Security Authentication and Authorization What s New in security in QlikView 11. Fredrik Lautrup Ralph Senseny

Size: px
Start display at page:

Download "Security Authentication and Authorization What s New in security in QlikView 11. Fredrik Lautrup Ralph Senseny"

Transcription

1 Security Authentication and Authorization What s New in security in QlikView 11 Fredrik Lautrup Ralph Senseny

2 Legal Disclaimer This Presentation contains forward-looking statements, including, but not limited to, statements regarding the value and effectiveness of QlikTech's products, the introduction of product enhancements or additional products and QlikTech's growth, expansion and market leadership, that involve risks, uncertainties, assumptions and other factors which, if they do not materialize or prove correct, could cause QlikTech's results to differ materially from those expressed or implied by such forward-looking statements. All statements, other than statements of historical fact, are statements that could be deemed forward-looking statements, including statements containing the words "predicts," "plan," "expects," "anticipates," "believes," "goal," "target," "estimate," "potential," "may", "will," "might," "could," and similar words. QlikTech intends all such forward-looking statements to be covered by the safe harbor provisions for forward-looking statements contained in Section 21E of the Exchange Act and the Private Securities Litigation Reform Act of Actual results may differ materially from those projected in such statements due to various factors, including but not limited to: risks and uncertainties inherent in our business; our ability to attract new customers and retain existing customers; our ability to effectively sell, service and support our products; our ability to manage our international operations; our ability to compete effectively; our ability to develop and introduce new products and addons or enhancements to existing products; our ability to continue to promote and maintain our brand in a cost-effective manner; our ability to manage growth; our ability to attract and retain key personnel; the scope and validity of intellectual property rights applicable to our products; adverse economic conditions in general and adverse economic conditions specifically affecting the markets in which we operate; and other risks more fully described in QlikTech's publicly available filings with the Securities and Exchange Commission. Past performance is not necessarily indicative of future results. The forward-looking statements included in this presentation represent QlikTech's views as of the date of this presentation. QlikTech anticipates that subsequent events and developments will cause its views to change. QlikTech undertakes no intention or obligation to update or revise any forward-looking statements, whether as a result of new information, future events or otherwise. These forward-looking statements should not be relied upon as representing QlikTech's views as of any date subsequent to the date of this presentation. This Presentation should be read in conjunction with QlikTech's periodic reports filed with the SEC (SEC Information), including the disclosures therein of certain factors which may affect QlikTech s future performance. Individual statements appearing in this Presentation are intended to be read in conjunction with and in the context of the complete SEC Information documents in which they appear, rather than as stand-alone statements Qlik Technologies Inc. All rights reserved. QlikTech and QlikView are trademarks or registered trademarks of Qlik Technologies Inc. or its subsidiaries in the U.S. and other countries. Other company names, product names and company logos mentioned herein are the trademarks, or registered trademarks of their owners.

3 Agenda Overview Ways to customize authentication Header Solution Web Tickets QlikView s Authentication.aspx API Authorization between services Certificates Questions and Answers

4 Overview

5 Basic Architecture Trust QlikView Authentication server

6 Cutomizing Authentication Get user id and credentials Verify credentials Transfer user identity to QlikView

7 Web Server Authentication Who are you? QlikView Server Authorisation What documents can I see? User Docs Front End QlikView Publisher Authorisation What data sources can I use? Source Docs Back End

8 Header Solution High Low

9 Header Solution - Architecture Trust zone A Trust Zone B Header Authentication server

10 Use case Integration using proxy Trust zone A Trust Zone B Header: QVUSER=A User ID A Apache reverse proxy

11 Use case SSO using filter Header IIS

12 Web Tickets High High Low

13 Web Tickets Trust Authenticating system User Directory

14 Use case SAML using Webtickets SAML Identity Provider Trust SAML Service provider

15 QlikView s Authentication.aspx API High High Low

16 Authenticate.aspx - Architecture User Directory Authenticate to external directory Login Transfer user identity to Qlikview

17 Authenticate.aspx flow Login failure No Get user credentials Authenticate to external system Success Yes Resolv user groups Transfer user to QlikView

18 Pseudo code //Validate credentials with external authentication system List<string> groups = new List<string>(); groups.add( NTDOMAIN\\EXPORTXLS"); //Allow him to export to Excel for this session groups.add( MOBILE"); //He can see data that is allowed from mobile devices IUser user = new NamedUser("NTDOMAIN\\XXX", groups, true); QlikView.AccessPoint.User.GenericAuthentication(context, user); //Ready to use QV

19 Use Case Authenticate.aspx LDAP Directory Group resolution using Directory Service Connector Authenticate to external directory Login Transfer user identity to Qlikview

20 Use Case Authenticate.aspx LDAP Directory Group resolution using Directory Service Connector Request Verify certificate Transfer user identity to Qlikview

21 Gererall security requirements All authentication needs to be protected from evesdropping Use encrypted communication such as HTTPS or VPN All authentication is done outside the QlikView system therefore there needs to be established trust between the systems IP address whitelists Firewall restrictions Authentication using something you have Hardening of the IIS platform in accordance with local security policy

22 How to Choose a Solution Yes Web frontend to integrate with No Yes Need to integrate content into portal using IFrames No Authenticate.aspx WebTicket Yes Need to transfer groups from authentication system No WebTicket Yes SSO system with header support No Header WebTicket

23 Certificates

24 Certificates Features Configuring Certificates, in a multiple server deployment within QlikView, removes the dependency of a QlikView Administration Group Certificates allows the use of certificates to build a trust domain between services that can be located between different domains/areas such as internal networks, extranets and internet Eliminates the need to share an Active Directory (AD) or other user directories. The architecture is based on the QlikView Management Service (QMS) as the certificate manager (CA, Certificate Authority). The QMS will be able to create and distribute certificates to all services in the QlikView installation.

25 Certificates Certificate Structure When deploying Certificates all QlikView servers must be configured for certificates. QlikView services participating in the installation will receive certificates signed using this root certificate when added to the QMS. QMS as the Certificate Authority(CA) issues digital certificates that contain keys and the identity of the owner QlikView Management Service is an important part of the security solution and needs to be managed from a secure location to keep the certificate solution secure. The QMS is responsible for saying "yes, this service deployed on this server is a service in my installation".

26 Questions

27 With QlikView there are many ways to solve authentication it s just a matter of selecting the appropriate one based on the pre requisites of the customer

28 Stay Qonnected Fredrik Lautrup, Ralph Senseny,

29 Stay Qonnected Visit partners.qlikview.com to download all Qonnections 2012 presentations Join the conversation Qonnections Community Group tinyurl.com/qonnect-qlikcommunity Qonnect Facebook Group tinyurl.com/qonnect-facebook Qonnect LinkedIn Group tinyurl.com/qonnect-linkedin

30 Thank you!

Enterprise Considerations. Michael Robertshaw Miha Batic

Enterprise Considerations. Michael Robertshaw Miha Batic Architecture and Security Enterprise Considerations Michael Robertshaw Miha Batic Legal Disclaimer This Presentation contains forward-looking statements, including, but not limited to, statements regarding

More information

Qlik Sense Security. Understand security basics of the new Sense platform. 14 October, 2014 Magnus Berg Master Principal Enterprise Architect

Qlik Sense Security. Understand security basics of the new Sense platform. 14 October, 2014 Magnus Berg Master Principal Enterprise Architect Qlik Sense Security Understand security basics of the new Sense platform 14 October, 2014 Magnus Berg Master Principal Enterprise Architect Legal Disclaimer This Presentation contains forward-looking statements,

More information

QlikView in Depth - Business Discovery Everywhere QlikView on Mobile platforms. Petra Bloem Marc Huijbregts

QlikView in Depth - Business Discovery Everywhere QlikView on Mobile platforms. Petra Bloem Marc Huijbregts Business Discovery World Tour QlikView in Depth - Business Discovery Everywhere QlikView on Mobile platforms Petra Bloem Marc Huijbregts Legal Disclaimer This Presentation contains forward-looking statements,

More information

CA Single Sign-On and LDAP/AD integration

CA Single Sign-On and LDAP/AD integration CA Single Sign-On and LDAP/AD integration CA Single Sign-On and LDAP/AD integration Legal notice Copyright 2017 LAVASTORM ANALYTICS, INC. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS HEREOF MAY NOT BE REPRODUCED

More information

Cloud Access Manager Overview

Cloud Access Manager Overview Cloud Access Manager 8.1.3 Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

This presentation and the documents incorporated by reference herein contain forward-looking statements regarding future events and our future

This presentation and the documents incorporated by reference herein contain forward-looking statements regarding future events and our future This presentation and the documents incorporated by reference herein contain forward-looking statements regarding future events and our future results that are subject to the safe harbor provisions of

More information

Server Installation Guide

Server Installation Guide Server Installation Guide Server Installation Guide Legal notice Copyright 2018 LAVASTORM ANALYTICS, INC. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS HEREOF MAY NOT BE REPRODUCED OR DISTRIBUTED IN ANY

More information

5348 Vegas Drive Las Vegas, NV 89108, U.S.A. Tel: ; Fax: Website:

5348 Vegas Drive Las Vegas, NV 89108, U.S.A. Tel: ; Fax: Website: The information in this document includes certain "forward-looking" statements within the meaning of the Safe Harbor provisions of Federal Securities Laws, as that term is defined in section 27a of the

More information

Qlik Sense Mobile September 2018 (version 1.6.1) release notes

Qlik Sense Mobile September 2018 (version 1.6.1) release notes Release Notes Qlik Sense Mobile September 2018 (version 1.6.1) release notes qlik.com Table of Contents Overview 3 Compatibility 3 Bug fixes 4 Qlik Sense Mobile September 2018 (version 1.6.1) 4 Qlik Sense

More information

Securing Your Salesforce Org: The Human Factor. February 2016 User Group Meeting

Securing Your Salesforce Org: The Human Factor. February 2016 User Group Meeting Securing Your Salesforce Org: The Human Factor February 2016 User Group Meeting Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

Dell One Identity Cloud Access Manager 8.0. Overview

Dell One Identity Cloud Access Manager 8.0. Overview Dell One Identity Cloud Access Manager 8.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Secure Held Print Jobs

Secure Held Print Jobs Secure Held Print Jobs Version 3.0 Administrator's Guide January 2016 www.lexmark.com Contents 2 Contents Change history... 3 Overview... 4 Deployment readiness checklist...5 Configuring the printer settings...

More information

Trusted Login Connector (Hosted SSO)

Trusted Login Connector (Hosted SSO) Trusted Login Connector (Hosted SSO) Table of Contents Summary... 3 Frequently Asked Questions... 3 Architecture... 5 Installation/configuration... 5 2 Summary New functionality allows SelectHR users to

More information

System requirements for Qlik Sense. Qlik Sense June 2018 Copyright QlikTech International AB. All rights reserved.

System requirements for Qlik Sense. Qlik Sense June 2018 Copyright QlikTech International AB. All rights reserved. System requirements for Qlik Sense Qlik Sense June 2018 Copyright 1993-2018 QlikTech International AB. All rights reserved. Copyright 1993-2018 QlikTech International AB. All rights reserved. Qlik, QlikTech,

More information

SAP Single Sign-On 2.0 Overview Presentation

SAP Single Sign-On 2.0 Overview Presentation SAP Single Sign-On 2.0 Overview Presentation June 2014 Public Legal disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue

More information

Modernizing Meetings: Delivering Intel Unite App Authentication with RFID

Modernizing Meetings: Delivering Intel Unite App Authentication with RFID Modernizing Meetings: Delivering Intel Unite App Authentication with RFID INTEL UNITE SOLUTION WHITE PAPER Revision 1.0 Document Number: 599309-1.0 Legal Disclaimers and Copyrights All information provided

More information

THE ROAD TO DIGITAL TRANSFORMATION

THE ROAD TO DIGITAL TRANSFORMATION THE ROAD TO DIGITAL TRANSFORMATION RED HAT & APPLICATION DEVELOPMENT CRAIG MUZILLA Senior Vice President Application Platforms Business SAFE HARBOR FORWARD LOOKING STATEMENTS Certain statements contained

More information

Your Voice is Your Passport: Implementing Voice-driven Applications with Amazon Alexa

Your Voice is Your Passport: Implementing Voice-driven Applications with Amazon Alexa Your Voice is Your Passport: Implementing Voice-driven Applications with Amazon Alexa Stephen Lippens Solutions Architect slippens@microstrategy.com This presentation may include statements that constitute

More information

BLACKBERRY INVESTOR SESSION

BLACKBERRY INVESTOR SESSION BLACKBERRY INVESTOR SESSION November 13, 2014 BlackBerry Public Public SAFE HARBOR Forward-looking statements in this presentation are made pursuant to the "safe harbor" provisions of the U.S. Private

More information

System requirements for Qlik Sense. Qlik Sense April 2018 Copyright QlikTech International AB. All rights reserved.

System requirements for Qlik Sense. Qlik Sense April 2018 Copyright QlikTech International AB. All rights reserved. System requirements for Qlik Sense Qlik Sense April 2018 Copyright 1993-2018 QlikTech International AB. All rights reserved. Copyright 1993-2018 QlikTech International AB. All rights reserved. Qlik, QlikTech,

More information

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights

IBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing

More information

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date

More information

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1

Inside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1 Inside Symantec O 3 Sergi Isasi Senior Manager, Product Management SR B30 - Inside Symantec O3 1 Agenda 2 Cloud: Opportunity And Challenge Cloud Private Cloud We should embrace the Cloud to respond to

More information

Oracle Communications Services Gatekeeper

Oracle Communications Services Gatekeeper Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or

More information

AWS plug-in. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved.

AWS plug-in. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved. AWS plug-in Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved. Copyright 1993-2016 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik Sense, QlikView,

More information

Intel Unite. Enterprise Test Environment Setup Guide

Intel Unite. Enterprise Test Environment Setup Guide Intel Unite Enterprise Test Environment Setup Guide Intel Unite Enterprise Test Environment Setup Guide Page 1 of 49 October 2015 Legal Disclaimers & Copyrights All information provided here is subject

More information

Bring Your Own Device. Peter Silva Technical Marketing Manager

Bring Your Own Device. Peter Silva Technical Marketing Manager Bring Your Own Device Peter Silva Technical Marketing Manager Bring-Your-Own-Device (BYOD) Personal devices for business apps Why implement BYOD? Increase employee satisfaction, productivity Reduce mobile

More information

opensap How-to Guide for Exercise Instructor-Led Walkthrough of SAML2 Configuration (Week 4 Unit 5)

opensap How-to Guide for Exercise Instructor-Led Walkthrough of SAML2 Configuration (Week 4 Unit 5) opensap How-to Guide for Exercise Instructor-Led Walkthrough of SAML2 Configuration (Week 4 Unit 5) Table of Contents Configuring SSL on the Frontend Server... 3 Execute SAML 2.0 related configuration...

More information

Version 9 Release 0. IBM i2 Analyst's Notebook Premium Configuration IBM

Version 9 Release 0. IBM i2 Analyst's Notebook Premium Configuration IBM Version 9 Release 0 IBM i2 Analyst's Notebook Premium Configuration IBM Note Before using this information and the product it supports, read the information in Notices on page 11. This edition applies

More information

System requirements for Qlik Sense. Qlik Sense September 2018 Copyright QlikTech International AB. All rights reserved.

System requirements for Qlik Sense. Qlik Sense September 2018 Copyright QlikTech International AB. All rights reserved. System requirements for Qlik Sense Qlik Sense September 2018 Copyright 1993-2018 QlikTech International AB. All rights reserved. Copyright 1993-2018 QlikTech International AB. All rights reserved. Qlik,

More information

Leveraging Adaptive Auth and Device Trust for Enhanced Security and Compliance

Leveraging Adaptive Auth and Device Trust for Enhanced Security and Compliance Leveraging Adaptive Auth and Device Trust for Enhanced Security and Compliance CHRISTOPHER NIGGEL, DIRECTOR OF SECURITY & COMPLIANCE SWAROOP SHAM, SR PRODUCT MARKETING MANAGER, SECURITY CHRIS NIGGEL Director

More information

HPE to Acquire Nimble Storage

HPE to Acquire Nimble Storage HPE to Acquire Nimble Storage March 7, 2017 http://www.hpe.com/investor/home Forward Looking Statements This document contains forward-looking statements within the meaning of the safe harbor provisions

More information

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution

Symantec Managed PKI. Integration Guide for AirWatch MDM Solution Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement

More information

Novell Access Manager

Novell Access Manager Setup Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 Setup Guide Legal Notices Novell, Inc., makes no representations or warranties

More information

IBM UrbanCode Cloud Services Security Version 3.0 Revised 12/16/2016. IBM UrbanCode Cloud Services Security

IBM UrbanCode Cloud Services Security Version 3.0 Revised 12/16/2016. IBM UrbanCode Cloud Services Security IBM UrbanCode Cloud Services Security 1 Before you use this information and the product it supports, read the information in "Notices" on page 10. Copyright International Business Machines Corporation

More information

Version 9 Release 0. IBM i2 Analyst's Notebook Configuration IBM

Version 9 Release 0. IBM i2 Analyst's Notebook Configuration IBM Version 9 Release 0 IBM i2 Analyst's Notebook Configuration IBM Note Before using this information and the product it supports, read the information in Notices on page 11. This edition applies to version

More information

Red Hat Acquisition of Qumranet Adds next generation virtualization capabilities. September 4, 2008

Red Hat Acquisition of Qumranet Adds next generation virtualization capabilities. September 4, 2008 Red Hat Acquisition of Qumranet Adds next generation virtualization capabilities September 4, 2008 Safe Harbor Forward-Looking Statements Certain statements contained or discussed in this presentation

More information

Install and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved.

Install and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved. Install and upgrade Qlik Sense Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved. Copyright 1993-2016 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik

More information

Novell Access Manager

Novell Access Manager Quick Start AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 June 11, 2010 www.novell.com Novell Access Manager 3.1 SP2 Quick Start Legal Notices Novell, Inc., makes no representations or warranties

More information

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017

Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017 Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

April Understanding Federated Single Sign-On (SSO) Process

April Understanding Federated Single Sign-On (SSO) Process April 2013 Understanding Federated Single Sign-On (SSO) Process Understanding Federated Single Sign-On Process (SSO) Disclaimer The following is intended to outline our general product direction. It is

More information

O365 Solutions. Three Phase Approach. Page 1 34

O365 Solutions. Three Phase Approach. Page 1 34 O365 Solutions Three Phase Approach msfttechteam@f5.com Page 1 34 Contents Use Cases... 2 Use Case One Advanced Traffic Management for WAP and ADFS farms... 2 Use Case Two BIG-IP with ADFS-PIP... 3 Phase

More information

Optimizing SSDs for Multiple Tenancy Use

Optimizing SSDs for Multiple Tenancy Use Optimizing SSDs for Multiple Tenancy Use Liam Parker Senior Technologist, SSD Systems Engineering August 7, 2018 2018 Western Digital Corporation or its affiliates. All rights reserved. 8/7/2018 1 Forward-Looking

More information

Oracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC

Oracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC Oracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC Version 10.1.0.0 Documentation Part Number: E55027-01 June, 2014 Copyright 2009, 2014, Oracle and/or its affiliates.

More information

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017

Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and

More information

Introduction. The Safe-T Solution

Introduction. The Safe-T Solution Secure Application Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Capabilities 4 Benefits 5 Feature List 6 6 Introduction As the world becomes much more digital and global,

More information

Formula Training (Intermediate)

Formula Training (Intermediate) Formula Training (Intermediate) Lance Merkin Customer Success Manager #SmartsheetENGAGE Certain information set forth in this presentation may be forward-looking information. Except for statements of historical

More information

Investor Presentation. February 2016

Investor Presentation. February 2016 Investor Presentation February 2016 Disclaimer Forward-Looking Statements This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended,

More information

Making your Application Social with the Chatter API

Making your Application Social with the Chatter API Making your Application Social with the Chatter API Logan Henriquez Product Manager @loganh Quinton Wall Developer Evangelist @quintonwall Safe Harbor Safe harbor statement under the Private Securities

More information

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book] Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document

More information

System requirements for Qlik Sense. Qlik Sense September 2017 Copyright QlikTech International AB. All rights reserved.

System requirements for Qlik Sense. Qlik Sense September 2017 Copyright QlikTech International AB. All rights reserved. System requirements for Qlik Sense Qlik Sense September 2017 Copyright 1993-2017 QlikTech International AB. All rights reserved. Copyright 1993-2017 QlikTech International AB. All rights reserved. Qlik,

More information

CONFIGURING SSO FOR FILENET P8 DOCUMENTS

CONFIGURING SSO FOR FILENET P8 DOCUMENTS CONFIGURING SSO FOR FILENET P8 DOCUMENTS Overview Configuring IBM Content Analytics with Enterprise Search (ICA) to support single sign-on (SSO) authentication for secure search of IBM FileNet P8 (P8)

More information

CAUTIONARY STATEMENT This presentation contains forward-looking statements concerning Advanced Micro Devices, Inc. (AMD) including, but not limited to the features, functionality, availability, timing,

More information

Qlik. 10 key elements of a successful data strategy and modern analytics platform. February 2019 Julie Kae Executive Director, Qlik.

Qlik. 10 key elements of a successful data strategy and modern analytics platform. February 2019 Julie Kae Executive Director, Qlik. Qlik 10 key elements of a successful data strategy and modern analytics platform February 2019 Julie Kae Executive Director, Qlik.org Legal Disclaimer Qlik roadmaps provide a general overview of our anticipated

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for SonicWALL Secure Remote Access All information herein is either public information or is

More information

IBM. IBM i2 Analyze Windows Upgrade Guide. Version 4 Release 1 SC

IBM. IBM i2 Analyze Windows Upgrade Guide. Version 4 Release 1 SC IBM IBM i2 Analyze Windows Upgrade Guide Version 4 Release 1 SC27-5091-00 Note Before using this information and the product it supports, read the information in Notices on page 19. This edition applies

More information

Novell Access Manager

Novell Access Manager Setup Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.0 SP4 IR2 January 30, 2009 www.novell.com Novell Access Manager 3.0 SP4 Setup Guide Legal Notices Novell, Inc., makes no representations or

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

Okta Integration Guide for Web Access Management with F5 BIG-IP

Okta Integration Guide for Web Access Management with F5 BIG-IP Okta Integration Guide for Web Access Management with F5 BIG-IP Contents Introduction... 3 Publishing SAMPLE Web Application VIA F5 BIG-IP... 5 Configuring Okta as SAML 2.0 Identity Provider for F5 BIG-IP...

More information

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8 Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Oracle Utilities Opower Solution Extension Partner SSO

Oracle Utilities Opower Solution Extension Partner SSO Oracle Utilities Opower Solution Extension Partner SSO Integration Guide E84763-01 Last Updated: Friday, January 05, 2018 Oracle Utilities Opower Solution Extension Partner SSO Integration Guide Copyright

More information

Connect-2-Everything SAML SSO (client documentation)

Connect-2-Everything SAML SSO (client documentation) Connect-2-Everything SAML SSO (client documentation) Table of Contents Summary Overview Refined tags Summary The Connect-2-Everything landing page by Refined Data allows Adobe Connect account holders to

More information

WebEx Connector. Version 2.0. User Guide

WebEx Connector. Version 2.0. User Guide WebEx Connector Version 2.0 User Guide 2016 Ping Identity Corporation. All rights reserved. PingFederate WebEx Connector User Guide Version 2.0 May, 2016 Ping Identity Corporation 1001 17th Street, Suite

More information

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018

ARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018 REVISED 6 NOVEMBER 2018 Table of Contents Architectural Overview Workspace ONE Logical Architecture GUIDE 2 VMware Workspace ONE Cloud-Based Reference Architecture - Architectural Overview Architectural

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Qlik Analytics Platform

Qlik Analytics Platform Technical Brief Qlik Analytics Platform Building Engaging Visual Analytics October, 2015 qlik.com Table of Contents Introduction 3 Introducing Qlik Analytics Platform 3 Integration Capabilities 4 Architecture

More information

Quick Start Access Manager 3.1 SP5 January 2013

Quick Start Access Manager 3.1 SP5 January 2013 www.novell.com/documentation Quick Start Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,

More information

MiContact Center Business Important Product Information for Customer GDPR Compliance Initiatives

MiContact Center Business Important Product Information for Customer GDPR Compliance Initiatives MiContact Center Business Important Product Information for Customer GDPR Compliance Initiatives MITEL SOLUTIONS ENGINEERING MiContact Center Business Release 9.0 Version 1 May 2018 NOTICE The information

More information

Configuring Claims-based Authentication for Microsoft Dynamics CRM Server. Last updated: May 2015

Configuring Claims-based Authentication for Microsoft Dynamics CRM Server. Last updated: May 2015 Configuring Claims-based Authentication for Microsoft Dynamics CRM Server Last updated: May 2015 This document is provided "as-is". Information and views expressed in this document, including URL and other

More information

Security Guide Release 4.0

Security Guide Release 4.0 [1]Oracle Communications Session Monitor Security Guide Release 4.0 E89197-01 November 2017 Oracle Communications Session Monitor Security Guide, Release 4.0 E89197-01 Copyright 2017, Oracle and/or its

More information

VMware AirWatch Integration with RSA PKI Guide

VMware AirWatch Integration with RSA PKI Guide VMware AirWatch Integration with RSA PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

ActivIdentity ActivID Card Management System and Juniper Secure Access. Integration Handbook

ActivIdentity ActivID Card Management System and Juniper Secure Access. Integration Handbook ActivIdentity ActivID Card Management System and Juniper Secure Access Integration Handbook Document Version 2.0 Released May 2, 2012 ActivIdentity ActivID Card Management System and Juniper Secure Access

More information

Oracle Hospitality Cruise AffairWhere Security Guide Release E April 2017

Oracle Hospitality Cruise AffairWhere Security Guide Release E April 2017 Oracle Hospitality Cruise AffairWhere Security Guide Release 2.2.5 E85968-01 April 2017 Copyright 2006, 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager. Integration Handbook

ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager. Integration Handbook ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager Integration Handbook Document Version 1.1 Released July 11, 2012 ActivIdentity 4TRESS AAA Web Tokens and F5 APM Integration Handbook

More information

Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E

Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E96343-01 May 2018 Copyright 2010, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation

More information

REST API Developer Preview

REST API Developer Preview REST API Developer Preview Dave Carroll Developer Evangelist dcarroll@salesforce.com @dcarroll Alex Toussaint Sr. Product Manager atoussaint@salesforce.com @alextoussaint Safe Harbor Safe harbor statement

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

NetBackup Collection Quick Start Guide

NetBackup Collection Quick Start Guide NetBackup Collection Quick Start Guide This whitepaper is intended for IT professionals, IT managers, and IT personnel responsible for the planning, setup, and/or administration of Veritas Information

More information

Desktop Installation Guide

Desktop Installation Guide Desktop Installation Guide Desktop Installation Guide Legal notice Copyright 2018 LAVASTORM ANALYTICS, INC. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS HEREOF MAY NOT BE REPRODUCED OR DISTRIBUTED IN ANY

More information

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for SonicWALL Secure Remote Access

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for SonicWALL Secure Remote Access SafeNet Authentication Manager Integration Guide Using SAM as an Identity Provider for SonicWALL Secure Remote Access Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright

More information

MicroStrategy & Google

MicroStrategy & Google MicroStrategy & Google Joint Value Proposition HF Chadeisson Solutions Architect Safe Harbor Notice This presentation describes features that are under development by MicroStrategy. The objective of this

More information

Cisco Expressway Authenticating Accounts Using LDAP

Cisco Expressway Authenticating Accounts Using LDAP Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4

More information

Build Data-rich Websites using Siteforce

Build Data-rich Websites using Siteforce Build Data-rich Websites using Siteforce Sonali Agrawal Director of Product Management @sonali_sfdc Eric Dorgelo Director of Development Safe Harbor Safe harbor statement under the Private Securities Litigation

More information

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for RadiantOne Cloud Federation Service (CFS) All information herein is either public information

More information

SAML-Based SSO Configuration

SAML-Based SSO Configuration Prerequisites, page 1 SAML SSO Configuration Task Flow, page 5 Reconfigure OpenAM SSO to SAML SSO Following an Upgrade, page 9 SAML SSO Deployment Interactions and Restrictions, page 9 Prerequisites NTP

More information

QLIKVIEW INTEGRATION OVERVIEW

QLIKVIEW INTEGRATION OVERVIEW QLIKVIEW INTEGRATION OVERVIEW QlikView Technology White Paper Series June 211 www.qlikview.com Table of Contents Overview 3 Data Source Integration 4 Standard ODBC/OLE Connections (structured) 4 Non Standard

More information

ArcGIS Server and Portal for ArcGIS An Introduction to Security

ArcGIS Server and Portal for ArcGIS An Introduction to Security ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context

More information

Building Mobile Force.com Apps for the iphone and ipad

Building Mobile Force.com Apps for the iphone and ipad Building Mobile Force.com Apps for the iphone and ipad Quinton Wall Sr. Developer Evangelist, Salesforce.com @quintonwall Mike Leach Manager, Cloud Services, Facebook @dlog Safe Harbor Salesforce.com Safe

More information

IBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture

IBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture IBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture Big data analytics involves processing large amounts of data that cannot be handled by conventional systems. The IBM

More information

Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE. Release 9.2

Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE. Release 9.2 Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE Release 9.2 NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel

More information

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

vsphere plug-in Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved.

vsphere plug-in Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved. vsphere plug-in Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved. Copyright 1993-2016 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik Sense, QlikView,

More information

Configure Unsanctioned Device Access Control

Configure Unsanctioned Device Access Control Configure Unsanctioned Device Access Control paloaltonetworks.com/documentation Contact Information Corporate Headquarters: Palo Alto Networks 3000 Tannery Way Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-support

More information

Release notes. QlikView Version 12. Lund, Sweden, November Authored by QlikTech International AB

Release notes. QlikView Version 12. Lund, Sweden, November Authored by QlikTech International AB Release notes QlikView Version 12 Lund, Sweden, November 2015 Authored by QlikTech International AB 1994-2015 QlikTech International AB. All rights reserved. Qlik, QlikView, QlikTech, and the QlikTech

More information

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1 VMware Workspace ONE Quick Configuration Guide VMware AirWatch 9.1 A P R I L 2 0 1 7 V 2 Revision Table The following table lists revisions to this guide since the April 2017 release Date April 2017 June

More information

Syncplicity Panorama with Isilon Storage. Technote

Syncplicity Panorama with Isilon Storage. Technote Syncplicity Panorama with Isilon Storage Technote Copyright 2014 EMC Corporation. All rights reserved. Published in USA. Published November, 2014 EMC believes the information in this publication is accurate

More information

Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0

Cloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0 Cloud Access Manager 8.1.3 How to Configure for SSO to SAP Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information