Authentication Policy Overview & Justification

Size: px
Start display at page:

Download "Authentication Policy Overview & Justification"

Transcription

1 Kainos Smart recommends an authentication policy be implemented in order to deny an active Kainos Smart integration system user or Professional Services/Smart Support named account access to a customer s Production Workday tenant. Following the recommendation as described in this article allows Kainos Smart Professional Services to re-provision non-production tenants weekly without requiring a new password to be sent each week by the customer. Authentication Policy Overview & Justification Authentication policies provide a degree of control over how users can sign into Workday by allowing or denying the use of specified authentication types the methods by which a user may attempt to sign in to Workday. These types include the following: Mobile PIN OpenID Connect SAML User Name / Password User Name / Password + Challenge Questions User Name / Password + One Time Passcode X509 Using an authentication policy, it is possible to explicitly allow or deny the use of any of the aforementioned authentication types on a per security group basis. Put in context, Kainos Smart recommends that access to all of these authentication types is explicitly denied for the kainossmart-intsysuser and all Professional Services/Smart Support named accounts within a customer s Production Workday tenant, while these accounts are allowed to remain active. When configured correctly, this will not allow the Kainos user accounts to be used on the customer s Production Workday tenant despite being active, because they lack the permissions required to authenticate themselves using any authentication type, even the standard username & password combination. Where this benefits the customer is during the weekly Sandbox refresh. Prior to the use of authentication policies, customers would have to provide a new password for the Kainos user accounts to Kainos Smart Professional Services/Smart Support for provisioning Smart. Implementing an authentication policy as described in section 3 of this document will render this step obsolete, as when the Production authentication policy is copied to the Sandbox tenant during the weekly refresh of Workday tenants, it does not apply to the Sandbox tenant. This mirrors the tenant scope of proxy access policies. In summary: The authentication policy implemented applies to a Production Workday tenant It prevents the use of any authentication type by the Kainos user accounts, therefore preventing them from signing into the customer s Production Workday tenant The Kainos user accounts are active on the Production Workday tenant, but cannot sign in as a result of being denied access to all authentication types in this environment Page 1

2 When Workday s weekly refresh occurs, the Kainos user accounts can sign into Sandbox tenants because the Production authentication policy no longer applies. As the Kainos user account passwords on Production are known by Kainos Smart Professional Services, the customer does not need to provide a new password each week for Smart tenant provisioning to take place. For emphasis: if the authentication policy is configured as described in this document, the Kainos user accounts cannot sign into Production tenants Authentication Policy Configuration Search for and run the Manage Authentication Policies task: The Manage Authentication Policies screen is shown, if no Production authentication policy currently exists, click on the Add Authentication Policy button: The Add Authentication Policy screen below shows: The environment(s) the authentication policy applies to A flag showing whether or not the authentication policy is enabled The network blacklist a list of IP ranges which are blocked by the Workday tenant. The authentication whitelist a list of security groups and related authentication types which the security groups listed are permitted to use in order to sign into the specified environments. The default rule for All Users a catch all rule to allow non configured security groups to access the environments in question as if there was no authentication policy applied i.e. unrestricted. Page 2

3 To configure an authentication policy as required for Kainos Smart, create and flag as enabled a Production environment policy: Create the authentication rule shown below. This rule explicitly denies access to any method of authentication to the Kainos user accounts, even if the accounts are enabled. This rule therefore prevents the Kainos user accounts from logging into the Production tenant. This rule should always be the first rule in the authentication whitelist: Page 3

4 The default rule for all users shown below prevents the authentication policy from restricting access to users not specified in the authentication whitelist. This rule can be left blank, as this will result in no restrictions being placed on the users not previously matched in the authentication whitelist. A user is matched by only the first rule in the list which concerns a security group they are a member of. This mirrors the operation of the proxy access policy, and is why the aforementioned security rule is placed at the top of the list if other authentication rules are currently in place. The final step in implementing this authentication policy is to activate it, in a similar manner as security domain changes are activated. To do this, run the Activate All Pending Authentication Policy Changes task within Workday, and enter a comment. Click OK to proceed to the confirmation screen. Check the Confirm check box, then click OK. Page 4

5 Page 5

Report HQ. Quick Start Guide. Report HQ Quick Start Guide - Version 1.2

Report HQ. Quick Start Guide. Report HQ Quick Start Guide - Version 1.2 Report HQ Quick Start Guide STEP 1 Requesting An Account 1) Request an account via the Report HQ Request Form 2) Nasdaq will verify your account 3) Once your account is verified and provisioned, you will

More information

NotifyMDM Device Application User Guide Installation and Configuration for Android

NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM Device Application User Guide Installation and Configuration for Android NotifyMDM for Android, Version 3.x NotifyMDM for Android 1 Table of Contents NotifyMDM for Android 3 Installation Instructions

More information

Pearson CTC User Roles Update and Security Audit Process

Pearson CTC User Roles Update and Security Audit Process Pearson CTC User Roles Update and Security Audit Process In order to make certain all user accounts in PearsonAccess next are accurate and up to date for the 2016-2017 school year, the Office of Assessment

More information

Using CSE Cisco Anyconnect with 2FA

Using CSE Cisco Anyconnect with 2FA Using CSE Cisco Anyconnect with 2FA If you are using the Duo Mobile App in push mode: you open Anyconnect. 3. Enter your CSE UserName for the Username. 4. A new window will open. 5. Enter your CSE UserName

More information

AppSpider Enterprise. Getting Started Guide

AppSpider Enterprise. Getting Started Guide AppSpider Enterprise Getting Started Guide Contents Contents 2 About AppSpider Enterprise 4 Getting Started (System Administrator) 5 Login 5 Client 6 Add Client 7 Cloud Engines 8 Scanner Groups 8 Account

More information

Setup Smart Login for Windows V2

Setup Smart Login for Windows V2 Setup Smart Login for Windows V2 Smart Login allows workstations to login to a Smart-Net server without having to join a domain. Smart Login is suitable for both laptops and desktop PC s. Features Users

More information

A S C E R T I A LTD D O C U M E N T V E R S I O N - 1.2

A S C E R T I A LTD D O C U M E N T V E R S I O N - 1.2 Q u i c k G u i d e E n t r u s t I D G S m a r t C r e d e n t i a l E n r o l m e n t A S C E R T I A LTD J A N U A R Y 2 0 1 5 D O C U M E N T V E R S I O N - 1.2 Ascertia Ltd, 2015 This document contains

More information

How to Request a Signatory Role

How to Request a Signatory Role How to Request a Signatory Role What is a Signatory user? 2 A Signatory (40 CFR 122.22) is a person associated with a Permittee that is responsible for signing and submitting DMRs on behalf of an organization.

More information

Online Banking Initial Log In Instructions. Go to and enter your username: Ex JaneDoe

Online Banking Initial Log In Instructions. Go to   and enter your username: Ex JaneDoe Online Banking Initial Log In Instructions Go to www.riverbankandtrust.com and enter your username: Ex JaneDoe 1 Step 1: Enter your existing login ID: Step 2: Enter security code: username + last 4 of

More information

Workday Deployment Guide Version 4.0

Workday Deployment Guide Version 4.0 Workday Deployment Guide Version 4.0 Deployment Guide Overview SAML Configuration Workday Driven IT Provisioning Overview Basic Provisioning Configuration Workday Provisioning Groups Real Time Sync Attribute

More information

User Guide. Version R92. English

User Guide. Version R92. English AuthAnvil User Guide Version R92 English October 9, 2015 Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated from

More information

ForeScout Amazon Web Services (AWS) Plugin

ForeScout Amazon Web Services (AWS) Plugin ForeScout Amazon Web Services (AWS) Plugin Version 1.1.1 and above Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic Segmentation

More information

AvePoint Online Services 2

AvePoint Online Services 2 2 User Guide Service Pack 7 Issued August 2017 Table of Contents What s New in this Guide...6 About...7 Versions: Commercial and U.S. Government Public Sector...7 Submitting Documentation Feedback to AvePoint...8

More information

Identity and Access Management Program NetID and PIN Tool Administration. Quick Guide

Identity and Access Management Program NetID and PIN Tool Administration. Quick Guide Identity and Access Management Program NetID and PIN Tool Administration Quick Guide Version 1 March 2, 2018 Table of Contents Table of Contents... 2 Introduction... 4 About the Yale Provisioning Tool...

More information

Workspace Secure Container for Mobile Devices

Workspace Secure Container for Mobile Devices Workspace Secure Container for Mobile Devices Version 1.1 Last Updated: April 24, 2014 2014 Verizon. All Rights Reserved. The Verizon name and logo and all other names, logos, and slogans identifying Verizon

More information

Administration Guide. BlackBerry Workspaces. Version 5.6

Administration Guide. BlackBerry Workspaces. Version 5.6 Administration Guide BlackBerry Workspaces Version 5.6 Published: 2017-06-21 SWD-20170621110833084 Contents Introducing the BlackBerry Workspaces administration console... 8 Configuring and managing BlackBerry

More information

Mobile App User Guide

Mobile App User Guide Mobile App User Guide Updated: July 28, 2015 Introduction The Farmers Trust & Savings Bank Mobile Banking App is a downloadable application that is compatible with numerous mobile devices. These devices

More information

VidyoDesktop: Quick User Guide Ver. 1.0

VidyoDesktop: Quick User Guide Ver. 1.0 Page 1 Logging In There are 3 parameters needed to log in. 1. The video portal link. (http://webvc.nic.in). 2. User Name provided by NIC. 3. Password. When you are ready to log in, enter your username

More information

CounterACT Microsoft System Management Server (SMS) System Center Configuration Manager (SCCM) Plugin

CounterACT Microsoft System Management Server (SMS) System Center Configuration Manager (SCCM) Plugin CounterACT Microsoft System Management Server (SMS) System Center Configuration Manager (SCCM) Plugin Version 2.2.5 Table of Contents About the Microsoft SMS/SCCM Plugin... 3 Concepts, Components, Considerations...

More information

Comodo IT and Security Manager Software Version 5.4

Comodo IT and Security Manager Software Version 5.4 Comodo IT and Security Manager Software Version 5.4 End User Guide Guide Version 5.4.090716 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Table of Contents 1. Introduction to Comodo IT

More information

Deploy Enhancements from Sandboxes

Deploy Enhancements from Sandboxes Deploy Enhancements from Sandboxes Salesforce, Spring 18 @salesforcedocs Last updated: April 13, 2018 Copyright 2000 2018 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

MyCSF User Guide. Prepared By: HITRUST Frisco Square Blvd. Suite 327. Frisco, Texas P: (469) F: (469)

MyCSF User Guide. Prepared By: HITRUST Frisco Square Blvd. Suite 327. Frisco, Texas P: (469) F: (469) MyCSF User Guide Prepared By: HITRUST 6136 Frisco Square Blvd. Suite 327 Frisco, Texas 75034 P: (469)269-1110 F: (469)269-1101 www.hitrustalliance.net 1 P a g e Table of Contents MyCSF User Guide Browser

More information

Introduction to application management

Introduction to application management Introduction to application management To deploy web and mobile applications, add the application from the Centrify App Catalog, modify the application settings, and assign roles to the application to

More information

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

VMware AirWatch Google Sync Integration Guide Securing Your  Infrastructure VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure Workspace ONE UEM v9.5 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

WebEx Integration User Guide. Cvent, Inc 1765 Greensboro Station Place McLean, VA

WebEx Integration User Guide. Cvent, Inc 1765 Greensboro Station Place McLean, VA WebEx Integration User Guide 2018 Cvent, Inc 1765 Greensboro Station Place McLean, VA 22102 www.cvent.com Contents WebEx Integration User Guide... 3 Enabling WebEx Integration in Your Account... 4 Setting

More information

E X O S T A R L L C D A T E : N O V E M B E R V E R S I O N : 2.0

E X O S T A R L L C D A T E : N O V E M B E R V E R S I O N : 2.0 SECURE ACCESS MAN AG E R PRO VIDER AD M I NISTRAT I ON GUI DE E X O S T A R L L C D A T E : N O V E M B E R 2 0 1 6 V E R S I O N : 2.0 1 S E C U R E A C C E S S M A N A G E R SECURE ACCESS MANAGER OVERVIEW...

More information

Deploy Enhancements from Sandboxes

Deploy Enhancements from Sandboxes Deploy Enhancements from Sandboxes Salesforce, Spring 17 @salesforcedocs Last updated: March 10, 2017 Copyright 2000 2017 salesforce.com, inc. All rights reserved. Salesforce is a registered trademark

More information

Barracuda Networks NG Firewall 7.0.0

Barracuda Networks NG Firewall 7.0.0 RSA SECURID ACCESS Standard Agent Implementation Guide Barracuda Networks.0 fal, RSA Partner Engineering Last Modified: 10/13/16 Solution Summary The Barracuda NG Firewall

More information

Windows Smart Card Logon Use Case

Windows Smart Card Logon Use Case Windows Smart Card Logon Use Case Issue Smart Card Logon versasec.com 1(13) Table of Contents Windows Smart Card Logon Use Case... 3 Step 1 Configuring a Windows Smart Card Logon Template... 3 Step 2 Configuring

More information

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3

ForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3 ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic

More information

MFA Instructions. Getting Started. 1. Go to Apps, select Play Store 2. Search for Microsoft Authenticator 3. Click Install

MFA Instructions. Getting Started. 1. Go to Apps, select Play Store 2. Search for Microsoft Authenticator 3. Click Install MFA Instructions Getting Started You will need the following: Your smartphone, a computer, and Internet access. Before using MFA your computer will need to be running Office 2016 if you use the full version

More information

VMware AirWatch Reports Guide

VMware AirWatch Reports Guide VMware AirWatch Reports Guide AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product is protected by copyright

More information

NetSupport ServiceDesk Product Manual Version 3.10

NetSupport ServiceDesk Product Manual Version 3.10 NetSupport ServiceDesk Product Manual Version 3.10 Manual COPYRIGHT (C) 2013 NetSupport Ltd. All rights reserved. The Information in this document is subject to change without notice. NetSupport Ltd. reserves

More information

iportal user guide for assessors

iportal user guide for assessors iportal user guide for assessors April 2017 Contents About the Careerforce iportal... 3 Help & General Administration... 4 How to Register... 5 Terminology Changes... 5 Navigation on the iportal... 6 Assessor

More information

User Self-Administrative Web Guide

User Self-Administrative Web Guide User Self-Administrative Web Guide NotifyMDM Version 3.x The User Self-Administrative Web 1 Table of Contents The User Self-Administrative Web 3 Accessing the Mobile User Self-Administrative Portal...

More information

Licensing the Application CHAPTER

Licensing the Application CHAPTER CHAPTER 5 Licensing Application, Configuring E-mail, Cisco.com, Proxy Settings, RCP, SCP Settings, Security, Backup, Authentication Settings and Idle Timeout Settings, Browser and Server Security Mode

More information

[GSoC Proposal] Securing Airavata API

[GSoC Proposal] Securing Airavata API [GSoC Proposal] Securing Airavata API TITLE: Securing AIRAVATA API ABSTRACT: The goal of this project is to design and implement the solution for securing AIRAVATA API. Particularly, this includes authenticating

More information

Equitrac Embedded for Kyocera Mita. Setup Guide Equitrac Corporation Equitrac Corporation

Equitrac Embedded for Kyocera Mita. Setup Guide Equitrac Corporation Equitrac Corporation Equitrac Embedded for Kyocera Mita 1.3 Setup Guide 2012 Equitrac Corporation 2012 Equitrac Corporation Equitrac Embedded for Kyocera Mita Setup Guide Document Revision History Revision Date Revision List

More information

SAS Viya 3.3 Administration: Mobile

SAS Viya 3.3 Administration: Mobile SAS Viya 3.3 Administration: Mobile Mobile: Overview The SAS Mobile BI app enables mobile device users to view and interact with reports that can contain a variety of charts, graphs, gauges, tables, and

More information

Understanding Admin Access and RBAC Policies on ISE

Understanding Admin Access and RBAC Policies on ISE Understanding Admin Access and RBAC Policies on ISE Contents Introduction Prerequisites Requirements Components Used Configure Authentication Settings Configure Admin Groups Configure Admin Users Configure

More information

User Guide. 3CX Enhanced Billing Codes. Version

User Guide. 3CX Enhanced Billing Codes. Version User Guide 3CX Enhanced Billing Codes Version 15.5.54 "Copyright VoIPTools, LLC 2011-2017" Information in this document is subject to change without notice. No part of this document may be reproduced or

More information

VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch

VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

PECO SMART ENERGY USAGE DATA TOOL (PSEUDT)

PECO SMART ENERGY USAGE DATA TOOL (PSEUDT) PECO SMART ENERGY USAGE DATA TOOL (PSEUDT) BUILDING MANAGER USER GUIDE V2.5 2 Confidential Table of Contents 1. INTRODUCTION... 4 2. GETTING STARTED... 4 2.1 LOGGING IN TO PSEUDT... 4 2.2 THE PSEUDT DASHBOARD...

More information

VMware AirWatch Google Sync Integration Guide Securing Your Infrastructure

VMware AirWatch Google Sync Integration Guide Securing Your  Infrastructure VMware AirWatch Google Sync Integration Guide Securing Your Email Infrastructure AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

BlackBerry Workspaces Server Administration Guide

BlackBerry Workspaces Server Administration Guide BlackBerry Workspaces Server Administration Guide 6.0 2018-10-06Z 2 Contents Introducing BlackBerry Workspaces administration console... 7 Configuring and managing BlackBerry Workspaces... 7 BlackBerry

More information

Introduction to SSO Access Policy

Introduction to SSO Access Policy Introduction to SSO Access Policy ISAM appliance includes an advanced access control offering that can be used to create authentication policies to protect web resources. These authentication policies

More information

ONE ID Identity and Access Management System

ONE ID Identity and Access Management System ONE ID Identity and Access Management System Local Registration Authority User Guide Document Identifier: 2274 Version: 1.8 Page 1 Copyright Notice Copyright 2011, ehealth Ontario All rights reserved No

More information

HTTP Authentication API

HTTP Authentication API HTTP Authentication API Note: Both GET (URL format) and POST http requests are supported. Note that POST is considered better security as URL data can be cached in the browser. HTTP URL Format http(s)://your_securenvoy_server/secserver?flag=desktop&version=2.0&status=auth&userid=(my_userid)&passcode=(6

More information

Mobility Manager 9.5. Users Guide

Mobility Manager 9.5. Users Guide Mobility Manager 9.5 Users Guide LANDESK MOBILITY MANAGER Copyright 2002-2013, LANDesk Software, Inc. and its affiliates. All rights reserved. LANDesk and its logos are registered trademarks or trademarks

More information

Connector. Installing and Configuring the Client

Connector. Installing and Configuring the Client LastPass Active Connector Directory The LastPass Active Directory Connector Client is a windows service that is run locally and can be downloaded from the Admin Dashboard. It connects to your Active Directory

More information

MailEnable Connector for Microsoft Outlook

MailEnable Connector for Microsoft Outlook MailEnable Connector for Microsoft Outlook Version 1.41 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for

More information

AUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER

AUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER E-Guide AUTHENTICATION AND AUTHORIZATION: TWO SECURITY ESSENTIALS THAT WORK TOGETHER SearchSecurity E ffective IT security today demands that users be both authenticated and authorized. But even those

More information

User Guide. 3CX Enhanced Billing Codes. Version

User Guide. 3CX Enhanced Billing Codes. Version User Guide 3CX Enhanced Billing Codes Version 15.5.54 "Copyright VoIPTools, LLC 2011-2018" Information in this document is subject to change without notice. No part of this document may be reproduced or

More information

CLEARSPAN PAGING CONFIGURE PAGING SYSTEM USER CONFIGURE ADDRESSES ADD USER

CLEARSPAN PAGING CONFIGURE PAGING SYSTEM USER CONFIGURE ADDRESSES ADD USER CLEARSPAN PAGING There are two ways you can set a paging system: By setting up a special user account or by creating a paging group. Both methods are described in the following section. CONFIGURE PAGING

More information

MailEnable Connector for Microsoft Outlook

MailEnable Connector for Microsoft Outlook MailEnable Connector for Microsoft Outlook Version 1.36 This guide describes the installation and functionality of the MailEnable Connector for Microsoft Outlook. Features The MailEnable Connector for

More information

Verizon Registration Process:

Verizon Registration Process: All controlled substances will require the prescriber to electronically sign the prescription prior to transmitting it to the pharmacy. Emdeon has partnered with Verizon to provide the digital signing

More information

User Guide. Version R94. English

User Guide. Version R94. English AuthAnvil User Guide Version R94 English March 8, 2017 Copyright Agreement The purchase and use of all Software and Services is subject to the Agreement as defined in Kaseya s Click-Accept EULATOS as updated

More information

Tableau Server platform security. Implementing the four tenets of enterprise security

Tableau Server platform security. Implementing the four tenets of enterprise security Tableau Server platform security Implementing the four tenets of enterprise security Contents 1 Authentication...4 User identity... 4 Active directory... 4 Local authentication... 4 LDAP... 5 Single sign-on

More information

AT&T Cloud Web Security Service

AT&T Cloud Web Security Service AT&T Cloud Web Security Service Troubleshooting Guide Table of Contents 1 Summary... 3 2 Explicit Proxy Access Method... 4 2.1 Explicit Proxy Flow Diagram... 4 3 Proxy Forwarding Access Method... 6 3.1

More information

Using MFA with the Pulse Client

Using MFA with the Pulse Client Using MFA with the Pulse Client 1. Launch the Pulse client and open your preferred connection. 2. A new pre-sign in notification will display similar to the one shown below. This page explains your options

More information

Workspace ONE UEM Directory Service Integration. VMware Workspace ONE UEM 1811

Workspace ONE UEM Directory Service Integration. VMware Workspace ONE UEM 1811 Workspace ONE UEM Directory Service Integration VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

RSA SecurID Ready Implementation Guide

RSA SecurID Ready Implementation Guide RSA SecurID Ready Implementation Guide Last Modified: August 26, 2011 Partner Information Product Information Partner Name Web Site Product Name Version & Platform Product Description Voice Innovate http://voiceinnovate.com/

More information

Easy Time Control Training Manual

Easy Time Control Training Manual Easy Time Control Training Manual Copyright 2008, Trinity Enterprise Solutions Inc Easy Time Control Training Manual Table of Contents Preface...iii Module 1...5 Getting Started...5 1.1. Opening the System...6

More information

Function. Description

Function. Description Function Check In Get / Checkout Description Checking in a file uploads the file from the user s hard drive into the vault and creates a new file version with any changes to the file that have been saved.

More information

REGISTERING YOUR BYOD DEVICE

REGISTERING YOUR BYOD DEVICE REGISTERING YOUR BYOD DEVICE Bring Your Own Device (BYOD) Registration for Android Devices with MobileIron The MobileIron app (Mobile@Work) connects your Android device to the MobileIron server and provides

More information

TOP Server Version 6 Security Settings

TOP Server Version 6 Security Settings TOP Server 1 (10) TOP Server Version 6 TOP Server 2 (10) Contents Security Built In... 3 User Manager Configuration... 3 New User Accounts... 5 New User Group and Properties... 5 Configuration Security...

More information

Securing APIs and Microservices with OAuth and OpenID Connect

Securing APIs and Microservices with OAuth and OpenID Connect Securing APIs and Microservices with OAuth and OpenID Connect By Travis Spencer, CEO @travisspencer, @curityio Organizers and founders ü All API Conferences ü API Community ü Active blogosphere 2018 Platform

More information

Deploying and Provisioning the Barracuda Web Application Firewall in the New Microsoft Azure Management Portal

Deploying and Provisioning the Barracuda Web Application Firewall in the New Microsoft Azure Management Portal Deploying and Provisioning the Barracuda Web Application Firewall in the New Microsoft Azure Management Deploying and Provisioning the Barracuda Web Application Firewall Using the Azure Resource Manager

More information

Using NetShow Commands

Using NetShow Commands CHAPTER 10 Network show (NetShow) commands represent a set of read-only commands. These are primarily, show commands that you can run on devices that are managed in LMS. You can specify the commands that

More information

Leave Request Employee Manual

Leave Request Employee Manual South Dakota Board of Regents Human Resources/Finance Information Systems Leave Request Employee Manual Version 1.1 Updated 11/07/2011 Table of Contents Contents Introduction... 2 Overview... 2 Intended

More information

OfficeSuite PC Console Quick reference guide

OfficeSuite PC Console Quick reference guide OfficeSuite PC Console Quick reference guide Welcome Letter: You will receive a Welcome Letter which will provide instructions on the following: Where to obtain the PC Console Software download License

More information

Monitor Mode Deployment with Cisco Identity Services Engine. Secure Access How -To Guides Series

Monitor Mode Deployment with Cisco Identity Services Engine. Secure Access How -To Guides Series Monitor Mode Deployment with Cisco Identity Services Engine Secure Access How -To Guides Series Author: Adrianne Wang Date: December 2012 Table of Contents Monitor Mode... 3 Overview of Monitor Mode...

More information

Install Application Start Download the Application

Install Application Start Download the Application Install Application Start Download the Application Apple Android Enter A cardholder will download the app from either the itunes app store or the Android Google Play Store. 6 Install Application Completion

More information

Swyft Mobile for Saleforce TM. User Guide

Swyft Mobile for Saleforce TM. User Guide Swyft Mobile for Saleforce TM User Guide Last updated: May 2018 Welcome to Swyft Mobile for Salesforce! Swyft Mobile for Salesforce envelopes The Salesforce mobile app in a secure container on your device

More information

SureClose Product Line

SureClose Product Line SureClose Product Line Release Notes 3.7 June 21, 2013 SureClose 3.7 Release Notes June 2013 1 Table of Contents Overview... 4 Post-Installation Considerations... 4 Features and Functionality... 6 New

More information

IBM Smart Cloud Entry Hosted Trial Guide 3.2

IBM Smart Cloud Entry Hosted Trial Guide 3.2 IBM Smart Cloud Entry Hosted Trial Guide 3.2 SmartCloud Entry Team: Cloud Solutions Beta cloudbta@us.ibm.com Page 1 Table of Contents Chapter 1: Introduction...3 Chapter 2: Getting Started...4 Request

More information

Google Sync Integration Guide. VMware Workspace ONE UEM 1902

Google Sync Integration Guide. VMware Workspace ONE UEM 1902 Google Sync Integration Guide VMware Workspace ONE UEM 1902 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

SAP API Management Cloud Connector PUBLIC

SAP API Management Cloud Connector PUBLIC SAP API Management Cloud Connector PUBLIC Objectives After completing this unit, you will be able to: - Understand Cloud connector and its value proposition - Call an API accessible through Cloud Connector

More information

User Databases. ACS Internal Database CHAPTER

User Databases. ACS Internal Database CHAPTER CHAPTER 12 The Cisco Secure Access Control Server Release 4.2, hereafter referred to as ACS, authenticates users against one of several possible databases, including its internal database. You can configure

More information

REMOTE ACCESS TO HUSKY S COMPUTER NETWORKS TWO WAYS TO CONNECT IN EUROPE

REMOTE ACCESS TO HUSKY S COMPUTER NETWORKS TWO WAYS TO CONNECT IN EUROPE REMOTE ACCESS TO HUSKY S COMPUTER NETWORKS TWO WAYS TO CONNECT IN EUROPE If you have access to the Internet (via net cable, wireless or phone line, hotel, airport, IPass), you need to change your proxy

More information

Tyler Dashboard. User Guide Version 6.0. For more information, visit

Tyler Dashboard. User Guide Version 6.0. For more information, visit Tyler Dashboard User Guide Version 6.0 For more information, visit www.tylertech.com. TABLE OF CONTENTS Tyler Dashboard... 4 Tyler Dashboard Features... 4 Browse... 5 Page... 5 Dashboard... 5 Views...

More information

Lab - Working with Android

Lab - Working with Android Introduction In this lab, you will place apps and widgets on the home screen and move them between different screens. You will also create folders. Finally, you will install and uninstall apps from the

More information

bt-webfilter Administrator s Guide: Access Rules & Custom Access Policies

bt-webfilter Administrator s Guide: Access Rules & Custom Access Policies bt-webfilter Administrator s Guide: Access Rules & Custom Access Policies Contents Custom Access Policies and Access Rules... 4 Introduction... 4 Custom Access Polices vs. Access Rules... 4 When an Access

More information

ScheduleSoft - Complete Manual

ScheduleSoft - Complete Manual ScheduleSoft - Complete Manual Entering Leaves Using the Kiosk Procedure 1. The link to the GNWT ScheduleSoft site is found on the Human Resources website at www.hr.gov.nt.ca. Click the ScheduleSoft link.

More information

Clearspan OpEasy Basic Provisioning Guide NOVEMBER Release

Clearspan OpEasy Basic Provisioning Guide NOVEMBER Release Clearspan OpEasy Basic Provisioning Guide NOVEMBER 2016 Release 4.6 2827-012 NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel Communications,

More information

connected New User Guide

connected New User Guide connected New User Guide This guide will walk you through how to accomplish the following for programs launched through the McGraw-Hill connected website: Create a Teacher Account Redeem Content Create

More information

River Bank & Trust Online Banking Initial Log In Instructions

River Bank & Trust Online Banking Initial Log In Instructions River Bank & Trust Online Banking Initial Log In Instructions Step 1: Go to River Bank & Trust s website (https://riverbankandtrust.com/). Locate the Online Banking Login box in the upper right corner

More information

Quick Start Guide. Kaseya 2

Quick Start Guide. Kaseya 2 LiveConnect Quick Start Guide Kaseya 2 February 13, 2010 About Kaseya Kaseya is a global provider of IT automation software for IT Solution Providers and Public and Private Sector IT organizations. Kaseya's

More information

ISEC7 Mobile Exchange Delegate

ISEC7 Mobile Exchange Delegate ios User Documentation 1 License/Subscription 4 1.1 Free version 4 1.2 Activating company account 5 1.3 Premium Subscription 8 2 Create Master Account 16 3 Add Delegate Access 19 4 Add Shared Calendars

More information

Alberta Reliability Standard Cyber Security Electronic Security Perimeter(s) CIP-005-AB-5

Alberta Reliability Standard Cyber Security Electronic Security Perimeter(s) CIP-005-AB-5 A. Introduction 1. Title: 2. Number: 3. Purpose: To manage electronic access to BES cyber systems by specifying a controlled electronic security perimeter in support of protecting BES cyber systems against

More information

Product Guide. McAfee Web Gateway Cloud Service

Product Guide. McAfee Web Gateway Cloud Service Product Guide McAfee Web Gateway Cloud Service COPYRIGHT Copyright 2017 McAfee, LLC TRADEMARK ATTRIBUTIONS McAfee and the McAfee logo, McAfee Active Protection, epolicy Orchestrator, McAfee epo, McAfee

More information

Remote Access VPN Setup

Remote Access VPN Setup Remote Access VPN Setup MWI Animal Health provides remote access to the MWI network using a VPN (virtual private network). Use the information on this site to setup and connect to the MWI VPN. Before You

More information

English. For Windows. WebAccess. User Manual. Buffalo Inc.

English. For Windows. WebAccess. User Manual. Buffalo Inc. English For Windows WebAccess User Manual Buffalo Inc. www.buffalotech.com Contents Chapter 1 Overview... 3 WebAccess for Windows... 3 System Requirements... 3 Chapter 2 Using WebAccess... 4 Installation...

More information

How to Configure ATP in the HTTP Proxy

How to Configure ATP in the HTTP Proxy Configure when and which types of files are uploaded to the Barracuda ATP Cloud for traffic passing through the HTTP proxy service. Users will receive downloaded files immediately. When files with a risk

More information

penelope case management software AUTHENTICATION GUIDE v4.4 and higher

penelope case management software AUTHENTICATION GUIDE v4.4 and higher penelope case management software AUTHENTICATION GUIDE v4.4 and higher Last modified: August 9, 2016 TABLE OF CONTENTS Authentication: The basics... 4 About authentication... 4 SSO authentication... 4

More information

Click: Double-click:

Click: Double-click: Computer Mouse The computer s mouse controls the mouse pointer on the screen. Roll the mouse left, and the pointer moves left; roll it in circles, and the pointer does the same on the screen. Click: A

More information

Provider Portal User Guide

Provider Portal User Guide Provider Portal User Guide Updated: January 1, 2019 Table of Contents Introduction... 1 How to Register for the Provider Portal... 3 Manage Your Profile... 5 User Administration... 8 Authorizations & Referrals...

More information

Spotfire Security. Peter McKinnis July 2017

Spotfire Security. Peter McKinnis July 2017 Spotfire Security Peter McKinnis July 2017 Outline Authentication in Spotfire Spotfire Server 7.9 Sites Feature and Authentication Authorization in Spotfire Data Security Spotfire Statistics Services Security

More information

Secure web proxy resistant to probing attacks

Secure web proxy resistant to probing attacks Technical Disclosure Commons Defensive Publications Series December 04, 2017 Secure web proxy resistant to probing attacks Benjamin Schwartz Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

IQSweb Reference G. ROSS Migration/Registration

IQSweb Reference G. ROSS Migration/Registration ROSS Migration/Registration Contents IQSweb V3.0.1 ROSS Connection Requirements... 2 Test Agency Network Connectivity to ROSS... 3 FIREWALL Exceptions... 3 FIREWALL Exception Justification... 4 ROSS Interface

More information