Identity and Access Management. User Guide. Issue 09 Date

Size: px
Start display at page:

Download "Identity and Access Management. User Guide. Issue 09 Date"

Transcription

1 Issue 09 Date

2 Contents Contents 1 What Is IAM? How Do I Manage User Groups and Grant Permissions to Them? Permission Description How Do I Manage Users? How Do I Create an Agency? How Do I Switch Roles? How Do I Configure Federated Identity Authentication? Introduction to Federated Identity Authentication Interconnection for Federated Identity Authentication SSO Process How Do I Create an Identity Provider and Perform an SSO? How Do I Configure the Name and Permission Information About a Federated User? How Do I Set Account Policies? User Management Mechanism Explained Using a Picture A Change History Issue 09 ( ) ii

3 1 What Is IAM? 1 What Is IAM? (IAM) is an enterprise-level self-service cloud resource management system and provides user identity management and access control functions. With IAM, users can manage user accounts (for example, employees, systems, or applications) and control the operation rights of these accounts over their resources. If multiple users collaboratively operate resources in an enterprise, IAM prevents users from sharing their account keys with other users and allows security administrators to grant only necessary permissions to users. IAM also ensures account security and reduces security risks for enterprise information by allowing users to set login verification policies, password policies, and access control list (ACL). Issue 09 ( ) 1

4 2 How Do I Manage User Groups and Grant Permissions to Them? 2 How Do I Manage User Groups and Grant Permissions to Them? Prerequisites Procedure Users with Security Administrator permissions in an enterprise can plan user groups based on user responsibilities, and grant permissions to the user groups so that users in each user group have the corresponding permissions. This method makes those permissions easier to manage for the users in the user groups. You have Security Administrator permissions. Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Choose Management & Deployment >. In the navigation pane, choose User Group. On the User Group page, click Create User Group. Set User Group. (Optional) Set Description. Click OK to return to the user group list. The new user group is displayed in the user group list. Step 7 Click Modify in the Operation column corresponding to the new user group. The Modify User Group page is displayed. Step 8 Step 9 In the User Group Rights area, click Modify in the Operation column corresponding to the target project. In the Available Rights Sets area of the Modify User Group Permission dialog box, select a rights set corresponding to the service. For the default rights sets, see Default Permissions. After you select a rights set name, you can view the JSON-formatted detailed information about this rights set in the Rights Set Information area. For details, see Permission Information. Issue 09 ( ) 2

5 2 How Do I Manage User Groups and Grant Permissions to Them? Step 10 Step 11 Click OK. Select a user from the Group Members drop-down combo box to add it to the user group. You can enter a keyword to quickly find the target user. Step 12 Click OK. ----End Operation Result Follow-up Procedure The created user group is displayed in the user group list. In the user group list, click next to the target user group to view its details. Issue 09 ( ) 3

6 3 Permission Description 3 Permission Description Permissions specify operations that users are allowed to perform on related objects. You can add operations on a certain object to the permissions of a user group and add a user to the user group so that the user inherits the permissions of the user group. User permission management based on user groups is more organized and avoids confusions. Issue 09 ( ) 4

7 3 Permission Description Permission Relationship Default Permissions The system provides two types of default permissions: user management and resource management. Issue 09 ( ) 5

8 3 Permission Description Users with the user management permissions can manage users, user groups, and user group permissions. For details, see Table 3-1. Table 3-1 User management permissions Node Name Base IAM Permission Name Security Administrator Agent Operator Description Users with this permission can: Create, delete, and modify users. Grant permissions to users. Users with this permission can switch to an entrusted user for processing services. Users with resource management permissions can control the operations performed on cloud service resources. For details, see Table 3-2. Object Storage Service (OBS) and other cloud resources are deployed separately. OBS only has Tenant Administrator and Tenant Guest permissions. Table 3-2 Cloud resource management permissions Node Name Permission Name Managed Cloud Resource Description Base Tenant Administrator All services Permissions to operate all cloud resources owned by an enterprise. Server Administrator EVS, Elastic Cloud Server (ECS), and Virtual Private Cloud (VPC) For the EVS service, users with this permission can create, modify, and delete EVS disks. For the ECS service, users with this permission can create, modify, and delete ECSs. For the VPC service, users with this permission can perform any operations on security groups, security group rules, ports, firewalls, elastic IP addresses (EIPs), and bandwidth. The Server Administrator permission depends on the Tenant Guest permission. Tenant Guest All services Permissions to query the usage of all cloud resources owned by an enterprise. Issue 09 ( ) 6

9 3 Permission Description Node Name Permission Name Managed Cloud Resource Description Anti-DDoS Anti-DDoS Administrator Anti-DDoS Permissions to enable, disable, and modify configurations. This permission depends on the Tenant Guest permission and must have permission to query EIPs in VPCs. APM APM Admin ServiceStag e Users with this permission can manage domain monitoring data. CCS CCS Administrator Cloud Catalog Service (CCS) Users with this permission can customize products, product portfolios, and versions, add a product to a product portfolio, assign authorization, add constraints, perform O&M on product instances, and manage quotas. CCS User Cloud Catalog Service (CCS) Users with this permission can view products and manage product instances. CDE CDE Admin ServiceStag e Users with this permission can manage orchestration of domain' applications. CDE Developer ServiceStag e Users with this permission can orchestrate applications. CTS CTS Administrator Cloud Trace Service (CTS) Permissions to enable CTS, create, modify, enable, and disable a tracker, and receive and view traces. This permission depends on Tenant Guest and OBS Tenant Administrator permissions. If the OBS Tenant Administrator permission is unavailable, traces cannot be delivered to the OBS bucket for storage. CRS CRS Administrator Cloud Report Service (CRS) Permissions to: Connent, delete, modify, and query data sources. Create, delete, modify, query, and preview data sets. Create, delete, modify, query, and analyze data in worksheets. Create, delete, modify, and query dashboards. Query quotas. Issue 09 ( ) 7

10 3 Permission Description Node Name Permission Name Managed Cloud Resource Description DWS DWS Administrator Data Warehouse Service (DWS) Management permissions on all DWS resources. The permissions depend on the Tenant Guest and Server Administrator permissions. DWS cannot run properly if either of the permissions is unavailable. If DWS users are to create a VPC or a subnet, the VPC Administrator permission is required. KMS KMS Administrator Key Managemen t Service (KMS) Permissions to: Create, enable, disable, schedule the deletion of, and cancel the scheduled deletion of CMKs. Query the list of CMKs and information about CMKs. Create random numbers. Create DEKs, including plaintext-free DEKs. Encrypt and decrypt DEKs. SVCSTG SvcStg Admin ServiceStag e Users with this permission can approve domain registration requests, service shelving requests, and service subscription requests. SvcStg Developer SvcStg Operator ServiceStag e ServiceStag e Users with this permission can apply for, use, and release resources. They can also configure the code library and perform operations on the software repositories. Users with this permission can monitor global resources, reclaim resources, and back up or restore platform data. SWR SWR Admin ServiceStag e Users with this permission can manage software repositories of domain. MRS MRS Administrator MapReduce Service (MRS) Permissions to view MRS overview information, operation logs, cluster information, job information, HDFS file operation information, alarm list, and MRS Manager portal. Issue 09 ( ) 8

11 3 Permission Description Node Name Permission Name Managed Cloud Resource Description RDS RDS Administrator Relational Database Service (RDS) and Document Database Service(DD S) Users who have this right, plus Tenant Guest and Server Administrator rights, can perform any operations on RDS and DDS, including creating, deleting, rebooting, or scaling up DB instances, configuring database parameters, and restoring DB instances. Users who have this right but not the Tenant Guest or Server Administrator right cannot use RDS and DDS. Users who have the VPC Administrator right can create VPCs or subnets. Users who have the CES Administrator right can add or modify alarm rules for DB instances. DIS DIS Administrator Data Ingestion Service(DIS ) Permissions to: Create, delete, query, and list DIS streams. Push data to DIS streams or pull data from them. Query stream monitoring metrics. DPS DPS Administrator Data Pipeline Service (DPS) Permissions to: Create and delete pipelines; modify, obtain, and check pipeline definitions. Run and pause pipelines; set the schedule configurations for pipelines; stop the schedule of pipelines. Obtain pipeline lists, pipeline instance lists, activity instance lists, compute resources, and activity properties. Permission Information Select a rights set name from the Available Rights Sets or Selected Rights Sets area of the Edit dialog box. The JSON-formatted detailed information about the selected rights set is displayed in the lower part. The JSON-formatted detailed information about each rights set contains one or multiple statements. Each statement describes a group of permissions. The following is a permission information example. Table 3-3 describes the parameters. "Version" : "1.0", "Statement" : [ Issue 09 ( ) 9

12 3 Permission Description "Effect" : "Allow", "Action" : [ "VPC:vpc:*", "VPC:router:*", "VPC:network:*", "VPC:subnet:*", "VPC:privateip:*", "VPC:port:*", "VPC:vpn:*", "Depends" : [ "catalog": "BASE", "display_name": "Tenant Guest" Table 3-3 Parameter description Parameter Description Value Version Indicates a version. Example value: 1.0 Statement (systemdefined JSON statement) Effect Whether an operation included in an action is allowed. Possible values: Allow: The operation is allowed. Deny: The operation is not allowed. Action An operation for a service included in a permission. Service name: Operation name Example value: VPC:subnet:*: indicates all operations performed on a subnet. In this value, VPC is a service name, and the asterisk sign (*) is a wildcard character, indicating all operations. Depends (dependent rights set) catalog display_na me Service that a dependent rights set belongs to. Name of a dependent rights set. Service name Example value: BASE Rights set name Example value: Tenant Guest Issue 09 ( ) 10

13 4 How Do I Manage Users? 4 How Do I Manage Users? When an enterprise needs to create a user for a new employee or for development tools (such as API, CLI, and SDK) to access cloud services, users with Security Administrator permissions can create a user, set access credential for this user, and add this user to a corresponding user group so that this user has the permissions of this user group. Prerequisites You have Security Administrator permissions. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Management & Deployment >. In the navigation pane, choose User. On the User page, click Create User. On the Create User page, enter User Name. Specify Credential Type. Password Access key This option is used for logging in to the management console or enables development tools (such as API, CLI, and SDK) that support password authentication to access cloud services. This option enables development tools (such as API, CLI, and SDK) that support key authentication to access cloud services. Step 6 Select a user group to be added from the User Groups drop-down combo box. You can also enter a keyword to quickly find the target user group. If you set Credential Type to Password, go to Step 7. If you set Credential Type to Access key, click OK to download the generated key. The user creation is complete. Issue 09 ( ) 11

14 4 How Do I Manage Users? The generated key is the access key. Download it as required. Step 7 Step 8 Click Next. Specify Password Type and enter and Mobile Number. Set at first login: The system will send you a one-time login URL using an . You can click this URL to log in to the management console and set the password. If you set Password Type to Set at first login, must be set. Automatically generated: The system randomly generates a 10-byte password. This option enables development tools (such as API, CLI, and SDK) that support password authentication to access cloud services. You can click OK to download the automatically generated password file. Set manually: allows you to customize a login password. SMS-based login verification can be used only when a user is bound with and Mobile Number. For the method of enabling this function, see "How Do I Modify My Credential Information?" in My Credential. You can log in to the system using the configured user name, address, or mobile number. If you forget your password, you can reset your password using the bound address or mobile number. Password requirements are as follows: The password cannot be the user name or the user name spelled backwards. Comparing the password and user name is done case-insensitive. The password must contain 6 to 32 characters. The password must contain at least two of the following character types: uppercase letters (A to Z), lowercase letters (a to z), digits (0 to 9), and special characters (!"#$%&'()*+,-./:;<=>?@[^`_ ~ and spaces). Step 9 Click OK. The user creation is complete. ----End Follow-up Procedure Viewing user details In the user list, click corresponding to a user to view the details of the user. Modifying basic user information In the user list, click Modify corresponding to a user to modify basic information about the user. Modifying a user group to which a user belongs In the user list, click Modify corresponding to a user. In the User Groups area of the Modify User page, add or delete a user group to which the user belongs. Deleting a user In the user list, click Delete corresponding to a user. Issue 09 ( ) 12

15 4 How Do I Manage Users? Setting user credentials In the user list, click Set Credentials corresponding to a user and modify user credentials or set a key. Issue 09 ( ) 13

16 5 How Do I Create an Agency? 5 How Do I Create an Agency? If an enterprise wants to reduce the operating expense (OPEX) or selects a more professional person or team to manage cloud resources, the user with Security Administrator permissions in the enterprise can create an agency to establish a relationship of trust with another enterprise account. The entrusted enterprise then manages cloud resources. This function implements secure and efficient management of cloud resources. Prerequisites You have Security Administrator permissions. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Step 6 Step 7 Choose Management & Deployment >. In the navigation pane, choose Agency. On the Agency page, click Create Agency. On the Create Agency page, specify Agency name and Agency Type. If you set Agency Type to Common domain, enter the agency domain name in Domain name. If you set Agency Type to Cloud service, click Select and set the service domain type. Set Validity Period and enter Description. In the Rights area, click Modify in the Operation column corresponding to the target region or project. In the Modify Permission dialog box, select a required rights set for the entrusted enterprise from the Available Rights Sets area. For details about rights sets, see Permission Description. Step 8 Click OK. The newly created agency is displayed in the agency list. ----End Issue 09 ( ) 14

17 5 How Do I Create an Agency? Operation Result Follow-up Operation After an agency is created, the account of the entrusted enterprise can call an API to manage cloud resources. You can click Modify in the agency list to modify the basic information about the new agency. The information includes the account and validity period of the entrusted domain name. Issue 09 ( ) 15

18 6 How Do I Switch Roles? 6 How Do I Switch Roles? After an agency is created, a user can use the entrusted enterprise administrator account to log in to the cloud service system and switch roles to manage cloud resources for the enterprise that creates the agency. This function implements secure and efficient management of cloud resources. Prerequisites You have the te_agency permission. An agency has been created. Procedure Step 1 Step 2 Step 3 Click the login account in the upper right of the page and choose Switch Role. On the Switch Role page, enter Domain Name and select the target agency from the Agency Name drop-down list. Click OK. The operation page of the agency account is displayed. ----End Follow-up Operation Click the agency account in the upper right corner of the page and choose Switch to to switch back to the original account. Issue 09 ( ) 16

19 7 How Do I Configure Federated Identity Authentication? 7 How Do I Configure Federated Identity Authentication? 7.1 Introduction to Federated Identity Authentication 7.2 Interconnection for Federated Identity Authentication 7.3 SSO Process 7.4 How Do I Create an Identity Provider and Perform an SSO? 7.5 How Do I Configure the Name and Permission Information About a Federated User? Issue 09 ( ) 17

20 7 How Do I Configure Federated Identity Authentication? 7.1 Introduction to Federated Identity Authentication Federated identity authentication is a mechanism for establishing a relationship of trust between an identity provider (IdP) and the service provider (SP). An IdP is an identity provider owned by an enterprise. SP refers to HUAWEI CLOUD. After a relationship of trust between an IdP and the SP is established, the IdP uses the existing credentials to access cloud resources. With federated identity authentication, the enterprise administrator can implement employee identity authentication and authorization using the IdP owned by the enterprise to access HUAWEI CLOUD, without having to repeatedly create employee information in HUAWEI CLOUD. 7.2 Interconnection for Federated Identity Authentication Prerequisites Before interconnection for federated identity authentication, the enterprise IdP and SP need to establish a relationship of trust between the IdP and SP. The time of the IdP server is consistent with that of the SP server. That is, both servers use the Universal Time Coordinated (UTC) time. If the time is inconsistent, federated identity authentication will fail. Issue 09 ( ) 18

21 7 How Do I Configure Federated Identity Authentication? Trust Relationship Procedure Step 1 Step 2 Exchange the metadata files between the enterprise IdP and SP. Upload the metadata file of the enterprise IdP to IAM. For details, see How Do I Create an Identity Provider and Perform an SSO? Enter in the address box of a web browser to obtain the metadata file of IAM and configure this file to the IdP. Create an IdP. For details, see How Do I Create an Identity Provider and Perform an SSO? Step 3 Configure the name and permission information about the federated user. For details, see How Do I Configure the Name and Permission Information About a Federated User? Configure the login link generated in Step 2 to the enterprise portal to facilitate future access. ----End Issue 09 ( ) 19

22 7 How Do I Configure Federated Identity Authentication? 7.3 SSO Process Process Description 1. Open the login link generated after an IdP is created in a web browser, the web browser initiates single sign-on (SSO). 2. IAM finds the metadata file of the enterprise IdP based on domain and IdP carried in the link and constructs a SAML Request to respond to the web browser. 3. The web browser responds and forwards the SAML Request to the enterprise IdP. 4. Users enter a user name and password on the IdP server completes identity authentication. 5. The IdP server constructs an assertion in a SAML Response to respond the web browser. 6. The web browser responds and forwards the SAML Response to IAM. Issue 09 ( ) 20

23 7 How Do I Configure Federated Identity Authentication? 7. IAM extracts the assertion from the SAML Response and parses the assertion. Based on the configured rules, IAM generates a token to implement the login. The assertion must carry a signature. Otherwise, the login will fail. To view the interactive requests and assertion information more easily, you are advised to use the Chrome web browser and install the plug-in SAML Message Decoder. 7.4 How Do I Create an Identity Provider and Perform an SSO? Most of enterprises or organizations have their own identity providers (IdPs), who provide a secure and reliable identity authentication service. For example, the IAM service acts as the IdP for the HUAWEI CLOUD. After single sign-on (SSO) is configured, redirection between an enterprise website and the HUAWEI CLOUD is implemented. SSO is a prerequisite for redirection between an enterprise website and the HUAWEI CLOUD without login. Prerequisites You have Security Administrator permissions. The enterprise has the IdP service, and this IdP supports the SAML2.0 protocol. Security Assertion Markup Language (SAML): An XML-based open standard for exchanging authentication and authorization data between security domains. If you are unfamiliar with the SAML content, you are advised to learn the basic information about SAML2.0 at You have configured the metadata file provided by the HUAWEI CLOUD to the IdP server of the enterprise. a. The website is b. Right-click on the browser and choose Save as, and set a file name, for example, hec-metadata.xml. c. Configure the hec-metadata.xml file to the IdP server of the enterprise. The configuration operation depends on the IdP server brand and version of the enterprise. You have obtained the metadata file of the enterprise IdP. For the acquisition method, consult the corresponding enterprise department. Generally, you can obtain the metadata file of an enterprise IdP using a URL address. Save the obtained file. Context You have a basic knowledge of the following concepts for better understanding how to create and configure an identity provider: Currently, the IAM service of the HUAWEI CLOUD supports entrusted authentication and SSO using the standard SAML2.0 protocol. The enterprise administrator is able to create an IdP in the IAM service ( of HUAWEI CLOUD to implement redirection between the enterprise portal and the HUAWEI Issue 09 ( ) 21

24 7 How Do I Configure Federated Identity Authentication? CLOUD and implement the user and information mapping between IAM of the HUAWEI CLOUD and the enterprise's IdP. IdP: indicates the identity provider of an enterprise in this document. Service provider (SP): indicates the HUAWEI CLOUD in this document. Metadata: indicates a SAML2.0-compliant interface file. The file contains interface addresses and certificate information required by the SAML2.0 protocol. Two such files are available, one for IdP and the other for SP. The IdP and SP set up a trust relationship by exchanging their metadata files and configuring data in the file of each other. The HUAWEI CLOUD uses the address and certificate in the metadata file to communicate with the IdP server. Procedure Step 1 Step 2 Step 3 Step 4 Step 5 Choose Management & Deployment >. In the navigation pane, click Identity Provider. On the Identity Provider page, click Create Identity Provider. Set the Name, Status, and Description. Click OK. If information shown in Figure 7-1 is displayed, the IdP has been successfully created. Figure 7-1 IdP created successfully Step 6 Step 7 After this page is closed, click Modify in the Operation column of the target IdP In the Metadata Configuration area on the Modify Identity Provider page, configure metadata. Automatically extracting metadata a. Click on the left of Upload, and select the metadata file of the enterprise IdP. b. Click Upload. A dialog box is displayed, showing the metadata extracted by the system. c. Click OK. If "The uploaded file contains multiple IdPs. Select an IdP as needed." is displayed, select the desired IdP you need from the Entity ID drop-down list box. If a message is displayed indicating that Entity ID in the metadata file is empty or that the signature certificate has expired, check whether the metadata file is correct. Then, upload the file again or manually configure metadata. Manually configuring metadata a. Click manually configure. Issue 09 ( ) 22

25 7 How Do I Configure Federated Identity Authentication? b. On the displayed Manually Configure Metadata page, enter Entity ID, Signature Certificates, SingleSignOnService, and other parameters. Entity ID: uniquely identifies an enterprise IdP. A metadata file can contain multiple IdPs. You need to select your desired IdP. Signature Certificates: indicates a certificate used for verifying the signature and contains a public key. For security purposes, you are advised to use a public key whose length is greater than or equal to 2048 bits. During federated identity authentication, the system checks the credibility and integrity of an assertion based on the signature certificate in the metadata file. SingleSignOnService: indicates the method of sending SAML requests during the SSO process. SingleSignOnService in the metadata file must support HTTP Redirect or HTTP POST. c. Click OK. For details about SSO, see SSO Process Step 8 In the Identity Conversion Rule area, click Create Rule to create an identity conversion rule. For details about how to create an identity conversion rule, see How Do I Configure the Name and Permission Information About a Federated User? Step 9 Step 10 Click OK and save the settings. Attempt to perform an SSO. 1. Click View in the Operation column correspond to the IdP on the Identity Provider page. 2. Click Copy on the right of Login link to copy the address in Login link and open it using the browser. 3. Check whether the login page provided by the IdP server of the enterprise can be displayed. If it is displayed, go to Step If it is not displayed, check whether the obtained enterprise metadata file and the enterprise IdP server are correctly configured. Issue 09 ( ) 23

26 7 How Do I Configure Federated Identity Authentication? 4. Enter a user name and password and check whether you can log in to the HUAWEI CLOUD. ----End If the login is successful, configure this address as a link to your enterprise website. If the login fails, check your user name and password. Follow-up Procedure Viewing IdP information On the Identity Provider page, click View in the Operation column corresponding to an IdP to query the basic information, metadata file status, and identity conversion rules of the IdP. You can click View Identity Provider Information on the Modify Identity Provider page to enter the Modify Identity Provider page. Modifying IdP information On the Identity Provider page, click Modify in the Operation column corresponding to an IdP to enter the Modify Identity Provider page. You can set Status (Enabled or Disabled), Description, Metadata File, and Identity Conversion Rule. Deleting an IdP On the Identity Provider page, click Delete in the Operation column corresponding to an IdP to delete the IdP. 7.5 How Do I Configure the Name and Permission Information About a Federated User? User identity authentication and permission configuration in the HUAWEI CLOUD can be implemented by creating identity conversion rules. This section describes how to create an identity conversion rule. You can set certain rules to set up the mapping between the user and permission information returned by the enterprise IdP server and those of the HUAWEI CLOUD. The user names and permission names returned by the enterprise IdP server and the HUAWEI CLOUD may be different. For example, set demo@example.org of in the attributes to the user name in the HUAWEI CLOUD and allocate the user to the admin user group based on idp_admin in Groups. Prerequisites The basic IdP information has been set and SSO is successful. For details, see How Do I Create an Identity Provider and Perform an SSO? You have Security Administrator permissions. The enterprise has the IdP service, and this IdP supports the SAML2.0 protocol. You have a preliminary understanding of the SAML2.0 protocol and are familiar with metadata files. You have learned the assertion structure displayed after successful SAML2.0 authentication. Issue 09 ( ) 24

27 7 How Do I Configure Federated Identity Authentication? Context IdPs maintain user identity and permission information. After an SSO is complete, the IdP returns an assertion structure to the SP. The assertion structure contains the user identity and permission information that pass the authentication and presents the information as an attribute list. The following example shows the attributes in an assertion.... <saml2:attributestatement> <saml2:attribute FriendlyName="mail" Name="urn:oid: " NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"> <saml2:attributevalue>demo@example.orgsaml2:attributevalue>demo@example.org> </saml2:attribute> <saml2:attribute FriendlyName="GROUPS" Name="urn:oid: " NameFormat="urn:oasis:names:tc:SAML:2.0:attrname-format:uri"> <saml2:attributevalue>dev-adm;sec-admsaml2:attributevalue>dev-adm;secadm> </saml2:attribute> </saml2:attributestatement>... Procedure Step 1 Step 2 Step 3 Choose Management & Deployment >. In the navigation pane, click Identity Provider. On the Identity Provider page, click Modify in the Operation column corresponding to an IdP. The Modify Identity Provider page is displayed. Step 4 In the Identity Conversion Rule area, click Create Rule to add an identity conversion rule. After you create an IdP, the HUAWEI CLOUD will preconfigure a default rule. The default user name for this rule is FederationUser. This user is allowed to view only certain GUIs. In the Identity Conversion Rule area, click View Rules to view the current rules. In the Identity Conversion Rule area, you can click Create Rule and create a rule to define user names, set user permissions, and specify the scenarios where the rule takes effect. Do not configure sensitive personal information in rules, for example, use a credit card number as a user name. Issue 09 ( ) 25

28 7 How Do I Configure Federated Identity Authentication? The parameters are described as follows: User Name: indicates the user name displayed in the HUAWEI CLOUD after a federated user logs in. You can enter a simple expression in this input box, for example, Federation_user_ . is a placeholder, which is replaced by the value of the attribute in the actual assertion. As indicated by the sample assertion, the user name is Federation_user_demo@example.org. In Editing rules, placeholders, such as 0 and 1, rather than are used. After a rule is created, the system automatically converts the rule. Pay attention to the difference when editing rules. User Group: indicates the user group to which the federated user belongs in the HUAWEI CLOUD after the federated user logs in. The user group of a user determines the permissions of the user. Conditions for Validating This Rule: You can set certain conditions so that a rule takes effect only when it meets the conditions. If the user group admin is specified in a rule and you need to grant the admin permission to only certain users who perform the federated login, you can specify conditions so that the rule takes effect only when these conditions are met. If no rule takes effect, the user is not allowed to log in to the system. The user can click the login link to display the corresponding error message. ----End Follow-up Procedure Viewing rules In the Identity Conversion Rule area, click View Rules. The newly created identity conversion rule is displayed in the JSON file. Editing rules In the Identity Conversion Rule area, click Edit Rule. This function provides flexible syntax for editing rules to meet the federated identity authentication requirements. The following shows a typical editing example. After the rules are edited, you can click Verify Rule in the lower left corner of the page to verify the correctness of the rules. Issue 09 ( ) 26

29 7 How Do I Configure Federated Identity Authentication? Rule file description Each rule is saved in a JSON file. The example is as follows: [ "local": [ "<user> or <group>", "remote": [ "<condition>" local: indicates the user information after conversion. It can be the placeholder 0..n. remote: indicates the expression that is a combination of assertion attributes and operators. condition: The following three conditions are supported: Example of Empty empty: unlimited. That is, the condition is always valid and the returned value is the input attribute value. This value is used to replace the placeholder in the local block. any_one_of: The condition is valid only if the input attributes include any specified value, and a Boolean value is returned. The returned value cannot be used to replace the placeholder in the local block. not_any_of: The condition is valid only if the input attributes do not include any specified value, and a Boolean value is returned. The returned value cannot be used to replace the placeholder in the local block. The Empty condition indicates that a character string value can be returned. This value is used to replace the placeholder 0..n in the local block. The example is as follows: [ "local": [ "user": "name": "0 1", "group": "name": "2", "remote": [ "type": "FirstName", "type": "LastName", "type": "Groups" Issue 09 ( ) 27

30 7 How Do I Configure Federated Identity Authentication? Assume that the HUAWEI CLOUD receives the following assertion. (For easy understanding, the following examples use a simplified assertion structure.) FirstName: Jone LastName: Smith Groups: [admin, manager The following attributes are mapped into the HUAWEI CLOUD: UserName: John Smith Groups: admin; manager Example of Any one of and Not any of Different from the Empty condition, the returned values of the Any one of and Not any of conditions are Boolean values. These values cannot be used to replace the placeholder of in the local block. In the following example, only the placeholder 0 exists and is replaced by the returned value of Empty in the remote block, and the value of group is fixedly set to admin. [ "local": [ "user": "name": "0", "group": "name": "admin", "remote": [ "type": "UserName", "type": "Groups", "any_one_of": [ "idp_admin" Assume that the HUAWEI CLOUD receives the following assertion. UserName: Jone Smith Groups: [idp_user, idp_admin, idp_agency The following attributes are mapped into the HUAWEI CLOUD: UserName: John Smith Groups: admin Oppositely, assume that the HUAWEI CLOUD receives the following assertion. UserName: Jone Smith Groups: [idp_user, idp_agency None of the rules takes effect, and the current user is not allowed to log in to the system. Condition including a regular expression Issue 09 ( ) 28

31 7 How Do I Configure Federated Identity Authentication? You can specify "regix": true in conditions to indicate that the system is calculating the result using a regular expression. This is an advanced function, which is provided for you to have a simple understanding of it. [ Condition combination "local": [ "user": "name": "0", "group": "name": "admin", "remote": [ "type": "UserName", "type": "Groups", "any_one_of": [ ".*@mail.com$", "regex": true Multiple conditions are combined using the logical AND. [ "local": [ "user": "name": "0", "group": "name": "admin", "remote": [ "type": "UserName", "type": "Groups", "not_any_of": [ "idp_user", "type": "Groups", "not_any_of": [ "idp_agent" Issue 09 ( ) 29

32 7 How Do I Configure Federated Identity Authentication? The preceding mapping is similar to the following example: [ Multiple rules "local": [ "user": "name": "0", "group": "name": "admin", "remote": [ "type": "UserName", "type": "Groups", "not_any_of": [ "idp_user", "idp_agent" If multiple rules are combined, the methods for generating user names and user groups are different. The user name in the first valid rule is used as UserName. At least one user name rule among all rules must take effect. Otherwise, the user is not allowed to log in. The collection of the user group names in all valid rules is used as Groups. Separating the configuration of user names and user groups using the multi-rule configuration method makes the configuration easy-to-read. [, "local": [ "user": "name": "0", "remote": [ "type": "UserName" "local": [ "group": "name": "admin", "remote": [ "type": "Groups", "any_one_of": [ "idp_admin" Issue 09 ( ) 30

33 7 How Do I Configure Federated Identity Authentication?, "local": [ "group": "name": "agency", "remote": [ "type": "orgpersontype", "any_one_of": [ "idp_agency" Assume that the HUAWEI CLOUD receives the following assertion. UserName: Jone Smith Groups: [idp_user, idp_admin, idp_agency The following attributes are mapped into the HUAWEI CLOUD: UserName: John Smith Groups: admin; agency Issue 09 ( ) 31

34 8 How Do I Set Account Policies? 8 How Do I Set Account Policies? Users with Security Administrator permissions in an enterprise can set login verification policies, password policies, and the ACL to improve user information and system security. Prerequisites You have Security Administrator permissions. Procedure Step 1 Step 2 Choose Management & Deployment >. Set login verification policies. 1. In the navigation pane, choose Account Settings > Login Authentication Policies. 2. In the Account Locking Policy area, enter Duration, Maximum Number of Attempts, and Locking Duration. If the number of login attempts reaches the specified upper limit within the specified duration, the user account will be locked for a period of time. 3. In the Account Disabling Policy area, select If an account is not used within the validity period, it will be disabled and set Account Expiration. This policy takes effect only for users created by the enterprise administrator. The value range of Account Expiration is 1 to 240. The default value is In the Recent Login Information area, select Display last login information upon a successful login. Users can view login information, such as the last login time, on the Login Verification page. 5. In the Login Verification Information area, customize the verification information displayed upon a successful login. Users can view the customized verification information on the Login Verification page. 6. Click Apply. Step 3 Set password policies. 1. In the navigation pane, choose Account Settings > Password Policies. Issue 09 ( ) 32

35 8 How Do I Set Account Policies? Password requirements are as follows: The password cannot be the user name or the reverse of the user name. The password must contain 6 to 32 characters. The password must contain at least two of the following character types: uppercase letters (A to Z), lowercase letters (a to z), digits (0 to 9), and special characters ~ and spaces). 2. In the Setting Policy area, set parameters as follows: Set Minimum Number of Characters. The default value contains 6 characters. Select Disallow same consecutive characters in a password and set Maximum Number of Same Consecutive Characters. Select Disallow password repetition and set Most Recent Passwords Disallowed. 3. In the Expiration Policy area, select Force password change upon password expiration (You are prompted to change your password 15 days before password expiration) and set Password Validity Period. The user must change the password within the time specified in Password Validity Period. Otherwise, the user cannot log in to the system. 4. In the Minimum Password Validity Period Policy area, select A new password can be changed only after it has been used for the specified minimum password validity period and set Min. Password Validity Period. After the password is changed, you can change it again only after the time specified by Min. Password Validity Period. 5. Click Apply. Step 4 Set the ACL. 1. In the navigation pane, choose Account Settings > ACL. The ACL does not take effect for root users of domains (except the domains starting with op_svc). 2. On the ACL page, enter the allowed IP addresses or network segments. Allowed IP Address Ranges: allows users to access the system using only specified IP addresses. You can click Restore Defaults to restore the allowed IP address range to the default value, Allowed IP Addresses or Network Segments: allows users to access the system using only specified IP addresses or network segments. For example: /32 If both Allowed IP Address Ranges and Allowed IP Addresses or Network Segments are set, a user is allowed to access IAM when the IP address of the user meets the condition specified by either of the two parameters. The ACL takes effect for the users who use cloud services on the management console but does not take effect for the users who use cloud services by calling APIs. Issue 09 ( ) 33

36 8 How Do I Set Account Policies? 3. Click Apply. ----End Issue 09 ( ) 34

37 9 User Management Mechanism Explained Using a Picture 9 User Management Mechanism Explained Using a Picture Issue 09 ( ) 35

38 9 User Management Mechanism Explained Using a Picture Issue 09 ( ) 36

39 A Change History A Change History Release Date What's New This issue is the ninth official release. Added the following contents: CTS Administrator permission Description for automatically extracting metadata and manually configuring metadata in chapter How Do I Create an Identity Provider and Perform an SSO? This issue is the eighth official release. Modified the following contents: Server Administrator permission VPC Administrator permission Issue 09 ( ) 37

40 A Change History Release Date What's New This issue is the seventh official release. Added the following contents: Introduction to Federated Identity Authentication Interconnection for Federated Identity Authentication SSO Process APM Admin permission CCS Administrator permission CCS User permission CDE Admin permission CDE Developer permission SvcStg Admin permission SvcStg Developer permission SvcStg Operator permission SWR Admin permission Modified the description for the RDS Administrator permission. Deleted the following contents: te_devcloud_project_admin permission te_devcloud_project_poweruser permission te_devcloud_project_readonly permission te_devcloud_codehub_admin permission te_devcloud_codehub_poweruser permission te_devcloud_codehub_readonly permission te_devcloud_codecheck_admin permission te_devcloud_codecheck_poweruser permission te_devcloud_codecheck_readonly permission te_devcloud_codeci_admin permission te_devcloud_codeci_poweruser permission te_devcloud_codeci_readonly permission te_devcloud_test_admin permission te_devcloud_test_poweruser permission te_devcloud_test_readonly permission te_devcloud_release_admin permission te_devcloud_release_poweruser permission te_devcloud_release_readonly permission Issue 09 ( ) 38

41 A Change History Release Date What's New This issue is the sixth official release. Added the following contents: How Do I Create an Agency? How Do I Switch Roles? DWS Administrator permission This issue is the fifth official release. Synchronized the update on the Create User page and updated How Do I Manage Users? Added the following contents: Agent Operator permission CRS Administrator permission This issue is the fourth official release. Synchronized the update on the Account Settings page and updated How Do I Set Account Policies? This issue is the third official release. Added the following chapters: Permission Description How Do I Create an Identity Provider and Perform an SSO? How Do I Configure the Name and Permission Information About a Federated User? This issue is the second official release. Added the setting of the parameter Min. Password Validity Period This issue is the first official release. Issue 09 ( ) 39

Web Cloud Solution. User Guide. Issue 01. Date

Web Cloud Solution. User Guide. Issue 01. Date Issue 01 Date 2017-05-30 Contents Contents 1 Overview... 3 1.1 What Is Web (CCE+RDS)?... 3 1.2 Why You Should Choose Web (CCE+RDS)... 3 1.3 Concept and Principle... 4... 5 2.1 Required Services... 5 2.2

More information

Vulnerability Scan Service. User Guide. Issue 20 Date HUAWEI TECHNOLOGIES CO., LTD.

Vulnerability Scan Service. User Guide. Issue 20 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 20 Date 2018-08-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page. Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator

More information

Introduction to application management

Introduction to application management Introduction to application management To deploy web and mobile applications, add the application from the Centrify App Catalog, modify the application settings, and assign roles to the application to

More information

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page. Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator

More information

Cloud Stream Service. User Guide. Issue 18 Date HUAWEI TECHNOLOGIES CO., LTD.

Cloud Stream Service. User Guide. Issue 18 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 18 Date 2018-11-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

SAML-Based SSO Configuration

SAML-Based SSO Configuration Prerequisites, page 1 SAML SSO Configuration Task Flow, page 5 Reconfigure OpenAM SSO to SAML SSO Following an Upgrade, page 9 SAML SSO Deployment Interactions and Restrictions, page 9 Prerequisites NTP

More information

Integrating the YuJa Enterprise Video Platform with Dell Cloud Access Manager (SAML)

Integrating the YuJa Enterprise Video Platform with Dell Cloud Access Manager (SAML) Integrating the YuJa Enterprise Video Platform with Dell Cloud Access Manager (SAML) 1. Overview This document is intended to guide users on how to integrate their institution s Dell Cloud Access Manager

More information

Integrating AirWatch and VMware Identity Manager

Integrating AirWatch and VMware Identity Manager Integrating AirWatch and VMware Identity Manager VMware AirWatch 9.1.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a

More information

Relational Database Service. User Guide. Issue 05 Date

Relational Database Service. User Guide. Issue 05 Date Issue 05 Date 2017-02-08 Contents Contents 1 Introduction... 1 1.1 Concepts... 2 1.1.1 RDS... 2 1.1.2 DB Cluster... 2 1.1.3 DB Instance... 2 1.1.4 DB Backup... 3 1.1.5 DB Snapshot... 3 1.2 RDS DB Instances...

More information

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1

Administering Workspace ONE in VMware Identity Manager Services with AirWatch. VMware AirWatch 9.1.1 Administering Workspace ONE in VMware Identity Manager Services with AirWatch VMware AirWatch 9.1.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Anti-DDoS. User Guide. Issue 05 Date

Anti-DDoS. User Guide. Issue 05 Date Issue 05 Date 2017-02-08 Contents Contents 1 Introduction... 1 1.1 Functions... 1 1.2 Application Scenarios...1 1.3 Accessing and Using Anti-DDoS... 2 1.3.1 How to Access Anti-DDoS...2 1.3.2 How to Use

More information

Single Sign-On for PCF. User's Guide

Single Sign-On for PCF. User's Guide Single Sign-On for PCF Version 1.2 User's Guide 2018 Pivotal Software, Inc. Table of Contents Table of Contents Single Sign-On Overview Installation Getting Started with Single Sign-On Manage Service Plans

More information

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server... Oracle Access Manager Configuration Guide for On-Premises Version 17 October 2017 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing

More information

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1

Guide to Deploying VMware Workspace ONE. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 Guide to Deploying VMware Workspace ONE DEC 2017 VMware AirWatch 9.2 VMware Identity Manager 3.1 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

Elastic Load Balance. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Elastic Load Balance. User Guide. Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2018-04-30 HUAWEI TECHNOLOGIES CO., LTD. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1

Guide to Deploying VMware Workspace ONE. VMware Identity Manager VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE VMware Identity Manager 2.9.1 VMware AirWatch 9.1 Guide to Deploying VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware

More information

Virtual Private Cloud. User Guide. Issue 21 Date HUAWEI TECHNOLOGIES CO., LTD.

Virtual Private Cloud. User Guide. Issue 21 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 21 Date 2018-09-30 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE

Integrating VMware Workspace ONE with Okta. VMware Workspace ONE Integrating VMware Workspace ONE with Okta VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this

More information

Database Security Service. FAQs. Issue 19 Date HUAWEI TECHNOLOGIES CO., LTD.

Database Security Service. FAQs. Issue 19 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 19 Date 2019-04-08 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 Single Sign on Single Service Provider Agreement, page 2 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 3 Cisco Unified Communications Applications

More information

Mozy. Administrator Guide

Mozy. Administrator Guide Mozy Administrator Guide Preface 2017 Mozy, Inc. All rights reserved. Information in this document is subject to change without notice. The software described in this document is furnished under a license

More information

Elastic Load Balancing. User Guide. Date

Elastic Load Balancing. User Guide. Date Date 2018-07-20 Contents Contents 1 Product Description... 4 1.1 What Is Elastic Load Balancing (ELB)?... 4 1.2 Load Balancer Type... 4 1.3 Basic Architecture... 5 1.3.1 Classic Load Balancer... 5 1.3.2

More information

Object Storage Service. Client Guide (OBS Browser) Issue 10 Date HUAWEI TECHNOLOGIES CO., LTD.

Object Storage Service. Client Guide (OBS Browser) Issue 10 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 10 Date 2018-07-15 HUAWEI TECHNOLOGIES CO., LTD. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2

VMware Identity Manager Administration. MAY 2018 VMware Identity Manager 3.2 VMware Identity Manager Administration MAY 2018 VMware Identity Manager 3.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Anti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD.

Anti-DDoS. User Guide (Paris) Issue 01 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 01 Date 2018-08-15 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Identity Provider for SAP Single Sign-On and SAP Identity Management

Identity Provider for SAP Single Sign-On and SAP Identity Management Implementation Guide Document Version: 1.0 2017-05-15 PUBLIC Identity Provider for SAP Single Sign-On and SAP Identity Management Content 1....4 1.1 What is SAML 2.0.... 5 SSO with SAML 2.0.... 6 SLO with

More information

Centrify for Dropbox Deployment Guide

Centrify for Dropbox Deployment Guide CENTRIFY DEPLOYMENT GUIDE Centrify for Dropbox Deployment Guide Abstract Centrify provides mobile device management and single sign-on services that you can trust and count on as a critical component of

More information

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE

Guide to Deploying VMware Workspace ONE with VMware Identity Manager. SEP 2018 VMware Workspace ONE Guide to Deploying VMware Workspace ONE with VMware Identity Manager SEP 2018 VMware Workspace ONE You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

INTEGRATING OKTA: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE

INTEGRATING OKTA: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE GUIDE AUGUST 2018 PRINTED 4 MARCH 2019 INTEGRATING OKTA: VMWARE WORKSPACE ONE OPERATIONAL TUTORIAL VMware Workspace ONE Table of Contents Overview Introduction Purpose Audience Integrating Okta with VMware

More information

Integrating YuJa Active Learning into Google Apps via SAML

Integrating YuJa Active Learning into Google Apps via SAML Integrating YuJa Active Learning into Google Apps via SAML 1. Overview This document is intended to guide users on how to integrate YuJa as a Service Provider (SP) using Google as the Identity Provider

More information

SAP IoT Application Enablement Best Practices Authorization Guide

SAP IoT Application Enablement Best Practices Authorization Guide SAP IoT Application Enablement Best Practices Authorization Guide TABLE OF CONTENTS 1 INITIAL TENANT SETUP... 3 1.1 Configure Trust... 3 1.1.1 Technical Background... 6 1.2 Establish Trust... 6 1.3 Set

More information

RECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for High Security SSO

RECOMMENDED DEPLOYMENT PRACTICES. The F5 and Okta Solution for High Security SSO July 2017 Contents Introduction...3 The Integrated Solution...3 Prerequisites...4 Configuration...4 Set up BIG-IP APM to be a SAML IdP...4 Create a self-signed certificate for signing SAML assertions...4

More information

Backup Solution. User Guide. Issue 01 Date

Backup Solution. User Guide. Issue 01 Date Issue 01 Date 2017-08-30 Contents Contents 1 Introduction... 1 1.1 What Is the Backup Solution?... 1 1.2 Why Choose the Backup Solution?... 2 1.3 Concepts and Principles...3 1.3.1 Basic OBS Concepts...3

More information

Advanced Configuration for SAML Authentication

Advanced Configuration for SAML Authentication The advanced configuration for SAML authentication includes: Configuring Multiple Identity Providers Multiple Identity Providers can be configured to a SAML authentication service on the Barracuda Web

More information

Five9 Plus Adapter for Agent Desktop Toolkit

Five9 Plus Adapter for Agent Desktop Toolkit Cloud Contact Center Software Five9 Plus Adapter for Agent Desktop Toolkit Administrator s Guide September 2017 The Five9 Plus Adapter for Agent Desktop Toolkit integrates the Five9 Cloud Contact Center

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Google Cloud Connector Guide McAfee Cloud Identity Manager version 1.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

IAM. Shopping Cart. IAM Description PM OM CM IF. CE SC USM Common Web CMS Reporting. Review & Share. Omnichannel Frontend...

IAM. Shopping Cart. IAM Description PM OM CM IF. CE SC USM Common Web CMS Reporting. Review & Share. Omnichannel Frontend... PM OM CM IF IAM CE SC USM Common Web CMS Reporting IAM Description The identity & access management (IAM) provides functions such as account information management, role permission management, access control

More information

Third-Party Client (s3fs) User Guide

Third-Party Client (s3fs) User Guide Issue 02 Date 2017-09-28 HUAWEI TECHNOLOGIES CO., LTD. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Oracle Access Manager Configuration Guide

Oracle Access Manager Configuration Guide Oracle Access Manager Configuration Guide 16 R2 September 2016 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 7 Installing Oracle HTTP Server...

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware AirWatch 9.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Upland Qvidian Proposal Automation Single Sign-on Administrator's Guide

Upland Qvidian Proposal Automation Single Sign-on Administrator's Guide Upland Qvidian Proposal Automation Single Sign-on Administrator's Guide Version 12.0-4/17/2018 Copyright Copyright 2018 Upland Qvidian. All rights reserved. Information in this document is subject to change

More information

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29

Contents Introduction... 5 Configuring Single Sign-On... 7 Configuring Identity Federation Using SAML 2.0 Authentication... 29 Oracle Access Manager Configuration Guide 16 R1 March 2016 Contents Introduction... 5 Configuring Single Sign-On... 7 Prerequisites for Configuring Single Sign-On... 8 Installing Oracle HTTP Server...

More information

Virtual Private Cloud. User Guide. Issue 03 Date

Virtual Private Cloud. User Guide. Issue 03 Date Issue 03 Date 2016-10-19 Change History Change History Release Date What's New 2016-10-19 This issue is the third official release. Modified the following content: Help Center URL 2016-07-15 This issue

More information

Configuration Guide - Single-Sign On for OneDesk

Configuration Guide - Single-Sign On for OneDesk Configuration Guide - Single-Sign On for OneDesk Introduction Single Sign On (SSO) is a user authentication process that allows a user to access different services and applications across IT systems and

More information

Add OKTA as an Identity Provider in EAA

Add OKTA as an Identity Provider in EAA Add OKTA as an Identity Provider in EAA Log in to Akamai Luna control center with administrative privileges. Select the correct contract which is provisioned for Enterprise Application Access (EAA). In

More information

Object Storage Service. Client Guide (OBS Browser) Issue 02 Date HUAWEI TECHNOLOGIES CO., LTD.

Object Storage Service. Client Guide (OBS Browser) Issue 02 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 02 Date 2018-01-17 HUAWEI TECHNOLOGIES CO., LTD. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Amazon AppStream 2.0: SOLIDWORKS Deployment Guide

Amazon AppStream 2.0: SOLIDWORKS Deployment Guide 2018 Amazon AppStream 2.0: SOLIDWORKS Deployment Guide Build an Amazon AppStream 2.0 environment to stream SOLIDWORKS to your users June 2018 https://aws.amazon.com/appstream2/ 1 Welcome This guide describes

More information

StreamSets Control Hub Installation Guide

StreamSets Control Hub Installation Guide StreamSets Control Hub Installation Guide Version 3.2.1 2018, StreamSets, Inc. All rights reserved. Table of Contents 2 Table of Contents Chapter 1: What's New...1 What's New in 3.2.1... 2 What's New in

More information

Elastic Load Balance. User Guide. Issue 14 Date

Elastic Load Balance. User Guide. Issue 14 Date Issue 14 Date 2018-02-28 Contents Contents 1 Overview... 1 1.1 Basic Concepts... 1 1.1.1 Elastic Load Balance... 1 1.1.2 Public Network Load Balancer...1 1.1.3 Private Network Load Balancer... 2 1.1.4

More information

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1

Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date

More information

VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch

VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch Workspace ONE UEM v9.4 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard

More information

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA

271 Waverley Oaks Rd. Telephone: Suite 206 Waltham, MA USA Contacting Leostream Leostream Corporation http://www.leostream.com 271 Waverley Oaks Rd. Telephone: +1 781 890 2019 Suite 206 Waltham, MA 02452 USA To submit an enhancement request, email features@leostream.com.

More information

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide BlackBerry Enterprise Server for Microsoft Office 365 Version: 1.0 Administration Guide Published: 2013-01-29 SWD-20130131125552322 Contents 1 Related resources... 18 2 About BlackBerry Enterprise Server

More information

ServiceStage. User Guide. Issue 01 Date

ServiceStage. User Guide. Issue 01 Date Issue 01 Date 2018-06-26 Contents Contents 1 Environment Preparation...1 2 Console... 3 3 Resource Preparation... 5 3.1 Creating a Cluster... 5 3.2 Creating a Namespace... 11 3.3 Adding a Node...12 3.4

More information

Third-Party Client (s3fs) User Guide

Third-Party Client (s3fs) User Guide Issue 02 Date 2017-09-28 HUAWEI TECHNOLOGIES CO., LTD. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Five9 Plus Adapter for Microsoft Dynamics CRM

Five9 Plus Adapter for Microsoft Dynamics CRM Cloud Contact Center Software Five9 Plus Adapter for Microsoft Dynamics CRM Administrator s Guide September 2017 This guide describes how to install and configure the Five9 Plus Adapter for Microsoft Dynamics

More information

Setting Up Resources in VMware Identity Manager

Setting Up Resources in VMware Identity Manager Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.7 This document supports the version of each product listed and supports all subsequent versions until the document is replaced

More information

Object Storage Service. Product Introduction. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD.

Object Storage Service. Product Introduction. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 04 Date 2017-12-20 HUAWEI TECHNOLOGIES CO., LTD. 2017. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of

More information

Google SAML Integration

Google SAML Integration YuJa Enterprise Video Platform Google SAML Integration Overview This document is intended to guide users on how to integrate the YuJa Enterprise Video Platform as a Service Provider (SP) using Google as

More information

SAML-Based SSO Solution

SAML-Based SSO Solution About SAML SSO Solution, page 1 SAML-Based SSO Features, page 2 Basic Elements of a SAML SSO Solution, page 2 SAML SSO Web Browsers, page 3 Cisco Unified Communications Applications that Support SAML SSO,

More information

Installing and Configuring vcloud Connector

Installing and Configuring vcloud Connector Installing and Configuring vcloud Connector vcloud Connector 2.6.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Configuring Single Sign-on from the VMware Identity Manager Service to Marketo

Configuring Single Sign-on from the VMware Identity Manager Service to Marketo Configuring Single Sign-on from the VMware Identity Manager Service to Marketo VMware Identity Manager JANUARY 2016 V1 Configuring Single Sign-On from VMware Identity Manager to Marketo Table of Contents

More information

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate

Integration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Setting Up the Server

Setting Up the Server Managing Licenses, page 1 Cross-launch from Prime Collaboration Provisioning, page 5 Integrating Prime Collaboration Servers, page 6 Single Sign-On for Prime Collaboration, page 7 Changing the SSL Port,

More information

Oracle Utilities Opower Solution Extension Partner SSO

Oracle Utilities Opower Solution Extension Partner SSO Oracle Utilities Opower Solution Extension Partner SSO Integration Guide E84763-01 Last Updated: Friday, January 05, 2018 Oracle Utilities Opower Solution Extension Partner SSO Integration Guide Copyright

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager WebExConnect Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

CloudHealth. AWS and Azure On-Boarding

CloudHealth. AWS and Azure On-Boarding CloudHealth AWS and Azure On-Boarding Contents 1. Enabling AWS Accounts... 3 1.1 Setup Usage & Billing Reports... 3 1.2 Setting Up a Read-Only IAM Role... 3 1.3 CloudTrail Setup... 5 1.4 Cost and Usage

More information

Open Telekom Cloud Tutorial: Getting Started. Date published: Estimated reading time: 20 minutes Authors: Editorial Team

Open Telekom Cloud Tutorial: Getting Started. Date published: Estimated reading time: 20 minutes Authors: Editorial Team Date published: 03.08.2018 Estimated reading time: 20 minutes Authors: Editorial Team The bookmarks and navigation in this tutorial are optimized for Adobe Reader. Getting Started 1. Introduction 2. Prerequisites

More information

About This Document 3. Overview 3. System Requirements 3. Installation & Setup 4

About This Document 3. Overview 3. System Requirements 3. Installation & Setup 4 About This Document 3 Overview 3 System Requirements 3 Installation & Setup 4 Step By Step Instructions 5 1. Login to Admin Console 6 2. Show Node Structure 7 3. Create SSO Node 8 4. Create SAML IdP 10

More information

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager

Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) Modified 15 SEP 2017 VMware Identity Manager Setting Up Resources in VMware Identity Manager (SaaS) You can find the most up-to-date technical documentation

More information

SAP Business One. User Guide. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD.

SAP Business One. User Guide. Issue 04 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 04 Date 2018-12-31 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2019. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

Security and Privacy Overview

Security and Privacy Overview Security and Privacy Overview Cloud Application Security, Data Security and Privacy, and Password Management 1 Overview Security is a growing concern and should not be taken lightly across an organization.

More information

VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch

VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch VMware AirWatch Chrome OS Platform Guide Managing Chrome OS Devices with AirWatch AirWatch v9.3 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Marketo Cloud Connector Guide McAfee Cloud Identity Manager version 3.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Syncplicity Cloud Connector Guide McAfee Cloud Identity Manager version 3.1 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8

Setting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8 Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

SAP Security in a Hybrid World. Kiran Kola

SAP Security in a Hybrid World. Kiran Kola SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal

More information

SAP Global Track and Trace Onboarding Guide

SAP Global Track and Trace Onboarding Guide SAP Global Track and Trace Onboarding Guide Document Version: Cloud 2019.04a Implementation Guide PUBLIC TABLE OF CONTENTS 1 INTRODUCTION... 3 1.1 Prerequisite... 3 1.2 Overview... 3 2 SET UP AN SAP CLOUD

More information

IaaS Integration for Multi- Machine Services. vrealize Automation 6.2

IaaS Integration for Multi- Machine Services. vrealize Automation 6.2 IaaS Integration for Multi- Machine Services vrealize Automation 6.2 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about

More information

How to set up a Virtual Private Cloud (VPC)

How to set up a Virtual Private Cloud (VPC) Date published: 15.06.2018 Estimated reading time: 20 minutes Authors: Editorial Team The bookmarks and navigation in this tutorial are optimized for Adobe Reader. How to set up a Virtual Private Cloud

More information

Contents About This Guide... 5 About Notifications... 5 Managing User Accounts... 6 Managing Companies Managing Password Policies...

Contents About This Guide... 5 About Notifications... 5 Managing User Accounts... 6 Managing Companies Managing Password Policies... Cloud Services Identity Management Administration Guide Version 17 July 2017 Contents About This Guide... 5 About Notifications... 5 Managing User Accounts... 6 About the User Administration Table...

More information

Administering vrealize Log Insight. September 20, 2018 vrealize Log Insight 4.7

Administering vrealize Log Insight. September 20, 2018 vrealize Log Insight 4.7 Administering vrealize Log Insight September 20, 2018 4.7 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments about this documentation,

More information

Workspace. User Guide (Administrators) Issue 18 Date HUAWEI TECHNOLOGIES CO., LTD.

Workspace. User Guide (Administrators) Issue 18 Date HUAWEI TECHNOLOGIES CO., LTD. Issue 18 Date 2018-08-17 HUAWEI TECHNOLOGIES CO., LTD. Copyright Huawei Technologies Co., Ltd. 2018. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any

More information

IaaS Integration for Multi-Machine Services

IaaS Integration for Multi-Machine Services IaaS Integration for Multi-Machine Services vcloud Automation Center 6.1 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by

More information

ForeScout Extended Module for VMware AirWatch MDM

ForeScout Extended Module for VMware AirWatch MDM ForeScout Extended Module for VMware AirWatch MDM Version 1.7.2 Table of Contents About the AirWatch MDM Integration... 4 Additional AirWatch Documentation... 4 About this Module... 4 How it Works... 5

More information

Access Manager Applications Configuration Guide. October 2016

Access Manager Applications Configuration Guide. October 2016 Access Manager Applications Configuration Guide October 2016 Legal Notice For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions, U.S. Government rights,

More information

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow)

Integration Guide. PingFederate SAML Integration Guide (SP-Initiated Workflow) Integration Guide PingFederate SAML Integration Guide (SP-Initiated Workflow) Copyright Information 2018. SecureAuth is a registered trademark of SecureAuth Corporation. SecureAuth s IdP software, appliances,

More information

OnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems

OnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems OnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems April 2017 215-12035_C0 doccomments@netapp.com Table of Contents 3 Contents Before you create ONTAP Cloud systems... 5 Logging in

More information

ClientNet. Portal Admin Guide

ClientNet. Portal Admin Guide ClientNet Portal Admin Guide Document Revision Date: June 5, 2013 ClientNet Portal Admin Guide i Contents Introduction to the Portal... 1 About the Portal... 1 Logging On and Off the Portal... 1 Language

More information

McAfee Cloud Identity Manager

McAfee Cloud Identity Manager Coupa Cloud Connector Guide McAfee Cloud Identity Manager version 2.5 or later COPYRIGHT Copyright 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Print Management Cloud

Print Management Cloud Print Management Cloud Version 1.0 Configuration Guide January 2018 www.lexmark.com Contents 2 Contents Change history... 4 Overview... 5 Deployment readiness checklist...6 Getting started...7 Accessing

More information

Horizon Workspace Administrator's Guide

Horizon Workspace Administrator's Guide Horizon Workspace Administrator's Guide Horizon Workspace 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.

More information

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Better MDM

Integration Guide. SafeNet Authentication Service. Using SAS as an Identity Provider for Better MDM SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Enabling Single Sign-On Using Microsoft Azure Active Directory in Axon Data Governance 5.2

Enabling Single Sign-On Using Microsoft Azure Active Directory in Axon Data Governance 5.2 Enabling Single Sign-On Using Microsoft Azure Active Directory in Axon Data Governance 5.2 Copyright Informatica LLC 2018. Informatica and the Informatica logo are trademarks or registered trademarks of

More information

PingOne. How to Set Up a PingFederate Connection to the PingOne Dock. Quick Start Guides. Version 1.1 December Created by: Ping Identity Support

PingOne. How to Set Up a PingFederate Connection to the PingOne Dock. Quick Start Guides. Version 1.1 December Created by: Ping Identity Support PingOne Quick Start Guides How to Set Up a PingFederate Connection to the PingOne Dock Version 1.1 December 2014 Created by: Ping Identity Support Disclaimer This document is proprietary and not for general

More information

13241 Woodland Park Road, Suite 400 Herndon, VA USA A U T H O R : E X O S T A R D ATE: M A R C H V E R S I O N : 3.

13241 Woodland Park Road, Suite 400 Herndon, VA USA A U T H O R : E X O S T A R D ATE: M A R C H V E R S I O N : 3. SECURE ACCESS MAN AG E R FIRST TIME LOGIN GUIDE A U T H O R : E X O S T A R D ATE: M A R C H 2 0 1 5 V E R S I O N : 3.0 1 S E C U R E A CCESS M A N A G E R SECURE ACCESS MANAGER OVERVIEW... 3 SUMMARY...

More information

Table of Contents. Configure and Manage Logging in to the Management Portal Verify and Trust Certificates

Table of Contents. Configure and Manage Logging in to the Management Portal Verify and Trust Certificates Table of Contents Configure and Manage Logging in to the Management Portal Verify and Trust Certificates Configure System Settings Add Cloud Administrators Add Viewers, Developers, or DevOps Administrators

More information