Proposed User Experience for Handling Multiple Identity Providers in Network Identity Manager 2.0
|
|
- Shanon Short
- 6 years ago
- Views:
Transcription
1 Proposed User Experience for Handling Multiple Identity Providers in Network Identity Manager 2.0 The current architecture of Network Identity Manager is designed around a single identity provider and multiple credentials providers. Since the only identity provider is Kerberos v5, all identities in Network Identity Manager represent Kerberos v5 principals. By implication, since every credential must be associated with an identity, all credentials derived their identity from a Kerberos v5 principal. One of the strengths of the Network Identity Manager framework is its ability to derive credentials from an identity credential (for example, a Kerberos v5 Ticket Granting Ticket.) This permits a single Kerberos v5 identity to be used to obtain tokens for multiple AFS cells or certificates from multiple Kerberized Certificate Authorities. PK INIT (RFC ) specifies a protocol for acquiring Kerberos v5 TGT via use of public key cryptography using either raw asymmetric key pairs or a certificate and private key (perhaps stored on a smartcard.) A single key pair or certificate and private key can be associated with one or more Kerberos v5 principals. A Kerberos v5 principal can be configured in the Key Distribution Center database to require PK INIT for TGT acquisition or permit it as an option instead of a password. In order to add support for PK INIT, it is proposed that Network Identity Manager 2.x support multiple identity providers (X.509 certificates and Kerberos v5.) One user experience that will be affected by this change is the obtain new credentials operation. This document outlines the proposed modifications to the user experience
2 Obtain new credentials operation The new credentials dialog will have a wizard interface with the following page flow: (One or more potential primary identities) (New identity) Start Identity Specification (No potential primary identities) Credential Options (Basic) Credential Options (Advanced) (Finish) (Finish) Progress End Overview of dialog flow Each node in the above diagram other than the "Start" and End nodes corresponds to a page in the obtain new credentials wizard. When the user initiates a new credentials operation, she will be presented with either the "Credential Options" page or the "Identity Specification" page depending on whether there are any candidate identities defined or not, respectively. The "Identity Specification" page is used to create a new identity which can then be used to obtain new credentials. Once an identity has been selected, control flows to the "Credential Options" view. Once the credentials acquisition process starts, the Progress page will be shown to indicate the progress of the operation. Credential Options The purpose of this view is to collect information from the user, including any privileged information, for a specific identity. The identity for which the dialog is displayed will be referred to as the primary identity. Successful completion of the dialog will result in an attempt to obtain new credentials for this identity. 2
3 This page will only be displayed if there are one or more candidates for a primary identity. Depending on the context in which the page was invoked, one of these candidates may have been implicitly selected as the primary identity. Examples of these are: If the new credentials dialog was launched as a result of a GSSAPI call, there might be an identity specified in the call, which will become the primary identity. If the "Credential Options" page was launched as a result of a successful completion of the "Identity Specification" page, then the identity that resulted from that page will be the implicit primary identity. If there is no implicit primary identity, then the identity which has been used most frequently in recent history will be selected as the primary identity. The "Credential Options" page has two modes of operation: The basic mode and the advanced mode. The basic mode is shown below. Figure 1 : Credential Options page (Basic mode) The top of the dialog displays the primary identity. Each identity is associated with an icon, which by default is an icon representing the identity provider. It can be customized by the user on a per identity basis. The identity provider is also identified by a string beside the identity name. The identity display area is active. It is rendered and acts like a drop down box. Clicking on the field allows the user to change the primary identity. If the user clicks on the field, it will expand to a secondary UI that has the affordance of a menu that lists the other candidate primary identities as well as an option for creating a new identity. 3
4 Figure 2 : Credentials Options page (Basic Mode) with identity menu Selecting any other identity will result in that identity becoming the active identity. Any identity specific controls that were being displayed will be replaced by controls corresponding to the new identity. If the user selects "Specify New Identity...", then the dialog would switch to the "Identity Specification" page. Implementation note: The list of potential identities will not be maintained by the Network Identity Manager application. Instead, all the identity providers will be queried for a list of potential identities for that credential type. Statistics used to order the list will be maintained by the application. The list will, in general, be unordered. The NIM application will keep track of the last known list by noting the relative position of each identity and then add any new identities at the end. Options: The list of potential primary identities can be sorted. However, for small lists, users tend to memorize the spatial location of UI elements and will be forced to read the list if they can't find the identity they are looking for in the location that they last remember seeing it. One compromise is to automatically sort the list if the number of identities exceeds a certain threshold. Each identity in the list will have a type that corresponds to the identity provider that exposed it. The icon displayed next to the identity name represents the type if the user has not assigned a custom icon to that identity. 4
5 Options: We can allow the identity provider to customize a short description string that will appear below the identity name. This can be used to give a more technical specification for the identity. If the list of identities is too long to be displayed in a single page, an optional scroll bar can be use to scroll the list. The area between the identity display and the dialog navigation buttons ('Advanced', 'Finish' and 'Cancel' buttons) consist of controls that are used for obtaining privileged information such as passwords. If no privileged information is required, this area will contain a message to that effect. It should never be empty. Figure 3 : Credentials Options page (Basic mode) showing an identity provider that requires no privileged interaction The preceding figure illustrates an example of what might be displayed to the user if no privileged information is required. If the user clicks on the "Advanced Options" button, or if the identity or user preferences state that it should be shown in Advanced mode, then the Credential Options page will switch to the Advanced mode. Figure 4 : Credential Options Page (Advanced mode) 5
6 The advanced mode is similar to the advanced mode in the new credentials dialog in existing versions of Network Identity Manager, with a few minor differences. There is no 'Identity' tab. It has been replaced by the 'Password' tab. The name of the tab corresponds to the kind of privileged information that is being requested. If no privileged interaction is required, this tab will be suppressed. Similar to the basic view, the top of the advanced view will also features an identity display button that can be used to switch to a different identity. When a different identity is selected as the primary identity, the entire set of tabs will need to be replaced. When multiple identity providers are supported, it is expected that not all credentials providers will be applicable for every identity type. In either mode, if there is sufficient information to proceed with the new credentials acquisition, then the 'Finish' button will become enabled and the default. Pressing this button will start the process of acquiring new credentials and may cause the dialog to switch to the progress page. Issues: There might be situations where multiple pages of interaction are needed before initial credentials can be successfully acquired, such as when the user s password needs to be changed, or a secondary authentication mechanism needs to be used. In this case, the Password tab or whichever tab is used for privileged information can be shown multiple times to the user. However, since knowing how many sessions of interaction are needed in advance is not always possible, these additional views may have to be shown after the user has selected the Finish button. This is problematic since it violates Wizard 97 guidelines on how the Finish button should function. When multiple sessions of privileged interaction is needed, the banner or the heading of the tab should clearly explain why it was necessary to prompt the user again and make it obvious that this is a new page of information. An alternative to showing the credential options page to the user multiple times with different Password tabs is to use a pop up modal dialog box to perform any additional interaction that is necessary. This makes it obvious to the user that additional interaction is necessary. The new credentials acquisition framework supports complex hierarchies of identities and credentials. Currently, the user experience (UX) framework does not aim to provide a dedicated specification for managing identity hierarchies. Note: The UX does not aim to aggregate the derived identities. Instead, individual credentials providers are expected to expose interfaces for deriving identities from individual credentials. 6
7 Note on credential options: Per identity settings are independent of the identity hierarchy used to obtain the identity credentials. In general, if a particular identity A is configured to obtain a particular credential C, then this should happen regardless of whether A is the primary identity or a derived identity. However, exceptions to this are allowed. If there is some credential that is sensitive to the identity hierarchy, then this should be made visible to the user through the Advanced Options page. If a credential cannot be obtained using the current identity hierarchy, it should be indicated to the user by making the specific credential appear disabled. If the sensitivity to the identity hierarchy is not known for a particular credential until the time an attempt is made to obtain the credential, the user should be notified about it including information on how she should rectify the situation. An example of a credentials provider that supports derived identities is shown below: Figure 5 : Credential Options page (Advanced mode) showing an identity with derived identities The sample sketch shows the credentials options tab for a hypothetical Secure Key Storage provider that allows specification of derived identities. For consistency, the NIM application will provide UX transactions for specifying new identities and configuring them. In the sketch above, clicking on the 'New Identity' button will launch another dialog that is similar to the Identity Selection menu or 'Identity Specification' page (depending on whether there are any identities to choose from) with a suitable caption. The 'Configure' button will similarly launch a UX transaction for configuring the selected derived identity. These UX transactions are described in Appendix A. Issues: Navigation: Even if the user is configuring a complicated hierarchy of identities, it should be easy for her to navigate the hierarchy. The proposed design does not 7
8 make the hierarchy obvious and does not allow configuring an arbitrary identity without navigating there by opening the advanced page of each node along the path to the target identity from the primary identity. Assuming that the Privileged Information tab has signaled that there is enough information to complete the credentials acquisition, the user will be able to click the 'finish' button to acquire credentials. Identity Specification The identity specification page is used to specify a new identity. This will be the initial page in the new credentials dialog/wizard if there are no known identities. Figure 6 : Identity Specification Page The top of the dialog contains a set of set of icons and names for the identity types that are supported. The user can select one of the icons, after which the identity type specific selectors appear below the icons. The sample above shows the user interface if the Kerberos v5 identity type is selected. The realm control is a combo box with auto complete semantics. If the drop down button is clicked, the user is presented with a list of recently used realms. The last item in the list is "(Show all realms)", which, if selected, displays all the realms in the drop down list. Implementation Note: The identity selector controls other than the row of buttons that select the identity type are provided by the selected identity provider. It's the identity provider's responsibility to signal to Network Identity Manager whether or not a valid identity is selected. Another sample view follows which demonstrates the selection of a certificate identity type. When the selected identity type is changed, the identity selector controls will be replaced with the set of controls that will assist in the specification or selection of an identity of that type. 8
9 Figure 7 : Identity Specification page with a certificate type identity When a valid identity is selected or specified, then the 'Next' button becomes enabled and becomes the default. At that point, the user can hit the 'return' key to proceed to the next page. The 'Back' button may be disabled if this is the first page presented to the user. Note on derived identity selection: The Identity Selection and Identity Specification pages only select the primary identity for the new credentials operation. Once a primary identity is known, the credentials providers and identity providers will be queried for the credentials and derived identities that will also be obtained. If there are any derived identities, they will be queried in turn to build a breadth first tree of credentials and derived identities. 9
10 Progress Page Since obtaining credentials is a time consuming task, it is proposed that there should be a progress page. It will not be required to display this page at every new credentials acquisition. However, it should be displayed after a certain amount of time has passed since the user initiated the credential acquisition if the operation is still on going. Figure 8 : Progress Page Implementation Note: The Network Identity Manager Message Queue supports marking dispatched messages as cancelled. This feature was added with the intent of supporting operations that can be cancelled. Certain credentials acquisition operations tend to be time consuming, especially if network access is slow. If the delay is particularly long, the user may wish to abort the operation in whole or in part. The mock up above shows a Cancel button for this purpose. However, current versions of Network Identity Manager don t implement this feature because most of these delays happen during calls to APIs beyond the scope of the application which can t be cancelled. Network Identity Manager 2.x series plans to implement this feature and credential providers are expected to comply with cancelled messages to the best of their ability. Options: It may be desirable to allow the user to cancel individual credential providers. If a user has configured multiple identities with multiple credential types, the user might not wish to obtain credentials for all identities all the time. Having this feature would allow the user to cancel out identities that are not necessary at that time. 10
11 Appendix A: Secondary UX Transactions The following UX transactions will be provided for use by credentials providers when adding or configuring derived identities. Derived Identity wizard The dialog flow for the derived identity wizard is as follows: Start Derived Identity Specification Credential Options for Derived Identity (Per Identity) End The Credential Options for Derived Identity page is mostly identical to the advanced mode of the 'Credential Options' page, with the exception that there is no tab for privileged information. The title bar will be different and will reflect the fact that a new identity is being derived from a specific identity. The 'Derived Identity Specification' page will resemble the Identity Specification page. When the wizard starts, it will check if there are any candidate identities for the user to choose from. If there are no candidates, then the wizard starts with the 'Derived Identity Specification' page. Implementation Note: The list of potential derived identities is not queried from anywhere. Instead it should be provided to the wizard when it is invoked. A derived identity can itself have other derived identities and will be exposed via a similar UI. Upon completion of the wizard, the caller will be notified of the new derived identity. If the user activates the identity button and selects Specify New Identity, the wizard will show the Derived Identity Specification page to allow the user to specify the new derived identity. The wizard runs as a modal dialog box. 11
12 New Derived Identity dialog The New Derived Identity wizard/dialog is simply a special case of the above 'Derived Identity' wizard where the wizard starts at the 'Identity Specification' page. The dialog runs as a modal dialog box. 12
AT&T Global Network Client for Mac User s Guide Version 1.7.3
Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 1.7.3 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..
More informationAT&T Global Network Client for Mac User s Guide Version 2.0.0
Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 2.0.0 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..
More informationConfiguring Microsoft Outlook to Connect to Hosted Exchange Service
Configuring Microsoft Outlook to Connect to Hosted Exchange Service Configuring Microsoft Outlook for Hosted Exchange Service Version: 1.0 Updated on: April 27, 2011 Page 1 of 7 TABLE OF CONTENTS Configuring
More informationPartner Integration Portal (PIP) Installation Guide
Partner Integration Portal (PIP) Installation Guide Last Update: 12/3/13 Digital Gateway, Inc. All rights reserved Page 1 TABLE OF CONTENTS INSTALLING PARTNER INTEGRATION PORTAL (PIP)... 3 DOWNLOADING
More informationNetwork Security Essentials
Network Security Essentials Fifth Edition by William Stallings Chapter 4 Key Distribution and User Authentication No Singhalese, whether man or woman, would venture out of the house without a bunch of
More informationEkran System v.6.0 Privileged User Accounts and Sessions (PASM)
Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...
More informationA Guide to Quark Author Web Edition September 2016 Update
A Guide to Quark Author Web Edition 2015 - September 2016 Update CONTENTS Contents Getting Started...4 About Quark Author Web Edition...4 Smart documents...4 Introduction to the Quark Author Web Edition
More informationPASSPORTAL PLUGIN DOCUMENTATION
Contents Requirements... 2 Install or Update Passportal Plugin Solution Center... 3 Configuring Passportal Plugin... 5 Client mapping... 6 User Class Configuration... 7 About the Screens... 8 Passportal
More informationForeScout Extended Module for VMware AirWatch MDM
ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5
More informationBloomberg Software Installation Manual New Bloomberg Professional Installer (InstallAware) English
Bloomberg Software Installation Manual New Bloomberg Professional Installer (InstallAware) English 18 June 2018 Version: 1.0 2018 Bloomberg L.P. All rights reserved. 1 Download the Bloomberg Software...2
More informationIntroduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security.
Trusted Intermediaries CSC/ECE 574 Computer and Network Security Topic 7. Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center () Representative solution:
More informationXton Access Manager GETTING STARTED GUIDE
Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3
More informationA Guide to Quark Author Web Edition 2015
A Guide to Quark Author Web Edition 2015 CONTENTS Contents Getting Started...4 About Quark Author - Web Edition...4 Smart documents...4 Introduction to the Quark Author - Web Edition User Guide...4 Quark
More informationBASICS. Create a Project. Click on a question below to skip to the answer. How do I create a project?
BASICS Create a Project Click on a question below to skip to the answer. How do I create a project? What is the difference between an Invitation-Only project and a General Access project? Can I delete
More informationTABLE OF CONTENTS CHAPTER 1. PROTOCOL APPLICATION PROCESS OVERVIEW
IBC Creating Protocol Applications TABLE OF CONTENTS CHAPTER 1. PROTOCOL APPLICATION PROCESS OVERVIEW... 1.1 CHAPTER 2. GENERAL INFORMATION... 2.1 2.1. STARTING AND LOGGING IN... 2.1 2.2. USING NAVIGATION
More informationSAS Data Explorer 2.1: User s Guide
SAS Data Explorer 2.1: User s Guide Working with SAS Data Explorer Understanding SAS Data Explorer SAS Data Explorer and the Choose Data Window SAS Data Explorer enables you to copy data to memory on SAS
More informationCreating Reports in Access 2007 Table of Contents GUIDE TO DESIGNING REPORTS... 3 DECIDE HOW TO LAY OUT YOUR REPORT... 3 MAKE A SKETCH OF YOUR
Creating Reports in Access 2007 Table of Contents GUIDE TO DESIGNING REPORTS... 3 DECIDE HOW TO LAY OUT YOUR REPORT... 3 MAKE A SKETCH OF YOUR REPORT... 3 DECIDE WHICH DATA TO PUT IN EACH REPORT SECTION...
More informationTeam Member Management
Introduction Team Member Management When viewing this job aid electronically, click within the Contents to advance to desired page. Contents Introduction... 2 About STARS -... 2 Technical Assistance and
More informationConfiguration Guide. Requires Vorex version 3.9 or later and VSA version or later. English
Kaseya v2 Integration of VSA with Vorex Configuration Guide Requires Vorex version 3.9 or later and VSA version 9.3.0.11 or later English September 15, 2017 Copyright Agreement The purchase and use of
More informationA Guide to Quark Author Web Edition October 2017 Update
A Guide to Quark Author Web Edition 2015 - October 2017 Update Contents Getting Started...1 Smart Documents...1 Introduction to the Quark Author Web Edition User Guide...1 Quark Author Web Edition configuration...1
More informationTrusted Intermediaries
AIT 682: Network and Systems Security Topic 7. Trusted Intermediaries Instructor: Dr. Kun Sun Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC)
More informationAIT 682: Network and Systems Security
AIT 682: Network and Systems Security Topic 7. Trusted Intermediaries Instructor: Dr. Kun Sun Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC)
More informationDigest Authentication Setup for SIP Trunks
This chapter provides information about digest authentication setup for SIP trunks. When you configure digest authentication for SIP trunks, Cisco Unified Communications Manager challenges the identity
More informationAdministration. Training Guide. Infinite Visions Enterprise Edition phone toll free fax
Administration Training Guide Infinite Visions Enterprise Edition 406.252.4357 phone 1.800.247.1161 toll free 406.252.7705 fax www.csavisions.com Copyright 2005 2011 Windsor Management Group, LLC Revised:
More informationForeScout Extended Module for Tenable Vulnerability Management
ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support
More informationSQL Server. Management Studio. Chapter 3. In This Chapter. Management Studio. c Introduction to SQL Server
Chapter 3 SQL Server Management Studio In This Chapter c Introduction to SQL Server Management Studio c Using SQL Server Management Studio with the Database Engine c Authoring Activities Using SQL Server
More informationForeScout Extended Module for MaaS360
Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationINSTALLATION GUIDE Spring 2017
INSTALLATION GUIDE Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and
More informationUsing Two-Factor Authentication to Connect to a Kerberos-enabled Informatica Domain
Using Two-Factor Authentication to Connect to a Kerberos-enabled Informatica Domain Copyright Informatica LLC 2016, 2018. Informatica LLC. No part of this document may be reproduced or transmitted in any
More informationModern Requirements4TFS 2018 Update 1 Release Notes
Modern Requirements4TFS 2018 Update 1 Release Notes Modern Requirements 6/22/2018 Table of Contents 1. INTRODUCTION... 3 2. SYSTEM REQUIREMENTS... 3 3. APPLICATION SETUP... 3 GENERAL... 4 1. FEATURES...
More informationRemote Support 19.1 Web Rep Console
Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property
More informationONE ID Identity and Access Management System
ONE ID Identity and Access Management System Local Registration Authority User Guide Document Identifier: 2274 Version: 1.8 Page 1 Copyright Notice Copyright 2011, ehealth Ontario All rights reserved No
More informationBusiness Insight Authoring
Business Insight Authoring Getting Started Guide ImageNow Version: 6.7.x Written by: Product Documentation, R&D Date: August 2016 2014 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,
More informationManaged Access Gateway. User Guide
Managed Access Gateway User Guide Version 2.2 Exostar, LLC November 3, 2011 Table of Contents Table of Contents... ii Purpose... 1 Log-in to your MAG Account... 2 Additional MAG Login Options... 2 First
More informationUnderstanding the Local KDC
Appendix C Understanding the Local KDC The local Key Distribution Center (LKDC) facilitates single sign-on for Apple Filing Protocol (AFP) file sharing and screen sharing, and although it is outside the
More informationPrivileged Access Management Android Access Console 2.2.2
Privileged Access Management Android Access Console 2.2.2 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown
More informationTRAINING GUIDE. ArcGIS Online and Lucity
TRAINING GUIDE ArcGIS Online and Lucity ArcGIS Online and Lucity This covers some basic functionality we feel you will need to be successful with Lucity with ArcGIS Online or Portal for ArcGIS Enterprise.
More informationEWAY RAPID SETUP GUIDE FOR
EWAY RAPID SETUP GUIDE FOR CONTENTS 1. Add ewayrapid payment method to your online shop... 2 2. Configure and activate ewayrapid payment method... 3 3. Add eway logo and credit card types to your website...
More informationSpiraTeam Help Desk Integration Guide Inflectra Corporation
/ SpiraTeam Help Desk Integration Guide Inflectra Corporation Date: July 23rd, 2018 Contents Introduction... 1 1. KronoDesk... 2 2. Zendesk... 7 Introduction SpiraTeam is an integrated Application Lifecycle
More informationOpenAFS MAC 10.2 System Requirements and Installation
Information Technology, Arizona State University OpenAFS MAC 10.2 System Requirements and Installation COMMUNICATIONS 8/2004 This document assists in setting up a process for logging into Mac OS 10.2 with
More informationTwo factor authentication for Microsoft Remote Desktop Web Access
Two factor authentication for Microsoft Remote Desktop Web Access logintc.com/docs/connectors/rd-web-access.html Overview The LoginTC RD Web Access Connector protects access to your Microsoft Remote Desktop
More informationSecure Web Appliance. Basic Usage Guide
Secure Web Appliance Basic Usage Guide Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About this Manual... 1 1.2.1. Document Conventions... 1 2. Description of the
More informationManaged Access Gateway. User Guide
Managed Access Gateway User Guide Version 3.0 Exostar, LLC April 20, 2013 Table of Contents Table of Contents...ii Purpose... 1 Log-in to your MAG Account... 2 Additional MAG Login Options... 2 First Time
More informationBest Practices Benchmarking Application
1 1. Introduction For the purposes of this user manual, all menu items are visible in all screen shots. Depending upon the users privileges, the user s menu option may vary from what is shown in the screen
More informationCLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1
CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9
More informationRemote Support Web Rep Console
Remote Support Web Rep Console 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their
More informationArea Access Manager User Guide
Area Access Manager User Guide Area Access Manager User Guide Table of Contents Chapter 1: Introduction...9 Conventions Used in this Documentation... 9 Getting Started... 10 Licensing Requirements...
More informationConfiguring Remote Access using the RDS Gateway
Configuring Remote Access using the RDS Gateway Author: AC, SNE Contents Introduction... 3 Pre-requisites... 3 Supported Operating Systems... 3 Installing the I.T. Services Certificate Authority Root Certificate...
More informationIntegrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording
Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording Contents 1 About This Document... 2 2 Overview... 2 3 Before You Begin... 2 4 Deploying ObserveIT with IBM
More informationMANAGEMENT AND CONFIGURATION MANUAL
MANAGEMENT AND CONFIGURATION MANUAL Page 1 of 31 Table of Contents Overview... 3 SYSTEM REQUIREMENTS... 3 The Administration Console... 3 CHAT DASHBOARD... 4 COMPANY CONFIGS... 4 MANAGE LEARNING... 7 MANAGE
More informationAT&T Global Network Client for Android
Version 4.1.0 AT&T Global Network Client for Android 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual
More informationPoet Image Description Tool: Step-by-step Guide
Poet Image Description Tool: Step-by-step Guide Introduction This guide is designed to help you use the Poet image description tool to add image descriptions to DAISY books. The tool assumes you have access
More informationCIS 6930/4930 Computer and Network Security. Topic 7. Trusted Intermediaries
CIS 6930/4930 Computer and Network Security Topic 7. Trusted Intermediaries 1 Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC) Representative
More informationBridgeware Systems War Board Documentation
Introduction Temps Plus War Board Help Bridgeware Systems War Board Documentation Version date 2/3/2006 WarBoard.chm Version 4 Please visit www.bridgeware.net/webhelp for ideas, examples, and further education
More informationSpiraTeam Help Desk Integration Guide Inflectra Corporation
/ SpiraTeam Help Desk Integration Guide Inflectra Corporation Date: June 12, 2017 Contents Introduction... 1 1. Zendesk... 2 Introduction SpiraTeam is an integrated Application Lifecycle Management (ALM)
More informationColleague UI4.3 Documentation
Colleague UI4.3 Documentation Table of Contents Getting Started... 2 Add the Shortcuts to your Desktop... 2 Searching for and Using Forms... 3 Begin Your Form Search... 3 Form Search Results... 3 The Navigation
More informationWholesale Lockbox User Guide
Wholesale Lockbox User Guide August 2017 Copyright 2017 City National Bank City National Bank Member FDIC For Client Use Only Table of Contents Introduction... 3 Getting Started... 4 System Requirements...
More informationForeScout Extended Module for MobileIron
Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...
More informationRelease Notes Life Technologies Attune NxT Software v2.3
Release Notes Life Technologies Attune NxT Software v2.3 In the following pages you will find instructions describing: New software features Known software/system issues with troubleshooting guidance Software
More informationBlog to Contents. User Guide March 11, 2008
User Guide March 11, 2008 Contents Blog Accessing the My Blog page Searching for a Blog Entry Viewing blogs Viewing public blog entries and comments Viewing private blog entries Viewing Blogs Externally
More informationInstall and Configure the TS Agent
Install or Upgrade the TS Agent, page 1 Start the TS Agent Configuration Interface, page 2 Configure the TS Agent, page 2 Creating the REST VDI Role, page 7 Install or Upgrade the TS Agent Before You Begin
More informationUser Guide. 3CX CRM Plug-in for Zendesk. Version
User Guide 3CX CRM Plug-in for Zendesk Version 15.5.89 "Copyright VoIPTools, LLC 2011-2018" Information in this document is subject to change without notice. No part of this document may be reproduced
More information9.0 Help for Community Managers About Jive for Google Docs...4. System Requirements & Best Practices... 5
for Google Docs Contents 2 Contents 9.0 Help for Community Managers... 3 About Jive for Google Docs...4 System Requirements & Best Practices... 5 Administering Jive for Google Docs... 6 Quick Start...6
More informationHow to Import a Certificate When Using Microsoft Windows OS
How to Import a Certificate When Using Microsoft Windows OS This document explains the process of importing your digital certificate for use in Microsoft Internet Explorer (IE) and/or Mozilla Firefox.
More informationManage Administrators and Admin Access Policies
Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on
More informationINBUSINESS BANKING SYSTEM
Introducing your new INBUSINESS BANKING SYSTEM Companion Guide to Business Banking Video Tutorials Updated 0.09.8 WELCOME TO THE INBUSINESS SYSTEM The InBusiness System will help you efficiently and securely
More informationFrequently Asked Questions Contents
Frequently Asked Questions Contents How do I open a saved application?... 2 How do I print my application?... 3 Is there a time limit on how long my session lasts?... 5 Is it alright to use my Web browser
More informationMyFloridaNet-2 (MFN-2) Customer Portal/ Password Management/ VPN Reference Guide
MyFloridaNet-2 (MFN-2) Customer Portal/ Password Management/ VPN Reference Guide i VISION RECORDS REVISION DATE DESCRIPTION 0 27 September 2017 Initial Submittal. 1 Second Submittal. ii TABLE OF CONTENTS
More informationOUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2007
OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2007 CONTENTS What is Outlook Anywhere? Before you begin How do I configure Outlook Anywhere with Outlook 2007? How do I use Outlook Anywhere? I already
More informationRSA Authentication Manager 7.1 Help Desk Administrator s Guide
RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
More informationUsing PDC's resources in Applied CFD. Elisabet Molin PDC
Using PDC's resources in Applied CFD Elisabet Molin PDC support@pdc.kth.se 1 What is PDC? q National high-performance computing center q Located at KTH, hosted by CSC q Swedish National Infrastructure
More informationOKTA users provisioning for Vable platform
OKTA users provisioning for Vable platform Features Requirements Step-by-step Configuration Instructions Requesting Vable OKTA integration Adding Vable private application to organization account Configuring
More informationMicrosoft Office Groove Server Groove Manager. Domain Administrator s Guide
Microsoft Office Groove Server 2007 Groove Manager Domain Administrator s Guide Copyright Information in this document, including URL and other Internet Web site references, is subject to change without
More informationColligo Manager 5.4 SP3. User Guide
5.4 SP3 User Guide Contents Enterprise Email Management for SharePoint 2010 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Email Manager 2 Checking for Updates 4 Updating
More informationBQS User Guide For Online (Hosted) Approved Centres
BQS User Guide For Online (Hosted) Approved Centres April 2013 v3.0 Contents 1. Getting Started... 3 1.1 Administration... 3 1.2 Automated Testing Software... 3 2. BQS Web Administration... 4 2.1 The Login
More informationOPC UA Configuration Manager PTC Inc. All Rights Reserved.
2017 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 5 Project Properties - OPC UA 5 Server Endpoints 7 Trusted Clients 9 Discovery Servers 10 Trusted Servers 11 Instance
More informationDocument Management System GUI. v6.0 User Guide
Document Management System GUI v6.0 User Guide Copyright Copyright HelpSystems, LLC. All rights reserved. www.helpsystems.com US: +1 952-933-0609 Outside the U.S.: +44 (0) 870 120 3148 IBM, AS/400, OS/400,
More informationCisco NAC Appliance Agents
10 CHAPTER This chapter presents overviews, login flow, and session termination dialogs for the following Cisco NAC Appliance access portals: Cisco NAC Agent, page 10-1 Cisco NAC Web Agent, page 10-28
More information8.0.6 New Features Guide Auto Window/Level Adjustments
8.0.6 New Features Guide Improvements to the feature allow users to quickly and easily set for images. These adjustments will be automatically and consistently applied to similar images. Window/Level Adjustments
More informationSmart Answer Operator Manual rev. 1.0.
Smart Answer Operator Manual rev. 1.0. 2003-2009 Eastwright Corp. www.eastwright.com 1.System Overview 1.1. Concepts The Smart Answer is a web based help desk system. The program allows efficient processing
More informationComodo LoginPro Software Version 1.0
Comodo LoginPro Software Version 1.0 User Guide Guide Version 1.0.102512 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System
More informationPortfolio Account Link (PAL ) User Guide
Getting Started / First Time Login... 2 Password Authentication... 2 Multifactor Authentication... 3 Trouble Signing In?... 7 Information Banner and Report Headings... 8 Account Access... 8 Portfolio Review...
More informationRB Digital Signature Proxy Guide for Reporters
RB Digital Signature Proxy Guide for Reporters Table of Contents RB-DSP registration workflow.... 1 Obtaining your certificate.... 2 Using Firefox to obtain your certificate.... 2 Using Internet Explorer
More informationNovell Kerberos Login Method for NMASTM
Novell Kerberos Login Method for NMASTM 1.0 ADMINISTRATION GUIDE www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
More informationMAGNUM-SDVN Security Administration Manual
MAGNUM-SDVN Security Administration Manual Revision 19: November 21, 2017 Contents Overview... 3 Administrative Access... 4 Logging Into Terminal Locally... 4 Logging Out Of Local Terminal... 4 Logging
More informationUSER QUICK LOOK FOR FACULTY & STAFF
TABLE OF CONTENTS ACCESSING ONTRACK... 2 PROFILE INFORMATION... 3 INSTITUTIONAL PROFILE... 3 APPOINTMENT PREFERENCES:... 3 EMAIL NOTIFICATIONS... 3 UPDATE YOUR PROFILE... 4 INSTITUTIONAL PROFILE... 4 APPOINTMENT
More informationInfo Input Express Network Edition
Info Input Express Network Edition Administrator s Guide A-61892 Table of Contents Using Info Input Express to Create and Retrieve Documents... 9 Compatibility... 9 Contents of this Guide... 9 Terminology...
More informationInstalling and Configuring the TS Agent
Installing the TS Agent, page 1 Starting the TS Agent Configuration Interface, page 2 Configuring the TS Agent, page 2 Creating the REST VDI Role, page 7 Installing the TS Agent Before You Begin Confirm
More informationMyTeleMed iphone User Guide
Table of Contents Log In 2 Incorrect Login Information 2 Registering your iphone 2 Main Menu 3 Messages 3 Compose a New Message 4 Message Recipients 4 Archiving Messages 4 Message Detail 5 Add Comments
More information8x8 Virtual Office Sage ACT! Integration User Guide
8x8 Virtual Office Version 1.1, January 2015 Table of Contents 8x8 Virtual Office Sage ACT! Integration....................3 System Requirements...3 Uninstalling ACT! Integration Software...3 Installation...4
More informationInteraction Center Business Manager Supervisor Functions
Interaction Center Business Manager Supervisor Functions CIC 2016 RX 1 Contents Interaction Supervisor... 10 Introduction... 10 Views... 10 Access to Views is controlled by License Assignment... 11 Alerts...
More informationCOGNOS (R) 8 COGNOS CONNECTION USER GUIDE USER GUIDE THE NEXT LEVEL OF PERFORMANCE TM. Cognos Connection User Guide
COGNOS (R) 8 COGNOS CONNECTION USER GUIDE Cognos Connection User Guide USER GUIDE THE NEXT LEVEL OF PERFORMANCE TM Product Information This document applies to Cognos (R) 8 Version 8.1.2 MR2 and may also
More informationGetting Started with Outlook Web App (OWA)
Getting Started with Outlook Web App (OWA) Office 365 User Guide When first accessing your new Office 365 account, or if you are having any issues with your regular email client, use the below directions
More informationPECO SMART ENERGY USAGE DATA TOOL (PSEUDT)
PECO SMART ENERGY USAGE DATA TOOL (PSEUDT) BUILDING MANAGER USER GUIDE V2.5 2 Confidential Table of Contents 1. INTRODUCTION... 4 2. GETTING STARTED... 4 2.1 LOGGING IN TO PSEUDT... 4 2.2 THE PSEUDT DASHBOARD...
More informationBell Total Connect receptionist app. Quick reference guide
Bell Total Connect receptionist app Quick reference guide What s in this guide Welcome to the Bell Total Connect receptionist app... 1 1 Getting started... 1 1.1 Minimum system requirements... 1 1.2 Logging
More informationBUSINESS LINE COMMPORTAL GUIDE
wowforbusiness.com BUSINESS LINE COMMPORTAL GUIDE WOW! Business BCSE.U.1505.O Business Line CommPortal Guide Table of Contents Getting Started...3 Dashboard...4 Messages and Calls...5 Messages...5 Missed
More informationNetwork DK2 DESkey Installation Guide
VenturiOne Getting Started Network DK2 DESkey Installation Guide PD-061.2.306 DESkey Network Server Manual Rev A Applied Cytometry CONTENTS 1 DK2 Network Server Overview... 2 2 DK2 Network Server Installation...
More informationIBM DB2 Query Patroller. Administration Guide. Version 7 SC
IBM DB2 Query Patroller Administration Guide Version 7 SC09-2958-00 IBM DB2 Query Patroller Administration Guide Version 7 SC09-2958-00 Before using this information and the product it supports, be sure
More informationChime for Lync High Availability Setup
Chime for Lync High Availability Setup Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation
More informationIBM Security Access Manager Version January Federation Administration topics IBM
IBM Security Access Manager Version 9.0.2.1 January 2017 Federation Administration topics IBM IBM Security Access Manager Version 9.0.2.1 January 2017 Federation Administration topics IBM ii IBM Security
More information