Open XML Gateway User Guide. CORISECIO GmbH - Uhlandstr Darmstadt - Germany -
|
|
- Lee Paul
- 6 years ago
- Views:
Transcription
1 Open XML Gateway User Guide
2 Conventions Typographic representation: Screen text and KEYPAD Texts appearing on the screen, key pads like e.g. system messages, menu titles, - texts, or buttons are displayed as follows: Example: Enter your name in the User field and click OK. Files and folders File and folder structures are marked as follows: Example: Download the file dospellingsuggestion.xml from the folder Examples. Entries User entries are displayed as follows: Example: Enter login here. Quotation Quotations and references are displayed as follows: Example: Further information can be found in chapter Overview on the following pages. Weblinks Web addresses and links are displayed as follows: Example:
3 1 INTRODUCTION SYSTEM REQUIREMENTS INSTALLATION ADMINISTRATION Login Home Express Advanced Express mode Level Config Security Level Low Security Level Medium Security Level High Advanced mode Entity Consumer New Edit Delete Provider Policy Activate Policy
4 Listener Request Applying new functions to the policy Removing Policy functions Changing the order in the Policy Configuring the functions in the policy Displaying a description text for a function Accepting the changes Response Error Logging Admin Change Password External Access API Keypair WSDL-User Keypair Keypair Download LOG FILES HELP & SUPPORT
5 1 Introduction The CORISECIO Open XML Gateway provides companies the possibility to cost-effectively and simply protect their Web Services. Nowadays, more and more applications communicate via the internet and local networks because of the increased spreading of architectures like SOA and Cloud Computing. Because of the network-based approach applications and data are increasingly exposed to business critical threats. This e.g. includes, besides various security vulnerabilities, themes like data theft, XML-DOS or Multi-Layer attacks. These weak points need to be protected efficiently. CORISECIO Open XML Gateway provides the following features: Policy-based SOAP messages processing Filtering, authentication and authorization for Web Services The gateway may be used as stand-alone component Enables use of cryptography for Web Services 5
6 2 System requirements The statements regarding processor, working memory and hard disk storage may only be seen as values for orientation as the requirement for system resources mainly depends on the Open XML Gateway use. Reliable statements are only available by testing in your system environment. Processor Working storage Free hard disk storage Intel Pentium IV 2,4 GHz or more 1024 MB or more 10 GB or more (amongst others for Logging) Operating system CentOS 6.0 Software Java Software Development Kit 1.6 Java Cryptography Extension (JCE) Unlimited Strength Jurisdiction Policy Apache Tomcat
7 3 Installation In the following deploying the Open XML Gateway in an Application Server is described. If you are using the preconfigured Virtual Appliance, you may skip this chapter. The Open XML Gateway is operated as Web application on the Application Server. If required, please kindly see your Application Server s documentation. For deploying in the Apache Tomcat rename the War-File so that the filename corresponds with the required deployment path. Maintain the file extension. Copy the file to the Tomcat webapps directory. If necessary, restart the Tomcat. After deploying test the installation by starting the web application. Enter the following text at your browser s address line: without extension> Example: If you have renamed the war file openxmlgateway.war and if your tomcat installation is running under localhost:8080, then the address to be entered is: You will be shown the Open XML Gateway login page. 7
8 4 Administration The configuration is done completely via the Open XML Gateway web interface. 4.1 Login First you will have to login at the Open XML Gateway web interface. The password is predefined as follows: Password: secrt Enter the password and click Ok. At correct entry the Open XML Gateway administration page shows up. The password may be changed after login to the system (see chapter ). If you are logging-in for the first time, the data store will automatically be created in the Open XML Gateway directory. Here the Open XML Gateway configuration is saved. 8
9 4.2 Home After login the Open XML Gateway start page is displayed. On the home page an overview of the menu items Express and Advanced as well as the services status is shown. Here you may start and stop the service. 4.3 Express By using the Express button you may switch the Open XML Gateway to the Express mode. 4.4 Advanced By using the Advanced button you may switch the Open XML Gateway to the Advanced mode. 9
10 4.5 Express mode In the Express mode all configuration steps are executed automatically Level Under the menu item Level the solution s security level can be set. At installation the security level Low is preset. The following Security Levels are available: Low: At Security Level Low all messages incoming on Port 80 are checked against an XML scheme for correctness and XXE attacks and forwarded to the configured target address. Medium: At Security Level Medium the message sender has to authenticate using SSL v3 (Client authentication). All incoming messages on Port 443 are tested against an XML scheme for correctness as well as for XXE attacks and SQL/X-Query injections and forwarded to the configured target address. Also the XML well-formedness is ensured. 10
11 High: At Security Level High the same features apply as at Security Level Medium. Additionally, messages are tested for WSDL scanning attacks and Replay attacks. Also requests are. Additionally a SAML Token is added to the request and it is encrypted and signed. The response delivered from the target system is decrypted and the signature is verified. Select the required Security Level and click Apply Config Using Config you may configure the behavior of the solution. The provided parameters are dependent on the selected security level Security Level Low At Security Level Low the following configuration parameters are available: URL: Enter the XML scheme file URL, the messages will be validated against. If not defined otherwise, all SOAP messages will be accepted. Also, you may define a file here. The format to be used is file:///e:/directory/file.xsd. Endpoint: Enter the target address formatted like host:port, e.g. localhost: Security Level Medium At Security Level Medium the following configuration parameters are available: URL: Enter the XML scheme file URL, the messages will be validated against. If not defined otherwise, all SOAP messages will be accepted. Also, you may define a file here. The format to be used is file:///e:/directory/file.xsd. Endpoint: Enter the target address formatted like host:port, e.g. localhost:4711. SSL Key Password: Here you define the password for the Consumer Keypair, used for the SSL Client authentication. SSL Key Generate: Here you generate the Consumer s SSL Keypair. SSL Key Download: Here you may download the Consumer s root certificate and the keypair Security Level High At Security Level High the following configuration parameters are available: 11
12 URL: Enter the XML scheme file URL, the messages will be validated against. If not defined otherwise, all SOAP messages will be accepted. Also, you may define a file here. The format to be used is file:///e:/directory/file.xsd. Endpoint: Enter the target address formatted like host:port, e.g. localhost:4711. SSL Key Password: Here you define the password for the Consumer s Keypair, used for the SSL Client authentication. SSL Key Generate: Here you generate the Consumer s SSL Keypair. SSL Key Download: Here you may download the Consumer s root certificate and the keypair. Provider Certificate: Here you may download the provider certificate. 4.6 Advanced mode In the Advanced mode you may detailed define the Open XML Gateway performance and configuration Entity Under Entity you may configure the Consumer and the Provider. Consumer are authorized clients, the provider is the identity used for signing and SAML tokens Consumer New After clicking this link the form for generating consumers shows up: 12
13 Permitted entry values are: Field Description Acceptance criteria Name ID of the user to be created 4-50 characters accordant to the regular expression ([-] [_] [.] [a-z] [0-9])+, unambiguously (no commas) Keystore Password User password; an entry is possible by clicking characters Address Consumer address 0-60 characters Description Consumer description 0-60 characters When clicking the button, the data is sent and the new consumer created and a key pair is generated if the acceptance criteria are fulfilled. 13
14 Edit By clicking Edit you may edit the selected user s properties. The name cannot be edited. The acceptance criteria are the same as at creating a consumer Delete Via this link the selected consumers are deleted. The data is completely removed from the database, issued certificates are revoked. 14
15 Provider Here you may change the provider information. Permitted entry values are Field Description Acceptance criteria Name ID of the provider to be created 4-50 characters accordant the regular expression ([-] [_] [.] [a-z] [0-9])+, unambiguously (no commas) Keystore Password Provider password; entry by clicking is possible characters Endpoint Hostname and Port, requests are forwarded to. Format: hostname:port Trusted SSL The optional SSL provider certificate is required if the endpoint is using an Valid SSL certificate. 15
16 SSL connection. After having created resp. modified the provider, click Activate Policy Policy With the Policy Editor, XML Gateway provides an option to arrange and configure security functions available via adapters in a process logic. Thus, security functions may be realized by the Workflow Engine without programming effort. To open the Policy Editor, click the menu item Policy. With the Policy Editor you may configure how incoming requests and the corresponding replies will be tested resp. secured. When clicking the symbol, the Editor appears and the current configuration is shown. The entire sequence is displayed graphically. You will see areas for configuring the Listener, under Request the request processing, the response processing (Response) and the error handling (Error). On the Policy Editor main page there are buttons to be used for starting the configuration pages. 16
17 Activate Policy This button is placed on the left side of the page. Clicking it results in persistent saving the current configuration and activating and starting (or restarting) it. After successful start you will be lead to the Advanced Mode overview page, displaying the Services status. Please pay special attention to the fact that, without clicking Activate Policy on the Policy Editor main page, all unsaved configuration changes are discarded, especially when leaving the Policy Editor. When restarting the Policy Editor, it will be preset with the currently saved setting Listener Select Listener and click the Select button, to configure the Listener for the service. You will be forwarded to another page, where the available Listeners are displayed as selection list (the current configuration is selected by default). Select the Listener from the list. Then click the Configure button. You will be forwarded to the Listener configuration page. According to selection you have several options from the simple stating of a TCP/IP port to configuring an SSL client authentication. Please kindly consult your product s Modeling References regarding the varied configuration options. Accept the required configuration by clicking Apply. You will be returned to Entry Point Configuration. Click the Apply button on the bottom of the page to accept the changes and to return to the Policy Editor main page. The changes are accepted for the current session, but they are not persistent and do not affect the service (to achieve this, please click Activate Policy on the Policy Editor main page) Request Select Request and click the Select button, to configure the request processing. You will be forwarded to the Request Configuration page. On the left side you will see the currently configured Policy (Request Configuration list) and on the right side all available functions. 17
18 Applying new functions to the policy Click the function in the list of available functions (Functions) and click on the arrow pointing to the left. The function is added to the Policy at the end Removing Policy functions Click the function in the Request Configuration list and then click the arrow pointing to the right. The function is removed from the Policy Changing the order in the Policy In the Request Configuration list click the function, the position of which in the process order you would like to change. Then click the buttons resp.. Normally, the process order is essential for the correct message processing Configuring the functions in the policy In the Request Configuration list click the function you would like to configure and then Configure. A specific configuration page for the function appears. Please consult your product s Modeling References to learn more about the configuration options. Accept the changes on the configuration pages with Apply. You will be returned to the page for the Request Configuration Displaying a description text for a function In the Functions list, click the function you would like to learn more about. Then click the Display Information button below the Functions list. In the Description text field further information for the function are shown. Alternatively you may consult the Modeling References Accepting the changes Click the Apply button on the bottom of the page to accept the configuration changes. Please kindly bear in mind, that the changes do not apply immediately, but after having been confirmed again on the Policy Editor main page (see Fehler! Verweisquelle konnte nicht gefunden werden.). 18
19 Response Select Response and click the Select button, to configure the process steps for the response. The functionality of page appearing then is mainly the same as of the Request Configuration page (see paragraph ). The difference is, that here the policy for processing the response is configured here Error Select Error and click the Select button, to configure the error page, which is sent if errors occur during processing. You will be forwarded to a page where you may configure the error text. Entry of HTML tags is possible here. Accept the changes by clicking Apply. 19
20 4.6.3 Logging Under Logging the recorded SOAP messages are shown. In the fields From and To enter the required period of time and click Refresh. Under Log Messages all logged messages are shown. The status shows the log reason, if it is an error (red), a normally processed message (green) or a message, where a warning occurred during processing (orange). Date is the log date, Message ID an internal Id and Source the sender s address. Click an entry to have the details displayed. A description of the log-cause can be seen under Message Details and under Message the message can be viewed. By clicking a bar in the timeline you may focus the log entry view on this period of time. 20
21 4.6.4 Admin Change Password Using Change Password changes the entry data for the Open XML Gateway External Access Here you may configure the API, used for accessing the Open XML Gateway functions from external applications API Keypair As for an external accessing the Open XML Gateway an encrypted connection is required, the API Keypair has to be used for encryption WSDL-User Keypair For authenticating and authorizing the access to the WSDL API the WSDL-User Keypair is required. 21
22 Keypair Download SOAP messages sent to the WSDL API, first have to be signed with the private WSDL-User key and then have to be encrypted with the WSDL-API Public Key. The Open XML Gateway responses are signed with the private key from the WSDL-API Keypair generated previously. The signature may be validated with the WSDL-API Public Key. The responses are encrypted using the public WSDL-User key. 22
23 5 Log files The Open XML Gateway Log Files are located in the folder log of the web application s directory structure. In this folder there is a file named connector.[yyyy]-[mm]-[tt].log. Here [YYYY] means the year, [MM] the month and [TT] the day, the log file was created at. To open the log file, you will have to close the application first. 23
24 6 Help & Support You have a problem or a question? Our Support Team will support you fast and professionally. Please kindly have the version information of your CORISECIO solution available. You can find the data required by the Support Team in the Security Administration (RCP) under Help > About via the button Plug-In Details. On the client systems you can obtain these data via the appropriate About dialogs of the CORISECIO Runtime Components. Please kindly state your CORISECIO customer name and your customer ID at each inquiry which you may receive from us if necessary. support@corisecio.com 24
Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway
Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest
More informationEntrust Connector (econnector) Venafi Trust Protection Platform
Entrust Connector (econnector) For Venafi Trust Protection Platform Installation and Configuration Guide Version 1.0.5 DATE: 17 November 2017 VERSION: 1.0.5 Copyright 2017. All rights reserved Table of
More informationWeb Access Management Token Translator. Version 2.0. User Guide
Web Access Management Token Translator Version 2.0 User Guide 2014 Ping Identity Corporation. All rights reserved. PingFederate Web Access Management Token Translator User Guide Version 2.0 August, 2014
More informationCisco CVP VoiceXML 3.1. Installation Guide
Cisco CVP VoiceXML 3.1 CISCO CVP VOICEXML 3.1 Publication date: October 2005 Copyright (C) 2001-2005 Audium Corporation. All rights reserved. Distributed by Cisco Systems, Inc. under license from Audium
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationF-Secure PSB Getting Started Guide
F-Secure PSB Getting Started Guide F-Secure PSB Getting Started Guide TOC 3 Contents Chapter 1: Introduction...5 Chapter 2: Getting Started...7 Creating a new account...8 Downloading Software...9 Recovering
More informationConnectUPS-X / -BD /-E How to use and install SSL, SSH
ConnectUPS-X /-BD /-E product family Root CA Certificate installation Rev. B Page 1/16 Index 1. How to use and install SSL (Secure Socket Layer)...3 1.1. General Certificate warning message if not installed...3
More informationPowerSearch for MS CRM 4.0
PowerSearch for MS CRM 4.0 Version 4.0 Implementation Guide (How to install/uninstall) The content of this document is subject to change without notice. Microsoft and Microsoft CRM are registered trademarks
More informationEnabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface
Enabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface Release 7.1 Revised: March 5, 2013 1:53 pm This document describes the
More informationUsing SSL to Secure Client/Server Connections
Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections, page 1 Using SSL to Secure Client/Server Connections Introduction This chapter contains information on creating
More informationIBM Security Access Manager Version December Release information
IBM Security Access Manager Version 8.0.1 12 December 2014 Release information IBM Security Access Manager Version 8.0.1 12 December 2014 Release information ii IBM Security Access Manager Version 8.0.1
More informationECP. Installation Guide V4.2.0
Unicorn 2016 Unicorn Systems a.s. Jankovcova 1037/49, CZ 170 00 Prague 7 Project: Project Subject: Document Title: ECP Date: Author: 1.11.2016 Jakub Eliáš, Aleš Holý, Zdeněk Pospíšil, Josef Brož, Jiří
More informationNovell Access Manager
Setup Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 Setup Guide Legal Notices Novell, Inc., makes no representations or warranties
More informationConfiguring SAML-based Single Sign-on for Informatica Web Applications
Configuring SAML-based Single Sign-on for Informatica Web Applications Copyright Informatica LLC 2017. Informatica LLC. Informatica, the Informatica logo, Informatica Big Data Management, and Informatica
More informationInstalling and Configuring VMware vcenter Orchestrator
Installing and Configuring VMware vcenter Orchestrator vcenter Orchestrator 4.2.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationM i c r o s o f t S Q L S e r v e r I n s t a l l a t i o n G u i d e for A D S S S e r v e r
M i c r o s o f t S Q L S e r v e r I n s t a l l a t i o n G u i d e for A D S S S e r v e r A S C E R T I A LTD S E P T E M B E R 2 0 1 8 D o c u m e n t V e r s i o n - 5.9. 0. 1 Ascertia Limited. All
More informationAdvanced Service Design. vrealize Automation 6.2
vrealize Automation 6.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation, submit your feedback to
More informationQuickStart Guide for Managing Computers. Version
QuickStart Guide for Managing Computers Version 10.2.0 copyright 2002-2018 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite 1100
More informationEasy UI Solution 2.1 Installation Guide
Easy UI Solution 2.1 Installation Guide Thank you for selecting our product. This guide is intended for System Administrators, and describes how to install Easy UI Solution 2.1 (hereafter referred to as
More informationPolicy Manager for IBM WebSphere DataPower 7.2: Configuration Guide
Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide Policy Manager for IBM WebSphere DataPower Configuration Guide SOAPMDP_Config_7.2.0 Copyright Copyright 2015 SOA Software, Inc. All rights
More informationUser Manual. Admin Report Kit for IIS 7 (ARKIIS)
User Manual Admin Report Kit for IIS 7 (ARKIIS) Table of Contents 1 Admin Report Kit for IIS 7... 1 1.1 About ARKIIS... 1 1.2 Who can Use ARKIIS?... 1 1.3 System requirements... 2 1.4 Technical Support...
More informationFUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry.
FUSION REGISTRY COMMUNITY EDITION VERSION 9 Setup Guide This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE Fusion Registry: 9.2.x Document
More informationDeploy the ExtraHop Discover 3100, 6100, 8100, or 9100 Appliances
Deploy the ExtraHop Discover 3100, 6100, 8100, or 9100 s Published: 2017-12-29 This guide explains how to install the rack-mounted EDA 3100, EDA 6100, EDA 8100, and EDA 9100 ExtraHop Discover appliances.
More informationRead the following information carefully, before you begin an upgrade.
Read the following information carefully, before you begin an upgrade. Review Supported Upgrade Paths, page 1 Review Time Taken for Upgrade, page 1 Review Available Cisco APIC-EM Ports, page 2 Securing
More informationSymantec Endpoint Protection Installation Guide
Symantec Endpoint Protection 11.0 Installation Guide SYMANTEC ENDPOINT PROTECTION 11.0 TABLE OF CONTENTS A NEW SECURITY APPLICATION... 1 INTRODUCTION... 1 WHAT IS SYMANTEC ENDPOINT PROTECTION (SEP) 11.0?...
More informationQuickStart Guide for Managing Computers. Version 9.73
QuickStart Guide for Managing Computers Version 9.73 JAMF Software, LLC 2015 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software
More informationPRODUCT MANUAL. idashboards Reports Admin Manual. Version 9.1
PRODUCT MANUAL idashboards Reports Admin Manual Version 9.1 idashboards Reports Admin Manual Version 9.1 No part of the computer software or this document may be reproduced or transmitted in any form or
More informationContents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29
Oracle Access Manager Configuration Guide 16 R1 March 2016 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 8 Installing Oracle HTTP Server...
More informationPreface. Fuji Xerox Co., Ltd. Preface. Note
Mac and Mac OS are trademarks of Apple Inc., registered in the U.S. and other countries. Microsoft, Windows, and Windows Vista are either registered trademarks or trademarks of Microsoft Corporation in
More informationVMware AirWatch Integration with RSA PKI Guide
VMware AirWatch Integration with RSA PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationGroupWise Architecture and Best Practices. WebAccess. Kiran Palagiri Team Lead GroupWise WebAccess
GroupWise Architecture and Best Practices WebAccess Kiran Palagiri Team Lead GroupWise WebAccess kpalagiri@novell.com Ed Hanley Senior Architect ed.hanley@novell.com Agenda Kiran Palagiri Architectural
More informationQuickStart Guide for Managing Computers. Version 9.32
QuickStart Guide for Managing Computers Version 9.32 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software
More informationServer Installation and Administration Guide
NetApp Connect 5.1 Server Installation and Administration Guide NetApp, Inc. 495 East Java Drive Sunnyvale, CA 94089 U.S. Telephone: +1 (408) 822-6000 Fax: +1 (408) 822-4501 Support telephone: +1 (888)
More informationProven Practice Installing TM1 9.5 in Apache Tomcat Product(s): TM1 9.5 Area of Interest: Install Config
Proven Practice Installing TM1 9.5 in Apache Tomcat Product(s): TM1 9.5 Area of Interest: Install Config 2 Copyright and Trademarks Licensed Materials - Property of IBM. Copyright IBM Corp. 2009 IBM, the
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationNGFW Security Management Center
NGFW Security Management Center Release Notes 6.3.4 Revision A Contents About this release on page 2 System requirements on page 2 Build version on page 3 Compatibility on page 5 New features on page 5
More informationInstalling and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.
Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on
More informationVII. Corente Services SSL Client
VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...
More informationSAML-Based SSO Configuration
Prerequisites, page 1 SAML SSO Configuration Task Flow, page 5 Reconfigure OpenAM SSO to SAML SSO Following an Upgrade, page 9 SAML SSO Deployment Interactions and Restrictions, page 9 Prerequisites NTP
More informationUsing the VMware vrealize Orchestrator Client
Using the VMware vrealize Orchestrator Client vrealize Orchestrator 7.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by
More informationWorkspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810
Workspace ONE UEM Integration with RSA PKI VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationUsing Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS)
CHAPTER 2 Using Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) This chapter contains information on the following topics: HTTPS Overview, page 2-1 HTTPS for Cisco Unified IP Phone Services,
More informationMicrosoft ISA 2006 Integration. Microsoft Internet Security and Acceleration Server (ISA) Integration Notes Introduction
Microsoft ISA 2006 Integration Contents 1 Microsoft Internet Security and Acceleration Server (ISA) Integration Notes 2 Introduction 3 Prerequisites 3.1 ISA 2006 Filter 3.2 TMG Filter 4 Baseline 5 Architecture
More informationIntegration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for SonicWALL Secure Remote Access
SafeNet Authentication Manager Integration Guide Using SAM as an Identity Provider for SonicWALL Secure Remote Access Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
More informationCHAPTER. Introduction
CHAPTER 1 Cisco Unified Communications Manager (formerly Cisco Unified CallManager) serves as the software-based call-processing component of the Cisco Unified Communications family of products. A wide
More informationAirWatch Mobile Device Management
RSA Ready Implementation Guide for 3rd Party PKI Applications Last Modified: November 26 th, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product Description
More informationInstalling and Configuring VMware vcenter Orchestrator
Installing and Configuring VMware vcenter Orchestrator vcenter Orchestrator 5.5.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationLive Data Connection to SAP Universes
Live Data Connection to SAP Universes You can create a Live Data Connection to SAP Universe using the SAP BusinessObjects Enterprise (BOE) Live Data Connector component deployed on your application server.
More informationHypertext Transfer Protocol over Secure Sockets Layer (HTTPS)
Hypertext Transfer Protocol over Secure Sockets Layer (HTTPS) This chapter provides information about Hypertext Transfer Protocol over Secure Sockets Layer. HTTPS, page 1 HTTPS for Cisco Unified IP Phone
More informationIntegration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate
SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationSystem Administration
Most of SocialMiner system administration is performed using the panel. This section describes the parts of the panel as well as other administrative procedures including backup and restore, managing certificates,
More informationCasper Suite Release Notes. Version 8.7
Casper Suite Release Notes Version 8.7 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave
More informationCisco Unified Serviceability
Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified
More informationCasper Suite Release Notes. Version 9.0
Casper Suite Release Notes Version 9.0 JAMF Software, LLC 2013 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts to ensure that this guide is accurate. JAMF Software 301 4th Ave
More informationRemote Support 19.1 Web Rep Console
Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationOracle Cloud. Using Oracle Eloqua Adapter Release E
Oracle Cloud Using Oracle Eloqua Adapter Release 12.1.3 E65434-01 August 2015 Oracle Cloud Using Oracle Eloqua Adapter, Release 12.1.3 E65434-01 Copyright 2015, Oracle and/or its affiliates. All rights
More informationOracle Access Manager Configuration Guide
Oracle Access Manager Configuration Guide 16 R2 September 2016 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...
More informationVMware Identity Manager Connector Installation and Configuration (Legacy Mode)
VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until
More informationOracle Fusion Middleware
Oracle Fusion Middleware Using Oracle Eloqua Cloud Adapter Release 12.2.1.1.0 E73562-01 June 2016 Oracle Fusion Middleware Using Oracle Eloqua Cloud Adapter, Release 12.2.1.1.0 E73562-01 Copyright 2015,
More informationVMware AirWatch Cloud Connector Guide ACC Installation and Integration
VMware AirWatch Cloud Connector Guide ACC Installation and Integration Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationOracle Communications Services Gatekeeper
Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or
More informationPKI Cert Creation via Good Control: Reference Implementation
PKI Cert Creation via Good Control: Reference Implementation Legal Notice Copyright 2016 BlackBerry Limited. All rights reserved. All use is subject to license terms posted at http://us.blackberry.com/legal/legal.html.
More informationdatango collaborator Installation manual
datango collaborator Installation manual Table of contents System requirements 4 Installing required applications 5 Microsoft.NET Framework 2.0 5 Windows Installer 6 Java Runtime Environment (JRE) 7 Installing
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the product, please review the readme files,
More informationETK Installation and Configuration Manual
BMW GROUP ETK Installation and Configuration Manual English Version 1.4 06.08.2013 1 System Requirements General... 4 1.1 Operating system compatibility:... 4 1.1.1 Local (standalone) version... 4 1.1.2
More informationOracle Cloud Using the Microsoft Adapter. Release 17.3
Oracle Cloud Using the Microsoft Email Adapter Release 17.3 E70297-10 December 2017 Oracle Cloud Using the Microsoft Email Adapter, Release 17.3 E70297-10 Copyright 2016, 2017, Oracle and/or its affiliates.
More informationOracle Fusion Middleware
Oracle Fusion Middleware Using Oracle Eloqua Cloud Adapter Release 12.2.1.3.0 E83336-02 July 2017 Documentation for Oracle Service-Oriented Architecture (SOA) developers that describes how to use the Oracle
More informationVMware Notification Service v2.0 Installation and Configuration Guide Configure ENSv2 for cloud and on-premises deployments
VMware Email Notification Service v2.0 Installation and Configuration Guide Configure ENSv2 for cloud and on-premises deployments Workspace ONE UEM v9.4 Have documentation feedback? Submit a Documentation
More informationCLEO VLTrader Made Simple Guide
CLEO VLTrader Made Simple Guide Table of Contents Quick Reference... 3 Miscellaneous Technical Notes... 3 CLEO VLTrader at a Glance... 3 Introduction... 5 Application Page Layout... 5 Preconfigured Hosts...
More informationStreamSets Control Hub Installation Guide
StreamSets Control Hub Installation Guide Version 3.2.1 2018, StreamSets, Inc. All rights reserved. Table of Contents 2 Table of Contents Chapter 1: What's New...1 What's New in 3.2.1... 2 What's New in
More informationGoogle GCP-Solution Architects Exam
Volume: 90 Questions Question: 1 Regarding memcache which of the options is an ideal use case? A. Caching data that isn't accessed often B. Caching data that is written more than it's read C. Caching important
More informationvcloud Director Administrator's Guide
vcloud Director 5.1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of
More informationComodo Offline Updater Utility Software Version
Comodo Offline Updater Utility Software Version 1.2.30701.2 i User Guide Guide Version 1.2.011811 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Table of Contents 1.Introduction to
More informationIntroduction to application management
Introduction to application management To deploy web and mobile applications, add the application from the Centrify App Catalog, modify the application settings, and assign roles to the application to
More informationHypertext Transfer Protocol Over Secure Sockets Layer (HTTPS)
Hypertext Transfer Protocol Over Secure Sockets Layer (HTTPS) This chapter provides information about Hypertext Transfer Protocol over Secure Sockets Layer. HTTPS, page 1 HTTPS for Cisco Unified IP Phone
More informationCertificate Properties File Realm
Certificate Properties File Realm {scrollbar} This realm type allows you to configure Web applications to authenticate users against it. To get to that point, you will need to first configure Geronimo
More informationIntroduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...
Oracle Access Manager Configuration Guide for On-Premises Version 17 October 2017 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing
More informationSecure Web Appliance. SSL Intercept
Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...
More informationSolution Composer. User's Guide
Solution Composer User's Guide January 2014 www.lexmark.com Contents 2 Contents Overview...4 Understanding the basics...4 System recommendations...5 Building custom solutions...6 Getting started...6 Step
More informationTHUNDERKRYPT: THUNDERBIRD EXTENSION
THUNDERKRYPT: THUNDERBIRD EXTENSION Version: 1.0 Date: 08.03.2009 Authors: Dirk, Eduardo, Zakaria Description: Thunderkrypt adds java-based decryption to Mozilla Thunderbird > 1.5 The current document
More informationRemote Support Web Rep Console
Remote Support Web Rep Console 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their
More informationVIRTUAL GPU LICENSE SERVER VERSION , , AND 5.1.0
VIRTUAL GPU LICENSE SERVER VERSION 2018.10, 2018.06, AND 5.1.0 DU-07754-001 _v7.0 through 7.2 March 2019 User Guide TABLE OF CONTENTS Chapter 1. Introduction to the NVIDIA vgpu Software License Server...
More informationVMware AirWatch Content Gateway for Linux. VMware Workspace ONE UEM 1811 Unified Access Gateway
VMware AirWatch Content Gateway for Linux VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More information2 Oracle WebLogic Overview Prerequisites Baseline Architecture...6
Table of Contents 1 Oracle Access Manager Integration...1 1.1 Overview...1 1.2 Prerequisites...1 1.3 Deployment...1 1.4 Integration...1 1.5 Authentication Process...1 2 Oracle WebLogic...2 3 Overview...3
More informationQuickStart Guide for Managing Mobile Devices. Version
QuickStart Guide for Managing Mobile Devices Version 10.1.0 copyright 2002-2017 Jamf. All rights reserved. Jamf has made all efforts to ensure that this guide is accurate. Jamf 100 Washington Ave S Suite
More informationEveryonePrint. Mobile Gateway 4.2. Installation Guide. EveryonePrint Mobile Gateway Installation Guide Page 1 of 30
EveryonePrint Mobile Gateway 4.2 Installation Guide EveryonePrint Mobile Gateway Installation Guide 2016.09.01 Page 1 of 30 1. Introduction... 3 1.1 Multiple networks (using Multicast Bonjour AirPrint)...
More informationConfigure the IM and Presence Service to Integrate with the Microsoft Exchange Server
Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure a Presence Gateway for Microsoft Exchange Integration, page 1 SAN and Wildcard Certificate Support, page
More informationUsing a VPN with Niagara Systems. v0.3 6, July 2013
v0.3 6, July 2013 What is a VPN? Virtual Private Network or VPN is a mechanism to extend a private network across a public network such as the Internet. A VPN creates a point to point connection or tunnel
More informationDeveloping and Deploying vsphere Solutions, vservices, and ESX Agents. 17 APR 2018 vsphere Web Services SDK 6.7 vcenter Server 6.7 VMware ESXi 6.
Developing and Deploying vsphere Solutions, vservices, and ESX Agents 17 APR 2018 vsphere Web Services SDK 6.7 vcenter Server 6.7 VMware ESXi 6.7 You can find the most up-to-date technical documentation
More informationVMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway
VMware AirWatch Content Gateway for Windows VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationInstalling and Configuring VMware vcenter Orchestrator. vrealize Orchestrator 5.5.2
Installing and Configuring VMware vcenter Orchestrator vrealize Orchestrator 5.5.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have
More informationSecuring PostgreSQL From External Attack
Securing From External Attack BRUCE MOMJIAN, ENTERPRISEDB September, 2009 Abstract systems are rich with attack vectors to exploit. This presentation explores the many potential external vulnerabilities
More informationInfor Enterprise Server Connector for Web Services Administration and User Guide
Infor Enterprise Server Connector for Web Services Administration and User Guide Copyright 2017 Infor Important Notices The material contained in this publication (including any supplementary information)
More informationEnabling SAML Authentication in an Informatica 10.2.x Domain
Enabling SAML Authentication in an Informatica 10.2.x Domain Copyright Informatica LLC 2017, 2018. Informatica, the Informatica logo, Informatica Big Data Management, and Informatica PowerCenter are trademarks
More informationEasyMorph Server Administrator Guide
EasyMorph Server Administrator Guide Version 3.9.2 December, 24 th 2018 Table of Contents TABLE OF CONTENTS... 1 PREREQUISITES... 2 Memory requirements... 2 INSTALLATION... 2 License key... 3 SERVER SERVICE
More informationInstalling the DITA CMS Eclipse Client
Installing the DITA CMS Eclipse Client WWW.IIASOFT.COM / DITACMS v. 4.1 / Copyright 2015 IIASOFT Technologies. All rights reserved. Last revised: March 03, 2015 Table of contents 3 Table of contents Packaging
More informationVMware Workspace ONE UEM VMware AirWatch Cloud Connector
VMware AirWatch Cloud Connector VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this
More informationManaging Certificates
CHAPTER 12 The Cisco Identity Services Engine (Cisco ISE) relies on public key infrastructure (PKI) to provide secure communication for the following: Client and server authentication for Transport Layer
More information