Proposed User Experience for Handling Multiple Identity Providers in Network Identity Manager 2.0

Size: px
Start display at page:

Download "Proposed User Experience for Handling Multiple Identity Providers in Network Identity Manager 2.0"

Transcription

1 Proposed User Experience for Handling Multiple Identity Providers in Network Identity Manager 2.0 The current architecture of Network Identity Manager is designed around a single identity provider and multiple credentials providers. Since the only identity provider is Kerberos v5, all identities in Network Identity Manager represent Kerberos v5 principals. By implication, since every credential must be associated with an identity, all credentials derived their identity from a Kerberos v5 principal. One of the strengths of the Network Identity Manager framework is its ability to derive credentials from an identity credential (for example, a Kerberos v5 Ticket Granting Ticket.) This permits a single Kerberos v5 identity to be used to obtain tokens for multiple AFS cells or certificates from multiple Kerberized Certificate Authorities. PK INIT (RFC ) specifies a protocol for acquiring Kerberos v5 TGT via use of public key cryptography using either raw asymmetric key pairs or a certificate and private key (perhaps stored on a smartcard.) A single key pair or certificate and private key can be associated with one or more Kerberos v5 principals. A Kerberos v5 principal can be configured in the Key Distribution Center database to require PK INIT for TGT acquisition or permit it as an option instead of a password. In order to add support for PK INIT, it is proposed that Network Identity Manager 2.x support multiple identity providers (X.509 certificates and Kerberos v5.) One user experience that will be affected by this change is the obtain new credentials operation. This document outlines the proposed modifications to the user experience

2 Obtain new credentials operation The new credentials dialog will have a wizard interface with the following page flow: (One or more potential primary identities) (New identity) Start Identity Specification (No potential primary identities) Credential Options (Basic) Credential Options (Advanced) (Finish) (Finish) Progress End Overview of dialog flow Each node in the above diagram other than the "Start" and End nodes corresponds to a page in the obtain new credentials wizard. When the user initiates a new credentials operation, she will be presented with either the "Credential Options" page or the "Identity Specification" page depending on whether there are any candidate identities defined or not, respectively. The "Identity Specification" page is used to create a new identity which can then be used to obtain new credentials. Once an identity has been selected, control flows to the "Credential Options" view. Once the credentials acquisition process starts, the Progress page will be shown to indicate the progress of the operation. Credential Options The purpose of this view is to collect information from the user, including any privileged information, for a specific identity. The identity for which the dialog is displayed will be referred to as the primary identity. Successful completion of the dialog will result in an attempt to obtain new credentials for this identity. 2

3 This page will only be displayed if there are one or more candidates for a primary identity. Depending on the context in which the page was invoked, one of these candidates may have been implicitly selected as the primary identity. Examples of these are: If the new credentials dialog was launched as a result of a GSSAPI call, there might be an identity specified in the call, which will become the primary identity. If the "Credential Options" page was launched as a result of a successful completion of the "Identity Specification" page, then the identity that resulted from that page will be the implicit primary identity. If there is no implicit primary identity, then the identity which has been used most frequently in recent history will be selected as the primary identity. The "Credential Options" page has two modes of operation: The basic mode and the advanced mode. The basic mode is shown below. Figure 1 : Credential Options page (Basic mode) The top of the dialog displays the primary identity. Each identity is associated with an icon, which by default is an icon representing the identity provider. It can be customized by the user on a per identity basis. The identity provider is also identified by a string beside the identity name. The identity display area is active. It is rendered and acts like a drop down box. Clicking on the field allows the user to change the primary identity. If the user clicks on the field, it will expand to a secondary UI that has the affordance of a menu that lists the other candidate primary identities as well as an option for creating a new identity. 3

4 Figure 2 : Credentials Options page (Basic Mode) with identity menu Selecting any other identity will result in that identity becoming the active identity. Any identity specific controls that were being displayed will be replaced by controls corresponding to the new identity. If the user selects "Specify New Identity...", then the dialog would switch to the "Identity Specification" page. Implementation note: The list of potential identities will not be maintained by the Network Identity Manager application. Instead, all the identity providers will be queried for a list of potential identities for that credential type. Statistics used to order the list will be maintained by the application. The list will, in general, be unordered. The NIM application will keep track of the last known list by noting the relative position of each identity and then add any new identities at the end. Options: The list of potential primary identities can be sorted. However, for small lists, users tend to memorize the spatial location of UI elements and will be forced to read the list if they can't find the identity they are looking for in the location that they last remember seeing it. One compromise is to automatically sort the list if the number of identities exceeds a certain threshold. Each identity in the list will have a type that corresponds to the identity provider that exposed it. The icon displayed next to the identity name represents the type if the user has not assigned a custom icon to that identity. 4

5 Options: We can allow the identity provider to customize a short description string that will appear below the identity name. This can be used to give a more technical specification for the identity. If the list of identities is too long to be displayed in a single page, an optional scroll bar can be use to scroll the list. The area between the identity display and the dialog navigation buttons ('Advanced', 'Finish' and 'Cancel' buttons) consist of controls that are used for obtaining privileged information such as passwords. If no privileged information is required, this area will contain a message to that effect. It should never be empty. Figure 3 : Credentials Options page (Basic mode) showing an identity provider that requires no privileged interaction The preceding figure illustrates an example of what might be displayed to the user if no privileged information is required. If the user clicks on the "Advanced Options" button, or if the identity or user preferences state that it should be shown in Advanced mode, then the Credential Options page will switch to the Advanced mode. Figure 4 : Credential Options Page (Advanced mode) 5

6 The advanced mode is similar to the advanced mode in the new credentials dialog in existing versions of Network Identity Manager, with a few minor differences. There is no 'Identity' tab. It has been replaced by the 'Password' tab. The name of the tab corresponds to the kind of privileged information that is being requested. If no privileged interaction is required, this tab will be suppressed. Similar to the basic view, the top of the advanced view will also features an identity display button that can be used to switch to a different identity. When a different identity is selected as the primary identity, the entire set of tabs will need to be replaced. When multiple identity providers are supported, it is expected that not all credentials providers will be applicable for every identity type. In either mode, if there is sufficient information to proceed with the new credentials acquisition, then the 'Finish' button will become enabled and the default. Pressing this button will start the process of acquiring new credentials and may cause the dialog to switch to the progress page. Issues: There might be situations where multiple pages of interaction are needed before initial credentials can be successfully acquired, such as when the user s password needs to be changed, or a secondary authentication mechanism needs to be used. In this case, the Password tab or whichever tab is used for privileged information can be shown multiple times to the user. However, since knowing how many sessions of interaction are needed in advance is not always possible, these additional views may have to be shown after the user has selected the Finish button. This is problematic since it violates Wizard 97 guidelines on how the Finish button should function. When multiple sessions of privileged interaction is needed, the banner or the heading of the tab should clearly explain why it was necessary to prompt the user again and make it obvious that this is a new page of information. An alternative to showing the credential options page to the user multiple times with different Password tabs is to use a pop up modal dialog box to perform any additional interaction that is necessary. This makes it obvious to the user that additional interaction is necessary. The new credentials acquisition framework supports complex hierarchies of identities and credentials. Currently, the user experience (UX) framework does not aim to provide a dedicated specification for managing identity hierarchies. Note: The UX does not aim to aggregate the derived identities. Instead, individual credentials providers are expected to expose interfaces for deriving identities from individual credentials. 6

7 Note on credential options: Per identity settings are independent of the identity hierarchy used to obtain the identity credentials. In general, if a particular identity A is configured to obtain a particular credential C, then this should happen regardless of whether A is the primary identity or a derived identity. However, exceptions to this are allowed. If there is some credential that is sensitive to the identity hierarchy, then this should be made visible to the user through the Advanced Options page. If a credential cannot be obtained using the current identity hierarchy, it should be indicated to the user by making the specific credential appear disabled. If the sensitivity to the identity hierarchy is not known for a particular credential until the time an attempt is made to obtain the credential, the user should be notified about it including information on how she should rectify the situation. An example of a credentials provider that supports derived identities is shown below: Figure 5 : Credential Options page (Advanced mode) showing an identity with derived identities The sample sketch shows the credentials options tab for a hypothetical Secure Key Storage provider that allows specification of derived identities. For consistency, the NIM application will provide UX transactions for specifying new identities and configuring them. In the sketch above, clicking on the 'New Identity' button will launch another dialog that is similar to the Identity Selection menu or 'Identity Specification' page (depending on whether there are any identities to choose from) with a suitable caption. The 'Configure' button will similarly launch a UX transaction for configuring the selected derived identity. These UX transactions are described in Appendix A. Issues: Navigation: Even if the user is configuring a complicated hierarchy of identities, it should be easy for her to navigate the hierarchy. The proposed design does not 7

8 make the hierarchy obvious and does not allow configuring an arbitrary identity without navigating there by opening the advanced page of each node along the path to the target identity from the primary identity. Assuming that the Privileged Information tab has signaled that there is enough information to complete the credentials acquisition, the user will be able to click the 'finish' button to acquire credentials. Identity Specification The identity specification page is used to specify a new identity. This will be the initial page in the new credentials dialog/wizard if there are no known identities. Figure 6 : Identity Specification Page The top of the dialog contains a set of set of icons and names for the identity types that are supported. The user can select one of the icons, after which the identity type specific selectors appear below the icons. The sample above shows the user interface if the Kerberos v5 identity type is selected. The realm control is a combo box with auto complete semantics. If the drop down button is clicked, the user is presented with a list of recently used realms. The last item in the list is "(Show all realms)", which, if selected, displays all the realms in the drop down list. Implementation Note: The identity selector controls other than the row of buttons that select the identity type are provided by the selected identity provider. It's the identity provider's responsibility to signal to Network Identity Manager whether or not a valid identity is selected. Another sample view follows which demonstrates the selection of a certificate identity type. When the selected identity type is changed, the identity selector controls will be replaced with the set of controls that will assist in the specification or selection of an identity of that type. 8

9 Figure 7 : Identity Specification page with a certificate type identity When a valid identity is selected or specified, then the 'Next' button becomes enabled and becomes the default. At that point, the user can hit the 'return' key to proceed to the next page. The 'Back' button may be disabled if this is the first page presented to the user. Note on derived identity selection: The Identity Selection and Identity Specification pages only select the primary identity for the new credentials operation. Once a primary identity is known, the credentials providers and identity providers will be queried for the credentials and derived identities that will also be obtained. If there are any derived identities, they will be queried in turn to build a breadth first tree of credentials and derived identities. 9

10 Progress Page Since obtaining credentials is a time consuming task, it is proposed that there should be a progress page. It will not be required to display this page at every new credentials acquisition. However, it should be displayed after a certain amount of time has passed since the user initiated the credential acquisition if the operation is still on going. Figure 8 : Progress Page Implementation Note: The Network Identity Manager Message Queue supports marking dispatched messages as cancelled. This feature was added with the intent of supporting operations that can be cancelled. Certain credentials acquisition operations tend to be time consuming, especially if network access is slow. If the delay is particularly long, the user may wish to abort the operation in whole or in part. The mock up above shows a Cancel button for this purpose. However, current versions of Network Identity Manager don t implement this feature because most of these delays happen during calls to APIs beyond the scope of the application which can t be cancelled. Network Identity Manager 2.x series plans to implement this feature and credential providers are expected to comply with cancelled messages to the best of their ability. Options: It may be desirable to allow the user to cancel individual credential providers. If a user has configured multiple identities with multiple credential types, the user might not wish to obtain credentials for all identities all the time. Having this feature would allow the user to cancel out identities that are not necessary at that time. 10

11 Appendix A: Secondary UX Transactions The following UX transactions will be provided for use by credentials providers when adding or configuring derived identities. Derived Identity wizard The dialog flow for the derived identity wizard is as follows: Start Derived Identity Specification Credential Options for Derived Identity (Per Identity) End The Credential Options for Derived Identity page is mostly identical to the advanced mode of the 'Credential Options' page, with the exception that there is no tab for privileged information. The title bar will be different and will reflect the fact that a new identity is being derived from a specific identity. The 'Derived Identity Specification' page will resemble the Identity Specification page. When the wizard starts, it will check if there are any candidate identities for the user to choose from. If there are no candidates, then the wizard starts with the 'Derived Identity Specification' page. Implementation Note: The list of potential derived identities is not queried from anywhere. Instead it should be provided to the wizard when it is invoked. A derived identity can itself have other derived identities and will be exposed via a similar UI. Upon completion of the wizard, the caller will be notified of the new derived identity. If the user activates the identity button and selects Specify New Identity, the wizard will show the Derived Identity Specification page to allow the user to specify the new derived identity. The wizard runs as a modal dialog box. 11

12 New Derived Identity dialog The New Derived Identity wizard/dialog is simply a special case of the above 'Derived Identity' wizard where the wizard starts at the 'Identity Specification' page. The dialog runs as a modal dialog box. 12

AT&T Global Network Client for Mac User s Guide Version 1.7.3

AT&T Global Network Client for Mac User s Guide Version 1.7.3 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 1.7.3 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

AT&T Global Network Client for Mac User s Guide Version 2.0.0

AT&T Global Network Client for Mac User s Guide Version 2.0.0 Version 1.7.0 AT&T Global Network Client for Mac User s Guide Version 2.0.0 experience may vary. This document is not an offer, commitment, representation or warranty by AT&T and is subject to change..

More information

Configuring Microsoft Outlook to Connect to Hosted Exchange Service

Configuring Microsoft Outlook to Connect to Hosted Exchange Service Configuring Microsoft Outlook to Connect to Hosted Exchange Service Configuring Microsoft Outlook for Hosted Exchange Service Version: 1.0 Updated on: April 27, 2011 Page 1 of 7 TABLE OF CONTENTS Configuring

More information

Partner Integration Portal (PIP) Installation Guide

Partner Integration Portal (PIP) Installation Guide Partner Integration Portal (PIP) Installation Guide Last Update: 12/3/13 Digital Gateway, Inc. All rights reserved Page 1 TABLE OF CONTENTS INSTALLING PARTNER INTEGRATION PORTAL (PIP)... 3 DOWNLOADING

More information

Network Security Essentials

Network Security Essentials Network Security Essentials Fifth Edition by William Stallings Chapter 4 Key Distribution and User Authentication No Singhalese, whether man or woman, would venture out of the house without a bunch of

More information

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM)

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...

More information

A Guide to Quark Author Web Edition September 2016 Update

A Guide to Quark Author Web Edition September 2016 Update A Guide to Quark Author Web Edition 2015 - September 2016 Update CONTENTS Contents Getting Started...4 About Quark Author Web Edition...4 Smart documents...4 Introduction to the Quark Author Web Edition

More information

PASSPORTAL PLUGIN DOCUMENTATION

PASSPORTAL PLUGIN DOCUMENTATION Contents Requirements... 2 Install or Update Passportal Plugin Solution Center... 3 Configuring Passportal Plugin... 5 Client mapping... 6 User Class Configuration... 7 About the Screens... 8 Passportal

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Bloomberg Software Installation Manual New Bloomberg Professional Installer (InstallAware) English

Bloomberg Software Installation Manual New Bloomberg Professional Installer (InstallAware) English Bloomberg Software Installation Manual New Bloomberg Professional Installer (InstallAware) English 18 June 2018 Version: 1.0 2018 Bloomberg L.P. All rights reserved. 1 Download the Bloomberg Software...2

More information

Introduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security.

Introduction. Trusted Intermediaries. CSC/ECE 574 Computer and Network Security. Outline. CSC/ECE 574 Computer and Network Security. Trusted Intermediaries CSC/ECE 574 Computer and Network Security Topic 7. Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center () Representative solution:

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

A Guide to Quark Author Web Edition 2015

A Guide to Quark Author Web Edition 2015 A Guide to Quark Author Web Edition 2015 CONTENTS Contents Getting Started...4 About Quark Author - Web Edition...4 Smart documents...4 Introduction to the Quark Author - Web Edition User Guide...4 Quark

More information

BASICS. Create a Project. Click on a question below to skip to the answer. How do I create a project?

BASICS. Create a Project. Click on a question below to skip to the answer. How do I create a project? BASICS Create a Project Click on a question below to skip to the answer. How do I create a project? What is the difference between an Invitation-Only project and a General Access project? Can I delete

More information

TABLE OF CONTENTS CHAPTER 1. PROTOCOL APPLICATION PROCESS OVERVIEW

TABLE OF CONTENTS CHAPTER 1. PROTOCOL APPLICATION PROCESS OVERVIEW IBC Creating Protocol Applications TABLE OF CONTENTS CHAPTER 1. PROTOCOL APPLICATION PROCESS OVERVIEW... 1.1 CHAPTER 2. GENERAL INFORMATION... 2.1 2.1. STARTING AND LOGGING IN... 2.1 2.2. USING NAVIGATION

More information

SAS Data Explorer 2.1: User s Guide

SAS Data Explorer 2.1: User s Guide SAS Data Explorer 2.1: User s Guide Working with SAS Data Explorer Understanding SAS Data Explorer SAS Data Explorer and the Choose Data Window SAS Data Explorer enables you to copy data to memory on SAS

More information

Creating Reports in Access 2007 Table of Contents GUIDE TO DESIGNING REPORTS... 3 DECIDE HOW TO LAY OUT YOUR REPORT... 3 MAKE A SKETCH OF YOUR

Creating Reports in Access 2007 Table of Contents GUIDE TO DESIGNING REPORTS... 3 DECIDE HOW TO LAY OUT YOUR REPORT... 3 MAKE A SKETCH OF YOUR Creating Reports in Access 2007 Table of Contents GUIDE TO DESIGNING REPORTS... 3 DECIDE HOW TO LAY OUT YOUR REPORT... 3 MAKE A SKETCH OF YOUR REPORT... 3 DECIDE WHICH DATA TO PUT IN EACH REPORT SECTION...

More information

Team Member Management

Team Member Management Introduction Team Member Management When viewing this job aid electronically, click within the Contents to advance to desired page. Contents Introduction... 2 About STARS -... 2 Technical Assistance and

More information

Configuration Guide. Requires Vorex version 3.9 or later and VSA version or later. English

Configuration Guide. Requires Vorex version 3.9 or later and VSA version or later. English Kaseya v2 Integration of VSA with Vorex Configuration Guide Requires Vorex version 3.9 or later and VSA version 9.3.0.11 or later English September 15, 2017 Copyright Agreement The purchase and use of

More information

A Guide to Quark Author Web Edition October 2017 Update

A Guide to Quark Author Web Edition October 2017 Update A Guide to Quark Author Web Edition 2015 - October 2017 Update Contents Getting Started...1 Smart Documents...1 Introduction to the Quark Author Web Edition User Guide...1 Quark Author Web Edition configuration...1

More information

Trusted Intermediaries

Trusted Intermediaries AIT 682: Network and Systems Security Topic 7. Trusted Intermediaries Instructor: Dr. Kun Sun Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC)

More information

AIT 682: Network and Systems Security

AIT 682: Network and Systems Security AIT 682: Network and Systems Security Topic 7. Trusted Intermediaries Instructor: Dr. Kun Sun Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC)

More information

Digest Authentication Setup for SIP Trunks

Digest Authentication Setup for SIP Trunks This chapter provides information about digest authentication setup for SIP trunks. When you configure digest authentication for SIP trunks, Cisco Unified Communications Manager challenges the identity

More information

Administration. Training Guide. Infinite Visions Enterprise Edition phone toll free fax

Administration. Training Guide. Infinite Visions Enterprise Edition phone toll free fax Administration Training Guide Infinite Visions Enterprise Edition 406.252.4357 phone 1.800.247.1161 toll free 406.252.7705 fax www.csavisions.com Copyright 2005 2011 Windsor Management Group, LLC Revised:

More information

ForeScout Extended Module for Tenable Vulnerability Management

ForeScout Extended Module for Tenable Vulnerability Management ForeScout Extended Module for Tenable Vulnerability Management Version 2.7.1 Table of Contents About Tenable Vulnerability Management Module... 4 Compatible Tenable Vulnerability Products... 4 About Support

More information

SQL Server. Management Studio. Chapter 3. In This Chapter. Management Studio. c Introduction to SQL Server

SQL Server. Management Studio. Chapter 3. In This Chapter. Management Studio. c Introduction to SQL Server Chapter 3 SQL Server Management Studio In This Chapter c Introduction to SQL Server Management Studio c Using SQL Server Management Studio with the Database Engine c Authoring Activities Using SQL Server

More information

ForeScout Extended Module for MaaS360

ForeScout Extended Module for MaaS360 Version 1.8 Table of Contents About MaaS360 Integration... 4 Additional ForeScout MDM Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

INSTALLATION GUIDE Spring 2017

INSTALLATION GUIDE Spring 2017 INSTALLATION GUIDE Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and

More information

Using Two-Factor Authentication to Connect to a Kerberos-enabled Informatica Domain

Using Two-Factor Authentication to Connect to a Kerberos-enabled Informatica Domain Using Two-Factor Authentication to Connect to a Kerberos-enabled Informatica Domain Copyright Informatica LLC 2016, 2018. Informatica LLC. No part of this document may be reproduced or transmitted in any

More information

Modern Requirements4TFS 2018 Update 1 Release Notes

Modern Requirements4TFS 2018 Update 1 Release Notes Modern Requirements4TFS 2018 Update 1 Release Notes Modern Requirements 6/22/2018 Table of Contents 1. INTRODUCTION... 3 2. SYSTEM REQUIREMENTS... 3 3. APPLICATION SETUP... 3 GENERAL... 4 1. FEATURES...

More information

Remote Support 19.1 Web Rep Console

Remote Support 19.1 Web Rep Console Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property

More information

ONE ID Identity and Access Management System

ONE ID Identity and Access Management System ONE ID Identity and Access Management System Local Registration Authority User Guide Document Identifier: 2274 Version: 1.8 Page 1 Copyright Notice Copyright 2011, ehealth Ontario All rights reserved No

More information

Business Insight Authoring

Business Insight Authoring Business Insight Authoring Getting Started Guide ImageNow Version: 6.7.x Written by: Product Documentation, R&D Date: August 2016 2014 Perceptive Software. All rights reserved CaptureNow, ImageNow, Interact,

More information

Managed Access Gateway. User Guide

Managed Access Gateway. User Guide Managed Access Gateway User Guide Version 2.2 Exostar, LLC November 3, 2011 Table of Contents Table of Contents... ii Purpose... 1 Log-in to your MAG Account... 2 Additional MAG Login Options... 2 First

More information

Understanding the Local KDC

Understanding the Local KDC Appendix C Understanding the Local KDC The local Key Distribution Center (LKDC) facilitates single sign-on for Apple Filing Protocol (AFP) file sharing and screen sharing, and although it is outside the

More information

Privileged Access Management Android Access Console 2.2.2

Privileged Access Management Android Access Console 2.2.2 Privileged Access Management Android Access Console 2.2.2 2015 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown

More information

TRAINING GUIDE. ArcGIS Online and Lucity

TRAINING GUIDE. ArcGIS Online and Lucity TRAINING GUIDE ArcGIS Online and Lucity ArcGIS Online and Lucity This covers some basic functionality we feel you will need to be successful with Lucity with ArcGIS Online or Portal for ArcGIS Enterprise.

More information

EWAY RAPID SETUP GUIDE FOR

EWAY RAPID SETUP GUIDE FOR EWAY RAPID SETUP GUIDE FOR CONTENTS 1. Add ewayrapid payment method to your online shop... 2 2. Configure and activate ewayrapid payment method... 3 3. Add eway logo and credit card types to your website...

More information

SpiraTeam Help Desk Integration Guide Inflectra Corporation

SpiraTeam Help Desk Integration Guide Inflectra Corporation / SpiraTeam Help Desk Integration Guide Inflectra Corporation Date: July 23rd, 2018 Contents Introduction... 1 1. KronoDesk... 2 2. Zendesk... 7 Introduction SpiraTeam is an integrated Application Lifecycle

More information

OpenAFS MAC 10.2 System Requirements and Installation

OpenAFS MAC 10.2 System Requirements and Installation Information Technology, Arizona State University OpenAFS MAC 10.2 System Requirements and Installation COMMUNICATIONS 8/2004 This document assists in setting up a process for logging into Mac OS 10.2 with

More information

Two factor authentication for Microsoft Remote Desktop Web Access

Two factor authentication for Microsoft Remote Desktop Web Access Two factor authentication for Microsoft Remote Desktop Web Access logintc.com/docs/connectors/rd-web-access.html Overview The LoginTC RD Web Access Connector protects access to your Microsoft Remote Desktop

More information

Secure Web Appliance. Basic Usage Guide

Secure Web Appliance. Basic Usage Guide Secure Web Appliance Basic Usage Guide Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About this Manual... 1 1.2.1. Document Conventions... 1 2. Description of the

More information

Managed Access Gateway. User Guide

Managed Access Gateway. User Guide Managed Access Gateway User Guide Version 3.0 Exostar, LLC April 20, 2013 Table of Contents Table of Contents...ii Purpose... 1 Log-in to your MAG Account... 2 Additional MAG Login Options... 2 First Time

More information

Best Practices Benchmarking Application

Best Practices Benchmarking Application 1 1. Introduction For the purposes of this user manual, all menu items are visible in all screen shots. Depending upon the users privileges, the user s menu option may vary from what is shown in the screen

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

Remote Support Web Rep Console

Remote Support Web Rep Console Remote Support Web Rep Console 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their

More information

Area Access Manager User Guide

Area Access Manager User Guide Area Access Manager User Guide Area Access Manager User Guide Table of Contents Chapter 1: Introduction...9 Conventions Used in this Documentation... 9 Getting Started... 10 Licensing Requirements...

More information

Configuring Remote Access using the RDS Gateway

Configuring Remote Access using the RDS Gateway Configuring Remote Access using the RDS Gateway Author: AC, SNE Contents Introduction... 3 Pre-requisites... 3 Supported Operating Systems... 3 Installing the I.T. Services Certificate Authority Root Certificate...

More information

Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording

Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording Contents 1 About This Document... 2 2 Overview... 2 3 Before You Begin... 2 4 Deploying ObserveIT with IBM

More information

MANAGEMENT AND CONFIGURATION MANUAL

MANAGEMENT AND CONFIGURATION MANUAL MANAGEMENT AND CONFIGURATION MANUAL Page 1 of 31 Table of Contents Overview... 3 SYSTEM REQUIREMENTS... 3 The Administration Console... 3 CHAT DASHBOARD... 4 COMPANY CONFIGS... 4 MANAGE LEARNING... 7 MANAGE

More information

AT&T Global Network Client for Android

AT&T Global Network Client for Android Version 4.1.0 AT&T Global Network Client for Android 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual

More information

Poet Image Description Tool: Step-by-step Guide

Poet Image Description Tool: Step-by-step Guide Poet Image Description Tool: Step-by-step Guide Introduction This guide is designed to help you use the Poet image description tool to add image descriptions to DAISY books. The tool assumes you have access

More information

CIS 6930/4930 Computer and Network Security. Topic 7. Trusted Intermediaries

CIS 6930/4930 Computer and Network Security. Topic 7. Trusted Intermediaries CIS 6930/4930 Computer and Network Security Topic 7. Trusted Intermediaries 1 Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC) Representative

More information

Bridgeware Systems War Board Documentation

Bridgeware Systems War Board Documentation Introduction Temps Plus War Board Help Bridgeware Systems War Board Documentation Version date 2/3/2006 WarBoard.chm Version 4 Please visit www.bridgeware.net/webhelp for ideas, examples, and further education

More information

SpiraTeam Help Desk Integration Guide Inflectra Corporation

SpiraTeam Help Desk Integration Guide Inflectra Corporation / SpiraTeam Help Desk Integration Guide Inflectra Corporation Date: June 12, 2017 Contents Introduction... 1 1. Zendesk... 2 Introduction SpiraTeam is an integrated Application Lifecycle Management (ALM)

More information

Colleague UI4.3 Documentation

Colleague UI4.3 Documentation Colleague UI4.3 Documentation Table of Contents Getting Started... 2 Add the Shortcuts to your Desktop... 2 Searching for and Using Forms... 3 Begin Your Form Search... 3 Form Search Results... 3 The Navigation

More information

Wholesale Lockbox User Guide

Wholesale Lockbox User Guide Wholesale Lockbox User Guide August 2017 Copyright 2017 City National Bank City National Bank Member FDIC For Client Use Only Table of Contents Introduction... 3 Getting Started... 4 System Requirements...

More information

ForeScout Extended Module for MobileIron

ForeScout Extended Module for MobileIron Version 1.8 Table of Contents About MobileIron Integration... 4 Additional MobileIron Documentation... 4 About this Module... 4 How it Works... 5 Continuous Query Refresh... 5 Offsite Device Management...

More information

Release Notes Life Technologies Attune NxT Software v2.3

Release Notes Life Technologies Attune NxT Software v2.3 Release Notes Life Technologies Attune NxT Software v2.3 In the following pages you will find instructions describing: New software features Known software/system issues with troubleshooting guidance Software

More information

Blog to Contents. User Guide March 11, 2008

Blog to Contents. User Guide March 11, 2008 User Guide March 11, 2008 Contents Blog Accessing the My Blog page Searching for a Blog Entry Viewing blogs Viewing public blog entries and comments Viewing private blog entries Viewing Blogs Externally

More information

Install and Configure the TS Agent

Install and Configure the TS Agent Install or Upgrade the TS Agent, page 1 Start the TS Agent Configuration Interface, page 2 Configure the TS Agent, page 2 Creating the REST VDI Role, page 7 Install or Upgrade the TS Agent Before You Begin

More information

User Guide. 3CX CRM Plug-in for Zendesk. Version

User Guide. 3CX CRM Plug-in for Zendesk. Version User Guide 3CX CRM Plug-in for Zendesk Version 15.5.89 "Copyright VoIPTools, LLC 2011-2018" Information in this document is subject to change without notice. No part of this document may be reproduced

More information

9.0 Help for Community Managers About Jive for Google Docs...4. System Requirements & Best Practices... 5

9.0 Help for Community Managers About Jive for Google Docs...4. System Requirements & Best Practices... 5 for Google Docs Contents 2 Contents 9.0 Help for Community Managers... 3 About Jive for Google Docs...4 System Requirements & Best Practices... 5 Administering Jive for Google Docs... 6 Quick Start...6

More information

How to Import a Certificate When Using Microsoft Windows OS

How to Import a Certificate When Using Microsoft Windows OS How to Import a Certificate When Using Microsoft Windows OS This document explains the process of importing your digital certificate for use in Microsoft Internet Explorer (IE) and/or Mozilla Firefox.

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on

More information

INBUSINESS BANKING SYSTEM

INBUSINESS BANKING SYSTEM Introducing your new INBUSINESS BANKING SYSTEM Companion Guide to Business Banking Video Tutorials Updated 0.09.8 WELCOME TO THE INBUSINESS SYSTEM The InBusiness System will help you efficiently and securely

More information

Frequently Asked Questions Contents

Frequently Asked Questions Contents Frequently Asked Questions Contents How do I open a saved application?... 2 How do I print my application?... 3 Is there a time limit on how long my session lasts?... 5 Is it alright to use my Web browser

More information

MyFloridaNet-2 (MFN-2) Customer Portal/ Password Management/ VPN Reference Guide

MyFloridaNet-2 (MFN-2) Customer Portal/ Password Management/ VPN Reference Guide MyFloridaNet-2 (MFN-2) Customer Portal/ Password Management/ VPN Reference Guide i VISION RECORDS REVISION DATE DESCRIPTION 0 27 September 2017 Initial Submittal. 1 Second Submittal. ii TABLE OF CONTENTS

More information

OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2007

OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2007 OUTLOOK ANYWHERE CONNECTION GUIDE FOR USERS OF OUTLOOK 2007 CONTENTS What is Outlook Anywhere? Before you begin How do I configure Outlook Anywhere with Outlook 2007? How do I use Outlook Anywhere? I already

More information

RSA Authentication Manager 7.1 Help Desk Administrator s Guide

RSA Authentication Manager 7.1 Help Desk Administrator s Guide RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

Using PDC's resources in Applied CFD. Elisabet Molin PDC

Using PDC's resources in Applied CFD. Elisabet Molin PDC Using PDC's resources in Applied CFD Elisabet Molin PDC support@pdc.kth.se 1 What is PDC? q National high-performance computing center q Located at KTH, hosted by CSC q Swedish National Infrastructure

More information

OKTA users provisioning for Vable platform

OKTA users provisioning for Vable platform OKTA users provisioning for Vable platform Features Requirements Step-by-step Configuration Instructions Requesting Vable OKTA integration Adding Vable private application to organization account Configuring

More information

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide Microsoft Office Groove Server 2007 Groove Manager Domain Administrator s Guide Copyright Information in this document, including URL and other Internet Web site references, is subject to change without

More information

Colligo Manager 5.4 SP3. User Guide

Colligo  Manager 5.4 SP3. User Guide 5.4 SP3 User Guide Contents Enterprise Email Management for SharePoint 2010 1 Benefits 1 Key Features 1 Platforms Supported 1 Installing and Activating Colligo Email Manager 2 Checking for Updates 4 Updating

More information

BQS User Guide For Online (Hosted) Approved Centres

BQS User Guide For Online (Hosted) Approved Centres BQS User Guide For Online (Hosted) Approved Centres April 2013 v3.0 Contents 1. Getting Started... 3 1.1 Administration... 3 1.2 Automated Testing Software... 3 2. BQS Web Administration... 4 2.1 The Login

More information

OPC UA Configuration Manager PTC Inc. All Rights Reserved.

OPC UA Configuration Manager PTC Inc. All Rights Reserved. 2017 PTC Inc. All Rights Reserved. 2 Table of Contents 1 Table of Contents 2 4 Overview 4 5 Project Properties - OPC UA 5 Server Endpoints 7 Trusted Clients 9 Discovery Servers 10 Trusted Servers 11 Instance

More information

Document Management System GUI. v6.0 User Guide

Document Management System GUI. v6.0 User Guide Document Management System GUI v6.0 User Guide Copyright Copyright HelpSystems, LLC. All rights reserved. www.helpsystems.com US: +1 952-933-0609 Outside the U.S.: +44 (0) 870 120 3148 IBM, AS/400, OS/400,

More information

Cisco NAC Appliance Agents

Cisco NAC Appliance Agents 10 CHAPTER This chapter presents overviews, login flow, and session termination dialogs for the following Cisco NAC Appliance access portals: Cisco NAC Agent, page 10-1 Cisco NAC Web Agent, page 10-28

More information

8.0.6 New Features Guide Auto Window/Level Adjustments

8.0.6 New Features Guide Auto Window/Level Adjustments 8.0.6 New Features Guide Improvements to the feature allow users to quickly and easily set for images. These adjustments will be automatically and consistently applied to similar images. Window/Level Adjustments

More information

Smart Answer Operator Manual rev. 1.0.

Smart Answer Operator Manual rev. 1.0. Smart Answer Operator Manual rev. 1.0. 2003-2009 Eastwright Corp. www.eastwright.com 1.System Overview 1.1. Concepts The Smart Answer is a web based help desk system. The program allows efficient processing

More information

Comodo LoginPro Software Version 1.0

Comodo LoginPro Software Version 1.0 Comodo LoginPro Software Version 1.0 User Guide Guide Version 1.0.102512 Comodo Security Solutions 1255 Broad Street STE 100 Clifton, NJ 07013 Table of Contents 1.Introduction to Comodo LoginPro... 3 1.1.System

More information

Portfolio Account Link (PAL ) User Guide

Portfolio Account Link (PAL ) User Guide Getting Started / First Time Login... 2 Password Authentication... 2 Multifactor Authentication... 3 Trouble Signing In?... 7 Information Banner and Report Headings... 8 Account Access... 8 Portfolio Review...

More information

RB Digital Signature Proxy Guide for Reporters

RB Digital Signature Proxy Guide for Reporters RB Digital Signature Proxy Guide for Reporters Table of Contents RB-DSP registration workflow.... 1 Obtaining your certificate.... 2 Using Firefox to obtain your certificate.... 2 Using Internet Explorer

More information

Novell Kerberos Login Method for NMASTM

Novell Kerberos Login Method for NMASTM Novell Kerberos Login Method for NMASTM 1.0 ADMINISTRATION GUIDE www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

MAGNUM-SDVN Security Administration Manual

MAGNUM-SDVN Security Administration Manual MAGNUM-SDVN Security Administration Manual Revision 19: November 21, 2017 Contents Overview... 3 Administrative Access... 4 Logging Into Terminal Locally... 4 Logging Out Of Local Terminal... 4 Logging

More information

USER QUICK LOOK FOR FACULTY & STAFF

USER QUICK LOOK FOR FACULTY & STAFF TABLE OF CONTENTS ACCESSING ONTRACK... 2 PROFILE INFORMATION... 3 INSTITUTIONAL PROFILE... 3 APPOINTMENT PREFERENCES:... 3 EMAIL NOTIFICATIONS... 3 UPDATE YOUR PROFILE... 4 INSTITUTIONAL PROFILE... 4 APPOINTMENT

More information

Info Input Express Network Edition

Info Input Express Network Edition Info Input Express Network Edition Administrator s Guide A-61892 Table of Contents Using Info Input Express to Create and Retrieve Documents... 9 Compatibility... 9 Contents of this Guide... 9 Terminology...

More information

Installing and Configuring the TS Agent

Installing and Configuring the TS Agent Installing the TS Agent, page 1 Starting the TS Agent Configuration Interface, page 2 Configuring the TS Agent, page 2 Creating the REST VDI Role, page 7 Installing the TS Agent Before You Begin Confirm

More information

MyTeleMed iphone User Guide

MyTeleMed iphone User Guide Table of Contents Log In 2 Incorrect Login Information 2 Registering your iphone 2 Main Menu 3 Messages 3 Compose a New Message 4 Message Recipients 4 Archiving Messages 4 Message Detail 5 Add Comments

More information

8x8 Virtual Office Sage ACT! Integration User Guide

8x8 Virtual Office Sage ACT! Integration User Guide 8x8 Virtual Office Version 1.1, January 2015 Table of Contents 8x8 Virtual Office Sage ACT! Integration....................3 System Requirements...3 Uninstalling ACT! Integration Software...3 Installation...4

More information

Interaction Center Business Manager Supervisor Functions

Interaction Center Business Manager Supervisor Functions Interaction Center Business Manager Supervisor Functions CIC 2016 RX 1 Contents Interaction Supervisor... 10 Introduction... 10 Views... 10 Access to Views is controlled by License Assignment... 11 Alerts...

More information

COGNOS (R) 8 COGNOS CONNECTION USER GUIDE USER GUIDE THE NEXT LEVEL OF PERFORMANCE TM. Cognos Connection User Guide

COGNOS (R) 8 COGNOS CONNECTION USER GUIDE USER GUIDE THE NEXT LEVEL OF PERFORMANCE TM. Cognos Connection User Guide COGNOS (R) 8 COGNOS CONNECTION USER GUIDE Cognos Connection User Guide USER GUIDE THE NEXT LEVEL OF PERFORMANCE TM Product Information This document applies to Cognos (R) 8 Version 8.1.2 MR2 and may also

More information

Getting Started with Outlook Web App (OWA)

Getting Started with Outlook Web App (OWA) Getting Started with Outlook Web App (OWA) Office 365 User Guide When first accessing your new Office 365 account, or if you are having any issues with your regular email client, use the below directions

More information

PECO SMART ENERGY USAGE DATA TOOL (PSEUDT)

PECO SMART ENERGY USAGE DATA TOOL (PSEUDT) PECO SMART ENERGY USAGE DATA TOOL (PSEUDT) BUILDING MANAGER USER GUIDE V2.5 2 Confidential Table of Contents 1. INTRODUCTION... 4 2. GETTING STARTED... 4 2.1 LOGGING IN TO PSEUDT... 4 2.2 THE PSEUDT DASHBOARD...

More information

Bell Total Connect receptionist app. Quick reference guide

Bell Total Connect receptionist app. Quick reference guide Bell Total Connect receptionist app Quick reference guide What s in this guide Welcome to the Bell Total Connect receptionist app... 1 1 Getting started... 1 1.1 Minimum system requirements... 1 1.2 Logging

More information

BUSINESS LINE COMMPORTAL GUIDE

BUSINESS LINE COMMPORTAL GUIDE wowforbusiness.com BUSINESS LINE COMMPORTAL GUIDE WOW! Business BCSE.U.1505.O Business Line CommPortal Guide Table of Contents Getting Started...3 Dashboard...4 Messages and Calls...5 Messages...5 Missed

More information

Network DK2 DESkey Installation Guide

Network DK2 DESkey Installation Guide VenturiOne Getting Started Network DK2 DESkey Installation Guide PD-061.2.306 DESkey Network Server Manual Rev A Applied Cytometry CONTENTS 1 DK2 Network Server Overview... 2 2 DK2 Network Server Installation...

More information

IBM DB2 Query Patroller. Administration Guide. Version 7 SC

IBM DB2 Query Patroller. Administration Guide. Version 7 SC IBM DB2 Query Patroller Administration Guide Version 7 SC09-2958-00 IBM DB2 Query Patroller Administration Guide Version 7 SC09-2958-00 Before using this information and the product it supports, be sure

More information

Chime for Lync High Availability Setup

Chime for Lync High Availability Setup Chime for Lync High Availability Setup Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation

More information

IBM Security Access Manager Version January Federation Administration topics IBM

IBM Security Access Manager Version January Federation Administration topics IBM IBM Security Access Manager Version 9.0.2.1 January 2017 Federation Administration topics IBM IBM Security Access Manager Version 9.0.2.1 January 2017 Federation Administration topics IBM ii IBM Security

More information