IAM. Shopping Cart. IAM Description PM OM CM IF. CE SC USM Common Web CMS Reporting. Review & Share. Omnichannel Frontend...

Size: px
Start display at page:

Download "IAM. Shopping Cart. IAM Description PM OM CM IF. CE SC USM Common Web CMS Reporting. Review & Share. Omnichannel Frontend..."

Transcription

1 PM OM CM IF IAM CE SC USM Common Web CMS Reporting IAM Description The identity & access management (IAM) provides functions such as account information management, role permission management, access control management, and log management. The business enabling system (BES) utilizes the IAM to obtain diversified account & identity management, sign-in, authorization, and authentication capabilities that can be opened and shared. Review & Share Shopping Cart Omnichannel Frontend...

2 View of BES Engagement & Experience Omnichannel Frontend Communication Engine Experience Monitor & Optimizer Search Center Web CMS Personalization Engine Review & Share Customer Segment Shopping Cart Live Help Social Media listening&engagement Enterprise Mobility Mgmt Mobile APP Unified Interaction Hub Business Orchestration Identity & Access Mgmt Business Orchestrator Operation Openness Integration Framework Operation& Management Product Mgmt Customer Mgmt Order Mgmt Inventory Mgmt Promotion Partner Mgmt Unified System Mgmt Content Mgmt Sales Mgmt Document Mgmt Reporting Campaign Mgmt Loyalty Mgmt Knowledge Base Complaint & Problem Handling Commission CPQ MRM Activity Mgmt implemented Service Mgmt Do not implement

3 1. Overview 1.1 Typical Scenario Account and Password Authentication When an operator signs in to the system, the IAM authenticates the operator's account to ensure system security. The authentication includes whether the password is correct, whether the account is normal, and whether the IP address of the operator's computer is within the specified range. The IAM authenticates the account, password, IP address, and MAC address. x Retail Shop URL: Sign-in success Operator Account: Jack001 Password: ****** Sign In 1.2 Advantages Authorization and authentication for innumerable users and support for flexible third-party authorization capabilities The IAM provides end-to-end functions such as identity management and access control for the BES. The IAM also integrates third-party authentication capabilities such as the Windows Active Directories (Windows AD) for client security management and Oracle access manager (OAM). The IAM uses methods such as expending database tables and adding servers to provide unified identity management and authorization functions for hundreds of millions of users, covering operators, partners, and end users. Hundreds of millions of users Operator Partner End user Sign-in authorization Access control Authentication IAM Windows AD OAM Third-party authorization system Identity mgmt

4 2. Core Concepts 2.1 IAM-related Concepts Core concepts in the IAM include role, function permission, data permission. The following figure is the core concept model. Normal General role Common role Role exclusion Role inheritance User Unavailable Unassignable Permission exclusion Employee Partner Status Role template N:N Customer Role Function permission Resource + operation Permission Menu Visible Excluded permission Button Visible Role assignable permission Type 1:N Role use permission... Readonly Data source metadata definition Data permission Format definition Role A role is a set of related permissions. When a role is assigned to an employee, the employee will have all permissions defined for the role. The permissions of employees can be managed through role management. For example, to delete the permission of a type of employees, the permission information can be modified for the role of the employee type. Function permission A function permission controls the access to specified graphical user interface (GUI) resources, for example, add, delete, modify, and query menus and buttons. An employee can perform such operations only when the corresponding function permissions are assigned to the role of the employee.

5 Data permission A data permission controls access to dynamically instantiated resources, for example, add, delete, modify, and query database table information and data dictionaries. An employee can perform operations on specified data only when the role with the corresponding permission is assigned to the employee. E.g. E.g. A department administrator role is created. The role must have function permissions over the menus of business entities (BEs) and organization units (OUs) commonly accessed by a department administrator, as well as data permission over the OU table recording the data of all OUs. As such, an employee with this role can perform operations on these menus and maintain data in the OU table. Employee Individual basic info Role: department administrator Function permission Data permission BE menu OU menu... DB OU table

6 3 Architecture 3.1 Functional Architecture Authentication management Authorization management Role Function permission Data permission Group/User role mgmt Authentication service Permission comparison Employee role log Authentication failure log Authorization service Verification code service Sign-in service SSO server Role permission log Distributed session mgmt Account authorization interface mgmt 360-degree permission view Authorization log Sign-in and sign-out log Identity mgmt User mgmt Group mgmt Account binding Password mgmt Account/Password rule User info change log Authentication management Role Maintains role basic information, for example, delete or permanently disable invalid roles. A system administrator can configure the function and data permissions of roles, add role inheritance so that a role can inherit the configuration of another role, configure shortcut menus for a role, and view associated role templates. The system administrator can also copy a role directly to add a new role. The role copy has the same configuration as the copied role. Function permission Maintains function permission basic information. To describe function permissions in detail, an attachment can be uploaded for reference. If a role cannot have two permissions (for example, offering creation and offering review permission) at the same time in specific scenarios, the function permissions can be configured as mutually exclusive. Data permission Manages data permission basic information, for example, deleting expired data permission. Group/User role management Authentication service Permission comparison Employee role log Provides interfaces for querying and maintaining roles and employees. This function does not provide a GUI. Provides interfaces for verifying function permissions and data permissions of employee accounts. Enables system administrators to quickly view the permission difference between two employees or roles for whom multiple function permissions have been configured. Queries employee role change history by account, customer name, role code, role name, or time segment.

7 Role permission log Queries the permission change history of a role by role code, role name, permission code, permission name, and time segment. Authentication failure log Queries user authentication failure records by account, authentication object, and time segment. 360-degree permission view Provides menus for the role-permission, employee-permission, permission-employee, and permission-role views, displaying the relationships between employee, role, and permission from various perspectives. Authorization mgmt Authorization service Provides identity authorization services that support process orchestration and supports authorization modes such as static password, SMS verification code, and the combination of the two. Provides generation and verification services for graphic verification code and SMS verification code. Sign-in service Provides account sign-in services that support process orchestration. After an account successfully signs in, the system automatically creates a session and generates logs. Verification code service SSO server Provides the single sign-on (SSO) server for the system and integrates third-party SSO systems to enable the SSO function. Provides distributed session management for signed-in accounts, including online user session locking and destruction. Account authorization token mgmt Manages tokens for verified accounts. The token validity period can be set and extended as required. An account can be directly authorized through a token within the validity period. Records backend log information such as the channel, method, result, and Authorization log time for authorizing a user. Distributed session mgmt Sign-in log Records users' sign-in and sign-out information, including the operation time, sign-in channel, server IP address, and client IP address, and provides such information for display in the unified system management (USM). Identity management Provides the interface for maintaining system user basic information and life cycle status such as Created, Enabled, Suspended, and Discarded. Group management Provides the interface for querying and maintaining user group basic information and relationships between users and groups. A user group can be the OU of an employee or the segment to which a customer belongs. Account binding Provides the interface for binding, unbinding, and querying sign-in accounts of various types. User management Password management Provides the interface for changing and resetting an account, using the old password or a dynamic verification code, visiting a specified URL, or answering security questions. Supports the configuration of password and account rules specifying the requirements for account and password complexity to ensure system security. Rules can be configured through regular expressions or using the rule engine. Records and queries user information changes by account, name, or time segment. Account and password rule User info change log

8 3.2 Layered Architecture A business suite is composed of the foundation, extension, and corresponding predefined business configuration data. Foundation: provides cross-field basic business capabilities (including data models shared across fields) and is composed of related s. Extension: capability extended based on the foundation to meet the capability requirements of a specified field (such as the telecom) or product. Extension is expressed by new s (extension BC) and foundation extension plug-ins. Predefined configuration data: It can be copied, modified, and replaced to form business configuration data released by products. Basic suite layer Field extension Configuration layer IAM Component View Layer Business UI module Plug-in Business configuration Business configuration Account/ Password rule Authorization process (to implement) Sign-in process (to implement) Third-party authorization N/A Verification code Common sign-in Common authentication Account mgmt Sign-in authorization Permission mgmt Component/ Extension Name Common sign-in Party Function Provides distributed cache capability and web SSO service for other suites to embed. Basic suite layer Common authentication Provides authentication services through RESTful interfaces for other suites to embed. Identity mgmt Manages accounts and passwords. Sign-in authorization Provides services such as sign-in authorization and session management. Permission mgmt Provides maintenance and authentication services for information such as roles, function permissions, and data permissions. Party Common library, which provides the functions for querying and maintaining party basic information and contact information. Verification code Provides generation and verification services for graphic verification code and SMS verification code.

9 4. Key Technologies and Capabilities 4.1 Distributed Session Traditionally, sign-in sessions are stored on web nodes. Once the connected web node changes or the session is missing, a user needs to sign in again. The IAM uses the distributed session framework to automatically obtain sessions. In this way, the user does not need to sign in again for performing operations. Browser Distributed cache Web node 1. Visit a URL and enter the account and password. 4. Sign-in success. Backend 2. Send an account and password verification request. 3. Generate a unique key after verification success. 5. Create a session and store the session in the distributed cache. 6. Send a new access request. 7. Query the session by key value. 8. Matched successfully. 9. Set up the connection again without sign-in. 4.2 Role-based Access Control Model All function and data permissions are assigned to a user or user group by assigning a corresponding role. Hierarchical authorization and role-based permission inheritance are supported. Permission management framework centering on users and roles: Users' function and data permissions are managed by a role. A role is the standard method for defining the responsibilities of users and controlling resource access. Function permissions are not directly assigned to employees. Hierarchical authorization management: An employee of a BE can gain permissions by inheriting the role of an employee belonging to the upper-level BE (direct inheritance). This implements hierarchical authorization management. In addition, hierarchical authorization management prevents the situation that a user has too many function permissions and ensures that a user has the required permissions. Tips An employee can only inherit the role configured by the employee s direct supervisor.

10 Permission 1 Department Common role A Permission 2 Employees under the department inherit common role A and therefore have permissions 1 and 2. Employee Permission 1 Permission 2 Employee Permission 1... (administrator) Permission 2 Employee Permission 1 Permission 2 The administrator creates a sub-department and assigns permission 1 to common role B. Employees under the sub-department inherit common role B and therefore have permission 1. Sub-department Employee Permission 1 Common role B Employee Permission 1... Permission 1 Employee Permission Sign-in Authorization Process Orchestration The sign-in authorization process provided in the baseline version can be modified based on the actual situation through the Digital Studio tool. The following is a process orchestration example: Start Obtain sign-in context (such as language and IP address) End Validate account and password Check account validity period Check home BE for account 2. Orchestrate the process again. Validate graphical verification code 1. Customize new process nodes using Groovy scripts. Generate sign-in logs

11 5. Core Processes 5.1 SSO Authorization Process Singe sign-on (SSO) is a property of access control over multiple related but independent application systems. With this property, a user signs in once and gains access to all systems that trust each other without being prompted to sign in again at each of them. A third-party system menu entrance is mapped to the portal of the USM. When a user successfully signs in to the USM and accesses the third-party menu, the USM sends an authorization ticket to the third-party system. If the authorization is successful, the user can access the third-party system again without signing in. The following figure shows the SSO authorization process. Operator USM web node USM application cluster USM DB IAM (SSO server) Third-party system 1. Enter account and password. 2. Send authorization request. 3. Send back authorization success. 4. Generate session and store session in database. 5. Sign-in success. 6. Send registration request to SSO server. 7. Return authorization ticket after registration success. 8. Apply to access third-party menu. 9. Send access request to third-party menu and transfer authorization ticket. 10. Query operator info by authorization ticket. 11. Send back operator info. 12. Verify operator info and set up session. 13. Accessed successfully.

12 5.2 Unified Sign-in Sign-in Process The IAM provides a unified user sign-in and authorization framework for the BES to verify the sign-in information of accounts. Start 1. Visit page of BES. 2. Obtain the IAM authorization service. No Authorization successful? Yes 3. Invoke authorization interface. No Authorization successful? Yes 4. Invoke domain session service to construct a session. 11. Invoke authorization failure extended interface. 5. Create session cookie. 12. Generate logs. 6. Create context info (such as language and time zone). 13. Return sign-in failure message. Password change notification upon password expiration 7. Invoke authorization success extended interface. Password change notification when password is about to expire 8. Obtain password authorization rules and verify password. Password change notification at first sign-in 9. Generate sign-in logs. 10. Jump to the requested page. End

13 1. An operator enters the account and password on the sign-in page of BES and clicks Sign In. 2. The system invokes the authorization service of the IAM to verify the account, password, and account status based on the password verification logic. 3. The IAM invokes the authorization interface of other suites. Then other suites do further authorization based on the authorization logic such as check whether the status of a partner account is normal. 4. The IAM invokes the domain session service to construct a session to identify the authorization request sent from other suites and sustain the connection. The IAM sets up a user session and stores the addition information, cache information, and user data of the session in the database. 5. The IAM creates a session cookie to sustain the session. 6. The IAM creates context information (such as language and time zone) based on the session cookie for other suites to invoke to query and identify accounts. 7. The IAM invokes thes authorization extended interface to instruct other suites or the third-party system to do internal processing such as create an internal session cookie in other suites and sustain the session connection. 8. The IAM verifies the password. The verification includes: Whether the password is about to expire or has expired. If yes, the system instructs the operator to change the password. Whether the sign-in is the first sign-in. If yes, the system asks the operator to change the password. 9. The IAM generates sign-in success logs. 10. The system obtains the success message from the IAM and jumps to the requested page. 11. The IAM invokes the authorization failure extended interface to instruct other suites to do internal processing, such as delete the session cookie and end the invoking. 12. The IAM generates sign-in failure logs. 13. The system obtains the failure message from the IAM and displays an error message on the sign-in page of other suites.

14 5.3 Unified Sign-in Authorization Process The following figure shows the authorization process in the unified sign-in process. Start 1. Other suites invoke IAM authorization service. 2. The IAM follows the following steps to perform authorization. (The step sequence can be customized.) Identify verification code Identify account Verify password Verify status Verify IP/MAC address Verify one-off SMS verification code No Authorization successful? 4. Processing after authorization failure. Accumulate authentication failures within a cycle Yes 3. Processing after authentication success. Clear authentication failures Unlock account Lock account Send back user account object (such as account info and account binding info) End 1. Ohter suites invoke the authorization service of the IAM to verify the sign-in information of an account. 2. The IAM provides an authorization process to verify account information in an orchestrated sequence. The verification fails as long as any authorization item fails. Even though the entire authorization fails, the system will continue the execution of the remaining authorization items and return the authorization result. 3. The IAM clears the authorization failure records. After the account is unlocked, the IAM returns the account information and account binding information (such as the account, password, and home BE) to other suites. 4. The IAM locks an account if the accumulated number of authorization failure times of the account reaches a specified value.

15 5.4 Authentication Process The IAM provides a unified customer number authentication function for the BES, supporting customer number authentication by password and ID card. Start 1. Retailshop invokes IAM authentication service to authenticate service number. 2. The IAM follows the following steps to perform authentication. (The step sequence can be customized.) Check user existence Check validity of authentication mode Unlock expired account automatically locked by system Check customer locking status Verify customer password Verify customer certificate info No 4. Processing after authentication failure. Update authentication Send back failure times failure message Authentication successful? 3. Processing after authentication success. Clear authentication failure times to Retailshop No Yes Exceeded maximum authentication failure times? Send back customer info to Retailshop Yes Lock service number End 1. Retailshop invokes the customer authentication service of the IAM to send a sign-in authentication request for a service number and transfers the service number, authentication mode, and authentication information including password and certificate number to the IAM. 2. The IAM provides an authentication process for authenticating a service number in an orchestrated process. The authentication fails if any authentication item fails. Even though the entire authentication fails, the system will continue the execution of the remaining authentication items and return the authentication result.

16 3. The IAM sends the obtained customer information to the Retailshop. 4. If the authentication items for checking the customer password and customer certification information fail, the number of authentication failure times will be updated and compared with the maximum limit. If the number exceeds the maximum limit, the customer number will be locked. If other authentication items fail, the IAM returns an authentication failure message to the Retailshop. 5.5 HTTP Request Authentication Process The IAM provides a complete HTTP request authentication function for the BES. For example, the Role menu has a high security level and only operators with the permission for the menu can access the menu. When an operator accesses the menu by clicking the menu URL, the IAM checks whether the sign-in of the operator has timed out and whether the operator has the permission on the menu. The following figure shows the HTTP request authentication process. Start 1. Send HTTP request 2. Sign-in free on authentication page? Yes No 3. Obtain session Yes 4. Authentication timed out? No 5. Parse URL and match permission Jump to sign-in page 6. Authentication successful? Yes 7. Generate access success logs 8. Jump to business page End No Show authentication failure page

17 5.6 Role Permission Configuration Process The system administrator needs to add an inventory administrator role. To configure an inventory administrator role, the system administrator must understand the responsibilities of an inventory administrator, determine the required function permissions and data permissions based on the responsibilities, and assign the permissions to the inventory administrator role. The following figure shows the configuration process. Start Preparations for configuration An inventory administrator's daily work includes stock-in, stock-out, and transfer. An inventory administrator must have the permissions for inventory-related menus and system data. Determine responsibilities of role to be configured Match permissions for responsibilities Configure role End Role: inventory administrator Function permission Data permission

18 6. Core Interface 6.1 Internal Interface Relationship The IAM interacts with internal interface through the distributed service framework (DSF). IAM DSF Omnichannel OM CM PM... INV USM Interaction Description Interaction Object Omnichannel/CM/ OM/PM/INV... The IAM provides functions such as employee sign-in authorization, customer authorization and authentication, session authorization, and service authentication for peer suites through interfaces. USM The IAM provides employee sign-in information, employee sign-in authentication information, employee role permission information, and functions such as authentication service and session authentication interface for the USM. 6.2 Interaction with Other Systems The IAM interacts with other systems through the integration framework (IF), which provides protocol conversion between different systems. CBS BES IAM IPCC IF Windows AD Third-party authentication system

19 Peer System Interaction Description Convergent billing system/ip call center CBS/IPCC The IAM synchronizes role permission data to the third-party system. Windows AD The IAM obtains domain account authentication and synchronization information from a third-party system to complete the synchronization and authentication of Windows domain accounts on the IAM side. Third-party unified The IAM sends an account authentication and synchronization request to authentication system the third-party unified authentication system for authentication. 6.3 API Description The IAM provides the following types of APIs. For details, see the IAM SDK API Reference. API Classification Description Authorization interface Queries, maintains, and verifies user data. Authentication interface Maintains and queries data, such as role and permission data.

20 More Details For details about the common operations and related concepts of the IAM, see the IAM Operation Guide. For details about the configuration process and method of the IAM, see the IAM Configuration Guide. For details about the secondary development capability and method of the IAM, see the IAM Development Guide.

21 Copyright Huawei Technologies Co., Ltd. All rights reserved.

IAM. Shopping Cart. IAM Description PM OM CM IF. Common Web CMS Reporting CE SC Review & Share. Omnichannel Frontend...

IAM. Shopping Cart. IAM Description PM OM CM IF. Common Web CMS Reporting CE SC Review & Share. Omnichannel Frontend... PM OM CM IF IAM Common Web CMS Reporting CE SC Review & Share IAM Description The identity & access management (IAM) provides functions such as account information management, role permission management,

More information

Enterprise Access Gateway Management for Exostar s IAM Platform June 2018

Enterprise Access Gateway Management for Exostar s IAM Platform June 2018 Enterprise Access Gateway Management for Exostar s IAM Platform June 2018 Copyright 2018 Exostar LLC All rights reserved. 1 Version Impacts Date Owner Enterprise Access Gateway (EAG) Guide Revised June

More information

OpenIAM Identity and Access Manager Technical Architecture Overview

OpenIAM Identity and Access Manager Technical Architecture Overview OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...

More information

Elastic Load Balance. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Elastic Load Balance. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2018-04-30 HUAWEI TECHNOLOGIES CO., LTD. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Web Cloud Solution. User Guide. Issue 01. Date

Web Cloud Solution. User Guide. Issue 01. Date Issue 01 Date 2017-05-30 Contents Contents 1 Overview... 3 1.1 What Is Web (CCE+RDS)?... 3 1.2 Why You Should Choose Web (CCE+RDS)... 3 1.3 Concept and Principle... 4... 5 2.1 Required Services... 5 2.2

More information

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM)

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...

More information

Actual4Test. Actual4test - actual test exam dumps-pass for IT exams

Actual4Test.   Actual4test - actual test exam dumps-pass for IT exams Actual4Test http://www.actual4test.com Actual4test - actual test exam dumps-pass for IT exams Exam : 1z1-349 Title : Oracle Eloqua Marketing Cloud Service 2017 Implementation Essentials Vendor : Oracle

More information

Episerver CMS. Editor User Guide

Episerver CMS. Editor User Guide Episerver CMS Editor User Guide Episerver CMS Editor User Guide 18-2 Release date 2018-03-19 Table of Contents 3 Table of contents Table of contents 3 Introduction 8 Features, licenses and releases 8 Copyright

More information

Contents About This Guide... 5 About Notifications... 5 Managing User Accounts... 6 Managing Companies Managing Password Policies...

Contents About This Guide... 5 About Notifications... 5 Managing User Accounts... 6 Managing Companies Managing Password Policies... Cloud Services Identity Management Administration Guide Version 17 July 2017 Contents About This Guide... 5 About Notifications... 5 Managing User Accounts... 6 About the User Administration Table...

More information

Five9 Plus Adapter for Agent Desktop Toolkit

Five9 Plus Adapter for Agent Desktop Toolkit Cloud Contact Center Software Five9 Plus Adapter for Agent Desktop Toolkit Administrator s Guide September 2017 The Five9 Plus Adapter for Agent Desktop Toolkit integrates the Five9 Cloud Contact Center

More information

Identity and Access Management. User Guide. Issue 09 Date

Identity and Access Management. User Guide. Issue 09 Date Issue 09 Date 2017-08-16 Contents Contents 1 What Is IAM?...1 2 How Do I Manage User Groups and Grant Permissions to Them?... 2 3 Permission Description... 4 4 How Do I Manage Users?... 11 5 How Do I Create

More information

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server... Oracle Access Manager Configuration Guide for On-Premises Version 17 October 2017 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing

More information

USER MANUAL. SalesPort Salesforce Customer Portal for WordPress (Lightning Mode) TABLE OF CONTENTS. Version: 3.1.0

USER MANUAL. SalesPort Salesforce Customer Portal for WordPress (Lightning Mode) TABLE OF CONTENTS. Version: 3.1.0 USER MANUAL TABLE OF CONTENTS Introduction...1 Benefits of Customer Portal...1 Prerequisites...1 Installation...2 Salesforce App Installation... 2 Salesforce Lightning... 2 WordPress Manual Plug-in installation...

More information

Laserfiche Rio 10.3: Deployment Guide. White Paper

Laserfiche Rio 10.3: Deployment Guide. White Paper Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6

More information

Episerver CMS. Editor User Guide

Episerver CMS. Editor User Guide Episerver CMS Editor User Guide Episerver CMS Editor User Guide 17-2 Release date 2017-03-13 Table of Contents 3 Table of contents Table of contents 3 Introduction 11 Features, licenses and releases 11

More information

CA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5

CA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5 CA SiteMinder Federation Manager Guide: Legacy Federation r12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

TeamViewer 12 Manual Management Console. Rev

TeamViewer 12 Manual Management Console. Rev TeamViewer 12 Manual Management Console Rev 12.1-201704 TeamViewer GmbH Jahnstraße 30 D-73037 Göppingen www.teamviewer.com Table of content 1 About the TeamViewer Management Console 4 1.1 About the Management

More information

Xerox App Gallery App Gallery User Guide. Version 5.0 September P06709

Xerox App Gallery App Gallery User Guide. Version 5.0 September P06709 Xerox App Gallery App Gallery User Guide Version 5.0 September 2018 702P06709 2018 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, ConnectKey, VersaLink, AltaLink, Xerox Extensible Interface

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on

More information

MB Exam Code: MB Exam Name: Microsoft Dynamics CRM 2016 Customer Service

MB Exam Code: MB Exam Name: Microsoft Dynamics CRM 2016 Customer Service MB2-714 Number: MB2-714 Passing Score: 800 Time Limit: 120 min File Version: 1.0 Exam Code: MB2-714 Exam Name: Microsoft Dynamics CRM 2016 Customer Service Exam A QUESTION 1 You install Microsoft Dynamics

More information

SafeNet Authentication Manager

SafeNet Authentication Manager SafeNet Authentication Manager Version 8.0 Rev A User s Guide Copyright 2010 SafeNet, Inc. All rights reserved. All attempts have been made to make the information in this document complete and accurate.

More information

A Guide to Understand, Install and Use Pie Register WordPress Registration Plugin

A Guide to Understand, Install and Use Pie Register WordPress Registration Plugin A Guide to Understand, Install and Use Pie Register WordPress Registration Plugin 1 P a g e Contents 1. Introduction... 5 2. Who is it for?... 6 3. Community v/s PRO Version... 7 3.1. Which version is

More information

SIMSme Management Cockpit Documentation

SIMSme Management Cockpit Documentation Introduction SIMSme Management Cockpit Documentation Version 2.1 February 2018 Table of Contents 1 INTRODUCTION... 2 2 USERS... 3 3 LICENSES... 5 4 GROUPS... 7 5 CHANNELS... 8 6 DASHBOARD...10 7 APP SETTINGS...12

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes Workspace ONE UEM v9.6 Have documentation feedback? Submit

More information

Secure single sign-on for cloud applications

Secure single sign-on for cloud applications Secure single sign-on for cloud applications Secure single sign-on for cloud applications Traditional on-premises tools used to rule the IT environments of most organizations, but now cloud applications

More information

Liferay Security Features Overview. How Liferay Approaches Security

Liferay Security Features Overview. How Liferay Approaches Security Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................

More information

Build Mobile Cloud Apps Effectively Using Oracle Mobile Cloud Services (MCS)

Build Mobile Cloud Apps Effectively Using Oracle Mobile Cloud Services (MCS) Build Mobile Cloud Apps Effectively Using Oracle Mobile Cloud Services (MCS) Presented by: John Jay King Download this paper from: 1 Session Objectives Understand the need for something like Oracle Mobile

More information

Blueprinting Questionnaire Sample

Blueprinting Questionnaire Sample Manish Chaitanya Blueprinting Questionnaire Sample from The Complete Guide to SAP NetWeaver Portal Bonn Boston ch11_a_online_6124.indd 1 1/12/12 2:58:16 PM A Blueprinting Questionnaire Sample In Chapter

More information

Pass4sure CASECURID01.70 Questions

Pass4sure CASECURID01.70 Questions Pass4sure.050-80-CASECURID01.70 Questions Number: 050-80-CASECURID01 Passing Score: 800 Time Limit: 120 min File Version: 4.8 http://www.gratisexam.com/ 050-80-CASECURID01 RSA SecurID Certified Administrator

More information

SSO Integration Overview

SSO Integration Overview SSO Integration Overview 2006-2014 Ping Identity Corporation. All rights reserved. PingFederate SSO Integration Overview Version 7.2 June, 2014 Ping Identity Corporation 1001 17th Street, Suite 100 Denver,

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

User Management in Resource Manager

User Management in Resource Manager CHAPTER 8 This section describes how to manage user profiles. Topics in this section include: Overview of User Management, page 8-1 Using User Management, page 8-1 Overview of User Management In Resource

More information

Version 5.0 September P Xerox App Gallery. App Gallery User Guide

Version 5.0 September P Xerox App Gallery. App Gallery User Guide Version 5.0 September 2018 702P06709 Xerox App Gallery App Gallery User Guide 2018 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, ConnectKey, VersaLink, AltaLink, Xerox Extensible Interface

More information

Feature Guide. Sybase mbanking

Feature Guide. Sybase mbanking Feature Guide Sybase mbanking 365 2.1 DOCUMENT ID: DC00785-01-0210-01 LAST REVISED: March 2009 Copyright 2009 by Sybase, Inc. All rights reserved. This publication pertains to Sybase software and to any

More information

Application management in Nokia: Getting the most from Company Apps

Application management in Nokia: Getting the most from Company Apps Application management in Nokia: Getting the most from Case Study 2 Contents 1 Challenge...3 2...5 2.1 Deployment options...5 2.2 App security and authentication...7 2.3 Nokia...7 3 Company Hub...9 3.1

More information

Quantum Policy Suite Subscriber Services Portal 2.9 Interface Guide for Managers

Quantum Policy Suite Subscriber Services Portal 2.9 Interface Guide for Managers Quantum Policy Suite Subscriber Services Portal 2.9 Interface Guide for Managers Version 5.5 August 31, 2013 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone

More information

SAP Asset Manager Configuration Guide for Android

SAP Asset Manager Configuration Guide for Android PUBLIC SAP Asset Manager Document Version: 1.0 2018-12-03 SAP Asset Manager Configuration Guide for Android 2018 SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN Content 1 Document

More information

The following device commands are used most frequently: Lock/Unlock device O - O O. Reset screen password O - O - Factory reset + Initialize SD Card

The following device commands are used most frequently: Lock/Unlock device O - O O. Reset screen password O - O - Factory reset + Initialize SD Card 10 Device management Administrators can install apps on an activated device using device commands and check the profiles settings. Moreover, they can update, delete, or re-install apps installed on users'

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits

SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW. Decentralized platform for coordination and administration of healthcare and benefits SOLUTION ARCHITECTURE AND TECHNICAL OVERVIEW Decentralized platform for coordination and administration of healthcare and benefits ENABLING TECHNOLOGIES Blockchain Distributed ledgers Smart Contracts Relationship

More information

Customize Your Application

Customize Your Application Customize Your Application Pega Customer Service 7.4 April 2018 Core features for initial implementation (approximately 8-10 weeks) Stated durations are estimates, and assume that installation tasks are

More information

October J. Polycom Cloud Services Portal

October J. Polycom Cloud Services Portal October 2018 3725-42461-001J Polycom Cloud Services Portal Copyright 2018, Polycom, Inc. All rights reserved. No part of this document may be reproduced, translated into another language or format, or

More information

AvePoint Governance Automation 2. Release Notes

AvePoint Governance Automation 2. Release Notes AvePoint Governance Automation 2 Release Notes Service Pack 2, Cumulative Update 1 Release Date: June 2018 New Features and Improvements In the Create Office 365 Group/Team service > Governance Automation

More information

with Access Manager 51.1 What is Supported in This Release?

with Access Manager 51.1 What is Supported in This Release? 51 51 Integrating Microsoft SharePoint Server with Access Manager This chapter explains how to integrate Access Manager with a 10g WebGate and Microsoft SharePoint Server. It covers the following topics:

More information

Unified CCX Administration Web Interface

Unified CCX Administration Web Interface The Unified CCX provides a multimedia (voice, data, and web) IP-enabled customer-care application environment, using VoIP technology that allows your Cisco Unified Communications network to share resources

More information

Core Solutions of Microsoft SharePoint Server 2013

Core Solutions of Microsoft SharePoint Server 2013 Core Solutions of Microsoft SharePoint Server 2013 Number: 70331 Passing Score: 800 Time Limit: 120 min File Version: 1.0 ht t p:/ / w w w.gratisexam.com/ 123 Q&As 5 cases Studies 69 mixed Questions Not

More information

My Account. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

My Account. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2018-09-28 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Oracle HCM Cloud Common Release 12. What s New

Oracle HCM Cloud Common Release 12. What s New Oracle HCM Cloud Common Release 12 What s New TABLE OF CONTENTS REVISION HISTORY... 4 OVERVIEW... 7 RELEASE FEATURE SUMMARY... 8 HCM COMMON FEATURES... 11 APPLICATIONS SECURITY... 11 User Account Management...

More information

Colligo Console. Administrator Guide

Colligo Console. Administrator Guide Colligo Console Administrator Guide Contents About this guide... 6 Audience... 6 Requirements... 6 Colligo Technical Support... 6 Introduction... 7 Colligo Console Overview... 8 Colligo Console Home Page...

More information

Episerver CMS. Editor User Guide

Episerver CMS. Editor User Guide Episerver CMS Editor User Guide Episerver CMS Editor User Guide 18-3 Table of Contents 3 Table of contents Introduction 15 Features, licenses and releases 16 Copyright notice 16 About Episerver 17 The

More information

VMware Workspace ONE UEM Integration with Apple School Manager

VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM Integration with Apple School Manager VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation

More information

Citrix Exam 1Y0-301 Deploying Citrix XenDesktop 7.6 Solutions Version: 8.0 [ Total Questions: 112 ]

Citrix Exam 1Y0-301 Deploying Citrix XenDesktop 7.6 Solutions Version: 8.0 [ Total Questions: 112 ] s@lm@n Citrix Exam 1Y0-301 Deploying Citrix XenDesktop 7.6 Solutions Version: 8.0 [ Total Questions: 112 ] Citrix 1Y0-301 : Practice Test Topic break down Topic No. of Questions Topic 1: Pre-installation

More information

Microsoft Unified Access Gateway 2010

Microsoft Unified Access Gateway 2010 RSA SecurID Ready Implementation Guide Partner Information Last Modified: March 26, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description Microsoft www.microsoft.com

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

VMware AirWatch Tizen Guide

VMware AirWatch Tizen Guide VMware AirWatch Tizen Guide AirWatch v8.4 and higher Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product is protected

More information

DreamFactory Security Guide

DreamFactory Security Guide DreamFactory Security Guide This white paper is designed to provide security information about DreamFactory. The sections below discuss the inherently secure characteristics of the platform and the explicit

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes AirWatch v9.3 Have documentation feedback? Submit a Documentation

More information

Exostar Identity Access Platform (SAM) User Guide September 2018

Exostar Identity Access Platform (SAM) User Guide September 2018 Exostar Identity Access Platform (SAM) User Guide September 2018 Copyright 2018 Exostar, LLC All rights reserved. 1 INTRODUCTION... 4 SUMMARY... 4 Exostar IAM Platform (SAM) Organization and User Types...

More information

Setting Up the Server

Setting Up the Server Managing Licenses, page 1 Cross-launch from Prime Collaboration Provisioning, page 5 Integrating Prime Collaboration Servers, page 6 Single Sign-On for Prime Collaboration, page 7 Changing the SSL Port,

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3.1 April 07, Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3.1 April 07, Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3.1 April 07, 2017 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

Elastic Load Balancing. User Guide. Date

Elastic Load Balancing. User Guide. Date Date 2018-07-20 Contents Contents 1 Product Description... 4 1.1 What Is Elastic Load Balancing (ELB)?... 4 1.2 Load Balancer Type... 4 1.3 Basic Architecture... 5 1.3.1 Classic Load Balancer... 5 1.3.2

More information

Bechtel Partner Access User Guide

Bechtel Partner Access User Guide Bechtel Partner Access User Guide IMPORTANT: For help with this process, please contact the IS&T Service Center or your local IS&T support group: IS&T Service Center Phone: +1-571-392-6767 US Only +1 (800)

More information

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29 Oracle Access Manager Configuration Guide 16 R1 March 2016 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 8 Installing Oracle HTTP Server...

More information

Oracle Identity and Access Management

Oracle Identity and Access Management Oracle Identity and Access Management AGENDA Overview Features Components Customizations APIs Oracle Identity Manager Connectors High Availability Concepts High Availability Architecture OVERVIEW Identity

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Using the vrealize Orchestrator Operations Client. vrealize Orchestrator 7.5

Using the vrealize Orchestrator Operations Client. vrealize Orchestrator 7.5 Using the vrealize Orchestrator Operations Client vrealize Orchestrator 7.5 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

SAP Anywhere Security Guide

SAP Anywhere Security Guide SAP Anywhere Security Guide 1. Document history Version Date Change 1.0 2017-06-21 Initial version for SAP Anywhere 1707 2.0 2018-03-08 Added Personal Data Protection Information for SAP Anywhere 1803

More information

Unified Communications Manager Version 10.5 SAML SSO Configuration Example

Unified Communications Manager Version 10.5 SAML SSO Configuration Example Unified Communications Manager Version 10.5 SAML SSO Configuration Example Contents Introduction Prerequisites Requirements Network Time Protocol (NTP) Setup Domain Name Server (DNS) Setup Components Used

More information

Exostar Identity Access Platform (SAM) User Guide July 2018

Exostar Identity Access Platform (SAM) User Guide July 2018 Exostar Identity Access Platform (SAM) User Guide July 2018 Copyright 2018 Exostar, LLC All rights reserved. 1 Version Impacts Date Owner Identity and Access Management Email Verification (Email OTP) July

More information

Quick Connection Guide

Quick Connection Guide WebEx Connector Version 1.0.1 Quick Connection Guide 2014 Ping Identity Corporation. All rights reserved. PingFederate WebEx Connector Quick Connection Guide Version 1.0.1 March, 2014 Ping Identity Corporation

More information

Configuring Service Monitor

Configuring Service Monitor CHAPTER 3 The following topics are included: Configuring Trap Receivers, page 3-2 Understanding and Setting Data Source Credentials, page 3-2 Managing the Phone Count, page 3-15 Configuring Settings for

More information

1z0-479 oracle. Number: 1z0-479 Passing Score: 800 Time Limit: 120 min.

1z0-479 oracle. Number: 1z0-479 Passing Score: 800 Time Limit: 120 min. 1z0-479 oracle Number: 1z0-479 Passing Score: 800 Time Limit: 120 min Exam A QUESTION 1 What is the role of a user data store in Oracle Identity Federation (OIF) 11g when it is configured as an Identity

More information

BMS Managing Users in Modelpedia V1.1

BMS Managing Users in Modelpedia V1.1 BMS 3.2.0 Managing Users in Modelpedia V1.1 Version Control Version Number Purpose/Change Author Date 1.0 Initial published version Gillian Dass 26/10/2017 1.1 Changes to User roles Gillian Dass 14/11/2017

More information

Release Notes Release (December 4, 2017)... 4 Release (November 27, 2017)... 5 Release

Release Notes Release (December 4, 2017)... 4 Release (November 27, 2017)... 5 Release Release Notes Release 2.1.4. 201712031143 (December 4, 2017)... 4 Release 2.1.4. 201711260843 (November 27, 2017)... 5 Release 2.1.4. 201711190811 (November 20, 2017)... 6 Release 2.1.4. 201711121228 (November

More information

Vodafone Mobile Wi-Fi Monitor. Android Troubleshoot Guide

Vodafone Mobile Wi-Fi Monitor. Android Troubleshoot Guide Vodafone Mobile Wi-Fi Monitor Android Troubleshoot Guide Introduction The Mobile Wi-Fi Monitor app allows the user to monitor the status of his mobile Wi-Fi router. To achieve this, the app must pull the

More information

Connect and Transform Your Digital Business with IBM

Connect and Transform Your Digital Business with IBM Connect and Transform Your Digital Business with IBM 1 MANAGEMENT ANALYTICS SECURITY MobileFirst Foundation will help deliver your mobile apps faster IDE & Tools Mobile App Builder Development Framework

More information

Coveo Platform 6.5. Microsoft SharePoint Connector Guide

Coveo Platform 6.5. Microsoft SharePoint Connector Guide Coveo Platform 6.5 Microsoft SharePoint Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing

More information

Oracle Access Manager Configuration Guide

Oracle Access Manager Configuration Guide Oracle Access Manager Configuration Guide 16 R2 September 2016 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

More information

Episerver CMS. Editor User Guide

Episerver CMS. Editor User Guide Episerver CMS Editor User Guide Episerver CMS Editor User Guide 17-6 Release date 2017-12-04 Table of Contents 3 Table of contents Table of contents 3 Introduction 11 Features, licenses and releases 11

More information

BusinessObjects LifeCycle Manager User's Guide

BusinessObjects LifeCycle Manager User's Guide BusinessObjects LifeCycle Manager User's Guide BusinessObjects Enterprise XI 3.1 Service Pack2 windows Copyright 2009 SAP BusinessObjects. All rights reserved. SAP BusinessObjects and its logos, BusinessObjects,

More information

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow)

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow) Integration Guide PingFederate SAML Integration Guide (SP-Initiated Workflow) Copyright Information 2018. SecureAuth is a registered trademark of SecureAuth Corporation. SecureAuth s IdP software, appliances,

More information

ADDITIONAL GUIDES Customer SAP Enable Now System Requirements Customer

ADDITIONAL GUIDES Customer SAP Enable Now System Requirements Customer 2019 SAP SE or an SAP affiliate company. All rights reserved. ADDITIONAL GUIDES Customer 1902 2019-02-01 Customer Table of Contents 1 Introduction... 3 1.1 What is the Cloud Edition?... 4 1.2 Cloud Edition

More information

The IBM MobileFirst Platform

The IBM MobileFirst Platform The IBM MobileFirst Platform Curtis Miles IBM MobileFirst Solution Architect April 14, 2015 What is the IBM MobileFirst Platform? A modular set " of libraries, tools, and runtimes " that help you " easily

More information

pinremote Manual Version 4.0

pinremote Manual Version 4.0 pinremote Manual Version 4.0 Page 1 Table of content 1 Introduction... 4 2 Setup... 5 2.1 Requirements server... 5 2.2 Requirements client... 5 2.3 Setup process... 6 2.3.1 Single Server... 8 2.3.2 Cluster...

More information

VI. Corente Services Client

VI. Corente Services Client VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...

More information

The benefits of synchronizing G Suite and Active Directory passwords

The benefits of synchronizing G Suite and Active Directory passwords The benefits of synchronizing G Suite and Active Directory passwords www.adselfserviceplus.com Enterprises are adopting more and more applications to enhance productivity and improve employees' user experience.

More information

IBM Security Access Manager Version 9.0 October Federation Administration topics IBM

IBM Security Access Manager Version 9.0 October Federation Administration topics IBM IBM Security Access Manager Version 9.0 October 2015 Federation Administration topics IBM IBM Security Access Manager Version 9.0 October 2015 Federation Administration topics IBM ii IBM Security Access

More information

ICE CLEAR EUROPE DMS GLOBAL ID CREATION USER GUIDE VERSION 1.0

ICE CLEAR EUROPE DMS GLOBAL ID CREATION USER GUIDE VERSION 1.0 ICE CLEAR EUROPE DMS GLOBAL ID CREATION USER GUIDE VERSION 1.0 August 2017 Date Version Description August 2017 1.0 Initial Draft 1. Single Sign On... 2 2. To register for SSO on the Global ID webpage...

More information

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation

Enhancing cloud applications by using external authentication services. 2015, 2016 IBM Corporation Enhancing cloud applications by using external authentication services After you complete this section, you should understand: Terminology such as authentication, identity, and ID token The benefits of

More information

Nortel Quality Monitoring Search and Replay Guide

Nortel Quality Monitoring Search and Replay Guide Nortel Quality Monitoring Search and Replay Guide NN44480-106 Product release 7.0 Standard 02.02 November 2009 Nortel Quality Monitoring Search and Replay Guide Publication number: NN44480-106 Product

More information

SecureTransport Version May Web Client User Guide

SecureTransport Version May Web Client User Guide SecureTransport Version 5.3.6 9 May 2018 Web Client User Guide Copyright 2018 Axway All rights reserved. This documentation describes the following Axway software: Axway SecureTransport 5.3.6 No part of

More information

Technical Support. Web site. 24online Support Contact. ( a) Technical support (Corporate Office):

Technical Support. Web site.   24online Support Contact. ( a) Technical support (Corporate Office): Technical Support Please feel free to contact us for any of your query, comments, or requests concerning the software you purchased, your registration status, or similar issues to Customer Care/Service

More information

Receiver for BlackBerry 2.2

Receiver for BlackBerry 2.2 Receiver for BlackBerry 2.2 2015-04-19 05:21:53 UTC 2015 Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement Contents Receiver for BlackBerry 2.2... 3 About This Release...

More information

Product Overview. Benefits CHAPTER

Product Overview. Benefits CHAPTER CHAPTER 1 Revised July 3, 2012 The Cisco TelePresence Exchange System is an integrated video service-creation platform that enables service providers and strategic partners to offer secure cloud-based

More information

Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10

Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10 Cloud Service Administrator's Guide 15 R2 March 2016 Contents Using the Primavera Cloud Service Administrator's Guide... 9 Web Browser Setup Tasks... 10 Configuring Settings for Microsoft Internet Explorer...

More information

OAM 2FA Value-Added Module (VAM) Deployment Guide

OAM 2FA Value-Added Module (VAM) Deployment Guide OAM 2FA Value-Added Module (VAM) Deployment Guide Copyright Information 2018. SecureAuth is a copyright of SecureAuth Corporation. SecureAuth s IdP software, appliances, and other products and solutions,

More information

SAP IoT Application Enablement Best Practices Authorization Guide

SAP IoT Application Enablement Best Practices Authorization Guide SAP IoT Application Enablement Best Practices Authorization Guide TABLE OF CONTENTS 1 INITIAL TENANT SETUP... 3 1.1 Configure Trust... 3 1.1.1 Technical Background... 6 1.2 Establish Trust... 6 1.3 Set

More information

Administration. STILOG IST, all rights reserved

Administration. STILOG IST, all rights reserved 2 Table of Contents I. Admin Center... 1 1. ACCESS... 1 Starting the Admin Center application... 1 2. General Settings... 2 Home page... 3 Client... 4 Application... 5 VPPortal... 6 3. Password Configuration...

More information

BrainCert Enterprise LMS. Learning Management System (LMS) documentation Administrator Guide Version 3.0

BrainCert Enterprise LMS. Learning Management System (LMS) documentation Administrator Guide Version 3.0 BrainCert Enterprise LMS Learning Management System (LMS) documentation Administrator Guide Version 3.0 1 P a g e Table of Contents... 3... 3... 4... 4... 5... 5... 6... 6... 8... 8... 9... 9... 10...

More information