user_managment Alessandro Taurelli 2010/06/15 11:53
|
|
- Anthony Butler
- 5 years ago
- Views:
Transcription
1 user_managment Alessandro Taurelli 2010/06/15 11:53
2 Table of Contents 1 ISecurityInfoProvider ISecurityServiceSupplier How configure this connectors The Role management Connectors Internal Connector (available from SpagoBI 2.5) XML file based LDAP based exo liferay Role based access rights Change Password module Roles Page 2 - last modified by Alessandro Taurelli on 2010/06/15 11:53
3 Users management 1 ISecurityInfoProvider 2 ISecurityServiceSupplier 3 How configure this connectors 4 The Role management 5 Connectors 5.1 Internal Connector (available from SpagoBI 2.5) 5.2 XML file based 5.3 LDAP based 5.4 exo 5.5 liferay 5.6 Role based access rights 6 Change Password module 6.1 Roles From version 2.5 can directly manage users in its DBMS (it uses an InternalConnector), while with earlier versions it stores only roles information to allow the administrator to set up the behavioral model. To retrive this infomations SpagoBI uses 2 connectors to read: Role and Attributes name. User Profile in session. 1 ISecurityInfoProvider This interface retrives all roles and user attrvibutes. public interface ISecurityInfoProvider { public List getroles(); public List getallprofileattributesnames (); } SpagoBI invokes these methods in order to read the user's roles and attributes from the external system. The roles name and description are inserted in SBI_EXT_ROLES table. The User attributes are displayed when the administrator displays the attributes list. It's important to know that all the roles are handled by SpagoBI, not only the roles of a specific user. The roles are filtered with a regular expression in file spagobi.xml <ROLE-NAME-PATTERN-FILTER>.* </ROLE-NAME-PATTERN-FILTER> 2 ISecurityServiceSupplier SpagoBI invokes these methods at the user login in order to read the user information: roles and attributes. The roles and attributes are specifically related to the users. The checkauthentication and checkauthenticationwithtoken methods are used if SSO is disabled. public interface ISecurityServiceSupplier { SpagoBIUserProfile createuserprofile( String userid); SpagoBIUserProfile checkauthentication( String userid, Page 3 - last modified by Alessandro Taurelli on 2010/06/15 11:53
4 String psw); SpagoBIUserProfile checkauthenticationwithtoken( String userid, String token); } 3 How configure this connectors You can set up this connetors in spagobi.xml, for example: <SECURITY> <PORTAL-SECURITY-INIT-CLASS>it.eng.spagobi.security.init.XmlSecurityProviderInit </PORTAL-SECURITY-INIT-CLASS> <PORTAL-SECURITY-CLASS classname= "it.eng.spagobi.security.xmlsecurityinfoproviderimpl"> <CONFIG /> </PORTAL-SECURITY-CLASS> <USER-PROFILE-FACTORY-CLASS classname= "it.eng.spagobi.security.xmlsecurityservicesupplierimpl" /> <ROLE-NAME-PATTERN-FILTER>.* </ROLE-NAME-PATTERN-FILTER> <ROLE-TYPE-PATTERNS> <ADMIN-PATTERN>/spagobi/admin </ADMIN-PATTERN> <DEV_ROLE-PATTERN>/spagobi/dev </DEV_ROLE-PATTERN> <TEST_ROLE-PATTERN>/spagobi/test </TEST_ROLE-PATTERN> <MODEL_ADMIN-PATTERN>/spagobi/modeladmin </MODEL_ADMIN-PATTERN> </ROLE-TYPE-PATTERNS> </SECURITY> In SpagoBI each role has a TYPE, each role type is used to authorize the functionality. The role types are: ADMIN: SpagoBI administrator MODEL_ADMIN: Behavioural model administrator DEV_ROLE: developer TEST_ROLE: tester USER: the final user Page 4 - last modified by Alessandro Taurelli on 2010/06/15 11:53
5 The Role-Type-Patterns is usefull to set the default type to the new role. The administrator is able to change this with the graphical user interface. 4 The Role management There is a GUI where the administrator is able to: Start the synchronization of roles Change the Role Type Assign some features to display 5 Connectors If you have to write a new connetcor you must implement the previous Java Interface, create a JAR with implementation class ad configure spagobi.xml adding custom SECURITY TAG. SpagoBI includes these connectors: 5.1 Internal Connector (available from SpagoBI 2.5) If you want to use internal user (defined in SpagoBI metadata db), insert in spagobi.xml this xml: <SECURITY> <PORTAL-SECURITY-INIT-CLASS>it.eng.spagobi.security.init.InternalSecurityInitializer Page 5 - last modified by Alessandro Taurelli on 2010/06/15 11:53
6 </PORTAL-SECURITY-INIT-CLASS> <PORTAL-SECURITY-CLASS classname= "it.eng.spagobi.security.internalsecurityinfoproviderimpl"> <CONFIG /> </PORTAL-SECURITY-CLASS> <USER-PROFILE-FACTORY-CLASS classname= "it.eng.spagobi.security.internalsecurityservicesupplierimpl" /> <ROLE-NAME-PATTERN-FILTER>.* </ROLE-NAME-PATTERN-FILTER> <ROLE-TYPE-PATTERNS> <ADMIN-PATTERN>/spagobi/admin </ADMIN-PATTERN> <DEV_ROLE-PATTERN>/spagobi/dev </DEV_ROLE-PATTERN> <TEST_ROLE-PATTERN>/spagobi/test </TEST_ROLE-PATTERN> <MODEL_ADMIN-PATTERN>/spagobi/modeladmin </MODEL_ADMIN-PATTERN> </ROLE-TYPE-PATTERNS> </SECURITY> 5.2 XML file based XML file is usefull to the purpose of demo or development environment. This is the default configuration. <SECURITY> <PORTAL-SECURITY-INIT-CLASS>it.eng.spagobi.security.init.XmlSecurityProviderInit </PORTAL-SECURITY-INIT-CLASS> <PORTAL-SECURITY-CLASS classname= "it.eng.spagobi.security.xmlsecurityinfoproviderimpl"> <CONFIG /> Page 6 - last modified by Alessandro Taurelli on 2010/06/15 11:53
7 </PORTAL-SECURITY-CLASS> <USER-PROFILE-FACTORY-CLASS classname= "it.eng.spagobi.security.xmlsecurityservicesupplierimpl" /> <ROLE-NAME-PATTERN-FILTER>.* </ROLE-NAME-PATTERN-FILTER> <ROLE-TYPE-PATTERNS> <ADMIN-PATTERN>/spagobi/admin </ADMIN-PATTERN> <DEV_ROLE-PATTERN>/spagobi/dev </DEV_ROLE-PATTERN> <TEST_ROLE-PATTERN>/spagobi/test </TEST_ROLE-PATTERN> <MODEL_ADMIN-PATTERN>/spagobi/modeladmin </MODEL_ADMIN-PATTERN> </ROLE-TYPE-PATTERNS> </SECURITY> If you have to change user,roles,attributes you can edit this file: TOMCAT_HOME/webapps/SpagoBI/WEB-INF/conf/webapp/authorizations.xml In this file you can Add user Add role Add profile attribute Assign a role to a user <ATTRIBUTES> <ATTRIBUTE name= "month" /> <ATTRIBUTE name= " " /> <ATTRIBUTE name= "name" /> Page 7 - last modified by Alessandro Taurelli on 2010/06/15 11:53
8 </ATTRIBUTES> <USERS> <USER userid= "biadmin" password= "biadmin" month= "03" name= "SpagoAdmin" = <USER userid= "biuser" password= "biuser" month= "04" name= "SpagoUser" = <USER userid= "bidev" password= "bidev" /> <USER userid= "chiron" password= "chiron" /> </USERS> <ROLES> <ROLE rolename= "/spagobi/dev" description= "/spagobi/dev" /> <ROLE rolename= "/spagobi/user" description= "/spagobi/user" /> <ROLE rolename= "/spagobi/admin" description= "/spagobi/admin" /> <ROLE rolename= "/spagobi/moni" description= "/spagobi/moni" /> </ROLES> <BEHAVIOURS> <BEHAVIOUR userid= Page 8 - last modified by Alessandro Taurelli on 2010/06/15 11:53
9 "biuser" rolename= "/spagobi/user" /> <BEHAVIOUR userid= "biadmin" rolename= "/spagobi/admin" /> <BEHAVIOUR userid= "bidev" rolename= "/spagobi/dev" /> <BEHAVIOUR userid= "chiron" rolename= "/spagobi/admin" /> </BEHAVIOURS> Note: check if the sbi.security.xml jar is present in /SpagoBI/WEB-INF/lib 5.3 LDAP based If you want to use LDAP insert in spagobi.xml this xml: <SECURITY> <PORTAL-SECURITY-INIT-CLASS>it.eng.spagobi.security.init.LdapSecurityProviderInit </PORTAL-SECURITY-INIT-CLASS> <PORTAL-SECURITY-CLASS classname= "it.eng.spagobi.security.ldapsecurityproviderimpl"> <CONFIG /> </PORTAL-SECURITY-CLASS> <USER-PROFILE-FACTORY-CLASS classname= "it.eng.spagobi.security.ldapuserprofilefactoryimpl" /> <ROLE-NAME-PATTERN-FILTER>.* </ROLE-NAME-PATTERN-FILTER> <ROLE-TYPE-PATTERNS> <ADMIN-PATTERN>/spagobi/admin </ADMIN-PATTERN> <DEV_ROLE-PATTERN>/spagobi/dev </DEV_ROLE-PATTERN> <TEST_ROLE-PATTERN>/spagobi/test Page 9 - last modified by Alessandro Taurelli on 2010/06/15 11:53
10 </TEST_ROLE-PATTERN> <MODEL_ADMIN-PATTERN>/spagobi/modeladmin </MODEL_ADMIN-PATTERN> </ROLE-TYPE-PATTERNS> </SECURITY> This connector uses ldap.jar library and ldap_authorizations.xml to configure connection and some specific parameters. You MUST set up how connector retrive informations in LDAP in ldap_authorizations.xml: <?xml version= "1.0" encoding= "ISO "?> <LDAP_AUTHORIZATIONS default= "FALSE"> <CONFIG> <USER_DN>cn=*,ou=People,dc=spagobi,dc=com </USER_DN> <ADMIN_USER>cn=Manager,dc=spagobi,dc=com </ADMIN_USER> <ADMIN_PSW>6ddbcdd70d086e75bdc121b16bd23f03 </ADMIN_PSW> <ATTRIBUTES_ID name= "nome"> description </ATTRIBUTES_ID> <ATTRIBUTES_ID name= "cognome"> sn </ATTRIBUTES_ID> <ATTRIBUTES_ID name= "userid"> cn </ATTRIBUTES_ID> <HOST>localhost </HOST> <PORT>389 Page 10 - last modified by Alessandro Taurelli on 2010/06/15 11:53
11 </PORT> <OBJECTCLASS>person </OBJECTCLASS> <SEARCH_ROOT>ou=People,dc=spagobi,dc=com </SEARCH_ROOT> <OU_ATTRIBUTE>ou </OU_ATTRIBUTE> <SEARCH_ROOT_GROUP>ou=Group,dc=spagobi,dc=com </SEARCH_ROOT_GROUP> <OBJECTCLASS_GROUP>organizationalUnit </OBJECTCLASS_GROUP> <ATTRIBUTES_ID_GROUP>description </ATTRIBUTES_ID_GROUP> <ATTRIBUTES_ID_GROUP>OU </ATTRIBUTES_ID_GROUP> </CONFIG> </LDAP_AUTHORIZATIONS> By default this connector expects spagobi.ldif schema If you have your LDAP schema check the ldap_authorizations.xml and configure this. The ADMIN_PSW value must be encrypted, using this simple code. For examles:"secret" == 6ddbcdd70d086e75bdc121b16bd23f03 DefaultCipher defaultcipher = new DefaultCipher(); defaultcipher.encrypt ()... Note: check if the sbi.security.ldap jar is present in /SpagoBI/WEB-INF/lib 5.4 exo If you install SpagoBI in exo you must configure spagobi.xml with this xml: <SECURITY> <PORTAL-SECURITY-INIT-CLASS>it.eng.spagobi.security.init.ExoPortalSecurityProviderInit </PORTAL-SECURITY-INIT-CLASS> <PORTAL-SECURITY-CLASS classname= "it.eng.spagobi.security.exosecurityproviderimpl"> Page 11 - last modified by Alessandro Taurelli on 2010/06/15 11:53
12 <CONFIG> <NAME_PORTAL_APPLICATION>portal </NAME_PORTAL_APPLICATION> </CONFIG> </PORTAL-SECURITY-CLASS> <USER-PROFILE-FACTORY-CLASS classname= "it.eng.spagobi.security.exouserprofileimpl"> </USER-PROFILE-FACTORY-CLASS> <ROLE-NAME-PATTERN-FILTER>/spagobi/.* </ROLE-NAME-PATTERN-FILTER> <ROLE-TYPE-PATTERNS> <ADMIN-PATTERN>/spagobi/admin </ADMIN-PATTERN> <DEV_ROLE-PATTERN>/spagobi/dev </DEV_ROLE-PATTERN> <TEST_ROLE-PATTERN>/spagobi/test </TEST_ROLE-PATTERN> <MODEL_ADMIN-PATTERN>/spagobi/modeladmin </MODEL_ADMIN-PATTERN> </ROLE-TYPE-PATTERNS> </SECURITY> Note: check if the sbi.security.exo jar is present in /SpagoBI/WEB-INF/lib 5.5 liferay to do Role based access rights All SpagoBI functions check if the user can or can't execute it, this is done from Spago Application Framework. At the login, SpagoBI inserts all the functionalities in User Profile and use it to check the authorization. Each SpagoBI role has some functionlities, the administrator can configure this association in SpagoBI metadata DB. 6 Change Password module Page 12 - last modified by Alessandro Taurelli on 2010/06/15 11:53
13 From 2.5 SpagoBI version is possible change the user password (using CAS environment too). It's useful when you use the Internal Connector of SpagoBI. Then, you should view a new link in login page : When you click on this link a change password page is opened: With this management is possible add several controls on the new password and on the time when its necessary to change it. SpagoBI has a new table with all this roles (the SBI_CONFIG) where there are insert all roles that SpagoBI manage. Pay attention that the administrator is excluded from these controls. 6.1 Roles The roles available today are: len_min: defines a minimum lenght; it can be useful to check the minimum length of the password when the user change it. special_char: defines a set of special chars. If it's active the system check that almost one of them is presents in the new password. upper_char: checks that at least one character must been in upper case. lower_char: check that at least one character must been in lower case. number: defines that at least one character must been a number. alphabetical: defines that at least one character must been a letter. change_first: when this role is active the system forces a change password at the first login. disactivation_time: defines a number of months after which the password become disbled (for unused). expired_time: defines a number of days after whitch the change password is necessary. Page 13 - last modified by Alessandro Taurelli on 2010/06/15 11:53
14 If you desire to apply some of this roles you should setting the relative ACTIVE value to true (1) in SBI_CONFIG table (apart from individual configurations). Page 14 - last modified by Alessandro Taurelli on 2010/06/15 11:53
Installation. Alessandro Taurelli 2010/06/15 13:39
Installation Alessandro Taurelli 2010/06/15 13:39 Table of Contents 1 Installation... 3 1.1 Install JDK... 3 1.2 Install Tomcat... 3 1.3 Install SpagoBI Metadata DB... 3 1.4 Deploy SpagoBI WebApplication
More informationSpagoBI SDK User Guide. Alessandro Taurelli 2010/06/15 11:30
SpagoBI SDK 2.1.0 User Guide Alessandro Taurelli 2010/06/15 11:30 Table of Contents 1 Introduction... 3 2 How to install... 3 3 Service interface... 3 3.1 opensession(string username, String password)
More informationWildfly Final (SpagoBI 5.2.0) Davide Zerbetto 2016/11/08 16:55
Wildfly 8.2.0 Final (SpagoBI 5.2.0) Davide Zerbetto 2016/11/08 16:55 Table of Contents Introduction... 3 JDBC drivers configuration... 3 Thread pool component configuration... 3 Environment variables...
More informationCreate Datamart. Alessandro Taurelli 2010/06/15 13:41
Create Datamart Alessandro Taurelli 2010/06/15 13:41 Table of Contents Create Datamart... 3 1 Reverse engineering the target database schema... 3 2 Hibernate mapping adjustement... 16 3 jar production
More informationSpagoBI Server installation on JBoss. Alessandra Toninelli 2013/11/04 11:36
SpagoBI Server installation on JBoss Alessandra Toninelli 2013/11/04 11:36 Table of Contents 1 Download. 3 2 Deploy SpagoBI core and external engines.. 3 3 Datasources configuration 3 4 JNDI variables
More informationRealms and Identity Policies
The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 14 Create an Identity Rule, page 15 Manage a Realm, page 17 Manage an Identity
More informationSDK 2.3 User Guide. Alessandro Taurelli 2010/06/15 11:30
SDK 2.3 User Guide Alessandro Taurelli 2010/06/15 11:30 Table of Contents 1 Introduction... 3 2 How to install... 3 3 Web Services interfaces... 3 3.1 getdocumentsaslist(string type, String state, String
More informationRealms and Identity Policies
The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 15 Create an Identity Rule, page 15 Manage a Realm, page 20 Manage an Identity
More informationUser Management in Resource Manager
CHAPTER 8 This section describes how to manage user profiles. Topics in this section include: Overview of User Management, page 8-1 Using User Management, page 8-1 Overview of User Management In Resource
More informationKnowage CE SpagoBI2Knowage
INTRODUCTION This package contains a Talend ETL process whose aim is to copy metadata from a SpagoBI to a Knowage. It is composed by: SpagoBI2Kowage.bat/sh: using to start the process. configurationfile.properties:
More informationTRAINING GUIDE. Lucity GIS. Web Administration
TRAINING GUIDE Lucity GIS Web Administration Lucity GIS Web Administration Contents Portal Config and SSO... 2 Registering with Portal... 2 Behind the Scenes... 4 Resetting Portal Integration... 5 Single
More informationHow to use SpagoBI Installer 1.9.4
How to use SpagoBI Installer 1.9.4 Authors Zerbetto Davide Yannick LE NY How to use SpagoBI Installer 1.9.4 - August,23 th 2008 pag. 1 of 16 Index 1 VERSION...3 2 DOCUMENT GOAL...3 3 REFERENCES...3 4 SYSTEM
More informationSmartPatch. Configuration Reference Version 6.x
SmartPatch Configuration Reference Version 6.x Copyright Copyright 2017 Brand-Rex Ltd. All rights reserved. No part of this publication or of the SmartPatch software, in source code or object code form,
More informationZendesk Connector. Version 2.0. User Guide
Zendesk Connector Version 2.0 User Guide 2015 Ping Identity Corporation. All rights reserved. PingFederate Zendesk Connector Quick Connection Guide Version 2.0 November, 2015 Ping Identity Corporation
More informationKonaKart Portlet Installation for Liferay. 2 nd January DS Data Systems (UK) Ltd., 9 Little Meadow Loughton, Milton Keynes Bucks MK5 8EH UK
KonaKart Portlet Installation for Liferay 2 nd January 2018 DS Data Systems (UK) Ltd., 9 Little Meadow Loughton, Milton Keynes Bucks MK5 8EH UK 1 Table of Contents KonaKart Portlets... 3 Supported Versions
More informationSAML-Based SSO Configuration
Prerequisites, page 1 SAML SSO Configuration Task Flow, page 5 Reconfigure OpenAM SSO to SAML SSO Following an Upgrade, page 9 SAML SSO Deployment Interactions and Restrictions, page 9 Prerequisites NTP
More informationContents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6
Gateway Installation and Configuration Guide for On-Premises Version 17 September 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites...
More informationbryan.wooten@utah.edu 6/6/14 Apereo Miami 2014 1 For Beginners How to create a group for each course secbon and provision to AcBve Directory. 6/6/14 Apereo Miami 2014 2 6/6/14 Apereo Miami 2014 3 This
More informationLiferay Security Features Overview. How Liferay Approaches Security
Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................
More informationDatabase Explorer Quickstart
Database Explorer Quickstart Last Revision: Outline 1. Preface 2. Requirements 3. Introduction 4. Creating a Database Connection 1. Configuring a JDBC Driver 2. Creating a Connection Profile 3. Opening
More informationYou will get Access to the DDX Portal via Web Browser. Please use the following Address:
What is the DDX Portal The DDX Portal uses the functionality of an FTP Server with some more comfortable options. You can send data directly to a person instead of downloading into a directory. Registration
More informationSpagoBI QuickStart. Luca Scarel
SpagoBI QuickStart Authors Grazia Cazzin Luca Scarel SpagoBI QuickStart ver. 0.8 May, 17 th 2006 pag. 1 of 64 Index VERSION... 4 1 DOCUMENT GOAL... 4 REFERENCES... 4 HELP FOR LECTURE... 5 1.1 STYLISTIC
More informationTable of Contents. Single Sign On 1
Table of Contents Table of Contents Single Sign On SAML Authentication Using SAML SSO Authentication Setting up SAML SSO Authentication Configuring OneLogin as an Identity Provider LDAP Authentication
More informationdocs.hortonworks.com
docs.hortonworks.com Hortonworks Data Platform : Security Administration Tools Guide Copyright 2012-2014 Hortonworks, Inc. Some rights reserved. The Hortonworks Data Platform, powered by Apache Hadoop,
More informationDirectory Integration with VMware Identity Manager
Directory Integration with VMware Identity Manager VMware AirWatch 9.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
More informationSaperion. Patch Level List. Version: 8.0.1
Saperion Patch Level List Version: 8.0.1 Written by: Product Knowledge, R&D Date: April 2018 Copyright 1991-2018 Hyland Software, Inc. and its affiliates. Table of Contents Table of Contents... 3 Overview...
More informationOneLogin Integration User Guide
OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...
More informationQuick Connection Guide
Egnyte Connector Version 1.0 Quick Connection Guide 2015 Ping I dentity Corporation. A ll rights reserved. PingFederate Egnyte Connector Quick Connection Guide Version 1.0 February, 2015 Ping Identity
More informationRealms and Identity Policies
The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page
More informationRemote Authentication
Authentication Services, page 1 Guidelines and Recommendations for Providers, page 2 User Attributes in Providers, page 2 Two-Factor Authentication, page 4 LDAP Providers and Groups, page 5 RADIUS Providers,
More informationJ2EE Development with Apache Geronimo 1.1. Aaron Mulder CTO, Chariot Solutions Committer, Apache Geronimo
J2EE Development with Apache Geronimo 1.1 Aaron Mulder CTO, Chariot Solutions Committer, Apache Geronimo Speaker Aaron Mulder Geronimo Developer Works on deployment, management, console, kernel, plugins,...
More informationConfiguration Store Setup Guide
Configuration Store Setup Guide Version 1.6 Corresponding Software Version Celonis 4.3 This document is copyright of the Celonis SE. Distribution or reproduction are only permitted by written approval
More informationIntroducing Apache Geronimo 1.1. Aaron Mulder CTO, Chariot Solutions Committer, Apache Geronimo
Introducing Apache Geronimo 1.1 Aaron Mulder CTO, Chariot Solutions Committer, Apache Geronimo Speaker Aaron Mulder Geronimo Developer Works on deployment, management, console, kernel, plugins,... Online
More informationWhite Paper. Fabasoft Folio Portlet. Fabasoft Folio 2017 R1 Update Rollup 1
White Paper Fabasoft Folio Portlet Fabasoft Folio 2017 R1 Update Rollup 1 Copyright Fabasoft R&D GmbH, Linz, Austria, 2018. All rights reserved. All hardware and software names used are registered trade
More informationConfiguring Role-Based Access Control
Configuring Role-Based Access Control This chapter includes the following sections: Role-Based Access Control, page 1 User Accounts for Cisco UCS Manager, page 1 User Roles, page 3 Privileges, page 4 User
More informationAll about SAML End-to-end Tableau and OKTA integration
Welcome # T C 1 8 All about SAML End-to-end Tableau and OKTA integration Abhishek Singh Senior Manager, Regional Delivery Tableau Abhishek Singh Senior Manager Regional Delivery asingh@tableau.com Agenda
More informationOIG 11G R2 Field Enablement Training
OIG 11G R2 Field Enablement Training Lab 21 - Reports Lab Disclaimer: The Virtual Machine Image and other software are provided for use only during the workshop. Please note that you are responsible for
More informationExternal Authentication with Ultra Protect v7.2 SSL VPN Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Ultra Protect v7.2 SSL VPN Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
More informationFUEGO 5.5 WORK PORTAL. (Using Tomcat 5) Fernando Dobladez
FUEGO 5.5 WORK PORTAL SINGLE-SIGN-ON WITH A WINDOWS DOMAIN (Using Tomcat 5) Fernando Dobladez ferd@fuego.com December 30, 2005 3 IIS CONFIGURATION Abstract This document describes a way of configuring
More informationUser Registry Configuration in WebSphere Application Server(WAS)
2012 User Registry Configuration in WebSphere Application Server(WAS) By Geetha Kanra, Sanjay Singh, and Yogendra Srivastava [Abstract: This article provides step by step procedure to configure various
More informationWebEx Connector. Version 2.0. User Guide
WebEx Connector Version 2.0 User Guide 2016 Ping Identity Corporation. All rights reserved. PingFederate WebEx Connector User Guide Version 2.0 May, 2016 Ping Identity Corporation 1001 17th Street, Suite
More informationBox Connector. Version 2.0. User Guide
Box Connector Version 2.0 User Guide 2016 Ping Identity Corporation. All rights reserved. PingFederate Box Connector User Guide Version 2.0 March, 2016 Ping Identity Corporation 1001 17th Street, Suite
More informationNETCONF Client GUI. Client Application Files APPENDIX
APPENDIX B The NETCONF client is a simple GUI client application that can be used to understand the implementation of the NETCONF protocol in Cisco E-DI. This appendix includes the following information:
More informationWebSphere Portal Security Configuration
WebSphere Portal Security Configuration Introduction Using a Login Attribute Instead of the RDN Login Using Your E-mail Attribute This guide will describe to process of using the IBM LDAP (sometimes referred
More informationU Commands. Send documentation comments to CHAPTER
CHAPTER 24 The commands in this chapter apply to the Cisco MDS 9000 Family of multilayer directors and fabric switches. All commands are shown here in alphabetical order regardless of command mode. See
More informationVersion 7.x. Quick-Start Guide
Version 7.x Quick-Start Guide 2005-2013 Ping Identity Corporation. All rights reserved. PingFederate Quick-Start Guide Version 7.x September, 2013 Ping Identity Corporation 1001 17th Street, Suite 100
More informationInstalling Access Manager Agent for Microsoft SharePoint 2007
Installing Access Manager Agent for Microsoft SharePoint 2007 Author: Jeff Nester Sun Microsystems Jeff.Nester@sun.com Date: 7/17/2008 Version 1.0 Description: Paraphrased version of the Sun Java System
More informationUsing the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1
Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationLogi Ad Hoc Reporting Management Console Usage Guide
Logi Ad Hoc Reporting Management Console Usage Guide Version 12.1 July 2016 Page 2 Contents Introduction... 5 Target Audience... 5 System Requirements... 6 Components... 6 Supported Reporting Databases...
More informationColligo Console. Administrator Guide
Colligo Console Administrator Guide Contents About this guide... 6 Audience... 6 Requirements... 6 Colligo Technical Support... 6 Introduction... 7 Colligo Console Overview... 8 Colligo Console Home Page...
More informationOverview of the Self-Service Portal
This chapter contains the following sections: Cisco UCS Director Self-Service Portal, page 1 Logging into the Self-Service Portal, page 1 Examining the Interface, page 4 Cisco UCS Director Self-Service
More informationDIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION. Gabriella Davis The Turtle Partnership
DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION Gabriella Davis The Turtle Partnership In This Session Review possible use cases for multiple directories Understand security implications
More informationHSM and Thales Basics using the Thales Simulator
HSM and Thales Basics using the Thales Simulator Single Double Triple Length Keys Single length key = 8 bytes = 64 bits = 16 hex chars Double Length key = 16 bytes = 128 bits = 32 hex chars Triple Length
More informationOpenProdoc. ECM Open Source
OpenProdoc ECM Open Source Index Overview Architecture Functionality Security Administration Requirements Roadmap Overview OpenProdoc is a general purpose document management system. It has the standard
More informationDatabase Setup in IRI Workbench 1
Database Setup in IRI Workbench Two types of database connectivity are required by the IRI Workbench. They are: Microsoft Open Database Connectivity (ODBC) for data movement between the database and IRI
More informationpure::variants Server Administration Manual
pure-systems GmbH Version 4.0.14.685 for pure::variants 4.0 Copyright 2003-2018 pure-systems GmbH 2018 Table of Contents 1. Introduction... 1 2. Import Administration Project... 1 3. Manage Users and Roles...
More informationExternal Authentication with Checkpoint R77.20 Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Checkpoint R77.20 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale
More informationTIM TAM Integration. Planning to install the Tivoli Access Manager Combo Adapter
TIM TAM Integration For TIM TAM Integration, TAM Combo Adapter is required. The installation and configuration details of TAM Combo Adapter is described below. Planning to install the Tivoli Access Manager
More informationcreate-auth-realm adds the named authentication realm
Name Synopsis Description Options create-auth-realm adds the named authentication realm create-auth-realm --classname realm_class [--help] [ --property (name=value)[:name=value]*] [ --target target_name]
More informationSmartLink configuration DME Server 3.5
SmartLink configuration DME Server 3.5 Document version: 1.3 Date: 2010-03-22 Circulation/Restrictions: Internal/Excitor partners Applies to: DME Server 3.5 Table of contents SmartLink configuration...3
More informationImplementing Single-Sign-On(SSO) for APM UI
Implementing Single-Sign-On(SSO) for APM UI 1.Introduction...2 2.Overview of SSO with LTPA...3 3.Installing and configuring TDS...5 3.1.Installing TDS 6.3...5 3.2.Changing the administrator password (Optional)...7
More informationSecuring ArcGIS for Server. David Cordes, Raj Padmanabhan
Securing ArcGIS for Server David Cordes, Raj Padmanabhan Agenda Security in the context of ArcGIS for Server User and Role Considerations Identity Stores Authentication Securing web services Protecting
More informationTutorial 5 : Invoking Siebel Business Object through the Oracle AS Adapter
Reference: 2005/04/26 Adapter Tutorial Tutorial 5 : Invoking Siebel Business Object through the Oracle AS Adapter The Oracle AS Adapter for Siebel exposes the Siebel Business Object and Services as a Web
More informationJASPERREPORTS SERVER AUTHENTICATION COOKBOOK
JASPERREPORTS SERVER AUTHENTICATION COOKBOOK RELEASE 7.1 http://www.jaspersoft.com Copyright 2005-2018 TIBCO Software Inc. All Rights Reserved. TIBCO Software Inc. This is version 0518-JSP71-12 of the
More informationAfter extracting the zip file a ldap-jetty directory is created, from now on this directory will be referred as <ldap_home>.
Configuring LDAP Geronimo uses the Apache Directory Server for its directory service, this is part of the Apache Directory Project. Geronimo implements the following two projects from the ApacheDS project.
More informationIBM Lotus Sametime Media Manager Cluster Deployment Walk-through Part VI- Bandwidth Manager IBM Corporation
IBM Lotus Sametime 8.5.2 Media Manager Cluster Deployment Walk-through Part VI- Bandwidth Manager Prerequisites for this part of the walk-through We've completed parts I, II, II, IV, and V Lotus Domino
More informationBanner 8/ Luminis 4 Change Overview. September 24, 2009
Banner 8/ Luminis 4 Change Overview September 24, 2009 www.sigcorp.com What information will be covered? Banner 8 changes which impact Luminis 4 What information will NOT be covered? Specific Banner 8
More informationAndowson Chang
Andowson Chang http://www.andowson.com/ All JForum templates are stored in the directory templates, where each subdirectory is a template name, being the default template name callled default. There you
More informationArcGIS Server and Portal for ArcGIS An Introduction to Security
ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context
More informationNovell Access Manager authentication class for OpenID authentication
Novell Access Manager authentication class for OpenID authentication (Requires NovellAccessManager 3.1 SP1 IR1 or later) Introduction: This article describes the steps to deploy and configure a new authentication
More informationIntellicus Single Sign-on. Version: 16.0
Intellicus Single Sign-on Version: 16.0 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not be copied or derived
More informationSignicat Connector for Java Version 2.6. Document version 3
Signicat Connector for Java Version 2.6 Document version 3 About this document Purpose Target This document is a guideline for using Signicat Connector for Java. Signicat Connector for Java is a client
More informationData Exchange via ProjektPortal
Data Exchange via ProjektPortal Application of the tool cfolders for business partners Via the collaboration cfolders, you - as a connected business partner - can gain reading access to the documents allocated
More informationConfiguring Role-Based Access Control
Configuring Role-Based Access Control This chapter includes the following sections: Role-Based Access Control, page 1 User Accounts for Cisco UCS Manager, page 1 User Roles, page 4 User Locales, page 7
More informationOIG 11G R2 Field Enablement Training
OIG 11G R2 Field Enablement Training Lab 14 - Reconciliation Lab Disclaimer: The Virtual Machine Image and other software are provided for use only during the workshop. Please note that you are responsible
More informationExam : Title : IBM WebSphere Commerce V7.0 Application Development. Version : Demo
Exam : 000-723 Title : IBM WebSphere Commerce V7.0 Application Development Version : Demo 1.An application developer notices that a policy that is expected to grant access appears in the trace, however
More informationConfiguration Export and Import
This chapter includes the following sections:, page 1 From the Export & Import, you can schedule configuration backup for Cisco UCS Central and the registered Cisco UCS Domains. You can schedule export
More informationCredential Policy CHAPTER
CHAPTER 21 Cisco Unified Communications Manager authenticates user login credentials before allowing system access. To help secure user accounts, you can specify settings for failed logon attempts, lockout
More informationpenelope case management software AUTHENTICATION GUIDE v4.4 and higher
penelope case management software AUTHENTICATION GUIDE v4.4 and higher Last modified: August 9, 2016 TABLE OF CONTENTS Authentication: The basics... 4 About authentication... 4 SSO authentication... 4
More informationSAS Integration Technologies Server Administrator s Guide
SAS 9.1.2 Integration Technologies Server Administrator s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS 9.1.2 Integration Technologies: Server Administrator
More informationOracle Fusion Middleware
Oracle Fusion Middleware Tutorial for Oracle Identity Management 11g Release 1 (11.1.1) E10276-01 May 2009 Oracle Fusion Middleware Tutorial for Oracle Identity Management, 11g Release 1 (11.1.1) E10276-01
More informationweb.xml Deployment Descriptor Elements
APPENDIX A web.xml Deployment Descriptor s The following sections describe the deployment descriptor elements defined in the web.xml schema under the root element . With Java EE annotations, the
More informationIVE Quick Startup Guide - OS 4.0
IVE Quick Startup Guide - OS 4.0 Initial Setup Once you receive the IVE device, unpack the IVE and connect it to a PC or Laptop using the console (null modem) cable provided with the IVE. You have to connect
More informationF5 BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.1
F5 BIG-IQ Centralized Management: Licensing and Initial Setup Version 5.1 Table of Contents Table of Contents BIG-IQ System Introduction...5 About BIG-IQ System Management...5 About secure communication
More informationStorageGRID Webscale 11.0 Tenant Administrator Guide
StorageGRID Webscale 11.0 Tenant Administrator Guide January 2018 215-12403_B0 doccomments@netapp.com Table of Contents 3 Contents Administering a StorageGRID Webscale tenant account... 5 Understanding
More informationFOCUS ON REAL DESIGN AUTOMATE THE REST. CUSTOMTOOLS installation guide
FOCUS ON REAL DESIGN AUTOMATE THE REST CUSTOMTOOLS installation guide Francois Simon 15.02.2016 The purpose of that guide is to assist you during the different stages of the installation of CUSTOMTOOLS.
More informationCA Identity Manager. Provisioning Guide. r12
CA Identity Manager Provisioning Guide r12 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational purposes
More informationSecure Access Manager (SAM) Administrator Guide December 2017
Secure Access Manager (SAM) Administrator Guide December 2017 Copyright 2017 Exostar, LLC All rights reserved. 1 SECURE ACCESS MANAGER (SAM) OVERVIEW... 4 ADMINISTRATIVE ROLES OVERVIEW... 4 SAM NAVIGATIONAL
More informationITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!
ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com Exam : C_AUDSEC_731 Title : SAP Certified Technology Associate - SAP Authorization and Auditing for SAP NetWeaver 7.31
More informationInformatica BCI Extractor Solution
Informatica BCI Extractor Solution Objective: The current BCI implementation delivered by Informatica uses a LMAPI SDK plugin to serially execute idoc requests to SAP and then execute a process mapping
More informationUser Manual Al Manhal. All rights reserved v 3.0
User Manual 1 2010-2016 Al Manhal. All rights reserved v 3.0 Table of Contents Conduct a Search... 3 1. USING SIMPLE SEARCH... 3 2. USING ADVANCED SEARCH... 4 Search Results List... 5 Browse... 7 1. BROWSE
More informationCA IdentityMinder. Glossary
CA IdentityMinder Glossary 12.6.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational
More informationCLI users are not listed on the Cisco Prime Collaboration User Management page.
Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator
More informationDonaubauer CRM to Online - EXE
Donaubauer CRM to Online - EXE User Manual CRM to Online - EXE for Microsoft Dynamics 365 for version 8.2.3 Table of Contents 1 Introduction...3 2 Prerequisites...4 2.1 Prerequisites in the target CRM...
More informationlist-modules lists Application Server modules
Name Synopsis Description Options list-modules lists Application Server modules list-modules [--terse={true false}][ --echo={true false} ] [ --interactive={true false} ] [ --host host] [--port port] [--secure
More informationIntegrating a directory server
Integrating a directory server Knox Manage provides a directory service that integrates a client's directory server through a Lightweight Directory Access Protocol (LDAP)-based Active Directory service
More informationPerceptive Matching Engine
Perceptive Matching Engine Advanced Design and Setup Guide Version: 1.0.x Written by: Product Development, R&D Date: January 2018 2018 Hyland Software, Inc. and its affiliates. Table of Contents Overview...
More informationOracle Utilities Opower Energy Efficiency Web Portal - Classic Single Sign-On
Oracle Utilities Opower Energy Efficiency Web Portal - Classic Single Sign-On Configuration Guide E84772-01 Last Update: Monday, October 09, 2017 Oracle Utilities Opower Energy Efficiency Web Portal -
More informationMTAT Introduction to Databases
MTAT.03.105 Introduction to Databases Lecture #2 Introduction to SAP SQL Anywhere 17 Ljubov Jaanuska (ljubov.jaanuska@ut.ee) Lecture 1. Summary Data is collection of unprocessed items that may consists
More informationThe following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into
The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,
More information