Expanding Single Sign-on for SAP Landscapes on i5/os

Size: px
Start display at page:

Download "Expanding Single Sign-on for SAP Landscapes on i5/os"

Transcription

1 Expanding Single Sign-on for SAP Landscapes on i5/os This document can be found on the web, Version Date: 10/23/2007 IBM Systems & Technology Group Kolby Hoelzle

2 Preface Reducing and keeping administrative costs down is a challenge for most if not all organizations. One common source of high administrative costs is user and password administration. Forgotten passwords and locked user IDs not only result in lost productivity, but also a high volume of calls to the help desk. One strategy for reducing user ID and password administrative costs is single sign-on (SSO). By reducing the number of passwords a user must remember without sacrificing security, is one way that SSO can reduce administrative costs. This paper explores the possibility of expanding SSO from an SAP NetWeaver WebAS Java environment, running on the IBM i5/os operating system, to include other elements of the enterprise including a Microsoft Windows network and other i5/os systems. About the Author Kolby Hoelzle is a member of the SAP on i5/os development team, which is part of the i5/os development lab in Rochester, Minnesota. He joined IBM in 1999 and has over six years of experience with SAP on the i5/os platform, including two years working at SAP development in Walldorf, Germany as a member of the joint IBM SAP i5/os porting team. Acknowledgements Thank you to the following reviewers: Pat Botz, IBM STG Lab Services Security Mike Frost, IBM STG Lab Services SAP Bernhard Wolf, SAP i5/os Porting Team Expanding Single Sign-on for SAP Landscapes on i5/os Page 2 of 26

3 Introduction This paper explores one possibility for expanding single sign-on (SSO) from an SAP NetWeaver landscape running on the IBM i5/os operating system to encompass your entire enterprise. SSO tends to be somewhat modular in nature and sometimes connecting the pieces to create a cohesive SSO environment proves to be elusive. Like most things in information technology (IT), there are many ways to accomplish the same thing. SSO is no different and many tactics and technologies have been developed to accomplish SSO. This paper provides an overview and discussion of one approach for expanding SSO from an SAP landscape on i5/os to include the entire enterprise. The purpose of this paper is to provide a proof of concept and a starting reference point for anyone interested in expanding SSO from an SAP landscape on i5/os to the entire enterprise. In today s heterogeneous IT environments, the way new technology is planned and implemented will depend on the environment itself. Goals and Expectations of Single Sign-on When you hear the term single sign-on or SSO, you might first think of eliminating password prompts for end users. Though eliminating prompts might be popular with the end user, SSO should not be implemented for this reason alone. SSO should be viewed and implemented as a means of reducing the cost of user administration. The end goal should not be SSO, but rather reducing administration costs. SSO is one strategy that can be used to accomplish this goal. SSO is a user administration strategy that might include the central management of all of an enterprise s users and their passwords or eliminating certain passwords altogether. SSO might provide authentication mechanisms that allow a user to authenticate once and obtain the necessary credentials that allow automatic authentication to subsequent systems and applications throughout the enterprise. An SSO solution might even provide a service to map one user ID to another so that a user does not have to manage different user IDs and passwords across multiple systems. Regardless of how SSO is implemented the main purpose of SSO should be to meet the goal of reducing costs. Administrative costs are reduced through SSO by simplifying the management of users and passwords for both the administrators and the users themselves. Password related problems tend to be a high percentage of the calls to the help desk in many organizations. Decreasing the number of passwords a user must remember has the potential to save help desk and administrative costs, not to mention lost productivity due to password related problems. Besides being one means for reducing costs, SSO can also help improve security. A user might be tempted to compromise security by writing down or caching the passwords if he or she has multiple user IDs and passwords to keep track of. The temptation might be even greater if your organization has implemented a security policy that forces users to change their password regularly. Decreasing the number of passwords that a user must keep track of lowers the tendency for a user to write down passwords and leave them easily accessible. Expanding Single Sign-on for SAP Landscapes on i5/os Page 3 of 26

4 Environment To illustrate SSO, I implemented a simple environment. My environment consists of three basic components: an SAP NetWeaver landscape, i5/os systems not running SAP applications, and a Microsoft Windows network and workstations. My simplified SAP landscape is a NetWeaver04s WebAS Java TM application server running SAP NetWeaver Portal 7.0. The i5/os systems are separate from the SAP systems and represent legacy applications running on i5/os. All i5/os systems, including the ones running SAP applications, are running V5R4. And finally, Windows workstations are used as the primary access point to the network resources. The Windows workstations are all part of a Windows domain. The Windows systems are a combination of Windows Server 2003 and Windows XP. Figure 1 shows a representation of my simple enterprise environment. Windows Domain Controller SAP backend systems SAP Enterprise Portal on i5 John Smith's user IDs: u:jsmith p:myonepwd u:jsmith p:mypassword u:johns p:password u:smithj p:thepassword etc.. Other i5/os applications Figure 1 Simple enterprise environment with multiple points of access In this environment, our user John arrives at work in the morning and the first thing that he does is sign-on to his Windows workstation using his Windows ID and password. After checking his , John decides to check the status of some i5/os batch jobs that ran overnight. John starts iseries Navigator and selects the system he needs to access. Since his Windows ID doesn t match his i5/os user profile, John is prompted for his user profile and password. After checking the status of his batch job, John decides to do some work using SAP. John opens his web browser and navigates to his SAP portal. Again John is prompted to enter a user ID and a password. John remembers that his SAP user ID is the same as his Windows ID, but yesterday he was forced to change his SAP password so now it doesn t match his Windows password. John thought that he remembered his new password, but after three attempts he was locked out and had to call the help desk. Not only is this additional cost to the help desk, but it also cost John in lost productivity. In our simple scenario, John has multiple different user IDs and passwords that he must keep track of. Combine this with security policies requiring passwords be Expanding Single Sign-on for SAP Landscapes on i5/os Page 4 of 26

5 changed on a regular basis and it is easy to see how this could lead to problems keeping track of passwords, even in this simple environment. Technology To make sense of my SSO implementation it is important to have an understanding of the concepts and technologies used to implement SSO in the environment I used as a reference for this paper. Authentication vs. Authorization First off, it is important to differentiate between authentication and authorization. Simply put, authentication is the process of proving you are who you say you are and authorization is providing the rights to access specific system resources after you have authenticated. The user authenticates with a system on the network by providing the proper credentials, usually a valid user ID and password. Authorization, on the other hand, is usually transparent to the user and is usually only noticed when access to a specific resource is denied. Traditionally authentication and authorization processes use the same user registry. Each system and sometimes applications will have their own user registries for authentication and authorization. With SSO, authentication and authorization are often separated so that there is a separate user repositories for authentication and one for authorization. In certain situations, the user repository for authentication may not even be located on the system that is being accessed. In contrast to authentication, the user repository used for authorization will always remain with the system or application. This is necessary due to differences in authorities and how they are managed from one system or application to the next. Plus this provides additional flexibility since a user may have different levels of authority from one system or application to another. Since a user s authority is managed by system or application and authorities are rarely changed after being established this has little impact on maintenance costs. Kerberos The primary authentication mechanism used for my SSO implementation is based off of a protocol named Kerberos. Kerberos is a distributed authentication protocol that was developed by MIT researchers. Kerberos consists of three distinct parts: authentication server, ticket granting server, and services. The authentication server and ticket granting server, though logically distinct, often exist on the same physical machine and are collectively referred to as the key distribution center (KDC). At a high level, the authentication server verifies a user s (principal in Kerberos terminology) credentials and grants what is called the ticket granting ticket or initial ticket. The ticket granting ticket is then used by the ticket granting server to grant a ticket for the specific service that the user is trying to access. The service can be a system or application on the network. Each service must be Kerberos enabled and configured to trust the KDC granting the tickets. All tickets are temporary and will Expanding Single Sign-on for SAP Landscapes on i5/os Page 5 of 26

6 expire after a limited period of time, usually eight to ten hours. This forces the user to reauthenticate and limits the opportunity for someone other than the original user to intercept and reuse the ticket. To illustrate how Kerberos works, let s take another look at our user John. When John arrives at work in the morning, he signs on to his workstation. John authenticates by entering his user ID and password. John is issued a ticket granting ticket by the KDC that is good for the rest of the day. Now John decides to access a network service (application) on a different machine. Since the KDC that issued John s ticket granting ticket is trusted by that service, John is issued a ticket for access to that particular service. This ticket is also good for the rest of the day. John can immediately access this service without entering his credentials, since he has already been authenticated. For more information on Kerberos see Kerberos has been implemented and integrated in both Windows and i5/os. SAP has implemented a Kerberos based authentication mechanism named SPNego for WebAS Java. SPNego enables Kerberos authentication and allows a user to authenticate using Kerberos tickets. Microsoft Windows Active Directory Microsoft Windows Active Directory is an integrated part of Windows Server technology and is a key component of the Windows Server domain controller. A domain controller is required for any Windows based network. Active Directory is used as the user repository for both authorization and authentication in a Windows based network. Active Directory is a critical part of a Windows network making it an essential part of my SSO solution. For more information on Microsoft Active Directory see ault.mspx Network Authentication Service Network Authentication Service (NAS) is the IBM implementation of Kerberos and the Generic Security Service (GSS) API. NAS is an integrated part of i5/os, but it must be configured. NAS allows i5/os users the ability to use Kerberos to access the i5/os green screen or Kerberos-enabled client server applications running on i5/os, such as iseries Navigator. For more information on NAS, see esultof=%22% Enterprise Identity Mapping Normally used in tandem with NAS, Enterprise Identity Mapping (EIM) provides the capability to map one user ID to another. One person may have a different user ID for Expanding Single Sign-on for SAP Landscapes on i5/os Page 6 of 26

7 different systems or applications even in the same organization. Tracking which user ID goes with which system or application can be as daunting as trying to remember all of your passwords, not to mention which password goes with which user ID. EIM allows a user to authenticate with one user ID and then use those credentials to map that user ID to another user ID. For more information on EIM, see ultof=%22%45% Implementation Before discussing my implementation, I need to highlight three key assumptions that I based my implementation on. The first assumption is that a typical user s primary point of access to network resources is a single workstation of some type. With Windows dominance of the desktop, I m assuming that a Windows network and workstations are typical for many organizations. The second assumption is that the SAP Enterprise Portal system is the main access point to the SAP landscape and that SSO, using SAP technology, has been implemented between Enterprise Portals and the backend SAP applications. Since Enterprise Portals is a relatively new product offered by SAP, this assumption is probably less typical in current SAP landscapes. But as more and more customers take advantage of the benefits of portals, this may become more of the norm in the future. The third and final assumption is that all of the applications in the landscape can be enabled or configured to authenticate via Kerberos. In reality this is not the case. Although many applications have been enabled for Kerberos, there are many that have not. Enabling an application for Kerberos is something that usually must be done at the application development level. Besides Kerberos, other mechanisms do exist for implementing SSO. It is even possible that multiple mechanisms will be used in the same SSO solution. SSO solutions tend to be somewhat modular, the individual components of a solution might be implemented and provide value before the entire solution is in place. Not only does this provide a natural way to break up a big SSO project, but could also provide a way to manage the costs of the project itself. The implementation of my test environment consisted of the following components: creating a Microsoft domain which includes the KDC; configuring the i5/os network authentication server and enterprise identity mapping; configuring the SAP user store to use Microsoft Active Directory; and finally configuring the SAP WebAS Java application server to use Kerberos for authentication. Windows Domain Controller and KDC For my environment I had to create a Windows network that I could use for a sandbox. I m assuming for the sake of this paper that most environments using Windows workstations already have a Windows network and domain controller configured. Since Windows network administration is beyond the scope of this paper, I will not be Expanding Single Sign-on for SAP Landscapes on i5/os Page 7 of 26

8 discussing how to configure a Windows network. For more information on Windows networks see Fortunately Kerberos is the default mechanism used for authentication in a Windows network domain. So by default my Windows domain controller is also a Kerberos KDC. Network Authentication Server and Enterprise Identity Mapping Once the Windows domain was created and all of the Windows workstations added to the domain, I began configuration of the i5/os machines in my environment. EIM and NAS were configured on each i5/os system. I configured one i5/os as my EIM domain controller and configured all of the other systems to join that domain. The configuration of EIM and NAS are closely related. The configuration for both services is done through wizards available through iseries Navigator. To configure EIM and NAS: 1. Open iseries Navigator 2. Under My Connections, select the system to be used as the EIM domain controller 3. Expand Network, then Enterprise Identity Mapping 4. Right click Configuration, then select Configure to start the wizard, see figure 2 Figure 2 Starting the EIM wizard 5. At the first dialog screen, select Create and join a new domain and click next, see figure 3. Expanding Single Sign-on for SAP Landscapes on i5/os Page 8 of 26

9 Figure 3 Creating a new EIM domain 6. On the next dialog screen select On the local Directory server and click next. 7. When prompted to configure NAS, click Yes and press Next. Configure NAS 8. Click next to continue and start the NAS wizard 9. Enter the name of your Kerberos default realm and make sure to check the box specifying that Microsoft Active Directory is used for Kerberos authentication 10. Enter the name and port for your KDC, this should be the fully qualified domain name of your Windows domain controller. The default port for the KDC is When prompted to configure the system to use a password server for the default realm, select Yes and specify the fully-qualified host name of the KDC. The default port the password server is On the next dialog you will be prompted to select services for the keytab. A keytab file is used to securely store a service principal s long term key. (With Kerberos it is possible to authenticate with a service such as an HTTP server. The service principal is the Kerberos name for that service.) Check all of the services and press Next. 13. The next few dialogs will prompt you to enter a password for each service. This password is used to create the keytab entries specified in the previous dialog. 14. After entering passwords for all of the keytab entries, you will be asked if you want to create batch file that can be run on your KDC host. This batch file will contain the Windows commands necessary to configure the service users. Specify yes and the location for this batch file and press Next. Expanding Single Sign-on for SAP Landscapes on i5/os Page 9 of 26

10 15. NAS configuration is now complete on the server. The batch file that was created as part of the NAS wizard, must be run on the KDC host from the command prompt. Once NAS configuration is complete, the EIM wizard will automatically resume. Complete EIM Configuration 16. In the next dialog, you will be prompted to configure the directory server. The default port for the directory server is 389. Enter the value cn=administrator for Distinguished name. Click Next. 17. You will now be prompted to specify a name for you EIM domain. This can be any name you want. I used the value deptggqeimdomain for my EIM domain name. After specifying a name, click Next. 18. In the next dialog you will be asked if you would like to specify a parent DN for the EIM domain, select No and click Next. 19. You should see a warning asking if you would like to restart the directory server, press Yes. 20. Next you will be asked to specify user registries. Check the box for Local i5/os and Kerberos. For the local i5/os registry, this should be the fully qualified domain name of the server that EIM is being configuring on. For the Kerberos registry, this should be the fully-qualified domain name of the KDC. Leave the Kerberos user identities are case sensitive box unchecked. Click Next. 21. Specify the EIM system user in the next dialog. From the pull down menu select Distinguished name and password. For the distinguished name enter cn=administrator. Specify a password, press Verify Connection to test and then click Next. 22. The final dialog screen will present a summary. Verify that everything is correct and press Finish. NAS and EIM must be configured on the remaining i5/os systems in your network. The same wizards can still be used, but instead of creating a new EIM domain controller, select Join an existing domain to join the EIM domain that you previously created, see figure 4. Expanding Single Sign-on for SAP Landscapes on i5/os Page 10 of 26

11 Figure 4 Joining an existing EIM domain For more detailed information on configuring EIM and NAS see IBM Systems iseries: Security, Single signon, Version 5 Release 4. This can be downloaded at After configuring EIM and NAS on all of my i5/os systems, I was able to use EIM to map each user s profile on each system to one single user ID. Once this was complete, I modified the user profiles on i5/os so that the password field was set to *NONE, effectively eliminating the passwords. After configuring iseries Navigator to use Kerberos, the users are now able to access any i5/os in my network using their Windows user ID and password, regardless of their user profiles on a particular i5/os system. To configure iseries Navigator to use Kerberos do the following: 1. Open iseries Navigator and expand My Connections 2. Right click the system you wish to modify and select Properties in the pop up menu 3. Select the Connection tab 4. Under Signon information select the option Use Kerberos principal name, no prompting 5. Click OK Using Microsoft Active Directory as a WebAS Java Data Source One tactic that can be used for part or even all of your SSO solution is to centralize both user IDs and passwords. Depending on the complexity of your organization and the applications being used, this may be a good choice, especially if user IDs are Expanding Single Sign-on for SAP Landscapes on i5/os Page 11 of 26

12 synchronized for each user and the user store data source can be configured. I chose somewhat of a hybrid solution, where I centralized the SAP application users and the Windows users. My i5/os users were not centralized, so I used EIM to map user IDs and eliminate the passwords. Since most of my users have the same user ID on Windows as they have on SAP, I was able to easily configure the SAP user store to use Microsoft Active Directory as a data source. This provided centralization for my Windows and SAP user IDs and allowed me to administer passwords for all of these users from one central location. In cases where one user has one user ID for the Windows domain and a different one for SAP, it was necessary to synchronize the user IDs. Another possible solution is to implement an identity mapping technology such as IBM EIM. In addition to providing a centralized location to administer and maintain user IDs, the configuration of the SAP user store to use Microsoft ADS transfers user authentication from the SAP application to the Windows. This does not eliminate the user store from the SAP application since the SAP application still requires a user store for authorization. Password maintenance for all users is done on the Windows domain controller, while other user ID administration, such as assigning roles and authorities remains on the SAP application. More information on configuring the WebAS Java User Management Engine (UME) to use alternate data sources can be found in SAP note NetWeaver: Supported UME Data Sources and Change Options and in the SAP Library at Search for the topic LDAP Directory as Data Source. For a list of SAP certified LDAP directory servers that can be used as a data source, see SAP note Certified LDAP directory servers. To configure the SAP WebAS Java UME to use Microsoft Active Directory as a data source, follow these steps: 1. Start the WebAS system 2. From your browser, enter the URL for the WebAS Java main page ( where host is the host name of the WebAS Java application server and nn is the instance number) 3. Click the User Management link and logon as administrator if prompted 4. Click User Management Configuration 5. Click Modify Configuration 6. Change the data source by using the pull down menu and update the data source file name, see figure 5. Expanding Single Sign-on for SAP Landscapes on i5/os Page 12 of 26

13 Figure 5 Configuring the user store data source 7. Click Save All Changes 8. Select the LDAP Server tab 9. Enter the required information for each field, see figure 6. Expanding Single Sign-on for SAP Landscapes on i5/os Page 13 of 26

14 Figure 6 Configure LDAP server for user management engine 10. Click the Test Connection button to verify 11. Click Save All Changes 12. Restart WebAS Java Configure the UME Data Source for Kerberos Configuring the UME to use Microsoft Active Directory as a data source is only part of the necessary configuration for SSO. The UME data source must still be configured for Kerberos authentication. This is done by modifying the UME configuration XML file to map Kerberos attributes to the proper attributes in the data source. More details on configuring the UME can be found in the SAP Library at Search for the topic Configuring the UME when Using ADS Data Sources for Kerberos. To configure the UME data source for Kerberos, follow these steps: 1. Start the WebAS system 2. From your browser, enter the URL for the WebAS Java main page 3. Click the User Management link and logon as administrator if prompted 4. Click User Management Configuration 5. Click the Download File link, see figure 7. Expanding Single Sign-on for SAP Landscapes on i5/os Page 14 of 26

15 Figure 7 Download XML data source configuration file 7. Save the XML file so that you can edit it 8. Edit the XML file by defining the attributes kpnprefix, krb5principalname and dn in the responsiblefor section of the configuration file. See figure 8. In the attributemapping section set kpnprefix to the physical attribute samaccountname ; krb5principal to userprincipalname ; and dn to distinguishedname. See figure 9. Expanding Single Sign-on for SAP Landscapes on i5/os Page 15 of 26

16 ... <responsiblefor>... <principal type="user"> <namespaces> <namespace name="com.sap.security.core.usermanagement"> <attributes> <attribute name="firstname" populateinitially="true"/> <attribute name="displayname" populateinitially="true"/> <attribute name="lastname" populateinitially="true"/> <attribute name="fax"/> <attribute name=" "/> <attribute name="title"/> <attribute name="department"/> <attribute name="description"/> <attribute name="mobile"/> <attribute name="telephone"/> <attribute name="streetaddress"/> <attribute name="uniquename" populateinitially="true"/> <attribute name="kpnprefix"/> <attribute name="krb5principalname"/> <attribute name="dn"/> </attributes> </namespace> <namespace name="com.sap.security.core.usermanagement.relation"> </principal>... </responsiblefor> Figure 8 Add Kerberos attributes to UME configuration file... <attributemapping>... <principals> <principal type="user"> <namespaces> <namespace name="com.sap.security.core.usermanagement"> <attributes> <attribute name="firstname"> <physicalattribute name="givenname"/> </attribute> <attribute name="displayname"> <physicalattribute name="displayname"/> </attribute> <attribute name="lastname"> <physicalattribute name="sn"/> </attribute>... </namespaces> </principal> </principals> </attributemapping>... <attribute name="kpnprefix"> <physicalattribute name="samaccountname"/> </attribute> <attribute name="krb5principalname"> <physicalattribute name="userprincipalname"/> </attribute> <attribute name="dn"> <physicalattribute name="distinguishedname"/> </attribute> </attributes> </namespace>... Figure 9 Map Kerberos attributes to physical attributes in UME configuration file 9. Return to the WebAS Java browser session Expanding Single Sign-on for SAP Landscapes on i5/os Page 16 of 26

17 10. In the File Upload field enter the location of the edited XML configuration file 11. Click Upload File, see Figure 10. Figure 10 Upload XML data source file after editing 12. Restart WebAS Java application server for the changes to take effect. Enabling SAP Java Application Server for Kerberos SAP WebAS Java makes it possible for Kerberos authentication when using web clients such as a web browser. This is done with the Java implementation of the Simple and Protected GCC API Negotiation Mechanism, known as SPNego. The SPNego implementation for SAP WebAS Java is available as a download through SAP note SPNego Wizard. Besides documentation, this note includes a wizard that simplifies the configuration. Deploy the SPNego Wizard Before using the wizard, it is necessary to deploy the wizard to the WebAS Java application server. Follow these steps to deploy the wizard: 1. Start WebAS Java 2. Connect Visual Administrator to your WebAS Java system 3. Expand Server -> Services 4. Click Deploy Expanding Single Sign-on for SAP Landscapes on i5/os Page 17 of 26

18 5. In the right-hand pane, make sure the Runtime tab is selected 6. Press the Deploy & Start button, see figure 11. Figure 11 Starting the deploy process 7. In the File field enter the path to the EAR to be deployed and press OK, see figure 12. Expanding Single Sign-on for SAP Landscapes on i5/os Page 18 of 26

19 Figure 12 Deploy component of SPNego wizard 8. A warning dialog will appear, click OK 9. Click OK to acknowledge the application overwriting check 10. Click OK at the deploy dialog 11. Repeat for the remaining EARs Run the SPNego Wizard Before running the SPNego wizard the following conditions must be met: Microsoft Active Directory must be configured and running as the KDC Service principal name (SPN) created for the DNS name that is used to access the WebAS Java with Kerberos authentication (service principal names and the appropriate mapping should have been configured as part of the NAS configuration) the UME configured to use Microsoft Active Directory as the data source the UME configuration file modified for Kerberos authentication Once the prerequisites have been met, you can run the SPNego wizard by doing the following: Expanding Single Sign-on for SAP Landscapes on i5/os Page 19 of 26

20 1. Start WebAS Java 2. From a web browser enter the URL where host is the host name of the WebAS Java application server and nn is the instance number 4. Logon as administrator if prompted 5. On the first dialog make sure the boxes Service user is created and configured in Active Directory and UME configuration includes SPNego specific settings are both checked and press Next 6. In the second dialog enter the name of your Kerberos realm and press the Add KDC button 7. Enter the host name or IP address of your KDC in the pop-up dialog and make sure the port number is correct and press OK 8. Fill in the required fields and press Next, see figure 13. Figure 13 Using SPNego configuration wizard to specify Kerberos realm 9. On the next dialog screen select prefixbased from the pull down menu. 10. Take the default values and press Next, see figure 14. Expanding Single Sign-on for SAP Landscapes on i5/os Page 20 of 26

21 Figure 14 Using SPNego wizard to specify resolution mode 11. On the next dialog take the default values and press Next 12. On the final dialog screen, validate that the values are correct and press Finish 13. Restart WebAS Java Allow WebAS Java to Authenticate Using SPNego After SPNego has been configured the final step is to allow WebAS Java to authenticate using SPNego. This is done by doing the following: 1. Start WebAS Java 2. Connect Visual Administrator to your WebAS Java system 3. Expand Server -> Services 4. Click Security Provider 5. Select the Runtime tab, then the Policy Configurations tab, and finally the Authentication tab 6. In the Components pane, select ticket 7. Click the edit icon 8. Using the pull down menu, change Authentication template to spnego, see figure 15. Expanding Single Sign-on for SAP Landscapes on i5/os Page 21 of 26

22 Figure 15 Configure WebAS Java for Kerberos authentication 9. Repeat for component sap.com/tc~sec~auth~examples*sec_form 10. Restart WebAS Java Configure Browser The final step is to configure your web browser to access SAP WebAS Java using Kerberos authentication. Steps for doing this can also be found in SAP note SPNego Wizard. The following steps are for Microsoft Internet Explorer. 1. Open your browser 2. From the menu select Tools -> Internet Options 3. Select the security tab 4. Select Local intranet 5. Click the Sites button 6. Enter the fully qualified domain name for the WebAS Java host, see figure 16. Expanding Single Sign-on for SAP Landscapes on i5/os Page 22 of 26

23 Figure 16 Adding WebAS Java website to trusted zone 7. Click the Add button 8. Click Close 9. Select the Advanced tab 10. Make sure the Enable Integrated Windows Authentication box is checked, see figure 17. Expanding Single Sign-on for SAP Landscapes on i5/os Page 23 of 26

24 Figure 17 Enabling integrated Windows authentication 11. Click OK You are now ready to test your SSO configuration! Results and Conclusion Finally after implementing all of the pieces of the SSO solution, it is time to bring it all together. Our user John will still sign-on to his workstation first thing in the morning. Since John has already authenticated he can access any resource in the enterprise without entering his credentials again, see figure 18. More importantly, John no longer has to keep track of multiple user IDs and multiple passwords. This makes life a lot easier for John, especially when he is forced to change his password on a regular basis. Since John only has one password to remember, he no longer has to write down his passwords and leave them somewhere easily accessible. John is happy and the help desk and administrators are happy because the volume of calls relating to password problems has dropped drastically. Expanding Single Sign-on for SAP Landscapes on i5/os Page 24 of 26

25 Windows 2003 Active Directory SAP backend systems SAP Enterprise Portal on i5 John Smith's user IDs: u:jsmith p:myonepwd u:jsmith p:none u:johns p:none u:smithj p:none etc.. Legacy application on i5 Figure 18 Simple enterprise environment with a single point of access after SSO The goal is to reduce administrative costs and improve security through the use of SSO. Eliminating user ID and password prompts, though convenient for a user, is not the primary purpose of SSO. However, it is usually a positive side effect of some SSO implementations. SSO is not a product that can be installed and configured, but rather a custom solution that can include different products and technologies as well as incorporate different strategies. The approaches to implementing an SSO solution are as varied as the technologies and products that can be utilized. So to sum it all up, there is no one size fits all solution for SSO and to make use of another cliché common in IT when it comes to implementing SSO, it depends. I have shown one approach to expanding SSO from an SAP on i5/os landscape to the entire enterprise. Hopefully, this will provide some valuable insights when planning an SSO solution for your environment. All of the technology that I used was either part of Windows, i5/os, or made available by SAP. In this simple case, no third party SSO technology was necessary, although a number of vendors do offer SSO enabling technology. Armed with this information and the knowledge that SSO is indeed a possibility in your SAP on i5/os environment, you can begin developing an SSO strategy and plan suited for your enterprise. Expanding Single Sign-on for SAP Landscapes on i5/os Page 25 of 26

26 References Garman, Jason. Kerberos: The Definitive Guide. 1 st edition, Sebastopol, CA: Farnham: O Reilly International Business Machines Corporation. IBM System i and i5/os Information Center: Enterprise Identity Mapping (EIM). < esultof=%22%45%/>. International Business Machines Corporation. IBM System i and i5/os Information Center: Network Authentication Service. < resultof=%22%/>. International Business Machines Corporation. System i Security, Single signon, Version 5 Release 4. Third edition, < Massachusetts Institute of Technology. Kerberos: The Network Authentication Protocol. < Microsoft Corporation. Windows Server 2003 Active Directory. < efault.mspx/>. Microsoft Corporation. Microsoft TechNet: Networking and Access Technologies. < SAP AG. SAP Help Portal. < SAP AG. SAP Note NetWeaver: Supported UME Data Sources and Change Options. SAP AG. SAP Note Certified LDAP directory servers. SAP AG. SAP Note SPNego Wizard. Expanding Single Sign-on for SAP Landscapes on i5/os Page 26 of 26

Simplifying SAP on i5/os with Single Sign-on

Simplifying SAP on i5/os with Single Sign-on Simplifying SAP on i5/os with Single Sign-on This document can be found on the web, Version Date: May 6, 2008 IBM Systems & Technology Group Kolby Hoelzle hoelzle@us.ibm.com This page left blank intentionally.

More information

Step By Step Guide to Connect LDAP as Datasource in NW 7.0 and CE 7.1

Step By Step Guide to Connect LDAP as Datasource in NW 7.0 and CE 7.1 Step By Step Guide to Connect LDAP as Datasource in NW 7.0 and CE 7.1 Applies to: SAP Netweaver Portal 7.0 SAP Composite Environment 7.1 SR5 Summary This document provides step by step guidance on how

More information

Security Single sign-on

Security Single sign-on System i Security Single sign-on Version 6 Release 1 System i Security Single sign-on Version 6 Release 1 Note Before using this information and the product it supports, read the information in Notices,

More information

Security Enterprise Identity Mapping

Security Enterprise Identity Mapping System i Security Enterprise Identity Mapping Version 6 Release 1 System i Security Enterprise Identity Mapping Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

SPNEGO SINGLE SIGN-ON USING SECURE LOGIN SERVER X.509 CLIENT CERTIFICATES

SPNEGO SINGLE SIGN-ON USING SECURE LOGIN SERVER X.509 CLIENT CERTIFICATES SPNEGO SINGLE SIGN-ON USING SECURE LOGIN SERVER X.509 CLIENT CERTIFICATES TABLE OF CONTENTS SCENARIO... 2 IMPLEMENTATION STEPS... 2 PREREQUISITES... 3 1. CONFIGURE ADMINISTRATOR FOR THE SECURE LOGIN ADMINISTRATION

More information

Configuring Integrated Windows Authentication for IBM WebSphere with SAS 9.2 Web Applications

Configuring Integrated Windows Authentication for IBM WebSphere with SAS 9.2 Web Applications Configuring Integrated Windows Authentication for IBM WebSphere with SAS 9.2 Web Applications Copyright Notice The correct bibliographic citation for this manual is as follows: SAS Institute Inc., Configuring

More information

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902 Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Kerberos Authentication User Resolution Example issues and suggested solutions

Kerberos Authentication User Resolution Example issues and suggested solutions Kerberos Authenticion User Resolution Example issues and suggested solutions Prick Whitty SAP Product Support This document is intended to provide informion about UME User and Account tributes and how

More information

Configuring Kerberos based SSO in Weblogic Application server Environment

Configuring Kerberos based SSO in Weblogic Application server Environment IBM Configuring Kerberos based SSO in Weblogic Application server Environment Kerberos configuration Saravana Kumar KKB 10/11/2013 Saravana, is working as a Staff Software Engineer (QA) for IBM Policy

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

Perceptive Matching Engine

Perceptive Matching Engine Perceptive Matching Engine Advanced Design and Setup Guide Version: 1.0.x Written by: Product Development, R&D Date: January 2018 2018 Hyland Software, Inc. and its affiliates. Table of Contents Overview...

More information

with Access Manager 51.1 What is Supported in This Release?

with Access Manager 51.1 What is Supported in This Release? 51 51 Integrating Microsoft SharePoint Server with Access Manager This chapter explains how to integrate Access Manager with a 10g WebGate and Microsoft SharePoint Server. It covers the following topics:

More information

Pyramid 2018 Kerberos Guide Guidelines and best practices for how deploy Pyramid 2018 with Kerberos

Pyramid 2018 Kerberos Guide Guidelines and best practices for how deploy Pyramid 2018 with Kerberos Pyramid 2018 Kerberos Guide Guidelines and best practices for how deploy Pyramid 2018 with Kerberos Contents Overview... 3 Warning... 3 Prerequisites... 3 Operating System... 3 Pyramid 2018... 3 Delegation

More information

Identity Provider for SAP Single Sign-On and SAP Identity Management

Identity Provider for SAP Single Sign-On and SAP Identity Management Implementation Guide Document Version: 1.0 2017-05-15 PUBLIC Identity Provider for SAP Single Sign-On and SAP Identity Management Content 1....4 1.1 What is SAML 2.0.... 5 SSO with SAML 2.0.... 6 SLO with

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

RSA Authentication Manager 7.1 Help Desk Administrator s Guide

RSA Authentication Manager 7.1 Help Desk Administrator s Guide RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

IBM Security Access Manager Version January Federation Administration topics IBM

IBM Security Access Manager Version January Federation Administration topics IBM IBM Security Access Manager Version 9.0.2.1 January 2017 Federation Administration topics IBM IBM Security Access Manager Version 9.0.2.1 January 2017 Federation Administration topics IBM ii IBM Security

More information

VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Manager

VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Manager VMware AirWatch - Workspace ONE, Single Sign-on and VMware Identity Table of Contents Lab Overview - HOL-1857-03-UEM - Workspace ONE UEM with App & Access Management... 2 Lab Guidance... 3 Module 1 - Workspace

More information

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1 Administering Workspace ONE in VMware Identity Manager Services with AirWatch VMware AirWatch 9.1.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Integrating AirWatch and VMware Identity Manager

Integrating AirWatch and VMware Identity Manager Integrating AirWatch and VMware Identity Manager VMware AirWatch 9.1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE Guide to Deploying VMware Workspace ONE with VMware Identity Manager SEP 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Password Manager for SAP Single Sign-On Implementation Guide

Password Manager for SAP Single Sign-On Implementation Guide PUBLIC SAP Single Sign-On 3.0 SP02 Document Version: 1.1 2018-07-31 Password Manager for SAP Single Sign-On Implementation Guide 2018 SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN

More information

Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording

Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording Contents 1 About This Document... 2 2 Overview... 2 3 Before You Begin... 2 4 Deploying ObserveIT with IBM

More information

Files.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team

Files.Kennesaw.Edu. Kennesaw State University Information Technology Services. Introduces. Presented by the ITS Technology Outreach Team Kennesaw State University Information Technology Services Introduces Files.Kennesaw.Edu Presented by the ITS Technology Outreach Team Last Updated 08/12/13 Powered by Xythos Copyright 2006, Xythos Software

More information

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date

More information

MANAGEMENT AND CONFIGURATION MANUAL

MANAGEMENT AND CONFIGURATION MANUAL MANAGEMENT AND CONFIGURATION MANUAL Page 1 of 31 Table of Contents Overview... 3 SYSTEM REQUIREMENTS... 3 The Administration Console... 3 CHAT DASHBOARD... 4 COMPANY CONFIGS... 4 MANAGE LEARNING... 7 MANAGE

More information

SPNegoLoginModule configuration for multi-forest scenarios with SUN JDK

SPNegoLoginModule configuration for multi-forest scenarios with SUN JDK SDN Contribution SPNegoLoginModule configuration for multi-forest scenarios with SUN JDK Applies to: SAP NetWeaver 04 Java Stack as of SPS15 Summary This document explains how to configure Windows Integrated

More information

Kerberos Constrained Delegation Authentication for SEG V2. VMware Workspace ONE UEM 1810

Kerberos Constrained Delegation Authentication for SEG V2. VMware Workspace ONE UEM 1810 Kerberos Constrained Delegation Authentication for SEG V2 VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you

More information

Single Sign-On Extensions Library THE BEST RUN. PUBLIC SAP Single Sign-On 3.0 SP02 Document Version:

Single Sign-On Extensions Library THE BEST RUN. PUBLIC SAP Single Sign-On 3.0 SP02 Document Version: PUBLIC SAP Single Sign-On 3.0 SP02 Document Version: 1.1 2018-07-31 2018 SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN Content 1....3 1.1 Extension for Kerberos Constrained Delegation

More information

BusinessObjects Enterprise XI Release 2

BusinessObjects Enterprise XI Release 2 Configuring Kerberos End-to-End Single Sign-On using IIS Overview Contents This document provides information and instructions for setting up Kerberos end-to-end Single Sign-On (SSO) using IIS to the database

More information

BIG-IP Access Policy Manager : Portal Access. Version 12.1

BIG-IP Access Policy Manager : Portal Access. Version 12.1 BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7

More information

Supporting Networked Computers

Supporting Networked Computers CHAPTER 7 Supporting Networked Computers After completing this chapter, you will be able to: Define the main concepts of networking, including the roles of TCP/IP, IP addresses, and subnet masks. Set up

More information

Webthority can provide single sign-on to web applications using one of the following authentication methods:

Webthority can provide single sign-on to web applications using one of the following authentication methods: Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,

More information

Julia Levedag, Vera Gutbrod RIG and Product Management SAP AG

Julia Levedag, Vera Gutbrod RIG and Product Management SAP AG Setting Up Portal Roles in SAP Enterprise Portal 6.0 Julia Levedag, Vera Gutbrod RIG and Product Management SAP AG Learning Objectives As a result of this workshop, you will be able to: Understand the

More information

Cisco Secure Desktop (CSD) on IOS Configuration Example using SDM

Cisco Secure Desktop (CSD) on IOS Configuration Example using SDM Cisco Secure Desktop (CSD) on IOS Configuration Example using SDM Document ID: 70791 Contents Introduction Prerequisites Requirements Components Used Network Diagram Related Products Conventions Configure

More information

Connecting to System i System i Access for Web

Connecting to System i System i Access for Web System i Connecting to System i System i Access for Web Version 6 Release 1 System i Connecting to System i System i Access for Web Version 6 Release 1 Note Before using this information and the product

More information

Lotus Domino Security NSL, Web SSO, Notes ID vault. Collin Murray Program Director, Lotus Domino Product Management

Lotus Domino Security NSL, Web SSO, Notes ID vault. Collin Murray Program Director, Lotus Domino Product Management Lotus Domino Security NSL, Web SSO, Notes ID vault Collin Murray Program Director, Lotus Domino Product Management Challenge: Reduce Cost of Ownership IBM Lotus Notes and Domino have been providing a secure

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

SAP NetWeaver Identity Management Virtual Directory Server. Tutorial. Version 7.0 Rev 4. - Accessing LDAP servers

SAP NetWeaver Identity Management Virtual Directory Server. Tutorial. Version 7.0 Rev 4. - Accessing LDAP servers SAP NetWeaver Identity Management Virtual Directory Server Tutorial - Accessing LDAP servers Version 7.0 Rev 4 SAP Library document classification: PUBLIC No part of this publication may be reproduced

More information

IBM Security Access Manager Version 9.0 October Federation Administration topics IBM

IBM Security Access Manager Version 9.0 October Federation Administration topics IBM IBM Security Access Manager Version 9.0 October 2015 Federation Administration topics IBM IBM Security Access Manager Version 9.0 October 2015 Federation Administration topics IBM ii IBM Security Access

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

DoD Common Access Card Authentication. Feature Description

DoD Common Access Card Authentication. Feature Description DoD Common Access Card Authentication Feature Description UPDATED: 20 June 2018 Copyright Notices Copyright 2002-2018 KEMP Technologies, Inc. All rights reserved. KEMP Technologies and the KEMP Technologies

More information

OVERVIEW Feature Summary... 3 CONFIGURATION System Requirements... 4 ConnectWise Manage Configuration... 4

OVERVIEW Feature Summary... 3 CONFIGURATION System Requirements... 4 ConnectWise Manage Configuration... 4 Contents OVERVIEW... 3 Feature Summary... 3 CONFIGURATION... 4 System Requirements... 4 ConnectWise Manage Configuration... 4 Configuration of Manage Login... 4 Configuration of GL Accounts... 5 Configuration

More information

SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5. System Administrator s Guide

SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5. System Administrator s Guide SMEC ASSET MANAGEMENT SYSTEM PMS Version 5.5 System Administrator s Guide January 2015 PREPARATION, REVIEW AND AUTHORISATION Revision # Date Prepared by Reviewed by Approved for Issue by 1 21-Jan-2015

More information

Federated Search between SAP NetWeaver Enterprise Search and Microsoft Search Server 2008 using OpenSearch and SSO

Federated Search between SAP NetWeaver Enterprise Search and Microsoft Search Server 2008 using OpenSearch and SSO Federated Search between SAP NetWeaver Enterprise Search and Microsoft Search Server 2008 using OpenSearch and SSO Applies to: SAP NetWeaver Enterprise Search 7.0 SP3 Microsoft Windows Server 2000 or 2003

More information

Configuring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them

Configuring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them Configuring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them The Content Collection should be the repository for all of the files used in Blackboard. The Content Collection

More information

5 MANAGING USER ACCOUNTS AND GROUPS

5 MANAGING USER ACCOUNTS AND GROUPS MANAGING USER ACCOUNTS AND GROUPS.1 Introduction to user accounts Objectives.2 Types of User Accounts.2.1 Local User Account.2.2 Built-in User Account.2.3 Domain User Account.3 User Profile.3.1 Content

More information

Security Provider Integration Kerberos Authentication

Security Provider Integration Kerberos Authentication Security Provider Integration Kerberos Authentication 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 15 Create an Identity Rule, page 15 Manage a Realm, page 20 Manage an Identity

More information

MANAGEMENT AND CONFIGURATION MANUAL

MANAGEMENT AND CONFIGURATION MANUAL MANAGEMENT AND CONFIGURATION MANUAL Table of Contents Overview... 3 SYSTEM REQUIREMENTS... 3 The Administration Console... 3 CHAT DASHBOARD... 4 COMPANY CONFIGS... 4 MANAGE LEARNING... 7 MANAGE TABS...

More information

Welcome to the e-learning course for SAP Business One Analytics Powered by SAP HANA: Installation and Licensing. This course is valid for release

Welcome to the e-learning course for SAP Business One Analytics Powered by SAP HANA: Installation and Licensing. This course is valid for release Welcome to the e-learning course for SAP Business One Analytics Powered by SAP HANA: Installation and Licensing. This course is valid for release 9.0. 1 At the end of this course, you will be able to discuss

More information

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

ITCertMaster.  Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way! ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com Exam : C_AUDSEC_731 Title : SAP Certified Technology Associate - SAP Authorization and Auditing for SAP NetWeaver 7.31

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

NetExtender for SSL-VPN

NetExtender for SSL-VPN NetExtender for SSL-VPN Document Scope This document describes how to plan, design, implement, and manage the NetExtender feature in a SonicWALL SSL-VPN Environment. This document contains the following

More information

Five9 Plus Adapter for Agent Desktop Toolkit

Five9 Plus Adapter for Agent Desktop Toolkit Cloud Contact Center Software Five9 Plus Adapter for Agent Desktop Toolkit Administrator s Guide September 2017 The Five9 Plus Adapter for Agent Desktop Toolkit integrates the Five9 Cloud Contact Center

More information

CA SiteMinder Federation Standalone

CA SiteMinder Federation Standalone CA SiteMinder Federation Standalone Agent for Windows Authentication Guide r12.52 SP1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred

More information

Centrify for Dropbox Deployment Guide

Centrify for Dropbox Deployment Guide CENTRIFY DEPLOYMENT GUIDE Centrify for Dropbox Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of

More information

maxecurity Product Suite

maxecurity Product Suite maxecurity Product Suite Domain Administrator s Manual Firmware v2.2 ii Table of Contents BASICS... 1 Understanding how maxecurity products work in your company... 1 Getting started as a Domain Administrator...

More information

SecureTransport Version May Web Client User Guide

SecureTransport Version May Web Client User Guide SecureTransport Version 5.3.6 9 May 2018 Web Client User Guide Copyright 2018 Axway All rights reserved. This documentation describes the following Axway software: Axway SecureTransport 5.3.6 No part of

More information

ControlPoint. Advanced Installation Guide. September 07,

ControlPoint. Advanced Installation Guide. September 07, ControlPoint Advanced Installation Guide September 07, 2017 www.metalogix.com info@metalogix.com 202.609.9100 Copyright International GmbH., 2008-2017 All rights reserved. No part or section of the contents

More information

Kerberos Constrained Delegation Authentication for SEG V2. VMware Workspace ONE UEM 1811

Kerberos Constrained Delegation Authentication for SEG V2. VMware Workspace ONE UEM 1811 Kerberos Constrained Delegation Authentication for SEG V2 VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you

More information

How to Integrate an External Authentication Server

How to Integrate an External Authentication Server How to Integrate an External Authentication Server Required Product Model and Version This article applies to the Barracuda Load Balancer ADC 540 and above, version 5.1 and above, and to all Barracuda

More information

Workstation Configuration Guide

Workstation Configuration Guide Workstation Configuration Guide August 13, 2018 Version 9.6.134.78 For the most recent version of this document, visit our documentation website. Table of Contents 1 Workstation configuration 4 1.1 Considerations

More information

Senior Technical Specialist, IBM. Charles Price (Primary) Advisory Software Engineer, IBM. Matthias Falkenberg DX Development Team Lead, IBM

Senior Technical Specialist, IBM. Charles Price (Primary) Advisory Software Engineer, IBM. Matthias Falkenberg DX Development Team Lead, IBM Session ID: DDX-15 Session Title: Building Rich, OmniChannel Digital Experiences for Enterprise, Social and Storefront Commerce Data with Digital Data Connector Part 2: Social Rendering Instructors: Bryan

More information

IBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions

IBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions IBM Security Access Manager open mic webcast July 14, 2015 IBM Security Access Manager v8.x Kerberos Part 1 Desktop Single Sign-on Solutions Panelists Gianluca Gargaro L2 Support Engineer Darren Pond L2

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

Automated Sign-on for Mainframe Administrator Guide

Automated Sign-on for Mainframe Administrator Guide Automated Sign-on for Mainframe Administrator Guide 12.5.1 For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights, patent policy,

More information

FastPass Password Manager

FastPass Password Manager FastPass Password Manager Version 3.4.2 Document Title Document Classification Public Document Revision D Document Status Final Document Date April 23, 2012 The specifications and information in this document

More information

Laserfiche Rio 10.3: Deployment Guide. White Paper

Laserfiche Rio 10.3: Deployment Guide. White Paper Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6

More information

Equitrac Integrated for Océ

Equitrac Integrated for Océ Equitrac Integrated for Océ 1.2 Setup Guide 2014 Equitrac Integrated for Océ Setup Guide Document History Revision Date Revision List November 2, 2012 Updated for Equitrac Office/Express version 4.2.5

More information

WebSphere Application Server V7: Administration Consoles and Commands

WebSphere Application Server V7: Administration Consoles and Commands Chapter 5 of WebSphere Application Server V7 Administration and Configuration Guide, SG24-7615 WebSphere Application Server V7: Administration Consoles and Commands WebSphere application server properties

More information

Workstation Configuration

Workstation Configuration Workstation Configuration December 15, 2017 - Version 9.3 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

SOA Software Policy Manager Agent v6.1 for WebSphere Application Server Installation Guide

SOA Software Policy Manager Agent v6.1 for WebSphere Application Server Installation Guide SOA Software Policy Manager Agent v6.1 for WebSphere Application Server Installation Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software,

More information

TIBCO Spotfire Connecting to a Kerberized Data Source

TIBCO Spotfire Connecting to a Kerberized Data Source TIBCO Spotfire Connecting to a Kerberized Data Source Introduction Use Cases for Kerberized Data Sources in TIBCO Spotfire Connecting to a Kerberized Data Source from a TIBCO Spotfire Client Connecting

More information

Single Sign On (SSO) with Polarion 17.3

Single Sign On (SSO) with Polarion 17.3 SIEMENS Single Sign On (SSO) with Polarion 17.3 POL007 17.3 Contents Configuring single sign-on (SSO)......................................... 1-1 Overview...........................................................

More information

Widgets for SAP BusinessObjects Business Intelligence Platform User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2

Widgets for SAP BusinessObjects Business Intelligence Platform User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2 Widgets for SAP BusinessObjects Business Intelligence Platform User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2 Copyright 2013 SAP AG or an SAP affiliate company. All

More information

The following topics provide more information on user identity. Establishing User Identity Through Passive Authentication

The following topics provide more information on user identity. Establishing User Identity Through Passive Authentication You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user

More information

ROCK-POND REPORTING 2.1

ROCK-POND REPORTING 2.1 ROCK-POND REPORTING 2.1 Installation and Setup Guide Revised on 09/25/2014 TABLE OF CONTENTS ROCK-POND REPORTING 2.1... 1 SUPPORT FROM ROCK-POND SOLUTIONS... 2 ROCK-POND REPORTING OVERVIEW... 2 INFRASTRUCTURE

More information

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) You can find the most up-to-date technical documentation

More information

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8 Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Liferay Portal 4 - Portal Administration Guide. Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer

Liferay Portal 4 - Portal Administration Guide. Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer Liferay Portal 4 - Portal Administration Guide Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer Liferay Portal 4 - Portal Administration Guide Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer 1.1

More information

Workstation Configuration

Workstation Configuration Workstation Configuration December 12, 2017 - Version 9.4 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

SAP Single Sign-On 2.0 Overview Presentation

SAP Single Sign-On 2.0 Overview Presentation SAP Single Sign-On 2.0 Overview Presentation June 2014 Public Legal disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue

More information

Web-enable a 5250 application with the IBM WebFacing Tool

Web-enable a 5250 application with the IBM WebFacing Tool Web-enable a 5250 application with the IBM WebFacing Tool ii Web-enable a 5250 application with the IBM WebFacing Tool Contents Web-enable a 5250 application using the IBM WebFacing Tool......... 1 Introduction..............1

More information

Workstation Configuration

Workstation Configuration Workstation Configuration September 22, 2015 - Version 9 & 9.1 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 14 Create an Identity Rule, page 15 Manage a Realm, page 17 Manage an Identity

More information

PxM Proof of Concept Configuration. June 2018 Version 3.1

PxM Proof of Concept Configuration. June 2018 Version 3.1 PxM Proof of Concept Configuration June 2018 Version 3.1 Table of Contents PxM Architecture, Installation & Configuration... 3 PxM Proof of Concept (POC) Guide... 4 Introduction... 4 Prerequisites... 4

More information

SAP BusinessObjects Live Office User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2

SAP BusinessObjects Live Office User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2 SAP BusinessObjects Live Office User Guide SAP BusinessObjects Business Intelligence platform 4.1 Support Package 2 Copyright 2013 SAP AG or an SAP affiliate company. All rights reserved. No part of this

More information

Embedded for Xerox EPA-EIP Setup Guide

Embedded for Xerox EPA-EIP Setup Guide Embedded for Xerox EPA-EIP Setup Guide 2016 XRX-EPA-EIP-20160315 Equitrac Embedded for Xerox EPA-EIP Setup Guide Document History Date Description of Revision Changes March 15, 2016 Updated for Equitrac

More information

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER

DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER DEPLOYMENT GUIDE DEPLOYING F5 WITH ORACLE ACCESS MANAGER Table of Contents Table of Contents Introducing the F5 and Oracle Access Manager configuration Prerequisites and configuration notes... 1 Configuration

More information

Qualys SAML 2.0 Single Sign-On (SSO) Technical Brief

Qualys SAML 2.0 Single Sign-On (SSO) Technical Brief Qualys SAML 2.0 Single Sign-On (SSO) Technical Brief Qualys provides its customers the option to use SAML 2.0 Single SignOn (SSO) authentication with their Qualys subscription. When implemented, Qualys

More information

SharePoint 2010 Tutorial

SharePoint 2010 Tutorial SharePoint 2010 Tutorial TABLE OF CONTENTS Introduction... 1 Basic Navigation... 2 Navigation Buttons & Bars... 3 Ribbon... 4 Library Ribbon... 6 Recycle Bin... 7 Permission Levels & Groups... 8 Create

More information

citrix MetaFrame Password Manager2.0:Adminsitration

citrix MetaFrame Password Manager2.0:Adminsitration citrix MetaFrame Password Manager2.0:Adminsitration Number: 1Y0-972 Passing Score: 800 Time Limit: 120 min File Version: 62.24 http://www.gratisexam.com/ CITRIX 1Y0-972 EXAM QUESTIONS & ANSWERS Exam Name:

More information

Step-by-step installation guide for monitoring untrusted servers using Operations Manager

Step-by-step installation guide for monitoring untrusted servers using Operations Manager Step-by-step installation guide for monitoring untrusted servers using Operations Manager Most of the time through Operations Manager, you may require to monitor servers and clients that are located outside

More information

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources Workspace ONE UEM v9.6 Have documentation feedback? Submit a Documentation Feedback

More information

VMware Mirage Web Manager Guide

VMware Mirage Web Manager Guide Mirage 5.3 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this document,

More information