Using Filters in etrust IAM Policies 2
|
|
- Naomi Spencer
- 6 years ago
- Views:
Transcription
1 Using Filters in etrust IAM Policies Using Filters in etrust IAM Policies 2 1. Policy Filters How to build filters to use in searches? Building Filters Filter Examples of 15
2 Using Filters in etrust IAM Policies 1. Policy Filters In searches we can limit the search by specifying the conditions through filters. Similarly in Policies, you can further limit the access policy through these filters. We can also define multiple filters combining them into groups using and/or operations just the way we define conditions in "where" clause while searching the database. Filters are attached to the policies to limit the scope of a policy. etrust IAM uses filters during the evaluation phase of the policy evaluation process. Basic structure of a filter Each filter consists of the following components: The connector to the previous filter (logic) (Optional) One or more left parentheses before the expression A sub-expression, consisting of a left-hand side value, an operator, and a right-hand side value (Optional) One or more right parentheses after the expression The Filter takes in 7 arguments. They are logic, lparens, col, optype, oper, val, and rparens in order. Let's see what they actually mean: Parameter Description logic lparens constant int value from SafeEnum.Logic number of left parens Overview Logic is used to represent the logic between each ordered filter. The available SafeEnum.Logic values are AND, OR, LAST, NONE. This is for the logical grouping of filters. Works together with right parens col the column field This is the left side value of the condition optype oper constant int value from SafeEnum.OpType constant int value from SafeEnum.Oper OpType is used to set the operator's data type, the data type is used for proper evaluation of filters. Oper is used to represent the operator. Available operations are like, notlike, equal, notequal, match, notmatch, withinset, notinset, startswith, endswith, greater, greaterequal, less, lessequal, contains. 2 of 15
3 val the value field This represent the left side value of the condition rparens number of right parens These are count of number closing braces to end a group of conditions. Example: Build a filter which limits the search of Users whose FirstName is equal to "Ravi" and whose Jobtitle is Manager. Observe what our condition is - "FirstName" "is equal to" "Ravi" and "Jobtitle" "is equal to" "Manager". Analyzing in the same manner as above will get us: 'FirstName=Ravi and JobTitle=Manager' 1st Filter : new SafeFilter(SafeEnum.Logic.NONE, 0, "A:FirstName", SafeEnum.OpType.STRING, SafeEnum.Oper.EQUAL, "Ravi", 0); 2nd Filter : new SafeFilter(SafeEnum.Logic.NONE, 0, "A:JobTitle", SafeEnum.OpType.STRING, SafeEnum.Oper.EQUAL, "Manager", 0); Filters are ordered in IAM. So, in the logic of second filter, we must use "AND" logic instead of "NONE" logic. And we have added to List in the same order. So, finally it looks like: List filterq = new ArrayList(); filterq.add(new SafeFilter(SafeEnum.Logic.NONE, 0, "A:FirstName", SafeEnum.OpType.STRING, SafeEnum.Oper.EQUAL, "Ravi", 0)); filterq.add(new SafeFilter(SafeEnum.Logic.AND, 0, "A:JobTitle", SafeEnum.OpType.STRING, SafeEnum.Oper.EQUAL, "Manager", 0)); List globalusers = safecontext.searchglobaluser(filterq); 2. How to build filters to use in searches? In the SafeContext class, we have many search methods using which we can search for application instances, calendars, appobjects, policies, user groups, global user groups, users and global users. And by implementation all the mentioned objects are inherited from Safe Stored Object class. This is because all these objects are stored. We will refer to any of these objects commonly as stored objects. When searching for stored objects, use "cn" to refer to the Name of the object.that is: List filterq = new ArrayList(); 3 of 15
4 filterq.add(new SafeFilter(SafeEnum.Logic.NONE, 0, "cn", SafeEnum.OpType.STRING, SafeEnum.Oper.LIKE, "app*", 0)); // Build the filter and just call the appropriate search method. List globalusergroups = safecontext.searchapplicationinstances(filterq); 3. Building Filters You can use filters to manage searches. Filters are similar to the 'where' clause in the databases when used in searches. You can define multiple filters by combining groups using the AND and OR operations. The easiest way to read filters is to string them together, ignoring the logic in the initial filter. For example: Logic ( Left type/value Operator Right type/value ) (ignore) named attribute: ward == value: ER AND ( named attribute: ward == user: ward OR ( named attribute: doctor == global user: UserName AND user group: Name == value: Doctors )) The following fields are available in each filter: Logic Indicates the connector to the previous filter that is ignored for the first filter. ( and ) Indicates how the sub-expressions are grouped, which affects the logic. Left type/value and Right type/value Specifies a type and value for the sub-expression. The possible values vary based on the selected type. The type can include any of the following: 4 of 15
5 global user Specifies a global user attribute, as follows: User Name First Name Middle Name Last Name Alias Job Title Company Department Office Work Phone Number Fax Phone Number Mobile Phone Number Home Phone Number Address City State Postal Code Country Mail Stop Address Description Incorrect Login Count Suspended Comments Group Membership Display Name Password Change Date Password Expire Time Suspended Date Disable Date Enable Date Change Password Next Login Override Password Policy Password Time to Warn Parent Path global user group Specifies a global user group attribute, as follows: Name Description Group Membership Parent Path 5 of 15
6 user Specifies a user attribute, as follows: Name Group Membership Parent Path Terminology Preference JobFlowMonitoringRefreshInterval JobFlowOverviewRefreshInterval JobEditObjectDisplayCount Note: User values are application-specific. This list will change for each etrust IAM application. user group Specifies a user group attribute, as follows: Name Description Group Membership Parent Path named attribute Specifies a resource attribute (passed in with the authorization request), as follows: Resource Class Named Attributes AlertAction component - the name of the component issuing nametype - View or Server name - viewname or servername ApplicationAccess component - the name of the component issuing category the category for a set of applications name a specific application within the application category CommandExecute component - the name of the component issuing servername the name of the server command command to be executed on the given server CommandSetup component - the name of the component issuing mode local or global cmdname the name of the command specification in the local or global command set 6 of 15
7 Resource Class Named Attributes JobActionAutoSys component - the name of the component issuing nametype view or server name name of the view or server JobActionCA7 component - the name of the component issuing nametype view or server name name of the view or server LogAccess component - the name of the component issuing servername the name of the server MonitorViewControl component - the name of the component issuing viewname name of the view objecttype JobFlow, PriorRun, or RunLog ObjectAccess component - the name of the component issuing servername the name of the server objecttype AlertPolicy, Calendar, Cycle, ExtendedCalendar, GlobalVariable, Job, Jobset, Report objectname the name of the object ObjectControl component - the name of the component issuing servername the name of the server objecttype AlertPolicy, ARFDef, ARFSet, Calendar, Cycle, Dataset, ExtendedCalendar, GlobalVariable, Job jobtype Box, CA-7, Command, FileWatcher, InfoPackage, ProcessChain, SAP, WebServices, UserDefinedX objectsubtype Predecessor, Schedule, Trigger predtype Dataset, Job, Network, UserRequirement, VRM PortletAccess component - the name of the component issuing category the category for a set of portlets name a specific portlet within the portlet category ServerAccess component - the name of the component issuing type - AutoSys, CA7, or Event servername the name of the server Note: Named Attributes are application-specific. This list will change for each etrust IAM application. Components are comprised of the following: Applications: Configuration JobEditor 7 of 15
8 JobFlowDesign JobFlowMonitoring JobFlowOverviewEditor JobStatusConsole EventConsole HostAccess WebServicesBasic WebServicesAdvanced SecurityConfiguration Reporting QuickView Portlets: QuickStart ServerStatus ServicesStatus CredentialGroupSummaryStatus CredentialUserSummaryStatus CCILinkStatus CredentialUserPasswordModification JobEditorCreateObject JobEditorFindObject JobFlowOverview JobStatusViews CommandLine session Specifies a session attribute, as follows: ses:{name} evaluates to the value(s) of the session's attributeq (sessionattrq) matching {name} Enter the name of the session attribute in the value. environment Specifies an environment attribute, as follows: Env:{name} evaluates to the value(s) of the environment attributeq (envattrq) maching {name} Enter the name of the environment attribute in the value. 8 of 15
9 request Specifies a request attribute, as follows: req:{identity action resource when delegator} evaluates to the corresponding values from the permission check request value Specifies an open-ended value. Enter the value. val:{data} evaluates to the single value of {data} Operator dynamic user group Specifies a dynamic user group by its name. dug:name evaluates to the name(s) of the Dynamic UserGroups the identity belongs to. request time (when) calculation Specifies the offset in minutes from the current request time. For example, "-360" means 10 hours before the current request, and "60" means one hour after the current request. when:{offset} evaluates to req:when offset by the {offset} ({offset} is specified in minutes). Sets the offset in minutes from the current request time. For example, "-360" means 10 hours before the current request, and "60" means one hour after the current request. Specifies an XML-based formula to be performed during policy evaluation. This opens the Calculation Editor. calc:{calculation} evaluates to result of the {calculation} Indicates the datatype and operator with which to evaluate the subexpression, as follows: Datatype Specifies one of the following datatypes: Notype STRING INT32 9 of 15
10 Operator UINT32 REAL32 REAL64 TIMESTAMP REGEX XPATH BOOLEAN Note: You must ensure that the datatype selected matches the datatype of the type/value being evaluated. Specifies one of the following operators: NONE EQUAL == NOTEQUAL!= LESS < GREATER > LESSEQUAL <= GREATEREQUAL >= LIKE ~ NOTLIKE!~ WITHINSET {} NOTINSET!{} STARTSWITH --* ENDSWITH *-- CONTAINS *--* The following buttons and icons are available: Add Filter Adds another empty filter to the end of the list. Remove Removes the associated filter. Show Calculation Editor Displays the Calculation Editor so that you can manipulate attribute values before a comparison. 10 of 15
11 4. Filter Examples Global User: Example 1: Policy will restrict the allowed users to only those whose first names begin with an A. Example 2: Policy will restrict the allowed users to only those whose office is New York. Example 3: Policy will restrict allowed users to those whose office is New York, and whose last name is either Smith or Singh. Global User Group: Example 1: Policy will restrict allowed users to those who are in the Global User Groups with names that begin with WCC*. User: Example 1: Policy will restrict allowed users to those with a terminology preference of Native. 11 of 15
12 Named Attribute: Example 1: Policy will only allow access to the Job Flow Monitoring component. Dynamic User Group: Example 1: Policy will allow access only to users whose dynamic user group is not equal to Operator. Session: Example1: Here we are building a filter based on the session of global user headnurse. Policy: The entire Chiefs global group can read any billing data. If we want only headnurse can only read the data who is member of Chiefs. We are defining filter as shown below. Example 2: Chiefs can read any billing data, where nurse is member of the group chiefs 12 of 15
13 Request: Example 1: Filter based on request for a resource. Filter for: Chiefs can enter any ward except office. Example 2: Office workers can read/write any safeobject except policies Example 3: Request in combination with when Chiefs can enter any ward with in 1 hour Example 4: Combinations of request and named attribute.( Delegation Policy) Filter: if worker delegates his rights to the head doctor for global users and users in the Medical subfolder 13 of 15
14 Selected Identities are Resources are: Filter: Calculation: Example 1: If the calculation defined in the filter evaluates to true then only, the permission check on that policy evaluates to true. Access policy for door resource class: Door should be opened by erdoctor only Filter: 14 of 15
15 Example 2: Calculation on Integer operations Example 3: Calculation on REAL32 operations Example 4: Calculation with TIMESTAMP Custom variable and Request time: Custom variable and Request time filter conditions are used to be only through SDK. These filters are meant only for developers integrating etrust IAM into their applications. Usage of these filters through UI is not intended/encouraged. 15 of 15
Novell OpenLDAP Configuration
Novell OpenLDAP Configuration To access the GoPrint Novell e-directory LDAP Connector configuration screen navigate to: Accounts Authentication Connectors GoPrint provides two connector options, Standard
More informationAuthentication via Active Directory and LDAP
Authentication via Active Directory and LDAP Overview The LDAP and Active Directory authenticators available in Datameer provide remote authentication services for Datameer users. Administrators can configure
More informationSolution: Use Workload Automation AE polices in EEM to grant full permissions to the administrators and restricted permissions to the schedulers.
Allow Users to Only Execute Certain Jobs in WCC Using EEM Policies 1 Scenario: You have two groups of WCC users: administrators and schedulers. You want administrators to have full permissions on all AE
More informationChapter 10 Introduction to Classes
C++ for Engineers and Scientists Third Edition Chapter 10 Introduction to Classes CSc 10200! Introduction to Computing Lecture 20-21 Edgardo Molina Fall 2013 City College of New York 2 Objectives In this
More informationOne Identity Manager 8.0. Administration Guide for Connecting to Azure Active Directory
One Identity Manager 8.0 Administration Guide for Connecting to Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationQuick Guide: Profile Setup
Guide This Guide will provide you instructions on how to setup your Profile in Concur. Upon initial access to Concur, setting up your Profile is the first step to take. Accessing Concur 1. Go to Travel.ouhsc.edu.
More informationPRISM-FHF The Fred Hollows Foundation
PRISM-FHF The Fred Hollows Foundation SECURITY ADMINISTRATOR S GUIDE Version 1.2 TABLE OF CONTENTS INTRODUCTION... 4 OVERVIEW... 4 SECURITY CONSOLE... 6 ACCESSING THE SECURITY CONSOLE... 6 VIEWING THE
More informationIntroduction. This quick reference gives you clear and simple steps to. navigate ENA's website to Run Reports; run a report listing scheduled courses;
Introduction ENA's active Course Directors, State Chairs, State Presidents, President-Elects and Board of Directors all have a role in efficient and effective Course Operations. In order to stay informed,
More information1 28/06/ :17. Authenticating Users General Information Manipulating Data. REST Requests
1 28/06/2012 13:17 Using standard HTTP requests, this API allows you to retrieve information about the datastore classes in your project, manipulate data, log into your web application, and much more.
More informationUser Guide. Version R94. English
AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
More informationQuick Guide: Profile Setup
Guide This Guide will provide you instructions on how to setup your Profile in Concur. Upon initial access to Concur, setting up your Profile is the first step to take. Accessing Concur 1. Go to Travel.ouhsc.edu.
More informationConnector for OpenText Content Server Setup and Reference Guide
Connector for OpenText Content Server Setup and Reference Guide Published: 2018-Oct-09 Contents 1 Content Server Connector Introduction 4 1.1 Products 4 1.2 Supported features 4 2 Content Server Setup
More informationOne Identity Manager Administration Guide for Connecting Oracle E-Business Suite
One Identity Manager 8.0.2 Administration Guide for Connecting Oracle E- Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationDirectory Integration with VMware Identity Manager
Directory Integration with VMware Identity Manager VMware AirWatch 9.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
More informationTalend Component tgoogledrive
Talend Component tgoogledrive Purpose and procedure This component manages files on a Google Drive. The component provides these capabilities: 1. Providing only the client for other tgoogledrive components
More informationEasy Survey Creator: User s Guide
Easy Survey Creator: User s Guide The Easy Survey Creator software is designed to enable faculty, staff, and students at the University of Iowa Psychology Department to quickly and easily create surveys
More information1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari) and go to
VMWare AirWatch User Guide for Web Browser You can access your AirWatch Files from a web browser. How to login AirWatch Cloud Storage? 1. Open any browser (e.g. Internet Explorer, Firefox, Chrome or Safari)
More informationUser guide. Bloomberg Legal Entity Identifier (LEI) web platform
User guide Bloomberg Legal Entity Identifier (LEI) web platform Access the platform 1. Go to : https://lei.bloomberg.com 2. Click on Account and then on Signup 2 Create your account 3. Fill-in the requested
More informationLecture 18 Tao Wang 1
Lecture 18 Tao Wang 1 Abstract Data Types in C++ (Classes) A procedural program consists of one or more algorithms that have been written in computerreadable language Input and display of program output
More informationTIBCO Spotfire Automation Services 7.5. User s Manual
TIBCO Spotfire Automation Services 7.5 User s Manual Revision date: 15 January 2016 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
More informationRulePoint Proactive PowerCenter Monitoring
Contents Informatica Corporation RulePoint Release Notes June 27, 2011 Copyright 1998-2011 Informatica Corporation Abstract... 1 RulePoint Proactive PowerCenter Monitoring... 1 Installation... 1 Enhancements...
More informationThis document contains information on fixed and known limitations for Test Data Management.
Informatica Corporation Test Data Management Version 9.6.0 Release Notes August 2014 Copyright (c) 2003-2014 Informatica Corporation. All rights reserved. Contents Informatica Version 9.6.0... 1 Installation
More informationRSA Identity Governance and Lifecycle Collector Data Sheet for Workday
RSA Identity Governance and Lifecycle Collector Data Sheet for Workday Version 1.3 January 2018 RSA Identity Governance and Lifecycle Collector Datasheet for Workday Contents Purpose... 4 Supported Software...
More informationSMARTPROS LTD. PROFESSIONAL EDUCATION CENTER USER S GUIDE BANKING EDITION
- 1 - SMARTPROS LTD. PROFESSIONAL EDUCATION CENTER USER S GUIDE BANKING EDITION Document version 1.0 - Banking Updated April 20, 2006 SmartPros Banking by SmartPros Ltd. Support: admin@smartpros.com (914)
More informationARELLO.COM Licensee Verification Web Service v2.0 (LVWS v2) Documentation. Revision: 8/22/2018
ARELLO.COM Licensee Verification Web Service v2.0 (LVWS v2) Documentation Revision: 8/22/2018 Table of Contents Revision: 8/22/2018... 1 Introduction... 3 Subscription... 3 Interface... 3 Formatting the
More informationOne Identity Active Roles 7.2. Replication: Best Practices and Troubleshooting Guide
One Identity Active Roles 7.2 Replication: Best Practices and Troubleshooting Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The
More informationLiferay Portal 4 - Portal Administration Guide. Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer
Liferay Portal 4 - Portal Administration Guide Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer Liferay Portal 4 - Portal Administration Guide Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer 1.1
More informationSAP Analytics Cloud Best Practices for BI Platform Live Universes
NOTE: Delete the yellow stickers when finished. See the SAP Image Library for other available images. Once the custom image is inserted, click Format Send Backward Send to Back, so the motion band is on
More informationUser Guide. Version R92. English
AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from
More informationIB Sets and Venn Diagram Questions- Package #1
I Sets and Venn Diagram Questions- Package #1 1. is the set of all the positive integers less than or equal to 12., and C are subsets of. = {1, 2, 3, 4, 6,12} = {odd integers} C = {5, 6, 8} (a) Write down
More informationISEC7 Mobile Exchange Delegate
Android User Documentation 1 Create Master Account 4 2 Add Delegate Access 6 3 Add Shared Calendars 7 4 Synchronization 8 5 Managing Folders 9 5.1 Folders 9 5.2 Add Folder 10 6 Move Items 11 7 Categorize
More informationAdobe Sign for Microsoft Dynamics
Adobe Sign for Microsoft Dynamics Installation & Configuration Guide (v5) Last Updated: March 16, 2017 2017 Adobe Systems Incorporated. All rights reserved Table of Contents Overview... 3 Prerequisites...
More informationGeneos Gateway Authentication Technical Reference. Functional Area: Geneos Gateway Authentication. Geneos Release: v4.9. Document Version: v1.0.
Geneos Gateway Authentication Technical Reference Functional Area: Geneos Gateway Authentication Geneos Release: v4.9 Document Version: v1.0.0 Date Published: 25 October 2018 Copyright 2018. ITRS Group
More informationDell One Identity Manager Administration Guide for Connecting to SharePoint
Dell One Identity Manager 7.1.3 Administration Guide for Connecting to SharePoint 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property
More informationSharePoint Best Practices. Security
SharePoint Best Practices Security A fundamental responsibility concerning site security is to manage who can access resources on your site. The following outlines specifics and best practices in doing
More informationUser Group Configuration
CHAPTER 90 The role and user group menu options in the Cisco Unified Communications Manager Administration User Management menu allow users with full access to configure different levels of access for
More informationExpense: Process Reports
Expense: Process Reports User Guide for Standard Edition Applies to these SAP Concur solutions: Expense Professional/Premium edition Standard edition Travel Professional/Premium edition Standard edition
More informationIBM. Administration Guide. IBM Emptoris Contract Management SaaS
IBM Emptoris Contract Management IBM Administration Guide 10.1.2 SaaS IBM Emptoris Contract Management IBM Administration Guide 10.1.2 SaaS ii IBM Emptoris Contract Management: Administration Guide Copyright
More informationUser Guide Ahmad Bilal [Type the company name] 1/1/2009
User Guide Ahmad Bilal [Type the company name] 1/1/2009 Contents 1 LOGGING IN... 1 1.1 REMEMBER ME... 1 1.2 FORGOT PASSWORD... 2 2 HOME PAGE... 3 2.1 CABINETS... 4 2.2 SEARCH HISTORY... 5 2.2.1 Recent
More informationThis manual is for financial service provider (FSP) members of CIO in using the CIO self-service Portal.
CIO FSP Portal Manual 2017 Who is this manual intended for This manual is for financial service provider (FSP) members of CIO in using the CIO self-service Portal. Logging In The Portal can be accessed
More informationSee Types of Data Supported for information about the types of files that you can import into Datameer.
Importing Data When you import data, you import it into a connection which is a collection of data from different sources such as various types of files and databases. See Configuring a Connection to learn
More informationDonor Management with GiftWorks. The Big Picture... 2 A Closer Look... 2 Scenarios... 4 Best Practices Conclusion... 21
Donor Management with GiftWorks The Big Picture... 2 A Closer Look... 2 Scenarios... 4 Best Practices... 20 Conclusion... 21 The Big Picture With GiftWorks, you can store a large amount of information
More informationUser Guide. Version 8.0
User Guide Version 8.0 Contents 1 Getting Started... iii 1.1... About... iii 2 Logging In... 4 2.1... Choosing Security Questions... 4 3 The File Manager... 5 3.1... Uploading a file... 6 3.2... Downloading
More informationConfiguring RBAC Using Admin UI
CHAPTER 13 This chapter describes the Security feature of Prime Cable Provisioning. Use this feature to configure and manage various levels of security. For conceptual information about the RBAC feature,
More informationInteract2 Help and Support
Sharing content stored in Interact2 Content Collection Contents Terminology... 2 What is the Content Collection?... 2 Student view of the Content Collection in course and subject sites... 4 Summary of
More informationStarTeam LDAP QuickStart Manager Administration Guide
StarTeam 15.1 LDAP QuickStart Manager Administration Guide Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 2016. All rights reserved.
More informationSetting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000
Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000 Define and set DAC policy (define group membership, set default DAC attributes, set DAC on files systems) Modify
More informationEMC SourceOne for Microsoft SharePoint Version 6.7
EMC SourceOne for Microsoft SharePoint Version 6.7 Administration Guide P/N 300-012-746 REV A01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2011
More informationThis Job Aid will assist setting up the Outlook Application for use on iphones and Android phones.
Purpose Outlook App Setup for iphones and Android Job Aid This Job Aid will assist setting up the Outlook Application for use on iphones and Android phones. Contents iphone Device Setup... 2 Account Setup...
More informationBMS Managing Users in Modelpedia V1.1
BMS 3.2.0 Managing Users in Modelpedia V1.1 Version Control Version Number Purpose/Change Author Date 1.0 Initial published version Gillian Dass 26/10/2017 1.1 Changes to User roles Gillian Dass 14/11/2017
More informationContent Publisher User Guide
Content Publisher User Guide Overview 1 Overview of the Content Management System 1 Table of Contents What's New in the Content Management System? 2 Anatomy of a Portal Page 3 Toggling Edit Controls 5
More informationOracle Adaptive Access Manager. 1 Oracle Adaptive Access Manager Documentation. 2 Resolved Issues. Release Notes Release 10g (
Oracle Adaptive Access Manager Release Notes Release 10g (10.1.4.5) E13648-03 May 2009 These release notes contain important last minute information not included in the Oracle Adaptive Access Manager Release
More informationNew Features Summary. SAP Sybase Event Stream Processor 5.1 SP02
Summary SAP Sybase Event Stream Processor 5.1 SP02 DOCUMENT ID: DC01616-01-0512-01 LAST REVISED: April 2013 Copyright 2013 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software
More informationEMS WEB APP Configuration Guide
EMS WEB APP Configuration Guide V44.1 Last Updated: August 14, 2018 EMS Software emssoftware.com/help 800.440.3994 2018 EMS Software, LLC. All Rights Reserved. Table of Contents CHAPTER 1: EMS Web App
More informationOne Identity Manager Administration Guide for Connecting to SharePoint
One Identity Manager 8.0.2 Administration Guide for Connecting to Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationDell One Identity Quick Connect for Cloud Services 3.6. Administrator Guide
Dell One Identity Quick Connect for Cloud Services 3.6 2014 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationConnector for Microsoft SharePoint 2013, 2016 and Online Setup and Reference Guide
Connector for Microsoft SharePoint 2013, 2016 and Online Setup and Reference Guide Published: 2018-Oct-09 Contents 1 Microsoft SharePoint 2013, 2016 and Online Connector 4 1.1 Products 4 1.2 Supported
More informationRescueAssist. Administrator Guide. LogMeIn, Inc. 320 Summer St., Boston MA LogMeIn, Inc. All rights reserved.
RescueAssist Administrator Guide LogMeIn, Inc. 320 Summer St., Boston MA 02210 2018 LogMeIn, Inc. All rights reserved. https://support.logmeininc.com Contents Using the Admin Center... 1 Log in to the
More informationISEC7 Mobile Exchange Delegate
ios User Documentation 1 License/Subscription 4 1.1 Free version 4 1.2 Activating company account 5 1.3 Premium Subscription 8 2 Create Master Account 16 3 Add Delegate Access 19 4 Add Shared Calendars
More informationLaserfiche Security Training Manual
- 1 - Laserfiche Security General Overview: One of the responsibilities of a Unit Administrator as it pertains to the Laserfiche Document Management System is controlling access to various file areas for
More informationSage Installation and Administration Guide. May 2018
Sage 300 2019 Installation and Administration Guide May 2018 This is a publication of Sage Software, Inc. 2018 The Sage Group plc or its licensors. All rights reserved. Sage, Sage logos, and Sage product
More informationCayuse 424 Training VT PI Update Professional Profile
This handout is step by step instructions for a Principal Investigator (PI) to update their Professional Profile permissions in Cayuse 424 so that a staff person/business manager can be designated as a
More informationOne Identity Manager 8.0. Target System Base Module Administration Guide
One Identity Manager 8.0 Target System Base Module Administration Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationSolution: Use WCC polices in EEM to grant full access to the administrators and restricted access to the schedulers.
How to Filter Views in WCC Using EEM Policies 1 Scenario: You have two groups of WCC users: administrators and schedulers. You want administrators to have full access to all WCC Monitoring Views. You want
More informationManaged DNS API Specification Version July 28, 2008
Managed DNS API Specification Version 2.8.8 July 28, 2008 Table of Contents Revisions and Updates...6 Introduction...7 Definition of terms used in this document...7 Validation Rules...8 Other constraints...9
More informationFCCLA State Adviser Membership Affiliation Instructions
FCCLA State Adviser 2014-2015 Membership Affiliation Instructions How to Login to the National Affiliation System: As a State Adviser, you received an email from National FCCLA with your Login Credentials.
More informationCTC Accounts Active Directory Synchronizer User Guide
i Contents Overview... 3 System Requirements... 4 Additional Notes... 5 Installation and Configuration... 6 Running the Synchronizer Interactively... 7 Automatic Updates... 7 Logging In... 8 Options...
More informationCreating an Analyst Viewer User and Group
Creating an Analyst Viewer User and Group 2010 Informatica Abstract This article describes how to create an analyst viewer user and group. Create an analyst viewer group in the Administrator tool to grant
More informationLink to Download FlexiDoc Server preactivated
Link to Download FlexiDoc Server preactivated Download FlexiDoc Server with licence code FlexiDoc Server last edition of windows XP x32&64 For the product update process, see ⠌ Product version: 3.1.6.0
More informationIBM Clinical Development
IBM Clinical Development New User Help Effective: 26 January 2018 Copyright IBM corporation. 2017. IBM Clinical Development 2 TOPICS > > > Click the green icon to jump to the section or use the PDF page
More informationOne Identity Manager 8.0. Administration Guide for Connecting to a Universal Cloud Interface
One Identity Manager 8.0 Administration Guide for Connecting to a Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationMcAfee Cloud Identity Manager
Coupa Cloud Connector Guide McAfee Cloud Identity Manager version 2.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationibase Manager Net Admin Guide 2005 ibase
ibase Manager Net Admin Guide 1 ibase Manager Net Table of Contents Section 1 Welcome to the ibase Manager Net Admin Help 3 Section 2 Purpose 3 Section 3 Copyright 3 Section 4 Disclaimer 3 Section 5 Main
More informationVERITAS Cluster Server Agent 1.0 for IBM HTTP Server
VERITAS Cluster Server Agent 1.0 for IBM HTTP Server Installation and Configuration Guide Solaris February 2003 Disclaimer The information contained in this publication is subject to change without notice.
More informationTable of Contents. Table of Contents 3
User Guide for Administrators EPiServer 7 CMS Revision A, 2012 Table of Contents 3 Table of Contents Table of Contents 3 Introduction 5 About this Documentation 5 Accessing EPiServer Help System 5 Online
More informationCoveo Platform 7.0. Liferay Connector Guide
Coveo Platform 7.0 Liferay Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing market
More informationApril 2011
ereinsure User Guide Insurer Administrators ----------------------------------------------------------------------------------------------------------------------------- April 2011 Copyright 2011 ereinsure.com,
More informationPegasystems PEGACSA71V1 Exam
Pegasystems PEGACSA71V1 Exam Number: PEGACSA71V1 Passing Score: 800 Time Limit: 120 min File Version: 4.0 http://www.gratisexam.com/ PEGACSA71V1 Certified System Architect (CSA) 71V1 Version 4.0 Exam A
More informationTeamcenter NX Remote Manager Guide. Publication Number PLM00123 G
Teamcenter 10.1 NX Remote Manager Guide Publication Number PLM00123 G Proprietary and restricted rights notice This software and related documentation are proprietary to Siemens Product Lifecycle Management
More informationUser Service. User Service. member. Network-level user with access to all aspects of the member's account (Advertisers, Publishers, Apps, etc.).
User Service User Service "User" refers to people or groups able to log in to the AppNexus UI and API. Users are classified by a user_type, which determines what type of information they have access to.
More informationWorkload Control Center Performance Tuning
Workload Control Center Performance Tuning This document includes recommendations and best practices for performance tuning for CA Workload Control Center (WCC), for the following releases: Unicenter Workload
More informationEnterprise Reporting -- APEX
Quick Reference Enterprise Reporting -- APEX This Quick Reference Guide documents Oracle Application Express (APEX) as it relates to Enterprise Reporting (ER). This is not an exhaustive APEX documentation
More informationUsing the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1
Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More information1. Open Outlook by clicking on the Outlook icon. 2. Select Next in the following two boxes. 3. Type your name, , and password in the appropriate
1 4 9 11 12 1 1. Open Outlook by clicking on the Outlook icon. 2. Select Next in the following two boxes. 3. Type your name, email, and password in the appropriate blanks and click next. 4. Choose Allow
More informationUser Guide Product Design Version 1.7
User Guide Product Design Version 1.7 1 INTRODUCTION 3 Guide 3 USING THE SYSTEM 4 Accessing the System 5 Logging In Using an Access Email 5 Normal Login 6 Resetting a Password 6 Logging Off 6 Home Page
More informationWebStudio User Guide. OpenL Tablets BRMS Release 5.18
WebStudio User Guide OpenL Tablets BRMS Release 5.18 Document number: TP_OpenL_WS_UG_3.2_LSh Revised: 07-12-2017 OpenL Tablets Documentation is licensed under a Creative Commons Attribution 3.0 United
More informationOracle User Productivity Kit User and Content Management. E August 2016
Oracle User Productivity Kit User and Content Management E79038-01 August 2016 Oracle User Productivity Kit User and Content Management E79038-01 August 2016 Copyright 1998, 2016, Oracle and/or its affiliates.
More informationOracle Big Data Cloud Service, Oracle Storage Cloud Service, Oracle Database Cloud Service
Demo Introduction Keywords: Oracle Big Data Cloud Service, Oracle Storage Cloud Service, Oracle Database Cloud Service Goal of Demo: Oracle Big Data Preparation Cloud Services can ingest data from various
More informationComodo Certificate Manager
Comodo Certificate Manager Device Certificate Enroll API Comodo CA Limited 3rd Floor, 26 Office Village, Exchange Quay, Trafford Road, Salford, Greater Manchester M5 3EQ, United Kingdom Table of Contents
More informationCisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.2 D14465.07 June 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
More informationReplicator. Enterprise API Guide VERSION January 04,
Replicator Enterprise API Guide VERSION 7.4.0 January 04, 2018 www.metalogix.com info@metalogix.com 202.609.9100 Copyright International GmbH, 2002-2018. All rights reserved. No part or section of the
More informationCampus Portal for Parents and Students December 2012
Campus Portal for Parents and Students December 2012 This document is intended for restricted use only. Infinite Campus asserts that this document contains proprietary information that would give our competitors
More informationVillages Golf & Country Club Emergency Preparedness Committee (EPC) Records Database and Document Management System Manual (DMS)
Villages Golf & Country Club Emergency Preparedness Committee (EPC) Records Database and Document Management System Manual (DMS) Table of Contents 1 Introduction... 2 2 Rationale... 2 2.1 Directors...
More informationKaseya 2. Quick Start Guide. for Network Monitor 4.1
Kaseya 2 Router Monitor Quick Start Guide for Network Monitor 4.1 June 5, 2012 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector
More informationBroadVision. InfoExchange Portal. InfoExchange Portal. Administrator s Guide
BroadVision InfoExchange Portal InfoExchange Portal Administrator s Guide Version 6.0.0 BroadVision, Inc. 585 Broadway Redwood City, CA 94063 (650) 261-5100 InfoExchange Portal Administrator s Guide Copyright
More informationMcAfee Cloud Identity Manager
WebExConnect Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationManage Administrators and Admin Access Policies
Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on
More informationHierarchical inheritance: Contains one base class and multiple derived classes of the same base class.
1. What is C#? C# (pronounced "C sharp") is a simple, modern, object oriented, and type safe programming language. It will immediately be familiar to C and C++ programmers. C# combines the high productivity
More information12d Synergy V4 Release Notes. 12d Synergy V4 Release Notes. Prerequisites. Upgrade Path. Check Outs. Scripts. Workspaces
12d Synergy V4 Release Notes V4 contains a large number of features. Many of these features are listed in this document, but this list may not be exhaustive. This document also contains pre-requisites
More informationSetting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More information