Red Hat Technical Series Systems Management in the Enterprise with Red Hat Network version 1.0

Size: px
Start display at page:

Download "Red Hat Technical Series Systems Management in the Enterprise with Red Hat Network version 1.0"

Transcription

1 Red Hat Technical Series Systems Management in the Enterprise with Red Hat Network version 1.0 Copyright 2002 by Red Hat, Inc. Tammy Fox and Greg DeKoenigsberg Red Hat Network is the environment for system-level support and management of Red Hat Linux networks. Red Hat Network brings together the tools, services, and information administrators need to maximize the reliability, security, and performance of their systems. Red Hat Network can decrease the time and effort required for systems management.

2

3 Table of Contents 1. Red Hat Network Overview RHN Service Offerings Enabling Technologies Security and Privacy Simplifying System Administration Summary Glossary... 16

4

5 1. Red Hat Network Overview Red Hat Network (RHN) is the environment for system-level support and management of Red Hat Linux networks. Red Hat Network brings together the tools, services, and information that help administrators to maximize the reliability, security, and performance of their systems. To use RHN, system administrators must register their client systems with Red Hat Network. When the client systems request package updates, only the applicable packages for that specific client are returned, based on the System Profile stored on the RHN Servers. RPM Updates can be automatically applied or scheduled for multiple systems at the same time. Red Hat Network has the following characteristics: Scalability You can set up and manage a network of dozens of Red Hat Linux systems with ease. With Red Hat Network and Red Hat Linux, a single system administrator can set up and maintain hundreds or thousands of Red Hat Linux systems more easily, accurately, and quickly than that same administrator could maintain a single system without Red Hat Network. Security All communication between registered systems and Red Hat Network are over secure Internet connections. Refer to Section 4 for more information. Standard Protocols Red Hat Network client connections are established using XML/RPC over secure HTTP. These standard protocols maintain security and increase capability. Client Software All software required to register a client system comes with Red Hat Linux 7 and higher and can be installed for use with Red Hat Linux 6.2. To create an account go to and click on Create Account. Then, use the Red Hat Network Registration Client to register each system and create System Profiles. Use the Red Hat Update Agent to retrieve and (optionally) install RPM Updates. The Web interface provides more features than the standalone client, only requires a Web browser, and does not have to be run on the client system. System Profile The Red Hat Network registration process creates a System Profile, which is stored on the RHN Profile Server. A System Profile consists of a list of software and hardware for the registered system. It is used to customize the notifications that you receive for each system and to determine which default base channel the system is subscribed to. Digital Certificate Upon registration Red Hat Network assigns a unique Digital Certificate to the client system. The Digital Certificate is an XML file that is stored on the client, which contains information about the system including the profile name, architecture, and the Red Hat username of the person who registered the system. The Digital Certificate also contains a unique System ID, which is a string of characters and numbers that identify your system for updates and support Communication Methods There are two methods to communicate with Red Hat Network: Web Interface The Red Hat Network Web interface is accessible through any SSL-enabled Web browser; this tool allows you to manage multiple systems simultaneously. For example, a user can quickly view Errata Alerts for all registered systems, view details from Errata Reports, download RPM packages, and subscribe to different channels. Red Hat Update Agent A user can also view Errata Alerts, download the RPM packages, and (optionally) install the packages using the Red Hat Update Agent, a standalone client application. This client application uses the client system s Digital Certificate to display Errata Alerts customized for the client system.

6 6 Red Hat Technical Series 1.2. RPM Updates Using one of the two methods of communication, system administrators can retrieve the latest software packages based on the Errata Alerts for each client system. If you select automatic RPM Updates, the next time the Red Hat Network Daemon connects to the RHN Servers, the client downloads the packages according to its Red Hat Update Agent preferences and (optionally) installs them. RPM Updates work as follows (refer to Figure 1): Figure 1. Red Hat Network Components Periodically the Red Hat Network Daemon (rhnsd) running on a client forks a script that polls the Network Server using the client s System ID (a series of characters and numbers that identifies a registered system). The Network Server queries the Profile Server to see if there are any actions for the client with the specified System ID. If there are no actions, then the Profile Server passes that information back to the Network Server which in turn passes it back to the client, ending the exchange. The forked script running on the client terminates execution. If there are actions for the client, the Profile Server passes the list of actions, including the names of the required files, back to the Network Server which passes the list back to the script running on the client. What the client does when it receives the list of actions from the Profile Server depends on how the system administrator sets the preferences in the client profile. If the administrator sets the preferences to bring the files back to the client then the client automatically runs the Red Hat Update Agent which requests the files specified by the actions, one at a time, from the Red Hat Network Server. The Red Hat Network Server in turn retrieves the files from the Red Hat File Server. The files are returned back up the chain of servers to the Client. All of this happens without user intervention.

7 Red Hat Technical Series 7 The client system handles the files according to the system administrator s preferences. If the preferences state that files are to be installed automatically, then the Red Hat Update Agent installs the files. Otherwise, it stores the files in /var/spool/up2date. Until the packages are installed, the corresponding errata remain in the errata list displayed for the system by the Red Hat Update Agent and the Web interface. 2. RHN Service Offerings There are two RHN service offerings: Basic and Enterprise. The RHN Basic offering is ideal for users who need to maintain a small number of Red Hat Linux systems. It includes Errata Alerts, automatic notifications, the ability to schedule Errata Updates and package installations, and use of the Red Hat Update Agent. RHN Basic should be used by users with one or two Red Hat Linux systems to maintain. RHN Enterprise should be used by Enterprise customers with numerous systems to maintain. It provides an extended set of features such as system group management, multiple user management, multiple administrators for each organization, enhanced system details, user privileges based on system groups, and the use of the System Set Manager that allows administrators to perform actions on multiple systems at the same time. Some features of Basic include: Priority Access during periods of high load When Red Hat releases a large errata, Priority Access can be guaranteed to Enterprise subscribers so that updated packages can be retrieved immediately. Instant ISOs For customers who have purchased subscriptions to Red Hat Network, ISO images are available for immediate download. Beat the rush to the FTP servers by downloading directly from Red Hat Network. Enterprise includes the following additional features that are indispensable to the administrator of multiple systems: Errata Notification, Multiple Systems Subscriptions for multiple systems means Errata Alerts for all entitled systems in one . Errata Updates, Multiple Systems Get quick updates for multiple systems with an easy button click for each system. Package Profile Comparison Compare the package set on a system with the package sets of similar systems with one click. System Grouping Web servers, database servers, workstations, and other workload-focused systems may be grouped so that each set can be administered in common ways. Multiple Administrators Administrators may be given rights to particular system groups, easing the burden of system management within larger organizations. System Set Manager You can apply actions to sets of systems instead of single systems. Work with members of a predefined system group, or work with an ad-hoc collection of systems. Install a single package to each, subscribe them all to a new channel, or apply all errata to them with a single action. Massive Scalability Determining outdated packages for a thousand systems would take days for a dedicated system administrator. Red Hat Network Enterprise Service can do it for you in seconds. For more information, refer to

8 8 Red Hat Technical Series 2.1. Client Applications The client applications that run on client systems (Red Hat Network clients) are the software tools that make Red Hat Network perform properly. The following sections describe the Red Hat Network client-side applications Red Hat Network Registration Client The Red Hat Network Registration Client (rhn_register) collects hardware and software information from the system being registered, creates a System Profile, registers the System Profile with Red Hat Network which stores it on the Profile Server, and obtains a Digital Certificate that is stored on the client system to identify itself to the Red Hat Network Servers. The Red Hat Network Registration Client allows you to specify notification and exclude packages that you do not want Red Hat Network to update Red Hat Update Agent The Red Hat Update Agent (up2date) is a client application that retrieves (and optionally installs) the latest Red Hat packages from the Red Hat Network Public File Server based on your preferences. It is part of the Enterprise service offering. Before you run the Red Hat Update Agent, run the Red Hat Update Agent Configuration Tool (up2date-config) to configure your retrieval/installation and package-exception preferences including: Enable HTTP Proxy Specify a proxy server. Automatic package installation Automatically installs packages on the client; otherwise they are just downloaded so that you can install them manually. Package exclusion Excludes software packages from the list of packages that will be updated. File exclusion Excludes files from the list of packages that will be updated. Source RPM retrieval Downloads source files along with the binaries. Binary package preservation Keeps binary files on the system after installation. Without this option binary RPM files are deleted once installed to save disk space. Download directory Specifies a directory other than /var/spool/up2date to store downloaded files. Configuration file replacement Causes the Red Hat Update Agent to prompt you before it downloads a package in which the local configuration file has been changed Red Hat Network Daemon The Red Hat Network Daemon (rhnsd) runs on client systems and periodically starts a script that contacts Red Hat Network to see if there are any actions pending for the client. It is also a component of the Enterprise service offering. The rules defined by the Red Hat Update Agent Configuration Tool for the Red Hat Update Agent also apply to the script that the Red Hat Network Daemon runs. The rhnsd polling interval is two hours by default. To prevent the Red Hat Network servers from being overloaded, rhnsd will not accept an interval of less than one hour.

9 Red Hat Technical Series 9 3. Enabling Technologies 3.1. Internet Connectivity The Internet is fundamental to Red Hat Network. It enables easy-to-establish, secure, two-way communication between the Red Hat Network servers and each of the clients RPM RPM is integral to Red Hat Network. RPM Update manages system, application, and kernel software packages. While it installs and upgrades packages, it checks for dependencies both for the package it is installing (making sure the correct libraries are installed) as well as for any other packages dependent on any files it is updating. It can also tell you which version of a package is installed (or if it is not installed). RPM stores a list of installed RPM packages in the /var/lib/rpm/packages.rpm file. All of the binary and source packages that Red Hat Network supplies are produced by Red Hat in RPM format. Red Hat Network cannot maintain packages that are not produced by Red Hat and packages that are not in RPM format. The client s RPM database is used to create the System Profile which lists the files that Red Hat Network maintains (subject to administrative override) Standard Communication Protocols Red Hat Network uses industry standard communication protocols that work effectively over a WAN (wide area network) such as the Internet. These protocols include: HTTPS All connections to Red Hat Network servers are made using the secure version of HyperText Transport Protocol (HTTPS). This protocol enables secure two-way communication between RHN Enterprise and a Web browser XML-RPC XML-RPC (extensible Markup Language-Remote Procedure Calls) enables software running on different operating systems and in different environments to use the Internet for making remote procedure calls (instructions from a computer that execute commands on another computer). XML-RPC implements remote procedure calls using an HTTPS transport and XML encoding. It is a simple, extensible, lightweight RPC method that is easy to implement and use, yet robust enough to transmit, process, and return complex data structures. Red Hat Network uses XML-RPC for communication between the Red Hat Network Server and a client running Red Hat Network Registration Client, Red Hat Update Agent, and the Red Hat Network Daemon SSL All connections between a client and Red Hat Network (over the Internet) are encrypted using SSL, and all SSL encrypted information is signed with Red Hat s cryptography key. Clients verify the signature with Red Hat s public key which is installed on all clients.

10 10 Red Hat Technical Series 4. Security and Privacy With the advent of new technology such as Red Hat Network where systems outside of your network hold valuable system data and communicate with your systems on a regular basis there is an obvious concern for the security and privacy of your data. Red Hat understands these concerns and addresses them as described in the following sections Red Hat Network Security and Integrity Using the Red Hat Network will not compromise client system security. From the data that Red Hat Network loads onto a client system to maintaining the impenetrability of client systems, Red Hat Network does not lessen (nor does it make it easier to lessen) the integrity of client data. All communication with Red Hat Network is initiated by the client. There is no process, daemon, or port that waits for communication from Red Hat Network. A client will not respond to communication that is initiated by an impostor claiming to be Red Hat Network because it is not listening for this type of communication and because it may violate firewall policy. The sole purpose of the RHN client daemon is to initiate periodic communication with Red Hat Network. When a client initiates contact with Red Hat Network, the client expects and accepts a response and takes security measures to make sure that the response is valid. Red Hat Network uses the following mechanisms to protect client/customer information from malicious users (security) and from lost data (integrity): User name and password required You can only log into the Web interface with the correct user name and password. Transaction authentication During registration, a unique Digital Certificate is generated and stored on the client system. Red Hat Network uses the System ID in the Digital Certificate to authenticate each transaction between itself and the client system. Secure private internal networks All data that is transferred between Red Hat internal systems flows across secure, private, nonadvertised, networks that are not accessible to the public. Operating system security All Red Hat Network servers run Red Hat Linux. SSL encryption All transactions across the Internet use a 128-bit Secure Sockets Layer (SSL) protocol that provides encrypted communications. Electronic signature All software packages come directly from Red Hat quality control and are digitally signed with Red Hat s cryptographic key, using GNU Privacy Guard, to ensure authenticity. Users control As the user, you choose which tasks you want Red Hat Network to perform and which you want to handle yourself. Red Hat Network can download, install, and upgrade Red Hat Network software packages as they are released. If you prefer, Red Hat Network can simply notify you when a new package is available and (optionally) download the package.

11 Red Hat Technical Series 11 Minimal Required User Information When you register a system, you provide Red Hat Network with as much or as little information as you choose to provide. Red Hat Network requires only a user name, password, and a valid address Red Hat Network Privacy The Red Hat promise of privacy is straightforward: The users personal information is theirs; it does not belong to Red Hat. Users tell Red Hat how it may or may not use their information and Red Hat will respect their wishes. When users register products or services on the Red Hat website, they will be asked if they would like to be contacted by Red Hat and, if they would, how. If users do not want to be contacted, Red Hat will not contact them. When users participate in surveys, contests, promotions, or other features that appear on redhat.com, Red Hat will let them know how their information may be used. Questions or concerns may be ed to <feedback@redhat.com>. Red Hat never sells its customers personal information or provides it to others without making it clear that there is intent to do so. If users receive any sort of communication from Red Hat that they find intrusive, whether via phone, , or regular mail, they can let Red Hat know so that Red Hat can prevent that type of communication from happening again. Go to for more details about Red Hat s security and privacy practices. 5. Simplifying System Administration The introduction of RHN Enterprise Service simplifies the system administration tasks of an organization in several ways. The ability to apply updates to multiple systems, to assign management duties to multiple users, to group and administer systems according to location or function, and to schedule updates during defined maintenance periods all make Enterprise indispensable to the busy Red Hat Linux system administrator Updating Multiple Systems For example, if Red Hat issues an Errata that fixes a security hole, all users with administration privileges to the affected systems will receive an RHN Errata Alert with the summary and description of the Errata. This notification will also contain a list of all systems to which that user has administrative privileges. Using the RHN Web interface, you can apply an errata to every system within a system group with just a few clicks: 1. Log in to 2. Click Systems => System Group list on the left navigation bar. 3. Click the Work With Group link for the system group. 4. Click the Errata tab. 5. Select the appropriate Errata from the list.

12 12 Red Hat Technical Series 6. Click the Apply Selected Errata button. 7. Select when to apply the Errata Update. 8. Click the Schedule Errata Updates button. The Errata Update will be applied to the applicable systems within the system group at the selected time. Compare the RHN Errata Update process to the manual process for keeping Red Hat Linux systems updated in the absence of Red Hat Network: 1. Go to periodically and watch the list of Errata Alert for Errata Updates applicable to any systems within the organization. 2. Download the appropriate packages for each Errata you want to apply. 3. Determine whether the Errata Alert is applicable to the system. 4. Log in as root on an affected system. 5. Upgrade the packages from the Errata Alert. 6. Resolve the software dependencies, if any. Depending upon the severity of the alert, many additional packages could be affected, each of which would have to be downloaded and applied. 7. Repeat the previous steps for each affected system in your organization. This manual process might seem comparable for one Red Hat Linux system, but it would take a considerable amount of time to apply just one Errata Update to dozens of systems Multiple System Administrators As an organization deploys more Red Hat Linux systems, maintaining proper security practices becomes more difficult. If a system administrator is expected to perform any useful action on a particular system, he must have the root password for that system. Red Hat Network gives system administrators the power to keep systems properly updated without having to keep track of a long laundry list of root passwords. With RHN, the Organization Administrator grants RHN-registered system administers permission to administer specific entitled systems. Authentication to administer the system through RHN is granted based on the RHN user s user name and password combination, the unique Digital Certificate installed on the entitled system, and the membership of the system in a predefined system group to which the RHN user must be given administrative access. RHN also stores the history of completed and pending actions for each system so that administrators can keep track of when an Errata Update was applied. The actions can be viewed for the entire organization or for each system. This feature is extremely helpful if the organization has multiple administrators per system. Administrators do not have to waste valuable time determining which Errata Updates were applied to each system.

13 Red Hat Technical Series 13 Figure 2. RHN Scheduled Actions Any user that has permission to administer the system can add a note. The notes can be used to give other administrators information about the system, to manually record the system s planned or unplanned outage, to list future plans for the system, or to store any information that can be written in text format. Figure 3. RHN Notes 5.3. Updating Systems by Group One of the most important features of Enterprise is its grouping functionality. Common sense dictates that similar systems should be administered in similar ways. Enterprise allows you to group systems by characteristics that you define. Once these groups have been defined, applying actions to the whole group is a simple task. Some of the more common means of grouping systems are presented in the following examples.

14 14 Red Hat Technical Series Figure 4. RHN System Groups Grouping by Physical Location Scenario: Systems in the New York office are different from systems in the San Jose collocation facility. Solution: Create a New York group and a San Jose group, and assign a particular administrator to each. When new systems are profiled, the Organization Administrator places them in the appropriate group, and management responsibility is automatically assigned to the proper system administrators Grouping by Function Scenario: Different system administrators maintain different functional groups, such as all mail servers or all Web servers. The sendmail expert keeps your mail servers updated, and the Apache expert keeps your Web farm updated. Solution: Create a Web Server group and a Mail Server group so that you can assign different privileges to different system administrators. When the latest version of Apache is released, the Apache expert applies the Apache Errata Update without affecting any of the mail servers. When the latest version of sendmail is released, the sendmail expert applies the Sendmail Errata Update without affecting any of the Web servers Grouping by OS Version Scenario: Production servers are running Red Hat Linux version 6.2, while all desktop systems are running Red Hat Linux version 7.2. All Errata Updates do not apply to all versions of Red Hat Linux. Solution: Group systems by OS version to make it easy to apply Errata Updates quickly and cleanly. When a system admininstrator receives an Errata Alert that only affects Red Hat Linux 7.2 systems, he can quickly and easily apply the Errata Update the group containing only Red Hat Linux 7.2 systems Grouping by Hardware Scenario: The developer workstations require the development packages and the SMP kernel package because they are multi-processor machines. The laptops require a small installation and the latest PCMCIA kernel. Solution: Create a Developer Machines group and a Laptops group. When an Errata Update is released for a development packages such as python-devel, apply it to the Developer Machines system group. When an Errata Update for the PCMCIA kernel is released, apply it to the Laptops group without affecting the Developer Machines group that does not need the PCM- CIA kernel.

15 Red Hat Technical Series Grouping by Multiple Characteristics Scenario: A laptop is used as a developer machine, and a different laptop belongs to an employee in the Sales department. Solution: Assign both laptops to the Laptops group, and then assign one to the Developer Machines group and the other to the Sales group. A system be a member of as many groups as you deem appropriate Maintenance of Production Systems Altering the running package set on a production system is a delicate operation. Red Hat strongly recommends maintaining a QA environment to mirror any application servers that are mission-critical. Enterprise provides tools to help the careful system administrator complete this task with minimal downtime. The Profile Comparison tool helps administrators keep the QA environments in sync with the production systems. When Errata Alerts are issued, they may safely be applied to the QA system. When the administrator is confident that the Errata Update applied to the QA system had the desired effect, the same Errata Update may then be scheduled for deployment to the production systems during a particular maintenance window. In many cases, a package may be applied to a production system without any downtime at all. Many packages are built to stop the service before the upgrade and then restart the service when the package has been successfully upgraded. Red Hat Network also provides tools to assist in failure recovery. Because RHN stores a list of RPM packages for each registered system, if a system is compromised or has a catastrophic hardware failure, the system administrator can log in to the RHN website and retrieve the full software profile for that system with complete accuracy Updating Private Packages The nature of open source dictates that most organizations come to rely upon applications that are not part of the standard Red Hat Linux distribution. Whether these applications are GPL or are developed by the organization for the organization, at some point they become essential elements of the systems management equation for an organization. For these customers, RHN Proxy Server is a reasonable alternative. Available to customers who manage 50 or more Red Hat Linux systems through Red Hat Network, the RHN Proxy Server provides both a local caching mechanism for Red Hat Network packages and a distribution mechanism for custom-built packages. Packages built and stored on the RHN Proxy Server can be managed in exactly the same way that standard Red Hat Linux packages are managed. For more information on the RHN Proxy Server, please consult the Deploying RHN Proxy in the Enterprise paper available at 6. Summary Proper system management is a difficult task. Deploying, auditing, upgrading, and removing software can be a difficult task even for a handful of systems; for an entire organization it can seem impossible. Customized in-house solutions can mitigate the management task for some customers, but the cost of building, deploying, and maintaining such a system is prohibitive to most. A robust, easily maintained,

16 16 Red Hat Technical Series easily deployed toolset with a centralized interface is essential for the effective management of any broad software deployment. Enterprise for Red Hat Network was built to solve this problem. Red Hat Network is the future of computing, today. In the past, upgrades, bug fixes, and security alerts were something a system administrator had to monitor on a constant basis. Now, they are just a few clicks away with customized, automatic delivery. If you have any questions about Red Hat Network, visit Glossary A Action A task that is scheduled by a system administrator using Red Hat Network to be performed on one or more client systems. For example, an action can be scheduled to update the kernel packages on all the systems within a selected group. Activation Key RHN Enterprise customers can generate activation keys through the RHN website. Each unique key can then be used to register a RHL system, entitle the system to RHN Enterprise, subscribe the system to specific channels, and subscribe the system to RHN system groups through the command line utility rhnreg_ks from the rhn_register package. B Base Channel A base channel is a type of Channel that consists of a list of packages based on a specific architecture and Red Hat Linux release. For example, all the packages in Red Hat Linux 7.3 for the x86 architecture make a base channel. Basic One of the RHN service level offerings. Basic was formerly called Software Manager. Basic offers the same services as the Software Manager subscription did, plus more new features. Bug Fix Alert An Errata Alert that pertains to a bug fix. Bugzilla Bugzilla is an online application ( that allows users to communicate directly with the developers. From Bugzilla, users can submit bug reports and feature requests for Red Hat Linux and related open source packages.

17 Red Hat Technical Series 17 C Channel A channel is a list of Red Hat Linux packages. Channels are used to choose packages to be installed from client systems. Every client system must be subscribed to one Base Channel and can be subscribed to one or more Child Channel. Child Channel A child channel is a Channel associated with a Base Channel but contains extra packages. Client System See Registered System. D Digital Certificate A client component in XML format that is stored in the /etc/sysconfig/rhn/systemid file on registered systems. Red Hat Network verifies this certificate to authenticate the registered system before each connection. This certificate is issued by Red Hat and passed to the system as part of the registration process. It includes unique information about the registered system to avoid fraudulent use. E Notification Similar to an Errata Alert, except the information is delivered via . If the notifications option is selected, notifications are sent for every Red Hat Network Errata Alert. The includes the type of Errata Alert, summary of the Errata, description of the Errata, and a list of which systems are affected by the report. Enhancement Alert An Errata Alert that pertains to a package enhancement request.

18 18 Red Hat Technical Series Enterprise One of the RHN service level offering. It has more features than the Basic service level, including user management, system groups, and enhanced system details. Entitled Server A server that is subscribed to Software Manager. Because the server is entitled, the Software Manager interface can be used to manage its packages. Errata Information published by Red Hat describing security fixes, bug fixes, and package enhancements for Red Hat Linux. The information includes the topics of the Errata, Bugzilla bug IDs, relevant releases/architectures, solutions including required RPMs, and MD5 checksums for verification. Errata are also available at Each RHN Errata Alert is based on the Red Hat Linux Errata List. Security issues and bug fixes are submitted by Red Hat engineers as well as the Linux community through Bugzilla which generates a bug report for each issue. Red Hat engineering evaluates the reports, resolves the bug, and generates new RPM packages. After the Red Hat quality assurance team tests new packages they are placed on the Red Hat Public File Server and on the Red Hat Network Server and an Errata is generated. Errata Alert RHN Errata Alert that updated packages based on Red Hat Errata are available for one or more systems within an organization. There are three types of Errata Alerts: Security Alerts, Bug Fix Alerts, and Enhancement Alerts. O Organization Administrator Organization Administrator are sets of users that have the highest level of control over an organization s Red Hat Network account. Members of this group can add users, systems, and system groups to the organization as well as remove them. An Organization Administrator can also give users administrative privileges to system groups. An RHN organization must have at least one member of the Organization Administrator group. P Package All software in Red Hat Linux is divided into software packages. Software updates are released in the form of RPM packages that can be installed on a Red Hat Linux system.

19 Red Hat Technical Series 19 R Registered System A system that is registered with Red Hat Network. Also known as a client system. Red Hat Network Daemon The RHN client daemon (rhnsd) that periodically polls Red Hat Network for updates and notifications. Red Hat Network Registration Client The RHN client application (rhn_register) that collects information about the client system, creates a System Profile and Digital Certificate, establishes a connection with the Red Hat Network servers, and registers the system with Red Hat Network. Red Hat Update Agent The RHN client application (up2date) that allows users to retrieve and install all updated packages for the client system on which the application is run. Use the Red Hat Update Agent Configuration Tool to configure its preferences, including whether to install the packages after they are downloaded. RPM A software package manager that was developed by Red Hat. It can be used to build, install, query, verify, update, and uninstall software packages. All software updates from RHN are delivered in RPM format. RPM Database Each Red Hat Linux system has an RPM database that stores information about all the RPM packages installed on the system. This information includes the version of the package, which files were installed with the package, a brief description of the package, the installation date, and more. RPM Update Red Hat Network option to deliver the RPM packages based on the Errata Alert list to a client system automatically and without user intervention. If this feature is selected, packages are delivered through the Red Hat Network Daemon running on the client system.

20 20 Red Hat Technical Series S Security Alert An Errata Alert that pertains to system security. Service Level A Red Hat Network subscription service. Different service levels offer different features of RHN. There are two service levels currently available: RHN Basic and RHN Enterprise. Software Manager The name of the first Service Level offering for Red Hat Network. Software Manager is now known as RHN Basic. System Directory The System Directory section of Red Hat Network allows an organization to divide its client systems into system groups. Only members of the Organization Administrator group can add systems to the organization. System ID A unique string of characters and numbers that identifies a registered system. It is stored in the system s Digital Certificate. System Profile Hardware and software information about the client system. It is created during the registration process. The software information is a list of RPM packages and their versions installed on the client system. The System Profile is used to determine every Errata Alert relevant to each client system. System Set Manager Interface that allows users to perform actions on multiple systems. Actions include applying Errata Updates, upgrading packages, and adding/removing systems to/from system groups.

Red Hat Network Satellite 5.5

Red Hat Network Satellite 5.5 Red Hat Network Satellite 5.5 Reference Guide Edition 4 Red Hat Network Satellite Last Updated: 2017-09-26 Red Hat Network Satellite 5.5 Reference Guide Red Hat Network Satellite Edition 4 Landmann rlandmann@redhat.com

More information

Red Hat Network Satellite 5.4

Red Hat Network Satellite 5.4 Red Hat Network Satellite 5.4 Reference Guide Edition 2 Red Hat Network Satellite Last Updated: 2017-09-20 Red Hat Network Satellite 5.4 Reference Guide Red Hat Network Satellite Edition 2 Landmann rlandmann@redhat.com

More information

Laserfiche Rio 10.3: Deployment Guide. White Paper

Laserfiche Rio 10.3: Deployment Guide. White Paper Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6

More information

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 4 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

Ekran System v Program Overview

Ekran System v Program Overview Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation

More information

Certification. RPM, Boot Loaders, and Kickstart

Certification. RPM, Boot Loaders, and Kickstart Certification RPM, Boot Loaders, and Kickstart UNIT 7 RPM, Boot Loaders, and Kickstart 1 UNIT 7: Objectives Upon completion of this unit the student should be able to: Use RPM to install, remove, update,

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

Ekran System v Program Overview

Ekran System v Program Overview Ekran System v. 5.1 Program Overview Contents About the Program Ekran Server & Management Tool Database Management Licensing Client Installation Monitoring Parameters Client Protection Advanced User Authentication

More information

Installing Sentry-go Quick Monitors, Sentry-go Plus!, Client Tools & Enterprise Reporting

Installing Sentry-go Quick Monitors, Sentry-go Plus!, Client Tools & Enterprise Reporting Installing Sentry-go Quick Monitors, Sentry-go Plus!, Client Tools & Enterprise Reporting 3Ds (UK) Limited, November, 2013 http://www.sentry-go.com Be Proactive, Not Reactive! This guide gives full details

More information

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide

BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry

More information

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure a Presence Gateway for Microsoft Exchange Integration, page 1 SAN and Wildcard Certificate Support, page

More information

StreamSets Control Hub Installation Guide

StreamSets Control Hub Installation Guide StreamSets Control Hub Installation Guide Version 3.2.1 2018, StreamSets, Inc. All rights reserved. Table of Contents 2 Table of Contents Chapter 1: What's New...1 What's New in 3.2.1... 2 What's New in

More information

WHITE PAPER. Good Mobile Intranet Technical Overview

WHITE PAPER. Good Mobile Intranet Technical Overview WHITE PAPER Good Mobile Intranet CONTENTS 1 Introduction 4 Security Infrastructure 6 Push 7 Transformations 8 Differential Data 8 Good Mobile Intranet Server Management Introduction Good Mobile Intranet

More information

Inventory and Reporting Security Q&A

Inventory and Reporting Security Q&A Inventory and Reporting Security Q&A General Q. What is Inventory Reporting, Collection, and Analysis? A. Inventory Reporting, Collection, and Analysis is a tool that discovers, collects, and analyzes

More information

Vodafone Secure Device Manager Administration User Guide

Vodafone Secure Device Manager Administration User Guide Vodafone Secure Device Manager Administration User Guide Vodafone New Zealand Limited. Correct as of June 2017. Vodafone Ready Business Contents Introduction 3 Help 4 How to find help in the Vodafone Secure

More information

Red Hat Network Satellite 5.0.0: Virtualization Step by Step

Red Hat Network Satellite 5.0.0: Virtualization Step by Step Red Hat Network Satellite 5.0.0: Virtualization Step by Step By Máirín Duffy, Red Hat Network Engineering Abstract Red Hat Network Satellite 5.0 is the first Satellite release to include virtual platform

More information

VI. Corente Services Client

VI. Corente Services Client VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...

More information

Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION

Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION Data Protection and Synchronization for Desktop and Laptop Users VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS DESKTOP AND LAPTOP OPTION 1 TABLE OF CONTENTS VERITAS BACKUP EXEC 9.1 FOR WINDOWS SERVERS...1

More information

Administrator Manual. Last Updated: 15 March 2012 Manual Version:

Administrator Manual. Last Updated: 15 March 2012 Manual Version: Administrator Manual Last Updated: 15 March 2012 Manual Version: 1.6 http://www.helpdeskpilot.com Copyright Information Under the copyright laws, this manual may not be copied, in whole or in part. Your

More information

Entrust. Discovery 2.4. Administration Guide. Document issue: 3.0. Date of issue: June 2014

Entrust. Discovery 2.4. Administration Guide. Document issue: 3.0. Date of issue: June 2014 Entrust Discovery 2.4 Administration Guide Document issue: 3.0 Date of issue: June 2014 Copyright 2010-2014 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of Entrust, Inc.

More information

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

ForeScout Extended Module for Carbon Black

ForeScout Extended Module for Carbon Black ForeScout Extended Module for Carbon Black Version 1.0 Table of Contents About the Carbon Black Integration... 4 Advanced Threat Detection with the IOC Scanner Plugin... 4 Use Cases... 5 Carbon Black Agent

More information

WINDOWS HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your PC or Server

WINDOWS HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your PC or Server WINDOWS HOST GUIDE Remote Support & Management PC Mac Tablet Smartphone Embedded device WiseMo Guest module for example on your Windows PC WiseMo Host module on your PC or Server WiseMo develops software

More information

Services: Monitoring and Logging. 9/16/2018 IST346: Info Tech Management & Administration 1

Services: Monitoring and Logging. 9/16/2018 IST346: Info Tech Management & Administration 1 Services: Monitoring and Logging 9/16/2018 IST346: Info Tech Management & Administration 1 Recall: Server vs. Service A server is a computer. A service is an offering provided by server(s). HTTP 9/16/2018

More information

Cisco CTL Client Setup

Cisco CTL Client Setup This chapter provides information about Cisco CTL client setup. About, page 2 Addition of Second SAST Role in the CTL File for Recovery, page 2 Cluster Encryption Configuration Through CLI, page 3 Remove

More information

Installing and Configuring vcenter Support Assistant

Installing and Configuring vcenter Support Assistant Installing and Configuring vcenter Support Assistant vcenter Support Assistant 6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution

WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution WHITE PAPER Cloud FastPath: A Highly Secure Data Transfer Solution Tervela helps companies move large volumes of sensitive data safely and securely over network distances great and small. We have been

More information

19.1. Security must consider external environment of the system, and protect it from:

19.1. Security must consider external environment of the system, and protect it from: Module 19: Security The Security Problem Authentication Program Threats System Threats Securing Systems Intrusion Detection Encryption Windows NT 19.1 The Security Problem Security must consider external

More information

Transport Gateway Installation / Registration / Configuration

Transport Gateway Installation / Registration / Configuration CHAPTER 2 Transport Gateway Installation / Registration / Configuration This chapter covers the following areas: Transport Gateway requirements. Security Considerations When Using a Transport Gateway.

More information

Using SSL to Secure Client/Server Connections

Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections, page 1 Using SSL to Secure Client/Server Connections Introduction This chapter contains information on creating

More information

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5

USER GUIDE. CTERA Agent for Windows. June 2016 Version 5.5 USER GUIDE CTERA Agent for Windows June 2016 Version 5.5 Copyright 2009-2016 CTERA Networks Ltd. All rights reserved. No part of this document may be reproduced in any form or by any means without written

More information

App Orchestration 2.0

App Orchestration 2.0 App Orchestration 2.0 Getting Started with Citrix App Orchestration 2.0 Prepared by: Jenny Berger Commissioning Editor: Erin Smith Version: 1.0 Last Updated: April 4, 2014 Page 1 Contents Welcome to App

More information

You can administer Policy and Distribution Services by using the following:

You can administer Policy and Distribution Services by using the following: IPolicy and Distribution Services Novell ZENworks 7 Server Management Policy and Distribution Services is a software, configuration, and behavioral management system for servers. Through Policy and Distribution

More information

Red Hat s Subscription Guide

Red Hat s Subscription Guide Red Hat s Subscription Guide for JBoss Enterprise Middleware A guide to understanding Red Hat s flexible consumption model for JBoss Enterprise Middleware November 2010 1. JBoss Enterprise Middleware Subscriptions

More information

Cisco CTL Client setup

Cisco CTL Client setup Cisco CTL Client setup This chapter provides information about Cisco CTL client setup. About Cisco CTL Client setup, page 2 Remove etoken Run Time Environment 3.00 for CTL Client 5.0 plug-in, page 2 Cisco

More information

Installing and Configuring vcenter Multi-Hypervisor Manager

Installing and Configuring vcenter Multi-Hypervisor Manager Installing and Configuring vcenter Multi-Hypervisor Manager vcenter Server 5.1 vcenter Multi-Hypervisor Manager 1.1.2 This document supports the version of each product listed and supports all subsequent

More information

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed.

Technical Overview. Access control lists define the users, groups, and roles that can access content as well as the operations that can be performed. Technical Overview Technical Overview Standards based Architecture Scalable Secure Entirely Web Based Browser Independent Document Format independent LDAP integration Distributed Architecture Multiple

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

MAC HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your Mac computer

MAC HOST GUIDE. Remote Support & Management PC Mac Tablet Smartphone Embedded device. WiseMo Host module on your Mac computer MAC HOST GUIDE Remote Support & Management PC Mac Tablet Smartphone Embedded device WiseMo Guest module for example on your Windows PC WiseMo Host module on your Mac computer WiseMo develops software for

More information

Veritas System Recovery 18 Management Solution Administrator's Guide

Veritas System Recovery 18 Management Solution Administrator's Guide Veritas System Recovery 18 Management Solution Administrator's Guide Documentation version: 18 Legal Notice Copyright 2018 Veritas Technologies LLC. All rights reserved. Veritas and the Veritas Logo are

More information

De La Salle University Information Technology Center. Microsoft Windows SharePoint Services and SharePoint Portal Server 2003

De La Salle University Information Technology Center. Microsoft Windows SharePoint Services and SharePoint Portal Server 2003 De La Salle University Information Technology Center Microsoft Windows SharePoint Services and SharePoint Portal Server 2003 WEB DESIGNER / ADMINISTRATOR User s Guide 2 Table Of Contents I. What is Microsoft

More information

Oracle Java SE Advanced for ISVs

Oracle Java SE Advanced for ISVs Oracle Java SE Advanced for ISVs Oracle Java SE Advanced for ISVs is designed to enhance the Java based solutions that ISVs are providing to their enterprise customers. It brings together industry leading

More information

Security Enhancements

Security Enhancements OVERVIEW Security Enhancements February 9, 2009 Abstract This paper provides an introduction to the security enhancements in Microsoft Windows 7. Built upon the security foundations of Windows Vista, Windows

More information

Getting Started with. Agents for Unix and Linux. Version

Getting Started with. Agents for Unix and Linux. Version Getting Started with Agents for Unix and Linux Version 10.1.0.0 Copyright RES Software Development B.V. All rights reserved. Commercial Computer Software documentation/data Restricted Rights. RES and RES

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

Mozy. Administrator Guide

Mozy. Administrator Guide Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license

More information

Planning the Installation and Installing SQL Server

Planning the Installation and Installing SQL Server Chapter 2 Planning the Installation and Installing SQL Server In This Chapter c SQL Server Editions c Planning Phase c Installing SQL Server 22 Microsoft SQL Server 2012: A Beginner s Guide This chapter

More information

Performing an ObserveIT Upgrade Using the Interactive Installer

Performing an ObserveIT Upgrade Using the Interactive Installer Performing an ObserveIT Upgrade Using the Interactive Installer ABOUT THIS DOCUMENT This document contains detailed procedures and instructions on how to upgrade ObserveIT by using the interactive "One

More information

Pulse Connect Secure. Network Connect to Pulse Desktop Migration Guide. Document Revision 2.1

Pulse Connect Secure. Network Connect to Pulse Desktop Migration Guide. Document Revision 2.1 Pulse Connect Secure Network Connect to Pulse Desktop Migration Guide Published Date May, 2018 Document Revision 2.1 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose, CA 95134 http://www.pulsesecure.net

More information

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief

RSA Solution Brief. Providing Secure Access to Corporate Resources from BlackBerry. Devices. Leveraging Two-factor Authentication. RSA Solution Brief Providing Secure Access to Corporate Resources from BlackBerry Devices Leveraging Two-factor Authentication Augmenting the BlackBerry Enterprise Solution BlackBerry devices are becoming ubiquitous throughout

More information

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2

Forescout. eyeextend for IBM BigFix. Configuration Guide. Version 1.2 Forescout Version 1.2 Contact Information Forescout Technologies, Inc. 190 West Tasman Drive San Jose, CA 95134 USA https://www.forescout.com/support/ Toll-Free (US): 1.866.377.8771 Tel (Intl): 1.408.213.3191

More information

DSS User Guide. End User Guide. - i -

DSS User Guide. End User Guide. - i - DSS User Guide End User Guide - i - DSS User Guide Table of Contents End User Guide... 1 Table of Contents... 2 Part 1: Getting Started... 1 How to Log in to the Web Portal... 1 How to Manage Account Settings...

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

VMware Workspace ONE UEM VMware AirWatch Cloud Connector

VMware Workspace ONE UEM VMware AirWatch Cloud Connector VMware AirWatch Cloud Connector VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

Administrator Manual. Last Updated: 15 March 2012 Manual Version:

Administrator Manual. Last Updated: 15 March 2012 Manual Version: Administrator Manual Last Updated: 15 March 2012 Manual Version: 1.6 http://www.happyfox.com Copyright Information Under the copyright laws, this manual may not be copied, in whole or in part. Your rights

More information

Comodo SecureBox Management Console Software Version 1.9

Comodo SecureBox Management Console Software Version 1.9 6. Comodo SecureBox Management Console Software Version 1.9 Quick Start Guide Guide Version 1.9.041918 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo SecureBox Management Console

More information

DefendX Software Control-Audit for Hitachi Installation Guide

DefendX Software Control-Audit for Hitachi Installation Guide DefendX Software Control-Audit for Hitachi Installation Guide Version 4.1 This guide details the method for the installation and initial configuration of DefendX Software Control-Audit for NAS, Hitachi

More information

Use a class C setting for maximum security. The class C setting is Click RoomWizard Setup.

Use a class C setting for maximum security. The class C setting is Click RoomWizard Setup. Use a class C setting for maximum security. The class C setting is 255.255.255.0. 2 Click RoomWizard Setup. The Default Gateway is the IP address of the router or gateway that provides internet access.

More information

Oracle Ksplice for Oracle Linux

Oracle Ksplice for Oracle Linux Oracle Ksplice for Oracle Linux Oracle Corporation Oracle Ksplice Oracle Ksplice is an exciting new addition to the Oracle Linux Premier Support subscription. The Oracle Ksplice technology allows customers

More information

Colligo Briefcase. for Good Technology. Administrator Guide

Colligo Briefcase. for Good Technology. Administrator Guide for Good Technology Administrator Guide Contents Introduction... 2 Target Audience... 2 Overview... 2 Key Features... 2 Platforms Supported... 2 SharePoint Security & Privileges... 3 for Good Technology...

More information

VMware AirWatch Content Gateway Guide for Linux For Linux

VMware AirWatch Content Gateway Guide for Linux For Linux VMware AirWatch Content Gateway Guide for Linux For Linux Workspace ONE UEM v9.7 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Apptix Online Backup by Mozy User Guide

Apptix Online Backup by Mozy User Guide Apptix Online Backup by Mozy User Guide 1.10.1.2 Contents Chapter 1: Overview...5 Chapter 2: Installing Apptix Online Backup by Mozy...7 Downloading the Apptix Online Backup by Mozy Client...7 Installing

More information

Security Digital Certificate Manager

Security Digital Certificate Manager System i Security Digital Certificate Manager Version 6 Release 1 System i Security Digital Certificate Manager Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

NETWRIX GROUP POLICY CHANGE REPORTER

NETWRIX GROUP POLICY CHANGE REPORTER NETWRIX GROUP POLICY CHANGE REPORTER ADMINISTRATOR S GUIDE Product Version: 7.2 November 2012. Legal Notice The information in this publication is furnished for information use only, and does not constitute

More information

Briefcase ios 3.7. Administrator s Guide

Briefcase ios 3.7. Administrator s Guide Briefcase ios 3.7 Administrator s Guide Contents Colligo Briefcase ios Introduction... 2 Target Audience... 2 Overview... 2 Key Features... 2 Platforms Supported... 2 SharePoint Security & Privileges...

More information

Remote Support Security Provider Integration: RADIUS Server

Remote Support Security Provider Integration: RADIUS Server Remote Support Security Provider Integration: RADIUS Server 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks

More information

User Manual. Active Directory Change Tracker

User Manual. Active Directory Change Tracker User Manual Active Directory Change Tracker Last Updated: March 2018 Copyright 2018 Vyapin Software Systems Private Ltd. All rights reserved. This document is being furnished by Vyapin Software Systems

More information

ON SCHEDULE TERMS AND CONDITIONS (September 23rd 2018)

ON SCHEDULE TERMS AND CONDITIONS (September 23rd 2018) By using On Schedule web application you are making an agreement with us, code fish, according to the current terms and conditions at the time of use. Upon the terms and conditions changing you will be

More information

IBM. Security Digital Certificate Manager. IBM i 7.1

IBM. Security Digital Certificate Manager. IBM i 7.1 IBM IBM i Security Digital Certificate Manager 7.1 IBM IBM i Security Digital Certificate Manager 7.1 Note Before using this information and the product it supports, be sure to read the information in

More information

ThinAir Server Platform White Paper June 2000

ThinAir Server Platform White Paper June 2000 ThinAir Server Platform White Paper June 2000 ThinAirApps, Inc. 1999, 2000. All Rights Reserved Copyright Copyright 1999, 2000 ThinAirApps, Inc. all rights reserved. Neither this publication nor any part

More information

ForeScout CounterACT. Resiliency Solutions. CounterACT Version 8.0

ForeScout CounterACT. Resiliency Solutions. CounterACT Version 8.0 ForeScout CounterACT Resiliency Solutions CounterACT Version 8.0 Table of Contents About ForeScout Resiliency Solutions... 4 Comparison of Resiliency Solutions for Appliances... 5 Choosing the Right Solution

More information

Horizon Workspace Administrator's Guide

Horizon Workspace Administrator's Guide Horizon Workspace Administrator's Guide Horizon Workspace 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Your Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust. Wise Athena Security Team

Your Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust. Wise Athena Security Team Your Data and Artificial Intelligence: Wise Athena Security, Privacy and Trust Wise Athena Security Team Contents Abstract... 3 Security, privacy and trust... 3 Artificial Intelligence in the cloud and

More information

OpenIAM Identity and Access Manager Technical Architecture Overview

OpenIAM Identity and Access Manager Technical Architecture Overview OpenIAM Identity and Access Manager Technical Architecture Overview Overview... 3 Architecture... 3 Common Use Case Description... 3 Identity and Access Middleware... 5 Enterprise Service Bus (ESB)...

More information

Control-M and Payment Card Industry Data Security Standard (PCI DSS)

Control-M and Payment Card Industry Data Security Standard (PCI DSS) Control-M and Payment Card Industry Data Security Standard (PCI DSS) White paper PAGE 1 OF 16 Copyright BMC Software, Inc. 2016 Contents Introduction...3 The Need...3 PCI DSS Related to Control-M...4 Control-M

More information

Deployment Guide. 3.1 For Windows For Linux Docker image Windows Installation Installation...

Deployment Guide. 3.1 For Windows For Linux Docker image Windows Installation Installation... TABLE OF CONTENTS 1 About Guide...1 2 System Requirements...2 3 Package...3 3.1 For Windows... 3 3.2 For Linux... 3 3.3 Docker image... 4 4 Windows Installation...5 4.1 Installation... 5 4.1.1 Install

More information

ForeScout Extended Module for IBM BigFix

ForeScout Extended Module for IBM BigFix ForeScout Extended Module for IBM BigFix Version 1.0.0 Table of Contents About this Integration... 4 Use Cases... 4 Additional BigFix Documentation... 4 About this Module... 4 Concepts, Components, Considerations...

More information

FIREFLY ARCHITECTURE: CO-BROWSING AT SCALE FOR THE ENTERPRISE

FIREFLY ARCHITECTURE: CO-BROWSING AT SCALE FOR THE ENTERPRISE FIREFLY ARCHITECTURE: CO-BROWSING AT SCALE FOR THE ENTERPRISE Table of Contents Introduction... 2 Architecture Overview... 2 Supported Browser Versions and Technologies... 3 Firewalls and Login Sessions...

More information

Cambium Wireless Manager

Cambium Wireless Manager Cambium Wireless Manager Client Setup Guide System Release 4.2 and Later Issue 1 November 2014 2014 Cambium Networks. All Rights Reserved. Accuracy While reasonable efforts have been made to assure the

More information

Are You Avoiding These Top 10 File Transfer Risks?

Are You Avoiding These Top 10 File Transfer Risks? Are You Avoiding These Top 10 File Transfer Risks? 1. 2. 3. 4. Today s Agenda Introduction 10 Common File Transfer Risks Brief GoAnywhere MFT Overview Question & Answer HelpSystems Corporate Overview.

More information

VMware AirWatch Cloud Connector Guide ACC Installation and Integration

VMware AirWatch Cloud Connector Guide ACC Installation and Integration VMware AirWatch Cloud Connector Guide ACC Installation and Integration Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Content and Purpose of This Guide... 1 User Management... 2

Content and Purpose of This Guide... 1 User Management... 2 Contents Introduction--1 Content and Purpose of This Guide........................... 1 User Management........................................ 2 Security--3 Security Features.........................................

More information

CompTIA SY CompTIA Security+

CompTIA SY CompTIA Security+ CompTIA SY0-501 CompTIA Security+ https://killexams.com/pass4sure/exam-detail/sy0-501 QUESTION: 338 The help desk is receiving numerous password change alerts from users in the accounting department. These

More information

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4

vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4 vrealize Operations Manager Customization and Administration Guide vrealize Operations Manager 6.4 vrealize Operations Manager Customization and Administration Guide You can find the most up-to-date technical

More information

Contents at a Glance COPYRIGHTED MATERIAL. Introduction...1 Part I: Becoming Familiar with Enterprise Linux...7

Contents at a Glance COPYRIGHTED MATERIAL. Introduction...1 Part I: Becoming Familiar with Enterprise Linux...7 Contents at a Glance Introduction...1 Part I: Becoming Familiar with Enterprise Linux...7 Chapter 1: Getting Acquainted with Enterprise Linux...9 Chapter 2: Exploring the Desktop...17 Chapter 3: Putting

More information

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA

Directory Integration with Okta. An Architectural Overview. Okta Inc. 301 Brannan Street San Francisco, CA Directory Integration with Okta An Architectural Overview Okta Inc. 301 Brannan Street San Francisco, CA 94107 info@okta.com 1-888-722-7871 Contents 1 User Directories and the Cloud: An Overview 3 Okta

More information

DOWNLOAD PDF SQL SERVER 2012 STEP BY STEP

DOWNLOAD PDF SQL SERVER 2012 STEP BY STEP Chapter 1 : Microsoft SQL Server Step by Step - PDF Free Download - Fox ebook Your hands-on, step-by-step guide to building applications with Microsoft SQL Server Teach yourself the programming fundamentals

More information

Configuring SSL. SSL Overview CHAPTER

Configuring SSL. SSL Overview CHAPTER 7 CHAPTER This topic describes the steps required to configure your ACE appliance as a virtual Secure Sockets Layer (SSL) server for SSL initiation or termination. The topics included in this section are:

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration

More information

HikCentral V1.3 for Windows Hardening Guide

HikCentral V1.3 for Windows Hardening Guide HikCentral V1.3 for Windows Hardening Guide Contents Introduction... 1 1. The Operating System - Microsoft Windows Security Configuration... 2 1.1Strict Password Policy... 2 1.2Turn Off Windows Remote

More information

Central Administration Console Installation and User's Guide

Central Administration Console Installation and User's Guide IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Central Administration Console Installation and User's Guide SC27-2808-03 IBM Tivoli Storage Manager FastBack for Workstations Version

More information

EnterpriseLink Benefits

EnterpriseLink Benefits EnterpriseLink Benefits GGY a Moody s Analytics Company 5001 Yonge Street Suite 1300 Toronto, ON M2N 6P6 Phone: 416-250-6777 Toll free: 1-877-GGY-AXIS Fax: 416-250-6776 Email: axis@ggy.com Web: www.ggy.com

More information

ESET Remote Administrator 6. Version 6.0 Product Details

ESET Remote Administrator 6. Version 6.0 Product Details ESET Remote Administrator 6 Version 6.0 Product Details ESET Remote Administrator 6.0 is a successor to ESET Remote Administrator V5.x, however represents a major step forward, completely new generation

More information

IBM BigFix Version 9.5. Patch for Red Hat Enterprise Linux User's Guide IBM

IBM BigFix Version 9.5. Patch for Red Hat Enterprise Linux User's Guide IBM IBM BigFix Version 9.5 Patch for Red Hat Enterprise Linux User's Guide IBM IBM BigFix Version 9.5 Patch for Red Hat Enterprise Linux User's Guide IBM Note Before using this information and the product

More information

Configuration Manager

Configuration Manager CHAPTER 7 This chapter describes how to perform routine Cisco VXC Manager configuration management tasks using the Administrator Console. It provides information on managing the configuration settings

More information

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3.1 April 07, Integration Guide IBM

IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3.1 April 07, Integration Guide IBM IBM Campaign Version-independent Integration with IBM Engage Version 1 Release 3.1 April 07, 2017 Integration Guide IBM Note Before using this information and the product it supports, read the information

More information

SQL Server Solutions GETTING STARTED WITH. SQL Secure

SQL Server Solutions GETTING STARTED WITH. SQL Secure SQL Server Solutions GETTING STARTED WITH SQL Secure Purpose of this document This document is intended to be a helpful guide to installing, using, and getting the most value from the Idera SQL Secure

More information

NetIQ Secure Configuration Manager Installation Guide. October 2016

NetIQ Secure Configuration Manager Installation Guide. October 2016 NetIQ Secure Configuration Manager Installation Guide October 2016 Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use restrictions, U.S. Government restricted

More information

Introduction to Change and Configuration Management

Introduction to Change and Configuration Management CHAPTER 1 Introduction to Change and Configuration Management Cisco Prime Network Change and Configuration Management provides tools that allow you to manage the software and device configuration changes

More information