Security Authentication and Authorization What s New in security in QlikView 11. Fredrik Lautrup Ralph Senseny
|
|
- Antony Dixon
- 6 years ago
- Views:
Transcription
1 Security Authentication and Authorization What s New in security in QlikView 11 Fredrik Lautrup Ralph Senseny
2 Legal Disclaimer This Presentation contains forward-looking statements, including, but not limited to, statements regarding the value and effectiveness of QlikTech's products, the introduction of product enhancements or additional products and QlikTech's growth, expansion and market leadership, that involve risks, uncertainties, assumptions and other factors which, if they do not materialize or prove correct, could cause QlikTech's results to differ materially from those expressed or implied by such forward-looking statements. All statements, other than statements of historical fact, are statements that could be deemed forward-looking statements, including statements containing the words "predicts," "plan," "expects," "anticipates," "believes," "goal," "target," "estimate," "potential," "may", "will," "might," "could," and similar words. QlikTech intends all such forward-looking statements to be covered by the safe harbor provisions for forward-looking statements contained in Section 21E of the Exchange Act and the Private Securities Litigation Reform Act of Actual results may differ materially from those projected in such statements due to various factors, including but not limited to: risks and uncertainties inherent in our business; our ability to attract new customers and retain existing customers; our ability to effectively sell, service and support our products; our ability to manage our international operations; our ability to compete effectively; our ability to develop and introduce new products and addons or enhancements to existing products; our ability to continue to promote and maintain our brand in a cost-effective manner; our ability to manage growth; our ability to attract and retain key personnel; the scope and validity of intellectual property rights applicable to our products; adverse economic conditions in general and adverse economic conditions specifically affecting the markets in which we operate; and other risks more fully described in QlikTech's publicly available filings with the Securities and Exchange Commission. Past performance is not necessarily indicative of future results. The forward-looking statements included in this presentation represent QlikTech's views as of the date of this presentation. QlikTech anticipates that subsequent events and developments will cause its views to change. QlikTech undertakes no intention or obligation to update or revise any forward-looking statements, whether as a result of new information, future events or otherwise. These forward-looking statements should not be relied upon as representing QlikTech's views as of any date subsequent to the date of this presentation. This Presentation should be read in conjunction with QlikTech's periodic reports filed with the SEC (SEC Information), including the disclosures therein of certain factors which may affect QlikTech s future performance. Individual statements appearing in this Presentation are intended to be read in conjunction with and in the context of the complete SEC Information documents in which they appear, rather than as stand-alone statements Qlik Technologies Inc. All rights reserved. QlikTech and QlikView are trademarks or registered trademarks of Qlik Technologies Inc. or its subsidiaries in the U.S. and other countries. Other company names, product names and company logos mentioned herein are the trademarks, or registered trademarks of their owners.
3 Agenda Overview Ways to customize authentication Header Solution Web Tickets QlikView s Authentication.aspx API Authorization between services Certificates Questions and Answers
4 Overview
5 Basic Architecture Trust QlikView Authentication server
6 Cutomizing Authentication Get user id and credentials Verify credentials Transfer user identity to QlikView
7 Web Server Authentication Who are you? QlikView Server Authorisation What documents can I see? User Docs Front End QlikView Publisher Authorisation What data sources can I use? Source Docs Back End
8 Header Solution High Low
9 Header Solution - Architecture Trust zone A Trust Zone B Header Authentication server
10 Use case Integration using proxy Trust zone A Trust Zone B Header: QVUSER=A User ID A Apache reverse proxy
11 Use case SSO using filter Header IIS
12 Web Tickets High High Low
13 Web Tickets Trust Authenticating system User Directory
14 Use case SAML using Webtickets SAML Identity Provider Trust SAML Service provider
15 QlikView s Authentication.aspx API High High Low
16 Authenticate.aspx - Architecture User Directory Authenticate to external directory Login Transfer user identity to Qlikview
17 Authenticate.aspx flow Login failure No Get user credentials Authenticate to external system Success Yes Resolv user groups Transfer user to QlikView
18 Pseudo code //Validate credentials with external authentication system List<string> groups = new List<string>(); groups.add( NTDOMAIN\\EXPORTXLS"); //Allow him to export to Excel for this session groups.add( MOBILE"); //He can see data that is allowed from mobile devices IUser user = new NamedUser("NTDOMAIN\\XXX", groups, true); QlikView.AccessPoint.User.GenericAuthentication(context, user); //Ready to use QV
19 Use Case Authenticate.aspx LDAP Directory Group resolution using Directory Service Connector Authenticate to external directory Login Transfer user identity to Qlikview
20 Use Case Authenticate.aspx LDAP Directory Group resolution using Directory Service Connector Request Verify certificate Transfer user identity to Qlikview
21 Gererall security requirements All authentication needs to be protected from evesdropping Use encrypted communication such as HTTPS or VPN All authentication is done outside the QlikView system therefore there needs to be established trust between the systems IP address whitelists Firewall restrictions Authentication using something you have Hardening of the IIS platform in accordance with local security policy
22 How to Choose a Solution Yes Web frontend to integrate with No Yes Need to integrate content into portal using IFrames No Authenticate.aspx WebTicket Yes Need to transfer groups from authentication system No WebTicket Yes SSO system with header support No Header WebTicket
23 Certificates
24 Certificates Features Configuring Certificates, in a multiple server deployment within QlikView, removes the dependency of a QlikView Administration Group Certificates allows the use of certificates to build a trust domain between services that can be located between different domains/areas such as internal networks, extranets and internet Eliminates the need to share an Active Directory (AD) or other user directories. The architecture is based on the QlikView Management Service (QMS) as the certificate manager (CA, Certificate Authority). The QMS will be able to create and distribute certificates to all services in the QlikView installation.
25 Certificates Certificate Structure When deploying Certificates all QlikView servers must be configured for certificates. QlikView services participating in the installation will receive certificates signed using this root certificate when added to the QMS. QMS as the Certificate Authority(CA) issues digital certificates that contain keys and the identity of the owner QlikView Management Service is an important part of the security solution and needs to be managed from a secure location to keep the certificate solution secure. The QMS is responsible for saying "yes, this service deployed on this server is a service in my installation".
26 Questions
27 With QlikView there are many ways to solve authentication it s just a matter of selecting the appropriate one based on the pre requisites of the customer
28 Stay Qonnected Fredrik Lautrup, Ralph Senseny,
29 Stay Qonnected Visit partners.qlikview.com to download all Qonnections 2012 presentations Join the conversation Qonnections Community Group tinyurl.com/qonnect-qlikcommunity Qonnect Facebook Group tinyurl.com/qonnect-facebook Qonnect LinkedIn Group tinyurl.com/qonnect-linkedin
30 Thank you!
Enterprise Considerations. Michael Robertshaw Miha Batic
Architecture and Security Enterprise Considerations Michael Robertshaw Miha Batic Legal Disclaimer This Presentation contains forward-looking statements, including, but not limited to, statements regarding
More informationQlik Sense Security. Understand security basics of the new Sense platform. 14 October, 2014 Magnus Berg Master Principal Enterprise Architect
Qlik Sense Security Understand security basics of the new Sense platform 14 October, 2014 Magnus Berg Master Principal Enterprise Architect Legal Disclaimer This Presentation contains forward-looking statements,
More informationQlikView in Depth - Business Discovery Everywhere QlikView on Mobile platforms. Petra Bloem Marc Huijbregts
Business Discovery World Tour QlikView in Depth - Business Discovery Everywhere QlikView on Mobile platforms Petra Bloem Marc Huijbregts Legal Disclaimer This Presentation contains forward-looking statements,
More informationCA Single Sign-On and LDAP/AD integration
CA Single Sign-On and LDAP/AD integration CA Single Sign-On and LDAP/AD integration Legal notice Copyright 2017 LAVASTORM ANALYTICS, INC. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS HEREOF MAY NOT BE REPRODUCED
More informationCloud Access Manager Overview
Cloud Access Manager 8.1.3 Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationThis presentation and the documents incorporated by reference herein contain forward-looking statements regarding future events and our future
This presentation and the documents incorporated by reference herein contain forward-looking statements regarding future events and our future results that are subject to the safe harbor provisions of
More informationServer Installation Guide
Server Installation Guide Server Installation Guide Legal notice Copyright 2018 LAVASTORM ANALYTICS, INC. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS HEREOF MAY NOT BE REPRODUCED OR DISTRIBUTED IN ANY
More information5348 Vegas Drive Las Vegas, NV 89108, U.S.A. Tel: ; Fax: Website:
The information in this document includes certain "forward-looking" statements within the meaning of the Safe Harbor provisions of Federal Securities Laws, as that term is defined in section 27a of the
More informationQlik Sense Mobile September 2018 (version 1.6.1) release notes
Release Notes Qlik Sense Mobile September 2018 (version 1.6.1) release notes qlik.com Table of Contents Overview 3 Compatibility 3 Bug fixes 4 Qlik Sense Mobile September 2018 (version 1.6.1) 4 Qlik Sense
More informationSecuring Your Salesforce Org: The Human Factor. February 2016 User Group Meeting
Securing Your Salesforce Org: The Human Factor February 2016 User Group Meeting Safe Harbor Safe harbor statement under the Private Securities Litigation Reform Act of 1995: This presentation may contain
More informationSAP Security in a Hybrid World. Kiran Kola
SAP Security in a Hybrid World Kiran Kola Agenda Cybersecurity SAP Cloud Platform Identity Provisioning service SAP Cloud Platform Identity Authentication service SAP Cloud Connector & how to achieve Principal
More informationDell One Identity Cloud Access Manager 8.0. Overview
Dell One Identity Cloud Access Manager 8.0 2015 Dell Inc. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished under
More informationSecure Held Print Jobs
Secure Held Print Jobs Version 3.0 Administrator's Guide January 2016 www.lexmark.com Contents 2 Contents Change history... 3 Overview... 4 Deployment readiness checklist...5 Configuring the printer settings...
More informationTrusted Login Connector (Hosted SSO)
Trusted Login Connector (Hosted SSO) Table of Contents Summary... 3 Frequently Asked Questions... 3 Architecture... 5 Installation/configuration... 5 2 Summary New functionality allows SelectHR users to
More informationSystem requirements for Qlik Sense. Qlik Sense June 2018 Copyright QlikTech International AB. All rights reserved.
System requirements for Qlik Sense Qlik Sense June 2018 Copyright 1993-2018 QlikTech International AB. All rights reserved. Copyright 1993-2018 QlikTech International AB. All rights reserved. Qlik, QlikTech,
More informationSAP Single Sign-On 2.0 Overview Presentation
SAP Single Sign-On 2.0 Overview Presentation June 2014 Public Legal disclaimer This presentation is not subject to your license agreement or any other agreement with SAP. SAP has no obligation to pursue
More informationModernizing Meetings: Delivering Intel Unite App Authentication with RFID
Modernizing Meetings: Delivering Intel Unite App Authentication with RFID INTEL UNITE SOLUTION WHITE PAPER Revision 1.0 Document Number: 599309-1.0 Legal Disclaimers and Copyrights All information provided
More informationTHE ROAD TO DIGITAL TRANSFORMATION
THE ROAD TO DIGITAL TRANSFORMATION RED HAT & APPLICATION DEVELOPMENT CRAIG MUZILLA Senior Vice President Application Platforms Business SAFE HARBOR FORWARD LOOKING STATEMENTS Certain statements contained
More informationYour Voice is Your Passport: Implementing Voice-driven Applications with Amazon Alexa
Your Voice is Your Passport: Implementing Voice-driven Applications with Amazon Alexa Stephen Lippens Solutions Architect slippens@microstrategy.com This presentation may include statements that constitute
More informationBLACKBERRY INVESTOR SESSION
BLACKBERRY INVESTOR SESSION November 13, 2014 BlackBerry Public Public SAFE HARBOR Forward-looking statements in this presentation are made pursuant to the "safe harbor" provisions of the U.S. Private
More informationSystem requirements for Qlik Sense. Qlik Sense April 2018 Copyright QlikTech International AB. All rights reserved.
System requirements for Qlik Sense Qlik Sense April 2018 Copyright 1993-2018 QlikTech International AB. All rights reserved. Copyright 1993-2018 QlikTech International AB. All rights reserved. Qlik, QlikTech,
More informationIBM Secure Proxy. Advanced edge security for your multienterprise. Secure your network at the edge. Highlights
IBM Secure Proxy Advanced edge security for your multienterprise data exchanges Highlights Enables trusted businessto-business transactions and data exchange Protects your brand reputation by reducing
More informationSetting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1
Setting Up Resources in VMware Identity Manager (On Premises) Modified on 30 AUG 2017 VMware AirWatch 9.1.1 Setting Up Resources in VMware Identity Manager (On Premises) You can find the most up-to-date
More informationInside Symantec O 3. Sergi Isasi. Senior Manager, Product Management. SR B30 - Inside Symantec O3 1
Inside Symantec O 3 Sergi Isasi Senior Manager, Product Management SR B30 - Inside Symantec O3 1 Agenda 2 Cloud: Opportunity And Challenge Cloud Private Cloud We should embrace the Cloud to respond to
More informationOracle Communications Services Gatekeeper
Oracle Communications Services Gatekeeper Security Guide Release 5.1 E36134-01 June 2013 Oracle Communications Services Gatekeeper Security Guide, Release 5.1 E36134-01 Copyright 2011, 2013, Oracle and/or
More informationAWS plug-in. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved.
AWS plug-in Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved. Copyright 1993-2016 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik Sense, QlikView,
More informationIntel Unite. Enterprise Test Environment Setup Guide
Intel Unite Enterprise Test Environment Setup Guide Intel Unite Enterprise Test Environment Setup Guide Page 1 of 49 October 2015 Legal Disclaimers & Copyrights All information provided here is subject
More informationBring Your Own Device. Peter Silva Technical Marketing Manager
Bring Your Own Device Peter Silva Technical Marketing Manager Bring-Your-Own-Device (BYOD) Personal devices for business apps Why implement BYOD? Increase employee satisfaction, productivity Reduce mobile
More informationopensap How-to Guide for Exercise Instructor-Led Walkthrough of SAML2 Configuration (Week 4 Unit 5)
opensap How-to Guide for Exercise Instructor-Led Walkthrough of SAML2 Configuration (Week 4 Unit 5) Table of Contents Configuring SSL on the Frontend Server... 3 Execute SAML 2.0 related configuration...
More informationVersion 9 Release 0. IBM i2 Analyst's Notebook Premium Configuration IBM
Version 9 Release 0 IBM i2 Analyst's Notebook Premium Configuration IBM Note Before using this information and the product it supports, read the information in Notices on page 11. This edition applies
More informationSystem requirements for Qlik Sense. Qlik Sense September 2018 Copyright QlikTech International AB. All rights reserved.
System requirements for Qlik Sense Qlik Sense September 2018 Copyright 1993-2018 QlikTech International AB. All rights reserved. Copyright 1993-2018 QlikTech International AB. All rights reserved. Qlik,
More informationLeveraging Adaptive Auth and Device Trust for Enhanced Security and Compliance
Leveraging Adaptive Auth and Device Trust for Enhanced Security and Compliance CHRISTOPHER NIGGEL, DIRECTOR OF SECURITY & COMPLIANCE SWAROOP SHAM, SR PRODUCT MARKETING MANAGER, SECURITY CHRIS NIGGEL Director
More informationHPE to Acquire Nimble Storage
HPE to Acquire Nimble Storage March 7, 2017 http://www.hpe.com/investor/home Forward Looking Statements This document contains forward-looking statements within the meaning of the safe harbor provisions
More informationSymantec Managed PKI. Integration Guide for AirWatch MDM Solution
Symantec Managed PKI Integration Guide for AirWatch MDM Solution ii Symantec Managed PKI Integration Guide for AirWatch MDM Solution The software described in this book is furnished under a license agreement
More informationNovell Access Manager
Setup Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP3 February 02, 2011 www.novell.com Novell Access Manager 3.1 SP3 Setup Guide Legal Notices Novell, Inc., makes no representations or warranties
More informationIBM UrbanCode Cloud Services Security Version 3.0 Revised 12/16/2016. IBM UrbanCode Cloud Services Security
IBM UrbanCode Cloud Services Security 1 Before you use this information and the product it supports, read the information in "Notices" on page 10. Copyright International Business Machines Corporation
More informationVersion 9 Release 0. IBM i2 Analyst's Notebook Configuration IBM
Version 9 Release 0 IBM i2 Analyst's Notebook Configuration IBM Note Before using this information and the product it supports, read the information in Notices on page 11. This edition applies to version
More informationRed Hat Acquisition of Qumranet Adds next generation virtualization capabilities. September 4, 2008
Red Hat Acquisition of Qumranet Adds next generation virtualization capabilities September 4, 2008 Safe Harbor Forward-Looking Statements Certain statements contained or discussed in this presentation
More informationInstall and upgrade Qlik Sense. Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved.
Install and upgrade Qlik Sense Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved. Copyright 1993-2016 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik
More informationNovell Access Manager
Quick Start AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 June 11, 2010 www.novell.com Novell Access Manager 3.1 SP2 Quick Start Legal Notices Novell, Inc., makes no representations or warranties
More informationOracle Payment Interface Token Proxy Service Security Guide Release 6.1 E November 2017
Oracle Payment Interface Token Proxy Service Security Guide Release 6.1 E87635-01 November 2017 Copyright 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationApril Understanding Federated Single Sign-On (SSO) Process
April 2013 Understanding Federated Single Sign-On (SSO) Process Understanding Federated Single Sign-On Process (SSO) Disclaimer The following is intended to outline our general product direction. It is
More informationO365 Solutions. Three Phase Approach. Page 1 34
O365 Solutions Three Phase Approach msfttechteam@f5.com Page 1 34 Contents Use Cases... 2 Use Case One Advanced Traffic Management for WAP and ADFS farms... 2 Use Case Two BIG-IP with ADFS-PIP... 3 Phase
More informationOptimizing SSDs for Multiple Tenancy Use
Optimizing SSDs for Multiple Tenancy Use Liam Parker Senior Technologist, SSD Systems Engineering August 7, 2018 2018 Western Digital Corporation or its affiliates. All rights reserved. 8/7/2018 1 Forward-Looking
More informationOracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC
Oracle Insurance Policy Administration Configuration of SAML 1.1 Between OIPA and OIDC Version 10.1.0.0 Documentation Part Number: E55027-01 June, 2014 Copyright 2009, 2014, Oracle and/or its affiliates.
More informationCloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017
Cloud Operations for Oracle Cloud Machine ORACLE WHITE PAPER MARCH 2017 Disclaimer The following is intended to outline our general product direction. It is intended for information purposes only, and
More informationIntroduction. The Safe-T Solution
Secure Application Access Product Brief Contents Introduction 2 The Safe-T Solution 3 How It Works 3 Capabilities 4 Benefits 5 Feature List 6 6 Introduction As the world becomes much more digital and global,
More informationFormula Training (Intermediate)
Formula Training (Intermediate) Lance Merkin Customer Success Manager #SmartsheetENGAGE Certain information set forth in this presentation may be forward-looking information. Except for statements of historical
More informationInvestor Presentation. February 2016
Investor Presentation February 2016 Disclaimer Forward-Looking Statements This presentation contains forward-looking statements within the meaning of Section 27A of the Securities Act of 1933, as amended,
More informationMaking your Application Social with the Chatter API
Making your Application Social with the Chatter API Logan Henriquez Product Manager @loganh Quinton Wall Developer Evangelist @quintonwall Safe Harbor Safe harbor statement under the Private Securities
More informationNimsoft Service Desk. Single Sign-On Configuration Guide. [assign the version number for your book]
Nimsoft Service Desk Single Sign-On Configuration Guide [assign the version number for your book] Legal Notices Copyright 2012, CA. All rights reserved. Warranty The material contained in this document
More informationSystem requirements for Qlik Sense. Qlik Sense September 2017 Copyright QlikTech International AB. All rights reserved.
System requirements for Qlik Sense Qlik Sense September 2017 Copyright 1993-2017 QlikTech International AB. All rights reserved. Copyright 1993-2017 QlikTech International AB. All rights reserved. Qlik,
More informationCONFIGURING SSO FOR FILENET P8 DOCUMENTS
CONFIGURING SSO FOR FILENET P8 DOCUMENTS Overview Configuring IBM Content Analytics with Enterprise Search (ICA) to support single sign-on (SSO) authentication for secure search of IBM FileNet P8 (P8)
More informationCAUTIONARY STATEMENT This presentation contains forward-looking statements concerning Advanced Micro Devices, Inc. (AMD) including, but not limited to the features, functionality, availability, timing,
More informationQlik. 10 key elements of a successful data strategy and modern analytics platform. February 2019 Julie Kae Executive Director, Qlik.
Qlik 10 key elements of a successful data strategy and modern analytics platform February 2019 Julie Kae Executive Director, Qlik.org Legal Disclaimer Qlik roadmaps provide a general overview of our anticipated
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for SonicWALL Secure Remote Access All information herein is either public information or is
More informationIBM. IBM i2 Analyze Windows Upgrade Guide. Version 4 Release 1 SC
IBM IBM i2 Analyze Windows Upgrade Guide Version 4 Release 1 SC27-5091-00 Note Before using this information and the product it supports, read the information in Notices on page 19. This edition applies
More informationNovell Access Manager
Setup Guide AUTHORIZED DOCUMENTATION Novell Access Manager 3.0 SP4 IR2 January 30, 2009 www.novell.com Novell Access Manager 3.0 SP4 Setup Guide Legal Notices Novell, Inc., makes no representations or
More informationBIG-IP Access Policy Manager : Secure Web Gateway. Version 13.0
BIG-IP Access Policy Manager : Secure Web Gateway Version 13.0 Table of Contents Table of Contents BIG-IP APM Secure Web Gateway Overview...9 About APM Secure Web Gateway... 9 About APM benefits for web
More informationOkta Integration Guide for Web Access Management with F5 BIG-IP
Okta Integration Guide for Web Access Management with F5 BIG-IP Contents Introduction... 3 Publishing SAMPLE Web Application VIA F5 BIG-IP... 5 Configuring Okta as SAML 2.0 Identity Provider for F5 BIG-IP...
More informationSetting Up Resources in VMware Identity Manager. VMware Identity Manager 2.8
Setting Up Resources in VMware Identity Manager VMware Identity Manager 2.8 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationOracle Utilities Opower Solution Extension Partner SSO
Oracle Utilities Opower Solution Extension Partner SSO Integration Guide E84763-01 Last Updated: Friday, January 05, 2018 Oracle Utilities Opower Solution Extension Partner SSO Integration Guide Copyright
More informationConnect-2-Everything SAML SSO (client documentation)
Connect-2-Everything SAML SSO (client documentation) Table of Contents Summary Overview Refined tags Summary The Connect-2-Everything landing page by Refined Data allows Adobe Connect account holders to
More informationWebEx Connector. Version 2.0. User Guide
WebEx Connector Version 2.0 User Guide 2016 Ping Identity Corporation. All rights reserved. PingFederate WebEx Connector User Guide Version 2.0 May, 2016 Ping Identity Corporation 1001 17th Street, Suite
More informationARCHITECTURAL OVERVIEW REVISED 6 NOVEMBER 2018
REVISED 6 NOVEMBER 2018 Table of Contents Architectural Overview Workspace ONE Logical Architecture GUIDE 2 VMware Workspace ONE Cloud-Based Reference Architecture - Architectural Overview Architectural
More informationVMware Identity Manager Connector Installation and Configuration (Legacy Mode)
VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until
More informationQlik Analytics Platform
Technical Brief Qlik Analytics Platform Building Engaging Visual Analytics October, 2015 qlik.com Table of Contents Introduction 3 Introducing Qlik Analytics Platform 3 Integration Capabilities 4 Architecture
More informationQuick Start Access Manager 3.1 SP5 January 2013
www.novell.com/documentation Quick Start Access Manager 3.1 SP5 January 2013 Legal Notices Novell, Inc., makes no representations or warranties with respect to the contents or use of this documentation,
More informationMiContact Center Business Important Product Information for Customer GDPR Compliance Initiatives
MiContact Center Business Important Product Information for Customer GDPR Compliance Initiatives MITEL SOLUTIONS ENGINEERING MiContact Center Business Release 9.0 Version 1 May 2018 NOTICE The information
More informationConfiguring Claims-based Authentication for Microsoft Dynamics CRM Server. Last updated: May 2015
Configuring Claims-based Authentication for Microsoft Dynamics CRM Server Last updated: May 2015 This document is provided "as-is". Information and views expressed in this document, including URL and other
More informationSecurity Guide Release 4.0
[1]Oracle Communications Session Monitor Security Guide Release 4.0 E89197-01 November 2017 Oracle Communications Session Monitor Security Guide, Release 4.0 E89197-01 Copyright 2017, Oracle and/or its
More informationVMware AirWatch Integration with RSA PKI Guide
VMware AirWatch Integration with RSA PKI Guide For VMware AirWatch Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationActivIdentity ActivID Card Management System and Juniper Secure Access. Integration Handbook
ActivIdentity ActivID Card Management System and Juniper Secure Access Integration Handbook Document Version 2.0 Released May 2, 2012 ActivIdentity ActivID Card Management System and Juniper Secure Access
More informationOracle Hospitality Cruise AffairWhere Security Guide Release E April 2017
Oracle Hospitality Cruise AffairWhere Security Guide Release 2.2.5 E85968-01 April 2017 Copyright 2006, 2017, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager. Integration Handbook
ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager Integration Handbook Document Version 1.1 Released July 11, 2012 ActivIdentity 4TRESS AAA Web Tokens and F5 APM Integration Handbook
More informationOracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E
Oracle Hospitality ecommerce Integration Cloud Service Security Guide Release 4.2 E96343-01 May 2018 Copyright 2010, 2018, Oracle and/or its affiliates. All rights reserved. This software and related documentation
More informationREST API Developer Preview
REST API Developer Preview Dave Carroll Developer Evangelist dcarroll@salesforce.com @dcarroll Alex Toussaint Sr. Product Manager atoussaint@salesforce.com @alextoussaint Safe Harbor Safe harbor statement
More informationVMware AirWatch Content Gateway Guide for Windows
VMware AirWatch Content Gateway Guide for Windows AirWatch v9.1 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com. This product
More informationNetBackup Collection Quick Start Guide
NetBackup Collection Quick Start Guide This whitepaper is intended for IT professionals, IT managers, and IT personnel responsible for the planning, setup, and/or administration of Veritas Information
More informationDesktop Installation Guide
Desktop Installation Guide Desktop Installation Guide Legal notice Copyright 2018 LAVASTORM ANALYTICS, INC. ALL RIGHTS RESERVED. THIS DOCUMENT OR PARTS HEREOF MAY NOT BE REPRODUCED OR DISTRIBUTED IN ANY
More informationIntegration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for SonicWALL Secure Remote Access
SafeNet Authentication Manager Integration Guide Using SAM as an Identity Provider for SonicWALL Secure Remote Access Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
More informationMicroStrategy & Google
MicroStrategy & Google Joint Value Proposition HF Chadeisson Solutions Architect Safe Harbor Notice This presentation describes features that are under development by MicroStrategy. The objective of this
More informationCisco Expressway Authenticating Accounts Using LDAP
Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4
More informationBuild Data-rich Websites using Siteforce
Build Data-rich Websites using Siteforce Sonali Agrawal Director of Product Management @sonali_sfdc Eric Dorgelo Director of Development Safe Harbor Safe harbor statement under the Private Securities Litigation
More informationVMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager
VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationVMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager
VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The
More informationSafeNet Authentication Service
SafeNet Authentication Service Integration Guide Using SafeNet Authentication Service as an Identity Provider for RadiantOne Cloud Federation Service (CFS) All information herein is either public information
More informationSAML-Based SSO Configuration
Prerequisites, page 1 SAML SSO Configuration Task Flow, page 5 Reconfigure OpenAM SSO to SAML SSO Following an Upgrade, page 9 SAML SSO Deployment Interactions and Restrictions, page 9 Prerequisites NTP
More informationQLIKVIEW INTEGRATION OVERVIEW
QLIKVIEW INTEGRATION OVERVIEW QlikView Technology White Paper Series June 211 www.qlikview.com Table of Contents Overview 3 Data Source Integration 4 Standard ODBC/OLE Connections (structured) 4 Non Standard
More informationArcGIS Server and Portal for ArcGIS An Introduction to Security
ArcGIS Server and Portal for ArcGIS An Introduction to Security Jeff Smith & Derek Law July 21, 2015 Agenda Strongly Recommend: Knowledge of ArcGIS Server and Portal for ArcGIS Security in the context
More informationBuilding Mobile Force.com Apps for the iphone and ipad
Building Mobile Force.com Apps for the iphone and ipad Quinton Wall Sr. Developer Evangelist, Salesforce.com @quintonwall Mike Leach Manager, Cloud Services, Facebook @dlog Safe Harbor Salesforce.com Safe
More informationIBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture
IBM BigInsights Security Implementation: Part 1 Introduction to Security Architecture Big data analytics involves processing large amounts of data that cannot be handled by conventional systems. The IBM
More informationMitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE. Release 9.2
Mitel MiContact Center Enterprise WEB APPLICATIONS CONFIGURATION GUIDE Release 9.2 NOTICE The information contained in this document is believed to be accurate in all respects but is not warranted by Mitel
More informationIntegration Guide. SafeNet Authentication Manager. Using SAM as an Identity Provider for PingFederate
SafeNet Authentication Manager Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationvsphere plug-in Qlik Sense 3.0 Copyright QlikTech International AB. All rights reserved.
vsphere plug-in Qlik Sense 3.0 Copyright 1993-2016 QlikTech International AB. All rights reserved. Copyright 1993-2016 QlikTech International AB. All rights reserved. Qlik, QlikTech, Qlik Sense, QlikView,
More informationConfigure Unsanctioned Device Access Control
Configure Unsanctioned Device Access Control paloaltonetworks.com/documentation Contact Information Corporate Headquarters: Palo Alto Networks 3000 Tannery Way Santa Clara, CA 95054 www.paloaltonetworks.com/company/contact-support
More informationRelease notes. QlikView Version 12. Lund, Sweden, November Authored by QlikTech International AB
Release notes QlikView Version 12 Lund, Sweden, November 2015 Authored by QlikTech International AB 1994-2015 QlikTech International AB. All rights reserved. Qlik, QlikView, QlikTech, and the QlikTech
More informationVMware Workspace ONE Quick Configuration Guide. VMware AirWatch 9.1
VMware Workspace ONE Quick Configuration Guide VMware AirWatch 9.1 A P R I L 2 0 1 7 V 2 Revision Table The following table lists revisions to this guide since the April 2017 release Date April 2017 June
More informationSyncplicity Panorama with Isilon Storage. Technote
Syncplicity Panorama with Isilon Storage Technote Copyright 2014 EMC Corporation. All rights reserved. Published in USA. Published November, 2014 EMC believes the information in this publication is accurate
More informationCloud Access Manager How to Configure for SSO to SAP NetWeaver using SAML 2.0
Cloud Access Manager 8.1.3 How to Configure for SSO to SAP Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More information