user_managment Alessandro Taurelli 2010/06/15 11:53

Size: px
Start display at page:

Download "user_managment Alessandro Taurelli 2010/06/15 11:53"

Transcription

1 user_managment Alessandro Taurelli 2010/06/15 11:53

2 Table of Contents 1 ISecurityInfoProvider ISecurityServiceSupplier How configure this connectors The Role management Connectors Internal Connector (available from SpagoBI 2.5) XML file based LDAP based exo liferay Role based access rights Change Password module Roles Page 2 - last modified by Alessandro Taurelli on 2010/06/15 11:53

3 Users management 1 ISecurityInfoProvider 2 ISecurityServiceSupplier 3 How configure this connectors 4 The Role management 5 Connectors 5.1 Internal Connector (available from SpagoBI 2.5) 5.2 XML file based 5.3 LDAP based 5.4 exo 5.5 liferay 5.6 Role based access rights 6 Change Password module 6.1 Roles From version 2.5 can directly manage users in its DBMS (it uses an InternalConnector), while with earlier versions it stores only roles information to allow the administrator to set up the behavioral model. To retrive this infomations SpagoBI uses 2 connectors to read: Role and Attributes name. User Profile in session. 1 ISecurityInfoProvider This interface retrives all roles and user attrvibutes. public interface ISecurityInfoProvider { public List getroles(); public List getallprofileattributesnames (); } SpagoBI invokes these methods in order to read the user's roles and attributes from the external system. The roles name and description are inserted in SBI_EXT_ROLES table. The User attributes are displayed when the administrator displays the attributes list. It's important to know that all the roles are handled by SpagoBI, not only the roles of a specific user. The roles are filtered with a regular expression in file spagobi.xml <ROLE-NAME-PATTERN-FILTER>.* </ROLE-NAME-PATTERN-FILTER> 2 ISecurityServiceSupplier SpagoBI invokes these methods at the user login in order to read the user information: roles and attributes. The roles and attributes are specifically related to the users. The checkauthentication and checkauthenticationwithtoken methods are used if SSO is disabled. public interface ISecurityServiceSupplier { SpagoBIUserProfile createuserprofile( String userid); SpagoBIUserProfile checkauthentication( String userid, Page 3 - last modified by Alessandro Taurelli on 2010/06/15 11:53

4 String psw); SpagoBIUserProfile checkauthenticationwithtoken( String userid, String token); } 3 How configure this connectors You can set up this connetors in spagobi.xml, for example: <SECURITY> <PORTAL-SECURITY-INIT-CLASS>it.eng.spagobi.security.init.XmlSecurityProviderInit </PORTAL-SECURITY-INIT-CLASS> <PORTAL-SECURITY-CLASS classname= "it.eng.spagobi.security.xmlsecurityinfoproviderimpl"> <CONFIG /> </PORTAL-SECURITY-CLASS> <USER-PROFILE-FACTORY-CLASS classname= "it.eng.spagobi.security.xmlsecurityservicesupplierimpl" /> <ROLE-NAME-PATTERN-FILTER>.* </ROLE-NAME-PATTERN-FILTER> <ROLE-TYPE-PATTERNS> <ADMIN-PATTERN>/spagobi/admin </ADMIN-PATTERN> <DEV_ROLE-PATTERN>/spagobi/dev </DEV_ROLE-PATTERN> <TEST_ROLE-PATTERN>/spagobi/test </TEST_ROLE-PATTERN> <MODEL_ADMIN-PATTERN>/spagobi/modeladmin </MODEL_ADMIN-PATTERN> </ROLE-TYPE-PATTERNS> </SECURITY> In SpagoBI each role has a TYPE, each role type is used to authorize the functionality. The role types are: ADMIN: SpagoBI administrator MODEL_ADMIN: Behavioural model administrator DEV_ROLE: developer TEST_ROLE: tester USER: the final user Page 4 - last modified by Alessandro Taurelli on 2010/06/15 11:53

5 The Role-Type-Patterns is usefull to set the default type to the new role. The administrator is able to change this with the graphical user interface. 4 The Role management There is a GUI where the administrator is able to: Start the synchronization of roles Change the Role Type Assign some features to display 5 Connectors If you have to write a new connetcor you must implement the previous Java Interface, create a JAR with implementation class ad configure spagobi.xml adding custom SECURITY TAG. SpagoBI includes these connectors: 5.1 Internal Connector (available from SpagoBI 2.5) If you want to use internal user (defined in SpagoBI metadata db), insert in spagobi.xml this xml: <SECURITY> <PORTAL-SECURITY-INIT-CLASS>it.eng.spagobi.security.init.InternalSecurityInitializer Page 5 - last modified by Alessandro Taurelli on 2010/06/15 11:53

6 </PORTAL-SECURITY-INIT-CLASS> <PORTAL-SECURITY-CLASS classname= "it.eng.spagobi.security.internalsecurityinfoproviderimpl"> <CONFIG /> </PORTAL-SECURITY-CLASS> <USER-PROFILE-FACTORY-CLASS classname= "it.eng.spagobi.security.internalsecurityservicesupplierimpl" /> <ROLE-NAME-PATTERN-FILTER>.* </ROLE-NAME-PATTERN-FILTER> <ROLE-TYPE-PATTERNS> <ADMIN-PATTERN>/spagobi/admin </ADMIN-PATTERN> <DEV_ROLE-PATTERN>/spagobi/dev </DEV_ROLE-PATTERN> <TEST_ROLE-PATTERN>/spagobi/test </TEST_ROLE-PATTERN> <MODEL_ADMIN-PATTERN>/spagobi/modeladmin </MODEL_ADMIN-PATTERN> </ROLE-TYPE-PATTERNS> </SECURITY> 5.2 XML file based XML file is usefull to the purpose of demo or development environment. This is the default configuration. <SECURITY> <PORTAL-SECURITY-INIT-CLASS>it.eng.spagobi.security.init.XmlSecurityProviderInit </PORTAL-SECURITY-INIT-CLASS> <PORTAL-SECURITY-CLASS classname= "it.eng.spagobi.security.xmlsecurityinfoproviderimpl"> <CONFIG /> Page 6 - last modified by Alessandro Taurelli on 2010/06/15 11:53

7 </PORTAL-SECURITY-CLASS> <USER-PROFILE-FACTORY-CLASS classname= "it.eng.spagobi.security.xmlsecurityservicesupplierimpl" /> <ROLE-NAME-PATTERN-FILTER>.* </ROLE-NAME-PATTERN-FILTER> <ROLE-TYPE-PATTERNS> <ADMIN-PATTERN>/spagobi/admin </ADMIN-PATTERN> <DEV_ROLE-PATTERN>/spagobi/dev </DEV_ROLE-PATTERN> <TEST_ROLE-PATTERN>/spagobi/test </TEST_ROLE-PATTERN> <MODEL_ADMIN-PATTERN>/spagobi/modeladmin </MODEL_ADMIN-PATTERN> </ROLE-TYPE-PATTERNS> </SECURITY> If you have to change user,roles,attributes you can edit this file: TOMCAT_HOME/webapps/SpagoBI/WEB-INF/conf/webapp/authorizations.xml In this file you can Add user Add role Add profile attribute Assign a role to a user <ATTRIBUTES> <ATTRIBUTE name= "month" /> <ATTRIBUTE name= " " /> <ATTRIBUTE name= "name" /> Page 7 - last modified by Alessandro Taurelli on 2010/06/15 11:53

8 </ATTRIBUTES> <USERS> <USER userid= "biadmin" password= "biadmin" month= "03" name= "SpagoAdmin" = <USER userid= "biuser" password= "biuser" month= "04" name= "SpagoUser" = <USER userid= "bidev" password= "bidev" /> <USER userid= "chiron" password= "chiron" /> </USERS> <ROLES> <ROLE rolename= "/spagobi/dev" description= "/spagobi/dev" /> <ROLE rolename= "/spagobi/user" description= "/spagobi/user" /> <ROLE rolename= "/spagobi/admin" description= "/spagobi/admin" /> <ROLE rolename= "/spagobi/moni" description= "/spagobi/moni" /> </ROLES> <BEHAVIOURS> <BEHAVIOUR userid= Page 8 - last modified by Alessandro Taurelli on 2010/06/15 11:53

9 "biuser" rolename= "/spagobi/user" /> <BEHAVIOUR userid= "biadmin" rolename= "/spagobi/admin" /> <BEHAVIOUR userid= "bidev" rolename= "/spagobi/dev" /> <BEHAVIOUR userid= "chiron" rolename= "/spagobi/admin" /> </BEHAVIOURS> Note: check if the sbi.security.xml jar is present in /SpagoBI/WEB-INF/lib 5.3 LDAP based If you want to use LDAP insert in spagobi.xml this xml: <SECURITY> <PORTAL-SECURITY-INIT-CLASS>it.eng.spagobi.security.init.LdapSecurityProviderInit </PORTAL-SECURITY-INIT-CLASS> <PORTAL-SECURITY-CLASS classname= "it.eng.spagobi.security.ldapsecurityproviderimpl"> <CONFIG /> </PORTAL-SECURITY-CLASS> <USER-PROFILE-FACTORY-CLASS classname= "it.eng.spagobi.security.ldapuserprofilefactoryimpl" /> <ROLE-NAME-PATTERN-FILTER>.* </ROLE-NAME-PATTERN-FILTER> <ROLE-TYPE-PATTERNS> <ADMIN-PATTERN>/spagobi/admin </ADMIN-PATTERN> <DEV_ROLE-PATTERN>/spagobi/dev </DEV_ROLE-PATTERN> <TEST_ROLE-PATTERN>/spagobi/test Page 9 - last modified by Alessandro Taurelli on 2010/06/15 11:53

10 </TEST_ROLE-PATTERN> <MODEL_ADMIN-PATTERN>/spagobi/modeladmin </MODEL_ADMIN-PATTERN> </ROLE-TYPE-PATTERNS> </SECURITY> This connector uses ldap.jar library and ldap_authorizations.xml to configure connection and some specific parameters. You MUST set up how connector retrive informations in LDAP in ldap_authorizations.xml: <?xml version= "1.0" encoding= "ISO "?> <LDAP_AUTHORIZATIONS default= "FALSE"> <CONFIG> <USER_DN>cn=*,ou=People,dc=spagobi,dc=com </USER_DN> <ADMIN_USER>cn=Manager,dc=spagobi,dc=com </ADMIN_USER> <ADMIN_PSW>6ddbcdd70d086e75bdc121b16bd23f03 </ADMIN_PSW> <ATTRIBUTES_ID name= "nome"> description </ATTRIBUTES_ID> <ATTRIBUTES_ID name= "cognome"> sn </ATTRIBUTES_ID> <ATTRIBUTES_ID name= "userid"> cn </ATTRIBUTES_ID> <HOST>localhost </HOST> <PORT>389 Page 10 - last modified by Alessandro Taurelli on 2010/06/15 11:53

11 </PORT> <OBJECTCLASS>person </OBJECTCLASS> <SEARCH_ROOT>ou=People,dc=spagobi,dc=com </SEARCH_ROOT> <OU_ATTRIBUTE>ou </OU_ATTRIBUTE> <SEARCH_ROOT_GROUP>ou=Group,dc=spagobi,dc=com </SEARCH_ROOT_GROUP> <OBJECTCLASS_GROUP>organizationalUnit </OBJECTCLASS_GROUP> <ATTRIBUTES_ID_GROUP>description </ATTRIBUTES_ID_GROUP> <ATTRIBUTES_ID_GROUP>OU </ATTRIBUTES_ID_GROUP> </CONFIG> </LDAP_AUTHORIZATIONS> By default this connector expects spagobi.ldif schema If you have your LDAP schema check the ldap_authorizations.xml and configure this. The ADMIN_PSW value must be encrypted, using this simple code. For examles:"secret" == 6ddbcdd70d086e75bdc121b16bd23f03 DefaultCipher defaultcipher = new DefaultCipher(); defaultcipher.encrypt ()... Note: check if the sbi.security.ldap jar is present in /SpagoBI/WEB-INF/lib 5.4 exo If you install SpagoBI in exo you must configure spagobi.xml with this xml: <SECURITY> <PORTAL-SECURITY-INIT-CLASS>it.eng.spagobi.security.init.ExoPortalSecurityProviderInit </PORTAL-SECURITY-INIT-CLASS> <PORTAL-SECURITY-CLASS classname= "it.eng.spagobi.security.exosecurityproviderimpl"> Page 11 - last modified by Alessandro Taurelli on 2010/06/15 11:53

12 <CONFIG> <NAME_PORTAL_APPLICATION>portal </NAME_PORTAL_APPLICATION> </CONFIG> </PORTAL-SECURITY-CLASS> <USER-PROFILE-FACTORY-CLASS classname= "it.eng.spagobi.security.exouserprofileimpl"> </USER-PROFILE-FACTORY-CLASS> <ROLE-NAME-PATTERN-FILTER>/spagobi/.* </ROLE-NAME-PATTERN-FILTER> <ROLE-TYPE-PATTERNS> <ADMIN-PATTERN>/spagobi/admin </ADMIN-PATTERN> <DEV_ROLE-PATTERN>/spagobi/dev </DEV_ROLE-PATTERN> <TEST_ROLE-PATTERN>/spagobi/test </TEST_ROLE-PATTERN> <MODEL_ADMIN-PATTERN>/spagobi/modeladmin </MODEL_ADMIN-PATTERN> </ROLE-TYPE-PATTERNS> </SECURITY> Note: check if the sbi.security.exo jar is present in /SpagoBI/WEB-INF/lib 5.5 liferay to do Role based access rights All SpagoBI functions check if the user can or can't execute it, this is done from Spago Application Framework. At the login, SpagoBI inserts all the functionalities in User Profile and use it to check the authorization. Each SpagoBI role has some functionlities, the administrator can configure this association in SpagoBI metadata DB. 6 Change Password module Page 12 - last modified by Alessandro Taurelli on 2010/06/15 11:53

13 From 2.5 SpagoBI version is possible change the user password (using CAS environment too). It's useful when you use the Internal Connector of SpagoBI. Then, you should view a new link in login page : When you click on this link a change password page is opened: With this management is possible add several controls on the new password and on the time when its necessary to change it. SpagoBI has a new table with all this roles (the SBI_CONFIG) where there are insert all roles that SpagoBI manage. Pay attention that the administrator is excluded from these controls. 6.1 Roles The roles available today are: len_min: defines a minimum lenght; it can be useful to check the minimum length of the password when the user change it. special_char: defines a set of special chars. If it's active the system check that almost one of them is presents in the new password. upper_char: checks that at least one character must been in upper case. lower_char: check that at least one character must been in lower case. number: defines that at least one character must been a number. alphabetical: defines that at least one character must been a letter. change_first: when this role is active the system forces a change password at the first login. disactivation_time: defines a number of months after which the password become disbled (for unused). expired_time: defines a number of days after whitch the change password is necessary. Page 13 - last modified by Alessandro Taurelli on 2010/06/15 11:53

14 If you desire to apply some of this roles you should setting the relative ACTIVE value to true (1) in SBI_CONFIG table (apart from individual configurations). Page 14 - last modified by Alessandro Taurelli on 2010/06/15 11:53

Installation. Alessandro Taurelli 2010/06/15 13:39

Installation. Alessandro Taurelli 2010/06/15 13:39 Installation Alessandro Taurelli 2010/06/15 13:39 Table of Contents 1 Installation... 3 1.1 Install JDK... 3 1.2 Install Tomcat... 3 1.3 Install SpagoBI Metadata DB... 3 1.4 Deploy SpagoBI WebApplication

More information

SpagoBI SDK User Guide. Alessandro Taurelli 2010/06/15 11:30

SpagoBI SDK User Guide. Alessandro Taurelli 2010/06/15 11:30 SpagoBI SDK 2.1.0 User Guide Alessandro Taurelli 2010/06/15 11:30 Table of Contents 1 Introduction... 3 2 How to install... 3 3 Service interface... 3 3.1 opensession(string username, String password)

More information

Wildfly Final (SpagoBI 5.2.0) Davide Zerbetto 2016/11/08 16:55

Wildfly Final (SpagoBI 5.2.0) Davide Zerbetto 2016/11/08 16:55 Wildfly 8.2.0 Final (SpagoBI 5.2.0) Davide Zerbetto 2016/11/08 16:55 Table of Contents Introduction... 3 JDBC drivers configuration... 3 Thread pool component configuration... 3 Environment variables...

More information

Create Datamart. Alessandro Taurelli 2010/06/15 13:41

Create Datamart. Alessandro Taurelli 2010/06/15 13:41 Create Datamart Alessandro Taurelli 2010/06/15 13:41 Table of Contents Create Datamart... 3 1 Reverse engineering the target database schema... 3 2 Hibernate mapping adjustement... 16 3 jar production

More information

SpagoBI Server installation on JBoss. Alessandra Toninelli 2013/11/04 11:36

SpagoBI Server installation on JBoss. Alessandra Toninelli 2013/11/04 11:36 SpagoBI Server installation on JBoss Alessandra Toninelli 2013/11/04 11:36 Table of Contents 1 Download. 3 2 Deploy SpagoBI core and external engines.. 3 3 Datasources configuration 3 4 JNDI variables

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 14 Create an Identity Rule, page 15 Manage a Realm, page 17 Manage an Identity

More information

SDK 2.3 User Guide. Alessandro Taurelli 2010/06/15 11:30

SDK 2.3 User Guide. Alessandro Taurelli 2010/06/15 11:30 SDK 2.3 User Guide Alessandro Taurelli 2010/06/15 11:30 Table of Contents 1 Introduction... 3 2 How to install... 3 3 Web Services interfaces... 3 3.1 getdocumentsaslist(string type, String state, String

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 15 Create an Identity Rule, page 15 Manage a Realm, page 20 Manage an Identity

More information

User Management in Resource Manager

User Management in Resource Manager CHAPTER 8 This section describes how to manage user profiles. Topics in this section include: Overview of User Management, page 8-1 Using User Management, page 8-1 Overview of User Management In Resource

More information

Knowage CE SpagoBI2Knowage

Knowage CE SpagoBI2Knowage INTRODUCTION This package contains a Talend ETL process whose aim is to copy metadata from a SpagoBI to a Knowage. It is composed by: SpagoBI2Kowage.bat/sh: using to start the process. configurationfile.properties:

More information

TRAINING GUIDE. Lucity GIS. Web Administration

TRAINING GUIDE. Lucity GIS. Web Administration TRAINING GUIDE Lucity GIS Web Administration Lucity GIS Web Administration Contents Portal Config and SSO... 2 Registering with Portal... 2 Behind the Scenes... 4 Resetting Portal Integration... 5 Single

More information

How to use SpagoBI Installer 1.9.4

How to use SpagoBI Installer 1.9.4 How to use SpagoBI Installer 1.9.4 Authors Zerbetto Davide Yannick LE NY How to use SpagoBI Installer 1.9.4 - August,23 th 2008 pag. 1 of 16 Index 1 VERSION...3 2 DOCUMENT GOAL...3 3 REFERENCES...3 4 SYSTEM

More information

SmartPatch. Configuration Reference Version 6.x

SmartPatch. Configuration Reference Version 6.x SmartPatch Configuration Reference Version 6.x Copyright Copyright 2017 Brand-Rex Ltd. All rights reserved. No part of this publication or of the SmartPatch software, in source code or object code form,

More information

Zendesk Connector. Version 2.0. User Guide

Zendesk Connector. Version 2.0. User Guide Zendesk Connector Version 2.0 User Guide 2015 Ping Identity Corporation. All rights reserved. PingFederate Zendesk Connector Quick Connection Guide Version 2.0 November, 2015 Ping Identity Corporation

More information

KonaKart Portlet Installation for Liferay. 2 nd January DS Data Systems (UK) Ltd., 9 Little Meadow Loughton, Milton Keynes Bucks MK5 8EH UK

KonaKart Portlet Installation for Liferay. 2 nd January DS Data Systems (UK) Ltd., 9 Little Meadow Loughton, Milton Keynes Bucks MK5 8EH UK KonaKart Portlet Installation for Liferay 2 nd January 2018 DS Data Systems (UK) Ltd., 9 Little Meadow Loughton, Milton Keynes Bucks MK5 8EH UK 1 Table of Contents KonaKart Portlets... 3 Supported Versions

More information

SAML-Based SSO Configuration

SAML-Based SSO Configuration Prerequisites, page 1 SAML SSO Configuration Task Flow, page 5 Reconfigure OpenAM SSO to SAML SSO Following an Upgrade, page 9 SAML SSO Deployment Interactions and Restrictions, page 9 Prerequisites NTP

More information

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6 Gateway Installation and Configuration Guide for On-Premises Version 17 September 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites...

More information

bryan.wooten@utah.edu 6/6/14 Apereo Miami 2014 1 For Beginners How to create a group for each course secbon and provision to AcBve Directory. 6/6/14 Apereo Miami 2014 2 6/6/14 Apereo Miami 2014 3 This

More information

Liferay Security Features Overview. How Liferay Approaches Security

Liferay Security Features Overview. How Liferay Approaches Security Liferay Security Features Overview How Liferay Approaches Security Table of Contents Executive Summary.......................................... 1 Transport Security............................................

More information

Database Explorer Quickstart

Database Explorer Quickstart Database Explorer Quickstart Last Revision: Outline 1. Preface 2. Requirements 3. Introduction 4. Creating a Database Connection 1. Configuring a JDBC Driver 2. Creating a Connection Profile 3. Opening

More information

You will get Access to the DDX Portal via Web Browser. Please use the following Address:

You will get Access to the DDX Portal via Web Browser. Please use the following Address: What is the DDX Portal The DDX Portal uses the functionality of an FTP Server with some more comfortable options. You can send data directly to a person instead of downloading into a directory. Registration

More information

SpagoBI QuickStart. Luca Scarel

SpagoBI QuickStart. Luca Scarel SpagoBI QuickStart Authors Grazia Cazzin Luca Scarel SpagoBI QuickStart ver. 0.8 May, 17 th 2006 pag. 1 of 64 Index VERSION... 4 1 DOCUMENT GOAL... 4 REFERENCES... 4 HELP FOR LECTURE... 5 1.1 STYLISTIC

More information

Table of Contents. Single Sign On 1

Table of Contents. Single Sign On 1 Table of Contents Table of Contents Single Sign On SAML Authentication Using SAML SSO Authentication Setting up SAML SSO Authentication Configuring OneLogin as an Identity Provider LDAP Authentication

More information

docs.hortonworks.com

docs.hortonworks.com docs.hortonworks.com Hortonworks Data Platform : Security Administration Tools Guide Copyright 2012-2014 Hortonworks, Inc. Some rights reserved. The Hortonworks Data Platform, powered by Apache Hadoop,

More information

Directory Integration with VMware Identity Manager

Directory Integration with VMware Identity Manager Directory Integration with VMware Identity Manager VMware AirWatch 9.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Saperion. Patch Level List. Version: 8.0.1

Saperion. Patch Level List. Version: 8.0.1 Saperion Patch Level List Version: 8.0.1 Written by: Product Knowledge, R&D Date: April 2018 Copyright 1991-2018 Hyland Software, Inc. and its affiliates. Table of Contents Table of Contents... 3 Overview...

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

Quick Connection Guide

Quick Connection Guide Egnyte Connector Version 1.0 Quick Connection Guide 2015 Ping I dentity Corporation. A ll rights reserved. PingFederate Egnyte Connector Quick Connection Guide Version 1.0 February, 2015 Ping Identity

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

Remote Authentication

Remote Authentication Authentication Services, page 1 Guidelines and Recommendations for Providers, page 2 User Attributes in Providers, page 2 Two-Factor Authentication, page 4 LDAP Providers and Groups, page 5 RADIUS Providers,

More information

J2EE Development with Apache Geronimo 1.1. Aaron Mulder CTO, Chariot Solutions Committer, Apache Geronimo

J2EE Development with Apache Geronimo 1.1. Aaron Mulder CTO, Chariot Solutions Committer, Apache Geronimo J2EE Development with Apache Geronimo 1.1 Aaron Mulder CTO, Chariot Solutions Committer, Apache Geronimo Speaker Aaron Mulder Geronimo Developer Works on deployment, management, console, kernel, plugins,...

More information

Configuration Store Setup Guide

Configuration Store Setup Guide Configuration Store Setup Guide Version 1.6 Corresponding Software Version Celonis 4.3 This document is copyright of the Celonis SE. Distribution or reproduction are only permitted by written approval

More information

Introducing Apache Geronimo 1.1. Aaron Mulder CTO, Chariot Solutions Committer, Apache Geronimo

Introducing Apache Geronimo 1.1. Aaron Mulder CTO, Chariot Solutions Committer, Apache Geronimo Introducing Apache Geronimo 1.1 Aaron Mulder CTO, Chariot Solutions Committer, Apache Geronimo Speaker Aaron Mulder Geronimo Developer Works on deployment, management, console, kernel, plugins,... Online

More information

White Paper. Fabasoft Folio Portlet. Fabasoft Folio 2017 R1 Update Rollup 1

White Paper. Fabasoft Folio Portlet. Fabasoft Folio 2017 R1 Update Rollup 1 White Paper Fabasoft Folio Portlet Fabasoft Folio 2017 R1 Update Rollup 1 Copyright Fabasoft R&D GmbH, Linz, Austria, 2018. All rights reserved. All hardware and software names used are registered trade

More information

Configuring Role-Based Access Control

Configuring Role-Based Access Control Configuring Role-Based Access Control This chapter includes the following sections: Role-Based Access Control, page 1 User Accounts for Cisco UCS Manager, page 1 User Roles, page 3 Privileges, page 4 User

More information

All about SAML End-to-end Tableau and OKTA integration

All about SAML End-to-end Tableau and OKTA integration Welcome # T C 1 8 All about SAML End-to-end Tableau and OKTA integration Abhishek Singh Senior Manager, Regional Delivery Tableau Abhishek Singh Senior Manager Regional Delivery asingh@tableau.com Agenda

More information

OIG 11G R2 Field Enablement Training

OIG 11G R2 Field Enablement Training OIG 11G R2 Field Enablement Training Lab 21 - Reports Lab Disclaimer: The Virtual Machine Image and other software are provided for use only during the workshop. Please note that you are responsible for

More information

External Authentication with Ultra Protect v7.2 SSL VPN Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Ultra Protect v7.2 SSL VPN Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Ultra Protect v7.2 SSL VPN Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

FUEGO 5.5 WORK PORTAL. (Using Tomcat 5) Fernando Dobladez

FUEGO 5.5 WORK PORTAL. (Using Tomcat 5) Fernando Dobladez FUEGO 5.5 WORK PORTAL SINGLE-SIGN-ON WITH A WINDOWS DOMAIN (Using Tomcat 5) Fernando Dobladez ferd@fuego.com December 30, 2005 3 IIS CONFIGURATION Abstract This document describes a way of configuring

More information

User Registry Configuration in WebSphere Application Server(WAS)

User Registry Configuration in WebSphere Application Server(WAS) 2012 User Registry Configuration in WebSphere Application Server(WAS) By Geetha Kanra, Sanjay Singh, and Yogendra Srivastava [Abstract: This article provides step by step procedure to configure various

More information

WebEx Connector. Version 2.0. User Guide

WebEx Connector. Version 2.0. User Guide WebEx Connector Version 2.0 User Guide 2016 Ping Identity Corporation. All rights reserved. PingFederate WebEx Connector User Guide Version 2.0 May, 2016 Ping Identity Corporation 1001 17th Street, Suite

More information

Box Connector. Version 2.0. User Guide

Box Connector. Version 2.0. User Guide Box Connector Version 2.0 User Guide 2016 Ping Identity Corporation. All rights reserved. PingFederate Box Connector User Guide Version 2.0 March, 2016 Ping Identity Corporation 1001 17th Street, Suite

More information

NETCONF Client GUI. Client Application Files APPENDIX

NETCONF Client GUI. Client Application Files APPENDIX APPENDIX B The NETCONF client is a simple GUI client application that can be used to understand the implementation of the NETCONF protocol in Cisco E-DI. This appendix includes the following information:

More information

WebSphere Portal Security Configuration

WebSphere Portal Security Configuration WebSphere Portal Security Configuration Introduction Using a Login Attribute Instead of the RDN Login Using Your E-mail Attribute This guide will describe to process of using the IBM LDAP (sometimes referred

More information

U Commands. Send documentation comments to CHAPTER

U Commands. Send documentation comments to CHAPTER CHAPTER 24 The commands in this chapter apply to the Cisco MDS 9000 Family of multilayer directors and fabric switches. All commands are shown here in alphabetical order regardless of command mode. See

More information

Version 7.x. Quick-Start Guide

Version 7.x. Quick-Start Guide Version 7.x Quick-Start Guide 2005-2013 Ping Identity Corporation. All rights reserved. PingFederate Quick-Start Guide Version 7.x September, 2013 Ping Identity Corporation 1001 17th Street, Suite 100

More information

Installing Access Manager Agent for Microsoft SharePoint 2007

Installing Access Manager Agent for Microsoft SharePoint 2007 Installing Access Manager Agent for Microsoft SharePoint 2007 Author: Jeff Nester Sun Microsystems Jeff.Nester@sun.com Date: 7/17/2008 Version 1.0 Description: Paraphrased version of the Sun Java System

More information

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1

Using the VMware vcenter Orchestrator Client. vrealize Orchestrator 5.5.1 Using the VMware vcenter Orchestrator Client vrealize Orchestrator 5.5.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Logi Ad Hoc Reporting Management Console Usage Guide

Logi Ad Hoc Reporting Management Console Usage Guide Logi Ad Hoc Reporting Management Console Usage Guide Version 12.1 July 2016 Page 2 Contents Introduction... 5 Target Audience... 5 System Requirements... 6 Components... 6 Supported Reporting Databases...

More information

Colligo Console. Administrator Guide

Colligo Console. Administrator Guide Colligo Console Administrator Guide Contents About this guide... 6 Audience... 6 Requirements... 6 Colligo Technical Support... 6 Introduction... 7 Colligo Console Overview... 8 Colligo Console Home Page...

More information

Overview of the Self-Service Portal

Overview of the Self-Service Portal This chapter contains the following sections: Cisco UCS Director Self-Service Portal, page 1 Logging into the Self-Service Portal, page 1 Examining the Interface, page 4 Cisco UCS Director Self-Service

More information

DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION. Gabriella Davis The Turtle Partnership

DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION. Gabriella Davis The Turtle Partnership DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION Gabriella Davis The Turtle Partnership In This Session Review possible use cases for multiple directories Understand security implications

More information

HSM and Thales Basics using the Thales Simulator

HSM and Thales Basics using the Thales Simulator HSM and Thales Basics using the Thales Simulator Single Double Triple Length Keys Single length key = 8 bytes = 64 bits = 16 hex chars Double Length key = 16 bytes = 128 bits = 32 hex chars Triple Length

More information

OpenProdoc. ECM Open Source

OpenProdoc. ECM Open Source OpenProdoc ECM Open Source Index Overview Architecture Functionality Security Administration Requirements Roadmap Overview OpenProdoc is a general purpose document management system. It has the standard

More information

Database Setup in IRI Workbench 1

Database Setup in IRI Workbench 1 Database Setup in IRI Workbench Two types of database connectivity are required by the IRI Workbench. They are: Microsoft Open Database Connectivity (ODBC) for data movement between the database and IRI

More information

pure::variants Server Administration Manual

pure::variants Server Administration Manual pure-systems GmbH Version 4.0.14.685 for pure::variants 4.0 Copyright 2003-2018 pure-systems GmbH 2018 Table of Contents 1. Introduction... 1 2. Import Administration Project... 1 3. Manage Users and Roles...

More information

External Authentication with Checkpoint R77.20 Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Checkpoint R77.20 Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Checkpoint R77.20 Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 Merlin House Brunel Road Theale

More information

TIM TAM Integration. Planning to install the Tivoli Access Manager Combo Adapter

TIM TAM Integration. Planning to install the Tivoli Access Manager Combo Adapter TIM TAM Integration For TIM TAM Integration, TAM Combo Adapter is required. The installation and configuration details of TAM Combo Adapter is described below. Planning to install the Tivoli Access Manager

More information

create-auth-realm adds the named authentication realm

create-auth-realm adds the named authentication realm Name Synopsis Description Options create-auth-realm adds the named authentication realm create-auth-realm --classname realm_class [--help] [ --property (name=value)[:name=value]*] [ --target target_name]

More information

SmartLink configuration DME Server 3.5

SmartLink configuration DME Server 3.5 SmartLink configuration DME Server 3.5 Document version: 1.3 Date: 2010-03-22 Circulation/Restrictions: Internal/Excitor partners Applies to: DME Server 3.5 Table of contents SmartLink configuration...3

More information

Implementing Single-Sign-On(SSO) for APM UI

Implementing Single-Sign-On(SSO) for APM UI Implementing Single-Sign-On(SSO) for APM UI 1.Introduction...2 2.Overview of SSO with LTPA...3 3.Installing and configuring TDS...5 3.1.Installing TDS 6.3...5 3.2.Changing the administrator password (Optional)...7

More information

Securing ArcGIS for Server. David Cordes, Raj Padmanabhan

Securing ArcGIS for Server. David Cordes, Raj Padmanabhan Securing ArcGIS for Server David Cordes, Raj Padmanabhan Agenda Security in the context of ArcGIS for Server User and Role Considerations Identity Stores Authentication Securing web services Protecting

More information

Tutorial 5 : Invoking Siebel Business Object through the Oracle AS Adapter

Tutorial 5 : Invoking Siebel Business Object through the Oracle AS Adapter Reference: 2005/04/26 Adapter Tutorial Tutorial 5 : Invoking Siebel Business Object through the Oracle AS Adapter The Oracle AS Adapter for Siebel exposes the Siebel Business Object and Services as a Web

More information

JASPERREPORTS SERVER AUTHENTICATION COOKBOOK

JASPERREPORTS SERVER AUTHENTICATION COOKBOOK JASPERREPORTS SERVER AUTHENTICATION COOKBOOK RELEASE 7.1 http://www.jaspersoft.com Copyright 2005-2018 TIBCO Software Inc. All Rights Reserved. TIBCO Software Inc. This is version 0518-JSP71-12 of the

More information

After extracting the zip file a ldap-jetty directory is created, from now on this directory will be referred as <ldap_home>.

After extracting the zip file a ldap-jetty directory is created, from now on this directory will be referred as <ldap_home>. Configuring LDAP Geronimo uses the Apache Directory Server for its directory service, this is part of the Apache Directory Project. Geronimo implements the following two projects from the ApacheDS project.

More information

IBM Lotus Sametime Media Manager Cluster Deployment Walk-through Part VI- Bandwidth Manager IBM Corporation

IBM Lotus Sametime Media Manager Cluster Deployment Walk-through Part VI- Bandwidth Manager IBM Corporation IBM Lotus Sametime 8.5.2 Media Manager Cluster Deployment Walk-through Part VI- Bandwidth Manager Prerequisites for this part of the walk-through We've completed parts I, II, II, IV, and V Lotus Domino

More information

Banner 8/ Luminis 4 Change Overview. September 24, 2009

Banner 8/ Luminis 4 Change Overview. September 24, 2009 Banner 8/ Luminis 4 Change Overview September 24, 2009 www.sigcorp.com What information will be covered? Banner 8 changes which impact Luminis 4 What information will NOT be covered? Specific Banner 8

More information

Andowson Chang

Andowson Chang Andowson Chang http://www.andowson.com/ All JForum templates are stored in the directory templates, where each subdirectory is a template name, being the default template name callled default. There you

More information

ArcGIS Server and Portal for ArcGIS An Introduction to Security

ArcGIS Server and Portal for ArcGIS An Introduction to Security ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context

More information

Novell Access Manager authentication class for OpenID authentication

Novell Access Manager authentication class for OpenID authentication Novell Access Manager authentication class for OpenID authentication (Requires NovellAccessManager 3.1 SP1 IR1 or later) Introduction: This article describes the steps to deploy and configure a new authentication

More information

Intellicus Single Sign-on. Version: 16.0

Intellicus Single Sign-on. Version: 16.0 Intellicus Single Sign-on Version: 16.0 Copyright 2015 Intellicus Technologies This document and its content is copyrighted material of Intellicus Technologies. The content may not be copied or derived

More information

Signicat Connector for Java Version 2.6. Document version 3

Signicat Connector for Java Version 2.6. Document version 3 Signicat Connector for Java Version 2.6 Document version 3 About this document Purpose Target This document is a guideline for using Signicat Connector for Java. Signicat Connector for Java is a client

More information

Data Exchange via ProjektPortal

Data Exchange via ProjektPortal Data Exchange via ProjektPortal Application of the tool cfolders for business partners Via the collaboration cfolders, you - as a connected business partner - can gain reading access to the documents allocated

More information

Configuring Role-Based Access Control

Configuring Role-Based Access Control Configuring Role-Based Access Control This chapter includes the following sections: Role-Based Access Control, page 1 User Accounts for Cisco UCS Manager, page 1 User Roles, page 4 User Locales, page 7

More information

OIG 11G R2 Field Enablement Training

OIG 11G R2 Field Enablement Training OIG 11G R2 Field Enablement Training Lab 14 - Reconciliation Lab Disclaimer: The Virtual Machine Image and other software are provided for use only during the workshop. Please note that you are responsible

More information

Exam : Title : IBM WebSphere Commerce V7.0 Application Development. Version : Demo

Exam : Title : IBM WebSphere Commerce V7.0 Application Development. Version : Demo Exam : 000-723 Title : IBM WebSphere Commerce V7.0 Application Development Version : Demo 1.An application developer notices that a policy that is expected to grant access appears in the trace, however

More information

Configuration Export and Import

Configuration Export and Import This chapter includes the following sections:, page 1 From the Export & Import, you can schedule configuration backup for Cisco UCS Central and the registered Cisco UCS Domains. You can schedule export

More information

Credential Policy CHAPTER

Credential Policy CHAPTER CHAPTER 21 Cisco Unified Communications Manager authenticates user login credentials before allowing system access. To help secure user accounts, you can specify settings for failed logon attempts, lockout

More information

penelope case management software AUTHENTICATION GUIDE v4.4 and higher

penelope case management software AUTHENTICATION GUIDE v4.4 and higher penelope case management software AUTHENTICATION GUIDE v4.4 and higher Last modified: August 9, 2016 TABLE OF CONTENTS Authentication: The basics... 4 About authentication... 4 SSO authentication... 4

More information

SAS Integration Technologies Server Administrator s Guide

SAS Integration Technologies Server Administrator s Guide SAS 9.1.2 Integration Technologies Server Administrator s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS 9.1.2 Integration Technologies: Server Administrator

More information

Oracle Fusion Middleware

Oracle Fusion Middleware Oracle Fusion Middleware Tutorial for Oracle Identity Management 11g Release 1 (11.1.1) E10276-01 May 2009 Oracle Fusion Middleware Tutorial for Oracle Identity Management, 11g Release 1 (11.1.1) E10276-01

More information

web.xml Deployment Descriptor Elements

web.xml Deployment Descriptor Elements APPENDIX A web.xml Deployment Descriptor s The following sections describe the deployment descriptor elements defined in the web.xml schema under the root element . With Java EE annotations, the

More information

IVE Quick Startup Guide - OS 4.0

IVE Quick Startup Guide - OS 4.0 IVE Quick Startup Guide - OS 4.0 Initial Setup Once you receive the IVE device, unpack the IVE and connect it to a PC or Laptop using the console (null modem) cable provided with the IVE. You have to connect

More information

F5 BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.1

F5 BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.1 F5 BIG-IQ Centralized Management: Licensing and Initial Setup Version 5.1 Table of Contents Table of Contents BIG-IQ System Introduction...5 About BIG-IQ System Management...5 About secure communication

More information

StorageGRID Webscale 11.0 Tenant Administrator Guide

StorageGRID Webscale 11.0 Tenant Administrator Guide StorageGRID Webscale 11.0 Tenant Administrator Guide January 2018 215-12403_B0 doccomments@netapp.com Table of Contents 3 Contents Administering a StorageGRID Webscale tenant account... 5 Understanding

More information

FOCUS ON REAL DESIGN AUTOMATE THE REST. CUSTOMTOOLS installation guide

FOCUS ON REAL DESIGN AUTOMATE THE REST. CUSTOMTOOLS installation guide FOCUS ON REAL DESIGN AUTOMATE THE REST CUSTOMTOOLS installation guide Francois Simon 15.02.2016 The purpose of that guide is to assist you during the different stages of the installation of CUSTOMTOOLS.

More information

CA Identity Manager. Provisioning Guide. r12

CA Identity Manager. Provisioning Guide. r12 CA Identity Manager Provisioning Guide r12 This documentation and any related computer software help programs (hereinafter referred to as the Documentation ) is for the end user s informational purposes

More information

Secure Access Manager (SAM) Administrator Guide December 2017

Secure Access Manager (SAM) Administrator Guide December 2017 Secure Access Manager (SAM) Administrator Guide December 2017 Copyright 2017 Exostar, LLC All rights reserved. 1 SECURE ACCESS MANAGER (SAM) OVERVIEW... 4 ADMINISTRATIVE ROLES OVERVIEW... 4 SAM NAVIGATIONAL

More information

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

ITCertMaster.  Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way! ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com Exam : C_AUDSEC_731 Title : SAP Certified Technology Associate - SAP Authorization and Auditing for SAP NetWeaver 7.31

More information

Informatica BCI Extractor Solution

Informatica BCI Extractor Solution Informatica BCI Extractor Solution Objective: The current BCI implementation delivered by Informatica uses a LMAPI SDK plugin to serially execute idoc requests to SAP and then execute a process mapping

More information

User Manual Al Manhal. All rights reserved v 3.0

User Manual Al Manhal. All rights reserved v 3.0 User Manual 1 2010-2016 Al Manhal. All rights reserved v 3.0 Table of Contents Conduct a Search... 3 1. USING SIMPLE SEARCH... 3 2. USING ADVANCED SEARCH... 4 Search Results List... 5 Browse... 7 1. BROWSE

More information

CA IdentityMinder. Glossary

CA IdentityMinder. Glossary CA IdentityMinder Glossary 12.6.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page. Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator

More information

Donaubauer CRM to Online - EXE

Donaubauer CRM to Online - EXE Donaubauer CRM to Online - EXE User Manual CRM to Online - EXE for Microsoft Dynamics 365 for version 8.2.3 Table of Contents 1 Introduction...3 2 Prerequisites...4 2.1 Prerequisites in the target CRM...

More information

list-modules lists Application Server modules

list-modules lists Application Server modules Name Synopsis Description Options list-modules lists Application Server modules list-modules [--terse={true false}][ --echo={true false} ] [ --interactive={true false} ] [ --host host] [--port port] [--secure

More information

Integrating a directory server

Integrating a directory server Integrating a directory server Knox Manage provides a directory service that integrates a client's directory server through a Lightweight Directory Access Protocol (LDAP)-based Active Directory service

More information

Perceptive Matching Engine

Perceptive Matching Engine Perceptive Matching Engine Advanced Design and Setup Guide Version: 1.0.x Written by: Product Development, R&D Date: January 2018 2018 Hyland Software, Inc. and its affiliates. Table of Contents Overview...

More information

Oracle Utilities Opower Energy Efficiency Web Portal - Classic Single Sign-On

Oracle Utilities Opower Energy Efficiency Web Portal - Classic Single Sign-On Oracle Utilities Opower Energy Efficiency Web Portal - Classic Single Sign-On Configuration Guide E84772-01 Last Update: Monday, October 09, 2017 Oracle Utilities Opower Energy Efficiency Web Portal -

More information

MTAT Introduction to Databases

MTAT Introduction to Databases MTAT.03.105 Introduction to Databases Lecture #2 Introduction to SAP SQL Anywhere 17 Ljubov Jaanuska (ljubov.jaanuska@ut.ee) Lecture 1. Summary Data is collection of unprocessed items that may consists

More information

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into

The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated into any contract. It is not a commitment to deliver any material,

More information