Find Answers

Filter Search Results
Source:
 
Ask a Question
Example: "Database could not be verified"  
Tips | Start Over | Solutions | Alerts | Patches | Defects  
Pages [Next]
  Results
PDF Serena Release Control: SBM Plugin Quick Reference
2. On the Release Control installation of SBM, on the Authentication tab, select Single Sign-On (SSO) to manage user sessions. 3. On the Release Control installation of SBM , on the Security tab open the Secure SBM sub-tab and click Export All. 4. On the external SBM system, go to the SSO server and on the Secure SBM sub-tab, import the certificates you just exported.
PDF Serena Agile Planner Connector for SBM and Jira Installation and Configuration Guide
11. In your browser address bar, copy the ID from the end of the URL. For example, the ID is 10000 in the following URL: http://localhost:8080/ secure /admin/ EditCustomField!default.jspa?id=10000
PDF SBM JavaScript Library Guide
SecureRESTServiceWrapper is written to always use proxy ID to ensure that the REST service call is secure . This object defines the REST service to query through parameters as described in the following table.
PDF SBM Application Administrator Guide
Endpoints enable you to test a process app with one environment, perhaps on an isolated network, on a test server, and then roll out the process app to a production environment, with a more secure server. By specifying different endpoints in each of these environments, you can apply different conditions without having to edit the details of the process app workflows.
PDF SBM Application Repository Guide
Endpoints enable you to test a process app with one environment, perhaps on an isolated network, on a test server, and then roll out the process app to a production environment, with a more secure server. By specifying different endpoints in each of these environments, you can apply different conditions without having to edit the details of the process app workflows.
PDF SBM Application Repository Guide
Endpoints enable you to test a process app with one environment, perhaps on an isolated network on a test server, and then roll out the process app to a production environment, with a more secure server. By specifying different endpoints in each of these environments, you can change the service used and/or authentication information without having to edit the details of the process app workflows.
PDF SBM System Administrator Guide
4. Select the Secure check box to perform LDAP authentication via Secure Sockets Layer (SSL). If this check box is selected, the Port setting automatically changes to 636, which is the default LDAP port for SSL. You can alter this value if necessary.
PDF SBM System Administrator Guide
4. Clear the CA Certificate check box to successfully connect to the LDAP server without using the key file to make sure that you have it configured properly. 5. Select the Secure check box and browse to a valid CA Certificate. 6. Test again and it should connect successfully.
PDF SBM Application Administrator Guide
Roles can span the applications within the process app and serve two functions: • Roles are a named collection of privileges. The privileges secure user actions and data access. For example, a role named User could be a collection of privileges suitable for someone to whom items are assigned but who has no administrative
PDF SBM Application Administrator Guide
Roles can span the applications within the process app and serve two functions: • Roles are a named collection of privileges. The privileges secure user actions and data access. For example, a role named User could be a collection of privileges
Pages [Next]

Welcome kb sso

My Recent Searches

Search Feedback

Are we answering your questions?

Additional Assistance

  • Submit a Case Online
  • FAQs