SmartPatch. Configuration Reference Version 6.x

Size: px
Start display at page:

Download "SmartPatch. Configuration Reference Version 6.x"

Transcription

1 SmartPatch Configuration Reference Version 6.x

2 Copyright Copyright 2017 Brand-Rex Ltd. All rights reserved. No part of this publication or of the SmartPatch software, in source code or object code form, may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording or otherwise, without the prior written consent of Brand-Rex or technology partners of Brand-Rex Ltd. Contact information is available on request Disclaimer These materials are subject to change without notice and for informational purposes only, without representation of warranty of any kind. Document history History table: Version Date Author Description Edeeben Logo and style update 6.x Edeeben Version 6 updates 2

3 Contents Copyright... 2 Disclaimer... 2 Document history... 2 Introduction... 4 Server Configuration... 4 Server Configuration File Database Configuration... 4 Authentication Configuration... 5 Password Policy Configuration... 6 LDAP Authentication Configuration... 6 LDAP Interface Test Tool... 9 SAML 2.0 Single Sign-On (SSO) Authentication Configuration... 9 Enable the Spring Security SAML Extension Identity Provider (IdP) Metadata Identity Provider (IdP) Metadata for File Based Metadata Identity Provider (IdP) Metadata for URL Based Metadata Service Provider (SP) Metadata Configuring the Identity Provider (IdP) Verifying the SSO Configuration SSL Configuration Logging Configuration Miscellaneous Configuration Client-Server Compression

4 Introduction The purpose of this document is to describe the available configuration options for the SmartPatch Server and SmartPatch Client software. Server Configuration Server Configuration File. SmartPatch Server is configured using the file server.properties, which can be found in the installation folder of the software. The following sections describe the configuration properties in detail. Note that the Database Configuration (described in section 4) is a mandatory configuration. All other configurations are optional. Note that applying any changes to the server.properties file should be done while the Apache Tomcat process is stopped. Database Configuration The properties that specify the database that SmartPatch Server should connect to are described in Table 1. Please refer to the database specific installation manual supplement for a description and example of the correct property values for each of the supported DBMS types. These installation manual supplements are: SmartPatch Installation Manual MySQL Supplement.pdf SmartPatch Installation Manual Oracle Supplement.pdf SmartPatch Installation Manual SQL Server Supplement.pdf SmartPatch Installation Manual PostgreSQL Supplement.pdf Property 0-dbms 0-dbhost 0-dbport 0-dbproperties 0-dbinstance 0-login 0-password Description The type of database used for the specified project. Possible values are Firebird, HSQLDB, MSSQLServer, MySQL, Oracle, IBM DB2 and PostgreSQL The host name of the machine hosting the database server for the specified project. The network port that should be used to contact the database server for the specified project Option database connection string properties The instance name of the database that should be used for the specified project. The user name for the database that should be used for the specified project The password for the database that should be used for the specified project. Table 1: Database Properties 4

5 Authentication Configuration The method by which SmartPatch users are authenticated is controlled by the authentication-methods property. The supported methods are: BASIC, in which case authentication is performed against user credentials in the SmartPatch database. Section 6 provides details of the properties available for controlling password policies. LDAP, in which case authentication is performed against user credentials in an external directory such as Windows Active Directory. Section 6 provides details on how to configure LDAP authentication. SAML, in which case authentication will be handled by a SAML 2.0 Identity Provider and SmartPatch will operate as a SAML 2.0 Service Provider to the Identity Provider. Section 9 provides details on how to configure SAML authentication. Table 3 describes the authentication-methods property. Property Description Default Authentication-methods The methods of authentication that SmartPatch should Basic use. The supported methods are BASIC LDAP SAML BASIC indicates that authentication will take place against user credentials stored in the SmartPatch database. LDAP indicates that authentication will be handled by an LDAP server. Note that both LDAP and BASIC methods of authentication can be specified in conjunction by separating them with a comma, for example: LDAP,BASIC In this case, fail-over authentication will take place in the order that the methods are specified. SAML indicates that authentication will be handled by a SAML 2.0 Identity Provider and SmartPatch will operate as a SAML 2.0 Service Provider to the Identity Provider. See section 9 for details 5

6 Password Policy Configuration The properties described in Table 2 determine the password policies for users when the authentication method is configured to be BASIC (see section 5 for details on how to configure authentication methods). Property Description Default password-max-days If a password was set more than password-max-days ago then the user is requested to change their password. password-max-days-allow-all-policy If a password was set more than password-max-daysallow-all-policy ago then the users who have the allow- all policy are requested to change their password. previous-passwords-to-remember New passwords should be different than the previous 0 previous-passwords-to-remember ones. password-min-length Passwords must be at least password-min-length 0 characters long. password-min-non-letters Passwords must contain at least password-min-nonletters 0 characters that are not letters. password-min-upper-case-letters Passwords must contain at least password-min-uppercase-letters 0 upper case letters. password-min-lower-case-letters Passwords must contain at least password-min-lowercase-letters 0 upper case letters. password-min-numeric-characters Passwords must contain at least password-min-numericcharacters 0 numeric characters. password-min-non-alphanumericcharacteralphanumeric-characters Passwords must contain at least password-min-non- 0 characters that are not alphanumeric (i.e. $, %, etc.). failed-attempts-before-lockout Locks the user for this amount of time in minutes if an incorrect password is entered failed-attempts-beforelockout times. 60 Table 2: Password Expiration and Content Properties LDAP Authentication Configuration The steps to configure SmartPatch to use LDAP authentication are: 1. Configure SmartPatch user groups so that the names of the groups match with corresponding groups in the LDAP directory. Group names are case sensitive. Users that are members of the LDAP groups will belong to the SmartPatch group of the same name. Multiple groups are honored. For example: SmartPatch groups: Patchers, EquipmentMaintainers LDAP groups: Administrators, Patchers, EquipmentMaintainers LDAP users and group memberships: Joe: Administrators, Patchers Bob: Administrators, Patchers, EquipmentMaintainers Eric: Administrators James: Patchers Fred: Patchers Peter: Patchers, EquipmentMaintainers Martin: EquipmentMaintainers 6

7 The Patchers group will contain Joe, Bob, James, Fred, and Peter. The EquipmentMaintainers group will contain Bob, Peter, and Martin. Finally, because there is no SmartPatch group named Administrators, Eric will not be associated with any user groups (and will not have any privileges to enter the application). 2. Configure the appropriate properties in the server.properties file to specify the interface between SmartPatch and the LDAP directory. A complete description of the available properties is provided in Table 3. Typical property values are provided in Table 4. Note that these values are only intended as examples and may differ from the values required by your LDAP directory. Note that to assist in configuring the appropriate server properties, an offline interface test tool is available. This tool is described in section 9. Property Description Default ldap-enabled Set to true to enable LDAP functionality in false SMARTPATCHServer. ldap-provider URL for the LDAP server. Should include the protocol and port, e.g. ldap://server.address:389. Ensure that the LDAP server DNS name in the URL matches the SPN (Service Principal Name) of the server. ldap-auth-mechanism Authentication method for LDAP. Note that Active simple Directory can use DIGEST-MD5 whereas linux slapd should use simple with protocol ldaps:// or ldap:// ldap-search-context The base user DN. This is the root node in LDAP from which to search for users, e.g. dc=patchmanager,dc=com ldap-search-user-name The user used to create the initial search context. For Windows Active Directory, the value that should be specified for this property depends on the value that is specified for ldap-user-result: If ldap-user-result = samaccountname then the value specified should represent the user name of the LDAP search account. If ldap-user-result = dn then the value specified should represent the DN(=Distinguished Name) of the LDAP search account. ldap-search-user-password ldap-groups-search-context ldap-group-objectclass ldap-group-name-attribute ldap-member-attribute For Linux/Unix based LDAP servers, the value specified for ldap-user-result should always be dn, so the value specified for ldap-search-user-name should always represent the DN(=Distinguished Name) of the LDAP search account. The password for the initial LDAP search. The base group DN. This is the node in LDAP below which to search for groups, e.g. dc=patchmanager,dc=com LDAP object class for groups of users. The name of the attribute in a group that contains the name of the group. The name of the attribute in a group that contains the members of the group. Default value for both Active Directory and slapd is member. Member 7

8 ldap-user-objectclass The object class that represents a user. Active Directory: Person slapd: posixaccount. Other commonly used values are person, organizationalperson, inetorgperson. ldap-user-lookup The name of the attribute in a user object that contains the username. Active Directory: samaccountname slapd: uid ldap-user-result The name of the attribute in a user object that contains the login name. Active Directory: samaccountname slapd: dn Table 3: LDAP Authentication Properties Common LDAP properties: For Windows Active Directory, add the following additional properties: For Linux/Unix based LDAP servers, add the following additional properties: Table 4: Example LDAP properties authentication-methods=ldap ldap-enabled=true ldap-provider=ldap://localhost:389 ldap-search-user-password=abc123 ldap-search-context=dc=example,dc=com ldap-groups-search-context=dc=example,dc=com ldap-member-attribute=member ldap-search-user-name=johnsmith ldap-auth-mechanism=digest-md5 ldap-group-name-attribute=name ldap-group-objectclass=group ldap-user-lookup=samaccountname ldap-user-objectclass=person ldap-user-result=samaccountname ldap-search-user-name=cn=john Smith,ou=Users,ou=Accounts,dc=example,dc=com ldap-auth-mechanism=simple ldap-group-name-attribute=displayname ldap-group-objectclass=posixgroup ldap-user-lookup=uid ldap-user-objectclass=posixaccount ldap-user-result=dn 8

9 LDAP Interface Test Tool The LDAP Interface Test Tool is an offline tool that provides a mechanism for validating the properties required to interface to your LDAP Directory server. Valid properties will lead to the tool establishing a connection to the LDAP directory, successfully authenticating a specified user and retrieving the group membership of that user, thus simulating the actions taken by SmartPatch Server when authenticating/authorizing the user. When the properties have been validated, they can then be entered into the SmartPatch Server server.properties file. Note that the tool does not require that SmartPatch Server is running, but it is recommended that it is executed on the SmartPatch Server machine. The tool is distributed in the archive 'ldap-interface-testing-tool-<rev>.zip', where <rev> is the software revision number of the tool. The archive contains two files: 'ldap-interface-testing-tool-<rev>.jar', where <rev> is the software revision number of the tool 'ldap.properties', which contains an example set of input properties. The tool should be executed by Java from the command line and requires a single parameter to indicate the path to the file containing the input properties: -c <the file containing the input properties to validate> An example command line to run the tool is: java -jar ldap-interface-testing-tool jar -c ldap.properties Upon execution of the tool, prompts will appear for entering the user name and password of the user whose authentication and group membership will be validated. Logging output will be generated at each step of the process. If the tool logs the successful authentication of the user and the retrieval of the appropriate group membership of the user, then the properties are set correctly and can be used in the server.properties file of SmartPatch Server. SAML 2.0 Single Sign-On (SSO) Authentication Configuration SmartPatch supports being configured as a SAML 2.0 Service Provider (SP) to facilitate SAML 2.0 Single Sign-On (SSO). The mechanism with which SmartPatch implements SAML 2.0 SSO is via the Spring Security SAML Extension. This section is intended to serve as a guideline for enabling SAML 2.0 SP SSO support in SmartPatch. Note that the detail of the configuration steps may vary depending on your specific Identity Provider (IdP) implementation, but in all cases, the configuration steps will be similar to those described in this section. In order to configure SMARTPATCHas a SAML 2.0 SP, prior knowledge of the SAML 2.0 protocol and of the appropriate configuration of your IdP is recommended. The following sections assume that SmartPatch has been deployed to the 'ROOT' web application context of Apache Tomcat. If SmartPatch has instead been deployed to a different web application context, then any references in the sections to the 'ROOT' web application context should be interpreted accordingly. 9

10 Enable the Spring Security SAML Extension In the file '<Apache Tomcat Installation Directory>/webapps/ROOT/WEB-INF/web.xml' ensure that the XML elements below are uncommented (by removing the character sequences '<!--' and '-->' that enclose the XML elements): <context-param> <param-name>contextconfiglocation</param-name> <param-value> /WEB-INF/securityContext.xml <servlet> <servlet-name>saml</servlet-name> <servlet-class>org.springframework.web.servlet.dispatcherservlet</servlet-class> <load-on-startup>1</load-on-startup> </servlet> <servlet-mapping> <servlet-name>saml</servlet-name> <url-pattern>/saml/web/*</url-pattern> </servlet-mapping> <filter> <filter-name>springsecurityfilterchain</filter-name> <filter-class>org.springframework.web.filter.delegatingfilterproxy</filter-class> </filter> <filter-mapping> <filter-name>springsecurityfilterchain</filter-name> <url-pattern>/*</url-pattern> </filter-mapping> <listener> <listener-class>org.springframework.web.context.contextloaderlistener</listener-class> </listener> 10

11 Identity Provider (IdP) Metadata Identity Provider (IdP) Metadata for File Based Metadata If your IdP metadata is available as a file, the following steps describe how to configure this metadata in SmartPatch. 1. Create a directory named 'metadata' in the directory: '<Apache Tomcat Installation Directory>/webapps/ROOT/WEB-INF/classes' 2. Copy your IdP metadata file into the newly created 'metadata' directory and (if necessary) rename it to be 'idp.xml'. 3. In the file '<Apache Tomcat Installation Directory>/webapps/ROOT/WEB-INF/securityContext.xml', after the tag '<!-- add Identity Provider metadata here -->', add the following contents: <bean class="org.springframework.security.saml.metadata.extendedmetadatadelegate"> <property name="metadatatrustcheck" value="false"/> <constructor-arg> <bean class="org.opensaml.saml2.metadata.provider.filesystemmetadataprovider"> <constructor-arg> <value type="java.io.file">classpath:metadata/idp.xml</value> </constructor-arg> <property name="parserpool" ref="parserpool"/> </bean> </constructor-arg> <constructor-arg> <bean class="org.springframework.security.saml.metadata.extendedmetadata"> </bean> </constructor-arg> </bean> 11

12 Identity Provider (IdP) Metadata for URL Based Metadata If your IdP offers its metadata as a URL, add the following contents in the file '<Apache Tomcat Installation Directory>/webapps/ROOT/WEB-INF/securityContext.xml', after the tag '<!-- add Identity Provider metadata here ->', replacing the text '{idp-metadata-url}' with the URL of the IdP metadata: <bean class="org.opensaml.saml2.metadata.provider.httpmetadataprovider"> <constructor-arg> <value type="java.lang.string">{idp-metadata-url}</value> </constructor-arg> <constructor-arg> <value type="int">5000</value> </constructor-arg> <property name="parserpool" ref="parserpool"/> </bean> 12

13 Service Provider (SP) Metadata Ensure that SmartPatch Server is running. Using your browser, browse to 'http(s)://<serveraddress:port>/saml/web/metadata', where '<serveraddress:port>' is the network address and port that SmartPatch Server is running on. Log in to the metadata administration page with the following login credentials: User name: Password: pmadmin pmadmin-pa$$ Upon successful login, the Metadata administration page will appear. Click on the 'Generate new service provider metadata' button. The 'Metadata generation' page will appear. In the 'Metadata generation' page, configure the following fields, leaving the remaining fields with their default values: 1. Entity ID = http(s)://<serveraddress>, where <serveraddress> is the network address of SmartPatch Server. Note that Entity ID is a unique identifier for an identity or service provider, and the value is included in the generated metadata. Note also that with some ID Providers the Entity ID should be the same as the Audience Restriction field on the IdP side. 2. Entity base URL = where <serveraddress:port> is the network address and port that SMARTPATCHServer is running on. Click the 'Generate metadata' button. The 'Metadata detail' page will appear. You will see two blocks of generated data: Metadata and Configuration, with instructions at the foot of the page. Follow the instructions, and at the third bullet-point of the instructions, note: - the location within the file '<Apache Tomcat Installation Directory>/webapps/ROOT/WEB- INF/securityContext.xml' to paste the generated Configuration is marked in the file with the tag '<!-- add Service Provider metadata here- ->'. - ensure that idpdiscovery is disabled in the generated Configuration that you pasted into the 'securitycontext.xml' file: <property name="idpdiscoveryenabled" value="false"/> 3. Stop Apache Tomcat 4. In the configuration file 'server.properties' in the SMARTPATCHServer working directory, configure the following properties: authentication-methods=saml Note that applying any changes to the 'server.properties' file should be done while the Apache Tomcat process is stopped. The 'saml-user-key' property should be specified as the name of the attribute (for example, ' Address', 'userid', etc.) which is returned with the SAML assertion as a part of the authentication process. This attribute should be set on the IdP side. During the SmartPatch login process, the value of the attribute will be matched to a user name in SmartPatch, in which case the user will be automatically logged in. Note that it is necessary that such a matching user name exists in the SmartPatch database, otherwise the login attempt will be rejected. 5. Start Apache Tomcat 13

14 Configuring the Identity Provider (IdP) Configuring the IdP will vary depending on the IdP vendor / application. The following information specifies a typical set of parameters required for the IdP configuration: Single sign on URL = http(s)://<serveraddress>/saml/sso, where <serveraddress> is the network address of SmartPatch Server Audience URI (SP Entity ID) = <serveraddress> is the network address of SmartPatch Server. Note that this value should be the same as the Entity ID value used when creating the Service Provider metadata in step 2) of section 13. Define attributes that will be returned with the SAML assertion. For example, in step 4) of section 13, if you specified saml-user-key= address you should define an attribute entry with Name = Address and Value = ${user. } Verifying the SSO Configuration 1. Clear your browser cache. 2. Browse to 'http(s)://<serveraddress:port>', where <serveraddress:port> is the network address and port that SmartPatch Server is running on. Note that the form of the <serveraddress> should be as specified in the Entity base URL parameter (see step 2) of section 13). 3. You will be redirected to the IdP login page. 4. Log in to the IdP using your SSO credentials. After a successful login you will be redirected to the SmartPatch start page. 5. On the SmartPatch start page, click the link "Start SmartPatch" and execute the jnlp file. 6. You will be automatically logged into the application with the user name supplied in the SAML assertion attribute. Once the SSO configuration has been verified, it is recommended to disable access to the metadata administration by commenting out the following servlet mapping in the file '<Apache Tomcat Installation Directory>/webapps/ROOT/WEB-INF/web.xml': <servlet-mapping> <servlet-name>saml</servlet-name> <url-pattern>/saml/web/*</url-pattern> </servlet-mapping> 14

15 SSL Configuration To enable SSL communication on SmartPatch Server, the ssl-enabled property should be set to have the value true. Note that in addition to setting this property, SSL communication is also required to be configured at the Apache Tomcat level (or Apache Web Server level if Apache Web Server is a front-end to Apache Tomcat). Please refer to the Apache Tomcat or Apache Web Server documentation for details on how to configure SSL on these platforms. Note also that client-server communication requires that the server SSL certificate is trusted by Java on the client machines. If the SSL certificate was issued by a recognized certification authority, then no further action is required to establish the trust. If the server SSL certificate is not trusted (for example if it is selfsigned or was not issued by a recognized certification authority), the certificate will be required to be imported into the Java 'cacerts' trust store on each client machine. Property Description Default ssl-enabled When set to true, SSL communication is enabled. false Table 5: SSL Properties 15

16 Logging Configuration The properties described in Table 6 specify parameters relating to server-side application level logging. Property Description Default logging-level log-remove-delay log-remove-action log-remove-archivefile Table 6: Logging Properties Specifies the details of the server logs. When set to debug,the logging is more detailed. Possible values are info and debug. Specifies the number of days logs should be stored. -1 means that logs are never deleted / archived automatically. Specifies the action to perform on logs that are older than the number of days specified in log-remove-delay. Possible values are archive and delete. Specifies the file to which logs older than the number of days specified in log-remove-delay are archived. info -1 archive logs/logs.old.zip Miscellaneous Configuration Table 7 describes miscellaneous properties that have not been described in other sections of this guide. Property Description Default session-expiry If a client session has been inactive for the time (in 480 minutes) specified by this property, then the server will expire the client session. languages file-types server-poll-interval dir-file-cache Specifies the enabled user interface language packs. Users can select from these user interface languages in a list box on the login screen. The value should be a comma-separated list of languages. The available languages are NL (Dutch), EN (English), DE (German), FR (French), ES (Spanish) and IT (Italian). A comma-separated list of file types that are allowed to be uploaded to the server as file uploads using the File Management function in the user interface. An empty or missing property indicates that all file types are allowed. The refresh rate in seconds that SmartPATCH Client will use for polling SmartPatch Server to retrieve any pending updates. Specifies the directory where application files are cached on the client machine. NL,EN,DE,FR,ES, IT 30 '.patchmanager /file-cache' in the operating system user home folder on the client machine. 16

17 dir-image-cache download-cache google-maps-key google-maps-client google-maps-private-key google-maps-language server-type show-server-type-in-gui server-type-gui-color start-page-footer Table 7: Miscellaneous Properties Specifies the directory where application images are cached on the client machine. When set to false, the client cache of application images and files is not synchronized with the server at client start up. In this case, any stale images or files will be synchronized on-demand by the client at the moment that they are needed by the application. The API key for the Google Static Maps API. Applicable when integrating Google Maps images into location overview backgrounds. The client ID for the Google Static Maps API. Applicable when integrating Google Maps images into location overview backgrounds. The private key for signing communication with the Google Static Maps API. Applicable when integrating Google Maps images into location overview backgrounds. Optional property for specifying the language code when communicating with the Google Static Maps API. Applicable when integrating Google Maps images into location overview backgrounds. Property for specifying the server usage type for example to distinguish between Production, Backup and Development server instances. The specified value for server-type will appear in the home page below the 'Start' section. If a value for the server-type property has been specified, then setting this property to true will result in the server type also being displayed in the log-in dialog, in the toolbar of the main window of the GUI, and in the title of the main window of the GUI. If a value for the server-type property has been specified and the show-server-type-in-gui property has been set to true, then this property specifies the text color for the server type in the toolbar of the main window of the GUI. The value should take the form of an RGB color specified in the format 'rgb(r,g,b)'. Property for specifying text that appears as a footer in the home page. '.SmartPatch/im age-cache' in the operating system user home folder on the client machine. true false rgb(255,255,255 ) 17

18 Client-Server Compression In a network scenario where the latency between SmartPatch Client and SmartPatch Server is significant or the bandwidth is limited, compressing the HTTP(S) traffic between SmartPatch Client and SmartPatch Server can be advantageous. Please refer to the Apache Tomcat or Apache Web Server documentation for details on how to configure compression on these platforms. Note that the MIME type of traffic between SmartPatch Client and SmartPatch Server is 'application/x-java-serialized-object', therefore this MIME type should be explicitly included in the compression configuration. 18

SmartPatch. Installation Manual Version 6.x

SmartPatch. Installation Manual Version 6.x SmartPatch Installation Manual Version 6.x Copyright Copyright 2017 Brand-Rex Ltd. All rights reserved. No part of this publication or of the SmartPatch software, in source code or object code form, may

More information

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page. Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator

More information

Setting Up the Server

Setting Up the Server Managing Licenses, page 1 Cross-launch from Prime Collaboration Provisioning, page 5 Integrating Prime Collaboration Servers, page 6 Single Sign-On for Prime Collaboration, page 7 Changing the SSL Port,

More information

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page. Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator

More information

IBM Security Access Manager Version January Federation Administration topics IBM

IBM Security Access Manager Version January Federation Administration topics IBM IBM Security Access Manager Version 9.0.2.1 January 2017 Federation Administration topics IBM IBM Security Access Manager Version 9.0.2.1 January 2017 Federation Administration topics IBM ii IBM Security

More information

NetIQ Identity Governance

NetIQ Identity Governance NetIQ Identity Governance Identity Reporting Guide February 2018 Contents Accessing Identity Reporting 2 Using the Overview Page 2 Using the Repository Page 3 Using the Import Page 8 Using the Calendar

More information

FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry.

FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION VERSION 9 Setup Guide This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE Fusion Registry: 9.2.x Document

More information

Table of Contents. Single Sign On 1

Table of Contents. Single Sign On 1 Table of Contents Table of Contents Single Sign On SAML Authentication Using SAML SSO Authentication Setting up SAML SSO Authentication Configuring OneLogin as an Identity Provider LDAP Authentication

More information

Novell Access Manager

Novell Access Manager Setup Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 Setup Guide Legal Notices Novell, Inc., makes no representations or warranties

More information

IBM Security Access Manager Version 9.0 October Federation Administration topics IBM

IBM Security Access Manager Version 9.0 October Federation Administration topics IBM IBM Security Access Manager Version 9.0 October 2015 Federation Administration topics IBM IBM Security Access Manager Version 9.0 October 2015 Federation Administration topics IBM ii IBM Security Access

More information

MyWorkDrive SAML v2.0 Okta Integration Guide

MyWorkDrive SAML v2.0 Okta Integration Guide MyWorkDrive SAML v2.0 Okta Integration Guide i Introduction In this integration, Okta is acting as the identity provider (IdP) and the MyWorkDrive Server is acting as the service provider (SP). It is

More information

Cloud Access Manager Configuration Guide

Cloud Access Manager Configuration Guide Cloud Access Manager 8.1.3 Configuration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

esignlive SAML Administrator's Guide Product Release: 6.5 Date: July 05, 2018 esignlive 8200 Decarie Blvd, Suite 300 Montreal, Quebec H4P 2P5

esignlive SAML Administrator's Guide Product Release: 6.5 Date: July 05, 2018 esignlive 8200 Decarie Blvd, Suite 300 Montreal, Quebec H4P 2P5 esignlive SAML Administrator's Guide Product Release: 6.5 Date: July 05, 2018 esignlive 8200 Decarie Blvd, Suite 300 Montreal, Quebec H4P 2P5 Phone: 1-855-MYESIGN Fax: (514) 337-5258 Web: www.esignlive.com

More information

Contents About This Guide... 5 About Notifications... 5 Managing User Accounts... 6 Managing Companies Managing Password Policies...

Contents About This Guide... 5 About Notifications... 5 Managing User Accounts... 6 Managing Companies Managing Password Policies... Cloud Services Identity Management Administration Guide Version 17 July 2017 Contents About This Guide... 5 About Notifications... 5 Managing User Accounts... 6 About the User Administration Table...

More information

D9.2.2 AD FS via SAML2

D9.2.2 AD FS via SAML2 D9.2.2 AD FS via SAML2 This guide assumes you have an AD FS deployment. This guide is based on Windows Server 2016. Third Light support staff cannot offer assistance with 3rd party tools, so while the

More information

Administering Jive Mobile Apps for ios and Android

Administering Jive Mobile Apps for ios and Android Administering Jive Mobile Apps for ios and Android TOC 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios...3 Custom App Wrapping for ios...3 Authentication with Mobile

More information

SAML-Based SSO Configuration

SAML-Based SSO Configuration Prerequisites, page 1 SAML SSO Configuration Workflow, page 5 Reconfigure OpenAM SSO to SAML SSO After an Upgrade, page 9 Prerequisites NTP Setup In SAML SSO, Network Time Protocol (NTP) enables clock

More information

Manage SAML Single Sign-On

Manage SAML Single Sign-On SAML Single Sign-On Overview, page 1 Opt-In Control for Certificate-Based SSO Authentication for Cisco Jabber on ios, page 1 SAML Single Sign-On Prerequisites, page 2, page 3 SAML Single Sign-On Overview

More information

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client.

The SSL device also supports the 64-bit Internet Explorer with new ActiveX loaders for Assessment, Abolishment, and the Access Client. WatchGuard SSL v3.2 Update 2 Release Notes Supported Devices SSL 100 and 560 WatchGuard SSL OS Build 452330 Revision Date 11 November 2014 Introduction WatchGuard is pleased to announce the release of

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Novell Access Manager

Novell Access Manager Setup Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.0 SP4 IR2 January 30, 2009 www.novell.com Novell Access Manager 3.0 SP4 Setup Guide Legal Notices Novell, Inc., makes no representations or

More information

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

CA SiteMinder Federation Security Services

CA SiteMinder Federation Security Services CA SiteMinder Federation Security Services Federation Endpoint Deployment Guide r6.0 SP 5 Fourth Edition This documentation and any related computer software help programs (hereinafter referred to as the

More information

SAML-Based SSO Configuration

SAML-Based SSO Configuration Prerequisites, page 1 SAML SSO Configuration Task Flow, page 5 Reconfigure OpenAM SSO to SAML SSO Following an Upgrade, page 9 SAML SSO Deployment Interactions and Restrictions, page 9 Prerequisites NTP

More information

Novell Access Manager

Novell Access Manager SSL VPN Server Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 SSL VPN Server Guide Legal Notices Novell, Inc., makes no representations

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 14 Create an Identity Rule, page 15 Manage a Realm, page 17 Manage an Identity

More information

Configure Unsanctioned Device Access Control

Configure Unsanctioned Device Access Control Configure Unsanctioned Device Access Control paloaltonetworks.com/documentation Contact Information Corporate Headquarters: Palo Alto Networks 3000 Tannery Way Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-support

More information

Enabling Single Sign-On Using Okta in Axon Data Governance 5.4

Enabling Single Sign-On Using Okta in Axon Data Governance 5.4 Enabling Single Sign-On Using Okta in Axon Data Governance 5.4 Copyright Informatica LLC 2018. Informatica and the Informatica logo are trademarks or registered trademarks of Informatica LLC in the United

More information

Webthority can provide single sign-on to web applications using one of the following authentication methods:

Webthority can provide single sign-on to web applications using one of the following authentication methods: Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 15 Create an Identity Rule, page 15 Manage a Realm, page 20 Manage an Identity

More information

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book] Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.2 D14465.07 June 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Okta

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Okta SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Authenticating Cisco VCS accounts using LDAP

Authenticating Cisco VCS accounts using LDAP Authenticating Cisco VCS accounts using LDAP Cisco TelePresence Deployment Guide Cisco VCS X6 D14526.04 February 2011 Contents Contents Document revision history... 3 Introduction... 4 Usage... 4 Cisco

More information

Single Sign-On for PCF. User's Guide

Single Sign-On for PCF. User's Guide Single Sign-On for PCF Version 1.2 User's Guide 2018 Pivotal Software, Inc. Table of Contents Table of Contents Single Sign-On Overview Installation Getting Started with Single Sign-On Manage Service Plans

More information

Cisco Expressway Authenticating Accounts Using LDAP

Cisco Expressway Authenticating Accounts Using LDAP Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4

More information

Oracle Utilities Opower Solution Extension Partner SSO

Oracle Utilities Opower Solution Extension Partner SSO Oracle Utilities Opower Solution Extension Partner SSO Integration Guide E84763-01 Last Updated: Friday, January 05, 2018 Oracle Utilities Opower Solution Extension Partner SSO Integration Guide Copyright

More information

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6 Gateway Installation and Configuration Guide for On-Premises Version 17 September 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites...

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

novdocx (en) 11 December 2007 XII XIIWebAccess

novdocx (en) 11 December 2007 XII XIIWebAccess XIIWebAccess Chapter 53, Scaling Your WebAccess Installation, on page 855 Chapter 54, Configuring WebAccess Components, on page 869 Chapter 55, Managing User Access, on page 915 Chapter 56, Monitoring

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

Administration Guide. Lavastorm Analytics Engine 6.1.1

Administration Guide. Lavastorm Analytics Engine 6.1.1 Administration Guide Lavastorm Analytics Engine 6.1.1 Lavastorm Analytics Engine 6.1.1: Administration Guide Legal notice Copyright THE CONTENTS OF THIS DOCUMENT ARE THE COPYRIGHT OF LIMITED. ALL RIGHTS

More information

Version 7.x. Quick-Start Guide

Version 7.x. Quick-Start Guide Version 7.x Quick-Start Guide 2005-2013 Ping Identity Corporation. All rights reserved. PingFederate Quick-Start Guide Version 7.x September, 2013 Ping Identity Corporation 1001 17th Street, Suite 100

More information

Session 8. Reading and Reference. en.wikipedia.org/wiki/list_of_http_headers. en.wikipedia.org/wiki/http_status_codes

Session 8. Reading and Reference. en.wikipedia.org/wiki/list_of_http_headers. en.wikipedia.org/wiki/http_status_codes Session 8 Deployment Descriptor 1 Reading Reading and Reference en.wikipedia.org/wiki/http Reference http headers en.wikipedia.org/wiki/list_of_http_headers http status codes en.wikipedia.org/wiki/_status_codes

More information

Bria 3 Provisioning Guide OEM Deployments

Bria 3 Provisioning Guide OEM Deployments Bria 3 Provisioning Guide OEM Deployments CounterPath Corporation CounterPath Corporation. Suite 300, One Bentall Centre 505 Burrard Street Box 95 Vancouver BC V7X 1M3 Tel: 1.604.320.3344 sales@counterpath.com

More information

Mozy. Administrator Guide

Mozy. Administrator Guide Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license

More information

Quick Start Guide for SAML SSO Access

Quick Start Guide for SAML SSO Access Quick Start Guide Quick Start Guide for SAML SSO Access Cisco Unity Connection SAML SSO 2 Introduction 2 Understanding Service Provider and Identity Provider 2 Understanding SAML Protocol 3 SSO Mode 4

More information

Server Installation Guide

Server Installation Guide Server Installation Guide Server Installation Guide Legal notice Copyright 2018 LAVASTORM ANALYTICS, INC. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS HEREOF MAY NOT BE REPRODUCED OR DISTRIBUTED IN ANY

More information

Integration of the platform. Technical specifications

Integration of the platform. Technical specifications Introduction This document is meant as a reference and specification guide to carry out the integration between Gamelearn s platform and the different Learning Management System platforms of the client,

More information

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Tableau Server

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Tableau Server SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

RECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for High Security SSO

RECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for High Security SSO July 2017 Contents Introduction...3 The Integrated Solution...3 Prerequisites...4 Configuration...4 Set up BIG-IP APM to be a SAML IdP...4 Create a self-signed certificate for signing SAML assertions...4

More information

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow)

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow) Integration Guide PingFederate SAML Integration Guide (SP-Initiated Workflow) Copyright Information 2018. SecureAuth is a registered trademark of SecureAuth Corporation. SecureAuth s IdP software, appliances,

More information

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1 Administering Workspace ONE in VMware Identity Manager Services with AirWatch VMware AirWatch 9.1.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE Integrating VMware Workspace ONE with Okta VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

Box Connector. Version 2.0. User Guide

Box Connector. Version 2.0. User Guide Box Connector Version 2.0 User Guide 2016 Ping Identity Corporation. All rights reserved. PingFederate Box Connector User Guide Version 2.0 March, 2016 Ping Identity Corporation 1001 17th Street, Suite

More information

Google Search Appliance

Google Search Appliance Google Search Appliance Getting the Most from Your Google Search Appliance Google Search Appliance software version 7.4 Google, Inc. 1600 Amphitheatre Parkway Mountain View, CA 94043 www.google.com GSA-QS_200.03

More information

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University

ISA 767, Secure Electronic Commerce Xinwen Zhang, George Mason University Identity Management and Federated ID (Liberty Alliance) ISA 767, Secure Electronic Commerce Xinwen Zhang, xzhang6@gmu.edu George Mason University Identity Identity is the fundamental concept of uniquely

More information

Managing Users and Configuring Role-Based Access Control

Managing Users and Configuring Role-Based Access Control Managing s and Configuring Role-Based Access Control This section describes how to manage users in Prime Central, including defining users and passwords and configuring role-based access control (RBAC).

More information

User guide NotifySCM Installer

User guide NotifySCM Installer User guide NotifySCM Installer TABLE OF CONTENTS 1 Overview... 3 2 Office 365 Users synchronization... 3 3 Installation... 5 4 Starting the server... 17 2 P a g e 1 OVERVIEW This user guide provides instruction

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

SSO Authentication with ADFS SAML 2.0. Ephesoft Transact Documentation

SSO Authentication with ADFS SAML 2.0. Ephesoft Transact Documentation SSO Authentication with ADFS SAML 2.0 Ephesoft Transact Documentation 2017 Table of Contents Prerequisites... 1 Tools Used... 1 Setup... 1 Generating Server Certificates to Set Up SSL/TLS... 1 Creating

More information

2 Oracle WebLogic Overview Prerequisites Baseline Architecture...6

2 Oracle WebLogic Overview Prerequisites Baseline Architecture...6 Table of Contents 1 Oracle Access Manager Integration...1 1.1 Overview...1 1.2 Prerequisites...1 1.3 Deployment...1 1.4 Integration...1 1.5 Authentication Process...1 2 Oracle WebLogic...2 3 Overview...3

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Connect-2-Everything SAML SSO (client documentation)

Connect-2-Everything SAML SSO (client documentation) Connect-2-Everything SAML SSO (client documentation) Table of Contents Summary Overview Refined tags Summary The Connect-2-Everything landing page by Refined Data allows Adobe Connect account holders to

More information

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29 Oracle Access Manager Configuration Guide 16 R1 March 2016 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 8 Installing Oracle HTTP Server...

More information

Google Apps Integration

Google Apps Integration Google Apps Integration Contents 1 Using Swivel for Google Apps Authentication 2 Prerequisites 3 Google SSO 4 Swivel and Google Apps 5 User Experience 6 Install the Swivel Google software 7 Create private

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Okta Integration Guide for Web Access Management with F5 BIG-IP

Okta Integration Guide for Web Access Management with F5 BIG-IP Okta Integration Guide for Web Access Management with F5 BIG-IP Contents Introduction... 3 Publishing SAMPLE Web Application VIA F5 BIG-IP... 5 Configuring Okta as SAML 2.0 Identity Provider for F5 BIG-IP...

More information

CA SiteMinder Federation

CA SiteMinder Federation CA SiteMinder Federation Legacy Federation Guide 12.52 SP1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Quick Start Access Manager 3.1 SP5 January 2013

Quick Start Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Quick Start Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

CA SiteMinder Federation

CA SiteMinder Federation CA SiteMinder Federation Partnership Federation Guide 12.52 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Troubleshooting Single Sign-On

Troubleshooting Single Sign-On Security Trust Error Message, on page 1 "Invalid Profile Credentials" Message, on page 2 "Module Name Is Invalid" Message, on page 2 "Invalid OpenAM Access Manager (Openam) Server URL" Message, on page

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Tutorial for Oracle Identity Management 11g Release 1 (11.1.1) E10276-01 May 2009 Oracle Fusion Middleware Tutorial for Oracle Identity Management, 11g Release 1 (11.1.1) E10276-01

More information

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Pulse Connect Secure 8.x

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Pulse Connect Secure 8.x RSA SECURID ACCESS Implementation Guide Pulse Connect Secure 8.x Daniel R. Pintal, RSA Partner Engineering Last Modified: January 24 th, 2018 Solution Summary The Pulse

More information

Oracle Virtual Directory 11g Oracle Enterprise Gateway Integration Guide

Oracle Virtual Directory 11g Oracle Enterprise Gateway Integration Guide An Oracle White Paper June 2011 Oracle Virtual Directory 11g Oracle Enterprise Gateway Integration Guide 1 / 25 Disclaimer The following is intended to outline our general product direction. It is intended

More information

User Guide. Admin Guide. r

User Guide. Admin Guide. r User Guide Admin Guide r 03.08.16 1 Welcome to Keeper! We re excited you have chosen to work with us. Let s get started by walking through how you can tell your employees about Keeper, then we ll walk

More information

Quick Start Guide for SAML SSO Access

Quick Start Guide for SAML SSO Access Standalone Doc - Quick Start Guide Quick Start Guide for SAML SSO Access Cisco Unity Connection SAML SSO 2 Introduction 2 Understanding Service Provider and Identity Provider 3 Understanding SAML Protocol

More information

Troubleshooting Single Sign-On

Troubleshooting Single Sign-On Security Trust Error Message, page 1 "Invalid Profile Credentials" Message, page 2 "Module Name Is Invalid" Message, page 2 "Invalid OpenAM Access Manager (Openam) Server URL" Message, page 2 Web Browser

More information

Configuring SAML-based Single Sign-on for Informatica Web Applications

Configuring SAML-based Single Sign-on for Informatica Web Applications Configuring SAML-based Single Sign-on for Informatica Web Applications Copyright Informatica LLC 2017. Informatica LLC. Informatica, the Informatica logo, Informatica Big Data Management, and Informatica

More information

Configuring and Delivering Salesforce as a managed application to XenMobile Users with NetScaler as the SAML IDP (Identity Provider)

Configuring and Delivering Salesforce as a managed application to XenMobile Users with NetScaler as the SAML IDP (Identity Provider) Solution Guide ios Managed Configuration Configuring and Delivering Salesforce as a managed application to XenMobile Users with NetScaler as the SAML IDP (Identity Provider) Solution Guide 1 Introduction

More information

CA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5

CA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5 CA SiteMinder Federation Manager Guide: Legacy Federation r12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

CounterACT User Directory Plugin

CounterACT User Directory Plugin Version 6.1.2 and Above Table of Contents About the User Directory Plugin... 3 Endpoint User Details... 3 Verify Endpoint Authentication... 3 User Directory Inventory... 4 HTTP Login Action... 5 HTTP Sign

More information

Setting Up Resources in VMware Identity Manager

Setting Up Resources in VMware Identity Manager Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Integrating YuJa Active Learning with ADFS (SAML)

Integrating YuJa Active Learning with ADFS (SAML) Integrating YuJa Active Learning with ADFS (SAML) 1. Overview This document is intended to guide users on how to setup a secure connection between the YuJa Active Learning Platform referred to as the Service

More information

Unity Connection Version 10.5 SAML SSO Configuration Example

Unity Connection Version 10.5 SAML SSO Configuration Example Unity Connection Version 10.5 SAML SSO Configuration Example Document ID: 118772 Contributed by A.M.Mahesh Babu, Cisco TAC Engineer. Jan 21, 2015 Contents Introduction Prerequisites Requirements Network

More information

SAML SSO Okta Identity Provider 2

SAML SSO Okta Identity Provider 2 SAML SSO Okta Identity Provider SAML SSO Okta Identity Provider 2 Introduction 2 Configure Okta as Identity Provider 2 Enable SAML SSO on Unified Communications Applications 4 Test SSO on Okta 4 Revised:

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware AirWatch 9.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Unified Communications Manager Version 10.5 SAML SSO Configuration Example

Unified Communications Manager Version 10.5 SAML SSO Configuration Example Unified Communications Manager Version 10.5 SAML SSO Configuration Example Contents Introduction Prerequisites Requirements Network Time Protocol (NTP) Setup Domain Name Server (DNS) Setup Components Used

More information

Yellowfin SAML Bridge Web Application

Yellowfin SAML Bridge Web Application Yellowfin SAML Bridge Web Application 2017 2 Introduction The Yellowfin SAML Bridge is a Java web application that allows for interfacing between a SAML Identity Provider, and Yellowfin. This allows for

More information

Oracle Cloud Using the MailChimp Adapter. Release 17.3

Oracle Cloud Using the MailChimp Adapter. Release 17.3 Oracle Cloud Using the MailChimp Adapter Release 17.3 E70293-07 September 2017 Oracle Cloud Using the MailChimp Adapter, Release 17.3 E70293-07 Copyright 2016, 2017, Oracle and/or its affiliates. All rights

More information

SCCM Plug-in User Guide. Version 3.0

SCCM Plug-in User Guide. Version 3.0 SCCM Plug-in User Guide Version 3.0 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave

More information

ComponentSpace SAML v2.0 Okta Integration Guide

ComponentSpace SAML v2.0 Okta Integration Guide ComponentSpace SAML v2.0 Okta Integration Guide Copyright ComponentSpace Pty Ltd 2017-2018. All rights reserved. www.componentspace.com Contents Introduction... 1 Adding a SAML Application... 1 Service

More information

Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE. Release 9.2

Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE. Release 9.2 Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE Release 9.2 NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel

More information

Novell Filr 1.2 Administration Guide. November 2015

Novell Filr 1.2 Administration Guide. November 2015 Novell Filr 1.2 Administration Guide November 2015 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and specifically disclaims

More information

Oracle Access Manager Configuration Guide

Oracle Access Manager Configuration Guide Oracle Access Manager Configuration Guide 16 R2 September 2016 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

More information

Quick Connection Guide

Quick Connection Guide ServiceNow Connector Version 1.0 Quick Connection Guide 2015 Ping Identity Corporation. All rights reserved. PingFederate ServiceNow Connector Quick Connection Guide Version 1.0 August, 2015 Ping Identity

More information