McAfee Cloud Identity Manager

Size: px
Start display at page:

Download "McAfee Cloud Identity Manager"

Transcription

1 Jive Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later

2 COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, Avert, epo, epolicy Orchestrator, Foundstone, GroupShield, IntruShield, LinuxShield, MAX (McAfee SecurityAlliance Exchange), NetShield, PortalShield, Preventsys, SecureOS, SecurityAlliance, SiteAdvisor, SmartFilter, Total Protection, TrustedSource, Type Enforcement, VirusScan, and WebShield are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANTOR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Cloud Identity Manager Jive Cloud Connector Guide

3 Contents 1.0 Introduction to McAfee Cloud Identity Manager Supported environments Supported browsers Application portal Management Console Available documentation Technical support Configuring SSO for a Jive User Configuring SSO in Your Jive Account SAML Metadata Jive Example Configuring a Jive Cloud Connector Select the Cloud Application Type Specifying an Identity Connector Select an Existing Identity Connector Create a New Identity Connector Configure SAML Credential Mapping for a Jive Cloud Connector Add a New Attribute to the Jive Credential Map Configure a SAML Assertion for a Jive Cloud Connector Apply an Authorization Policy to a Jive Cloud Connector Configure the default policy action Configure policy rules and add them to the policy Policy conditions and their Boolean expressions Expression editor examples Review the Jive Cloud Connector Configuration...26 McAfee Cloud Identity Manager Jive Cloud Connector Guide 3

4 4 McAfee Cloud Identity Manager Jive Cloud Connector Guide

5 1.0 Introduction to McAfee Cloud Identity Manager McAfee Cloud Identity Manager (Cloud Identity Manager, formerly Intel Expressway Cloud Access 360-SSO) simplifies the management and secures the use of cloud, Software as a Service (SaaS), and web applications for companies and large organizations. Service and application providers can also use Cloud Identity Manager to simplify and improve the authentication process for their customers. Cloud Identity Manager provides support for the following features: Extensible framework Web single sign on (SSO) Multiple authentication methods Credential mapping and user provisioning Authorization policies and access control enforcement Event auditing and monitoring Connectors for popular cloud services and applications Web-based Management Console Cloud Identity Manager runs as a stand-alone server and is configured by an administrator using a webbased Management Console accessible from a web browser. For information about installing Cloud Identity Manager as a standalone server or as a cluster of servers, see the McAfee Cloud Identity Manager Installation Guide. For information about configuring Cloud Identity Manager in the Management Console, see the McAfee Cloud Identity Manager Product Guide. Cloud Identity Manager provides connectors for many popular cloud services and applications, including Google Apps and Salesforce.com. These connectors are built in to Cloud Identity Manager and simplify the deployment of the cloud service or application in an organization. Web SSO requires configuration in the Management Console and in the cloud application s user interface. Instructions for configuring SSO on the cloud application side are included in the documentation set. For customers who have Java-based or.net web applications that do not support SAML2 authentication, Cloud Identity Manager provides a custom connector. For information about integrating Java-based and.net web applications with Cloud Identity Manager, see the McAfee Cloud Identity Manager Integration Guide. For software developers who want to write their own cloud service connectors or authentication modules, Cloud Identity Manager provides an SDK. For more information about the SDK, see the McAfee Cloud Identity Manager Developer s Guide. McAfee Cloud Identity Manager Jive Cloud Connector Guide 5

6 1.1 Supported environments Cloud Identity Manager supports these environments. Version Architecture IA-32 Intel 64 Linux Operating System Red Hat Enterprise Linux Server and Advanced Platform 5.0 Windows Operating System Yes Yes Windows Server 2003 Standard Edition Yes Yes Windows Server 2003 DataCenter Edition Yes Yes Windows Server 2003 Enterprise Edition Yes Yes Windows Server 2008 Yes Yes 1.2 Supported browsers Cloud Identity Manager supports different browsers for the application portal and the Management Console Application portal For end users who seek access to SaaS and web applications through a portal using Cloud Identity Manager identity services, Cloud Identity Manager supports the following desktop and mobile web browsers. Note that Cloud Identity Manager services are running in the background and are not visible to the end user. Desktop browsers Google Chrome 16 Mozilla Firefox 9 Microsoft Internet Explorer 7, 8, and 9 Safari Mobile browsers Android 2.0 devices and WebKit browser ios devices and Safari browser Management Console The Cloud Identity Manager Management Console is a web-based user interface that provides administrators with a single, central point of management and control through a web browser on a local computer. For Management Console administrators, Cloud Identity Manager supports the following desktop and mobile web browsers. Desktop browsers Firefox 9 Internet Explorer 7, 8, and 9 Mobile browsers None are currently supported. 6 McAfee Cloud Identity Manager Jive Cloud Connector Guide

7 1.3 Available documentation The Cloud Identity Manager documentation set includes the following guides: McAfee Cloud Identity Manager Product Guide A complete guide to the Management Console and the configuration tasks needed to administer Cloud Identity Manager McAfee Cloud Identity Manager Developer s Guide Provides information for software developers who want to write custom Java code that extends Cloud Identity Manager functionality McAfee Cloud Identity Manager Installation Guide Includes the tasks and procedures that you need to install and remove Cloud Identity Manager as a standalone server on Microsoft Windows and Linux operating system platforms McAfee Cloud Identity Manager Integration Guide Provides instructions on how to integrate Javabased and.net web applications that do not support SAML2 authentication with Cloud Identity Manager Note: In addition to these guides, there are separate guides that document how to configure the different Cloud Connectors. For more information, see the McAfee Cloud Identity Manager Product Guide. 1.4 Technical support For technical assistance, contact McAfee support by one of the following options: Support portal: Phone number: McAfee Cloud Identity Manager Jive Cloud Connector Guide 7

8 8 McAfee Cloud Identity Manager Jive Cloud Connector Guide

9 2.0 Configuring SSO for a Jive User Jive offers social business software as a service. The Jive application and Cloud Identity Manager Cloud Connector support Identity Provider (IdP)-initiated authentication. Integrating Jive and Cloud Identity Manager involves the following configuration tasks. For more information, see the corresponding sections: Configuring a Jive Cloud Connector in the Management Console See section 3.0 Configuring a Jive Cloud Connector. Configuring SSO in your Jive account See section 2.1 Configuring SSO in Your Jive Account. Note: The Management Console is the Cloud Identity Manager administrative interface. 2.1 Configuring SSO in Your Jive Account To integrate Jive with Cloud Identity Manager, complete the following steps in your Jive administrator s account. 1. Log in to your Jive administrator s account. 2. Go to People Settings Single Sign On. 3. On the Single Sign On Settings page, select the SAML tab, and then select the General tab. 4. Click Edit Metadata, paste the contents of the SAML metadata file provided by Cloud Identity Manager in the field provided, and click Save Settings to load the data. Loading the metadata populates the General tab with a list of Cloud Identity Manager attributes available for user attribute mapping. Note: For an example of a SAML metadata file, see section SAML Metadata Jive Example. 5. In the User Attribute Mapping area, for each user attribute you want mapped from Cloud Identity Manager to Jive: a. Type the name of the attribute in your Jive profile in the corresponding field in the Attribute Name column. b. Select the corresponding checkbox in the Federated column. 6. Click Save Settings. Note: You can use the settings on the Advanced tab to refine and troubleshoot the SAML integration. McAfee Cloud Identity Manager Jive Cloud Connector Guide 9

10 2.1.1 SAML Metadata Jive Example The following XML code is an example of the SAML metadata that you can use when configuring SAML SSO in your Jive administrator s account. <?xml version="1.0" encoding="utf-8"?> <md:entitydescriptor xmlns:md="urn:oasis:names:tc:saml:2.0:metadata" entityid=" /IdentityProvider.com/identityservice" validuntil=" t02:55:03.831z"> <md:idpssodescriptor protocolsupportenumeration="urn:oasis:names:tc:saml:2.0:protocol"> <md:keydescriptor use="signing"> <ds:keyinfo xmlns:ds=" <ds:x509data> <ds:x509issuerserial> <ds:x509issuername>cn=eca360sso,ou=ssg,o=intel,l=shanghai,s=china,c=cn</ ds:x509issuername> <ds:x509serialnumber> </ds:x509serialnumber> </ds:x509issuerserial> <ds:x509certificate>.. </ds:x509certificate> <ds:x509subjectname>cn=eca360sso,ou=ssg,o=intel,l=shanghai,s=china, C=CN</ ds:x509subjectname> </ds:x509data> </ds:keyinfo> </md:keydescriptor> <md:singlelogoutservice Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location=" JiveConnector"/> <md:nameidformat>urn:oasis:names:tc:saml:1.1:nameid-format:unspecified </ md:nameidformat> <md:singlesignonservice Binding="urn:oasis:names:tc:SAML:2.0:bindings:HTTP-POST" Location=" JiveConnector"/> </md:idpssodescriptor> </md:entitydescriptor> 10 McAfee Cloud Identity Manager Jive Cloud Connector Guide

11 3.0 Configuring a Jive Cloud Connector A Cloud Connector is the configuration that allows Cloud Identity Manager to connect to and provide services for a cloud application. When a Jive Cloud Connector is configured, Cloud Identity Manager can provide identity and SSO services for Jive users. You configure a Jive Cloud Connector in the Cloud Connector wizard in the Management Console. Configuring a Jive Cloud Connector in the wizard involves the following steps. For more information about each step, see the corresponding sections: 1. Cloud Application Type See section 3.1 Select the Cloud Application Type. 2. Identity Connector See section 3.2 Specifying an Identity Connector. 3. SAML Credential Mapping See section 3.3 Configure SAML Credential Mapping for a Jive Cloud Connector. 4. SAML Assertion See section 3.4 Configure a SAML Assertion for a Jive Cloud Connector. 5. Authorization Enforcement See section 3.5 Apply an Authorization Policy to a Jive Cloud Connector. 6. Review See section 3.6 Review the Jive Cloud Connector Configuration. McAfee Cloud Identity Manager Jive Cloud Connector Guide 11

12 3.1 Select the Cloud Application Type A Cloud Connector is the configuration that allows Cloud Identity Manager to connect to and provide services for a cloud application. For example, a Jive Cloud Connector is the configuration that allows Cloud Identity Manager to connect to a Jive application and to provide SSO, SLO, and other services. To select the Jive cloud application type 1. Select the Cloud Connectors tab in the Management Console, and then click New Cloud Connector. The Cloud Connector wizard opens on the Cloud Application Type step. 2. Select the cloud application type: Jive. Note: If the application is not one of the built-in types shown in the Cloud Application Type window, click More to open the More Applications window. This window shows all plug-in cloud application types in the Cloud Identity Manager system. 3. Type a name for the Jive Cloud Connector in the Cloud Connector Name field. Note: The name can contain only letters, numbers, and the following characters:., _ and -. The name cannot contain spaces or exceed 64 characters in length and is not case-sensitive. Specify a meaningful name. For example, a name that identifies the Cloud Connector-Identity Connector combination is more useful than a URL, which can change. 4. Click Next. The Identity Connector step opens. 3.2 Specifying an Identity Connector To specify an Identity Connector, you select an existing Identity Connector or create a new one. There are six types of Identity Connectors: LDAP Integrated Windows Authentication with Active Directory (IWA-AD) ECA360 Token Authentication Authentication Chain SAML2 Proxy Central Authentication Service (CAS) For LDAP and IWA-AD Identity Connectors, identity information is retrieved from an identity store. To configure these Identity Connectors, you specify the ID of the identity store containing the identity information and how to search the specified identity store. To specify the search, you configure the following LDAP parameters: Base DN Specifies where to start searching in the LDAP tree Search Attribute Specifies the user attribute to retrieve from the identity store Search Scope Specifies how many levels to search in the LDAP tree below the Base DN For CAS and other Identity Connectors, identity information is retrieved from an authentication result provided by an external authentication service. To configure one of these Identity Connectors, you specify fields specific to each connector type. 12 McAfee Cloud Identity Manager Jive Cloud Connector Guide

13 3.2.1 Select an Existing Identity Connector If the Identity Connector is already configured, you can select it on the Identity Connector step of the Cloud Connector wizard. The settings on this step depend on the Identity Connector you select. For example, the Enable Additional Authentication Module(s) area is only displayed when the following conditions are met: The selected Identity Connector type is an authentication chain. When the authentication chain was created, one or more authentication modules were configured as Determined by Cloud Connector on the Policy Setting step of the Authentication Module wizard. To enable these modules, select the checkboxes in the Enable Additional Authentication Module(s) area. For more information, see the McAfee Cloud Identity Manager Product Guide. To select an existing Identity Connector 1. Select an existing Identity Connector from the list in the window, or click New Identity Connector to create a new one and add it to the list. 2. (Optional) To test the connection to the Identity Connector, click Test. Note: The Test button is disabled for Identity Connectors of type authentication chain. 3. (Optional) Select a user-defined portal category from the Category drop-down list, click Manage Categories, or both. For more information, see the next section. 4. (Optional) In the Enable Additional Authentication Module(s) area, select the checkboxes corresponding to the authentication modules you want to enable. Note: This area is only displayed when one or more modules in an authentication chain are configured as Determined by Cloud Connector. Example: OTP () 5. Click Next. The Identity Connector configuration is saved. McAfee Cloud Identity Manager Jive Cloud Connector Guide 13

14 Manage User-defined Portal Categories On the Identity Connector step of the Cloud Connector wizard, you can assign a user-defined portal category to the Cloud Connector that you are configuring. User-defined portal categories allow you to group applications having the same category on the application portal associated with that Identity Connector. For example, all applications tagged with the Cash Management category are displayed together on the portal. Each Identity Connector has its own menu of categories. To manage user-defined portal categories 1. To manage user-defined portal categories, click Manage Categories on the Identity Connector step of the Cloud Connector wizard. The Manage Categories dialog box opens. To add a new category, click Add, provide values for the fields in the Add Category dialog box, and click Save. URL Specifies the portal URL that you can use to access the Cloud Identity Manager service and the category ID. This value is provided for you. Name Specifies the name of the new category. Description (Optional) Specifies a description of the new category. To edit an existing category, click Edit, modify the values in the fields in the Edit Category dialog box, and click Save. To remove an existing category, select it in the Manage Categories dialog box, and click Remove. 2. Click OK. The Manage Categories dialog box closes, and the categories are saved and added to the Categories drop-down list in the Identity Connector window. 14 McAfee Cloud Identity Manager Jive Cloud Connector Guide

15 3.2.2 Create a New Identity Connector To create a new Identity Connector, you specify a name and an Identity Connector type. Fields open that correspond to the type that you select. To configure an LDAP or IWA-AD Identity Connector, you create a new or use an existing identity store. To configure a CAS or other Identity Connector, you specify fields specific to that connector type. You begin this procedure on the Identity Connector step of the Cloud Connector wizard. To create a new Identity Connector 1. Click New Identity Connector. The New Identity Connector dialog box opens. 2. Type a name in the Identity Connector field. 3. Select one of the following types from the Identity Connector Type drop-down list: LDAP Integrated Windows Authentication with Active Directory (IWA-AD) ECA360 Token Authentication Authentication Chain SAML2 Proxy Central Authentication Service (CAS) The New Identity Connector dialog box expands to show the parameters required to configure the selected Identity Connector type. 4. Configure the parameters required for the specified Identity Connector type. For more information, see the McAfee Cloud Identity Manager Product Guide. 5. Click Save Identity Connector. The Identity Connector configuration is saved. McAfee Cloud Identity Manager Jive Cloud Connector Guide 15

16 3.3 Configure SAML Credential Mapping for a Jive Cloud Connector On the SAML Credential Mapping step, you map identity information from Cloud Identity Manager to the target application. The Credential Mapping source is the user attribute name in the Cloud Identity Manager system. The target is the attribute name that you specified in the administrator s account of the cloud application. A SAML subject is the user whose identity is authenticated. The SAML subject type is the type of identity information. The SAML subject source is a value that corresponds to the specified subject type. For example, if the subject type is an authentication result, the subject source is an attribute value output by the Identity Connector. Note: For instructions on how to add a new or edit an existing target-source attribute mapping, see section Add a New Attribute to the Jive Credential Map. To configure SAML credential mapping for a Jive Cloud Connector 1. Select one of the following options from the Subject Type drop-down list, and then specify the Subject Source: CONSTANT Select this subject type if the identity information has a constant value, and then type the constant value in the Subject Source field. AUTHN_RESULT_FIELD Select this subject type if the identity information is one of the user attributes output by the Identity Connector, and then select the user attribute from the Subject Source drop-down list. EXPRESSION Select this subject type if the identity information is the result of an expression, and then type the expression in the Subject Source field. 2. In the table on the Credential Mapping step, you have the following options: Add Click Add to open the New attribute dialog box, configure a new target-source attribute mapping, and add it to the table. Edit Select a row in the table, and click Edit to open the editor and modify an existing target-source attribute mapping. Remove Select a row in the table, and click Remove to remove the target-source attribute mapping from the table. 3. Click Next. The SAML Assertion step opens. 16 McAfee Cloud Identity Manager Jive Cloud Connector Guide

17 3.3.1 Add a New Attribute to the Jive Credential Map You add a new target-source pair to the credential or user account mapping table. To edit an existing target-source pair, you follow the same steps. To add a target-source pair to the credential or user account mapping table 1. Type the name of the attribute that Jive is expecting in the Target name field. 2. Select one of the following options from the Source type drop-down list: CONSTANT Select this source type if the identity information has a constant value, and then type the constant value in the Constant value field. AUTHN_RESULT_FIELD Select this source type if the identity information is one of the user attributes output by the Identity Connector, and then select the user attribute from the Authentication result drop-down list EXPRESSION Select this source type if the identity information is the result of an expression, and then type the expression in the Expression value field. 3. (Optional) When the SAML2 attribute mapping requires additional attributes, select the More options for attribute checkbox. In the table that opens, add the additional attribute name-value pairs. 4. Click Ok. The New attribute dialog box closes, and the new target-source attribute pair is added to the table on the Credential Mapping step. McAfee Cloud Identity Manager Jive Cloud Connector Guide 17

18 3.4 Configure a SAML Assertion for a Jive Cloud Connector You configure a SAML assertion on the SAML Assertion step of the Jive Cloud Connector wizard. To configure a SAML assertion for a Jive Cloud Connector 1. In the Cloud Issuer URL field, specify the URL of the X.509 certificate issuer used by Jive. 2. From the X509 Certificate drop-down list, select the X.509 certificate provided by Jive. 3. In the ACS URL field, specify the URL of the Assertion Consumer Service (ACS) that Jive uses to consume SAML assertions issued by Cloud Identity Manager. 4. From the Signature Key drop-down list, select the key pair that Cloud Identity Manager uses to sign SAML assertions. 5. In the SAML Assertion Issuer field, specify the URL of the Cloud Identity Manager service that issues SAML assertions. Format: hostname Specifies the name of the server on which Cloud Identity Manager is installed. portnumber Specifies the port number of the server on which Cloud Identity Manager is installed. Default: In the SLO URL field, specify the URL of the Jive SLO endpoint. 7. Specify the following fields in the Conditions area: Clock Skew Specifies a value to use when calculating the SAML assertion s expiration time. This value is designed to offset small differences between clocks in different security domains. Default value: 20 Units: seconds Lifetime Specifies a lifetime value to use when calculating the SAML assertion s expiration time. When the expiration time is exceeded, the SAML assertion is invalidated by the assertion consumer. When specifying the lifetime value, take into account the estimated transmission latency between security domains. Default value: 60 Units: seconds 8. Click Next. The Authorization Enforcement step opens. 18 McAfee Cloud Identity Manager Jive Cloud Connector Guide

19 3.5 Apply an Authorization Policy to a Jive Cloud Connector On the Authorization Enforcement step of the Cloud Connector wizard, you can build an authorization policy that determines which users can access your cloud application and under what conditions. To build the policy, you configure individual policy rules and add them to the overall policy. Each rule consists of an expression, which can be made up of sub expressions. Each rule has an action, as does the overall policy. The rule action is to permit or deny access to your cloud application when the rule evaluates to TRUE. The overall policy action the default action is to permit or deny access to your cloud application when none of the rules in the policy evaluates to TRUE. When the policy configuration area first opens, the default policy action is set to deny access Configure the default policy action Configure the overall policy action for when none of the rules in the policy evaluates to TRUE. 1. Select the Enable Authorization Policy checkbox. The policy configuration area opens. 2. To modify the overall policy action, click the Permit access to myapp or Deny access to myapp link that is shown, where myapp is the name of your cloud application, select an option in the Change Default Action dialog box, and click OK. McAfee Cloud Identity Manager Jive Cloud Connector Guide 19

20 3.5.2 Configure policy rules and add them to the policy Each policy rule has an action and consists of an expression, which can be made up of sub expressions. 1. Click Add Rule, select an option in the Rule Action dialog box, and click OK. The new rule is added above the Add Rule button and shown with the selected permit or deny action. 2. Configure the new rule by clicking the following options. For more information about configuring expressions, see section Policy conditions and their Boolean expressions. Table 1. Option Policy Rule Configuration Options Description (Permit Deny) access to myapp Delete Rule AND OR +! Move Down Move Up Toggles the rule s action from permit to deny and deny to permit. Note: myapp is the name you assign to the Cloud Connector. Deletes the rule. Toggles the Boolean operators that specify whether the relationship among the expressions in the group at the current level of the rule have an AND relationship or an OR relationship. Note: All expressions at one level in the rule have the same Boolean relationship. Opens the Add Expression dialog box where you can configure an expression and add it to the rule. Note: Clicking the + sign above a group of expressions adds the expression to the bottom of the group. Clicking the + sign to the right side of an individual expression creates a sub group that consists of the selected expression and the new expression. Alternately adds the NOT operator to and removes the NOT operator from the group of expressions at the current level in the rule. Moves the rule down one position in the rule list in the configuration area. Note: This option is only visible when more than one rule is added to the policy. Moves the rule up one position in the rule list in the configuration area. Note: This option is only visible when more than one rule is added to the policy. 3. Click Next. The Review step opens. 20 McAfee Cloud Identity Manager Jive Cloud Connector Guide

21 3.5.3 Policy conditions and their Boolean expressions When you configure an expression, you first select the expression type or condition. When the condition is met, the expression evaluates to TRUE. The conditions and their corresponding Boolean expressions are shown in the following table. Condition Access Time Day of Week Client IP Address Client Device Subject Attribute Match Advanced Expression Boolean Expression The time of access falls within the specified time range. The day of the week belongs to the specified set of days. The client IP address falls within the specified address range. The client device has one of the specified types. The user attribute value meets the specified match. The specified Boolean expression evaluates to TRUE Restrict access to the specified time range You can restrict when users are allowed to access your application to a specified time range. 1. Click + to open the Add Expression dialog box. 2. Select Access Time from the Expression Type drop-down list. 3. Select an operator from the Access Time drop-down list, and specify the required values: Between Select a starting and ending time for the time range from the From and To dropdown lists, respectively. Greater than Select a value from the Time drop-down list. Less than Select a value from the Time drop-down list. Greater than or equal to Select a value from the Time drop-down list. Less than or equal to Select a value from the Time drop-down list. 4. Click OK to close the dialog box and add the expression to the policy rule Restrict access to specified days of the week You can restrict when users are allowed to access your application to specified days of the week. 1. Click + to open the Add Expression dialog box. 2. Select Day of Week from the Expression Type drop-down list. 3. Select one or more of the checkboxes corresponding to the days of the week. 4. Click OK to close the dialog box and add the expression to the policy rule. McAfee Cloud Identity Manager Jive Cloud Connector Guide 21

22 Restrict access to the specified range of client IP addresses You can restrict access to your application to users having an IP address in the specified range. 1. Click + to open the Add Expression dialog box. 2. Select Client IP from the Expression Type drop-down list. 3. Select an operator from the IP Address drop-down list, and specify the required values: Between Select a starting and ending IP address for the address range from the From and To drop-down lists, respectively. Equals Type a valid IP address in the IP field. Greater than Type a valid IP address in the IP field. Less than Type a valid IP address in the IP field. Greater than or equal to Type a valid IP address in the IP field. Less than or equal to Type a valid IP address in the IP field. Masked IP address Type values for the base IP address and the bit mask in the Base IP and Mask fields, respectively. 4. Click OK to close the dialog box and add the expression to the policy rule Restrict access to specified client devices You can restrict access to your application to users on a personal computer or a mobile device. 1. Click + to open the Add Expression dialog box. 2. Select Client Device from the Expression Type drop-down list. 3. Select one or both of the following checkboxes: PC Allows users on a personal computer to access your application. Mobile Allows users on a mobile device to access your application. 4. Click OK to close the dialog box and add the expression to the policy rule Restrict access to subjects having the specified attribute value You can restrict access to your application to subjects or users having a specified attribute value. To do so, you specify the subject type and the subject source. The subject type is the type of identity information. The subject source is a value that corresponds to the specified subject type. For example, if the subject type is an authentication result, the subject source is an attribute output by the Identity Connector. 1. Click + to open the Add Expression dialog box. 2. Select Subject Attribute Match Expression from the Expression Type drop-down list. 3. Select an option from the Subject Type drop-down list: CONSTANT Type a constant value in the Subject Source field. AUTHN_RESULT_FIELD Select a user attribute from the Subject Source drop-down list. EXPRESSION Type an expression in the Subject Source field. 4. Select an option from the Operator drop-down list, and specify the required values: Equals The user attribute value must equal the value you specify in the Value field. Contains The user attribute value must contain the value you specify in the Value field. Starts with The user attribute value must start with the value you specify in the Value field. Ends with The user attribute value must end with the value you specify in the Value field. Matches (regular expression) The user attribute value must equal the result of the regular expression you specify in the Regex field. In list The user attribute value must belong to the list of specified values. 5. Click OK to close the dialog box and add the expression to the policy rule. 22 McAfee Cloud Identity Manager Jive Cloud Connector Guide

23 Restrict access based on the specified expression You can restrict access to your application based on whether the expression you specify evaluates to TRUE or FALSE. To build the expression, you select and combine components from the drop-down lists with text that you type in the expression editor. 1. Click + to open the Add Expression dialog box. 2. Select Advanced Expression from the Expression Type drop-down list. 3. Click Edit to open the Expression editor. 4. Select components from the following drop-down lists, and add them to the expression. Built-in Library Function Select the following built-in function: $AuthnResult.isIPInRange Tests whether the client computer s IP address falls within the specified range. Syntax: $AuthnResult.isIPInRange(low_IP,high_IP,target_IP) Parameters low_ip Specifies the beginning value of the IP address range. high_ip Specifies the ending value of the IP address range. target_ip Specifies the IP address of the client computer seeking access to the application. Return Value Returns one of the following values: TRUE The client IP address falls within the specified range. FALSE The client IP address does not fall within the specified range. Built-in Library Variable Select one of the following built-in variables: $IP Specifies the IP address of the client computer seeking access to the application. $UserAgent Specifies the web browser s user agent which provides information about whether the browser is running on a personal computer or mobile device. AuthnResult Select an attribute from the AuthnResult drop-down list. Example: mail Expression: $AuthnResult.getField("mail") Note: This attribute is an authentication result output by the Identity Connector or by the preceding authentication module in an authentication chain. Operator Select an operator from the Operator drop-down list. Example: contains Expression: $AuthnResult.getField("mail") contains Note: The available operators are: ==,!=, >, <, >=, <=, contains, &&,, or, ~=, +, -, *, %, /, and =. 5. Complete the expression by typing in the Expression editor field. Example: mcafee.com Expression: $AuthnResult.getField("mail") contains "mcafee.com" McAfee Cloud Identity Manager Jive Cloud Connector Guide 23

24 6. Click OK to close the Expression editor. 7. Click OK to close the dialog box and add the expression to the policy rule Expression editor examples The following examples show how to build an expression using the expression editor. Expression editor: example 1 The expression in the following example retrieves the attribute corporation from the authentication results and compares its value to the empty string on the right side of the expression. If the expression evaluates to TRUE, the user is not part of any corporation. If the Rule Effect is set to Deny, the user is denied access to the SaaS or web application. To create this expression: 1. Select the attribute corporation from the AuthnResult drop-down list. 2. Select the operator == from the Operator drop-down list. 3. Type the double quotes in the Expression editor field. 4. Click OK. 24 McAfee Cloud Identity Manager Jive Cloud Connector Guide

25 Expression editor: example 2 The expression in the following example uses the built-in library function $AuthnResult.isIPInRange and the built-in library variables: $IP and $UserAgent. The expression evaluates to TRUE if one or more of these conditions are met: The client computer IP address falls within the specified range. The client computer IP address equals the specified value. The web browser is running on an iphone. If the expression evaluates to TRUE and the Rule Effect is set to Permit, the user is granted access to the SaaS or web application. To create this expression: 1. Select $AuthnResult.isIPInRange from the Built-in Library Function drop-down list. 2. Type the low and high IP addresses that specify the range inside the first two pairs of quotes inside the parentheses. 3. Replace the third pair of quotes with the Built-in Library Variable $IP, which is the IP address of the client computer seeking access to the application. 4. Select the operator from the Operator drop-down list. 5. Select $IP from the Built-in Library Variable drop-down list. 6. Select the operator == from the Operator drop-down list. 7. Type an IP address enclosed in quotes in the Expression editor field. 8. Select the operator from the Operator drop-down list. 9. Select $UserAgent from the Built-in Library Variable drop-down list. 10. Select the operator contains from the Operator drop-down list. 11. Type iphone (including the quotes) in the Expression editor field. 12. Click OK. McAfee Cloud Identity Manager Jive Cloud Connector Guide 25

26 3.6 Review the Jive Cloud Connector Configuration On the Review step of the Cloud Connector wizard, you can view the application type, application name, and the Identity Connector. You can also test the configuration with the SSO test URL that is provided. The alias is a short name that you can use in place of the longer SSO test URL. To accept and save the configuration, click Finish. 26 McAfee Cloud Identity Manager Jive Cloud Connector Guide

27

28 Order Number: US [Revision A]

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager BoxNet Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Syncplicity Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Marketo Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Coupa Cloud Connector Guide McAfee Cloud Identity Manager version 2.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager WebExConnect Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager IdeaScale Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Google Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager EchoSign Provisioning Connector Guide McAfee Cloud Identity Manager version 3.5 and later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Firewall Enterprise epolicy Orchestrator

Firewall Enterprise epolicy Orchestrator Integration Guide McAfee Firewall Enterprise epolicy Orchestrator Extension version 5.2.1 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Provisioning SDK Guide McAfee Cloud Identity Manager version 3.5 COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

McAfee SiteAdvisor Enterprise 3.5.0

McAfee SiteAdvisor Enterprise 3.5.0 Installation Guide McAfee SiteAdvisor Enterprise 3.5.0 for use with epolicy Orchestrator 4.5 4.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced,

More information

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform

Installation Guide. McAfee Web Gateway. for Riverbed Services Platform Installation Guide McAfee Web Gateway for Riverbed Services Platform COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Cloud Identity Manager Installation Guide For McAfee Cloud Identity Manager v3.1 August 2012

McAfee Cloud Identity Manager Installation Guide For McAfee Cloud Identity Manager v3.1 August 2012 McAfee Cloud Identity Manager Installation Guide For McAfee Cloud Identity Manager v3.1 August 2012 Order Number: 326712-005US COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK

More information

Release Notes for McAfee(R) Security for Microsoft Exchange(TM) Version 8.0 Copyright (C) 2013 McAfee, Inc. All Rights Reserved

Release Notes for McAfee(R) Security for Microsoft Exchange(TM) Version 8.0 Copyright (C) 2013 McAfee, Inc. All Rights Reserved Release Notes for McAfee(R) Security for Microsoft Exchange(TM) Version 8.0 Copyright (C) 2013 McAfee, Inc. All Rights Reserved ========================================================== Release date:

More information

Product Guide. McAfee Plugins for Microsoft Threat Management Gateway Software

Product Guide. McAfee Plugins for Microsoft Threat Management Gateway Software Product Guide McAfee Plugins for Microsoft Threat Management Gateway 1.4.0 Software COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Release Notes - McAfee Deep Defender 1.0

Release Notes - McAfee Deep Defender 1.0 Release Notes - McAfee Deep Defender 1.0 About this document About this release Features Known issues Documentation Before installing McAfee Deep Defender 1.0 Installing McAfee Deep Defender 1.0 About

More information

McAfee Firewall Enterprise epolicy Orchestrator Extension

McAfee Firewall Enterprise epolicy Orchestrator Extension Integration Guide Revision A McAfee Firewall Enterprise epolicy Orchestrator Extension COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

Product Guide Revision A. McAfee Client Proxy 2.3.2

Product Guide Revision A. McAfee Client Proxy 2.3.2 Product Guide Revision A McAfee Client Proxy 2.3.2 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee epolicy Orchestrator 4.5 Hardware Sizing and Bandwidth Usage Guide

McAfee epolicy Orchestrator 4.5 Hardware Sizing and Bandwidth Usage Guide McAfee epolicy Orchestrator 4.5 Hardware Sizing and Bandwidth Usage Guide COPYRIGHT Copyright 009 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Installation Guide McAfee Firewall Enterprise (Sidewinder ) on Riverbed Services Platform

Installation Guide McAfee Firewall Enterprise (Sidewinder ) on Riverbed Services Platform Installation Guide McAfee Firewall Enterprise (Sidewinder ) on Riverbed Services Platform version 7.0.1.02 COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be

More information

Installation Guide. McAfee Web Gateway Cloud Service

Installation Guide. McAfee Web Gateway Cloud Service Installation Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Change Control Using Change Reconciliation and Ticket-based Enforcement

McAfee Change Control Using Change Reconciliation and Ticket-based Enforcement 6.0.0 Using Change Reconciliation and Ticket-based Enforcement COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

McAfee MVISION Endpoint 1808 Installation Guide

McAfee MVISION Endpoint 1808 Installation Guide McAfee MVISION Endpoint 1808 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Using VMware Horizon Workspace to Enable SSO in VMware vcloud Director 5.1

Using VMware Horizon Workspace to Enable SSO in VMware vcloud Director 5.1 Using VMware Horizon Workspace to Enable SSO in VMware vcloud Director 5.1 March 2013 Using VMware Horizon Workspace to Enable SSO This product is protected by U.S. and international copyright and intellectual

More information

Data Loss Prevention Discover 11.0

Data Loss Prevention Discover 11.0 Installation Guide Data Loss Prevention Discover 11.0 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Release Notes for McAfee(R) Security for Lotus Domino(TM) Version 7.5 with Patch 2 Hotfix Copyright (C) 2013 McAfee, Inc. All Rights Reserved

Release Notes for McAfee(R) Security for Lotus Domino(TM) Version 7.5 with Patch 2 Hotfix Copyright (C) 2013 McAfee, Inc. All Rights Reserved Release Notes for McAfee(R) Security for Lotus Domino(TM) Version 7.5 with Patch 2 Hotfix 904321 Copyright (C) 2013 McAfee, Inc. All Rights Reserved ==========================================================

More information

McAfee Content Security Reporter 2.6.x Migration Guide

McAfee Content Security Reporter 2.6.x Migration Guide McAfee Content Security Reporter 2.6.x Migration Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Installation Guide. McAfee Endpoint Security for Servers 5.0.0

Installation Guide. McAfee Endpoint Security for Servers 5.0.0 Installation Guide McAfee Endpoint Security for Servers 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Migration Guide. McAfee Content Security Reporter 2.4.0

Migration Guide. McAfee Content Security Reporter 2.4.0 Migration Guide McAfee Content Security Reporter 2.4.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee MVISION Endpoint 1811 Installation Guide

McAfee MVISION Endpoint 1811 Installation Guide McAfee MVISION Endpoint 1811 Installation Guide COPYRIGHT Copyright 2019 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Boot Attestation Service 3.5.0

McAfee Boot Attestation Service 3.5.0 Product Guide McAfee Boot Attestation Service 3.5.0 For use with epolicy Orchestrator 4.6.7, 4.6.8, 5.1.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

Boot Attestation Service 3.0.0

Boot Attestation Service 3.0.0 Product Guide Boot Attestation Service 3.0.0 For use with epolicy Orchestrator 4.6.0, 5.0.0 Software COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee,

More information

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator)

McAfee Application Control Windows Installation Guide. (McAfee epolicy Orchestrator) McAfee Application Control 8.1.0 - Windows Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

Integration Guide. SafeNet Authentication Service. Protecting Syncplicity with SAS

Integration Guide. SafeNet Authentication Service. Protecting Syncplicity with SAS SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud)

McAfee Agent Interface Reference Guide. (McAfee epolicy Orchestrator Cloud) McAfee Agent 5.5.0 Interface Reference Guide (McAfee epolicy Orchestrator Cloud) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide Administrator's guide for providing Integration with Microsoft Intune MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.3 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Client Proxy Product Guide

McAfee Client Proxy Product Guide McAfee Client Proxy 2.3.5 Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM, Foundstone,

More information

McAfee. Deployment and User Guide. epo 4 / Endpoint Encryption

McAfee. Deployment and User Guide. epo 4 / Endpoint Encryption McAfee Deployment and User Guide epo 4 / Endpoint Encryption 1 McAfee, Inc. McAfee, Inc. 3965 Freedom Circle, Santa Clara, CA 95054, USA Tel: (+1) 888.847.8766 For more information regarding local McAfee

More information

McAfee Host Intrusion Prevention 8.0

McAfee Host Intrusion Prevention 8.0 Product Guide Self Protection addendum Revision A McAfee Host Intrusion Prevention 8.0 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel and McAfee logos, McAfee Active Protection,

More information

McAfee Solidcore Platform Support Matrix Version (Nov 16, 2011)

McAfee Solidcore Platform Support Matrix Version (Nov 16, 2011) McAfee Solidcore Platform Support Matrix Version 5.1.2 (Nov 16, 2011) COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Total Protection Service

Total Protection Service User Guide McAfee Total Protection Service for Microsoft Windows Home Server COPYRIGHT Copyright 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator)

McAfee Client Proxy Product Guide. (McAfee epolicy Orchestrator) McAfee Client Proxy 2.3.4 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

Account Management. Administrator Guide. Secure Gateway (SEG) Service Administrative Guides. Revised August 2013

Account Management. Administrator Guide. Secure  Gateway (SEG) Service Administrative Guides. Revised August 2013 Secure E-Mail Gateway (SEG) Service Administrative Guides Account Management Administrator Guide Revised August 2013 * The Directory Services Connector (DSC) feature is not included as a standard feature

More information

McAfee Client Proxy Installation Guide

McAfee Client Proxy Installation Guide McAfee Client Proxy 2.3.5 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee EMM,

More information

Product Guide. McAfee Enterprise Mobility Management (McAfee EMM ) 9.6

Product Guide. McAfee Enterprise Mobility Management (McAfee EMM ) 9.6 Product Guide McAfee Enterprise Mobility Management (McAfee EMM ) 9.6 COPYRIGHT Copyright 2011 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee MVISION Mobile IBM MaaS360 Integration Guide

McAfee MVISION Mobile IBM MaaS360 Integration Guide McAfee MVISION Mobile IBM MaaS360 Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee MVISION Mobile Silverback Integration Guide

McAfee MVISION Mobile Silverback Integration Guide McAfee MVISION Mobile Silverback Integration Guide Administrator's guide for providing Integration with Silverback MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0

Reference Guide Revision B. McAfee Cloud Workload Security 5.0.0 Reference Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

McAfee MVISION Mobile Microsoft Intune Integration Guide

McAfee MVISION Mobile Microsoft Intune Integration Guide McAfee MVISION Mobile Microsoft Intune Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0

Installation Guide Revision B. McAfee Cloud Workload Security 5.0.0 Installation Guide Revision B McAfee Cloud Workload Security 5.0.0 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Installation Guide. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Installation Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee MVISION Mobile IBM MaaS360 Integration Guide

McAfee MVISION Mobile IBM MaaS360 Integration Guide McAfee MVISION Mobile IBM MaaS360 Integration Guide Administrator's guide for providing Integration with IBM MaaS360 MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

Release Notes for McAfee(R) VirusScan Enterprise for Linux Version Hotfix Copyright (C) 2013 McAfee, Inc. All Rights Reserved

Release Notes for McAfee(R) VirusScan Enterprise for Linux Version Hotfix Copyright (C) 2013 McAfee, Inc. All Rights Reserved Release Notes for McAfee(R) VirusScan Enterprise for Linux Version 1.9.0 Hotfix 872066 Copyright (C) 2013 McAfee, Inc. All Rights Reserved ============================================================ Release

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Rogue Database Detection For use with epolicy Orchestrator Software

McAfee Rogue Database Detection For use with epolicy Orchestrator Software McAfee Rogue Database Detection 1.0.0 For use with epolicy Orchestrator 4.6.0 Software COPYRIGHT Copyright 2012 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo,

More information

Archiving Service. Exchange server setup (2010) Secure Gateway (SEG) Service Administrative Guides

Archiving Service. Exchange server setup (2010) Secure  Gateway (SEG) Service Administrative Guides Secure E-Mail Gateway (SEG) Service Administrative Guides Archiving Service Exchange server setup (2010) 2014 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks

More information

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security Migration Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security 10.6.0 - Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee MVISION Mobile Citrix XenMobile Integration Guide

McAfee MVISION Mobile Citrix XenMobile Integration Guide McAfee MVISION Mobile Citrix XenMobile Integration Guide MVISION Mobile Console 4.22 February 11, 2019 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active

More information

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder )

Application Note. Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) Application Note Providing Secure Remote Access to Industrial Control Systems Using McAfee Firewall Enterprise (Sidewinder ) This document describes how to configure McAfee Firewall Enterprise to provide

More information

Cloud Access Manager Configuration Guide

Cloud Access Manager Configuration Guide Cloud Access Manager 8.1.3 Configuration Guide Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

McAfee Endpoint Security

McAfee Endpoint Security Migration Guide McAfee Endpoint Security 10.2.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.2 COPYRIGHT 2017 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

========================================================== Release date: December 03, This release was developed and tested with:

========================================================== Release date: December 03, This release was developed and tested with: Release Notes for McAfee(R) Security (TM) for Lotus Domino, version 7.5 on Microsoft Windows. Rollup1 Copyright (C) 2012 McAfee, Inc. All Rights Reserved ==========================================================

More information

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator)

McAfee Content Security Reporter Release Notes. (McAfee epolicy Orchestrator) McAfee Content Security Reporter 2.5.0 Release Notes (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Endpoint Security Threat Prevention Installation Guide - Linux

McAfee Endpoint Security Threat Prevention Installation Guide - Linux McAfee Endpoint Security 10.5.1 - Threat Prevention Installation Guide - Linux COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Configure ISE 2.3 Guest Portal with OKTA SAML SSO

Configure ISE 2.3 Guest Portal with OKTA SAML SSO Configure ISE 2.3 Guest Portal with OKTA SAML SSO Contents Introduction Prerequisites Requirements Components Used Background Information Federated SSO Network Flow Configure Step 1. Configure SAML Identity

More information

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE Integrating VMware Workspace ONE with Okta VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0

McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 Migration Guide McAfee Management for Optimized Virtual Environments AntiVirus 4.5.0 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel

More information

Addendum. McAfee Virtual Advanced Threat Defense

Addendum. McAfee Virtual Advanced Threat Defense Addendum McAfee Virtual Advanced Threat Defense 3.10.0 COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel Corporation in the US and/or

More information

McAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator)

McAfee Drive Encryption Client Transfer Migration Guide. (McAfee epolicy Orchestrator) McAfee Drive Encryption 7.2.5 Client Transfer Migration Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Data Protection for Cloud 1.0.1

McAfee Data Protection for Cloud 1.0.1 Product Guide McAfee Data Protection for Cloud 1.0.1 For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,

More information

Introduction to application management

Introduction to application management Introduction to application management To deploy web and mobile applications, add the application from the Centrify App Catalog, modify the application settings, and assign roles to the application to

More information

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide

McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide McAfee Cloud Workload Security Suite Amazon Machine Image Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee MVISION Mobile MobileIron Integration Guide

McAfee MVISION Mobile MobileIron Integration Guide McAfee MVISION Mobile MobileIron Integration Guide Administrator's guide for providing Integration with MobileIron MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee

More information

McAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide

McAfee Endpoint Security for Linux Threat Prevention Interface Reference Guide McAfee Endpoint Security for Linux Threat Prevention 10.5.0 Interface Reference Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Installation Guide. McAfee epolicy Orchestrator software D R A F T

Installation Guide. McAfee epolicy Orchestrator software D R A F T Installation Guide McAfee epolicy Orchestrator 4.6.0 software COPYRIGHT Copyright 2010 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored

More information

SAML-Based SSO Configuration

SAML-Based SSO Configuration Prerequisites, page 1 SAML SSO Configuration Task Flow, page 5 Reconfigure OpenAM SSO to SAML SSO Following an Upgrade, page 9 SAML SSO Deployment Interactions and Restrictions, page 9 Prerequisites NTP

More information

McAfee Application Control Windows Installation Guide

McAfee Application Control Windows Installation Guide McAfee Application Control 8.2.0 - Windows Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee

More information

Five9 Plus Adapter for Agent Desktop Toolkit

Five9 Plus Adapter for Agent Desktop Toolkit Cloud Contact Center Software Five9 Plus Adapter for Agent Desktop Toolkit Administrator s Guide September 2017 The Five9 Plus Adapter for Agent Desktop Toolkit integrates the Five9 Cloud Contact Center

More information

Migration Guide. McAfee File and Removable Media Protection 5.0.0

Migration Guide. McAfee File and Removable Media Protection 5.0.0 Migration Guide McAfee File and Removable Media Protection 5.0.0 COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766, www.intelsecurity.com TRADEMARK

More information

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1 VMware Workspace ONE Quick Configuration Guide VMware AirWatch 9.1 A P R I L 2 0 1 7 V 2 Revision Table The following table lists revisions to this guide since the April 2017 release Date April 2017 June

More information

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0

Product Guide. McAfee Endpoint Upgrade Assistant 1.5.0 Product Guide McAfee Endpoint Upgrade Assistant 1.5.0 COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

McAfee epolicy Orchestrator 5.9.1

McAfee epolicy Orchestrator 5.9.1 Configuration Guide McAfee epolicy Orchestrator 5.9.1 Hosted in Microsoft Azure Cloud Services and Amazon Web Services (AWS) McAfee epolicy Orchestrator 5.9.1 Configuration Guide 1 COPYRIGHT Copyright

More information

McAfee Endpoint Security Threat Prevention Installation Guide - macos

McAfee Endpoint Security Threat Prevention Installation Guide - macos McAfee Endpoint Security 10.5.5 - Threat Prevention Installation Guide - macos COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

Five9 Plus Adapter for Microsoft Dynamics CRM

Five9 Plus Adapter for Microsoft Dynamics CRM Cloud Contact Center Software Five9 Plus Adapter for Microsoft Dynamics CRM Administrator s Guide September 2017 This guide describes how to install and configure the Five9 Plus Adapter for Microsoft Dynamics

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator 5.9.0) McAfee Endpoint Upgrade Assistant 1.6.0 Product Guide (McAfee epolicy Orchestrator 5.9.0) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee MVISION Mobile epo Extension Product Guide

McAfee MVISION Mobile epo Extension Product Guide McAfee MVISION Mobile epo Extension 1809 Product Guide September 11, 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Upgrade Assistant Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Upgrade Assistant 2.0.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy

More information

McAfee Enterprise Mobility Management 12.0 Software

McAfee Enterprise Mobility Management 12.0 Software Product Guide McAfee Enterprise Mobility Management 12.0 Software For use with epolicy Orchestrator 4.6.7-5.1 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS

More information

McAfee MVISION Mobile AirWatch Integration Guide

McAfee MVISION Mobile AirWatch Integration Guide McAfee MVISION Mobile AirWatch Integration Guide Administrator's guide for providing Integration with AirWatch MDM September 2018 COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and

More information

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator)

McAfee Endpoint Security for Servers Product Guide. (McAfee epolicy Orchestrator) McAfee Endpoint Security for Servers 5.1.0 Product Guide (McAfee epolicy Orchestrator) COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection,

More information

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide

McAfee Endpoint Upgrade Assistant 2.3.x Product Guide McAfee Endpoint Upgrade Assistant 2.3.x Product Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo,

More information

McAfee Policy Auditor 6.2.2

McAfee Policy Auditor 6.2.2 Release Notes McAfee Policy Auditor 6.2.2 For use with McAfee epolicy Orchestrator COPYRIGHT 2016 Intel Corporation TRADEMARK ATTRIBUTIONS Intel and the Intel logo are registered trademarks of the Intel

More information

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide

Revision A. McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide Revision A McAfee Data Loss Prevention Endpoint 11.1.x Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee File and Removable Media Protection Installation Guide

McAfee File and Removable Media Protection Installation Guide McAfee File and Removable Media Protection 5.0.8 Installation Guide COPYRIGHT Copyright 2018 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator,

More information

McAfee epolicy Orchestrator Software

McAfee epolicy Orchestrator Software User Guide McAfee epolicy Orchestrator 5.3.0 Software COPYRIGHT Copyright 2014 McAfee, Inc. Do not copy without permission. TRADEMARK ATTRIBUTIONS McAfee, the McAfee logo, McAfee Active Protection, McAfee

More information