BusinessObjects Enterprise XI

Size: px
Start display at page:

Download "BusinessObjects Enterprise XI"

Transcription

1 Overview Contents This document contains information on LDAP authentication and how to configure with this type of authentication. INTRODUCTION... 2 What Is LDAP?...2 LDAP platforms supported by...3 LDAP Servers... 3 Single Sign-on Server (SSO)... 3 HOW TO CONFIGURE ENTERPRISE XI FOR LDAP AUTHENTICATION...3 Overview...3 Hands-On configuration...4 HOW TO CONFIGURE ENTERPRISE XI FOR LDAP AUTHENTICATION WITH SECURE SOCKET LAYER (SSL)...5 HOW TO CONFIGURE ENTERPRISE XI FOR LDAP AUTHENTICATION WITH SINGLE SIGN-ON (SSO)...7 HOW TO MAP USER ACCOUNTS AND GROUPS FROM THE LDAP DIRECTORY SERVER... 7 HOW TO MANAGE MULTIPLE LDAP HOSTS...9 ADDITIONAL NOTE...9 FINDING MORE INFORMATION /30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 1

2 Introduction This document provides a definition for LDAP and then step-by-step instructions on how to configure LDAP authentication for use with. What Is LDAP? LDAP stands for Lightweight Directory Access Protocol and is a directory service protocol that runs over TCP/IP. Lightweight Directory Access Protocol (LDAP), a common, applicationindependent directory, enables users to share information among various applications. Based on an open standard, LDAP provides a means for accessing and updating information in a directory. LDAP is based on the X.500 standard, which uses a directory access protocol (DAP) to communicate between a directory client and a directory server. LDAP is an alternative to DAP because it uses fewer resources and simplifies and omits some X.500 operations and features. The directory structure within LDAP has entries arranged in a specific schema. Each entry is identified by its corresponding distinguished name (DN) or common name (CN). Other common attributes include the organizational unit name (OU), and the organization name (O). For example, a member group may be located in a directory tree as follows: cn=businessobjects Enterprise Users, ou=enterprise Users A, o=research. Refer to your LDAP documentation for more information. Because LDAP is application-independent, any client with the proper authorization can access its directories. LDAP offers you the ability to set up users to log on to BusinessObjects Enterprise through LDAP authentication. It also enables users to be authorized when attempting to access objects in BusinessObjects Enterprise. As long as you have an LDAP server (or servers) running, and use LDAP in your existing networked computer systems, you can use LDAP authentication. If desired, the LDAP security plug-in provided with BusinessObjects Enterprise can communicate with your LDAP server using a Secure Socket Layer (SSL) connection established using either server authentication or mutual authentication. With server authentication, the LDAP server has a security certificate which BusinessObjects Enterprise uses to verify that it trusts the server, while the LDAP server allows connections from anonymous clients. With mutual authentication, both the LDAP server and BusinessObjects Enterprise have security certificates, and the LDAP server must also verify the client certificate before a connection can be established. Currently LDAP is considered to be the most popular protocol for providing directory services on the Internet. 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 2

3 LDAP platforms supported by BusinessObjects Enterprise XI LDAP Servers SunOne Directory Server*5.1 SunOne Directory Server* 5.2 IBM Secureway Directory 5.1 Lotus Domino Novell NDS edirectory 8.7 *SunOne Directory Server is previously known as iplanet Directory Server. Single Sign-on Server (SSO) Netegrity Siteminder 5.5 NOTE The LDAP security plug-in is LDAP version 3 compliant but we only support the LDAP vendors listed above. For more information and for the latest updates on BusinessObjects Enterprise XI supported platforms, search for the file name, boe_xi_supported_platforms.pdf on our support site at: How to configure Enterprise XI for LDAP authentication Overview The LDAP security plug-in (secldap.dll) allows you to map user accounts and groups from your LDAP directory server to ; it also enables the system to verify all logon requests that specify LDAP authentication. Users are authenticated against the LDAP directory server, and have their membership in a mapped LDAP group verified before the CMS grants them an active session. Enterprise XI dynamically maintains user lists and group memberships. With LDAP authentication, you can create new Enterprise accounts for existing LDAP users, or assign LDAP aliases to existing users if the user names match the Enterprise user names. In addition, you can specify multiple host names and their ports. Once you have mapped your LDAP users and groups, all of the BusinessObjects Enterprise client tools support LDAP authentication, 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 3

4 except for the Import Wizard. You can also create your own applications that support LDAP authentication. Hands-On configuration Before setting up and enabling LDAP authentication, ensure that you have your LDAP directory set up and the LDAP server information. For example, you need to know LDAP host and port information, Base LDAP Distinguished Name, and LDAP Server Administration Credentials if your LDAP Server does not allow anonymous binding. Steps to configure the LDAP host: 1. Go to the Authentication management area of the Central Management Console. 2. Click the LDAP tab, and then click Start LDAP Configuration Wizard. The LDAP Configuration Wizard leads you through the setup of LDAP authentication. The first screen of the Wizard asks for information about your LDAP host. Type your LDAP host and port information in the Add and LDAP host (hostname:port) field. For example, "myserver:123". Click Add. Repeat this step to add more than one LDAP host of the same server type if you want to add hosts that can act as failover servers. If you want to remove a host, highlight the host name and click Delete. For more information on multiple hosts, refer to the How to manage multiple LDAP hosts section in this document. 3. Click Next. 4. Select your server type from the LDAP Server Type list. Click Show Attribute Mappings if you want to view or change any of the LDAP Server Attribute Mappings or the LDAP Default Search Attributes. By default, each supported server type's server attribute mappings and search attributes are already set. 5. Click Next. 6. In the Base LDAP Distinguished Name field, type the distinguished name (for example, o=somebase). 7. Click Next. 8. Enter the credentials required by the LDAP hosts: In the LDAP Server Administration Credentials area, type the distinguished name and password for a user account that is authorized to administer your LDAP server. If your LDAP Server allows anonymous binding, leave this area blank BusinessObjects Enterprise servers and clients will bind to the primary host via anonymous logon. Enter another distinguished name and password in the LDAP Referral Credentials area if all of the following apply: 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 4

5 a) The primary host has been configured to refer to another directory server that handles queries for entries under a specified base. b) The host referred to has been configured to not allow anonymous binding. c) A group from the host being referred to will be mapped to BusinessObjects Enterprise. Although groups can be mapped from multiple hosts, only one set of referral credentials can be set. Therefore, if you have multiple referral hosts, you must create a user account on each host that uses the same distinguished name and password. 9. Enter the number of referral hops in the Maximum Referral Hops field. If this field is set to zero, no referrals will be followed. 10. Click Next. 11. Proceed with configuring the Secure Socket Layer (SSL). 12. Proceed with configuring LDAP for single sign-on (SSO). 13. Map user accounts and groups from your LDAP directory server to Enterprise XI. How to configure Enterprise XI for LDAP authentication with Secure Socket Layer (SSL) You can specify that BusinessObjects Enterprise use a Secure Socket Layer (SSL) connection to communicate to the LDAP directory server for additional security. NOTE The LDAP security plug-in provided with can be configured to communicate with an LDAP server via SSL, but always performs basic authentication when verifying users' credentials. Before deploying LDAP authentication in conjunction with, ensure that you are familiar with the differences between these LDAP types. For details, see RFC2251, which is currently available at 1. Select the type of SSL authentication (Basic (no SSL), Server Authentication, or Mutual Authentication) your LDAP hosts use to establish a connection with Enterprise XI. 2. Click Next. 3. If you selected Server Authentication or Mutual Authentication, choose one of the following options: a) Always accept server certificate This is the lowest security option. Before BusinessObjects Enterprise can establish an SSL connection with the LDAP host (to authenticate LDAP users and groups), it must receive a security certificate from the LDAP host. Enterprise XI does not verify the certificate it receives. 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 5

6 b) Accept server certificate if it comes from a trusted Certificate Authority This is a medium security option. Before BusinessObjects Enterprise can establish an SSL connection with the LDAP host (to authenticate LDAP users and groups), it must receive and verify a security certificate sent to it by the LDAP host. To verify the certificate, BusinessObjects Enterprise must find the Certificate Authority that issued the certificate in its certificate database. TIP Java applications, such as the Java version of InfoView, always use this option, regardless of the setting you choose. c) Accept server certificate if it comes from a trusted Certificate Authority The common name attribute of the certificate matches the DNS hostname of the server. This is the highest security option. Before BusinessObjects Enterprise XI can establish an SSL connection with the LDAP host (to authenticate LDAP users and groups), it must receive and verify a security certificate sent to it by the LDAP host. To verify the certificate, must find the Certificate Authority that issued the certificate in its certificate database. It must also be able to confirm that the CN attribute on the server certificate exactly matches the host name of the LDAP host as you typed it in the "Add LDAP host" field in the first step of the Wizard. That is, if you entered the LDAP host name as ABALONE.rd.crystald.net:389, using CN =ABALONE:389 in the certificate would not work. TIP The hostname on the server security certificate is the name of the primary LDAP host. Therefore, if you select this option you cannot use a fail over LDAP host. 4. In the SSL host computer, you must next add the hostname of each machine in your system that uses the BusinessObjects Enterprise SDK. This includes the machine running your Central Management Server and the machine running your WCA. Type the hostname of each machine in the SSL Host box, and then click Add. 5. Configure the SSL settings for each SSL host in the list, starting with the default host. To select settings for the default host, clear all the Use default value boxes. 6. Type the values for the path to the certificate and key database files, and the password for the key database. Type a nickname for the client certificate in the cert7.db, if you selected mutual authentication. The settings for the default host are used for any setting (for any host) where you leave the "Use default value" check box selected, as 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 6

7 well, for any machine whose name you do not explicitly add to the list of SSL hosts. To select settings for another host, select its name in the list on the left. Then type the appropriate values in the boxes on the right. 7. Click Next to complete this set of steps. How to configure Enterprise XI for LDAP authentication with Single Sign-on (SSO) Business Objects XI has introduced single sign-on for LDAP authentication. When LDAP authentication is enabled, the administrator has the option to use Siteminder (a third-party user access and authentication tool) as an external system for authentication providing single sign-on capabilities to BusinessObjects Enterprise. 1. Select the type of single sign-on authentication (Basic (no SSO) or SiteMinder). 2. Click Next. 3. If you selected SiteMinder, configure the SiteMinder hosts: In the Policy Server Host box, type the name of each Policy Server, and then click Add. For each Policy Server Host, specify the Accounting, Authentication and Authorization port numbers. Enter the name of the Web Agent and the Shared Secret. Enter the Shared Secret, again. 4. Click Next to complete this set of steps. How to map user accounts and groups from the LDAP directory server When you map an LDAP account, you can choose to create a new account or to link to an existing Enterprise account. The next screen of the LDAP Configuration Wizard controls how maps LDAP users to Enterprise users. 1. Click New Alias Options to specify how LDAP aliases are mapped to Enterprise accounts. Select either one of the following options: a) Assign each added LDAP alias to an account with the same name Use this option when you know users have an existing Enterprise account with the same name; that is, LDAP aliases will be assigned to existing users (auto alias creation is turned on). Users who do not have an existing Enterprise account, or who do not have the same name in their Enterprise and LDAP account, are added as new LDAP users. 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 7

8 b) Create a new account for every added LDAP alias Use this option when you want to create a new account for each user. 2. Click Update Options to specify if LDAP aliases are automatically created for all new users. Select either one of the following options: a) New aliases will be added and new users will be created Use this option to automatically create a new alias for every LDAP user mapped to BusinessObjects Enterprise. New LDAP accounts are added for users without BusinessObjects Enterprise accounts, or for all users if you selected the "Create a new account for every added LDAP alias" option. b) No new aliases will be added and new users will not be created Use this option when the LDAP directory you are mapping contains many users, but only a few of them will use BusinessObjects Enterprise. BusinessObjects Enterprise does not automatically create aliases and Enterprise accounts for all users. Instead, it creates aliases (and accounts, if required) only for users who log on to BusinessObjects Enterprise. 3. Click New User Options to specify properties of the new Enterprise accounts that are created to map to LDAP accounts. Select either one of the following: a) New users are created as named users New user accounts are configured to use named user licenses. Named user licenses are associated with specific users and allow people to access the system based on their user name and password. This provides named users with access to the system regardless of how many other people are connected. You must have a named user license available for each user account created using this option. a) New users are created as concurrent users New user accounts are configured to use concurrent user licenses. Concurrent licenses specify the number of people who can connect to at the same time. This type of licensing is very flexible because a small concurrent license can support a large user base. For example, depending on how often and how long users access BusinessObjects Enterprise, a 100 user concurrent license could support 250, 500, or 700 users. 4. Click Finish to save your LDAP settings. The LDAP Server Summary page appears. Once you have configured LDAP authentication using the LDAP Configuration Wizard, you can map LDAP groups to Enterprise groups. 5. In the "Mapped LDAP Member Groups" area, specify your LDAP group (either by common name or distinguished name) in the Add LDAP group (by cn or dn) field; click Add. You can add more than 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 8

9 one LDAP group by repeating this step. To remove a group, highlight the LDAP group and click Delete. 6. Click Update to save the settings. How to manage multiple LDAP hosts 7. To confirm that these groups are successfully mapped to BusinessObject Enterprise XI, click the Organize GROUPS link located in the Home area of the Central Management Console. In the Groups page, you can see the new LDAP groups just mapped from the LDAP directory server. Using LDAP and BusinessObjects Enterprise, you can add fault tolerance to your system by adding multiple LDAP hosts. BusinessObjects Enterprise XI uses the first host that you add as the primary LDAP host. Subsequent hosts are treated as fail over hosts. The primary LDAP host and all fail over hosts must be configured in exactly the same way, and each LDAP host must refer to all additional hosts from which you wish to map groups. For more information about LDAP hosts and referrals, refer to LDAP documentation. To add multiple LDAP Hosts, enter all hosts when you configure LDAP using the LDAP Configuration Wizard (refer to the section on How to configure LDAP authentication for details.) Or, if you have already configured LDAP, go to the Authentication Management area of the Central Management Console and click the LDAP tab. In the LDAP Server Configuration Summary area, click the name of the LDAP host to open the page that enables you to add or delete hosts. NOTE The order in which the hosts are communicated with matters, so ensure that you add the primary host first, followed by the remaining fail over hosts. If you use fail over LDAP hosts, you cannot use the highest level of SSL security. That is, you cannot select "Accept server certificate if it comes from a trusted Certificate Authority and the CN attribute of the certificate matches the DNS hostname of the server." Additional note JAVA SDK - LDAP authentication When logging on to BusinessObjects Enterprise 11 using the JAVA SDK s LDAP provider (in particular, when logging on to the Java InfoView via LDAP), specified referral credentials are not used when following referrals while looking up users. For LDAP authentication to succeed, you need to enable anonymous logon for all LDAP servers specified in referrals. (Refer to release.pdf on the installation CD as the source for this note.) 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 9

10 Finding More Information For more information and resources, refer to the product documentation and visit the support area of the web site at: 3/30/2007 2:23 PM Copyright 2007 Business Objects. All rights reserved. Page 10

ACS 5.x: LDAP Server Configuration Example

ACS 5.x: LDAP Server Configuration Example ACS 5.x: LDAP Server Configuration Example Document ID: 113473 Contents Introduction Prerequisites Requirements Components Used Conventions Background Information Directory Service Authentication Using

More information

Configuring LDAP Authentication for HPE OBR

Configuring LDAP Authentication for HPE OBR Technical White Paper Configuring LDAP Authentication for HPE OBR For the Windows and Linux Operation System Software Version 10.00 Table of Contents Introduction... 2 Supported Directory servers for LDAP...

More information

Blueprinting Questionnaire Sample

Blueprinting Questionnaire Sample Manish Chaitanya Blueprinting Questionnaire Sample from The Complete Guide to SAP NetWeaver Portal Bonn Boston ch11_a_online_6124.indd 1 1/12/12 2:58:16 PM A Blueprinting Questionnaire Sample In Chapter

More information

Windows Server 2003 Network Administration Goals

Windows Server 2003 Network Administration Goals Objectives Differentiate between the different editions of Windows Server 2003 Explain Windows Server 2003 network models and server roles Identify concepts relating to Windows Server 2003 network management

More information

BusinessObjects Enterprise XI Release 1 and Release 2

BusinessObjects Enterprise XI Release 1 and Release 2 BusinessObjects Enterprise XI Release 1 and Release 2 Overview Contents This document provides information and instructions for setting up Lightweight Directory Access Protocol (LDAP) authentication in

More information

Host Access Management and Security Server Administrative Console Users Guide. August 2016

Host Access Management and Security Server Administrative Console Users Guide. August 2016 Host Access Management and Security Server Administrative Console Users Guide August 2016 2016 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials

More information

SMS 2.0 SSO / LDAP Launch Kit

SMS 2.0 SSO / LDAP Launch Kit SMS 2.0 SSO / LDAP Launch Kit Table of Contents What options are available in SMS 2.0 for Single Sign On?... 4 LDAP (Lightweight Directory Access Protocol)... 4 SkySSO (Skyward Single Sign On)... 4 SkySTS

More information

DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION. Gabriella Davis The Turtle Partnership

DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION. Gabriella Davis The Turtle Partnership DIRECTORY INTEGRATION: USING ACTIVE DIRECTORY FOR AUTHENTICATION Gabriella Davis The Turtle Partnership In This Session Review possible use cases for multiple directories Understand security implications

More information

Business Objects Exam SABE201 BusinessObjects(TM) Enterprise Certified Professional XI - Level One Version: 5.0 [ Total Questions: 160 ]

Business Objects Exam SABE201 BusinessObjects(TM) Enterprise Certified Professional XI - Level One Version: 5.0 [ Total Questions: 160 ] s@lm@n Business Objects Exam SABE201 BusinessObjects(TM) Enterprise Certified Professional XI - Level One Version: 5.0 [ Total Questions: 160 ] Topic 0, D D Question No : 1 - (Topic 0) Which two actions

More information

CounterACT User Directory Plugin

CounterACT User Directory Plugin Version 6.1.2 and Above Table of Contents About the User Directory Plugin... 3 Endpoint User Details... 3 Verify Endpoint Authentication... 3 User Directory Inventory... 4 HTTP Login Action... 5 HTTP Sign

More information

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.1

Job Reference Guide. SLAMD Distributed Load Generation Engine. Version 1.8.1 Job Reference Guide SLAMD Distributed Load Generation Engine Version 1.8.1 December 2004 Contents 1. Introduction...3 2. The Utility Jobs...4 3. The LDAP Search Jobs...11 4. The LDAP Authentication Jobs...22

More information

How to Integrate an External Authentication Server

How to Integrate an External Authentication Server How to Integrate an External Authentication Server Required Product Model and Version This article applies to the Barracuda Load Balancer ADC 540 and above, version 5.1 and above, and to all Barracuda

More information

ISBG May LDAP: It s Time. Gabriella Davis - Technical Director The Turtle Partnership

ISBG May LDAP: It s Time. Gabriella Davis - Technical Director The Turtle Partnership ISBG May 2015 LDAP: It s Time Gabriella Davis - Technical Director The Turtle Partnership gabriella@turtlepartnership.com What Is LDAP? Lightweight Directory Access Protocol Standard language for reading

More information

Integrating With LDAP

Integrating With LDAP This chapter contains the following sections: Overview, on page 1 Configuring LDAP to Work with the Spam Quarantine, on page 1 Creating the LDAP Server Profile, on page 2 Configuring LDAP Queries, on page

More information

Managing External Identity Sources

Managing External Identity Sources CHAPTER 5 The Cisco Identity Services Engine (Cisco ISE) integrates with external identity sources to validate credentials in user authentication functions, and to retrieve group information and other

More information

Data Collection Tool

Data Collection Tool Data Collection Tool June 2009 Contents Chapter 1: What is the Data Collection Tool?...5 Chapter 2: Use of the DCT Data File in MM Configuration...7 Chapter 3: Obtaining a current version of the Data

More information

User Management: Configuring Auth Servers

User Management: Configuring Auth Servers 7 CHAPTER This chapter describes how to set up external authentication sources, configure Active Directory Single Sign-On (SSO), VLAN ID or attribute-based auth server mapping rules, and RADIUS accounting.

More information

Laserfiche Rio 10.3: Deployment Guide. White Paper

Laserfiche Rio 10.3: Deployment Guide. White Paper Laserfiche Rio 10.3: Deployment Guide White Paper January 2018 Table of Contents How Laserfiche Licensing Works... 4 Types of Licenses... 4 Named User Licenses... 4 WebLink Public Portal Licenses... 6

More information

Data Collection Tool

Data Collection Tool Data Collection Tool November 2009 Contents Chapter 1: What is the Data Collection Tool?...5 Chapter 2: Use of the DCT Data File in MM Configuration...7 Chapter 3: Obtaining the current version of the

More information

Workspace ONE UEM Directory Service Integration. VMware Workspace ONE UEM 1811

Workspace ONE UEM Directory Service Integration. VMware Workspace ONE UEM 1811 Workspace ONE UEM Directory Service Integration VMware Workspace ONE UEM 1811 You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/ If you have comments

More information

Lotus Learning Management System R1

Lotus Learning Management System R1 Lotus Learning Management System R1 Version 1.0.4 March 2004 Administrator's Guide G210-1785-00 Contents Chapter 1 Introduction to the Learning Management System and Administration...1 Understanding the

More information

Blue Coat Security First Steps Solution for Integrating Authentication Using LDAP

Blue Coat Security First Steps Solution for Integrating Authentication Using LDAP Solution for Integrating Authentication Using LDAP SGOS 6.5 Third Party Copyright Notices 2014 Blue Coat Systems, Inc. All rights reserved. BLUE COAT, PROXYSG, PACKETSHAPER, CACHEFLOW, INTELLIGENCECENTER,

More information

BusinessObjects OLAP Intelligence XI

BusinessObjects OLAP Intelligence XI Configuring Overview BusinessObjects OLAP Intelligence XI allows users to connect to and design custom applications against OLAP data sources. OLAP Intelligence XI and its web components use the Microsoft

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

Remote Support Security Provider Integration: RADIUS Server

Remote Support Security Provider Integration: RADIUS Server Remote Support Security Provider Integration: RADIUS Server 2003-2019 BeyondTrust Corporation. All Rights Reserved. BEYONDTRUST, its logo, and JUMP are trademarks of BeyondTrust Corporation. Other trademarks

More information

Setting up Multiple LDAP Domains in SonicWall 6.5 Firmware without Partitioning.

Setting up Multiple LDAP Domains in SonicWall 6.5 Firmware without Partitioning. Setting up Multiple LDAP Domains in SonicWall 6.5 Firmware without Partitioning. SonicWall 6.5 firmware now allows multiple LDAP servers for authentication, to set this up follow the guide below. SonicWall

More information

FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry.

FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE VERSION 9. Setup Guide. This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION VERSION 9 Setup Guide This guide explains how to install and configure the Fusion Registry. FUSION REGISTRY COMMUNITY EDITION SETUP GUIDE Fusion Registry: 9.2.x Document

More information

Host Access Management and Security Server Administrative Console Users Guide. December 2016

Host Access Management and Security Server Administrative Console Users Guide. December 2016 Host Access Management and Security Server Administrative Console Users Guide December 2016 2016 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials

More information

Implementing Single-Sign-On(SSO) for APM UI

Implementing Single-Sign-On(SSO) for APM UI Implementing Single-Sign-On(SSO) for APM UI 1.Introduction...2 2.Overview of SSO with LTPA...3 3.Installing and configuring TDS...5 3.1.Installing TDS 6.3...5 3.2.Changing the administrator password (Optional)...7

More information

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page. Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator

More information

An LDAP server may implement its own schema or a standard schema defined as in RFC Mainstream implementations of LDAP include Netscape

An LDAP server may implement its own schema or a standard schema defined as in RFC Mainstream implementations of LDAP include Netscape Spectrum Software, Inc. 11445 Johns Creek Pkwy. Suite 300 Duluth, GA 30097 www.spectrumscm.com Subject: LDAP Support for SpectrumSCM Original Issue Date: April 26 th, 2003 Update Date: December 13 th,

More information

ZENworks Mobile Workspace. Integration Overview. Version June 2018 Copyright Micro Focus Software Inc. All rights reserved.

ZENworks Mobile Workspace. Integration Overview. Version June 2018 Copyright Micro Focus Software Inc. All rights reserved. ZENworks Mobile Workspace Integration Overview Version 3.17.1 - June 2018 Copyright Micro Focus Software Inc. All rights reserved. Table of Contents Foreword..................................................................................

More information

9/2/2006. Cool Solutions for LDAP and AR System

9/2/2006. Cool Solutions for LDAP and AR System 9/2/2006 Cool Solutions for LDAP and AR System Introduction IT organizations often maintain systems containing data that can be useful in conjunction with BMC Remedy packaged applications Active Directories

More information

LDAP Directory Integration

LDAP Directory Integration LDAP Server Name, Address, and Profile Configuration, on page 1 with Cisco Unified Communications Manager Task List, on page 1 for Contact Searches on XMPP Clients, on page 6 LDAP Server Name, Address,

More information

Lotus Domino and Extended Products. Version Administrator's Guide G

Lotus Domino and Extended Products. Version Administrator's Guide G Lotus Domino and Extended Products Version 6.5.1 Administrator's Guide G210-1747-00 Disclaimer THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. WHILE EFFORTS

More information

Installation and Setup of IBM Lotus Sametime From Zero to Hero The Next Generation

Installation and Setup of IBM Lotus Sametime From Zero to Hero The Next Generation Installation and Setup of IBM Lotus Sametime 8.5.1 From Zero to Hero The Next Generation Frank Altenburg Senior Field Support Engineer frank.altenburg@de.ibm.com Agenda Components of IBM Lotus Sametime

More information

ITCertMaster. Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way!

ITCertMaster.  Safe, simple and fast. 100% Pass guarantee! IT Certification Guaranteed, The Easy Way! ITCertMaster Safe, simple and fast. 100% Pass guarantee! http://www.itcertmaster.com Exam : C_AUDSEC_731 Title : SAP Certified Technology Associate - SAP Authorization and Auditing for SAP NetWeaver 7.31

More information

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.

Installing and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3. Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on

More information

Security Provider Integration RADIUS Server

Security Provider Integration RADIUS Server Security Provider Integration RADIUS Server 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

LDAP Configuration Guide

LDAP Configuration Guide LDAP Configuration Guide Publication date: 11/8/2017 www.xcalar.com Copyright 2017 Xcalar, Inc. All rights reserved. Table of Contents About this guide 3 Configuring LDAP 4 Before you start 5 Configuring

More information

CLI users are not listed on the Cisco Prime Collaboration User Management page.

CLI users are not listed on the Cisco Prime Collaboration User Management page. Cisco Prime Collaboration supports creation of user roles. A user can be assigned the Super Administrator role. A Super Administrator can perform tasks that both system administrator and network administrator

More information

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server

Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure the IM and Presence Service to Integrate with the Microsoft Exchange Server Configure a Presence Gateway for Microsoft Exchange Integration, page 1 SAN and Wildcard Certificate Support, page

More information

HP Service Health Reporter Configuring SHR to use Windows AD Authentication

HP Service Health Reporter Configuring SHR to use Windows AD Authentication Technical white paper HP Service Health Reporter Configuring SHR to use Windows AD Authentication For the Windows Operation System Software Version 9.3x Table of Contents Introduction... 2 Motivation...

More information

BusinessObjects Enterprise XI Release 2

BusinessObjects Enterprise XI Release 2 Configuring Kerberos End-to-End Single Sign-On using IIS Overview Contents This document provides information and instructions for setting up Kerberos end-to-end Single Sign-On (SSO) using IIS to the database

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012848-001, Rev. E Release Date July 2015 Applicability This version of the SAS

More information

Users. LDAP Synchronization Overview

Users. LDAP Synchronization Overview LDAP Synchronization Overview, page 1 Configure Workflow, page 3 Activate Services, page 3 Enable LDAP Directory Synchronization, page 4 Configure LDAP Directory Sync, page 4 Authentication Options, page

More information

Show 201 Installation and Setup of IBM Lotus Sametime From Zero to Hero The Next Generation

Show 201 Installation and Setup of IBM Lotus Sametime From Zero to Hero The Next Generation Show 201 Installation and Setup of IBM Lotus Sametime 8.5.1 From Zero to Hero The Next Generation Frank Altenburg SME for Sametime IBM Volker Juergensen Senior IT Specialist IBM 2011 IBM Corporation Agenda

More information

Host Access Management and Security Server Administrative Console Users Guide. April 2017

Host Access Management and Security Server Administrative Console Users Guide. April 2017 Host Access Management and Security Server Administrative Console Users Guide April 2017 2017 Attachmate Corporation, a Micro Focus company. All rights reserved. No part of the documentation materials

More information

Oracle Directory Services 11g: Administration

Oracle Directory Services 11g: Administration Oracle University Contact Us: 0180-2000-526 / +49 89-14301200 Oracle Directory Services 11g: Administration Duration: 5 Days What you will learn After completing this course, you should be able to perform

More information

Security Enterprise Identity Mapping

Security Enterprise Identity Mapping System i Security Enterprise Identity Mapping Version 6 Release 1 System i Security Enterprise Identity Mapping Version 6 Release 1 Note Before using this information and the product it supports, be sure

More information

ForeScout CounterACT. Configuration Guide. Version 6.3

ForeScout CounterACT. Configuration Guide. Version 6.3 ForeScout CounterACT Authentication Module: User Directory Plugin Version 6.3 Table of Contents About the User Directory Plugin... 4 Endpoint User Details... 4 Endpoint Authentication... 5 User Directory

More information

NotifySCM Workspace Administration Guide

NotifySCM Workspace Administration Guide NotifySCM Workspace Administration Guide TABLE OF CONTENTS 1 Overview... 3 2 Login... 4 2.1 Main View... 5 3 Manage... 6 3.1 PIM... 6 3.2 Document...12 3.3 Server...13 4 Workspace Configuration... 14 4.1

More information

Synchronization Agent Configuration Guide

Synchronization Agent Configuration Guide SafeNet Authentication Service Synchronization Agent Configuration Guide 1 Document Information Document Part Number 007-012848-001, Rev. B Release Date March 2015 Applicability This version of the SAS

More information

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager

VMware Identity Manager Cloud Deployment. DEC 2017 VMware AirWatch 9.2 VMware Identity Manager VMware Identity Manager Cloud Deployment DEC 2017 VMware AirWatch 9.2 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware website at: https://docs.vmware.com/

More information

LDAP Queries. Overview of LDAP Queries. Understanding LDAP Queries

LDAP Queries. Overview of LDAP Queries. Understanding LDAP Queries This chapter contains the following sections: Overview of, on page 1 Working with, on page 10 Using Acceptance Queries For Recipient Validation, on page 17 Using Routing Queries to Send Mail to Multiple

More information

Cisco VCS Authenticating Devices

Cisco VCS Authenticating Devices Cisco VCS Authenticating Devices Deployment Guide First Published: May 2011 Last Updated: November 2015 Cisco VCS X8.7 Cisco Systems, Inc. www.cisco.com 2 About Device Authentication Device authentication

More information

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager

VMware Identity Manager Cloud Deployment. Modified on 01 OCT 2017 VMware Identity Manager VMware Identity Manager Cloud Deployment Modified on 01 OCT 2017 VMware Identity Manager You can find the most up-to-date technical documentation on the VMware Web site at: https://docs.vmware.com/ The

More information

NetIQ Advanced Authentication Framework. Deployment Guide. Version 5.1.0

NetIQ Advanced Authentication Framework. Deployment Guide. Version 5.1.0 NetIQ Advanced Authentication Framework Deployment Guide Version 5.1.0 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 NetIQ Advanced Authentication Framework Deployment 4

More information

LDAP Queries. Overview of LDAP Queries. This chapter contains the following sections:

LDAP Queries. Overview of LDAP Queries. This chapter contains the following sections: This chapter contains the following sections: Overview of, page 1 Working with, page 11 Using Acceptance Queries For Recipient Validation, page 18 Using Routing Queries to Send Mail to Multiple Target

More information

LDAP Directory Services

LDAP Directory Services ATTENTION LDAP Directory Services THE MATERIAL PROVIDED IN THIS DOCUMENT IS FOR INFORMATION PURPOSES ONLY. IT IS NOT INTENDED TO BE ADVICE. YOU SHOULD NOT ACT OR ABSTAIN FROM ACTING BASED UPON SUCH INFORMATION

More information

BEA WebLogic Server Integration Guide

BEA WebLogic Server Integration Guide IBM Tivoli Access Manager for e-business BEA WebLogic Server Integration Guide Version 5.1 SC32-1366-00 IBM Tivoli Access Manager for e-business BEA WebLogic Server Integration Guide Version 5.1 SC32-1366-00

More information

Configuring SAML-based Single Sign-on for Informatica Web Applications

Configuring SAML-based Single Sign-on for Informatica Web Applications Configuring SAML-based Single Sign-on for Informatica Web Applications Copyright Informatica LLC 2017. Informatica LLC. Informatica, the Informatica logo, Informatica Big Data Management, and Informatica

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

Cisco TelePresence Device Authentication on Cisco VCS

Cisco TelePresence Device Authentication on Cisco VCS Cisco TelePresence Device Authentication on Cisco VCS Deployment Guide Cisco VCS X8.5 December 2014 Contents About device authentication 4 Authentication policy 6 Configuring VCS authentication policy

More information

Novell OpenLDAP Configuration

Novell OpenLDAP Configuration Novell OpenLDAP Configuration To access the GoPrint Novell e-directory LDAP Connector configuration screen navigate to: Accounts Authentication Connectors GoPrint provides two connector options, Standard

More information

Extending the Domino System. Powered by Notes. The First Groupware and Server for the Net R E L E A S E

Extending the Domino System. Powered by Notes. The First Groupware and  Server for the Net R E L E A S E Extending the Domino System Powered by Notes The First Groupware and E-mail Server for the Net R E L E A S E COPYRIGHT Under the copyright laws, neither the documentation nor the software may be copied,

More information

Lotus Team Workplace. Version Installation and Upgrade Guide G

Lotus Team Workplace. Version Installation and Upgrade Guide G Lotus Team Workplace Version 6.5.1 Installation and Upgrade Guide G210-1658-00 Disclaimer THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. WHILE EFFORTS WERE

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 14 Create an Identity Rule, page 15 Manage a Realm, page 17 Manage an Identity

More information

Enabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface

Enabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface Enabling Microsoft Outlook Calendar Notifications for Meetings Scheduled from the Cisco Unified MeetingPlace End-User Web Interface Release 7.1 Revised: March 5, 2013 1:53 pm This document describes the

More information

DIGIPASS Authentication for Check Point VPN-1

DIGIPASS Authentication for Check Point VPN-1 DIGIPASS Authentication for Check Point VPN-1 With Vasco VACMAN Middleware 3.0 2007 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 51 Disclaimer Disclaimer of Warranties and

More information

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved.

Configuring the Oracle Network Environment. Copyright 2009, Oracle. All rights reserved. Configuring the Oracle Network Environment Objectives After completing this lesson, you should be able to: Use Enterprise Manager to: Create additional listeners Create Oracle Net Service aliases Configure

More information

BusinessObjects Enterprise XI Linux Multiple Language Build

BusinessObjects Enterprise XI Linux Multiple Language Build Revision Date: December 22, 2006 BusinessObjects Enterprise XI Linux Multiple Language Build Overview Contents This document lists specific platforms and configurations for the. INTRODUCTION... 3 LANGUAGES...

More information

Security Provider Integration LDAP Server

Security Provider Integration LDAP Server Security Provider Integration LDAP Server 2017 Bomgar Corporation. All rights reserved worldwide. BOMGAR and the BOMGAR logo are trademarks of Bomgar Corporation; other trademarks shown are the property

More information

Configuring Applications to Exploit LDAP

Configuring  Applications to Exploit LDAP BY BOB PETTI Configuring Email Applications to Exploit LDAP Email applications such as Microsoft Outlook Express, Pegasus Mail, Netscape Communicator, Lotus Notes and Eudora can be configured to retrieve

More information

User Management in Resource Manager

User Management in Resource Manager CHAPTER 8 This section describes how to manage user profiles. Topics in this section include: Overview of User Management, page 8-1 Using User Management, page 8-1 Overview of User Management In Resource

More information

Configuration Manager Active Directory Schema Extensions Are Not Required For Site Server

Configuration Manager Active Directory Schema Extensions Are Not Required For Site Server Configuration Manager Active Directory Schema Extensions Are Not Required For Site Server Applies To: System Center 2012 Configuration Manager, System Center 2012 publishing site information to Active

More information

Realms and Identity Policies

Realms and Identity Policies The following topics describe realms and identity policies: About, page 1 Create a Realm, page 8 Create an Identity Policy, page 15 Create an Identity Rule, page 15 Manage a Realm, page 20 Manage an Identity

More information

Shared Session Management Administration Guide

Shared Session Management Administration Guide Security Access Manager Version 7.0 Shared Session Management Administration Guide SC23-6509-02 Security Access Manager Version 7.0 Shared Session Management Administration Guide SC23-6509-02 Note Before

More information

Getting Started With Authentication Servers

Getting Started With Authentication Servers Getting Started With Authentication Servers The Authentication Servers application enables you to create, modify, and delete authentication servers in OmniVista. An authentication server could be an LDAP,

More information

VMware AirWatch Directory Services Guide Integrating your Directory Services

VMware AirWatch Directory Services Guide Integrating your Directory Services VMware AirWatch Directory Services Guide Integrating your Directory Services AirWatch v9.2 Have documentation feedback? Submit a Documentation Feedback support ticket using the Support Wizard on support.air-watch.com.

More information

One Identity Quick Connect for Base Systems 2.4. Administrator Guide

One Identity Quick Connect for Base Systems 2.4. Administrator Guide One Identity Quick Connect for Base Systems 2.4 Administrator Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described

More information

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access

Integration Guide. SafeNet Authentication Manager. SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access SafeNet Authentication Manager Integration Guide SAM using RADIUS Protocol with SonicWALL E-Class Secure Remote Access Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright

More information

LDAP Directory Integration

LDAP Directory Integration LDAP Server Name, Address, and Profile Configuration, page 1 with Cisco Unified Communications Manager Task List, page 1 for Contact Searches on XMPP Clients, page 6 LDAP Server Name, Address, and Profile

More information

Novell Access Manager

Novell Access Manager Quick Start AUTHORIZED DOCUMENTATION Novell Access Manager 3.1 SP2 June 11, 2010 www.novell.com Novell Access Manager 3.1 SP2 Quick Start Legal Notices Novell, Inc., makes no representations or warranties

More information

ISA 2006 and OWA 2003 Implementation Guide

ISA 2006 and OWA 2003 Implementation Guide ISA 2006 and OWA 2003 Implementation Guide Copyright Copyright 2006, CRYPTOCard Corp. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval

More information

TrueSight Capacity Optimization 10.x - LDAP Integration with Microsoft Active Directory. January 2017

TrueSight Capacity Optimization 10.x - LDAP Integration with Microsoft Active Directory. January 2017 TrueSight Capacity Optimization 10.x - LDAP Integration with Microsoft Active Directory January 2017 If you plan to use Capacity Views, or other views provided by TrueSight Presentation Server, don t waste

More information

Managing Users and Authentication Settings

Managing Users and Authentication Settings Users Managing Users and Authentication Settings Managing Guest Services and Guest Accounts Managing Users and Authentication Settings User Management Overview Using Local Users and Groups for Authentication

More information

LDAP Servers for AAA

LDAP Servers for AAA This chapter describes how to configure LDAP servers used in AAA. About LDAP and the ASA, page 1 Guidelines for, page 5 Configure, page 5 Test LDAP Server Authentication and Authorization, page 9 Monitoring,

More information

Cisco Expressway Authenticating Accounts Using LDAP

Cisco Expressway Authenticating Accounts Using LDAP Cisco Expressway Authenticating Accounts Using LDAP Deployment Guide Cisco Expressway X8.5 December 2014 Contents Introduction 3 Process summary 3 LDAP accessible authentication server configuration 4

More information

Authorized Send Installation and Configuration Guide Version 3.5

Authorized Send Installation and Configuration Guide Version 3.5 Canon Authorized Send Installation and Configuration Guide Version 3.5 08011-35-UD2-004 This page is intentionally left blank. 2 Authorized Send Installation and Configuration Guide Contents Preface...5

More information

Remote Authentication

Remote Authentication Authentication Services, page 1 Guidelines and Recommendations for Providers, page 2 User Attributes in Providers, page 2 Two-Factor Authentication, page 4 LDAP Providers and Groups, page 5 RADIUS Providers,

More information

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication

Identity Policies. Identity Policy Overview. Establishing User Identity through Active Authentication You can use identity policies to collect user identity information from connections. You can then view usage based on user identity in the dashboards, and configure access control based on user or user

More information

VMware Identity Manager Connector Installation and Configuration (Legacy Mode)

VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until

More information

Lotus IBM Lotus Virtual Classroom. Version Installation Guide G

Lotus IBM Lotus Virtual Classroom. Version Installation Guide G Lotus IBM Lotus Virtual Classroom Version 1.1.2 Installation Guide G210-1900-00 Terms of Use Disclaimer THE INFORMATION CONTAINED IN THIS DOCUMENTATION IS PROVIDED FOR INFORMATIONAL PURPOSES ONLY. WHILE

More information

Using SSL/TLS with Active Directory / LDAP

Using SSL/TLS with Active Directory / LDAP Purpose This document describes how to install the required certificate on the for use with LDAP or Active Directory (AD) Integration in. This process is required if your LDAP / AD server has a self signed

More information

ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018

ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk. November 2018 ZENworks Service Desk 8.0 Using ZENworks with ZENworks Service Desk November 2018 Legal Notices For information about legal notices, trademarks, disclaimers, warranties, export and other use restrictions,

More information

Understanding the LDAP Binding Component

Understanding the LDAP Binding Component Understanding the LDAP Binding Component Sun Microsystems, Inc. 4150 Network Circle Santa Clara, CA 95054 U.S.A. Part No: 820 6573 Dec 2008 Copyright 2008 Sun Microsystems, Inc. 4150 Network Circle, Santa

More information

Enforced Client Policy & Reporting Server (EPRS) 2.3. Administration Guide

Enforced Client Policy & Reporting Server (EPRS) 2.3. Administration Guide Enforced Client Policy & Reporting Server (EPRS) 2.3 Copyright 2016 Dell Inc. All rights reserved. This product is protected by U.S. and international copyright and intellectual property laws. Dell, the

More information

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6

Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites... 6 Gateway Installation and Configuration Guide for On-Premises Version 17 September 2017 Contents Overview... 5 Downloading Primavera Gateway... 5 Primavera Gateway On-Premises Installation Prerequisites...

More information

VMware Horizon Cloud Service on Microsoft Azure Administration Guide

VMware Horizon Cloud Service on Microsoft Azure Administration Guide VMware Horizon Cloud Service on Microsoft Azure Administration Guide Modified on 03 APR 2018 VMware Horizon Cloud Service VMware Horizon Cloud Service on Microsoft Azure 1.5 You can find the most up-to-date

More information