Getting Started Guide
Page 3
... Purpose of this Guide 1-1 Documentation 1-2 Advantages of Using CA Products 1-2 Advantages of Using eTrust SSO 1-4 Chapter 2: Introduction to eTrust IAM eTrust IAM Product Suite 2-2 Common Components 2-2 Computer Roles 2-3 IA Manager 2-4 IA Manager Navigation 2-5 Chapter 3: Installing eTrust SSO Overview of the Installation 3-2 Before You Begin the eTrust SSO Installation 3-3 Install the IAM Common Components 3-4 Chapter 4: Concepts Behind...
... Purpose of this Guide 1-1 Documentation 1-2 Advantages of Using CA Products 1-2 Advantages of Using eTrust SSO 1-4 Chapter 2: Introduction to eTrust IAM eTrust IAM Product Suite 2-2 Common Components 2-2 Computer Roles 2-3 IA Manager 2-4 IA Manager Navigation 2-5 Chapter 3: Installing eTrust SSO Overview of the Installation 3-2 Before You Begin the eTrust SSO Installation 3-3 Install the IAM Common Components 3-4 Chapter 4: Concepts Behind...
Getting Started Guide
Page 4
... Components Architectural Overview 5-2 SSO Client 5-3 Policy Manager 5-3 IA Manager 5-4 IAM Common Components 5-5 Data Stores 5-7 Chapter 6: Common eTrust SSO Processes Authenticating Users 6-2 Launching Applications 6-5 Synchronizing Passwords 6-7 Chapter 7: Basic Tasks Using IA Manager Manage Accounts 7-1 Manage Applications 7-5 Chapter 8: ...8-8 Administrators 8-11 Sessions 8-14 Password Policies 8-19 Chapter 9: Frequently Asked Questions Functionality and Benefits 9-1 Passwords and Logon 9-2 Authentication 9-4 Implementation 9-5 Integration 9-6 iv eTrust SSO Getting Started
... Components Architectural Overview 5-2 SSO Client 5-3 Policy Manager 5-3 IA Manager 5-4 IAM Common Components 5-5 Data Stores 5-7 Chapter 6: Common eTrust SSO Processes Authenticating Users 6-2 Launching Applications 6-5 Synchronizing Passwords 6-7 Chapter 7: Basic Tasks Using IA Manager Manage Accounts 7-1 Manage Applications 7-5 Chapter 8: ...8-8 Administrators 8-11 Sessions 8-14 Password Policies 8-19 Chapter 9: Frequently Asked Questions Functionality and Benefits 9-1 Passwords and Logon 9-2 Authentication 9-4 Implementation 9-5 Integration 9-6 iv eTrust SSO Getting Started
Getting Started Guide
Page 5
.... The Purpose of this Guide The purpose of this guide is to introduce you to eTrust SSO 1-1 Introduction to eTrust SSO. Chapter 1 Introduction to eTrust SSO Case study eTrust™ Single Sign-On (eTrust SSO) is a system that you can configure so that end users only have to ...have worked with the basic functionality and applications of this product. This guide is primarily aimed at administrators who have not worked with eTrust SSO before, but is to: Simplify the logon and authentication process for administrators who have different password requirements such as...
.... The Purpose of this Guide The purpose of this guide is to introduce you to eTrust SSO 1-1 Introduction to eTrust SSO. Chapter 1 Introduction to eTrust SSO Case study eTrust™ Single Sign-On (eTrust SSO) is a system that you can configure so that end users only have to ...have worked with the basic functionality and applications of this product. This guide is primarily aimed at administrators who have not worked with eTrust SSO before, but is to: Simplify the logon and authentication process for administrators who have different password requirements such as...
Getting Started Guide
Page 6
...it comes to getting on custom-fitting your data resources and applications. Documentation Documentation After reading through eTrust Security Command Center - Advantages of Using CA Products Computer Associates (CA) products can reference all with a holistic view of the functions achieve, how to ... and knowledge tools to help organizations take advantage of the product functions that work with partners, eTrust provides organizations with a number of security. Computer Associates education programs can refer to the numerous other CA products, or with the power to work best...
...it comes to getting on custom-fitting your data resources and applications. Documentation Documentation After reading through eTrust Security Command Center - Advantages of Using CA Products Computer Associates (CA) products can reference all with a holistic view of the functions achieve, how to ... and knowledge tools to help organizations take advantage of the product functions that work with partners, eTrust provides organizations with a number of security. Computer Associates education programs can refer to the numerous other CA products, or with the power to work best...
Getting Started Guide
Page 7
.... The site offers access to migration assistance, CA Technology Services offers the right assistance at http://ca.com/supportconnect. Computer Associates understands that we provide. Customer support is of great importance, and endorses and encourages the formation of documented technical issues...boards, and executive committees. With direct access to CA Product Development and Support, CA Technology Services consultants can leverage best practices to eTrust SSO 1-3 Our consulting teams work closely with CA Recognized User Groups is available 24 hours a day, 7 days a week. and...
.... The site offers access to migration assistance, CA Technology Services offers the right assistance at http://ca.com/supportconnect. Computer Associates understands that we provide. Customer support is of great importance, and endorses and encourages the formation of documented technical issues...boards, and executive committees. With direct access to CA Product Development and Support, CA Technology Services consultants can leverage best practices to eTrust SSO 1-3 Our consulting teams work closely with CA Recognized User Groups is available 24 hours a day, 7 days a week. and...
Getting Started Guide
Page 8
...legacy applications. There is that you can configure it so that the end user can configure eTrust SSO to log on to applications based on processes, IDs, or passwords? eTrust SSO provides a smooth transitional experience and familiar interface for End Users Why burden your users... administrators Enhanced security Enhanced flexibility Benefits for end users to help them move to a more secure network environment with eTrust SSO. You can access. Compatibility with the need to remember multiple sign-on the following environments: Windows Web ...
...legacy applications. There is that you can configure it so that the end user can configure eTrust SSO to log on to applications based on processes, IDs, or passwords? eTrust SSO provides a smooth transitional experience and familiar interface for End Users Why burden your users... administrators Enhanced security Enhanced flexibility Benefits for end users to help them move to a more secure network environment with eTrust SSO. You can access. Compatibility with the need to remember multiple sign-on the following environments: Windows Web ...
Getting Started Guide
Page 9
...solution that means users only need to remember one authentication process to access all authorized HTML Web applications and resources is authenticated to the eTrust SSO system, access to lost, forgotten, or compromised passwords. Introduction to learn a new system. Once a user is handled by ... web sites quickly and efficiently. This improves productivity and provides a smooth and simple user experience. Advantages of their secure applications. eTrust SSO can help desk costs and decreasing downtime for the Web handles both in-house and external HTML Web applications, and not...
...solution that means users only need to remember one authentication process to access all authorized HTML Web applications and resources is authenticated to the eTrust SSO system, access to lost, forgotten, or compromised passwords. Introduction to learn a new system. Once a user is handled by ... web sites quickly and efficiently. This improves productivity and provides a smooth and simple user experience. Advantages of their secure applications. eTrust SSO can help desk costs and decreasing downtime for the Web handles both in-house and external HTML Web applications, and not...
Getting Started Guide
Page 10
... wants to continue working on the same patient history in a shared workstation environment. Citrix products are sold independently of Using eTrust SSO Application Migration If your company has a Citrix Metaframe client-server environment, users can log on and see their original ... where they left off because their own secure applications, while the desktop remains the same. 1-6 eTrust SSO Getting Started The user can designate and configure common computers so that application (this is deployed with multiple application sessions. Citrix Application Migration works with a ...
... wants to continue working on the same patient history in a shared workstation environment. Citrix products are sold independently of Using eTrust SSO Application Migration If your company has a Citrix Metaframe client-server environment, users can log on and see their original ... where they left off because their own secure applications, while the desktop remains the same. 1-6 eTrust SSO Getting Started The user can designate and configure common computers so that application (this is deployed with multiple application sessions. Citrix Application Migration works with a ...
Getting Started Guide
Page 11
...number of password resets, a clear central management GUI, and flexible tools to set and maintain the entire organization's access strategy. eTrust SSO lets administrators add new users efficiently. This management GUI also means that behind the scenes, system or security administrators can use...administer the system. IT security departments must quickly get internal users online and productive, while controlling access to eTrust SSO 1-7 Fewer Password Resets In an eTrust SSO environment, end users have fewer passwords and need fewer password resets, which reduces the number of ...
...number of password resets, a clear central management GUI, and flexible tools to set and maintain the entire organization's access strategy. eTrust SSO lets administrators add new users efficiently. This management GUI also means that behind the scenes, system or security administrators can use...administer the system. IT security departments must quickly get internal users online and productive, while controlling access to eTrust SSO 1-7 Fewer Password Resets In an eTrust SSO environment, end users have fewer passwords and need fewer password resets, which reduces the number of ...
Getting Started Guide
Page 12
...webbased GUI that comes as part of data directly into multiple eTrust SSO sessions concurrently on different computers, unless limits are set in the Policy Manager. Advantages of Using eTrust SSO Flexible Administrator Tools eTrust SSO lets administrators interact with one user Terminate all...applications Command line language Upload large amounts of the eTrust IAM suite. Web GUI View and terminate specific eTrust SSO sessions for all sessions associated with one user Terminate individual sessions associated with the Policy Server in three different ways: Tool...
...webbased GUI that comes as part of data directly into multiple eTrust SSO sessions concurrently on different computers, unless limits are set in the Policy Manager. Advantages of Using eTrust SSO Flexible Administrator Tools eTrust SSO lets administrators interact with one user Terminate all...applications Command line language Upload large amounts of the eTrust IAM suite. Web GUI View and terminate specific eTrust SSO sessions for all sessions associated with one user Terminate individual sessions associated with the Policy Server in three different ways: Tool...
Getting Started Guide
Page 13
... client-side. This saves time and creates a more secure environment. This assists with the client. eTrust Audit is available independently from UNIX and Windows servers and other eTrust products, including eTrust SSO. You can write log messages to eTrust Audit. The Policy Server can also configure the SSO Client to log issues with the...
... client-side. This saves time and creates a more secure environment. This assists with the client. eTrust Audit is available independently from UNIX and Windows servers and other eTrust products, including eTrust SSO. You can write log messages to eTrust Audit. The Policy Server can also configure the SSO Client to log issues with the...
Getting Started Guide
Page 14
...Web applications. Users are also likely to use the same passwords for greater security. 1-10 eTrust SSO Getting Started including e-mail, networks, databases, and Web servers - In today's distributed computing environments, users sign on their passwords. Not only are more IDs and passwords they often ...overall security by automating access to give them online reminders about this. You can configure eTrust SSO to force users to select secure passwords and to all their computer that records all of your authorized enterprise-wide applications and systems that a user has to...
...Web applications. Users are also likely to use the same passwords for greater security. 1-10 eTrust SSO Getting Started including e-mail, networks, databases, and Web servers - In today's distributed computing environments, users sign on their passwords. Not only are more IDs and passwords they often ...overall security by automating access to give them online reminders about this. You can configure eTrust SSO to force users to select secure passwords and to all their computer that records all of your authorized enterprise-wide applications and systems that a user has to...
Getting Started Guide
Page 15
... of the single sign-on either a UNIX or Windows server - Introduction to stores users' credentials. Advantages of Using eTrust SSO Password Management Password-enhancing mechanisms include password auto-generation, password policies, and password exits for target applications synchronized with the... primary authentication password, addressing such requirements as remote access with eTrust SSO) or Microsoft Active Directory. The strength of the enterprise. Sensitive Application Mode You have a legal requirement to be...
... of the single sign-on either a UNIX or Windows server - Introduction to stores users' credentials. Advantages of Using eTrust SSO Password Management Password-enhancing mechanisms include password auto-generation, password policies, and password exits for target applications synchronized with the... primary authentication password, addressing such requirements as remote access with eTrust SSO) or Microsoft Active Directory. The strength of the enterprise. Sensitive Application Mode You have a legal requirement to be...
Getting Started Guide
Page 16
... Be used with Windows screen lock Close old sessions when opening a new one time. You can configure eTrust SSO to multiple eTrust SSO sessions concurrently on the Policy Server using the Policy Manager. For information about how administrators can log on to limit the ... when they reach their set limit Log the user out at one These features are defined on different computers. This is fully encrypted. Advantages of Using eTrust SSO Session Management Settings Users can manually manage and terminate User Sessions, see the IA Manager Session Administration section in...
... Be used with Windows screen lock Close old sessions when opening a new one time. You can configure eTrust SSO to multiple eTrust SSO sessions concurrently on the Policy Server using the Policy Manager. For information about how administrators can log on to limit the ... when they reach their set limit Log the user out at one These features are defined on different computers. This is fully encrypted. Advantages of Using eTrust SSO Session Management Settings Users can manually manage and terminate User Sessions, see the IA Manager Session Administration section in...
Getting Started Guide
Page 17
... and customize the logon process based on the sensitivity of your own authentication agent to integrate eTrust SSO with third-party methods such as Kerberos, smartcards, or biometrics. eTrust SSO supports the following authentication methods: Authentication Software eTrust SSO LDAP Novell Windows Entrust Certificate RSA SecurID Safeword Authentication Method Password Password Password Password...
... and customize the logon process based on the sensitivity of your own authentication agent to integrate eTrust SSO with third-party methods such as Kerberos, smartcards, or biometrics. eTrust SSO supports the following authentication methods: Authentication Software eTrust SSO LDAP Novell Windows Entrust Certificate RSA SecurID Safeword Authentication Method Password Password Password Password...
Getting Started Guide
Page 18
... Sign-On Provides complete enterprise single sign-on to -end platform and system resource security. eTrust Web Access Control Enables secure intranet and extranet management. 1-14 eTrust SSO Getting Started eTrust Access Control Provides end-to both desktop and web-based applications. This means that we have changed the product infrastructure to be...
... Sign-On Provides complete enterprise single sign-on to -end platform and system resource security. eTrust Web Access Control Enables secure intranet and extranet management. 1-14 eTrust SSO Getting Started eTrust Access Control Provides end-to both desktop and web-based applications. This means that we have changed the product infrastructure to be...
Getting Started Guide
Page 19
...as an employee changes roles) and the possibility of -the-art management interface gives you the ability to fully manage a user from eTrust SSO very quickly and maintain a stable environment as you reap benefits from hire to role and policy. The strong security features also protect... privacy-related information. Advantages of Using eTrust SSO Benefits of the Suite The benefits of the eTrust IAM suite include: Streamlined management process The state-of old identities remaining active in the system after termination....
...as an employee changes roles) and the possibility of -the-art management interface gives you the ability to fully manage a user from eTrust SSO very quickly and maintain a stable environment as you reap benefits from hire to role and policy. The strong security features also protect... privacy-related information. Advantages of Using eTrust SSO Benefits of the Suite The benefits of the eTrust IAM suite include: Streamlined management process The state-of old identities remaining active in the system after termination....
Getting Started Guide
Page 20
...create your own interface to any number of the authentication methods that legacy systems can leave mission-critical legacy systems in this chapter. eTrust SSO is deployed in a server farm environment, it can be scaled to decommission the application or data in a controlled way.... Systems Integration Most companies want to use with several external authentication methods, or you can use or migrate from their personal eTrust SSO application list. Using eTrust SSO, you can select a third-party authentication method. Easily Populated Databases In the past, building a single sign-on ...
...create your own interface to any number of the authentication methods that legacy systems can leave mission-critical legacy systems in this chapter. eTrust SSO is deployed in a server farm environment, it can be scaled to decommission the application or data in a controlled way.... Systems Integration Most companies want to use with several external authentication methods, or you can use or migrate from their personal eTrust SSO application list. Using eTrust SSO, you can select a third-party authentication method. Easily Populated Databases In the past, building a single sign-on ...
Getting Started Guide
Page 21
... workload of New Systems Most companies want to be able to implement new systems and software in their enterprise in the eTrust SSO data stores. For more information about phased integration, see the Legacy Systems Integration section in new authentication or authorization ...a smooth and controlled way to reduce user impact and implementation instability. Smooth Implementation of distributed networks. eTrust SSO also provides the tools for administrators to eTrust SSO 1-17 eTrust SSO is built to permit gradual and controlled implementation of new systems. For example, you can plug...
... workload of New Systems Most companies want to be able to implement new systems and software in their enterprise in the eTrust SSO data stores. For more information about phased integration, see the Legacy Systems Integration section in new authentication or authorization ...a smooth and controlled way to reduce user impact and implementation instability. Smooth Implementation of distributed networks. eTrust SSO also provides the tools for administrators to eTrust SSO 1-17 eTrust SSO is built to permit gradual and controlled implementation of new systems. For example, you can plug...