New 8.5 Notes Shared Login "Gotchas"
|
|
- Ira McLaughlin
- 6 years ago
- Views:
Transcription
1 New 8.5 Notes Shared Login "Gotchas" Document information Technote (FAQ) Question The Notes Administrator has enabled Notes Shared Login in a policy for users. The user's Notes IDs are now locked with the Windows password using the PC's SID and Microsoft's Data Protection API (DPAPI). This is presenting numerous issues especially in an environment where the users are mobile - they use their Notes ID on more than one PC, and more than one NOTES ID is used on a single Windows profile. Background Information: The new Notes Shared Login feature, when enabled via policy or manually by the end user, locks and encrypts the Notes ID in the current Windows Profile using the PC SID and Microsoft's Data Protection API (DPAPI). This allows for maximum security as the certificates within the ID are now locked and bound to that PC and that OS profile, eliminating any password "guesses" or any other attempts to copy the ID to another PC and try to access the user's Notes databases on the Domino Server. This is a completely different function from the older Notes Single Login feature which is still supported in Notes 8.5. More information on how the feature is enabled and what it does is available in the Lotus Notes Help database. Product categories: Software Messaging Applications Advanced Messaging Lotus Notes Security Operating system(s): Mac OS X, Windows Software version: 8.5 Reference #: IBM Group: Software Group Modified date: Cause The Notes ID is now locked by Microsoft's DPAPI, and that PC's SID so only that Notes ID can be accessed on that PC. Answer Currently, the Help Database lists the following as limitations of the Notes Shared Login feature: You cannot use shared login if any of the following conditions is true: you use a computer that does not run Microsoft Windows you use a Smartcard to log in to Lotus Notes your User ID is protected by multiple passwords you are a roaming user that uses a roaming ID you run Notes on a USB drive you use a mandatory Windows profile you are running Notes in a Citrix environment Enhancement requests to change some functionality within this feature have been documented with Lotus Quality engineering. Copying ID files: SPR WTON7W8M6H: New Notes Shared Login feature restricts user mobility to other PCs 1/5
2 Because the Notes ID has been locked with the machine's SID, and that user profile's DPAPI, that Notes ID now belongs to that Machine and user profile. It will not work on another PC with Lotus Notes. In some cases, Lotus Notes will not even launch. Consequently, a user ID that was not locked on a PC with NSL will not work on that Notes Client. Workaround: There is a procedure the end user must follow in the Help Database in order to copy their ID to another PC. This must be done manually by the end user. Help Topic: Copying your ID file when you use Shared Login If you use shared login and want to make a copy of your User ID, you may need to use a special procedure to do so. The procedure assigns the copy of the ID file a new Notes password. Whether you need to use the special copy procedure depends on whether your administrator has set up shared login so that a Notes password remains on the User ID. To determine whether you must use a special procedure to copy your ID file if you use Notes shared login, and to use the procedure to copy your ID if required, perform the following steps: 1. Click File > Security > User Security. 2. Type your Microsoft Windows password and click OK. 3. Verify that Login to Notes using your operating system login is selected, which indicates that you are using Notes shared login. 4. Click Copy ID. Note: If you do not see the Copy ID button, your User ID still contains the Notes password and you should use Windows Explorer to make a copy of the User ID. You will need to remember and provide the Notes password for the User ID when starting Notes on the other computer. 5. Specify a location and file name for the copy, including the.id file name extension, and then click Save. 6. You see a prompt explaining that you are about to set a password for the ID copy, and that you will need to remember the password in order to use the ID copy on another computer. Click OK to close the prompt. 7. Type a password for the ID copy twice, and click OK. 8. Read the reminder prompt that is displayed and click OK. If you use the copied ID on another computer, it will be enabled for Notes shared login if your administrator has enabled the feature for you. NOTES ID VAULT: If a user creates a copy of the ID file with a locking windows password following the above procedure, a copy must be sent to the ID vault once that ID is used on another Notes Client. Help Topic: 2/5
3 How an ID vault works This topic describes common vault operations. How IDs are uploaded to a vault initially A user ID can be uploaded to a vault if a parent certifier of the user ID has issued a Vault Trust Certificate certifying its trust of the vault and if the associated user's effective policy has a Security Settings document that specifies the vault name. If these conditions are met for a new user being registered, the process of user registration uploads the ID to the vault. IBM Lotus Notes setup copies the ID file to the Notes client, as it does for non-vaulted users, that is the first time the user authenticates with the home server. Note If you do not want to keep copies of user IDs in the Domino Directory, clear the Advanced - ID File registration setting "Location for storing user ID - In Domino Directory," which is selected by default. If the above conditions are met for an existing user, a copy of the user's ID is uploaded from the Notes client to the vault automatically. For more information on the timing of this operation, see "How copies of IDs on Notes clients are kept synchronized with the vault copies." How copies of IDs on Notes clients are kept synchronized with the vault copies When a user changes the ID on a Notes client, for example changes the password or adds an Internet certificate, the change needs to be pushed to the ID copy in the vault. When a change is made to an ID copy in a vault, for example the password is reset, the change needs to be pushed to the Notes client. To synchronize a local copy of an ID with the vault copy, a client asks its home server for a list of servers that have a replica of the vault. If the home server is unavailable or does not run release 8.5 or higher, the client searches for a server in the home server cluster to provide the list. A server returns the list in random order to load balance synchronization among vault servers. The client tries each vault server in the returned list until one can satisfy its request. For better performance, the client caches the location of the first vault server that responds. This cache is cleared periodically to ensure that load balancing is maintained. When a user changes the ID file on a client, switches IDs, or provides a new password after a password reset, the client attempts synchronization immediately. Otherwise, synchronization occurs as follows: The client checks for changes periodically, generally every eight hours. To prevent a heavy demand on vault servers during client startup in the morning, a client does its first check at a random time within the first eight hours from client startup. If an attempt to check or to synchronize fails, for example, if the client is unable to connect to an 8.5 server, up to three retry attempts are made at five-minute intervals. If still not successful, checking resumes at the next eight-hour checking interval. To ensure that clients that are frequently started and stopped check the vault regularly, if a client has been started and stopped three 3/5
4 times and it has been more than 24 hours since it has checked for the need to synchronize, it checks about five minutes after startup. How new passwords are synchronized across multiple ID copies When the password on a user ID is changed anywhere (in the vault or on a client), the user can provide the new password from any client as long as the client can connect to the network to synchronize with the vault. The user does not have to change the password on each client workstation copy or copy the ID file from one client workstation to another. If a client does not have network connectivity, a user can continue to use the old password until a connection becomes available. How ID recovery works for an ID in a vault If the ID file on a user's computer is deleted, a copy of the ID is downloaded to the Notes client from the vault. This recovery occurs the next time the user attempts to access the ID file through Notes when the client is connected to the network. How shared-login-enabled IDs work with a vault Shared-login-enabled user IDs can be stored in a vault. In this case, the steps to recover the ID or to respond to a stolen ID are different than for non-shared-login-enabled IDs. ID file recovery If a shared-login-enabled ID is deleted from user's computer or its local file name is changed, the Notes password must be reset on the copy of the ID in the vault. After the reset, the following actions occur: 1. A user is prompted for the new password when next starting Notes. 2. After the user provides the new password, a copy of the ID file is downloaded to the client from the vault. 3. After the download, if the user policy requires the use of shared login, the local ID is re-enabled for shared login and the user is no longer prompted for the password. If the user policy makes the use of shared login optional, the user must re-enable the feature through the User Security window. Response to a stolen ID If you suspect that a non-shared-login-enabled ID is stolen, the correct response is to reset the password on the ID, roll over the keys on the ID, and ensure that server key checking is enabled. These steps help prevent unauthorized people from using the stolen ID because they won't know the new password required to obtain the new keys from the ID copy in the vault. A shared-login-enabled ID is different in that it is protected with a secret in the local ID file rather than with a Notes password that the vault understands. The ID can be used only on the computer on which it was shared-login enabled. If a computer with a shared-login-enabled ID is stolen, perform these steps: disable shared login in the user policy, force the policy to replicate to all vault servers, respond as you would for a nonshared-login-enabled ID (reset the password, roll over the keys, enable server key checking), and afterwards re-enable shared login in the user policy. 4/5
5 How ID renaming and key rollover work with a vault A user with a vaulted ID who requests a name change through the User Security window is not given the option to approve the change. The option to "Ask your approval before accepting name changes" is unavailable, and the change is always made on the client ID copy automatically during client-vault synchronization when the name change is detected on the server. A user with a vaulted ID cannot request a key rollover through the User Security window; only an administrator can initiate key rollover through policy configuration. The key rollover on the client ID copy happens automatically during client-vault synchronization when the key rollover is detected on the server; the user is never prompted to accept the new keys. Note If key rollover of IDs is in process, do not enable use of a vault until the key rollover is complete. In addition, when a vault is in use, always register new users with ID key sizes that conform to their effective policies. Smart Cards: There is a request to support the use of Smart Cards with Notes Shared Login: DJAG7CFLVK: NSL should support smartcard login to Windows Currently, a Notes ID can only be locked with a Smart Card OR with Notes Shared Login. Internet Password: SPR SAKI7P88GT: Enhancement request: Need synchronization between Notes Shared log-in password and DWA Currently, the Internet Password and the Notes Shared Login Notes ID password cannot be synchronized. CITRIX: SPR AJAS7PKJ3M: Request to support Notes Client Shared Logon feature for Citrix presentation server 4.5 Currently, Notes Shared Login cannot be used in a Citrix environment. Copyright and trademark information IBM, the IBM logo and ibm.com are trademarks of International Business Machines Corp., registered in many jurisdictions worldwide. Other product and service names might be trademarks of IBM or other companies. A current list of IBM trademarks is available on the Web at "Copyright and trademark information" at 5/5
Lotus Domino Security NSL, Web SSO, Notes ID vault. Collin Murray Program Director, Lotus Domino Product Management
Lotus Domino Security NSL, Web SSO, Notes ID vault Collin Murray Program Director, Lotus Domino Product Management Challenge: Reduce Cost of Ownership IBM Lotus Notes and Domino have been providing a secure
More informationLotus IBM Lotus Notes Domino 8.5 System Administration Operating Fundamentals.
Lotus 190-980 IBM Lotus Notes Domino 8.5 System Administration Operating Fundamentals http://killexams.com/exam-detail/190-980 QUESTION: 190 When creating the ID Vault for your domain, which of the following
More informationOpen Mic on. ID Vault Overview & Best Practices. 19th December, 2012
Open Mic on ID Vault Overview & Best Practices 19th December, 2012 1 Open Mic Team Sunil Chelani Domino SME Presenter Seema Janjirkar Software Engineer Presenter Ranjit Rai Lotus Technical Advisor Focussing
More informationMANAGING LOCAL AUTHENTICATION IN WINDOWS
MANAGING LOCAL AUTHENTICATION IN WINDOWS Credentials Manager Windows OS has a set of tools that help remedy some of the authentication challenges. For example, the Credential Manager in Windows 7 and newer
More informationThe Domino Certificate Authority Key Rollover Process. Author: Graham Farrell IBM Domino server Support Engineer
The Domino Certificate Authority Key Rollover Process Author: Graham Farrell IBM Domino server Support Engineer 1 Introduction.... 3 Terms and Abbreviations... 4 The Domino Certificate Authority and The
More informationD8L75G IBM Lotus Domino 8.5 System Administration Fundamentals Training
D8L75G IBM Lotus Domino 8.5 System Administration Fundamentals Training DESCRIPTION This course introduces you to basic concepts that provide the foundation for IBM Lotus Domino 8.5 and IBM Lotus Notes
More informationINFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT
INFORMATION TECHNOLOGY COMMITTEE ESCB-PKI PROJECT SUBSCRIBER S GUIDE VERSION 1.3 ECB-PUBLIC 15-April-2014 ESCB-PKI - Subscriber's Procedures v.1.3.docx Page 2 of 26 TABLE OF CONTENTS GLOSSARY AND ACRONYMS...
More informationModeChanger
35020808-02 2015.11 ModeChanger ModeChanger is a software utility that can switch the drive between normal mode and encrypted mode. Operating in encrypted mode will help protect your data. While the drive
More informationLotus Exam IBM Lotus Notes Domino 7 Managing Servers and Users Version: 5.0 [ Total Questions: 90 ]
s@lm@n Lotus Exam 190-722 IBM Lotus Notes Domino 7 Managing Servers and Users Version: 5.0 [ Total Questions: 90 ] Topic 0, A A Question No : 1 - (Topic 0) Smart Upgrade failover utilizes what search order?
More informationEkran System v Program Overview
Ekran System v. 6.2 Program Overview Contents About the Program Login Ekran Server & Management Tool Notifying Users about Being Database Management Monitored Licensing User Blocking Client Installation
More informationRelease Notes. Dell SonicWALL SRA Release Notes
Secure Remote Access Contents Release Purpose... 1 Platform Compatibility... 1 Licensing on the Dell SonicWALL SRA Appliances and Virtual Appliance... 1 Important Differences Between the SRA Appliances...
More informationLesson 3: Identifying Key Characteristics of Workgroups and Domains
1-16 Chapter 1 Introduction to Windows XP Professional Lesson 3: Identifying Key Characteristics of Workgroups and Domains Windows XP Professional supports two types of network environments in which users
More informationVMware Horizon FLEX Client User Guide. 26 SEP 2017 Horizon FLEX 1.12
26 SEP 2017 Horizon FLEX 1.12 You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The VMware Web site also provides the latest product updates.
More informationIBM Lotus Domino 8.5 System Administration Bootcamp Information Length: Ref: 5.0 Days D8L89G Delivery method: Classroom. Price: INR.
IBM Lotus Domino 8.5 System Administration Bootcamp Information Length: Ref: 5.0 Days D8L89G Delivery method: Classroom Overview Price: INR In this course, you will: Be introduced to basic concepts that
More informationUser Guide SecureLogin 8.1
User Guide SecureLogin 8.1 November, 2015 www.netiq.com/documentation Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use restrictions, U.S. Government
More informationSafeGuard Enterprise user help. Product version: 8.0
SafeGuard Enterprise user help Product version: 8.0 Contents 1 About SafeGuard Enterprise...4 2 SafeGuard Enterprise modules...5 3 Security recommendations...7 4 Full disk encryption...9 4.1 Encryption
More informationInformation Technology Services
Initializing Your Remote Workstation Lotus Notes Release 7.0.X After you have installed Notes on your home PC for the first time (not version upgrades) you must configure the software. If you are performing
More informationSafeGuard Enterprise. user help. Product Version: 8.1
SafeGuard Enterprise user help Product Version: 8.1 Contents About SafeGuard Enterprise...1 Modules... 2 Full disk encryption with BitLocker...2 Full disk encryption with SafeGuard Power-on Authentication...
More informationMicrosoft Office Groove Server Groove Manager. Domain Administrator s Guide
Microsoft Office Groove Server 2007 Groove Manager Domain Administrator s Guide Copyright Information in this document, including URL and other Internet Web site references, is subject to change without
More information<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Check Point SmartEndpoint Security
RSA SECURID ACCESS Authenticator Implementation Guide Check Point SmartEndpoint Security Daniel R. Pintal, RSA Partner Engineering Last Modified: January 27, 2017 Solution
More informationSecureLogin 8.7 User Guide. December, 2018
SecureLogin 8.7 User Guide December, 2018 Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use restrictions, U.S. Government restricted rights, patent policy,
More informationAhsay Online Backup Manager v7 Microsoft System State Backup and Restore Guide
Ahsay Online Backup Manager v7 Microsoft System State Backup and Restore Guide Ahsay Systems Corporation Limited 1 November 2017 www.ahsay.com Copyright Notice 2017 Ahsay Systems Corporation Limited. All
More informationRelease Notes. Dell SonicWALL SRA Release Notes
Secure Remote Access Contents Platform Compatibility... 1 Licensing on the Dell SonicWALL SRA Appliances and Virtual Appliance... 1 Important Differences between the SRA Appliances... 2 Known Issues...
More informationUsing the Vita Group Citrix Portal
Using the Vita Group Citrix Portal Using the Portal Summary This document is will step you through using the Vita Group Citrix portal. This portal allows you to reset your password if it is expired, unlock
More informationLotus IBM WebShere Portal 6 Deployment and Administration.
Lotus 190-825 IBM WebShere Portal 6 Deployment and Administration http://killexams.com/exam-detail/190-825 QUESTION: 131 While managing your Portal environment, you chose to externalize the access control
More informationRelease Notes Dell SonicWALL SRA Contents Platform Compatibility Licensing on the SRA Appliances and Virtual Appliance
Secure Remote Access Dell SonicWALL SRA 7.0.0.2 Contents Platform Compatibility... 1 Licensing on the SRA Appliances and Virtual Appliance... 1 Important Differences between the SRA Appliances... 2 Feature
More informationLOT-983 IBM Lotus Notes Domino 8.5 Managing Servers and Users
LOT-983 IBM Lotus Notes Domino 8.5 Managing Servers and Users Version 3.1 QUESTION NO: 1 Milosh is configuring the backup process for the databases within his DAOS enabled environment. In what order should
More informationBlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0. Administration Guide
BlackBerry Enterprise Server for IBM Lotus Domino Version: 5.0 Administration Guide SWDT487521-636611-0528041049-001 Contents 1 Overview: BlackBerry Enterprise Server... 21 Getting started in your BlackBerry
More informationRelease Notes McAfee Application Control 6.1.0
Release Notes McAfee Application Control 6.1.0 About this document New features Known issues Resolved issues Installation instructions Find product documentation About this document Thank you for choosing
More informationClient Installation and User's Guide
IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation and User's Guide SC27-2809-04 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1.1 Client Installation
More informationClient Installation and User's Guide
IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation and User's Guide SC27-2809-03 IBM Tivoli Storage Manager FastBack for Workstations Version 7.1 Client Installation
More informationALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE
ALTIRIS SECURITY SOLUTION 6.1 FOR HANDHELDS ADMINISTRATOR GUIDE Notice Copyright 2004 Altiris Inc. All rights reserved. Product Version: 6.1 Document Date: October 14, 2004 Bootworks U.S. Patent No. 5,764,593.
More informationAutomated Sign-on for Mainframe Administrator Guide
Automated Sign-on for Mainframe Administrator Guide 12.5.1 For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy,
More informationUser Manual. User Manual. AnyShare 1/ 16
AnyShare 1/ 16 Catalog All Rights Reserved... 3 Perface... 4 Chapter 1 About AnyShare5.0... 5 1.1 Role Introduction... 5 1.2 Module Introduction... 5 Chapter 2 QuickStart... 6 2.1 PC Client... 6 2.1.1
More informationLotus Domino Roaming. in Lotus Notes 8.5.x. Presenter: Christian Henseler (roaming (at) henseler.org)
Lotus Domino Roaming in Lotus Notes 8.5.x Presenter: Christian Henseler (roaming (at) henseler.org) Legal Disclaimer 'This is beta software from IBM and does not represent a commitment, promise or legal
More informationConfiguring OneSign 4.9 Virtual Desktop Access with Horizon View HOW-TO GUIDE
Configuring OneSign 4.9 Virtual Desktop Access with Horizon View HOW-TO GUIDE Introduction This How-To Guide includes information about configuring OneSign virtual desktop access (VDA) with View in VMware
More informationThe ID Vault Feature Across IBM Products
The ID Vault Feature Across IBM Products August 5, 2015 Amy Knox, Paco Pascua, Patrick Legaspi, Prince Mendoza, Paul Johnson, Quervin Lloyd Buco, Russell Norberg Powered by IBM SmartCloud Meetings Who
More informationNetfinity White Paper Paul Branch Netfinity Technology Center
Netfinity White Paper Paul Branch Netfinity Technology Center paul_branch@vnet.ibm.com Lotus Domino Clusters Installation Primer Abstract The Advanced Services option 1 of Lotus Domino server 4.5 adds
More informationG/On. G/On is available for Windows, MacOS and Linux (selected distributions).
G/On Soliton G/On is a remote access solution which establishes connections between a remote device and application servers inside an organisations network. A secure gateway is used to separate the remote
More informationVerizon Enhanced Security Authentication
Verizon Enhanced Security Authentication Overview Verizon introduced a new security process for Verizon s business portals to help maintain the security of your data. Over the next few months we will initiate
More informationCisco CTL Client Setup
This chapter provides information about Cisco CTL client setup. About, page 2 Addition of Second SAST Role in the CTL File for Recovery, page 2 Cluster Encryption Configuration Through CLI, page 3 Remove
More informationAventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.9.0 1996-2007 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
More informationWhat's New in IBM Lotus Notes and Domino 8.02 and 8.5
IBM Software Group What's New in IBM Lotus Notes and Domino 8.02 and 8.5 Nov 20, 2008 Presenters: Stephen Ng Greater China Group, Channel Leader, Lotus, IBM Software Group Agenda New features in Lotus
More informationIf your Mac keeps asking for the login keychain password
If your Mac keeps asking for the login keychain password The password of your macos user account might not match the password of your login keychain. Either create a new login keychain or update it with
More informationUsing CSE Cisco Anyconnect with 2FA
Using CSE Cisco Anyconnect with 2FA If you are using the Duo Mobile App in push mode: you open Anyconnect. 3. Enter your CSE UserName for the Username. 4. A new window will open. 5. Enter your CSE UserName
More informationEkran System v Program Overview
Ekran System v. 5.1 Program Overview Contents About the Program Ekran Server & Management Tool Database Management Licensing Client Installation Monitoring Parameters Client Protection Advanced User Authentication
More informationReadme RSA Authentication Manager 6.1
Readme RSA Authentication Manager 6.1 October 26, 2005 Introduction This document lists known issues, and includes other important information about RSA Authentication Manager 6.1. Read this document before
More informationUser Guide SecureLogin 7.0 SP3 April, 2012
www.novell.com/documentation User Guide SecureLogin 7.0 SP3 April, 2012 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation, and
More informationDTVaultLock User s Manual
DTVaultLock User s Manual DTVaultLock is a DataTraveler Vault tool that enables you to create and access a user defined password-protected area called a Privacy Zone, on your DataTraveler Vault drive.
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file
More informationKey File Generation. November 14, NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171
Key File Generation NATIONAL STUDENT CLEARINGHOUSE 2300 Dulles Station Blvd., Suite 220, Herndon, VA 20171 Table of Contents Introduction... 2 PuTTY Installation... 2 Key Generation... 7 Configuring PuTTY
More informationIBM LOT-825. IBM WebSphere Portal 6 Deployment and(r) Administration.
IBM LOT-825 IBM WebSphere Portal 6 Deployment and(r) Administration http://killexams.com/exam-detail/lot-825 QUESTION: 97 Your LDAP configuration must support users to login to Portal with their Internet
More informationIntegrating Password Management with Enterprise Single Sign-On
Integrating Password Management with Enterprise Single Sign-On 2016 Hitachi ID Systems, Inc. All rights reserved. Contents 1 Introduction 1 2 Background: one problem, two solutions 2 2.1 The Problem.............................................
More informationSophos Mobile Control Administrator guide. Product version: 5.1
Sophos Mobile Control Administrator guide Product version: 5.1 Document date: June 2015 Contents 1 About Sophos Mobile Control...5 1.1 Sophos Mobile Control on premise and as a Service...5 1.2 About this
More informationNetIQ SecureLogin 8.7 enhances the product capability and resolves several previous issues.
NetIQ SecureLogin 8.7 Release Notes December 2018 NetIQ SecureLogin 8.7 enhances the product capability and resolves several previous issues. Many of these improvements were made in direct response to
More informationConfigure advanced audit policies
7 LESSON Configuring Advanced Audit Policies 70-411 EXAM OBJECTIVE Objective 2.4 Configure advanced audit policies. This objective may include but is not limited to: implement auditing using Group Policy
More informationLotus Team Workplace. Version Installation and Upgrade Guide G
Lotus Team Workplace Version 6.5.1 Installation and Upgrade Guide G210-1658-00 Disclaimer THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. WHILE EFFORTS WERE
More informationLastPass Enterprise Recommended Policies Guide
LastPass Enterprise Recommended Policies Guide This document will help guide you through common scenarios and selecting policies to enable on your LastPass Enterprise account. We will not cover all policies
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file
More informationVMware Horizon FLEX Client User Guide
Horizon FLEX 1.10 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
More informationCopyright SolarWinds. All rights reserved worldwide. No part of this document may be reproduced by any means nor modified, decompiled,
APM Migration Introduction... 3 General Requirements... 3 Database Requirements... 3 Stopping APM Services... 4 Creating and Restoring Orion Database Backups... 4 Creating a Database Backup File with Database
More informationChime for Lync High Availability Setup
Chime for Lync High Availability Setup Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation
More informationPAN-OS Integration with SafeNet Luna SA HSM Tech Note PAN-OS 6.0
PAN-OS Integration with SafeNet Luna SA HSM Tech Note PAN-OS 6.0 Revision 1 2014, Palo Alto Networks, Inc. www.paloaltonetworks.com Secure Keys with a SafeNet Luna Hardware Security Module A hardware security
More informationIBM SmartCloud Notes Security
IBM Software White Paper September 2014 IBM SmartCloud Notes Security 2 IBM SmartCloud Notes Security Contents 3 Introduction 3 Service Access 4 People, Processes, and Compliance 5 Service Security IBM
More informationSoftBank Wireless Assistant Desktop Assistant Client User's Guide
SoftBank Wireless Assistant Desktop Assistant Client User's Guide Ver.5.5 Rev.1.1 3 Contents Preface Introduction... 4 1 The Personal Edition Desktop Assistant... 4 2 Requirements... 4 Chapter 1 Checking
More informationSETUP FOR OUTLOOK (Updated October, 2018)
EMAIL SETUP FOR OUTLOOK (Updated October, 2018) This tutorial will show you how to set up your email in Outlook using IMAP or POP. It also explains how to configure Outlook for MAC. Click on your version
More informationVendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions. Version: Demo
Vendor: Citrix Exam Code: 1Y0-253 Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: Demo QUESTION 1 A Citrix Administrator needs to configure a single virtual server
More informationSecurewireless Windows 7 Setup Guide
Securewireless Windows 7 Setup Guide 1. Click on the wireless icon in the lower right-hand corner of the taskbar and then click on Open Network and Sharing Center. 2. From the Network and Sharing Center
More informationConnect to Wireless, certificate install and setup Citrix Receiver
Connect to Wireless, certificate install and setup Citrix Receiver This document explains how to connect to the Wireless Network and access applications using Citrix Receiver on a Bring Your Own Device
More informationD8L89G IBM Lotus Domino 8.5 System Administration Bootcamp
Tel. +39 02 365738 info@overneteducation.it www.overneteducation.it D8L89G IBM Lotus Domino 8.5 System Administration Bootcamp Durata: 5 gg Descrizione In this course, you will: Be introduced to basic
More informationEnterprise Vault 8.0 Security Model for Lotus Domino Archiving. Rob Forgione Technical Field Enablement March 2009
W H I T E P A P E R : T E C H N I C A L Enterprise Vault 8.0 Security Model for Lotus Domino Archiving Rob Forgione Technical Field Enablement March 2009 White Paper: Symantec Technical Contents Purpose...
More informationKeycode Installation Guide. BCM Business Communications Manager
Keycode Installation Guide BCM Business Communications Manager Document Status: Standard Document Version: 02.00 Document Number: NN40010-301 Part Code: N0060625 Date: June 2006 Copyright 2006 Nortel Networks,
More informationAdministering FileVault 2 on OS X Mountain Lion with the Casper Suite. Technical Paper Casper Suite v9.0 or Later 7 January 2015
Administering FileVault 2 on OS X Mountain Lion with the Casper Suite Technical Paper Casper Suite v9.0 or Later 7 January 2015 JAMF Software, LLC 2015 JAMF Software, LLC. All rights reserved. JAMF Software
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme file
More informationIBM A Assessment: IBM Lotus Notes Domino 8.5 System Administration Update.
IBM A2040-956 Assessment: IBM Lotus Notes Domino 8.5 System Administration Update http://killexams.com/exam-detail/a2040-956 QUESTION: 89 Domino 8.5 includes both Domino server roaming and file server
More informationBIG-IP System: Migrating Devices and Configurations Between Different Platforms. Version
BIG-IP System: Migrating Devices and Configurations Between Different Platforms Version 13.0.0 Table of Contents Table of Contents Migration of Configurations Between Different Platforms...5 About Migrating
More informationRSA Authentication Manager 7.1 Help Desk Administrator s Guide
RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
More informationRSA Authentication Manager 7.1 Administrator s Guide
RSA Authentication Manager 7.1 Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA
More informationA. Getting Started About e-access Enrolling in e-access: Authenticating your account Login... 5
Contents A. Getting Started... 3 1. About e-access... 3 2. Enrolling in e-access:... 3 3. Authenticating your account... 5 4. Login... 5 B. Fix a Problem... 6 1. Provided the wrong email address during
More informationOnline documentation: Novell Documentation Web site. (http://www.novell.com/ documentation/securelogin70/index.html)
Novell SecureLogin 7.0 Readme September 18, 2009 Novell 1 Documentation The following sources provide information about Novell SecureLogin 7.0: Online documentation: Novell Documentation Web site. (http://www.novell.com/
More informationVMware AirWatch Android Platform Guide
VMware AirWatch Android Platform Guide Workspace ONE UEM v9.4 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationCeladon Password Self-Service
Celadon Password Self-Service Quest Password Manager is a facility that allows you to reset your Celadon Windows password as well as unlock the account without calling the Helpdesk to provide self-service
More informationJob Aid: Citrix Receiver Upgrade
January 3, 2018 Job Aid: Citrix Receiver Upgrade Overview We have upgraded the Citrix infrastructure that securely delivers your Citrix applications and desktops. While your applications and desktops are
More informationTroubleshooting Policies on a Domino Server
Troubleshooting Policies on a Domino Server Open Mic Webcast October 9, 2012 Jana Medlin Domino Server Development IBM Collaboration Solutions 2012 IBM Corporation Agenda Policy, its types and usage Ways
More informationBlackBerry Wireless Handheld Getting Started Guide
BlackBerry Wireless Handheld Getting Started Guide Phone button Open the phone screen Earpiece Headset jack USB port Notification LED Trackwheel Select or click an item Escape button Exit a screen Alt
More informationThird-Party Client (s3fs) User Guide
Issue 02 Date 2017-09-28 HUAWEI TECHNOLOGIES CO., LTD. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of
More informationIBM Hyper-Scale Manager as an Application Version 1.8. User Guide IBM GC
IBM Hyper-Scale Manager as an Application Version 1.8 User Guide IBM GC27-5984-04 Note Before using this information and the product it supports, read the information in Notices on page 37. Management
More informationIBM Hyper-Scale Manager as an Application Version 1.7. User Guide GC
IBM Hyper-Scale Manager as an Application Version 1.7 User Guide GC27-5984-03 Note Before using this information and the product it supports, read the information in Notices on page 35. Management Tools
More informationSecure Single Sign On with FingerTec OFIS
Secure Single Sign On with FingerTec OFIS User Guide CONTENTS 3 1 INTRODUCTION Welcome to OFIS Gateway 4-11 2 INSTALLATION & SETUP Registering Your OFIS Gateway Installing & Setting Up Your OFIS Gateway
More informationUser Guide. Version R94. English
AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated
More informationLotusLive Notes Client Configuration
LotusLive Notes Client Configuration End to End User Transition Guide Version 2.1 Prepared by IBM Support Education for ICS January 2012 1 Table of Contents Before Migration...4 LotusLive Subscription
More informationSecurity Enterprise Identity Mapping
System i Security Enterprise Identity Mapping Version 6 Release 1 System i Security Enterprise Identity Mapping Version 6 Release 1 Note Before using this information and the product it supports, be sure
More informationDell One Identity Manager Administration Guide for Connecting to SharePoint
Dell One Identity Manager 7.1.3 Administration Guide for Connecting to SharePoint 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property
More informationEvaluation Guide Host Access Management and Security Server 12.4 SP1 ( )
Evaluation Guide Host Access Management and Security Server 12.4 SP1 (12.4.10) Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,
More informationSophos Central Device Encryption. Administrator Guide
Sophos Central Device Encryption Administrator Guide Contents About... 1 Manage BitLocker Drive Encryption... 2 Migrate to...2 Prepare Device Encryption...3 Device Encryption step by step... 3 Device Encryption
More informationIBM XIV Storage System IBM Hyper-Scale Manager Installation as application Version 1.4. User Guide GC
IBM XIV Storage System IBM Hyper-Scale Manager Installation as application Version 1.4 User Guide GC27-5984-00 Note Before using this information and the product it supports, read the information in Notices
More informationUsing VMware View Client for Mac
May 2012 View Client for Mac This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions
More informationClientNet. Portal Admin Guide
ClientNet Portal Admin Guide Document Revision Date: June 5, 2013 ClientNet Portal Admin Guide i Contents Introduction to the Portal... 1 About the Portal... 1 Logging On and Off the Portal... 1 Language
More informationProgressive Authentication in ios
Progressive Authentication in ios Genghis Chau, Denis Plotnikov, Edwin Zhang December 12 th, 2014 1 Overview In today s increasingly mobile-centric world, more people are beginning to use their smartphones
More informationIntel Security/McAfee Endpoint Encryption
RSA Ready Implementation Guide for RSA SecurID Last Modified: March 13, 2015 Partner Information Product Information Partner Name Intel Security formerly McAfee Web Site www.mcafee.com Product Name for
More information