BLUEPRINT REQUIREMENTS CENTER 2010 BLUEPRINT TEAM REPOSITORY VERSION 2. Administrator s Guide
|
|
- Gavin Atkins
- 5 years ago
- Views:
Transcription
1 BLUEPRINT REQUIREMENTS CENTER 2010 BLUEPRINT TEAM REPOSITORY VERSION 2 September 2010
2 Contents Introduction... 2 Repository Configuration Files... 3 User Administration... 5 Appendix A. Instructions for LDAP Installations Appendix B. Starting and Stopping Apache Appendix C. HTPASSWD Reference Copyright 2010 Blueprint Software Systems Inc. This document contains confidential and proprietary information of Blueprint Software Systems, Inc. and is intended only for the person(s) to whom it is transmitted by Blueprint Software Systems Inc. Any reproduction or retransmission of this document or the information contained herein, in whole or in part, without the prior written consent of Blueprint Software Systems, Inc. is expressly prohibited. Blueprint Software Systems, Inc. reserves all right, title and interest in this document and the information contained herein. Unless otherwise set out in a written agreement between Blueprint Software Systems, Inc., and a recipient of this document, Blueprint Software Systems Inc. makes no representations or warranties with respect to the completeness or accuracy of the information contained herein and shall not under any circumstances, be held liable for any damages howsoever caused by reliance thereon. Blueprint Software Systems, Inc. 372 Bay Street, Suite 1600 Toronto, Ontario M5H 2W9 1
3 Introduction This document provides instructions for configuring users and permissions for the Blueprint Team Repository. For detailed additional information on installing the Blueprint Team Repository, please refer to the following document, available from the Blueprint Products download page: Blueprint Team Repository Version 2 Installation and Configuration Guide Before You Begin Updates to Blueprint Team Repository software and documentation are made available periodically. Please check the Blueprint Product downloads page for updates, and select the appropriate files. Directories & File Names: This document uses the directory locations and file names pre-selected by the application. If you select different locations or file names, remember to substitute your own choices when following the instructions. 2
4 Repository Configuration Files In order to configure or troubleshoot your repository, there are several files you will need to access, as follows: Apache Web Server Configuration File: httpd.conf Subversion Repository Configuration File: BTR.conf Subversion Repository Access File: svn-access-file Subversion Repository Authorization File: svn-auth-file Apache Web Server Configuration File The httpd.conf file is the main configuration file for the Apache Web Server. It provides the web server with information about your Subversion installation and repository installation, for user authentication and other web services. In a default installation, this file is located in the following directory for your operating system: Windows 7: C:\Program Files (x86)\collabnet\subversion Server\httpd\conf Windows XP: C:\Program Files\CollabNet\Subversion Server\httpd\conf Windows 2003 Server: C:\Program Files\CollabNet\Subversion Server\httpd\conf Subversion Repository Configuration File This configuration file, also referred to as the LOCATION BLOCK, provides information to the Apache Webserver about the Subversion Repository Server. In a default installation, this file is located in C:\BTR\BTR.conf This file provides the following: 1. Establishes a portion of the URL alias 2. Identifies the location of the repository 3. Identifies the location of the access file (svn-access-file) 4. Identifies the location of the authorization file (svn-auth-file) 5. Identifies the security policy 3
5 Subversion Repository Access File The Access file, also referred to as the ACL file, defines user permissions for the repository. In a default installation, this file is located in C:\BTR\svn-access-file For more information, see the section User Permissions. Subversion Repository Authorization File This is an encrypted file in which user credentials are stored by the system. In a default installation, this file is located in: C:\BTR\svn-auth-file IMPORTANT: Do not edit, move, or delete this file. The system must have read-write access to this file. 4
6 User Administration When a user requests access to the system, there are two conditions the server must be able to resolve: Authentication Permission The system first validates the authenticity of the user through authentication of a username and password combination. For a basic Blueprint Team Repository implementation, authentication is performed by the Apache Web Server. Alternatively, you may choose to configure the Apache Web Server to utilize LDAP for user authentication. User Authentication To implement the basic authentication system, the Apache utility htpasswd is used to generate and maintain user credentials. These credentials are maintained in an encrypted file. Adding Users * The following does not apply to a LDAP implementation. 1. Launch a command prompt. 2. Navigate to the \bin directory for Apache by typing the following: cd C:\Program Files(x86)\CollabNet\Subversion Server\httpd\bin 3. Enter the following, substituting <username> appropriately. htpasswd c:\btr\svn-auth-file <username> 4. Follow the prompts to provide and confirm the password. Resetting User Passwords 1. Launch a command prompt. 2. Navigate to the \bin directory for Apache by typing the following: cd C:\Program Files(x86)\CollabNet\Subversion Server\httpd\bin 3. Enter the following, substituting <username> appropriately. htpasswd c:\btr\svn-auth-file <username> 5
7 4. Follow the prompts to provide and confirm the new password. Removing Users 1. Launch a command prompt. 2. Navigate to the \bin directory for Apache by typing the following: cd C:\Program Files(x86)\CollabNet\Subversion Server\httpd\bin 3. Enter the following, substituting <username> appropriately. htpasswd -D c:\btr\svn-auth-file <username> User Permissions Permission is controlled by the Access file, also known as the ACL file. This file is maintained by the system administrator using any common text editor. IMPORTANT: This file is still required in an LDAP implementation. In its simplest form, each section names a repository and path within it, and then the authenticated groups/usernames and the options (R for read-only, W for read-write) for those groups/usernames. If the user is not mentioned at all, no access is allowed, assuming no implementation of wildcards i.e. [/] * = rw. Permissions are inherited from parent to child directories. Thus you can specify a sub-directory with a different access policy than its parent. The value of the section names are either: [repos-name:path] or [path] By default, the section name is root [/] and no user has any access to the repository at all. Therefore, if you are starting with an empty file, you will probably want to give at least read permission to all users at the root of the repository. You can do this by editing the ACL as follows. Note: use the asterisk variable (*) to represent ALL USERS. [/] * = r admin = rw This is a very common setup. This section name [/] directive makes all repositories readable to all users. Once all users have read access to the repositories, you can give explicit rw permission to certain users on specific subdirectories within specific repositories. In Project Access Examples; Example 1; [calc:/branches/calc/bug-142] is the section name. 6
8 Additionally, the user admin has been provided write access at the root of the repository, and will therefore be responsible for creating parent folders for all projects. Do You Need Path-Based Access Control? Administrators setting up Subversion for the first time often establish path-based access control. The administrator usually knows which teams of people are working on which projects, so it is easy to grant certain teams access to certain directories and not others. There are often costs associated with this feature. Firstly, the server needs to do a lot more work to ensure that the user has the right to read or write each specific path. In certain situations, there may be a noticeable performance loss. Secondly, unwanted barriers to collaboration may be established by over-enforcing path-based access control. Teams often spontaneously collaborate with each other; someone may want to help someone else by committing to an area she doesn't normally work on. Finally, path-based control rules need to be maintained as projects develop, new users are added, and so on. The net result can be extra work. As you are working with a version control system, it is useful to remember that even if somebody accidentally commits a change to something they should not, it is easy to undo the change. Project Access Examples Example 1 Configure a subdirectory for full access by one user and read-only access for a different user. [calc:/branches/calc/bug-142] Harry = rw Sally = r The user Harry has full read and write access on the /branches/calc/bug-142 directory in the calc repository. The user Sally has only read access on the same branch. Example 2 Specify a sub-directory with different access rights. 7
9 Permissions are inherited from parent to child directory; therefore you can specify a subdirectory with a different access policy for Sally. [calc:/branches/calc/bug-142] Harry = rw Sally = r [calc:/branches/calc/bug-142/testing] Sally = rw Sally can write to the testing subdirectory of the branch, but can still only read other parts. Harry meanwhile continues to have complete read-write access to the whole branch. Example 3 Specify a sub-directory with explicit denial rights. You may also want to explicitly deny permission to someone via inheritance rules by setting the group/username variable to do nothing. [calc:/branches/calc/bug-142] Harry = rw Sally = r [calc:/branches/calc/bug-142/secret] Harry = Harry can write to the entire bug-142 tree Harry has absolutely no access to the secret subdirectory within it. Groups The access file also allows you to define whole groups of users; for example: [groups] calc-developers = harry, sally, joe 8
10 paint-developers = frank, sally, jane everyone = harry, sally, jane, joe, frank Groups can be granted access control just like users. Distinguish them with an prefix. = rw = rw jane = r Groups can also be defined to contain other groups: [groups] calc-developers = harry, sally, joe paint-developers = frank, sally, jane Single Repository Example The following depicts a model using one repository. Each group has visibility only to their own projects. They have no read access to projects outside their group. [groups] Administrators = admin, TeamA =user1, user2, user3, user4, user5, TeamB = user6, user7, user8, user9, user10 TeamC =user11, user12, user13, user14, user15, [/] 9
11 * = = rw = = = = = rw Multiple Repository Example The following depicts a model using multiple (3) repositories. Each group has visibility only to their own repository. They have no read access to projects outside their group. [groups] Administrators = admin, TeamA =user1, user2, user3, user4, user5, TeamB = user6, user7, user8, user9, user10 TeamC =user11, user12, user13, user14, user15, [/] 10
12 * = = rw = = = = = rw 11
13 Appendix A. Instructions for LDAP Installations Adapting Apache (httpd.conf) for LDAP In standard installations, the following lines are added to the end of the httpd.conf : # Blueprint Team Repository [22_16.1] Include C:/BTR/BTR.conf #Include C:/BTR/BTR-LDAP.conf If authentication for your installation will occur against an LDAP server, modify the lines above to look like the entry below: # Blueprint Team Repository [22_16.1] #Include C:/BTR/BTR.conf Include C:/BTR/BTR-LDAP.conf Note: only the # has been moved to include BTR-LDAP.conf & exclude BTR.conf Specifying LDAP Bind User In C:\BTR\BTR-LDAP.conf, specify your LDAP bind user name. The sole purpose of this account is to allow the Apache web server to bind to your LDAP server. An example of how to create an LDAP bind user follows: AuthLDAPBindDN "CN=AD SVN User,OU=People,OU=Toronto,DC=blueprint,DC=toronto" AuthLDAPBindPassword "Blueprint99" Specify your installation s authentication criteria in this line: AuthLDAPURL "ldap://bpsdcneo/dc=blueprint,dc=toronto?samaccountname?sub?(objectclass=*)" Please note: the entries stated in the lines above are examples only. They should be substituted with information pertaining to your own LDAP server. 12
14 LDAP Glossary The table below details a limited number of LDAP attributes that you should be familiar with before configuring users or modifying LDAP configuration files. We used the name Steve Smith as an example entry in our LDAP directory throughout the table. LDAP Attribute CN - Common Name givenname name samaccountname SN c company department OU DN or distinguishedname Example CN=Steve Smith. This LDAP attribute is made up from the givenname joined to SN. Firstname also called Christian name name = Steve Smith. Exactly the same as CN. samaccountname ssmith. This is a Microsoft Active Directory (AD) Attribute and may be substituted in other LDAP implementations with UID SN = Smith. This would be referred to as last name or surname. Country or Region Company or organization name Useful category to fill in and use for filtering Organizational unit. See also DN DN a key LDAP attribute. E.g. CN=Steve Smith,OU=toronto,DC=blueprint,DC=toronto 13
15 Appendix B. Starting and Stopping Apache Starting/Stopping /Restarting Apache Methods to starting and stopping Apache Web Server on Windows XP, Windows 2003 Server & Windows 7 differ slightly. The method described in this document is consistent with the three operating system versions, but you may observe minor changes depending on the operating system you re working with. 1. Click the Start button (located at the bottom left hand corner of your windows Desktop). 2. Highlight Computer or My Computer. 3. Right mouse click and select Manage 4. Under Services and Applications select Services 5. Highlight CollabNet Subversion Apache 6. Right mouse click and choose to STOP, START or RESTART the Apache service. 14
16 Appendix C. HTPASSWD Reference The command htpasswd is a utility provided by Apache for managing the list of acceptable usernames and passwords. htpasswd was referenced earlier in the document for adding and deleting users. More details are provided below on the options that can be used with this utility. Example: In this example, the user johndoe is deleted (-D) from the Subversion authorization file. htpasswd -D c:\btr\svn-auth-file johndoe Usage: htpasswd [-cmdpsd] passwordfile username htpasswd -b[cmdpsd] passwordfile username password htpasswd -n[mdps] username htpasswd -nb[mdps] username password -c Create a new file. -n Don't update file; display results on stdout. -m Force MD5 encryption of the password (default). -d Force CRYPT encryption of the password. -p Do not encrypt the password (plaintext). -s Force SHA encryption of the password. -b Use the password from the command line rather than prompting for it. -D Delete the specified user. On Windows, NetWare and TPF systems, the '-m' flag is used by default. 15
BLUEPRINT TEAM REPOSITORY. For Requirements Center & Requirements Center Test Definition
BLUEPRINT TEAM REPOSITORY Installation Guide for Windows For Requirements Center & Requirements Center Test Definition Table Of Contents Contents Table of Contents Getting Started... 3 About the Blueprint
More informationRealms and Identity Policies
The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 14 Create an Identity Rule, page 15 Manage a Realm, page 17 Manage an Identity
More informationRealms and Identity Policies
The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 15 Create an Identity Rule, page 15 Manage a Realm, page 20 Manage an Identity
More informationInstallation Guide. Infor HCM Workforce Management - Business Edition and higher
Installation Guide Infor HCM Workforce Management - Business Edition 5.0.5.0 and higher Copyright 2008 Infor. All rights reserved. The word and design marks set forth herein are trademarks and/or registered
More informationEnterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3
Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice
More informationCollabNet Desktop - Microsoft Windows Edition
CollabNet Desktop - Microsoft Windows Edition User Guide 2009 CollabNet Inc. CollabNet Desktop - Microsoft Windows Edition TOC 3 Contents Legal fine print...7 CollabNet, Inc. Trademark and Logos...7 Chapter
More informationRWT Network System Installation Guide
RWT Network System Installation Guide Copyright 2003, Talking Fingers, Inc. Page 1 of 48 This document is Copyright 2003 by Talking Fingers, Inc. All rights are reserved. This document may not be copied
More informationIntroduction to Security in Laserfiche 8.3 and later. White Paper
Introduction to Security in Laserfiche 8.3 and later White Paper November 2013 Table of Contents Authentication and Authorization... 4 Authentication... 4 Windows Accounts and LDAP... 5 Laserfiche Trustees...
More informationImplementing Single-Sign-On(SSO) for APM UI
Implementing Single-Sign-On(SSO) for APM UI 1.Introduction...2 2.Overview of SSO with LTPA...3 3.Installing and configuring TDS...5 3.1.Installing TDS 6.3...5 3.2.Changing the administrator password (Optional)...7
More informationWORKING IN TEAMS WITH CASECOMPLETE AND SUBVERSION. Contents
WORKING IN TEAMS WITH CASECOMPLETE AND SUBVERSION Contents Working in Teams with CaseComplete... 3 Need an introduction to how version control works?... 3 Exclusive Checkout... 4 Multiple Checkout... 4
More informationDeploy Cisco Directory Connector
Cisco Directory Connector Deployment Task Flow, page 1 Install Cisco Directory Connector, page 3 Sign In To Cisco Directory Connector, page 4 Configure General Settings for Directory Connector, page 7
More informationHow to Configure Authentication and Access Control (AAA)
How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual
More informationRealms and Identity Policies
The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page
More informationInstalling Vovici EFM Community Version 2.20 on Windows 2003 Server. September For support, contact Vovici Technical Support.
Installing Vovici EFM Community Version 2.20 on Windows 2003 Server September 2007 For support, contact Vovici Technical Support. Please contact Vovici Technical Support if you believe any of the information
More informationInstalling Vovici EFM Community Version 2.20 on Windows 2003 Server. September For support, contact Vovici Technical Support.
Installing Vovici EFM Community Version 2.20 on Windows 2003 Server September 2007 For support, contact Vovici Technical Support. Please contact Vovici Technical Support if you believe any of the information
More informationCLI users are not listed on the Cisco Prime Collaboration User Management page.
Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator
More informationSource Control: Subversion
USER GUIDE MADCAP LINGO 10.1 Source Control: Subversion Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in
More informationCisco Expressway Authenticating Accounts Using LDAP
Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4
More informationTIBCO Slingshot User Guide. Software Release August 2015
TIBCO Slingshot User Guide Software Release 1.9.4 August 2015 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY
More informationmaxecurity Product Suite
maxecurity Product Suite Domain Administrator s Manual Firmware v2.2 ii Table of Contents BASICS... 1 Understanding how maxecurity products work in your company... 1 Getting started as a Domain Administrator...
More informationms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/grpolwt.htm
Page 1 of 17 Windows 2000 Server Step-by-Step Guide to Understanding the Group Policy Feature Set Operating System Abstract Group Policy is the central component of the Change and Configuration Management
More informationeb ProjectWise Connection Services
eb ProjectWise Connection Services INSTALLATION & ADMIN GUIDE D003483 rev 2.0 TRADEMARK NOTICE Bentley and the "B" Bentley logo are registered or non-registered trademarks of Bentley Systems, Inc. or Bentley
More informationNovell OpenLDAP Configuration
Novell OpenLDAP Configuration To access the GoPrint Novell e-directory LDAP Connector configuration screen navigate to: Accounts Authentication Connectors GoPrint provides two connector options, Standard
More informationCisco TelePresence Authenticating Cisco VCS Accounts Using LDAP
Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.2 D14465.07 June 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration
More informationVMware Identity Manager Administration
VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationSet Up Rules Palette
Oracle Insurance Policy Administration Set Up Rules Palette Installation Instructions Step 3 Version 9.5.0.0 Documentation Part Number: E23638_01 June 2012 Copyright 2009, 2012 Oracle and/or its affiliates.
More informationCounterACT User Directory Plugin
Version 6.1.2 and Above Table of Contents About the User Directory Plugin... 3 Endpoint User Details... 3 Verify Endpoint Authentication... 3 User Directory Inventory... 4 HTTP Login Action... 5 HTTP Sign
More informationMobiControl v13: Package Rules to Profiles Migration Guide. January 2016
MobiControl v13: Package Rules to Profiles Migration Guide January 2016 Copyright 2016 SOTI Inc. All rights reserved. This documentation and the software described in this document are furnished under
More informationUSER GUIDE. MADCAP FLARE 2017 r3. Source Control: Git
USER GUIDE MADCAP FLARE 2017 r3 Source Control: Git Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this
More informationHost Access Management and Security Server Administrative Console Users Guide. August 2016
Host Access Management and Security Server Administrative Console Users Guide August 2016 2016 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials
More informationNovell Identity Manager
Role Mapping Administrator User Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 1.0 August 28, 2009 www.novell.com Novell Identity Manager Role Mapping Administrator 1.0 User GuideNovell Identity
More informationUSER GUIDE MADCAP LINGO Source Control: Git
USER GUIDE MADCAP LINGO 10.1 Source Control: Git Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document
More informationHYCU SCOM Management Pack for F5 BIG-IP
USER GUIDE HYCU SCOM Management Pack for F5 BIG-IP Product version: 5.5 Product release date: August 2018 Document edition: First Legal notices Copyright notice 2015-2018 HYCU. All rights reserved. This
More informationQuest Enterprise Reporter 2.0 Report Manager USER GUIDE
Quest Enterprise Reporter 2.0 Report Manager USER GUIDE 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this
More informationEgress Administration Panel
1 COMMERCIAL IN CONFIDENCE Egress Administration Panel User Guide Copyright 2018 Egress Software Technologies Ltd. All rights reserved. 2 COMMERCIAL IN CONFIDENCE Confidentiality statement This document
More informationPassword Reset Utility. Configuration
Password Reset Utility Configuration 1 Table of Contents 1. Uninstalling Legacy Password Reset... 2 2. Password Reset Utility: How to deploy and configure via Group Policy... 2 3. Configuring Group Policy
More informationSource Control: Perforce
USER GUIDE MADCAP LINGO 10.1 Source Control: Perforce Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this
More informationFunction. Description
Function Check In Get / Checkout Description Checking in a file uploads the file from the user s hard drive into the vault and creates a new file version with any changes to the file that have been saved.
More informationTable of Contents. About this Guide..3. This workis licensed under a Creative Commons Attribution 2.5 License. Getting Help..4. Welcome to Pinnacle..
Installation Guide Table of Contents About this Guide..3 This workis licensed under a Creative Commons Attribution 2.5 License. Getting Help..4 Welcome to Pinnacle..4 Introduction..4 Organizational Hierarchy..4
More informationDISCLAIMER COPYRIGHT List of Trademarks
DISCLAIMER This documentation is provided for reference purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this documentation, this documentation
More informationAdministration Guide
Administration Guide Version 2.0 November, 2015 Biscom, Inc. 321 Billerica Rd. Chelmsford, MA 01824 tel 978-250-1800 fax 978-250-4449 CONTENTS 1. Initial Configuration and Settings...1 1.1 Application...
More informationGlobalbrain Administration Guide. Version 5.4
Globalbrain Administration Guide Version 5.4 Copyright 2012 by Brainware, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,
More informationAuthenticating Cisco VCS accounts using LDAP
Authenticating Cisco VCS accounts using LDAP Cisco TelePresence Deployment Guide Cisco VCS X6 D14526.04 February 2011 Contents Contents Document revision history... 3 Introduction... 4 Usage... 4 Cisco
More informationSource control with Subversion A user perspective
http://svnbook.red-bean.com/ Source control with Subversion A user perspective Aaron Ponti What is Subversion? } It is a free and open-source version control system } It manages files and directories,
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationRSA Authentication Manager 7.1 Help Desk Administrator s Guide
RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
More informationMicrosoft IIS version 6 Integration
Microsoft IIS version 6 Integration Contents 1 Overview 2 Prerequisites 3 PINsafe Configuration 4 Configuring the IIS Server 4.1 Install the PINsafeIISFilter.exe 4.2 Configure the ISAPI filter 4.3 Create
More informationDirectory Integration
Directory Parameters, page 1 Attribute Mapping Parameters, page 4 CDI Parameters, page 6 UDS Parameters, page 18 Directory Server Configuration Examples, page 20 Directory Parameters The following table
More informationEgress Switch Administration Panel
1 COMMERCIAL IN CONFIDENCE Egress Switch Administration Panel User Guide Copyright 2017 Egress Software Technologies Ltd. All rights reserved. 2 COMMERCIAL IN CONFIDENCE Confidentiality Statement This
More informationWorkshare Desktop App. User Guide
Workshare Desktop App User Guide February 2018 Workshare Desktop App User Guide Table of Contents Introducing the Workshare Desktop App...4 What is the Desktop App?... 5 Key features of the Workshare desktop
More informationMedia Archive Server for Small Teams
Media Archive Server for Small Teams Installation Guide Daminion Server 0.9.X beta This 5-minute guide will help you set up and configure your Daminion Server Software correctly. Please take the time to
More informationAuthentication via Active Directory and LDAP
Authentication via Active Directory and LDAP Overview The LDAP and Active Directory authenticators available in Datameer provide remote authentication services for Datameer users. Administrators can configure
More informationZL UA Domino Configuration Guide. Version 7.0
ZL UA Domino Email Configuration Guide Version 7.0 ZL Technologies, Inc. Copyright 2010 ZL Technologies, Inc.All rights reserved ZL Technologies, Inc. ( ZLTI, formerly known as ZipLip ) and its licensors
More informationSK hynix Drive Manager Easy Kit. Installation Guide
SK hynix Drive Manager Easy Kit Installation Guide Legal Notice This document is provided for informational purposes only, and does not constitute a binding legal document. Information in this document
More informationAn LDAP server may implement its own schema or a standard schema defined as in RFC Mainstream implementations of LDAP include Netscape
Spectrum Software, Inc. 11445 Johns Creek Pkwy. Suite 300 Duluth, GA 30097 www.spectrumscm.com Subject: LDAP Support for SpectrumSCM Original Issue Date: April 26 th, 2003 Update Date: December 13 th,
More informationF5 BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.2
F5 BIG-IQ Centralized Management: Licensing and Initial Setup Version 5.2 Table of Contents Table of Contents BIG-IQ System Introduction...5 About BIG-IQ Centralized Management... 5 How do I navigate
More informationINTEGRATING WITH LDAP DIRECTORIES
INTEGRATING WITH LDAP DIRECTORIES 1 BACKGROUND This document outlines the steps involved in integrating Unity Desktop with an LDAP-compliant directory (including Microsoft Active Directory) for click-to-dial
More informationIdentity, Authentication, and Access Control
Identity, Authentication, and Access Control License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.
More informationVersion Control. Kyungbaek Kim. Chonnam National University School of Electronics and Computer Engineering. Original slides from James Brucker
Version Control Chonnam National University School of Electronics and Computer Engineering Kyungbaek Kim Original slides from James Brucker What is version control Manage documents over time Keep a history
More informationConfiguring Microsoft ADAM
Proven Practice Configuring Microsoft ADAM Product(s): IBM Cognos Series 7 Area of Interest: Security Configuring Microsoft ADAM 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated). Cognos
More informationWA2031 WebSphere Application Server 8.0 Administration on Windows. Student Labs. Web Age Solutions Inc. Copyright 2012 Web Age Solutions Inc.
WA2031 WebSphere Application Server 8.0 Administration on Windows Student Labs Web Age Solutions Inc. Copyright 2012 Web Age Solutions Inc. 1 Table of Contents Directory Paths Used in Labs...3 Lab Notes...4
More informationHPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide
HPE Security Fortify WebInspect Enterprise Software Version: 17.10 Windows operating systems Installation and Implementation Guide Document Release Date: May 2017 Software Release Date: April 2017 Legal
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep
More informationInstalling SurveySolutions/EFM 2.10 on Windows 2003 Server
Installing SurveySolutions/EFM 2.10 on Windows 2003 Server November 2006 Perseus Development Corporation 50 Braintree Hill Office Park, Suite 308 Braintree, MA 02184 Tel (781) 848-8100 Fax (781) 848-1978
More informationx10data Application Platform v7.1 Installation Guide
Copyright Copyright 2010 Automated Data Capture (ADC) Technologies, Incorporated. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the
More informationUser Guide. BlackBerry Workspaces for Windows. Version 5.5
User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing
More informationWORKING IN TEAMS WITH CASECOMPLETE AND THE CASECOMPLETE PROJECT SHARING ADDIN. Contents
WORKING IN TEAMS WITH CASECOMPLETE AND THE CASECOMPLETE PROJECT SHARING ADDIN Contents Working in Teams with CaseComplete... 2 Need an introduction to how version control works?... 2 Exclusive Checkout...
More informationUsing Kerberos Authentication in a Reverse Proxy Environment
Using Kerberos Authentication in a Reverse Proxy Environment Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat
More informationManaging Users and Configuring Role-Based Access Control
Managing s and Configuring Role-Based Access Control This section describes how to manage users in Prime Central, including defining users and passwords and configuring role-based access control (RBAC).
More informationTDDC88 Lab 4 Software Configuration Management
TDDC88 Lab 4 Software Configuration Management Introduction "Version control is to programmers what the safety net is to a trapeze artist. Knowing the net is there to catch them if they fall, aerialists
More informationYou can access data using the FTP/SFTP protocol. This document will guide you in the procedures for configuring FTP/SFTP access.
You can access data using the FTP/SFTP protocol. This document will guide you in the procedures for configuring FTP/SFTP access. Overview of Configuring FTP/SFTP Access In order to access data using the
More informationUser Management Tool
Citrix Product Documentation docs.citrix.com September 21, 2018 Contents What s new 3 What s new in User Management Tool 1.8.1........................... 3 What s new in User Management Tool 1.8............................
More informationOracle Advanced Security: Enterprise User Management. An Oracle Technical White Paper November 1999
Advanced Security: Enterprise User Management An Technical White Paper Advanced Security: Enterprise User Management THE CHALLENGES OF USER MANAGEMENT Some of the challenges faced by an enterprise today
More informationChangeAuditor 5.6. For NetApp User Guide
ChangeAuditor 5.6 For NetApp User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationOne Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide
One Identity Active Roles 7.2 Azure AD and Office 365 Management Administrator Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.
More informationContents. Introducing TARMAC Customizing your user experience... 19
TARMAC Version 1.2 Contents Overview... 3 Introducing TARMAC... 4 Installation and Licensing... 5 Installing TARMAC on Mac OS X Client 5 Installing TARMAC on Mac OS X Server 5 Accessing TARMAC for the
More informationCoveo Platform 7.0. Oracle UCM Connector Guide
Coveo Platform 7.0 Oracle UCM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing market
More informationSymantec Ghost Solution Suite Web Console - Getting Started Guide
Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.
More informationPeoplePassword Documentation v6.0
PeoplePassword Documentation v6.0 Instructions to Configure and Use PeoplePassword v6.0, LLC Contents Overview... 3 Getting Started... 3 Components of PeoplePassword... 3 Core Components... 3 Optional
More informationWindows Server 2008 Active Directory Resource Kit
Windows Server 2008 Active Directory Resource Kit Stan Reimer, Mike Mulcare, Conan Kezema, Byron Wright w MS AD Team PREVIEW CONTENT This excerpt contains uncorrected manuscript from an upcoming Microsoft
More informationIBM Security Identity Manager Version Planning Topics IBM
IBM Security Identity Manager Version 7.0.1 Planning Topics IBM IBM Security Identity Manager Version 7.0.1 Planning Topics IBM ii IBM Security Identity Manager Version 7.0.1: Planning Topics Table of
More informationEnforced Client Policy & Reporting Server (EPRS) 2.3. Administration Guide
Enforced Client Policy & Reporting Server (EPRS) 2.3 Copyright 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell, the
More informationSharePoint 2010 Tutorial
SharePoint 2010 Tutorial TABLE OF CONTENTS Introduction... 1 Basic Navigation... 2 Navigation Buttons & Bars... 3 Ribbon... 4 Library Ribbon... 6 Recycle Bin... 7 Permission Levels & Groups... 8 Create
More informationXton Access Manager GETTING STARTED GUIDE
Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3
More informationInstall WordPress 3.X In Multi Blog / Multi user mode On localhost
Install WordPress 3.X In Multi Blog / Multi user mode On localhost In this tutorial, we will cover how to setup WordPress as a Multi User /Multi Blog. We ll start by downloading and installing a new version
More informationClearspan Communicator Desktop R20.2.2
Clearspan Communicator Desktop R20.2.2 UPGRADE INSTRUCTIONS APRIL 2015 Table of Contents Overview... 3 Upgrading (Windows 7 or above, Mac OS 10.6 or above)... 3 Recording Your Settings (Windows and Mac
More informationGetting Started with Tally.Developer 9
Getting Started with Tally.Developer 9 The information contained in this document is current as of the date of publication and subject to change. Because Tally must respond to changing market conditions,
More informationTWO-FACTOR AUTHENTICATION Version 1.1.0
TWO-FACTOR AUTHENTICATION Version 1.1.0 User Guide for Magento 1.9 Table of Contents 1..................... The MIT License 2.................... About JetRails 2FA 4................. Installing JetRails
More informationMigrating vrealize Automation 6.2 to 7.2
Migrating vrealize Automation 6.2 to 7.2 vrealize Automation 7.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationVersion Control System. -- base on Subversion 1.4
More Functionalities of a -- base on Subversion 1.4 Sui Huang A tutorial for Software Engineering Course SE2AA4 Instructor: Dr. William M. Farmer TAs: Clare So, Sui Huang, Jeffrey Heifetz Jan 10 th, 2006
More informationFTP Service Reference
IceWarp Unified Communications Reference Version 11.4 Published on 2/9/2016 Contents... 3 About... 4 Reference... 5 General Tab... 5 Dialog... 6 FTP Site... 6 Users... 7 Groups... 11 Options... 14 Access...
More informationActive Directory Change Notifier Quick Start Guide
Active Directory Change Notifier Quick Start Guide Software version 3.0 General Information: info@cionsystems.com Online Support: support@cionsystems.com Copyright 2017 CionSystems Inc., All Rights Reserved
More informationDirectory Integration with VMware Identity Manager
Directory Integration with VMware Identity Manager VMware AirWatch 9.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a
More informationNovell Nsure SecureLogin
Novell Nsure SecureLogin TM 3.51.1 September 7, 2004 INSTALLATION GUIDE www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,
More informationAdministration Guide. Lavastorm Analytics Engine 6.1.1
Administration Guide Lavastorm Analytics Engine 6.1.1 Lavastorm Analytics Engine 6.1.1: Administration Guide Legal notice Copyright THE CONTENTS OF THIS DOCUMENT ARE THE COPYRIGHT OF LIMITED. ALL RIGHTS
More informationIDOL. Software Version Document Security Administration Guide
IDOL Software Version 12.0 Document Security Administration Guide Document Release Date: June 2018 Software Release Date: June 2018 Legal notices Copyright notice Copyright 2018 Micro Focus or one of its
More informationSingle Sign On (SSO) with Polarion 17.3
SIEMENS Single Sign On (SSO) with Polarion 17.3 POL007 17.3 Contents Configuring single sign-on (SSO)......................................... 1-1 Overview...........................................................
More informationClient Portal Client User Manual
Client Portal Client User Manual Version 2.0 Contents Client Portal User Manual... 3 Groups and User Levels... 3 Inviting Users... 5 Terms of Use... 9 Removing Users... 12 Password Reset... 14 List Items
More informationCA ERwin Data Modeler
CA ERwin Data Modeler Implementation Guide Service Pack 9.5.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to only and is subject
More informationVII. Corente Services SSL Client
VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...
More information