Mcafee Cloud Identity Manager Product Guide

Total Page:16

File Type:pdf, Size:1020Kb

Mcafee Cloud Identity Manager Product Guide Product Guide McAfee Cloud Identity Manager version 3.5 COPYRIGHT Copyright © 2013 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies. TRADEMARK ATTRIBUTIONS McAfee®, the McAfee logo, Avert, ePO, ePolicy Orchestrator, Foundstone, GroupShield, IntruShield, LinuxShield, MAX (McAfee SecurityAlliance Exchange), NetShield, PortalShield, Preventsys, SecureOS, SecurityAlliance, SiteAdvisor, SmartFilter, Total Protection, TrustedSource, Type Enforcement, VirusScan, and WebShield are registered trademarks or trademarks of McAfee, Inc. or its subsidiaries in the United States and other countries. LICENSE INFORMATION License Agreement NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANTOR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEBSITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND. 2 McAfee Cloud Identity Manager 3.5 Product Guide Contents 1.0 Introduction to McAfee Cloud Identity Manager ........................................................ 9 1.1 Extensible Framework ......................................................................................... 9 1.2 Web Single Sign On (SSO) ..................................................................................10 1.3 Multiple Authentication Methods...........................................................................11 1.4 Credential Mapping and User Provisioning .............................................................12 1.5 Authorization Policies and Access Control Enforcement............................................12 1.6 Event Auditing and Monitoring .............................................................................13 1.7 Cloud Connector Options ....................................................................................14 1.8 Web-based Management Console.........................................................................14 1.9 Supported Environments ....................................................................................15 1.10 Supported Browsers...........................................................................................15 1.11 Available Documentation ....................................................................................16 1.12 Technical Support ..............................................................................................16 2.0 Getting Started with the Management Console.........................................................17 2.1 The Login Page..................................................................................................17 2.2 Cloud Identity Manager Version Information ..........................................................18 2.3 The Management Console Dashboard ...................................................................19 2.4 Management Console — Configuration Tabs (A) .....................................................20 2.4.1 Cloud Connectors Tab .............................................................................20 2.4.2 Application Adapters Tab .........................................................................22 2.4.3 Logs Tab ...............................................................................................22 2.4.4 Monitoring Tab .......................................................................................23 2.4.5 Addons Tab............................................................................................23 2.4.6 Admin Tab .............................................................................................24 2.5 Management Console — Cloud Connectors (B) .......................................................26 2.5.1 Cloud Connectors — Carousel View ...........................................................27 2.5.2 Cloud Connectors — List View...................................................................28 2.5.3 Cloud Connectors — Management Options .................................................28 2.6 Management Console — System Snapshots (C) .....................................................32 2.7 Management Console — Quick Access (D) .............................................................33 2.8 Configuration Wizards ........................................................................................36 3.0 Cloud Connectors .....................................................................................................37 3.1 Understanding the Cloud Connector Types ............................................................38 3.1.1 Built-in and Plug-in Cloud Connectors ........................................................38 3.2 Viewing the Built-in Cloud Connector Types...........................................................39 3.3 Viewing the Plug-in Cloud Connector Types ...........................................................40 3.4 Cloud Connector Reference .................................................................................41 4.0 Identity Connectors .................................................................................................53 4.1 Authentication Types..........................................................................................53 4.2 Authentication Chain Identity Connector ...............................................................54 4.3 External Configuration and Additional Considerations..............................................55 4.4 View All Configured Identity Stores ......................................................................55 4.5 View All Configured Identity Connectors................................................................56 4.6 How to Select the Identity Connector Type............................................................57 4.7 Create an LDAP Identity Store .............................................................................58 4.8 Create an Active Directory Identity Store ..............................................................59 4.9 Create an Identity Connector...............................................................................63 4.9.1 Configure an Authentication Chain Identity Connector..................................64 4.9.2 Configure a CAS Identity Connector ..........................................................65 4.9.3 Configure an ECA360 Token Identity Connector ..........................................66 4.9.4 Configure an IWA-AD Identity Connector ...................................................69 4.9.5 Configure an LDAP Identity Connector .......................................................71 4.9.6 Configure a SAML2 Proxy Identity Connector ..............................................72 4.10 User Provisioning...............................................................................................74 McAfee Cloud Identity Manager 3.5 Product Guide 3 5.0 Authentication Chains ..............................................................................................75 5.1 Creating Authentication Chains in the Management Console ....................................75 5.2 Authentication Modules.......................................................................................76 5.3 Select the Authentication Module Type..................................................................77 5.3.1 Authentication Methods Available for Primary Authentication ........................78 5.3.2 Authentication Methods Available for Secondary Authentication.....................80 5.4 Customizing the Authentication Module Login Page.................................................80 5.4.1 Customize a JDBC or LDAP Login Page.......................................................81 5.4.2 Customize an OTP or OTP Self-service Login Page .......................................82 5.4.3 Customize a Combined LDAP and OTP Login Page .......................................84 5.5 Configuring the Authentication Module Options ......................................................86 5.5.1 Configure a JDBC Authentication Module ....................................................87 5.5.2 Configure an OpenID Authentication Module ...............................................88 5.5.3 Configure a Facebook Authentication Module ..............................................91 5.5.4 Configure a LinkedIn Authentication Module ...............................................92 5.5.5 Configure a Twitter Authentication Module .................................................93 5.5.6 Configure an ECA360 Token Authentication Module .....................................94 5.5.7 Configuring a SAML2 Authentication Module ...............................................95 5.5.8 Configure a Salesforce Authentication Module ........................................... 102 5.5.9 Configure an IWA Authentication
Recommended publications
  • Phoenix Workgroup Consulting
    Phoenix Workgroup Consulting Protoshare Training Part 1 – Introduction May 2014 John HR Schuster Version 2.1c 11/23/2014 Phoenix Workgroup Consulting 1 Prototyping / Wireframe Toolkits Considerations • Web based (Not Windows)can be used from any platform (Cloud storage) • Interactive and dynamic prototype that runs like a web app • Any level of resolution including mobile • High level of collaboration for everyone • Inexpensive entry cost and maintenance 11/23/2014 Phoenix Workgroup Consulting 2 Protoshare Introduction • ProtoShare is an easy-to-use, collaborative prototyping tool that helps teams visualize requirements with website wireframes and interactive prototypes while working together in real-time. • Teams include – Customer and shareholders – Architects and designers – Business analysts and trainers • Protoshare has 2 types of users – Developer (2) Can create and edit projects – Reviewers (Unlimited) Who can review and comment • Resource link http://pwc.protoshare.com/launch/static/account-getting-started.html 11/23/2014 Phoenix Workgroup Consulting 3 Two sides of Coin • Active pages that allow for kicking the tires • Navigation links that work D S • Designer annotations to shareholders • User discussions to resolve issues e h • Any level of resolution possible • a Documentation geared towards users v r e e l o h Designer / p o Architect l e d r • Active pages that allow basic layout and UI s e • Navigation links that indicate work flow • Designer annotations to developers r • User discussions identify critical points • Specific
    [Show full text]
  • Master Thesis 60 Credits
    UNIVERSITETET I OSLO Department of informatics Prototypes in usability testing: the implications of richness in interaction fidelity Master thesis 60 credits Jo Christian Magnussen May 3rd 2010 Abstract Current research on prototypes in usability testing revolves mainly around the comparison of traditional high- and low-fidelity prototypes. Rapid development in technology presents interaction designers with new and more advanced tools for building prototypes, allowing for different levels of fidelity for different dimensions. Aiming to uncover how the fidelity of interaction in prototypes influences the results from usability testing, this thesis can be a valuable addition to the field of interaction design. As such, this study’s purpose is to investigate the effects of the level of richness of interaction in prototypes used for usability testing. 16 participants took part in the usability testing of two mixed fidelity prototypes. The two prototypes were identical, both visually and in the types of interaction mechanisms shown, but were of different level in terms of interaction. By analyzing and comparing the results from the tests it was investigated how these differences affected the outcome of the usability tests. The analysis points towards a lesser need for high-fidelity richness of interaction in functionality that is familiar to users. Furthermore, analysis suggests that a higher level of fidelity is needed in unfamiliar features for participants to be able to provide relevant feedback. Consequently, these results have an impact on the practice of prototyping and usability testing, as they will allow for a wiser distribution of resources when producing prototypes and require stricter criteria for recruitment of participants for usability testing.
    [Show full text]
  • Engineering Annotations for Supporting the Design Process of Interactive Systems : a Model Based Approach and a Tool Suite Jean-Luc Hak
    Engineering annotations for supporting the design process of interactive systems : a model based approach and a tool suite Jean-Luc Hak To cite this version: Jean-Luc Hak. Engineering annotations for supporting the design process of interactive systems : a model based approach and a tool suite. Networking and Internet Architecture [cs.NI]. Université Paul Sabatier - Toulouse III, 2019. English. NNT : 2019TOU30062. tel-02925106 HAL Id: tel-02925106 https://tel.archives-ouvertes.fr/tel-02925106 Submitted on 28 Aug 2020 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. THÈSE En vue de l’obtention du DOCTORAT DE L’UNIVERSITÉ DE TOULOUSE Délivré par l'Université Toulouse 3 - Paul Sabatier Présentée et soutenue par Jean-Luc HAK Le 18 juillet 2019 Engineering annotations for supporting the design process of interactive systems: A model-based approach and a tool suite Ingénierie des annotations pour le support de processus de conception de systèmes interactifs: une approche basée modèle et outillée Ecole doctorale : EDMITT - Ecole Doctorale Mathématiques, Informatique et Télécommunications de Toulouse Spécialité : Informatique et Télécommunications Unité de recherche : IRIT : Institut de Recherche en Informatique de Toulouse Thèse dirigée par Philippe PALANQUE et Marco WINCKLER Jury Mme Kathia MARCAL DE OLIVEIRA, Rapporteur M.
    [Show full text]
  • Prototyping Von Rich Internet Applikationen
    Prototyping von Rich Internet Applikationen Master of Advanced Studies in Human Computer Interaction Design Masterarbeit Autoren: Andreas Binggeli Marc Blume Yuan-Yuan Sun Betreuer: Thomas Bircher 30. Januar 2009 Erklärung zur Urheberschaft: Wir erklären hiermit an Eides statt, dass wir die vorliegende Arbeit ohne Benutzung anderer als der angegebenen Hilfsmittel angefertigt haben; die aus fremden Quellen direkt oder indirekt übernommenen Gedanken sind als solche kenntlich gemacht. Die Arbeit wurde bisher in gleicher oder ähnlicher Form keiner anderen Prüfungsbehörde vorgelegt und auch noch nicht veröffentlicht. Ort, Datum Andreas Binggeli Ort, Datum Marc Blume Ort, Datum Yuan-Yuan Sun ii Prototyping von Rich Internet Applikationen Abstract Rich Internet Applikationen (RIA) beschreiben eine neue Generation von Web- Anwendungen, welche die Vorteile von traditionellen Web- und Desktop-Applikationen miteinander vereinen. RIA stellen die Designer vor grosse Herausforderungen, da die neuen Konzepte und Interaktionsmöglichkeiten bei den Anwendern teilweise noch unbekannt sind, und die Dynamik und Reichhaltigkeit von RIA grössere Anforderungen an das Erstellen und Testen von Prototypen der Anwendungen stellt. Das Ziel dieser Studie war es, verschiedene Prototyping Methoden auf Ihre Eignung zur Simulation und Evaluation von RIA Patterns zu untersuchen. Für die Untersuchung wurden zehn typische RIA Interaktionsmuster ausgewählt und mit vier verschiedenen Prototyp Versionen umgesetzt: handgezeichnete Papier-Prototypen, mit PowerPoint erstellten Papier-Prototypen, mit der Prototyping Software „Axure RP Pro“ erstellte digitalen Prototypen und ausprogrammierten Ajax Prototypen. Alle wurden in zwei Iterationen mit insgesamt 15 Benutzern getestet. Die quantitative Auswertung der Tests erfolgte auf der Basis eines „subjektiven“ Fragebogens welcher die Testteilnehmer nach jeder Testaufgabe ausfüllten sowie einem „objektiven“ Fragebogen mit unseren eigenen Einschätzungen über die Schwierigkeiten bei der Lösung der Aufgaben.
    [Show full text]
  • CATALOG About Bayt.Com Tests
    CATALOG About Bayt.com Tests Bayt.com Tests are the right tool to qualify the skills of your candidates, with over 500 tests offered covering a large array of soft skills, business skills, lingual skills, and specialized technical skills. Bayt.com Tests are developed and reviewed by top experts and PHD holders, the test are developed under ISO 9001:2008 (TUV, America) mandated process to ensure the highest quality. Featured Bayt.com Test IQ Test This test is designed to assess candidate prior to employment or during current employment. The IQ Test has been designed and developed to help employers and recruiters evaluate the job readiness of candidates. Syllabus of the IQ test Linguistic/Verbal Ability Logical Ability Numerical Skills Perceptual Skills Visual Spatial Skills Who it is intended for: IQ test is designed to measure an individual’s mental ability to solve problems, reason, think abstractly, recognize patterns, etc. This test determines the individual’s intelligence through standardized tests. Various attributes of the human mind are tested such as memory, problem- solving, pattern recognition, learning, attention to detail, etc. Upon completing the test, you will be provided with your IQ score. The skills/abilities that are measured through this test are: Linguistic/VerbalAbility LogicalAbility Numerical Skills Perceptual Skills Visual Spatial Skills Sample Questions 1) Consider the following statements: P, Q, R are Intelligent P, S, T are Hardworking S, R, T are Honest P, Q, T are Ambitious Who is not hardworking and also not ambitious? a) P b) Q c) R d) S Answer is: c) R 2) From the 4 given options, choose the one that completes the series.
    [Show full text]
  • User Experience Careers
    User Experience Careers How to Become a UX Pro, and How to Hire One Susan Farrell and Jakob Nielsen WWW.NNGROUP.COM 48105 WARM SPRINGS BLVD., FREMONT CA 94539–7498 USA Copyright © Nielsen Norman Group; All Rights Reserved. To get your own copy, download from: http://www.nngroup.com/reports/user-experience-careers About This Free Report This report is a gift for our loyal audience of UX enthusiasts. Thank you for your support over the years. We hope this information will aid your efforts to improve user experiences for everyone. The research for this report was done in 2013, but the majority of the advice may still be applicable today, because people and principles of good design change much more slowly than computer technology does. We sometimes make older report editions available to our audience at no cost, because they still provide interesting insights. Even though these reports discuss older designs, it’s still worth remembering the lessons from mistakes made in the past. If you don’t remember history, you’ll be doomed to repeat it. We regularly publish new research reports that span a variety of web and UX related topics. These reports include thousands of actionable, illustrated user experience guidelines for creating and improving your web, mobile, and intranet sites. We sell our new reports to fund independent, unbiased usability research; we do not have investors, government funding or research grants that pay for this work. Visit our reports page at https://www.nngroup.com/reports/ to see a complete list of these reports. HOW TO SHARE Do not link directly to the PDF file (the hosted address could change).
    [Show full text]
  • 5Si SEO Für Wordpress CSS 3 Tutorial HTML Newsletter
    Know-how & Tutorials für Profis WordPress jQuery EÍHTML5 3 CSS 5Si t i / * C o 4l/( '4 o C° c /t i n A SEO für WordPress CSS 3 Tutorial HTML Newsletter Immer noch ein Objekte ohne Flash & Wir zeigen Ihnen unterschätztes Thema JavaScript animieren wies funktioniert Europas Nr. 1 kreative Ressource 21 Mio. lizenzfreie Fotos, Videos und Vektoren ab 0,75€. Tel. +49 (0)30 208 96 208 | www.fotolia.de EDITORIAL Ltí j g g stcrrr webdesigner erscheint zehnmal jährlich bei Sonic Media - ein Geschäftsbereich der music support group GmbH Hauptstraße 31,53604 Bad Honnef Tel.: 02224 98826 0, Fax -79 Mail: [email protected] www.webdesigner-magazin.de Herausgeber und Dipl.-Ing. Hans-Günther Beer (V.i.S.d.P) Chefredakteur [email protected] Willkommen ! Redaktion Jürgen Ortmann [email protected] Tobias Henke [email protected] nline Shops stellen als Webseiten eine Besonderheit Fraqen an die [email protected] dar, da für den Betreiber von der Funktionalität dieser Redaktion _ _ Seiten enorm viel abhängt. Inzwischen ist der Markt für O Autoren dieser Oliver Berghold, Daniel Flöter, Tobias Henke, Andreas Shopsysteme riesig und die Entscheidung für eines dieser Syste­ Ausgabe Hitzig Jürgen Ortmann me und gegen seine Konkurrenzprodukte erfordert eine intensive Grafik & Layout Ronald M. Stirner Recherche, da zum einen die Kosten für das Shopsystem und den [email protected] Support sich stark voneinander unterscheiden. Zum anderen Lektorat Dagmar Schellhas-Pelzer muss unbedingt sichergestellt werden, dass das System Zukunfts­ Gesamtanzeigen- Daniyal Rahman fähigkeit ist und genügend Möglichkeiten für einen Ausbau bie­ leitung Tel.: 02224 9882635 tet.
    [Show full text]
  • Impact of Technological Support on the Workload of Software Prototyping
    Impact of Technological Support on the Workload of Software Prototyping Von der Fakultät für Mathematik, Informatik und Naturwissenschaften der RWTH Aachen University zur Erlangung des akademischen Grades einer Doktorin der Naturwissenschaften genehmigte Dissertation vorgelegt von Sarah Suleri, M.Sc. aus Toba Tek Singh, Pakistan Berichter: Prof. Dr. Matthias Jarke Prof. Dr. Wolfgang Prinz Prof. Dr. Ulrich J. Schröder Tag der mündlichen Prüfung: 18.02.2021 Diese Dissertation ist auf den Internetseiten der Universitätsbibliothek verfügbar. Sarah Suleri: Impact of Technological Support on the Workload of Software Prototyping, Doctoral Dissertation, © December 2020 Eidesstattliche Erklärung Declaration of Authorship I, Sarah Suleri declare that this thesis and the work presented in it are my own and has been generated by me as the result of my own original research. Hiermit erkläre ich an Eides statt / I do solemnely swear that: 1. This work was done wholly or mainly while in candidature for the doctoral degree at this faculty and university; 2. Where any part of this thesis has previously been submitted for a degree or any other qualification at this university or any other institution, this has been clearly stated; 3. Where I have consulted the published work of others or myself, this is always clearly attributed; 4. Where I have quoted from the work of others or myself, the source is always given. This thesis is entirely my own work, with the exception of such quotations; 5. I have acknowledged all major sources of assistance; 6. Where the thesis is based on work done by myself jointly with others, I have made clear exactly what was done by others and what I have contributed myself; 7.
    [Show full text]