IDOL 12.3 Document Security Administration Guide

Total Page:16

File Type:pdf, Size:1020Kb

IDOL 12.3 Document Security Administration Guide IDOL Software Version 12.3 Document Security Administration Guide Document Release Date: June 2019 Software Release Date: June 2019 Document Security Administration Guide Legal notices Copyright notice © Copyright 2019 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Documentation updates The title page of this document contains the following identifying information: l Software Version number, which indicates the software version. l Document Release Date, which changes each time the document is updated. l Software Release Date, which indicates the release date of this version of the software. You can check for more recent versions of a document through the MySupport portal. Many areas of the portal, including the one for documentation, require you to sign in with a Software Passport. If you need a Passport, you can create one when prompted to sign in. Additionally, if you subscribe to the appropriate product support service, you will receive new or updated editions of documentation. Contact your Micro Focus sales representative for details. Support Visit the MySupport portal to access contact information and details about the products, services, and support that Micro Focus offers. This portal also provides customer self-solve capabilities. It gives you a fast and efficient way to access interactive technical support tools needed to manage your business. As a valued support customer, you can benefit by using the MySupport portal to: l Search for knowledge documents of interest l Access product documentation l View software vulnerability alerts l Enter into discussions with other software customers l Download software patches l Manage software licenses, downloads, and support contracts l Submit and track service requests l Contact customer support l View information about all services that Support offers Many areas of the portal require you to sign in with a Software Passport. If you need a Passport, you can create one when prompted to sign in. To learn about the different access levels the portal uses, see the Access Levels descriptions. About this PDF version of online Help This document is a PDF version of the online Help. This PDF file is provided so you can easily print multiple topics or read the online Help. Because this content was originally created to be viewed as online help in a web browser, some topics may not be formatted properly. Some interactive topics may not be present in this PDF version. Those topics can be successfully printed from within the online Help. IDOL (12.3) Page 2 of 81 Document Security Administration Guide Contents Part I: Overview 7 Chapter 1: Introduction 8 Security Overview 8 User Authentication 8 Document Security 9 Mapped Security 9 Unmapped Security 10 Mapped Security Example 11 Related Documentation 12 Chapter 2: Configure IDOL Server 13 Introduction 13 Configure Content Security 13 Configure Security Types 13 Configure IDOL to Identify the ACL 15 Identify the Security Type 15 Configure User Security 16 Example Configuration 19 Security Types 21 Configure Client Authorization 22 Chapter 3: Configure Connectors 24 Introduction 24 Retrieve Access Control Lists and Identify the Security Type 24 Chapter 4: Configure OmniGroupServer 25 Introduction 25 OmniGroupServer Configuration File 26 Start and Stop OmniGroupServer 27 Display OmniGroupServer Online Help 27 Retrieve Security Information from Repositories 28 Retrieve Groups from Active Directory 28 Retrieve Groups from Alfresco 28 Retrieve Groups through a Connector 29 Retrieve Groups from Documentum 30 Retrieve Groups from eRoom 32 Retrieve Groups from Google Directory 32 Configure Authentication (with a service account) 33 Configure the OmniGroupServer Repository 34 Retrieve Groups from LDAP 35 Retrieve Groups from LDAP using Kerberos on Linux 37 Retrieve Groups from Netware 39 Retrieve Groups from Notes 40 IDOL (12.3) Page 3 of 81 Document Security Administration Guide Retrieve NT Groups 40 Retrieve Security Information from a Text File 41 Construct the Text File 42 Text Commands 43 Schedule Tasks 46 Combine Repositories 46 Configure Redirection 47 Chapter 5: Configure a Front End 50 Introduction 50 Security for Third-Party Interfaces 50 Security through the Java ACI API NG 51 Example 53 Chapter 6: Secure Communications 57 SSL Communications 57 Chapter 7: Encrypt Passwords 58 Encrypt Passwords 58 Create a Key File 58 Encrypt a Password 58 Decrypt a Password 59 Chapter 8: Query Servers 61 View Security Details on a Group Server 61 Query IDOL Server with Security Information 62 Obtain the SecurityInfo String 62 SecurityInfo Parameters 62 Log Query Security Information 64 Part II: Appendixes 65 Appendix A: Available Security Libraries 66 Appendix B: Custom Mapped Security 67 Introduction 67 System Architecture 67 Set Up IDOL Server 68 Set Up a Custom Mapped Security Type 68 Specify the ACL Format and Security Checks 69 Example - NT Security 72 Example - Custom Security 74 Set Up the Connector 74 Appendix C: Additional Restrictions on Document Access 76 Restrict IDOL Server Database Access 76 Glossary 78 IDOL (12.3) Page 4 of 81 Document Security Administration Guide Send documentation feedback 81 IDOL (12.3) Page 5 of 81 Document Security Administration Guide IDOL (12.3) Page 6 of 81 Part I: Overview This section provides an overview of Micro Focus IDOL document security and describes how to configure the components involved in security. l Introduction l Configure IDOL Server l Configure Connectors l Configure OmniGroupServer l Configure a Front End l Secure Communications l Encrypt Passwords l Query Servers IDOL (12.3) Page 7 of 81 Chapter 1: Introduction This section provides an overview of Micro Focus IDOL document security. • Security Overview 8 • User Authentication 8 • Document Security 9 • Mapped Security Example 11 • Related Documentation 12 Security Overview Micro Focus provides the software infrastructure that automates operations on unstructured information. This software infrastructure is based on IDOL Server. Document security protects the information that you index into IDOL Server. Your organization is likely to store information in many repositories. Many of these repositories have security features that apply permissions to files, so that they only authorized personnel can view them. Document security ensures that when you index information into IDOL Server, IDOL continues to enforce these permissions. In response to a query, IDOL returns only documents that a user is permitted to view. IDOL includes the following features to protect your data: l User authentication. At the front end, users must log on before they can query IDOL. IDOL can authenticate users against an existing directory service, such as Microsoft Active Directory. l Document security. IDOL Server checks each document that is returned in response to a query. If the user who submitted the query does not have permission to view the document, the document is removed from the query results before the results are returned. l Secure communications. You can encrypt the communications between ACI servers and any applications that use the Micro Focus IDOL ACI API. User Authentication To access front-end applications, users must log on by providing their credentials. If you build your own front-end applications, you can use the IDOL API to customize the logon process. IDOL supports authentication against industry standard systems, including: l Windows NT logon. l LDAP authentication. l Other third-party authentication (for example, Lotus Notes). IDOL (12.3) Page 8 of 81 Document Security Administration Guide Chapter 1: Introduction A single logon allows a user to access all the systems for which they have permission. For example, if a user submits a query they receive all documents that they are permitted to view, even though these documents originated from different data repositories. The IDOL Server Community component enables you to store and update user security details for this purpose. In addition, you can use IDOL in a single sign-on environment that uses Kerberos for authentication. Document Security Document security ensures that users can access only those documents for which they have the necessary permissions. When a user logs on to a front-end application and is authenticated successfully, IDOL returns an encrypted security string to the front-end application. This string identifies the user and contains information about their group memberships. The front-end application must include this security string in every subsequent query it sends to IDOL. When a user submits a query, IDOL compares the user's information with the permissions on each document. IDOL offers two ways of doing this, Mapped Security and Unmapped Security. NOTE: Micro Focus strongly recommends using Mapped Security, because IDOL can return query responses significantly faster than when Unmapped Security is used. Mapped Security In the Mapped Security architecture, IDOL determines whether a user is permitted to view a document by comparing the user's security details against an Access Control List (ACL) that has been added to the document. With Mapped Security, when connectors fetch information from data repositories they add an encrypted Access Control List (ACL) to a metadata field in each document. The ACL contains information about which users and groups are permitted to access the document. The documents, and therefore the ACLs, are indexed into IDOL Server. A user might be allowed or denied permission to view a document because they are a member of a security group. This means that IDOL must consider group memberships, in addition to permissions, before it can determine whether a user can view a document. OmniGroupServer collects user and group information, and stores it, so that IDOL Server can access this information.
Recommended publications
  • Administrator Guide Company
    PUBLIC SAP Information Steward Document Version: 4.2 Support Package 12 (14.2.12.0) – 2019-05-23 Administrator Guide company. All rights reserved. All rights company. affiliate THE BEST RUN 2019 SAP SE or an SAP SE or an SAP SAP 2019 © Content 1 Welcome.................................................................. 9 2 Accessing Information Steward for administrative tasks............................. 10 3 Architecture............................................................... 11 3.1 Information Steward architecture overview.......................................... 11 Servers and services........................................................13 SAP BusinessObjects BI platform.............................................. 13 SAP BI platform components usage.............................................14 SAP Data Services components usage...........................................16 Web application server......................................................17 Services................................................................19 Metadata integrators.......................................................23 3.2 Distributed architecture....................................................... 24 Component communication channels...........................................25 Port assignments......................................................... 26 DSN-less and TNS-less connections............................................26 3.3 SAP integration............................................................. 27 3.4 Information workflows.......................................................
    [Show full text]
  • Letter, If Not the Spirit, of One Or the Other Definition
    Producing Open Source Software How to Run a Successful Free Software Project Karl Fogel Producing Open Source Software: How to Run a Successful Free Software Project by Karl Fogel Copyright © 2005-2021 Karl Fogel, under the CreativeCommons Attribution-ShareAlike (4.0) license. Version: 2.3214 Home site: https://producingoss.com/ Dedication This book is dedicated to two dear friends without whom it would not have been possible: Karen Under- hill and Jim Blandy. i Table of Contents Preface ............................................................................................................................. vi Why Write This Book? ............................................................................................... vi Who Should Read This Book? ..................................................................................... vi Sources ................................................................................................................... vii Acknowledgements ................................................................................................... viii For the first edition (2005) ................................................................................ viii For the second edition (2021) .............................................................................. ix Disclaimer .............................................................................................................. xiii 1. Introduction ...................................................................................................................
    [Show full text]
  • Course 2: «Open Source Software (OSS) Engineering Data»
    Course 2: «Open Source Software (OSS) Engineering Data». 1st Day: Metrics and Tools for Software Engineering in Open Source Software 1. Open Software / Hardware Technologies: Introduction to Open Source Software and related technologies. 2. Software Engineering FLOSS: Free Libre Open Source Software in Software Engineering. 3. Metrics for Open Source Software: product and project metrics and related tooling. 2nd Day: Research based on Open Source Software Data 4. Facilitating Metric for White-Box Reuse: we will discuss a metric derived from the analysis of Open Source Project which facilitates the white-box reuse (reuse based on the source code analysis). 5. Extracting components from Open-Source: The Component Adaptation Environment Approach (COPE): we will discuss the results of the OPEN-SME EU Research Project and in particular the COPE tool for extracting reusable components from Open Source Software. 6. Software Engineering Research based on Open Source Software Data: Data, A recent example: we will discuss a recent study of open source repository mailing lists for deriving implications for the evolution of an open source project. 7. Improving Component Coupling Information with Dynamic Profiling: we will discuss how dynamic profiling of an open source program can contribute towards its comprehension. In various points during the lectures students will be asked to carry out activities. Open Software / Hardware Technologies Ioannis Stamelos, Professor Nikolaos Konofaos, Associate Professor School of Informatics Aristotle University of Thessaloniki George Kakarontzas, Assistant Professor University of Thessaly 2018-2019 1 F/OSS - FLOSS Definition ● The traditional SW development model asks for a “closed member” team that develops proprietary source code.
    [Show full text]
  • How to Run a Successful Free Software Project
    Producing Open Source Software How to Run a Successful Free Software Project Karl Fogel Producing Open Source Software: How to Run a Successful Free Software Project by Karl Fogel Copyright © 2005-2021 Karl Fogel, under the CreativeCommons Attribution-ShareAlike (4.0) license. Version: 2.3214 Home site: https://producingoss.com/ Dedication This book is dedicated to two dear friends without whom it would not have been possible: Karen Underhill and Jim Blandy. i Table of Contents Preface ........................................................................................................................................................... vi Why Write This Book? ............................................................................................................................. vi Who Should Read This Book? ................................................................................................................... vi Sources .................................................................................................................................................. vii Acknowledgements ................................................................................................................................. viii For the first edition (2005) .............................................................................................................. viii For the second edition (2021) ............................................................................................................ ix Disclaimer .............................................................................................................................................
    [Show full text]
  • TIBCO FTL® Release Notes Software Release 6.2.0 August 2019 2
    TIBCO FTL® Release Notes Software Release 6.2.0 August 2019 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE FUNCTIONALITY (OR PROVIDE LIMITED ADD-ON FUNCTIONALITY) OF THE LICENSED TIBCO SOFTWARE. THE EMBEDDED OR BUNDLED SOFTWARE IS NOT LICENSED TO BE USED OR ACCESSED BY ANY OTHER TIBCO SOFTWARE OR FOR ANY OTHER PURPOSE. USE OF TIBCO SOFTWARE AND THIS DOCUMENT IS SUBJECT TO THE TERMS AND CONDITIONS OF A LICENSE AGREEMENT FOUND IN EITHER A SEPARATELY EXECUTED SOFTWARE LICENSE AGREEMENT, OR, IF THERE IS NO SUCH SEPARATE AGREEMENT, THE CLICKWRAP END USER LICENSE AGREEMENT WHICH IS DISPLAYED DURING DOWNLOAD OR INSTALLATION OF THE SOFTWARE (AND WHICH IS DUPLICATED IN THE LICENSE FILE) OR IF THERE IS NO SUCH SOFTWARE LICENSE AGREEMENT OR CLICKWRAP END USER LICENSE AGREEMENT, THE LICENSE(S) LOCATED IN THE “LICENSE” FILE(S) OF THE SOFTWARE. USE OF THIS DOCUMENT IS SUBJECT TO THOSE TERMS AND CONDITIONS, AND YOUR USE HEREOF SHALL CONSTITUTE ACCEPTANCE OF AND AN AGREEMENT TO BE BOUND BY THE SAME. ANY SOFTWARE ITEM IDENTIFIED AS THIRD PARTY LIBRARY IS AVAILABLE UNDER SEPARATE SOFTWARE LICENSE TERMS AND IS NOT PART OF A TIBCO PRODUCT. AS SUCH, THESE SOFTWARE ITEMS ARE NOT COVERED BY THE TERMS OF YOUR AGREEMENT WITH TIBCO, INCLUDING ANY TERMS CONCERNING SUPPORT, MAINTENANCE, WARRANTIES, AND INDEMNITIES. DOWNLOAD AND USE OF THESE ITEMS IS SOLELY AT YOUR OWN DISCRETION AND SUBJECT TO THE LICENSE TERMS APPLICABLE TO THEM. BY PROCEEDING TO DOWNLOAD, INSTALL OR USE ANY OF THESE ITEMS, YOU ACKNOWLEDGE THE FOREGOING DISTINCTIONS BETWEEN THESE ITEMS AND TIBCO PRODUCTS.
    [Show full text]
  • TIBCO FTL® Release Notes Version 6.6.0 November 2020
    v TIBCO FTL® Release Notes Version 6.6.0 November 2020 Copyright © 2010-2020. TIBCO Software Inc. All Rights Reserved. 2 | Contents Contents Contents 2 TIBCO Documentation and Support Services 3 New Features 6 Changes in Functionality 16 Deprecated and Removed Features 22 Migration and Compatibility 26 Closed Issues 27 Known Issues 53 Legal and Third-Party Notices 57 TIBCO FTL® Release Notes 3 | TIBCO Documentation and Support Services TIBCO Documentation and Support Services For information about this product, you can read the documentation, contact TIBCO Support, and join TIBCO Community. How to Access TIBCO Documentation Documentation for TIBCO products is available on the TIBCO Product Documentation website, mainly in HTML and PDF formats. The TIBCO Product Documentation website is updated frequently and is more current than any other documentation included with the product. To access the latest documentation, visit https://docs.tibco.com. Product-Specific Documentation Documentation for TIBCO FTL® is available on the TIBCO FTL® Product Documentation page. To directly access documentation for this product, double-click the following file: TIBCO_HOME/release_notes/TIB_ftl_6.6.0_docinfo.html where TIBCO_HOME is the top- level directory in which TIBCO products are installed. On Windows, the default TIBCO_ HOME is C:\tibco. On UNIX systems, the default TIBCO_HOME is /opt/tibco. TIBCO FTL® Documentation Set l TIBCO FTL Concepts This booklet presents an intuitive introduction to the fundamental concepts of FTL software. l TIBCO FTL Development Application developers and architects read this manual to understand concepts relevant in any supported programming language. l TIBCO FTL API Reference Application developers use this HTML documentation to learn the details of the FTL API in specific programming languages.
    [Show full text]
  • Controlpoint 5.6 Installation Guide
    ControlPoint Software Version 5.6 Installation Guide Document Release Date: August 2018 Software Release Date: August 2018 Installation Guide Legal notices Copyright notice © Copyright 2016-2018 Micro Focus or one of its affiliates. The only warranties for products and services of Micro Focus and its affiliates and licensors (“Micro Focus”) are set forth in the express warranty statements accompanying such products and services. Nothing herein should be construed as constituting an additional warranty. Micro Focus shall not be liable for technical or editorial errors or omissions contained herein. The information contained herein is subject to change without notice. Trademark notices Adobe™ is a trademark of Adobe Systems Incorporated. Microsoft® and Windows® are U.S. registered trademarks of Microsoft Corporation. UNIX® is a registered trademark of The Open Group. This product includes an interface of the 'zlib' general purpose compression library, which is Copyright © 1995-2002 Jean-loup Gailly and Mark Adler. Documentation updates The title page of this document contains the following identifying information: l Software Version number, which indicates the software version. l Document Release Date, which changes each time the document is updated. l Software Release Date, which indicates the release date of this version of the software. To verify you are using the most recent edition of a document, go to https://softwaresupport.softwaregrp.com/group/softwaresupport/search-result?doctype=online help. If you subscribe to the appropriate product support service, you will receive new or updated editions of documentation. Contact your Micro Focus sales representative for details. To check for new versions of software, go to the Micro Focus Software Licenses and Downloads Portal.
    [Show full text]
  • TIBCO FTL® Release Notes
    TIBCO FTL® Release Notes Software Release 5.2.0 March 2017 Two-Second Advantage® 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE FUNCTIONALITY (OR PROVIDE LIMITED ADD-ON FUNCTIONALITY) OF THE LICENSED TIBCO SOFTWARE. THE EMBEDDED OR BUNDLED SOFTWARE IS NOT LICENSED TO BE USED OR ACCESSED BY ANY OTHER TIBCO SOFTWARE OR FOR ANY OTHER PURPOSE. USE OF TIBCO SOFTWARE AND THIS DOCUMENT IS SUBJECT TO THE TERMS AND CONDITIONS OF A LICENSE AGREEMENT FOUND IN EITHER A SEPARATELY EXECUTED SOFTWARE LICENSE AGREEMENT, OR, IF THERE IS NO SUCH SEPARATE AGREEMENT, THE CLICKWRAP END USER LICENSE AGREEMENT WHICH IS DISPLAYED DURING DOWNLOAD OR INSTALLATION OF THE SOFTWARE (AND WHICH IS DUPLICATED IN THE LICENSE FILE) OR IF THERE IS NO SUCH SOFTWARE LICENSE AGREEMENT OR CLICKWRAP END USER LICENSE AGREEMENT, THE LICENSE(S) LOCATED IN THE “LICENSE” FILE(S) OF THE SOFTWARE. USE OF THIS DOCUMENT IS SUBJECT TO THOSE TERMS AND CONDITIONS, AND YOUR USE HEREOF SHALL CONSTITUTE ACCEPTANCE OF AND AN AGREEMENT TO BE BOUND BY THE SAME. This document contains confidential information that is subject to U.S. and international copyright laws and treaties. No part of this document may be reproduced in any form without the written authorization of TIBCO Software Inc. TIBCO, Two-Second Advantage, TIB, Information Bus, eFTL and Rendezvous are either registered trademarks or trademarks of TIBCO Software Inc. in the United States and/or other countries. Enterprise Java Beans (EJB), Java Platform Enterprise Edition (Java EE), Java 2 Platform Enterprise Edition (J2EE), and all Java-based trademarks and logos are trademarks or registered trademarks of Oracle Corporation in the U.S.
    [Show full text]
  • TIBCO FTL® Administration Software Release 6.2 August 2019 2
    TIBCO FTL® Administration Software Release 6.2 August 2019 2 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO SOFTWARE IS SOLELY TO ENABLE THE FUNCTIONALITY (OR PROVIDE LIMITED ADD-ON FUNCTIONALITY) OF THE LICENSED TIBCO SOFTWARE. THE EMBEDDED OR BUNDLED SOFTWARE IS NOT LICENSED TO BE USED OR ACCESSED BY ANY OTHER TIBCO SOFTWARE OR FOR ANY OTHER PURPOSE. USE OF TIBCO SOFTWARE AND THIS DOCUMENT IS SUBJECT TO THE TERMS AND CONDITIONS OF A LICENSE AGREEMENT FOUND IN EITHER A SEPARATELY EXECUTED SOFTWARE LICENSE AGREEMENT, OR, IF THERE IS NO SUCH SEPARATE AGREEMENT, THE CLICKWRAP END USER LICENSE AGREEMENT WHICH IS DISPLAYED DURING DOWNLOAD OR INSTALLATION OF THE SOFTWARE (AND WHICH IS DUPLICATED IN THE LICENSE FILE) OR IF THERE IS NO SUCH SOFTWARE LICENSE AGREEMENT OR CLICKWRAP END USER LICENSE AGREEMENT, THE LICENSE(S) LOCATED IN THE “LICENSE” FILE(S) OF THE SOFTWARE. USE OF THIS DOCUMENT IS SUBJECT TO THOSE TERMS AND CONDITIONS, AND YOUR USE HEREOF SHALL CONSTITUTE ACCEPTANCE OF AND AN AGREEMENT TO BE BOUND BY THE SAME. ANY SOFTWARE ITEM IDENTIFIED AS THIRD PARTY LIBRARY IS AVAILABLE UNDER SEPARATE SOFTWARE LICENSE TERMS AND IS NOT PART OF A TIBCO PRODUCT. AS SUCH, THESE SOFTWARE ITEMS ARE NOT COVERED BY THE TERMS OF YOUR AGREEMENT WITH TIBCO, INCLUDING ANY TERMS CONCERNING SUPPORT, MAINTENANCE, WARRANTIES, AND INDEMNITIES. DOWNLOAD AND USE OF THESE ITEMS IS SOLELY AT YOUR OWN DISCRETION AND SUBJECT TO THE LICENSE TERMS APPLICABLE TO THEM. BY PROCEEDING TO DOWNLOAD, INSTALL OR USE ANY OF THESE ITEMS, YOU ACKNOWLEDGE THE FOREGOING DISTINCTIONS BETWEEN THESE ITEMS AND TIBCO PRODUCTS.
    [Show full text]
  • Administrator Guide Content
    PUBLIC SAP Information Steward Document Version: 4.2 Support Package 7 Patch 1 (14.2.7.1) – 2017-01-24 Administrator Guide Content 1 Accessing Information Steward for administrative tasks................................ 9 2 Architecture................................................................. 10 2.1 Architecture overview........................................................... 10 Servers and services..........................................................12 Information Steward architecture overview..........................................12 Services...................................................................17 Metadata integrators.........................................................20 2.2 Distributed architecture..........................................................22 Component communication channels............................................. 22 Port assignments............................................................22 DSN-less and TNS-less connections...............................................23 2.3 SAP integration................................................................24 2.4 Information workflows...........................................................24 Adding a table to a Data Insight project.............................................25 Profiling data ...............................................................25 Scheduling and running a Metadata Management integrator source........................26 Creating a custom cleansing package with Cleansing Package Builder.......................26
    [Show full text]
  • Primavera® P6™ Administrator's Guide
    Primavera® P6™ Administrator’s Guide Version 6.2.1 Copyright © 1999, 2009, Oracle and/or its affiliates. All rights reserved. The Programs (which include both the software and documentation) contain proprietary information; they are provided under a license agreement containing restrictions on use and disclosure and are also protected by copyright, patent, and other intellectual and industrial property laws. Reverse engineering, disassembly, or decompilation of the Programs, except to the extent required to obtain interoperability with other independently created software or as specified by law, is prohibited. The information contained in this document is subject to change without notice. If you find any problems in the documentation, please report them to us in writing. This document is not warranted to be error-free. Except as may be expressly permitted in your license agreement for these Programs, no part of these Programs may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose. If the Programs are delivered to the United States Government or anyone licensing or using the Programs on behalf of the United States Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S. Government customers are "commercial computer software" or "commercial technical data" pursuant to the applicable Federal Acquisition Regulation and agency-specific supplemental regulations. As such, use, duplication, disclosure, modification, and adaptation of the Programs, including documentation and technical data, shall be subject to the licensing restrictions set forth in the applicable Oracle license agreement, and, to the extent applicable, the additional rights set forth in FAR 52.227-19, Commercial Computer Software-- Restricted Rights (June 1987).
    [Show full text]
  • Cisco Prime Access Registrar 9.1 User Guide Published: March 20, 2020
    Cisco Prime Access Registrar 9.1 User Guide Published: March 20, 2020 Last Modified: August 27, 2021 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]