- Page 1 and 2: Product GuideMcAfee Cloud Identity
- Page 4 and 5: 5.0 Authentication Chains .........
- Page 6 and 7: 10.2.1 Configuring a Filter for a C
- Page 8 and 9: F.4.2 Editing Claim Rules in AD FS
- Page 10 and 11: 1.2 Web Single Sign On (SSO)In web
- Page 12 and 13: 1.4 Credential Mapping and User Pro
- Page 14 and 15: 1.7 Cloud Connector OptionsCloud Id
- Page 16 and 17: 1.11 Available DocumentationThe Clo
- Page 18 and 19: When the Management Console login p
- Page 20 and 21: 2.4 Management Console — Configur
- Page 22 and 23: 2.4.2 Application Adapters TabYou c
- Page 24 and 25: 2.4.6 Admin TabMany administrative
- Page 26 and 27: 2.5 Management Console — Cloud Co
- Page 28 and 29: 2.5.2 Cloud Connectors — List Vie
- Page 30 and 31: Identity ConnectorThe Identity Conn
- Page 32 and 33: 2.6 Management Console — System S
- Page 34 and 35: • Service Provider Integration Ki
- Page 36 and 37: 2.8 Configuration WizardsThe Manage
- Page 38 and 39: 3.1 Understanding the Cloud Connect
- Page 40 and 41: 3.3 Viewing the Plug-in Cloud Conne
- Page 42 and 43: Connector TypeSSO TypeMcAfee Cloud
- Page 44 and 45: Connector TypeSSO TypeMcAfee Cloud
- Page 46 and 47: Connector TypeSSO TypeMcAfee Cloud
- Page 48 and 49: Connector TypeSSO TypeMcAfee Cloud
- Page 50 and 51: Connector TypeSSO TypeMcAfee Cloud
- Page 54 and 55: Supported Authentication Modules•
- Page 56 and 57: 4.5 View All Configured Identity Co
- Page 58 and 59: 4.7 Create an LDAP Identity StoreYo
- Page 60 and 61: 4. Specify the following fields for
- Page 62 and 63: . To download the AD connection log
- Page 64 and 65: 4.9.1 Configure an Authentication C
- Page 66 and 67: 4.9.3 Configure an ECA360 Token Ide
- Page 68 and 69: c. To configure the Source name, cl
- Page 70 and 71: 3. Configure the Active Directory o
- Page 72 and 73: 3. Configure the LDAP output attrib
- Page 74 and 75: 4.10 User ProvisioningUser provisio
- Page 76 and 77: Regardless of the approach you take
- Page 78 and 79: 5.3.1 Authentication Methods Availa
- Page 80 and 81: 5.3.2 Authentication Methods Availa
- Page 82 and 83: 4. (Optional) Select one of the fol
- Page 84 and 85: 6. To specify whether buttons are d
- Page 86 and 87: 5.5 Configuring the Authentication
- Page 88 and 89: 3. Select one of the following Quer
- Page 90 and 91: 3. (Optional) For OpenID Providers
- Page 92 and 93: To configure a Facebook authenticat
- Page 94 and 95: 5.5.6 Configure an ECA360 Token Aut
- Page 96 and 97: To configure SSO for a SAML2 authen
- Page 98 and 99: 5.5.7.2 Configure Assertion Verific
- Page 100 and 101: ii. Verify that “C_14_N_EXCLUSIVE
- Page 102 and 103:
5.5.8 Configure a Salesforce Authen
- Page 104 and 105:
3. Configure the Active Directory o
- Page 106 and 107:
5.5.11 Configure a SAML2 Proxy Auth
- Page 108 and 109:
5.5.12 Configure an LDAP Authentica
- Page 110 and 111:
5.5.13 Configure a Combined LDAP an
- Page 112 and 113:
To configure a Certificate authenti
- Page 114 and 115:
5.5.15 Configure a SiteMinder Authe
- Page 116 and 117:
6. (Optional) Select the Advanced C
- Page 118 and 119:
The following table summarizes attr
- Page 120 and 121:
3. Configure the fields in the OTP
- Page 122 and 123:
c. Configure the following fields,
- Page 124 and 125:
Before you configure a KCD authenti
- Page 126 and 127:
a. Type the name of the output attr
- Page 128 and 129:
5.6.1 Default Output Attributes for
- Page 130 and 131:
5.7.1 Configuring the JAAS Policy T
- Page 132 and 133:
5.7.4 Configure a Policy for the Au
- Page 134 and 135:
5.8 Registering a User-defined Auth
- Page 136 and 137:
5.8.2 Configure the Authentication
- Page 138 and 139:
5.8.3 Specify the Callback Configur
- Page 140 and 141:
To review the new authentication mo
- Page 142 and 143:
6.1.1 CAS OverviewThe following dia
- Page 144 and 145:
6.1.4 Configure CAS for User Provis
- Page 146 and 147:
6.2.2 Facebook ConfigurationBefore
- Page 148 and 149:
6.3.2 Internet Explorer Configurati
- Page 150 and 151:
6.3.4.5 Errors Occur When the Cloud
- Page 152 and 153:
6.4.1 LinkedIn Authentication Overv
- Page 154 and 155:
6.5 Integrating OpenID Authenticati
- Page 156 and 157:
6.5.3 OpenID Configuration Consider
- Page 158 and 159:
6.6.2 Configuring Salesforce as the
- Page 160 and 161:
6.7.1 SiteMinder Use CasesCloud Ide
- Page 162 and 163:
6.7.1.2 Cloud Identity Manager Inst
- Page 164 and 165:
6.7.2 Configuration in the Cloud Id
- Page 166 and 167:
6.7.3.1 Creating a Custom Agent Typ
- Page 168 and 169:
6.7.3.4 Creating Policy ResponsesWh
- Page 170 and 171:
6.8.1 Twitter Authentication Overvi
- Page 172 and 173:
6.9.1 Overview of Cloud Identity Ma
- Page 174 and 175:
6.9.3 SAML2 Proxy Configuration Sum
- Page 176 and 177:
7.2 Cloud Application Trust Profile
- Page 178 and 179:
7.4 Cloud AuthenticatorsTo view, ed
- Page 180 and 181:
7.4.2 Configure a Cloud Authenticat
- Page 182 and 183:
7.5 The Application Adapter WizardT
- Page 184 and 185:
7.5.2 Configure a Custom Connection
- Page 186 and 187:
3. Select the Specify Issuer checkb
- Page 188 and 189:
8.1 The Auditing TabIn the Auditing
- Page 190 and 191:
8.2.1 Configure Filter Settings for
- Page 192 and 193:
8.2.2 View the Filtered Audit LogWh
- Page 194 and 195:
8.4 Download the Audit LogThe Downl
- Page 196 and 197:
8.6 Audit Event Names and Source Co
- Page 198 and 199:
9.1 Configure Filter Settings for t
- Page 200 and 201:
9.2 Viewing the Filtered Transactio
- Page 202 and 203:
9.3 Configure the Transaction LogTo
- Page 204 and 205:
9.5 Purge the Transaction LogYou ca
- Page 206 and 207:
10.1 AlertsWhen you select Alerts f
- Page 208 and 209:
10.1.1.1 Create an AlertOn the Gene
- Page 210 and 211:
Note: At least one event is require
- Page 212 and 213:
10.1.1.4 Configure Notification Met
- Page 214 and 215:
To import and manage custom alert n
- Page 216 and 217:
10.1.2 Filtering the Alert LogSelec
- Page 218 and 219:
3. To configure the Severity settin
- Page 220 and 221:
10.1.2.2 Viewing the Filtered Alert
- Page 222 and 223:
10.1.4 Purge the Alert LogYou can c
- Page 224 and 225:
10.2.1 Configuring a Filter for a C
- Page 226 and 227:
4. To limit the counts to instances
- Page 228 and 229:
10.2.4 Download the Cloud MetricsTh
- Page 230 and 231:
10.3 Login HistoryCloud Identity Ma
- Page 232 and 233:
2. (Optional) To configure the Clie
- Page 234 and 235:
10.3.3 Download the Login HistoryTh
- Page 236 and 237:
10.4 Audit Event Names and Actions
- Page 238 and 239:
11.1.1 Configuring SSO for Salesfor
- Page 240 and 241:
11.1.3 The Identity Proxy WindowSel
- Page 242 and 243:
11.1.4.1 Configure the Identity Con
- Page 244 and 245:
11.1.4.3 Configure a Salesforce Con
- Page 246 and 247:
11.1.6 Install the Outlook Plug-inD
- Page 248 and 249:
11.2.1 OAuth OverviewUsers own data
- Page 250 and 251:
11.2.3 The OAuth Management WindowS
- Page 252 and 253:
6. (Optional) Click Advanced, type
- Page 254 and 255:
6. (Optional) Click Advanced, type
- Page 256 and 257:
• Import a License File — Use t
- Page 258 and 259:
12.2 Configure Network Proxy Addres
- Page 260 and 261:
12.3 Configure a Timeout Value for
- Page 262 and 263:
12.5.1 Create Administrative User A
- Page 264 and 265:
12.6 Certificate ManagementMany clo
- Page 266 and 267:
12.6.4 The Certificate Management W
- Page 268 and 269:
12.6.6 View One X.509 CertificateTo
- Page 270 and 271:
To export an X.509 certificate1. Cl
- Page 272 and 273:
12.6.10 Validate an X.509 Certifica
- Page 274 and 275:
12.6.12 Import Key PairsA key pair
- Page 276 and 277:
12.6.14 Replace the SSL Key PairIn
- Page 278 and 279:
ProviderSpecifies the name of the S
- Page 280 and 281:
12.9 Import System Configuration Se
- Page 282 and 283:
12.12 Configure the Fully Qualified
- Page 284 and 285:
12.13 Configuring Remote OTP Settin
- Page 286 and 287:
12.14 Language SettingsTo specify t
- Page 288 and 289:
A.1 Two-factor Authentication Using
- Page 290 and 291:
A.1.2OpenID-OTP AuthenticationThe f
- Page 292 and 293:
A.3 One-time Password Server Config
- Page 294 and 295:
To create two-factor authentication
- Page 296 and 297:
B.3 Configuring RCDevs OpenOTP Serv
- Page 298 and 299:
C.1 Overview of SharePoint Integrat
- Page 300 and 301:
C.2.2.1User Name and Password for S
- Page 302 and 303:
C.2.5Installing and Configuring Sha
- Page 304 and 305:
D.2.1Dual Installation GuidelinesYo
- Page 306 and 307:
D.3 Configuring Outgoing Cloud Iden
- Page 308 and 309:
E.1 Salesforce Chatter Mobile Overv
- Page 310 and 311:
E.2.2Configuring SSO and SLO in Sal
- Page 312 and 313:
312 McAfee Cloud Identity Manager 3
- Page 314 and 315:
For more background information abo
- Page 316 and 317:
F.2.2Use Case 2: AD FS 2.0 as the R
- Page 318 and 319:
8. On the Configure URL page:a. Sel
- Page 320 and 321:
F.3.3Configuring Cloud Identity Man
- Page 322 and 323:
F.4.2Editing Claim Rules in AD FS 2
- Page 324 and 325:
F.5 Locating the AD FS 2.0 Service
- Page 326 and 327:
F.7 Software Requirements for AD FS
- Page 328 and 329:
F.9.6Disabling Certificate Chain Va
- Page 330 and 331:
G.2.1Add Your Windows Home Director
- Page 332 and 333:
};permission java.util.PropertyPerm
- Page 334 and 335:
Example 2: Complex Control Flow Map
- Page 336:
336 McAfee Cloud Identity Manager 3