BLUEPRINT REQUIREMENTS CENTER 2010 BLUEPRINT TEAM REPOSITORY VERSION 2. Administrator s Guide

Size: px
Start display at page:

Download "BLUEPRINT REQUIREMENTS CENTER 2010 BLUEPRINT TEAM REPOSITORY VERSION 2. Administrator s Guide"

Transcription

1 BLUEPRINT REQUIREMENTS CENTER 2010 BLUEPRINT TEAM REPOSITORY VERSION 2 September 2010

2 Contents Introduction... 2 Repository Configuration Files... 3 User Administration... 5 Appendix A. Instructions for LDAP Installations Appendix B. Starting and Stopping Apache Appendix C. HTPASSWD Reference Copyright 2010 Blueprint Software Systems Inc. This document contains confidential and proprietary information of Blueprint Software Systems, Inc. and is intended only for the person(s) to whom it is transmitted by Blueprint Software Systems Inc. Any reproduction or retransmission of this document or the information contained herein, in whole or in part, without the prior written consent of Blueprint Software Systems, Inc. is expressly prohibited. Blueprint Software Systems, Inc. reserves all right, title and interest in this document and the information contained herein. Unless otherwise set out in a written agreement between Blueprint Software Systems, Inc., and a recipient of this document, Blueprint Software Systems Inc. makes no representations or warranties with respect to the completeness or accuracy of the information contained herein and shall not under any circumstances, be held liable for any damages howsoever caused by reliance thereon. Blueprint Software Systems, Inc. 372 Bay Street, Suite 1600 Toronto, Ontario M5H 2W9 1

3 Introduction This document provides instructions for configuring users and permissions for the Blueprint Team Repository. For detailed additional information on installing the Blueprint Team Repository, please refer to the following document, available from the Blueprint Products download page: Blueprint Team Repository Version 2 Installation and Configuration Guide Before You Begin Updates to Blueprint Team Repository software and documentation are made available periodically. Please check the Blueprint Product downloads page for updates, and select the appropriate files. Directories & File Names: This document uses the directory locations and file names pre-selected by the application. If you select different locations or file names, remember to substitute your own choices when following the instructions. 2

4 Repository Configuration Files In order to configure or troubleshoot your repository, there are several files you will need to access, as follows: Apache Web Server Configuration File: httpd.conf Subversion Repository Configuration File: BTR.conf Subversion Repository Access File: svn-access-file Subversion Repository Authorization File: svn-auth-file Apache Web Server Configuration File The httpd.conf file is the main configuration file for the Apache Web Server. It provides the web server with information about your Subversion installation and repository installation, for user authentication and other web services. In a default installation, this file is located in the following directory for your operating system: Windows 7: C:\Program Files (x86)\collabnet\subversion Server\httpd\conf Windows XP: C:\Program Files\CollabNet\Subversion Server\httpd\conf Windows 2003 Server: C:\Program Files\CollabNet\Subversion Server\httpd\conf Subversion Repository Configuration File This configuration file, also referred to as the LOCATION BLOCK, provides information to the Apache Webserver about the Subversion Repository Server. In a default installation, this file is located in C:\BTR\BTR.conf This file provides the following: 1. Establishes a portion of the URL alias 2. Identifies the location of the repository 3. Identifies the location of the access file (svn-access-file) 4. Identifies the location of the authorization file (svn-auth-file) 5. Identifies the security policy 3

5 Subversion Repository Access File The Access file, also referred to as the ACL file, defines user permissions for the repository. In a default installation, this file is located in C:\BTR\svn-access-file For more information, see the section User Permissions. Subversion Repository Authorization File This is an encrypted file in which user credentials are stored by the system. In a default installation, this file is located in: C:\BTR\svn-auth-file IMPORTANT: Do not edit, move, or delete this file. The system must have read-write access to this file. 4

6 User Administration When a user requests access to the system, there are two conditions the server must be able to resolve: Authentication Permission The system first validates the authenticity of the user through authentication of a username and password combination. For a basic Blueprint Team Repository implementation, authentication is performed by the Apache Web Server. Alternatively, you may choose to configure the Apache Web Server to utilize LDAP for user authentication. User Authentication To implement the basic authentication system, the Apache utility htpasswd is used to generate and maintain user credentials. These credentials are maintained in an encrypted file. Adding Users * The following does not apply to a LDAP implementation. 1. Launch a command prompt. 2. Navigate to the \bin directory for Apache by typing the following: cd C:\Program Files(x86)\CollabNet\Subversion Server\httpd\bin 3. Enter the following, substituting <username> appropriately. htpasswd c:\btr\svn-auth-file <username> 4. Follow the prompts to provide and confirm the password. Resetting User Passwords 1. Launch a command prompt. 2. Navigate to the \bin directory for Apache by typing the following: cd C:\Program Files(x86)\CollabNet\Subversion Server\httpd\bin 3. Enter the following, substituting <username> appropriately. htpasswd c:\btr\svn-auth-file <username> 5

7 4. Follow the prompts to provide and confirm the new password. Removing Users 1. Launch a command prompt. 2. Navigate to the \bin directory for Apache by typing the following: cd C:\Program Files(x86)\CollabNet\Subversion Server\httpd\bin 3. Enter the following, substituting <username> appropriately. htpasswd -D c:\btr\svn-auth-file <username> User Permissions Permission is controlled by the Access file, also known as the ACL file. This file is maintained by the system administrator using any common text editor. IMPORTANT: This file is still required in an LDAP implementation. In its simplest form, each section names a repository and path within it, and then the authenticated groups/usernames and the options (R for read-only, W for read-write) for those groups/usernames. If the user is not mentioned at all, no access is allowed, assuming no implementation of wildcards i.e. [/] * = rw. Permissions are inherited from parent to child directories. Thus you can specify a sub-directory with a different access policy than its parent. The value of the section names are either: [repos-name:path] or [path] By default, the section name is root [/] and no user has any access to the repository at all. Therefore, if you are starting with an empty file, you will probably want to give at least read permission to all users at the root of the repository. You can do this by editing the ACL as follows. Note: use the asterisk variable (*) to represent ALL USERS. [/] * = r admin = rw This is a very common setup. This section name [/] directive makes all repositories readable to all users. Once all users have read access to the repositories, you can give explicit rw permission to certain users on specific subdirectories within specific repositories. In Project Access Examples; Example 1; [calc:/branches/calc/bug-142] is the section name. 6

8 Additionally, the user admin has been provided write access at the root of the repository, and will therefore be responsible for creating parent folders for all projects. Do You Need Path-Based Access Control? Administrators setting up Subversion for the first time often establish path-based access control. The administrator usually knows which teams of people are working on which projects, so it is easy to grant certain teams access to certain directories and not others. There are often costs associated with this feature. Firstly, the server needs to do a lot more work to ensure that the user has the right to read or write each specific path. In certain situations, there may be a noticeable performance loss. Secondly, unwanted barriers to collaboration may be established by over-enforcing path-based access control. Teams often spontaneously collaborate with each other; someone may want to help someone else by committing to an area she doesn't normally work on. Finally, path-based control rules need to be maintained as projects develop, new users are added, and so on. The net result can be extra work. As you are working with a version control system, it is useful to remember that even if somebody accidentally commits a change to something they should not, it is easy to undo the change. Project Access Examples Example 1 Configure a subdirectory for full access by one user and read-only access for a different user. [calc:/branches/calc/bug-142] Harry = rw Sally = r The user Harry has full read and write access on the /branches/calc/bug-142 directory in the calc repository. The user Sally has only read access on the same branch. Example 2 Specify a sub-directory with different access rights. 7

9 Permissions are inherited from parent to child directory; therefore you can specify a subdirectory with a different access policy for Sally. [calc:/branches/calc/bug-142] Harry = rw Sally = r [calc:/branches/calc/bug-142/testing] Sally = rw Sally can write to the testing subdirectory of the branch, but can still only read other parts. Harry meanwhile continues to have complete read-write access to the whole branch. Example 3 Specify a sub-directory with explicit denial rights. You may also want to explicitly deny permission to someone via inheritance rules by setting the group/username variable to do nothing. [calc:/branches/calc/bug-142] Harry = rw Sally = r [calc:/branches/calc/bug-142/secret] Harry = Harry can write to the entire bug-142 tree Harry has absolutely no access to the secret subdirectory within it. Groups The access file also allows you to define whole groups of users; for example: [groups] calc-developers = harry, sally, joe 8

10 paint-developers = frank, sally, jane everyone = harry, sally, jane, joe, frank Groups can be granted access control just like users. Distinguish them with an prefix. = rw = rw jane = r Groups can also be defined to contain other groups: [groups] calc-developers = harry, sally, joe paint-developers = frank, sally, jane Single Repository Example The following depicts a model using one repository. Each group has visibility only to their own projects. They have no read access to projects outside their group. [groups] Administrators = admin, TeamA =user1, user2, user3, user4, user5, TeamB = user6, user7, user8, user9, user10 TeamC =user11, user12, user13, user14, user15, [/] 9

11 * = = rw = = = = = rw Multiple Repository Example The following depicts a model using multiple (3) repositories. Each group has visibility only to their own repository. They have no read access to projects outside their group. [groups] Administrators = admin, TeamA =user1, user2, user3, user4, user5, TeamB = user6, user7, user8, user9, user10 TeamC =user11, user12, user13, user14, user15, [/] 10

12 * = = rw = = = = = rw 11

13 Appendix A. Instructions for LDAP Installations Adapting Apache (httpd.conf) for LDAP In standard installations, the following lines are added to the end of the httpd.conf : # Blueprint Team Repository [22_16.1] Include C:/BTR/BTR.conf #Include C:/BTR/BTR-LDAP.conf If authentication for your installation will occur against an LDAP server, modify the lines above to look like the entry below: # Blueprint Team Repository [22_16.1] #Include C:/BTR/BTR.conf Include C:/BTR/BTR-LDAP.conf Note: only the # has been moved to include BTR-LDAP.conf & exclude BTR.conf Specifying LDAP Bind User In C:\BTR\BTR-LDAP.conf, specify your LDAP bind user name. The sole purpose of this account is to allow the Apache web server to bind to your LDAP server. An example of how to create an LDAP bind user follows: AuthLDAPBindDN "CN=AD SVN User,OU=People,OU=Toronto,DC=blueprint,DC=toronto" AuthLDAPBindPassword "Blueprint99" Specify your installation s authentication criteria in this line: AuthLDAPURL "ldap://bpsdcneo/dc=blueprint,dc=toronto?samaccountname?sub?(objectclass=*)" Please note: the entries stated in the lines above are examples only. They should be substituted with information pertaining to your own LDAP server. 12

14 LDAP Glossary The table below details a limited number of LDAP attributes that you should be familiar with before configuring users or modifying LDAP configuration files. We used the name Steve Smith as an example entry in our LDAP directory throughout the table. LDAP Attribute CN - Common Name givenname name samaccountname SN c company department OU DN or distinguishedname Example CN=Steve Smith. This LDAP attribute is made up from the givenname joined to SN. Firstname also called Christian name name = Steve Smith. Exactly the same as CN. samaccountname ssmith. This is a Microsoft Active Directory (AD) Attribute and may be substituted in other LDAP implementations with UID SN = Smith. This would be referred to as last name or surname. Country or Region Company or organization name Useful category to fill in and use for filtering Organizational unit. See also DN DN a key LDAP attribute. E.g. CN=Steve Smith,OU=toronto,DC=blueprint,DC=toronto 13

15 Appendix B. Starting and Stopping Apache Starting/Stopping /Restarting Apache Methods to starting and stopping Apache Web Server on Windows XP, Windows 2003 Server & Windows 7 differ slightly. The method described in this document is consistent with the three operating system versions, but you may observe minor changes depending on the operating system you re working with. 1. Click the Start button (located at the bottom left hand corner of your windows Desktop). 2. Highlight Computer or My Computer. 3. Right mouse click and select Manage 4. Under Services and Applications select Services 5. Highlight CollabNet Subversion Apache 6. Right mouse click and choose to STOP, START or RESTART the Apache service. 14

16 Appendix C. HTPASSWD Reference The command htpasswd is a utility provided by Apache for managing the list of acceptable usernames and passwords. htpasswd was referenced earlier in the document for adding and deleting users. More details are provided below on the options that can be used with this utility. Example: In this example, the user johndoe is deleted (-D) from the Subversion authorization file. htpasswd -D c:\btr\svn-auth-file johndoe Usage: htpasswd [-cmdpsd] passwordfile username htpasswd -b[cmdpsd] passwordfile username password htpasswd -n[mdps] username htpasswd -nb[mdps] username password -c Create a new file. -n Don't update file; display results on stdout. -m Force MD5 encryption of the password (default). -d Force CRYPT encryption of the password. -p Do not encrypt the password (plaintext). -s Force SHA encryption of the password. -b Use the password from the command line rather than prompting for it. -D Delete the specified user. On Windows, NetWare and TPF systems, the '-m' flag is used by default. 15

BLUEPRINT TEAM REPOSITORY. For Requirements Center & Requirements Center Test Definition

BLUEPRINT TEAM REPOSITORY. For Requirements Center & Requirements Center Test Definition BLUEPRINT TEAM REPOSITORY Installation Guide for Windows For Requirements Center & Requirements Center Test Definition Table Of Contents Contents Table of Contents Getting Started... 3 About the Blueprint

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 14 Create an Identity Rule, page 15 Manage a Realm, page 17 Manage an Identity

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 15 Create an Identity Rule, page 15 Manage a Realm, page 20 Manage an Identity

More information

Installation Guide. Infor HCM Workforce Management - Business Edition and higher

Installation Guide. Infor HCM Workforce Management - Business Edition and higher Installation Guide Infor HCM Workforce Management - Business Edition 5.0.5.0 and higher Copyright 2008 Infor. All rights reserved. The word and design marks set forth herein are trademarks and/or registered

More information

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3

Enterprise Vault.cloud CloudLink Google Account Synchronization Guide. CloudLink to 4.0.3 Enterprise Vault.cloud CloudLink Google Account Synchronization Guide CloudLink 4.0.1 to 4.0.3 Enterprise Vault.cloud: CloudLink Google Account Synchronization Guide Last updated: 2018-06-08. Legal Notice

More information

CollabNet Desktop - Microsoft Windows Edition

CollabNet Desktop - Microsoft Windows Edition CollabNet Desktop - Microsoft Windows Edition User Guide 2009 CollabNet Inc. CollabNet Desktop - Microsoft Windows Edition TOC 3 Contents Legal fine print...7 CollabNet, Inc. Trademark and Logos...7 Chapter

More information

RWT Network System Installation Guide

RWT Network System Installation Guide RWT Network System Installation Guide Copyright 2003, Talking Fingers, Inc. Page 1 of 48 This document is Copyright 2003 by Talking Fingers, Inc. All rights are reserved. This document may not be copied

More information

Introduction to Security in Laserfiche 8.3 and later. White Paper

Introduction to Security in Laserfiche 8.3 and later. White Paper Introduction to Security in Laserfiche 8.3 and later White Paper November 2013 Table of Contents Authentication and Authorization... 4 Authentication... 4 Windows Accounts and LDAP... 5 Laserfiche Trustees...

More information

Implementing Single-Sign-On(SSO) for APM UI

Implementing Single-Sign-On(SSO) for APM UI Implementing Single-Sign-On(SSO) for APM UI 1.Introduction...2 2.Overview of SSO with LTPA...3 3.Installing and configuring TDS...5 3.1.Installing TDS 6.3...5 3.2.Changing the administrator password (Optional)...7

More information

WORKING IN TEAMS WITH CASECOMPLETE AND SUBVERSION. Contents

WORKING IN TEAMS WITH CASECOMPLETE AND SUBVERSION. Contents WORKING IN TEAMS WITH CASECOMPLETE AND SUBVERSION Contents Working in Teams with CaseComplete... 3 Need an introduction to how version control works?... 3 Exclusive Checkout... 4 Multiple Checkout... 4

More information

Deploy Cisco Directory Connector

Deploy Cisco Directory Connector Cisco Directory Connector Deployment Task Flow, page 1 Install Cisco Directory Connector, page 3 Sign In To Cisco Directory Connector, page 4 Configure General Settings for Directory Connector, page 7

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

Installing Vovici EFM Community Version 2.20 on Windows 2003 Server. September For support, contact Vovici Technical Support.

Installing Vovici EFM Community Version 2.20 on Windows 2003 Server. September For support, contact Vovici Technical Support. Installing Vovici EFM Community Version 2.20 on Windows 2003 Server September 2007 For support, contact Vovici Technical Support. Please contact Vovici Technical Support if you believe any of the information

More information

Installing Vovici EFM Community Version 2.20 on Windows 2003 Server. September For support, contact Vovici Technical Support.

Installing Vovici EFM Community Version 2.20 on Windows 2003 Server. September For support, contact Vovici Technical Support. Installing Vovici EFM Community Version 2.20 on Windows 2003 Server September 2007 For support, contact Vovici Technical Support. Please contact Vovici Technical Support if you believe any of the information

More information

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page. Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator

More information

Source Control: Subversion

Source Control: Subversion USER GUIDE MADCAP LINGO 10.1 Source Control: Subversion Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in

More information

Cisco Expressway Authenticating Accounts Using LDAP

Cisco Expressway Authenticating Accounts Using LDAP Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4

More information

TIBCO Slingshot User Guide. Software Release August 2015

TIBCO Slingshot User Guide. Software Release August 2015 TIBCO Slingshot User Guide Software Release 1.9.4 August 2015 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY

More information

maxecurity Product Suite

maxecurity Product Suite maxecurity Product Suite Domain Administrator s Manual Firmware v2.2 ii Table of Contents BASICS... 1 Understanding how maxecurity products work in your company... 1 Getting started as a Domain Administrator...

More information

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/grpolwt.htm

ms-help://ms.technet.2004apr.1033/win2ksrv/tnoffline/prodtechnol/win2ksrv/howto/grpolwt.htm Page 1 of 17 Windows 2000 Server Step-by-Step Guide to Understanding the Group Policy Feature Set Operating System Abstract Group Policy is the central component of the Change and Configuration Management

More information

eb ProjectWise Connection Services

eb ProjectWise Connection Services eb ProjectWise Connection Services INSTALLATION & ADMIN GUIDE D003483 rev 2.0 TRADEMARK NOTICE Bentley and the "B" Bentley logo are registered or non-registered trademarks of Bentley Systems, Inc. or Bentley

More information

Novell OpenLDAP Configuration

Novell OpenLDAP Configuration Novell OpenLDAP Configuration To access the GoPrint Novell e-directory LDAP Connector configuration screen navigate to: Accounts Authentication Connectors GoPrint provides two connector options, Standard

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.2 D14465.07 June 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Set Up Rules Palette

Set Up Rules Palette Oracle Insurance Policy Administration Set Up Rules Palette Installation Instructions Step 3 Version 9.5.0.0 Documentation Part Number: E23638_01 June 2012 Copyright 2009, 2012 Oracle and/or its affiliates.

More information

CounterACT User Directory Plugin

CounterACT User Directory Plugin Version 6.1.2 and Above Table of Contents About the User Directory Plugin... 3 Endpoint User Details... 3 Verify Endpoint Authentication... 3 User Directory Inventory... 4 HTTP Login Action... 5 HTTP Sign

More information

MobiControl v13: Package Rules to Profiles Migration Guide. January 2016

MobiControl v13: Package Rules to Profiles Migration Guide. January 2016 MobiControl v13: Package Rules to Profiles Migration Guide January 2016 Copyright 2016 SOTI Inc. All rights reserved. This documentation and the software described in this document are furnished under

More information

USER GUIDE. MADCAP FLARE 2017 r3. Source Control: Git

USER GUIDE. MADCAP FLARE 2017 r3. Source Control: Git USER GUIDE MADCAP FLARE 2017 r3 Source Control: Git Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this

More information

Host Access Management and Security Server Administrative Console Users Guide. August 2016

Host Access Management and Security Server Administrative Console Users Guide. August 2016 Host Access Management and Security Server Administrative Console Users Guide August 2016 2016 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials

More information

Novell Identity Manager

Novell Identity Manager Role Mapping Administrator User Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 1.0 August 28, 2009 www.novell.com Novell Identity Manager Role Mapping Administrator 1.0 User GuideNovell Identity

More information

USER GUIDE MADCAP LINGO Source Control: Git

USER GUIDE MADCAP LINGO Source Control: Git USER GUIDE MADCAP LINGO 10.1 Source Control: Git Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this document

More information

HYCU SCOM Management Pack for F5 BIG-IP

HYCU SCOM Management Pack for F5 BIG-IP USER GUIDE HYCU SCOM Management Pack for F5 BIG-IP Product version: 5.5 Product release date: August 2018 Document edition: First Legal notices Copyright notice 2015-2018 HYCU. All rights reserved. This

More information

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE

Quest Enterprise Reporter 2.0 Report Manager USER GUIDE Quest Enterprise Reporter 2.0 Report Manager USER GUIDE 2014 Quest Software, Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this

More information

Egress Administration Panel

Egress Administration Panel 1 COMMERCIAL IN CONFIDENCE Egress Administration Panel User Guide Copyright 2018 Egress Software Technologies Ltd. All rights reserved. 2 COMMERCIAL IN CONFIDENCE Confidentiality statement This document

More information

Password Reset Utility. Configuration

Password Reset Utility. Configuration Password Reset Utility Configuration 1 Table of Contents 1. Uninstalling Legacy Password Reset... 2 2. Password Reset Utility: How to deploy and configure via Group Policy... 2 3. Configuring Group Policy

More information

Source Control: Perforce

Source Control: Perforce USER GUIDE MADCAP LINGO 10.1 Source Control: Perforce Copyright 2018 MadCap Software. All rights reserved. Information in this document is subject to change without notice. The software described in this

More information

Function. Description

Function. Description Function Check In Get / Checkout Description Checking in a file uploads the file from the user s hard drive into the vault and creates a new file version with any changes to the file that have been saved.

More information

Table of Contents. About this Guide..3. This workis licensed under a Creative Commons Attribution 2.5 License. Getting Help..4. Welcome to Pinnacle..

Table of Contents. About this Guide..3. This workis licensed under a Creative Commons Attribution 2.5 License. Getting Help..4. Welcome to Pinnacle.. Installation Guide Table of Contents About this Guide..3 This workis licensed under a Creative Commons Attribution 2.5 License. Getting Help..4 Welcome to Pinnacle..4 Introduction..4 Organizational Hierarchy..4

More information

DISCLAIMER COPYRIGHT List of Trademarks

DISCLAIMER COPYRIGHT List of Trademarks DISCLAIMER This documentation is provided for reference purposes only. While efforts were made to verify the completeness and accuracy of the information contained in this documentation, this documentation

More information

Administration Guide

Administration Guide Administration Guide Version 2.0 November, 2015 Biscom, Inc. 321 Billerica Rd. Chelmsford, MA 01824 tel 978-250-1800 fax 978-250-4449 CONTENTS 1. Initial Configuration and Settings...1 1.1 Application...

More information

Globalbrain Administration Guide. Version 5.4

Globalbrain Administration Guide. Version 5.4 Globalbrain Administration Guide Version 5.4 Copyright 2012 by Brainware, Inc. All rights reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system,

More information

Authenticating Cisco VCS accounts using LDAP

Authenticating Cisco VCS accounts using LDAP Authenticating Cisco VCS accounts using LDAP Cisco TelePresence Deployment Guide Cisco VCS X6 D14526.04 February 2011 Contents Contents Document revision history... 3 Introduction... 4 Usage... 4 Cisco

More information

Source control with Subversion A user perspective

Source control with Subversion A user perspective http://svnbook.red-bean.com/ Source control with Subversion A user perspective Aaron Ponti What is Subversion? } It is a free and open-source version control system } It manages files and directories,

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

RSA Authentication Manager 7.1 Help Desk Administrator s Guide

RSA Authentication Manager 7.1 Help Desk Administrator s Guide RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

Microsoft IIS version 6 Integration

Microsoft IIS version 6 Integration Microsoft IIS version 6 Integration Contents 1 Overview 2 Prerequisites 3 PINsafe Configuration 4 Configuring the IIS Server 4.1 Install the PINsafeIISFilter.exe 4.2 Configure the ISAPI filter 4.3 Create

More information

Directory Integration

Directory Integration Directory Parameters, page 1 Attribute Mapping Parameters, page 4 CDI Parameters, page 6 UDS Parameters, page 18 Directory Server Configuration Examples, page 20 Directory Parameters The following table

More information

Egress Switch Administration Panel

Egress Switch Administration Panel 1 COMMERCIAL IN CONFIDENCE Egress Switch Administration Panel User Guide Copyright 2017 Egress Software Technologies Ltd. All rights reserved. 2 COMMERCIAL IN CONFIDENCE Confidentiality Statement This

More information

Workshare Desktop App. User Guide

Workshare Desktop App. User Guide Workshare Desktop App User Guide February 2018 Workshare Desktop App User Guide Table of Contents Introducing the Workshare Desktop App...4 What is the Desktop App?... 5 Key features of the Workshare desktop

More information

Media Archive Server for Small Teams

Media Archive Server for Small Teams Media Archive Server for Small Teams Installation Guide Daminion Server 0.9.X beta This 5-minute guide will help you set up and configure your Daminion Server Software correctly. Please take the time to

More information

Authentication via Active Directory and LDAP

Authentication via Active Directory and LDAP Authentication via Active Directory and LDAP Overview The LDAP and Active Directory authenticators available in Datameer provide remote authentication services for Datameer users. Administrators can configure

More information

ZL UA Domino Configuration Guide. Version 7.0

ZL UA Domino  Configuration Guide. Version 7.0 ZL UA Domino Email Configuration Guide Version 7.0 ZL Technologies, Inc. Copyright 2010 ZL Technologies, Inc.All rights reserved ZL Technologies, Inc. ( ZLTI, formerly known as ZipLip ) and its licensors

More information

SK hynix Drive Manager Easy Kit. Installation Guide

SK hynix Drive Manager Easy Kit. Installation Guide SK hynix Drive Manager Easy Kit Installation Guide Legal Notice This document is provided for informational purposes only, and does not constitute a binding legal document. Information in this document

More information

An LDAP server may implement its own schema or a standard schema defined as in RFC Mainstream implementations of LDAP include Netscape

An LDAP server may implement its own schema or a standard schema defined as in RFC Mainstream implementations of LDAP include Netscape Spectrum Software, Inc. 11445 Johns Creek Pkwy. Suite 300 Duluth, GA 30097 www.spectrumscm.com Subject: LDAP Support for SpectrumSCM Original Issue Date: April 26 th, 2003 Update Date: December 13 th,

More information

F5 BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.2

F5 BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.2 F5 BIG-IQ Centralized Management: Licensing and Initial Setup Version 5.2 Table of Contents Table of Contents BIG-IQ System Introduction...5 About BIG-IQ Centralized Management... 5 How do I navigate

More information

INTEGRATING WITH LDAP DIRECTORIES

INTEGRATING WITH LDAP DIRECTORIES INTEGRATING WITH LDAP DIRECTORIES 1 BACKGROUND This document outlines the steps involved in integrating Unity Desktop with an LDAP-compliant directory (including Microsoft Active Directory) for click-to-dial

More information

Identity, Authentication, and Access Control

Identity, Authentication, and Access Control Identity, Authentication, and Access Control License This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons Attribution-ShareAlike 3.0 Unported License.

More information

Version Control. Kyungbaek Kim. Chonnam National University School of Electronics and Computer Engineering. Original slides from James Brucker

Version Control. Kyungbaek Kim. Chonnam National University School of Electronics and Computer Engineering. Original slides from James Brucker Version Control Chonnam National University School of Electronics and Computer Engineering Kyungbaek Kim Original slides from James Brucker What is version control Manage documents over time Keep a history

More information

Configuring Microsoft ADAM

Configuring Microsoft ADAM Proven Practice Configuring Microsoft ADAM Product(s): IBM Cognos Series 7 Area of Interest: Security Configuring Microsoft ADAM 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated). Cognos

More information

WA2031 WebSphere Application Server 8.0 Administration on Windows. Student Labs. Web Age Solutions Inc. Copyright 2012 Web Age Solutions Inc.

WA2031 WebSphere Application Server 8.0 Administration on Windows. Student Labs. Web Age Solutions Inc. Copyright 2012 Web Age Solutions Inc. WA2031 WebSphere Application Server 8.0 Administration on Windows Student Labs Web Age Solutions Inc. Copyright 2012 Web Age Solutions Inc. 1 Table of Contents Directory Paths Used in Labs...3 Lab Notes...4

More information

HPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide

HPE Security Fortify WebInspect Enterprise Software Version: Windows operating systems. Installation and Implementation Guide HPE Security Fortify WebInspect Enterprise Software Version: 17.10 Windows operating systems Installation and Implementation Guide Document Release Date: May 2017 Software Release Date: April 2017 Legal

More information

SafeNet Authentication Service

SafeNet Authentication Service SafeNet Authentication Service Integration Guide All information herein is either public information or is the property of and owned solely by Gemalto NV. and/or its subsidiaries who shall have and keep

More information

Installing SurveySolutions/EFM 2.10 on Windows 2003 Server

Installing SurveySolutions/EFM 2.10 on Windows 2003 Server Installing SurveySolutions/EFM 2.10 on Windows 2003 Server November 2006 Perseus Development Corporation 50 Braintree Hill Office Park, Suite 308 Braintree, MA 02184 Tel (781) 848-8100 Fax (781) 848-1978

More information

x10data Application Platform v7.1 Installation Guide

x10data Application Platform v7.1 Installation Guide Copyright Copyright 2010 Automated Data Capture (ADC) Technologies, Incorporated. All rights reserved. Complying with all applicable copyright laws is the responsibility of the user. Without limiting the

More information

User Guide. BlackBerry Workspaces for Windows. Version 5.5

User Guide. BlackBerry Workspaces for Windows. Version 5.5 User Guide BlackBerry Workspaces for Windows Version 5.5 Published: 2017-03-30 SWD-20170330110027321 Contents Introducing BlackBerry Workspaces for Windows... 6 Getting Started... 7 Setting up and installing

More information

WORKING IN TEAMS WITH CASECOMPLETE AND THE CASECOMPLETE PROJECT SHARING ADDIN. Contents

WORKING IN TEAMS WITH CASECOMPLETE AND THE CASECOMPLETE PROJECT SHARING ADDIN. Contents WORKING IN TEAMS WITH CASECOMPLETE AND THE CASECOMPLETE PROJECT SHARING ADDIN Contents Working in Teams with CaseComplete... 2 Need an introduction to how version control works?... 2 Exclusive Checkout...

More information

Using Kerberos Authentication in a Reverse Proxy Environment

Using Kerberos Authentication in a Reverse Proxy Environment Using Kerberos Authentication in a Reverse Proxy Environment Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat

More information

Managing Users and Configuring Role-Based Access Control

Managing Users and Configuring Role-Based Access Control Managing s and Configuring Role-Based Access Control This section describes how to manage users in Prime Central, including defining users and passwords and configuring role-based access control (RBAC).

More information

TDDC88 Lab 4 Software Configuration Management

TDDC88 Lab 4 Software Configuration Management TDDC88 Lab 4 Software Configuration Management Introduction "Version control is to programmers what the safety net is to a trapeze artist. Knowing the net is there to catch them if they fall, aerialists

More information

You can access data using the FTP/SFTP protocol. This document will guide you in the procedures for configuring FTP/SFTP access.

You can access data using the FTP/SFTP protocol. This document will guide you in the procedures for configuring FTP/SFTP access. You can access data using the FTP/SFTP protocol. This document will guide you in the procedures for configuring FTP/SFTP access. Overview of Configuring FTP/SFTP Access In order to access data using the

More information

User Management Tool

User Management Tool Citrix Product Documentation docs.citrix.com September 21, 2018 Contents What s new 3 What s new in User Management Tool 1.8.1........................... 3 What s new in User Management Tool 1.8............................

More information

Oracle Advanced Security: Enterprise User Management. An Oracle Technical White Paper November 1999

Oracle Advanced Security: Enterprise User Management. An Oracle Technical White Paper November 1999 Advanced Security: Enterprise User Management An Technical White Paper Advanced Security: Enterprise User Management THE CHALLENGES OF USER MANAGEMENT Some of the challenges faced by an enterprise today

More information

ChangeAuditor 5.6. For NetApp User Guide

ChangeAuditor 5.6. For NetApp User Guide ChangeAuditor 5.6 For NetApp User Guide 2011 Quest Software, Inc. ALL RIGHTS RESERVED This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

One Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide

One Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide One Identity Active Roles 7.2 Azure AD and Office 365 Management Administrator Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Contents. Introducing TARMAC Customizing your user experience... 19

Contents. Introducing TARMAC Customizing your user experience... 19 TARMAC Version 1.2 Contents Overview... 3 Introducing TARMAC... 4 Installation and Licensing... 5 Installing TARMAC on Mac OS X Client 5 Installing TARMAC on Mac OS X Server 5 Accessing TARMAC for the

More information

Coveo Platform 7.0. Oracle UCM Connector Guide

Coveo Platform 7.0. Oracle UCM Connector Guide Coveo Platform 7.0 Oracle UCM Connector Guide Notice The content in this document represents the current view of Coveo as of the date of publication. Because Coveo continually responds to changing market

More information

Symantec Ghost Solution Suite Web Console - Getting Started Guide

Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console - Getting Started Guide Symantec Ghost Solution Suite Web Console- Getting Started Guide Documentation version: 3.3 RU1 Legal Notice Copyright 2019 Symantec Corporation.

More information

PeoplePassword Documentation v6.0

PeoplePassword Documentation v6.0 PeoplePassword Documentation v6.0 Instructions to Configure and Use PeoplePassword v6.0, LLC Contents Overview... 3 Getting Started... 3 Components of PeoplePassword... 3 Core Components... 3 Optional

More information

Windows Server 2008 Active Directory Resource Kit

Windows Server 2008 Active Directory Resource Kit Windows Server 2008 Active Directory Resource Kit Stan Reimer, Mike Mulcare, Conan Kezema, Byron Wright w MS AD Team PREVIEW CONTENT This excerpt contains uncorrected manuscript from an upcoming Microsoft

More information

IBM Security Identity Manager Version Planning Topics IBM

IBM Security Identity Manager Version Planning Topics IBM IBM Security Identity Manager Version 7.0.1 Planning Topics IBM IBM Security Identity Manager Version 7.0.1 Planning Topics IBM ii IBM Security Identity Manager Version 7.0.1: Planning Topics Table of

More information

Enforced Client Policy & Reporting Server (EPRS) 2.3. Administration Guide

Enforced Client Policy & Reporting Server (EPRS) 2.3. Administration Guide Enforced Client Policy & Reporting Server (EPRS) 2.3 Copyright 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell, the

More information

SharePoint 2010 Tutorial

SharePoint 2010 Tutorial SharePoint 2010 Tutorial TABLE OF CONTENTS Introduction... 1 Basic Navigation... 2 Navigation Buttons & Bars... 3 Ribbon... 4 Library Ribbon... 6 Recycle Bin... 7 Permission Levels & Groups... 8 Create

More information

Xton Access Manager GETTING STARTED GUIDE

Xton Access Manager GETTING STARTED GUIDE Xton Access Manager GETTING STARTED GUIDE XTON TECHNOLOGIES, LLC PHILADELPHIA Copyright 2017. Xton Technologies LLC. Contents Introduction... 2 Technical Support... 2 What is Xton Access Manager?... 3

More information

Install WordPress 3.X In Multi Blog / Multi user mode On localhost

Install WordPress 3.X In Multi Blog / Multi user mode On localhost Install WordPress 3.X In Multi Blog / Multi user mode On localhost In this tutorial, we will cover how to setup WordPress as a Multi User /Multi Blog. We ll start by downloading and installing a new version

More information

Clearspan Communicator Desktop R20.2.2

Clearspan Communicator Desktop R20.2.2 Clearspan Communicator Desktop R20.2.2 UPGRADE INSTRUCTIONS APRIL 2015 Table of Contents Overview... 3 Upgrading (Windows 7 or above, Mac OS 10.6 or above)... 3 Recording Your Settings (Windows and Mac

More information

Getting Started with Tally.Developer 9

Getting Started with Tally.Developer 9 Getting Started with Tally.Developer 9 The information contained in this document is current as of the date of publication and subject to change. Because Tally must respond to changing market conditions,

More information

TWO-FACTOR AUTHENTICATION Version 1.1.0

TWO-FACTOR AUTHENTICATION Version 1.1.0 TWO-FACTOR AUTHENTICATION Version 1.1.0 User Guide for Magento 1.9 Table of Contents 1..................... The MIT License 2.................... About JetRails 2FA 4................. Installing JetRails

More information

Migrating vrealize Automation 6.2 to 7.2

Migrating vrealize Automation 6.2 to 7.2 Migrating vrealize Automation 6.2 to 7.2 vrealize Automation 7.2 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Version Control System. -- base on Subversion 1.4

Version Control System. -- base on Subversion 1.4 More Functionalities of a -- base on Subversion 1.4 Sui Huang A tutorial for Software Engineering Course SE2AA4 Instructor: Dr. William M. Farmer TAs: Clare So, Sui Huang, Jeffrey Heifetz Jan 10 th, 2006

More information

FTP Service Reference

FTP Service Reference IceWarp Unified Communications Reference Version 11.4 Published on 2/9/2016 Contents... 3 About... 4 Reference... 5 General Tab... 5 Dialog... 6 FTP Site... 6 Users... 7 Groups... 11 Options... 14 Access...

More information

Active Directory Change Notifier Quick Start Guide

Active Directory Change Notifier Quick Start Guide Active Directory Change Notifier Quick Start Guide Software version 3.0 General Information: info@cionsystems.com Online Support: support@cionsystems.com Copyright 2017 CionSystems Inc., All Rights Reserved

More information

Directory Integration with VMware Identity Manager

Directory Integration with VMware Identity Manager Directory Integration with VMware Identity Manager VMware AirWatch 9.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Novell Nsure SecureLogin

Novell Nsure SecureLogin Novell Nsure SecureLogin TM 3.51.1 September 7, 2004 INSTALLATION GUIDE www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Administration Guide. Lavastorm Analytics Engine 6.1.1

Administration Guide. Lavastorm Analytics Engine 6.1.1 Administration Guide Lavastorm Analytics Engine 6.1.1 Lavastorm Analytics Engine 6.1.1: Administration Guide Legal notice Copyright THE CONTENTS OF THIS DOCUMENT ARE THE COPYRIGHT OF LIMITED. ALL RIGHTS

More information

IDOL. Software Version Document Security Administration Guide

IDOL. Software Version Document Security Administration Guide IDOL Software Version 12.0 Document Security Administration Guide Document Release Date: June 2018 Software Release Date: June 2018 Legal notices Copyright notice Copyright 2018 Micro Focus or one of its

More information

Single Sign On (SSO) with Polarion 17.3

Single Sign On (SSO) with Polarion 17.3 SIEMENS Single Sign On (SSO) with Polarion 17.3 POL007 17.3 Contents Configuring single sign-on (SSO)......................................... 1-1 Overview...........................................................

More information

Client Portal Client User Manual

Client Portal Client User Manual Client Portal Client User Manual Version 2.0 Contents Client Portal User Manual... 3 Groups and User Levels... 3 Inviting Users... 5 Terms of Use... 9 Removing Users... 12 Password Reset... 14 List Items

More information

CA ERwin Data Modeler

CA ERwin Data Modeler CA ERwin Data Modeler Implementation Guide Service Pack 9.5.2 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to only and is subject

More information

VII. Corente Services SSL Client

VII. Corente Services SSL Client VII. Corente Services SSL Client Corente Release 9.1 Manual 9.1.1 Copyright 2014, Oracle and/or its affiliates. All rights reserved. Table of Contents Preface... 5 I. Introduction... 6 Chapter 1. Requirements...

More information