Integrating non-dce/dfs Desktops into an existing DCE/DFS Environment

Size: px
Start display at page:

Download "Integrating non-dce/dfs Desktops into an existing DCE/DFS Environment"

Transcription

1 Integrating non-dce/dfs Desktops into an existing DCE/DFS Environment Markus Zahn Computer Centre Augsburg University May 2000

2 Integrating non-dce/dfs Desktops into an existing DCE/DFS Environment Overview Introduction Environment and Goals Solution for Linux Clients Upcoming Solution for Windows Clients Conclusions References Markus Zahn Augsburg University, Computer Centre 1

3 Introduction, assumptions and environment Introduction Large computing environments consist of many different platforms. Unix(Solaris,HP/UX,AIX,...includingLinux) Windows 3.x/95/98/NT Mac... Each platform has its own native authentication mechanism. Each platform has its own native file sharing facilities. There is definitely a great demand for both a single sign on solution and a common file system. Markus Zahn Augsburg University, Computer Centre 2

4 Introduction, assumptions and environment Basic Approach Idea: Make use of a distributed system based on Unix and handle desktop access via gateway solutions (e.g. Samba, netatalk,...). NIS/NFS is not really desireable (security, scalability). Make use of DCE/DFS: Implementations for most Unix systems. Windows and Mac implementation. Markus Zahn Augsburg University, Computer Centre 3

5 Introduction, assumptions and environment Advantages Leverage existing capital investment and expertise to provide file services from Unix to the different desktop systems. Increase service by providing one single password for login, mail service etc. Provide for Unix-based account mangement. Markus Zahn Augsburg University, Computer Centre 4

6 Introduction, assumptions and environment Caveats No DCE/DFS for Linux (at least no DFS): How to authenticate against DCE? Using the DFS/NFS gateway is far too much trouble (regarding authentication/authorization). No DFS support for Mac and Windows NT Samba, netatalk. Login integration not too smart on Windows: Accounts have to be known by DCE and Windows. Make use of a customized GINA or find a different approach. Markus Zahn Augsburg University, Computer Centre 5

7 Introduction, assumptions and environment Augsburg University s Environment Overall enrolled students employees. DCE cell (growing since 1994) DCE/DFS is backbone of account management and file sharing registered student accounts. 600 registered employee accounts. 400 affiliates with accounts. Windows NT domain (students only, since 1996) Student accounts derived from DCE registry. Continued for traditional reasons mainly. Markus Zahn Augsburg University, Computer Centre 6

8 Our Solution In general Modify client systems as few as possible. Make use of SSL to secure connections. Linux integration Pluggable Authentication Module (PAM) to allow integrated login. Implicit DFS/NFS Gateway authentication/mapping. Extend Name Service Switch (NSS) for DCE registry lookups. Markus Zahn Augsburg University, Computer Centre 7

9 Our Solution, continued Windows integration (in progress) Synchronize Windows NT and DCE registry. Use integrated login (login against NT and DCE registry) and native DFS support on DCE/DFS-integrated systems. Use SMB gateways elsewhere (e.g. Samba with Paul Henson s extensions). No modifications on the clients (except installation of DCE/DFS). Markus Zahn Augsburg University, Computer Centre 8

10 Inside PAM/NSS for Linux Extending Linux Major Components Pluggable Authentication Module (pam dce.so) to authenticate users. Name Service Switch extension (libnss dce.so.2) to make DCE registry lookups. PAM-Dæmon on DFS/NFS Gateway server to process PAM requests and establish DFS/NFS mapping. NSS-Dæmon on any DCE client to process NSS requests. Markus Zahn Augsburg University, Computer Centre 9

11 Inside PAM/NSS for Linux Conceptual Overview Linux Client libnss_dce.so.2 pam_dce.so SSL NFS Client DCE Client DCE Registry nssdced pamdced DFS/NFS Gateway NFS Server DFS Markus Zahn Augsburg University, Computer Centre 10

12 Inside PAM/NSS for Linux Linux Configuration Compile/install modules (/lib/security/pam dce.so and /lib/libnss dce.so.2). Setup PAM/DCE configuration (/etc/security/pam dce.conf). Install SSL certificate (/etc/security/pam dce.pem). Modify PAM configuration (e.g. /etc/pam.d/login): auth required /lib/security/pam_dce.so NSS/DCE configuration (/etc/nss dce.conf). Modify NSS configuration (/etc/nsswitch.conf): passwd: files dce group: files dce Markus Zahn Augsburg University, Computer Centre 11

13 Inside PAM/NSS for Linux Dæmon Setup Compile/install dæmons on DCE client (/usr/local/pam nss/pamdced and /usr/local/pam nss/nssdced). Create/install SSL certificate. Add pamdced to /etc/inetd.conf. Add nssdced to /etc/rc.local. Markus Zahn Augsburg University, Computer Centre 12

14 Inside PAM/NSS for Linux Current Status What is implemented... Authentication via PAM. Establish DFS/NFS mapping via PAM. SSL to secure PAM connections (i.e. password transfers). Support for the most important lookup methods (getpwnam(), getpwuid(), getgrnam() and getgrgid()). Markus Zahn Augsburg University, Computer Centre 13

15 Inside PAM/NSS for Linux Current Status, continued What is not implemented (yet)... No session support, no kdestroy equivalent ( security issue). No password managment yet. Not all lookup methods implemented for performace reasons (setpwent(), endpwent(), getpwent(), setgrent(), endgrent() and getgrent()). No support for multiple nssdced Dæmons (within client configuraton) yet. Markus Zahn Augsburg University, Computer Centre 14

16 Integrating Windows clients We are planning to... make use of existing Windows NT servers (mainly for traditional reasons). synchronize DCE registry and Windows NT registry. Add new accounts to both registries. Propagate password changes from DCE to NT and vice versa. Use password stength facilities of DCE (password strength server) and NT (password strength DLL) use patched Samba to export DFS home directories. Markus Zahn Augsburg University, Computer Centre 15

17 Integrating Windows clients Conceptual Overview Windows 3.x/95/98 Windows NT DCE/DFS Client authentication DFS access Integrated Login authentication authentication Windows NT PDC DCE Client DCE/DFS Client DCE/DFS Client DCE/DFS Client PWD Strength DLL PWD Strength Server SMB Gateway SMB Gateway SMB Gateway SSL password propagation DCE registry Markus Zahn Augsburg University, Computer Centre 16

18 Conclusions PAM/NSS-DCE integration for Linux in production use for > 2 months now. DFS access over DFS/NFS Gateway is restricted to NFS capabilities (e.g. no ACL support). Installation is plug & play. No major problems up to now. Additional features on wish list. Markus Zahn Augsburg University, Computer Centre 17

19 PAM/NSS-DCE Homepage: References Linux-PAM: ftp://ftp.kernel.org/pub/linux/libs/pam/index.html The GNU C Library System Databases and Name Service Switch: Paul Henson s Samba patches and authentication extensions: Synchronizing NT and Unix passwords with DCE: Markus Zahn Augsburg University, Computer Centre 18

Windows 2000 Conversion Wrapup. Al Williams Penn State Teaching and Learning with Technology SHARE 98, Nashville, TN Session 5822

Windows 2000 Conversion Wrapup. Al Williams Penn State Teaching and Learning with Technology SHARE 98, Nashville, TN Session 5822 Windows 2000 Conversion Wrapup Al Williams (alw@psu.edu) Penn State Teaching and Learning with Technology SHARE 98, Nashville, TN Session 5822 1 Introduction We ve reorganized (again, and again, and )

More information

Kerberos-enabled applications. Core services for UNIX shell programs and applications. Kerberos environment. Centrify DirectControl Service Library

Kerberos-enabled applications. Core services for UNIX shell programs and applications. Kerberos environment. Centrify DirectControl Service Library Understanding Centrify DirectControl Agents The Centrify DirectControl Agent makes a UNIX, Linux, or Mac OS X computer look and behave like a Windows client computer to Active Directory. The Centrify DirectControl

More information

This section discusses the protocols available for volumes on Nasuni Filers.

This section discusses the protocols available for volumes on Nasuni Filers. Nasuni Corporation Boston, MA Introduction The Nasuni Filer provides efficient and convenient global access to your data. Nasuni s patented file system, UniFS, combines the performance and consistency

More information

SSSD. Client side identity management. LinuxDays 2012 Jakub Hrozek

SSSD. Client side identity management. LinuxDays 2012 Jakub Hrozek SSSD Client side identity management LinuxDays 2012 Jakub Hrozek 20. října 2012 1 User login in Linux 2 Centralized user databases 3 SSSD Section 1 User login in Linux User login in Linux User login in

More information

SDC EMEA 2019 Tel Aviv

SDC EMEA 2019 Tel Aviv Integrating Storage Systems into Active Directory SDC EMEA 2019 Tel Aviv Volker Lendecke Samba Team / SerNet 2019-01-30 Volker Lendecke AD integration (2 / 16) Overview Active Directory Authentication

More information

Veritas NetBackup Appliance Security Guide

Veritas NetBackup Appliance Security Guide Veritas NetBackup Appliance Security Guide Release 2.7.3 NetBackup 52xx and 5330 Veritas NetBackup Appliance Security Guide Document version: 2.7.3 Legal Notice Copyright 2016 Veritas Technologies LLC.

More information

The Samba-3: Overview, Authentication, Integration

The Samba-3: Overview, Authentication, Integration The Samba-3: Overview, Authentication, Integration John H Terpstra, CTO PrimaStasys Inc. jht@primastasys.com or jht@samba.org Slide 1 About the speaker Long term Samba-Team member Author of official Samba

More information

Configuring Request Authentication and Authorization

Configuring Request Authentication and Authorization CHAPTER 15 Configuring Request Authentication and Authorization Request authentication and authorization is a means to manage employee use of the Internet and restrict access to online content. This chapter

More information

Mapping LPI certifications against e-cf EXIN. status

Mapping LPI certifications against e-cf EXIN. status Mapping LPI certifications against e-cf EXIN status 20140916 Linux Essentials Professional Development Certificate (PDC) https://www.lpi.org/linux-certifications/entry-level-credential/linux To secure

More information

The Samba-3 Enchilada: Overview, Authentication, Integration

The Samba-3 Enchilada: Overview, Authentication, Integration : Overview, Authentication, Integration John H Terpstra, CTO PrimaStasys Inc. jht@primastasys.com or jht@samba.org Page 1 About the speaker Long term Samba-Team member Author of official Samba documentation

More information

Integrating Ubuntu based workstations in IPBrick s domain

Integrating Ubuntu based workstations in IPBrick s domain Integrating Ubuntu based workstations in IPBrick s domain IPBRICK International November 29, 2012 1 Contents 1 Introduction 3 2 IPBrick servers Setup Datasheet 3 2.1 IPBrick.I server - Intranet Master.......................

More information

Subtitle: Join Sun Solaris Systems to Active Directory with Likewise

Subtitle: Join Sun Solaris Systems to Active Directory with Likewise Keywords: join solaris to active directory, solaris active directory integration, solaris AD, solaris active directory, solaris winbind, Sun Identity Manager, Unix authentication, solaris authentication,

More information

Veritas NetBackup Appliance Security Guide

Veritas NetBackup Appliance Security Guide Veritas NetBackup Appliance Security Guide Release 2.7.2 NetBackup 52xx and 5330 Veritas NetBackup Appliance Security Guide Documentation version: 2.7.2 Legal Notice Copyright 2016 Veritas Technologies

More information

Distributed Computing Environment (DCE)

Distributed Computing Environment (DCE) Distributed Computing Environment (DCE) Distributed Computing means computing that involves the cooperation of two or more machines communicating over a network as depicted in Fig-1. The machines participating

More information

Link Gateway Initial Configuration Manual

Link Gateway Initial Configuration Manual Link Gateway Initial Configuration Manual Copyright 2016 NetLinkz. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated

More information

InsightConnector Version 1.0

InsightConnector Version 1.0 InsightConnector Version 1.0 2002 Bynari Inc. All Rights Reserved Table of Contents Table of Contents... 2 Executive Summary... 3 Examination of the Insight Messaging Solution... 3 Exchange or Outlook?...

More information

Likewise Open provides smooth integration with Active Directory environments. We show you how to install

Likewise Open provides smooth integration with Active Directory environments. We show you how to install Open provides smooth integration with Active Directory environments. We show you how to install and configure the admin-friendly authentication system. BY WALTER NEU he Open authentication system [1] integrates

More information

CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions 1800 ULEARN (853 276) www.ddls.com.au CNS-207-2I Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Length 5 days Price $5500.00 (inc GST) Overview The objective of Implementing Citrix NetScaler

More information

SOLO NETWORK (11) (21) (31) (41) (48) (51) (61)

SOLO NETWORK (11) (21) (31) (41) (48) (51) (61) Cisco NSS6000 4-Bay Advanced Gigabit Storage System Chassis and Cisco NSS6100 4-Bay Advanced Gigabit Storage System - 1.0TB RAID Cisco Small Business Network Storage System 4-Drive-Bay Advanced Gigabit

More information

Migration of NT4 to Samba-3

Migration of NT4 to Samba-3 Migration of NT4 to Samba-3 John H Terpstra, CTO PrimaStasys Inc. jht@primastasys.com Slide 1 Overview of John H Terpstra Long term Samba-Team member Author of official Samba documentation The Official

More information

Oracle Application Express: Administration 1-2

Oracle Application Express: Administration 1-2 Oracle Application Express: Administration 1-2 The suggested course agenda is displayed in the slide. Each lesson, except the Course Overview, will be followed by practice time. Oracle Application Express:

More information

SSH with Globus Auth

SSH with Globus Auth SSH with Globus Auth Summary As the community moves away from GSI X.509 certificates, we need a replacement for GSI-OpenSSH that uses Globus Auth (see https://docs.globus.org/api/auth/ ) for authentication.

More information

SFTP CONNECTIVITY STANDARDS Connectivity Standards Representing Bloomberg s Requirements for SFTP Connectivity.

SFTP CONNECTIVITY STANDARDS Connectivity Standards Representing Bloomberg s Requirements for SFTP Connectivity. SFTP CONNECTIVITY STANDARDS Connectivity Standards Representing Bloomberg s Requirements for SFTP Connectivity. Version 1.2 April 2017 Contents Overview... 3 BB-SFTP Functionality... 3 Bloomberg SFTP Connectivity

More information

QuickSpecs. HP Advanced Server V5.1B-5 for UNIX. Overview. Retired

QuickSpecs. HP Advanced Server V5.1B-5 for UNIX. Overview. Retired Overview The Advanced Server for UNIX (ASU) software is a Tru64 UNIX layered application that provides seamless interoperability between systems running the Tru64 UNIX operating system software and systems

More information

HP Advanced Server V5.1B-3 for UNIX. Overview

HP Advanced Server V5.1B-3 for UNIX. Overview Overview The Advanced Server for UNIX (ASU) software is a Tru64 UNIX layered application that provides seamless interoperability between systems running the Tru64 UNIX operating system software and systems

More information

Manually Mount Network Drive Mac Os X Command Line

Manually Mount Network Drive Mac Os X Command Line Manually Mount Network Drive Mac Os X Command Line Is there ANY way to mount a network share for both users? I really You may do it manually in the command line also: Let's assume your media folder is

More information

Network Team. Document for connecting a Mac to the University VPN system

Network Team. Document for connecting a Mac to the University VPN system Academic Services Information & Computing Services Division Network Team Network Team Document for connecting a Mac to the University VPN system Document reference: Document type: Document status: Review

More information

Lorikeet Integrated Authentication

Lorikeet Integrated Authentication Lorikeet Integrated Authentication Who am I? 'Student Network Administrator' at Hawker College Samba Team Authentication in the real world 800 students 170 client computers Win NT, Win2k, WinXP Single

More information

The role of Samba on the Linux desktop. Steve Langasek Canonical USA

The role of Samba on the Linux desktop. Steve Langasek Canonical USA The role of Samba on the Linux desktop Steve Langasek Canonical USA The role of Samba on the Linux desktop The role of Samba on the Linux desktop everyone recognizes the importance of Samba on the Linux

More information

Diploma in Network (LAN/WAN) Administration

Diploma in Network (LAN/WAN) Administration Diploma in Network (LAN/WAN) Administration The Diploma in Network (LAN/WAN) Administration program prepares students to setup Local & Wide Area Networks using Cisco routers and Catalyst switches in a

More information

Presenter. Xiaolong Li, Assistant Professor Department of Industrial and Engineering Technology Morehead State University

Presenter. Xiaolong Li, Assistant Professor Department of Industrial and Engineering Technology Morehead State University DEVELOPMENT AND APPLICATION OF A NEW CURRICULUM FOR COMPUTER NETWORKING Presenter Xiaolong Li, Assistant Professor Department of Industrial and Engineering Technology Morehead State University Gabriel

More information

2 SCANNING, PROBING, AND MAPPING VULNERABILITIES

2 SCANNING, PROBING, AND MAPPING VULNERABILITIES GL-550: Red Hat Linux Security Administration Course Length: 5 days Course Description: This highly technical course focuses on properly securing machines running the Linux operating systems. A broad range

More information

You will save an Auto Server Setup file and use it in the next exercise.

You will save an Auto Server Setup file and use it in the next exercise. Initial Mac OS X Server Configuration 51 30 You are now at the Review pane. Do not click the Set Up button. Instead, leave your Mac OS X Server at this Review pane. You will save an Auto Server Setup file

More information

THE GREEN CHOICE, THE SMART CHOICE.

THE GREEN CHOICE, THE SMART CHOICE. THE GREEN CHOICE, THE SMART CHOICE. Powered by HyPAS TRACK and control printing charges by users, groups or clients EASY to install and configure to your specific environment RETURN on investment is fast

More information

Exam Name: IBM Certified System Administrator - WebSphere Application Server Network Deployment V7.0

Exam Name: IBM Certified System Administrator - WebSphere Application Server Network Deployment V7.0 Vendor: IBM Exam Code: 000-377 Exam Name: IBM Certified System Administrator - WebSphere Application Server Network Deployment V7.0 Version: Demo QUESTION 1 An administrator would like to use the Centralized

More information

Novell Nsure Identity Manager Fan-Out Driver

Novell Nsure Identity Manager Fan-Out Driver Novell Nsure Identity Manager TM Fan-Out Driver 3.1 October 27, 2004 PLATFORM SERVICES ADMINISTRATION GUIDE FOR LINUX* AND UNIX* www.novell.com Legal Notices Novell, Inc. and Omnibond Systems LLC. make

More information

Copyright

Copyright This video looks at Claim Based/Identity Based systems using Active Directory Federation Services as an example. An example of a claim based system is where the user logs into a system like a web page

More information

I m InTouch Server Edition (SE) Administration Features

I m InTouch Server Edition (SE) Administration Features I m InTouch Server Edition (SE) Administration Features Administration Features Add user accounts Create user remote access rights Edit user accounts Remove user accounts View statistics on remote access

More information

Nessus Scan Report. Hosts Summary (Executive) Hosts Summary (Executive) Mon, 15 May :27:44 EDT

Nessus Scan Report. Hosts Summary (Executive) Hosts Summary (Executive) Mon, 15 May :27:44 EDT Nessus Scan Report Mon, 15 May 2017 15:27:44 EDT Table Of Contents Hosts Summary (Executive) 192.168.168.134 Hosts Summary (Executive) [-] Collapse All [+] Expand All 192.168.168.134 Summary Critical High

More information

IBM Distributed Computing Environment Version 3.2 for AIX. Quick Beginnings

IBM Distributed Computing Environment Version 3.2 for AIX. Quick Beginnings IBM Distributed Computing Environment Version 3.2 for AIX Quick Beginnings IBM Distributed Computing Environment Version 3.2 for AIX Quick Beginnings Note Before using this document, read the general

More information

File Services. File Services at a Glance

File Services. File Services at a Glance File Services High-performance workgroup and Internet file sharing for Mac, Windows, and Linux clients. Features Native file services for Mac, Windows, and Linux clients Comprehensive file services using

More information

Cisco Energy Management

Cisco Energy Management Cisco Energy Management Maior visibilidade para uma maior Poupança Energética Rodrigo Teixeira-Services Manager Cisco Innovation Lab Porto,28 Maio 2015 Agenda Why Energy Management? Introduction to Cisco

More information

PCI DSS Compliance. White Paper Parallels Remote Application Server

PCI DSS Compliance. White Paper Parallels Remote Application Server PCI DSS Compliance White Paper Parallels Remote Application Server Table of Contents Introduction... 3 What Is PCI DSS?... 3 Why Businesses Need to Be PCI DSS Compliant... 3 What Is Parallels RAS?... 3

More information

PKI is Alive and Well: The Symantec Managed PKI Service

PKI is Alive and Well: The Symantec Managed PKI Service PKI is Alive and Well: The Symantec Managed PKI Service Marty Jost Product Marketing, User Authentication Lance Handorf Technical Enablement, PKI Solutions 1 Agenda 1 2 3 PKI Background: Problems and Solutions

More information

User Guide Version 2.0

User Guide Version 2.0 User Guide Version 2.0 Page 2 of 8 Summary Contents 1 INTRODUCTION... 3 2 SECURESHELL (SSH)... 4 2.1 ENABLING SSH... 4 2.2 DISABLING SSH... 4 2.2.1 Change Password... 4 2.2.2 Secure Shell Connection Information...

More information

Replacing Windows Servers with Linux

Replacing Windows Servers with Linux Replacing Windows Servers with Linux Mark Post Novell, Inc. Wednesday, February 14, 2007 Session 9281 Agenda Reasons to move away from Microsoft Windows What Windows functions can be replaced? What can

More information

Server Software Installation Guide

Server Software Installation Guide Server Software Installation Guide This guide provides information on...... The architecture model for NotifyMDM system setup... Hardware and supporting software requirements for NotifyMDM... Server software

More information

Pre-Assessment Answers-1

Pre-Assessment Answers-1 Pre-Assessment Answers-1 0Pre-Assessment Answers Lesson 1 Pre-Assessment Questions 1. What is the name of a statistically unique number assigned to all users on a Windows 2000 system? a. A User Access

More information

Procedure for Connecting to OIL VPN

Procedure for Connecting to OIL VPN Procedure for Connecting to OIL VPN Contents Introduction... 1 Pre-requisites... 1 How to Connect to OIL VPN... 1 Access using Checkpoint remote access client... 2 Note for macos users... 6 Accessing using

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information

Mario Iseli

Mario Iseli LUGS-Treff @ 24.08.2006 What is a directory? (Where did i put that damn username?) Your business partners, friends, coworkers. Do you know all their E-Mail addresses? How many lines does your /etc/hosts

More information

Filesharing. Jason Healy, Director of Networks and Systems

Filesharing. Jason Healy, Director of Networks and Systems Filesharing Jason Healy, Director of Networks and Systems Last Updated Mar 18, 2008 2 Contents 1 Name of Project Here 5 1.1 Introduction.............................. 5 1.2 Initial Setup..............................

More information

Chapter 02 Linux Installation and Usage

Chapter 02 Linux Installation and Usage Chapter 02 Linux Installation and Usage TRUEFALSE 1. A swap partition contains a filesystem. 2. When a user interacts with his computer, he interacts directly with the kernel of the computer's operating

More information

Linux User Management Administration Guide

Linux User Management Administration Guide www.novell.com/documentation Linux User Management Administration Guide Open Enterprise Server 2 SP3 May 06, 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the

More information

Advanced Authentication 6.0 includes new features, improves usability, and resolves several previous issues.

Advanced Authentication 6.0 includes new features, improves usability, and resolves several previous issues. Advanced Authentication 6.0 Release Notes May 2018 Advanced Authentication 6.0 includes new features, improves usability, and resolves several previous issues. Many of these improvements were made in direct

More information

You can access data using the FTP/SFTP protocol. This document will guide you in the procedures for configuring FTP/SFTP access.

You can access data using the FTP/SFTP protocol. This document will guide you in the procedures for configuring FTP/SFTP access. You can access data using the FTP/SFTP protocol. This document will guide you in the procedures for configuring FTP/SFTP access. Overview of Configuring FTP/SFTP Access In order to access data using the

More information

Getting started with my.acap

Getting started with my.acap Getting started with my.acap A resource for Students, including: 1. Logging in to my.acap 2. Accessing your Classes 3. Participant Profiles a. Updating your own Profile 4. Announcements and Discussion

More information

Parallels Remote Application Server 15 Beta Beta Guide

Parallels Remote Application Server 15 Beta Beta Guide Parallels Remote Application Server 15 Beta Beta Guide Version 1 Copyright 1999 2015 Parallels IP Holdings GmbH and its affiliates. All rights reserved. All other marks and names mentioned herein may be

More information

SA3 E7 Advanced Linux System Administration III Internet Network Services and Security

SA3 E7 Advanced Linux System Administration III Internet Network Services and Security SA3 E7 Advanced Linux System Administration III Internet Network Services and Security Synopsis: This is a fast paced, level 3, advanced class for experienced administrators of Linux based hosts on a network

More information

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities

SailPoint IdentityIQ Integration with the BeyondInsight Platform. Providing Complete Visibility and Auditing of Identities SailPoint IdentityIQ Integration with the BeyondInsight Platform Providing Complete Visibility and Auditing of Identities Table of Contents Executive Summary... 3 Identity and Access Management... 5 BeyondTrust

More information

Version June 2016

Version June 2016 HOSTING GUIDE Version 3.2.3 June 2016 This guide is sold in conjunction with the VETtrak Hosting Serv ice and is current at the time of purchase. Later v ersions are av ailable for download from www.v

More information

aehostd The PAM/NSS service for Æ-DIR

aehostd The PAM/NSS service for Æ-DIR aehostd The PAM/NSS service for Æ-DIR Michael Ströder OpenLDAP Developer s Day 2018 STROEDER.COM - 1 - Michael Ströder Freelancer Topics the last 20 years

More information

Identity Management In Red Hat Enterprise Linux. Dave Sirrine Solutions Architect

Identity Management In Red Hat Enterprise Linux. Dave Sirrine Solutions Architect Identity Management In Red Hat Enterprise Linux Dave Sirrine Solutions Architect Agenda Goals of the Presentation 2 Identity Management problem space What Red Hat Identity Management solution is about?

More information

Release Date May StorNext NAS Release Notes 2. New Features for Release Performing System Installations and Upgrades 4

Release Date May StorNext NAS Release Notes 2. New Features for Release Performing System Installations and Upgrades 4 Release Notes Release 1.2.3 Supported Product StorNext NAS Date May 2016 Contents StorNext NAS 1.2.3 Release Notes 2 New Features for Release 1.2.3 2 Performing System Installations and Upgrades 4 Fixes

More information

VI. Corente Services Client

VI. Corente Services Client VI. Corente Services Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 II. Corente Client Configuration...

More information

AHC IE Data Shelter User Guide

AHC IE Data Shelter User Guide AHC IE Data Shelter User Guide Click on the links to jump to sections: Pre-requisites Connecting PC Instructions: Login to Data Shelter MAC Instructions: Login to Data Shelter Connecting via Fairview Secure

More information

HySecure Quick Start Guide. HySecure 5.0

HySecure Quick Start Guide. HySecure 5.0 HySecure Quick Start Guide HySecure 5.0 Last Updated: 25 May 2017 2012-2017 Propalms Technologies Private Limited. All rights reserved. The information contained in this document represents the current

More information

User accounts and authorization

User accounts and authorization User accounts and authorization Authentication vs authorization Authentication: proving the identity of someone Authorization: allowing a user to access certain resources 1 Government authorization documents

More information

EnterpriseLink and LDAP

EnterpriseLink and LDAP Case Requirement A client has an EnterpriseLink application and wishes to utilize their Linux LDAP server to validate Users against, then use the EnterpriseLink feature of pooled logons to the mainframe.

More information

Remote Administration

Remote Administration Windows Remote Desktop, on page 1 pcanywhere, on page VNC, on page 6 Windows Remote Desktop Remote Desktop permits users to remotely execute applications on Windows Server 2012 R2 from a range of devices

More information

PMS 138 C Moto Black spine width spine width 100% 100%

PMS 138 C Moto Black spine width spine width 100% 100% Series MOTOROLA and the Stylized M Logo are registered in the US Patent & Trademark Office. All other product or service names are the property of their respective owners. 2009 Motorola, Inc. Table of

More information

Step-by-step installation guide for monitoring untrusted servers using Operations Manager

Step-by-step installation guide for monitoring untrusted servers using Operations Manager Step-by-step installation guide for monitoring untrusted servers using Operations Manager Most of the time through Operations Manager, you may require to monitor servers and clients that are located outside

More information

3.1 Getting Software and Certificates

3.1 Getting Software and Certificates 3 Configuring the Remote Client On the remote client you have to download the Sophos SSL VPN Client software including configuration data from the UTM User Portal. Then you install the software package

More information

SpaceShuttle User guide v3

SpaceShuttle User guide v3 SpaceShuttle User guide v3 1.Get Started with SpaceShuttle p2 1.1 For Windows p2 How to download and install Aspera Connect p2 1.2 For Mac p4 How to download and install Aspera Connect p4 2. Accessing

More information

Aventail ST2 SSL VPN New Features Guide

Aventail ST2 SSL VPN New Features Guide Aventail ST2 SSL VPN New Features Guide Summary of New Features and Functionality for the Aventail ST2 SSL VPN Platform Upgrade Release August, 2006 2006 Aventail Corporation. All rights reserved. Aventail,

More information

Samba4 and Directory Services. Andrew Bartlett Samba Team

Samba4 and Directory Services. Andrew Bartlett Samba Team Samba4 and Directory Services Andrew Bartlett Samba Team Who Am I Samba Developer Authentication Systems I care about who you are Directory Services I've enjoyed the more painful parts of actually using

More information

Virtual Machine Connection Guide for AWS Labs

Virtual Machine Connection Guide for AWS Labs Virtual Machine Connection Guide for AWS Labs Thank you for participating in our hands-on workshop. We are glad to have you in our class! This class relies on our accompanying lab environment which provides

More information

Novell Open Enterprise Server

Novell Open Enterprise Server Novell Open Enterprise Server Klaus Huebner Novell Deutschland Senior Category Specialist Novel l Open Enterprise Server: the Future of NetWare and NLS Open Enterprise Server: The Best of Both Worlds NetWare

More information

These are the new features in headlines grouped by topic. Later in the document we have included detailed information about each new feature.

These are the new features in headlines grouped by topic. Later in the document we have included detailed information about each new feature. 5HOHDVHQRWHV²YHUVLRQ Danware is proud to introduce NetOp Remote Control 7.65 as the shipping version. It s a free upgrade for our existing customers using version 7.6x and a commercial upgrade for users

More information

Linux Administration

Linux Administration Linux Administration This course will cover all aspects of Linux Certification. At the end of the course delegates will have the skills required to administer a Linux System. It is designed for professionals

More information

Computer Classroom Security Standard

Computer Classroom Security Standard Computer Classroom Security Standard Cal State Fullerton operates a heterogeneous network environment composed of centrally supported workstations, servers, and the network infrastructure. Along with administrative

More information

0Activity Answers. Table A1-1: Operating system elements and security mechanisms. The Security Accounts Manager (SAM)

0Activity Answers. Table A1-1: Operating system elements and security mechanisms. The Security Accounts Manager (SAM) Activity Answers-1 0Activity Answers Activity 1-1: Reviewing elements and mechanisms found in operating systems In this activity, you will compare Windows 2000 and Linux to discover how each implements

More information

Data Validation Option Best Practices

Data Validation Option Best Practices Data Validation Option Best Practices 1993-2016 Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying, recording or otherwise) without

More information

Welcome to the Contra Costa Community College District and InSite

Welcome to the Contra Costa Community College District and InSite Welcome to the Contra Costa Community College District and InSite These instructions will demonstrate how to log into InSite and how to manage your user account. Part 1 Your First Login Update your Password

More information

Certificate Enrollment for the Atlas Platform

Certificate Enrollment for the Atlas Platform Certificate Enrollment for the Atlas Platform Certificate Distribution Challenges Digital certificates can provide a secure second factor for authenticating connections from MAP-wrapped enterprise apps

More information

HP Supporting the HP ProLiant Storage Server Product Family.

HP Supporting the HP ProLiant Storage Server Product Family. HP HP0-698 Supporting the HP ProLiant Storage Server Product Family https://killexams.com/pass4sure/exam-detail/hp0-698 QUESTION: 1 What does Volume Shadow Copy provide?. A. backup to disks B. LUN duplication

More information

RSA SECURID ACCESS PAM Agent Implementation Guide

RSA SECURID ACCESS PAM Agent Implementation Guide RSA SECURID ACCESS PAM Agent Implementation Guide IBM AIX 7.2 RSA Authentication Agent for PAM John Sammon, RSA Partner Engineering Last Modified: 8/18/16 -- 1 - Solution Summary The AIX operating system

More information

VAS 2.6 ADMINISTRATION GUIDE

VAS 2.6 ADMINISTRATION GUIDE VAS 2.6 ADMINISTRATION GUIDE SEPTEMBER 2004 Copyright c 2003, 2004 Vintela, Inc. All Rights Reserved. Legal Notice Vintela documents are protected by the copyright laws of the United States and International

More information

RSA Ready Implementation Guide for. VMware vsphere Management Assistant 6.0

RSA Ready Implementation Guide for. VMware vsphere Management Assistant 6.0 RSA Ready Implementation Guide for vsphere Management Assistant 6.0 Daniel Pintal, RSA Partner Engineering Last Modified: July 20 th, 2016 Solution Summary vsphere Management

More information

AirWatch for Android Devices for AirWatch InBox

AirWatch for Android Devices for AirWatch InBox Overview What is AirWatch AirWatch is the mobile device management (MDM) system provided by Michigan Medicine ensure security for smart phones and tablets that connect to the Michigan Medicine environment.

More information

Free4Torrent. Free and valid exam torrent helps you to pass the exam with high score

Free4Torrent.   Free and valid exam torrent helps you to pass the exam with high score Free4Torrent http://www.free4torrent.com Free and valid exam torrent helps you to pass the exam with high score Exam : 220-902 Title : CompTIA A+ Certification Exam (902) Vendor : CompTIA Version : DEMO

More information

Graphical Access to IU's Supercomputers with Karst Desktop Beta

Graphical Access to IU's Supercomputers with Karst Desktop Beta Graphical Access to IU's Supercomputers with Karst Desktop Beta A Thota, R Henschel, C Dennis, J Rinkovsky, D Hancock Research Technologies Indiana University 1 Show of hands Who here has Run statistical

More information

Enterprise Directories and Security Management: Merging Technologies for More Control

Enterprise Directories and Security Management: Merging Technologies for More Control Enterprise Directories and Security Management: Merging Technologies for More Control Contents Introduction...3 Directory Services...3 A brief history of LDAP...3 LDAP today...4 Free and commercially available

More information

Linux User Management Administration Guide

Linux User Management Administration Guide www.novell.com/documentation Linux User Management Administration Guide Open Enterprise Server 11 SP1 August 28, 2012 Legal Notices Novell, Inc., makes no representations or warranties with respect to

More information

The Collaboration Cornerstone

The Collaboration Cornerstone E-Mail: The Collaboration Cornerstone On Demand Insurance Business Problems 1. We lose customers because we process new policy applications too slowly. 2. Our claims processing is time-consuming and inefficient.

More information

Introduction to ISE-PIC

Introduction to ISE-PIC User identities must be authenticated in order to protect the network from unauthorized threats. To do so, security products are implemented on the networks. Each security product has its own method of

More information

Securing Linux Systems Before Deployment

Securing Linux Systems Before Deployment Securing Linux Systems Before Deployment Richard Williams Senior Support Services Specialist Symark Why secure Linux systems? Your Linux enterprise installation is growing Assets on Linux systems are becoming

More information

Active Directory Integration

Active Directory Integration SwiftStack Gateway Active Directory Integration Summary There are two main ways of integrating the SwiftStack Gateway with Microsoft Active Directory authentication: RID, using winbind LDAP For most implementations

More information

Cloud Secure Integration with ADFS. Deployment Guide

Cloud Secure Integration with ADFS. Deployment Guide Cloud Secure Integration with ADFS Deployment Guide Product Release 8.3R3 Document Revisions 1.0 Published Date October 2017 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San Jose CA 95134 http://www.pulsesecure.net

More information

ONLINE REGISTRATION FORMS

ONLINE REGISTRATION FORMS ONLINE REGISTRATION FORMS Table of Contents Online Registration Forms... 1 About the Manual... 4 Audience... 4 Purpose... 4 Authorship... 4 Introduction to Online forms:-... 6 Single User Subscription

More information