13.04.2013 Views

Digipass Plug-In for SBR Administrator Reference - Vasco

Digipass Plug-In for SBR Administrator Reference - Vasco

Digipass Plug-In for SBR Administrator Reference - Vasco

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

<strong>Digipass</strong> <strong>Plug</strong>-<strong>In</strong> <strong>for</strong> <strong>SBR</strong> <strong>Administrator</strong> <strong>Reference</strong> Table of Contents<br />

5 Set Up Active Directory Permissions....................................................................62<br />

5.1 Permissions Needed by the <strong>SBR</strong> <strong>Plug</strong>-<strong>In</strong>.....................................................................62<br />

5.1.1 Giving Permissions to the <strong>SBR</strong> <strong>Plug</strong>-<strong>In</strong>..................................................................... 62<br />

5.2 Permissions Needed by <strong>Administrator</strong>s...................................................................... 63<br />

5.2.1 Domain <strong>Administrator</strong>s.......................................................................................... 63<br />

5.2.2 Delegated <strong>Administrator</strong>s....................................................................................... 63<br />

5.2.3 Reduced-Rights <strong>Administrator</strong>s............................................................................... 63<br />

5.2.4 System <strong>Administrator</strong>s.......................................................................................... 64<br />

5.3 Assign Administration Permissions to a User .............................................................64<br />

5.4 Multiple Domains........................................................................................................66<br />

5.4.1 Scenario 1 – Each <strong>SBR</strong> <strong>Plug</strong>-<strong>In</strong> Handles One Domain................................................. 66<br />

5.4.2 Scenario 2 – One <strong>SBR</strong> <strong>Plug</strong>-<strong>In</strong> Handles All Domains................................................... 67<br />

5.4.3 Scenario 3 - Combination....................................................................................... 67<br />

6 Backup and Recovery.......................................................................................... 68<br />

6.1 What Must be Backed Up............................................................................................ 68<br />

6.1.1 Configuration files................................................................................................. 69<br />

6.1.2 Web Sites............................................................................................................ 69<br />

6.1.3 Audit Log Data..................................................................................................... 69<br />

6.1.3.1 Write to Text File..............................................................................................................69<br />

6.1.3.2 Write to ODBC Database....................................................................................................70<br />

6.1.3.3 Write to Windows Event Log...............................................................................................70<br />

6.1.4 DPX files............................................................................................................. 70<br />

6.1.5 Active Directory.................................................................................................... 70<br />

6.1.5.1 Cold Backup.....................................................................................................................70<br />

6.1.6 ODBC and Embedded Database.............................................................................. 71<br />

6.1.6.1 Data Source Settings........................................................................................................ 71<br />

6.1.6.2 Backup Strategies.............................................................................................................71<br />

6.1.6.3 Backup of Embedded Database...........................................................................................72<br />

6.2 Recovery.................................................................................................................... 73<br />

6.2.1 Active Directory.................................................................................................... 73<br />

6.2.2 ODBC or Embedded Database................................................................................ 74<br />

6.2.2.1 Rebuild <strong>SBR</strong> <strong>Plug</strong>-<strong>In</strong>, Database Undamaged......................................................................... 74<br />

6.2.2.2 Restore Database, <strong>SBR</strong> <strong>Plug</strong>-<strong>In</strong> Undamaged......................................................................... 75<br />

6.2.2.3 Rebuild <strong>SBR</strong> <strong>Plug</strong>-<strong>In</strong>, Restore Database............................................................................... 76<br />

6.2.2.4 Copy Database from Other <strong>SBR</strong> <strong>Plug</strong>-<strong>In</strong>...............................................................................78<br />

6.2.2.5 Rebuild <strong>SBR</strong> <strong>Plug</strong>-<strong>In</strong>, Copy Database................................................................................... 80<br />

7 Field Listings....................................................................................................... 82<br />

7.1 User Property Sheet................................................................................................... 82<br />

7.2 User Authorization Profiles/Attributes Window..........................................................84<br />

7.3 <strong>Digipass</strong> Property Sheet............................................................................................. 85<br />

7.4 <strong>Digipass</strong> Application Tab.............................................................................................86<br />

7.5 Policy Property Sheet................................................................................................. 87<br />

7.6 Component Property Sheet.........................................................................................94<br />

7.7 Domain Property Sheet...............................................................................................95<br />

7.8 Organizational Unit Property Sheet............................................................................ 95<br />

7.9 Data Changes Requiring a Restart.............................................................................. 96<br />

7.9.1 Changes to the Data Store..................................................................................... 96<br />

7.9.1.1 ODBC or Embedded Database............................................................................................ 96<br />

7.9.1.2 Active Directory................................................................................................................96<br />

© 2006 VASCO Data Security <strong>In</strong>c. 5

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!