Using Secondary ehealth Consoles

Size: px
Start display at page:

Download "Using Secondary ehealth Consoles"

Transcription

1 Using Secondary ehealth Consoles If you have several ehealth administrators at your site, each administrator can use an ehealth console to perform administrative tasks. The primary ehealth console and any of the secondary consoles can run at local or remote workstations. Through the primary console, administrators can perform all administrative- and user-level ehealth tasks. Administrators can use secondary consoles to perform a subset of the primary console tasks. This chapter provides detailed guidelines and best practices for operating multiple ehealth consoles (these guidelines do not apply to the use of the OneClick for ehealth Console). Performing Tasks Using Multiple Consoles When multiple consoles are in use, the first administrator who attempts to perform a task obtains read-write access for that task. Subsequent admins who attempt to perform the same task (regardless of which console the administrator is using) is given read-only access or is prevented from accessing a dialog that is being used by another administrator. You can allow administrators who might have responsibility for specific users (such as customers) to perform the following tasks for those users from secondary consoles: Discover resources within your network infrastructure. Edit or delete elements. Schedule jobs. Schedule, customize, and run reports. View license information. From the secondary console, an administrator can access some dialogs with restrictions. Table 1 describes the restrictions that apply to the use of the Discover and Poller Configuration (Poller Config) dialogs. Table 1. Restrictions on the Use of the Discover and Poller Configuration Dialogs Administrative Action Administrator opens Discover dialog from the primary console or a secondary console Administrator opens Poller Configuration dialog from the primary console or a secondary console Restrictions Discover dialog and the Poller Config dialog are not accessible from the other console. Poller Config dialog is accessible in read-only mode from a secondary console. Discover dialog is not accessible from both consoles. Poller Config dialog is accessible in read-only mode from the other console, unless you have filtered both consoles to show different groups. If you have specified different element filters for both consoles from the console that you are using you can access the Poller Config in read-write mode for the group that is not appearing in the other console. It displays the elements for the group on which you are filtering only. If you have specified a filter on only one of the consoles or the same filter on both consoles, you can access the Poller Config for the other in read-only mode only. ehealth Release 6.0 October 2006

2 Using Secondary ehealth Consoles Table 2 explains how an open Discover or Poller Config dialog affects your ability to view or modify element information from the other dialogs on the primary and secondary consoles. Table 2. Discover and Poller Configuration Dialog Restrictions with Secondary Consoles Primary Console Discover Dialog Primary Console Filter Primary Console Poller Config Dialog Secondary Console Discover Dialog Secondary Console Filter Secondary Console Poller Config Dialog Open N/A Inaccessible Inaccessible N/A Read-only mode Inaccessible N/A Read-only mode Open N/A Inaccessible Inaccessible None Open Inaccessible None Read-only Inaccessible None Read-only Inaccessible None Open Inaccessible Group A Open Inaccessible None Read-only Inaccessible Group A Open Inaccessible Group A Read-only Inaccessible Group A Open Inaccessible Group B Read-write Inaccessible Group A Read-write Inaccessible Group B Open Inaccessible None Read-only Inaccessible Group B Open Inaccessible Group B Read-only Inaccessible Group B Open ehealth displays messages to indicate whether you have read-only access, or to indicate that you cannot open a dialog. It also displays messages in each console about changes that all administrators are making. Discovering Elements ehealth permits a discover process to run from only one console at one time. When several ehealth administrators are logged into the ehealth system, the first administrator to open the Discover dialog can run the discover, and the other administrators receive a message that they cannot run a discover process. They will have read-only access to the Poller Configuration, Poller Controls, and Options dialogs. Managing the Poller Configuration Only one ehealth administrator at a time can open the Poller Configuration dialog for editing, unless each console has specified the name of a group on which to filter. For both consoles to have read-write access, the group filters specified in the Set Element Filter field in the Options dialog must be unique. If element filters are not set, and a secondary administrator attempts to open the Poller Configuration dialog while an administrator is editing it, ehealth notifies the secondary administrator that the dialog can be opened in read-only mode only. The secondary administrator can then view it, but cannot modify it. If each console has a unique group specified in the Set Element Filter field, administrators can open their Poller Configuration dialogs to edit the elements in the groups they specified in the Set Element Filter field, even if other administrators are simultaneously modifying other groups of elements. 2

3 Using ehealth Secondary Consoles The first administrator to open the Poller Configuration dialog automatically receives read-write access. Other administrators who attempt to open the dialog while it is open are granted read-only access. Two administrators cannot work on the same group of elements or reports simultaneously. Administrators can, however, use element filters to display only the groups for which they are responsible in the Poller Configuration dialog, thus ensuring that they can modify the elements for which they are responsible while other administrators modify their own elements. NOTE: Element filtering enables administrators to edit different groups at the same time. Because ehealth permits the same element to exist in more than one group, one administrator could overwrite changes made concurrently by another administrator. Therefore, take precautions to prevent two administrators from modifying the same elements at the same time. Setting Other Global Options. You can set global console options to show alias names instead of element names and specify report time zones. When you change the settings for the time zone and alias name fields in a secondary ehealth console, the settings are not preserved for any subsequent console sessions. The global settings only apply to the console in which you apply them; that is, if you set an option in the primary console, it is not automatically enabled in the secondary console. Scheduling Jobs An ehealth administrator who uses a secondary console cannot modify scheduled system jobs. The primary ehealth administrator is responsible for managing the database and performing these functions. If two ehealth administrators modify the same scheduled job at the same time, ehealth saves only the changes that were saved last. It overwrites the changes that were saved first. Configuring Secondary Consoles on UNIX Systems Before allowing other administrators to run ehealth at a secondary console, note the following restrictions. If you have installed ehealth on a UNIX system and you allow remote administrators access using secondary consoles, you must grant write permission to those other users. You must add the secondary console administrators to the UNIX user group to which the primary ehealth user account belongs. Specify group write permissions for the following directories (and their subdirectories) in your ehealth installation: help log output poller reports tmp web/output ehealth/extensions/auto To run a secondary console, each administrator must do the following: Log in as a different user (each ehealth administrator must use a unique user name). Obtain read and write access permissions on ehealth directories to create, read, or modify a report or temporary file. 3

4 Using Secondary ehealth Consoles To register another administrator as a database user: 1. Log in as the ehealth user (the name by which you or other administrators access ehealth) on the ehealth system. 2. Do one of the following: If your shell is sh or ksh, source the nethealthrc.sh file. If your shell is csh, source the nethealthrc.csh file. 3. Enter the following command to specify administrator privileges for the new user, where username is the name of an existing UNIX account: nhmanageusers -add -user username -priv admin To run a secondary console at a remote UNIX workstation: 1. Issue the following command to allow an X server to access your display, where ehealthhost is the name of the ehealth system: xhost +ehealthhost 2. Log in to the ehealth system remotely by entering the following command: rlogin ehealthhost 3. Set the display to appear on your workstation by entering the following, where systemname is the name of the workstation on which you want to display the console: setenv DISPLAY systemname: Do one of the following: If your shell is sh or ksh, source the nethealthrc.sh file. If your shell is csh, source the nethealthrc.csh file. 5. Enter the following command, where ehealth is the full pathname of the ehealth installation directory: ehealth/bin/ehealth -2nd Configuring Secondary Consoles on Windows Systems You must create a new user to run the secondary console. (The same user cannot run both the primary and secondary consoles simultaneously.) If you want to restrict access to these users, you can use Windows access control lists to allow individual or group access. To register an administrator as a database user: 1. Log in as the ehealth user on the ehealth system. 2. Enter the following command to specify administrator privileges for the new user, where username is the user name of the secondary console administrator (the user name must be the name of an existing Windows user account): nhmanageusers -add -user username -priv admin 4

5 Using ehealth Secondary Consoles If you run a secondary console on a Windows system, do not output on-demand or scheduled reports to the screen. If you have installed ehealth on a Windows system, you can obtain and install a Telnet server or Citrix Terminal Services on the ehealth system to support secondary consoles. Using Terminal Services. Terminal servers are systems that run application server software that enables you to deploy and maintain a business-critical application on one server machine (or several servers), while multiple users access and use the application from end-user systems. If you plan to use Terminal Services, you must purchase and install the Exceed X server software. You cannot use XVision, the X server that is installed with ehealth, with Terminal Services. To run a secondary console with Terminal Services: 1. Confirm that Exceed and Terminal Services are installed on the terminal server on which ehealth resides. 2. Through the Control Panel, verify that the Administrative Tools directory includes shortcuts for the following: Terminal Services Client Creator Terminal Services Configuration Terminal Services Licensing Terminal Services Manager 3. Verify that Exceed appears in your list of programs. 4. Confirm that the Terminal Services client is running on the system that you are going to use as a secondary console. 5. Verify that XVision is not running on the Terminal Services server or client systems. If it is, stop the XVision Server. You cannot use it with Terminal Services. 6. Create user accounts for the system and for ehealth on the terminal server. Terminal Services supports a maximum of three users for secondary consoles. 7. Start the Exceed server on the terminal server. 8. Start the primary ehealth console; then start the Terminal Services server. 9. Log in to the remote system (Terminal Services client) and start Exceed in the Terminal Services window. 10.Select Start Run, enter cmd in the Open field, and click OK. 11.Enter the following at the command prompt, where x.x is the value that appeared in the Exceed window: set DISPLAY=:x.x 12.Start the secondary console on this system by entering the following command: ehealth -2nd 5

6 Using ehealth Secondary Consoles Using Telnet. If you are using a Telnet server and the client system (the system on which you want the secondary console to run) is running Windows, you must have an X server running. ehealth Windows installations provide XVision as the X server. To run a secondary console through telnet at a remote Windows workstation: 1. Confirm that the telnet server is installed. 2. Start the XVision server by selecting Start Programs Vision XVision Server, or start the primary ehealth console. 3. Log in to the ehealth system remotely by entering the following command: telnet ehealthhost 4. Set the display to appear on your workstation by entering the following command, where systemname is the name of the workstation on which you want the console to appear: set DISPLAY=systemName: Reset your TMPDIR environment variable by entering the following command, where directoryname is the name of the directory in which you want to create your tmp directory: set TMPDIR=directoryName/eHealth/tmp 6. Enter the following command: ehealth -2nd Copyright 2006 CA. All rights reserved. 6

ehealth SPECTRUM Integration

ehealth SPECTRUM Integration User Guide May 2006 ehealth SPECTRUM Integration Whether you are a large enterprise or a service provider, your operations team faces a significant challenge maintaining critical service levels across

More information

Configuring TACACS+ About TACACS+

Configuring TACACS+ About TACACS+ This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on Cisco NX-OS devices. This chapter includes the following sections: About TACACS+,

More information

8.3.7 New Features Guide Associating Referrings with Studies

8.3.7 New Features Guide Associating Referrings with Studies In version 8.3 of Novarad products, the Referring Physician role has enhanced security. Medical Groups have also been enhanced in this version of Novarad software to comply with increasing HIPAA regulations

More information

ehealth SPECTRUM Integration

ehealth SPECTRUM Integration User Guide March 2007 ehealth SPECTRUM Integration Whether you are a large enterprise or a service provider, your operations team faces a significant challenge maintaining critical service levels across

More information

AAA and the Local Database

AAA and the Local Database This chapter describes authentication, authorization, and accounting (AAA, pronounced triple A ). AAA is a a set of services for controlling access to computer resources, enforcing policies, assessing

More information

Configuring Application Response to Monitor Custom Applications

Configuring Application Response to Monitor Custom Applications Configuring Application Response to Monitor Custom Applications This topic describes the process for configuring ehealth Application Response to monitor the average response times of your business-critical

More information

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+

Configuring TACACS+ Finding Feature Information. Prerequisites for TACACS+ Finding Feature Information, page 1 Prerequisites for TACACS+, page 1 Information About TACACS+, page 3 How to Configure TACACS+, page 7 Monitoring TACACS+, page 16 Finding Feature Information Your software

More information

Setting Up the MPLS VPN Environment

Setting Up the MPLS VPN Environment CHAPTER 2 Cisco VPN Solutions Center: MPLS Solution is an MPLS VPN provisioning and auditing tool. The software focuses on the provider edge routers (PEs), customer edge routers (CEs), and the link between

More information

Installing the L-Series Library Admin and Personality Module on the L180 and L700 Series Libraries

Installing the L-Series Library Admin and Personality Module on the L180 and L700 Series Libraries Installing the L-Series Library Admin and Personality Module on the L180 and L700 Series Libraries The following instructions describe the installation procedures for installing the L-Series Library Admin

More information

Creating Domain Templates Using the Domain Template Builder 11g Release 1 (10.3.6)

Creating Domain Templates Using the Domain Template Builder 11g Release 1 (10.3.6) [1]Oracle Fusion Middleware Creating Domain Templates Using the Domain Template Builder 11g Release 1 (10.3.6) E14139-06 April 2015 This document describes how to use the Domain Template Builder to create

More information

ehealth Administration Overview Guide

ehealth Administration Overview Guide ehealth Administration Overview Guide MN-EHADMOV-001 October 2006 This documentation (the "Documentation") and related computer software program (the "Software") (hereinafter collectively referred to as

More information

CA ehealth Integration for HP OpenView

CA ehealth Integration for HP OpenView CA ehealth Integration for HP OpenView User Guide r6.1 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational

More information

Configuring SAP Targets and Runtime Users

Configuring SAP Targets and Runtime Users CHAPTER 4 Before you can create or run processes in your SAP environment, you must create the targets on which the processes will run. Targets are used to define specific environments where activities,

More information

Installing the Is2 Onsite Version - HVAC Office System

Installing the Is2 Onsite Version - HVAC Office System Installing the Is2 Onsite Version - HVAC Office System This document describes the full onsite server installation of the Is2 database files, the database server, and the application server. The full program

More information

Managing Configurations

Managing Configurations CHAPTER 3 The Configurations page is your starting point for managing device configurations for network elements managed by Cisco Prime Network by using the CM tools. The following table lists the main

More information

Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000

Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000 Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000 Define and set DAC policy (define group membership, set default DAC attributes, set DAC on files systems) Modify

More information

CNR and DHCP FAQs for Cable Environment

CNR and DHCP FAQs for Cable Environment CNR and DHCP FAQs for Cable Environment Document ID: 6184 Contents Introduction How do I access CNR remotely? How do I access CNR remotely if the CNR server is behind a firewall? What is a policy in CNR

More information

SAS Enterprise Guide 4.3

SAS Enterprise Guide 4.3 Administering SAS Enterprise Guide 4.3 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2010. Administering SAS Enterprise Guide 4.3. Cary, NC: SAS

More information

Lesson 1: Preparing for Installation

Lesson 1: Preparing for Installation 2-2 Chapter 2 Installing Windows XP Professional Lesson 1: Preparing for Installation When you install Windows XP Professional, the Windows XP Professional Setup program allows you to specify how to install

More information

Managing Software Images Using Software Management

Managing Software Images Using Software Management CHAPTER 8 Managing Software Images Using Software Management Manually upgrading your devices to the latest software version can be an error-prone, and time-consuming process. To ensure rapid, reliable

More information

ControlPoint. Advanced Installation Guide. September 07,

ControlPoint. Advanced Installation Guide. September 07, ControlPoint Advanced Installation Guide September 07, 2017 www.metalogix.com info@metalogix.com 202.609.9100 Copyright International GmbH., 2008-2017 All rights reserved. No part or section of the contents

More information

Customizing Wizards with Cisco Prime Network Activation Wizard Builder

Customizing Wizards with Cisco Prime Network Activation Wizard Builder CHAPTER 3 Customizing Wizards with Cisco Prime Network Activation Wizard Builder The following topics provide detailed information about customizing Network Activation wizard metadata files using the Cisco

More information

Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording

Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording Contents 1 About This Document... 2 2 Overview... 2 3 Before You Begin... 2 4 Deploying ObserveIT with IBM

More information

Install and Configure the TS Agent

Install and Configure the TS Agent Install the TS Agent, page 1 Start the TS Agent Configuration Interface, page 2 Configure the TS Agent, page 2 Creating the REST VDI Role, page 7 Install the TS Agent Before You Begin Confirm that the

More information

Configure Site Network Settings

Configure Site Network Settings About Global Network Settings, page 1 About Device Credentials, page 2 Configure Global Device Credentials, page 4 Configure IP Address Pools, page 9 Configure Global Network Servers, page 9 Configure

More information

CA ehealth. Setting Up Service Availability 2.0. r6.1

CA ehealth. Setting Up Service Availability 2.0. r6.1 CA ehealth Setting Up Service Availability 2.0 r6.1 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational

More information

RMI ADVANTAGE Desktop User Guide. February 2010

RMI ADVANTAGE Desktop User Guide. February 2010 RMI ADVANTAGE Desktop User Guide February 2010 Table of Contents Contents Logging into the SaaS environment... 3 Logging off the Hosted Desktop... 9 Directories... 10 Wizmo AdminSet... 11 Shadowing a User...

More information

CA Productivity Accelerator v Single User Installation

CA Productivity Accelerator v Single User Installation v12.1.0.2 Single User Installation Congratulations on your purchase of the (CA PA). This document will provide you with the information you will need to install the Single User Editor (or Developer) and

More information

CA Spectrum. Remote Operations Suite User Guide. Release 9.3

CA Spectrum. Remote Operations Suite User Guide. Release 9.3 CA Spectrum Remote Operations Suite User Guide Release 9.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

CA ehealth and CA SPECTRUM

CA ehealth and CA SPECTRUM CA ehealth and CA SPECTRUM Integration and User Guide (5177) ehealth r6.1 / SPECTRUM r9.0 This documentation and any related computer software help programs (hereinafter referred to as the Documentation

More information

User and System Administration

User and System Administration CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays

More information

StarQuest Client Access for UNIX. User s Guide

StarQuest Client Access for UNIX. User s Guide StarQuest Client Access for UNIX OS User s Guide April 1997 Table Of Contents About Client Access for UNIX OS... 5 About Installing Client Access for UNIX OS... 7 Before You Begin... 9 Running the Program...

More information

Install and Configure the TS Agent

Install and Configure the TS Agent Install or Upgrade the TS Agent, page 1 Start the TS Agent Configuration Interface, page 2 Configure the TS Agent, page 2 Creating the REST VDI Role, page 7 Install or Upgrade the TS Agent Before You Begin

More information

Working with the Cisco IOS File System, Configuration Files, and Software Images

Working with the Cisco IOS File System, Configuration Files, and Software Images APPENDIXB Working with the Cisco IOS File System, Configuration Files, and Software Images This appendix describes how to manipulate the Catalyst 2960 switch flash file system, how to copy configuration

More information

Administering SAS Enterprise Guide 4.2

Administering SAS Enterprise Guide 4.2 Administering SAS Enterprise Guide 4.2 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. Administering SAS Enterprise Guide 4.2. Cary, NC: SAS

More information

How to create a System Logon Account in Backup Exec for Windows Servers

How to create a System Logon Account in Backup Exec for Windows Servers How to create a System Logon Account in Backup Exec for Windows Servers Problem How to create a System Logon Account in Backup Exec for Windows Servers Solution The Backup Exec System Logon Account (SLA)

More information

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003

Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts,

More information

Upgrading the Secure Access Unified ID System to Equitrac Office Equitrac Corporation

Upgrading the Secure Access Unified ID System to Equitrac Office Equitrac Corporation Upgrading the Secure Access Unified ID System to Equitrac Office 4.2.0 2010 Equitrac Corporation Upgrading the Xerox Secure Access Unified ID System to Equitrac Office 4.2.0 Document Revision History Revision

More information

NetIQ Advanced Authentication Framework. Deployment Guide. Version 5.1.0

NetIQ Advanced Authentication Framework. Deployment Guide. Version 5.1.0 NetIQ Advanced Authentication Framework Deployment Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 NetIQ Advanced Authentication Framework Deployment 4

More information

Module 4: Access Control

Module 4: Access Control Module 4: Access Control Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University, Jackson, MS 39232 E-mail: natarajan.meghanathan@jsums.edu Access Control In general,

More information

48-Port 10/100/1000Base-T with 4 Shared SFP. Managed Gigabit Switch WGSW Quick Installation Guide

48-Port 10/100/1000Base-T with 4 Shared SFP. Managed Gigabit Switch WGSW Quick Installation Guide 48-Port 10/100/1000Base-T with 4 Shared SFP Managed Gigabit Switch WGSW-48000 Quick Installation Guide Table of Contents 1. Package Content... 3 2. Requirements... 4 3. Terminal Setup... 5 4. Logon to

More information

Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+)

Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+) Finding Feature Information, page 1 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), page 1 Information About TACACS+, page 3 How to Configure

More information

WAVELINK AVALANCHE REMOTE CONTROL 3.0 QUICK START GUIDE

WAVELINK AVALANCHE REMOTE CONTROL 3.0 QUICK START GUIDE This document provides information about using Remote Control to connect to mobile devices. OVERVIEW This document contains the following sections: Overview Installing the Remote Control Setup Kit Activating

More information

Logging in through SNMP from an NMS 22 Overview 22 Configuring SNMP agent 22 NMS login example 24

Logging in through SNMP from an NMS 22 Overview 22 Configuring SNMP agent 22 NMS login example 24 Contents Logging in to the CLI 1 Login methods 1 Logging in through the console or AUX port 2 Introduction 2 Configuration procedure 2 Logging in through Telnet 6 Introduction 6 Logging in to the switch

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

Configuring the CSS as a Client of a TACACS+ Server

Configuring the CSS as a Client of a TACACS+ Server CHAPTER 4 Configuring the CSS as a Client of a TACACS+ Server The Terminal Access Controller Access Control System (TACACS+) protocol provides access control for routers, network access servers (NAS),

More information

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE

Quick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE Page 1 of 35 Quick Start Guide TABLE OF CONTENTS This Quick Start Guide is designed to help you install and use a CommCell configuration to which you can later add other components. COMMCELL ARCHITECTURE

More information

Management Security Switch SGSD-1022 / SGSD-1022P SGSW-2840 / SGSW-2840P. Quick Installation Guide

Management Security Switch SGSD-1022 / SGSD-1022P SGSW-2840 / SGSW-2840P. Quick Installation Guide Management Security Switch SGSD-1022 / SGSD-1022P SGSW-2840 / SGSW-2840P Quick Installation Guide Table of Contents 1. Package Content... 3 2. Requirements... 4 3. Terminal Setup... 5 4. Logon to the Console...

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

Data Privilege Adding or Removing Members

Data Privilege Adding or Removing Members Data Privilege allows you to add or remove Members, aka Users, (individuals permitted to access all or portions of a group s resources) from any security group for which you are an Owner or an Authorizer.

More information

Using the Offline Diagnostic Monitor Menu

Using the Offline Diagnostic Monitor Menu APPENDIX B Using the Offline Diagnostic Monitor Menu During the boot process, you can access the Offline Diagnostic Monitor (Offline DM) Main menu. The Offline DM Main menu allows you to perform the following

More information

GSS Administration and Troubleshooting

GSS Administration and Troubleshooting CHAPTER 9 GSS Administration and Troubleshooting This chapter covers the procedures necessary to properly manage and maintain your GSSM and GSS devices, including login security, software upgrades, GSSM

More information

Installing and Configuring the TS Agent

Installing and Configuring the TS Agent Installing the TS Agent, page 1 Starting the TS Agent Configuration Interface, page 2 Configuring the TS Agent, page 2 Creating the REST VDI Role, page 7 Installing the TS Agent Before You Begin Confirm

More information

VMware Horizon Migration Tool User Guide

VMware Horizon Migration Tool User Guide VMware Horizon Migration Tool User Guide Version 3.0.0 August 2017 VMware End User Computing 1/31 @2017 VMware, Inc. All rights reserved. @2017 VMware, Inc. All rights reserved. This product is protected

More information

About shells and command lines

About shells and command lines About shells and command lines Computer Literacy 1 Lecture 6 06/10/2008 Topics General Shell and its name GUI Shells CLI Shells Shell Commands for Windows Shell Commands for UNIX SSH 1 The Shell Shell

More information

ODBC INSTALLATION Operating System: Windows Bit

ODBC INSTALLATION Operating System: Windows Bit ODBC INSTALLATION Operating System: Windows 10 64-Bit This is documentation that will guide you through installing ODBC on a Windows 10 64-Bit Operating System. It is also VERY IMPORTANT that no one is

More information

Centrify Infrastructure Services

Centrify Infrastructure Services Centrify Infrastructure Services License Management Administrator s Guide December 2018 (release 18.11) Centrify Corporation Legal Notice This document and the software described in this document are furnished

More information

Configuring Management Access

Configuring Management Access 37 CHAPTER This chapter describes how to access the ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, how to create login banners, and how

More information

Intrusion Detection and Prevention IDP 4.1r4 Release Notes

Intrusion Detection and Prevention IDP 4.1r4 Release Notes Intrusion Detection and Prevention IDP 4.1r4 Release Notes Build 4.1.134028 September 22, 2009 Revision 02 Contents Overview...2 Supported Hardware...2 Changed Features...2 IDP OS Directory Structure...2

More information

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support...

High Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support... Quick Start Guide Table of Contents Overview... 4 Deployment... 4 System Requirements... 4 Installation... 6 Working with AD360... 8 Starting AD360... 8 Launching AD360 client... 9 Stopping AD360... 9

More information

Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M

Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M Topics: TACACS+ Authentication for Centralized Control of Switch Access Security (page 7) CDP (page

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

Configuring Security Features on an External AAA Server

Configuring Security Features on an External AAA Server CHAPTER 3 Configuring Security Features on an External AAA Server The authentication, authorization, and accounting (AAA) feature verifies the identity of, grants access to, and tracks the actions of users

More information

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902 Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

16/24/48-Port 10/100/1000T + 2/4-Port 100/1000X SFP Managed Switch GS T2S/GS T2S/GS T4S. Quick Installation Guide

16/24/48-Port 10/100/1000T + 2/4-Port 100/1000X SFP Managed Switch GS T2S/GS T2S/GS T4S. Quick Installation Guide 16/24/48-Port 10/100/1000T + 2/4-Port 100/1000X SFP Managed Switch GS-4210-16T2S/GS-4210-24T2S/GS-4210-48T4S Quick Installation Guide Table of Contents 1. Package Contents... 3 2. Requirements... 4 3.

More information

Examples of Cisco APE Scenarios

Examples of Cisco APE Scenarios CHAPTER 5 This chapter describes three example scenarios with which to use Cisco APE: Access to Asynchronous Lines, page 5-1 Cisco IOS Shell, page 5-3 Command Authorization, page 5-5 Note For intructions

More information

VMware AirWatch Certificate Authentication for EAS with ADCS

VMware AirWatch Certificate Authentication for EAS with ADCS VMware AirWatch Certificate Authentication for EAS with ADCS For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

16/24-Port 10/100/1000T 802.3at PoE + 2-Port 100/1000X SFP Managed Switch GS P2S GS P2S. Quick Installation Guide

16/24-Port 10/100/1000T 802.3at PoE + 2-Port 100/1000X SFP Managed Switch GS P2S GS P2S. Quick Installation Guide 16/24-Port 10/100/1000T 802.3at PoE + 2-Port 100/1000X SFP Managed Switch GS-4210-16P2S GS-4210-24P2S Quick Installation Guide Table of Contents 1. Package Contents... 3 2. Requirements... 4 3. Terminal

More information

Administrator for Enterprise Clients: User s Guide. Second Edition

Administrator for Enterprise Clients: User s Guide. Second Edition Administrator for Enterprise Clients: User s Guide Second Edition The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2002. Administrator for Enterprise Clients: User s

More information

Client Portal Training Manual

Client Portal Training Manual Nexsure Training Manual Client Portal Training Manual Version 2.1.3 Page Nexsure Training Manual 2011 XDimensional Technologies, Inc. All rights reserved. No part of this documentation shall be reproduced,

More information

How to install the software of ZNS8022

How to install the software of ZNS8022 How to install the software of ZNS8022 1. Please connect ZNS8022 to your PC after finished assembly. 2. Insert Installation CD to your CD-ROM drive and initiate the auto-run program. The wizard will run

More information

Using ANM With Virtual Data Centers

Using ANM With Virtual Data Centers APPENDIXB Date: 3/8/10 This appendix describes how to integrate ANM with VMware vcenter Server, which is a third-party product for creating and managing virtual data centers. Using VMware vsphere Client,

More information

Configuring Communication Services

Configuring Communication Services This chapter includes the following sections: Configuring HTTP, on page 1 Configuring SSH, on page 2 Configuring XML API, on page 3 Enabling Redfish, on page 3 Configuring IPMI, on page 4 Configuring SNMP,

More information

Configuring the Management Interface and Security

Configuring the Management Interface and Security CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various

More information

Configure a Cisco Router with TACACS+ Authentication

Configure a Cisco Router with TACACS+ Authentication Configure a Cisco Router with TACACS+ Authentication Document ID: 13865 Contents Introduction Prerequisites Requirements Components Used Conventions Authentication Add Authorization Add Accounting Test

More information

Privileged Remote Access Jumpoint Guide

Privileged Remote Access Jumpoint Guide Privileged Remote Access Jumpoint Guide 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of their respective

More information

Command-Line Interfaces

Command-Line Interfaces CHAPTER 2 This chapter describes the CLIs you use to configure the Catalyst 4500 series switch. This chapter includes the following major sections: Accessing the Switch CLI, page 2-2 Performing Command-Line

More information

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM)

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...

More information

Managing GSS User Accounts Through a TACACS+ Server

Managing GSS User Accounts Through a TACACS+ Server 4 CHAPTER Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System

More information

RSA Authentication Manager 7.1 Help Desk Administrator s Guide

RSA Authentication Manager 7.1 Help Desk Administrator s Guide RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

Oracle WebLogic Server

Oracle WebLogic Server Oracle WebLogic Server Creating WebLogic Domains Using the Configuration Wizard 10g Release 3 (10.1.3) August 2008 Oracle WebLogic Server Creating WebLogic Domains Using the Configuration Wizard, 10g Release

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Nortel Quality Monitoring Search and Replay Guide

Nortel Quality Monitoring Search and Replay Guide Nortel Quality Monitoring Search and Replay Guide NN44480-106 Product release 7.0 Standard 02.02 November 2009 Nortel Quality Monitoring Search and Replay Guide Publication number: NN44480-106 Product

More information

28-Port 10/100/1000Mbps with. 4 Shared SFP Managed Gigabit Switch WGSW / WGSW-28040P. Quick Installation Guide

28-Port 10/100/1000Mbps with. 4 Shared SFP Managed Gigabit Switch WGSW / WGSW-28040P. Quick Installation Guide 28-Port 10/100/1000Mbps with 4 Shared SFP Managed Gigabit Switch WGSW-28040 / WGSW-28040P Quick Installation Guide Table of Contents 1. Package Content... 3 2. Requirements... 4 3. Terminal Setup... 5

More information

DIL/NetPC DNP/9200 Board Revision 1.1 Installing an SSH Connection User Manual

DIL/NetPC DNP/9200 Board Revision 1.1 Installing an SSH Connection User Manual DIL/NetPC DNP/9200 Board Revision 1.1 Installing an SSH Connection User Manual SSV Embedded Systems Heisterbergallee 72 D-30453 Hannover Phone: +49 (0)511/40 000-0 Fax: +49 (0)511/40 000-40 E-mail: sales@ist1.de

More information

Performing an ObserveIT Upgrade Using the Interactive Installer

Performing an ObserveIT Upgrade Using the Interactive Installer Performing an ObserveIT Upgrade Using the Interactive Installer ABOUT THIS DOCUMENT This document contains detailed procedures and instructions on how to upgrade ObserveIT by using the interactive "One

More information

TIBCO ActiveMatrix Adapter for Amdocs CRM Installation. Software Release 5.5 July 2012

TIBCO ActiveMatrix Adapter for Amdocs CRM Installation. Software Release 5.5 July 2012 TIBCO ActiveMatrix Adapter for Amdocs CRM Installation Software Release 5.5 July 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO

More information

Configuring Authentication, Authorization, and Accounting

Configuring Authentication, Authorization, and Accounting Configuring Authentication, Authorization, and Accounting This chapter contains the following sections: Information About AAA, page 1 Prerequisites for Remote AAA, page 5 Guidelines and Limitations for

More information

Configuring Authorization

Configuring Authorization Configuring Authorization AAA authorization enables you to limit the services available to a user. When AAA authorization is enabled, the network access server uses information retrieved from the user

More information

KYOCERA Net Admin User Guide

KYOCERA Net Admin User Guide KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable

More information

Server License Activation and Administration Guide. Lavastorm Analytics Engine

Server License Activation and Administration Guide. Lavastorm Analytics Engine Server License Activation and Administration Guide Lavastorm Analytics Engine Lavastorm Analytics Engine: Server License Activation and Administration Guide Legal notice Copyright THE CONTENTS OF THIS

More information

Multiple Context Mode

Multiple Context Mode This chapter describes how to configure multiple security contexts on the Cisco ASA. About Security Contexts, page 1 Licensing for, page 12 Prerequisites for, page 13 Guidelines for, page 14 Defaults for,

More information

Mercury WinRunner. Installation Guide Version 9.2. Document Release Date: February 26, 2007

Mercury WinRunner. Installation Guide Version 9.2. Document Release Date: February 26, 2007 Mercury WinRunner Installation Guide Version 9.2 Document Release Date: February 26, 2007 Mercury WinRunner Installation Guide, Version 9.2 This document, and the accompanying software and other documentation,

More information

CA Spectrum. Operator Guide. Release 9.2.3

CA Spectrum. Operator Guide. Release 9.2.3 CA Spectrum Operator Guide Release 9.2.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

Configuring Switch-Based Authentication

Configuring Switch-Based Authentication CHAPTER 7 This chapter describes how to configure switch-based authentication on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. This chapter consists

More information

RED IM Integration with Bomgar Privileged Access

RED IM Integration with Bomgar Privileged Access RED IM Integration with Bomgar Privileged Access 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the

More information

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.2

Wavelink Avalanche Mobility Center Java Console User Guide. Version 5.2 Wavelink Avalanche Mobility Center Java Console User Guide Version 5.2 Revised 27/09/2011 ii Copyright 2011 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway,

More information

Remote Support Jumpoint Guide: Unattended Access to Computers in a Network 4. Recommended Steps to Implement Bomgar Jump Technology 5

Remote Support Jumpoint Guide: Unattended Access to Computers in a Network 4. Recommended Steps to Implement Bomgar Jump Technology 5 Jumpoint Guide 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective owners.

More information

Nimsoft Monitor. hpovsdgtw Guide. v1.2 series

Nimsoft Monitor. hpovsdgtw Guide. v1.2 series Nimsoft Monitor hpovsdgtw Guide v1.2 series Legal Notices Copyright 2012, Nimsoft Corporation Warranty The material contained in this document is provided "as is," and is subject to being changed, without

More information

TM1 9.0 SP2 UNIX Installation Help

TM1 9.0 SP2 UNIX Installation Help TM1 9.0 SP2 UNIX Installation Help Table of Contents TM1 Installation for UNIX...1 This document is a printed version of the online help available from the Applix Installation Wizard.Welcome to the Applix

More information