Project Plan EZProxy
|
|
- Melanie Mathews
- 6 years ago
- Views:
Transcription
1 Page 1 of 11: projectplan ezproxy.docx Project Plan EZProxy Contents Description... 1 Notes... 2 Installation... 3 Adding Resources To Access After Authentication... 6 Authentication Types: Restricting... 7 Authentication Types: multiple types example... 8 EZProxy URLs... 9 Resources... 9 Subject Matter Experts... 9 Definitions Modifications Description This document describes the installation of EZProxy, including configuration for using local, LDAP and Shibboleth authentication types, as well as restricting which IPs use which type. This document was produced using Version 6 (V6). See the 'Resources' section for a Visio visual of the parts.
2 Page 2 of 11: projectplan ezproxy.docx Notes Your purchase includes: A license key (WSKey) that you request from our website subscription for one year for the right to download new versions of EZproxy as they are released the right to transfer your WSKey between different platforms at any time permission to install your WSkey on non-production servers owned by your institution to test new configurations To run EZProxy, will need OCLC Web Service Key (WSKEY). WSKey will take effect immediately with no need to restart EZproxy. OCLC recommends following the outline below when implementing a new EZproxy instance Step Task Owner Notes / Other Info 1. Request WSKEY Systems Librarian / Main Contact Documentation and links to request WSKEY can be found here. 2. Process WSKEY request OCLC Orders Services Site will be notified once WSKEY is available. 3. Download executable to your server Systems Librarian / Server Admin Available here. Task assumes admin access to machine that will run EZproxy. 4. Provide the EZproxy server external IP address to all content providers Electronic Resources Librarian This is an additional IP address and should NOT replace any existing IP addresses you have on file with the provider. 5. DNS and Firewall Configuration IT/Network Team Internal and External DNS entries must be assigned to EZproxy server IP. Additionally, any ports it will use need to be open for external inbound and outbound traffic. Documentation can be found here under Initial Setup. You can test external DNS here. 6. Install and configure EZproxy Systems Librarian / Server Admin A walkthrough for each operating system is available at the download page. If not successful, confirm correct DNS and Firewall configurations are in place.
3 Page 3 of 11: projectplan ezproxy.docx 7. Configure resources Electronic Resources Librarian / Systems Librarian / Server Admin Database stanzas for resources that will be need to be added to the config.txt can be found here. If stanza is not available, first check the listserv and contact the content provider. If you still cannot locate a stanza, please contact OCLC. 8. Configure user authentication Systems Librarian / your Identity Management Team Depending on authentication method, you may need to consult and gather information from technical staff at your institution as well as adjust firewall/authentication settings to successfully configure the authentication method. 9. SSL certificate Systems Librarian / IT / Server Admin Not required for all resources but strongly recommended. Please review all related documentation before acquiring a cert and contact OCLC if you still have questions. 10. Testing Electronic Resources Librarian / misc. staff During this time you, change all links to e-resources on your institution s webpages to starting point URLs. These pages could include but are not limited to: A-to- Z lists, LibGuides, 856 links, course management systems, etc. 11. Managing EZproxy System Librarian / Electronic Resources Librarian / Server Admin This includes but is not limited to: security, login page customizations, log files, updates, server migrations, and SSL cert renewal. Installation Note: in adding lines to the config.txt and user.txt, it does not seem to matter the location where you put the lines. In our case, we placed the lines in sections near other similar information, like SSL near other SSL settings, and in user.txt, we placed settings at the end. Note: it is assumed you want to use SSL connections only and so these installation steps end up disabling port 80/non-SSL connections. Request WSKey o Create OCLC account o
4 Page 4 of 11: projectplan ezproxy.docx o Instructions for requesting WSKey o [website] click tab: Develop o [develop] click: Manage your API Keys o [manage API keys] click: Request a WSKey o [request a WSKey][Environment] change to: Production o [request a WSKey][Services] check: EZProxy o [request a WSKey][WSKey Name] enter name, ex: lccezproxywskey o [request a WSKey][What is the reason...] enter Institution Name, ex: o [request a WSKey][Registry ID] enter value (provided by OCLC ?) o [request a WSKey][Symbol] enter value (provided by OCLC ?) o [request a WSKey][Redirect URI] [skip] o [request a WSKey][Usage] [skip] o [request a WSKey][Terms and Conditions] click: I agree... o [request a WSKey] click: Create Request (should receive 'Successfully submitted...') o OCLC doc says it will take 1-2 days to process o Once you receive, you only need to copy/paste the key, not the Secret Download installation program o o ex: exproxy-windows.exe Configure internal/external DNS to EZProxy IP create folder on drive 'ezproxy' copy installation exe (ezproxy-windows.exe) into that folder rename ezproxy-windows.exe to ezproxy.exe from command prompt, run: ezproxy.exe -m Allow windows firewall exception for Ezproxy Edit config.txt and add line after "# Name My.ezproxy.server" o Name [your URL], ex: ezproxy.ourcollege.edu Edit config.txt and remove remark character '#' from line "# LoginPortSSL 443" o LoginPortSSL 443 Test connection works, use command: ezproxy -c Edit user.txt and add line for testing Install WSKey by supplying the WSKey value provided in the command, replacing "[...]" with your key value: ezproxy -k [...] run: ezproxy.exe
5 Page 5 of 11: projectplan ezproxy.docx Test using non-https, ex: Turning on SSL with a CA certificate o Click: Manage SSL (https) certificates o Click: Import Existing SSL Certificate o Paste public (CER) text from your CA certificate in first box (Certificate) o Paste private key (Key) text from your CA certificate in second box (Key) To export private key/public certificate from PFX (using OpenSSL): openssl pkcs12 -in certname.pfx -nocerts -out key.pem -nodes openssl pkcs12 -in certname.pfx -nokeys -out cert.pem openssl rsa -in key.pem -out server.key o Type ACTIVE in the ACTIVE box and click 'activate' To install as Service, run Command Prompt As Administrator, run: ezproxy.exe -si o Note: we found it handy to just run EZProxy from command line with 'ezproxy.exe' to look for any errors/etc, then add it as server once it was running smooth. Then start the service: NET START EZProxy To remove the service, run: ezproxy.exe -sr To set LDAP authentication, use link Test LDAP o Bind user: full account for connecting to AD, ex: ouruser@ourcollege.edu o Bind password:... o LDAP Version check: 3 o Host: we used the IP of a DC o Search Base: DC=ourcollege,DC=edu o Search Attribute: samaccountname o Test user: jdoe (do not include domain portion, 'jdoe' is just an example) o Test password:... o Click: search (should see AD attributes for that user) o Copy the lines at the bottom use the "To use this LDAP search with EZProxy..." that start with "::LDAP", until /LDAP o In user.txt Paste the ::LDAP to /LDAP lines Example: ::LDAP BindUser [user for querying AD]@ourcollege.edu BindPassword -Obscure [...] URL ldap://[your DC]/DC=ourcollege,DC=edu?sAMAccountName?sub?(objectClass=person)
6 Page 6 of 11: projectplan ezproxy.docx IfUnauthenticated; Stop /LDAP Note: to allow IT to still use the EZProxy admin console, we recommend using the steps detailed in the 'Restricting Authentication Types' section. To set Shibboleth authentication o Copy your Shibboleth Metadata file into the same folder as the ezproxy.exe o In config.txt Create this section ShibbolethMetadata \ -EntityID= idp url]/idp/shibboleth \ -File=idp1MetaData.xml \ [-Cert=1 \] [-URL= idp url]/idp/shibboleth \] o In user.txt Create this section ::Shibboleth IDP13 /Shibboleth Note: to allow IT to still use the EZProxy admin console, we recommend using the steps detailed in the 'Restricting Authentication Types' section. o Restart EZproxy o Click on Manage Shibboleth Click EZproxy Metadata Copy file to your IdP Shibboleth server in the folder C:\Program Files (x86)\shibboleth\idp\metadata o On your IdP Shibboleth server In metadata-provider.xml, add this section: <MetadataProvider id="ezproxy" xsi:type="filesystemmetadataprovider" metadatafile="%{idp.home}/metadata/ezproxy-sp-metadata.xml" /> Provide EZProxy external IP to all content providers Adding Resources To Access After Authentication
7 Page 7 of 11: projectplan ezproxy.docx There are many attributes that can be used to define a resource (see the Resources section for the EZProxy Manual link). These are the basic ones that should be used: Title: Name of the resource to show on the../menu page after authentication, if no resource URL originally provided by the request URL: what URL serves the resource, is proxied DomainJavaScript: what JavaScript references to replace EZProxy rewrites links, including JavaScript resources/etc. when proxying a resource. Just add as many resources as desired inside the config.txt file, within the 'Database Definitions' section. Example: Title Alma URL DomainJavaScript ourcollege.alma.somegroup.com Once you have resources (aka databases) defined, you can create links directly to the EZProxy login for that resource, so that after authentication, the user is routed to that resource. This URL is an example of logging into the Example resource above. If you want users to get a 'list' of resources after log-in that they can choose from, provide a link in the following syntax: Authentication Types: Restricting To restrict certain authentication types, you can include either 'IfIP' or "Not IfIP' to allow or block an authentication type from being used. IfIP Syntax: IfIP [first IP],[other IPs]; Stop Not IfIP Syntax: Not IfIP [first IP],[other IPs]; Stop
8 Page 8 of 11: projectplan ezproxy.docx The above lines tell EZProxy, if IP matches condition, then 'stop' evaluating this section. Example: avoiding Shibboleth authentication on computers you want to be able to log into the 'admin' EZProxy portal using the 'user.txt' credentials. This would prevent IP and from using Shibboleth: ::Shibboleth IfIP , ; Stop IDP13 /Shibboleth Authentication Types: multiple types example This configuration shows how to have multiple authentication types, i.e. local, LDAP and Shibboleth, restricting what IPs can use what type, and who is/is not an admin after authentication. In this example, the following conditions will happen: local o a local account (in the config.txt) is defined o it only becomes an admin when used through specific IPs LDAP o only available to a single IP o if authenticated, becomes an admin Shibboleth o disabled for three IPs, but, allowed on all others In this example, the IPs listed are as follows: : local to the EZProxy server : public IP to the EZProxy server : a remote IT Admin workstation Not IfIP , ; Stop ourlocaluser:ourlocalpassword:ip= ; ,admin ::LDAP Not IfIP ; Stop BindUser ouruser@ourcollege.edu
9 Page 9 of 11: projectplan ezproxy.docx BindPassword -Obscure... URL ldap://ourdc/dc=ourcollege,dc=edu?samaccountname?sub?(objectclass=person) IfUnauthenticated; Stop admin /LDAP ::Shibboleth IfIP , , ; Stop IDP13 /Shibboleth EZProxy URLs Some common URLs within EZProxy. Admin Console Login List Of Link Resources After Logged In Resources Subject Matter Experts David Mielcarek dmielcarek@lowercolumbia.edu
10 Page 10 of 11: projectplan ezproxy.docx projectplan ezproxy-flow.pdf Details a visual flow of the parts. EZProxy Product Site EZProxy Reference Manual EZProxy Download/Install EZProxy LDAP Configuration EZProxy config.txt URL correction Default config.txt has this URL: the correct URL is: EZProxy [ur]/menu URL correction Default [url]/menu has this URL: the correct URL is: Shibboleth IdP/SP Installation Definitions CA - Certificate Authority EZProxy - Proxy resources for end users
11 Page 11 of 11: projectplan ezproxy.docx SSL - Secure Socket Layer WSKEY - OCLC Web Service Key Modifications NAME DATE MODIFICATION David Mielcarek 5/24/2017 Created David Mielcarek 6/6/2017 Removed disabling non-ssl port, as EZProxy uses non- SSL on redirection after authentication David Mielcarek 6/7/2017 Added corrected config.txt URL from oclc.org support staff End of document
EZproxy v6.3.5 Release Notes
EZproxy v6.3.5 Release Notes Release Date: November 2017 Last updated: November 20, 2017 Table of Contents Operating System Requirements... 2 Recommended Actions... 2 Release Notes... 3 Administrative
More informationUser guide NotifySCM Installer
User guide NotifySCM Installer TABLE OF CONTENTS 1 Overview... 3 2 Office 365 Users synchronization... 3 3 Installation... 5 4 Starting the server... 17 2 P a g e 1 OVERVIEW This user guide provides instruction
More informationVMware Identity Manager Connector Installation and Configuration (Legacy Mode)
VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until
More informationInstalling and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.
Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on
More informationAbout the Citrix Usage Collector (versions 1.0 and 1.0.1)
About the Citrix Usage Collector (versions 1.0 and 1.0.1) Apr 03, 2015 The Citrix Usage Collector collects and reports billable license consumption for Citrix Service Providers directly to Citrix. You
More informationHow to Configure Authentication and Access Control (AAA)
How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual
More informationWorkspace ONE UEM Notification Service. VMware Workspace ONE UEM 1811
Workspace ONE UEM Email Notification Service VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationHave documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
VMware AirWatch Email Notification Service Installation Guide Providing real-time email notifications to ios devices with AirWatch Inbox and VMware Boxer Workspace ONE UEM v9.7 Have documentation feedback?
More informationHow to Configure SSL Interception in the Firewall
Most applications encrypt outgoing connections with SSL or TLS. SSL Interception decrypts SSL-encrypted traffic to allow Application Control features (such as the Virus Scanner, ATD, URL Filter, Safe Search,
More informationVMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018
VMWARE HORIZON CLOUD WITH VMWARE IDENTITY MANAGER QUICK START GUIDE WHITE PAPER MARCH 2018 Table of Contents Introduction to Horizon Cloud with Manager.... 3 Benefits of Integration.... 3 Single Sign-On....3
More informationHave documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
VMware AirWatch Email Notification Service Installation Guide Providing real-time email notifications to ios devices with AirWatch Inbox and VMware Boxer Workspace ONE UEM v9.4 Have documentation feedback?
More informationWatchGuard XCS and Outlook Web Access 2013
WatchGuard XCS and Outlook Web Access 2013 The Secure WebMail proxy provides a highly secure mechanism for accessing Microsoft OWA (Outlook Web Access). OWA uses a very similar interface to Outlook and
More informationPrescription Monitoring Program Information Exchange. RxCheck State Routing Service. SRS Installation & Setup Guide
Prescription Monitoring Program Information Exchange RxCheck State Routing Service SRS Installation & Setup Guide Delivery On: Version: July 2018 2.0 Prepared By: Sponsored By: IJIS Institute Tetrus Corp
More informationADMINISTRATOR'S MANUAL
ADMINISTRATOR'S MANUAL The Integrated Cross-Selling and Prospecting Application ATraC Services, LLC Version 2.3.4 June 2014 View online at http://atracservices.com/protrac Contact ProTraC Support 855-Get-ATraC
More informationOkta Integration Guide for Web Access Management with F5 BIG-IP
Okta Integration Guide for Web Access Management with F5 BIG-IP Contents Introduction... 3 Publishing SAMPLE Web Application VIA F5 BIG-IP... 5 Configuring Okta as SAML 2.0 Identity Provider for F5 BIG-IP...
More informationUC for Enterprise (UCE) NEC Centralized Authentication Service (NEC CAS)
UC for Enterprise (UCE) NEC Centralized Authentication Service (NEC CAS) Installation Guide NEC NEC Corporation October 2010 NDA-30362, Revision 15 Liability Disclaimer NEC Corporation reserves the right
More informationQuick Connection Guide
WebEx Connector Version 1.0.1 Quick Connection Guide 2014 Ping Identity Corporation. All rights reserved. PingFederate WebEx Connector Quick Connection Guide Version 1.0.1 March, 2014 Ping Identity Corporation
More informationHow to Setup Total Application Security
How to Setup Total Application Security TABLE OF CONTENTS Access Total Application Security on AWS Marketplace... 2 Configuring Total Application Security... 12 Total Application Security Portal Access...
More information2 Oracle WebLogic Overview Prerequisites Baseline Architecture...6
Table of Contents 1 Oracle Access Manager Integration...1 1.1 Overview...1 1.2 Prerequisites...1 1.3 Deployment...1 1.4 Integration...1 1.5 Authentication Process...1 2 Oracle WebLogic...2 3 Overview...3
More informationNetBackup Collection Quick Start Guide
NetBackup Collection Quick Start Guide This whitepaper is intended for IT professionals, IT managers, and IT personnel responsible for the planning, setup, and/or administration of Veritas Information
More informationHow to Set Up External CA VPN Certificates
To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA
More informationHow to integrate CMS Appliance & Wallix AdminBastion
How to integrate CMS Appliance & Wallix AdminBastion Version 1.0 Date 24/04/2012 P 2 Table of Contents 1.0 Introduction... 3 1.1 Context and objective... 3 3.0 CMS Appliance prerequisites... 4 4.0 Certificate
More informationRSA SecurID Access SAML Configuration for Kanban Tool
RSA SecurID Access SAML Configuration for Kanban Tool Last Modified: October 4, 2016 Kanban Tool is a visual product management application based on the Kanban methodology (development) which was initially
More informationBomgar PA Integration with ServiceNow
Bomgar PA Integration with ServiceNow 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of
More informationOracle WebLogic. Overview. Prerequisites. Baseline. Architecture. Installation. Contents
Oracle WebLogic Contents 1 Overview 2 Prerequisites 3 Baseline 4 Architecture 5 Installation 5.1 Swivel Integration Configuration 5.1.1 Configuring Swivel for Agent XML Authentication 5.1.2 Configuring
More informationSAML-Based SSO Configuration
Prerequisites, page 1 SAML SSO Configuration Task Flow, page 5 Reconfigure OpenAM SSO to SAML SSO Following an Upgrade, page 9 SAML SSO Deployment Interactions and Restrictions, page 9 Prerequisites NTP
More informationIntegrating YuJa Active Learning into Google Apps via SAML
Integrating YuJa Active Learning into Google Apps via SAML 1. Overview This document is intended to guide users on how to integrate YuJa as a Service Provider (SP) using Google as the Identity Provider
More informationHave documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
VMware AirWatch Email Notification Service Installation Guide Providing real-time email notifications to ios devices with AirWatch Inbox and VMware Boxer AirWatch v9.1 Have documentation feedback? Submit
More informationCloud Access Manager Configuration Guide
Cloud Access Manager 8.1.3 Configuration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationBest Practices for Security Certificates w/ Connect
Application Note AN17038 MT AppNote 17038 (AN 17038) September 2017 Best Practices for Security Certificates w/ Connect Description: This Application Note describes the process and best practices for using
More informationVMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1
VMware Workspace ONE Quick Configuration Guide VMware AirWatch 9.1 A P R I L 2 0 1 7 V 2 Revision Table The following table lists revisions to this guide since the April 2017 release Date April 2017 June
More informationRECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for High Security SSO
July 2017 Contents Introduction...3 The Integrated Solution...3 Prerequisites...4 Configuration...4 Set up BIG-IP APM to be a SAML IdP...4 Create a self-signed certificate for signing SAML assertions...4
More informationS/MIME on Good for Enterprise MS Online Certificate Status Protocol. Installation and Configuration Notes. Updated: November 10, 2011
S/MIME on Good for Enterprise MS Online Certificate Status Protocol Installation and Configuration Notes Updated: November 10, 2011 Installing the Online Responder service... 1 Preparing the environment...
More informationIntegration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Tableau Server
SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationCA Service Desk Integration with Remote Support
CA Service Desk Integration with Remote Support 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the
More informationGoogle Apps Integration
Google Apps Integration Contents 1 Using Swivel for Google Apps Authentication 2 Prerequisites 3 Google SSO 4 Swivel and Google Apps 5 User Experience 6 Install the Swivel Google software 7 Create private
More informationVMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager
VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationDeliver and manage customer VIP POCs. The lab will be directed and provide you with step-by-step walkthroughs of key features.
SR L15 Hands-On Lab Description Protecting Corporate Networks with Symantec Validation and ID Protection At the end of this lab, you should be able to Technically present and answer questions from your
More informationVMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager
VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The
More informationMicrosoft ISA 2006 Integration. Microsoft Internet Security and Acceleration Server (ISA) Integration Notes Introduction
Microsoft ISA 2006 Integration Contents 1 Microsoft Internet Security and Acceleration Server (ISA) Integration Notes 2 Introduction 3 Prerequisites 3.1 ISA 2006 Filter 3.2 TMG Filter 4 Baseline 5 Architecture
More informationPublic Key Enabling Oracle Weblogic Server
DoD Public Key Enablement (PKE) Reference Guide Public Key Enabling Oracle Weblogic Server Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke URL: http://iase.disa.smil.mil/pki-pke Public Key Enabling
More informationInstalling AX Server with PostgreSQL (multi-server)
Installing AX Server with PostgreSQL (multi-server) Version: 13 Published: Wednesday, November 29, 2017 ACL Services Ltd. 2017 Table of contents Table of contents Table of contents 3 Introduction 7 Intended
More informationIntegration Guide. SafeNet Authentication Service. Protecting SugarCRM with SAS
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for Tableau Server All information herein is either public information or is the property of
More informationUpgrade Instructions. NetBrain Integrated Edition 7.1. Two-Server Deployment
NetBrain Integrated Edition 7.1 Upgrade Instructions Two-Server Deployment Version 7.1a Last Updated 2018-09-04 Copyright 2004-2018 NetBrain Technologies, Inc. All rights reserved. Contents 1. Upgrading
More informationUpland Qvidian Proposal Automation Single Sign-on Administrator's Guide
Upland Qvidian Proposal Automation Single Sign-on Administrator's Guide Version 12.0-4/17/2018 Copyright Copyright 2018 Upland Qvidian. All rights reserved. Information in this document is subject to change
More informationRSA SecurID Access SAML Configuration for Datadog
RSA SecurID Access SAML Configuration for Datadog Last Modified: Feb 17, 2017 Datadog is a monitoring service for cloud-scale applications, bringing together data from servers, databases, tools, and services
More informationQualys SAML 2.0 Single Sign-On (SSO) Technical Brief
Qualys SAML 2.0 Single Sign-On (SSO) Technical Brief Qualys provides its customers the option to use SAML 2.0 Single SignOn (SSO) authentication with their Qualys subscription. When implemented, Qualys
More informationWebEx Connector. Version 2.0. User Guide
WebEx Connector Version 2.0 User Guide 2016 Ping Identity Corporation. All rights reserved. PingFederate WebEx Connector User Guide Version 2.0 May, 2016 Ping Identity Corporation 1001 17th Street, Suite
More informationVMware Enterprise Systems Connector Installation and Configuration. JULY 2018 VMware Identity Manager 3.2 VMware Identity Manager VMware AirWatch 9.
VMware Enterprise Systems Connector Installation and Configuration JULY 2018 VMware Identity Manager 3.2 VMware Identity Manager VMware AirWatch 9.3 You can find the most up-to-date technical documentation
More informationNovell Access Manager
Setup Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.0 SP4 IR2 January 30, 2009 www.novell.com Novell Access Manager 3.0 SP4 Setup Guide Legal Notices Novell, Inc., makes no representations or
More informationSCCM Plug-in User Guide. Version 3.0
SCCM Plug-in User Guide Version 3.0 JAMF Software, LLC 2012 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave
More informationAuthlogics Forefront TMG and UAG Agent Integration Guide
Authlogics Forefront TMG and UAG Agent Integration Guide With PINgrid, PINphrase & PINpass Technology Product Version: 3.0.6230.0 Publication date: January 2017 Authlogics, 12 th Floor, Ocean House, The
More informationVMware AirWatch Installation Guide Installing AirWatch v9.1 in on-premises environments
VMware AirWatch Installation Guide Installing AirWatch v9.1 in on-premises environments AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard
More informationHow to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT
How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT Ta Table of Contents Table of Contents TA TABLE OF CONTENTS 1 TABLE OF CONTENTS 1 BACKGROUND 2 CONFIGURATION STEPS 2 Create a SSL
More informationArcGIS Server and Portal for ArcGIS An Introduction to Security
ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context
More informationSlack Cloud App SSO. Configuration Guide. Product Release Document Revisions Published Date
Slack Cloud App SSO Configuration Guide Product Release Document Revisions Published Date 1.0 1.0 May 2016 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose CA 95134 http://www.pulsesecure.net. 2016
More informationADMINISTRATOR'S MANUAL
ADMINISTRATOR'S MANUAL The Integrated Cross-Selling and Prospecting Application ATraC Services, LLC Version 2.1 July 2013 View online at http://atracservices.com/protrac Contact ProTraC Support 855-Get-ATraC
More informationOCLC-Hosted EZproxy Troubleshooting Tips
OCLC-Hosted EZproxy Troubleshooting Tips EZproxy Problems/Issues This is a list of frequently asked questions and issues you may encounter when managing your Hosted EZproxy server. It provides information
More informationPrivileged Identity App Launcher and Session Recording
Privileged Identity App Launcher and Session Recording 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are
More informationDecember P Xerox FreeFlow Core Installation Guide
5.1.0.0 December 2017 702P06246 2017 Xerox Corporation. All rights reserved. Xerox, Xerox and Design, and FreeFlow are trademarks of Xerox Corporation in the United States and/or other countries. This
More informationConfiguring Single Sign-on from the VMware Identity Manager Service to Marketo
Configuring Single Sign-on from the VMware Identity Manager Service to Marketo VMware Identity Manager JANUARY 2016 V1 Configuring Single Sign-On from VMware Identity Manager to Marketo Table of Contents
More informationReal-Time Dashboard Integration Bomgar Remote Support
Real-Time Dashboard Integration Bomgar Remote Support 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are
More informationComodo Certificate Authority Proxy Server Installation guide
Comodo Certificate Authority Proxy Server Installation guide Rev. 0006 1.Prerequisite 1.1 Server requirement Windows Server 2008 /2008 R2 (Standart/Enterprise/Datacenter) Active Directory Domain Services
More informationRemote Support Security Provider Integration: RADIUS Server
Remote Support Security Provider Integration: RADIUS Server 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks
More informationSafeNet Authentication Manager
SafeNet Authentication Manager INTEGRATION GUIDE Using SAM as an Identity Provider for Remedyforce Contents Support Contacts... 2 Description... 3 Single Sign-On Dataflow... 3 Configuring SAM as an Identity
More informationSophos Mobile Control Installation guide
Sophos Mobile Control Installation guide Product version: 1.0 Document date: May 2011 Contents 1 Introduction... 3 2 The Sophos Mobile Control server... 4 3 Set up Sophos Mobile Control... 13 4 Apple Push
More informationAccess SharePoint using Basic Authentication and SSL (via Alternative Access URL) with SP 2016 (v 1.9)
Access SharePoint using Basic Authentication and SSL (via Alternative Access URL) with SP 2016 (v 9) This page is part of the installation guide for the Confluence SharePoint Connector. It tells you how
More informationWhen starting the installation PKI Install will try to find a high port available for https connection.
created by: Rainer Bemsel Version 1.0 Dated: July/19/2003 The purpose of this TechNote is how to install & configure Net Tools PKI 1.0. There is one important change necessary that PKI will handle Certificate
More informationUsing SSL to Secure Client/Server Connections
Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections, page 1 Using SSL to Secure Client/Server Connections Introduction This chapter contains information on creating
More informationKaseya 2. Installation guide. Version R8. English
Kaseya 2 Kaseya Server Setup Installation guide Version R8 English October 24, 2014 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept
More informationVMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway
VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationSECURE Gateway v4.7. TLS configuration guide
SECURE Email Gateway v4.7 TLS configuration guide November 2017 Copyright Published by Clearswift Ltd. 1995 2017 Clearswift Ltd. All rights reserved. The materials contained herein are the sole property
More informationNovell Access Manager
Setup Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 Setup Guide Legal Notices Novell, Inc., makes no representations or warranties
More informationGoogle Calendar Integration
Google Calendar Integration Version 1.2 gradleaders.com 614.791.9000 Table of Contents TABLE OF CONTENTS OVERVIEW... 1 Google Calendar Integration Configuration Steps... 1 Required Items for Integration...
More informationADMINISTRATOR'S MANUAL
ADMINISTRATOR'S MANUAL The Integrated Cross-Selling and Prospecting Application ATraC Services, LLC Version 2.3 October 2013 View online at http://atracservices.com/protrac Contact ProTraC Support 855-Get-ATraC
More informationIntegration Guide. LoginTC
Integration Guide LoginTC Revised: 21 November 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration. Guide Details
More informationWebthority can provide single sign-on to web applications using one of the following authentication methods:
Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,
More informationVMware Enterprise Systems Connector Installation and Configuration
VMware Enterprise Systems Connector Installation and Configuration Modified APR 2018 VMware Identity Manager 3.1 VMware Identity Manager VMware AirWatch 9.2 You can find the most up-to-date technical documentation
More informationOdette CA Help File and User Manual
How to Order and Install Odette Certificates For a German version of this file please follow this link. Odette CA Help File and User Manual 1 Release date 31.05.2016 Contents Preparation for Ordering an
More informationSophos Mobile as a Service
startup guide product version: 8.6 Contents About this guide... 1 What are the key steps?... 2 Change your password... 3 Change your login name... 4 Activate Mobile Advanced licenses... 5 Check your licenses...6
More informationIntegration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for Okta
SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationConfiguring Windows 7 VPN (Agile) Client for authentication to McAfee Firewall Enterprise v8. David LePage - Enterprise Solutions Architect, Firewalls
Configuring Windows 7 VPN (Agile) Client for authentication to McAfee Firewall Enterprise v8 David LePage - Enterprise Solutions Architect, Firewalls Overview: Microsoft Windows version 7 introduced a
More informationAbout This Document 3. Overview 3. System Requirements 3. Installation & Setup 4
About This Document 3 Overview 3 System Requirements 3 Installation & Setup 4 Step By Step Instructions 5 1. Login to Admin Console 6 2. Show Node Structure 7 3. Create SSO Node 8 4. Create SAML IdP 10
More informationIntegrating the YuJa Enterprise Video Platform with Dell Cloud Access Manager (SAML)
Integrating the YuJa Enterprise Video Platform with Dell Cloud Access Manager (SAML) 1. Overview This document is intended to guide users on how to integrate their institution s Dell Cloud Access Manager
More informationWhosOn server help
server help Server help Important For WhosOn to work, you will need to ensure that certain ports are open in the firewall. With the default setup for WhosOn, you would need to open ports 80, 443, 8080
More informationSophos UTM Web Application Firewall For: Microsoft Exchange Services
How to configure: Sophos UTM Web Application Firewall For: Microsoft Exchange Services This guide explains how to configure your Sophos UTM 9.3+ to allow access to the relevant Microsoft Exchange services
More informationQuick Connection Guide
ServiceNow Connector Version 1.0 Quick Connection Guide 2015 Ping Identity Corporation. All rights reserved. PingFederate ServiceNow Connector Quick Connection Guide Version 1.0 August, 2015 Ping Identity
More informationVSP16. Venafi Security Professional 16 Course 04 April 2016
VSP16 Venafi Security Professional 16 Course 04 April 2016 VSP16 Prerequisites Course intended for: IT Professionals who interact with Digital Certificates Also appropriate for: Enterprise Security Officers
More informationNovell Access Manager
Quick Start AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 June 11, 2010 www.novell.com Novell Access Manager 3.1 SP2 Quick Start Legal Notices Novell, Inc., makes no representations or warranties
More informationAbout Retrieve 3. Installing DocuSign Retrieve 4. Logging on to DocuSign 6
Quick Start Guide DocuSign Retrieve 3.3 May 2018 Rev A Overview DocuSign Retrieve is a windows-based tool that "retrieves" envelopes, documents, and data from DocuSign for use in external systems. Retrieve
More informationThis help covers the ordering, download and installation procedure for Odette Digital Certificates.
This help covers the ordering, download and installation procedure for Odette Digital Certificates. Answers to Frequently Asked Questions are available online CONTENTS Preparation for Ordering an Odette
More information<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Citrix NetScaler Gateway 12.0
RSA SECURID ACCESS Implementation Guide Citrix 12.0 Peter Waranowski, RSA Partner Engineering Last Modified: February 20 th, 2018 Table of Contents Table of Contents...
More informationProphet 21 Middleware Installation Guide. version 12.16
version 12.16 Disclaimer This document is for informational purposes only and is subject to change without notice. This document and its contents, including the viewpoints, dates and functional content
More informationSterling Secure Proxy Version 3 FTP Adapter Configuration with SSL. ProFTP SSL Certificate creation with openssl
Sterling Secure Proxy Version 3 FTP Adapter Configuration with SSL The SSP configuration has been tested with the following components. SSP 3 on Windows 2003 ProFTP Version 1.2.10 on Red Hat ES 4 Lftp
More informationBox Connector. Version 2.0. User Guide
Box Connector Version 2.0 User Guide 2016 Ping Identity Corporation. All rights reserved. PingFederate Box Connector User Guide Version 2.0 March, 2016 Ping Identity Corporation 1001 17th Street, Suite
More informationScenarios for Setting Up SSL Certificates for View. Modified for Horizon VMware Horizon 7 7.3
Scenarios for Setting Up SSL Certificates for View Modified for Horizon 7 7.3.2 VMware Horizon 7 7.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationSecureW2 and Wi-Fi Cloud. Integration Guide
SecureW2 and Wi-Fi Cloud Integration Guide SecureW2 and Wi-Fi Cloud Integration Guide Deployment Overview This guide demonstrates how to integrate a WatchGuard Wi-Fi Cloud Captive Portal with SecureW2
More informationGoogle SAML Integration
YuJa Enterprise Video Platform Google SAML Integration Overview This document is intended to guide users on how to integrate the YuJa Enterprise Video Platform as a Service Provider (SP) using Google as
More informationConfiguring ADFS for Academic Works
Page 1 of 10: ConfiguringADFSForAcademicWorks.docx Configuring ADFS for Academic Works Contents Description... 1 Prerequisites: (for ADFS 3.0)... 2 Install the Public SSL Cert on both the ADFS and the
More information