TRANSPARENT AUTHENTICATION GUIDE

Size: px
Start display at page:

Download "TRANSPARENT AUTHENTICATION GUIDE"

Transcription

1 TRANSPARENT AUTHENTICATION GUIDE Webwasher Web Gateway Security e Version 6.0 and higher

2 Part Number: A All Rights Reserved, Published and Printed in Germany 2007 Secure Computing Corporation. This document may not, in whole or in part, be copied, photocopied, reproduced, translated, or reduced to any electronic medium or machine-readable form without prior consent in writing from Secure Computing Corporation. Every effort has been made to ensure the accuracy of this manual. However, Secure Computing Corporation, makes no warranties with respect to this documentation and disclaims any implied warranties of merchantability and fitness for a particular purpose. Secure Computing Corporation shall not be liable for any error or for incidental or consequential damages in connection with the furnishing, performance, or use of this manual or the examples herein. The information in this document is subject to change without notice. Webwasher, MethodMix, AV PreScan, Live Reporting, Content Reporter, ContentReporter, Real-Time Classifier are all trademarks or registered trademarks of Secure Computing Corporation in Germany and/or other countries. Microsoft, Windows NT, Windows 2000 are registered trademarks of Microsoft Corporation in the United States and/or other countries. McAfee is a business unit of Network Associates, Inc. CheckPoint, OPSEC, and FireWall-1 are trademarks or registered trademarks of CheckPoint Software Technologies Ltd. or its affiliates. Sun and Solaris are trademarks or registered trademarks of Sun Microsystems, Inc. in the United States and other countries. Squid is copyrighted by the University of California, San Diego. Squid uses some code developed by others. Squid is Free Software, licensed under the terms of the GNU General Public License. NetCache is a registered trademark of Network Appliances, Inc. in the United States and other countries. Linux is a registered trademark of Linus Torvalds. Other product names mentioned in this guide may be trademarks or registered trademarks of their respective companies and are the sole property of their respective manufacturers. Secure Computing Corporation Webwasher A Secure Computing Brand Vattmannstrasse 3, Paderborn, Germany Phone: +49 (0) Fax: +49 (0) info@webwasher.com European Hotline Phone: +49 (0) US Hotline Phone: ,

3 Contents Chapter 1 Introduction Chapter 2 On Authentication Chapter 3 Deployment Planning and Configuration Deployment Scenarios Configuration Steps i

4

5 Introduction Chapter 1 This document provides information on the use of transparent authentication under Webwasher. The information applies to version 6.0 and higher versions of Webwasher. Successful authentication means that a proxy or server knows the user who requested access to an object. A concept related to authentication is policy mapping, but while authentication establishes who requested a resource, policy mapping is used to decide how this request will be handled, i. e. what security policy is applied to it. Usually, authentication is a prerequisite for policy mapping. This document explains some basic concepts of the authentication process, see Chapter 2. Furthermore, it describes some deployment scenarios and the configuration steps required for setting up transparent authentication under Webwasher, see Chapter

6

7 On Authentication Chapter 2 This chapter explains a number of basic concepts to enable a better understanding of what happens when you are setting up authentication under Webwasher. Credential Retrieval Methods There are several methods for retrieving user credentials from a client that sent a request. Note that these methods should be seen independently from the methods chosen for verification of the credentials. The following retrieval methods are dealt with in this document: Basic The client sends the combined user name and password as request header in base64-encoded format to the destination, e. g. to the proxy or server. Integrated The integrated method is a challenge/response technique that does not allow to recover a password from a sniffed connection. The password hash will be hashed with two random values, one chosen by the client and one by the server. This means that three steps are required to complete the authentication procedure. Login Page Under this method, the proxy/server sends an HMTL page to let the user submit a user name and password. This will then be treated as a regular request. 2 1

8 On Authentication Credential Verification Methods After a proxy or a server has retrieved the credentials of a user, there are several methods for verifying them and retrieving the additional user information (group membership) that is needed in order to do policy mapping: NTLM Submitting a query to a Windows domain controller This requires that Webwasher is running on a Windows server, or the use of the NTLM Agent running on a separate server. LDAP Submitting a query to an LDAP server Webwasher User Database Looking up user data in the Webwasher User Database This database runs on every supported platform and does not require the use of additional servers. Authentication Authentication is credential retrieval plus credential verification. A graphical representation of the authentication procedure including both these parts is provided by the diagrams shown below. The procedure starts after the proxy/server has indicated that authentication is required. The bold arrows inside the credential retrieval diagram show how many steps are required between the client and proxy/server in order to transmit the credentials: 2 2

9 On Authentication Proxy Authentication vs. Transparent Authentication Authentication procedures may also differ with regard to whether they are done as Proxy Authentication or Transparent Authentication. There are two main features that distinguish these authentication methods: 1. With proxy authentication, you need to configure the browser on the client to use the proxy server. 2. With proxy authentication each request or connection (when the integrated method of retrieving credentials is applied) is authenticated. This means that a request or connection is mapped to a user. With transparent authentication under Webwasher, the mapping is done between an IP address and a user. Note that it is not possible with this authentication method to distinguish between multiple users on a single system. The following diagram shows the various steps that are completed when transparent authentication is used: A user requests a URL (1) and the ICAP client forwards this request to the ICAP server (2). If the ICAP server is unable to map the IP address of the client to a user name (3, 4), it starts the authentication process. 2 3

10 On Authentication Instead of filtering the request (in REQMOD or RESPMOD communication mode), it sends a redirect that points to the authentication server (5, 6). This server, which is identical with the ICAP server under Webwasher, uses the configured credential retrieval and verification methods to obtain a user name and group membership (7). This information is assigned to an IP address and distributed in the Webwasher cluster as required. Depending on the chosen methods, this procedure will not be visible to the user and does not require any user interaction. After authentication has been successfully achieved, the authentication server sends another redirect to the original URL (8). By following this redirect, the client requests the URL once again (9), and the usual data flow (10-14) will go on now because the user has been authenticated. 2 4

11 Chapter 3 Deployment Planning and Configuration This chapter introduces two scenarios for using transparent authentication, see 3.1. Furthermore, it describes in detail the steps required under Webwasher to configure this authentication method, see Deployment Scenarios There are at least two scenarios where it would make sense to use transparent authentication in a Webwasher configuration: 1. Clients use Webwasher as proxy and authentication is done using LDAP, or NTLM with the basic method of credential retrieval. The disadvantage with this scenario is that the LDAP user name and password will be sent unprotected and can be sniffed at any point in the network. The security hole can be overcome by using transparent authentication, with credential retrieval performed in basic mode over an SSL-secured connection and credential verification done using an LDAP server. However, a better solution can be found here: If the user credentials are verified on an active directory, you can use the NTLM Agent, or instead of an LDAP server, you can use the integrated method of credential retrieval together with the Webwasher User Database. In the latter case, you may also use the LDAP synchronization feature to enable a smooth transition. 2. There is no proxy in your configuration, such as the Webwasher Pass-By ICAP Client, but authentication or policy mapping is required, or the proxy server (ICAP client) installed in the configuration is not capable of performing the desired authentication method. 3 1

12 Deployment Planning and Configuration 3.2 Configuration Steps This section describes the configuration steps that are required to configure transparent authentication under Webwasher. Proceed as follows: 1. Log in to the Webwasher Web interface and go to the Web Mapping tab under User Management > Policy Mapping. Note that this step is required even if you only want to configure authentication without policy mapping. 2. Set up a mapping like the one shown under 1. in the upper list if you want to do only authentication or to assign a policy that is based on the user name. A mapping like 2. should be chosen to assign a policy based on the group membership of the client. After setting up a mapping, click on the Edit rules and options button in the same line. 3 2

13 Deployment Planning and Configuration The User based Mapping (or Group based Mapping) tab appears: 3. In the User Name Location section, select Transparent Authentication from the first drop-down list to let Webwasher search for the user name in the (transparent) authenticated user database. 4. If the Input value must exist checkbox is marked in the Mapping Options section, the ICAP server will send a redirect if it does not find a user name corresponding to an IP address. 5. In the Add Rule section, add a user mapping rule, e. g. default = *, which means that only authenticated users are allowed access. 3 3

14 Deployment Planning and Configuration The next steps are required to configure the authentication server: 1. Go to the Authentication Server tab under User Management > Authentication Server. 2. In the Authentication Server Settings section, enable use of the server by marking the checkbox next to the section heading. 3. Depending on the authentication method selected in step 6, make sure the Use SSL checkbox is marked, see the description given for that step. 4. Accept the default port, which is 9094, or enter another port. 5. Accept the standard value of 120 seconds to configure how long the mapping from an IP address to a user should be valid. After this interval has expired, the ICAP server will again send a redirect for the next request and the mapping (and authentication) must be renewed. The danger in configuring a long interval here is that a user switch on one computer or a new assignment of the IP address by DHCP to another computer will not be recognized, which will lead to an inaccurate mapping. On the other hand, a short interval may increase the number of redirects that are required in the authentication process. 3 4

15 Deployment Planning and Configuration 6. In the Authentication Process section, select an authentication method. If you select more than one method, authentication is achieved if at least one of them was applied successfully. Depending on the chosen method, SSL encryption should be used for the connection between client and authentication server. To enable this, use the corresponding checkbox in the Authentication Server Settings section, see step 3. SSL encryption can be omitted if the method selected is User Database, NTLM, or NTLM Agent and if the integrated method is used to retrieve the user credentials. The method is enabled by marking the corresponding checkbox in the NTLM and NTLM-Agent Authentication Options or User Database Authentication Options section. Note that today all widely distributed browsers support this integrated method. If you want the user to submit the credentials through the login page, mar the corresponding checkbox above the methods list. The only benefit of the login page is that the user sees what happens. Credentials are entered manually, and this must be repeated every time the authentication has expired. Technically speaking, it does not make sense to use the login page since the other options are not less secure, but more comfortable. The following table provides an overview of how often the user must enter the credentials (assuming the browser process does not terminate): Basic Integrated Login Page Windows First time Never First Time + each renewal Other First Time First Time First Time + each renewal 7. The other sections on the tab are used to configure further authentication parameters. After specifying the appropriate values in all sections, click on the Apply Changes button to make your settings effective. 3 5

16 Deployment Planning and Configuration Notes on Some Pitfalls Note that there are some pitfalls that must be taken into account when setting up transparent authentication: POST requests will fail if the ICAP server sends an redirect to the authentication server. This affects, however, only the renewal of the mapping since for the browser the request was successful, and the POST body will not be sent again after the final redirect. Authentication at a server (here the authentication server) over a proxy connection. In this configuration, the Microsoft Internet Explorer will not send the credentials. Possible work-arounds: use login page configure the Internet Explorer not to use a proxy for the authentication server. Note that if Webwasher has been configured to run in a cluster, all IP addresses must be excluded. Redirection loops. A browser requests URL A. The ICAP server sends a redirect to B and the authentication server sends an redirect to A again. Firefox treats this as an endless loop and stops the request. (the Internet Explorer will not recognize the problem). To solve the problem, Webwasher appends a dummy parameter to A in the default configuration, so it is not a loop any longer (A -> B -> A2). The additional parameter will be removed in the REQMOD call. Further problems may occur when using the Pass-By ICAP Client because this client searches only for blocked requests and not for modified requests. There are many Web servers that have no problem with the additional parameter, but some will respond with a File not found error message. 3 6

User s GUIDE. Webwasher Spam Reporter Version 1.0.

User s GUIDE. Webwasher Spam Reporter Version 1.0. User s GUIDE Webwasher Spam Reporter Version 1.0 www.securecomputing.com Edition November 2006 All Rights Reserved, Published and Printed in Germany 2006 Secure Computing Corporation. This document may

More information

NETWORK INTERFACE CARDS UPGRADE GUIDE

NETWORK INTERFACE CARDS UPGRADE GUIDE NETWORK INTERFACE CARDS UPGRADE GUIDE Webwasher Web Gateway Security e www.securecomputing.com Part Number: 86-0947553-C All Rights Reserved, Published and Printed in Germany 2008 Secure Computing Corporation.

More information

QUICK CONFIGURATION GUIDE

QUICK CONFIGURATION GUIDE QUICK CONFIGURATION GUIDE Webwasher Web Gateway Security Version 6.8.1 and higher Quick Configuration Guide Webwasher Web Gateway Security 6.8.1 and higher Thank you for selecting Webwasher as your company's

More information

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book] Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document

More information

INSTALLATION AND CONFIGURATION GUIDE. Webwasher Appliances.

INSTALLATION AND CONFIGURATION GUIDE. Webwasher Appliances. INSTALLATION AND CONFIGURATION GUIDE Webwasher Appliances www.securecomputing.com Part Number: 86-0946281-B All Rights Reserved, Published and Printed in Germany 2006 Secure Computing Corporation. This

More information

Connection Broker Advanced Connections Management for Multi-Cloud Environments

Connection Broker Advanced Connections Management for Multi-Cloud Environments Connection Broker Advanced Connections Management for Multi-Cloud Environments Using Leostream with the VMware Horizon View Direct- Connection Plug-in Version 8.2 December 2017 Contacting Leostream Leostream

More information

Product Guide. McAfee Plugins for Microsoft Threat Management Gateway Software

Product Guide. McAfee Plugins for Microsoft Threat Management Gateway Software Product Guide McAfee Plugins for Microsoft Threat Management Gateway 1.4.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Management Console User Guide

Management Console User Guide Secure Web Gateway Management Console User Guide Release 10.2.0 Manual Version v 10.2.0.1 M86 SECURITY SECURE WEB GATEWAY MANAGEMENT CONSOLE USER GUIDE 2012 M86 Security All rights reserved. 828 W. Taft

More information

Partner Information. Integration Overview. Remote Access Integration Architecture

Partner Information. Integration Overview. Remote Access Integration Architecture Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration OTP Barracuda Networks Barracuda SSL VPN User Name + Security Code VIP Enterprise

More information

Authorized Send Installation and Configuration Guide Version 3.5

Authorized Send Installation and Configuration Guide Version 3.5 Canon Authorized Send Installation and Configuration Guide Version 3.5 08011-35-UD2-004 This page is intentionally left blank. 2 Authorized Send Installation and Configuration Guide Contents Preface...5

More information

One Identity Quick Connect for Base Systems 2.4. Administrator Guide

One Identity Quick Connect for Base Systems 2.4. Administrator Guide One Identity Quick Connect for Base Systems 2.4 Administrator Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Secure Web Gateway. SWG User Guide. Release Manual Version v

Secure Web Gateway. SWG User Guide. Release Manual Version v Secure Web Gateway SWG User Guide Release 10.2.0 Manual Version v 10.2.0.1 M86 SECURITY SECURE WEB GATEWAY SWG USER GUIDE 2012 M86 Security All rights reserved. 828 W. Taft Ave., Orange, CA 92865, USA

More information

Nimsoft Monitor Server

Nimsoft Monitor Server Nimsoft Monitor Server Configuration Guide v6.00 Document Revision History Version Date Changes 1.0 10/20/2011 Initial version of Nimsoft Server Configuration Guide, containing configuration and usage

More information

DIGIPASS Authentication for Check Point VPN-1

DIGIPASS Authentication for Check Point VPN-1 DIGIPASS Authentication for Check Point VPN-1 With IDENTIKEY Server 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 36 Disclaimer Disclaimer of Warranties and Limitations

More information

Copyright 2015 YEALINK NETWORK TECHNOLOGY CO., LTD.

Copyright 2015 YEALINK NETWORK TECHNOLOGY CO., LTD. Copyright Copyright 2015 YEALINK NETWORK TECHNOLOGY CO., LTD. Copyright 2015 Yealink Network Technology CO., LTD. All rights reserved. No parts of this publication may be reproduced or transmitted in any

More information

Application Note Using SiteManager as Web Proxy And/or Mail Relay Server

Application Note Using SiteManager as Web Proxy And/or Mail Relay Server Application Note Using SiteManager as Web Proxy And/or Mail Relay Server This guide explains how to configure a SiteManager, so devices on the Device side of it can use it to access as Web Proxy to access

More information

Cisco FindIT Plugin for Kaseya Quick Start Guide

Cisco FindIT Plugin for Kaseya Quick Start Guide First Published: 2017-10-23 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE

More information

Partner Information. Integration Overview Authentication Methods Supported

Partner Information. Integration Overview Authentication Methods Supported Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration F5 Networks FirePass VPN User Name - Security Code User Name - Password - Security

More information

One Identity Starling Two-Factor Desktop Login 1.0. Administration Guide

One Identity Starling Two-Factor Desktop Login 1.0. Administration Guide One Identity Starling Two-Factor Desktop Login 1.0 Administration Guide Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

How to configure SecureW2

How to configure SecureW2 How to configure SecureW2 Disclaimer The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement. Copyright Notice

More information

Novell Access Manager

Novell Access Manager Quick Start AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 June 11, 2010 www.novell.com Novell Access Manager 3.1 SP2 Quick Start Legal Notices Novell, Inc., makes no representations or warranties

More information

Installing the SSL Client for Mac

Installing the SSL Client for Mac Mac Install Installing the SSL Client for Mac SSLMac201211-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have

More information

GTA SSL Client & Browser Configuration

GTA SSL Client & Browser Configuration GB-OS Version 6.2 GTA SSL Client & Browser Configuration SSL201607-01 Global Technology Associates 3361 Rouse Rd, Suite 240 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com

More information

Veritas Desktop and Laptop Option 9.2

Veritas Desktop and Laptop Option 9.2 1. Veritas Desktop and Laptop Option 9.2 Quick Reference Guide for DLO Installation and Configuration 24-Jan-2018 Veritas Desktop and Laptop Option: Quick Reference Guide for DLO Installation and Configuration.

More information

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7

Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Blue Coat ProxySG First Steps Solution for Controlling HTTPS SGOS 6.7 Legal Notice Copyright 2018 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the

More information

DameWare Server. Administrator Guide

DameWare Server. Administrator Guide DameWare Server Administrator Guide About DameWare Contact Information Team Contact Information Sales 1.866.270.1449 General Support Technical Support Customer Service User Forums http://www.dameware.com/customers.aspx

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

By Anthony di Donato. Citrix Systems, Inc.

By Anthony di Donato. Citrix Systems, Inc. How to install NFuse Components and Web Extensions on the same Server? By Anthony di Donato Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION

More information

This Readme describes the NetIQ Access Manager 3.1 SP5 release.

This Readme describes the NetIQ Access Manager 3.1 SP5 release. NetIQ Access Manager 3.1 SP5 Readme January 2013 This Readme describes the NetIQ Access Manager 3.1 SP5 release. Section 1, What s New, on page 1 Section 2, Upgrading or Migrating to Access Manager 3.1

More information

UNIBOX. An Intelligent Network Controller. Knowledge Base: Billing Module

UNIBOX. An Intelligent Network Controller. Knowledge Base: Billing Module UNIBOX An Intelligent Network Controller Knowledge Base: Billing Module Copyright 2013 Wifi-soft Solutions Pvt. Ltd. All rights reserved. The information contained herein is subject to change without notice.

More information

Vital Security Supported Topologies

Vital Security Supported Topologies Vital Security Supported Topologies Software Release 9.0 Vital Security Supported Topologies Copyright Copyright 1996-2008. Finjan Software Inc. and its affiliates and subsidiaries ( Finjan ). All rights

More information

Symantec Ghost Solution Suite Web Console - Getting Started Guide

Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.

More information

Recovery Guide for Cisco Digital Media Suite 5.4 Appliances

Recovery Guide for Cisco Digital Media Suite 5.4 Appliances Recovery Guide for Cisco Digital Media Suite 5.4 Appliances September 17, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408

More information

Office 365 Best Practices: Protocols

Office 365 Best Practices:  Protocols Office 365 Best Practices: Email Protocols VERSION 9: 08/11/17 Office 365 Integration: Email Protocols/Page 2 Skype/Lync Integration/Page 3 Copyrights Copyright 2016 Symantec Corp. All rights reserved.

More information

Authenticating Cisco VCS accounts using LDAP

Authenticating Cisco VCS accounts using LDAP Authenticating Cisco VCS accounts using LDAP Cisco TelePresence Deployment Guide Cisco VCS X6 D14526.04 February 2011 Contents Contents Document revision history... 3 Introduction... 4 Usage... 4 Cisco

More information

V iew Direct- Connection Plug-In. The Leostream Connection Broker. Advanced Connection and Capacity Management for Hybrid Clouds

V iew Direct- Connection Plug-In. The Leostream Connection Broker. Advanced Connection and Capacity Management for Hybrid Clouds V iew Direct- Connection Plug-In The Leostream Connection Broker Advanced Connection and Capacity Management for Hybrid Clouds Version 9.0 June 2018 f Contacting Leostream Leostream Corporation http://www.leostream.com

More information

Access Manager 3.2 Service Pack 2 IR1 resolves several previous issues.

Access Manager 3.2 Service Pack 2 IR1 resolves several previous issues. Access Manager 3.2 Service Pack 2 IR1 Readme September 2013 Access Manager 3.2 Service Pack 2 IR1 resolves several previous issues. Many of these improvements were made in direct response to suggestions

More information

Proxy Log Configuration

Proxy Log Configuration Stealthwatch System Proxy Log Configuration (for Stealthwatch System v6.10.x) Copyrights and Trademarks 2018 Cisco Systems, Inc. All rights reserved. NOTICE THE SPECIFICATIONS AND INFORMATION REGARDING

More information

Contains the Linux Identity Server, the Linux Administration Console, the ESP-enabled SSL VPN Server, and the Traditional SSL VPN Server.

Contains the Linux Identity Server, the Linux Administration Console, the ESP-enabled SSL VPN Server, and the Traditional SSL VPN Server. NetIQ Access Manager 3.2 IR1 Readme July 2012 This Readme describes the NetIQ Access Manager 3.2 IR1 release. Section 1, Upgrading to Access Manager 3.2 IR1, on page 1 Section 2, Issues Fixed, on page

More information

Proofpoint Threat Response

Proofpoint Threat Response Proofpoint Threat Response Threat Response Auto Pull (TRAP) - Installation Guide Proofpoint, Inc. 892 Ross Drive Sunnyvale, CA 94089 United States Tel +1 408 517 4710 www.proofpoint.com Copyright Notice

More information

Authorized Send User s Guide Version 3.5

Authorized Send User s Guide Version 3.5 Canon Authorized Send User s Guide Version 3.5 08011-35-UD1-004 This page is intentionally left blank. 2 Authorized Send User s Guide Contents Preface...5 How to Use This Manual... 5 Symbols Used in This

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization

More information

DIGIPASS Authentication for Check Point VPN-1

DIGIPASS Authentication for Check Point VPN-1 DIGIPASS Authentication for Check Point VPN-1 With Vasco VACMAN Middleware 3.0 2007 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 51 Disclaimer Disclaimer of Warranties and

More information

Configuring Symantec Protection Engine for Network Attached Storage. Dell FluidFS 5.0

Configuring Symantec Protection Engine for Network Attached Storage. Dell FluidFS 5.0 Configuring Symantec Protection Engine for Network Attached Storage Dell FluidFS 5.0 Contents Abstract... 2 About software component... 2 How does FluidFS antivirus protect data on FluidFS cluster... 2

More information

Cisco Expressway Authenticating Accounts Using LDAP

Cisco Expressway Authenticating Accounts Using LDAP Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4

More information

Novell Access Manager

Novell Access Manager Setup Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 Setup Guide Legal Notices Novell, Inc., makes no representations or warranties

More information

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More

Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More Connection Broker Managing User Connections to Workstations and Blades, OpenStack Clouds, VDI, and More Quick Start Using Leostream with Citrix XenDesktop 7 and HDX Version 8.1 January 14, 2016 Contacting

More information

VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide

VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide VeriSign Managed PKI for SSL and Symantec Protection Center Integration Guide The software described in this book is furnished

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Push OTP Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have

More information

Using Kerberos Authentication in a Reverse Proxy Environment

Using Kerberos Authentication in a Reverse Proxy Environment Using Kerberos Authentication in a Reverse Proxy Environment Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat

More information

Date : June 16, 2011 Version : 1

Date : June 16, 2011 Version : 1 EaseGate Guide Date : June 16, 2011 Version : 1 EaseGate Guide Copyright 2010-2011 PATRONSOFT LIMITED All rights reserved. Every effort has been made to ensure the accuracy of this guide. PATRONSOFT LIMITED

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for SonicWALL Secure Remote Access All information herein is either public information or is

More information

SecureW2 Client for Windows Administrator Guide. Version 2.2

SecureW2 Client for Windows Administrator Guide. Version 2.2 SecureW2 Client for Windows Administrator Guide Version 2.2 The software described in this document is furnished under a license agreement and may be used only in accordance with the terms of the agreement.

More information

Authorized Send User s Guide Version 4.0

Authorized Send User s Guide Version 4.0 Canon Authorized Send User s Guide Version 4.0 08011-40-UD1-003 This page is intentionally left blank. 2 Authorized Send User s Guide Contents Preface...5 How to Use This Manual... 5 Symbols Used in This

More information

Authenticating Devices

Authenticating Devices Authenticating Devices Cisco TelePresence Deployment Guide Cisco VCS X6.1 D14819.01 May 2011 Contents Contents Document revision history... 4 Introduction... 5 Local database... 6 Configuration... 6 H.350

More information

Cloud Link Configuration Guide. March 2014

Cloud Link Configuration Guide. March 2014 Cloud Link Configuration Guide March 2014 Copyright 2014 SOTI Inc. All rights reserved. This documentation and the software described in this document are furnished under and are subject to the terms of

More information

Cloud Access Manager Overview

Cloud Access Manager Overview Cloud Access Manager 8.1.3 Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.2 D14465.07 June 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

Mobile Admin GETTING STARTED GUIDE. Version 8.2. Last Updated: Thursday, May 25, 2017

Mobile Admin GETTING STARTED GUIDE. Version 8.2. Last Updated: Thursday, May 25, 2017 GETTING STARTED GUIDE Mobile Admin Version 8.2 Last Updated: Thursday, May 25, 2017 Retrieve the latest version from: https://support.solarwinds.com/success_center/mobile_admin/mobile_admin_documentation

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery for Windows and Quest Foglight vapp Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization

More information

CA Nimsoft Monitor for Flow Analysis

CA Nimsoft Monitor for Flow Analysis CA Nimsoft Monitor for Flow Analysis Release Notes Release 1.1 Document Revision History Document Version Date Changes 1.1 11/30/2012 Updated for Flow Analysis 1.1 release 1.0 9/29/2012 Initial version

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization on two separate

More information

Cloud Access Manager SonicWALL Integration Overview

Cloud Access Manager SonicWALL Integration Overview Cloud Access Manager 8.1.3 SonicWALL Integration Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Ethical Advocate. Anonymous Incident Reporting. Users Manual for Call Center Incident Reporting

Ethical Advocate. Anonymous Incident Reporting. Users Manual for Call Center Incident Reporting Ethical Advocate Anonymous Incident Reporting Users Manual for Call Center Incident Reporting EA System Release 2.0 August 2006 Issue Submission System Guide- Page 1 of 7 Anonymous Incident Reporting Issue

More information

Proxy Log Configuration

Proxy Log Configuration Stealthwatch System Proxy Log Configuration (for Stealthwatch System v6.10) Copyrights and Trademarks 2017 Cisco Systems, Inc. All rights reserved. NOTICE THE SPECIFICATIONS AND INFORMATION REGARDING THE

More information

Videoscape Distribution Suite Software Installation Guide

Videoscape Distribution Suite Software Installation Guide First Published: August 06, 2012 Last Modified: September 03, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

Blue Coat Security First Steps Solution for Controlling HTTPS

Blue Coat Security First Steps Solution for Controlling HTTPS Solution for Controlling HTTPS SGOS 6.5 Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat logo are trademarks

More information

SAML SSO Okta Identity Provider 2

SAML SSO Okta Identity Provider 2 SAML SSO Okta Identity Provider SAML SSO Okta Identity Provider 2 Introduction 2 Configure Okta as Identity Provider 2 Enable SAML SSO on Unified Communications Applications 4 Test SSO on Okta 4 Revised:

More information

Outlook Web Access. Implementation Guide. (Version 5.4) Copyright 2012 Deepnet Security Limited

Outlook Web Access. Implementation Guide. (Version 5.4) Copyright 2012 Deepnet Security Limited Implementation Guide (Version 5.4) Copyright 2012 Deepnet Security Limited Copyright 2012, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID, QuickID, PocketID,

More information

Cisco Prime Network Registrar IPAM 8.3 Quick Start Guide

Cisco Prime Network Registrar IPAM 8.3 Quick Start Guide Cisco Prime Network Registrar IPAM 8.3 Quick Start Guide Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS

More information

Cisco CSPC 2.7.x. Quick Start Guide. Feb CSPC Quick Start Guide

Cisco CSPC 2.7.x. Quick Start Guide. Feb CSPC Quick Start Guide CSPC Quick Start Guide Cisco CSPC 2.7.x Quick Start Guide Feb 2018 2018 Cisco and/or its affiliates. All rights reserved. This document is Cisco Public. Page 1 of 17 Contents Table of Contents 1. INTRODUCTION

More information

AppScaler SSO Active Directory Guide

AppScaler SSO Active Directory Guide Version: 1.0.3 Update: April 2018 XPoint Network Notice To Users Information in this guide is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for Tableau Server All information herein is either public information or is the property of

More information

Authorized Send User s Guide for imagerunner Machines Version 4.1

Authorized Send User s Guide for imagerunner Machines Version 4.1 Canon Authorized Send User s Guide for imagerunner Machines Version 4.1 08011-41-UD1-003 This page is intentionally left blank. 2 Authorized Send User s Guide for imagerunner Machines Contents Preface...5

More information

Client Proxy interface reference

Client Proxy interface reference McAfee Client Proxy 2.3.5 Interface Reference Guide Client Proxy interface reference These tables provide information about the policy settings found in the Client Proxy UI. Policy Catalog On the McAfee

More information

Cisco Meeting Management

Cisco Meeting Management Cisco Meeting Management Cisco Meeting Management 1.1 User Guide for Administrators September 19, 2018 Cisco Systems, Inc. www.cisco.com Contents 1 Introduction 4 1.1 The software 4 2 Deployment overview

More information

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview

Product overview. McAfee Web Protection Hybrid Integration Guide. Overview McAfee Web Protection Hybrid Integration Guide Product overview Overview The McAfee Web Protection hybrid solution is the integration of McAfee Web Gateway and McAfee Web Gateway Cloud Service (McAfee

More information

GUIDE for Authentication

GUIDE for Authentication R3000 Enterprise Filter USER GUIDE for Authentication Model: R3000 Release 2.0.10 Manual Version 1.02 ii 8E6 TECHNOLOGIES, R3000 ENTERPRISE FILTER AUTHENTICATION USER GUIDE R3000 ENTERPRISE FILTER AUTHENTICATION

More information

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario

Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Testing and Restoring the Nasuni Filer in a Disaster Recovery Scenario Version 7.8 April 2017 Last modified: July 17, 2017 2017 Nasuni Corporation All Rights Reserved Document Information Testing Disaster

More information

Group Calendar IBM. Installation and Configuration Manual. OnTime Group Calendar Exchange appendum Version 5.4.x

Group Calendar IBM. Installation and Configuration Manual. OnTime Group Calendar Exchange appendum Version 5.4.x Group Calendar IBM Installation and Configuration Manual OnTime Group Calendar Exchange appendum Version 5.4.x IntraVision ApS, 1997-2018 Trademarks OnTime is a registered community trademark (#004918124).

More information

Deploying the hybrid solution

Deploying the hybrid solution Deployment Guide McAfee Web Protection Hybrid Deploying the hybrid solution A McAfee Web Protection license provides all components needed to set up McAfee Web Gateway and McAfee Web Gateway Cloud Service

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

TROUBLESHOOTING GUIDE. HYCU Data Protection for Nutanix

TROUBLESHOOTING GUIDE. HYCU Data Protection for Nutanix TROUBLESHOOTING GUIDE HYCU Data Protection for Nutanix Version: 3.0.0 Product release date: April 2018 Document release date: April 2018 Legal notices Copyright notice 2017 2018 HYCU. All rights reserved.

More information

DIGIPASS Authentication to Citrix XenDesktop with endpoint protection

DIGIPASS Authentication to Citrix XenDesktop with endpoint protection DIGIPASS Authentication to Citrix XenDesktop with endpoint protection SmartAccess Configuration with Digipass INTEGRATION GUIDE Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-4218 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers

Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers Quest VROOM Quick Setup Guide for Quest Rapid Recovery and Foglight Windows Installers INTRODUCTION Setup of Quest VROOM requires installation of Rapid Recovery and Foglight for Virtualization on two separate

More information

JetAdvice Manager Data Collector v Date:

JetAdvice Manager Data Collector v Date: JetAdvice Manager Data Collector v. 2.2 Date: 12-6-2017 NOTE The information contained in this document is subject to change without notice. EuroForm makes no warranty of any kind with regard to this material,

More information

GB-OS. Certificate Management. Tel: Fax Web:

GB-OS. Certificate Management. Tel: Fax Web: GB-OS Certificate Management GBOSCM201411-01 Global Technology Associates 3505 Lake Lynda Drive Suite 115 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email: info@gta.com Web: www.gta.com

More information

Installing the Shrew Soft VPN Client

Installing the Shrew Soft VPN Client Windows Install Installing the Shrew Soft VPN Client ShrewVPNWindows201211-01 Global Technology Associates 3505 Lake Lynda Drive Suite 109 Orlando, FL 32817 Tel: +1.407.380.0220 Fax. +1.407.380.6080 Email:

More information

StoneGate Management Center. Release Notes for Version 5.3.2

StoneGate Management Center. Release Notes for Version 5.3.2 StoneGate Management Center Release Notes for Version 5.3.2 Created: September 21, 2011 Table of Contents What s New... 3 Enhancements... 3 Fixes... 3 Other Changes... 4 System Requirements... 5 Basic

More information

NetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi

NetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi NetScaler Analysis and Reporting Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi (v4.0) Document Date: October 2016 www.goliathtechnologies.com 1 Legal Notices Goliath for

More information

DIGIPASS Authentication for O2 Succendo

DIGIPASS Authentication for O2 Succendo DIGIPASS Authentication for O2 Succendo for IDENTIKEY Authentication Server IDENTIKEY Appliance 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 30 Disclaimer Disclaimer of

More information

Quick Start Access Manager 3.1 SP5 January 2013

Quick Start Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Quick Start Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

Cisco Expressway Web Proxy for Cisco Meeting Server

Cisco Expressway Web Proxy for Cisco Meeting Server Cisco Expressway Web Proxy for Cisco Meeting Server Deployment Guide First Published: December 2016 Last Updated: December 2017 Expressway X8.10 Cisco Systems, Inc. www.cisco.com Preface Preface Change

More information

Symantec Desktop and Laptop Option 8.0 SP2. Symantec Desktop Agent for Mac. Getting Started Guide

Symantec Desktop and Laptop Option 8.0 SP2. Symantec Desktop Agent for Mac. Getting Started Guide Symantec Desktop and Laptop Option 8.0 SP2 Symantec Desktop Agent for Mac Getting Started Guide Disclaimer The information contained in this publication is subject to change without notice. Symantec Corporation

More information

Nimsoft Monitor. exchange_response Guide. v2.5 series

Nimsoft Monitor. exchange_response Guide. v2.5 series Nimsoft Monitor exchange_response Guide v2.5 series Legal Notices Copyright 2014, CA. All rights reserved. Warranty The material contained in this document is provided "as is," and is subject to being

More information

Cisco Single VCS Control - Basic Configuration

Cisco Single VCS Control - Basic Configuration Cisco Single VCS Control - Basic Configuration Deployment Guide First Published: September 2009 Last Updated: November 2015 Cisco VCS X8.7 Cisco Systems, Inc. www.cisco.com Introduction The Cisco TelePresence

More information

Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control)

Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control) Cisco TelePresence Video Communication Server Basic Configuration (Single VCS Control) Deployment Guide Cisco VCS X8.2 D14524.05 June 2014 Contents Introduction 3 Example network deployment 3 Network elements

More information

Installation and Configuration Guide

Installation and Configuration Guide Installation and Configuration Guide h-series 800-782-3762 www.edgewave.com 2001 2011 EdgeWave Inc. (formerly St. Bernard Software). All rights reserved. The EdgeWave logo, iprism and iguard are trademarks

More information