Cisco Security Policy Engine Administration Server User Interface Topics
|
|
- Vernon Parrish
- 6 years ago
- Views:
Transcription
1 APPENDIX A Cisco Security Policy Engine Administration Server User Interface This appendix describes how a system administrator can access the Cisco Security Policy Engine (SPE) Services Administration web-based user interface using the Cisco Broadband Access Center (BAC) application. The Cisco SPE security service provides an authentication and authorization framework based upon the Role Based Access Control (RBAC) model, in which user access permissions are associated with roles and users are made occupants of a role. Table A-1 Topics If you want to... Learn more about how BAC implements security Access the Security Policy Engine user interface Edit your personal profile or change your password Go to the... Overview of BAC Security section on page A-1. Accessing the Application section on page A-3. Logging Out section on page A-8. Overview of BAC Security BAC security has two focuses: ISP partitioning Operator permissions Together these determine what objects a user can see and what actions a user can perform on the objects. For network efficiency and performance, BAC does not handle security for individual network devices or administrative networks. Thus, if you grant a user group access to an administrative network, that user group has access to all objects under the administrative network, including administrative subnetworks, devices, cards and ports. All objects inherit settings from their immediate parent. You give a user group permission to perform actions on objects by category, not by individual object. For example, if you give a user group permission to create a device, members of this group can create any device under any accessible administrative network. Underlying BAC security is the logical grouping of service providers. Therefore, you can create geographical, functional, technological, or any other grouping that enables you to logicaly partition administrative networks, devices, network resources and subscribers. In this way, network operators at one service provider can see only the networks, devices, network resources and subscribers that belong A-1
2 Overview of BAC Security Appendix A to it. In the BAC security model, you must assign an owner of each object you create. You select the owner from a list of ISPs. After you assign an owner to an object, only operators associated with that owner, or BACAdmin, can access the object. Figure A-1 illustrates the BAC security partition concept. Figure A-1 BAC Security Partitioning NIMRoot NY (assigned to ISP1) CA (assigned to ISP2, ISP3) San Francisco (assigned to ISP2) San Jose (assigned to ISP3) Bldg20 cpe1 cpe2 C10K_1 Associate NetworkResourceRoot AAA A1 (assigned to ISP1, ISP2) A2 (assigned to ISP3) AAA dhcp1 (assigned to ISP1) dhcp1 (assigned to ISP3) Each service provider can have a number of predefined user groups with different permissions. The user BACAdmin can create operators and assign them to user groups, and, based on the permissions from the associated group, an operator can perform actions such as create, delete, view, and modify networks, devices or subscribers, and also can add, delete, and modift services for devices and subscribers. When you initialize BACservers, the bacstartup script loads security object model into the security server, this security object model defines BAC specific permissions, associates roles that contains sets of permissions and provides a mechanism to create user groups associated with the roles. When you initialize the server, the system creates the BACAdministrators group and BACAdmin, which is the default BAC administrative user, and a default password. Caution Cisco Systems recommends against changing these permissions, roles, and groups to avoid unwanted behaviors. You can change the default password using SPE. When BACAdmin creates an ISP, the system automatically creates a number of user groups associated with the service provider in the SPE server. The permissions of the associated groups and the name of the user groups are pre-defined in the xml file, the default groups and their brief descriptions of their associated permissions are: [ISPname]AdvanceOperators contains the permissions to create, delete, get, set of AdminNetwork, Device, NetworkResource, Subscriber, SubscriberGroup as well as add, delete services of Device and Subscriber. The only thing it cannot do is anything related to ISP. A-2
3 Appendix A Accessing the Application [ISPname]IntermediateOperators contains the permissions to create, delete, get, set of AdminNetwork, Device, NetworkResource, and add, delete services of Device with partial list of service features. [ISPname]Operators contains the permissions to create, delete, get, set of Subscriber, Subscriber groups and add, delete services of Subscriber as well as partial list of service features, SinglePVC, PVCRange, SingleVLAN and VLANRange. This group is meant to complement the access list and permissions of IntermediateOperators group. [ISPname]CustomerOperators contains read-only permissions in all categories. If a user logs in as a member of the ser group [ISPname]AdvanceOperators, for example ISP3AdvanceOPerators, the user s access is illustrated in Figure A-2. Figure A-2 Access for a Member of the User Group AdvanceOperators NIMRoot CA (assigned to ISP2, ISP3) San Jose (assigned to ISP3) Bldg20 cpe1 cpe2 C10K_1 Associate NetworkResourceRoot AAA A2 (assigned to ISP3) DHCP dhcp2 (assigned to ISP3) The SPE application functions are accessed using a web browser from the BAC application. You can perform the following functions: Create, modify, and delete users in the user configuration view. Create, modify, and delete user groups in the group configuration view. Set up user roles. User roles allow you to assign a set of privileges to a user or user group. Set up policy rules. Policy rules are the primary component used to define a policy. They allow you to assign a scope for users and user groups to work with. Accessing the Application This section describes how to log onto the Cisco Security Policy Engine (SPE) server. You can launch the SPE in two ways: From the Broadband Access Center application By entering a specific URL in your web browser Authentication is the first operation required after starting the application. You do this from the Log On page. A-3
4 Accessing the Application Appendix A Logging On from BAC To access SPE, follow these steps: Log in to BAC. Enter your name and password, then press Login. An encryption notice page appears. Read the notice. Click Exit to return to the login page, or click OK to access the Broadband Access Center application. Click the Tools tab and then User Administration. The User Administration page appears. From the Tools > User Administration page, click SPE User Admin UI. Wait until the SPE Administration loads and the logon page appears. Note Step 6 SPE Administration is referred to as SPE throughout this appendix. Enter your user identification and password, then click Logon. The SPE page appears. The SPE page displays version, product, and copyright information, and menu options that allow you to navigate through different user-interfaces. Logging On from a Browser You can launch the Cisco Security Policy Engine Administration user interface from your web browser. Authentication is the first operation required after launching the application. This is accomplished from the Log On page. Follow these steps to log on to the system. Step 6 Open your browser. Enter the specified URL: The BAC Login page appears. Log on to BAC. Type in your name and password, then press Login. An encryption notice page appears. Read the notice and click Exit to return to the login page, or click OK to access the Broadband Access page. Click the Tools tab and then User Administration. The User Administration page appears. Enter the User Identification (case sensitive for databases), and Password (case sensitive in directories and databases) in the corresponding fields. Click Logon. The Cisco SPE Administration page appears. A-4
5 Appendix A Managing Users Managing Users This section describes the options that are available under SPE Administration User Management menu: User Configuration, page A-5 Note Only users with administrator privileges on the resource are allowed to perform administrative tasks on the resources. User Configuration Browsing Users After you log in to SPE, select User Management and then User Configuration from the menu. The User Configuration page appears. You can perform the following tasks when using the Cisco SPE user interface: Browsing Users, page A-5 Adding a New User, page A-6 Updating a User Profile, page A-6 Deleting a User, page A-6 Cloning a User, page A-7 Adding a User to User Groups, page A-7 Removing a User from a User Group, page A-8 To browse the list of users, follow these steps: Click Next >> or <<Prev to browse the users list. You can also search for a specific user by specifying the user s name in the Filter text field and then clicking Go. Click Browse to search for users in any context other than the default context. (This is possible only if context selection is enabled.) A context popup menu appears. Note The choose the context tag allows you to browse the context for either roles, policy rules, or groups. You select an entry for the intended context, for instance policy rules, and if you know what to filter, you enter the text that the operator wants and then click Go. If the operator does not know the text, just leave it blank and click Go. BAC provides all the data under that category. The operator can look at the desired entry and put in the text in the filter and then click Go again. BAC filters out all the entries except the ones that contain the text that you entered. Select the required context. You can specify certain filters to refine your search in the Filter text field. Click Go to list the users with the new search criteria. A-5
6 Managing Users Appendix A Adding a New User To add a new user to the SPE database, follow these steps: Click New. The new user page appears with the following fields: Name Name of the user. Last Name Last name of the user. Password User s password. Confirm Password Re-enter your user password to confirm it. Enter values in each field. Use the Tab key to move through the fields. Click Insert to save the user information. Updating a User Profile To modify the profile of a user, follow these steps: Select the user you that want to update. Make the necessary changes. If you make a mistake click Reset to reset all fields to their original values and continue. Click Update to save the changes. Deleting a User To delete a user from the system, follow these steps: Choose the user that you want to delete. Click Delete to delete the selected user. You are prompted to confirm the delete operation. Click: OK to confirm deletion Cancel to cancel the delete operation A-6
7 Appendix A Managing Users Cloning a User You might want to copy the same information from one user to another user and then use this information to create a new user. To clone or copy a user, follow these steps: Select an existing user having a profile similar to the new user you want to configure. Click Clone to make a copy of that user to configure the new one. Make appropriate changes to the required fields. Click Insert to save the user information. Adding a User to User Groups To add the user to different user groups, follow these steps: Step 6 Step 7 Step 8 Choose the user you want to add to the user groups. Click Add to Group at the bottom of the page. The Select User Group page appears. Select the desired group or groups, from the Available User Groups List, to which you want to add the user. Use the arrows to move the user groups to and from the Selected User Groups List (on the right side of the page). After you include the desired groups that you want the user added to, then click Insert and Close to save the changes and close the dialog box. You return to the previous page where the user groups that the user belongs to are listed at the bottom of the page. If the context selection is enabled, you can click Browse to select the user groups in any other context. A context popup menu appears. Select the required context and click Go. A list of user groups with the new search criteria appears. Filters can be specified in the Filter text field to refine your search. Click Insert and Close to save the changes you have made. Note Alternatively, you can click Cancel to discard the changes and close the dialog page. A-7
8 Managing Users Appendix A Removing a User from a User Group To remove a user from user groups, follow these steps: Choose the user that you want to remove from a group. Click the check box to the left of the user name. Select the user group from which you want to remove the specified user. Click Remove from Group to remove the user from the selected user group. The selected user is removed from the specified group. Logging Out To logout of the system, click Logout in the upper right corner of your CNS page. You are prompted with a message. Click OK to log out or Cancel to continue operations. A-8
Provisioning Flows Topics
CHAPTER 3 The BAC software provides network and service management tools that enable the provisioning of devices and subscribers in broadband aggregation environments. BAC supports the role of the following
More informationUser Group Configuration
CHAPTER 90 The role and user group menu options in the Cisco Unified Communications Manager Administration User Management menu allow users with full access to configure different levels of access for
More informationPassword Reset Utility. Configuration
Password Reset Utility Configuration 1 Table of Contents 1. Uninstalling Legacy Password Reset... 2 2. Password Reset Utility: How to deploy and configure via Group Policy... 2 3. Configuring Group Policy
More informationStatus Web Evaluator s Guide Software Pursuits, Inc.
Status Web Evaluator s Guide 2018 Table of Contents Introduction... 2 System Requirements... 2 Contact Information... 2 Installing Microsoft IIS... 2 Verifying Microsoft IIS Features... 9 Installing the
More informationWorkspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810
Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationUser Management in Resource Manager
CHAPTER 8 This section describes how to manage user profiles. Topics in this section include: Overview of User Management, page 8-1 Using User Management, page 8-1 Overview of User Management In Resource
More informationLab 11-1 Lab User Profiles and Tracking
In the following lab instructions, you will be setting up groups, users, and passwords to require password-protected login to Kofax Capture modules. Rights will be assigned to the groups and users that
More informationDeveloping a Gadget for the Home Page
CHAPTER 11 Note This topic is intended for system and business administrators who can develop new gadgets for the Home page. Cisco Pulse supports the development of gadgets that are comprised of an XML
More informationSharePoint AD Administration Tutorial for SharePoint 2007
SharePoint AD Administration Tutorial for SharePoint 2007 1. General Note Please note that AD Administration has to be activated before it can be used. For further reference, please see our Product Installation
More informationNortel Quality Monitoring Search and Replay Guide
Nortel Quality Monitoring Search and Replay Guide NN44480-106 Product release 7.0 Standard 02.02 November 2009 Nortel Quality Monitoring Search and Replay Guide Publication number: NN44480-106 Product
More informationMicrosoft Office Groove Server Groove Manager. Domain Administrator s Guide
Microsoft Office Groove Server 2007 Groove Manager Domain Administrator s Guide Copyright Information in this document, including URL and other Internet Web site references, is subject to change without
More informationData Privilege Adding or Removing Members
Data Privilege allows you to add or remove Members, aka Users, (individuals permitted to access all or portions of a group s resources) from any security group for which you are an Owner or an Authorizer.
More informationConfiguring Role-Based Access Control
Configuring Role-Based Access Control This chapter includes the following sections: Role-Based Access Control, page 1 User Accounts for Cisco UCS Manager, page 1 User Roles, page 3 Privileges, page 4 User
More informationCisco Unified Serviceability
Cisco Unified Serviceability Introduction, page 1 Installation, page 5 Introduction This document uses the following abbreviations to identify administration differences for these Cisco products: Unified
More informationThis chapter describes the tasks that you perform after installing Prime Cable Provisioning.
This chapter describes the tasks that you perform after installing Prime Cable Provisioning. Licensing Prime Cable Provisioning, page 1 Cisco Prime Network Registrar Configurations, page 5 Setting Up a
More informationOverview. ACE Appliance Device Manager Overview CHAPTER
1 CHAPTER This section contains the following: ACE Appliance Device Manager, page 1-1 Logging Into ACE Appliance Device Manager, page 1-3 Changing Your Account Password, page 1-4 ACE Appliance Device Manager
More informationCisco TEO Adapter Guide for Microsoft System Center Operations Manager 2007
Cisco TEO Adapter Guide for Microsoft System Center Operations Manager 2007 Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com
More informationTOP Server Version 6 Security Settings
TOP Server 1 (10) TOP Server Version 6 TOP Server 2 (10) Contents Security Built In... 3 User Manager Configuration... 3 New User Accounts... 5 New User Group and Properties... 5 Configuration Security...
More informationConfiguring Cisco TelePresence Manager
CHAPTER 3 Revised: November 27, 2006, First Published: November 27, 2006 Contents Introduction, page 3-1 System Configuration Tasks, page 3-2 Security Settings, page 3-3 Database, page 3-4 Room Phone UI,
More informationIntroduction to Provisioning
CHAPTER 1 Cisco Prime Collaboration Provisioning provides a scalable web-based solution to manage company s next-generation communication services. Provisioning manages IP communication services in an
More informationSTRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide
STRS OHIO F5 Access Client Setup for ChromeBook Systems User Guide For assistance, please contact the ITS Service Desk at x4357 or 227-8633. Table of Contents First Time Use of Remote Access... 1 F5 Access
More informationManage Administrators and Admin Access Policies
Manage Administrators and Admin Access Policies Role-Based Access Control, page 1 Cisco ISE Administrators, page 1 Cisco ISE Administrator Groups, page 3 Administrative Access to Cisco ISE, page 11 Role-Based
More informationSharePoint 2010 Tutorial
SharePoint 2010 Tutorial TABLE OF CONTENTS Introduction... 1 Basic Navigation... 2 Navigation Buttons & Bars... 3 Ribbon... 4 Library Ribbon... 6 Recycle Bin... 7 Permission Levels & Groups... 8 Create
More informationES CONTENT MANAGEMENT - EVER TEAM
ES CONTENT MANAGEMENT - EVER TEAM USER GUIDE Document Title Author ES Content Management - User Guide EVER TEAM Date 20/09/2010 Validated by EVER TEAM Date 20/09/2010 Version 9.4.0.0 Status Final TABLE
More informationCisco TEO Adapter Guide for Microsoft Windows
Cisco TEO Adapter Guide for Microsoft Windows Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800
More informationWMI log collection using a non-admin domain user
WMI log collection using a non-admin domain user To collect WMI logs from a domain controller in EventLog Analyer, it is necessary to add a domain admin account of that domain in it. Alternatively, you
More informationConfiguring RBAC Using Admin UI
CHAPTER 13 This chapter describes the Security feature of Prime Cable Provisioning. Use this feature to configure and manage various levels of security. For conceptual information about the RBAC feature,
More informationVMware AirWatch Certificate Authentication for Cisco IPSec VPN
VMware AirWatch Certificate Authentication for Cisco IPSec VPN For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationHR-Lite Database & Web Service Setup Guide
HR-Lite Database & Web Service Setup Guide Version: 1.00 HR21 Limited All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means, electronic or mechanical,
More informationReal Application Security Administration
Oracle Database Real Application Security Administration Console (RASADM) User s Guide 12c Release 2 (12.2) E85615-01 June 2017 Real Application Security Administration Oracle Database Real Application
More informationFigure 5-25: Setup Wizard s Safe Surfing Screen
4. After the settings have been saved, the Safe Surfing screen will appear. Click the Norton Internet Security Suite button to install the special edition of Norton Internet Security on your computer,
More informationCTC Accounts Active Directory Synchronizer User Guide
i Contents Overview... 3 System Requirements... 4 Additional Notes... 5 Installation and Configuration... 6 Running the Synchronizer Interactively... 7 Automatic Updates... 7 Logging In... 8 Options...
More informationNTP Software File Auditor for Windows Edition
NTP Software File Auditor for Windows Edition An NTP Software Installation Guide Abstract This guide provides a short introduction to installation and initial configuration of NTP Software File Auditor
More informationWCM 6.0 Pro MS/SP Software Recovery Installation Guide
Release Date: 2013/09/23 WCM 6.0 Pro MS/SP Software Recovery Installation Guide Once the OS is restored or re-imaged successfully on the system, please follow below installation guide to complete all the
More informationEkran System v.6.0 Privileged User Accounts and Sessions (PASM)
Ekran System v.6.0 Privileged User Accounts and Sessions (PASM) Table of Contents About... 3 Using Privileged User Accounts... 4 Password Vault Configuration... 5 Defining Domain Administrator Credentials...
More informationKentico CMS 6.0 Intranet Administrator's Guide
Kentico CMS 6.0 Intranet Administrator's Guide 2 Kentico CMS 6.0 Intranet Administrator's Guide Table of Contents Introduction 5... 5 About this guide Getting started 7... 7 Installation... 11 Accessing
More informationCorporate Administrator Tool (CAT) User Guide V8.0
Corporate Administrator Tool (CAT) User Guide V8.0 Table of Contents 1 Introduction... 3 1.1 Browser Supported... 3 1.2 Accessing CAT Application... 4 2 Managing Master-List... 5 2.1 Filter and Search
More informationMessage Networking 5.2 Administration print guide
Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do
More informationUsing ANM With Virtual Data Centers
APPENDIXB Date: 3/8/10 This appendix describes how to integrate ANM with VMware vcenter Server, which is a third-party product for creating and managing virtual data centers. Using VMware vsphere Client,
More informationManaging Users and Configuring Role-Based Access Control
Managing s and Configuring Role-Based Access Control This section describes how to manage users in Prime Central, including defining users and passwords and configuring role-based access control (RBAC).
More informationRecovering Cisco MXE 3500
CHAPTER 7 Recovering Cisco MXE 3500 Revised: January 26, 2010, Caution This recovery process resets your Cisco MXE 3500 to the same state and configuration in which it was delivered to you. All changes
More informationWebSphere Application Server V7: Administration Consoles and Commands
Chapter 5 of WebSphere Application Server V7 Administration and Configuration Guide, SG24-7615 WebSphere Application Server V7: Administration Consoles and Commands WebSphere application server properties
More informationTyler Dashboard. User Guide Version 6.3. For more information, visit
Tyler Dashboard User Guide Version 6.3 For more information, visit www.tylertech.com. TABLE OF CONTENTS Tyler Dashboard... 4 Tyler Dashboard Features... 4 Search... 5 Browse... 5 Page... 6 Dashboard...
More informationStudywiz-Gmail Teachers' and Students' Guide
00.04, 29 Nov 2010 Log in to Studywiz 1. Open a web browser window, and in the address field enter the URL of the Studywiz deployment. The Studywiz splash page appears. 2. Click the Standard Log In button.
More informationGetting Started with IBM Cognos 10 Reports
UNIVERSITY OF SUSSEX Getting Started with IBM Cognos 10 Reports ITS CIS 9/2/2015 Introduction to some of the features in the Cognos Connection reporting portal. Guides users through initial configuration
More informationRole-Based Access Configuration
Role-Based Access Control Overview, page 1 User Accounts for Cisco UCS, page 1 User Roles, page 3 Locales, page 9 Locally Authenticated User Accounts, page 11 Monitoring User Sessions, page 19 Role-Based
More informationXton Access Manager GETTING STARTED GUIDE
Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3
More informationR9.7 erwin License Server:
R9.7 erwin License Server: Installation and Setup This is a quick guide to setting-up a erwin DM License Server. NOTES: - Concurrent licensing is available for only erwin r8.2 and later releases! - Concurrent
More informationMy Publications Quick Start Guide
IHS > Decision Support Tool My Publications Quick Start Guide January 28, 2011 Version 2.0 2011 IHS, All Rights Reserved. All trademarks belong to IHS or its affiliated and subsidiary companies, all rights
More informationOracle Database. Installation and Configuration of Real Application Security Administration (RASADM) Prerequisites
Oracle Database Real Application Security Administration 12c Release 1 (12.1) E61899-04 May 2015 Oracle Database Real Application Security Administration (RASADM) lets you create Real Application Security
More informationIntroduction to Broadband Access Center Topics
CHAPTER 1 The Cisco Broadband Access Center software for Broadband Aggregation supports the mass-market deployment of broadband services by providing a provisioning system to replace labor-intensive and
More informationUsing the Subscriber Manager GUI Tool
CHAPTER 11 This chapter describes how to use the Subscriber Manager (SM) GUI tool to configure subscribers in the Cisco Service Control Management Suite (SCMS) Subscriber Manager (SM) database. The SM
More informationLab - Configure Users and Groups in Windows
Lab - Configure Users and Groups in Windows Introduction In this lab, you will create users and groups and delete users using the Local Users and Groups Manager. You will also assign group and user permission
More informationStart Creating SSL Policies
The following topics provide an overview of SSL policy creation, configuration, management, and logging. SSL Policies Overview, on page 1 SSL Policy Default Actions, on page 2 Default Handling Options
More informationMetastorm BPM Release 7.6
Metastorm BPM Release 7.6 Administration Guide May 2008 Metastorm Inc. email: inquiries@metastorm.com http://www.metastorm.com Metastorm BPM Release 7.6 Copyrights and Trademarks 1996-2008 Metastorm Inc.
More informationManage Administrators and Admin Access Policies
Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on
More informationEquitrac Embedded Connector for EFI SendMe. Setup Guide Equitrac Corporation Equitrac Corporation
Equitrac Embedded Connector for EFI SendMe 1.1 Setup Guide 2012 Equitrac Corporation 2012 Equitrac Corporation Equitrac Embedded Connector for EFI SendMe Setup Guide Document History Date Description of
More informationMicrosoft SQL Installation and Setup
This chapter provides information about installing and setting up Microsoft SQL. Encrypted Database Not Supported, page 1 Install and Setup Microsoft SQL Server, page 1 Database Migration Required for
More informationCRA Wiz and Fair Lending Wiz. Installation Guide V6.9
CRA Wiz and Fair Lending Wiz Installation Guide V6.9 CRA Wiz and Fair Lending Wiz 6.9 Installation Instructions The following installation instructions provide procedures for a new installation of CRA
More informationOne Identity Active Roles 7.2. Web Interface User Guide
One Identity Active Roles 7.2 Web Interface User Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in
More informationCLIQ Web Manager. User Manual. The global leader in door opening solutions V 6.1
CLIQ Web Manager User Manual V 6.1 The global leader in door opening solutions Program version: 6.1 Document number: ST-003478 Date published: 2016-03-31 Language: en-gb Table of contents 1 Overview...9
More informationEmbedded Connector for IKON DocSend Setup Guide
Embedded Connector for IKON DocSend Setup Guide Version 1.1 2016 IKON-20160314 Equitrac Embedded Connector for IKON DocSend Setup Guide Document History Date Description of Change April 18, 2013 Updated
More informationSecuring LDAP Directory Integration with Cisco Unified CallManager 4.x
Securing LDAP Directory Integration with Cisco Unified CallManager 4.x Document ID: 109804 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information For Existent
More informationApplication User Configuration
CHAPTER 87 The following topics contain information on managing application user information: Settings, page 87-1 Adding an Administrator User to Cisco Unity or Cisco Unity Connection, page 87-6 Changing
More informationOracle Financial Services Governance, Risk, and Compliance Workflow Manager User Guide. Release February 2016 E
Oracle Financial Services Governance, Risk, and Compliance Workflow Manager User Guide Release 8.0.2.0.0 February 2016 E65393-01 Oracle Financial Services Governance, Risk, and Compliance Workflow Manager
More informationNetExtender for SSL-VPN
NetExtender for SSL-VPN Document Scope This document describes how to plan, design, implement, and manage the NetExtender feature in a SonicWALL SSL-VPN Environment. This document contains the following
More informationHOWTO Make an Initial Connection to the Office Anywhere Desktop using a Windows 7 based PC v1
HOWTO Make an Initial Connection to the Office Anywhere Desktop using a Windows 7 based PC v1 1. Web browse to the Office Anywhere Portal: http://hosted.gg (as shown below) 2. Click the Access Office Anywhere
More informationLogging In and Setting Up
This chapter includes the following sections: Overview of, page 1 Resetting the Admin Password, page 3 Password Guidelines, page 3 Resetting the Shared Secret, page 4 Overview of You can log in and work
More informationLab - Connect to a Router for the First Time
Introduction In this lab, you will configure basic settings on a wireless router. Recommended Equipment A computer with Windows installed An Ethernet NIC installed Wireless router Ethernet patch cable
More informationManage Administrators and Admin Access Policies
Manage Administrators and Admin Access Policies Role-Based Access Control, on page 1 Cisco ISE Administrators, on page 1 Cisco ISE Administrator Groups, on page 3 Administrative Access to Cisco ISE, on
More informationManaging Subscribers Topics
CHAPTER 8 The Cisco Broadband Access Center (BAC) software enables you to organize and manage subscribers to broadband aggregation services. A subscriber is the individual, company, or organization that
More informationPaperClip32. Revision 2.0
PaperClip32 Quick Start Guide Revision 2.0 Copyright Information Copyright 2003, PaperClip Software, Inc. The PaperClip32 product name and PaperClip Logo are registered trademarks of PaperClip Software,
More informationPRISM-FHF The Fred Hollows Foundation
PRISM-FHF The Fred Hollows Foundation SECURITY ADMINISTRATOR S GUIDE Version 1.2 TABLE OF CONTENTS INTRODUCTION... 4 OVERVIEW... 4 SECURITY CONSOLE... 6 ACCESSING THE SECURITY CONSOLE... 6 VIEWING THE
More informationRenWeb Training. Creating Your Classroom Website
RenWeb Training Creating Your Classroom Website October 2013 RenWeb Training Manual Table of Contents Ren Web Survey 3 Pre-Training Handout: Saving a Document as a PDF 4 Lesson 1: Adding Homework & Web
More informationIntegrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording
Integrating IBM Security Privileged Identity Manager with ObserveIT Enterprise Session Recording Contents 1 About This Document... 2 2 Overview... 2 3 Before You Begin... 2 4 Deploying ObserveIT with IBM
More informationChancellor s Office Information Technology Services Corporate Information Management FIRMS Budget Review Hyperion Process
Step Open Internet Explorer and type in the following URL: http://peterson.calstate.edu:8080/hyperion/browse/login The Hyperion Login screen will display. Enter your User Id and Password > click on the
More informationLiferay Portal 4 - Portal Administration Guide. Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer
Liferay Portal 4 - Portal Administration Guide Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer Liferay Portal 4 - Portal Administration Guide Joseph Shum Alexander Chow Redmond Mar Jorge Ferrer 1.1
More informationVMware AirWatch Certificate Authentication for EAS with ADCS
VMware AirWatch Certificate Authentication for EAS with ADCS For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationInstalling and Configuring vcloud Connector
Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationManaging WCS User Accounts
7 CHAPTER This chapter describes how to configure global email parameters and manage WCS user accounts. It contains these sections: Adding WCS User Accounts, page 7-2 Viewing or Editing User Information,
More informationManaging NCS User Accounts
7 CHAPTER The Administration enables you to schedule tasks, administer accounts, and configure local and external authentication and authorization. Also, set logging options, configure mail servers, and
More informationTelax Administrator Portal
Telax Administrator Portal Table of Contents A. Getting Started... 2 B. Home... 2 C. Executive Dashboard... 3 E. Configuration... 5 1. General Page... 5 2. Working Hours... 5 3. Contact List:... 6 4. Queues:...
More informationUsing the Subscriber Manager GUI Tool
CHAPTER 11 Using the Subscriber Manager GUI Tool Published: December 23, 2013, Introduction This chapter describes how to use the Subscriber Manager (SM) graphical user interface (GUI) tool to configure
More informationRemote Access MPLS-VPNs
First Published: August 12, 2002 Last Updated: May 4, 2009 The feature allows the service provider to offer a scalable end-to-end Virtual Private Network (VPN) service to remote users. This feature integrates
More informationManaging GSS Devices from the GUI
CHAPTER 1 This chapter describes how to configure and manage your Global Site Selector Manager (GSSM) and Global Site Selector (GSS) devices from the primary GSSM graphical user interface. It includes
More informationCisco TEO Adapter Guide for
Release 2.3 April 2012 Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 Text Part
More informationRemote Support 19.1 Web Rep Console
Remote Support 19.1 Web Rep Console 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks are the property
More informationProSafe Plus Switch Utility
ProSafe Plus Switch Utility User Guide 350 East Plumeria Drive San Jose, CA 95134 USA May 2012 202-10524-04 2012 NETGEAR, Inc. All rights reserved No part of this publication maybe reproduced, transmitted,
More informationCHEMICAL SAFETY EMS SOFTWARE. Accumulation Inventory
CHEMICAL SAFETY EMS SOFTWARE Accumulation Inventory The Accumulation Inventory Database is used to track waste materials stored in specially designated Accumulation Areas. The total quantity of waste currently
More informationRealms and Identity Policies
The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page
More informationDrobo How-To Guide. Drobo Apps - Configuring ElephantDrive. Topics. What You Will Need. Prerequisites
The Drobo 5N provides simple and affordable network attached storage for the connected home or small office. ElephantDrive is a cloud-based service that provides real-time protection of all, or a subset
More informationUser Guide. Kronodoc Kronodoc Oy. Intelligent methods for process improvement and project execution
User Guide Kronodoc 3.0 Intelligent methods for process improvement and project execution 2003 Kronodoc Oy 2 Table of Contents 1 User Guide 5 2 Information Structure in Kronodoc 6 3 Entering and Exiting
More informationOXE Free desktop Guide
OXE Free desktop Guide The below telephone screen examples are for a 4038/4068 handset, the Free Desktop IP- Touch Interface works in the same manner with a 4028 extension. The only difference is that
More informationCaliber 11.0 for Visual Studio Team Systems
Caliber 11.0 for Visual Studio Team Systems Getting Started Getting Started Caliber - Visual Studio 2010 Integration... 7 About Caliber... 8 Tour of Caliber... 9 2 Concepts Concepts Projects... 13 Baselines...
More informationAdministration Tools User Guide. Release April 2015
Administration Tools User Guide Release 6.2.5 April 2015 Administration Tools User Guide Release 6.2.5 April 2015 Part Number: E62969_05 Oracle Financial Services Software, Inc. 1900 Oracle Way Reston,
More informationImportant notice regarding accounts used for installation and configuration
System Requirements Operating System Nintex Reporting 2008 can be installed on Microsoft Windows Server 2003 or 2008 (32 and 64 bit supported for both OS versions). Browser Client Microsoft Internet Explorer
More informationAtlona Manuals Software AMS
AMS Atlona Manuals Software Version Information Version Release Date Notes 1 03/18 Initial release AMS 2 Welcome to Atlona! Thank you for purchasing this Atlona product. We hope you enjoy it and will take
More informationInstallation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit
. All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All
More informationVMware AirWatch Certificate Authentication for EAS with NDES-MSCEP
VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationSARS ANYWHERE ADMINISTRATION MANUAL APPENDICES
SARS ANYWHERE ADMINISTRATION MANUAL APPENDICES APPENDIX A HELP FILE The Help feature is a convenient and quick way to obtain more information about SARS Anywhere topics. There are four ways to use the
More information