Configuring Microsoft ADAM

Size: px
Start display at page:

Download "Configuring Microsoft ADAM"

Transcription

1 Proven Practice Configuring Microsoft ADAM Product(s): IBM Cognos Series 7 Area of Interest: Security

2 Configuring Microsoft ADAM 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated). Cognos ULC is an IBM Company. While every attempt has been made to ensure that the information in this document is accurate and complete, some typographical errors or technical inaccuracies may exist. Cognos does not accept responsibility for any kind of loss resulting from the use of information contained in this document. This document shows the publication date. The information contained in this document is subject to change without notice. Any improvements or changes to the information contained in this document will be documented in subsequent editions. This document contains proprietary information of Cognos. All rights are reserved. No part of this document may be copied, photocopied, reproduced, stored in a retrieval system, transmitted in any form or by any means, or translated into another language without the prior written consent of Cognos. Cognos and the Cognos logo are trademarks of Cognos ULC (formerly Cognos Incorporated) in the United States and/or other countries. IBM and the IBM logo are trademarks of International Business Machines Corporation in the United States, or other countries, or both. All other names are trademarks or registered trademarks of their respective companies. Information about Cognos products can be found at This document is maintained by the Best Practices, Product and Technology team. You can send comments, suggestions, and additions to cscogpp@ca.ibm.com.

3 Configuring Microsoft ADAM 3 Contents 1 INTRODUCTION PURPOSE APPLICABILITY CAVEATS MICROSOFT ADAM INSTALLING ADAM CONFIGURING ADAM Enabling Anonymous Binds Setting Administrator s Group EXTENDING THE SCHEMA CONFIGURATION MANAGER SCHEMA OBJECTS AND ATTRIBUTES...18

4 Configuring Microsoft ADAM 4 1 Introduction 1.1 Purpose This document provides a walkthrough of configuring Microsoft Active Directory Application Mode (ADAM) in a Windows 2003 environment for use with the IBM Cognos Series 7 products. Once the ADAM schema has been extended, the Cognos namespace can be created. 1.2 Applicability Product version is important when using this document. If the product version is not at least IBM Cognos Series 7 Version 3 MR2, the operation may fail. Any release prior to Series 7 V3 MR2 is unsupported with ADAM. 1.3 Caveats The document covers installing and configuring ADAM in a Windows 2003 environment. At the time of the creation of this document, Windows XP was not a supported platform and some additional steps may be required. 2 Microsoft ADAM 2.1 Installing ADAM Before the installation can begin, the install media must first be obtained. ADAM is a free download from the Microsoft site and can be found at this URL: When the install media has been downloaded, double click the adamsetup.exe executable to start the install process. Ensure that a new instance is selected when prompted during the Setup Options.

5 Configuring Microsoft ADAM 5 When prompted for an Instance Name select a name that will be easily identified. One of the suggested names is CognosADAM to ensure that the ADAM instance can easily be identified as the directory server instance for the IBM Cognos application(s).

6 Configuring Microsoft ADAM 6 Once the name has been selected, the next user input required is to identify which ports the application will run on. It is recommended to not use the standard LDAP port of 389, or SSL port of 636, due to possible conflicts with currently running directory servers, or any future directory server installations. For this document, ports and were used. The next step of the installation process is to create the partition that will store the application specific data. Make sure that the Yes, create an application directory partition radio button is selected. The base distinguished name (basedn) will have to be supplied as well. The format of the basedn is usually DC=domain,DC=com, but any values can be used. In addition to specifying the basedn, it is recommended to prefix the basedn with an Organization (O), or Organizational Unit (OU), that will contain the Cognos namespace. The installation detailed in this document uses, O=Cognos,DC=pro,DC=nhslsp, DC=net.

7 Configuring Microsoft ADAM 7 Specify the installation path to continue the install. The next step requires selecting which account will start the ADAM service. This could either be a local system account or a named domain account. Certain situations may require a named domain account, but for the purpose of this document, the local system account will be used.

8 Configuring Microsoft ADAM 8 The last stage in installing the ADAM application is to indicate which LDIF files will be imported and included in the starting schema for the ADAM instance. The only two that need to be selected are the MS-InetOrgPerson.LDF and MS-User.LDF LDIF files. As this is the last step, press the Next button and then the Finish button.

9 Configuring Microsoft ADAM Configuring ADAM After the successful installation of the ADAM application, certain configuration changes will need to be made in order to allow the Cognos application to connect to the directory server and extend the schema. The configuration changes will need to be made through the ADAM ADSI Edit interface which can be found at: Start -> All Programs -> ADAM -> ADAM ADSI Edit. With the ADAM ADSI Edit interface open, right-click on the ADAM ADSI Edit root and select Connect to This presents the Connection Settings dialog box, in which the distinguished name will have to be entered in order to connect to the node. Use the base distinguished name that was entered when the new instance was created in step 2.1. Supply the machine name and port number that used to run ADAM. Right click your Cognos application DN node, select New, and click Object

10 Configuring Microsoft ADAM 10

11 Configuring Microsoft ADAM 11 In the Create Object dialog box select the user object class. Press the Next button and then supply a value for the new user object. In this example cognosadmin was the value that was used. Once the new user object has been created, the password will need to be reset. Right click this new user and select Reset Password, in the reset password dialog set your new password, confirm the password, and then press the OK button.

12 Configuring Microsoft ADAM 12 Right click this new user and select Properties, select msds- UserAccountDisabled from attribute list and press the Edit button. In Boolean Attribute Editor dialog box, if the value of True is set then select False, press the OK button. Press the OK button again to close the user properties. Under your Cognos application partition click the top node, there is the entry CN=Roles, select it and its children nodes appear in the right pane, right click CN=Administrators and select Properties. In CN=Administrators Properties page select its member attribute and click Edit, in Multi-valued Distinguished Name With Security Principal Editor click Add ADAM Account.

13 Configuring Microsoft ADAM 13 In Add ADAM Account input this new user s Distinguish name (DN) click OK. You can find the value of distinguishedname attribute from Properties of the newly added user in step d. Click OK to close Multi-valued Distinguished Name With Security Principal Editor. NOTE: Created UserDN is: Cn=cognosadmin,o=Cognos,DC=pro,DC=nhslsp,DC=net You should leave ADAM default settings in member. (By default, ADAM add the configuration partition s Administrators role, CN=Administrators,CN=Roles CN=Configuration,CN={GUID}, in this member, you should not remove it.) Enabling Anonymous Binds Before the schema can be successfully extended, Active Directory Application Mode must first be configured to accept anonymous requests. To accomplish this, the following steps will need to be executed: 1. Start ADAM ADSI Edit and right click root node, select Connect to.

14 Configuring Microsoft ADAM In Connection Settings, create your new configuration partition name in Connection Name, put your ADAM server name and port number, select Well-known naming context and select Configuration, then click OK. 3. Under your configuration partition click the top node, there is the entry CN=Services, click CN=Services to expand this node, click CN=Windows NT to expand to its children, right click CN=Directory Service and select Properties,. 4. In CN=Directory Service s Properties page select its attribute dsheuristics and click Edit, in String Attribute Editor input the string as value and click OK Setting Administrator s Group The last stage in the configuration process, is to add the Authenticated Users group into the configuration partition s Administrators group. 1. Start ADAM ADSI Edit and right click root node, select Connect to. 2. In Connection Settings, create your new configuration partition name in Connection Name, put your ADAM server name and port number, select Well-known naming context and select Configuration, then click OK.

15 Configuring Microsoft ADAM Under your configuration partition click the top node, there is the entry CN=Roles, click it to select this node, right click CN=Administrators and select Properties. 4. In CN=Administrators Properties page select its member attribute and click Edit, in Multi-valued Distinguished Name With Security Principal Editor click Add Windows Account. 5. In Select Users or Groups click Locations and select your local host name, click OK, then click Advanced button. 6. Click Find Now, select Authenticated Users and click OK. Click OK to close Select Users or Groups dialog. 7. Click OK to close Multi-valued Distinguished Name With Security Principal Editor 8. Click OK to close CN=Administrators Properties. Note: 9. After successfully configuring ADAM through Cognos Configuration Manager, remember to remove Authenticated Users from CN=Administrators member. Important: Microsoft has a patch (838342) that will not require that Authenticated Users be added to the Administrators role. This is key as most companies will want to either create a Cognos Admin account or designate an existing account. This patch can be obtained from Microsoft as Cognos will not distribute this to customers. Again, has to be obtained from Microsoft. 3 Extending the Schema The process of extending the schema to be able to use Active Directory as an authentication source, is split into two operations; extending the schema, where IBM Cognos specific objects and attributes are added to the existing ADAM schema, and creating the Cognos namespace that will contain all of the users and user classes to be used in the IBM Cognos security infrastructure.

16 Configuring Microsoft ADAM 16 When using Configuration Manager, the two processes appear to be part of the same operation, but there are in fact two distinct operations that occur. Once the schema has been extended, the objects and attributes are forever part of the Active Directory schema so ensure that you are configuring the correct domain. That being said, the schema only needs to be extended once, but multiple namespaces can be created at different locations within Active Directory. This can be done either through the Access Manager admin interface, which allows you to create multiple namespaces within the same instance, or, through Configuration Manager which permits the creation of different instances within the same directory server instance. This is achieved by setting different basedn values for the Base distinguished name (DN) parameter. For instance, specifying o=cognos_prod,dc=support,sc=local and o=cognos_dev,dc=support,dc=local would create two unique instances of the Cognos namespace that would have to be administered separately. Important: In order to successfully extend the ADAM schema with the Cognos objects and attributes, Configuration Manager must be installed on the same server as ADAM. At the time that this document was written, trying to configure ADAM remotely would fail. 3.1 Configuration Manager To complete the schema extension and the creation of the namespace, the Configuration Manager utility must be used. In Configuration Manager, modify the values required to extend the directory server schema by accessing the General page under Services -> Access Manager Directory Server. The values that need to be modified to extend the schema can be found in the right hand frame. Are you sure that you want to configure this directory server? This value should be set to yes, otherwise the operation will not be executed when the settings are applied. Schema Version This value should be set to CURRENT unless older Series 7 applications will be accessing this directory server as well. Server Type This value can be left to the default Auto Detect or the Active Directory option can be selected.

17 Configuring Microsoft ADAM 17 Computer Host name of the directory server housing the Cognos schema. This can be machine name, IP address or fully qualified DNS name. Port Port number that the directory server instance is running on. Base distinguished name (DN) Organizational Unit (OU) or Container (CN) where the Cognos namespace will be created. This can be done at the root DN, DC=Support,DC=local for example, or can be in part of the subtree, such as, O=Cognos,DC=Support,DC=local. Again, it would be good practice to not specify just the basedn and use an Organization or Organizational Unit such as Cognos to house the namespace. The namespace does not need to be created in the root of the domain. It can be created at any point of the domain hierarchy. For example, if the desired location was in an Organizational Unit (OU) called applications, which was under the root of the domain, the basedn would then be: o=cognos,ou=applications,dc=support,dc=local. Unrestricted User distinguished name (DN) User account that has sufficient privileges to extend the schema of the directory server as well as create the namespace. The value should be the full DN to the user account and NOT just the user name. Unrestricted User password Matching password value for the user specified as the unrestricted user. Primary ticket service - Host and port where the Access Manager Server or Ticket Server service is running. This value can be supplied after the schema has been extended either through Configuration Manager or the Access Manager admin tool, but it is recommended that this be set at the same time as the schema extension.

18 Configuring Microsoft ADAM 18 Apply these settings by clicking on the General object in the tree and pressing the apply button. The settings can also be applied by rightclicking on the General object and selecting Apply Selection. If all values are correct, and the credentials have enough privileges, the following message will be returned upon successful schema extension. 3.2 Schema Objects and Attributes Prior to extending the schema in Active Directory, administrators may inquire as to which objects and attributes will be added into the schema. As mentioned before, this is an irreversible action, so great discretion is sometimes used. All of the files that deal with the schema modification are located in the <install_path>\cerx\accman directory. The files in this directory are organized by both schema version (15.2 or 16.0) and directory server type. The files required for the CURRENT schema type (see section 2.2.3) contain 16.0 in the file name.

19 Configuring Microsoft ADAM 19 For example, slapd.oc.conf.16.0.extension. All files that are required for Active Directory have the.active Directory suffix in the file names. For example, slapd.oc.conf.16.0.extension.active_directory. Files that create the Object Classes contain.oc. in the file name, and files that create attributes contain.at. in the file name.

20 Configuring Microsoft ADAM 20 Here is a sample from the slapd.oc.conf.16.0.extension.active_directory file: # objectclasses below added for Cognos Authenticator Directory Service #Schema Version 16.0 objectclass authsubdirectory oid requires objectclass, cn allows authcreationdate, authconfigurationitem, authdefaultnamespace, authmiscellaneous, camutf8namespaces parents authsecuritydata, authsubdirectory, domaindns, organization, organizationalunit objectclass camobjectdirectory oid requires objectclass, cn parents authsecuritydata, camobjectdirectory And a sample from the slapd.at.conf.16.0.extension.active_directory file: #attributes below added for Cognos Authenticator Directory Service #Schema Version 16.0 attribute camuserfolderref camuserfolderref dn attribute camdbsignonref camdbsignonref dn attribute camuserclassref camuserclassref dn 13804

Report Studio: Using Java Script to Select and Submit Values to a SAP Prompt.

Report Studio: Using Java Script to Select and Submit Values to a SAP Prompt. Tip or Technique Report Studio: Using Java Script to Select and Submit Values to a SAP Prompt. Product(s): IBM Cognos 8 Area of Interest: Reporting Prompt. 2 Copyright Copyright 2008 Cognos ULC (formerly

More information

Configuring IBM Cognos 8 authentication against Microsoft ADAM

Configuring IBM Cognos 8 authentication against Microsoft ADAM Proven Practice Configuring IBM Cognos 8 authentication against Microsoft ADAM Product(s): IBM Cognos ReportNet, IBM Cognos8 Area of Interest: Security Copyright Copyright 2008 Cognos ULC (formerly Cognos

More information

Saving Report Output to the Server File System

Saving Report Output to the Server File System Guideline Saving Report Output to the Server File System Product(s): IBM Cognos 8 BI Area of Interest: Infrastructure Saving Report Output to the Server File System 2 Copyright and Trademarks Licensed

More information

How to import a WSDL Data Source and Prepare it for Use in Framework Manager

How to import a WSDL Data Source and Prepare it for Use in Framework Manager Tip or Technique How to import a WSDL Data Source and Prepare it for Use in Framework Manager Product(s): Composite Software 4.5.0 Area of Interest: Infrastructure Manager 2 Copyright Copyright 2008 Cognos

More information

LDAP Configuration Guide

LDAP Configuration Guide LDAP Configuration Guide Publication date: 11/8/2017 www.xcalar.com Copyright 2017 Xcalar, Inc. All rights reserved. Table of Contents About this guide 3 Configuring LDAP 4 Before you start 5 Configuring

More information

Integration Guide. Entrust Authority Security Manager 8.1 SP1 Microsoft Windows Server 2012 R2 Standard

Integration Guide. Entrust Authority Security Manager 8.1 SP1 Microsoft Windows Server 2012 R2 Standard Integration Guide Entrust Authority Security Manager 8.1 SP1 Microsoft Windows Server 2012 R2 Standard Integration Guide: Entrust Authority Security Manager 8.1 SP1 Imprint copyright 2018 Utimaco IS GmbH

More information

Proven Practice Installing TM1 9.5 in Apache Tomcat Product(s): TM1 9.5 Area of Interest: Install Config

Proven Practice Installing TM1 9.5 in Apache Tomcat Product(s): TM1 9.5 Area of Interest: Install Config Proven Practice Installing TM1 9.5 in Apache Tomcat Product(s): TM1 9.5 Area of Interest: Install Config 2 Copyright and Trademarks Licensed Materials - Property of IBM. Copyright IBM Corp. 2009 IBM, the

More information

TM1 Registration and Maintenance of Windows Services

TM1 Registration and Maintenance of Windows Services Tip or Technique TM1 Registration and Maintenance Product(s): TM1 Area of Interest: Infrastructure 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated). Cognos ULC is an IBM Company. While

More information

COGNOS (R) ENTERPRISE BI SERIES COGNOS IMPROMPTU (R) ADMINISTRATOR FOR WINDOWS

COGNOS (R) ENTERPRISE BI SERIES COGNOS IMPROMPTU (R) ADMINISTRATOR FOR WINDOWS COGNOS (R) ENTERPRISE BI SERIES COGNOS IMPROMPTU (R) ADMINISTRATOR FOR WINDOWS INSTALLATION GUIDE Installation Guide 02.12.2004 Impromptu Administrator 7.3 MR1 Type the text for the HTML TOC entry Type

More information

Connecting TM1 to Various Third- Party Data Sources

Connecting TM1 to Various Third- Party Data Sources Tip or Technique Connecting TM1 to Various Third- Party Data Sources Product(s): TM1 Area of Interest: Development Connecting TM1 to Various Third-Party Data Sources 2 Copyright Copyright 2008 Cognos ULC

More information

TM1 9.5 Quick Installation and Upgrade Guide. Nature of Document: Tip or Technique Product(s): TM1 9.5 Area of Interest: Upgrade/Migration

TM1 9.5 Quick Installation and Upgrade Guide. Nature of Document: Tip or Technique Product(s): TM1 9.5 Area of Interest: Upgrade/Migration TM1 9.5 Quick Installation and Upgrade Guide Nature of Document: Tip or Technique Product(s): TM1 9.5 Area of Interest: Upgrade/Migration 2 Copyright and Trademarks Licensed Materials - Property of IBM.

More information

Web Authentication Using LDAP on Wireless LAN Controllers (WLCs) Configuration Example

Web Authentication Using LDAP on Wireless LAN Controllers (WLCs) Configuration Example Web Authentication Using LDAP on Wireless LAN Controllers (WLCs) Configuration Example Document ID: 108008 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication

More information

Securing the IBM Cognos 8 BI Environment

Securing the IBM Cognos 8 BI Environment Proven Practice Securing the IBM Cognos 8 BI Environment Product(s): IBM Cognos 8 BI Area of Interest: Security 2 Copyright Copyright 2008 Cognos ULC (formerly Cognos Incorporated). Cognos ULC is an IBM

More information

Managing Report Server Database Connections

Managing Report Server Database Connections Guideline Managing Report Server Database Connections Product(s): IBM Cognos 8 Area of Interest: Infrastructure Managing Report Server Database Connections 2 Copyright Copyright 2008 Cognos ULC (formerly

More information

ACS 5.x: LDAP Server Configuration Example

ACS 5.x: LDAP Server Configuration Example ACS 5.x: LDAP Server Configuration Example Document ID: 113473 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Directory Service Authentication Using

More information

6.4 Microsoft Windows

6.4 Microsoft Windows CRYPTO-Server 3 rd Party Integration 6.4 Microsoft Windows ACTIVE DIRECTORY APPLICATION MODE (ADAM) Implementation Guide Solution Overview Summary Product Name Vendor Site ADAM Server Side Software ADAM

More information

Active Directory Auditing Guide

Active Directory Auditing Guide Active Directory Auditing Guide www.adauditplus.com Table of Contents Document summary 1. Configuring Active Directory domains and domain controllers in ADAudit Plus 1.1 Automatic configuration 1.2 Manual

More information

Calculations that Span Dimensions

Calculations that Span Dimensions Tip or Technique Calculations that Span Dimensions Product(s): Report Studio, Crosstabs, Dimensional Expressions Area of Interest: Reporting Calculations that Span Dimensions 2 Copyright Copyright 2008

More information

Using the AT and FOR Options with Relational Summary Functions

Using the AT and FOR Options with Relational Summary Functions Tip or Technique Using the AT and FOR Options with Relational Summary Functions Product(s): IBM Cognos 8 Area of Interest: Report Design Using the AT and FOR Options with Relational Summary Functions 2

More information

Setup Service Account in AD

Setup Service Account in AD Table of contents Setup Service Account in AD... 2 Security setup on Service Account in AD... 2 Create Organization Units (OU) in AD... 4 Security setup on OUs in AD... 5 Setup Service Account in AD 1.

More information

Using ZENworks with Novell Service Desk

Using ZENworks with Novell Service Desk www.novell.com/documentation Using ZENworks with Novell Service Desk Novell Service Desk 7.1 April 2015 Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

Polycom CMA System Upgrade Guide

Polycom CMA System Upgrade Guide Polycom CMA System Upgrade Guide 4.1.2 June 2009 3725-77606-001B2 Trademark Information Polycom, the Polycom Triangles logo, and the names and marks associated with Polycom s products are trademarks and/or

More information

StarTeam LDAP QuickStart Manager Administration Guide

StarTeam LDAP QuickStart Manager Administration Guide StarTeam 15.1 LDAP QuickStart Manager Administration Guide Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright Micro Focus 2016. All rights reserved.

More information

VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP

VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Active Directory 2000 Plugin Installation for Cisco CallManager

Active Directory 2000 Plugin Installation for Cisco CallManager Active Directory 2000 Plugin Installation for Cisco CallManager Document ID: 15323 Contents Introduction Prerequisites Requirements Components Used Conventions Before You Begin Task 1: Create the Cisco

More information

VMware AirWatch Certificate Authentication for EAS with ADCS

VMware AirWatch Certificate Authentication for EAS with ADCS VMware AirWatch Certificate Authentication for EAS with ADCS For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

AUTHORIZED DOCUMENTATION. Using ZENworks with Novell Service Desk Novell Service Desk February 03,

AUTHORIZED DOCUMENTATION. Using ZENworks with Novell Service Desk Novell Service Desk February 03, AUTHORIZED DOCUMENTATION Using ZENworks with Novell Service Desk 6.5.4 Novell Service Desk 6.5.4 February 03, 2012 www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with

More information

ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018

ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018 ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk November 2018 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

User Manual. Active Directory Change Tracker

User Manual. Active Directory Change Tracker User Manual Active Directory Change Tracker Last Updated: March 2018 Copyright 2018 Vyapin Software Systems Private Ltd. All rights reserved. This document is being furnished by Vyapin Software Systems

More information

Using an LDAP With ActiveWorkflow

Using an LDAP With ActiveWorkflow Table of contents 1 Groups...2 2 People...2 3 Authentication...3 4 Directory Service... 4 4.1 Connection Properties... 5 4.2 User Retrieval Properties...6 4.3 User Attribute Properties...7 4.4 Group Retrieval

More information

When starting the installation PKI Install will try to find a high port available for https connection.

When starting the installation PKI Install will try to find a high port available for https connection. created by: Rainer Bemsel Version 1.0 Dated: July/19/2003 The purpose of this TechNote is how to install & configure Net Tools PKI 1.0. There is one important change necessary that PKI will handle Certificate

More information

Creating Column Profiles on LDAP Data Objects

Creating Column Profiles on LDAP Data Objects Creating Column Profiles on LDAP Data Objects Copyright Informatica LLC 1993, 2017. Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying,

More information

COGNOS MANAGEMENT SERIES PLANNING

COGNOS MANAGEMENT SERIES PLANNING COGNOS MANAGEMENT SERIES PLANNING CREATING IMPROMPTU AND IWR REPORTS FROM CONTRIBUTOR PUBLISH TABLES THE NEXT LEVEL OF PERFORMANCE This document applies to Cognos Management Series Planning version 7.1

More information

Windows Server 2003 Network Administration Goals

Windows Server 2003 Network Administration Goals Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management

More information

CounterACT User Directory Plugin

CounterACT User Directory Plugin Version 6.1.2 and Above Table of Contents About the User Directory Plugin... 3 Endpoint User Details... 3 Verify Endpoint Authentication... 3 User Directory Inventory... 4 HTTP Login Action... 5 HTTP Sign

More information

Overview of AdminSDHolder, protected groups and SDPROP Controlling groups that are protected by AdminSDHolder Security Descriptor propagator

Overview of AdminSDHolder, protected groups and SDPROP Controlling groups that are protected by AdminSDHolder Security Descriptor propagator AdminSDHolder, Protected Groups and SDPROP John Policelli At a Glance: Overview of AdminSDHolder, protected groups and SDPROP Controlling groups that are protected by AdminSDHolder Security Descriptor

More information

Published By Imanami Corporation 5099 Preston Ave. Livermore, CA 94551, United States. Copyright 2008 by Imanami Corporation.

Published By Imanami Corporation 5099 Preston Ave. Livermore, CA 94551, United States. Copyright 2008 by Imanami Corporation. Installation Guide Published By Imanami Corporation 5099 Preston Ave. Livermore, CA 94551, United States Copyright 2008 by Imanami Corporation. All rights reserved. No part of the contents of this document

More information

Configure the ISE for Integration with an LDAP Server

Configure the ISE for Integration with an LDAP Server Configure the ISE for Integration with an LDAP Server Document ID: 119149 Contributed by Piotr Borowiec, Cisco TAC Engineer. Jul 10, 2015 Contents Introduction Prerequisites Requirements Components Used

More information

App Orchestration 2.6

App Orchestration 2.6 Configuring NetScaler 10.5 Load Balancing with StoreFront 3.0 and NetScaler Gateway for Last Updated: June 04, 2015 Contents Introduction... 3 Configure the NetScaler load balancer certificates... 3 To

More information

LDAP/AD v1.0 User Guide

LDAP/AD v1.0 User Guide LDAP/AD v1.0 User Guide For v6.5 systems Catalog No. 11-808-615-01 Important changes are listed in Document revision history at the end of this document. UTC 2017. throughout the world. All trademarks

More information

Windows Server 2008 Active Directory Resource Kit

Windows Server 2008 Active Directory Resource Kit Windows Server 2008 Active Directory Resource Kit Stan Reimer, Mike Mulcare, Conan Kezema, Byron Wright w MS AD Team PREVIEW CONTENT This excerpt contains uncorrected manuscript from an upcoming Microsoft

More information

Enforced Client Policy & Reporting Server (EPRS) 2.3. Administration Guide

Enforced Client Policy & Reporting Server (EPRS) 2.3. Administration Guide Enforced Client Policy & Reporting Server (EPRS) 2.3 Copyright 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell, the

More information

Installing the Cisco Unified CallManager Customer Directory Plugin Release 4.3(1)

Installing the Cisco Unified CallManager Customer Directory Plugin Release 4.3(1) Installing the Cisco Unified CallManager Customer Directory Plugin Release 4.3(1) Cisco Unified CallManager uses a Lightweight Directory Access Protocol (LDAP) directory to store data as well as authentication

More information

SPNEGO SINGLE SIGN-ON USING SECURE LOGIN SERVER X.509 CLIENT CERTIFICATES

SPNEGO SINGLE SIGN-ON USING SECURE LOGIN SERVER X.509 CLIENT CERTIFICATES SPNEGO SINGLE SIGN-ON USING SECURE LOGIN SERVER X.509 CLIENT CERTIFICATES TABLE OF CONTENTS SCENARIO... 2 IMPLEMENTATION STEPS... 2 PREREQUISITES... 3 1. CONFIGURE ADMINISTRATOR FOR THE SECURE LOGIN ADMINISTRATION

More information

CA SiteMinder Web Access Manager. Configuring SiteMinder Single Sign On for Microsoft SharePoint 2007 Using Forms-based Authentication

CA SiteMinder Web Access Manager. Configuring SiteMinder Single Sign On for Microsoft SharePoint 2007 Using Forms-based Authentication CA SiteMinder Web Access Manager Configuring SiteMinder Single Sign On for Microsoft SharePoint 2007 Using Forms-based Authentication This documentation and any related computer software help programs

More information

SAP NetWeaver Identity Management Virtual Directory Server. Tutorial. Version 7.0 Rev 4. - Accessing LDAP servers

SAP NetWeaver Identity Management Virtual Directory Server. Tutorial. Version 7.0 Rev 4. - Accessing LDAP servers SAP NetWeaver Identity Management Virtual Directory Server Tutorial - Accessing LDAP servers Version 7.0 Rev 4 SAP Library document classification: PUBLIC No part of this publication may be reproduced

More information

NetWrix Privileged Account Manager Version 4.1 User Guide

NetWrix Privileged Account Manager Version 4.1 User Guide NetWrix Privileged Account Manager Version 4.1 User Guide Table of Contents 1. Introduction... 1 1.1 About Security Roles... 1 2. Configuring Product... 2 2.1 Configuring Child Folders... 2 2.2 Configuring

More information

One Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide

One Identity Active Roles 7.2. Azure AD and Office 365 Management Administrator Guide One Identity Active Roles 7.2 Azure AD and Office 365 Management Administrator Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

User Account Manager

User Account Manager CHAPTER 4 Note User accounts can be accessed only when operating in Internal Directory mode. To access User tasks, log in to the system (see Logging In section on page 2-1). Then, from the Home page, click

More information

Installing CaseMap Server User Guide

Installing CaseMap Server User Guide Installing CaseMap Server User Guide CaseMap Server, Version 1.9 System Requirements Installing CaseMap Server Installing the CaseMap Admin Console Installing the CaseMap SQL Import Utility Testing Installation

More information

Obtaining the LDAP Search string (Distinguished Name)?

Obtaining the LDAP Search string (Distinguished Name)? How to Configure LDAP Sync with the Altium Vault Old Content - see latest equivalent Modified by Jason Howie on 31-May-2017 An LDAP Sync allows the administrator of an Altium Vault to leverage the network

More information

Introduction to LAN Introduction to TDC 363 Lecture 05 Course Outline What is NOS?

Introduction to LAN Introduction to TDC 363 Lecture 05 Course Outline What is NOS? Introduction to LAN TDC 363 Lecture 05 Nt Network rkoprti Operating Systems tm Windows Based Networking NetWare Based Networking Book Reading: Chapters 8 1 Course Outline Network operating system (NOS)

More information

Remote Authentication

Remote Authentication Authentication Services, page 1 Guidelines and Recommendations for Providers, page 2 User Attributes in Providers, page 2 Two-Factor Authentication, page 4 LDAP Providers and Groups, page 5 RADIUS Providers,

More information

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page. Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator

More information

Advanced Multidimensional Reporting

Advanced Multidimensional Reporting Guideline Advanced Multidimensional Reporting Product(s): IBM Cognos 8 Report Studio Area of Interest: Report Design Advanced Multidimensional Reporting 2 Copyright Copyright 2008 Cognos ULC (formerly

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

FastPass Password Manager

FastPass Password Manager FastPass Password Manager Version 3.4.2 Document Title Document Classification Public Document Revision D Document Status Final Document Date April 23, 2012 The specifications and information in this document

More information

TM1 Deployment Options and Bandwidth Considerations

TM1 Deployment Options and Bandwidth Considerations Guideline TM1 Deployment Options and Bandwidth Considerations Product(s): TM1 Area of Interest: Performance TM1 Deployment Options and Bandwidth Considerations 2 Copyright Copyright 2008 Cognos ULC (formerly

More information

8 Administering Groups

8 Administering Groups 8 Administering Groups Exam Objectives in this Chapter: Plan a security group hierarchy based on delegation requirements. Plan a security group strategy. Why This Chapter Matters As an administrator, you

More information

User Management in Resource Manager

User Management in Resource Manager CHAPTER 8 This section describes how to manage user profiles. Topics in this section include: Overview of User Management, page 8-1 Using User Management, page 8-1 Overview of User Management In Resource

More information

LDAP Servers for AAA

LDAP Servers for AAA This chapter describes how to configure LDAP servers used in AAA. About LDAP and the ASA, page 1 Guidelines for, page 5 Configure, page 5 Test LDAP Server Authentication and Authorization, page 9 Monitoring,

More information

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page. Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator

More information

NBC-IG Installation Guide. Version 7.2

NBC-IG Installation Guide. Version 7.2 Installation Guide Version 7.2 2017 Nuance Business Connect 7.2 Installation Guide Document Revision History Revision Date August 8, 2017 Revision List Updated supported SQL Server versions June 14, 2017

More information

How to integrate hp OpenView Service Desk with Microsoft Active Directory

How to integrate hp OpenView Service Desk with Microsoft Active Directory How to integrate hp OpenView Service Desk with Microsoft Active Directory Copyright 2004 Page 1 of 26 Table of Contents Introduction 3 What is Active Directory 4 Installing Active Directory... 5 Working

More information

VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP. For VMware AirWatch

VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP. For VMware AirWatch VMware AirWatch Certificate Authentication for EAS with NDES-MSCEP For VMware AirWatch H a v e d o c u m e n t a t io n f e e d b a c k? S u b m it a D o c u m e n t a t io n F e e d b a c k s u p p o

More information

SAS Web Infrastructure Kit 1.0. Administrator s Guide

SAS Web Infrastructure Kit 1.0. Administrator s Guide SAS Web Infrastructure Kit 1.0 Administrator s Guide The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2004. SAS Web Infrastructure Kit 1.0: Administrator s Guide. Cary,

More information

CaseMap Server Installation Guide

CaseMap Server Installation Guide CaseMap Server Installation Guide About CaseMap Server System Requirements v1.0 System Requirements v1.5 What's New in Version 1.5 Installing the CaseMap Server Installing the CaseMap Admin Console Installing

More information

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit

Installation Guide. . All right reserved. For more information about Specops Deploy and other Specops products, visit . All right reserved. For more information about Specops Deploy and other Specops products, visit www.specopssoft.com Copyright and Trademarks Specops Deploy is a trademark owned by Specops Software. All

More information

IT222 Microsoft Network Operating Systems II

IT222 Microsoft Network Operating Systems II 1 ITT Technical Institute IT222 Microsoft Network Operating Systems II Unit 1: Chapters 1 & 2 2 Chapter 1 OVERVIEW OF ACTIVE DIRECTORY Chapter 1: Overview of Active Directory, pp. 1 23 Chapter 2, Implementing

More information

Azure MFA Integration with NetScaler

Azure MFA Integration with NetScaler Azure MFA Integration with NetScaler This guide focuses on describing the configuration required for integrating Azure MFA (Multi-Factor Authentication) with NetScaler. Citrix.com 1 NetScaler is a world-class

More information

Novell Identity Manager

Novell Identity Manager Role Mapping Administrator User Guide AUTHORIZED DOCUMENTATION Novell Identity Manager 1.0 August 28, 2009 www.novell.com Novell Identity Manager Role Mapping Administrator 1.0 User GuideNovell Identity

More information

User Management Tool

User Management Tool Citrix Product Documentation docs.citrix.com September 21, 2018 Contents What s new 3 What s new in User Management Tool 1.8.1........................... 3 What s new in User Management Tool 1.8............................

More information

VMware AirWatch Integration with Microsoft ADCS via DCOM

VMware AirWatch Integration with Microsoft ADCS via DCOM VMware AirWatch Integration with Microsoft ADCS via DCOM For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Telelogic Directory Server Product Manual Release 4.3

Telelogic Directory Server Product Manual Release 4.3 Telelogic Directory Server Product Manual Release 4.3 Before using this information, be sure to read the general information under Appendix E, Notices on page 106. This edition applies to VERSION 4.3,

More information

Installing CaseMap Server User Guide

Installing CaseMap Server User Guide Installing CaseMap Server User Guide CaseMap Server, Version 2.2 System Requirements Installing CaseMap Server Installing the CaseMap Admin Console Installing the CaseMap SQL Import Utility Testing Installation

More information

Configuring Pentaho with LDAP or Active Directory

Configuring Pentaho with LDAP or Active Directory Configuring Pentaho with LDAP or Active Directory Change log (if you want to use it): Date Version Author Changes 07/2018 1.0 Carlos Lopez Contents Overview... 1 Before You Begin... 1 Prerequisites...

More information

Configuring Embedded LDAP Authentication

Configuring Embedded LDAP Authentication HP Restricted Configuring Embedded LDAP Authentication configure Configuring Embedded LDAP Authentication For HP product models: LaserJet 4345mfp, LaserJet 9040mfp, LaserJet 9050mfp, LaserJet 9500mfp,

More information

Installing the Financial Analytic Publisher (FAP) for Controller 10.2

Installing the Financial Analytic Publisher (FAP) for Controller 10.2 Proven Practice Installing the Financial Analytic Publisher (FAP) for Controller 10.2 Product(s): IBM Cognos Controller Area of Interest: Infrastructure Installing the Financial Analytic Publisher (FAP)

More information

MetaManager 3.3 New Features Guide METAMANAGER AN IBM GLOBAL SOLUTIONS DIRECTORY OFFERING BSP Software LLC 1/5

MetaManager 3.3 New Features Guide METAMANAGER AN IBM GLOBAL SOLUTIONS DIRECTORY OFFERING BSP Software LLC 1/5 METAMANAGER AN IBM GLOBAL SOLUTIONS DIRECTORY OFFERING Version 3.3 New Features Guide 2008 2009 BSP Software LLC 1/5 Product Information This document applies to MetaManager TM Series 3 version 3 and may

More information

Administration Guide. Lavastorm Analytics Engine 6.1.1

Administration Guide. Lavastorm Analytics Engine 6.1.1 Administration Guide Lavastorm Analytics Engine 6.1.1 Lavastorm Analytics Engine 6.1.1: Administration Guide Legal notice Copyright THE CONTENTS OF THIS DOCUMENT ARE THE COPYRIGHT OF LIMITED. ALL RIGHTS

More information

Enabling Smart Card Logon for Mac OS X Using Centrify Suite

Enabling Smart Card Logon for Mac OS X Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Mac OS X Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

Enabling Smart Card Logon for Linux Using Centrify Suite

Enabling Smart Card Logon for Linux Using Centrify Suite DoD Public Key Enablement (PKE) Reference Guide Enabling Smart Card Logon for Linux Using Centrify Suite 2012.4 Contact: dodpke@mail.mil URL: http://iase.disa.mil/pki-pke/ URL: http://iase.disa.smil.mil/pki-pke/

More information

Reconfiguring VMware vsphere Update Manager. 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7

Reconfiguring VMware vsphere Update Manager. 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7 Reconfiguring VMware vsphere Update Manager 17 APR 2018 VMware vsphere 6.7 vsphere Update Manager 6.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Active Directory Synchronisation

Active Directory Synchronisation Active Directory Synchronisation Table of Contents Overview... 3 Important Notes... 3 Installation & Configuration... 4 Configuration & Field Mappings... 4 Attribute Mappings... 7 Adding New Mappings...

More information

RSA Identity Governance and Lifecycle Collector Data Sheet For IBM Tivoli Directory Server

RSA Identity Governance and Lifecycle Collector Data Sheet For IBM Tivoli Directory Server RSA Identity Governance and Lifecycle Collector Data Sheet For IBM Tivoli Directory Server Version 1.2 June 2017 1 Contact Information RSA Link at https://community.rsa.com contains a knowledgebase that

More information

One Identity Manager 8.0. Administration Guide for Connecting to Active Directory

One Identity Manager 8.0. Administration Guide for Connecting to Active Directory One Identity Manager 8.0 Administration Guide for Connecting to Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

BusinessObjects Enterprise XI

BusinessObjects Enterprise XI Overview Contents This document contains information on LDAP authentication and how to configure with this type of authentication. INTRODUCTION... 2 What Is LDAP?...2 LDAP platforms supported by...3 LDAP

More information

DIGIPASS Authentication for O2 Succendo

DIGIPASS Authentication for O2 Succendo DIGIPASS Authentication for O2 Succendo for IDENTIKEY Authentication Server IDENTIKEY Appliance 2009 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 30 Disclaimer Disclaimer of

More information

BLUEPRINT REQUIREMENTS CENTER 2010 BLUEPRINT TEAM REPOSITORY VERSION 2. Administrator s Guide

BLUEPRINT REQUIREMENTS CENTER 2010 BLUEPRINT TEAM REPOSITORY VERSION 2. Administrator s Guide BLUEPRINT REQUIREMENTS CENTER 2010 BLUEPRINT TEAM REPOSITORY VERSION 2 September 2010 Contents Introduction... 2 Repository Configuration Files... 3 User Administration... 5 Appendix A. Instructions for

More information

COGNOS (R) ENTERPRISE BI SERIES COGNOS REPORTNET (TM)

COGNOS (R) ENTERPRISE BI SERIES COGNOS REPORTNET (TM) COGNOS (R) ENTERPRISE BI SERIES COGNOS REPORTNET (TM) GETTING STARTED Cognos ReportNet Getting Started 07-05-2004 Cognos ReportNet 1.1MR1 Type the text for the HTML TOC entry Type the text for the HTML

More information

maxecurity Product Suite

maxecurity Product Suite maxecurity Product Suite Domain Administrator s Manual Firmware v2.2 ii Table of Contents BASICS... 1 Understanding how maxecurity products work in your company... 1 Getting started as a Domain Administrator...

More information

COGNOS (R) ENTERPRISE PLANNING SERIES

COGNOS (R) ENTERPRISE PLANNING SERIES COGNOS (R) ENTERPRISE PLANNING SERIES COGNOS PLANNING CONTRIBUTOR CLIENT LOADER INSTALLATION GUIDE Contributor Client Loader User Guide DD-MM-YYYY Contributor Client Loader please update with product version

More information

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide

Authentication Services ActiveRoles Integration Pack 2.1.x. Administration Guide Authentication Services ActiveRoles Integration Pack 2.1.x Administration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright.

More information

Configuring Remote Access using the RDS Gateway

Configuring Remote Access using the RDS Gateway Configuring Remote Access using the RDS Gateway Author: AC, SNE Contents Introduction... 3 Pre-requisites... 3 Supported Operating Systems... 3 Installing the I.T. Services Certificate Authority Root Certificate...

More information

CA IdentityMinder. Glossary

CA IdentityMinder. Glossary CA IdentityMinder Glossary 12.6.3 This Documentation, which includes embedded help systems and electronically distributed materials, (hereinafter referred to as the Documentation ) is for your informational

More information

Grandstream Networks, Inc. LDAP Configuration Guide

Grandstream Networks, Inc. LDAP Configuration Guide Grandstream Networks, Inc. Table of Contents INTRODUCTION... 4 LDAP SERVER CONFIGURATION... 5 LDAP PHONEBOOK... 6 Access the Default Phonebook DN... 6 Add a New Phonebook DN... 7 Add contacts to Phonebook

More information

Authenticating and Importing Users with AD and LDAP

Authenticating and Importing Users with AD and LDAP Purpose This document describes how to integrate with Active Directory (AD) or Lightweight Directory Access Protocol (LDAP). This allows user authentication and validation through the interface. This is

More information

Novell Kerberos Login Method for NMASTM

Novell Kerberos Login Method for NMASTM Novell Kerberos Login Method for NMASTM 1.0 ADMINISTRATION GUIDE www.novell.com Legal Notices Novell, Inc. makes no representations or warranties with respect to the contents or use of this documentation,

More information

Getting Started with Penn State WikiSpaces

Getting Started with Penn State WikiSpaces Getting Started with Penn State WikiSpaces About Penn State WikiSpaces Penn State WikiSpaces is a platform intended to support Penn State-associated collaboration. Wikis are websites that allow for the

More information