Session Reference:
Session Type: Pre-Conference Seminar
Experience Level: Any
Pre-Conference Seminar > XYPRO - Getting the most out of XMA and XUA
You have the tools to be more secure than you may realize! XYGATE® Merged Audit (XMA) and User Authentication (XUA) are included with all new HPNS systems. In this session, learn how XMA intelligently merges audit data sources such as Safeguard, EMS, XYGATE, BASE24 (and others) so that you get the security information you need, when you need it. Learn how XUA, a Security Event Exit Process (SEEP) configured to Safeguard, can enhance and extend HP NonStop™ authentication. With XUA, LDAP/Microsoft Active Directory authentication can be configured to include your HP NonStop™ servers in Single Sign-on (SSO) or multi-factor authentication can be configured to use the RSA SecurID® token and RADIUS (Remote Authentication Dial In User Service) centralized authentication support. XUA can also provide granular control over Safeguard globals and provide tighter control over how, and when, users can authenticate.
Session Type: Pre-Conference Seminar
Experience Level: Any
Pre-Conference Seminar > XYPRO - Getting the most out of XMA and XUA
You have the tools to be more secure than you may realize! XYGATE® Merged Audit (XMA) and User Authentication (XUA) are included with all new HPNS systems. In this session, learn how XMA intelligently merges audit data sources such as Safeguard, EMS, XYGATE, BASE24 (and others) so that you get the security information you need, when you need it. Learn how XUA, a Security Event Exit Process (SEEP) configured to Safeguard, can enhance and extend HP NonStop™ authentication. With XUA, LDAP/Microsoft Active Directory authentication can be configured to include your HP NonStop™ servers in Single Sign-on (SSO) or multi-factor authentication can be configured to use the RSA SecurID® token and RADIUS (Remote Authentication Dial In User Service) centralized authentication support. XUA can also provide granular control over Safeguard globals and provide tighter control over how, and when, users can authenticate.