Integrating a directory server

Size: px
Start display at page:

Download "Integrating a directory server"

Transcription

1 Integrating a directory server Knox Manage provides a directory service that integrates a client's directory server through a Lightweight Directory Access Protocol (LDAP)-based Active Directory service in order to access intracompany data. This directory service, integrated with Knox Manage, can be used to authenticate user information, and then register users, groups, or organizations on the Knox Manager server, and/or to simplify the user registration process within the company through VPN, Microsoft Exchange, Certificate, or Account integration. The directory service in Knox Manage can be used as follows: 1. Directory server integration: Register server connection information including the directory server IP address and port number. For more information, see Adding directory server. When connecting Knox Manage installed in the cloud with a client's enterprise system, you can create a secure channel using Cloud Connector. The use of Cloud Connector is optional. You can enable Cloud Connector as described in Adding directory server. 2. Directory connector: Add search conditions for the enabled directory server including the Base DN and Filter fields. For more information, see Setting a directory connector. 3. User Authentication Settings and Search: Enable User Authentication in the profile that will use the directory connector or enable it in Configuration. Note: To learn more about how to integrate mail servers, such as Microsoft Exchange with Knox Manage, see Setting Exchange. 345

2 Adding directory server To get your company's user information through a link with the directory server, set up the directory server as follows. The directory server can be registered, modified and deleted, and can not delete the currently active directory server. To link to a directory server, follow the steps below: 1. Go to Settings > System Integration > Directory Integration. 2. Click on the top of the window. 3. Enter the information in Default Settings tab in the Add Directory window. Depending the Auth Type, enter additional information in the Authentication Detailed Setting tab. Pool Name: Enter a pool name that is up to 20 characters in length, containing letters, numbers, and special characters (only dashes and underscores allowed) to distinguish it from other directory services. Encryption Type: Select an encryption type for the internet communication protocol that will be used for communication with the directory server. - None (no encryption) - Secured Socket Layer (SSL) - Transport Layer Security (TLS) Auth Type: Select an authentication type that will be used for communication with the directory server. - None (no authentication) - Simple (Select this default value when you are not certain about the authentication type.) 346

3 - If you choose DIGEST-MD5 (SASL), CRAM-MD5 (SASL), or GSSAPI (Kerberos), then you need to configure the advanced settings in the Authentication Detailed Setting tab by referring to the information below: Auth Type Description DIGEST- MD5 (SASL) / CRAM- MD5 (SASL) GSSAPI (Kerberos) Configure the settings for Simple Authentication and Security Layer (SASL), a telnet-based protocol, as below: SASL Realm: Enter the realm value of the SASL server in domain format (e.g., sample.com). Quality of Protection: Select the quality of the data protection from the followings. - Authentication Only: Protect the data only upon authentication. - Authentication with integrity protection: Ensures integrity of all the data exchanged as well as authentication. - Authentication with integrity and privacy protection: Ensures integrity for all the data exchanges as well as authentication through data encryption. Protection Strength: Select a data protection level, and determine whether mutual authentication should be performed when exchanging data. - High: Use 128-bit encryption. - Medium: Use 56-bit encryption. - Low: Use 40-bit encryption. - Mutual Authentication: Ensures data validity by inserting the key into the data exchanged between the client and server. Kerberos Credential Configuration: Choose how to obtain a Kerberos ticket. - Use Native TGT: Select when you already have a ticket issued in Knox Manage. - Obtain TGT from KDC: Issue a new ticket using the default user ID and password. Kerberos Configuration: Select how to configure the Kerberos server. - Use Native System Configuration: Use Kerberos server information defined in the Java Property. - Use Following Configuration: Enter the Kerberos server information manually. - Realm: Enter the Realm of the Kerberos server. - KDC Host: Enter kerberos key distribution center (KDC) Host or IP address. - KDC Port: Enter KDC Port. IP/HOST: Enter the IP or HOST address of the directory address. Port: Enter the TCP port number that should be used for communication with the directory server. The default port number used for unencrypted communication with the directory server is 389. User ID and Password: Enter the User ID and Password that have read access to the directory server as the administrator account for accessing the directory server. 347

4 - It can be input in various forms such as domain\administrator ID, administrator or CN=administrator ID,CN=Users,DC=domain,DC=com. Maximum Active: The maximum number of connections that can be activated, select the number of connections to activate from 10 to 50. Maximum Idle: The maximum number of connections that can be idle, select the number of connections to keep idle from 0 to 30. Cloud Connector: Select whether to use the Cloud Connector in the Directory server. When you click Test to verify the conformity of input items, IP and Port information of Cloud Connector is automatically input. 4. Clicking Connection Test validates the Sync service input fields and saves the IP/HOST addresses and port number of the directory server. 5. After entering all information, click Save. Note: You may enable Cloud Connector to create a secure channel between the directory server and Knox Manage server. To learn more about how to enable Cloud Connector, see Cloud connector. Checking connection status with a directory server To check the connection with the directory server, follow the steps below: 1. Go to Settings > System Integration > Directory Integration. 2. Select the directory server to check the connection status, and click Check Directory Status. Click OK when the confirmation pop-up appears. 3. Check the Connection Status column on the directory list. 348

5 Setting a directory connector Enable the directory connector to filter a client's user information on the directory server integrated with Knox Manage and to import it. The directory connector extracts the required user information through the Directory Type, Range, and Filter settings, etc., simplifies the user registration process, and improves work efficiency for IT administrators. In the Connector settings, you can identify users by their Directory Type and Filter values, and also map the user information attributes on the Knox Manage and directory servers. When enabling the connector, see the following for more information on how to configure the Directory Type, Filter, and Output Field settings: Directory Type: See Directory service type. Base DN and Range: See Setting Base DN. Filter: See Setting filters. Output Field: See Setting output field. Adding directory connector To add a directory connector, follow the steps below: 1. Go to Settings > System Integration > Directory Connector. 2. Click on the top of the window. 3. In the Add Service window, enter the information. Service ID: Enter an ID that is up to 25 characters in length, containing letters, numbers, and special characters (only dashes and underscores allowed). Service Name: Enter a name that can distinguish it from other services. 349

6 Status: Select the status of the connector service that you need to operate. The default value is Activated. Pool Name: Among the pool names registered for directory servers in Settings > Integrations > Directory, choose the pool name that you want to register for the connector service. Service Type: Select a directory service type in accordance with the purpose of using user information provided by the directory server such as Authentication or Search. For more information, see Directory service type. Base DN: Click, and then in the Select the Base DN window, select the location from which searches should start on the directory server. For more information on Base DN, see Setting Base DN. Filter: Click, and then in the Select Object Class window, select an Object Class and attributes. Knox Manage provides basic filters for each directory type and allows you to select an LDAP syntax filter for user searches. For more information on filter, see Setting filters. Range: Based on the location specified in the Base DN field, select a search range for the directory server. - Object: Search within the level of Base DN. - One Level: Search within the level and the sub-level of Base DN. - Subtree: Search within all sub-levels including Base DN. Output field: Perform a search using the filter, and then select the set of attributes that should be returned for the entries that satisfy the filter. - Total: Returns all attributes for the searched entries. - Select: Only returns the attributes selected in the Output Field among the attributes for the searched entries. For information base output field, see Setting output field. Admin Role: Click 4. Click Save. and select Admin Role to manage the service. 350

7 Directory service type To perform user authentication or user searches on the directory server integrated with Knox Manage, select a directory type as follows: Classification Directory Service Type Service Description Authentication Authentication The Filter and Output Field fields are automatically set in accordance with the Directory Type value. Authentication requests are made to the client's directory server using this information. Search (Manually) Authentication (Manually) Search (Manually) Profile Configuration (User) VPN Exchange Account Profile Configuration (Certificate) Certificate Generic VPN The administrator has to fill out the Filter and Output Field fields manually. Authentication requests are made to the client's directory server using this information. Searches are performed on the integrated directory server using the Filter value manually entered by the administrator. This information can also be sent to devices. When VPN, Exchange, or Account is selected for integration in Profiles > Device Management Profile, this searches for a user using the Filter value specified for the connector. In order for you to go to Profiles > Device Management Profile > Android or ios > Settings, select Connector in the User information input method field in the Add Android/iOS Settings window, choose VPN, Exchange, or Account for integration, and then search for a user, you need to select Profile Configuration (User) as the Directory Type while registering the connector. When the administrator chooses Certificate or Generic VPN for integration in Profiles > Device Management Profile, this authenticates a user using the Filter value specified for the connector. In order for you to go to Profiles > Device Management Profile > Android or ios > Settings, select Connector in the User certificate input method field in the Add Android/iOS Settings window, and then authenticate a user through Certificate or Generic VPN integration, you need to select Profile Configuration (Certificate) as the Directory Type while registering the connector. Note: In order for you to select globalldapserviceauthenticator in the Authenticator field under Authentication in Settings > Configuration, and then authenticate a user on devices, you need to select Authentication or Authentication (Manually) as the Directory Type while registering the connector. For more information about configuring the Authentication settings in Knox Manage, see Configuring authentication. 351

8 Setting Base DN In the Base DN field, specify the location from which data searches should start on the directory server. You can enter a Base DN manually or select one. Please set it carefully: leaving the Base DN field unspecified may cause the entire directory server to be searched. To set the Base DN, follow the steps below. The Base DN field can be set while adding or modifying a directory connector. 1. Go to Settings > System Integration > Directory Connector. 2. Click next to a service, or click Service ID and click Modify. 3. In the Modify Service window, click next to Base DN. 352

9 4. In the Select the Base DN window, click the entry that you wish to set as the search start point on the directory server. Selected DN: Shows the selected DN (Distinguish Name). 5. Click Save. Setting filters Set up a filter to retrieve user information from the directory server. Knox Manage provides basic filters for each Directory Type. Administrators can search for information using a set filter. The filter is an LDAP syntax filter, which may differ by service. Filter attributes that are most commonly used to configure the filter settings on the directory server are as follows: {userid}: Knox Manage user ID {username}: Knox Manage user name { }: Knox Manage user {contact}: Knox Manage user phone number {empno}: Knox Manage user employee number To select the filter in the Modify Service window, follow the steps below. The filter settings can be configured while adding or modifying a directory connector. 1. Go to Settings > System Integration > Directory Connector. 2. Click next to a service, or click Service ID and click Modify. 3. In the Modify Service window, click next to Filter and in the Select Object Class window, click Object Class Name and Property Title you want to set as a filter and click OK. When searching for a specific object class, enter the object class name in the Select Object Class window and click on. To select the object class name defined by default as a filter, click Default at the bottom. To select the object class name defined by the connected directory server as a filter, click Custom at the bottom. 353

10 Property Information: The property information of the selected object class is displayed. Return Value: The LDAP Syntax of the selected property information and object class is displayed. 4. Click Save. Setting output field Entries searched on the directory server through a filter contain several attributes. The Output Field settings should be configured to only extract the desired attributes out of all available attributes. You can set an output field. If you click Total in the Output Field of the Add Service or Modify Service window, all fields are set as output fields and if you click Select, you can set the output field by selecting it. To set an output field in the Modify Service window, follow the steps below. The Output Field settings can be configured while adding or modifying a directory connector. 1. Go to Settings > System Integration > Directory Connector. 354

11 2. Click next to a service, or click Service ID and click Modify. 3. In the Modify Service window, click the Select radio button in the Output Field, and then click Add in the Output Field Settings area. Alternatively, click Loading Attribute, and select attributes. Loaded Attribute List: Attributes defined in the directory server: - Property Title: Name of attributes. - Description: Detailed description of attributes. Selected Attribute List: Return attributes when calling a service. Default: To select the object class name defined by default as a filter, click Default at the bottom. Custom: To select the object class name defined by the connected directory server as a filter, click Custom at the bottom. 355

12 a. Enter the property title in the search field of the Loading Attribute window, and click. b. Select a property title from Loaded Attribute list, and click to move the items to the Selected Attribute List. If a wrong property title selected, click to restore. 3. Click Save at the bottom of the Loading Attribute window. 4. After confirming the selected attributes in the Output Field Settings area, and click Save. Double click the source name item to change source name of each attributes. The Return Attribute Name may not be returned normally if you modify it arbitrarily with the name of the attribute you are requesting from the directory server. Testing directory service To make sure that the connector service functions correctly on the directory server, perform a test by setting parameters. To check whether the connector service functions properly through a test, follow the steps below: 1. Go to Settings > System Integration > Directory Connector. 2. Click next to a service. 3. Enter information required to perform a test in the Test window as follows: URL: A URL, which is used for a test when the service is called, is automatically entered. Click the dropdown menu on the right side of the URL field, and select XML or JSON as the output format. Parameter: If you have written a parameter key and value before, they are entered automatically. If there are none, then enter the parameter key and value previously specified in the Filter field in the Save Input Parameters window. (For example, userid=administrator) Load: Click Load to enter parameter. In the Input Value List window. In the Storage ID area of the Input Value List window, click the parameter that you wish to use as an input parameter, and then click OK. 356

13 Save: To use a repeatedly used input parameter by clicking Load, enter the relevant parameter key and value in the Input Value List window, and then click Save. - Input ID: To distinguish the parameter from other parameters, enter an Input ID that is up to 50 characters in length, containing letters, numbers, and special characters (only dashes and underscores allowed). - Service ID: Service ID of input parameter is automatically entered. - Service Type: Service type of parameter, such as SAP and DB, is automatically entered. - Description: Enter description of the parameter. - Parameters: In the Save Input Parameters window, enter the parameter key and parameter value previously specified in the Filter field as demonstrated below: (For example: userid=administrator) 4. Click Send to test the service connection in the Test window. You can check the Result Message in the Results Values area. The test results are displayed in tree structure, with the results expanded to the last node. Result Message displays the message type: either XML or JSON. 357

14 5. Click Close. Setting directory service operation hours You can set operation hours for directory service and record logs regarding the service. Also, you can choose to send message to users notifying the non-operating hours as well. To set the operation time of a directory service, follow the steps below: 1. Go to Settings > System Integration > Directory Connector. 2. Select a Service ID, and click Connector Service. 3. In the Connector Service window, select either Default or Individual set the details, and Save. Connector Service Time tab: Select the service time type. 358

15 Item Default Description Default service hour is 00:00-24:00 Monday to Saturday. Individual Message during non-operating hours tab: Enter a message notifying nonoperation hours. The entered message sends to the user devices when the service is not in operation. The service operates based on the time and day set by the administrator. For example) Mon. 00:00-20:30, Tue. 00:00-24:00, and Fri. 13:00-13:30: To add an operation schedule, select appropriate time and day, and click after selecting the date and time. To delete an a schedule, select an item and click after selecting the date and time. View Timetable: Displays all the specified service operation time and day in a time table format. 359

16 Log Service tab: Set whether to record log. Item Default Individual Description Log information is logged for the connector service. Choose whether to log the transaction. 360

LDAP Servers for AAA

LDAP Servers for AAA This chapter describes how to configure LDAP servers used in AAA. About LDAP and the ASA, page 1 Guidelines for, page 5 Configure, page 5 Test LDAP Server Authentication and Authorization, page 9 Monitoring,

More information

The following tasks must be completed before you begin to configure Exchange.

The following tasks must be completed before you begin to configure Exchange. Setting Exchange Mail servers, such as Microsoft Exchange Server, can be integrated and used through Knox Manage on the user's device. This Guide describes the method of connecting to Microsoft Exchange

More information

LDAP Servers for AAA

LDAP Servers for AAA This chapter describes how to configure LDAP servers used in AAA. About LDAP and the ASA, page 1 Guidelines for, page 5 Configure, page 5 Monitoring, page 11 History for, page 11 About LDAP and the ASA

More information

LDAP/AD v1.0 User Guide

LDAP/AD v1.0 User Guide LDAP/AD v1.0 User Guide For v6.5 systems Catalog No. 11-808-615-01 Important changes are listed in Document revision history at the end of this document. UTC 2017. throughout the world. All trademarks

More information

Certificate Management

Certificate Management Certificate Management This guide provides information on...... Configuring the NotifyMDM server to use a Microsoft Active Directory Certificate Authority... Using Certificates from Outside Sources...

More information

Embedded Web Server. Administrator's Guide

Embedded Web Server. Administrator's Guide Embedded Web Server Administrator's Guide October 2011 www.lexmark.com Contents 2 Contents Using security features in the Embedded Web Server...4 Understanding the basics...4 Authentication and Authorization...4

More information

VMware AirWatch Certificate Authentication for Cisco IPSec VPN

VMware AirWatch Certificate Authentication for Cisco IPSec VPN VMware AirWatch Certificate Authentication for Cisco IPSec VPN For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Apache Directory Studio Apache DS. User's Guide

Apache Directory Studio Apache DS. User's Guide Apache Directory Studio Apache DS User's Guide Apache Directory Studio Apache DS: User's Guide Version 2.0.0.v20180908-M14 Copyright 2006-2018 Apache Software Foundation Licensed to the Apache Software

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810

Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN. VMware Workspace ONE UEM 1810 Workspace ONE UEM Certificate Authentication for Cisco IPSec VPN VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Configure Settings and Customize Notifications on FindIT Network Probe

Configure  Settings and Customize  Notifications on FindIT Network Probe Configure Email Settings and Customize Email Notifications on FindIT Network Probe Objective Cisco FindIT Network Probe equips a network administrator with indispensable tools that help securely monitor

More information

ACS 5.x: LDAP Server Configuration Example

ACS 5.x: LDAP Server Configuration Example ACS 5.x: LDAP Server Configuration Example Document ID: 113473 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Directory Service Authentication Using

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

create-auth-realm adds the named authentication realm

create-auth-realm adds the named authentication realm Name Synopsis Description Options create-auth-realm adds the named authentication realm create-auth-realm --classname realm_class [--help] [ --property (name=value)[:name=value]*] [ --target target_name]

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

Integrating AirWatch and VMware Identity Manager

Integrating AirWatch and VMware Identity Manager Integrating AirWatch and VMware Identity Manager VMware AirWatch 9.1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

VMware Tunnel Guide for Windows Installing the VMware Tunnel for your AirWatch environment

VMware Tunnel Guide for Windows Installing the VMware Tunnel for your AirWatch environment VMware Tunnel Guide for Windows Installing the VMware Tunnel for your AirWatch environment AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS. VMware Identity Manager.

IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS. VMware Identity Manager. IMPLEMENTING SINGLE SIGN-ON (SSO) TO KERBEROS CONSTRAINED DELEGATION AND HEADER-BASED APPS VMware Identity Manager February 2017 V1 1 2 Table of Contents Overview... 5 Benefits of BIG-IP APM and Identity

More information

How to Integrate an External Authentication Server

How to Integrate an External Authentication Server How to Integrate an External Authentication Server Required Product Model and Version This article applies to the Barracuda Load Balancer ADC 540 and above, version 5.1 and above, and to all Barracuda

More information

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

Obtaining the LDAP Search string (Distinguished Name)?

Obtaining the LDAP Search string (Distinguished Name)? How to Configure LDAP Sync with the Altium Vault Old Content - see latest equivalent Modified by Jason Howie on 31-May-2017 An LDAP Sync allows the administrator of an Altium Vault to leverage the network

More information

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE Guide to Deploying VMware Workspace ONE with VMware Identity Manager SEP 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1

VMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1 VMware Workspace ONE Quick Configuration Guide VMware AirWatch 9.1 A P R I L 2 0 1 7 V 2 Revision Table The following table lists revisions to this guide since the April 2017 release Date April 2017 June

More information

Creating Column Profiles on LDAP Data Objects

Creating Column Profiles on LDAP Data Objects Creating Column Profiles on LDAP Data Objects Copyright Informatica LLC 1993, 2017. Informatica LLC. No part of this document may be reproduced or transmitted in any form, by any means (electronic, photocopying,

More information

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Pulse Connect Secure 8.x

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. Pulse Connect Secure 8.x RSA SECURID ACCESS Implementation Guide Pulse Connect Secure 8.x Daniel R. Pintal, RSA Partner Engineering Last Modified: January 24 th, 2018 Solution Summary The Pulse

More information

Client VPN OS Configuration. Android

Client VPN OS Configuration. Android Client VPN OS Configuration This article outlines instructions to configure a client VPN connection on commonly-used operating systems. For more information about client VPN, please refer to our documentation.

More information

VMware Tunnel Guide for Windows

VMware Tunnel Guide for Windows VMware Tunnel Guide for Windows Installing the VMware Tunnel for your Workspace ONE UEM environment Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using

More information

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3

Deploying VMware Identity Manager in the DMZ. SEPT 2018 VMware Identity Manager 3.3 Deploying VMware Identity Manager in the DMZ SEPT 2018 VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...

More information

Configuring 802.1X Settings on the WAP351

Configuring 802.1X Settings on the WAP351 Article ID: 5078 Configuring 802.1X Settings on the WAP351 Objective IEEE 802.1X authentication allows the WAP device to gain access to a secured wired network. You can configure the WAP device as an 802.1X

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6 Gateway Installation and Configuration Guide for On-Premises Version 17 September 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites...

More information

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Contents Administrator's Guide... 7 Using Web Config Network Configuration Software... 8 About Web Config... 8 Accessing Web Config... 8 Restricting Features Available for Users...

More information

Configuration Guide. BlackBerry UEM. Version 12.9

Configuration Guide. BlackBerry UEM. Version 12.9 Configuration Guide BlackBerry UEM Version 12.9 Published: 2018-07-16 SWD-20180713083904821 Contents About this guide... 8 Getting started... 9 Configuring BlackBerry UEM for the first time...9 Configuration

More information

IBM Tivoli Directory Server Version 5.2 Client Readme

IBM Tivoli Directory Server Version 5.2 Client Readme IBM Tivoli Directory Server Version 5.2 Client Readme GI11-4150-00 IBM Tivoli Directory Server Version 5.2 Client Readme GI11-4150-00 Note Before using this information and the product it supports, read

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 15 Create an Identity Rule, page 15 Manage a Realm, page 20 Manage an Identity

More information

VMware Tunnel Guide for Windows

VMware Tunnel Guide for Windows VMware Tunnel Guide for Windows Installing the VMware Tunnel for your Workspace ONE UEM environment Workspace ONE UEM v1810 Have documentation feedback? Submit a Documentation Feedback support ticket using

More information

Cloud connector. The system architecture of SCC to integrate with your LDAP is as follows:

Cloud connector. The system architecture of SCC to integrate with your LDAP is as follows: Cloud connector Samsung Knox Manage Cloud Connector (SCC) is a service that creates a secure channel for data transfer between your enterprise system and the Knox Manage cloud server. SCC allows you to

More information

VMware AirWatch Integration with SecureAuth PKI Guide

VMware AirWatch Integration with SecureAuth PKI Guide VMware AirWatch Integration with SecureAuth PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902

Workspace ONE UEM Certificate Authentication for EAS with ADCS. VMware Workspace ONE UEM 1902 Workspace ONE UEM Certificate Authentication for EAS with ADCS VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Cisco Expressway Authenticating Accounts Using LDAP

Cisco Expressway Authenticating Accounts Using LDAP Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4

More information

review of the potential methods

review of the potential methods Mandatory iscsi Security review of the potential methods IPS Interim Meeting Nashua NH, May 01 2001 Ofer Biran Thanks to: IBM Research Lab in Haifa Bernard Aboba, David Black, Julian Satran, Steve Senum

More information

F5 BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.1

F5 BIG-IQ Centralized Management: Licensing and Initial Setup. Version 5.1 F5 BIG-IQ Centralized Management: Licensing and Initial Setup Version 5.1 Table of Contents Table of Contents BIG-IQ System Introduction...5 About BIG-IQ System Management...5 About secure communication

More information

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2

Deploying VMware Identity Manager in the DMZ. JULY 2018 VMware Identity Manager 3.2 Deploying VMware Identity Manager in the DMZ JULY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have

More information

Mobile Iron Core - Setup Guide 1

Mobile Iron Core - Setup Guide 1 Mobile Iron Core - Setup Guide Mobile Iron Core - Setup Guide 1 Prerequisites 2 App Availability 2 Device Compatibility 2 Reachable KDC 2 Add Hypergate to Mobile Iron Apps 3 Enable Android Enterprise Support

More information

Workspace ONE UEM Directory Service Integration. VMware Workspace ONE UEM 1811

Workspace ONE UEM Directory Service Integration. VMware Workspace ONE UEM 1811 Workspace ONE UEM Directory Service Integration VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Integration Guide. LoginTC

Integration Guide. LoginTC Integration Guide LoginTC Revised: 21 November 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating integration. Guide Details

More information

JN0-355 Q&As. Junos Pulse Secure Access, Specialist (JNCIS-SA) Pass Juniper JN0-355 Exam with 100% Guarantee

JN0-355 Q&As. Junos Pulse Secure Access, Specialist (JNCIS-SA) Pass Juniper JN0-355 Exam with 100% Guarantee JN0-355 Q&As Junos Pulse Secure Access, Specialist (JNCIS-SA) Pass Juniper JN0-355 Exam with 100% Guarantee Free Download Real Questions & Answers PDF and VCE file from: 100% Passing Guarantee 100% Money

More information

Authenticating and Importing Users with AD and LDAP

Authenticating and Importing Users with AD and LDAP Purpose This document describes how to integrate with Active Directory (AD) or Lightweight Directory Access Protocol (LDAP). This allows user authentication and validation through the interface. This is

More information

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP

Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Cisco TelePresence Authenticating Cisco VCS Accounts Using LDAP Deployment Guide Cisco VCS X8.2 D14465.07 June 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration

More information

BlackBerry UEM Configuration Guide

BlackBerry UEM Configuration Guide BlackBerry UEM Configuration Guide 12.9 2018-11-05Z 2 Contents Getting started... 7 Configuring BlackBerry UEM for the first time... 7 Configuration tasks for managing BlackBerry OS devices... 9 Administrator

More information

Authorized Send Installation and Configuration Guide Version 3.5

Authorized Send Installation and Configuration Guide Version 3.5 Canon Authorized Send Installation and Configuration Guide Version 3.5 08011-35-UD2-004 This page is intentionally left blank. 2 Authorized Send Installation and Configuration Guide Contents Preface...5

More information

FortiMail Gateway SMTP Authentication Technical Note

FortiMail Gateway SMTP Authentication Technical Note FortiMail Gateway SMTP Authentication Technical Note FortiMail Gateway SMTP Authentication Technical Note Document Version: Version 2.0 Publication Date: 4 April, 2005 Description: This technical note

More information

CRM Integration LDAP 06/01/2016

CRM Integration LDAP 06/01/2016 CRM Integration LDAP 06/01/2016 CRM Integration LDAP Page 0 CRM Integration Contents Intro... 2 Configuration... 2 Connection... 2 Fields... 2 Show Contact... 3 Testing... 4 CRM Integration LDAP Page 1

More information

VMware AirWatch Directory Services Guide Integrating your Directory Services

VMware AirWatch Directory Services Guide Integrating your Directory Services VMware AirWatch Directory Services Guide Integrating your Directory Services AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

VMware Tunnel on Windows. VMware Workspace ONE UEM 1810

VMware Tunnel on Windows. VMware Workspace ONE UEM 1810 VMware Tunnel on Windows VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

Novell OpenLDAP Configuration

Novell OpenLDAP Configuration Novell OpenLDAP Configuration To access the GoPrint Novell e-directory LDAP Connector configuration screen navigate to: Accounts Authentication Connectors GoPrint provides two connector options, Standard

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

NXC Series. Handbook. NXC Controllers NXC 2500/ Default Login Details. Firmware Version 5.00 Edition 19, 5/

NXC Series. Handbook. NXC Controllers NXC 2500/ Default Login Details. Firmware Version 5.00 Edition 19, 5/ NXC Series NXC 2500/ 5500 NXC Controllers Firmware Version 5.00 Edition 19, 5/2017 Handbook Default Login Details LAN Port IP Address https://192.168.1.1 User Name admin Password 1234 Copyright 2017 ZyXEL

More information

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources

VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources VMware AirWatch Integration with F5 Guide Enabling secure connections between mobile applications and your backend resources Workspace ONE UEM v9.6 Have documentation feedback? Submit a Documentation Feedback

More information

Kerberos Constrained Delegation Authentication for SEG V2. VMware Workspace ONE UEM 1810

Kerberos Constrained Delegation Authentication for SEG V2. VMware Workspace ONE UEM 1810 Kerberos Constrained Delegation Authentication for SEG V2 VMware Workspace ONE UEM 1810 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you

More information

Kerberos V5. Raj Jain. Washington University in St. Louis

Kerberos V5. Raj Jain. Washington University in St. Louis Kerberos V5 Raj Jain Washington University in Saint Louis Saint Louis, MO 63130 Jain@cse.wustl.edu Audio/Video recordings of this lecture are available at: http://www.cse.wustl.edu/~jain/cse571-07/ 11-1

More information

Radius, LDAP, Radius used in Authenticating Users

Radius, LDAP, Radius used in Authenticating Users CSCD 303 Lecture 5 Fall 2017 Kerberos Radius, LDAP, Radius used in Authenticating Users Introduction to Centralized Authentication Kerberos is for authentication only and provides Single Sign-on (SSO)

More information

VMware Tunnel Guide Deploying the VMware Tunnel for your AirWatch environment

VMware Tunnel Guide Deploying the VMware Tunnel for your AirWatch environment VMware Tunnel Guide Deploying the VMware Tunnel for your AirWatch environment AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

Phone Inventory 1.1 (1012)

Phone Inventory 1.1 (1012) (1012) 2015 VoIP Integration July 28, 2015 Table of Contents Product Overview... 3 Requirements... 3 Application Requirements... 3 Call Manager... 3 Network Connectivity... 3 IP Phones... 3 Installation

More information

NotifySCM Workspace Administration Guide

NotifySCM Workspace Administration Guide NotifySCM Workspace Administration Guide TABLE OF CONTENTS 1 Overview... 3 2 Login... 4 2.1 Main View... 5 3 Manage... 6 3.1 PIM... 6 3.2 Document...12 3.3 Server...13 4 Workspace Configuration... 14 4.1

More information

Wireless LAN Controller Web Authentication Configuration Example

Wireless LAN Controller Web Authentication Configuration Example Wireless LAN Controller Web Authentication Configuration Example Document ID: 69340 Contents Introduction Prerequisites Requirements Components Used Conventions Web Authentication Web Authentication Process

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

FAQ 106 How do I access and set up client applications? There are two ways to access a mailbox for sending and receiving messages:

FAQ 106 How do I access  and set up  client applications? There are two ways to access a mailbox for sending and receiving  messages: FAQ 106 How do I access email and set up email client applications? Page 1 Access your webmail Outlook 2016 Setup Access from Mozilla Thunderbird Access from Apple Mail Access from iphone Access from Android

More information

VMware AirWatch Integration with RSA PKI Guide

VMware AirWatch Integration with RSA PKI Guide VMware AirWatch Integration with RSA PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: Introduction:, page 1 Creating a Realm, page 5 Creating an Identity Policy, page 11 Creating an Identity Rule, page 15 Managing Realms, page

More information

Juniper Networks SSL VPN Integration Guide

Juniper Networks SSL VPN Integration Guide Juniper Networks SSL VPN Integration Guide Introduction Overview Terms Setting Up an Authentication Server Creating a User Role Creating a User Realm Setting Up Your Sign In URL top Introduction This document

More information

Administrator's Guide

Administrator's Guide Administrator's Guide Administrator's Guide Welcome to the Administrator's Guide. For a printable PDF copy of this guide, click here. Note: Not all features mentioned in this Administrator's Guide are

More information

AirWatch Mobile Device Management

AirWatch Mobile Device Management RSA Ready Implementation Guide for 3rd Party PKI Applications Last Modified: November 26 th, 2014 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product Description

More information

Enabling Single Sign-On Using Okta in Axon Data Governance 5.4

Enabling Single Sign-On Using Okta in Axon Data Governance 5.4 Enabling Single Sign-On Using Okta in Axon Data Governance 5.4 Copyright Informatica LLC 2018. Informatica and the Informatica logo are trademarks or registered trademarks of Informatica LLC in the United

More information

Webthority can provide single sign-on to web applications using one of the following authentication methods:

Webthority can provide single sign-on to web applications using one of the following authentication methods: Webthority HOW TO Configure Web Single Sign-On Webthority can provide single sign-on to web applications using one of the following authentication methods: HTTP authentication (for example Kerberos, NTLM,

More information

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user

More information

Accessing the Ministry Secure File Delivery Service (SFDS)

Accessing the Ministry Secure File Delivery Service (SFDS) Ministry of Health Services Accessing the Ministry Secure File Delivery Service (SFDS) A Guide for New Users To SFDS And Digital Certificate Installation May 2004 Preface Purpose Audience Structure This

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 14 Create an Identity Rule, page 15 Manage a Realm, page 17 Manage an Identity

More information

Authenticating and Importing Users with AD and LDAP

Authenticating and Importing Users with AD and LDAP Purpose This document describes how to integrate with Active Directory (AD) or Lightweight Directory Access Protocol (LDAP). This allows user authentication and validation through the interface. This is

More information

VMware AirWatch System Settings Reference Manual for SaaS Customers A comprehensive listing of AirWatch system settings

VMware AirWatch System Settings Reference Manual for SaaS Customers A comprehensive listing of AirWatch system settings VMware AirWatch System s Reference Manual for SaaS Customers A comprehensive listing of AirWatch system settings Workspace ONE UEM v9.4 Have documentation feedback? Submit a Documentation Feedback support

More information

Set Up with Microsoft Outlook 2013 using POP3

Set Up  with Microsoft Outlook 2013 using POP3 Page 1 of 14 Help Center Set Up E-mail with Microsoft Outlook 2013 using POP3 Learn how to configure Microsoft Outlook 2013 for use with your 1&1 e-mail account using the POP3 Protocol. Before you begin,

More information

Navigation & Registration for Editors

Navigation & Registration for Editors Navigation & Registration for Editors Trademark Notice Blackboard, the Blackboard logos, and the unique trade dress of Blackboard are the trademarks, service marks, trade dress and logos of Blackboard,

More information

User Guide. Admin Guide. r

User Guide. Admin Guide. r User Guide Admin Guide r 03.08.16 1 Welcome to Keeper! We re excited you have chosen to work with us. Let s get started by walking through how you can tell your employees about Keeper, then we ll walk

More information

To Setup your Business id in MacOS X El Capitan Mail (POP) To find MacOS version please visit: Apple Support macos version

To Setup your Business  id in MacOS X El Capitan Mail (POP) To find MacOS version please visit: Apple Support macos version To Setup your Business email id in MacOS X El Capitan Mail (POP) To find MacOS version please visit: Apple Support macos version Depending on your MAC OS version, your screens may appear a bit different,

More information

Using Kerberos Authentication in a Reverse Proxy Environment

Using Kerberos Authentication in a Reverse Proxy Environment Using Kerberos Authentication in a Reverse Proxy Environment Legal Notice Copyright 2017 Symantec Corp. All rights reserved. Symantec, the Symantec Logo, the Checkmark Logo, Blue Coat, and the Blue Coat

More information

How to Connect to a Microsoft SQL Server Database that Uses Kerberos Authentication in Informatica 9.6.x

How to Connect to a Microsoft SQL Server Database that Uses Kerberos Authentication in Informatica 9.6.x How to Connect to a Microsoft SQL Server Database that Uses Kerberos Authentication in Informatica 9.6.x Copyright Informatica LLC 2015, 2017. Informatica Corporation. No part of this document may be reproduced

More information

VMware AirWatch System Settings Reference Manual for On-Premises Customers A comprehensive listing of AirWatch system settings. AirWatch v9.

VMware AirWatch System Settings Reference Manual for On-Premises Customers A comprehensive listing of AirWatch system settings. AirWatch v9. VMware AirWatch System s Reference Manual for On-Premises Customers A comprehensive listing of AirWatch system settings AirWatch v9.3 H a v e d o c u m e n t a t io n f e e d b a c k? S u b m it a D o

More information

Entrust Connector (econnector) Venafi Trust Protection Platform

Entrust Connector (econnector) Venafi Trust Protection Platform Entrust Connector (econnector) For Venafi Trust Protection Platform Installation and Configuration Guide Version 1.0.5 DATE: 17 November 2017 VERSION: 1.0.5 Copyright 2017. All rights reserved Table of

More information

Configuration Guide. BlackBerry UEM. Version 12.7 Maintenance Release 2

Configuration Guide. BlackBerry UEM. Version 12.7 Maintenance Release 2 Configuration Guide BlackBerry UEM Version 12.7 Maintenance Release 2 Published: 2017-12-04 SWD-20171130134721747 Contents About this guide... 8 Getting started... 9 Configuring BlackBerry UEM for the

More information

LDAP Configuration Guide

LDAP Configuration Guide LDAP Configuration Guide Publication date: 11/8/2017 www.xcalar.com Copyright 2017 Xcalar, Inc. All rights reserved. Table of Contents About this guide 3 Configuring LDAP 4 Before you start 5 Configuring

More information

Active Directory as a Probe and a Provider

Active Directory as a Probe and a Provider Active Directory (AD) is a highly secure and precise source from which to receive user identity information, including user name, IP address and domain name. The AD probe, a Passive Identity service, collects

More information

Managing AON Security

Managing AON Security CHAPTER 4 This chapter describes AON functions relating to security, authentication, and authorization. It includes the following topics. Managing Keystores, page 4-1 Configuring Security Properties, page

More information

CIS 6930/4930 Computer and Network Security. Topic 7. Trusted Intermediaries

CIS 6930/4930 Computer and Network Security. Topic 7. Trusted Intermediaries CIS 6930/4930 Computer and Network Security Topic 7. Trusted Intermediaries 1 Trusted Intermediaries Problem: authentication for large networks Solution #1 Key Distribution Center (KDC) Representative

More information

Implementing Security in Windows 2003 Network (70-299)

Implementing Security in Windows 2003 Network (70-299) Implementing Security in Windows 2003 Network (70-299) Level 1 Authorization & Authentication 2h 20m 20s 1.1 Group Strategy 1.2 Group Scopes 1.3 Built-in Groups 1.4 System or Special Groups 1.5 Administrating

More information

Authenticating Cisco VCS accounts using LDAP

Authenticating Cisco VCS accounts using LDAP Authenticating Cisco VCS accounts using LDAP Cisco TelePresence Deployment Guide Cisco VCS X6 D14526.04 February 2011 Contents Contents Document revision history... 3 Introduction... 4 Usage... 4 Cisco

More information

MCSA Guide to Networking with Windows Server 2016, Exam

MCSA Guide to Networking with Windows Server 2016, Exam MCSA Guide to Networking with Windows Server 2016, Exam 70-741 First Edition Chapter 7 Implementing Network Policy Server 2018 Cengage. All Rights Reserved. May not be copied, scanned, or duplicated, in

More information

Deliver and manage customer VIP POCs. The lab will be directed and provide you with step-by-step walkthroughs of key features.

Deliver and manage customer VIP POCs. The lab will be directed and provide you with step-by-step walkthroughs of key features. SR L15 Hands-On Lab Description Protecting Corporate Networks with Symantec Validation and ID Protection At the end of this lab, you should be able to Technically present and answer questions from your

More information