Getting Started Guide
Page 2
... and effect. Sections 52.227-19(c)(1) and (2) or DFARS Section 252.227-7013(c)(1)(ii) or applicable successor provisions. © 2005 Computer Associates International, Inc. Only authorized employees, consultants, or agents of this documentation is governed by the end user's applicable license agreement. In ... users may not be liable to change or withdrawal by the copyright laws of CA and protected by Computer Associates International, Inc. ("CA") at any third party for the software are bound by applicable law, CA provides this documentation for their respective companies.
... and effect. Sections 52.227-19(c)(1) and (2) or DFARS Section 252.227-7013(c)(1)(ii) or applicable successor provisions. © 2005 Computer Associates International, Inc. Only authorized employees, consultants, or agents of this documentation is governed by the end user's applicable license agreement. In ... users may not be liable to change or withdrawal by the copyright laws of CA and protected by Computer Associates International, Inc. ("CA") at any third party for the software are bound by applicable law, CA provides this documentation for their respective companies.
Getting Started Guide
Page 6
...eTrust SSO. To take control of third party software products. eTrust Product Suite Security remains one of the IT and physical infrastructure. CA's eTrust solutions secure enterprise resources and provide organizations with the technology and knowledge tools to keep your business moving. Our associates... Documentation After reading through eTrust Security Command Center - Computer Associates education programs can provide the training to give your data resources and applications. eTrust Identity Management, eTrust Access Management, and eTrust Threat Management, all with...
...eTrust SSO. To take control of third party software products. eTrust Product Suite Security remains one of the IT and physical infrastructure. CA's eTrust solutions secure enterprise resources and provide organizations with the technology and knowledge tools to keep your business moving. Our associates... Documentation After reading through eTrust Security Command Center - Computer Associates education programs can provide the training to give your data resources and applications. eTrust Identity Management, eTrust Access Management, and eTrust Threat Management, all with...
Getting Started Guide
Page 17
... lets administrators strengthen and customize the logon process based on the sensitivity of the protected resource. eTrust SSO supports the following authentication methods: Authentication Software eTrust SSO LDAP Novell Windows Entrust Certificate RSA SecurID Safeword Authentication Method Password Password Password Password Digital certificates Digital certificates Secure...-party authentication methods so you can use an authentication method not listed here, you want to use the eTrust SSO Integration Kit to create your enterprise. With the support of your own authentication agent to...
... lets administrators strengthen and customize the logon process based on the sensitivity of the protected resource. eTrust SSO supports the following authentication methods: Authentication Software eTrust SSO LDAP Novell Windows Entrust Certificate RSA SecurID Safeword Authentication Method Password Password Password Password Digital certificates Digital certificates Secure...-party authentication methods so you can use an authentication method not listed here, you want to use the eTrust SSO Integration Kit to create your enterprise. With the support of your own authentication agent to...
Getting Started Guide
Page 20
.... Easily Populated Databases In the past, building a single sign-on database was a time-consuming and resource-intensive process. eTrust SSO has been developed to work with multiple third-party authentication software and hardware systems. eTrust SSO comes ready to use with several external authentication methods, or you can access legacy mainframe applications from...
.... Easily Populated Databases In the past, building a single sign-on database was a time-consuming and resource-intensive process. eTrust SSO has been developed to work with multiple third-party authentication software and hardware systems. eTrust SSO comes ready to use with several external authentication methods, or you can access legacy mainframe applications from...
Getting Started Guide
Page 21
...in a server farm environment. Introduction to back up and restore data held in the eTrust SSO data stores. eTrust SSO also provides the tools for administrators to eTrust SSO 1-17 eTrust SSO facilitates load balancing and helps with the processing workload of New Systems Most companies want... to be able to implement new systems and software in their enterprise in this chapter. For more information about...
...in a server farm environment. Introduction to back up and restore data held in the eTrust SSO data stores. eTrust SSO also provides the tools for administrators to eTrust SSO 1-17 eTrust SSO facilitates load balancing and helps with the processing workload of New Systems Most companies want... to be able to implement new systems and software in their enterprise in this chapter. For more information about...
Getting Started Guide
Page 24
... installation includes third-party software such as Sun J2SE 1.4.2, Apache Tomcat 4.1.29, and Inxight Star Tree applet that create a central architecture with which each product integrates. eTrust Admin Supplies policy-based user and access rights provisioning. eTrust Single Sign-On Provides ...products: eTrust Access Control Provides end-to manage your applications. eTrust IAM Product Suite eTrust IAM Product Suite Products in the product suite, such as Admin Server, are required as agents and legacy interfaces. For more computers depending on your computer roles. The eTrust IAM...
... installation includes third-party software such as Sun J2SE 1.4.2, Apache Tomcat 4.1.29, and Inxight Star Tree applet that create a central architecture with which each product integrates. eTrust Admin Supplies policy-based user and access rights provisioning. eTrust Single Sign-On Provides ...products: eTrust Access Control Provides end-to manage your applications. eTrust IAM Product Suite eTrust IAM Product Suite Products in the product suite, such as Admin Server, are required as agents and legacy interfaces. For more computers depending on your computer roles. The eTrust IAM...
Getting Started Guide
Page 42
...the group to automatically grant or deny them log on to multiple software applications without having to identify themselves when they first log on to eTrust SSO, they see the Primary Authentication section in Windows, or from an eTrust SSO application list. End Users End-User Experience From an end... either a password, a smart card, an ID card or a biometric device. Once an end user successfully authenticates and logs on to eTrust SSO. After eTrust SSO has been implemented in your organization you can create a user group for each user. Users can be from the Start menu in ...
...the group to automatically grant or deny them log on to multiple software applications without having to identify themselves when they first log on to eTrust SSO, they see the Primary Authentication section in Windows, or from an eTrust SSO application list. End Users End-User Experience From an end... either a password, a smart card, an ID card or a biometric device. Once an end user successfully authenticates and logs on to eTrust SSO. After eTrust SSO has been implemented in your organization you can create a user group for each user. Users can be from the Start menu in ...
Getting Started Guide
Page 43
... system. For more information about authentication agents, see the Authenticating Users section in the "Common eTrust SSO Processes" chapter in the system. You may already have this guide. The eTrust SSO native authentication methods are : Authentication Software Certificate Entrust Novell Windows RSA SecurID Safeword Authentication Method Digital certificates Digital certificates Username and password...
... system. For more information about authentication agents, see the Authenticating Users section in the "Common eTrust SSO Processes" chapter in the system. You may already have this guide. The eTrust SSO native authentication methods are : Authentication Software Certificate Entrust Novell Windows RSA SecurID Safeword Authentication Method Digital certificates Digital certificates Username and password...
Getting Started Guide
Page 47
...the Session Profiles section in which the Policy Server stores the users' session information. Concepts Behind eTrust SSO 4-7 Configuration Resources Terminal: All computers that users can be used to software, hardware, and settings managed by the Policy Manager. EJBs: Enterprise Java Beans (EJB) ...can be applied to using eTrust SSO. Application Resources Applications that can not be recorded for each ...
...the Session Profiles section in which the Policy Server stores the users' session information. Concepts Behind eTrust SSO 4-7 Configuration Resources Terminal: All computers that users can be used to software, hardware, and settings managed by the Policy Manager. EJBs: Enterprise Java Beans (EJB) ...can be applied to using eTrust SSO. Application Resources Applications that can not be recorded for each ...
Getting Started Guide
Page 50
... the diagram represent the software components. The shaded rectangles represent the IAM Common Components. IA Manager (via web browser) Policy Manager Administrator Selang Communication Authentication Agent Administrator's Workstation Policy Manager Communication Policy Server eTrust Directory eTrust AC IA Manager Communication Web Application Server Provisioning Server eTrust Directory Directory Server Authentication Computer (host) Policy Server farm...
... the diagram represent the software components. The shaded rectangles represent the IAM Common Components. IA Manager (via web browser) Policy Manager Administrator Selang Communication Authentication Agent Administrator's Workstation Policy Manager Communication Policy Server eTrust Directory eTrust AC IA Manager Communication Web Application Server Provisioning Server eTrust Directory Directory Server Authentication Computer (host) Policy Server farm...
Getting Started Guide
Page 51
...authorized to use the Policy Manager to communicate with TCP/IP communication to the Policy Server. You can be run the SSO Client software on the user workstation, or it can use Sends the authenticated ticket to the Policy Server to gain access to applications ...is a small application that the user is usually installed on an administrator's workstation with both UNIX and Windows Policy Server computers. The SSO Client software: Communicates with eTrust SSO. Tour of tasks regularly using the Policy Manager. This is a Windows GUI for that session Displays ...
...authorized to use the Policy Manager to communicate with TCP/IP communication to the Policy Server. You can be run the SSO Client software on the user workstation, or it can use Sends the authenticated ticket to the Policy Server to gain access to applications ...is a small application that the user is usually installed on an administrator's workstation with both UNIX and Windows Policy Server computers. The SSO Client software: Communicates with eTrust SSO. Tour of tasks regularly using the Policy Manager. This is a Windows GUI for that session Displays ...
Getting Started Guide
Page 53
... used extensively by using the Policy Manager. IAM Common Components IAM Common Components Every product in the IAM suite, which includes eTrust SSO, uses a set of common components that provide underlying services. The Policy Server performs the following : Policy Server... Provisioning Server Web Application Server Directory Server Additionally, the common components installation includes third-party software, such as Java JRE 1.4.2 and Apache Tomcat 4.1.29, that forms the central architecture with which each application Determines which...
... used extensively by using the Policy Manager. IAM Common Components IAM Common Components Every product in the IAM suite, which includes eTrust SSO, uses a set of common components that provide underlying services. The Policy Server performs the following : Policy Server... Provisioning Server Web Application Server Directory Server Additionally, the common components installation includes third-party software, such as Java JRE 1.4.2 and Apache Tomcat 4.1.29, that forms the central architecture with which each application Determines which...
Getting Started Guide
Page 55
... and group information from existing databases in the data store, these products can also integrate thirdparty LDAP data stores. eTrust SSO comes with two data stores, eTrust Access Control and eTrust Directory, that stores the data associated with eTrust Directory. Data Stores Data Stores The data stores are the software that each give slightly different benefits.
... and group information from existing databases in the data store, these products can also integrate thirdparty LDAP data stores. eTrust SSO comes with two data stores, eTrust Access Control and eTrust Directory, that stores the data associated with eTrust Directory. Data Stores Data Stores The data stores are the software that each give slightly different benefits.
Getting Started Guide
Page 57
Common eTrust SSO Processes 6-1 The gray boxes in the diagrams represent the software components. Chapter 6 Common eTrust SSO Processes This chapter introduces the following common processes performed by eTrust Single Sign-On (eTrust SSO): Authenticating users Launching applications Synchronizing passwords Each description includes a diagram that shows how the component fits into the architecture of eTrust SSO.
Common eTrust SSO Processes 6-1 The gray boxes in the diagrams represent the software components. Chapter 6 Common eTrust SSO Processes This chapter introduces the following common processes performed by eTrust Single Sign-On (eTrust SSO): Authenticating users Launching applications Synchronizing passwords Each description includes a diagram that shows how the component fits into the architecture of eTrust SSO.
Getting Started Guide
Page 58
...depends on the method of authentication (authentication software) and the level of the eTrust SSO processes require an agent. The server where the authentication agent resides is usually also located on another software component. The authentication agent acts as a... gobetween, it back to relay information between the eTrust SSO system and the authentication software. Authenticating Users Authenticating Users Primary authentication is also compatible with another computer for the different ...
...depends on the method of authentication (authentication software) and the level of the eTrust SSO processes require an agent. The server where the authentication agent resides is usually also located on another software component. The authentication agent acts as a... gobetween, it back to relay information between the eTrust SSO system and the authentication software. Authenticating Users Authenticating Users Primary authentication is also compatible with another computer for the different ...
Getting Started Guide
Page 59
...6-3 Administrator Policy Manager Session Admin Administrator's machine Authentication Software B Authentication Agent Policy Server eTrust Access Control eTrust Directory A Authentication Policy Server__A_u_t_hentication machine machine___ Agent End ... Diagram Reference Policy Server A Domain member B Domain member B Separate authentication computer B Separate authentication computer B Separate authentication computer B Separate authentication computer B Separate authentication computer B The following diagram shows the location of the authentication agents in relation ...
...6-3 Administrator Policy Manager Session Admin Administrator's machine Authentication Software B Authentication Agent Policy Server eTrust Access Control eTrust Directory A Authentication Policy Server__A_u_t_hentication machine machine___ Agent End ... Diagram Reference Policy Server A Domain member B Domain member B Separate authentication computer B Separate authentication computer B Separate authentication computer B Separate authentication computer B Separate authentication computer B The following diagram shows the location of the authentication agents in relation ...
Getting Started Guide
Page 60
... primary authentication credentials in the previous section). Policy Manager Administrator Administrator's machine Authentication Policy Server Software eTrust 3 Authentication Access Control eTrust Agent Directory Authentication machine Policy Server machine 56 The ticket is terminated, depending on the expiration...agent for verification and produces a ticket if the credentials are allocated to them within the eTrust SSO framework. 6-4 eTrust SSO Getting Started Authenticating Users The Authentication Process The following diagram shows how the authentication process...
... primary authentication credentials in the previous section). Policy Manager Administrator Administrator's machine Authentication Policy Server Software eTrust 3 Authentication Access Control eTrust Agent Directory Authentication machine Policy Server machine 56 The ticket is terminated, depending on the expiration...agent for verification and produces a ticket if the credentials are allocated to them within the eTrust SSO framework. 6-4 eTrust SSO Getting Started Authenticating Users The Authentication Process The following diagram shows how the authentication process...
Getting Started Guide
Page 84
... and select New. General dialog appears. 8-12 eTrust SSO Getting Started A list of the computer and click OK. The Create New Terminal Resource - To set access rights to the Policy Server, right-click the computer name that computer access to the Policy Server, or you want... Properties - Select the Resources icon from the left hand pane. This computer must have the Policy Manager software installed. Administrators Setting the Administrator Computer Access Rights After you have created an eTrust SSO administrator, you should grant the new administrator access rights for the ...
... and select New. General dialog appears. 8-12 eTrust SSO Getting Started A list of the computer and click OK. The Create New Terminal Resource - To set access rights to the Policy Server, right-click the computer name that computer access to the Policy Server, or you want... Properties - Select the Resources icon from the left hand pane. This computer must have the Policy Manager software installed. Administrators Setting the Administrator Computer Access Rights After you have created an eTrust SSO administrator, you should grant the new administrator access rights for the ...