Manual RSA Security Xlr2

12 pages 0.66 mb
Download

Go to site of 12

Summary
  • RSA Security Xlr2 - page 1

    RSA Secured Implementation Guide For Portal Servers and Web-Based Applications Last Modified 12/2/05 Partner Information Product Information Partner Name Business Objects Web Site www.b us i n essobjects.com Product Name InfoView Version & Platform XIr2 / BusinessObjects Enterprise Product Description Business Objects is an integrated quer y, r ...

  • RSA Security Xlr2 - page 2

    Solution Summary To achieve Single-Sign-On (SSO) with BusinessObjects Enterprise XIr2 InfoView, a web server proxy to the InfoView application server host must be configur ed. An RSA ClearTrust agent is installed on this web server and it is configured to protect BusinessO bjects Enterprise resour ces. Pre-existing RSA ClearTrust (LDAP) groups can ...

  • RSA Security Xlr2 - page 3

    Product Requirement s Partner Product Requirements: <Partner Product (Component)> CPU Pentium 3 - 700 Mhz Memory 1GB RAM Storage 5 GB for BusinessObjects Enterprise and an additional 1.5 GB for Performance Management Optical Drives CD-ROM Operating System 1 Platform Required Patches Windows 2000 SP4 Advanced Server, SP4 Datacenter Server or S ...

  • RSA Security Xlr2 - page 4

    Product Configuration Before You Begin This section provides instructions for integrati ng the partners’ product with RSA ClearTrust. This document is not intended to suggest optimum installati ons or configurations. It is assumed that the reader has both working knowledge of the two products to perform the tasks outlined in this section and acce ...

  • RSA Security Xlr2 - page 5

    Configure the LDAP plug-in 1. Launch and log into the BusinessObjects En terprise Central Management Console (CMC). 2. Select Authentication from the Manage frame and then chose the LDAP tab. 3. Enter the LDAP hostname and port, click the Add button and then click Next . Page: 5 ...

  • RSA Security Xlr2 - page 6

    4. Enter the base LDAP di stinguished name, and click Next . 5. Enter LDAP log-on credentials and click Next . Note: The credentials do no t n eed to be those of an LDAP serv er administrator. The user o n ly needs read access to the server. 6. Select Basic (no SSO) for LDAP authentication and click Next . Page: 6 ...

  • RSA Security Xlr2 - page 7

    7. Select the following radio buttons: 1. Assign each added LDAP alias to an account with the same name 2. No new aliases w ill be added and new users w ill not be created 3. New users are created as concurrent users 8. Click Next and Finish . Build LDAP user accounts 1. Launch and log into the BusinessObjects En terprise Central Management Console ...

  • RSA Security Xlr2 - page 8

    Configure the Trusted Authentication shared secret 1. Launch and log into the CMC. 2. Select Authentication from the Manage frame and then chose the Enterprise tab. 3. Select the Trusted Authentication is e nabled checkbox and chose and enter a passkey in the Shared secret field. 4. Click Update . Page: 8 ...

  • RSA Security Xlr2 - page 9

    5. Navigate to %BUSINESSOBJECTS_HOME % 4 BusinessObjects Enterprise 11.5win32_x86 pluginsauthsecEnt erprise and create a new text file named TrustedPrinc ipal.conf . Type the following line at the beginning of this file: SharedSecret= %SHARED_SECRET% where %SHARED_SECRET% matches the passkey entered in step 3. 6. Save changes to TrustedPrincip ...

  • RSA Security Xlr2 - page 10

    Install the SSO and exit scripts The SSO script – sso.jsp – is contained in the BOXI_C T553.zip file (previously downloaded). This file is responsible for creating a BusinessObjects Enterprise session for the ClearTrust-authenticated user. After a successful ClearTrust authenticat ion, the user will be redirected to this JSP. The BusinessObject ...

  • RSA Security Xlr2 - page 11

    The exit script – exit.jsp – is also contained in the BOXI_CT553.zip file. This script will be called when a user clicks the Logoff button on the CMC. It is respons ible for destroying the BusinessObjects Enterprise session and closing the browser window (thus destroying the RSA Cl earTrust SSO token). Note: The sso.jsp and exit.jsp files are p ...

  • RSA Security Xlr2 - page 12

    Certification Checklist Port al Servers and Web-Based App s Date Tested11/18/2005 Certification Environment Product Name Version Information Operating System RSA ClearTrust 5.5.3 Windows 2003 Server Enterprise RSA ClearTrust IIS Agent 6.0 Windows 2003 Server Enterprise BusinessObjects Enterprise XIr2 InfoView XIr2 Windows 2003 Server Enterprise Tes ...

Manufacturer RSA Security Category Server

Documents that we receive from a manufacturer of a RSA Security Xlr2 can be divided into several groups. They are, among others:
- RSA Security technical drawings
- Xlr2 manuals
- RSA Security product data sheets
- information booklets
- or energy labels RSA Security Xlr2
All of them are important, but the most important information from the point of view of use of the device are in the user manual RSA Security Xlr2.

A group of documents referred to as user manuals is also divided into more specific types, such as: Installation manuals RSA Security Xlr2, service manual, brief instructions and user manuals RSA Security Xlr2. Depending on your needs, you should look for the document you need. In our website you can view the most popular manual of the product RSA Security Xlr2.

Similar manuals

A complete manual for the device RSA Security Xlr2, how should it look like?
A manual, also referred to as a user manual, or simply "instructions" is a technical document designed to assist in the use RSA Security Xlr2 by users. Manuals are usually written by a technical writer, but in a language understandable to all users of RSA Security Xlr2.

A complete RSA Security manual, should contain several basic components. Some of them are less important, such as: cover / title page or copyright page. However, the remaining part should provide us with information that is important from the point of view of the user.

1. Preface and tips on how to use the manual RSA Security Xlr2 - At the beginning of each manual we should find clues about how to use the guidelines. It should include information about the location of the Contents of the RSA Security Xlr2, FAQ or common problems, i.e. places that are most often searched by users in each manual
2. Contents - index of all tips concerning the RSA Security Xlr2, that we can find in the current document
3. Tips how to use the basic functions of the device RSA Security Xlr2 - which should help us in our first steps of using RSA Security Xlr2
4. Troubleshooting - systematic sequence of activities that will help us diagnose and subsequently solve the most important problems with RSA Security Xlr2
5. FAQ - Frequently Asked Questions
6. Contact detailsInformation about where to look for contact to the manufacturer/service of RSA Security Xlr2 in a specific country, if it was not possible to solve the problem on our own.

Do you have a question concerning RSA Security Xlr2?

Use the form below

If you did not solve your problem by using a manual RSA Security Xlr2, ask a question using the form below. If a user had a similar problem with RSA Security Xlr2 it is likely that he will want to share the way to solve it.

Copy the text from the picture

Comments (0)