In this session we looked at the architecture behind the Sametime mobile applications for chat and meetings. What do you need to deploy to support mobile users and what features are available to them on the different mobile platforms. We also looked at potential bottlenecks, security and troubleshooting for the mobile clients.
Traveler management, security and performanceGabriella Davis
Traveler is a core component of most companies’ mail infrastructure, but its maintenance and security goes far beyond Domino server management. In this session we’ll look at a Traveler environment from daily tasks to enforcing TLS and starting with understanding how Traveler behaves. We’ll review both standalone and high availability configurations and discuss common problems, as well how best to plan and design a secure and stable infrastructure.
IBM Traveler Management, Security and PerformanceGabriella Davis
Traveler is a core component of most companies’ mail infrastructure but its maintenance and security goes far beyond Domino server management. In this session we’ll look at a Traveler environment from daily tasks to enforcing TLS and starting with understanding how Traveler behaves. We’ll review both standalone and high availability configurations and discuss common problems, as well how best to plan and design a secure and stable infrastructure.
The document discusses ensuring high availability for IBM Sametime deployments. It describes how to cluster various Sametime services like instant messaging, meetings, and media services behind a load balancer. It provides tips for clustering the Sametime system console, database server, and Domino directories to maintain availability. The document emphasizes designing systems to scale for future growth and ensuring consistency across clustered servers.
Setting Up a Hybrid Domino Environment to Ease your Way to the CloudGabriella Davis
Are you looking at Cloud options and wondering how and if you can get there from where you are? If you have Domino on premises and are considering Cloud then a good option is a hybrid architecture which maintains all your on premises configuration managed by your own administrators but adds Cloud client access managed by IBM. We will look at how simple it is to create this hybrid solution using Domino passthru servers and review how things like user and directory maintenance, client access and mail routing will then work. From Domino Admin to Domino Hybrid Admin in a few simple steps.
The SSL Problem and How to Deploy SHA2 CertificatesGabriella Davis
Two years ago enabling your site with SSL was a simple affair, buy a certificate or create your own, install it, then just remember to renew it every couple of years. Then, suddenly security holes are being found in SSL virtually every month , popular browsers stop connecting to your site to protect themselves, and you’re continually being told your users data is at risk. In this session we will discuss how it all went wrong and can go wrong again, then go through each step of requesting, generating and deploying a 4096 SHA-2 certificate to use in a keyfile by Domino, IBM Connections, IBM Sametime and other WebSphere products. If you work with these IBM products and need to secure them with confidence this session will show you how!
In this recorded online session we looked at all the options to upgrade your existing Sametime environment to Sametime 9.0.1. Whether you have only a single Community server on an early Sametime version or an entire infrastructure including audio and video on 9.0 we outlined how to plan for an upgrade and the pros and cons of doing the work side by side vs in place.
Having a full set of Sametime features available on mobile devices has been a priority for IBM so if you are deploying, whether it’s the complete feature set including meetings audio and video or just instant messaging you can extend the functionality using IBM Connections Chat and IBM Connections Meetings applications which are available for most mobile platforms. In this session we will review both the backend server configuration and the features available via the mobile applications and discuss usability, bandwidth and security implications
In this session from MWLUG 2017 I introduce the concepts of containerisation and discuss Docker architecture, design, deployment considerations and risks.
Traveler management, security and performanceGabriella Davis
Traveler is a core component of most companies’ mail infrastructure, but its maintenance and security goes far beyond Domino server management. In this session we’ll look at a Traveler environment from daily tasks to enforcing TLS and starting with understanding how Traveler behaves. We’ll review both standalone and high availability configurations and discuss common problems, as well how best to plan and design a secure and stable infrastructure.
IBM Traveler Management, Security and PerformanceGabriella Davis
Traveler is a core component of most companies’ mail infrastructure but its maintenance and security goes far beyond Domino server management. In this session we’ll look at a Traveler environment from daily tasks to enforcing TLS and starting with understanding how Traveler behaves. We’ll review both standalone and high availability configurations and discuss common problems, as well how best to plan and design a secure and stable infrastructure.
The document discusses ensuring high availability for IBM Sametime deployments. It describes how to cluster various Sametime services like instant messaging, meetings, and media services behind a load balancer. It provides tips for clustering the Sametime system console, database server, and Domino directories to maintain availability. The document emphasizes designing systems to scale for future growth and ensuring consistency across clustered servers.
Setting Up a Hybrid Domino Environment to Ease your Way to the CloudGabriella Davis
Are you looking at Cloud options and wondering how and if you can get there from where you are? If you have Domino on premises and are considering Cloud then a good option is a hybrid architecture which maintains all your on premises configuration managed by your own administrators but adds Cloud client access managed by IBM. We will look at how simple it is to create this hybrid solution using Domino passthru servers and review how things like user and directory maintenance, client access and mail routing will then work. From Domino Admin to Domino Hybrid Admin in a few simple steps.
The SSL Problem and How to Deploy SHA2 CertificatesGabriella Davis
Two years ago enabling your site with SSL was a simple affair, buy a certificate or create your own, install it, then just remember to renew it every couple of years. Then, suddenly security holes are being found in SSL virtually every month , popular browsers stop connecting to your site to protect themselves, and you’re continually being told your users data is at risk. In this session we will discuss how it all went wrong and can go wrong again, then go through each step of requesting, generating and deploying a 4096 SHA-2 certificate to use in a keyfile by Domino, IBM Connections, IBM Sametime and other WebSphere products. If you work with these IBM products and need to secure them with confidence this session will show you how!
In this recorded online session we looked at all the options to upgrade your existing Sametime environment to Sametime 9.0.1. Whether you have only a single Community server on an early Sametime version or an entire infrastructure including audio and video on 9.0 we outlined how to plan for an upgrade and the pros and cons of doing the work side by side vs in place.
Having a full set of Sametime features available on mobile devices has been a priority for IBM so if you are deploying, whether it’s the complete feature set including meetings audio and video or just instant messaging you can extend the functionality using IBM Connections Chat and IBM Connections Meetings applications which are available for most mobile platforms. In this session we will review both the backend server configuration and the features available via the mobile applications and discuss usability, bandwidth and security implications
In this session from MWLUG 2017 I introduce the concepts of containerisation and discuss Docker architecture, design, deployment considerations and risks.
The document provides an overview of the key components in a Sametime audio and video architecture: Proxy Registrar, Conference Manager, Video Manager, Video MCU, SIP Edge Proxy, TURN server, and client behavior. It discusses the installation order, configuration of elements like the Video Manager, and considerations for deploying audio and video capabilities for internal and external users.
This document provides information about becoming an IBM Connections administrator. It discusses the wide range of skills and technologies required, including CSS, Java, LDAP, databases, IBM HTTP Server configuration, and WebSphere administration. It emphasizes planning resources, verifying configurations, backing up data, monitoring logs, and following documentation to install, customize, and maintain Connections successfully.
Integrated Web Authentication (IWA) allows automatic authentication between Microsoft clients and servers. IWA uses SPNEGO to negotiate Kerberos or NTLM authentication protocols. Configuring IWA for Domino requires setting up Service Principal Names (SPNs) in Active Directory for Domino hostnames, configuring Domino to start as an Active Directory service account, and configuring browser settings for supported browsers. Troubleshooting may involve checking SPN and account configuration or debugging HTTP authentication with Domino.
Presentation on building Sametime 9.0.1 step by step from Domino server through to SSC, Sametime Proxy and SSL configuration. Given at IBM Connect 2014 with Paul Mooney SHOW401
Planning and Completing an IBM Connections UpgradeGabriella Davis
So you have IBM Connections installed, but now you need to decide what and when to update. It could be a WebSphere fix or a DB2 fixpack, a new application, a database schema or an entirely new version. Some updates are for security, some for performance and some for new features. In this session we'll discuss how you can decide when and what to upgrade, how to plan for and perform a safe upgrade regardless of its size, and test when it’s complete. We’ll also discuss what things can trip you up along the way.
A Technical Guide To Deploying Single Sign OnGabriella Davis
This document provides instructions for configuring different single sign-on options for IBM Notes clients, including Notes Shared Logon, LDAP authentication, Kerberos/SPNEGO/IWA, and SAML. It describes what each option does, examples of how it works, and requirements to set it up. SAML provides single sign-on across multiple systems using a centralized identity provider, but has more complex setup involving configuring identity providers, service providers, certificates, and policies in both Active Directory and Domino.
What We Wish We Had Known: Becoming an IBM Connections AdministratorGabriella Davis
Presentation on IBM Connections given by Gab Davis and Paul Mooney at IBM Connect 2014. In this session we shared our experiences of Connections as administrators and what we feel is useful information for every admin to know.
Inform2015 - What's New in Domino 9 & 9.0.1 for AdminsJared Roberts
The document discusses new features in IBM Domino 9 and 9.0.1, including improvements to the Database Management Tool (DBMT) for automating database maintenance tasks. DBMT allows administrators to compact databases, purge deletion stubs, expire soft deletes, and perform other maintenance without interrupting users. It can run maintenance tasks in parallel and ensure tasks are completed even if they exceed allocated time frames. The document also covers new options for DBMT related to mail file compaction and delivery failover in clustered environments.
1084: Planning and Completing an IBM Connections UpgradeGabriella Davis
So we have IBM Connections installed, but now it’s time to consider what and when to update. It could be a WebSphere fix or a DB2 fixpack, a new application, or database scheme. Some updates are for security, some for performance and some for new features. In this session we'll discuss how you can decide when and what to upgrade, how to plan for and perform a safe upgrade, test when it’s complete and what things can trip you up along the way. All of this is based on lessons learned over hundreds of deployments.
HCL Domino V12 Key Security Features Overview hemantnaik
Domino 12 introduces several new security features, including improved TLS certificate management, enforcement of internet password lockouts based on IP address, and support for forward secrecy in NRPC encryption and TLS 1.2 ciphers using new elliptic curves. A new Certificate Manager server task automates requesting, configuring, and renewing certificates from Let's Encrypt to improve certificate management. Internet password lockouts can now be enforced based on failed login attempts from IP addresses. NRPC encryption and TLS 1.2 ciphers add support for forward secrecy using the X25519 curve for improved security of long-term secrets.
Planning & Completing An IBM Connections UpgradeGabriella Davis
Presentation from ICON UK in London Sept 2015 on approaches to upgrading IBM Connections whether it's a WebSphere iFix, TDI, DB2 or the Connections applications themselves
The document summarizes various commands that can be used to monitor and manage the IBM Notes Traveler server. It provides details on basic commands like load traveler, tell traveler status, tell traveler stat show, which can be used to check the status and health of the traveler server. It also describes commands for monitoring memory usage, threads, and device syncs. The document provides best practices for optimizing and troubleshooting the traveler server.
Domino Security - not knowing is not an option - MWLUG 2015Darren Duke
There have been a ton of changes to Domino security over the past few months. See what they are, why you need them and how to implement them, including but not limited to: SSL/TLS Notes port encryption reverse proxies SHA2 certificates SAML/NFL Perfect Forward Secrecy Learn. Implement. Sleep well.
From IBM Connected 2015
Connections 5 introduces us to a new model of access - the external user. Originally designed to have limited rights within your Connections environment, the security surrounding external user access is deliberately very restrictive. To achieve appropriate access for the external user, we must tell Connections how to identity an external user by flagging either an LDAP attribute or a new LDAP source. In this session we’ll discuss the options for external user configuration, how to manage registration and passwords as well as how everyone in your Connections world can work together.
What's New in Notes, Sametime and Verse On-PremisesGabriella Davis
This document provides a summary of new features in IBM Notes, Sametime, and Verse on-premises in version 10:
- IBM Notes version 10 includes upgrades to Eclipse/OSGI to version 4.6.2, embeds Sametime version 9.0.1x, allows compiling to Java 1.8, includes an add-on installer for CCM, and addresses some defects.
- Sametime is upgraded to version 9.0.1x when IBM Notes is upgraded to version 10. Administrators must manually update Sametime configuration if it was previously modified.
- New features in IBM Notes version 10 include the ability to send email in EML format, improved send mail
Open mic IBM Sametime 9 limited use serverRanjit Rai
This document provides instructions for deploying IBM Sametime 9 Limited Use. It discusses what the limited use entitlement allows, prerequisites for upgrade and deployment, and step-by-step instructions for installation and configuration. Key steps include installing Sametime Community Server, DB2, WebSphere Application Server, and Sametime System Console. The Sametime Community Server is configured to connect to the native Domino directory or an LDAP server. The Sametime System Console manages policies and settings.
SYN224: Best practices for migrating from Web Interface to StoreFront ServicesCitrix
This document discusses migrating from Citrix Web Interface (WI) to Citrix StoreFront. WI is over 15 years old and its code base has become difficult to maintain and update. StoreFront offers improvements in areas like pass-through authentication, application provisioning and hiding, and customization capabilities. The document recommends testing the migration, running a pilot group, and then fully migrating users. It covers deployment considerations for StoreFront like the different deployment modes, high availability using a server group, and how StoreFront handles remote access differently than WI.
This document discusses how VDI-in-a-Box can be used to deliver applications and desktops in small business scenarios. It provides steps to set up a VDI-in-a-Box server with Remote Desktop Services, Hyper-V, and RemoteApp capabilities. Problem applications can be hosted on pooled desktops using RemoteApp for Hyper-V as a lighter-weight alternative to full virtual desktops. The document aims to help IT professionals right-size application delivery based on user needs.
The document provides an overview of the key components in a Sametime audio and video architecture: Proxy Registrar, Conference Manager, Video Manager, Video MCU, SIP Edge Proxy, TURN server, and client behavior. It discusses the installation order, configuration of elements like the Video Manager, and considerations for deploying audio and video capabilities for internal and external users.
This document provides information about becoming an IBM Connections administrator. It discusses the wide range of skills and technologies required, including CSS, Java, LDAP, databases, IBM HTTP Server configuration, and WebSphere administration. It emphasizes planning resources, verifying configurations, backing up data, monitoring logs, and following documentation to install, customize, and maintain Connections successfully.
Integrated Web Authentication (IWA) allows automatic authentication between Microsoft clients and servers. IWA uses SPNEGO to negotiate Kerberos or NTLM authentication protocols. Configuring IWA for Domino requires setting up Service Principal Names (SPNs) in Active Directory for Domino hostnames, configuring Domino to start as an Active Directory service account, and configuring browser settings for supported browsers. Troubleshooting may involve checking SPN and account configuration or debugging HTTP authentication with Domino.
Presentation on building Sametime 9.0.1 step by step from Domino server through to SSC, Sametime Proxy and SSL configuration. Given at IBM Connect 2014 with Paul Mooney SHOW401
Planning and Completing an IBM Connections UpgradeGabriella Davis
So you have IBM Connections installed, but now you need to decide what and when to update. It could be a WebSphere fix or a DB2 fixpack, a new application, a database schema or an entirely new version. Some updates are for security, some for performance and some for new features. In this session we'll discuss how you can decide when and what to upgrade, how to plan for and perform a safe upgrade regardless of its size, and test when it’s complete. We’ll also discuss what things can trip you up along the way.
A Technical Guide To Deploying Single Sign OnGabriella Davis
This document provides instructions for configuring different single sign-on options for IBM Notes clients, including Notes Shared Logon, LDAP authentication, Kerberos/SPNEGO/IWA, and SAML. It describes what each option does, examples of how it works, and requirements to set it up. SAML provides single sign-on across multiple systems using a centralized identity provider, but has more complex setup involving configuring identity providers, service providers, certificates, and policies in both Active Directory and Domino.
What We Wish We Had Known: Becoming an IBM Connections AdministratorGabriella Davis
Presentation on IBM Connections given by Gab Davis and Paul Mooney at IBM Connect 2014. In this session we shared our experiences of Connections as administrators and what we feel is useful information for every admin to know.
Inform2015 - What's New in Domino 9 & 9.0.1 for AdminsJared Roberts
The document discusses new features in IBM Domino 9 and 9.0.1, including improvements to the Database Management Tool (DBMT) for automating database maintenance tasks. DBMT allows administrators to compact databases, purge deletion stubs, expire soft deletes, and perform other maintenance without interrupting users. It can run maintenance tasks in parallel and ensure tasks are completed even if they exceed allocated time frames. The document also covers new options for DBMT related to mail file compaction and delivery failover in clustered environments.
1084: Planning and Completing an IBM Connections UpgradeGabriella Davis
So we have IBM Connections installed, but now it’s time to consider what and when to update. It could be a WebSphere fix or a DB2 fixpack, a new application, or database scheme. Some updates are for security, some for performance and some for new features. In this session we'll discuss how you can decide when and what to upgrade, how to plan for and perform a safe upgrade, test when it’s complete and what things can trip you up along the way. All of this is based on lessons learned over hundreds of deployments.
HCL Domino V12 Key Security Features Overview hemantnaik
Domino 12 introduces several new security features, including improved TLS certificate management, enforcement of internet password lockouts based on IP address, and support for forward secrecy in NRPC encryption and TLS 1.2 ciphers using new elliptic curves. A new Certificate Manager server task automates requesting, configuring, and renewing certificates from Let's Encrypt to improve certificate management. Internet password lockouts can now be enforced based on failed login attempts from IP addresses. NRPC encryption and TLS 1.2 ciphers add support for forward secrecy using the X25519 curve for improved security of long-term secrets.
Planning & Completing An IBM Connections UpgradeGabriella Davis
Presentation from ICON UK in London Sept 2015 on approaches to upgrading IBM Connections whether it's a WebSphere iFix, TDI, DB2 or the Connections applications themselves
The document summarizes various commands that can be used to monitor and manage the IBM Notes Traveler server. It provides details on basic commands like load traveler, tell traveler status, tell traveler stat show, which can be used to check the status and health of the traveler server. It also describes commands for monitoring memory usage, threads, and device syncs. The document provides best practices for optimizing and troubleshooting the traveler server.
Domino Security - not knowing is not an option - MWLUG 2015Darren Duke
There have been a ton of changes to Domino security over the past few months. See what they are, why you need them and how to implement them, including but not limited to: SSL/TLS Notes port encryption reverse proxies SHA2 certificates SAML/NFL Perfect Forward Secrecy Learn. Implement. Sleep well.
From IBM Connected 2015
Connections 5 introduces us to a new model of access - the external user. Originally designed to have limited rights within your Connections environment, the security surrounding external user access is deliberately very restrictive. To achieve appropriate access for the external user, we must tell Connections how to identity an external user by flagging either an LDAP attribute or a new LDAP source. In this session we’ll discuss the options for external user configuration, how to manage registration and passwords as well as how everyone in your Connections world can work together.
What's New in Notes, Sametime and Verse On-PremisesGabriella Davis
This document provides a summary of new features in IBM Notes, Sametime, and Verse on-premises in version 10:
- IBM Notes version 10 includes upgrades to Eclipse/OSGI to version 4.6.2, embeds Sametime version 9.0.1x, allows compiling to Java 1.8, includes an add-on installer for CCM, and addresses some defects.
- Sametime is upgraded to version 9.0.1x when IBM Notes is upgraded to version 10. Administrators must manually update Sametime configuration if it was previously modified.
- New features in IBM Notes version 10 include the ability to send email in EML format, improved send mail
Open mic IBM Sametime 9 limited use serverRanjit Rai
This document provides instructions for deploying IBM Sametime 9 Limited Use. It discusses what the limited use entitlement allows, prerequisites for upgrade and deployment, and step-by-step instructions for installation and configuration. Key steps include installing Sametime Community Server, DB2, WebSphere Application Server, and Sametime System Console. The Sametime Community Server is configured to connect to the native Domino directory or an LDAP server. The Sametime System Console manages policies and settings.
SYN224: Best practices for migrating from Web Interface to StoreFront ServicesCitrix
This document discusses migrating from Citrix Web Interface (WI) to Citrix StoreFront. WI is over 15 years old and its code base has become difficult to maintain and update. StoreFront offers improvements in areas like pass-through authentication, application provisioning and hiding, and customization capabilities. The document recommends testing the migration, running a pilot group, and then fully migrating users. It covers deployment considerations for StoreFront like the different deployment modes, high availability using a server group, and how StoreFront handles remote access differently than WI.
This document discusses how VDI-in-a-Box can be used to deliver applications and desktops in small business scenarios. It provides steps to set up a VDI-in-a-Box server with Remote Desktop Services, Hyper-V, and RemoteApp capabilities. Problem applications can be hosted on pooled desktops using RemoteApp for Hyper-V as a lighter-weight alternative to full virtual desktops. The document aims to help IT professionals right-size application delivery based on user needs.
How long does it really take to install and configure IBM Connections - 99% of your time is taken up by waiting for things to install.
In this 45 minute presentation everything you need to know about installing and configuring your first connections install
WinConnections Spring, 2011 - How to Securely Connect Remote Desktop Services...Concentrated Technology
“The Cloud” is everywhere, but did you know that creating your own everywhere accessible cloud applications isn’t difficult. All you need are some certificates and Microsoft’s Remote Desktop Services. Greg Shields is a Microsoft MVP in RDS, and he’s got the step-by-step solution for cloud-enabling your applications. Join him in this session to learn exactly how you’ll securely extend your applications to everywhere with an Internet connection. Your boss and your users will love you for it.
Learn to Add an SSL Certificate Boost Your Site's Security.pdfReliqusConsulting
Enhance your website's security with Reliqus Consulting's simple guide on how to install an SSL certificate. Our step-by-step instructions make it easy for anyone to boost their site's protection. Learn the importance of SSL certificates and follow our user-friendly process to ensure a secure connection for your visitors. Safeguard sensitive data and build trust with your audience by implementing this crucial security measure.
Web375 course project web architecture plan for the de vry daily tribune new...bestwriter
The DeVry Daily Tribune is merging two newspaper companies and needs a new secure web architecture. The student is to design the architecture and provide step-by-step instructions for setting up: an email server, secure and anonymous FTP servers, a LAMP stack, firewalls, DHCP server and DNS. The architecture must support 100 employees accessing email, photographers uploading images securely, public downloading photos, and reporters submitting stories through a dynamic website. The instructions will be given to the newspaper's system administrator to implement.
This document discusses 15 common interview questions asked about VMware technology. It provides answers to each question, describing key VMware concepts like virtualization, hypervisors, virtual machines, networking and security. Example questions cover the benefits of virtualization, types of virtualization, virtual machine migration, VMware tools, templates vs clones, vCenter security and more. The document aims to help candidates prepare for VMware technical interviews.
- Jaydeep Choudhari has over 6 years of experience in hardware, networking, server management, and virtualization. He has expertise in managing virtual servers using Microsoft Hyper-V and VMware vSphere, and installing and configuring servers from HP and Dell.
- Some of his key responsibilities include managing Active Directory, DNS, DHCP, and file/print servers, performing system backups with Symantec NetBackup, and addressing hardware or service issues.
- He has a degree in commerce from the University of Mumbai and holds several IT certifications, including MCSA, VCP, and ITIL.
This document provides a quick-start guide for installing and configuring Cloudtenna DirectShare, a file sharing and collaboration solution. It outlines the necessary pre-installation information, steps for deploying the DirectShare virtual appliance using VMware ESXi, and configuring the appliance through its GUI to integrate with Active Directory, set up file shares, and enable guest access and shared links. The guide is intended to help users get DirectShare set up and operational in their environment for secure external file sharing and collaboration.
Mobile crm installation & configuration detailsArbind Tiwari
This document provides instructions for installing and configuring the CWR Mobile CRM server to allow access to a Dynamics CRM environment from mobile devices. It discusses prerequisites, terminology, configuration options for single or multi-server setups, and the step-by-step process for installing the server files, configuring the website and database settings, and finishing the configuration. It also covers additional configuration steps needed for IFD and online installations and provides a brief overview of the CWR Mobile CRM Express Edition product.
VDI allows organizations to virtualize desktops by running them as virtual machines on centralized servers rather than individual physical machines. The document discusses implementing a VDI solution for the City of Hallandale Beach. It estimates that deploying an initial 50 VDIs would cost around $90,000, with additional costs to scale up to 350 VDIs. While VDI provides benefits like easier management and mobility, the costs include new storage, software licenses, thin clients, and implementation fees. ROI is not expected until year 5 due to upfront infrastructure investment.
VDI-in-a-Box: Microsoft Desktop Virtualization for Smaller Businesses and UsesConcentrated Technology
Today’s talk about VDI centers around deploying hundreds or thousands of desktops. But sometimes you just want access for a few people and a few applications. Or, you just can’t afford big-budget solutions. Have you tried Microsoft Hyper-V and RDS? Combining these two tools, a sufficiently-powerful server, and the information in this session, you’ll quickly build a single-server VDI solution for just those small needs. Join RDS MVP Greg Shields for a look at the very small in VDI. He’ll show you how to get started on the most micro of budgets, and send you home with the exact click-by-click to begin hosting your own virtual desktops.
This document provides instructions for installing prerequisites for Windows SharePoint Services (WSS) version 3. It discusses creating a self-signed SSL certificate, installing .NET Framework 3, Microsoft SQL Server Management Studio Express, and determining if an existing SharePoint instance has been upgraded from the Windows internal database to SQL Server. The document also covers disabling full-text search in WSS version 2 and configuring Windows 2008 for WSS version 3.
Mobile frame getting started guide v5 0MobileWorxs
Before using MobileFrame you need to install it. This guide helps you understand thr prerequisites, install options and installation instructions for various componants that make up the MobileFrame suite.
Windows Small Business Server "Aurora" is a new edition of Windows Small Business Server that introduces cross-premise functionality, providing small businesses with on-premise file and print, security, backup, remote access, and identity management services, combined with optional off-premise services.
This document summarizes a presentation on understanding virtualization's role in auditing and security. It begins with introducing the speaker, Greg Shields, and his background and expertise in virtualization. It then discusses some key points about virtualization including what it is, what it does by virtualizing computer resources like memory, processors, network cards and disks, and some of the problems it can help solve like disaster recovery and server consolidation. It also discusses the seven elements of a successful virtualization architecture including recognizing hype, doing an assessment of your environment, purchase and implementation, physical to virtual conversions, high availability, backups, virtualizing desktops, and disaster recovery implementation.
Cloud Based Dev/Test Environments for .NET and SharePoint Using CloudShareJohn Calvert
Cloud-based platform and software environments are a hot topic these days. Why bother hosting, managing and licensing VMs and software for your development projects and test labs when the VMs are often only required for a few months or a year. Explore the possibilities with CloudShare for your .NET and SharePoint development environment and tools.
- Abhay Rastogi is a consultant at Capgemini seeking new opportunities. He has over 2.7 years experience as a Linux administrator working in production environments providing on-call support.
- He has a B.Tech in Information Technology and is trained in RHEL 6, 7, VMware administration, ITIL, and MCSA. His technical skills include Linux, Windows, networking, backups, virtualization, and more.
- Currently he works as a consultant at Capgemini for clients like Saint Gobain and Honeywell, serving as a Linux and UNIX system administrator level 2 performing tasks like patching, firewall management, storage administration, troubleshooting, and more.
This document provides an overview of Sametime administration from the perspective of server setup, user administration, and policies. It discusses key topics like server deployment order, LDAP configuration, port usage, buddylist conversion, standalone vs embedded clients, plugin customization, and managing settings through policies and files. Administrative tools like the Sametime Console and WAS management are also covered at a high level.
Similaire à Working With Sametime For Mobile Devices (20)
If you are a Domino Administrator in any size company you already have a range of skills that make you an expert administrator across many platforms and technologies.
In this session Gab explains how to apply those skills and that knowledge to take your career wherever you want to go.
Presentation from Engage 2022 in Bruges
From day to day administration to advanced configuration from automated maintenance to running the best multi client mail server on the market, from advanced security to data access.
. Design Decisions: Developing for Mobile - The Template Experience ProjectGabriella Davis
HCL Nomad allows us to access our Notes applications on tablet and mobile. Currently available for iOS the team behind Template Experience have been working with HCL development and UI design to redesign the standard discussions template for Notes and produce a whitepaper based on that work to assist you with your own mobile development. The beta of that template and whitepaper have now been published and this presentation accompanies that work
Domino Server Health - Monitoring and ManagingGabriella Davis
This document provides information on monitoring and managing Domino server health. It discusses analyzing and maintaining Domino server logs, using log filters, and analyzing log results. It also covers monitoring message tracking, mail probes, statistics, events, activity trends, and configuring the New Relic reporting tool. The document discusses database maintenance tasks like compacting and fixing up databases. It also discusses using the Domino Configuration Tuner tool and leveraging cluster symmetry and automatic database repairs.
How do Exchange on premises and the various Outlook clients line up against Domino on premises and its clients? In this session we'll look at the configuration options and management interfaces for each server as well as the client options and client behaviours. We'll also discuss the general ecosystems, considerations for migrating or co-existing and lessons learned. A great session for Domino admins who want to know more about the other side.
Presented at Engage.ug in Brussels May 2019
Admin Tips In 60 Minutes
In this high speed session I take you through the best admin tips for Domino, Notes, Sametime, Traveler and more. From notes.ini values, to server configuration settings and valuable customisations.
Some tips will be new to v10 and some have been around but rarely used for years.
Whatever your experience there will be something new for you to take away and enjoy.
Presented at Engage.ug in Brussels May 2019
Adminlicious - A Guide To TCO Features In Domino v10Gabriella Davis
With v10 of EVERYTHING due out in Q4 and the public beta now available it’s time to talk about what we know is coming and how to plan for upgrades. In this session I show the features I'm most inspired by (NDAs allowing!) talk about how I'm getting ready and why this is a really exciting time to be an admin!
An Introduction to Configuring Domino for DockerGabriella Davis
You may know that docker is a container solution but what does that mean and how could it affect your Domino infrstructure? In this session I will explain what Docker may offer, highlight the decisions to consider when designing container architecture , how to construct a container, how to install and run Domino inside one and discuss options for clustering. Is Docker for you?
Presented at CollabSphere 2018 in Ann Arbor, MI
An Introduction To The DMARC SMTP Validation RequirementsGabriella Davis
DMARC is a SMTP security standard being increasingly requested by customers to protect against email spoofing. It uses a combination of SPF (Sender Policy Framework) records and DKIM (DomainKeys Identified Mail). Using DMARC you would publicly specify how your outbound mail is sent and the receiving server would verify that the mail it receives matches your requirements. In this session we’ll discuss DMARC deployments and what to do if your mail server (like IBM Domino or SmartCloud) does not yet support DKIM?
Presented at Collabsphere 2018 in Ann Arbor, MI
× The Road To A #Perfect10 - How To Get Ready For Domino, Sametime, VOP and T...Gabriella Davis
Later this year HCL will be releasing the first major updates for Domino, Sametime, Traveler and Verse on Premises for several years. We've already heard about developments on the way such as a Notes client for tablet and phone as well as structural changes like the removal of the 64GB file limit. The more up to date and well designed your infrastructure is, the easier these upgrades are going to be so In this session Gab will explain how to audit, evaluate and fix your environment as well as what changes you can (and should) do in preparation so you can be fast to move when the products arrive..
Presented At CollabSphere 2018 in Ann Arbor, MI
An introduction to configuring Domino for DockerGabriella Davis
9.0.1 FP10 brings support for Domino on a docker platform. You may know that docker is a container solution but what does that mean and how could it affect your Domino infrstructure? In this session we'll review how to install and run Domino in a docker container, whether it can support external clustering and the decisions to consider when designing container architecture.
In this session, presented as a workshop outline, we will walk you through your GDPR responsibilities and how to assess your risk. We’ll give some recommendations on high priority but easy to fix issues and how to discover, secure and take ownership of existing data. At the end of the session we will share the workshop outline to help with your own planning.
Prepared for Social Connections 13 in Philadelphia April 2018
An Introduction To The DMARC SMTP Validation RequirementsGabriella Davis
Presented at Social Connections 13 in Philadelphia April 2018.
DMARC is a SMTP security standard being increasingly requested by customers to protect against email spoofing. It uses a combination of SPF (Sender Policy Framework) records and DKIM (DomainKeys Identified Mail). Using DMARC you would publicly specify how your outbound mail is sent and the receiving server would verify that the mail it receives matches your requirements. In this session we’ll discuss DMARC deployments and what to do if your mail server (like IBM Domino or SmartCloud) does not yet support DKIM?
In this session presented during Community Day at IBM Think, Gabriella Davis discusses the importance of a personal brand, why you have one, how to create one and how to move your brand to a new space.
A Guide To Single Sign-On for IBM Collaboration SolutionsGabriella Davis
Single sign-on, single identity and even password synchronization—in this session, we will take you through all the options available to minimize or eradicate logins across IBM's Collaboration Solutions (ICS); whether it is a Domino web server, IHS, Notes client, Traveler, Sametime, Connections or Verse, on-premises or cloud. The discussion will cover security certificates, password synchronization, IWA, SPNEGO and SAML Federation. We will explain what you can (and can't) do, and how to do it. Presented at Think 2018
The document discusses the Imposter Syndrome and provides tips to help deal with its effects. It explains that Imposter Syndrome causes people to feel like frauds and have doubts about their abilities, even when successful. It recommends challenging yourself with difficult tasks, admitting what you don't know, talking to others about feelings of inadequacy, praising others' work, and writing down accomplishments to build confidence and overcome imposter feelings.
In this session we introduce administrators to the concepts of Docker and discuss architectural decisions that will come into play when deploying containers. Although this session was originally presented as part of IBM's New Way To Learn initiative it does not discuss any specific aspects of IBM technology
Presentation from IBM InterConnect in Las Vegas March 2017.
Enabling Internet of Things (IoT) so your employees and your customers can have a simplified experience with new services and products sounds exciting. In this session, we will dig into the top ten risks that come with the IoT experience. Due to the rapidly evolving nature of IoT and associated threats, there are risks in allowing access to your enterprise resources. Custom firmware, embedded operating systems and wi-fi connectivity of IoT devices offer many possible areas for exploits and misuse. Come explore current security offerings and get a first look at best practices. Walk away with an immediate checklist to benefit your enterprise as it deploys and offers IoT access.
Benefits and Risks of a Single Identity - IBM Connect 2017Gabriella Davis
What is valuable about a single identity, why is that something people want and how achievable is it? As people work across multiple systems they encounter an equal number of barriers where they must authenticate or otherwise prove their identity in order to gain access. Ideally we always want to be showing the same information about ourselves regardless of where someone searches or how we are found. In this session we’ll discuss the issues behind both creating a single identity and simplifying authentication. We’ll also review the risks you need to be aware of, the technologies available to you and the importance of good and current personal information.
This is an updated presentation that includes some speaker notes for clarity
E-Invoicing Implementation: A Step-by-Step Guide for Saudi Arabian CompaniesQuickdice ERP
Explore the seamless transition to e-invoicing with this comprehensive guide tailored for Saudi Arabian businesses. Navigate the process effortlessly with step-by-step instructions designed to streamline implementation and enhance efficiency.
Using Query Store in Azure PostgreSQL to Understand Query PerformanceGrant Fritchey
Microsoft has added an excellent new extension in PostgreSQL on their Azure Platform. This session, presented at Posette 2024, covers what Query Store is and the types of information you can get out of it.
Most important New features of Oracle 23c for DBAs and Developers. You can get more idea from my youtube channel video from https://youtu.be/XvL5WtaC20A
What to do when you have a perfect model for your software but you are constrained by an imperfect business model?
This talk explores the challenges of bringing modelling rigour to the business and strategy levels, and talking to your non-technical counterparts in the process.
Malibou Pitch Deck For Its €3M Seed Roundsjcobrien
French start-up Malibou raised a €3 million Seed Round to develop its payroll and human resources
management platform for VSEs and SMEs. The financing round was led by investors Breega, Y Combinator, and FCVC.
Mobile App Development Company In Noida | Drona InfotechDrona Infotech
Drona Infotech is a premier mobile app development company in Noida, providing cutting-edge solutions for businesses.
Visit Us For : https://www.dronainfotech.com/mobile-application-development/
Top Benefits of Using Salesforce Healthcare CRM for Patient Management.pdfVALiNTRY360
Salesforce Healthcare CRM, implemented by VALiNTRY360, revolutionizes patient management by enhancing patient engagement, streamlining administrative processes, and improving care coordination. Its advanced analytics, robust security, and seamless integration with telehealth services ensure that healthcare providers can deliver personalized, efficient, and secure patient care. By automating routine tasks and providing actionable insights, Salesforce Healthcare CRM enables healthcare providers to focus on delivering high-quality care, leading to better patient outcomes and higher satisfaction. VALiNTRY360's expertise ensures a tailored solution that meets the unique needs of any healthcare practice, from small clinics to large hospital systems.
For more info visit us https://valintry360.com/solutions/health-life-sciences
How Can Hiring A Mobile App Development Company Help Your Business Grow?ToXSL Technologies
ToXSL Technologies is an award-winning Mobile App Development Company in Dubai that helps businesses reshape their digital possibilities with custom app services. As a top app development company in Dubai, we offer highly engaging iOS & Android app solutions. https://rb.gy/necdnt
Transform Your Communication with Cloud-Based IVR SolutionsTheSMSPoint
Discover the power of Cloud-Based IVR Solutions to streamline communication processes. Embrace scalability and cost-efficiency while enhancing customer experiences with features like automated call routing and voice recognition. Accessible from anywhere, these solutions integrate seamlessly with existing systems, providing real-time analytics for continuous improvement. Revolutionize your communication strategy today with Cloud-Based IVR Solutions. Learn more at: https://thesmspoint.com/channel/cloud-telephony
Unveiling the Advantages of Agile Software Development.pdfbrainerhub1
Learn about Agile Software Development's advantages. Simplify your workflow to spur quicker innovation. Jump right in! We have also discussed the advantages.
Oracle Database 19c New Features for DBAs and Developers.pptx
Working With Sametime For Mobile Devices
1. New Way To Learn
Deploying Instant
Messaging For Mobile
Devices
Gabriella Davis
Technical Director
The Turtle Partnership
gabriella@turtlepartnership.com
4. DB2
❖ Licensed as part of Sametime Communicate or Complete
❖ Used to store data for the Apple push notification activity
❖ If you aren’t using iOS devices then the DB2 database
for STProxy isn’t being used
❖ In default mode when coming out of the IM or
Meeting application on iOS it is remains backgrounded
and you remain logged in and available to other users
❖ Backgrounding can be disabled as a server setting
5. Sametime System Console
❖ The SSC is used to manage all the Sametime
components
❖ It must be aware of all servers in order to integrate
their services
❖ It also manages all policies
❖ A Sametime Proxy server doesn’t have to be installed as
part of the SSC Cell
6. Domino
❖ Sametime 9.0.1 still requires Domino and is still a 32bit application
❖ You must first install Domino before you can install the 32bit
Community Server using it
7. Community Server
❖ Installs on top of Domino
❖ Is a subtask of the HTTP server
❖ load staddin
❖ Create a deployment plan in the SSC and install using that so it’s federated
❖ All the other servers need to know about it
❖ Using Domino’s proprietary directory standard is no longer support for any
components, you must use LDAP
❖ Using Domino as LDAP is supported
8. Sametime Proxy Server
❖ The Sametime Proxy server is a HTTP proxy which connects to the
Sametime Community Server
❖ By default it will attempt to consume any server in the domain
❖ Any server document with “Is Sametime Server” set to “yes”
❖ The Sametime Proxy server is used by
❖ Web clients
❖ Web meetings
❖ Mobile applications
❖ Awareness in applications
❖ Connections integration
9. Sametime System Console
Deployment Plan
Sametime Server
Server Configuration
Server Policies
DB2
SSC Policies (STSC)
STProxy for iOS push
Sametime Proxy Server
Web Proxy
Sametime Community
Server
Client Mobile Request
Request access for chat or
meetings over port 443
Request is passed to the
Community server for
validation
LDAP Server Community server
authenticates credentials
Policies are applied
Policies are read
Mobile Access Architecture
10. Client
Mobile
Request
InternalMobile DMZ
DB2
SSC Policies (STSC)
STProxy for iOS push
Sametime System Console
Deployment Plan
Sametime Server
Server Configuration
Server Policies
LDAP Server
Sametime Community Server
Sametime Proxy
Server
Request is passed
to the Community
server for validation
Community server authenticates
credentials
443
1516
Mobile Access and Security
12. Create A Proxy Database
❖ Create a DB2 database to be used by iOS applications
❖ createProxyDb STPROXY db2admin
script to create the database
database schema
13. It can take a few minutes
to run but when complete
you should see this
message
14. Add It To The SSC
db2 server
hostname & port
Newly created db
name
stdb.turtlehost.net
23. If this page opens
successfully you have
confirmed the routing from
SSC to Proxy
24. Installing Standalone
❖ The Sametime Proxy server can only be federated into
the SSC as a single cluster
❖ When WAS servers are clustered horizontally with a
primary and several secondary nodes , they are all
considered “equal”
❖ Horizontal clusters are not suitable if you want to
manage access by location
25. Virtual Hosts
❖ Create a specific virtual host for all the hostname:port
combinations your Sametime Proxy Server will use
❖ These should be unique within your cell as they tell WebSphere
how to route traffic to the application
❖ avoid using wildcard hostnames
application
ports
26. Mapping Virtual Hosts
❖ Once our virtual host is created we need to map the modules
associated with the application to use it instead of “default_host”
27. Proxy Server Configuration
how a web
meeting is started.
Servers should share a
LtpaToken
specific
community clusters by
name to use or specific
community servers
31. Meeting Server Configuration
❖ There are additional settings that can be force users to
upgrade their mobile clients if they are using versions
older than X
❖ That’s a very specific, and potentially painful, admin
use case
❖ mobile.Android.currentVersion / mobile.Android.minVersion
❖ mobile.iOS.currentVersion / mobile.iOS.minVersion
32. Clustering
❖ Each cluster must be managed by a deployment manager
❖ That deployment manager can be, but does not have to be, the SSC
❖ There can be only one primary node in a cluster
❖ Deployment plans can only be created for one cluster of Sametime
Proxy Servers
❖ but a different cluster can be added manually
❖ Servers in the same cluster are considered the same for serving user
requests and users could be directed to any available member
34. Reverse Proxies
❖ A reverse or authenticating proxy can provide secure
access through a DMZ to your meeting servers
❖ For larger deployments you may want to keep the
Sametime Proxy and Meeting Servers on the internal
network and use a reverse proxy in the DMZ
❖ These proxies will authenticate with the LDAP servers
directly before passing the authorisation through to the
application servers
35. Deploying A SSL Certificate
❖ Never deploy to mobile clients without SSL
❖ A trusted SSL certificate is particularly important when
deploying mobile clients
❖ Both the Chat and Meeting applications allow users to
accept untrusted SSL certificates
❖ You can turn that off in the server configuration
❖ Replace the installed internal SSL certificate with one
you have purchased
36. Adding A New SSL Certificate
❖ Under Security - SSL Certificates and Key Management
❖ We want to import the trusted roots of the CA into the Trust Store
❖ In this example GoDaddy suppled a CRT bundle that I simply “Added”
37. Adding A New SSL Certificate
❖ I then had the IBM signer created during install and the
GoDaddy signer that will be used to create my certificate
38. Creating A CSR
❖ The simplest method of getting a certificate into WebSphere is to create the CSR
there
❖ Then you can simple “receive” the new certificate into the DefaultKeyStore
BEWARE!!
39. Adding A Personal Certificate
❖ If you can’t do that, then a P12 works well
❖ You must have the private key component of the
certificate you want to add
40. Replacing The Default Certificate
❖ In my environment I have purchased a wildcard turtlehost.net certificate I want each
server to use
❖ Rather than individually change each server, I can replace the default certificate with
my new wildcard once it’s imported
❖ Select the “default” certificate and choose “Replace”
41. Or..Apply To EndPoints
❖ If I want to apply different certificates to different servers
I can do this by mapping the server endpoints to each one
42. You MUST map both the inbound and outbound
endpoints , sync and restart the servers
43. Beware! 4096 Certificates
❖ WebSphere Application Server does not support 4096
certificates out of the box
❖ Previously if you attempted to add one you would get
an error “RSA Premaster Secret” and it would refuse to
add
❖ Now you don’t get the error, it does add
❖ It just doesn’t work
❖ There’s an easy fix
44. Unrestricted Java Policy Files
❖ Downloaded the unrestricted java policy files from IBM Fix Central
❖ There are two files local_policy.jar and US_export_policy.jar that overwrite those in
❖ <websphere install directory>/java/jre/lib/security
❖ Shutdown your servers
❖ Replace the files
❖ Start the servers
❖ Not doing this and deploying 4096 certificates will lead to
❖ servers being unable to talk to each other
❖ you being unable to stop your servers cleanly
❖ audio and video not working
46. Meeting Policies
❖ There are no specific policy settings for mobile users in
Meeting Rooms
❖ Mobile specific settings are in the Meeting server
configuration itself as they apply to all users
❖ Meeting policies apply to a user whether they are on a
mobile device or not
47. Media Policies
❖ The line rate will affect how much video data is broadcast
to the mobile client
49. Apple Push Notification Service
❖ To enable push notifications for iOS devices you must allow traffic outbound
❖ gateway.push.apple.com 2195
❖ feedback.push.apple.com 2196
❖ find the file apns-prod.pkcs12 which is on the Proxy server node
❖ <websphere profile>/config/cells/cellName/nodes/
stproxyPNNodename/apns-prod.pkcs12
❖ Copy it to the Node directory for any Sametime Proxy server under the
Deployment manager e.g.
❖ /STSCDMgrProfile/config/cells/balticcell/nodes/stproxynodename
❖ Always check fix central for an updated version of this certificate which needs to
be deployed
50. Google Cloud Messaging
❖ Used for Sametime notifications on Android devices
❖ Use “Retrieve from port” in the Trust Store to bring the
Google certificate into your deployment manager
60. Video Meeting on the iPad
click to
call via phone
(not my number :-))
61. Pre-Configuring Clients
❖ Create a custom URL for users that will provision their mobile chat
client
❖ sametime://@stproxy.turtlehost.net:443/?
AddCommunity&ssl=true
❖ creates a new community for the server stproxy.turtlehost.net
using the secure 443 port and prompts the user for their name
❖ Other optional parameters include
❖ savePassword (true/false)
❖ communityName (if you want to give it a specific name)
64. Trusted IPs
Long time bug.
When WAS writes the
Trusted IPs as a string
rather than a list
Until this is
fixed by saving the
document in
stconfig.nsf nothing
will work
65. Trusted IPs
❖ This has been a recurring problem since 8.5.2
❖ With this bug if you change the Trusted IPs in
WebSphere the next time the Community server is
restarted, they will be broken
❖ On 9.0.1 I’ve also seen an error where a single trusted ip
is listed with a “.” at the end, causing it to fail
66. Routing To The Correct Server
❖ Regardless which Community server you configure the Sametime
Proxy server to use in its deployment plan
❖ It can and will connect to any server in the Domino domain
configured as a “Sametime” server
❖ Edit the Sametime Proxy configuration to force routing to a
specific server, servers or cluster
❖ Check the SystemOut.log on the Sametime Proxy server to
determine which server it is trying to connect to
❖ Check the sametimexxx.log in the DominoTrace directory to
verify if connections are being refused and why
67. This is left empty on
install so by default all domain
Sametime servers can be
consumed
68. Re-Mapped Virtual Host
❖ During fix updates or patches it’s common for the
Virtual Hosts of each application to be reset to
“default_host” instead of the specific one we created
❖ If you get an error 500 or “SRVE0255E: A WebGroup/
Virtual Host to handle /mapping has not been defined”
these are commonly associated with an incorrect virtual
host
69. Bandwidth
❖ The largest consumption of resource for a Sametime
Proxy Server is the network
❖ If the server is virtualised, make sure the network card
assigned isn’t shared
❖ Monitor the network traffic to the server
❖ Audio and Video streams on mobile services are sent
via the Sometime Proxy server which was probably not
designed for media traffic
70. Mobile Bandwidth
❖ There is a maximum number of video feeds that are
supported for a Meeting on mobile devices
❖ the setting (which can’t be changed) is 4 + you
❖ This can be further limited if bandwidth goes beyond
the configured allowable amount
71. Media Using The Wrong Server
❖ Random media errors can be the result of the Conference Manager
attempting to connect to the wrong Community Server
❖ If everything else appears started with no errors, verify the SystemOut.log
of the Conference Manager for any errors relating to other servers
❖ If a server exists in the domain (Domino Directory) and has “Is This A
Sametime Server?” field marked as “yes” it will be consumed by the
servers in the SSC