RSA Identity Governance and Lifecycle Microsoft Exchange Connector Application Guide. Microsoft Exchange Connector Application Guide
|
|
- Bethany Barnett
- 6 years ago
- Views:
Transcription
1 Microsoft Exchange Connector Application Guide Version 1.2 April
2 License Agreement This software and the associated documentation are proprietary and confidential to EMC, are furnished under license, and may be used and copied only in accordance with the terms of such license and with the inclusion of the copyright notice below. This software and the documentation, and any copies thereof, may not be provided or otherwise made available to any other person. No title to or ownership of the software or documentation or any intellectual property rights thereto is hereby transferred. Any unauthorized use or reproduction of this software and the documentation may be subject to civil and/or criminal liability. This software is subject to change without notice and should not be construed as a commitment by EMC. Third-Party Licenses This product may include software developed by parties other than RSA. The text of the license agreements applicable to third-party software in this product may be viewed on the product documentation page on RSA SecurCare Online. By using this product, a user of this product agrees to be fully bound by terms of the license agreements. Note on Encryption Technologies This product may contain encryption technology. Many countries prohibit or restrict the use, import, or export of encryption technologies, and current use, import, and export regulations should be followed when using, importing or exporting this product. Distribution Use, copying, and distribution of any EMC software described in this publication requires an applicable software license. EMC believes the information in this publication is accurate as of its publication date. The information is subject to change without notice. THE INFORMATION IN THIS PUBLICATION IS PROVIDED "AS IS." EMC CORPORATION MAKES NO REPRESENTATIONS OR WARRANTIES OF ANY KIND WITH RESPECT TO THE INFORMATION IN THIS PUBLICATION, AND SPECIFICALLY DISCLAIMS IMPLIED WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. 2
3 CONTENTS Revision History... 4 Preface... 5 Supported RSA Identity Governance and Lifecycle Versions:... 5 Supported Microsoft Exchange Server versions:... 5 Audience... 5 What is covered in the Guide... 5 Introduction to PowerShell and PowerShell Cmdlets... 6 PowerShell Overview:... 6 PowerShell Cmdlets Overview:... 6 Prerequisites Configuring SSH PowerShell Server on windows for remote access Configuring RSAPowershellAgent on Windows for remote access Using RSA Identity Governance and Lifecycle SSH Microsoft Exchange Connector Configuration General Settings Capabilities Using RSA Identity Governance and Lifecycle Generic Powershell WebService Microsoft Exchange Connector Configuration General Settings Capabilities Tips & Troubleshooting Active Directory Connector Dependent Microsoft Exchange Connector COPYRIGHTS TRADEMARKS
4 REVISION HISTORY Revision Number Description Version 1.0 Microsoft Exchange Connector Version 1.1 Added supported Microsoft Exchange versions Version 1.2 Updated Supported version For Microsoft Exchange 2016 Connector 4
5 PREFACE This guide provides an overview of out of the box (OOTB) Microsoft Exchange Connector which uses SSH or RSAPowerShellAgent to communicate with Microsoft Exchange for provisioning and de-provisioning entities. This guide explains the required configurations, parameters, and different attributes mappings between the Connector and Microsoft Exchange supported system. Supported RSA Identity Governance and Lifecycle Versions: RSA Identity Management and Governance and later RSA Identity Governance and Lifecycle and later Supported Microsoft Exchange Server versions: Microsoft Exchange Server 2007, 2010, 2013 and 2016 Audience This guide is intended for the users of RSA Governance and Lifecycle, including security administrators. Any Microsoft Exchange system can be integrated with RSA Identity Governance and Lifecycle using these Connectors. Basic PowerShell cmdlets knowledge is an additional advantage. What is covered in the Guide An introduction to PowerShell and PowerShell Cmdlets helps understanding basics of this standard. How to configure RSA Identity Governance and Lifecycle Microsoft Exchange Connector. Tips and troubleshooting. 5
6 INTRODUCTION TO POWERSHELL AND POWERSHELL CMDLETS PowerShell Overview: Windows PowerShell is a task automation and configuration management framework from Microsoft, consisting of a command-line shell and associated scripting language built on the.net Framework. PowerShell provides full access to COM and WMI, enabling administrators to perform administrative tasks on both local and remote Windows systems Windows PowerShell can execute four kinds of named commands: cmdlets, which are.net programs designed to interact with PowerShell PowerShell scripts (files suffixed by.ps1) PowerShell functions standalone executable programs In PowerShell, administrative tasks are generally performed by cmdlets (pronounced command-lets), which are specialized.net classes implementing a particular operation. Sets of cmdlets may be combined into scripts, executables (which are standalone applications), or by instantiating regular.net classes (or WMI/COM Objects). These work by accessing data in different data stores, like the file system or registry, which are made available to the PowerShell runtime via Windows PowerShell providers. PowerShell Cmdlets Overview: Cmdlets are specialized commands in the PowerShell environment that implement specific functions. These are the native commands in the PowerShell stack. Cmdlets follow a Verb-Noun naming pattern (such as Get-Child Item), output their results as objects, known as collections thereof (including arrays), and can optionally receive input in that form. This makes them suitable for use as recipients in a pipeline. Whereas PowerShell allows arrays and other collections of objects to be written to the pipeline, cmdlets always process objects individually. For collections of objects, PowerShell invokes the cmdlet on each object in the collection, in sequence. Example: 1. Get-Command The Get-Command is one of the most useful cmdlets in PowerShell, as it will help you understand PowerShell and let you search for certain cmdlets. 6
7 2. Get-Process Get-Member Get-Member allows you to get the information on the objects that a cmdlets returns. However, Get- Member relies on PowerShell s pipeline feature. To demonstrate this, use the Get-Process cmdlet. 7
8 On the image above, the PowerShell output shows some of the properties at the top of each column. However, please note: While most frequently searched for properties appear in the list, not all properties are visible. The PowerShell does not show any methods that we are able to call on the object. To see the methods and properties we can pipe our output to Get-Member Cmdlet Parameters: Cmdlet parameters provide the mechanism that allows a cmdlet to accept input. Parameters can accept input directly from the command line, or from objects passed to the cmdlet through the pipeline. The arguments (also known as values) of these parameters can specify the input that the cmdlet accepts, how the cmdlet should perform its actions, and the data that the cmdlet returns to the pipeline. 8
9 Download: Download PowerShell Server v6 from This is a free evaluation version with maximum 1 concurrent connection. If more than one concurrent connection is required, purchase the license from 9
10 PREREQUISITES There are two ways to integrate, enable, and use a Microsoft Exchange Connector in an enterprise. 1. By configuring SSH PowerShell Server on Windows for remote access 2. By configuring RSAPowershellAgent on Windows for remote access 1. Configuring SSH PowerShell Server on windows for remote access To make sure that the Exchange Connector working, SSH PowerShell v6 Server and Microsoft Exchange should either be installed and running on the same machine or on the machine where there is command-line access to Microsoft Exchange Server. PowerShell v6 SSH Server: Deployment Architecture: SSH PowerShell Server can be deployed in two ways: 1. When PowerShell SSH Server and Microsoft Exchange Server reside on the same machine, and on different machines. a. When PowerShell SSH Server and Microsoft Exchange Server reside at same machine: i. By using SSH transport available, AFX will communicate to PowerShell Server and send the Microsoft Exchange PowerShell command for execution. b. When PowerShell SSH Server and Microsoft Exchange Server reside at different machines: 10
11 ii. By using SSH transport available, AFX will communicate to PowerShell Server and send the Microsoft Exchange PowerShell command for execution. Authentication: PowerShell Server supports three authentication mechanisms: Username/Password (NT), GSSAPI and Public Key Authentication. To work with RSA Identity Governance and Lifecycle, configure it with the Username/Password (NT) authentication. Installation: 1. Download the setup file (<setup>.exe) to a default download location or to a location given at the Download section. 2. Go to that download location, and double click on <setup>.exe. 3. Follow the Installation Wizard steps 11
12 12
13 13
14 14
15 15
16 4. Press Finish to complete the installation. There is no need for any customization. 5. Go to Start > All Programs > Powershell Server v6 6. Click Start powershell server. A server window will be opened. The first time running PowerShell Server, first switch to the Server Key tab to check/select the X.509 Digital Certificate to be used by the server to protect the SSH connections. By default, the setup will install and configure the application to use the included test certificate (testcert.pfx) generated through the installer. Alternatively, generate a new certificate, or select a previously generated one. Server Settings: 1. Open the server window. 2. Select checkbox Run as Windows Service 3. Go to the Other tab: 4. Under Log Options, check Write Log to a File to enable logging in. 5. Provide the appropriate location and filename. 6. Under Log Options, select the required Log Mode. RSA recommends using Verbose as the recommended mode. 16
17 7. Under Additional Settings, uncheck Enable Impersonation to disable it. 17
18 Authentication: 1. Go to the Security tab. 2. Under Authentication Settings, check Enable Password Authentication (NT authentication) as a method to authenticate the user. 3. Click Save Changes to save the changes. 4. Restart/start the server to ensure that the server-side installation and configurations are complete and the server is ready for use. 2. Configuring RSAPowershellAgent on Windows for remote access About the agent The RSAPowershellAgent is a WCF (Windows Communication Foundation) RESTful web-service hosted on a Windows service. The agent comes as a single executable with.exe.config file and a module file for the endpoints which would be needed. The module file currently comes for Forefront Identity Manager (FIM). The executable file can be run from the console with the options - install, uninstall and configure. o E.g. AveksaPowerShellAgent --install, AveksaPowerShellAgent --uninstall Pre-requisites 1. Install and launch OpenSSL v 0.9.8k or above. a. OpenSSL on a windows machine that can process cryptographic operations such as generation of a private key, certificate conversion, etc. 18
19 b. Access the official website of OpenSSL and Download Setup (openssl-setup.exe) or Binaries (openssl-bin.zip) of OpenSSL. i. If you have downloaded openssl-setup.exe, double click on it and follow default instructions ii. If you have downloaded openssl-bin.zip, unzip it c. The standard installation of OpenSSL under Windows is on "C:\OpenSSL-Win32" and the executable is stored in the sub-repertory "bin". To execute the program via the Windows command Prompt, provide one of the following paths: >C:\OpenSSL-Win32\bin\openssl.exe >C:\OpenSSL-Win64\bin\openssl.exe 2. Open a separate command prompt and go to openssl/bin. This second command prompt instance executes commands from following sections. 3. Generate the client certificate and install it on the server: a. The following command will generate a new private key and a new self-signed certificate. On the client machine (machine where RSA Identity Governance and Lifecycle is running) go to openssl/bin and execute: openssl req -new -newkey rsa:2048 -days nodes -x509 -keyout <client_key_name>.key -out <client_cert_name>.cer -config openssl.cnf b. Save the generated.cer file as a DER encoded file i. Double click on the generated.cer certificate ii. Go to the Details tab iii. Click Copy to File. iv. Click Next on Certificate Export Wizard window v. Select DER encoded binary format and save at desired location. vi. On the command prompt run following command to convert generated file to.pem format: openssl x509 -in <certificate_generated_in_der_format>.cer -inform DER -out <desired_name>.pem -outform PEM c. Create a P12 file. This file will contain private key and the certification chain: The path to the file being generated would be the path of your keystore. The password would be the password specified while creating the key in section 3.1 default is changeit openssl pkcs12 -export -in <crt_generated_in_previous_command>.pem -inkey <key_name>.key -out <name>.p12 This file can be used with Microsoft Exchange. d. Install the certificate on the server. 4. Generate the server certificate and install it at the client (i.e. RSA Identity Governance and Lifecycle machine): a. On server machine (i.e. endpoint machine), go to the openssl/bin and execute: 19
20 makecert.exe -sr CurrentUser -ss My -a sha1 -n CN=<cert-name> -sky exchange -pe Make sure that the cert name is same as the machine name on which the agent is being installed. b. Make sure to later copy it into personal store for local machine. c. Export the certificate to DER file and copy and install it on the client side (i.e. machine on which the AFX would run). d. Use the keytool.exe utility $JAVA_HOME/jre/bin to import this certificate to a trust-store. e. Create a new trust-store file or simply add it to java trust-store file: $JAVA_HOME/jre/lib/security/cacerts To do this, navigate to C:\Program Files\Java\jre6\lib\security and execute the following command:../../bin/keytool -import -alias myalias -file <server certificate name : should be same as the server name used when installing the agent> -keystore cacerts storepass changeit f. Install this certificate on the client RSA Identity Governance and Lifecycle machine. 5. When creating a Microsoft Exchange Connector, use the following path of the trust-store and use changeit as a password a. C:\Program Files\Java\jre6\lib\security\cacerts Installing the Agent: 1. Unzip the installer provided. 2. Inside the modules directory, find a.psm1 file. Copy this directory to a location on the endpoint Server (e.g. FIM, Microsoft Exchange). Note the path where it was copied. 3. Open the command prompt as an administrator. 4. Go to the directory where the agent is present using command prompt 5. Type AveksaPowerShellAgent --install 6. Enter the details as prompted on the console. 7. In the last question for installation, Enter the full path of directory enter the path on FIM server noted down from Step 2 of this section. 8. After the installation is complete, go to the Services console. 9. The service named AveksaPowerShellAgent should now be running. After Agent Installation: 1. Go to the Services console and to AveksaPowerShellAgent. 2. Double click it and go to the Logon tab. 3. Select Computer accounts option and enter <Domain>\<Administrator User Name> and domain admin password. 4. Restart the service. 5. Open the command prompt as an administrator. 6. Run the following command to configure the Port with an SSL Certificate: netsh http add sslcert ipport=<ip address of machine where agent is installed>:<port number which you have entered while installation> certhash=<thumbprint of the server certificate without any whitespaces>} appid={97d271d8-f3cc-4eac-a b8879bb9} 20
21 a. Example: if the Agent is installed on and port number is 9007, the command would look like (certhash will be different): netsh http add sslcert ipport= :9007 certhash=efda2ea8f0fbf4a a92b0fc339072ba51 appid={97d271d8-f3cc-4eac-a b8879bb9} b. Note: You will need.net framework 4.0 for this agent to execute commands on Microsoft Exchange 2010 machine. Currently, for Microsoft Exchange, the client certificate based authentication does not work. Although you should continue to follow the steps to create a client certificate, it would not be used. Still provide the path of.p12 file to Connector, which should work with the path same as that of the trust-store. Deployment Architecture: RSAPowerShellAgent and Microsoft Exchange Server will reside in the same machine. By using the Generic PowerShell WebSevice transport available, AFX will communicate with RSAPowerShellAgent and send the Microsoft Exchange PowerShell command for execution. 21
22 USING RSA IDENTITY GOVERNANCE AND LIFECYCLE SSH MICROSOFT EXCHANGE CONNECTOR This Connector can be used to communicate and to provision data to Microsoft Exchange Server. Configuration The configuration of the Connector is completed through a number of screens. This section will help you fill in the values for each screen. The Connector is created through the following three sections: general, settings, and capabilities. General The general section features details about the Connector, such as the name, and type of the Connector. Refer to the table below to configure General tab: Name <Connector instance name> Description <Connector instance description> Server Select available AFX server Connector Template Under group type SSH: Microsoft Exchange 2007/ Microsoft Exchange 2010/ Microsoft Exchange 2013 State Test/Active Note that on satisfactory Connector testing, change the state to Active. No automated provisioning will occur while in the Test state. It is recommended to test all enabled commands using the Test Connector Settings and check Connector Capabilities prior to changing to the Active state. Export As Template Use this field to name this Connector export zip file, used while exporting the Connector instance 22
23 Settings The connection settings required to connect the two entities, RSA Identity Governance and Lifecycle and the End-point Application, are listed below. Refer to the table below to configure the Settings tab: Connection Details Server Host <Host name or an IP address of the host where Microsoft Exchange Server and PowerShell SSH Server are installed> Port <The port where the PowerShell SSH Server is listening. Default value: 22> Timeout(milliseconds) <Connection timeout (milliseconds)>default : Login Name <The Login Name of the administrator user of the host where Microsoft Exchange Server and PowerShell SSH Server are installed> Password <Password for Login Name> Capabilities This tab has a list of capabilities supported by the Microsoft Exchange Connector. For the Exchange AFX Connector, use the term Mailbox instead of Account on AFX User Interface. All of the operations are supported and performed on Microsoft Exchange Mailbox, such as: CreateAccount: creates a mailbox DeleteAccount: deletes a mailbox EnableAccount: enables a mailbox DisableAccount: disables a mailbox UpdateAccount: updates a mailbox MoveAccount: moves a mailbox from one database to another Each capability listed above has the same configurations and can be changed according to the executable PowerShell commands. Refer to the section below to configure the capabilities. 23
24 Capabilities Settings For any available capability, the settings require that a user: Provide input parameters. Provide Exchange PowerShell command. Command : CreateAccount Command Name Limitations CreateAccount Microsoft Exchange is Active Directory dependent application. To create an account/mailbox at Exchange, first there should be an account in Active Directory Input Parameters Parameter Name Identity Type String Default Is the parameter required? Yes. Is the parameter encrypted? No 24
25 Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name Parameter Name Database Type String Default Is the parameter required? Yes Is the parameter encrypted? No Display Name Database Mapping Mailbox Database name. We need to provide default value for this parameter Description Mailbox database name Command Code Exchange Command Add-PSSnapin Microsoft.Exchange.Management.PowerShell.Admin 2>&1 Write- Host; if($?) {Enabl box '${Identity}' -Database '${Database}' 2>&1 Write- Host;} Note: 1. In the example mentioned here, Snap-in is required as example refers to a SSH based Connector. Snap-in added here is of Exchange If Exchange 2007 or Exchange 2010 is being configured, please change Snap-in name. E.g. For Exchange 2007 : Microsoft.Exchange.Management.PowerShell.Admin, For 25
26 Exchange 2010 : Microsoft.Exchange.Management.PowerShell.E If RSAPowerShellAgent based Connector is being configured, Snap-in is not required. Command : DeleteAccount Command Name Limitations DeleteAccount Input Parameters Parameter Name Identity Type String Default Is the parameter required? Yes Is the parameter encrypted? No Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name Command Code Exchange Command Add-PSSnapin Microsoft.Exchange.Management.PowerShell.Admin 2>&1 Write- 26
27 Host; if($?) {Disabl box '${Identity}' -Confirm:$False 2>&1 Write-Host;} Note: 1. In the example mentioned here, Snap-in is required as example refers to a SSH based Connector. Snap-in added here is of Exchange If Exchange 2007 or Exchange 2010 is being configured, please change Snap-in name. E.g. For Exchange 2007 : Microsoft.Exchange.Management.PowerShell.Admin, For Exchange 2010 : Microsoft.Exchange.Management.PowerShell.E If RSAPowerShellAgent based Connector is being configured, Snap-in is not required. Command: EnableAccount Command Name Limitations EnableAccount Input Parameters Parameter Name Identity Type String Default Is the parameter required? Yes. Is the parameter encrypted? No Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name 27
28 Parameter Name Database Type String Default Is the parameter required? Yes Is the parameter encrypted? No Display Name Database Mapping Mailbox Database name. We need to provide default value for this parameter Description Mailbox database name Command Code Exchange Command Add-PSSnapin Microsoft.Exchange.Management.PowerShell.Admin 2>&1 Write- Host; if($?) {Enabl box '${Identity}' -Database '${Database}' 2>&1 Write- Host;} Note: 1. In the example mentioned here, Snap-in is required as example refers to a SSH based Connector. Snap-in added here is of Exchange If Exchange 2007 or Exchange 2010 is being configured, please change Snap-in name. E.g. For Exchange 2007 : Microsoft.Exchange.Management.PowerShell.Admin, For Exchange 2010 : Microsoft.Exchange.Management.PowerShell.E If RSAPowerShellAgent based Connector is being configured, Snap-in is not required. 28
29 Command : DisableAccount Command Name Limitations DisableAccount Input Parameters Parameter Name Identity Type String Default Is the parameter required? Yes Is the parameter encrypted? No Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name Command Code Exchange Command Add-PSSnapin Microsoft.Exchange.Management.PowerShell.Admin 2>&1 Write- Host; if($?) {Disabl box '${Identity}' -Confirm:$False 2>&1 Write-Host;} Note: 1. In the example mentioned here, Snap-in is required as example refers to a SSH based Connector. Snap-in added here is of Exchange If Exchange 2007 or Exchange 2010 is being configured, please change Snap-in name. 29
30 E.g. For Exchange 2007 : Microsoft.Exchange.Management.PowerShell.Admin, For Exchange 2010 : Microsoft.Exchange.Management.PowerShell.E If RSAPowerShellAgent based Connector is being configured, Snap-in is not required. Command: UpdateAccount Command Name Limitations UpdateAccount Input Parameters Parameter Name Identity Type String Default Is the parameter required? Yes. Is the parameter encrypted? No Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name Parameter Name ForwardingAddress 30
31 Type String Default Is the parameter required? Yes Is the parameter encrypted? No Display Name Forwarding Address Mapping ${Account.Name} Description Forwarding address i.e. alias to which mails should be forwarded Command Code Exchange Command Add-PSSnapin Microsoft.Exchange.Management.PowerShell.Admin 2>&1 Write- Host; if($?) {Set-Mailbox '${Identity}' -ForwardingAddress '${ForwardingAddress}' 2>&1 Write-Host;} Note: 1. In the example mentioned here, Snap-in is required as example refers to a SSH based Connector. Snap-in added here is of Exchange If Exchange 2007 or Exchange 2010 is being configured, please change Snap-in name. E.g. For Exchange 2007 : Microsoft.Exchange.Management.PowerShell.Admin, For Exchange 2010 : Microsoft.Exchange.Management.PowerShell.E If RSAPowerShellAgent based Connector is being configured, Snap-in is not required. Command : MoveAccount Command Name Limitations MoveAccount 31
32 Input Parameters Parameter Name Identity Type String Default Is the parameter required? Yes. Is the parameter encrypted? No Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name Parameter Name Database Type String Default Is the parameter required? Yes Is the parameter encrypted? No Display Name Database 32
33 Mapping Name of the target database where you want to move mailbox (e.g. New Mailbox Database, EN12434 Mailbox Database etc.) Description A target mailbox database name Command Code Exchange Command Add-PSSnapin Microsoft.Exchange.Management.PowerShell.Admin 2>&1 Write- Host; if($?) {Mov box '${Identity}' -TargetDatabase '${Database}' - Confirm:$False 2>&1 Write-Host;} Note: 1. In the example mentioned here, Snap-in is required as example refers to a SSH based Connector. Snap-in added here is of Exchange If Exchange 2007 or Exchange 2010 is being configured, please change Snap-in name. E.g. For Exchange 2007 : Microsoft.Exchange.Management.PowerShell.Admin, For Exchange 2010 : Microsoft.Exchange.Management.PowerShell.E If RSAPowerShellAgent based Connector is being configured, Snap-in is not required. 33
34 USING RSA IDENTITY GOVERNANCE AND LIFECYCLE GENERIC POWERSHELL WEBSERVICE MICROSOFT EXCHANGE CONNECTOR This Connector can be used to communicate and to provision data to Microsoft Exchange Server. Configuration The configuration of the Connector is completed through a number of screens. This section will help you fill in the values for each screen. The Connector is created through the following three sections: general, settings, and capabilities. General The general section features details about the Connector, such as the name, and type of the Connector. Refer to the table below to configure General tab: Name <Connector instance name> Description <Connector instance description> Server Select available AFX server Connector Template Under group type Generic-Powershell-WebService : Microsoft Exchange 2007/ Microsoft Exchange 2010/ Microsoft Exchange 2013 State Test/Active Note that on satisfactory Connector testing, change the state to Active. No automated provisioning will occur while in the Test state. It is recommended to test all enabled commands using the Test Connector Settings and check Connector Capabilities prior to changing to the Active state. Export As Template Use this field to define name of this Connector export zip file, it will get used while exporting Connector instance 34
35 Settings The connection settings required to connect the two entities, RSA Identity Governance and Lifecycle and the End-point Application, are listed below. Refer to the table below to configure the Settings tab: Connection Details Endpoint Type <Type of the endpoint where command(s) would be running e.g. FIM, exchange etc.> Powershell Host Name <Host name or an IP address of the host where PowerShell Agent is running> Powershell Port <The port where the PowerShell Agent is listening> Trust-Store Path <Path for the trust-store where the agent certificate has been added> Trust-Store Password <Password of the trust-store where the agent certificate has been added> Key-Store Path <Path for the key-store where the client (connector) certificate has been added> Key-Store Password <Password of the key-store where the client (connector) certificate has been added> Capabilities This tab has a list of capabilities supported by the Microsoft Exchange Connector. For the Exchange AFX Connector, use the term Mailbox instead of Account on AFX User Interface. All of the operations are supported and performed on Microsoft Exchange Mailbox, such as: CreateAccount: creates a mailbox DeleteAccount: deletes a mailbox EnableAccount: enables a mailbox DisableAccount: disables a mailbox UpdateAccount: updates a mailbox MoveAccount: moves a mailbox from one database to another Each capability listed above has the same configurations and can be changed according to the executable PowerShell commands. Refer to the section below to configure the capabilities. 35
36 Capabilities Settings For any available capability, the settings require that a user: Provide input parameters. Provide Exchange PowerShell command. Command: CreateAccount Command Name Limitations CreateAccount Microsoft Exchange is Active Directory dependent application. To create an account/mailbox at Exchange, first there should be an account in Active Directory Input Parameters Parameter Name Identity Type String Default Is the parameter required? Yes. Is the parameter encrypted? No 36
37 Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name Parameter Name Database Type String Default Is the parameter required? Yes Is the parameter encrypted? No Display Name Database Mapping Mailbox Database name. We need to provide defaultvalue for this parameter Description Mailbox database name Command Code Exchange Command Enabl box '${Identity}' -Database '${Database}' Note: Powershell command to add the Snap-in is not required for Powershell agent based connector. 37
38 Command: DeleteAccount Command Name Limitations DeleteAccount Input Parameters Parameter Name Identity Type String Default Is the parameter required? Yes Is the parameter encrypted? No Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name Command Code Exchange Command Disabl box '${Identity}' -Confirm:$False Note: Powershell command to add the Snap-in is not required for Powershell agent based connector. 38
39 Command : EnableAccount Command Name Limitations EnableAccount Input Parameters Parameter Name Identity Type String Default Is the parameter required? Yes. Is the parameter encrypted? No Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name Parameter Name Database Type String Default 39
40 Is the parameter required? Yes Is the parameter encrypted? No Display Name Database Mapping Mailbox Database name. We need to provide default value for this parameter Description Mailbox database name Command Code Exchange Command Enabl box '${Identity}' -Database '${Database}' Note: Powershell command to add the Snap-in is not required for Powershell agent based connector. Command: DisableAccount Command Name Limitations DisableAccount Input Parameters Parameter Name Identity Type String Default 40
41 Is the parameter required? Yes Is the parameter encrypted? No Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name Command Code Exchange Command Disabl box '${Identity}' -Confirm:$False Note: Powershell command to add the Snap-in is not required for Powershell agent based connector. Command : UpdateAccount Command Name Limitations UpdateAccount Input Parameters Parameter Name Identity Type String Default 41
42 Is the parameter required? Yes. Is the parameter encrypted? No Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name Parameter Name ForwardingAddress Type String Default Is the parameter required? Yes Is the parameter encrypted? No Display Name Forwarding Address Mapping ${Account.Name} Description Forwarding address i.e. alias to which mails should be forwarded Command Code Exchange Command Set-Mailbox '${Identity}' -ForwardingAddress '${ForwardingAddress}' 42
43 Command:MoveAccount Note: Powershell command to add the Snap-in is not required for Powershell agent based connector. Command Name Limitations MoveAccount Input Parameters Parameter Name Identity Type String Default Is the parameter required? Yes. Is the parameter encrypted? No Display Name Identity Mapping ${Account.Name} Description Identity/Mailbox name Parameter Name Database Type String Default 43
44 Is the parameter required? Yes Is the parameter encrypted? No Display Name Database Mapping Name of the target database where you want to move mailbox (e.g. New Mailbox Database, EN12434 Mailbox Database etc.) Description A target mailbox database name Command Code Exchange Command For Microsoft Exchange 2007 : Mov box '${Identity}' -TargetDatabase '${Database}' -Confirm:$False For Microsoft Exchange 2010 and 2013 : cd 'C:\\Program Files\\Microsoft\\Exchange Server\\V14\\Scripts';.\\Mov box.ps1 -Identity '${Identity}' -TargetDatabase '${Database}' Note: Powershell command to add the Snap-in is not required for Powershell agent based connector. 44
45 TIPS & TROUBLESHOOTING 1. How to use Microsoft Exchange 2016 with RSA Identity Governance and Lifecycle? Microsoft Exchange 2016 is supported by RSA Identity Governance and Lifecycle. To configure the Microsoft Exchange 2016 Connector, you can use the Microsoft Exchange 2013 Connector template without any modification in capability. 2. How Does Microsoft Exchange Connector parse error code? Does it parse the error code at all? Microsoft Exchange Connector uses SSH transport. If you see "SSH.mule.xml" a flow is written which will process the exit status and respond back. There it checks ssh.outexit_status=0 and if condition is true, it will set the AFX_ERROR_CODE=0 i.e. success. 3. The Exchange Connectors only have non-standard verbs. Do they always work with form fulfillment workflows because they won t work with the normal CRs? If you check "Microsoft-Exchange.AFX.xml" you can see the verbs used for provisioning. The description for the command is written according to the exchange terminologies. In other words, if the description is "create a mailbox" at back-end, the standard "CreateAccount" verb is executed. CreateAccount (create a mailbox) and DeleteAccount (delete a mailbox) will work with the normal CRs. The remaining commands, EnableAccount, DisableAccount, UpdateAccount, MoveAccount, are supposed to work with form fulfillment workflows. 4. The customer wants to execute a different command which is not provided as a default with Microsoft Exchange Connector (for example, "Set-CASMailbox '${Identity}' -ActiveSyncEnabled '${ActiveSync}' -OWAEnabled '${OWAEnabled}' -PopEnabled '${POP3}' -ImapEnabled '${IMAP}"). Is it possible? Since this AFX Connector is using the PowerShell Server to translate from ssh to PowerShell on the Exchange Server, what are the limitations with the existing Microsoft Exchange Connectors? Any commands can be passed through Exchange Connector. The PowerShell Server is used to reach out to the endpoint, invoke the PowerShell, and execute the command. Explanation for the example: This command can be passed through any of the RSA Identity Governance and Lifecycle AFX Exchange Connector commands. What we have to do is, copy the command to Shell Command box and create parameters to pass values to the command being executed. The parameters have to be created for example, such as - Identity, ActiveSync, OWAEnabled, POP3, and IMAP and then pass the actual values for these parameters to the command while executing it. 5. What do I do if following error type is seen while executing any command using Microsoft Exchange Connector: java.io.ioexception: Session.connect: java.net.connectexception: Connection refused at net.sf.commons.ssh.jsch.jschconnectionfactory.connectusingpassword(jschconnectionfactory.java:8 2)... Caused by: com.jcraft.jsch.jschexception: Session.connect: java.net.connectexception: Connection refused at com.jcraft.jsch.session.connect(session.java:504) at 45
46 net.sf.commons.ssh.jsch.jschconnectionfactory.connectusingpassword(jschconnectionfactory.java:7 2) more :40: [WARN] com.aveksa.afx.transport.ssh.sshsettingstest:74 - Error connecting to SSH for endpoint test java.io.ioexception: Session.connect: java.net.unknownhostexception: adiamgtw3.development.nyiso.com at net.sf.commons.ssh.jsch.jschconnectionfactory.connectusingpassword(jschconnectionfactory.java:8 2) 1. Please make sure that all of the installation steps mentioned in the Installation section of this guide in Configuring SSH PowerShell Server on windows for remote access are followed and Enable impersonation checkbox is unchecked/disabled in Other tab of the PowerShell Server window. 2. Also, make sure that from Microsoft Exchange Connector Settings page, provided Login Name is same with the administrator user by which PowerShell Server is being run. 46
47 47
48 Active Directory Connector Dependent Microsoft Exchange Connector Configure a Microsoft Exchange Connector with an Active Directory Connector to create a mailbox in Microsoft Exchange for an account being created in an Active Directory. Steps to configure: 1. Create a Microsoft Exchange Connector in an Active State. 2. Create an Active Directory Connector in a Test State. For more information about Active Directory connector, please see RSA_Via_L-G_Active_Directory_Appguide 3. On the Settings page of the Active Directory Connector, in the Dependent Exchange Connector setting under Miscellaneous, select the Microsoft Exchange Connector created in step Click OK. Note: Microsoft Exchange does not allow special characters in mailbox identity name; the connector will show an error. But if we run a CreateAccount command for Active Directory Connector which is configured with Microsoft Exchange Connector (i.e. dependent Exchange Connector), the connector shows successful status message because an account is created in Active Directory and not in Microsoft Exchange. Example: Configuring Active Directory Connector Dependent Microsoft Exchange 2010 Connector: a. Create a Microsoft Exchange Connector 2010 in Active state. b. Create an Active Directory Connector and then configure it with Microsoft Exchange 2010 Connector created in Step 1, as shown below. Save the Active Directory Connector. 48
49 49
50 COPYRIGHTS Copyright 2016 EMC Corporation. All Rights Reserved. Published in the USA. TRADEMARKS RSA, the RSA Logo, and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries. All other trademarks used herein are the property of their respective owners. For a list of EMC trademarks, go to 50
RSA Archer GRC Application Guide
RSA Archer GRC Application Guide Version 1.2 vember 2017 Contact Information RSA Link at https://community.rsa.com contains a knowledgebase that answers common questions and provides solutions to known
More informationRSA Identity Governance and Lifecycle Collector Data Sheet For IBM Tivoli Directory Server
RSA Identity Governance and Lifecycle Collector Data Sheet For IBM Tivoli Directory Server Version 1.2 June 2017 1 Contact Information RSA Link at https://community.rsa.com contains a knowledgebase that
More informationLieberman Software Rapid Enterprise Defense Identity Management Application Guide
Lieberman Software Rapid Enterprise Defense Identity Management Application Guide Contact Information RSA Link at https://community.rsa.com contains a knowledgebase that answers common questions and provides
More informationRSA Authentication Manager 7.1 Help Desk Administrator s Guide
RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
More informationRSA Identity Governance and Lifecycle Generic SOAP Web Service Connector Application Guide. Generic SOAP Web Service Connector Application Guide
Generic SOAP Web Service Connector Application Guide Version 1.3 Nov 2017 1 Contents Revision History... 4 Preface... 5 Audience... 5 In This Guide... 5 Configuring SSL client certificate based authentication...
More informationRSA Identity Governance and Lifecycle Data Sheet for IBM Tivoli Directory Server Connector
RSA Identity Governance and Lifecycle Data Sheet for IBM Tivoli Directory Server Connector Version 1.1 March 2017 Contents PURPOSE... 4 SUPPO RTED SOFTWARE... 4 PREREQUISITES... 4 CONFIGURATION... 6 General...
More informationRSA Identity Governance and Lifecycle Connector Data Sheet for SQL Server
RSA Identity Governance and Lifecycle Connector Data Sheet for SQL Server 1 Contents PURPOSE... 3 SUPPORTED SOFTWARE... 3 PREREQUISITES... 3 MANAGE ENDPOINT CREDENTIALS USING A PASSWORD VAULT... 4 CONFIGURATION...
More informationRSA Identity Governance and Lifecycle Connector Data Sheet for IBM Tivoli Identity Manager 5.1
Connector Data Sheet for IBM Tivoli Identity Manager 5.1 Version 1.1 October 2017 Connector Data Sheet for ITIM 5.1 Table of Contents Revision History 3 Purpose 4 Supported Software 4 Prerequisites 4 Configuration
More informationRSA Identity Governance and Lifecycle Data Sheet for IBM DB2 Database
RSA Identity Governance and Lifecycle Data Sheet for IBM DB2 Database Version 2.1 July 2017 CONTENTS RSA Identity Governance and Lifecycle Data Sheet for IBM DB2 Database... 1 REVISION HISTORY... 3 PURPOSE...
More informationManaging the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N Rev 01 July, 2012
Managing the SSL Certificate for the ESRS HTTPS Listener Service Technical Notes P/N 300-013-818 Rev 01 July, 2012 This document contains information on these topics: Introduction... 2 Terminology... 2
More informationVMware AirWatch Integration with RSA PKI Guide
VMware AirWatch Integration with RSA PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationRSA Identity Governance and Lifecycle Connector Data Sheet for OpenLDAP
Connector Data Sheet for OpenLDAP Version 1.2 vember 2017 Table of Contents Purpose... 4 Supported Software... 4 Prerequisites... 4 SSL communication... 4 Manage Endpoint Credentials Using a Password Vault...
More informationRSA Identity Governance and Lifecycle Connector Data Sheet for Oracle Internet Directory
Connector Data Sheet for Oracle Internet Directory Version 1.2 vember 2017 Oracle Internet Directory Connector Datasheet Table of Contents Purpose... 4 Supported Software... 4 Prerequisites... 4 CONFIGURATION...
More informationRSA Authentication Manager 7.1 Administrator s Guide
RSA Authentication Manager 7.1 Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA
More informationSOA Software Intermediary for Microsoft : Install Guide
SOA Software Intermediary for Microsoft : Install Guide SOA Software Intermediary for Microsoft Install Guide SOAIM_60 August 2013 Copyright Copyright 2013 SOA Software, Inc. All rights reserved. Trademarks
More informationInstall the ExtraHop session key forwarder on a Windows server
Install the ExtraHop session key forwarder on a Windows server Published: 2018-07-23 The ExtraHop session key forwarder runs as a process on a monitored Windows server running SSL services. The forwarder
More informationTrademarks. License Agreement. Third-Party Licenses. Note on Encryption Technologies. Distribution
Copyright 2017 EMC Corporation. All Rights Reserved. Trademarks RSA, the RSA Logo and EMC are either registered trademarks or trademarks of EMC Corporation in the United States and/or other countries.
More informationRSA Authentication Manager 7.1 Migration Guide
RSA Authentication Manager 7.1 Migration Guide Contact Information See the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo are
More informationCisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at
Document Date: May 16, 2017 THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL
More informationCreating and Installing SSL Certificates (for Stealthwatch System v6.10)
Creating and Installing SSL Certificates (for Stealthwatch System v6.10) Copyrights and Trademarks 2017 Cisco Systems, Inc. All rights reserved. NOTICE THE SPECIFICATIONS AND INFORMATION REGARDING THE
More informationLifeSize Control Installation Guide
LifeSize Control Installation Guide January 2009 Copyright Notice 2005-2009 LifeSize Communications Inc, and its licensors. All rights reserved. LifeSize Communications has made every effort to ensure
More informationSSL Configuration Oracle Banking Liquidity Management Release [April] [2017]
SSL Configuration Oracle Banking Liquidity Management Release 12.4.0.0.0 [April] [2017] Table of Contents 1. CONFIGURING SSL ON ORACLE WEBLOGIC... 1-1 1.1 INTRODUCTION... 1-1 1.2 SETTING UP SSL ON ORACLE
More informationHYCU SCOM Management Pack for F5 BIG-IP
USER GUIDE HYCU SCOM Management Pack for F5 BIG-IP Product version: 5.5 Product release date: August 2018 Document edition: First Legal notices Copyright notice 2015-2018 HYCU. All rights reserved. This
More informationInstallation Guide For IM Sequencer 6.0
Installation Guide For IM Sequencer 6.0 Copyright 2007-2015 Traxion. All rights reserved. The software contains proprietary information of Traxion. It is provided under a license agreement containing restrictions
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for Tableau Server All information herein is either public information or is the property of
More informationPolicy Manager for IBM WebSphere DataPower 7.2: Configuration Guide
Policy Manager for IBM WebSphere DataPower 7.2: Configuration Guide Policy Manager for IBM WebSphere DataPower Configuration Guide SOAPMDP_Config_7.2.0 Copyright Copyright 2015 SOA Software, Inc. All rights
More informationRSA Identity Governance and Lifecycle Connector Data Sheet for Ubuntu Linux
RSA Identity Governance and Lifecycle Connector Data Sheet for Ubuntu Linux Version 1.1 October 2017 1 Table of Contents Purpose... 4 Supported Software... 4 Prerequisites... 5 Configuration... 5 General...
More informationCisco TelePresence Management Suite Extension for IBM Lotus Notes
Cisco TelePresence Management Suite Extension for IBM Lotus Notes Installation and Getting Started Guide Software version 11.3.2 D13561.19 April 2013 Contents Introduction 4 How to use this document 4
More informationSymantec Managed PKI. Integration Guide for ActiveSync
Symantec Managed PKI Integration Guide for ActiveSync ii Symantec Managed PKI Symantec Managed PKI Integration Guide for ActiveSync The software described in this book is furnished under a license agreement
More informationPTC Navigate Manage Traces Installation and Configuration Guide PTC Navigate Manage Traces 1.0 with Integrity Lifecycle Manager and Windchill
PTC Navigate Manage Traces Installation and Configuration Guide PTC Navigate Manage Traces 1.0 with Integrity Lifecycle Manager and Windchill Copyright 2016 PTC Inc. and/or Its Subsidiary Companies. All
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have and keep
More informationDeltek Touch Expense for Ajera. Touch 1.0 Technical Installation Guide
Deltek Touch Expense for Ajera Touch 1.0 Technical Installation Guide June 01, 2018 While Deltek has attempted to verify that the information in this document is accurate and complete, some typographical
More informationOne Identity Manager 8.0. Administration Guide for Connecting to a Universal Cloud Interface
One Identity Manager 8.0 Administration Guide for Connecting to a Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationContents Overview... 5 Upgrading Primavera Gateway... 7 Using Gateway Configuration Utilities... 9
Gateway Upgrade Guide for On-Premises Version 17 August 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Upgrading Primavera Gateway... 7 Prerequisites... 7 Upgrading Existing Gateway Database...
More informationRSA Identity Governance and Lifecycle Connector Data Sheet for Debian Linux
RSA Identity Governance and Lifecycle Connector Data Sheet for Debian Linux Version 1.1 October 2017 Table of Contents Purpose... 4 Supported Software... 4 Prerequisites... 4 Configuration... 5 General...
More informationVMware AirWatch Integration with SecureAuth PKI Guide
VMware AirWatch Integration with SecureAuth PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationCRYPTOCard Migration Agent for CRYPTO-MAS
CRYPTOCard Migration Agent for CRYPTO-MAS Version 1.0 2009 CRYPTOCard Corp. All rights reserved. http://www.cryptocard.com Trademarks CRYPTOCard and the CRYPTOCard logo are registered trademarks of CRYPTOCard
More informationWindows Installation Guide 8.2
Windows Installation Guide 8.2 Copyright 2018 PTC Inc. and/or Its Subsidiary Companies. All Rights Reserved. User and training guides and related documentation from PTC Inc. and its subsidiary companies
More informationWorkspace ONE UEM Integration with RSA PKI. VMware Workspace ONE UEM 1810
Workspace ONE UEM Integration with RSA PKI VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationRSA Authentication Manager 6.1 to 8.0 Migration Guide
RSA Authentication Manager 6.1 to 8.0 Migration Guide Contact Information Go to the RSA corporate website for regional Customer Support telephone and fax numbers: www.emc.com/domains/rsa/index.htm Trademarks
More informationRSA Via L&G Collector Data Sheet for Office365
RSA Via L&G Collector Data Sheet for Office365 Table of Contents Purpose 3 Supported Software 3 Account Data Collector 4 Prerequisites 4 Configuration 5 Configuration Information 5 Limitations/ Requirements
More informationEnabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface
Enabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface Release 7.1 Revised: March 5, 2013 1:53 pm This document describes the
More informationMicrosoft Dynamics GP Web Client Installation and Administration Guide For Service Pack 1
Microsoft Dynamics GP 2013 Web Client Installation and Administration Guide For Service Pack 1 Copyright Copyright 2013 Microsoft. All rights reserved. Limitation of liability This document is provided
More informationOracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC
Oracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC Version 10.1.0.0 Documentation Part Number: E55027-01 June, 2014 Copyright 2009, 2014, Oracle and/or its affiliates.
More informationCreating Domain Templates Using the Domain Template Builder 11g Release 1 (10.3.6)
[1]Oracle Fusion Middleware Creating Domain Templates Using the Domain Template Builder 11g Release 1 (10.3.6) E14139-06 April 2015 This document describes how to use the Domain Template Builder to create
More informationOracle Hospitality Simphony Venue Management Installation Guide Release 3.10 E March 2018
Oracle Hospitality Simphony Venue Management Installation Guide Release 3.10 E89837-02 March 2018 Copyright 2002, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationHPE Enterprise Integration Module for SAP Solution Manager 7.1
HPE Enterprise Integration Module for SAP Solution Manager 7.1 Software Version: 12.55 User Guide Document Release Date: August 2017 Software Release Date: August 2017 HPE Enterprise Integration Module
More informationZL UA Domino Configuration Guide. Version 7.0
ZL UA Domino Email Configuration Guide Version 7.0 ZL Technologies, Inc. Copyright 2010 ZL Technologies, Inc.All rights reserved ZL Technologies, Inc. ( ZLTI, formerly known as ZipLip ) and its licensors
More informationBlackBerry AtHoc Networked Crisis Communication. Cisco IP Phone Blast NDS Installation Guide
BlackBerry AtHoc Networked Crisis Communication Cisco IP Phone Blast NDS Installation Guide Version 2.8.5.2, September 2018 Copyright 2018 BlackBerry Limited. All Rights Reserved. This document may not
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV and/or its subsidiaries who shall have and keep
More informationOracle Fusion Middleware
Oracle Fusion Middleware Administering Web Services 12c (12.1.2) E28131-01 June 2013 Documentation for developers and administrators that describes how to administer Web services. Oracle Fusion Middleware
More informationRSA ACE/Agent 5.0 for PAM Installation and Configuration Guide
RSA ACE/Agent 5.0 for PAM Installation and Configuration Guide Contact Information See our Web sites for regional Customer Support telephone and fax numbers. RSA Security Inc. RSA Security Ireland Limited
More informationTanium IaaS Cloud Solution Deployment Guide for Microsoft Azure
Tanium IaaS Cloud Solution Deployment Guide for Microsoft Azure Version: All December 21, 2018 The information in this document is subject to change without notice. Further, the information provided in
More informationApplication notes for supporting third-party certificate in Avaya Aura System Manager 6.3.x and 7.0.x. Issue 1.3. November 2017
Application notes for supporting third-party certificate in Avaya Aura System Manager 6.3.x and 7.0.x Issue 1.3 November 2017 THE INFORMATION PROVIDED IN HEREIN IS PROVIDED AS IS WITHOUT ANY EXPRESS OR
More informationOne Identity Manager 8.0. Administration Guide for Connecting Unix-Based Target Systems
One Identity Manager 8.0 Administration Guide for Connecting Unix- Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationFieldView. Management Suite
FieldView The FieldView Management Suite (FMS) system allows administrators to view the status of remote FieldView System endpoints, create and apply system configurations, and manage and apply remote
More informationAirWatch Mobile Device Management
RSA Ready Implementation Guide for 3rd Party PKI Applications Last Modified: November 26 th, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product Description
More informationSSL/TLS Certificate Check
Administration Guide Supplemental SSL/TLS Certificate Check for BEMS and Blackberry Work Product Version: 2.5 Updated: 23-Jan-17 2017 BlackBerry Limited. Trademarks, including but not limited to BLACKBERRY,
More informationIBM Client Security Solutions. Client Security Software Version 1.0 Administrator's Guide
IBM Client Security Solutions Client Security Software Version 1.0 Administrator's Guide December 1999 1 Before using this information and the product it supports, be sure to read Appendix A - U.S. export
More informationOne Identity Manager 8.0. Administration Guide for Connecting to Azure Active Directory
One Identity Manager 8.0 Administration Guide for Connecting to Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationHave documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
VMware AirWatch Email Notification Service Installation Guide Providing real-time email notifications to ios devices with AirWatch Inbox and VMware Boxer AirWatch v9.1 Have documentation feedback? Submit
More informationIntel Small Business Extended Access. Deployment Guide
Intel Small Business Extended Access Deployment Legal Notices and Disclaimers Disclaimers INTEL CORPORATION MAKES NO WARRANTY OF ANY KIND WITH REGARD TO THIS MATERIAL, INCLUDING, BUT NOT LIMITED TO, THE
More informationOne Identity Manager 8.0. Administration Guide for Connecting to Active Directory
One Identity Manager 8.0 Administration Guide for Connecting to Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationIntegration Guide. SafeNet Authentication Client. Using SAC CBA for VMware Horizon 6 Client
SafeNet Authentication Client Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information Document
More informationHave documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
VMware AirWatch Email Notification Service Installation Guide Providing real-time email notifications to ios devices with AirWatch Inbox and VMware Boxer Workspace ONE UEM v9.7 Have documentation feedback?
More informationSymantec Validation & ID Protection Service. Integration Guide for Microsoft Outlook Web App
Symantec Validation & ID Protection Service Integration Guide for Microsoft Outlook Web App 2 Symantec VIP Integration Guide for Microsoft Outlook Web App The software described in this book is furnished
More informationHYCU SCOM Management Pack for F5 BIG-IP
USER GUIDE HYCU SCOM Management Pack for F5 BIG-IP Product version: 5.6 Product release date: November 2018 Document edition: First Legal notices Copyright notice 2015-2018 HYCU. All rights reserved. This
More informationBlackBerry Enterprise Server for Microsoft Exchange
BlackBerry Enterprise Server for Microsoft Exchange Version 3.5 Service Pack 1 Hotfix 2 December 2002 PLEASE READ THE LEGAL NOTICES SET OUT AT THE END OF THIS DOCUMENT. This document provides information
More informationUsing SSL to Secure Client/Server Connections
Using SSL to Secure Client/Server Connections Using SSL to Secure Client/Server Connections, page 1 Using SSL to Secure Client/Server Connections Introduction This chapter contains information on creating
More informationSC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide
SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide Copyright and Trademark Statements 2014 ViewSonic Computer Corp. All rights reserved. This document contains proprietary information that
More informationHave documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
VMware AirWatch Email Notification Service Installation Guide Providing real-time email notifications to ios devices with AirWatch Inbox and VMware Boxer Workspace ONE UEM v9.4 Have documentation feedback?
More informationEMC SourceOne for Microsoft SharePoint Version 7.1
EMC SourceOne for Microsoft SharePoint Version 7.1 Installation Guide 302-000-151 REV 01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2009-2013
More informationWhite Paper: Configuring SSL Communication between IBM HTTP Server and the Tivoli Common Agent
White Paper: Configuring SSL Communication between IBM HTTP Server and the Tivoli Common Agent IBM Tivoli Provisioning Manager Version 7.2.1 Document version 0.1 Lewis Lo IBM Tivoli Provisioning Manager,
More informationEntrust Connector (econnector) Venafi Trust Protection Platform
Entrust Connector (econnector) For Venafi Trust Protection Platform Installation and Configuration Guide Version 1.0.5 DATE: 17 November 2017 VERSION: 1.0.5 Copyright 2017. All rights reserved Table of
More informationProvisioning Certificates
CHAPTER 8 The Secure Socket Layer (SSL) protocol secures the network communication and allows data to be encrypted before transmission and provides security. Many application servers and web servers support
More informationOne Identity Manager Administration Guide for Connecting to SharePoint
One Identity Manager 8.0.2 Administration Guide for Connecting to Copyright 2018 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software
More informationAuthentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide
Authentication Services ActiveRoles Integration Pack 2.1.x Administration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationOracle Insurance Rules Palette
Oracle Insurance Rules Palette Security Guide Version 10.2.0.0 Document Part Number: E62439-01 August, 2015 Copyright 2009, 2015, Oracle and/or its affiliates. All rights reserved. Trademark Notice Oracle
More informationCisco TelePresence Management Suite Extension for IBM Lotus Notes
Cisco TelePresence Management Suite Extension for IBM Lotus Notes Installation and Getting Started Guide Software version 11.3.3 D13561.21 Revised October 2014 Contents Introduction 4 How to use this document
More informationSafeNet Authentication Client
SafeNet Authentication Client Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto and/or its subsidiaries who shall have and keep the
More informationEMC Ionix Network Configuration Manager Version 4.1.1
EMC Ionix Network Configuration Manager Version 4.1.1 RSA Token Service Installation Guide 300-013-088 REVA01 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com
More informationCloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0
Cloud Access Manager 8.1.3 How to Configure for SSO to SAP Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationSOA Software Policy Manager Agent v6.1 for WebSphere Application Server Installation Guide
SOA Software Policy Manager Agent v6.1 for WebSphere Application Server Installation Guide Trademarks SOA Software and the SOA Software logo are either trademarks or registered trademarks of SOA Software,
More informationAssureon Installation Guide Client Certificates. for Version 6.4
Client Certificates for Version 6.4 Publication info 2011 Nexsan Technologies Canada Inc. All rights reserved. Published by: Nexsan Technologies Canada Inc. 1405 Trans Canada Highway, Suite 300 Dorval,
More informationZL UA Exchange 2013 Archiving Configuration Guide
ZL UA Exchange 2013 Archiving Configuration Guide Version 8.0 January 2014 ZL Technologies, Inc. Copyright 2014 ZL Technologies, Inc.All rights reserved ZL Technologies, Inc. ( ZLTI, formerly known as
More informationOne Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide
One Identity Active Roles 7.2 Azure AD and Office 365 Management Administrator Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationQuest Collaboration Services 3.6. Installation Guide
Quest Collaboration Services 3.6 Installation Guide 2010 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide
More informationChime for Lync High Availability Setup
Chime for Lync High Availability Setup Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation
More informationINSTALLATION GUIDE Spring 2017
INSTALLATION GUIDE Spring 2017 Copyright and Disclaimer This document, as well as the software described in it, is furnished under license of the Instant Technologies Software Evaluation Agreement and
More informationGetting Started Guide
Interstage Application Server V1 powered by Windows Azure Getting Started Guide Windows B1FW-5952-01ENZ0(01) January 2012 Preface Purpose of This Document This document explains the main features of Interstage
More informationVeritas Enterprise Vault Setting up SharePoint Server Archiving 12.2
Veritas Enterprise Vault Setting up SharePoint Server Archiving 12.2 Veritas Enterprise Vault: Setting up SharePoint Server Archiving Last updated: 2017-08-10. Legal Notice Copyright 2017 Veritas Technologies
More informationCoveo Platform 7.0. Microsoft SharePoint Legacy Connector Guide
Coveo Platform 7.0 Microsoft SharePoint Legacy Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds
More informationRSA NetWitness Logs. Microsoft Exchange Server. Event Source Log Configuration Guide. Last Modified: Thursday, November 2, 2017
RSA NetWitness Logs Event Source Log Configuration Guide Microsoft Exchange Server Last Modified: Thursday, November 2, 2017 Event Source Product Information: Vendor: Microsoft Event Source: Exchange Server
More informationTable of Contents. Section 1: DocSTAR WebView v1.0 Requirements & Installation CD... 1 Section 2: DocSTAR WebView v1.
WebView v1.0 Installation Guide Revision 3 7/29/2003 WebView v1.0 Installation GuG ide Revision 3 7/29/2003 u Introduction Table of Contents Section 1: DocSTAR WebView v1.0 Requirements & Installation
More informationCisco TEO Adapter Guide for SAP Java
Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part
More informationEMC Documentum Import Manager
EMC Documentum Import Manager Version 6 Installation and Con guration Guide 300 005 288 EMC Corporation Corporate Headquarters: Hopkinton, MA 01748-9103 1-508-435-1000 www.emc.com Copyright 2007 EMC Corporation.
More informationCisco TelePresence Management Suite Extension for IBM Lotus Notes
Cisco TelePresence Management Suite Extension for IBM Lotus Notes Installation and Getting Started Guide D13561.18 June 2011 Software version 11.3.1 Contents Introduction 5 How to use this document 5 Requirements
More informationSecure IIS Web Server with SSL
Publication Date: May 24, 2017 Abstract The purpose of this document is to help users to Install and configure Secure Socket Layer (SSL) Secure the IIS Web server with SSL It is supported for all EventTracker
More informationWorkspace ONE UEM Notification Service. VMware Workspace ONE UEM 1811
Workspace ONE UEM Email Notification Service VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationGenesys Security Deployment Guide. What You Need
Genesys Security Deployment Guide What You Need 12/27/2017 Contents 1 What You Need 1.1 TLS Certificates 1.2 Generating Certificates using OpenSSL and Genesys Security Pack 1.3 Generating Certificates
More information