BusinessObjects Enterprise XI
|
|
- Curtis Jordan
- 5 years ago
- Views:
Transcription
1 Overview Contents This document contains information on LDAP authentication and how to configure with this type of authentication. INTRODUCTION... 2 What Is LDAP?...2 LDAP platforms supported by...3 LDAP Servers... 3 Single Sign-on Server (SSO)... 3 HOW TO CONFIGURE ENTERPRISE XI FOR LDAP AUTHENTICATION...3 Overview...3 Hands-On configuration...4 HOW TO CONFIGURE ENTERPRISE XI FOR LDAP AUTHENTICATION WITH SECURE SOCKET LAYER (SSL)...5 HOW TO CONFIGURE ENTERPRISE XI FOR LDAP AUTHENTICATION WITH SINGLE SIGN-ON (SSO)...7 HOW TO MAP USER ACCOUNTS AND GROUPS FROM THE LDAP DIRECTORY SERVER... 7 HOW TO MANAGE MULTIPLE LDAP HOSTS...9 ADDITIONAL NOTE...9 FINDING MORE INFORMATION /30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 1
2 Introduction This document provides a definition for LDAP and then step-by-step instructions on how to configure LDAP authentication for use with. What Is LDAP? LDAP stands for Lightweight Directory Access Protocol and is a directory service protocol that runs over TCP/IP. Lightweight Directory Access Protocol (LDAP), a common, applicationindependent directory, enables users to share information among various applications. Based on an open standard, LDAP provides a means for accessing and updating information in a directory. LDAP is based on the X.500 standard, which uses a directory access protocol (DAP) to communicate between a directory client and a directory server. LDAP is an alternative to DAP because it uses fewer resources and simplifies and omits some X.500 operations and features. The directory structure within LDAP has entries arranged in a specific schema. Each entry is identified by its corresponding distinguished name (DN) or common name (CN). Other common attributes include the organizational unit name (OU), and the organization name (O). For example, a member group may be located in a directory tree as follows: cn=businessobjects Enterprise Users, ou=enterprise Users A, o=research. Refer to your LDAP documentation for more information. Because LDAP is application-independent, any client with the proper authorization can access its directories. LDAP offers you the ability to set up users to log on to BusinessObjects Enterprise through LDAP authentication. It also enables users to be authorized when attempting to access objects in BusinessObjects Enterprise. As long as you have an LDAP server (or servers) running, and use LDAP in your existing networked computer systems, you can use LDAP authentication. If desired, the LDAP security plug-in provided with BusinessObjects Enterprise can communicate with your LDAP server using a Secure Socket Layer (SSL) connection established using either server authentication or mutual authentication. With server authentication, the LDAP server has a security certificate which BusinessObjects Enterprise uses to verify that it trusts the server, while the LDAP server allows connections from anonymous clients. With mutual authentication, both the LDAP server and BusinessObjects Enterprise have security certificates, and the LDAP server must also verify the client certificate before a connection can be established. Currently LDAP is considered to be the most popular protocol for providing directory services on the Internet. 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 2
3 LDAP platforms supported by BusinessObjects Enterprise XI LDAP Servers SunOne Directory Server*5.1 SunOne Directory Server* 5.2 IBM Secureway Directory 5.1 Lotus Domino Novell NDS edirectory 8.7 *SunOne Directory Server is previously known as iplanet Directory Server. Single Sign-on Server (SSO) Netegrity Siteminder 5.5 NOTE The LDAP security plug-in is LDAP version 3 compliant but we only support the LDAP vendors listed above. For more information and for the latest updates on BusinessObjects Enterprise XI supported platforms, search for the file name, boe_xi_supported_platforms.pdf on our support site at: How to configure Enterprise XI for LDAP authentication Overview The LDAP security plug-in (secldap.dll) allows you to map user accounts and groups from your LDAP directory server to ; it also enables the system to verify all logon requests that specify LDAP authentication. Users are authenticated against the LDAP directory server, and have their membership in a mapped LDAP group verified before the CMS grants them an active session. Enterprise XI dynamically maintains user lists and group memberships. With LDAP authentication, you can create new Enterprise accounts for existing LDAP users, or assign LDAP aliases to existing users if the user names match the Enterprise user names. In addition, you can specify multiple host names and their ports. Once you have mapped your LDAP users and groups, all of the BusinessObjects Enterprise client tools support LDAP authentication, 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 3
4 except for the Import Wizard. You can also create your own applications that support LDAP authentication. Hands-On configuration Before setting up and enabling LDAP authentication, ensure that you have your LDAP directory set up and the LDAP server information. For example, you need to know LDAP host and port information, Base LDAP Distinguished Name, and LDAP Server Administration Credentials if your LDAP Server does not allow anonymous binding. Steps to configure the LDAP host: 1. Go to the Authentication management area of the Central Management Console. 2. Click the LDAP tab, and then click Start LDAP Configuration Wizard. The LDAP Configuration Wizard leads you through the setup of LDAP authentication. The first screen of the Wizard asks for information about your LDAP host. Type your LDAP host and port information in the Add and LDAP host (hostname:port) field. For example, "myserver:123". Click Add. Repeat this step to add more than one LDAP host of the same server type if you want to add hosts that can act as failover servers. If you want to remove a host, highlight the host name and click Delete. For more information on multiple hosts, refer to the How to manage multiple LDAP hosts section in this document. 3. Click Next. 4. Select your server type from the LDAP Server Type list. Click Show Attribute Mappings if you want to view or change any of the LDAP Server Attribute Mappings or the LDAP Default Search Attributes. By default, each supported server type's server attribute mappings and search attributes are already set. 5. Click Next. 6. In the Base LDAP Distinguished Name field, type the distinguished name (for example, o=somebase). 7. Click Next. 8. Enter the credentials required by the LDAP hosts: In the LDAP Server Administration Credentials area, type the distinguished name and password for a user account that is authorized to administer your LDAP server. If your LDAP Server allows anonymous binding, leave this area blank BusinessObjects Enterprise servers and clients will bind to the primary host via anonymous logon. Enter another distinguished name and password in the LDAP Referral Credentials area if all of the following apply: 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 4
5 a) The primary host has been configured to refer to another directory server that handles queries for entries under a specified base. b) The host referred to has been configured to not allow anonymous binding. c) A group from the host being referred to will be mapped to BusinessObjects Enterprise. Although groups can be mapped from multiple hosts, only one set of referral credentials can be set. Therefore, if you have multiple referral hosts, you must create a user account on each host that uses the same distinguished name and password. 9. Enter the number of referral hops in the Maximum Referral Hops field. If this field is set to zero, no referrals will be followed. 10. Click Next. 11. Proceed with configuring the Secure Socket Layer (SSL). 12. Proceed with configuring LDAP for single sign-on (SSO). 13. Map user accounts and groups from your LDAP directory server to Enterprise XI. How to configure Enterprise XI for LDAP authentication with Secure Socket Layer (SSL) You can specify that BusinessObjects Enterprise use a Secure Socket Layer (SSL) connection to communicate to the LDAP directory server for additional security. NOTE The LDAP security plug-in provided with can be configured to communicate with an LDAP server via SSL, but always performs basic authentication when verifying users' credentials. Before deploying LDAP authentication in conjunction with, ensure that you are familiar with the differences between these LDAP types. For details, see RFC2251, which is currently available at 1. Select the type of SSL authentication (Basic (no SSL), Server Authentication, or Mutual Authentication) your LDAP hosts use to establish a connection with Enterprise XI. 2. Click Next. 3. If you selected Server Authentication or Mutual Authentication, choose one of the following options: a) Always accept server certificate This is the lowest security option. Before BusinessObjects Enterprise can establish an SSL connection with the LDAP host (to authenticate LDAP users and groups), it must receive a security certificate from the LDAP host. Enterprise XI does not verify the certificate it receives. 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 5
6 b) Accept server certificate if it comes from a trusted Certificate Authority This is a medium security option. Before BusinessObjects Enterprise can establish an SSL connection with the LDAP host (to authenticate LDAP users and groups), it must receive and verify a security certificate sent to it by the LDAP host. To verify the certificate, BusinessObjects Enterprise must find the Certificate Authority that issued the certificate in its certificate database. TIP Java applications, such as the Java version of InfoView, always use this option, regardless of the setting you choose. c) Accept server certificate if it comes from a trusted Certificate Authority The common name attribute of the certificate matches the DNS hostname of the server. This is the highest security option. Before BusinessObjects Enterprise XI can establish an SSL connection with the LDAP host (to authenticate LDAP users and groups), it must receive and verify a security certificate sent to it by the LDAP host. To verify the certificate, must find the Certificate Authority that issued the certificate in its certificate database. It must also be able to confirm that the CN attribute on the server certificate exactly matches the host name of the LDAP host as you typed it in the "Add LDAP host" field in the first step of the Wizard. That is, if you entered the LDAP host name as ABALONE.rd.crystald.net:389, using CN =ABALONE:389 in the certificate would not work. TIP The hostname on the server security certificate is the name of the primary LDAP host. Therefore, if you select this option you cannot use a fail over LDAP host. 4. In the SSL host computer, you must next add the hostname of each machine in your system that uses the BusinessObjects Enterprise SDK. This includes the machine running your Central Management Server and the machine running your WCA. Type the hostname of each machine in the SSL Host box, and then click Add. 5. Configure the SSL settings for each SSL host in the list, starting with the default host. To select settings for the default host, clear all the Use default value boxes. 6. Type the values for the path to the certificate and key database files, and the password for the key database. Type a nickname for the client certificate in the cert7.db, if you selected mutual authentication. The settings for the default host are used for any setting (for any host) where you leave the "Use default value" check box selected, as 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 6
7 well, for any machine whose name you do not explicitly add to the list of SSL hosts. To select settings for another host, select its name in the list on the left. Then type the appropriate values in the boxes on the right. 7. Click Next to complete this set of steps. How to configure Enterprise XI for LDAP authentication with Single Sign-on (SSO) Business Objects XI has introduced single sign-on for LDAP authentication. When LDAP authentication is enabled, the administrator has the option to use Siteminder (a third-party user access and authentication tool) as an external system for authentication providing single sign-on capabilities to BusinessObjects Enterprise. 1. Select the type of single sign-on authentication (Basic (no SSO) or SiteMinder). 2. Click Next. 3. If you selected SiteMinder, configure the SiteMinder hosts: In the Policy Server Host box, type the name of each Policy Server, and then click Add. For each Policy Server Host, specify the Accounting, Authentication and Authorization port numbers. Enter the name of the Web Agent and the Shared Secret. Enter the Shared Secret, again. 4. Click Next to complete this set of steps. How to map user accounts and groups from the LDAP directory server When you map an LDAP account, you can choose to create a new account or to link to an existing Enterprise account. The next screen of the LDAP Configuration Wizard controls how maps LDAP users to Enterprise users. 1. Click New Alias Options to specify how LDAP aliases are mapped to Enterprise accounts. Select either one of the following options: a) Assign each added LDAP alias to an account with the same name Use this option when you know users have an existing Enterprise account with the same name; that is, LDAP aliases will be assigned to existing users (auto alias creation is turned on). Users who do not have an existing Enterprise account, or who do not have the same name in their Enterprise and LDAP account, are added as new LDAP users. 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 7
8 b) Create a new account for every added LDAP alias Use this option when you want to create a new account for each user. 2. Click Update Options to specify if LDAP aliases are automatically created for all new users. Select either one of the following options: a) New aliases will be added and new users will be created Use this option to automatically create a new alias for every LDAP user mapped to BusinessObjects Enterprise. New LDAP accounts are added for users without BusinessObjects Enterprise accounts, or for all users if you selected the "Create a new account for every added LDAP alias" option. b) No new aliases will be added and new users will not be created Use this option when the LDAP directory you are mapping contains many users, but only a few of them will use BusinessObjects Enterprise. BusinessObjects Enterprise does not automatically create aliases and Enterprise accounts for all users. Instead, it creates aliases (and accounts, if required) only for users who log on to BusinessObjects Enterprise. 3. Click New User Options to specify properties of the new Enterprise accounts that are created to map to LDAP accounts. Select either one of the following: a) New users are created as named users New user accounts are configured to use named user licenses. Named user licenses are associated with specific users and allow people to access the system based on their user name and password. This provides named users with access to the system regardless of how many other people are connected. You must have a named user license available for each user account created using this option. a) New users are created as concurrent users New user accounts are configured to use concurrent user licenses. Concurrent licenses specify the number of people who can connect to at the same time. This type of licensing is very flexible because a small concurrent license can support a large user base. For example, depending on how often and how long users access BusinessObjects Enterprise, a 100 user concurrent license could support 250, 500, or 700 users. 4. Click Finish to save your LDAP settings. The LDAP Server Summary page appears. Once you have configured LDAP authentication using the LDAP Configuration Wizard, you can map LDAP groups to Enterprise groups. 5. In the "Mapped LDAP Member Groups" area, specify your LDAP group (either by common name or distinguished name) in the Add LDAP group (by cn or dn) field; click Add. You can add more than 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 8
9 one LDAP group by repeating this step. To remove a group, highlight the LDAP group and click Delete. 6. Click Update to save the settings. How to manage multiple LDAP hosts 7. To confirm that these groups are successfully mapped to BusinessObject Enterprise XI, click the Organize GROUPS link located in the Home area of the Central Management Console. In the Groups page, you can see the new LDAP groups just mapped from the LDAP directory server. Using LDAP and BusinessObjects Enterprise, you can add fault tolerance to your system by adding multiple LDAP hosts. BusinessObjects Enterprise XI uses the first host that you add as the primary LDAP host. Subsequent hosts are treated as fail over hosts. The primary LDAP host and all fail over hosts must be configured in exactly the same way, and each LDAP host must refer to all additional hosts from which you wish to map groups. For more information about LDAP hosts and referrals, refer to LDAP documentation. To add multiple LDAP Hosts, enter all hosts when you configure LDAP using the LDAP Configuration Wizard (refer to the section on How to configure LDAP authentication for details.) Or, if you have already configured LDAP, go to the Authentication Management area of the Central Management Console and click the LDAP tab. In the LDAP Server Configuration Summary area, click the name of the LDAP host to open the page that enables you to add or delete hosts. NOTE The order in which the hosts are communicated with matters, so ensure that you add the primary host first, followed by the remaining fail over hosts. If you use fail over LDAP hosts, you cannot use the highest level of SSL security. That is, you cannot select "Accept server certificate if it comes from a trusted Certificate Authority and the CN attribute of the certificate matches the DNS hostname of the server." Additional note JAVA SDK - LDAP authentication When logging on to BusinessObjects Enterprise 11 using the JAVA SDK s LDAP provider (in particular, when logging on to the Java InfoView via LDAP), specified referral credentials are not used when following referrals while looking up users. For LDAP authentication to succeed, you need to enable anonymous logon for all LDAP servers specified in referrals. (Refer to release.pdf on the installation CD as the source for this note.) 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 9
10 Finding More Information For more information and resources, refer to the product documentation and visit the support area of the web site at: 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 10
ACS 5.x: LDAP Server Configuration Example
ACS 5.x: LDAP Server Configuration Example Document ID: 113473 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Directory Service Authentication Using
More informationConfiguring LDAP Authentication for HPE OBR
Technical White Paper Configuring LDAP Authentication for HPE OBR For the Windows and Linux Operation System Software Version 10.00 Table of Contents Introduction... 2 Supported Directory servers for LDAP...
More informationBlueprinting Questionnaire Sample
Manish Chaitanya Blueprinting Questionnaire Sample from The Complete Guide to SAP NetWeaver Portal Bonn Boston ch11_a_online_6124.indd 1 1/12/12 2:58:16 PM A Blueprinting Questionnaire Sample In Chapter
More informationWindows Server 2003 Network Administration Goals
Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management
More informationBusinessObjects Enterprise XI Release 1 and Release 2
BusinessObjects Enterprise XI Release 1 and Release 2 Overview Contents This document provides information and instructions for setting up Lightweight Directory Access Protocol (LDAP) authentication in
More informationHost Access Management and Security Server Administrative Console Users Guide. August 2016
Host Access Management and Security Server Administrative Console Users Guide August 2016 2016 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials
More informationSMS 2.0 SSO / LDAP Launch Kit
SMS 2.0 SSO / LDAP Launch Kit Table of Contents What options are available in SMS 2.0 for Single Sign On?... 4 LDAP (Lightweight Directory Access Protocol)... 4 SkySSO (Skyward Single Sign On)... 4 SkySTS
More informationDIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION. Gabriella Davis The Turtle Partnership
DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION Gabriella Davis The Turtle Partnership In This Session Review possible use cases for multiple directories Understand security implications
More informationBusiness Objects Exam SABE201 BusinessObjects(TM) Enterprise Certified Professional XI - Level One Version: 5.0 [ Total Questions: 160 ]
s@lm@n Business Objects Exam SABE201 BusinessObjects(TM) Enterprise Certified Professional XI - Level One Version: 5.0 [ Total Questions: 160 ] Topic 0, D D Question No : 1 - (Topic 0) Which two actions
More informationCounterACT User Directory Plugin
Version 6.1.2 and Above Table of Contents About the User Directory Plugin... 3 Endpoint User Details... 3 Verify Endpoint Authentication... 3 User Directory Inventory... 4 HTTP Login Action... 5 HTTP Sign
More informationJob Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.1
Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.1 December 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22
More informationHow to Integrate an External Authentication Server
How to Integrate an External Authentication Server Required Product Model and Version This article applies to the Barracuda Load Balancer ADC 540 and above, version 5.1 and above, and to all Barracuda
More informationISBG May LDAP: It s Time. Gabriella Davis - Technical Director The Turtle Partnership
ISBG May 2015 LDAP: It s Time Gabriella Davis - Technical Director The Turtle Partnership gabriella@turtlepartnership.com What Is LDAP? Lightweight Directory Access Protocol Standard language for reading
More informationIntegrating With LDAP
This chapter contains the following sections: Overview, on page 1 Configuring LDAP to Work with the Spam Quarantine, on page 1 Creating the LDAP Server Profile, on page 2 Configuring LDAP Queries, on page
More informationManaging External Identity Sources
CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other
More informationData Collection Tool
Data Collection Tool June 2009 Contents Chapter 1: What is the Data Collection Tool?...5 Chapter 2: Use of the DCT Data File in MM Configuration...7 Chapter 3: Obtaining a current version of the Data
More informationUser Management: Configuring Auth Servers
7 CHAPTER This chapter describes how to set up external authentication sources, configure Active Directory Single Sign-On (SSO), VLAN ID or attribute-based auth server mapping rules, and RADIUS accounting.
More informationLaserfiche Rio 10.3: Deployment Guide. White Paper
Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6
More informationData Collection Tool
Data Collection Tool November 2009 Contents Chapter 1: What is the Data Collection Tool?...5 Chapter 2: Use of the DCT Data File in MM Configuration...7 Chapter 3: Obtaining the current version of the
More informationWorkspace ONE UEM Directory Service Integration. VMware Workspace ONE UEM 1811
Workspace ONE UEM Directory Service Integration VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments
More informationLotus Learning Management System R1
Lotus Learning Management System R1 Version 1.0.4 March 2004 Administrator's Guide G210-1785-00 Contents Chapter 1 Introduction to the Learning Management System and Administration...1 Understanding the
More informationBlue Coat Security First Steps Solution for Integrating Authentication Using LDAP
Solution for Integrating Authentication Using LDAP SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,
More informationBusinessObjects OLAP Intelligence XI
Configuring Overview BusinessObjects OLAP Intelligence XI allows users to connect to and design custom applications against OLAP data sources. OLAP Intelligence XI and its web components use the Microsoft
More informationMessage Networking 5.2 Administration print guide
Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do
More informationRemote Support Security Provider Integration: RADIUS Server
Remote Support Security Provider Integration: RADIUS Server 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks
More informationSetting up Multiple LDAP Domains in SonicWall 6.5 Firmware without Partitioning.
Setting up Multiple LDAP Domains in SonicWall 6.5 Firmware without Partitioning. SonicWall 6.5 firmware now allows multiple LDAP servers for authentication, to set this up follow the guide below. SonicWall
More informationFUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry.
FUSION REGISTRY COMMUNITY EDITION VERSION 9 Setup Guide This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE Fusion Registry: 9.2.x Document
More informationHost Access Management and Security Server Administrative Console Users Guide. December 2016
Host Access Management and Security Server Administrative Console Users Guide December 2016 2016 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials
More informationImplementing Single-Sign-On(SSO) for APM UI
Implementing Single-Sign-On(SSO) for APM UI 1.Introduction...2 2.Overview of SSO with LTPA...3 3.Installing and configuring TDS...5 3.1.Installing TDS 6.3...5 3.2.Changing the administrator password (Optional)...7
More informationCLI users are not listed on the Cisco Prime Collaboration User Management page.
Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator
More informationAn LDAP server may implement its own schema or a standard schema defined as in RFC Mainstream implementations of LDAP include Netscape
Spectrum Software, Inc. 11445 Johns Creek Pkwy. Suite 300 Duluth, GA 30097 www.spectrumscm.com Subject: LDAP Support for SpectrumSCM Original Issue Date: April 26 th, 2003 Update Date: December 13 th,
More informationZENworks Mobile Workspace. Integration Overview. Version June 2018 Copyright Micro Focus Software Inc. All rights reserved.
ZENworks Mobile Workspace Integration Overview Version 3.17.1 - June 2018 Copyright Micro Focus Software Inc. All rights reserved. Table of Contents Foreword..................................................................................
More information9/2/2006. Cool Solutions for LDAP and AR System
9/2/2006 Cool Solutions for LDAP and AR System Introduction IT organizations often maintain systems containing data that can be useful in conjunction with BMC Remedy packaged applications Active Directories
More informationLDAP Directory Integration
LDAP Server Name, Address, and Profile Configuration, on page 1 with Cisco Unified Communications Manager Task List, on page 1 for Contact Searches on XMPP Clients, on page 6 LDAP Server Name, Address,
More informationLotus Domino and Extended Products. Version Administrator's Guide G
Lotus Domino and Extended Products Version 6.5.1 Administrator's Guide G210-1747-00 Disclaimer THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. WHILE EFFORTS
More informationInstallation and Setup of IBM Lotus Sametime From Zero to Hero The Next Generation
Installation and Setup of IBM Lotus Sametime 8.5.1 From Zero to Hero The Next Generation Frank Altenburg Senior Field Support Engineer frank.altenburg@de.ibm.com Agenda Components of IBM Lotus Sametime
More informationITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!
ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com Exam : C_AUDSEC_731 Title : SAP Certified Technology Associate - SAP Authorization and Auditing for SAP NetWeaver 7.31
More informationInstalling and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.
Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on
More informationSecurity Provider Integration RADIUS Server
Security Provider Integration RADIUS Server 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
More informationLDAP Configuration Guide
LDAP Configuration Guide Publication date: 11/8/2017 www.xcalar.com Copyright 2017 Xcalar, Inc. All rights reserved. Table of Contents About this guide 3 Configuring LDAP 4 Before you start 5 Configuring
More informationCLI users are not listed on the Cisco Prime Collaboration User Management page.
Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator
More informationConfigure the IM and Presence Service to Integrate with the Microsoft Exchange Server
Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure a Presence Gateway for Microsoft Exchange Integration, page 1 SAN and Wildcard Certificate Support, page
More informationHP Service Health Reporter Configuring SHR to use Windows AD Authentication
Technical white paper HP Service Health Reporter Configuring SHR to use Windows AD Authentication For the Windows Operation System Software Version 9.3x Table of Contents Introduction... 2 Motivation...
More informationBusinessObjects Enterprise XI Release 2
Configuring Kerberos End-to-End Single Sign-On using IIS Overview Contents This document provides information and instructions for setting up Kerberos end-to-end Single Sign-On (SSO) using IIS to the database
More informationSynchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012848-001, Rev. E Release Date July 2015 Applicability This version of the SAS
More informationUsers. LDAP Synchronization Overview
LDAP Synchronization Overview, page 1 Configure Workflow, page 3 Activate Services, page 3 Enable LDAP Directory Synchronization, page 4 Configure LDAP Directory Sync, page 4 Authentication Options, page
More informationShow 201 Installation and Setup of IBM Lotus Sametime From Zero to Hero The Next Generation
Show 201 Installation and Setup of IBM Lotus Sametime 8.5.1 From Zero to Hero The Next Generation Frank Altenburg SME for Sametime IBM Volker Juergensen Senior IT Specialist IBM 2011 IBM Corporation Agenda
More informationHost Access Management and Security Server Administrative Console Users Guide. April 2017
Host Access Management and Security Server Administrative Console Users Guide April 2017 2017 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials
More informationOracle Directory Services 11g: Administration
Oracle University Contact Us: 0180-2000-526 / +49 89-14301200 Oracle Directory Services 11g: Administration Duration: 5 Days What you will learn After completing this course, you should be able to perform
More informationSecurity Enterprise Identity Mapping
System i Security Enterprise Identity Mapping Version 6 Release 1 System i Security Enterprise Identity Mapping Version 6 Release 1 Note Before using this information and the product it supports, be sure
More informationForeScout CounterACT. Configuration Guide. Version 6.3
ForeScout CounterACT Authentication Module: User Directory Plugin Version 6.3 Table of Contents About the User Directory Plugin... 4 Endpoint User Details... 4 Endpoint Authentication... 5 User Directory
More informationNotifySCM Workspace Administration Guide
NotifySCM Workspace Administration Guide TABLE OF CONTENTS 1 Overview... 3 2 Login... 4 2.1 Main View... 5 3 Manage... 6 3.1 PIM... 6 3.2 Document...12 3.3 Server...13 4 Workspace Configuration... 14 4.1
More informationSynchronization Agent Configuration Guide
SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012848-001, Rev. B Release Date March 2015 Applicability This version of the SAS
More informationVMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager
VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/
More informationLDAP Queries. Overview of LDAP Queries. Understanding LDAP Queries
This chapter contains the following sections: Overview of, on page 1 Working with, on page 10 Using Acceptance Queries For Recipient Validation, on page 17 Using Routing Queries to Send Mail to Multiple
More informationCisco VCS Authenticating Devices
Cisco VCS Authenticating Devices Deployment Guide First Published: May 2011 Last Updated: November 2015 Cisco VCS X8.7 Cisco Systems, Inc. www.cisco.com 2 About Device Authentication Device authentication
More informationVMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager
VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The
More informationNetIQ Advanced Authentication Framework. Deployment Guide. Version 5.1.0
NetIQ Advanced Authentication Framework Deployment Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 NetIQ Advanced Authentication Framework Deployment 4
More informationLDAP Queries. Overview of LDAP Queries. This chapter contains the following sections:
This chapter contains the following sections: Overview of, page 1 Working with, page 11 Using Acceptance Queries For Recipient Validation, page 18 Using Routing Queries to Send Mail to Multiple Target
More informationLDAP Directory Services
ATTENTION LDAP Directory Services THE MATERIAL PROVIDED IN THIS DOCUMENT IS FOR INFORMATION PURPOSES ONLY. IT IS NOT INTENDED TO BE ADVICE. YOU SHOULD NOT ACT OR ABSTAIN FROM ACTING BASED UPON SUCH INFORMATION
More informationBEA WebLogic Server Integration Guide
IBM Tivoli Access Manager for e-business BEA WebLogic Server Integration Guide Version 5.1 SC32-1366-00 IBM Tivoli Access Manager for e-business BEA WebLogic Server Integration Guide Version 5.1 SC32-1366-00
More informationConfiguring SAML-based Single Sign-on for Informatica Web Applications
Configuring SAML-based Single Sign-on for Informatica Web Applications Copyright Informatica LLC 2017. Informatica LLC. Informatica, the Informatica logo, Informatica Big Data Management, and Informatica
More informationHow to Configure Authentication and Access Control (AAA)
How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual
More informationCisco TelePresence Device Authentication on Cisco VCS
Cisco TelePresence Device Authentication on Cisco VCS Deployment Guide Cisco VCS X8.5 December 2014 Contents About device authentication 4 Authentication policy 6 Configuring VCS authentication policy
More informationNovell OpenLDAP Configuration
Novell OpenLDAP Configuration To access the GoPrint Novell e-directory LDAP Connector configuration screen navigate to: Accounts Authentication Connectors GoPrint provides two connector options, Standard
More informationExtending the Domino System. Powered by Notes. The First Groupware and Server for the Net R E L E A S E
Extending the Domino System Powered by Notes The First Groupware and E-mail Server for the Net R E L E A S E COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied,
More informationLotus Team Workplace. Version Installation and Upgrade Guide G
Lotus Team Workplace Version 6.5.1 Installation and Upgrade Guide G210-1658-00 Disclaimer THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. WHILE EFFORTS WERE
More informationRealms and Identity Policies
The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 14 Create an Identity Rule, page 15 Manage a Realm, page 17 Manage an Identity
More informationEnabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface
Enabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface Release 7.1 Revised: March 5, 2013 1:53 pm This document describes the
More informationDIGIPASS Authentication for Check Point VPN-1
DIGIPASS Authentication for Check Point VPN-1 With Vasco VACMAN Middleware 3.0 2007 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 51 Disclaimer Disclaimer of Warranties and
More informationConfiguring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.
Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure
More informationBusinessObjects Enterprise XI Linux Multiple Language Build
Revision Date: December 22, 2006 BusinessObjects Enterprise XI Linux Multiple Language Build Overview Contents This document lists specific platforms and configurations for the. INTRODUCTION... 3 LANGUAGES...
More informationSecurity Provider Integration LDAP Server
Security Provider Integration LDAP Server 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property
More informationConfiguring Applications to Exploit LDAP
BY BOB PETTI Configuring Email Applications to Exploit LDAP Email applications such as Microsoft Outlook Express, Pegasus Mail, Netscape Communicator, Lotus Notes and Eudora can be configured to retrieve
More informationUser Management in Resource Manager
CHAPTER 8 This section describes how to manage user profiles. Topics in this section include: Overview of User Management, page 8-1 Using User Management, page 8-1 Overview of User Management In Resource
More informationConfiguration Manager Active Directory Schema Extensions Are Not Required For Site Server
Configuration Manager Active Directory Schema Extensions Are Not Required For Site Server Applies To: System Center 2012 Configuration Manager, System Center 2012 publishing site information to Active
More informationRealms and Identity Policies
The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 15 Create an Identity Rule, page 15 Manage a Realm, page 20 Manage an Identity
More informationShared Session Management Administration Guide
Security Access Manager Version 7.0 Shared Session Management Administration Guide SC23-6509-02 Security Access Manager Version 7.0 Shared Session Management Administration Guide SC23-6509-02 Note Before
More informationGetting Started With Authentication Servers
Getting Started With Authentication Servers The Authentication Servers application enables you to create, modify, and delete authentication servers in OmniVista. An authentication server could be an LDAP,
More informationVMware AirWatch Directory Services Guide Integrating your Directory Services
VMware AirWatch Directory Services Guide Integrating your Directory Services AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.
More informationOne Identity Quick Connect for Base Systems 2.4. Administrator Guide
One Identity Quick Connect for Base Systems 2.4 Administrator Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described
More informationIntegration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access
SafeNet Authentication Manager Integration Guide SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright
More informationLDAP Directory Integration
LDAP Server Name, Address, and Profile Configuration, page 1 with Cisco Unified Communications Manager Task List, page 1 for Contact Searches on XMPP Clients, page 6 LDAP Server Name, Address, and Profile
More informationNovell Access Manager
Quick Start AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 June 11, 2010 www.novell.com Novell Access Manager 3.1 SP2 Quick Start Legal Notices Novell, Inc., makes no representations or warranties
More informationISA 2006 and OWA 2003 Implementation Guide
ISA 2006 and OWA 2003 Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval
More informationTrueSight Capacity Optimization 10.x - LDAP Integration with Microsoft Active Directory. January 2017
TrueSight Capacity Optimization 10.x - LDAP Integration with Microsoft Active Directory January 2017 If you plan to use Capacity Views, or other views provided by TrueSight Presentation Server, don t waste
More informationManaging Users and Authentication Settings
Users Managing Users and Authentication Settings Managing Guest Services and Guest Accounts Managing Users and Authentication Settings User Management Overview Using Local Users and Groups for Authentication
More informationLDAP Servers for AAA
This chapter describes how to configure LDAP servers used in AAA. About LDAP and the ASA, page 1 Guidelines for, page 5 Configure, page 5 Test LDAP Server Authentication and Authorization, page 9 Monitoring,
More informationCisco Expressway Authenticating Accounts Using LDAP
Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4
More informationAuthorized Send Installation and Configuration Guide Version 3.5
Canon Authorized Send Installation and Configuration Guide Version 3.5 08011-35-UD2-004 This page is intentionally left blank. 2 Authorized Send Installation and Configuration Guide Contents Preface...5
More informationRemote Authentication
Authentication Services, page 1 Guidelines and Recommendations for Providers, page 2 User Attributes in Providers, page 2 Two-Factor Authentication, page 4 LDAP Providers and Groups, page 5 RADIUS Providers,
More informationIdentity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication
You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user
More informationVMware Identity Manager Connector Installation and Configuration (Legacy Mode)
VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until
More informationLotus IBM Lotus Virtual Classroom. Version Installation Guide G
Lotus IBM Lotus Virtual Classroom Version 1.1.2 Installation Guide G210-1900-00 Terms of Use Disclaimer THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. WHILE
More informationUsing SSL/TLS with Active Directory / LDAP
Purpose This document describes how to install the required certificate on the for use with LDAP or Active Directory (AD) Integration in. This process is required if your LDAP / AD server has a self signed
More informationZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018
ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk November 2018 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,
More informationUnderstanding the LDAP Binding Component
Understanding the LDAP Binding Component Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 820 6573 Dec 2008 Copyright 2008 Sun Microsystems, Inc. 4150 Network Circle, Santa
More informationEnforced Client Policy & Reporting Server (EPRS) 2.3. Administration Guide
Enforced Client Policy & Reporting Server (EPRS) 2.3 Copyright 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell, the
More informationContents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6
Gateway Installation and Configuration Guide for On-Premises Version 17 September 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites...
More informationVMware Horizon Cloud Service on Microsoft Azure Administration Guide
VMware Horizon Cloud Service on Microsoft Azure Administration Guide Modified on 03 APR 2018 VMware Horizon Cloud Service VMware Horizon Cloud Service on Microsoft Azure 1.5 You can find the most up-to-date
More information