Using Secondary ehealth Consoles
|
|
- Geoffrey Henry
- 6 years ago
- Views:
Transcription
1 Using Secondary ehealth Consoles If you have several ehealth administrators at your site, each administrator can use an ehealth console to perform administrative tasks. The primary ehealth console and any of the secondary consoles can run at local or remote workstations. Through the primary console, administrators can perform all administrative- and user-level ehealth tasks. Administrators can use secondary consoles to perform a subset of the primary console tasks. This chapter provides detailed guidelines and best practices for operating multiple ehealth consoles (these guidelines do not apply to the use of the OneClick for ehealth Console). Performing Tasks Using Multiple Consoles When multiple consoles are in use, the first administrator who attempts to perform a task obtains read-write access for that task. Subsequent admins who attempt to perform the same task (regardless of which console the administrator is using) is given read-only access or is prevented from accessing a dialog that is being used by another administrator. You can allow administrators who might have responsibility for specific users (such as customers) to perform the following tasks for those users from secondary consoles: Discover resources within your network infrastructure. Edit or delete elements. Schedule jobs. Schedule, customize, and run reports. View license information. From the secondary console, an administrator can access some dialogs with restrictions. Table 1 describes the restrictions that apply to the use of the Discover and Poller Configuration (Poller Config) dialogs. Table 1. Restrictions on the Use of the Discover and Poller Configuration Dialogs Administrative Action Administrator opens Discover dialog from the primary console or a secondary console Administrator opens Poller Configuration dialog from the primary console or a secondary console Restrictions Discover dialog and the Poller Config dialog are not accessible from the other console. Poller Config dialog is accessible in read-only mode from a secondary console. Discover dialog is not accessible from both consoles. Poller Config dialog is accessible in read-only mode from the other console, unless you have filtered both consoles to show different groups. If you have specified different element filters for both consoles from the console that you are using you can access the Poller Config in read-write mode for the group that is not appearing in the other console. It displays the elements for the group on which you are filtering only. If you have specified a filter on only one of the consoles or the same filter on both consoles, you can access the Poller Config for the other in read-only mode only. ehealth Release 6.0 October 2006
2 Using Secondary ehealth Consoles Table 2 explains how an open Discover or Poller Config dialog affects your ability to view or modify element information from the other dialogs on the primary and secondary consoles. Table 2. Discover and Poller Configuration Dialog Restrictions with Secondary Consoles Primary Console Discover Dialog Primary Console Filter Primary Console Poller Config Dialog Secondary Console Discover Dialog Secondary Console Filter Secondary Console Poller Config Dialog Open N/A Inaccessible Inaccessible N/A Read-only mode Inaccessible N/A Read-only mode Open N/A Inaccessible Inaccessible None Open Inaccessible None Read-only Inaccessible None Read-only Inaccessible None Open Inaccessible Group A Open Inaccessible None Read-only Inaccessible Group A Open Inaccessible Group A Read-only Inaccessible Group A Open Inaccessible Group B Read-write Inaccessible Group A Read-write Inaccessible Group B Open Inaccessible None Read-only Inaccessible Group B Open Inaccessible Group B Read-only Inaccessible Group B Open ehealth displays messages to indicate whether you have read-only access, or to indicate that you cannot open a dialog. It also displays messages in each console about changes that all administrators are making. Discovering Elements ehealth permits a discover process to run from only one console at one time. When several ehealth administrators are logged into the ehealth system, the first administrator to open the Discover dialog can run the discover, and the other administrators receive a message that they cannot run a discover process. They will have read-only access to the Poller Configuration, Poller Controls, and Options dialogs. Managing the Poller Configuration Only one ehealth administrator at a time can open the Poller Configuration dialog for editing, unless each console has specified the name of a group on which to filter. For both consoles to have read-write access, the group filters specified in the Set Element Filter field in the Options dialog must be unique. If element filters are not set, and a secondary administrator attempts to open the Poller Configuration dialog while an administrator is editing it, ehealth notifies the secondary administrator that the dialog can be opened in read-only mode only. The secondary administrator can then view it, but cannot modify it. If each console has a unique group specified in the Set Element Filter field, administrators can open their Poller Configuration dialogs to edit the elements in the groups they specified in the Set Element Filter field, even if other administrators are simultaneously modifying other groups of elements. 2
3 Using ehealth Secondary Consoles The first administrator to open the Poller Configuration dialog automatically receives read-write access. Other administrators who attempt to open the dialog while it is open are granted read-only access. Two administrators cannot work on the same group of elements or reports simultaneously. Administrators can, however, use element filters to display only the groups for which they are responsible in the Poller Configuration dialog, thus ensuring that they can modify the elements for which they are responsible while other administrators modify their own elements. NOTE: Element filtering enables administrators to edit different groups at the same time. Because ehealth permits the same element to exist in more than one group, one administrator could overwrite changes made concurrently by another administrator. Therefore, take precautions to prevent two administrators from modifying the same elements at the same time. Setting Other Global Options. You can set global console options to show alias names instead of element names and specify report time zones. When you change the settings for the time zone and alias name fields in a secondary ehealth console, the settings are not preserved for any subsequent console sessions. The global settings only apply to the console in which you apply them; that is, if you set an option in the primary console, it is not automatically enabled in the secondary console. Scheduling Jobs An ehealth administrator who uses a secondary console cannot modify scheduled system jobs. The primary ehealth administrator is responsible for managing the database and performing these functions. If two ehealth administrators modify the same scheduled job at the same time, ehealth saves only the changes that were saved last. It overwrites the changes that were saved first. Configuring Secondary Consoles on UNIX Systems Before allowing other administrators to run ehealth at a secondary console, note the following restrictions. If you have installed ehealth on a UNIX system and you allow remote administrators access using secondary consoles, you must grant write permission to those other users. You must add the secondary console administrators to the UNIX user group to which the primary ehealth user account belongs. Specify group write permissions for the following directories (and their subdirectories) in your ehealth installation: help log output poller reports tmp web/output ehealth/extensions/auto To run a secondary console, each administrator must do the following: Log in as a different user (each ehealth administrator must use a unique user name). Obtain read and write access permissions on ehealth directories to create, read, or modify a report or temporary file. 3
4 Using Secondary ehealth Consoles To register another administrator as a database user: 1. Log in as the ehealth user (the name by which you or other administrators access ehealth) on the ehealth system. 2. Do one of the following: If your shell is sh or ksh, source the nethealthrc.sh file. If your shell is csh, source the nethealthrc.csh file. 3. Enter the following command to specify administrator privileges for the new user, where username is the name of an existing UNIX account: nhmanageusers -add -user username -priv admin To run a secondary console at a remote UNIX workstation: 1. Issue the following command to allow an X server to access your display, where ehealthhost is the name of the ehealth system: xhost +ehealthhost 2. Log in to the ehealth system remotely by entering the following command: rlogin ehealthhost 3. Set the display to appear on your workstation by entering the following, where systemname is the name of the workstation on which you want to display the console: setenv DISPLAY systemname: Do one of the following: If your shell is sh or ksh, source the nethealthrc.sh file. If your shell is csh, source the nethealthrc.csh file. 5. Enter the following command, where ehealth is the full pathname of the ehealth installation directory: ehealth/bin/ehealth -2nd Configuring Secondary Consoles on Windows Systems You must create a new user to run the secondary console. (The same user cannot run both the primary and secondary consoles simultaneously.) If you want to restrict access to these users, you can use Windows access control lists to allow individual or group access. To register an administrator as a database user: 1. Log in as the ehealth user on the ehealth system. 2. Enter the following command to specify administrator privileges for the new user, where username is the user name of the secondary console administrator (the user name must be the name of an existing Windows user account): nhmanageusers -add -user username -priv admin 4
5 Using ehealth Secondary Consoles If you run a secondary console on a Windows system, do not output on-demand or scheduled reports to the screen. If you have installed ehealth on a Windows system, you can obtain and install a Telnet server or Citrix Terminal Services on the ehealth system to support secondary consoles. Using Terminal Services. Terminal servers are systems that run application server software that enables you to deploy and maintain a business-critical application on one server machine (or several servers), while multiple users access and use the application from end-user systems. If you plan to use Terminal Services, you must purchase and install the Exceed X server software. You cannot use XVision, the X server that is installed with ehealth, with Terminal Services. To run a secondary console with Terminal Services: 1. Confirm that Exceed and Terminal Services are installed on the terminal server on which ehealth resides. 2. Through the Control Panel, verify that the Administrative Tools directory includes shortcuts for the following: Terminal Services Client Creator Terminal Services Configuration Terminal Services Licensing Terminal Services Manager 3. Verify that Exceed appears in your list of programs. 4. Confirm that the Terminal Services client is running on the system that you are going to use as a secondary console. 5. Verify that XVision is not running on the Terminal Services server or client systems. If it is, stop the XVision Server. You cannot use it with Terminal Services. 6. Create user accounts for the system and for ehealth on the terminal server. Terminal Services supports a maximum of three users for secondary consoles. 7. Start the Exceed server on the terminal server. 8. Start the primary ehealth console; then start the Terminal Services server. 9. Log in to the remote system (Terminal Services client) and start Exceed in the Terminal Services window. 10.Select Start Run, enter cmd in the Open field, and click OK. 11.Enter the following at the command prompt, where x.x is the value that appeared in the Exceed window: set DISPLAY=:x.x 12.Start the secondary console on this system by entering the following command: ehealth -2nd 5
6 Using ehealth Secondary Consoles Using Telnet. If you are using a Telnet server and the client system (the system on which you want the secondary console to run) is running Windows, you must have an X server running. ehealth Windows installations provide XVision as the X server. To run a secondary console through telnet at a remote Windows workstation: 1. Confirm that the telnet server is installed. 2. Start the XVision server by selecting Start Programs Vision XVision Server, or start the primary ehealth console. 3. Log in to the ehealth system remotely by entering the following command: telnet ehealthhost 4. Set the display to appear on your workstation by entering the following command, where systemname is the name of the workstation on which you want the console to appear: set DISPLAY=systemName: Reset your TMPDIR environment variable by entering the following command, where directoryname is the name of the directory in which you want to create your tmp directory: set TMPDIR=directoryName/eHealth/tmp 6. Enter the following command: ehealth -2nd Copyright 2006 CA. All rights reserved. 6
ehealth SPECTRUM Integration
User Guide May 2006 ehealth SPECTRUM Integration Whether you are a large enterprise or a service provider, your operations team faces a significant challenge maintaining critical service levels across
More informationConfiguring TACACS+ About TACACS+
This chapter describes how to configure the Terminal Access Controller Access Control System Plus (TACACS+) protocol on Cisco NX-OS devices. This chapter includes the following sections: About TACACS+,
More information8.3.7 New Features Guide Associating Referrings with Studies
In version 8.3 of Novarad products, the Referring Physician role has enhanced security. Medical Groups have also been enhanced in this version of Novarad software to comply with increasing HIPAA regulations
More informationehealth SPECTRUM Integration
User Guide March 2007 ehealth SPECTRUM Integration Whether you are a large enterprise or a service provider, your operations team faces a significant challenge maintaining critical service levels across
More informationAAA and the Local Database
This chapter describes authentication, authorization, and accounting (AAA, pronounced triple A ). AAA is a a set of services for controlling access to computer resources, enforcing policies, assessing
More informationConfiguring Application Response to Monitor Custom Applications
Configuring Application Response to Monitor Custom Applications This topic describes the process for configuring ehealth Application Response to monitor the average response times of your business-critical
More informationConfiguring TACACS+ Finding Feature Information. Prerequisites for TACACS+
Finding Feature Information, page 1 Prerequisites for TACACS+, page 1 Information About TACACS+, page 3 How to Configure TACACS+, page 7 Monitoring TACACS+, page 16 Finding Feature Information Your software
More informationSetting Up the MPLS VPN Environment
CHAPTER 2 Cisco VPN Solutions Center: MPLS Solution is an MPLS VPN provisioning and auditing tool. The software focuses on the provider edge routers (PEs), customer edge routers (CEs), and the link between
More informationInstalling the L-Series Library Admin and Personality Module on the L180 and L700 Series Libraries
Installing the L-Series Library Admin and Personality Module on the L180 and L700 Series Libraries The following instructions describe the installation procedures for installing the L-Series Library Admin
More informationCreating Domain Templates Using the Domain Template Builder 11g Release 1 (10.3.6)
[1]Oracle Fusion Middleware Creating Domain Templates Using the Domain Template Builder 11g Release 1 (10.3.6) E14139-06 April 2015 This document describes how to use the Domain Template Builder to create
More informationehealth Administration Overview Guide
ehealth Administration Overview Guide MN-EHADMOV-001 October 2006 This documentation (the "Documentation") and related computer software program (the "Software") (hereinafter collectively referred to as
More informationCA ehealth Integration for HP OpenView
CA ehealth Integration for HP OpenView User Guide r6.1 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational
More informationConfiguring SAP Targets and Runtime Users
CHAPTER 4 Before you can create or run processes in your SAP environment, you must create the targets on which the processes will run. Targets are used to define specific environments where activities,
More informationInstalling the Is2 Onsite Version - HVAC Office System
Installing the Is2 Onsite Version - HVAC Office System This document describes the full onsite server installation of the Is2 database files, the database server, and the application server. The full program
More informationManaging Configurations
CHAPTER 3 The Configurations page is your starting point for managing device configurations for network elements managed by Cisco Prime Network by using the CM tools. The following table lists the main
More informationSetting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000
Setting Access Controls on Files, Folders, Shares, and Other System Objects in Windows 2000 Define and set DAC policy (define group membership, set default DAC attributes, set DAC on files systems) Modify
More informationCNR and DHCP FAQs for Cable Environment
CNR and DHCP FAQs for Cable Environment Document ID: 6184 Contents Introduction How do I access CNR remotely? How do I access CNR remotely if the CNR server is behind a firewall? What is a policy in CNR
More informationSAS Enterprise Guide 4.3
Administering SAS Enterprise Guide 4.3 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc 2010. Administering SAS Enterprise Guide 4.3. Cary, NC: SAS
More informationLesson 1: Preparing for Installation
2-2 Chapter 2 Installing Windows XP Professional Lesson 1: Preparing for Installation When you install Windows XP Professional, the Windows XP Professional Setup program allows you to specify how to install
More informationManaging Software Images Using Software Management
CHAPTER 8 Managing Software Images Using Software Management Manually upgrading your devices to the latest software version can be an error-prone, and time-consuming process. To ensure rapid, reliable
More informationControlPoint. Advanced Installation Guide. September 07,
ControlPoint Advanced Installation Guide September 07, 2017 www.metalogix.com info@metalogix.com 202.609.9100 Copyright International GmbH., 2008-2017 All rights reserved. No part or section of the contents
More informationCustomizing Wizards with Cisco Prime Network Activation Wizard Builder
CHAPTER 3 Customizing Wizards with Cisco Prime Network Activation Wizard Builder The following topics provide detailed information about customizing Network Activation wizard metadata files using the Cisco
More informationIntegrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording
Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording Contents 1 About This Document... 2 2 Overview... 2 3 Before You Begin... 2 4 Deploying ObserveIT with IBM
More informationInstall and Configure the TS Agent
Install the TS Agent, page 1 Start the TS Agent Configuration Interface, page 2 Configure the TS Agent, page 2 Creating the REST VDI Role, page 7 Install the TS Agent Before You Begin Confirm that the
More informationConfigure Site Network Settings
About Global Network Settings, page 1 About Device Credentials, page 2 Configure Global Device Credentials, page 4 Configure IP Address Pools, page 9 Configure Global Network Servers, page 9 Configure
More informationCA ehealth. Setting Up Service Availability 2.0. r6.1
CA ehealth Setting Up Service Availability 2.0 r6.1 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational
More informationRMI ADVANTAGE Desktop User Guide. February 2010
RMI ADVANTAGE Desktop User Guide February 2010 Table of Contents Contents Logging into the SaaS environment... 3 Logging off the Hosted Desktop... 9 Directories... 10 Wizmo AdminSet... 11 Shadowing a User...
More informationCA Productivity Accelerator v Single User Installation
v12.1.0.2 Single User Installation Congratulations on your purchase of the (CA PA). This document will provide you with the information you will need to install the Single User Editor (or Developer) and
More informationCA Spectrum. Remote Operations Suite User Guide. Release 9.3
CA Spectrum Remote Operations Suite User Guide Release 9.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationCA ehealth and CA SPECTRUM
CA ehealth and CA SPECTRUM Integration and User Guide (5177) ehealth r6.1 / SPECTRUM r9.0 This documentation and any related computer software help programs (hereinafter referred to as the Documentation
More informationUser and System Administration
CHAPTER 2 This chapter provides information about performing user and system administration tasks and generating diagnostic information for obtaining technical assistance. The top-level Admin window displays
More informationStarQuest Client Access for UNIX. User s Guide
StarQuest Client Access for UNIX OS User s Guide April 1997 Table Of Contents About Client Access for UNIX OS... 5 About Installing Client Access for UNIX OS... 7 Before You Begin... 9 Running the Program...
More informationInstall and Configure the TS Agent
Install or Upgrade the TS Agent, page 1 Start the TS Agent Configuration Interface, page 2 Configure the TS Agent, page 2 Creating the REST VDI Role, page 7 Install or Upgrade the TS Agent Before You Begin
More informationWorking with the Cisco IOS File System, Configuration Files, and Software Images
APPENDIXB Working with the Cisco IOS File System, Configuration Files, and Software Images This appendix describes how to manipulate the Catalyst 2960 switch flash file system, how to copy configuration
More informationAdministering SAS Enterprise Guide 4.2
Administering SAS Enterprise Guide 4.2 SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2009. Administering SAS Enterprise Guide 4.2. Cary, NC: SAS
More informationHow to create a System Logon Account in Backup Exec for Windows Servers
How to create a System Logon Account in Backup Exec for Windows Servers Problem How to create a System Logon Account in Backup Exec for Windows Servers Solution The Backup Exec System Logon Account (SLA)
More informationNetworks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003
Networks: Access Management Windows NT Server Class Notes # 10 Administration October 24, 2003 In Windows NT server, the user manager for domains is the primary administrative tool for managing user accounts,
More informationUpgrading the Secure Access Unified ID System to Equitrac Office Equitrac Corporation
Upgrading the Secure Access Unified ID System to Equitrac Office 4.2.0 2010 Equitrac Corporation Upgrading the Xerox Secure Access Unified ID System to Equitrac Office 4.2.0 Document Revision History Revision
More informationNetIQ Advanced Authentication Framework. Deployment Guide. Version 5.1.0
NetIQ Advanced Authentication Framework Deployment Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 NetIQ Advanced Authentication Framework Deployment 4
More informationModule 4: Access Control
Module 4: Access Control Dr. Natarajan Meghanathan Associate Professor of Computer Science Jackson State University, Jackson, MS 39232 E-mail: natarajan.meghanathan@jsums.edu Access Control In general,
More information48-Port 10/100/1000Base-T with 4 Shared SFP. Managed Gigabit Switch WGSW Quick Installation Guide
48-Port 10/100/1000Base-T with 4 Shared SFP Managed Gigabit Switch WGSW-48000 Quick Installation Guide Table of Contents 1. Package Content... 3 2. Requirements... 4 3. Terminal Setup... 5 4. Logon to
More informationPrerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+)
Finding Feature Information, page 1 Prerequisites for Controlling Switch Access with Terminal Access Controller Access Control System Plus (TACACS+), page 1 Information About TACACS+, page 3 How to Configure
More informationWAVELINK AVALANCHE REMOTE CONTROL 3.0 QUICK START GUIDE
This document provides information about using Remote Control to connect to mobile devices. OVERVIEW This document contains the following sections: Overview Installing the Remote Control Setup Kit Activating
More informationLogging in through SNMP from an NMS 22 Overview 22 Configuring SNMP agent 22 NMS login example 24
Contents Logging in to the CLI 1 Login methods 1 Logging in through the console or AUX port 2 Introduction 2 Configuration procedure 2 Logging in through Telnet 6 Introduction 6 Logging in to the switch
More informationManaging GSS User Accounts Through a TACACS+ Server
CHAPTER 4 Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System
More informationConfiguring the CSS as a Client of a TACACS+ Server
CHAPTER 4 Configuring the CSS as a Client of a TACACS+ Server The Terminal Access Controller Access Control System (TACACS+) protocol provides access control for routers, network access servers (NAS),
More informationQuick Start Guide TABLE OF CONTENTS COMMCELL ARCHITECTURE OVERVIEW COMMCELL SOFTWARE DEPLOYMENT INSTALL THE COMMSERVE SOFTWARE
Page 1 of 35 Quick Start Guide TABLE OF CONTENTS This Quick Start Guide is designed to help you install and use a CommCell configuration to which you can later add other components. COMMCELL ARCHITECTURE
More informationManagement Security Switch SGSD-1022 / SGSD-1022P SGSW-2840 / SGSW-2840P. Quick Installation Guide
Management Security Switch SGSD-1022 / SGSD-1022P SGSW-2840 / SGSW-2840P Quick Installation Guide Table of Contents 1. Package Content... 3 2. Requirements... 4 3. Terminal Setup... 5 4. Logon to the Console...
More informationXton Access Manager GETTING STARTED GUIDE
Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3
More informationData Privilege Adding or Removing Members
Data Privilege allows you to add or remove Members, aka Users, (individuals permitted to access all or portions of a group s resources) from any security group for which you are an Owner or an Authorizer.
More informationUsing the Offline Diagnostic Monitor Menu
APPENDIX B Using the Offline Diagnostic Monitor Menu During the boot process, you can access the Offline Diagnostic Monitor (Offline DM) Main menu. The Offline DM Main menu allows you to perform the following
More informationGSS Administration and Troubleshooting
CHAPTER 9 GSS Administration and Troubleshooting This chapter covers the procedures necessary to properly manage and maintain your GSSM and GSS devices, including login security, software upgrades, GSSM
More informationInstalling and Configuring the TS Agent
Installing the TS Agent, page 1 Starting the TS Agent Configuration Interface, page 2 Configuring the TS Agent, page 2 Creating the REST VDI Role, page 7 Installing the TS Agent Before You Begin Confirm
More informationVMware Horizon Migration Tool User Guide
VMware Horizon Migration Tool User Guide Version 3.0.0 August 2017 VMware End User Computing 1/31 @2017 VMware, Inc. All rights reserved. @2017 VMware, Inc. All rights reserved. This product is protected
More informationAbout shells and command lines
About shells and command lines Computer Literacy 1 Lecture 6 06/10/2008 Topics General Shell and its name GUI Shells CLI Shells Shell Commands for Windows Shell Commands for UNIX SSH 1 The Shell Shell
More informationODBC INSTALLATION Operating System: Windows Bit
ODBC INSTALLATION Operating System: Windows 10 64-Bit This is documentation that will guide you through installing ODBC on a Windows 10 64-Bit Operating System. It is also VERY IMPORTANT that no one is
More informationCentrify Infrastructure Services
Centrify Infrastructure Services License Management Administrator s Guide December 2018 (release 18.11) Centrify Corporation Legal Notice This document and the software described in this document are furnished
More informationConfiguring Management Access
37 CHAPTER This chapter describes how to access the ASA for system management through Telnet, SSH, and HTTPS (using ASDM), how to authenticate and authorize users, how to create login banners, and how
More informationIntrusion Detection and Prevention IDP 4.1r4 Release Notes
Intrusion Detection and Prevention IDP 4.1r4 Release Notes Build 4.1.134028 September 22, 2009 Revision 02 Contents Overview...2 Supported Hardware...2 Changed Features...2 IDP OS Directory Structure...2
More informationHigh Availability Enabling SSL Database Migration Auto Backup and Auto Update Mail Server and Proxy Settings Support...
Quick Start Guide Table of Contents Overview... 4 Deployment... 4 System Requirements... 4 Installation... 6 Working with AD360... 8 Starting AD360... 8 Launching AD360 client... 9 Stopping AD360... 9
More informationSoftware Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M
Software Update C.09.xx Release Notes for the HP Procurve Switches 1600M, 2400M, 2424M, 4000M, and 8000M Topics: TACACS+ Authentication for Centralized Control of Switch Access Security (page 7) CDP (page
More informationMessage Networking 5.2 Administration print guide
Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do
More informationConfiguring Security Features on an External AAA Server
CHAPTER 3 Configuring Security Features on an External AAA Server The authentication, authorization, and accounting (AAA) feature verifies the identity of, grants access to, and tracks the actions of users
More informationWorkspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902
Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More information16/24/48-Port 10/100/1000T + 2/4-Port 100/1000X SFP Managed Switch GS T2S/GS T2S/GS T4S. Quick Installation Guide
16/24/48-Port 10/100/1000T + 2/4-Port 100/1000X SFP Managed Switch GS-4210-16T2S/GS-4210-24T2S/GS-4210-48T4S Quick Installation Guide Table of Contents 1. Package Contents... 3 2. Requirements... 4 3.
More informationExamples of Cisco APE Scenarios
CHAPTER 5 This chapter describes three example scenarios with which to use Cisco APE: Access to Asynchronous Lines, page 5-1 Cisco IOS Shell, page 5-3 Command Authorization, page 5-5 Note For intructions
More informationVMware AirWatch Certificate Authentication for EAS with ADCS
VMware AirWatch Certificate Authentication for EAS with ADCS For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More information16/24-Port 10/100/1000T 802.3at PoE + 2-Port 100/1000X SFP Managed Switch GS P2S GS P2S. Quick Installation Guide
16/24-Port 10/100/1000T 802.3at PoE + 2-Port 100/1000X SFP Managed Switch GS-4210-16P2S GS-4210-24P2S Quick Installation Guide Table of Contents 1. Package Contents... 3 2. Requirements... 4 3. Terminal
More informationAdministrator for Enterprise Clients: User s Guide. Second Edition
Administrator for Enterprise Clients: User s Guide Second Edition The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2002. Administrator for Enterprise Clients: User s
More informationClient Portal Training Manual
Nexsure Training Manual Client Portal Training Manual Version 2.1.3 Page Nexsure Training Manual 2011 XDimensional Technologies, Inc. All rights reserved. No part of this documentation shall be reproduced,
More informationHow to install the software of ZNS8022
How to install the software of ZNS8022 1. Please connect ZNS8022 to your PC after finished assembly. 2. Insert Installation CD to your CD-ROM drive and initiate the auto-run program. The wizard will run
More informationUsing ANM With Virtual Data Centers
APPENDIXB Date: 3/8/10 This appendix describes how to integrate ANM with VMware vcenter Server, which is a third-party product for creating and managing virtual data centers. Using VMware vsphere Client,
More informationConfiguring Communication Services
This chapter includes the following sections: Configuring HTTP, on page 1 Configuring SSH, on page 2 Configuring XML API, on page 3 Enabling Redfish, on page 3 Configuring IPMI, on page 4 Configuring SNMP,
More informationConfiguring the Management Interface and Security
CHAPTER 5 Configuring the Management Interface and Security Revised: February 15, 2011, Introduction This module describes how to configure the physical management interfaces (ports) as well as the various
More informationConfigure a Cisco Router with TACACS+ Authentication
Configure a Cisco Router with TACACS+ Authentication Document ID: 13865 Contents Introduction Prerequisites Requirements Components Used Conventions Authentication Add Authorization Add Accounting Test
More informationPrivileged Remote Access Jumpoint Guide
Privileged Remote Access Jumpoint Guide 2003-2018 BeyondTrust, Inc. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust, Inc. Other trademarks are the property of their respective
More informationCommand-Line Interfaces
CHAPTER 2 This chapter describes the CLIs you use to configure the Catalyst 4500 series switch. This chapter includes the following major sections: Accessing the Switch CLI, page 2-2 Performing Command-Line
More informationEkran System v.6.0 Privileged User Accounts and Sessions (PASM)
Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...
More informationManaging GSS User Accounts Through a TACACS+ Server
4 CHAPTER Managing GSS User Accounts Through a TACACS+ Server This chapter describes how to configure the GSS, primary GSSM, or standby GSSM as a client of a Terminal Access Controller Access Control System
More informationRSA Authentication Manager 7.1 Help Desk Administrator s Guide
RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
More informationOracle WebLogic Server
Oracle WebLogic Server Creating WebLogic Domains Using the Configuration Wizard 10g Release 3 (10.1.3) August 2008 Oracle WebLogic Server Creating WebLogic Domains Using the Configuration Wizard, 10g Release
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationNortel Quality Monitoring Search and Replay Guide
Nortel Quality Monitoring Search and Replay Guide NN44480-106 Product release 7.0 Standard 02.02 November 2009 Nortel Quality Monitoring Search and Replay Guide Publication number: NN44480-106 Product
More information28-Port 10/100/1000Mbps with. 4 Shared SFP Managed Gigabit Switch WGSW / WGSW-28040P. Quick Installation Guide
28-Port 10/100/1000Mbps with 4 Shared SFP Managed Gigabit Switch WGSW-28040 / WGSW-28040P Quick Installation Guide Table of Contents 1. Package Content... 3 2. Requirements... 4 3. Terminal Setup... 5
More informationDIL/NetPC DNP/9200 Board Revision 1.1 Installing an SSH Connection User Manual
DIL/NetPC DNP/9200 Board Revision 1.1 Installing an SSH Connection User Manual SSV Embedded Systems Heisterbergallee 72 D-30453 Hannover Phone: +49 (0)511/40 000-0 Fax: +49 (0)511/40 000-40 E-mail: sales@ist1.de
More informationPerforming an ObserveIT Upgrade Using the Interactive Installer
Performing an ObserveIT Upgrade Using the Interactive Installer ABOUT THIS DOCUMENT This document contains detailed procedures and instructions on how to upgrade ObserveIT by using the interactive "One
More informationTIBCO ActiveMatrix Adapter for Amdocs CRM Installation. Software Release 5.5 July 2012
TIBCO ActiveMatrix Adapter for Amdocs CRM Installation Software Release 5.5 July 2012 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO
More informationConfiguring Authentication, Authorization, and Accounting
Configuring Authentication, Authorization, and Accounting This chapter contains the following sections: Information About AAA, page 1 Prerequisites for Remote AAA, page 5 Guidelines and Limitations for
More informationConfiguring Authorization
Configuring Authorization AAA authorization enables you to limit the services available to a user. When AAA authorization is enabled, the network access server uses information retrieved from the user
More informationKYOCERA Net Admin User Guide
KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
More informationServer License Activation and Administration Guide. Lavastorm Analytics Engine
Server License Activation and Administration Guide Lavastorm Analytics Engine Lavastorm Analytics Engine: Server License Activation and Administration Guide Legal notice Copyright THE CONTENTS OF THIS
More informationMultiple Context Mode
This chapter describes how to configure multiple security contexts on the Cisco ASA. About Security Contexts, page 1 Licensing for, page 12 Prerequisites for, page 13 Guidelines for, page 14 Defaults for,
More informationMercury WinRunner. Installation Guide Version 9.2. Document Release Date: February 26, 2007
Mercury WinRunner Installation Guide Version 9.2 Document Release Date: February 26, 2007 Mercury WinRunner Installation Guide, Version 9.2 This document, and the accompanying software and other documentation,
More informationCA Spectrum. Operator Guide. Release 9.2.3
CA Spectrum Operator Guide Release 9.2.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational
More informationConfiguring Switch-Based Authentication
CHAPTER 7 This chapter describes how to configure switch-based authentication on the switch. Unless otherwise noted, the term switch refers to a standalone switch and to a switch stack. This chapter consists
More informationRED IM Integration with Bomgar Privileged Access
RED IM Integration with Bomgar Privileged Access 2018 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the
More informationWavelink Avalanche Mobility Center Java Console User Guide. Version 5.2
Wavelink Avalanche Mobility Center Java Console User Guide Version 5.2 Revised 27/09/2011 ii Copyright 2011 by Wavelink Corporation. All rights reserved. Wavelink Corporation 10808 South River Front Parkway,
More informationRemote Support Jumpoint Guide: Unattended Access to Computers in a Network 4. Recommended Steps to Implement Bomgar Jump Technology 5
Jumpoint Guide 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property of their respective owners.
More informationNimsoft Monitor. hpovsdgtw Guide. v1.2 series
Nimsoft Monitor hpovsdgtw Guide v1.2 series Legal Notices Copyright 2012, Nimsoft Corporation Warranty The material contained in this document is provided "as is," and is subject to being changed, without
More informationTM1 9.0 SP2 UNIX Installation Help
TM1 9.0 SP2 UNIX Installation Help Table of Contents TM1 Installation for UNIX...1 This document is a printed version of the online help available from the Applix Installation Wizard.Welcome to the Applix
More information