TRANSPARENT AUTHENTICATION GUIDE
|
|
- Gabriel Bryant
- 6 years ago
- Views:
Transcription
1 TRANSPARENT AUTHENTICATION GUIDE Webwasher Web Gateway Security e Version 6.0 and higher
2 Part Number: A All Rights Reserved, Published and Printed in Germany 2007 Secure Computing Corporation. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form without prior consent in writing from Secure Computing Corporation. Every effort has been made to ensure the accuracy of this manual. However, Secure Computing Corporation, makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Secure Computing Corporation shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this document is subject to change without notice. Webwasher, MethodMix, AV PreScan, Live Reporting, Content Reporter, ContentReporter, Real-Time Classifier are all trademarks or registered trademarks of Secure Computing Corporation in Germany and/or other countries. Microsoft, Windows NT, Windows 2000 are registered trademarks of Microsoft Corporation in the United States and/or other countries. McAfee is a business unit of Network Associates, Inc. CheckPoint, OPSEC, and FireWall-1 are trademarks or registered trademarks of CheckPoint Software Technologies Ltd. or its affiliates. Sun and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. Squid is copyrighted by the University of California, San Diego. Squid uses some code developed by others. Squid is Free Software, licensed under the terms of the GNU General Public License. NetCache is a registered trademark of Network Appliances, Inc. in the United States and other countries. Linux is a registered trademark of Linus Torvalds. Other product names mentioned in this guide may be trademarks or registered trademarks of their respective companies and are the sole property of their respective manufacturers. Secure Computing Corporation Webwasher A Secure Computing Brand Vattmannstrasse 3, Paderborn, Germany Phone: +49 (0) Fax: +49 (0) info@webwasher.com European Hotline Phone: +49 (0) US Hotline Phone: ,
3 Contents Chapter 1 Introduction Chapter 2 On Authentication Chapter 3 Deployment Planning and Configuration Deployment Scenarios Configuration Steps i
4
5 Introduction Chapter 1 This document provides information on the use of transparent authentication under Webwasher. The information applies to version 6.0 and higher versions of Webwasher. Successful authentication means that a proxy or server knows the user who requested access to an object. A concept related to authentication is policy mapping, but while authentication establishes who requested a resource, policy mapping is used to decide how this request will be handled, i. e. what security policy is applied to it. Usually, authentication is a prerequisite for policy mapping. This document explains some basic concepts of the authentication process, see Chapter 2. Furthermore, it describes some deployment scenarios and the configuration steps required for setting up transparent authentication under Webwasher, see Chapter
6
7 On Authentication Chapter 2 This chapter explains a number of basic concepts to enable a better understanding of what happens when you are setting up authentication under Webwasher. Credential Retrieval Methods There are several methods for retrieving user credentials from a client that sent a request. Note that these methods should be seen independently from the methods chosen for verification of the credentials. The following retrieval methods are dealt with in this document: Basic The client sends the combined user name and password as request header in base64-encoded format to the destination, e. g. to the proxy or server. Integrated The integrated method is a challenge/response technique that does not allow to recover a password from a sniffed connection. The password hash will be hashed with two random values, one chosen by the client and one by the server. This means that three steps are required to complete the authentication procedure. Login Page Under this method, the proxy/server sends an HMTL page to let the user submit a user name and password. This will then be treated as a regular request. 2 1
8 On Authentication Credential Verification Methods After a proxy or a server has retrieved the credentials of a user, there are several methods for verifying them and retrieving the additional user information (group membership) that is needed in order to do policy mapping: NTLM Submitting a query to a Windows domain controller This requires that Webwasher is running on a Windows server, or the use of the NTLM Agent running on a separate server. LDAP Submitting a query to an LDAP server Webwasher User Database Looking up user data in the Webwasher User Database This database runs on every supported platform and does not require the use of additional servers. Authentication Authentication is credential retrieval plus credential verification. A graphical representation of the authentication procedure including both these parts is provided by the diagrams shown below. The procedure starts after the proxy/server has indicated that authentication is required. The bold arrows inside the credential retrieval diagram show how many steps are required between the client and proxy/server in order to transmit the credentials: 2 2
9 On Authentication Proxy Authentication vs. Transparent Authentication Authentication procedures may also differ with regard to whether they are done as Proxy Authentication or Transparent Authentication. There are two main features that distinguish these authentication methods: 1. With proxy authentication, you need to configure the browser on the client to use the proxy server. 2. With proxy authentication each request or connection (when the integrated method of retrieving credentials is applied) is authenticated. This means that a request or connection is mapped to a user. With transparent authentication under Webwasher, the mapping is done between an IP address and a user. Note that it is not possible with this authentication method to distinguish between multiple users on a single system. The following diagram shows the various steps that are completed when transparent authentication is used: A user requests a URL (1) and the ICAP client forwards this request to the ICAP server (2). If the ICAP server is unable to map the IP address of the client to a user name (3, 4), it starts the authentication process. 2 3
10 On Authentication Instead of filtering the request (in REQMOD or RESPMOD communication mode), it sends a redirect that points to the authentication server (5, 6). This server, which is identical with the ICAP server under Webwasher, uses the configured credential retrieval and verification methods to obtain a user name and group membership (7). This information is assigned to an IP address and distributed in the Webwasher cluster as required. Depending on the chosen methods, this procedure will not be visible to the user and does not require any user interaction. After authentication has been successfully achieved, the authentication server sends another redirect to the original URL (8). By following this redirect, the client requests the URL once again (9), and the usual data flow (10-14) will go on now because the user has been authenticated. 2 4
11 Chapter 3 Deployment Planning and Configuration This chapter introduces two scenarios for using transparent authentication, see 3.1. Furthermore, it describes in detail the steps required under Webwasher to configure this authentication method, see Deployment Scenarios There are at least two scenarios where it would make sense to use transparent authentication in a Webwasher configuration: 1. Clients use Webwasher as proxy and authentication is done using LDAP, or NTLM with the basic method of credential retrieval. The disadvantage with this scenario is that the LDAP user name and password will be sent unprotected and can be sniffed at any point in the network. The security hole can be overcome by using transparent authentication, with credential retrieval performed in basic mode over an SSL-secured connection and credential verification done using an LDAP server. However, a better solution can be found here: If the user credentials are verified on an active directory, you can use the NTLM Agent, or instead of an LDAP server, you can use the integrated method of credential retrieval together with the Webwasher User Database. In the latter case, you may also use the LDAP synchronization feature to enable a smooth transition. 2. There is no proxy in your configuration, such as the Webwasher Pass-By ICAP Client, but authentication or policy mapping is required, or the proxy server (ICAP client) installed in the configuration is not capable of performing the desired authentication method. 3 1
12 Deployment Planning and Configuration 3.2 Configuration Steps This section describes the configuration steps that are required to configure transparent authentication under Webwasher. Proceed as follows: 1. Log in to the Webwasher Web interface and go to the Web Mapping tab under User Management > Policy Mapping. Note that this step is required even if you only want to configure authentication without policy mapping. 2. Set up a mapping like the one shown under 1. in the upper list if you want to do only authentication or to assign a policy that is based on the user name. A mapping like 2. should be chosen to assign a policy based on the group membership of the client. After setting up a mapping, click on the Edit rules and options button in the same line. 3 2
13 Deployment Planning and Configuration The User based Mapping (or Group based Mapping) tab appears: 3. In the User Name Location section, select Transparent Authentication from the first drop-down list to let Webwasher search for the user name in the (transparent) authenticated user database. 4. If the Input value must exist checkbox is marked in the Mapping Options section, the ICAP server will send a redirect if it does not find a user name corresponding to an IP address. 5. In the Add Rule section, add a user mapping rule, e. g. default = *, which means that only authenticated users are allowed access. 3 3
14 Deployment Planning and Configuration The next steps are required to configure the authentication server: 1. Go to the Authentication Server tab under User Management > Authentication Server. 2. In the Authentication Server Settings section, enable use of the server by marking the checkbox next to the section heading. 3. Depending on the authentication method selected in step 6, make sure the Use SSL checkbox is marked, see the description given for that step. 4. Accept the default port, which is 9094, or enter another port. 5. Accept the standard value of 120 seconds to configure how long the mapping from an IP address to a user should be valid. After this interval has expired, the ICAP server will again send a redirect for the next request and the mapping (and authentication) must be renewed. The danger in configuring a long interval here is that a user switch on one computer or a new assignment of the IP address by DHCP to another computer will not be recognized, which will lead to an inaccurate mapping. On the other hand, a short interval may increase the number of redirects that are required in the authentication process. 3 4
15 Deployment Planning and Configuration 6. In the Authentication Process section, select an authentication method. If you select more than one method, authentication is achieved if at least one of them was applied successfully. Depending on the chosen method, SSL encryption should be used for the connection between client and authentication server. To enable this, use the corresponding checkbox in the Authentication Server Settings section, see step 3. SSL encryption can be omitted if the method selected is User Database, NTLM, or NTLM Agent and if the integrated method is used to retrieve the user credentials. The method is enabled by marking the corresponding checkbox in the NTLM and NTLM-Agent Authentication Options or User Database Authentication Options section. Note that today all widely distributed browsers support this integrated method. If you want the user to submit the credentials through the login page, mar the corresponding checkbox above the methods list. The only benefit of the login page is that the user sees what happens. Credentials are entered manually, and this must be repeated every time the authentication has expired. Technically speaking, it does not make sense to use the login page since the other options are not less secure, but more comfortable. The following table provides an overview of how often the user must enter the credentials (assuming the browser process does not terminate): Basic Integrated Login Page Windows First time Never First Time + each renewal Other First Time First Time First Time + each renewal 7. The other sections on the tab are used to configure further authentication parameters. After specifying the appropriate values in all sections, click on the Apply Changes button to make your settings effective. 3 5
16 Deployment Planning and Configuration Notes on Some Pitfalls Note that there are some pitfalls that must be taken into account when setting up transparent authentication: POST requests will fail if the ICAP server sends an redirect to the authentication server. This affects, however, only the renewal of the mapping since for the browser the request was successful, and the POST body will not be sent again after the final redirect. Authentication at a server (here the authentication server) over a proxy connection. In this configuration, the Microsoft Internet Explorer will not send the credentials. Possible work-arounds: use login page configure the Internet Explorer not to use a proxy for the authentication server. Note that if Webwasher has been configured to run in a cluster, all IP addresses must be excluded. Redirection loops. A browser requests URL A. The ICAP server sends a redirect to B and the authentication server sends an redirect to A again. Firefox treats this as an endless loop and stops the request. (the Internet Explorer will not recognize the problem). To solve the problem, Webwasher appends a dummy parameter to A in the default configuration, so it is not a loop any longer (A -> B -> A2). The additional parameter will be removed in the REQMOD call. Further problems may occur when using the Pass-By ICAP Client because this client searches only for blocked requests and not for modified requests. There are many Web servers that have no problem with the additional parameter, but some will respond with a File not found error message. 3 6
User s GUIDE. Webwasher Spam Reporter Version 1.0.
User s GUIDE Webwasher Spam Reporter Version 1.0 www.securecomputing.com Edition November 2006 All Rights Reserved, Published and Printed in Germany 2006 Secure Computing Corporation. This document may
More informationNETWORK INTERFACE CARDS UPGRADE GUIDE
NETWORK INTERFACE CARDS UPGRADE GUIDE Webwasher Web Gateway Security e www.securecomputing.com Part Number: 86-0947553-C All Rights Reserved, Published and Printed in Germany 2008 Secure Computing Corporation.
More informationQUICK CONFIGURATION GUIDE
QUICK CONFIGURATION GUIDE Webwasher Web Gateway Security Version 6.8.1 and higher Quick Configuration Guide Webwasher Web Gateway Security 6.8.1 and higher Thank you for selecting Webwasher as your company's
More informationNimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]
Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document
More informationINSTALLATION AND CONFIGURATION GUIDE. Webwasher Appliances.
INSTALLATION AND CONFIGURATION GUIDE Webwasher Appliances www.securecomputing.com Part Number: 86-0946281-B All Rights Reserved, Published and Printed in Germany 2006 Secure Computing Corporation. This
More informationConnection Broker Advanced Connections Management for Multi-Cloud Environments
Connection Broker Advanced Connections Management for Multi-Cloud Environments Using Leostream with the VMware Horizon View Direct- Connection Plug-in Version 8.2 December 2017 Contacting Leostream Leostream
More informationProduct Guide. McAfee Plugins for Microsoft Threat Management Gateway Software
Product Guide McAfee Plugins for Microsoft Threat Management Gateway 1.4.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationManagement Console User Guide
Secure Web Gateway Management Console User Guide Release 10.2.0 Manual Version v 10.2.0.1 M86 SECURITY SECURE WEB GATEWAY MANAGEMENT CONSOLE USER GUIDE 2012 M86 Security All rights reserved. 828 W. Taft
More informationPartner Information. Integration Overview. Remote Access Integration Architecture
Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration OTP Barracuda Networks Barracuda SSL VPN User Name + Security Code VIP Enterprise
More informationAuthorized Send Installation and Configuration Guide Version 3.5
Canon Authorized Send Installation and Configuration Guide Version 3.5 08011-35-UD2-004 This page is intentionally left blank. 2 Authorized Send Installation and Configuration Guide Contents Preface...5
More informationOne Identity Quick Connect for Base Systems 2.4. Administrator Guide
One Identity Quick Connect for Base Systems 2.4 Administrator Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationSecure Web Gateway. SWG User Guide. Release Manual Version v
Secure Web Gateway SWG User Guide Release 10.2.0 Manual Version v 10.2.0.1 M86 SECURITY SECURE WEB GATEWAY SWG USER GUIDE 2012 M86 Security All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA
More informationNimsoft Monitor Server
Nimsoft Monitor Server Configuration Guide v6.00 Document Revision History Version Date Changes 1.0 10/20/2011 Initial version of Nimsoft Server Configuration Guide, containing configuration and usage
More informationDIGIPASS Authentication for Check Point VPN-1
DIGIPASS Authentication for Check Point VPN-1 With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 36 Disclaimer Disclaimer of Warranties and Limitations
More informationCopyright 2015 YEALINK NETWORK TECHNOLOGY CO., LTD.
Copyright Copyright 2015 YEALINK NETWORK TECHNOLOGY CO., LTD. Copyright 2015 Yealink Network Technology CO., LTD. All rights reserved. No parts of this publication may be reproduced or transmitted in any
More informationApplication Note Using SiteManager as Web Proxy And/or Mail Relay Server
Application Note Using SiteManager as Web Proxy And/or Mail Relay Server This guide explains how to configure a SiteManager, so devices on the Device side of it can use it to access as Web Proxy to access
More informationCisco FindIT Plugin for Kaseya Quick Start Guide
First Published: 2017-10-23 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE
More informationPartner Information. Integration Overview Authentication Methods Supported
Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration F5 Networks FirePass VPN User Name - Security Code User Name - Password - Security
More informationOne Identity Starling Two-Factor Desktop Login 1.0. Administration Guide
One Identity Starling Two-Factor Desktop Login 1.0 Administration Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationHow to configure SecureW2
How to configure SecureW2 Disclaimer The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright Notice
More informationNovell Access Manager
Quick Start AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 June 11, 2010 www.novell.com Novell Access Manager 3.1 SP2 Quick Start Legal Notices Novell, Inc., makes no representations or warranties
More informationInstalling the SSL Client for Mac
Mac Install Installing the SSL Client for Mac SSLMac201211-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com
More informationSafeNet Authentication Service
SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have
More informationGTA SSL Client & Browser Configuration
GB-OS Version 6.2 GTA SSL Client & Browser Configuration SSL201607-01 Global Technology Associates 3361 Rouse Rd, Suite 240 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com
More informationVeritas Desktop and Laptop Option 9.2
1. Veritas Desktop and Laptop Option 9.2 Quick Reference Guide for DLO Installation and Configuration 24-Jan-2018 Veritas Desktop and Laptop Option: Quick Reference Guide for DLO Installation and Configuration.
More informationBlue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7
Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the
More informationDameWare Server. Administrator Guide
DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationBy Anthony di Donato. Citrix Systems, Inc.
How to install NFuse Components and Web Extensions on the same Server? By Anthony di Donato Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION
More informationThis Readme describes the NetIQ Access Manager 3.1 SP5 release.
NetIQ Access Manager 3.1 SP5 Readme January 2013 This Readme describes the NetIQ Access Manager 3.1 SP5 release. Section 1, What s New, on page 1 Section 2, Upgrading or Migrating to Access Manager 3.1
More informationUNIBOX. An Intelligent Network Controller. Knowledge Base: Billing Module
UNIBOX An Intelligent Network Controller Knowledge Base: Billing Module Copyright 2013 Wifi-soft Solutions Pvt. Ltd. All rights reserved. The information contained herein is subject to change without notice.
More informationVital Security Supported Topologies
Vital Security Supported Topologies Software Release 9.0 Vital Security Supported Topologies Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights
More informationSymantec Ghost Solution Suite Web Console - Getting Started Guide
Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.
More informationRecovery Guide for Cisco Digital Media Suite 5.4 Appliances
Recovery Guide for Cisco Digital Media Suite 5.4 Appliances September 17, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408
More informationOffice 365 Best Practices: Protocols
Office 365 Best Practices: Email Protocols VERSION 9: 08/11/17 Office 365 Integration: Email Protocols/Page 2 Skype/Lync Integration/Page 3 Copyrights Copyright 2016 Symantec Corp. All rights reserved.
More informationAuthenticating Cisco VCS accounts using LDAP
Authenticating Cisco VCS accounts using LDAP Cisco TelePresence Deployment Guide Cisco VCS X6 D14526.04 February 2011 Contents Contents Document revision history... 3 Introduction... 4 Usage... 4 Cisco
More informationV iew Direct- Connection Plug-In. The Leostream Connection Broker. Advanced Connection and Capacity Management for Hybrid Clouds
V iew Direct- Connection Plug-In The Leostream Connection Broker Advanced Connection and Capacity Management for Hybrid Clouds Version 9.0 June 2018 f Contacting Leostream Leostream Corporation http://www.leostream.com
More informationAccess Manager 3.2 Service Pack 2 IR1 resolves several previous issues.
Access Manager 3.2 Service Pack 2 IR1 Readme September 2013 Access Manager 3.2 Service Pack 2 IR1 resolves several previous issues. Many of these improvements were made in direct response to suggestions
More informationProxy Log Configuration
Stealthwatch System Proxy Log Configuration (for Stealthwatch System v6.10.x) Copyrights and Trademarks 2018 Cisco Systems, Inc. All rights reserved. NOTICE THE SPECIFICATIONS AND INFORMATION REGARDING
More informationContains the Linux Identity Server, the Linux Administration Console, the ESP-enabled SSL VPN Server, and the Traditional SSL VPN Server.
NetIQ Access Manager 3.2 IR1 Readme July 2012 This Readme describes the NetIQ Access Manager 3.2 IR1 release. Section 1, Upgrading to Access Manager 3.2 IR1, on page 1 Section 2, Issues Fixed, on page
More informationProofpoint Threat Response
Proofpoint Threat Response Threat Response Auto Pull (TRAP) - Installation Guide Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 United States Tel +1 408 517 4710 www.proofpoint.com Copyright Notice
More informationAuthorized Send User s Guide Version 3.5
Canon Authorized Send User s Guide Version 3.5 08011-35-UD1-004 This page is intentionally left blank. 2 Authorized Send User s Guide Contents Preface...5 How to Use This Manual... 5 Symbols Used in This
More informationQuest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers
Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization
More informationDIGIPASS Authentication for Check Point VPN-1
DIGIPASS Authentication for Check Point VPN-1 With Vasco VACMAN Middleware 3.0 2007 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 51 Disclaimer Disclaimer of Warranties and
More informationConfiguring Symantec Protection Engine for Network Attached Storage. Dell FluidFS 5.0
Configuring Symantec Protection Engine for Network Attached Storage Dell FluidFS 5.0 Contents Abstract... 2 About software component... 2 How does FluidFS antivirus protect data on FluidFS cluster... 2
More informationCisco Expressway Authenticating Accounts Using LDAP
Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4
More informationNovell Access Manager
Setup Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 Setup Guide Legal Notices Novell, Inc., makes no representations or warranties
More informationConnection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More
Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More Quick Start Using Leostream with Citrix XenDesktop 7 and HDX Version 8.1 January 14, 2016 Contacting
More informationVeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide
VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide The software described in this book is furnished
More informationSafeNet Authentication Service
SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have
More informationUsing Kerberos Authentication in a Reverse Proxy Environment
Using Kerberos Authentication in a Reverse Proxy Environment Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat
More informationDate : June 16, 2011 Version : 1
EaseGate Guide Date : June 16, 2011 Version : 1 EaseGate Guide Copyright 2010-2011 PATRONSOFT LIMITED All rights reserved. Every effort has been made to ensure the accuracy of this guide. PATRONSOFT LIMITED
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for SonicWALL Secure Remote Access All information herein is either public information or is
More informationSecureW2 Client for Windows Administrator Guide. Version 2.2
SecureW2 Client for Windows Administrator Guide Version 2.2 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement.
More informationAuthorized Send User s Guide Version 4.0
Canon Authorized Send User s Guide Version 4.0 08011-40-UD1-003 This page is intentionally left blank. 2 Authorized Send User s Guide Contents Preface...5 How to Use This Manual... 5 Symbols Used in This
More informationAuthenticating Devices
Authenticating Devices Cisco TelePresence Deployment Guide Cisco VCS X6.1 D14819.01 May 2011 Contents Contents Document revision history... 4 Introduction... 5 Local database... 6 Configuration... 6 H.350
More informationCloud Link Configuration Guide. March 2014
Cloud Link Configuration Guide March 2014 Copyright 2014 SOTI Inc. All rights reserved. This documentation and the software described in this document are furnished under and are subject to the terms of
More informationCloud Access Manager Overview
Cloud Access Manager 8.1.3 Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationCisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.2 D14465.07 June 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
More informationMobile Admin GETTING STARTED GUIDE. Version 8.2. Last Updated: Thursday, May 25, 2017
GETTING STARTED GUIDE Mobile Admin Version 8.2 Last Updated: Thursday, May 25, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/mobile_admin/mobile_admin_documentation
More informationQuest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers
Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization
More informationCA Nimsoft Monitor for Flow Analysis
CA Nimsoft Monitor for Flow Analysis Release Notes Release 1.1 Document Revision History Document Version Date Changes 1.1 11/30/2012 Updated for Flow Analysis 1.1 release 1.0 9/29/2012 Initial version
More informationQuest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers
Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization on two separate
More informationCloud Access Manager SonicWALL Integration Overview
Cloud Access Manager 8.1.3 SonicWALL Integration Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationEthical Advocate. Anonymous Incident Reporting. Users Manual for Call Center Incident Reporting
Ethical Advocate Anonymous Incident Reporting Users Manual for Call Center Incident Reporting EA System Release 2.0 August 2006 Issue Submission System Guide- Page 1 of 7 Anonymous Incident Reporting Issue
More informationProxy Log Configuration
Stealthwatch System Proxy Log Configuration (for Stealthwatch System v6.10) Copyrights and Trademarks 2017 Cisco Systems, Inc. All rights reserved. NOTICE THE SPECIFICATIONS AND INFORMATION REGARDING THE
More informationVideoscape Distribution Suite Software Installation Guide
First Published: August 06, 2012 Last Modified: September 03, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800
More informationBlue Coat Security First Steps Solution for Controlling HTTPS
Solution for Controlling HTTPS SGOS 6.5 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks
More informationSAML SSO Okta Identity Provider 2
SAML SSO Okta Identity Provider SAML SSO Okta Identity Provider 2 Introduction 2 Configure Okta as Identity Provider 2 Enable SAML SSO on Unified Communications Applications 4 Test SSO on Okta 4 Revised:
More informationOutlook Web Access. Implementation Guide. (Version 5.4) Copyright 2012 Deepnet Security Limited
Implementation Guide (Version 5.4) Copyright 2012 Deepnet Security Limited Copyright 2012, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,
More informationCisco Prime Network Registrar IPAM 8.3 Quick Start Guide
Cisco Prime Network Registrar IPAM 8.3 Quick Start Guide Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS
More informationCisco CSPC 2.7.x. Quick Start Guide. Feb CSPC Quick Start Guide
CSPC Quick Start Guide Cisco CSPC 2.7.x Quick Start Guide Feb 2018 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 17 Contents Table of Contents 1. INTRODUCTION
More informationAppScaler SSO Active Directory Guide
Version: 1.0.3 Update: April 2018 XPoint Network Notice To Users Information in this guide is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for Tableau Server All information herein is either public information or is the property of
More informationAuthorized Send User s Guide for imagerunner Machines Version 4.1
Canon Authorized Send User s Guide for imagerunner Machines Version 4.1 08011-41-UD1-003 This page is intentionally left blank. 2 Authorized Send User s Guide for imagerunner Machines Contents Preface...5
More informationClient Proxy interface reference
McAfee Client Proxy 2.3.5 Interface Reference Guide Client Proxy interface reference These tables provide information about the policy settings found in the Client Proxy UI. Policy Catalog On the McAfee
More informationCisco Meeting Management
Cisco Meeting Management Cisco Meeting Management 1.1 User Guide for Administrators September 19, 2018 Cisco Systems, Inc. www.cisco.com Contents 1 Introduction 4 1.1 The software 4 2 Deployment overview
More informationProduct overview. McAfee Web Protection Hybrid Integration Guide. Overview
McAfee Web Protection Hybrid Integration Guide Product overview Overview The McAfee Web Protection hybrid solution is the integration of McAfee Web Gateway and McAfee Web Gateway Cloud Service (McAfee
More informationGUIDE for Authentication
R3000 Enterprise Filter USER GUIDE for Authentication Model: R3000 Release 2.0.10 Manual Version 1.02 ii 8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE R3000 ENTERPRISE FILTER AUTHENTICATION
More informationTesting and Restoring the Nasuni Filer in a Disaster Recovery Scenario
Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.8 April 2017 Last modified: July 17, 2017 2017 Nasuni Corporation All Rights Reserved Document Information Testing Disaster
More informationGroup Calendar IBM. Installation and Configuration Manual. OnTime Group Calendar Exchange appendum Version 5.4.x
Group Calendar IBM Installation and Configuration Manual OnTime Group Calendar Exchange appendum Version 5.4.x IntraVision ApS, 1997-2018 Trademarks OnTime is a registered community trademark (#004918124).
More informationDeploying the hybrid solution
Deployment Guide McAfee Web Protection Hybrid Deploying the hybrid solution A McAfee Web Protection license provides all components needed to set up McAfee Web Gateway and McAfee Web Gateway Cloud Service
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationTROUBLESHOOTING GUIDE. HYCU Data Protection for Nutanix
TROUBLESHOOTING GUIDE HYCU Data Protection for Nutanix Version: 3.0.0 Product release date: April 2018 Document release date: April 2018 Legal notices Copyright notice 2017 2018 HYCU. All rights reserved.
More informationDIGIPASS Authentication to Citrix XenDesktop with endpoint protection
DIGIPASS Authentication to Citrix XenDesktop with endpoint protection SmartAccess Configuration with Digipass INTEGRATION GUIDE Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information
More informationHP Load Balancing Module
HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-4218 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard
More informationQuest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers
Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization on two separate
More informationJetAdvice Manager Data Collector v Date:
JetAdvice Manager Data Collector v. 2.2 Date: 12-6-2017 NOTE The information contained in this document is subject to change without notice. EuroForm makes no warranty of any kind with regard to this material,
More informationGB-OS. Certificate Management. Tel: Fax Web:
GB-OS Certificate Management GBOSCM201411-01 Global Technology Associates 3505 Lake Lynda Drive Suite 115 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com Web: www.gta.com
More informationInstalling the Shrew Soft VPN Client
Windows Install Installing the Shrew Soft VPN Client ShrewVPNWindows201211-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:
More informationStoneGate Management Center. Release Notes for Version 5.3.2
StoneGate Management Center Release Notes for Version 5.3.2 Created: September 21, 2011 Table of Contents What s New... 3 Enhancements... 3 Fixes... 3 Other Changes... 4 System Requirements... 5 Basic
More informationNetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi
NetScaler Analysis and Reporting Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi (v4.0) Document Date: October 2016 www.goliathtechnologies.com 1 Legal Notices Goliath for
More informationDIGIPASS Authentication for O2 Succendo
DIGIPASS Authentication for O2 Succendo for IDENTIKEY Authentication Server IDENTIKEY Appliance 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 30 Disclaimer Disclaimer of
More informationQuick Start Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Quick Start Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
More informationCisco Expressway Web Proxy for Cisco Meeting Server
Cisco Expressway Web Proxy for Cisco Meeting Server Deployment Guide First Published: December 2016 Last Updated: December 2017 Expressway X8.10 Cisco Systems, Inc. www.cisco.com Preface Preface Change
More informationSymantec Desktop and Laptop Option 8.0 SP2. Symantec Desktop Agent for Mac. Getting Started Guide
Symantec Desktop and Laptop Option 8.0 SP2 Symantec Desktop Agent for Mac Getting Started Guide Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation
More informationNimsoft Monitor. exchange_response Guide. v2.5 series
Nimsoft Monitor exchange_response Guide v2.5 series Legal Notices Copyright 2014, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being
More informationCisco Single VCS Control - Basic Configuration
Cisco Single VCS Control - Basic Configuration Deployment Guide First Published: September 2009 Last Updated: November 2015 Cisco VCS X8.7 Cisco Systems, Inc. www.cisco.com Introduction The Cisco TelePresence
More informationCisco TelePresence Video Communication Server Basic Configuration (Single VCS Control)
Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control) Deployment Guide Cisco VCS X8.2 D14524.05 June 2014 Contents Introduction 3 Example network deployment 3 Network elements
More informationInstallation and Configuration Guide
Installation and Configuration Guide h-series 800-782-3762 www.edgewave.com 2001 2011 EdgeWave Inc. (formerly St. Bernard Software). All rights reserved. The EdgeWave logo, iprism and iguard are trademarks
More information