LinkOne Webview Setup Guide
|
|
- Eleanore Tyler
- 5 years ago
- Views:
Transcription
1 LinkOne Webview Setup Guide
2 LinkOne Webview - Integration with Ellipse 8 Contents LinkOne Webview - Integration with Ellipse 8 2 Commercial In Confidence 3 Preface 4 Summary information 4 Confidentiality 4 Document Control 4 Who should use this guide? 4 How use this guide 4 Purpose 4 Scope 4 Setup Procedure 5 Web View Installation 5 Web View Configuration 5 IIS Setup for Https Connections 7 User Setup 7 Advanced 9
3 Commercial In Confidence Copyright 2018 ABB All Rights Reserved Confidential and Proprietary Legal Disclaimer The product described in this documentation may be connected, and/or communicate information and data via, a network interface, which should be connected a secure network. It is your sole responsibility ensure a secure connection the network and establish and maintain appropriate measures (such as but not limited the installation of firewalls, application of authentication measures, encryption of data, installation of antivirus programs, etc.) protect the product, the network, your systems, and the interface against any kind of security breach, unauthorised access, interference, intrusion, leakage, damage, or corruption or theft of data. We are not liable for damages or losses related any such security breach, unauthorised access, interference, intrusion, leakage, damage, or corruption or theft of data.
4 Preface This Guide is part of the Ellipse Technical Documentation Library. This documentation library comprises a number of guides that provide information for the implementation, administration, and operation of the Ellipse application in a networked environment. Summary information Confidentiality The contents of this document are confidential between ABB and its cusmers. The parties must keep the information herein confidential at all times and not disclose it, or permit it be disclosed, any third party, apart from any of their officers, employees, agents or advisers who have a specific need access the information herein and have agreed be bound by the terms of confidentiality. Document Control Once the project is completed or terminated, this document will revert an uncontrolled document status. No further advice will be provided, and each recipient may either destroy the document or mark it as obsolete and retain it for future personal reference. All copies of this document will be issued electronically. Who should use this guide? This guide provides information for System Administrars installing LinkOne Webview. How use this guide This guide describes the Web View installation, configuration and IIS setup. Purpose This document is a guide Technical Consultants involved with installing LinkOne Webview. Scope The following is in scope and covered in a section of this document. Webview installation Webview configuration IIS Setup for Https Connections User Setup
5 Setup Procedure This section documents the steps required install Web View with support for Ellipse integration. Web View Installation Install WebView and license LinkOne WebView according the LinkOne WebView Getting Started Guide. First install the current version of Web View. Versions 3.4 and above support Ellipse integration. 1. Run the Web View installer. 2. Follow the steps in the Setup Wizard. 3. Once Web View is installed, use a web browser access the Web View URL. 4. Log in as an administrar (default is admin with matching password). 5. From the Web View menu, select Configuration->Site Licenses 6. Copy and paste your license details in the license box provided and press the butn. Web View Configuration Next setup the Web View web.config file support Ellipse integration. The ellipse server connects the WebView installation over the HTTPS procol using a transport mechanism called JSON, the web.config file needs be modified add this facility. The relevant sections within the web.config file are prefixed with the comment <! Ellipse 8 HTTPS MSELNK support > The instructions are applicable IIS 7 only. Note The IIS web server will need be configured for HTTPS/SSL before completing this step. 1. Make a backup of the default web.config in case anything goes wrong it is located under the installed direcry for webview (Usually c:inetpubwwwrootlinkone by default) 2. Open the web.config file located under the installed direcry for webview (Usually c:inetpubwwwrootlinkone by default) in a text edir. 3. Locate the <appsettings> tag and modify the line that starts with <!--<add key="basicauthenticationpages" value="~/viewer/picture.aspx,~/print.ashx,~/viewer/resource.aspx,~/viewer/graphic.aspx,~/services/bookservice.svc,~/services/searchservice.svc,~/services/printservice.svc,~/services/picturecontrolservice.svc" />--> read: <add key="basicauthenticationpages" value="~/viewer/picture.aspx,~/print.ashx,~/viewer/resource.aspx,~/viewer/graphic.aspx,~/services/bookservice.svc,~/services/searchservice.svc,~/services/printservice.svc,~/services/picturecontrolservice.svc" /> That is remove the <! from before the TAG and > from after 4. Locate the <httpmodules> tag and modify the following lines: <!--<remove name="formsauthentication" /> <add name="basicauthenticationmodule" type="mincom.linkone.webview.webserver.modules.basicauthenticationmodule" /> <add name="formsauthentication" type="system.web.security.formsauthenticationmodule" />-->
6 That is: <remove name="formsauthentication" /> <add name="basicauthenticationmodule" type="mincom.linkone.webview.webserver.modules.basicauthenticationmodule" /> <add name="formsauthentication" type="system.web.security.formsauthenticationmodule" /> Leave the line <! Ellipse 8 HTTPS MSELNK support > Remove the <! from before the TAG and > from after 5. Locate the <httphandlers> tag and modify the lines: <!--<add name="ellipseprinthandler" verb="*" path="print.ashx" type="mincom.linkone.webview.webserver.handlers.printhandler" />--> <add name="ellipseprinthandler" verb="*" path="print.ashx" type="mincom.linkone.webview.webserver.handlers.printhandler" /> 6. Find the <modules tag and modify the following lines: <!--<remove name="formsauthentication" /> <add name="basicauthenticationmodule" type="mincom.linkone.webview.webserver.modules.basicauthenticationmodule" /> <add name="formsauthentication" type="system.web.security.formsauthenticationmodule" />--> <remove name="formsauthentication" /> <add name="basicauthenticationmodule" type="mincom.linkone.webview.webserver.modules.basicauthenticationmodule" /> <add name="formsauthentication" type="system.web.security.formsauthenticationmodule" /> 7. Locate the <handlers> tag and modify : <!--<add name="ellipseprinthandler" verb="*" path="print.ashx" type="mincom.linkone.webview.webserver.handlers.printhandler" />--> <add name="ellipseprinthandler" verb="*" path="print.ashx" type="mincom.linkone.webview.webserver.handlers.printhandler" /> 8. Now we need add the secure JSON endpoint each of the services Ellipse will use. Locate the <services> tag and modify the following lines <!--<endpoint contract="mincom.linkone.webview.webserver.webservices.ipicturecontrolservice" address="jsons" binding="webhttpbinding" bindingconfiguration="webbindings" behaviorconfiguration="jsonbehavior" bindingnamespace="urn:mincom.linkone.webview.webserver.webservices" />--> <endpoint contract="mincom.linkone.webview.webserver.webservices.ipicturecontrolservice" address="jsons" binding="webhttpbinding" bindingconfiguration="webbindings" behaviorconfiguration="jsonbehavior" bindingnamespace="urn:mincom.linkone.webview.webserver.webservices" /> Configuration="webBindings" behaviorconfiguration="json Behavior" bindingnamespace="urn:mincom.linkone.webview. WebServer.WebServices"/> 9. Now Locate the line <!--<endpoint contract="mincom.linkone.webview.webserver.webservices.ibookservice" address="jsons" binding="webhttpbinding" bindingconfiguration="webbindings" behaviorconfiguration="jsonbehavior" bindingnamespace="urn:mincom.linkone.webview.webserver.webservices" />--> <endpoint contract="mincom.linkone.webview.webserver.webservices.ibookservice" address="jsons" binding="webhttpbinding" bindingconfiguration="webbindings" behaviorconfiguration="jsonbehavior" bindingnamespace="urn:mincom.linkone.webview.webserver.webservices" /> 10. Now Locate the line <!--<endpoint contract="mincom.linkone.webview.webserver.webservices.iselectionlistservice" address="jsons" binding="webhttpbinding" bindingconfiguration="webbindings" behaviorconfiguration="jsonbehavior" bindingnamespace="urn:mincom.linkone.webview.webserver.webservices" />--> <endpoint contract="mincom.linkone.webview.webserver.webservices.iselectionlistservice" address="jsons" binding="webhttpbinding" bindingconfiguration="webbindings" behaviorconfiguration="jsonbehavior" bindingnamespace="urn:mincom.linkone.webview.webserver.webservices" /> 11. Now Locate the line <!--<endpoint contract="mincom.linkone.webview.webserver.webservices.isecurityservice" address="jsons" binding="webhttpbinding" bindingconfiguration="webbindings" behaviorconfiguration="jsonbehavior" bindingnamespace="urn:mincom.linkone.webview.webserver.webservices" />--> <endpoint contract="mincom.linkone.webview.webserver.webservices.isecurityservice" address="jsons" binding="webhttpbinding" bindingconfiguration="webbindings" behaviorconfiguration="jsonbehavior" bindingnamespace="urn:mincom.linkone.webview.webserver.webservices" /> 12. Now Locate the line
7 <!--<service name="mincom.linkone.webview.webserver.webservices.searchservice" behaviorconfiguration="servicebehavior"> <endpoint contract="mincom.linkone.webview.webserver.webservices.isearchservice" address="jsons" binding="webhttpbinding" bindingconfiguration="webbindings" behaviorconfiguration="jsonbehavior" bindingnamespace="urn:mincom.linkone.webview.webserver.webservices"/> </service> <service name="mincom.linkone.webview.webserver.webservices.printservice" behaviorconfiguration="servicebehavior"> <endpoint contract="mincom.linkone.webview.webserver.webservices.iprintservice" address="jsons" binding="webhttpbinding" bindingconfiguration="webbindings" behaviorconfiguration="jsonbehavior" bindingnamespace="urn:mincom.linkone.webview.webserver.webservices"/> </service>--> <service name="mincom.linkone.webview.webserver.webservices.searchservice" behaviorconfiguration="servicebehavior"> <endpoint contract="mincom.linkone.webview.webserver.webservices.isearchservice" address="jsons" binding="webhttpbinding" bindingconfiguration="webbindings" behaviorconfiguration="jsonbehavior" bindingnamespace="urn:mincom.linkone.webview.webserver.webservices"/> </service> <service name="mincom.linkone.webview.webserver.webservices.printservice" behaviorconfiguration="servicebehavior"> <endpoint contract="mincom.linkone.webview.webserver.webservices.iprintservice" address="jsons" binding="webhttpbinding" bindingconfiguration="webbindings" behaviorconfiguration="jsonbehavior" bindingnamespace="urn:mincom.linkone.webview.webserver.webservices"/> </service> 13. WebView should now be configured, if you encounter problems when logging in or viewing, check the web.config for errors and ensure all XML tags are closed off correctly. Note It may be necessary edit the web.config as an administrar in order be able write the file. IIS Setup for Https Connections Web View uses https support Ellipse data requests. This requires that the Web View server machine must have a valid server certificate. This may be a self-signed certificate. The specific setup steps may vary depending on the installed version of Windows. The following steps most closely match setup under Windows Open the start menu or an explorer shell. 2. Right click on Computer or My Computer. 3. Select Manage. 4. Find and select Internet Information Services (IIS) Manager. 5. From the root of IIS manager, find the Server Certificates feature and open it. 6. Select Create Self-Signed Certificate. 7. Name the certificate and click Ok. 8. Under Sites find the LinkOne web site. 9. Select the parent node of LinkOne. This is normally Default Web Site. 10. On the Actions panel, click Bindings. 11. Click Add. 12. Setup the https binding as pictured below, where SSL certificate is set the certificate created above: 13. Click OK. 14. Click Close. User Setup At this time, the Link One/Ellipse integration requires a special Web View user be created. The username is l1http and in this example the password is also set l1http. This username and password, along with the WebView URL are used configure the LinkOne integration within Ellipse. Follow the steps below setup the user. 1. Enter the Link One web site URL in a web browser. 2. Log in Web View as an administrar (the default administration account is admin with matching password). 3. From the Web View menu, select Configuration->Users.
8 4. Configure the l1http user with matching password. 5. Press Enter or click the butn. The new user should appear as picture below. 6. Select the newly created user. 7. Add the newly created user the Users role by selecting Users in the Role combo box and clicking the butn. 8. By default the Users role does not have access any books. To configure the Users role, select Configuration->Roles.
9 9. Select the Users role from the list of users. 10. Select Allowed Books on the right hand panel. 11. Either select the All Books check box, or add the allowed books one, by one. Books may be individually added by clicking, browsing the appropriate book, then clicking the butn. Advanced The Ellipse user may be configured access specific books. The steps above suggest adding the user the Users role. This allows this user access all books allowed by the Users role. The Ellipse user may instead be assigned a different role, or given explicit access certain books. For more details on Users, see the Mincom LinkOne WebView Getting Started Guide found in the Documentation direcry of the Web View install direcry. Once LinkOne is installed and a User set up for Ellipse there is a requirement provide Ellipse 8 with the access details. Refer the Operations Guide > First Steps > LinkOne for details.
Develop Java Webservice Client
Develop Java Webservice Client Develop Java Webservice Client Contents Develop Java Webservice Client 2 Commercial In Confidence 3 Preface 4 Summary information 4 Confidentiality 4 Document Control 4 Who
More informationEllipse C# Client. Contents
Ellipse C# Client Ellipse C# Client Contents Ellipse C# Client 2 Commercial In Confidence 3 Preface 4 Summary information 4 Confidentiality 4 Document Control 4 Who should use this guide? 4.NET Ellipse
More informationEllipse Web Services Overview
Ellipse Web Services Overview Ellipse Web Services Overview Contents Ellipse Web Services Overview 2 Commercial In Confidence 3 Introduction 4 Purpose 4 Scope 4 References 4 Definitions 4 Background 5
More informationEllipse Legacy Conversion Guide
Ellipse Legacy Conversion Guide Ellipse 8 Legacy Conversion Guide Contents Ellipse 8 Legacy Conversion Guide 2 Commercial In Confidence 3 Conversion for Ellipse versions 5 & 6 to 8 4 Additional Components
More informationEllipse Support. Contents
Ellipse Support Ellipse Support Contents Ellipse Support 2 Commercial In Confidence 3 Preface 4 Mission 5 Scope 5 Introduction 6 What do you need to know about tuning and configuration? 6 How does a customer
More informationKYOCERA Net Admin User Guide
KYOCERA Net Admin User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable
More informationEllipse 8 Licence Audit. Contents
Licence Audit Guide Ellipse 8 Licence Audit Contents Ellipse 8 Licence Audit 2 Commercial In Confidence 3 Introduction 4 Purpose 4 Scope 4 Compliance with Licence Restrictions 4 Audit Process Description
More informationSystem 800xA Public Address System User Manual
System 800xA Public Address System User Manual System Version 6.0 Power and productivity for a better world System 800xA Public Address System User Manual System Version 6.0 NOTICE This document contains
More informationSafeNet Authentication Manager
SafeNet Authentication Manager Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationRevised: 08/02/ Click the Start button at bottom left, enter Server Manager in the search box, and select it in the list to open it.
Mobile App Windows Authentication & SSL Config Revised: 08/02/2017 Job Aid This Job Aid is intended for agency IT staff and explains how to enable Windows Authentication and SSL for your mobile applications
More informationesoms Suite / Mobile Operator Rounds User Guide
esoms Suite / Mobile Operator Rounds User Guide Release 2.2 GMDDB-1008-1606-03 June 2016 Copyright 2016 ABB All Rights Reserved Confidential and Proprietary June 2016 Legal Disclaimer The product described
More informationCopyright and Legal Disclaimers
1 Copyright and Legal Disclaimers Copyright 2016 by DiCentral Corporation All rights reserved. This document and all content that is contained, embedded and linked to this document, and that is written
More informationCounterACT User Directory Plugin
Version 6.1.2 and Above Table of Contents About the User Directory Plugin... 3 Endpoint User Details... 3 Verify Endpoint Authentication... 3 User Directory Inventory... 4 HTTP Login Action... 5 HTTP Sign
More informationVIP Troubleshooting Guide
VIP Troubleshooting Guide EIP Trouble Shooting Guide Contents EIP Trouble Shooting Guide 2 Commercial In Confidence 3 Preface Information 4 Overview 5 Server Tuning and Troubleshooting 6 Memory Settings
More informationSelectHR Installation & Upgrade Instructions
SelectHR Installation & Upgrade Instructions 1 Table of Contents Important Notes... 4 Components of SelectHR... 4 New Installations... 4 Upgrades... 4 Understanding SSUs... 4 Windows Authentication & Single
More informationVersion 3.17 LinkOne WebView Getting Started Guide
Version 3.17 LinkOne WebView Getting Started Guide Copyright 2016 ABB All Rights Reserved Confidential and Proprietary Wednesday, 20 January 2016 Legal Disclaimer The product described in this documentation
More informationVentyx LinkOne WebView Getting Started Guide. Version 3.12
Ventyx LinkOne WebView Getting Started Guide Version 3.12 Copyright 2014 ABB All Rights Reserved Confidential and Proprietary Friday, 2 May 2014 Legal Disclaimer The product described in this documentation
More informationCA IdentityMinder. Glossary
CA IdentityMinder Glossary 12.6.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational
More informationIntel Unite. Intel Unite Firewall Help Guide
Intel Unite Intel Unite Firewall Help Guide September 2015 Legal Disclaimers & Copyrights All information provided here is subject to change without notice. Contact your Intel representative to obtain
More informationHP WebInspect Enterprise
HP WebInspect Enterprise for the Windows operating system Software Version: 10.50 Implementation Guide Document Release Date: November 2015 Software Release Date: November 2015 Legal Notices Warranty The
More informationCA SiteMinder Web Access Manager. Configuring SiteMinder Single Sign On for Microsoft SharePoint 2007 Using Forms-based Authentication
CA SiteMinder Web Access Manager Configuring SiteMinder Single Sign On for Microsoft SharePoint 2007 Using Forms-based Authentication This documentation and any related computer software help programs
More informationConverged Network Analyzer Command Reference Guide Addendum
Converged Network Analyzer Command Reference Guide Addendum for the Converged Network Analyzer (CNA), Adaptive Path Controller-Enterprise (APC-E), Adaptive Path Controller-Internet (APC-I), and the CNA
More informationBrightStor ARCserve Backup for Windows
BrightStor ARCserve Backup for Windows Volume Shadow Copy Service Guide r11.5 D01191-2E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for
More informationVMware AirWatch Integration with RSA PKI Guide
VMware AirWatch Integration with RSA PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationInventory and Reporting Security Q&A
Inventory and Reporting Security Q&A General Q. What is Inventory Reporting, Collection, and Analysis? A. Inventory Reporting, Collection, and Analysis is a tool that discovers, collects, and analyzes
More informationBUSINESS DEVELOPMENT SUITE MOBILE INSTALLATION GUIDE. Version 14R2
BUSINESS DEVELOPMENT SUITE MOBILE INSTALLATION GUIDE Version 14R2 COPYRIGHT INFORMATION 2015 Thomson Reuters Elite. All rights reserved. Proprietary and confidential information of Thomson Reuters Elite.
More informationPNMsoft Knowledge Base. Sequence Admin Guides Active Directory Synchronization. March 2015 Product Version 7.x and above
PNMsoft Knowledge Base Sequence Admin Guides Active Directory Synchronization March 2015 Product Version 7.x and above 2016 PNMsoft All Rights Reserved This document, including any supporting materials,
More informationKYOCERA Device Manager Installation and Upgrade Guide
KYOCERA Device Manager Installation and Upgrade Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice.
More informationLegal Notes. Regarding Trademarks KYOCERA MITA Corporation
Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held liable for any problems arising from
More informationMitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE. Release 9.2
Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE Release 9.2 NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel
More informationNORTH AMERICAN SECURITIES ADMINISTRATORS ASSOCIATION Cybersecurity Checklist for Investment Advisers
Identify Protect Detect Respond Recover Identify: Risk Assessments & Management 1. Risk assessments are conducted frequently (e.g. annually, quarterly). 2. Cybersecurity is included in the risk assessment.
More informationConnectUPS-X / -BD /-E How to use and install SSL, SSH
ConnectUPS-X /-BD /-E product family Root CA Certificate installation Rev. B Page 1/16 Index 1. How to use and install SSL (Secure Socket Layer)...3 1.1. General Certificate warning message if not installed...3
More informationHPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide
HPE Security Fortify WebInspect Enterprise Software Version: 17.10 Windows operating systems Installation and Implementation Guide Document Release Date: May 2017 Software Release Date: April 2017 Legal
More informationABB Ability Verification for measurement devices
ABB MEASUREMENT & ANALYTICS OPERATING INSTRUCTION ABB Ability Verification for measurement devices The best possible check of measurement accuracy, without removal from the process. Measurement made easy
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authentication for Cisco IPSec VPN For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationAdministrator Guide. Find out how to set up and use MyKerio to centralize and unify your Kerio software administration.
Administrator Guide Find out how to set up and use MyKerio to centralize and unify your Kerio software administration. The information and content in this document is provided for informational purposes
More informationMcAfee Firewall Enterprise epolicy Orchestrator Extension
Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,
More informationHow to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT
How to Configure Mobile VPN for Forcepoint NGFW TECHNICAL DOCUMENT Table of Contents TABLE OF CONTENTS 1 BACKGROUND 2 WINDOWS SERVER CONFIGURATION STEPS 2 CONFIGURING USER AUTHENTICATION 3 ACTIVE DIRECTORY
More informationCatalogue Adapter. Contents
Catalogue Adapter Catalogue Adapter Contents Catalogue Adapter 2 Commercial In Confidence 3 Catalogue Adapter 4 Overview 4 OAGIS Message 4 Foreign Keys 4 Concurrent Updates 4 Methods 4 Sync 4 Sync Message
More informationRelease Notes. BlackBerry Enterprise Identity
Release Notes BlackBerry Enterprise Identity Published: 2018-03-13 SWD-20180606100327990 Contents New in this release...4 Fixed issues...5 Known issues... 6 Legal notice...8 New in this release New in
More informationConfiguring Embedded LDAP Authentication
HP Restricted Configuring Embedded LDAP Authentication configure Configuring Embedded LDAP Authentication For HP product models: LaserJet 4345mfp, LaserJet 9040mfp, LaserJet 9050mfp, LaserJet 9500mfp,
More informationImportant: System administrators are advised to read this manual.
Useful Tips for Reducing the Risk of Unauthorized Access for MFPs for Office (imagerunner ADVANCE/ Color imagerunner/imagerunner Series) and MFPs for Production Printing (imagerunner ADVANCE PRO/imagePRESS
More informationManual Firmware Update Guide
Manual Firmware Update Guide Mitel Desk Phone 6800 Series for MiCloud Office May 8, 2017 REVISION INFORMATION Issue Date Change Summary Updated By 1.1 May 3, 2017 Initial Version Chen-Hui Lee 1.2 May 8,
More informationQUICK CONFIGURATION GUIDE
QUICK CONFIGURATION GUIDE Webwasher Web Gateway Security Version 6.8.1 and higher Quick Configuration Guide Webwasher Web Gateway Security 6.8.1 and higher Thank you for selecting Webwasher as your company's
More informationIdentity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication
You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user
More information7. How do I obtain a Temporary ID? You will need to visit HL Bank or mail us the econnect form to apply for a Temporary ID.
About HL Bank Connect 1. What is HL Bank Connect? HL Bank Connect provides you with the convenience of accessing your bank accounts and performing online banking transactions via the Internet. 2. What
More informationCloud Access Manager Configuration Guide
Cloud Access Manager 8.1.3 Configuration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationSample BYOD Policy. Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited.
Sample BYOD Policy Copyright 2015, PWW Media, Inc. All Rights Reserved. Duplication, Reproduction or Distribution by Any Means Prohibited. SAMPLE BRING YOUR OWN DEVICE POLICY TERMS OF USE This Sample Bring
More informationCA Clarity Project & Portfolio Manager
CA Clarity Project & Portfolio Manager CA Clarity PPM Connector for Microsoft SharePoint Product Guide v1.1.0 Second Edition This documentation and any related computer software help programs (hereinafter
More informationGoldMine Connect Installation Guide
GoldMine Connect Installation Guide For GoldMine Web Release 2018.1 November 2017 490 N McCarthy Bld., Suite 100 Milpitas, CA 95035 USA TEL: 800.776.7889 www.goldmine.com Copyright Notice This document
More informationUC for Enterprise (UCE) NEC Centralized Authentication Service (NEC CAS)
UC for Enterprise (UCE) NEC Centralized Authentication Service (NEC CAS) Installation Guide NEC NEC Corporation October 2010 NDA-30362, Revision 15 Liability Disclaimer NEC Corporation reserves the right
More informationVMware AirWatch Integration with SecureAuth PKI Guide
VMware AirWatch Integration with SecureAuth PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationConfiguring PPP And SIP
Copyright Copyright 2005. All rights reserved. The content of this manual is subject to change without notice. The information and messages contained herein are proprietary to. No part of this manual may
More informationAvaya Converged Platform 130 Series. idrac9 Best Practices
Avaya Converged Platform 130 Series idrac9 Best Practices Release 4.0 December 2018 2018 Avaya Inc. All Rights Reserved Notice While reasonable efforts were made to ensure that the information in this
More informationCA Mobile Device Management Configure Access Control for Using Exchange PowerShell cmdlets
CA Mobile Device Management Configure Access Control for Email Using Exchange PowerShell cmdlets This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter
More informationData protection. 3 April 2018
Data protection 3 April 2018 Policy prepared by: Ltd Approved by the Directors on: 3rd April 2018 Next review date: 31st March 2019 Data Protection Registration Number (ico.): Z2184271 Introduction Ltd
More informationCisco WebEx Meetings Server Administration Guide
First Published: October 23, 2012 Last Modified: October 23, 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800
More informationCA SiteMinder Web Services Security
CA SiteMinder Web Services Security Policy Configuration Guide 12.52 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationMobile Computing Policy
Mobile Computing Policy Overview and Scope 1. The purpose of this policy is to ensure that effective measures are in place to protect against the risks of using mobile computing and communication facilities..
More informationCisco Threat Intelligence Director (TID)
The topics in this chapter describe how to configure and use TID in the Firepower System. Overview, page 1 Using TID Sources to Ingest Feed Data, page 6 Using Access Control to Publish TID Data and Generate
More informationSkills Management Automated Install and Upgrade Guide
Skills Management 8.5.648 Automated Install and Upgrade Guide Information contained herein is proprietary and confidential and cannot be disclosed or duplicated without the prior written consent of Genesys
More informationContents. Sync Installation Guide
1 Contents Contents... 2 Preface... 3 Prerequisites... 3 Installation... 4 Prepare File System... 4 Setup SQL Server... 4 Setup IIS web server... 4 Creating the Sync Application Pool... 4 Add the Sync
More informationEstablishing an ECAS Access UNION REGISTRY
Establishing an ECAS Access UNION REGISTRY IMPRESSUM German Emissions Trading Authority (DEHSt) at the Federal Environment Agency Bismarckplatz 1 14193 Berlin Phone: +49 (0) 30 8903 5050 Fax: +49 (0) 30
More informationOracle Hospitality Simphony Post-Installation or Upgrade Guide. Release 18.2
Oracle Hospitality Simphony Post-Installation or Upgrade Guide Release 18.2 F12086-01 December 2018 Oracle Hospitality Simphony Post-Installation or Upgrade Guide, Release 18.2 F12086-01 Copyright Oracle
More informationDIGIPASS Authentication to Citrix XenDesktop with endpoint protection
DIGIPASS Authentication to Citrix XenDesktop with endpoint protection SmartAccess Configuration with Digipass INTEGRATION GUIDE Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information
More informationNimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]
Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document
More informationClass Composer General Terms of Use
Class Composer General Terms of Use Effective Date: July 24, 2017 Welcome to Class Composer! Please continue reading to learn about the terms by which you may use our Service. If you have any questions
More informationInfor LN Workbench Installation Guide 2.0
Infor LN Workbench Installation Guide 2.0 Copyright 2014 Infor Important Notices The material contained in this publication (including any supplementary information) constitutes and contains confidential
More informationedocs Home > BEA AquaLogic Service Bus 3.0 Documentation > Accessing ALDSP Data Services Through ALSB
Accessing ALDSP 3.0 Data Services Through ALSB 3.0 edocs Home > BEA AquaLogic Service Bus 3.0 Documentation > Accessing ALDSP Data Services Through ALSB Introduction AquaLogic Data Services Platform can
More informationInstalling CaseMap Server User Guide
Installing CaseMap Server User Guide CaseMap Server, Version 2.3 System Requirements Installing CaseMap Server Installing the CaseMap Admin Console Installing the CaseMap SQL Import Utility Testing Installation
More informationANZ TRANSACTIVE ADMINISTRATOR GUIDE
ANZ TRANSACTIVE ADMINISTRATOR GUIDE Table of Contents Introduction to ANZ TRANSACTIVE About this guide 3 Learning about ANZ Transactive 3 Minimum specifications 5 ANZ Transactive security information 6
More informationBrightStor ARCserve Backup for Linux
BrightStor ARCserve Backup for Linux Agent for Apache Web Server Guide r11.5 D01212-1E This documentation and related computer software program (hereinafter referred to as the "Documentation") is for the
More informationInstalling CaseMap Server User Guide
Installing CaseMap Server User Guide CaseMap Server, Version 2.2 System Requirements Installing CaseMap Server Installing the CaseMap Admin Console Installing the CaseMap SQL Import Utility Testing Installation
More informationActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager. Integration Handbook
ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager Integration Handbook Document Version 1.1 Released July 11, 2012 ActivIdentity 4TRESS AAA Web Tokens and F5 APM Integration Handbook
More informationInstalling CaseMap Server User Guide
Installing CaseMap Server User Guide CaseMap Server, Version 1.9 System Requirements Installing CaseMap Server Installing the CaseMap Admin Console Installing the CaseMap SQL Import Utility Testing Installation
More informationRSA Archer GRC Application Guide
RSA Archer GRC Application Guide Version 1.2 vember 2017 Contact Information RSA Link at https://community.rsa.com contains a knowledgebase that answers common questions and provides solutions to known
More informationINSTALLATION GUIDE Spring 2017
INSTALLATION GUIDE Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and
More informationHow to Set Up External CA VPN Certificates
To configure a client-to-site, or site-to-site VPN using s created by External CA, you must create the following VPN s for the VPN service to be able to authenticate Before you begin Use an external CA
More informationIntel Unite. Enterprise Test Environment Setup Guide
Intel Unite Enterprise Test Environment Setup Guide Intel Unite Enterprise Test Environment Setup Guide Page 1 of 49 October 2015 Legal Disclaimers & Copyrights All information provided here is subject
More informationEnabling Embedded Systems to access Internet Resources
Enabling Embedded Systems to access Internet Resources Embedded Internet Book www.embeddedinternet.org 2 Agenda : RATIONALE Web Services: INTRODUCTION HTTP Protocol: REVIEW HTTP Protocol Bindings Testing
More informationPDxxxxx {P/N} {Doc Description} PRELIMINARY PDS-104_SECURED_WEB_BROWSING_UG. PDS-104G - Secured web browsing certificate management.
PDS-104G - Secured web browsing certificate management User Guide TABLE OF CONTENTS PDS-104_SECURED_WEB_BROWSING_UG 1 INTRODUCTION...2 1.1 GENERAL... 2 1.2 ENFORCING SECURED WEB BROWSING... 2 1.3 SECURED
More informationOData Guide June 2014 Product Version 7.7 and above
PNMsoft Knowledge Base Sequence User Guides OData Guide June 2014 Product Version 7.7 and above 2014 PNMsoft All Rights Reserved This document, including any supporting materials, is owned by PNMsoft Ltd
More informationTERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE
TERMS & CONDITIONS PLEASE READ THESE TERMS AND CONDITIONS CAREFULLY BEFORE USING THE SITE 1. General The term PPS refers to: Professional Provident Society Holdings Trust, (The Holding Trust); Professional
More informationCaseMap Server Installation Guide
CaseMap Server Installation Guide About CaseMap Server System Requirements v1.0 System Requirements v1.5 What's New in Version 1.5 Installing the CaseMap Server Installing the CaseMap Admin Console Installing
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for SonicWALL Secure Remote Access All information herein is either public information or is
More informationInstant HR Auditor Installation Guide
Instant HR Auditor Installation Guide Fall, 2015 Page 1 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software
More informationUpgrading an ObserveIT One-Click Installation
Upgrading an ObserveIT One-Click Installation This document was written for ObserveIT Enterprise version 7.6.1. This document uses screenshots and procedures written for Windows Server 2012 R2 and SQL
More informationDIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Sharepoint 2007
DIGIPASS Authentication for Microsoft ISA 2006 Single Sign-On for Sharepoint 2007 With IDENTIKEY Server / Axsguard IDENTIFIER Integration Guidelines Disclaimer Disclaimer of Warranties and Limitations
More informationCA XCOM Data Transport Gateway
CA XCOM Data Transport Gateway Product Guide Release 11.6 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation
More informationQ&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR )
Q&A for Citco Fund Services clients The General Data Protection Regulation ( GDPR ) May 2018 Document Classification Public Q&A for Citco Fund Services clients in relation to The General Data Protection
More informationedocument for Italy - SAP Cloud Platform Integration Guide
IMPLEMENTATION GUIDE PUBLIC 2018-12-14 edocument for Italy - SAP Cloud Platform Integration Guide 2018 SAP SE or an SAP affiliate company. All rights reserved. THE BEST RUN Content 1 Introduction....3
More informationData protection policy
Data protection policy Context and overview Introduction The ASHA Centre needs to gather and use certain information about individuals. These can include customers, suppliers, business contacts, employees
More informationPlateSpin Forge 3.4. Getting Started Guide. July 31, 2013
PlateSpin Forge 3.4 Getting Started Guide July 31, 2013 Legal Notice THIS DOCUMENT AND THE SOFTWARE DESCRIBED IN THIS DOCUMENT ARE FURNISHED UNDER AND ARE SUBJECT TO THE TERMS OF A LICENSE AGREEMENT OR
More informationAlarmView IP Receiver Server. Software Manual
AlarmView IP Receiver Server Software Manual Table of Contents TABLE OF CONTENTS 1 IP Receiver Introduction... 2 1.1 Overview... 2 1.2 Available Protocols... 2 1.3 Platform... 2 1.4 IP Receiver Key-Features...
More informationLesson 15 SOA with REST (Part II)
Lesson 15 SOA with REST (Part II) Service Oriented Architectures Security Module 3 - Resource-oriented services Unit 1 REST Ernesto Damiani Università di Milano REST Design Tips 1. Understanding GET vs.
More informationForeScout Extended Module for VMware AirWatch MDM
ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5
More informationLinkOne WebView Release Notes 3.3
3.3 Copyright 2010 by Mincom. All rights reserved. This document is copyright and may contain proprietary information. Except as expressly permitted under relevant copyright law, neither this document,
More informationBI Office. Web Authentication Model Guide Version 6
Web Authentication Model Guide Version 6 Copyright Pyramid Analytics 2010-2016 Contents 1. Web Authentication Model Overview... 3 A. Basic Authentication Models... 3 B. Windows Authentication Models...
More informationBell Aliant Total Office Quick Reference Guide.
Bell Aliant Total Office Quick Reference Guide www.bellaliant.net/totaloffice/ LEGAL NOTICE Copyright 2009 Nortel Networks. All Rights Reserved. This document is not to be copied, modified or distributed
More informationSPECTRUM Control Panel
SPECTRUM Control Panel User Guide Document 5029 Notice This documentation (the "Documentation") and related computer software program (the "Software") (hereinafter collectively referred to as the "Product")
More information