Cisco Security Policy Engine Administration Server User Interface Topics

Size: px
Start display at page:

Download "Cisco Security Policy Engine Administration Server User Interface Topics"

Transcription

1 APPENDIX A Cisco Security Policy Engine Administration Server User Interface This appendix describes how a system administrator can access the Cisco Security Policy Engine (SPE) Services Administration web-based user interface using the Cisco Broadband Access Center (BAC) application. The Cisco SPE security service provides an authentication and authorization framework based upon the Role Based Access Control (RBAC) model, in which user access permissions are associated with roles and users are made occupants of a role. Table A-1 Topics If you want to... Learn more about how BAC implements security Access the Security Policy Engine user interface Edit your personal profile or change your password Go to the... Overview of BAC Security section on page A-1. Accessing the Application section on page A-3. Logging Out section on page A-8. Overview of BAC Security BAC security has two focuses: ISP partitioning Operator permissions Together these determine what objects a user can see and what actions a user can perform on the objects. For network efficiency and performance, BAC does not handle security for individual network devices or administrative networks. Thus, if you grant a user group access to an administrative network, that user group has access to all objects under the administrative network, including administrative subnetworks, devices, cards and ports. All objects inherit settings from their immediate parent. You give a user group permission to perform actions on objects by category, not by individual object. For example, if you give a user group permission to create a device, members of this group can create any device under any accessible administrative network. Underlying BAC security is the logical grouping of service providers. Therefore, you can create geographical, functional, technological, or any other grouping that enables you to logicaly partition administrative networks, devices, network resources and subscribers. In this way, network operators at one service provider can see only the networks, devices, network resources and subscribers that belong A-1

2 Overview of BAC Security Appendix A to it. In the BAC security model, you must assign an owner of each object you create. You select the owner from a list of ISPs. After you assign an owner to an object, only operators associated with that owner, or BACAdmin, can access the object. Figure A-1 illustrates the BAC security partition concept. Figure A-1 BAC Security Partitioning NIMRoot NY (assigned to ISP1) CA (assigned to ISP2, ISP3) San Francisco (assigned to ISP2) San Jose (assigned to ISP3) Bldg20 cpe1 cpe2 C10K_1 Associate NetworkResourceRoot AAA A1 (assigned to ISP1, ISP2) A2 (assigned to ISP3) AAA dhcp1 (assigned to ISP1) dhcp1 (assigned to ISP3) Each service provider can have a number of predefined user groups with different permissions. The user BACAdmin can create operators and assign them to user groups, and, based on the permissions from the associated group, an operator can perform actions such as create, delete, view, and modify networks, devices or subscribers, and also can add, delete, and modift services for devices and subscribers. When you initialize BACservers, the bacstartup script loads security object model into the security server, this security object model defines BAC specific permissions, associates roles that contains sets of permissions and provides a mechanism to create user groups associated with the roles. When you initialize the server, the system creates the BACAdministrators group and BACAdmin, which is the default BAC administrative user, and a default password. Caution Cisco Systems recommends against changing these permissions, roles, and groups to avoid unwanted behaviors. You can change the default password using SPE. When BACAdmin creates an ISP, the system automatically creates a number of user groups associated with the service provider in the SPE server. The permissions of the associated groups and the name of the user groups are pre-defined in the xml file, the default groups and their brief descriptions of their associated permissions are: [ISPname]AdvanceOperators contains the permissions to create, delete, get, set of AdminNetwork, Device, NetworkResource, Subscriber, SubscriberGroup as well as add, delete services of Device and Subscriber. The only thing it cannot do is anything related to ISP. A-2

3 Appendix A Accessing the Application [ISPname]IntermediateOperators contains the permissions to create, delete, get, set of AdminNetwork, Device, NetworkResource, and add, delete services of Device with partial list of service features. [ISPname]Operators contains the permissions to create, delete, get, set of Subscriber, Subscriber groups and add, delete services of Subscriber as well as partial list of service features, SinglePVC, PVCRange, SingleVLAN and VLANRange. This group is meant to complement the access list and permissions of IntermediateOperators group. [ISPname]CustomerOperators contains read-only permissions in all categories. If a user logs in as a member of the ser group [ISPname]AdvanceOperators, for example ISP3AdvanceOPerators, the user s access is illustrated in Figure A-2. Figure A-2 Access for a Member of the User Group AdvanceOperators NIMRoot CA (assigned to ISP2, ISP3) San Jose (assigned to ISP3) Bldg20 cpe1 cpe2 C10K_1 Associate NetworkResourceRoot AAA A2 (assigned to ISP3) DHCP dhcp2 (assigned to ISP3) The SPE application functions are accessed using a web browser from the BAC application. You can perform the following functions: Create, modify, and delete users in the user configuration view. Create, modify, and delete user groups in the group configuration view. Set up user roles. User roles allow you to assign a set of privileges to a user or user group. Set up policy rules. Policy rules are the primary component used to define a policy. They allow you to assign a scope for users and user groups to work with. Accessing the Application This section describes how to log onto the Cisco Security Policy Engine (SPE) server. You can launch the SPE in two ways: From the Broadband Access Center application By entering a specific URL in your web browser Authentication is the first operation required after starting the application. You do this from the Log On page. A-3

4 Accessing the Application Appendix A Logging On from BAC To access SPE, follow these steps: Log in to BAC. Enter your name and password, then press Login. An encryption notice page appears. Read the notice. Click Exit to return to the login page, or click OK to access the Broadband Access Center application. Click the Tools tab and then User Administration. The User Administration page appears. From the Tools > User Administration page, click SPE User Admin UI. Wait until the SPE Administration loads and the logon page appears. Note Step 6 SPE Administration is referred to as SPE throughout this appendix. Enter your user identification and password, then click Logon. The SPE page appears. The SPE page displays version, product, and copyright information, and menu options that allow you to navigate through different user-interfaces. Logging On from a Browser You can launch the Cisco Security Policy Engine Administration user interface from your web browser. Authentication is the first operation required after launching the application. This is accomplished from the Log On page. Follow these steps to log on to the system. Step 6 Open your browser. Enter the specified URL: The BAC Login page appears. Log on to BAC. Type in your name and password, then press Login. An encryption notice page appears. Read the notice and click Exit to return to the login page, or click OK to access the Broadband Access page. Click the Tools tab and then User Administration. The User Administration page appears. Enter the User Identification (case sensitive for databases), and Password (case sensitive in directories and databases) in the corresponding fields. Click Logon. The Cisco SPE Administration page appears. A-4

5 Appendix A Managing Users Managing Users This section describes the options that are available under SPE Administration User Management menu: User Configuration, page A-5 Note Only users with administrator privileges on the resource are allowed to perform administrative tasks on the resources. User Configuration Browsing Users After you log in to SPE, select User Management and then User Configuration from the menu. The User Configuration page appears. You can perform the following tasks when using the Cisco SPE user interface: Browsing Users, page A-5 Adding a New User, page A-6 Updating a User Profile, page A-6 Deleting a User, page A-6 Cloning a User, page A-7 Adding a User to User Groups, page A-7 Removing a User from a User Group, page A-8 To browse the list of users, follow these steps: Click Next >> or <<Prev to browse the users list. You can also search for a specific user by specifying the user s name in the Filter text field and then clicking Go. Click Browse to search for users in any context other than the default context. (This is possible only if context selection is enabled.) A context popup menu appears. Note The choose the context tag allows you to browse the context for either roles, policy rules, or groups. You select an entry for the intended context, for instance policy rules, and if you know what to filter, you enter the text that the operator wants and then click Go. If the operator does not know the text, just leave it blank and click Go. BAC provides all the data under that category. The operator can look at the desired entry and put in the text in the filter and then click Go again. BAC filters out all the entries except the ones that contain the text that you entered. Select the required context. You can specify certain filters to refine your search in the Filter text field. Click Go to list the users with the new search criteria. A-5

6 Managing Users Appendix A Adding a New User To add a new user to the SPE database, follow these steps: Click New. The new user page appears with the following fields: Name Name of the user. Last Name Last name of the user. Password User s password. Confirm Password Re-enter your user password to confirm it. Enter values in each field. Use the Tab key to move through the fields. Click Insert to save the user information. Updating a User Profile To modify the profile of a user, follow these steps: Select the user you that want to update. Make the necessary changes. If you make a mistake click Reset to reset all fields to their original values and continue. Click Update to save the changes. Deleting a User To delete a user from the system, follow these steps: Choose the user that you want to delete. Click Delete to delete the selected user. You are prompted to confirm the delete operation. Click: OK to confirm deletion Cancel to cancel the delete operation A-6

7 Appendix A Managing Users Cloning a User You might want to copy the same information from one user to another user and then use this information to create a new user. To clone or copy a user, follow these steps: Select an existing user having a profile similar to the new user you want to configure. Click Clone to make a copy of that user to configure the new one. Make appropriate changes to the required fields. Click Insert to save the user information. Adding a User to User Groups To add the user to different user groups, follow these steps: Step 6 Step 7 Step 8 Choose the user you want to add to the user groups. Click Add to Group at the bottom of the page. The Select User Group page appears. Select the desired group or groups, from the Available User Groups List, to which you want to add the user. Use the arrows to move the user groups to and from the Selected User Groups List (on the right side of the page). After you include the desired groups that you want the user added to, then click Insert and Close to save the changes and close the dialog box. You return to the previous page where the user groups that the user belongs to are listed at the bottom of the page. If the context selection is enabled, you can click Browse to select the user groups in any other context. A context popup menu appears. Select the required context and click Go. A list of user groups with the new search criteria appears. Filters can be specified in the Filter text field to refine your search. Click Insert and Close to save the changes you have made. Note Alternatively, you can click Cancel to discard the changes and close the dialog page. A-7

8 Managing Users Appendix A Removing a User from a User Group To remove a user from user groups, follow these steps: Choose the user that you want to remove from a group. Click the check box to the left of the user name. Select the user group from which you want to remove the specified user. Click Remove from Group to remove the user from the selected user group. The selected user is removed from the specified group. Logging Out To logout of the system, click Logout in the upper right corner of your CNS page. You are prompted with a message. Click OK to log out or Cancel to continue operations. A-8

Provisioning Flows Topics

Provisioning Flows Topics CHAPTER 3 The BAC software provides network and service management tools that enable the provisioning of devices and subscribers in broadband aggregation environments. BAC supports the role of the following

More information

User Group Configuration

User Group Configuration CHAPTER 90 The role and user group menu options in the Cisco Unified Communications Manager Administration User Management menu allow users with full access to configure different levels of access for

More information

Password Reset Utility. Configuration

Password Reset Utility. Configuration Password Reset Utility Configuration 1 Table of Contents 1. Uninstalling Legacy Password Reset... 2 2. Password Reset Utility: How to deploy and configure via Group Policy... 2 3. Configuring Group Policy

More information

Status Web Evaluator s Guide Software Pursuits, Inc.

Status Web Evaluator s Guide Software Pursuits, Inc. Status Web Evaluator s Guide 2018 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 2 Installing Microsoft IIS... 2 Verifying Microsoft IIS Features... 9 Installing the

More information

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

User Management in Resource Manager

User Management in Resource Manager CHAPTER 8 This section describes how to manage user profiles. Topics in this section include: Overview of User Management, page 8-1 Using User Management, page 8-1 Overview of User Management In Resource

More information

Lab 11-1 Lab User Profiles and Tracking

Lab 11-1 Lab User Profiles and Tracking In the following lab instructions, you will be setting up groups, users, and passwords to require password-protected login to Kofax Capture modules. Rights will be assigned to the groups and users that

More information

Developing a Gadget for the Home Page

Developing a Gadget for the Home Page CHAPTER 11 Note This topic is intended for system and business administrators who can develop new gadgets for the Home page. Cisco Pulse supports the development of gadgets that are comprised of an XML

More information

SharePoint AD Administration Tutorial for SharePoint 2007

SharePoint AD Administration Tutorial for SharePoint 2007 SharePoint AD Administration Tutorial for SharePoint 2007 1. General Note Please note that AD Administration has to be activated before it can be used. For further reference, please see our Product Installation

More information

Nortel Quality Monitoring Search and Replay Guide

Nortel Quality Monitoring Search and Replay Guide Nortel Quality Monitoring Search and Replay Guide NN44480-106 Product release 7.0 Standard 02.02 November 2009 Nortel Quality Monitoring Search and Replay Guide Publication number: NN44480-106 Product

More information

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide

Microsoft Office Groove Server Groove Manager. Domain Administrator s Guide Microsoft Office Groove Server 2007 Groove Manager Domain Administrator s Guide Copyright Information in this document, including URL and other Internet Web site references, is subject to change without

More information

Data Privilege Adding or Removing Members

Data Privilege Adding or Removing Members Data Privilege allows you to add or remove Members, aka Users, (individuals permitted to access all or portions of a group s resources) from any security group for which you are an Owner or an Authorizer.

More information

Configuring Role-Based Access Control

Configuring Role-Based Access Control Configuring Role-Based Access Control This chapter includes the following sections: Role-Based Access Control, page 1 User Accounts for Cisco UCS Manager, page 1 User Roles, page 3 Privileges, page 4 User

More information

Cisco Unified Serviceability

Cisco Unified Serviceability Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified

More information

This chapter describes the tasks that you perform after installing Prime Cable Provisioning.

This chapter describes the tasks that you perform after installing Prime Cable Provisioning. This chapter describes the tasks that you perform after installing Prime Cable Provisioning. Licensing Prime Cable Provisioning, page 1 Cisco Prime Network Registrar Configurations, page 5 Setting Up a

More information

Overview. ACE Appliance Device Manager Overview CHAPTER

Overview. ACE Appliance Device Manager Overview CHAPTER 1 CHAPTER This section contains the following: ACE Appliance Device Manager, page 1-1 Logging Into ACE Appliance Device Manager, page 1-3 Changing Your Account Password, page 1-4 ACE Appliance Device Manager

More information

Cisco TEO Adapter Guide for Microsoft System Center Operations Manager 2007

Cisco TEO Adapter Guide for Microsoft System Center Operations Manager 2007 Cisco TEO Adapter Guide for Microsoft System Center Operations Manager 2007 Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com

More information

TOP Server Version 6 Security Settings

TOP Server Version 6 Security Settings TOP Server 1 (10) TOP Server Version 6 TOP Server 2 (10) Contents Security Built In... 3 User Manager Configuration... 3 New User Accounts... 5 New User Group and Properties... 5 Configuration Security...

More information

Configuring Cisco TelePresence Manager

Configuring Cisco TelePresence Manager CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,

More information

Introduction to Provisioning

Introduction to Provisioning CHAPTER 1 Cisco Prime Collaboration Provisioning provides a scalable web-based solution to manage company s next-generation communication services. Provisioning manages IP communication services in an

More information

STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide

STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide For assistance, please contact the ITS Service Desk at x4357 or 227-8633. Table of Contents First Time Use of Remote Access... 1 F5 Access

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, page 1 Cisco ISE Administrators, page 1 Cisco ISE Administrator Groups, page 3 Administrative Access to Cisco ISE, page 11 Role-Based

More information

SharePoint 2010 Tutorial

SharePoint 2010 Tutorial SharePoint 2010 Tutorial TABLE OF CONTENTS Introduction... 1 Basic Navigation... 2 Navigation Buttons & Bars... 3 Ribbon... 4 Library Ribbon... 6 Recycle Bin... 7 Permission Levels & Groups... 8 Create

More information

ES CONTENT MANAGEMENT - EVER TEAM

ES CONTENT MANAGEMENT - EVER TEAM ES CONTENT MANAGEMENT - EVER TEAM USER GUIDE Document Title Author ES Content Management - User Guide EVER TEAM Date 20/09/2010 Validated by EVER TEAM Date 20/09/2010 Version 9.4.0.0 Status Final TABLE

More information

Cisco TEO Adapter Guide for Microsoft Windows

Cisco TEO Adapter Guide for Microsoft Windows Cisco TEO Adapter Guide for Microsoft Windows Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800

More information

WMI log collection using a non-admin domain user

WMI log collection using a non-admin domain user WMI log collection using a non-admin domain user To collect WMI logs from a domain controller in EventLog Analyer, it is necessary to add a domain admin account of that domain in it. Alternatively, you

More information

Configuring RBAC Using Admin UI

Configuring RBAC Using Admin UI CHAPTER 13 This chapter describes the Security feature of Prime Cable Provisioning. Use this feature to configure and manage various levels of security. For conceptual information about the RBAC feature,

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authentication for Cisco IPSec VPN For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

HR-Lite Database & Web Service Setup Guide

HR-Lite Database & Web Service Setup Guide HR-Lite Database & Web Service Setup Guide Version: 1.00 HR21 Limited All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical,

More information

Real Application Security Administration

Real Application Security Administration Oracle Database Real Application Security Administration Console (RASADM) User s Guide 12c Release 2 (12.2) E85615-01 June 2017 Real Application Security Administration Oracle Database Real Application

More information

Figure 5-25: Setup Wizard s Safe Surfing Screen

Figure 5-25: Setup Wizard s Safe Surfing Screen 4. After the settings have been saved, the Safe Surfing screen will appear. Click the Norton Internet Security Suite button to install the special edition of Norton Internet Security on your computer,

More information

CTC Accounts Active Directory Synchronizer User Guide

CTC Accounts Active Directory Synchronizer User Guide i Contents Overview... 3 System Requirements... 4 Additional Notes... 5 Installation and Configuration... 6 Running the Synchronizer Interactively... 7 Automatic Updates... 7 Logging In... 8 Options...

More information

NTP Software File Auditor for Windows Edition

NTP Software File Auditor for Windows Edition NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor

More information

WCM 6.0 Pro MS/SP Software Recovery Installation Guide

WCM 6.0 Pro MS/SP Software Recovery Installation Guide Release Date: 2013/09/23 WCM 6.0 Pro MS/SP Software Recovery Installation Guide Once the OS is restored or re-imaged successfully on the system, please follow below installation guide to complete all the

More information

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM)

Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...

More information

Kentico CMS 6.0 Intranet Administrator's Guide

Kentico CMS 6.0 Intranet Administrator's Guide Kentico CMS 6.0 Intranet Administrator's Guide 2 Kentico CMS 6.0 Intranet Administrator's Guide Table of Contents Introduction 5... 5 About this guide Getting started 7... 7 Installation... 11 Accessing

More information

Corporate Administrator Tool (CAT) User Guide V8.0

Corporate Administrator Tool (CAT) User Guide V8.0 Corporate Administrator Tool (CAT) User Guide V8.0 Table of Contents 1 Introduction... 3 1.1 Browser Supported... 3 1.2 Accessing CAT Application... 4 2 Managing Master-List... 5 2.1 Filter and Search

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

Using ANM With Virtual Data Centers

Using ANM With Virtual Data Centers APPENDIXB Date: 3/8/10 This appendix describes how to integrate ANM with VMware vcenter Server, which is a third-party product for creating and managing virtual data centers. Using VMware vsphere Client,

More information

Managing Users and Configuring Role-Based Access Control

Managing Users and Configuring Role-Based Access Control Managing s and Configuring Role-Based Access Control This section describes how to manage users in Prime Central, including defining users and passwords and configuring role-based access control (RBAC).

More information

Recovering Cisco MXE 3500

Recovering Cisco MXE 3500 CHAPTER 7 Recovering Cisco MXE 3500 Revised: January 26, 2010, Caution This recovery process resets your Cisco MXE 3500 to the same state and configuration in which it was delivered to you. All changes

More information

WebSphere Application Server V7: Administration Consoles and Commands

WebSphere Application Server V7: Administration Consoles and Commands Chapter 5 of WebSphere Application Server V7 Administration and Configuration Guide, SG24-7615 WebSphere Application Server V7: Administration Consoles and Commands WebSphere application server properties

More information

Tyler Dashboard. User Guide Version 6.3. For more information, visit

Tyler Dashboard. User Guide Version 6.3. For more information, visit Tyler Dashboard User Guide Version 6.3 For more information, visit www.tylertech.com. TABLE OF CONTENTS Tyler Dashboard... 4 Tyler Dashboard Features... 4 Search... 5 Browse... 5 Page... 6 Dashboard...

More information

Studywiz-Gmail Teachers' and Students' Guide

Studywiz-Gmail Teachers' and Students' Guide 00.04, 29 Nov 2010 Log in to Studywiz 1. Open a web browser window, and in the address field enter the URL of the Studywiz deployment. The Studywiz splash page appears. 2. Click the Standard Log In button.

More information

Getting Started with IBM Cognos 10 Reports

Getting Started with IBM Cognos 10 Reports UNIVERSITY OF SUSSEX Getting Started with IBM Cognos 10 Reports ITS CIS 9/2/2015 Introduction to some of the features in the Cognos Connection reporting portal. Guides users through initial configuration

More information

Role-Based Access Configuration

Role-Based Access Configuration Role-Based Access Control Overview, page 1 User Accounts for Cisco UCS, page 1 User Roles, page 3 Locales, page 9 Locally Authenticated User Accounts, page 11 Monitoring User Sessions, page 19 Role-Based

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

R9.7 erwin License Server:

R9.7 erwin License Server: R9.7 erwin License Server: Installation and Setup This is a quick guide to setting-up a erwin DM License Server. NOTES: - Concurrent licensing is available for only erwin r8.2 and later releases! - Concurrent

More information

My Publications Quick Start Guide

My Publications Quick Start Guide IHS > Decision Support Tool My Publications Quick Start Guide January 28, 2011 Version 2.0 2011 IHS, All Rights Reserved. All trademarks belong to IHS or its affiliated and subsidiary companies, all rights

More information

Oracle Database. Installation and Configuration of Real Application Security Administration (RASADM) Prerequisites

Oracle Database. Installation and Configuration of Real Application Security Administration (RASADM) Prerequisites Oracle Database Real Application Security Administration 12c Release 1 (12.1) E61899-04 May 2015 Oracle Database Real Application Security Administration (RASADM) lets you create Real Application Security

More information

Introduction to Broadband Access Center Topics

Introduction to Broadband Access Center Topics CHAPTER 1 The Cisco Broadband Access Center software for Broadband Aggregation supports the mass-market deployment of broadband services by providing a provisioning system to replace labor-intensive and

More information

Using the Subscriber Manager GUI Tool

Using the Subscriber Manager GUI Tool CHAPTER 11 This chapter describes how to use the Subscriber Manager (SM) GUI tool to configure subscribers in the Cisco Service Control Management Suite (SCMS) Subscriber Manager (SM) database. The SM

More information

Lab - Configure Users and Groups in Windows

Lab - Configure Users and Groups in Windows Lab - Configure Users and Groups in Windows Introduction In this lab, you will create users and groups and delete users using the Local Users and Groups Manager. You will also assign group and user permission

More information

Start Creating SSL Policies

Start Creating SSL Policies The following topics provide an overview of SSL policy creation, configuration, management, and logging. SSL Policies Overview, on page 1 SSL Policy Default Actions, on page 2 Default Handling Options

More information

Metastorm BPM Release 7.6

Metastorm BPM Release 7.6 Metastorm BPM Release 7.6 Administration Guide May 2008 Metastorm Inc. email: inquiries@metastorm.com http://www.metastorm.com Metastorm BPM Release 7.6 Copyrights and Trademarks 1996-2008 Metastorm Inc.

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on

More information

Equitrac Embedded Connector for EFI SendMe. Setup Guide Equitrac Corporation Equitrac Corporation

Equitrac Embedded Connector for EFI SendMe. Setup Guide Equitrac Corporation Equitrac Corporation Equitrac Embedded Connector for EFI SendMe 1.1 Setup Guide 2012 Equitrac Corporation 2012 Equitrac Corporation Equitrac Embedded Connector for EFI SendMe Setup Guide Document History Date Description of

More information

Microsoft SQL Installation and Setup

Microsoft SQL Installation and Setup This chapter provides information about installing and setting up Microsoft SQL. Encrypted Database Not Supported, page 1 Install and Setup Microsoft SQL Server, page 1 Database Migration Required for

More information

CRA Wiz and Fair Lending Wiz. Installation Guide V6.9

CRA Wiz and Fair Lending Wiz. Installation Guide V6.9 CRA Wiz and Fair Lending Wiz Installation Guide V6.9 CRA Wiz and Fair Lending Wiz 6.9 Installation Instructions The following installation instructions provide procedures for a new installation of CRA

More information

One Identity Active Roles 7.2. Web Interface User Guide

One Identity Active Roles 7.2. Web Interface User Guide One Identity Active Roles 7.2 Web Interface User Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in

More information

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1

CLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1 CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9

More information

Embedded Connector for IKON DocSend Setup Guide

Embedded Connector for IKON DocSend Setup Guide Embedded Connector for IKON DocSend Setup Guide Version 1.1 2016 IKON-20160314 Equitrac Embedded Connector for IKON DocSend Setup Guide Document History Date Description of Change April 18, 2013 Updated

More information

Securing LDAP Directory Integration with Cisco Unified CallManager 4.x

Securing LDAP Directory Integration with Cisco Unified CallManager 4.x Securing LDAP Directory Integration with Cisco Unified CallManager 4.x Document ID: 109804 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information For Existent

More information

Application User Configuration

Application User Configuration CHAPTER 87 The following topics contain information on managing application user information: Settings, page 87-1 Adding an Administrator User to Cisco Unity or Cisco Unity Connection, page 87-6 Changing

More information

Oracle Financial Services Governance, Risk, and Compliance Workflow Manager User Guide. Release February 2016 E

Oracle Financial Services Governance, Risk, and Compliance Workflow Manager User Guide. Release February 2016 E Oracle Financial Services Governance, Risk, and Compliance Workflow Manager User Guide Release 8.0.2.0.0 February 2016 E65393-01 Oracle Financial Services Governance, Risk, and Compliance Workflow Manager

More information

NetExtender for SSL-VPN

NetExtender for SSL-VPN NetExtender for SSL-VPN Document Scope This document describes how to plan, design, implement, and manage the NetExtender feature in a SonicWALL SSL-VPN Environment. This document contains the following

More information

HOWTO Make an Initial Connection to the Office Anywhere Desktop using a Windows 7 based PC v1

HOWTO Make an Initial Connection to the Office Anywhere Desktop using a Windows 7 based PC v1 HOWTO Make an Initial Connection to the Office Anywhere Desktop using a Windows 7 based PC v1 1. Web browse to the Office Anywhere Portal: http://hosted.gg (as shown below) 2. Click the Access Office Anywhere

More information

Logging In and Setting Up

Logging In and Setting Up This chapter includes the following sections: Overview of, page 1 Resetting the Admin Password, page 3 Password Guidelines, page 3 Resetting the Shared Secret, page 4 Overview of You can log in and work

More information

Lab - Connect to a Router for the First Time

Lab - Connect to a Router for the First Time Introduction In this lab, you will configure basic settings on a wireless router. Recommended Equipment A computer with Windows installed An Ethernet NIC installed Wireless router Ethernet patch cable

More information

Manage Administrators and Admin Access Policies

Manage Administrators and Admin Access Policies Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on

More information

Managing Subscribers Topics

Managing Subscribers Topics CHAPTER 8 The Cisco Broadband Access Center (BAC) software enables you to organize and manage subscribers to broadband aggregation services. A subscriber is the individual, company, or organization that

More information

PaperClip32. Revision 2.0

PaperClip32. Revision 2.0 PaperClip32 Quick Start Guide Revision 2.0 Copyright Information Copyright 2003, PaperClip Software, Inc. The PaperClip32 product name and PaperClip Logo are registered trademarks of PaperClip Software,

More information

PRISM-FHF The Fred Hollows Foundation

PRISM-FHF The Fred Hollows Foundation PRISM-FHF The Fred Hollows Foundation SECURITY ADMINISTRATOR S GUIDE Version 1.2 TABLE OF CONTENTS INTRODUCTION... 4 OVERVIEW... 4 SECURITY CONSOLE... 6 ACCESSING THE SECURITY CONSOLE... 6 VIEWING THE

More information

RenWeb Training. Creating Your Classroom Website

RenWeb Training. Creating Your Classroom Website RenWeb Training Creating Your Classroom Website October 2013 RenWeb Training Manual Table of Contents Ren Web Survey 3 Pre-Training Handout: Saving a Document as a PDF 4 Lesson 1: Adding Homework & Web

More information

Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording

Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording Contents 1 About This Document... 2 2 Overview... 2 3 Before You Begin... 2 4 Deploying ObserveIT with IBM

More information

Chancellor s Office Information Technology Services Corporate Information Management FIRMS Budget Review Hyperion Process

Chancellor s Office Information Technology Services Corporate Information Management FIRMS Budget Review Hyperion Process Step Open Internet Explorer and type in the following URL: http://peterson.calstate.edu:8080/hyperion/browse/login The Hyperion Login screen will display. Enter your User Id and Password > click on the

More information

Liferay Portal 4 - Portal Administration Guide. Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer

Liferay Portal 4 - Portal Administration Guide. Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer Liferay Portal 4 - Portal Administration Guide Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer Liferay Portal 4 - Portal Administration Guide Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer 1.1

More information

VMware AirWatch Certificate Authentication for EAS with ADCS

VMware AirWatch Certificate Authentication for EAS with ADCS VMware AirWatch Certificate Authentication for EAS with ADCS For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Managing WCS User Accounts

Managing WCS User Accounts 7 CHAPTER This chapter describes how to configure global email parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-2 Viewing or Editing User Information,

More information

Managing NCS User Accounts

Managing NCS User Accounts 7 CHAPTER The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and

More information

Telax Administrator Portal

Telax Administrator Portal Telax Administrator Portal Table of Contents A. Getting Started... 2 B. Home... 2 C. Executive Dashboard... 3 E. Configuration... 5 1. General Page... 5 2. Working Hours... 5 3. Contact List:... 6 4. Queues:...

More information

Using the Subscriber Manager GUI Tool

Using the Subscriber Manager GUI Tool CHAPTER 11 Using the Subscriber Manager GUI Tool Published: December 23, 2013, Introduction This chapter describes how to use the Subscriber Manager (SM) graphical user interface (GUI) tool to configure

More information

Remote Access MPLS-VPNs

Remote Access MPLS-VPNs First Published: August 12, 2002 Last Updated: May 4, 2009 The feature allows the service provider to offer a scalable end-to-end Virtual Private Network (VPN) service to remote users. This feature integrates

More information

Managing GSS Devices from the GUI

Managing GSS Devices from the GUI CHAPTER 1 This chapter describes how to configure and manage your Global Site Selector Manager (GSSM) and Global Site Selector (GSS) devices from the primary GSSM graphical user interface. It includes

More information

Cisco TEO Adapter Guide for

Cisco TEO Adapter Guide for Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part

More information

Remote Support 19.1 Web Rep Console

Remote Support 19.1 Web Rep Console Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property

More information

ProSafe Plus Switch Utility

ProSafe Plus Switch Utility ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA May 2012 202-10524-04 2012 NETGEAR, Inc. All rights reserved No part of this publication maybe reproduced, transmitted,

More information

CHEMICAL SAFETY EMS SOFTWARE. Accumulation Inventory

CHEMICAL SAFETY EMS SOFTWARE. Accumulation Inventory CHEMICAL SAFETY EMS SOFTWARE Accumulation Inventory The Accumulation Inventory Database is used to track waste materials stored in specially designated Accumulation Areas. The total quantity of waste currently

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

Drobo How-To Guide. Drobo Apps - Configuring ElephantDrive. Topics. What You Will Need. Prerequisites

Drobo How-To Guide. Drobo Apps - Configuring ElephantDrive. Topics. What You Will Need. Prerequisites The Drobo 5N provides simple and affordable network attached storage for the connected home or small office. ElephantDrive is a cloud-based service that provides real-time protection of all, or a subset

More information

User Guide. Kronodoc Kronodoc Oy. Intelligent methods for process improvement and project execution

User Guide. Kronodoc Kronodoc Oy. Intelligent methods for process improvement and project execution User Guide Kronodoc 3.0 Intelligent methods for process improvement and project execution 2003 Kronodoc Oy 2 Table of Contents 1 User Guide 5 2 Information Structure in Kronodoc 6 3 Entering and Exiting

More information

OXE Free desktop Guide

OXE Free desktop Guide OXE Free desktop Guide The below telephone screen examples are for a 4038/4068 handset, the Free Desktop IP- Touch Interface works in the same manner with a 4028 extension. The only difference is that

More information

Caliber 11.0 for Visual Studio Team Systems

Caliber 11.0 for Visual Studio Team Systems Caliber 11.0 for Visual Studio Team Systems Getting Started Getting Started Caliber - Visual Studio 2010 Integration... 7 About Caliber... 8 Tour of Caliber... 9 2 Concepts Concepts Projects... 13 Baselines...

More information

Administration Tools User Guide. Release April 2015

Administration Tools User Guide. Release April 2015 Administration Tools User Guide Release 6.2.5 April 2015 Administration Tools User Guide Release 6.2.5 April 2015 Part Number: E62969_05 Oracle Financial Services Software, Inc. 1900 Oracle Way Reston,

More information

Important notice regarding accounts used for installation and configuration

Important notice regarding accounts used for installation and configuration System Requirements Operating System Nintex Reporting 2008 can be installed on Microsoft Windows Server 2003 or 2008 (32 and 64 bit supported for both OS versions). Browser Client Microsoft Internet Explorer

More information

Atlona Manuals Software AMS

Atlona Manuals Software AMS AMS Atlona Manuals Software Version Information Version Release Date Notes 1 03/18 Initial release AMS 2 Welcome to Atlona! Thank you for purchasing this Atlona product. We hope you enjoy it and will take

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP

VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

SARS ANYWHERE ADMINISTRATION MANUAL APPENDICES

SARS ANYWHERE ADMINISTRATION MANUAL APPENDICES SARS ANYWHERE ADMINISTRATION MANUAL APPENDICES APPENDIX A HELP FILE The Help feature is a convenient and quick way to obtain more information about SARS Anywhere topics. There are four ways to use the

More information