy Filters In searches we can limit the search by specifying the conditions through filters. Similarly in Policies, you can further limit the access policy through these filters. We can also define multiple filters combining them into groups using and/or operations just the way we define conditions in "where" clause while searching the database. Filters are attached to the policies to limit the scope of a policy. etrust IAM uses filters during the evaluation phase of the policy evaluation process. Basic structure of a filter Each filter consists of the following components: The connector to the previous filter (logic) (Optional) One or more left parentheses before the expression A sub-expression, consisting of a left-hand side value, an operator, and a right-hand side value (Optional) One or more right parentheses after the expression The Filter takes in 7 arguments. They are logic, lparens, col, optype, oper, val, and rparens in order. Let's see what they actually mean: Parameter Description logic lparens constant int value from SafeEnum.Logic number of left parens Overview Logic is used to represent the logic between each ordered filter. The available SafeEnum.Logic values are AND, OR, LAST, NONE. This is for the logical grouping of filters. Works together with right parens col the column field This is the left side value of the condition optype oper constant int value from SafeEnum.OpType constant int value from SafeEnum.Oper OpType is used to set the operator's data type, the data type is used for proper evaluation of filters. Oper is used to represent the operator. Available operations are like, notlike, equal, notequal, match, notmatch, withinset, notinset, startswith, endswith, greater, greaterequal, less, lessequal, contains. 2 of 15

3 val the value field This represent the left side value of the condition rparens number of right parens These are count of number closing braces to end a group of conditions. Example: Build a filter which limits the search of Users whose FirstName is equal to "Ravi" and whose Jobtitle is Manager. Observe what our condition is - "FirstName" "is equal to" "Ravi" and "Jobtitle" "is equal to" "Manager". Analyzing in the same manner as above will get us: 'FirstName=Ravi and JobTitle=Manager' 1st Filter : new SafeFilter(SafeEnum.Logic.NONE, 0, "A:FirstName", SafeEnum.OpType.STRING, SafeEnum.Oper.EQUAL, "Ravi", 0); 2nd Filter : new SafeFilter(SafeEnum.Logic.NONE, 0, "A:JobTitle", SafeEnum.OpType.STRING, SafeEnum.Oper.EQUAL, "Manager", 0); Filters are ordered in IAM. So, in the logic of second filter, we must use "AND" logic instead of "NONE" logic. And we have added to List in the same order. So, finally it looks like: List filterq = new ArrayList(); filterq.add(new SafeFilter(SafeEnum.Logic.NONE, 0, "A:FirstName", SafeEnum.OpType.STRING, SafeEnum.Oper.EQUAL, "Ravi", 0)); filterq.add(new SafeFilter(SafeEnum.Logic.AND, 0, "A:JobTitle", SafeEnum.OpType.STRING, SafeEnum.Oper.EQUAL, "Manager", 0)); List globalusers = safecontext.searchglobaluser(filterq); 2. How to build filters to use in searches? In the SafeContext class, we have many search methods using which we can search for application instances, calendars, appobjects, policies, user groups, global user groups, users and global users. And by implementation all the mentioned objects are inherited from Safe Stored Object class. This is because all these objects are stored. We will refer to any of these objects commonly as stored objects. When searching for stored objects, use "cn" to refer to the Name of the object.that is: List filterq = new ArrayList(); 3 of 15

4 filterq.add(new SafeFilter(SafeEnum.Logic.NONE, 0, "cn", SafeEnum.OpType.STRING, SafeEnum.Oper.LIKE, "app*", 0)); // Build the filter and just call the appropriate search method. List globalusergroups = safecontext.searchapplicationinstances(filterq); 3. Building Filters You can use filters to manage searches. Filters are similar to the 'where' clause in the databases when used in searches. You can define multiple filters by combining groups using the AND and OR operations. The easiest way to read filters is to string them together, ignoring the logic in the initial filter. For example: Logic ( Left type/value Operator Right type/value ) (ignore) named attribute: ward == value: ER AND ( named attribute: ward == user: ward OR ( named attribute: doctor == global user: UserName AND user group: Name == value: Doctors )) The following fields are available in each filter: Logic Indicates the connector to the previous filter that is ignored for the first filter. ( and ) Indicates how the sub-expressions are grouped, which affects the logic. Left type/value and Right type/value Specifies a type and value for the sub-expression. The possible values vary based on the selected type. The type can include any of the following: 4 of 15

5 global user Specifies a global user attribute, as follows: User Name First Name Middle Name Last Name Alias Job Title Company Department Office Work Phone Number Fax Phone Number Mobile Phone Number Home Phone Number Address City State Postal Code Country Mail Stop Address Description Incorrect Login Count Suspended Comments Group Membership Display Name Password Change Date Password Expire Time Suspended Date Disable Date Enable Date Change Password Next Login Override Password Policy Password Time to Warn Parent Path global user group Specifies a global user group attribute, as follows: Name Description Group Membership Parent Path 5 of 15

6 user Specifies a user attribute, as follows: Name Group Membership Parent Path Terminology Preference JobFlowMonitoringRefreshInterval JobFlowOverviewRefreshInterval JobEditObjectDisplayCount Note: User values are application-specific. This list will change for each etrust IAM application. user group Specifies a user group attribute, as follows: Name Description Group Membership Parent Path named attribute Specifies a resource attribute (passed in with the authorization request), as follows: Resource Class Named Attributes AlertAction component - the name of the component issuing nametype - View or Server name - viewname or servername ApplicationAccess component - the name of the component issuing category the category for a set of applications name a specific application within the application category CommandExecute component - the name of the component issuing servername the name of the server command command to be executed on the given server CommandSetup component - the name of the component issuing mode local or global cmdname the name of the command specification in the local or global command set 6 of 15

7 Resource Class Named Attributes JobActionAutoSys component - the name of the component issuing nametype view or server name name of the view or server JobActionCA7 component - the name of the component issuing nametype view or server name name of the view or server LogAccess component - the name of the component issuing servername the name of the server MonitorViewControl component - the name of the component issuing viewname name of the view objecttype JobFlow, PriorRun, or RunLog ObjectAccess component - the name of the component issuing servername the name of the server objecttype AlertPolicy, Calendar, Cycle, ExtendedCalendar, GlobalVariable, Job, Jobset, Report objectname the name of the object ObjectControl component - the name of the component issuing servername the name of the server objecttype AlertPolicy, ARFDef, ARFSet, Calendar, Cycle, Dataset, ExtendedCalendar, GlobalVariable, Job jobtype Box, CA-7, Command, FileWatcher, InfoPackage, ProcessChain, SAP, WebServices, UserDefinedX objectsubtype Predecessor, Schedule, Trigger predtype Dataset, Job, Network, UserRequirement, VRM PortletAccess component - the name of the component issuing category the category for a set of portlets name a specific portlet within the portlet category ServerAccess component - the name of the component issuing type - AutoSys, CA7, or Event servername the name of the server Note: Named Attributes are application-specific. This list will change for each etrust IAM application. Components are comprised of the following: Applications: Configuration JobEditor 7 of 15

8 JobFlowDesign JobFlowMonitoring JobFlowOverviewEditor JobStatusConsole EventConsole HostAccess WebServicesBasic WebServicesAdvanced SecurityConfiguration Reporting QuickView Portlets: QuickStart ServerStatus ServicesStatus CredentialGroupSummaryStatus CredentialUserSummaryStatus CCILinkStatus CredentialUserPasswordModification JobEditorCreateObject JobEditorFindObject JobFlowOverview JobStatusViews CommandLine session Specifies a session attribute, as follows: ses:{name} evaluates to the value(s) of the session's attributeq (sessionattrq) matching {name} Enter the name of the session attribute in the value. environment Specifies an environment attribute, as follows: Env:{name} evaluates to the value(s) of the environment attributeq (envattrq) maching {name} Enter the name of the environment attribute in the value. 8 of 15

9 request Specifies a request attribute, as follows: req:{identity action resource when delegator} evaluates to the corresponding values from the permission check request value Specifies an open-ended value. Enter the value. val:{data} evaluates to the single value of {data} Operator dynamic user group Specifies a dynamic user group by its name. dug:name evaluates to the name(s) of the Dynamic UserGroups the identity belongs to. request time (when) calculation Specifies the offset in minutes from the current request time. For example, "-360" means 10 hours before the current request, and "60" means one hour after the current request. when:{offset} evaluates to req:when offset by the {offset} ({offset} is specified in minutes). Sets the offset in minutes from the current request time. For example, "-360" means 10 hours before the current request, and "60" means one hour after the current request. Specifies an XML-based formula to be performed during policy evaluation. This opens the Calculation Editor. calc:{calculation} evaluates to result of the {calculation} Indicates the datatype and operator with which to evaluate the subexpression, as follows: Datatype Specifies one of the following datatypes: Notype STRING INT32 9 of 15

10 Operator UINT32 REAL32 REAL64 TIMESTAMP REGEX XPATH BOOLEAN Note: You must ensure that the datatype selected matches the datatype of the type/value being evaluated. Specifies one of the following operators: NONE EQUAL == NOTEQUAL!= LESS < GREATER > LESSEQUAL <= GREATEREQUAL >= LIKE ~ NOTLIKE!~ WITHINSET {} NOTINSET!{} STARTSWITH --* ENDSWITH *-- CONTAINS *--* The following buttons and icons are available: Add Filter Adds another empty filter to the end of the list. Remove Removes the associated filter. Show Calculation Editor Displays the Calculation Editor so that you can manipulate attribute values before a comparison. 10 of 15

11 4. Filter Examples Global User: Example 1: Policy will restrict the allowed users to only those whose first names begin with an A. Example 2: Policy will restrict the allowed users to only those whose office is New York. Example 3: Policy will restrict allowed users to those whose office is New York, and whose last name is either Smith or Singh. Global User Group: Example 1: Policy will restrict allowed users to those who are in the Global User Groups with names that begin with WCC*. User: Example 1: Policy will restrict allowed users to those with a terminology preference of Native. 11 of 15

12 Named Attribute: Example 1: Policy will only allow access to the Job Flow Monitoring component. Dynamic User Group: Example 1: Policy will allow access only to users whose dynamic user group is not equal to Operator. Session: Example1: Here we are building a filter based on the session of global user headnurse. Policy: The entire Chiefs global group can read any billing data. If we want only headnurse can only read the data who is member of Chiefs. We are defining filter as shown below. Example 2: Chiefs can read any billing data, where nurse is member of the group chiefs 12 of 15

13 Request: Example 1: Filter based on request for a resource. Filter for: Chiefs can enter any ward except office. Example 2: Office workers can read/write any safeobject except policies Example 3: Request in combination with when Chiefs can enter any ward with in 1 hour Example 4: Combinations of request and named attribute.( Delegation Policy) Filter: if worker delegates his rights to the head doctor for global users and users in the Medical subfolder 13 of 15

14 Selected Identities are Resources are: Filter: Calculation: Example 1: If the calculation defined in the filter evaluates to true then only, the permission check on that policy evaluates to true. Access policy for door resource class: Door should be opened by erdoctor only Filter: 14 of 15

15 Example 2: Calculation on Integer operations Example 3: Calculation on REAL32 operations Example 4: Calculation with TIMESTAMP Custom variable and Request time: Custom variable and Request time filter conditions are used to be only through SDK. These filters are meant only for developers integrating etrust IAM into their applications. Usage of these filters through UI is not intended/encouraged. 15 of 15

Novell OpenLDAP Configuration

Novell OpenLDAP Configuration Novell OpenLDAP Configuration To access the GoPrint Novell e-directory LDAP Connector configuration screen navigate to: Accounts Authentication Connectors GoPrint provides two connector options, Standard

More information

Authentication via Active Directory and LDAP

Authentication via Active Directory and LDAP Authentication via Active Directory and LDAP Overview The LDAP and Active Directory authenticators available in Datameer provide remote authentication services for Datameer users. Administrators can configure

More information

Solution: Use Workload Automation AE polices in EEM to grant full permissions to the administrators and restricted permissions to the schedulers.

Solution: Use Workload Automation AE polices in EEM to grant full permissions to the administrators and restricted permissions to the schedulers. Allow Users to Only Execute Certain Jobs in WCC Using EEM Policies 1 Scenario: You have two groups of WCC users: administrators and schedulers. You want administrators to have full permissions on all AE

More information

Chapter 10 Introduction to Classes

Chapter 10 Introduction to Classes C++ for Engineers and Scientists Third Edition Chapter 10 Introduction to Classes CSc 10200! Introduction to Computing Lecture 20-21 Edgardo Molina Fall 2013 City College of New York 2 Objectives In this

More information

One Identity Manager 8.0. Administration Guide for Connecting to Azure Active Directory

One Identity Manager 8.0. Administration Guide for Connecting to Azure Active Directory One Identity Manager 8.0 Administration Guide for Connecting to Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Quick Guide: Profile Setup

Quick Guide: Profile Setup Guide This Guide will provide you instructions on how to setup your Profile in Concur. Upon initial access to Concur, setting up your Profile is the first step to take. Accessing Concur 1. Go to Travel.ouhsc.edu.

More information

PRISM-FHF The Fred Hollows Foundation

PRISM-FHF The Fred Hollows Foundation PRISM-FHF The Fred Hollows Foundation SECURITY ADMINISTRATOR S GUIDE Version 1.2 TABLE OF CONTENTS INTRODUCTION... 4 OVERVIEW... 4 SECURITY CONSOLE... 6 ACCESSING THE SECURITY CONSOLE... 6 VIEWING THE

More information

Introduction. This quick reference gives you clear and simple steps to. navigate ENA's website to Run Reports; run a report listing scheduled courses;

Introduction. This quick reference gives you clear and simple steps to. navigate ENA's website to Run Reports; run a report listing scheduled courses; Introduction ENA's active Course Directors, State Chairs, State Presidents, President-Elects and Board of Directors all have a role in efficient and effective Course Operations. In order to stay informed,

More information

1 28/06/ :17. Authenticating Users General Information Manipulating Data. REST Requests

1 28/06/ :17. Authenticating Users General Information Manipulating Data. REST Requests 1 28/06/2012 13:17 Using standard HTTP requests, this API allows you to retrieve information about the datastore classes in your project, manipulate data, log into your web application, and much more.

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Quick Guide: Profile Setup

Quick Guide: Profile Setup Guide This Guide will provide you instructions on how to setup your Profile in Concur. Upon initial access to Concur, setting up your Profile is the first step to take. Accessing Concur 1. Go to Travel.ouhsc.edu.

More information

Connector for OpenText Content Server Setup and Reference Guide

Connector for OpenText Content Server Setup and Reference Guide Connector for OpenText Content Server Setup and Reference Guide Published: 2018-Oct-09 Contents 1 Content Server Connector Introduction 4 1.1 Products 4 1.2 Supported features 4 2 Content Server Setup

More information

One Identity Manager Administration Guide for Connecting Oracle E-Business Suite

One Identity Manager Administration Guide for Connecting Oracle E-Business Suite One Identity Manager 8.0.2 Administration Guide for Connecting Oracle E- Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Directory Integration with VMware Identity Manager

Directory Integration with VMware Identity Manager Directory Integration with VMware Identity Manager VMware AirWatch 9.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Talend Component tgoogledrive

Talend Component tgoogledrive Talend Component tgoogledrive Purpose and procedure This component manages files on a Google Drive. The component provides these capabilities: 1. Providing only the client for other tgoogledrive components

More information

Easy Survey Creator: User s Guide

Easy Survey Creator: User s Guide Easy Survey Creator: User s Guide The Easy Survey Creator software is designed to enable faculty, staff, and students at the University of Iowa Psychology Department to quickly and easily create surveys

More information

1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari) and go to

1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari) and go to VMWare AirWatch User Guide for Web Browser You can access your AirWatch Files from a web browser. How to login AirWatch Cloud Storage? 1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari)

More information

User guide. Bloomberg Legal Entity Identifier (LEI) web platform

User guide. Bloomberg Legal Entity Identifier (LEI) web platform User guide Bloomberg Legal Entity Identifier (LEI) web platform Access the platform 1. Go to : https://lei.bloomberg.com 2. Click on Account and then on Signup 2 Create your account 3. Fill-in the requested

More information

Lecture 18 Tao Wang 1

Lecture 18 Tao Wang 1 Lecture 18 Tao Wang 1 Abstract Data Types in C++ (Classes) A procedural program consists of one or more algorithms that have been written in computerreadable language Input and display of program output

More information

TIBCO Spotfire Automation Services 7.5. User s Manual

TIBCO Spotfire Automation Services 7.5. User s Manual TIBCO Spotfire Automation Services 7.5 User s Manual Revision date: 15 January 2016 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO

More information

RulePoint Proactive PowerCenter Monitoring

RulePoint Proactive PowerCenter Monitoring Contents Informatica Corporation RulePoint Release Notes June 27, 2011 Copyright 1998-2011 Informatica Corporation Abstract... 1 RulePoint Proactive PowerCenter Monitoring... 1 Installation... 1 Enhancements...

More information

This document contains information on fixed and known limitations for Test Data Management.

This document contains information on fixed and known limitations for Test Data Management. Informatica Corporation Test Data Management Version 9.6.0 Release Notes August 2014 Copyright (c) 2003-2014 Informatica Corporation. All rights reserved. Contents Informatica Version 9.6.0... 1 Installation

More information

RSA Identity Governance and Lifecycle Collector Data Sheet for Workday

RSA Identity Governance and Lifecycle Collector Data Sheet for Workday RSA Identity Governance and Lifecycle Collector Data Sheet for Workday Version 1.3 January 2018 RSA Identity Governance and Lifecycle Collector Datasheet for Workday Contents Purpose... 4 Supported Software...

More information

SMARTPROS LTD. PROFESSIONAL EDUCATION CENTER USER S GUIDE BANKING EDITION

SMARTPROS LTD. PROFESSIONAL EDUCATION CENTER USER S GUIDE BANKING EDITION - 1 - SMARTPROS LTD. PROFESSIONAL EDUCATION CENTER USER S GUIDE BANKING EDITION Document version 1.0 - Banking Updated April 20, 2006 SmartPros Banking by SmartPros Ltd. Support: admin@smartpros.com (914)

More information

ARELLO.COM Licensee Verification Web Service v2.0 (LVWS v2) Documentation. Revision: 8/22/2018

ARELLO.COM Licensee Verification Web Service v2.0 (LVWS v2) Documentation. Revision: 8/22/2018 ARELLO.COM Licensee Verification Web Service v2.0 (LVWS v2) Documentation Revision: 8/22/2018 Table of Contents Revision: 8/22/2018... 1 Introduction... 3 Subscription... 3 Interface... 3 Formatting the

More information

One Identity Active Roles 7.2. Replication: Best Practices and Troubleshooting Guide

One Identity Active Roles 7.2. Replication: Best Practices and Troubleshooting Guide One Identity Active Roles 7.2 Replication: Best Practices and Troubleshooting Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The

More information

Liferay Portal 4 - Portal Administration Guide. Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer

Liferay Portal 4 - Portal Administration Guide. Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer Liferay Portal 4 - Portal Administration Guide Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer Liferay Portal 4 - Portal Administration Guide Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer 1.1

More information

SAP Analytics Cloud Best Practices for BI Platform Live Universes

SAP Analytics Cloud Best Practices for BI Platform Live Universes NOTE: Delete the yellow stickers when finished. See the SAP Image Library for other available images. Once the custom image is inserted, click Format Send Backward Send to Back, so the motion band is on

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

IB Sets and Venn Diagram Questions- Package #1

IB Sets and Venn Diagram Questions- Package #1 I Sets and Venn Diagram Questions- Package #1 1. is the set of all the positive integers less than or equal to 12., and C are subsets of. = {1, 2, 3, 4, 6,12} = {odd integers} C = {5, 6, 8} (a) Write down

More information

ISEC7 Mobile Exchange Delegate

ISEC7 Mobile Exchange Delegate Android User Documentation 1 Create Master Account 4 2 Add Delegate Access 6 3 Add Shared Calendars 7 4 Synchronization 8 5 Managing Folders 9 5.1 Folders 9 5.2 Add Folder 10 6 Move Items 11 7 Categorize

More information

Adobe Sign for Microsoft Dynamics

Adobe Sign for Microsoft Dynamics Adobe Sign for Microsoft Dynamics Installation & Configuration Guide (v5) Last Updated: March 16, 2017 2017 Adobe Systems Incorporated. All rights reserved Table of Contents Overview... 3 Prerequisites...

More information

Geneos Gateway Authentication Technical Reference. Functional Area: Geneos Gateway Authentication. Geneos Release: v4.9. Document Version: v1.0.

Geneos Gateway Authentication Technical Reference. Functional Area: Geneos Gateway Authentication. Geneos Release: v4.9. Document Version: v1.0. Geneos Gateway Authentication Technical Reference Functional Area: Geneos Gateway Authentication Geneos Release: v4.9 Document Version: v1.0.0 Date Published: 25 October 2018 Copyright 2018. ITRS Group

More information

Dell One Identity Manager Administration Guide for Connecting to SharePoint

Dell One Identity Manager Administration Guide for Connecting to SharePoint Dell One Identity Manager 7.1.3 Administration Guide for Connecting to SharePoint 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property

More information

SharePoint Best Practices. Security

SharePoint Best Practices. Security SharePoint Best Practices Security A fundamental responsibility concerning site security is to manage who can access resources on your site. The following outlines specifics and best practices in doing

More information

User Group Configuration

User Group Configuration CHAPTER 90 The role and user group menu options in the Cisco Unified Communications Manager Administration User Management menu allow users with full access to configure different levels of access for

More information

Expense: Process Reports

Expense: Process Reports Expense: Process Reports User Guide for Standard Edition Applies to these SAP Concur solutions: Expense Professional/Premium edition Standard edition Travel Professional/Premium edition Standard edition

More information

IBM. Administration Guide. IBM Emptoris Contract Management SaaS

IBM. Administration Guide. IBM Emptoris Contract Management SaaS IBM Emptoris Contract Management IBM Administration Guide 10.1.2 SaaS IBM Emptoris Contract Management IBM Administration Guide 10.1.2 SaaS ii IBM Emptoris Contract Management: Administration Guide Copyright

More information

User Guide Ahmad Bilal [Type the company name] 1/1/2009

User Guide Ahmad Bilal [Type the company name] 1/1/2009 User Guide Ahmad Bilal [Type the company name] 1/1/2009 Contents 1 LOGGING IN... 1 1.1 REMEMBER ME... 1 1.2 FORGOT PASSWORD... 2 2 HOME PAGE... 3 2.1 CABINETS... 4 2.2 SEARCH HISTORY... 5 2.2.1 Recent

More information

This manual is for financial service provider (FSP) members of CIO in using the CIO self-service Portal.

This manual is for financial service provider (FSP) members of CIO in using the CIO self-service Portal. CIO FSP Portal Manual 2017 Who is this manual intended for This manual is for financial service provider (FSP) members of CIO in using the CIO self-service Portal. Logging In The Portal can be accessed

More information

See Types of Data Supported for information about the types of files that you can import into Datameer.

See Types of Data Supported for information about the types of files that you can import into Datameer. Importing Data When you import data, you import it into a connection which is a collection of data from different sources such as various types of files and databases. See Configuring a Connection to learn

More information

Donor Management with GiftWorks. The Big Picture... 2 A Closer Look... 2 Scenarios... 4 Best Practices Conclusion... 21

Donor Management with GiftWorks. The Big Picture... 2 A Closer Look... 2 Scenarios... 4 Best Practices Conclusion... 21 Donor Management with GiftWorks The Big Picture... 2 A Closer Look... 2 Scenarios... 4 Best Practices... 20 Conclusion... 21 The Big Picture With GiftWorks, you can store a large amount of information

More information

User Guide. Version 8.0

User Guide. Version 8.0 User Guide Version 8.0 Contents 1 Getting Started... iii 1.1... About... iii 2 Logging In... 4 2.1... Choosing Security Questions... 4 3 The File Manager... 5 3.1... Uploading a file... 6 3.2... Downloading

More information

Configuring RBAC Using Admin UI

Configuring RBAC Using Admin UI CHAPTER 13 This chapter describes the Security feature of Prime Cable Provisioning. Use this feature to configure and manage various levels of security. For conceptual information about the RBAC feature,

More information

Interact2 Help and Support

Interact2 Help and Support Sharing content stored in Interact2 Content Collection Contents Terminology... 2 What is the Content Collection?... 2 Student view of the Content Collection in course and subject sites... 4 Summary of

More information

StarTeam LDAP QuickStart Manager Administration Guide

StarTeam LDAP QuickStart Manager Administration Guide StarTeam 15.1 LDAP QuickStart Manager Administration Guide Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 2016. All rights reserved.

More information

Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000

Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000 Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000 Define and set DAC policy (define group membership, set default DAC attributes, set DAC on files systems) Modify

More information

EMC SourceOne for Microsoft SharePoint Version 6.7

EMC SourceOne for Microsoft SharePoint Version 6.7 EMC SourceOne for Microsoft SharePoint Version 6.7 Administration Guide P/N 300-012-746 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2011

More information

This Job Aid will assist setting up the Outlook Application for use on iphones and Android phones.

This Job Aid will assist setting up the Outlook Application for use on iphones and Android phones. Purpose Outlook App Setup for iphones and Android Job Aid This Job Aid will assist setting up the Outlook Application for use on iphones and Android phones. Contents iphone Device Setup... 2 Account Setup...

More information

BMS Managing Users in Modelpedia V1.1

BMS Managing Users in Modelpedia V1.1 BMS 3.2.0 Managing Users in Modelpedia V1.1 Version Control Version Number Purpose/Change Author Date 1.0 Initial published version Gillian Dass 26/10/2017 1.1 Changes to User roles Gillian Dass 14/11/2017

More information

Content Publisher User Guide

Content Publisher User Guide Content Publisher User Guide Overview 1 Overview of the Content Management System 1 Table of Contents What's New in the Content Management System? 2 Anatomy of a Portal Page 3 Toggling Edit Controls 5

More information

Oracle Adaptive Access Manager. 1 Oracle Adaptive Access Manager Documentation. 2 Resolved Issues. Release Notes Release 10g (

Oracle Adaptive Access Manager. 1 Oracle Adaptive Access Manager Documentation. 2 Resolved Issues. Release Notes Release 10g ( Oracle Adaptive Access Manager Release Notes Release 10g (10.1.4.5) E13648-03 May 2009 These release notes contain important last minute information not included in the Oracle Adaptive Access Manager Release

More information

New Features Summary. SAP Sybase Event Stream Processor 5.1 SP02

New Features Summary. SAP Sybase Event Stream Processor 5.1 SP02 Summary SAP Sybase Event Stream Processor 5.1 SP02 DOCUMENT ID: DC01616-01-0512-01 LAST REVISED: April 2013 Copyright 2013 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software

More information

EMS WEB APP Configuration Guide

EMS WEB APP Configuration Guide EMS WEB APP Configuration Guide V44.1 Last Updated: August 14, 2018 EMS Software emssoftware.com/help 800.440.3994 2018 EMS Software, LLC. All Rights Reserved. Table of Contents CHAPTER 1: EMS Web App

More information

One Identity Manager Administration Guide for Connecting to SharePoint

One Identity Manager Administration Guide for Connecting to SharePoint One Identity Manager 8.0.2 Administration Guide for Connecting to Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Dell One Identity Quick Connect for Cloud Services 3.6. Administrator Guide

Dell One Identity Quick Connect for Cloud Services 3.6. Administrator Guide Dell One Identity Quick Connect for Cloud Services 3.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Connector for Microsoft SharePoint 2013, 2016 and Online Setup and Reference Guide

Connector for Microsoft SharePoint 2013, 2016 and Online Setup and Reference Guide Connector for Microsoft SharePoint 2013, 2016 and Online Setup and Reference Guide Published: 2018-Oct-09 Contents 1 Microsoft SharePoint 2013, 2016 and Online Connector 4 1.1 Products 4 1.2 Supported

More information

RescueAssist. Administrator Guide. LogMeIn, Inc. 320 Summer St., Boston MA LogMeIn, Inc. All rights reserved.

RescueAssist. Administrator Guide. LogMeIn, Inc. 320 Summer St., Boston MA LogMeIn, Inc. All rights reserved. RescueAssist Administrator Guide LogMeIn, Inc. 320 Summer St., Boston MA 02210 2018 LogMeIn, Inc. All rights reserved. https://support.logmeininc.com Contents Using the Admin Center... 1 Log in to the

More information

ISEC7 Mobile Exchange Delegate

ISEC7 Mobile Exchange Delegate ios User Documentation 1 License/Subscription 4 1.1 Free version 4 1.2 Activating company account 5 1.3 Premium Subscription 8 2 Create Master Account 16 3 Add Delegate Access 19 4 Add Shared Calendars

More information

Laserfiche Security Training Manual

Laserfiche Security Training Manual - 1 - Laserfiche Security General Overview: One of the responsibilities of a Unit Administrator as it pertains to the Laserfiche Document Management System is controlling access to various file areas for

More information

Sage Installation and Administration Guide. May 2018

Sage Installation and Administration Guide. May 2018 Sage 300 2019 Installation and Administration Guide May 2018 This is a publication of Sage Software, Inc. 2018 The Sage Group plc or its licensors. All rights reserved. Sage, Sage logos, and Sage product

More information

Cayuse 424 Training VT PI Update Professional Profile

Cayuse 424 Training VT PI Update Professional Profile This handout is step by step instructions for a Principal Investigator (PI) to update their Professional Profile permissions in Cayuse 424 so that a staff person/business manager can be designated as a

More information

One Identity Manager 8.0. Target System Base Module Administration Guide

One Identity Manager 8.0. Target System Base Module Administration Guide One Identity Manager 8.0 Target System Base Module Administration Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

Solution: Use WCC polices in EEM to grant full access to the administrators and restricted access to the schedulers.

Solution: Use WCC polices in EEM to grant full access to the administrators and restricted access to the schedulers. How to Filter Views in WCC Using EEM Policies 1 Scenario: You have two groups of WCC users: administrators and schedulers. You want administrators to have full access to all WCC Monitoring Views. You want

More information

Managed DNS API Specification Version July 28, 2008

Managed DNS API Specification Version July 28, 2008 Managed DNS API Specification Version 2.8.8 July 28, 2008 Table of Contents Revisions and Updates...6 Introduction...7 Definition of terms used in this document...7 Validation Rules...8 Other constraints...9

More information

FCCLA State Adviser Membership Affiliation Instructions

FCCLA State Adviser Membership Affiliation Instructions FCCLA State Adviser 2014-2015 Membership Affiliation Instructions How to Login to the National Affiliation System: As a State Adviser, you received an email from National FCCLA with your Login Credentials.

More information

CTC Accounts Active Directory Synchronizer User Guide

CTC Accounts Active Directory Synchronizer User Guide i Contents Overview... 3 System Requirements... 4 Additional Notes... 5 Installation and Configuration... 6 Running the Synchronizer Interactively... 7 Automatic Updates... 7 Logging In... 8 Options...

More information

Creating an Analyst Viewer User and Group

Creating an Analyst Viewer User and Group Creating an Analyst Viewer User and Group 2010 Informatica Abstract This article describes how to create an analyst viewer user and group. Create an analyst viewer group in the Administrator tool to grant

More information

Link to Download FlexiDoc Server preactivated

Link to Download FlexiDoc Server preactivated Link to Download FlexiDoc Server preactivated Download FlexiDoc Server with licence code FlexiDoc Server last edition of windows XP x32&64 For the product update process, see ⠌ Product version: 3.1.6.0

More information

IBM Clinical Development

IBM Clinical Development IBM Clinical Development New User Help Effective: 26 January 2018 Copyright IBM corporation. 2017. IBM Clinical Development 2 TOPICS > > > Click the green icon to jump to the section or use the PDF page

More information

One Identity Manager 8.0. Administration Guide for Connecting to a Universal Cloud Interface

One Identity Manager 8.0. Administration Guide for Connecting to a Universal Cloud Interface One Identity Manager 8.0 Administration Guide for Connecting to a Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Coupa Cloud Connector Guide McAfee Cloud Identity Manager version 2.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

ibase Manager Net Admin Guide 2005 ibase

ibase Manager Net Admin Guide 2005 ibase ibase Manager Net Admin Guide 1 ibase Manager Net Table of Contents Section 1 Welcome to the ibase Manager Net Admin Help 3 Section 2 Purpose 3 Section 3 Copyright 3 Section 4 Disclaimer 3 Section 5 Main

More information

VERITAS Cluster Server Agent 1.0 for IBM HTTP Server

VERITAS Cluster Server Agent 1.0 for IBM HTTP Server VERITAS Cluster Server Agent 1.0 for IBM HTTP Server Installation and Configuration Guide Solaris February 2003 Disclaimer The information contained in this publication is subject to change without notice.

More information

Table of Contents. Table of Contents 3

Table of Contents. Table of Contents 3 User Guide for Administrators EPiServer 7 CMS Revision A, 2012 Table of Contents 3 Table of Contents Table of Contents 3 Introduction 5 About this Documentation 5 Accessing EPiServer Help System 5 Online

More information

Coveo Platform 7.0. Liferay Connector Guide

Coveo Platform 7.0. Liferay Connector Guide Coveo Platform 7.0 Liferay Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing market

More information

April 2011

April 2011 ereinsure User Guide Insurer Administrators ----------------------------------------------------------------------------------------------------------------------------- April 2011 Copyright 2011 ereinsure.com,

More information

Pegasystems PEGACSA71V1 Exam

Pegasystems PEGACSA71V1 Exam Pegasystems PEGACSA71V1 Exam Number: PEGACSA71V1 Passing Score: 800 Time Limit: 120 min File Version: 4.0 http://www.gratisexam.com/ PEGACSA71V1 Certified System Architect (CSA) 71V1 Version 4.0 Exam A

More information

Teamcenter NX Remote Manager Guide. Publication Number PLM00123 G

Teamcenter NX Remote Manager Guide. Publication Number PLM00123 G Teamcenter 10.1 NX Remote Manager Guide Publication Number PLM00123 G Proprietary and restricted rights notice This software and related documentation are proprietary to Siemens Product Lifecycle Management

More information

User Service. User Service. member. Network-level user with access to all aspects of the member's account (Advertisers, Publishers, Apps, etc.).

User Service. User Service. member. Network-level user with access to all aspects of the member's account (Advertisers, Publishers, Apps, etc.). User Service User Service "User" refers to people or groups able to log in to the AppNexus UI and API. Users are classified by a user_type, which determines what type of information they have access to.

More information

Workload Control Center Performance Tuning

Workload Control Center Performance Tuning Workload Control Center Performance Tuning This document includes recommendations and best practices for performance tuning for CA Workload Control Center (WCC), for the following releases: Unicenter Workload

More information

Enterprise Reporting -- APEX

Enterprise Reporting -- APEX Quick Reference Enterprise Reporting -- APEX This Quick Reference Guide documents Oracle Application Express (APEX) as it relates to Enterprise Reporting (ER). This is not an exhaustive APEX documentation

More information

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1 Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

1. Open Outlook by clicking on the Outlook icon. 2. Select Next in the following two boxes. 3. Type your name, , and password in the appropriate

1. Open Outlook by clicking on the Outlook icon. 2. Select Next in the following two boxes. 3. Type your name,  , and password in the appropriate 1 4 9 11 12 1 1. Open Outlook by clicking on the Outlook icon. 2. Select Next in the following two boxes. 3. Type your name, email, and password in the appropriate blanks and click next. 4. Choose Allow

More information

User Guide Product Design Version 1.7

User Guide Product Design Version 1.7 User Guide Product Design Version 1.7 1 INTRODUCTION 3 Guide 3 USING THE SYSTEM 4 Accessing the System 5 Logging In Using an Access Email 5 Normal Login 6 Resetting a Password 6 Logging Off 6 Home Page

More information

WebStudio User Guide. OpenL Tablets BRMS Release 5.18

WebStudio User Guide. OpenL Tablets BRMS Release 5.18 WebStudio User Guide OpenL Tablets BRMS Release 5.18 Document number: TP_OpenL_WS_UG_3.2_LSh Revised: 07-12-2017 OpenL Tablets Documentation is licensed under a Creative Commons Attribution 3.0 United

More information

Oracle User Productivity Kit User and Content Management. E August 2016

Oracle User Productivity Kit User and Content Management. E August 2016 Oracle User Productivity Kit User and Content Management E79038-01 August 2016 Oracle User Productivity Kit User and Content Management E79038-01 August 2016 Copyright 1998, 2016, Oracle and/or its affiliates.

More information

Oracle Big Data Cloud Service, Oracle Storage Cloud Service, Oracle Database Cloud Service

Oracle Big Data Cloud Service, Oracle Storage Cloud Service, Oracle Database Cloud Service Demo Introduction Keywords: Oracle Big Data Cloud Service, Oracle Storage Cloud Service, Oracle Database Cloud Service Goal of Demo: Oracle Big Data Preparation Cloud Services can ingest data from various

More information

Comodo Certificate Manager

Comodo Certificate Manager Comodo Certificate Manager Device Certificate Enroll API Comodo CA Limited 3rd Floor, 26 Office Village, Exchange Quay, Trafford Road, Salford, Greater Manchester M5 3EQ, United Kingdom Table of Contents

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.2 D14465.07 June 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

Replicator. Enterprise API Guide VERSION January 04,

Replicator. Enterprise API Guide VERSION January 04, Replicator Enterprise API Guide VERSION 7.4.0 January 04, 2018 www.metalogix.com info@metalogix.com 202.609.9100 Copyright International GmbH, 2002-2018. All rights reserved. No part or section of the

More information

Campus Portal for Parents and Students December 2012

Campus Portal for Parents and Students December 2012 Campus Portal for Parents and Students December 2012 This document is intended for restricted use only. Infinite Campus asserts that this document contains proprietary information that would give our competitors

More information

Villages Golf & Country Club Emergency Preparedness Committee (EPC) Records Database and Document Management System Manual (DMS)

Villages Golf & Country Club Emergency Preparedness Committee (EPC) Records Database and Document Management System Manual (DMS) Villages Golf & Country Club Emergency Preparedness Committee (EPC) Records Database and Document Management System Manual (DMS) Table of Contents 1 Introduction... 2 2 Rationale... 2 2.1 Directors...

More information

Kaseya 2. Quick Start Guide. for Network Monitor 4.1

Kaseya 2. Quick Start Guide. for Network Monitor 4.1 Kaseya 2 Router Monitor Quick Start Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector

More information

BroadVision. InfoExchange Portal. InfoExchange Portal. Administrator s Guide

BroadVision. InfoExchange Portal. InfoExchange Portal. Administrator s Guide BroadVision InfoExchange Portal InfoExchange Portal Administrator s Guide Version 6.0.0 BroadVision, Inc. 585 Broadway Redwood City, CA 94063 (650) 261-5100 InfoExchange Portal Administrator s Guide Copyright

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager WebExConnect Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on

More information

Hierarchical inheritance: Contains one base class and multiple derived classes of the same base class.

Hierarchical inheritance: Contains one base class and multiple derived classes of the same base class. 1. What is C#? C# (pronounced "C sharp") is a simple, modern, object oriented, and type safe programming language. It will immediately be familiar to C and C++ programmers. C# combines the high productivity

More information

12d Synergy V4 Release Notes. 12d Synergy V4 Release Notes. Prerequisites. Upgrade Path. Check Outs. Scripts. Workspaces

12d Synergy V4 Release Notes. 12d Synergy V4 Release Notes. Prerequisites. Upgrade Path. Check Outs. Scripts. Workspaces 12d Synergy V4 Release Notes V4 contains a large number of features. Many of these features are listed in this document, but this list may not be exhaustive. This document also contains pre-requisites

More information

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8 Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information