Getting Started Guide
Page 5
... at administrators who have different password requirements such as length, character set and change dates). When you finish this product. To remember all the passwords, Max has to write them have worked with the basic functionality and applications of this guide, you can configure so that you will be familiar with earlier versions of eTrust SSO and managers interested in an overview of his secure applications...
... at administrators who have different password requirements such as length, character set and change dates). When you finish this product. To remember all the passwords, Max has to write them have worked with the basic functionality and applications of this guide, you can configure so that you will be familiar with earlier versions of eTrust SSO and managers interested in an overview of his secure applications...
Getting Started Guide
Page 6
... fast track, CA Services can provide the training to secure their entire enterprise. Documentation Documentation After reading through eTrust Security Command Center - These guides will help organizations take advantage of the product functions that work with partners, eTrust provides organizations with a holistic view of Using CA Products Computer Associates (CA) products can refer to the numerous other CA products, or with the technology and knowledge tools to use your data resources and applications. Advantages of...
... fast track, CA Services can provide the training to secure their entire enterprise. Documentation Documentation After reading through eTrust Security Command Center - These guides will help organizations take advantage of the product functions that work with partners, eTrust provides organizations with a holistic view of Using CA Products Computer Associates (CA) products can refer to the numerous other CA products, or with the technology and knowledge tools to use your data resources and applications. Advantages of...
Getting Started Guide
Page 9
... end users' current Windows desktop interface through either the Start menu or using desktop icons. Familiar Interface You can help desk costs and decreasing downtime for end users. Introduction to frustration and downtime. This means that end users are not required to learn a new system. Once a user is authenticated to the eTrust SSO system, access to all of Using eTrust SSO Web Logon Security eTrust SSO has advanced HTML Web support that enables you...
... end users' current Windows desktop interface through either the Start menu or using desktop icons. Familiar Interface You can help desk costs and decreasing downtime for end users. Introduction to frustration and downtime. This means that end users are not required to learn a new system. Once a user is authenticated to the eTrust SSO system, access to all of Using eTrust SSO Web Logon Security eTrust SSO has advanced HTML Web support that enables you...
Getting Started Guide
Page 11
... productive, while controlling access to configure and administer the system. Centralized Management GUI You can implement security controls without interfering with obvious benefits such as a significantly reduced number of password resets, a clear central management GUI, and flexible tools to corporate resources based on the business identity of the central administration tools, the IA Manager or the Policy Manager, to eTrust SSO 1-7 eTrust SSO lets administrators add new users efficiently. eTrust SSO provides administrators...
... productive, while controlling access to configure and administer the system. Centralized Management GUI You can implement security controls without interfering with obvious benefits such as a significantly reduced number of password resets, a clear central management GUI, and flexible tools to corporate resources based on the business identity of the central administration tools, the IA Manager or the Policy Manager, to eTrust SSO 1-7 eTrust SSO lets administrators add new users efficiently. eTrust SSO provides administrators...
Getting Started Guide
Page 12
... to configure the Policy Manager to applications Command line language Upload large amounts of data directly into the Policy Server data stores. The IA Manager lets administrators: View users logged on different computers, unless limits are set in this chapter. 1-8 eTrust SSO Getting Started For more information, see the Session Management Settings section later in the Policy Manager. Web GUI View and terminate specific eTrust SSO sessions for all sessions for specific users. Manage users, groups and accounts Manage access to...
... to configure the Policy Manager to applications Command line language Upload large amounts of data directly into the Policy Server data stores. The IA Manager lets administrators: View users logged on different computers, unless limits are set in this chapter. 1-8 eTrust SSO Getting Started For more information, see the Session Management Settings section later in the Policy Manager. Web GUI View and terminate specific eTrust SSO sessions for all sessions for specific users. Manage users, groups and accounts Manage access to...
Getting Started Guide
Page 14
... multiple systems. Because eTrust SSO reduces the number of paper, or create a file on to many different applications and systems - each user must remember, and the greater the likelihood of your authorized enterprise-wide applications and systems that records all of user errors and compromised security. You can configure eTrust SSO to force users to select secure passwords and to give them online reminders about this. including e-mail, networks, databases, and Web servers - Users...
... multiple systems. Because eTrust SSO reduces the number of paper, or create a file on to many different applications and systems - each user must remember, and the greater the likelihood of your authorized enterprise-wide applications and systems that records all of user errors and compromised security. You can configure eTrust SSO to force users to select secure passwords and to give them online reminders about this. including e-mail, networks, databases, and Web servers - Users...
Getting Started Guide
Page 15
... authentication password, addressing such requirements as sensitive, which means that users are required to highly sensitive applications or information, which comes with eTrust SSO) or Microsoft Active Directory. Advantages of Using eTrust SSO Password Management Password-enhancing mechanisms include password auto-generation, password policies, and password exits for target applications synchronized with a single password. eTrust SSO can store these User IDs in the Access Control database or alternatively in one central and secure location - Sensitive Application Mode...
... authentication password, addressing such requirements as sensitive, which means that users are required to highly sensitive applications or information, which comes with eTrust SSO) or Microsoft Active Directory. Advantages of Using eTrust SSO Password Management Password-enhancing mechanisms include password auto-generation, password policies, and password exits for target applications synchronized with a single password. eTrust SSO can store these User IDs in the Access Control database or alternatively in one central and secure location - Sensitive Application Mode...
Getting Started Guide
Page 16
... used with Windows screen lock. Secure Network Traffic All information communicated between the eTrust SSO components is important flexibility for UNIX applications that anyone who intercepted the clear text password cannot use it can have open at any moment, either manually, or when triggered by an event Be used with Windows screen lock Close old sessions when opening a new one time. This is fully encrypted. For information about how administrators can log...
... used with Windows screen lock. Secure Network Traffic All information communicated between the eTrust SSO components is important flexibility for UNIX applications that anyone who intercepted the clear text password cannot use it can have open at any moment, either manually, or when triggered by an event Be used with Windows screen lock Close old sessions when opening a new one time. This is fully encrypted. For information about how administrators can log...
Getting Started Guide
Page 20
... work with multiple third-party authentication software and hardware systems. eTrust SSO comes ready to use with several external authentication methods, or you can reuse user information from their personal eTrust SSO application list. Using eTrust SSO, you can use the API to create your own interface to safely and efficiently handle large numbers of users. Scalable Data Store eTrust SSO has a directory data store (eTrust Directory) specially designed to any number of users. 1-16 eTrust...
... work with multiple third-party authentication software and hardware systems. eTrust SSO comes ready to use with several external authentication methods, or you can reuse user information from their personal eTrust SSO application list. Using eTrust SSO, you can use the API to create your own interface to safely and efficiently handle large numbers of users. Scalable Data Store eTrust SSO has a directory data store (eTrust Directory) specially designed to any number of users. 1-16 eTrust...
Getting Started Guide
Page 24
... platform and system resource security. eTrust Admin Supplies policy-based user and access rights provisioning. Common Components The eTrust IAM product suite uses a set of the common components installation. For example, if you configure your computers. The common components installation includes third-party software such as agents and legacy interfaces. For more computers depending on a combination of the following products: eTrust Access Control Provides end-to both desktop and web-based applications. The common components are installed onto one or...
... platform and system resource security. eTrust Admin Supplies policy-based user and access rights provisioning. Common Components The eTrust IAM product suite uses a set of the common components installation. For example, if you configure your computers. The common components installation includes third-party software such as agents and legacy interfaces. For more computers depending on a combination of the following products: eTrust Access Control Provides end-to both desktop and web-based applications. The common components are installed onto one or...
Getting Started Guide
Page 25
... processing load managed by using different computers to assume. Each computer role requires several web applications including the IA Manager, IAM Self Service, IAM Self Service Configuration and SPML Web Service. For more eTrust IAM roles based on the components that are installed on that must be installed on a different computer than a Policy Server or Directory Server. Introduction to the web, application programs, and workstation resources. Policy Server Controls access to eTrust IAM 2-3 The roles define the groups of components that computer. The...
... processing load managed by using different computers to assume. Each computer role requires several web applications including the IA Manager, IAM Self Service, IAM Self Service Configuration and SPML Web Service. For more eTrust IAM roles based on the components that are installed on that must be installed on a different computer than a Policy Server or Directory Server. Introduction to the web, application programs, and workstation resources. Policy Server Controls access to eTrust IAM 2-3 The roles define the groups of components that computer. The...
Getting Started Guide
Page 46
... Policy Manager to the SSO Client. Using eTrust SSO, you can set automatic session management rules to limit the number of concurrent sessions a user has open simultaneously Define what happens when a user attempts to users or groups of users. Session Profiles Session Profiles You can define a session as logging out the underlying Windows user An idle time-out for a length of time 4-6 eTrust SSO Getting Started By default, eTrust SSO lets users...
... Policy Manager to the SSO Client. Using eTrust SSO, you can set automatic session management rules to limit the number of concurrent sessions a user has open simultaneously Define what happens when a user attempts to users or groups of users. Session Profiles Session Profiles You can define a session as logging out the underlying Windows user An idle time-out for a length of time 4-6 eTrust SSO Getting Started By default, eTrust SSO lets users...
Getting Started Guide
Page 51
... Displays a list of the logon attempt to users and user groups Establishing access rights The Policy Manager also controls other eTrust products including eTrust Access Control and eTrust Web Access Control. This is a Windows GUI for that uses eTrust SSO desktop services. As an administrator, you must perform a number of eTrust SSO Components 5-3 SSO Client SSO Client The SSO Client runs on an administrator's workstation with both UNIX and Windows Policy Server computers. The SSO Client software: Communicates with primary authentication agents to...
... Displays a list of the logon attempt to users and user groups Establishing access rights The Policy Manager also controls other eTrust products including eTrust Access Control and eTrust Web Access Control. This is a Windows GUI for that uses eTrust SSO desktop services. As an administrator, you must perform a number of eTrust SSO Components 5-3 SSO Client SSO Client The SSO Client runs on an administrator's workstation with both UNIX and Windows Policy Server computers. The SSO Client software: Communicates with primary authentication agents to...
Getting Started Guide
Page 53
It forms a link between the Web Application Server and the Policy Server. IAM Common Components IAM Common Components Every product in the eTrust Directory data store Builds the list of applications that a user is permitted to access and sends it to the SSO Client Retrieves the logon scripts and the user-specific logon data for each product can control the Policy Server from the command line or by eTrust Admin, which includes eTrust SSO, uses a set of eTrust SSO Components 5-5 The common...
It forms a link between the Web Application Server and the Policy Server. IAM Common Components IAM Common Components Every product in the eTrust Directory data store Builds the list of applications that a user is permitted to access and sends it to the SSO Client Retrieves the logon scripts and the user-specific logon data for each product can control the Policy Server from the command line or by eTrust Admin, which includes eTrust SSO, uses a set of eTrust SSO Components 5-5 The common...
Getting Started Guide
Page 58
... a number of third-party authentication methods, so you can configure your system in different ways and install your company's needs. What Is the Authentication Agent? An agent is a program that you need to install a separate Authentication Agent, because the Policy Server can be located on another software component. eTrust SSO has two ready-made authentication methods: native SSO authentication and LDAP authentication. The corresponding authentication software is usually also located on the authentication host, but...
... a number of third-party authentication methods, so you can configure your system in different ways and install your company's needs. What Is the Authentication Agent? An agent is a program that you need to install a separate Authentication Agent, because the Policy Server can be located on another software component. eTrust SSO has two ready-made authentication methods: native SSO authentication and LDAP authentication. The corresponding authentication software is usually also located on the authentication host, but...
Getting Started Guide
Page 76
... work with the Policy Manager. Users-Lets you add, remove, and edit users and user groups in the Policy Manager: To display the panels on the left shows an icon for each of the categories of entries you can manage with that category in your policy data store. 8-4 eTrust SSO Getting Started Agents-Lets you manage the data stores, configuration resources, generic resources, application resources, and agents in your user data stores. Resources-Lets you create and delete agents and agent types...
... work with the Policy Manager. Users-Lets you add, remove, and edit users and user groups in the Policy Manager: To display the panels on the left shows an icon for each of the categories of entries you can manage with that category in your policy data store. 8-4 eTrust SSO Getting Started Agents-Lets you manage the data stores, configuration resources, generic resources, application resources, and agents in your user data stores. Resources-Lets you create and delete agents and agent types...
Getting Started Guide
Page 78
... user. 5. Users Users Creating a User eTrust SSO helps facilitate users' access to your system, and how to join users together to create user groups. A list of the machine that you use the pop-up menu. From the Edit menu, select New, User. General dialog appears. 4. Enter the user details in that you know how to add and delete users from your system. To create a new user: 1. The LDAP (eTrust Directory) data store is installed on. 2. A list of any existing users in the New User dialog. Select OK. 8-6 eTrust...
... user. 5. Users Users Creating a User eTrust SSO helps facilitate users' access to your system, and how to join users together to create user groups. A list of the machine that you use the pop-up menu. From the Edit menu, select New, User. General dialog appears. 4. Enter the user details in that you know how to add and delete users from your system. To create a new user: 1. The LDAP (eTrust Directory) data store is installed on. 2. A list of any existing users in the New User dialog. Select OK. 8-6 eTrust...
Getting Started Guide
Page 84
... Configuration Resources folder, if it is displayed. 3. The View or Set Terminal Properties - General dialog appears. 8-12 eTrust SSO Getting Started You can configure each computer to either give the administrators access to this list, right-click and select New. Administrators Setting the Administrator Computer Access Rights After you have created an eTrust SSO administrator, you should grant the new administrator access rights for the machine on to that you can define specific administrators to have the Policy Manager software installed...
... Configuration Resources folder, if it is displayed. 3. The View or Set Terminal Properties - General dialog appears. 8-12 eTrust SSO Getting Started You can configure each computer to either give the administrators access to this list, right-click and select New. Administrators Setting the Administrator Computer Access Rights After you have created an eTrust SSO administrator, you should grant the new administrator access rights for the machine on to that you can define specific administrators to have the Policy Manager software installed...
Getting Started Guide
Page 86
... default, eTrust SSO lets users have open and the behavior of sessions a user can have multiple concurrent sessions on different computers. However, using the Session Administrator. To discourage user sharing logon IDs and to save system resources, the Policy Manager lets you: Set the maximum number of those sessions. Sessions Sessions An eTrust SSO session is the period of the eTrust SSO session 8-14 eTrust SSO Getting Started...
... default, eTrust SSO lets users have open and the behavior of sessions a user can have multiple concurrent sessions on different computers. However, using the Session Administrator. To discourage user sharing logon IDs and to save system resources, the Policy Manager lets you: Set the maximum number of those sessions. Sessions Sessions An eTrust SSO session is the period of the eTrust SSO session 8-14 eTrust SSO Getting Started...
Getting Started Guide
Page 92
.... 8-20 eTrust SSO Getting Started Display the list of password policies. 2. Make any changes that are : General-Defines the password policy's name and owner. the bar on the left lists the associated dialogs. This displays the View or Set PWPOLICY Properties dialog. 3. Locate the policy you must complete the General and Password Extended Attributes dialogs. Updating Password Policy Properties To change and double-click its properties by completing a set of dialogs associated with the Create New PWPOLICY...
.... 8-20 eTrust SSO Getting Started Display the list of password policies. 2. Make any changes that are : General-Defines the password policy's name and owner. the bar on the left lists the associated dialogs. This displays the View or Set PWPOLICY Properties dialog. 3. Locate the policy you must complete the General and Password Extended Attributes dialogs. Updating Password Policy Properties To change and double-click its properties by completing a set of dialogs associated with the Create New PWPOLICY...