MuseKnowledge Proxy Source Profiling

Size: px
Start display at page:

Download "MuseKnowledge Proxy Source Profiling"

Transcription

1 MuseKnowledge Proxy Source Profiling MuseGlobal, Inc. One Embarcadero Suite 500 San Francisco, CA MuseGlobal S.A Calea Bucuresti Bl. 27B, Sc. 1, Ap. 10 Craiova, România EduLib, S.R.L. Calea Bucuresti Bl. 27B, Sc. 1, Ap. 2 Craiova, România Version: 1.0 Date: 22nd June 2016 Author: EduLib, S.R.L.

2 MuseKnowledge Proxy Highly customizable multi-platform proxy server Gateway to authenticated restricted content; Rewriting web server; Web Access Management (WAM); Multi tenant hosting for all customers; MuseKnowledge Proxy Applications: Fully configurable interfaces allowing administrators to setup remote or local Data Sources ("Sources"); End users enjoy a single sign-on for all of the subscribed data; The number of MuseKnowledge Proxy Applications and sources installed in an application are controlled by the license; More than 10 years within the Muse Federated Search Platform to manage the authentication to resources and the navigation to full text. PAGE 2

3 MuseKnowledge Proxy MuseKnowledge Proxy Terminology Source content provider resource (platform, website); MuseKnowledge Proxy Source profile XML file with the configuration options for a specific resource; MuseKnowledge Proxy files location on disk: ${MUSE_HOME}/proxy Where ${MUSE_HOME} is default %ProgramFiles%/muse on Windows Operating Systems and /opt/muse on Linux Operating Systems. MuseKnowledge Proxy Application location on disk: ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID Where Application_ID is the ID of the MuseKnowledge Proxy Application. Source profiles location on disk: ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/sources/ Assumptions for adding a new MuseKnowledge Proxy Source profile A MuseKnowledge Proxy Application already exists; The MuseKnowledge Proxy Application is accessible; The Source Groups are defined; The Source is defined and placed within at least one Source Group. PAGE 3

4 MuseKnowledge Proxy Software used for profiling Web browser: Google Chrome, Mozilla Firefox, Internet Explorer; Network sniffer: Fiddler, Browser Developer Tools; XML Editor (optional). XML files can be edited with any text editor (like Notepad for example) however it is good to verify the XML is well formed by loading it into a browser. Skills for MuseKnowledge Proxy Admin Good networking knowledge; Good understanding of HTTP; Good understanding of HTML; Good knowledge of the MuseKnowledge Proxy and its structure. PAGE 4

5 Source Configuration Source Profile XML file: ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/sources/S ourceid.xml Where Application_ID is the MuseKnowledge Proxy Application identifier and SourceID.xml is the XML configuration file associated with that resource. Sources index file: ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/Sources.x ml It contains the list of sources present in the MuseKnowledge Proxy Application. Sample entry: <SOURCE> <IDENTIFIER code="0">forensicnetbase</identifier> <NAME>FORENSICnetBASE</NAME> <DESCRIPTION>Featuring works by esteemed criminologists and forensic practitioners, this unparalleled e-library boasts an ever-growing number of essential references in crisis management and negotiation methods, arson and homicide investigation, expert witnessing, and forensic pathology. This versatile invaluable product is well-suited to the needs of the smallest of sheriff&apos;s departments to large governmental law enforcement agencies, such as the CIA, DEA, and FBI. </DESCRIPTION> </SOURCE> <MODULE> </MODULE> <CLASS>com.edulib.muse.proxy.application.sources.modules.impl.HttpModule</CLASS> <CONFIGURATION_FILE>${WEB_CONTEXT_HOME}/profiles/sources/FORENSICnetBASE.xml</CONFIGURATION_FILE> More PAGE 5

6 Source Configuration Sources Groups definitions: ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/SourcesGr oups.xml It contains the groups definitions. Sample entry: <SOURCES_GROUP> <IDENTIFIER>1</IDENTIFIER> <NAME>Default Sources</NAME> <SOURCES> </SOURCES> <IDENTIFIER>FORENSICnetBASE</IDENTIFIER> <IDENTIFIER>ProjectMuse</IDENTIFIER> </SOURCES_GROUP> 3 steps for enabling a MuseKnowledge Proxy source 1. Make sure the source XML profile exists, if not, create it by copying an existing one or download it from our EduLib web repository : ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/sources/SourceID.xml 2. Add a new entry in the sources index file, e.g. in the file: ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/Sources.xml 3. Add a new entry in the sources groups file, e.g. in the file: ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/SourcesGroups.xml PAGE 6

7 Basic Source Settings <URL> The URL of the target site service accessed by the source. Example: <URL> <NAME> The name of the source. Example: <NAME>IEEE Xplore Digital Library</NAME> <DESCRIPTION> A description of the source. Example: <DESCRIPTION>The IEEE Xplore digital library is a powerful resource for discovery and access to scientific and technical content published by the IEEE (Institute of Electrical and Electronics Engineers) and its publishing partners.</description> <REWRITING_PATTERNS> The URLs rewriting patterns. In the target site service pages only the URLs matching these patterns will be rewritten. Values: [include: PATTERNS], [exclude: PATTERNS] where PATTERNS = semicolon-delimited list of regular expressions matching the site's domain[:port][/url_file]. Example: <REWRITING_PATTERNS>*.ieee.org;*/*.js*;</REWRITING_PATTERNS> PAGE 7

8 Advanced Source Settings <TRANSPARENT_CONTENT_PATTERNS> URLs matching these patterns are rewritten to follow-up links if they match the REWRITING_PATTERNS, so they will be proxied, but their response content is not processed for rewrite. This is necessary because some resources needs to be requested from the same origin but should remain un-touched. Example: <TRANSPARENT_CONTENT_PATTERNS>*/*.js*;ieeexplore.ieee.org/xpl/mostPopular*.ajax*;ieeexplore.ieee.org/xpl/mostRecent*.ajax*;</T RANSPARENT_CONTENT_PATTERNS> <REWRITE_BY_HOST> true or false. This option states if the type of the follow-up links is Rewrite by Host. When set to true the follow-up links will contain the Muse Proxy marker values as part of the proxy host name subdomain. Wildcard DNS is required to have the Rewrite by Host functional. Example of a follow-up link when using rewrite by host: <ENCODING> The encoding of the site (e.g. UTF-8). <REFERER> The referer for the source. It is required to be filled for the sources that authenticate only from an explicit referer. Can be also used if it is required to have a custom referer in order for the target source provider to easily track the request coming from this module. <CUSTOM_HTTP_HEADERS> Custom HTTP headers to be sent when performing the request. Structure: <CUSTOM_HTTP_HEADER> The custom HTTP header. <NAME> The custom HTTP header name. </NAME> <VALUE> The custom HTTP header value. </VALUE> </CUSTOM_HTTP_HEADER> More PAGE 8

9 Advanced Source Settings <REPLACE_HOST>The value to be used for replacing the host from the URL obtained after the source authentication in order to be redirected to another page from the target site. Example: <REPLACE_HOST>es.mysite.com</REPLACE_HOST> <REPLACE_PATH> The value to be used for replacing the path from the URL obtained after the source authentication in order to be redirected to another page from the target site. Example: <REPLACE_PATH>/search/searchForm.html</REPLACE_PATH> <SSL_CERTIFICATES> The SSL certificates full path to be used for the source in order to obtain HTTPS authentication to the target source. <SSL_TRUST_ALL> If set to true it will accept all certificates from the remote source. <FILTER> Configurable filter to be applied on the content for this source. This rewriting filter is a general configurable Find and Replace filter which can rewrite/unrewrite or do other replacements based on JDK regular expressions and/or Muse Proxy specific Token Rule expressions. There can be multiple FILTER elements and also multiple find and replace rules and Token rules inside a FILTER element. Example: <FILTER> <PATTERNS> <FIND scope="first"> <REPLACE rewrite="0">$0</replace> </FILTER> PAGE 9

10 Additional Source Configuration Settings <EXTRACTOR>, <URL>, <POST_PARAMETERS> Extract and Navigate. Example: <URL> <EXTRACTOR ref="nexturl"><![cdata[<a class="ul" href="([^"]+)"\s*onmouseover="popup\('ihs Standards]]></EXTRACTOR> <URL>${nextURL_1}</URL> Processing options with refprocess attribute: "urlencode", "urldecode", "xmlescape", "xmlunescape. Example: <URL> <EXTRACTOR ref="eventtarget" refprocess="urlencode">type="hidden"\sname=" EVENTTARGET"\sid=" EVENTTARGET"\svalue="([^"]*?)"</EXTRACTOR> <EXTRACTOR ref="eventargument" refprocess="urlencode">type="hidden"\sname=" EVENTARGUMENT"\sid=" EVENTARGUMENT"\svalue="([^"]*?)"</EXTRACTOR> <EXTRACTOR ref="viewstate" refprocess="urlencode">type="hidden"\sname=" VIEWSTATE"\sid=" VIEWSTATE"\svalue="([^"]+?)"</EXTRACTOR> <EXTRACTOR ref="eventvalidation" refprocess="urlencode">type="hidden"\sname=" EVENTVALIDATION"\sid=" EVENTVALIDATION"\svalue="([^"]+?)"</EXTRACTOR> <URL> <POST_PARAMETERS><![CDATA[ EVENTTARGET=${eventtarget_1}& EVENTARGUMENT=${eventargument_1}& VIEWSTATE=${views tate_1}& EVENTVALIDATION=${eventvalidation_1}&_ctl0%3AphContent%3AtxUserName=${userName}&_ctl0%3AphContent%3AtxPass word=${userpassword}&_ctl0%3aphcontent%3abtnlogin=login]]></post_parameters> Define own JavaScript functions to be referred in the refprocess attribute: <DEF><![CDATA[ function jsonjoin(input) { //JS code here } ]]></DEF> <EXTRACTOR ref="sectek" refprocess="jsonjoin">(^.*+$)</extractor> More PAGE 10

11 Additional Source Configuration Settings <SHOW_GET_PARAMETERS> Show the URL details in the follow-up link. Example: <SHOW_GET_PARAMETERS>true</SHOW_GET_PARAMETERS> <CONNECT_TIMEOUT>, <READ_TIMEOUT> Connection time-outs. Example: <CONNECT_TIMEOUT>60000</CONNECT_TIMEOUT> <READ_TIMEOUT>60000</READ_TIMEOUT> <PROXY_USED>, <PROXY_HOST>, <PROXY_PORT>, <PROXY_PAC>, <PROXY_AUTHORIZATION_USER_NAME>, <PROXY_AUTHORIZATION_USER_PASSWORD>, <PROXY_AUTHORIZATION_SCHEME> Proxy Chaining configuration elements. Example: <PROXY_USED>SOURCE_LEVEL</PROXY_USED> <PROXY_HOST> </PROXY_HOST> <PROXY_PORT>3128</PROXY_PORT> <PROXY_AUTHORIZATION_USER_NAME>univ</PROXY_AUTHORIZATION_USER_NAME> <PROXY_AUTHORIZATION_USER_PASSWORD>fadwadOrp0</PROXY_AUTHORIZATION_USER_PASSWORD> <PROXY_AUTHORIZATION_SCHEME>Basic</PROXY_AUTHORIZATION_SCHEME> <LINK_OUT> Link out to other source profiles. Example: <LINK_OUT>true</LINK_OUT> <COOKIES> Specify cookies to be sent. Example: <COOKIES> <COOKIE>persistentSession=hl1k61cn32ecu1iu979cr5rbk2; path=/; domain=mydomain.com;</cookie> </COOKIES> More PAGE 11

12 Additional Source Configuration Settings <X_FORWARDED_FOR> Reveal the IP of the end-user to the Target Source. Example: <X_FORWARDED_FOR>true</X_FORWARDED_FOR> <FOLLOW_REDIRECTS> Automatic HTTP Redirects. Example: <FOLLOW_REDIRECTS>true</FOLLOW_REDIRECTS> <REDIRECT> Redirecting to Remote Source, e.g. drop out of rewriting. Example: <REDIRECT>true</REDIRECT> <CLIENT_KEYSTORE> Client Side SSL Authentication. Example: <CLIENT_KEYSTORE password="changeit">${web_context_home}/certificates/seap.jks</client_keystore> <PARAMETERS> General use definition of parameters. Example: <PARAMETERS> <PARAMETER> <NAME> </NAME><VALUE>MY_ </VALUE> </PARAMETER> <PARAMETER> <NAME>password</NAME><VALUE>MY_PASSWORD</VALUE> </PARAMETER> </PARAMETERS> <AUTHENTICATION_TYPE>, <LAST_UPDATED> Informational elements. Example: <AUTHENTICATION_TYPE>IP</AUTHENTICATION_TYPE> <LAST_UPDATED> </LAST_UPDATED> More PAGE 12

13 Recap: Adding a new Source Edit Edit Copy an existing ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/Sources.xml ${MUSE_HOME}/proxy/webcontexts/Applications/Application_ID/profiles/SourcesGroups.xml source profile under Duplicate an existing entry and change accordingly the values of IDENTIFIER, NAME and Duplicate a new filename, for CONFIGURATION_FILE. an existing entry and change accordingly the values of IDENTIFIER. example NewSource. Edit the NewSource.xml file and: 1) Change the URL value with the one of your new source. 2) Change the values for the NAME and DESCRIPTION fields accordingly. 3) Change accordingly the values for REWRITING_PATTERNS. PAGE 13

14 Username/Password Controlled Resource Use a network sniffer or browser developer tools to see the request made when submitting the username/password; URL value: POST_PARAMETERS value: <POST_PARAMETERS>autho=${userName}&password=${userPassword}&language=en&next=html%2Fhome.html&bad=error%2Fbadlo gin_en.html&entityjavascript=true&entityscreensize=large</post_parameters> PARAMETERS values: <PARAMETERS> <PARAMETER><NAME>userName</NAME><VALUE> </VALUE> </PARAMETER> <PARAMETER><NAME>userPassword</NAME><VALUE>test%26Password</VALUE> </PARAMETER> </PARAMETERS> PAGE 14

15 Use Case 1: How to correct unrewritten links Sniff communication and search for the unrewritten URL. Once found identify the URL pattern of the request and create a filter. PAGE 15

16 Use Case 2: A Complex Username/Password Authentication Scenario Second most popular authentication type after IP authentication. IPs shortage is becoming an issue; Make use of Extract and Navigate features: EXTRACTOR, URL and POST_PARAMETERS; Applicable where providing the Username/Password values in a single request is not working; More PAGE 16

17 Use Case 2: A Complex Username/Password Authentication Scenario <URL> <POST_PARAMETERS></POST_PARAMETERS> First request to the logon page. From the logon page extract the dynamic hidden fields. <EXTRACTOR ref="eventtarget" refprocess="urlencode">type="hidden"\sname=" EVENTTARGET"\sid=" EVENTTARGET"\svalue="([^"]*?)"</EXTRACTOR> <EXTRACTOR ref="eventargument" refprocess="urlencode">type="hidden"\sname=" EVENTARGUMENT"\sid=" EVENTARGUMENT"\svalue="([^"]*?)"</EXTRACTOR> <EXTRACTOR ref="viewstate" refprocess="urlencode">type="hidden"\sname=" VIEWSTATE"\sid=" VIEWSTATE"\svalue="([^"]+?)"</EXTRACTOR> <EXTRACTOR ref="viewstategenerator" refprocess="urlencode">type="hidden"\sname=" VIEWSTATEGENERATOR"\sid=" VIEWSTATEGENERATOR"\svalue="([^"]+?)"</EXTRACTOR> <EXTRACTOR ref="eventvalidation" refprocess="urlencode">type="hidden"\sname=" EVENTVALIDATION"\sid=" EVENTVALIDATION"\svalue="([^"]+?)"</EXTRACTOR> More PAGE 17

18 Use Case 2: A Complex Username/Password Authentication Scenario <URL> <POST_PARAMETERS><![CDATA[ EVENTTARGET=${eventtarget_1}& EVENTARGUMENT=${eventargument_1}& VIEWSTATE=${viewstate_1}& VIEWSTATEGENERATOR=${viewstategenerator_1}& EVENTVALIDATION=${eventvalidation_1}& ctl00%24maincontent%24userlogin%24username=${username}&ctl00%24maincontent%24userlogin%24password=${userpassword}& ctl00%24maincontent%24userlogin%24button1=giri%c5%9f]]></post_parameters> <PARAMETERS> <PARAMETER><NAME>userName</NAME><VALUE>YYY</VALUE> </PARAMETER> <PARAMETER><NAME>userPassword</NAME><VALUE>ZZZ</VALUE> </PARAMETER> </PARAMETERS> Second request to submit the login details using the values extracted previously. Complete configuration source profile can be downloaded from here. PAGE 18

19 Use Case 3: Transparent Navigation Scenario Perform actions transparently to the end-user: authenticate with username/password, change the default language, land on the desired page. And reach to the desired landing page. Logon page Landing page after logon from where change the language to English. In the new page click on UK United Kingdom and then on Contract notice More PAGE 19

20 Use Case 3: Transparent Navigation Scenario <URL> <EXTRACTOR ref="step1" refprocess="xmlunescape"><![cdata[<a href="( loginrequestid=[^"]+?)"\sclass="main_domain external_hover"\stitle="external"><span class="external"></span>]]></extractor> <URL>${step1_1}</URL> <EXTRACTOR ref="posturl">id="loginform"\sname="strongloginform"\saccept-charset="utf-8"\saction="([^"]+?)"</extractor> <EXTRACTOR ref="txid">type="hidden"\sname="txid"\svalue="([^"]+?)"</extractor> <EXTRACTOR ref="lt">type="hidden"\sname="lt"\svalue="([^"]+?)"</extractor> <EXTRACTOR ref="loginrequestid">type="hidden"\sname="loginrequestid"\svalue="([^"]+?)"</extractor> <URL>${postURL_1}</URL> <POST_PARAMETERS><![CDATA[TxId=${TxId_1}&lt=${lt_1}&domain=external&loginRequestId=${loginRequestId_1}&useDefaultStrength=true& timezone=gmt%2b03%3a00&selfhost=webgate.ec.europa.eu&username=${username}&zpassword=&password=${userpassword}&submit=login%21]]> </POST_PARAMETERS> <EXTRACTOR ref="lasturl"><![cdata[<a\sid="fallbacklink"\shref="( <URL>${lastURL_1}</URL> <URL> <URL> <POST_PARAMETERS><![CDATA[action=cl&lgId=en]]></POST_PARAMETERS> Perform authentication to the site s authentication service and go to the home page. Change the language to English. <URL> Click on the UK United Kingdom link. <URL> <POST_PARAMETERS><![CDATA[action=selectFacet&quickSearchCriteria=&searchScope=LAST_EDITION]]></POST_PARAMETERS> Complete configuration source profile can be downloaded from here. Click on the Contract notice link. PAGE 20

21 MuseKnowledge Proxy Source Profiling

SEAMLESS AND SECURE REMOTE ACCESS TO RESOURCES

SEAMLESS AND SECURE REMOTE ACCESS TO RESOURCES SEAMLESS AND SECURE REMOTE ACCESS TO RESOURCES VERSION 1.4 19 MARCH 2018 EDULIB, S.R.L. MUSE KNOWLEDGE HEADQUARTERS Calea Bucuresti, Bl. 27B, Sc. 1, Ap. 10, Craiova 200675, România phone +40 251 413 496

More information

MuseKnowledge Hybrid Search

MuseKnowledge Hybrid Search MuseKnowledge Hybrid Search MuseGlobal, Inc. One Embarcadero Suite 500 San Francisco, CA 94111 415 896-6873 www.museglobal.com MuseGlobal S.A Calea Bucuresti Bl. 27B, Sc. 1, Ap. 10 Craiova, România 40

More information

MuseKnowledge Source Package Building

MuseKnowledge Source Package Building MuseKnowledge Source Package Building MuseGlobal, Inc. One Embarcadero Suite 500 San Francisco, CA 94111 415 896-6873 www.museglobal.com MuseGlobal S.A Calea Bucuresti Bl. 27B, Sc. 1, Ap. 10 Craiova, România

More information

Smart Federated Search for Egyptian Knowledge Bank

Smart Federated Search for Egyptian Knowledge Bank Smart Federated Search for Egyptian Knowledge Bank MuseGlobal, Inc. 421 Fayetteville Street Suite 1100 Raleigh, NC 27601 U.S.A. www.museglobal.com MuseGlobal S.A Calea Bucuresti Bl. 27B, Sc. 1, Ap. 10

More information

How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT

How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT How to Configure SSL VPN Portal for Forcepoint NGFW TECHNICAL DOCUMENT Ta Table of Contents Table of Contents TA TABLE OF CONTENTS 1 TABLE OF CONTENTS 1 BACKGROUND 2 CONFIGURATION STEPS 2 Create a SSL

More information

BIG-IP Access Policy Manager : Portal Access. Version 12.1

BIG-IP Access Policy Manager : Portal Access. Version 12.1 BIG-IP Access Policy Manager : Portal Access Version 12.1 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...7

More information

SMART CONNECTOR TECHNOLOGY FOR FEDERATED SEARCH

SMART CONNECTOR TECHNOLOGY FOR FEDERATED SEARCH SMART CONNECTOR TECHNOLOGY FOR FEDERATED SEARCH VERSION 1.4 27 March 2018 EDULIB, S.R.L. MUSE KNOWLEDGE HEADQUARTERS Calea Bucuresti, Bl. 27B, Sc. 1, Ap. 10, Craiova 200675, România phone +40 251 413 496

More information

BIG-IP Access Policy Manager : Portal Access. Version 13.0

BIG-IP Access Policy Manager : Portal Access. Version 13.0 BIG-IP Access Policy Manager : Portal Access Version 13.0 Table of Contents Table of Contents Overview of Portal Access...7 Overview: What is portal access?...7 About portal access configuration elements...

More information

Lotus Notes Domino 6/ 6.5 Developing Web Applications.

Lotus Notes Domino 6/ 6.5 Developing Web Applications. Lotus 190-612 Notes Domino 6/ 6.5 Developing Web Applications http://killexams.com/exam-detail/190-612 QUESTION: 81 Rob uses Macromedia Dreamweaver MX to create HTML files, style sheets and JavaScript

More information

ForgeRock Access Management Customization and APIs

ForgeRock Access Management Customization and APIs training@forgerock.com ForgeRock Access Management Customization and APIs Description AM-421 Course Description Revision B This course provides a hands-on technical introduction to ForgeRock Access Management

More information

This Readme describes the NetIQ Access Manager 3.1 SP5 release.

This Readme describes the NetIQ Access Manager 3.1 SP5 release. NetIQ Access Manager 3.1 SP5 Readme January 2013 This Readme describes the NetIQ Access Manager 3.1 SP5 release. Section 1, What s New, on page 1 Section 2, Upgrading or Migrating to Access Manager 3.1

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Oracle Eloqua Legacy Authenticated Microsites and Contact Users. Configuration Guide

Oracle Eloqua Legacy Authenticated Microsites and Contact Users. Configuration Guide Oracle Eloqua Legacy Authenticated Microsites and Contact Users Configuration Guide 2019 Oracle Corporation. All rights reserved 04-Jan-2019 Contents 1 Authenticated microsites 3 2 Creating authenticated

More information

Access Manager 3.2 Service Pack 2 IR1 resolves several previous issues.

Access Manager 3.2 Service Pack 2 IR1 resolves several previous issues. Access Manager 3.2 Service Pack 2 IR1 Readme September 2013 Access Manager 3.2 Service Pack 2 IR1 resolves several previous issues. Many of these improvements were made in direct response to suggestions

More information

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure a Presence Gateway for Microsoft Exchange Integration, page 1 SAN and Wildcard Certificate Support, page

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Integration Documentation. Automated User Provisioning Common Logon, Single Sign On or Federated Identity Local File Repository Space Pinger

Integration Documentation. Automated User Provisioning Common Logon, Single Sign On or Federated Identity Local File Repository Space Pinger Integration Documentation Automated User Provisioning Common Logon, Single Sign On or Federated Identity Local File Repository Space Pinger Revision History Version No. Release Date Author(s) Description

More information

Microsoft Exchange Server 2013 and 2016 Deployment

Microsoft Exchange Server 2013 and 2016 Deployment Microsoft Exchange Server 2013 and 2016 Deployment Barracuda Networks has conducted interoperability tests using the Barracuda Load Balancer ADC and Microsoft Exchange Server 2013 and Microsoft Exchange

More information

Embedded WAYF A slightly new approach to the discovery problem. Lukas Hämmerle

Embedded WAYF A slightly new approach to the discovery problem. Lukas Hämmerle Embedded WAYF A slightly new approach to the discovery problem Lukas Hämmerle lukas.haemmerle@switch.ch The Problem In a federated environment, the user has to declare where he wants to authenticate. The

More information

Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE. Release 9.2

Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE. Release 9.2 Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE Release 9.2 NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel

More information

Microsoft MB2-711 Exam

Microsoft MB2-711 Exam Volume: 96 Questions Question No: 1 You are the primary technical resource for an enterprise deployment of Microsoft Dynamics CRM 2016 on premises that has 300 seats. You are asked about hardware requirements

More information

New in Release: Secomea Release 8.0. This document shows the changes from release 7.4 to release 8.0. Version: 1.5, 2018

New in Release: Secomea Release 8.0. This document shows the changes from release 7.4 to release 8.0. Version: 1.5, 2018 New in Release: Secomea Release 8.0 This document shows the changes from release 7.4 to release 8.0. Version: 1.5, 2018 Table of Contents Change log 4 1. Release 8.0 4 Highlights 4 2. General 6 2.1. New

More information

CA SiteMinder Federation

CA SiteMinder Federation CA SiteMinder Federation Legacy Federation Guide 12.52 SP1 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Chesar 3.4 Desktop (standalone) installation manual

Chesar 3.4 Desktop (standalone) installation manual Chesar 3.4 Desktop (standalone) installation manual 2 Chesar 3.4 Desktop (standalone) installation manual Changes to this document Date Modification 23/05/2017 First version. 14/11/2017 Section 8 on establishing

More information

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2 VMware Identity Manager Administration MAY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.

Android Mobile Single Sign-On to VMware Workspace ONE. SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3. Android Mobile Single Sign-On to VMware Workspace ONE SEP 2018 VMware Workspace ONE VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware

More information

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0

Author: Tonny Rabjerg Version: Company Presentation WSF 4.0 WSF 4.0 Author: Tonny Rabjerg Version: 20150730 Company Presentation WSF 4.0 WSF 4.0 Cybercrime is a growth industry. The returns are great, and the risks are low. We estimate that the likely annual cost to the

More information

Work with Forms in Joomla (Visforms and SAS Invite System)

Work with Forms in Joomla (Visforms and SAS Invite System) Work with Forms in Joomla (Visforms and SAS Invite System) Instructor for this Workshop Laura Gordon Web Development School of Arts and Sciences TABLE OF CONTENTS Welcome... 3 What is Joomla?... 3 What

More information

Web Applications Installation. version

Web Applications Installation. version version 2017.1 Disclaimer This document is for informational purposes only and is subject to change without notice. This document and its contents, including the viewpoints, dates and functional content

More information

NIELSEN API PORTAL USER REGISTRATION GUIDE

NIELSEN API PORTAL USER REGISTRATION GUIDE NIELSEN API PORTAL USER REGISTRATION GUIDE 1 INTRODUCTION In order to access the Nielsen API Portal services, there are three steps that need to be followed sequentially by the user: 1. User Registration

More information

Guide to Deploying NetScaler as an Active Directory Federation Services Proxy

Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Deployment Guide Guide to Deploying NetScaler as an Active Directory Federation Services Proxy Enabling seamless authentication for Office 365 use cases Table of Contents Introduction 3 ADFS proxy deployment

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware AirWatch 9.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Can HTTP Strict Transport Security Meaningfully Help Secure the Web? nicolle neulist June 2, 2012 Security B-Sides Detroit

Can HTTP Strict Transport Security Meaningfully Help Secure the Web? nicolle neulist June 2, 2012 Security B-Sides Detroit Can HTTP Strict Transport Security Meaningfully Help Secure the Web? nicolle neulist June 2, 2012 Security B-Sides Detroit 1 2 o hai. 3 Why Think About HTTP Strict Transport Security? Roadmap what is HSTS?

More information

Early Data Analyzer Web User Guide

Early Data Analyzer Web User Guide Early Data Analyzer Web User Guide Early Data Analyzer, Version 1.4 About Early Data Analyzer Web Getting Started Installing Early Data Analyzer Web Opening a Case About the Case Dashboard Filtering Tagging

More information

XCONNECT 2018 GATEWAY USER MANUAL

XCONNECT 2018 GATEWAY USER MANUAL XCONNECT 2018 GATEWAY USER MANUAL V1.0 This guide will assist in the installation and configuration of the xconnect 2018 Gateway. Version 1.0 of the xconnect Gateway web portal includes the necessary functionality

More information

Detects Potential Problems. Customizable Data Columns. Support for International Characters

Detects Potential Problems. Customizable Data Columns. Support for International Characters Home Buy Download Support Company Blog Features Home Features HttpWatch Home Overview Features Compare Editions New in Version 9.x Awards and Reviews Download Pricing Our Customers Who is using it? What

More information

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Getting Started with. Management Portal. Version

Getting Started with. Management Portal. Version Getting Started with Management Portal Version 10.1.0.0 Copyright RES Software Development B.V. All rights reserved. Commercial Computer Software documentation/data Restricted Rights. RES and RES ONE are

More information

MAGLOCLEN MOCIC NESPIN RMIN ROCIC WSIN Newtown, PA Springfield, MO Franklin, MA Phoenix, AZ Nashville, TN Sacramento, CA

MAGLOCLEN MOCIC NESPIN RMIN ROCIC WSIN Newtown, PA Springfield, MO Franklin, MA Phoenix, AZ Nashville, TN Sacramento, CA Regional Information Sharing Systems RISS Technology Support Center RISSNET Logon Procedure May 4, 2012 Introduction The purpose of this document is to provide instructions to users of the Regional Information

More information

Penetration Testing. James Walden Northern Kentucky University

Penetration Testing. James Walden Northern Kentucky University Penetration Testing James Walden Northern Kentucky University Topics 1. What is Penetration Testing? 2. Rules of Engagement 3. Penetration Testing Process 4. Map the Application 5. Analyze the Application

More information

Web Applications Installation. version

Web Applications Installation. version version 2017.1 Disclaimer This document is for informational purposes only and is subject to change without notice. This document and its contents, including the viewpoints, dates and functional content

More information

Composer Help. Web Request Common Block

Composer Help. Web Request Common Block Composer Help Web Request Common Block 7/4/2018 Web Request Common Block Contents 1 Web Request Common Block 1.1 Name Property 1.2 Block Notes Property 1.3 Exceptions Property 1.4 Request Method Property

More information

SMKI Code of Connection

SMKI Code of Connection SMKI Code of Connection DCC Public Page 1 of 12 Contents 1 Connection Mechanism... 4 1.1 Browser Policy... 4 2 SMKI Services interfaces... 5 2.1 SMKI Services interfaces via DCC Gateway Connection... 5

More information

Creating an IBM API Management Version 2.0 environment

Creating an IBM API Management Version 2.0 environment Understand the tasks required to create an IBM API Management environment June 2013 Creating an IBM API Management Version 2.0 environment IBM API Management Version 2.0 Information Center 1 Table of Contents

More information

Webthority can provide single sign-on to web applications using one of the following authentication methods:

Webthority can provide single sign-on to web applications using one of the following authentication methods: Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,

More information

The following topics provide more information on user identity. Establishing User Identity Through Passive Authentication

The following topics provide more information on user identity. Establishing User Identity Through Passive Authentication You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user

More information

Lotus IBM Lotus Notes Domino 8 Developing Web Applications. Download Full Version :

Lotus IBM Lotus Notes Domino 8 Developing Web Applications. Download Full Version : Lotus 190-836 IBM Lotus Notes Domino 8 Developing Web Applications Download Full Version : http://killexams.com/pass4sure/exam-detail/190-836 A. Create a WebQuerySave agent that writes the message to the

More information

Secure Web Appliance. SSL Intercept

Secure Web Appliance. SSL Intercept Secure Web Appliance SSL Intercept Table of Contents 1. Introduction... 1 1.1. About CYAN Secure Web Appliance... 1 1.2. About SSL Intercept... 1 1.3. About this Manual... 1 1.3.1. Document Conventions...

More information

Web Applications Installation. version 12.17

Web Applications Installation. version 12.17 version 12.17 Disclaimer This document is for informational purposes only and is subject to change without notice. This document and its contents, including the viewpoints, dates and functional content

More information

CA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5

CA SiteMinder. Federation Manager Guide: Legacy Federation. r12.5 CA SiteMinder Federation Manager Guide: Legacy Federation r12.5 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation

More information

Certified Secure Web Application Secure Development Checklist

Certified Secure Web Application Secure Development Checklist www.certifiedsecure.com info@certifiedsecure.com Tel.: +31 (0)70 310 13 40 Loire 128-A 2491 AJ The Hague The Netherlands About Certified Secure Checklist Certified Secure exists to encourage and fulfill

More information

ER/Studio Enterprise Portal 1.1 New Features Guide

ER/Studio Enterprise Portal 1.1 New Features Guide ER/Studio Enterprise Portal 1.1 New Features Guide 2nd Edition, April 16/2009 Copyright 1994-2009 Embarcadero Technologies, Inc. Embarcadero Technologies, Inc. 100 California Street, 12th Floor San Francisco,

More information

Cloud Access Manager Overview

Cloud Access Manager Overview Cloud Access Manager 8.1.3 Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

Browser Support Internet Explorer

Browser Support Internet Explorer Browser Support Internet Explorer Consumers Online Banking offers you more enhanced features than ever before! To use the improved online banking, you may need to change certain settings on your device

More information

WHY CSRF WORKS. Implicit authentication by Web browsers

WHY CSRF WORKS. Implicit authentication by Web browsers WHY CSRF WORKS To explain the root causes of, and solutions to CSRF attacks, I need to share with you the two broad types of authentication mechanisms used by Web applications: 1. Implicit authentication

More information

CONFIGURATION MANUAL. English version

CONFIGURATION MANUAL. English version CONFIGURATION MANUAL English version Frama F-Link Configuration Manual (EN) All rights reserved. Frama Group. The right to make changes in this Installation Guide is reserved. Frama Ltd also reserves the

More information

IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS. VMware Identity Manager.

IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS. VMware Identity Manager. IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS VMware Identity Manager February 2017 V1 1 2 Table of Contents Overview... 5 Benefits of BIG-IP APM and Identity

More information

Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access)

Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Secure Access Troubleshooting Rewrite related issues (Core/Web Based Access) Published June 2015 Why do certain web-based applications have issues through the rewrite engine compared to accessing the resource

More information

How to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity

How to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity How to configure the UTM Web Application Firewall for Microsoft Lync Web Services connectivity This article explains how to configure your Sophos UTM to allow access Microsoft s Lync Web Services (the

More information

PageScope Net Care Device Manager Ver. 2.0 User s Guide

PageScope Net Care Device Manager Ver. 2.0 User s Guide PageScope Net Care Device Manager Ver..0 User s Guide Net Care Device Manager Contents 1 Summary 1.1 Introduction...1-1 1.1.1 About Device Manager...1-1 Basic and extended functions... 1-1 Configuration

More information

How to Configure Fiori Launchpad and Web Dispatcher to Support SAML2 Using SAP Identity Provider Step-by-Step

How to Configure Fiori Launchpad and Web Dispatcher to Support SAML2 Using SAP Identity Provider Step-by-Step How to Configure Fiori Launchpad and Web Dispatcher to Support SAML2 Using SAP Identity Provider Step-by-Step SAP NetWeaver or S4H Gateway Ali Chalhoub 2016 SAP AG. All rights reserved. SAP, R/3, SAP NetWeaver,

More information

Microsoft ADFS Configuration

Microsoft ADFS Configuration Microsoft ADFS Configuration Side 1 af 12 1 Information 1.1 ADFS KMD Secure ISMS supports ADFS for integration with Microsoft Active Directory by implementing WS-Federation and SAML 2. The integration

More information

Cross-Site Request Forgery in Cisco SG220 series

Cross-Site Request Forgery in Cisco SG220 series Cross-Site Request Forgery in Cisco SG220 series Security advisory 12/09/2016 Renaud Dubourguais Nicolas Collignon www.synacktiv.com 5 rue Sextius Michel 75015 Paris Vulnerability description The Cisco

More information

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2

Public. Atos Trustcenter. Server Certificates + Codesigning Certificates. Version 1.2 Atos Trustcenter Server Certificates + Codesigning Certificates Version 1.2 20.11.2015 Content 1 Introduction... 3 2 The Atos Trustcenter Portfolio... 3 3 TrustedRoot PKI... 4 3.1 TrustedRoot Hierarchy...

More information

BIG-IP Access Policy Manager : Visual Policy Editor. Version 12.1

BIG-IP Access Policy Manager : Visual Policy Editor. Version 12.1 BIG-IP Access Policy Manager : Visual Policy Editor Version 12.1 Table of Contents Table of Contents Visual Policy Editor...7 About the visual policy editor...7 Visual policy editor conventions...7 About

More information

Introduction to application management

Introduction to application management Introduction to application management To deploy web and mobile applications, add the application from the Centrify App Catalog, modify the application settings, and assign roles to the application to

More information

APM Proxy with Workspace One

APM Proxy with Workspace One INTEGRATION GUIDE APM Proxy with Workspace One 1 Version History Date Version Author Description Compatible Versions Mar 2018 1.0 Matt Mabis Initial Document VMware Identity Manager 3.2.x and Above (1)

More information

Remote Access System for STAM-2 Monitoring Station STAM-VIEW

Remote Access System for STAM-2 Monitoring Station STAM-VIEW Remote Access System for STAM-2 Monitoring Station STAM-VIEW Installation Manual stam-view_i_en 10/11 SATEL sp. z o.o. ul. Schuberta 79 80-172 Gdańsk POLAND tel. + 48 58 320 94 00 info@satel.pl www.satel.eu

More information

Website SEO Checklist

Website SEO Checklist Website SEO Checklist Main points to have a flawless start for your new website. Domain Optimization Meta Data Up-to-Date Content Optimization SEO & Analytics Social Markup Markup Accessibility Browser

More information

WatchGuard AP - Remote Code Execution

WatchGuard AP - Remote Code Execution WatchGuard AP - Remote Code Execution Security Advisory Date 1/05/2018 Version: 1.0 Table of Contents 1. Document Control... 2 1.1. Document Information... 2 1.2. Revision Control... 2 2. Background...

More information

4.2. Authenticating to REST Services. Q u i c k R e f e r e n c e G u i d e. 1. IdentityX 4.2 Updates

4.2. Authenticating to REST Services. Q u i c k R e f e r e n c e G u i d e. 1. IdentityX 4.2 Updates 4.2 Authenticating to REST Services Q u i c k R e f e r e n c e G u i d e In IdentityX 4.1, REST services have an authentication and signing requirement that is handled by the IdentityX REST SDKs. In order

More information

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

App Orchestration 2.6

App Orchestration 2.6 Configuring NetScaler 10.5 Load Balancing with StoreFront 3.0 and NetScaler Gateway for Last Updated: June 04, 2015 Contents Introduction... 3 Configure the NetScaler load balancer certificates... 3 To

More information

High -Tech Bridge s Web Server Security Service API Developer Documentation Version v1.3 February 13 th 2018

High -Tech Bridge s Web Server Security Service API Developer Documentation Version v1.3 February 13 th 2018 HTB_WEBSECDOCS_v1.3.pdf Page 1 of 29 High -Tech Bridge s Web Server Security Service API Developer Documentation Version v1.3 February 13 th 2018 General Overview... 2 Meta-information... 4 HTTP Additional

More information

PlateSpin Transformation Manager Appliance Guide. June 2018

PlateSpin Transformation Manager Appliance Guide. June 2018 PlateSpin Transformation Manager Appliance Guide June 2018 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,

More information

User s Guide: Applied Functions

User s Guide: Applied Functions User s Guide: Applied Functions Table of contents 1 Using Web Connection 1.1 Web Connection... 1-2 Web Connection...1-2 Operating environment...1-2 1.2 Operations required to use this function... 1-2 1.2.1

More information

On-demand target, up and running

On-demand target, up and running On-demand target, up and running ii On-demand target, up and running Contents Chapter 1. Assumptions........ 1 Chapter 2. Overview......... 3 Chapter 3. Component purpose.... 5 Chapter 5. Starting a session

More information

Deltek Touch T&E Startup Guide

Deltek Touch T&E Startup Guide Deltek Touch T&E Startup Guide https://dte.unisys.com 2015 Unisys Corporation. All rights reserved. FOR INTERNAL USE ONLY. 1 Mobile Device Pre-requisites Make sure your mobile browser allows cookies from

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

The HTTP protocol. Fulvio Corno, Dario Bonino. 08/10/09 http 1

The HTTP protocol. Fulvio Corno, Dario Bonino. 08/10/09 http 1 The HTTP protocol Fulvio Corno, Dario Bonino 08/10/09 http 1 What is HTTP? HTTP stands for Hypertext Transfer Protocol It is the network protocol used to delivery virtually all data over the WWW: Images

More information

Support Visit mysupport.mcafee.com to find product documentation, announcements, and support.

Support Visit mysupport.mcafee.com to find product documentation, announcements, and support. Release Notes McAfee Web Gateway version 7.1.0.6 This document provides information about the McAfee Web Gateway version 7.1.0.6 appliance software. You can find more information at the following locations:

More information

Prophet 21 Middleware Installation Guide. version 12.16

Prophet 21 Middleware Installation Guide. version 12.16 version 12.16 Disclaimer This document is for informational purposes only and is subject to change without notice. This document and its contents, including the viewpoints, dates and functional content

More information

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway

VMware AirWatch Content Gateway for Windows. VMware Workspace ONE UEM 1811 Unified Access Gateway VMware AirWatch Content Gateway for Windows VMware Workspace ONE UEM 1811 Unified Access Gateway You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Eucalyptus User Console Guide

Eucalyptus User Console Guide Eucalyptus 3.4.1 User Console Guide 2013-12-11 Eucalyptus Systems Eucalyptus Contents 2 Contents User Console Overview...5 Install the Eucalyptus User Console...6 Install on Centos / RHEL 6.3...6 Configure

More information

SOMA2 Gateway to Grid Enabled Molecular Modelling Workflows in WWW-Browser. EGI User Forum Dr. Tapani Kinnunen

SOMA2 Gateway to Grid Enabled Molecular Modelling Workflows in WWW-Browser. EGI User Forum Dr. Tapani Kinnunen SOMA2 Gateway to Grid Enabled Molecular Modelling Workflows in WWW-Browser EGI User Forum 2011 Dr. Tapani Kinnunen CSC IT Center for Science Ltd., Espoo, Finland CSC at a Glance Founded in 1971 as a technical

More information

Configure Unsanctioned Device Access Control

Configure Unsanctioned Device Access Control Configure Unsanctioned Device Access Control paloaltonetworks.com/documentation Contact Information Corporate Headquarters: Palo Alto Networks 3000 Tannery Way Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-support

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

System Setup. Accessing the Administration Interface CHAPTER

System Setup. Accessing the Administration Interface CHAPTER CHAPTER 3 The system can be configured through the web interface to provide the networking configuration for the appliance and other system settings that are important such as time and SSL certificate.

More information

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0

BIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0 BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web

More information

Barracuda Firewall Release Notes 6.6.X

Barracuda Firewall Release Notes 6.6.X Please Read Before Upgrading Before installing the new firmware version, back up your configuration and read all of the release notes that apply to the versions that are more current than the version that

More information

Using vrealize Operations Tenant App as a Service Provider

Using vrealize Operations Tenant App as a Service Provider Using vrealize Operations Tenant App as a Service Provider Using vrealize Operations Tenant App as a Service Provider You can find the most up-to-date technical documentation on the VMware Web site at:

More information

VMware AirWatch Content Gateway Guide for Windows

VMware AirWatch Content Gateway Guide for Windows VMware AirWatch Content Gateway Guide for Windows Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

BI Office. Web Authentication Model Guide Version 6

BI Office. Web Authentication Model Guide Version 6 Web Authentication Model Guide Version 6 Copyright Pyramid Analytics 2010-2016 Contents 1. Web Authentication Model Overview... 3 A. Basic Authentication Models... 3 B. Windows Authentication Models...

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

Embedded Discovery Service Or how to save some clicks during AAI authentication. Lukas Hämmerle

Embedded Discovery Service Or how to save some clicks during AAI authentication. Lukas Hämmerle Embedded Discovery Service Or how to save some clicks during AAI authentication. Lukas Hämmerle lukas.haemmerle@switch.ch Zurich, 5. May 2009 Raider is now Twix and WAYF is now DS = WAYF = DS Where Are

More information

Abusing Windows Opener to Bypass CSRF Protection (Never Relay On Client Side)

Abusing Windows Opener to Bypass CSRF Protection (Never Relay On Client Side) Abusing Windows Opener to Bypass CSRF Protection (Never Relay On Client Side) Narendra Bhati @NarendraBhatiB http://websecgeeks.com Abusing Windows Opener To Bypass CSRF Protection Narendra Bhati Page

More information

SAML Authentication with Pulse Connect Secure and Pulse Secure Virtual Traffic Manager

SAML Authentication with Pulse Connect Secure and Pulse Secure Virtual Traffic Manager SAML Authentication with Pulse Connect Secure and Pulse Secure Virtual Traffic Manager Deployment Guide Published 14 December, 2017 Document Version 1.0 Pulse Secure, LLC 2700 Zanker Road, Suite 200 San

More information

How to social login with Aruba controller. Bo Nielsen, CCIE #53075 (Sec) December 2016, V1.00

How to social login with Aruba controller. Bo Nielsen, CCIE #53075 (Sec) December 2016, V1.00 Bo Nielsen, CCIE #53075 (Sec) December 2016, V1.00 Overview This short document describes the basic setup for social login using Aruba ClearPass and Aruba wireless LAN controller. Aruba ClearPass, version

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information