Technical White Paper. By Jay Tomlin NFuse Technical Support Team Citrix Systems, Inc.

Size: px
Start display at page:

Download "Technical White Paper. By Jay Tomlin NFuse Technical Support Team Citrix Systems, Inc."

Transcription

1 Security Guidelines for NFuse 1.0 Technical White Paper By Jay Tomlin NFuse Technical Support Team Citrix Systems, Inc.

2 Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS PROVIDED AS IS WITHOUT WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING ANY WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE OR NON- INFRINGEMENT. CITRIX SYSTEMS, INC. ( CITRIX ), SHALL NOT BE LIABLE FOR TECHNICAL OR EDITORIAL ERRORS OR OMISSIONS CONTAINED HEREIN, NOR FOR DIRECT, INCIDENTAL, CONSEQUENTIAL OR ANY OTHER DAMAGES RESULTING FROM THE FURNISHING, PERFORMANCE, OR USE OF THIS PUBLICATION, EVEN IF CITRIX HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES IN ADVANCE. This publication contains information protected by copyright. Except for internal distribution, no part of this publication may be photocopied or reproduced in any form without prior written consent from Citrix. The exclusive warranty for any Citrix products discussed in this publication, if any, is stated in the product documentation accompanying such products. Citrix does not warrant products other than its own. Product names mentioned herein may be trademarks and/or registered trademarks of their respective companies Citrix Systems, Inc. All rights reserved. Version History January 1, 2000 Firstname Lastname Version 1.0 Security Guidelines for NFuse 1.0 ii

3 TABLE OF CONTENTS SECURITY GUIDELINES FOR NFUSE INTRODUCTION...1 NFUSE ARCHITECTURE...1 ICA File Structure and Syntax...2 Example 1: Sample static ICA file...2 NFuse s template.ica file...3 SECURING NFUSE NETWORK TRAFFIC...5 BETWEEN THE CLIENT AND THE WEB SERVER...5 User credentials sent to the web server...5 NFuse Cookies...5 Webmasters can harvest user credentials...6 HTML and ICA files delivered to the client...6 BETWEEN THE WEB SERVER AND THE METAFRAME SERVER...7 Example 2: NFuse XML Protocol traffic...8 BETWEEN THE CLIENT AND THE METAFRAME SERVER...9 Integrating NFuse and Citrix SecureICA Services...9 " Secure Solution...10 " Unsecure Workaround...10 CONCLUSIONS AND RECOMMENDATIONS...11 Security Guidelines for NFuse 1.0 iii

4 Security Guidelines for NFuse 1.0 Introduction With the release of NFuse 1.0, Citrix Systems, Inc. makes it easier than ever to take your company s applications to the Internet. This flexibility brings with it a responsibility to ensure that your data remains secure and impervious to attacks. This document explores some of the security considerations surrounding Citrix NFuse 1.0. It is assumed that the reader is familiar with web server technologies, Citrix MetaFrame 1.8, and NFuse 1.0. NFuse Architecture Citrix NFuse 1.0 consists of a three-tier architecture in which a web browser, web server, and a Citrix MetaFrame 1.8 server work together to provide seamless user access to published applications. Users access an NFuse-driven web server, to enumerate their personal collection of applications, using a standard web browser such as Internet Explorer, or Netscape Navigator. Figure 1 illustrates the architecture of an NFuse-enabled MetaFrame server farm. Figure 1: NFuse Architecture Security Guidelines for NFuse 1.0 1

5 Application access is controlled from the MetaFrame server farm using Citrix Published Application Manager, the same tool used for publishing applications to existing Program Neighborhood clients. Currently, Program Neighborhood functionality is limited to Win32 and Java ICA clients; NFuse 1.0 can be thought of as a Web Program Neighborhood application portal that extends Program Neighborhood functionality to any client device. Access to applications published in Citrix Server Farm scope is controlled via Windows NT group membership. For example, the Citrix MetaFrame administrator may publish the User Manager application and allow only Domain Administrators to connect. If a user logs into Program Neighborhood or NFuse as a member of the Domain Administrators group, an icon for the User Manager published application will appear. Each Citrix server farm user may have a unique set of server-farm applications, referred to as the user s application set. Users receive the same application set whether they access the server farm using Program Neighborhood, or NFuse. If the Citrix MetaFrame administrator publishes a new application across the server farm, an icon for that application will appear automatically (or upon clicking the Refresh button) for all users with permission to access the new published application. ICA File Structure and Syntax To gain access to a MetaFrame published application, ICA web clients utilize small connection files that contain just enough information to connect to the least-busy server and launch the desired application. These ICA files use common INI-file syntax and can be manipulated directly with any text editor to alter the properties of the ICA connection. Example 1 illustrates a sample ICA file that could be used to connect a web client to the MS Excel published application. Example 1: Sample static ICA file [WFClient] Version=2.0 [Application Servers] MS Excel= [MS Excel] Address= InitialProgram=#MS Excel DesiredColor=2 TransportDriver=TCP/IP WinStationDriver=ICA 3.0 Username=johndoe Domain=CITRIX Password=00097d b1e07091f This file connects the user to the MetaFrame server with IP address , and launches the MS Excel published application. The user s credentials are also included in the ICA file, but the password is scrambled using a Citrix-proprietary algorithm. (To generate a scrambled password for inclusion in an ICA file, you can define a connection using any full ICA client and then find the value entered into your client s appsrv.ini file.) Security Guidelines for NFuse 1.0 2

6 Security tip: Inclusion of the user credentials in an ICA file is optional. If the credentials are missing or incorrect, the user will be prompted to enter the information during logon. Note Static ICA files do not require NFuse. The NFuse web server components generate ICA files dynamically, based on the current user and the selected application. NFuse s template.ica file The example below shows a sample template.ica file that an NFuse server could use to generate the static ICA file shown in Example 1. Sample NFuse template.ica [WFClient] Version=2 [ApplicationServers] [NFuse_AppName]= [[NFuse_AppName]] Address=[NFuse_IPv4Address] InitialProgram=#[NFuse_AppName] DesiredColor=[NFuse_WindowColors] TransportDriver=TCP/IP WinStationDriver=ICA 3.0 Username=[NFuse_User] Domain=[NFuse_Domain] Password=[NFuse_PasswordScrambled] All user-specific and application-specific information is generalized by use of [NFuse_variablename] substitution tags. By default, a single template.ica file is used to render static ICA files for all NFuse users. The template.ica file may be modified to increase security. For example, the [NFuse_PasswordScrambled] substitution tag could be deleted, forcing users to re-enter their password at the MetaFrame server. It is important to understand that the NFuse server performs TCP name resolution on behalf of the client for each published application. Without this new feature, the address line in the ICA file shown above would read Address=MS Excel, and the client would need to contact an ICA Master Browser on UDP port 1604 to resolve the name of the published application to the IP Security Guidelines for NFuse 1.0 3

7 address of the least-busy server hosting that application. With NFuse TCP name resolution, the need for UDP traffic between the ICA client and an ICA Master Browser has been eliminated. If your MetaFrame server lies behind a firewall or router performing Network Address Translation (NAT), you will need to modify the template.ica file so that application names are resolved to the server s external (alternate) address rather than the internal (private) address. To achieve this: 1. Issue the ALTADDR.EXE command at each of your MetaFrame servers, 2. Next, change the Address=[NFuse_IPv4Address] line in template.ica to Address=[NFuse_IPv4AddressAlternate]. Note When there are multiple MetaFrame servers behind a NAT firewall, each MetaFrame server must have its own unique external IP address in order for load-balancing to function properly. For a complete reference of possible ICA file entries and NFuse substitution tags, consult the NFuse Administrator s Guide. Security Guidelines for NFuse 1.0 4

8 Securing NFuse Network Traffic As illustrated in Figure 1, NFuse network traffic traverses a total of three network paths: Between the client web browser and the NFuse web server; Between the NFuse web server and the NFuse MetaFrame server; and Between the client and the MetaFrame Server farm. Each of these three paths will be discussed in this section. Note The information presented here is based on the default configurations one would receive when using the NFuse Web Site Wizard to generate an NFuse-driven website. Given a sufficient comfort level with Active Server Pages or Java Server Pages, webmasters are free to modify the default behavior of NFuse to meet the needs of their environment. Between the client and the web server NFuse relies on standard web protocols to exchange information between the client s web browser and the NFuse-enabled web server. This communication can be either standard HyperText Transfer Protocol (HTTP, TCP port 80 by default), or HTTP encrypted with Secure Sockets Layer (SSL, TCP port 443 by default). User credentials sent to the web server If the user is logging into an NFuse website with an explicit username and password (i.e., not a guest login), then the browser must send this information across the network. If standard HTTP (without SSL) is used to host the NFuse login page, then the user credentials will traverse the network in plain text. The login form works like any other HTML form on an Internet website; just as you should be wary of sending your credit card information to an unsecured web site to purchase a book, you should avoid hosting the NFuse login page on an unsecured web site. If the NFuse website was configured to allow guest logins only, no user credentials are required of the client and none are sent to the web server during the initial NFuse request to enumerate the application set. NFuse Cookies By default, NFuse uses a transient client-side cookie to remember the user s credentials. Upon receiving the credentials from the initial login form, the web server returns the credentials back to the client in the form of a transient cookie. As the user browses the NFuse website, this cookie is retransmitted with each HTTP GET request, allowing the user to browse their application set and launch applications without the need to re-enter their credentials. Since the cookie is flagged as transient, it is not saved to the client hard drive and is lost upon closing the browser. For NFuse 1.0, this cookie contains the current username, domain and password in clear text, and is used to initiate a ClearTextCredentials NFuse object on the web server. To encrypt the user credentials between the client s web browser and your NFuse web server, including the cookie mentioned above, SSL should be used. Security Guidelines for NFuse 1.0 5

9 Establishing an SSL-secured website requires an SSL-enabled web server and a digital certificate that can be obtained for Internet use from third-party companies like VeriSign, or created for internal use by Microsoft Certificate Server (when using IIS). SSL-secured web sites are easily identified on the browser by the presence of a padlock icon at the bottom of the browser window when using Microsoft Internet Explorer or Netscape Navigator. The clear-text credentials cookie present in the NFuse wizard-generated examples is optional. Other methods could be used to remember a user s credentials, such as ASP Session variables. Webmasters can harvest user credentials Since the user credentials are posted with HTTP as variables from a standard HTML form, their unencrypted contents are available to the webmaster and could be harvested, even if SSL is used between the web server and web browser. Just as an e- commerce webmaster should be audited to ensure that customer credit card information is not harvested, MetaFrame administrators and NFuse webmasters should work together to ensure that the NFuse webmaster does not abuse this possibility. HTML and ICA files delivered to the client Other data sent across the channel between the web client and web server includes the HTML page containing the user s application set or HTML-embedded application. In the latter case, the web server will deliver a rendered ICA file containing the user credentials in ICA file format (as shown in Example 1). While this information does not reveal the user s password explicitly, an attacker could save this ICA file to disk and execute it with an ICA client to gain access to the MetaFrame server farm. As with client-to-server traffic, SSL is the best way to secure your server-to-client traffic. It is not strictly necessary to return the user s credentials in the ICA file generated for each application. For example, if the [NFuse_PasswordScrambled] tag were removed from template.ica, users would be prompted by the MetaFrame server for their password. Security Guidelines for NFuse 1.0 6

10 Between the Web Server and the MetaFrame Server In order to enumerate the application set for the current user, the NFuse web server must forward the user credentials to a MetaFrame server running the NFuse MetaFrame component, or Citrix NFuse Service. The web server and MetaFrame server communicate using the NFuse XML Protocol. In NFuse 1.0, the network data stream between the Web server and the MetaFrame server is clear-text XML, but the password is scrambled with a Citrix-proprietary algorithm (not the same algorithm used for ICA files). This server-to-server link can be protected by use of a Virtual Private Netowrk (VPN) or by establishing a private subnet for server-to-server traffic. Note In smaller environments, it may be desirable to configure a single MetaFrame server that acts as both the NFuse Web server and the NFuse MetaFrame server. While this configuration may not be suitable in larger networks, it does eliminate the NFuse XML protocol traffic from the network entirely. When configuring the NFuse web server component in this situation, enter (the loopback address) as the address of the Citrix MetaFrame server. When installing the NFuse MetaFrame service, be sure to use a port other than the default port 80 since port 80 will be in use by your web server service. To illustrate the NFuse XML protocol, an excerpt of a network trace of Web server-to-metaframe traffic when a user logs into NFuse is shown below. The trace reveals the username that was entered into the logon HTML page. For this example, the following credentials were used: Username: johndoe Domain: CITRIX Password: saturn99 The authentication packet sent from the Web server to the MetaFrame server would contain the text shown in Example 2. Security Guidelines for NFuse 1.0 7

11 Example 2: NFuse XML Protocol traffic POST /scripts/wpnbr.dll HTTP/1.1 Content-Type: text/xml Host: iis4.citrix.com Content-Length: 554 <?xml version="1.0" encoding="iso "?> <!DOCTYPE NFuseProtocol SYSTEM "NFuse.dtd"> <NFuseProtocol version="1"> <RequestAppData> <Scope.traverse="onelevel"></Scope> <DesiredDetails>defaults</DesiredDetails> <ServerType>win32</ServerType> <ClientType>ica30</ClientType> <Credentials> <UserName>johndoe</UserName> <Password encoding="ctx1">mgalmpbinbblmkblnl</password> <Domain type="nt">citrix</domain> </Credentials> </RequestAppData> </NFuseProtocol> As you can see, the password is not transmitted in clear text, nor is it scrambled with the same algorithm used for ICA files. The password "saturn99" was scrambled as "00097d b1e07091f" in the ICA file shown in Example 1, but scrambled as MGALMPBINBBLMKBLNL within the XML protocol traffic. By intercepting the Web server-to-metaframe server traffic, an attacker may be able to forge a packet that allows him to enumerate the application set for a particular user, but he will not be able to log into any applications using that information. Without access to the cookie containing the user s plain-text credentials, this XML information is not enough to allow an attacker to forge an ICA file that logs into the MetaFrame server farm. Security Guidelines for NFuse 1.0 8

12 Between the client and the MetaFrame server Once the NFuse web server has generated a dynamic ICA file for the user and delivered it to the client web browser, the client uses the ICA file to make an independent TCP/IP connection into the MetaFrame server farm. Technically, this step does not involve NFuse; ICA files can be used to establish client connections without the help of NFuse or even of a web server. If the user credentials are included within the ICA file, the user is authenticated to the MetaFrame server without having to retype their username and password. Currently, the contents of the ICA file are sent in plain text from the client to the server s ICA port (TCP 1494 by default; MetaFrame administrators can change this port assignment using the icaport.exe command-line utility at the MetaFrame server.) Once the ICA session is established, all ICA commands are scrambled using a Basic scrambling algorithm. For higher levels of encryption, SecureICA Services can be used to encrypt the ICA data stream using RC5 key lengths of up to 128 bits. Integrating SecureICA Services with NFuse requires additional configuration described below. Integrating NFuse and Citrix SecureICA Services Citrix SecureICA Services can encrypt ICA session traffic between the ICA client and a WinFrame or MetaFrame server using RC5 key lengths of up to 128 bits. During authentication, the Diffie-Hellman key agreement algorithm is used to generate a pair of symmetric RC5 keys that encrypt the ICA data stream; one key is used to encrypt client-to-server traffic, and a second key is used to encrypt server-to-client traffic. Using SecureICA Services requires a modified ICA client. At the time of this writing, SecureICA clients are available for the following platforms only: Win32 Win16 DOS ActiveX web client Netscape plugin Since the ICA file must be sent to the MetaFrame server before the encrypted ICA session is established, it is not currently possible to encrypt the contents of the ICA file. As a security precaution, SecureICA-enabled MetaFrame servers do not accept ICA file connections that include user credentials. By default, NFuse will supply the user s credentials in the ICA file that is dynamically generated for them. In this case, SecureICA clients receive the following error message when they attempt to connect to a SecureICA published application via NFuse: "Cannot load the Citrix ICA Client drivers. [Error 1079: This connection entry uses RC5 encryption. For enhanced security, please do not specify a User name and Password in the connection properties or on the command line.]" For SecureICA clients to connect successfully, this feature must either be removed from the NFuse Web site, or disabled by use of the "AutoLogonAllowed" tag described below. It should be stressed that using the AutoLogonAllowed tag is an insecure workaround. Security Guidelines for NFuse 1.0 9

13 " Secure Solution To remove the username and password from NFuse-generated ICA files, locate the following lines in the template.ica file on your NFuse web server: Username=[NFuse_User] Domain=[NFuse_Domain] Password=[NFuse_PasswordScrambled] Delete the NFuse substitution tags [NFuse_User] and [NFuse_PasswordScrambled], leaving the following in template.ica: Username= Domain=[CitrixPN_Domain] Password= Users can now connect using SecureICA but must re-enter their username and password during MetaFrame log on. " Unsecure Workaround For a more seamless user experience, it is possible to automate username and password entry when using SecureICA Services by adding the following line to the Template.ica file: AutoLogonAllowed=On This line should be added to the [[NFuse_AppName]] section of template.ica, just after the Username, Domain and Password lines. When this line is added, the SecureICA MetaFrame server overrides its default security precaution and accepts the user credentials in the ICA file; the user is not prompted to re-enter their username and password. However, this poses a security risk because the authentication information contained in the ICA file is not encrypted en route to the Citrix server. If an attacker were to intercept the contents of the ICA file, they would be able to establish a SecureICA connection into the MetaFrame server using those credentials. For this reason, the current recommendation is to remove the [NFuse_User] and [NFuse_PasswordScrambled] tags from the template.ica file. Note Changes made to the template.ica file affect all users of the current NFuse Web directory. For more information about SecureICA Services, see the online documentation at Security Guidelines for NFuse

14 Conclusions and Recommendations As with any other Internet technology, evaluate Citrix NFuse 1.0 from a security aspect before it s put into production. Consider SSL between the web server and web clients a requirement if you plan to use NFuse 1.0 to enable access to your applications from the Internet. The same security technologies and precautions that accompany e-commerce websites should be implemented for NFuse websites. Traffic between the NFuse server and a MetaFrame server has less potential for harm. As mentioned in the Between the Web- Server and the MetaFrame server section, the worst-case scenario should this traffic be intercepted is that an attacker would be able to enumerate the application set for a user. Occasional peer review of the NFuse web pages is recommended to ensure that the webmaster is not harvesting user credentials as mentioned in the Webmasters can harvest user credentials section. When integrating SecureICA Services with NFuse 1.0, remove the username and password from the template.ica file. Security Guidelines for NFuse

15 6400 NW 6 th Way Fort Lauderdale, FL Copyright 2000 Citrix Systems, Inc. All rights reserved. Citrix, WinFrame and ICA are registered trademarks, and MultiWin and MetaFrame are trademarks of Citrix Systems, Inc. All other products and services are trademarks or service marks of their respective companies. Technical specifications and availability are subject to change without prior notice.

By Anthony di Donato. Citrix Systems, Inc.

By Anthony di Donato. Citrix Systems, Inc. How to install NFuse Components and Web Extensions on the same Server? By Anthony di Donato Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION

More information

By Jorge Gomez. Citrix Consulting Services. Citrix Systems, Inc.

By Jorge Gomez. Citrix Consulting Services. Citrix Systems, Inc. PeopleSoft 8 Network Bandwidth Consumption By Jorge Gomez Citrix Systems, Inc. Disclaimer The objective of this white paper is to compare consumption of bandwidth between different PeopleSoft 8 deployment

More information

Getting Started. Citrix Secure Gateway. Version 1.0. Citrix Systems, Inc.

Getting Started. Citrix Secure Gateway. Version 1.0. Citrix Systems, Inc. Getting Started Citrix Secure Gateway Version 1.0 Citrix Systems, Inc. Copyright and Trademark Notice Information in this document is subject to change without notice. Companies, names, and data used in

More information

Administrator s Guide. Citrix XML Service For Citrix MetaFrame for UNIX Operating Systems Solaris Intel /Solaris SPARC versions Citrix Systems, Inc.

Administrator s Guide. Citrix XML Service For Citrix MetaFrame for UNIX Operating Systems Solaris Intel /Solaris SPARC versions Citrix Systems, Inc. Administrator s Guide Citrix XML Service For Citrix MetaFrame for UNIX Operating Systems Solaris Intel /Solaris SPARC versions Citrix Systems, Inc. Information in this document is subject to change without

More information

Virtual Recovery Assistant user s guide

Virtual Recovery Assistant user s guide Virtual Recovery Assistant user s guide Part number: T2558-96323 Second edition: March 2009 Copyright 2009 Hewlett-Packard Development Company, L.P. Hewlett-Packard Company makes no warranty of any kind

More information

Setting Up an Environment for Testing Applications in a Federated Portal Network

Setting Up an Environment for Testing Applications in a Federated Portal Network SAP NetWeaver How-To Guide Setting Up an Environment for Testing Applications in a Federated Portal Network Applicable Releases: SAP NetWeaver 7.0 IT Practice: User Productivity Enablement IT Scenario:

More information

By Citrix Consulting Services. Citrix Systems, Inc.

By Citrix Consulting Services. Citrix Systems, Inc. Citrix ICA Priority Packet Tagging By Citrix Consulting Services Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS PROVIDED AS IS

More information

Citrix Systems, Inc. October 2001

Citrix Systems, Inc. October 2001 Citrix Systems, Inc. October 2001 Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS PROVIDED AS IS WITHOUT WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED,

More information

Deploying Citrix MetaFrame with the FirePass Controller

Deploying Citrix MetaFrame with the FirePass Controller Deployment Guide Deploying Citrix Presentation Server (MetaFrame) with the FirePass Controller Deploying Citrix MetaFrame with the FirePass Controller Welcome to the F5 FirePass controller Deployment Guide

More information

NCD ThinPATH PC Installation Guide and Release Notes

NCD ThinPATH PC Installation Guide and Release Notes NCD ThinPATH PC Installation Guide and Release s Copyright Copyright 2001 by Network Computing Devices, Inc. (NCD).The information contained in this document is subject to change without notice. Network

More information

How To Troubleshoot SSL with BPC Version 1.01 May 2009

How To Troubleshoot SSL with BPC Version 1.01 May 2009 How-to Guide SAP CPM How To Troubleshoot SSL with BPC Version 1.01 May 2009 Applicable Releases: SAP BPC 7 Microsoft Copyright 2007 SAP AG. All rights reserved. No part of this publication may be reproduced

More information

Citrix Consulting Services Citrix Systems, Inc.

Citrix Consulting Services Citrix Systems, Inc. Migrating from MetaFrame 1.8 to MetaFrame XP By Citrix Consulting Services Citrix Systems, Inc. Notice The information in this publication is subject to change without notice. THIS PUBLICATION IS PROVIDED

More information

BusinessObjects Enterprise XI 3.0 with Complex NAT Networks

BusinessObjects Enterprise XI 3.0 with Complex NAT Networks BusinessObjects Enterprise XI 3.0 with Complex NAT Networks Applies to: BusinessObjects Enterprise XI 3.0 Summary The BusinessObjects Enterprise Administrator s Guide (XI 3.1) provides the basic concept

More information

Simplified Configuration of Single System Update in Maintenance Optimizer

Simplified Configuration of Single System Update in Maintenance Optimizer SAP Solution Manager How-To Guide Simplified Configuration of Single System Update in Maintenance Optimizer Applicable Releases: SAP Solution Manager 7.0 Enhancement Package 1 SP23 or higher SAP Solution

More information

SDN Contribution HOW TO CONFIGURE XMII BUILD 63 AND IIS 6.0 FOR HTTPS

SDN Contribution HOW TO CONFIGURE XMII BUILD 63 AND IIS 6.0 FOR HTTPS SDN Contribution HOW TO CONFIGURE XMII 11.5.1 BUILD 63 AND IIS 6.0 FOR HTTPS Applies to: Configuring SAP xapp Manufacturing Integration and Intelligence (SAP xmii 11.5.1 build 63) and IIS 6.0 for https.

More information

Best Practices Using KMC Capabilities in an External Facing Portal Version 1.00 October 2006

Best Practices Using KMC Capabilities in an External Facing Portal Version 1.00 October 2006 Best Practices SAP NetWeaver 2004/2004s Best Practices Using KMC Capabilities in an External Facing Portal Version 1.00 October 2006 Applicable Releases: SAP NetWeaver 2004 and 2004s (Usage Type Enterprise

More information

Getting Started. Citrix Load Manager. Version 1.0. Citrix Systems, Inc.

Getting Started. Citrix Load Manager. Version 1.0. Citrix Systems, Inc. Getting Started Citrix Load Manager Version 1.0 Citrix Systems, Inc. Information in this document is subject to change without notice. Companies, names, and data used in examples herein are fictitious

More information

How to Upgr a d e We b Dynpro Them e s from SP S 9 to SP S 1 0

How to Upgr a d e We b Dynpro Them e s from SP S 9 to SP S 1 0 How- to Guide SAP NetW e a v e r 0 4 How to Upgr a d e We b Dynpro Them e s from SP S 9 to SP S 1 0 Ver si o n 1. 0 0 Dec e m b e r 2 0 0 4 Applic a b l e Rele a s e s : SAP NetW e a v e r 0 4 SP Sta c

More information

Access Control 5.3 Implementation Considerations for Superuser Privilege Management ID-Based Firefighting versus Role-Based Firefighting Applies to:

Access Control 5.3 Implementation Considerations for Superuser Privilege Management ID-Based Firefighting versus Role-Based Firefighting Applies to: Access Control 5.3 Implementation Considerations for Superuser Privilege Management ID-Based Firefighting versus Role-Based Firefighting Applies to: Access Control 5.3 Summary GRC Access Control identifies

More information

How To Recover Login Module Stack when login to NWA or Visual Administrator is impossible

How To Recover Login Module Stack when login to NWA or Visual Administrator is impossible SAP NetWeaver How-To Guide How To Recover Login Module Stack when login to NWA or Visual Administrator is impossible Applicable Releases: SAP NetWeaver 7.0 SAP NetWeaver CE 7.1 Topic Area: Security & Identity

More information

Setting up Single Sign On Between xmii and Enterprise Portal

Setting up Single Sign On Between xmii and Enterprise Portal Summary This paper outlines the process of configuring Signal Sign On between SAP xmii 11.5 and Enterprise Portal running on the Java Stack. This document explains a basic example that may not apply to

More information

How To Generate XSD Schemas from Existing MDM Repositories

How To Generate XSD Schemas from Existing MDM Repositories SAP NetWeaver How-To Guide How To Generate XSD Schemas from Existing MDM Repositories Applicable Releases: SAP NetWeaver MDM 7.1 Topic Area: Information Management Capability: Master Data Management Version

More information

configure an anonymous access to KM

configure an anonymous access to KM How-to Guide SAP NetWeaver 2004s How To configure an anonymous access to KM Version 1.00 February 2006 Applicable Releases: SAP NetWeaver 2004s Copyright 2006 SAP AG. All rights reserved. No part of this

More information

Introducing SAP Enterprise Services Explorer for Microsoft.NET

Introducing SAP Enterprise Services Explorer for Microsoft.NET Introducing SAP Enterprise Services Explorer for Microsoft.NET Applies to: SAP SOA, SAP NetWeaver Composition Environment 7.1 including enhancement package 1, SAP Services Registry, SAP - Microsoft interoperability,

More information

DEPLOYMENT GUIDE Amazon EC2 Security Groups. Deployment Guide. Security Groups Amazon EC2.

DEPLOYMENT GUIDE Amazon EC2 Security Groups. Deployment Guide. Security Groups Amazon EC2. Deployment Guide Security Groups Amazon EC2 www.citrix.com Table of Contents Introduction...3 Solution Requirements...4 Prerequisites...4 Additional Information...4 Network Diagram...5 IP Addresses...6

More information

link SAP BPC Excel from an enterprise portal Version th of March 2009

link SAP BPC Excel from an enterprise portal Version th of March 2009 How-to Guide SAP CPM How To link SAP BPC Excel from an enterprise portal Version 1.00 12 th of March 2009 Applicable Releases: SAP BPC 7.0 M, 7.0 NW Copyright 2007 SAP AG. All rights reserved. No part

More information

How to Translate a Visual Composer Model Part I

How to Translate a Visual Composer Model Part I How to Translate a Visual Composer Model Part I Applies to: SAP NetWeaver Visual Composer. Summary This How To guide is the first part in a series of guides which explain how to create and maintain translations

More information

Citrix Web Interface for Microsoft SharePoint Administrator s Guide. Citrix Access Suite 4.2

Citrix Web Interface for Microsoft SharePoint Administrator s Guide. Citrix Access Suite 4.2 Citrix Web Interface for Microsoft SharePoint Administrator s Guide Citrix Web Interface for Microsoft SharePoint Citrix Access Suite 4.2 Use of the product documented in this guide is subject to your

More information

SAP NetWeaver How-To Guide

SAP NetWeaver How-To Guide SAP NetWeaver How-To Guide Search and Adapt SAP Best Practice content from Business Process Repository (BPR) Applicable Releases: Business Process Blueprinting 1.0 for SAP Solution Manager 7.1 IT Practice

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module Load Balancing Configuration Guide Part number: 5998-4218 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Printing Enhancements to Citrix Presentation Server 4.0

Printing Enhancements to Citrix Presentation Server 4.0 Printing Enhancements to Citrix Presentation Server 4.0 Overview of Feature Citrix Presentation Server 4.0 includes three new major printing enhancements: Revamped printing engine Universal printer driver

More information

Dell One Identity Cloud Access Manager 8.0. Overview

Dell One Identity Cloud Access Manager 8.0. Overview Dell One Identity Cloud Access Manager 8.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under

More information

Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios

Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios Payment Card Industry and Citrix XenApp and XenDesktop Deployment Scenarios Overview Citrix XenApp, XenDesktop and NetScaler are commonly used in the creation of Payment Card Industry (PCI), Data Security

More information

Sophos Firewall Configuring SSL VPN for Remote Access

Sophos Firewall Configuring SSL VPN for Remote Access Sophos Firewall Configuring SSL VPN for Remote Access Product Version: 1 Document date: October 2014 Contents 1 Introduction 3 2 Configuring Sophos Firewall 4 2.1 Defining a User Account 4 2.2 Configuring

More information

Password Reset PRO INSTALLATION GUIDE

Password Reset PRO INSTALLATION GUIDE Password Reset PRO INSTALLATION GUIDE This guide covers the new features and settings available in Password Reset PRO. Please read this guide completely to ensure a trouble-free installation. January 2009

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

Wave 5.0. Wave OpenVPN Server Guide for Wave 5.0

Wave 5.0. Wave OpenVPN Server Guide for Wave 5.0 Wave 5.0 Wave OpenVPN Server Guide for Wave 5.0 2015 by Vertical Communications, Inc. All rights reserved. Vertical Communications and the Vertical Communications logo and combinations thereof and Vertical

More information

MDM Syndicator Create Flat Syndication File

MDM Syndicator Create Flat Syndication File MDM Syndicator Create Flat Syndication File Applies to: SAP NetWeaver Master Data Management (MDM) SP3, SP4, SP5. Summary This article provides a step-by-step procedure in manually syndicate the data to

More information

Partner Information. Integration Overview Authentication Methods Supported

Partner Information. Integration Overview Authentication Methods Supported Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration F5 Networks FirePass VPN User Name - Security Code User Name - Password - Security

More information

Cloud Access Manager Overview

Cloud Access Manager Overview Cloud Access Manager 8.1.3 Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

CITRIX 1Y0-722 EXAM QUESTIONS & ANSWERS

CITRIX 1Y0-722 EXAM QUESTIONS & ANSWERS CITRIX 1Y0-722 EXAM QUESTIONS & ANSWERS Number: 1Y0-722 Passing Score: 700 Time Limit: 75 min File Version: 32.0 http://www.gratisexam.com/ CITRIX 1Y0-722 EXAM QUESTIONS & ANSWERS Exam Name: MetaFrame

More information

Intel Small Business Extended Access. Deployment Guide

Intel Small Business Extended Access. Deployment Guide Intel Small Business Extended Access Deployment Legal Notices and Disclaimers Disclaimers INTEL CORPORATION MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE

More information

How To Set up NWDI for Creating Handheld Applications in SAP NetWeaver Mobile 7.1

How To Set up NWDI for Creating Handheld Applications in SAP NetWeaver Mobile 7.1 SAP NetWeaver How-To Guide How To Set up NWDI for Creating Handheld Applications in SAP NetWeaver Mobile 7.1 Applicable Releases: SAP NetWeaver Mobile 7.1 Topic Area: User Productivity Capability: Mobile

More information

Enterprise Portal Logon Page Branding

Enterprise Portal Logon Page Branding Enterprise Portal Logon Page Branding Applies to: This document applies to Enterprise Portal 6.0 based on NW04 and 2004s platforms. Summary This document describes a procedure that uses the NetWeaver Development

More information

How to View Dashboards in the Self Service Composition Environment with Additional Metadata

How to View Dashboards in the Self Service Composition Environment with Additional Metadata SAP MII Add Metadata to Dashboards in Service Composition Environment How-To-Guide How to View Dashboards in the Self Service Composition Environment with Additional Metadata Applicable Release: MII 15.0

More information

Work with Variables in SAP NetWeaver Visual Composer Version 1.00 May 2006

Work with Variables in SAP NetWeaver Visual Composer Version 1.00 May 2006 How-to Guide SAP NetWeaver 04s How To Work with Variables in SAP NetWeaver Visual Composer Version 1.00 May 2006 Applicable Releases: SAP NetWeaver 04s SPS07 or greater Copyright 2006 SAP AG. All rights

More information

SAP NetWeaver How-To Guide

SAP NetWeaver How-To Guide SAP NetWeaver How-To Guide Integrate your Business Blueprint with SAP Netweaver BPM Applicable Releases: Business Process Blueprinting 1.0 for SAP Solution Manager 7.1 IT Practice / Topic Area: Blueprinting

More information

Building a Composite Business Process from Scratch with SAP NetWeaver BPM Guide 2

Building a Composite Business Process from Scratch with SAP NetWeaver BPM Guide 2 Building a Composite Business Process from Scratch with SAP NetWeaver BPM Guide 2 Applies to: SAP enhancement package 1 for SAP NetWeaver Composition Environment 7.1 Summary This guide explains how to

More information

SOA Security Scenarios: WebAS Java, Message Level Security with no Transport Guarantee

SOA Security Scenarios: WebAS Java, Message Level Security with no Transport Guarantee SAP NetWeaver How-To Guide SOA Security Scenarios: WebAS Java, Message Level Security with no Transport Guarantee Applicable Releases: SAP NetWeaver 7.0 EhP1 SAP NetWeaver CE 7.1 and 7.1 EhP1 Topic Area:

More information

How To... Reuse Business Objects and Override Operations of a Business Object

How To... Reuse Business Objects and Override Operations of a Business Object SAP NetWeaver How-To Guide How To... Reuse Business Objects and Override Operations of a Business Object Applicable Releases: SAP NetWeaver Composition Environment 7.1 Topic Area: Development and Composition

More information

Install TREX for CAF Version 1.00 March 2006

Install TREX for CAF Version 1.00 March 2006 How-to Guide SAP NetWeaver 04s How To Install TREX for CAF Version 1.00 March 2006 Applicable Releases: SAP NetWeaver 04s Copyright 2006 SAP AG. All rights reserved. No part of this publication may be

More information

Configure SSO in an SAP NetWeaver 2004s Dual Stack

Configure SSO in an SAP NetWeaver 2004s Dual Stack How-to Guide SAP xrpm 4.0 How To Configure SSO in an SAP NetWeaver 2004s Dual Stack Version 1.00 December 2005 Applicable Releases: SAP xrpm 4.0 Copyright 2004 SAP AG. All rights reserved. No part of this

More information

Cache Settings in Web Page Composer

Cache Settings in Web Page Composer Cache Settings in Web Page Composer Applies to: EP 7.0, SAP NetWeaver Knowledge Management SPS14. For more information, visit the Content Management homepage. Summary This paper explains what cache settings

More information

xmii UDS Overview and Troubleshooting

xmii UDS Overview and Troubleshooting xmii UDS Overview and Troubleshooting Applies to: SAP xmii Universal Data Servers (UDS) version 4.0 and higher. Summary This article describes the SAP xmii UDS line of products and methods for debugging

More information

HYCU SCOM Management Pack for F5 BIG-IP

HYCU SCOM Management Pack for F5 BIG-IP USER GUIDE HYCU SCOM Management Pack for F5 BIG-IP Product version: 5.5 Product release date: August 2018 Document edition: First Legal notices Copyright notice 2015-2018 HYCU. All rights reserved. This

More information

Extracting Product Attributes in XML using Web Service

Extracting Product Attributes in XML using Web Service Extracting Product Attributes in XML using Web Service Applies to: SAP for Banking. For more information, visit the Web Services homepage. Summary The purpose of this document is to describe in detail

More information

Deployment Guide. ICA Proxy for Citrix Receiver with SMS Authentication. Access Gateway Enterprise Edition XenApp XenDesktop

Deployment Guide. ICA Proxy for Citrix Receiver with SMS Authentication. Access Gateway Enterprise Edition XenApp XenDesktop Mobile Device Deployment Guide ICA Proxy for Citrix Receiver with SMS Authentication Access Gateway Enterprise Edition XenApp XenDesktop www.citrix.com Table of Contents Introduction...3 Solution Requirements...4

More information

BIG-IP Access Policy Manager : Portal Access. Version 12.1

BIG-IP Access Policy Manager : Portal Access. Version 12.1 BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7

More information

How-To... Add Sensitive Content into an Area

How-To... Add Sensitive Content into an Area SAP NetWeaver How-To Guide How-To... Add Sensitive Content into an Area For Web Page Composer in SAP NetWeaver Portal 7.3 Applicable Releases: SAP NetWeaver 7.3 Version 1.0 Jun 2011 Some components of

More information

How To Set Up and Use the SAP ME Work Instructions Feature

How To Set Up and Use the SAP ME Work Instructions Feature SAP Manufacturing Execution How-To Guide How To Set Up and Use the SAP ME Work Instructions Feature Applicable Release: ME 6.1 Version 2.3 August 27, 2013 Copyright 2013 SAP AG. All rights reserved. No

More information

Connect to Wireless, certificate install and setup Citrix Receiver

Connect to Wireless, certificate install and setup Citrix Receiver Connect to Wireless, certificate install and setup Citrix Receiver This document explains how to connect to the Wireless Network and access applications using Citrix Receiver on a Bring Your Own Device

More information

Silver Peak EC-V and Microsoft Azure Deployment Guide

Silver Peak EC-V and Microsoft Azure Deployment Guide Silver Peak EC-V and Microsoft Azure Deployment Guide How to deploy an EC-V in Microsoft Azure 201422-001 Rev. A September 2018 2 Table of Contents Table of Contents 3 Copyright and Trademarks 5 Support

More information

Authentication of a WS Client Using a SAP Logon Ticket

Authentication of a WS Client Using a SAP Logon Ticket Authentication of a WS Client Using a SAP Logon Ticket Release 650 HELP.BCWEBSERVICES_TUTORIALS SAP Online Help 04.04.2005 Copyright Copyright 2004 SAP AG. All rights reserved. No part of this publication

More information

SAP NetWeaver 04. Unification Terminology

SAP NetWeaver 04. Unification Terminology SAP NetWeaver 04 Unification Terminology Version 1.00 March 2005 Copyright 2005 SAP AG. All rights reserved. No part of this publication may be reproduced or transmitted in any form or for any purpose

More information

ADM800 AS Java 7.3 Administration

ADM800 AS Java 7.3 Administration AS Java 7.3 Administration SAP NetWeaver Course Version: 99 Course Duration: 5 Day(s) Publication Date: 07-05-2013 Publication Time: 1141 Copyright Copyright SAP AG. All rights reserved. No part of this

More information

How to Set Up and Use the SAP OEE Custom UI Feature

How to Set Up and Use the SAP OEE Custom UI Feature SAP Overall Equipment Effectiveness Management How-To Guide How to Set Up and Use the SAP OEE Custom UI Feature Applicable Release: OEE 1.0 SP01 Version 1.0 August 8, 2013 Copyright 2013 SAP AG. All rights

More information

Partner Information. Integration Overview. Remote Access Integration Architecture

Partner Information. Integration Overview. Remote Access Integration Architecture Partner Information Partner Name Product Name Integration Overview Authentication Methods Supported Client Integration OTP Barracuda Networks Barracuda SSL VPN User Name + Security Code VIP Enterprise

More information

NetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi

NetScaler Analysis and Reporting. Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi NetScaler Analysis and Reporting Goliath for NetScaler Installation Guide v4.0 For Deployment on VMware ESX/ESXi (v4.0) Document Date: October 2016 www.goliathtechnologies.com 1 Legal Notices Goliath for

More information

HYCU SCOM Management Pack for F5 BIG-IP

HYCU SCOM Management Pack for F5 BIG-IP USER GUIDE HYCU SCOM Management Pack for F5 BIG-IP Product version: 5.6 Product release date: November 2018 Document edition: First Legal notices Copyright notice 2015-2018 HYCU. All rights reserved. This

More information

Security Information for SAP Asset Strategy and Performance Management

Security Information for SAP Asset Strategy and Performance Management Master Guide SAP Asset Strategy and Performance Management Document Version: 1.0 2017-11-30 Security Information for SAP Asset Strategy and Performance Management Typographic Conventions Type Style Example

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

Oracle Utilities Opower Solution Extension Partner SSO

Oracle Utilities Opower Solution Extension Partner SSO Oracle Utilities Opower Solution Extension Partner SSO Integration Guide E84763-01 Last Updated: Friday, January 05, 2018 Oracle Utilities Opower Solution Extension Partner SSO Integration Guide Copyright

More information

One Identity Manager Administration Guide for Connecting to SharePoint Online

One Identity Manager Administration Guide for Connecting to SharePoint Online One Identity Manager 8.0.1 Administration Guide for Connecting to Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

How To Customize the SAP User Interface Using Theme Editor

How To Customize the SAP User Interface Using Theme Editor SAP NetWeaver How-To Guide How To Customize the SAP User Interface Using Theme Editor Applicable Releases: SAP NetWeaver 7.0 and 7.11 Version 1.0 June 2010 Copyright 2010 SAP AG. All rights reserved. No

More information

How To... Configure Drill Through Functionality

How To... Configure Drill Through Functionality SAP BOBJ Planning & Consolidation (BPC), version for Netweaver How-To Guide How To... Configure Drill Through Functionality Applicable Releases: SAP BusinessObjects Planning and Consolidation 7.5, version

More information

How To...Use a Debugging Script to Easily Create a Test Environment for a SQL-Script Planning Function in PAK

How To...Use a Debugging Script to Easily Create a Test Environment for a SQL-Script Planning Function in PAK SAP NetWeaver SAP How-To NetWeaver Guide How-To Guide How To...Use a Debugging Script to Easily Create a Test Environment for a SQL-Script Planning Function in PAK Applicable Releases: SAP NetWeaver BW

More information

Scan Report Executive Summary. Part 2. Component Compliance Summary Component (IP Address, domain, etc.):

Scan Report Executive Summary. Part 2. Component Compliance Summary Component (IP Address, domain, etc.): Scan Report Executive Summary Part 1. Scan Information Scan Customer Company: Date scan was completed: Vin65 ASV Company: Comodo CA Limited 02/18/2018 Scan expiration date: 05/19/2018 Part 2. Component

More information

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE Quest Enterprise Reporter 2.0 Report Manager USER GUIDE 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

Monitoring System Landscapes Using the DBA Cockpit

Monitoring System Landscapes Using the DBA Cockpit Monitoring System Landscapes Using the DBA Cockpit Applies to: Database Monitoring and Administration of SAP NetWeaver systems using the latest DBA Cockpit that is provided with release 7.10 and SAP NetWeaver

More information

Setup an NWDI Track for Composition Environment Developments

Setup an NWDI Track for Composition Environment Developments How-to Guide SAP NetWeaver 7.0 How To Setup an NWDI Track for Composition Environment Developments Version 2.00 January 2008 Applicable Releases: SAP NetWeaver 7.0 SP13 (Custom Development & Unified Life-Cycle

More information

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]

Nimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book] Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document

More information

Configure UD Connect on the J2EE Server for JDBC Access to External Databases

Configure UD Connect on the J2EE Server for JDBC Access to External Databases How-to Guide SAP NetWeaver 04 How to Configure UD Connect on the J2EE Server for JDBC Access to External Databases Version 1.05 Jan. 2004 Applicable Releases: SAP NetWeaver 04 (SAP BW3.5) Copyright 2004

More information

One Identity Manager Administration Guide for Connecting to SharePoint

One Identity Manager Administration Guide for Connecting to SharePoint One Identity Manager 8.0.2 Administration Guide for Connecting to Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software

More information

How To Configure the Websocket Integration with SAP PCo in SAP MII Self Service Composition Environment Tool

How To Configure the Websocket Integration with SAP PCo in SAP MII Self Service Composition Environment Tool SAP MII Websocket Integration with SAP PCo in Self Service Composition Environment How To Configure the Websocket Integration with SAP PCo in SAP MII Self Service Composition Environment Tool Applicable

More information

Integrate a Forum into a Collaboration Room

Integrate a Forum into a Collaboration Room How-to Guide SAP NetWeaver 04 How To Integrate a Forum into a Collaboration Room Version 1.00 May 2007 Applicable Releases: SAP NetWeaver 04 SPS20 Copyright 2007 SAP AG. All rights reserved. No part of

More information

NCDware ICA. Version 1.0. Release Notes

NCDware ICA. Version 1.0. Release Notes NCDware ICA Version 1.0 Release Notes Copyright Copyright 1998 by Network Computing Devices, Inc. The information contained in this document is subject to change without notice. Network Computing Devices,

More information

Installation Guide Release 1.1

Installation Guide Release 1.1 February 24, 2012 Installation Guide Release 1.1 Revision/Update Information: February 24, 2012 Software Version: PowerBroker Servers Windows Edition 1.1 Revision Number: 0 COPYRIGHT NOTICE Copyright

More information

Stonesoft Management Center. Release Notes for Version 5.6.1

Stonesoft Management Center. Release Notes for Version 5.6.1 Stonesoft Management Center Release Notes for Version 5.6.1 Updated: January 9, 2014 Table of Contents What s New... 3 Fixes... 3 System Requirements... 6 Basic Management System Hardware Requirements...

More information

How To... Master Data Governance for Material: BADI USMD_SSW_SYSTEM_METHOD_CALLER to create successor change request

How To... Master Data Governance for Material: BADI USMD_SSW_SYSTEM_METHOD_CALLER to create successor change request SAP How-To Guide Master Data Governance for Material How To... Master Data Governance for Material: BADI USMD_SSW_SYSTEM_METHOD_CALLER to Applicable Releases: EhP5, EhP6, MDG6.1 Version 1.1 March 2013

More information

How To...Configure Integration of CUP with SPM

How To...Configure Integration of CUP with SPM SAP SOLUTIONS FOR GOVERNANCE, RISK, AND COMPLIANCE How-To Guide How To...Configure Integration of CUP with SPM SAP GRC Regional Implementation Group Applicable Releases: SAP GRC Access Control 5.3 Topic

More information

Craig Pelkie Bits & Bytes Programming, Inc.

Craig Pelkie Bits & Bytes Programming, Inc. Craig Pelkie Bits & Bytes Programming, Inc. craig@web400.com Configure iseries NetServer and work with Folders in the IFS Edition NETSERVER_20020219 Published by Bits & Bytes Programming, Inc. Valley Center,

More information

Modify the Portal Framework Page in SAP EP 6.0

Modify the Portal Framework Page in SAP EP 6.0 How-to Guide SAP NetWeaver 04 How To Modify the Portal Framework Page in SAP EP 6.0 Version 1.00 December 2004 Applicable Releases: SAP NetWeaver SP2 and higher (SAP NetWeaver 04) Copyright 2004 SAP AG.

More information

Preview of Web Services Reliable Messaging in SAP NetWeaver Process Integration 7.1

Preview of Web Services Reliable Messaging in SAP NetWeaver Process Integration 7.1 Preview of Web Services Reliable Messaging in SAP NetWeaver Process Integration 7.1 Applies to: SAP NetWeaver Process Integration IT Scenarios in Version 7.1 Summary In this article I introduce some details

More information

How to Use Function Keys in Mobile Applications for Handhelds

How to Use Function Keys in Mobile Applications for Handhelds SAP NetWeaver How-To Guide How to Use Function Keys in Mobile Applications for Handhelds Applicable Releases: SAP NetWeaver 7.1 Topic Area: User Productivity Capability: Mobile Version 1.00 June 2009 Copyright

More information

One Identity Active Roles 7.2. Web Interface Administrator Guide

One Identity Active Roles 7.2. Web Interface Administrator Guide One Identity Active Roles 7.2 Web Interface Administrator Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

NetApp Cloud Volumes Service for AWS

NetApp Cloud Volumes Service for AWS NetApp Cloud Volumes Service for AWS AWS Account Setup Cloud Volumes Team, NetApp, Inc. March 29, 2019 Abstract This document provides instructions to set up the initial AWS environment for using the NetApp

More information

HP Load Balancing Module

HP Load Balancing Module HP Load Balancing Module System Management Configuration Guide Part number: 5998-4216 Software version: Feature 3221 Document version: 6PW100-20130326 Legal and notice information Copyright 2013 Hewlett-Packard

More information

Transport in GP. How-to Guide Beginning with SAP NetWeaver 2004s SPS06. Version 2.00 January 2006

Transport in GP. How-to Guide Beginning with SAP NetWeaver 2004s SPS06. Version 2.00 January 2006 How-to Guide Beginning with SAP NetWeaver 2004s SPS06 How To Transport in GP Version 2.00 January 2006 Applicable Releases: Beginning with SAP NetWeaver 2004s SPS06 Copyright 2006 SAP AG. All rights reserved.

More information

Application Note Using SiteManager as Web Proxy And/or Mail Relay Server

Application Note Using SiteManager as Web Proxy And/or Mail Relay Server Application Note Using SiteManager as Web Proxy And/or Mail Relay Server This guide explains how to configure a SiteManager, so devices on the Device side of it can use it to access as Web Proxy to access

More information

How To... Configure Integrated Configurations in the Advanced Adapter Engine

How To... Configure Integrated Configurations in the Advanced Adapter Engine SAP NetWeaver How-To Guide How To... Configure Integrated Configurations in the Advanced Adapter Engine Applicable Releases: SAP NetWeaver Process Integration 7.1, EhP 1 Topic Area: SOA Middleware Capability:

More information