SecurID Information. General Card Information. Card Precautions. Security Features FRED HUTCHINSON CANCER RESEARCH CENTER
|
|
- Dulcie Holmes
- 6 years ago
- Views:
Transcription
1 FRED HUTCHINSON CANCER RESEARCH CENTER SecurID Information General Card Information The SecurID card is a credit-card-sized microprocessor token that lets authorized users access the SCHARP secure web site. It calculates and displays codes that change unpredictably every 60 seconds. Card Precautions The SecurID card is rugged enough to withstand reasonably adverse conditions, but: Don t immerse the card or get it wet. Don t let it be exposed to temperatures colder than -5 or hotter than 120 F, nor to sustained temperatures above 90 F, to prevent excessive drift by the internal clock. Don t subject it to excessive (i.e., dangerous to people) electric or electromagnetic activity, including such radiation as microwaves, X-rays, or electrostatic shock. Don t drop it onto a hard surface, bend or otherwise stress it excessively. In particular, don t carry it in a pants pocket or put it in a wallet carried in a back pocket. The LCD is glass and can be damaged by too much pressure. If your card ever stops displaying new numbers, is lost, or stolen, please contact Rana Bonnice at (206) or rana@scharp.org as soon as possible. A new one will be issued and the old one disabled for security. Note that each individual is responsible for the SecurID cards issued to it. If one is lost or broken from negligence, the SC must be reimbursed for the cost of the card. Security Features The user authentication process used by SecurID is based on two-factor authentication - the concept of both physically having something (the SecurID card) and having to know something (your Personal Identification Number or PIN). With a conventional security system it is easy for someone to learn your password and log in under your identity. Requiring two factors ensures reliable identification and authentication. Page 1 of Fairview Avenue North, MW-500 P.O. Box Seattle, WA FAX (206)
2 User Responsibilities You are responsible for protecting the authentication factors entrusted to you. Users must make every effort to not compromise the security of the system. This includes not writing your PIN on your SecurID card, not leaving connected terminals unattended, etc. Keep your PIN secret and protect your SecurID token against loss and theft. Because this system creates an audit trail that cannot be repudiated, you may be held accountable for activities recorded identifying you as the perpetrator. Avoid the unauthorized use of your identity and privileges by protecting the secrecy of your PIN and the possession of your token. As such, we do not recommend sharing cards. Do not reveal your PIN to anyone. Memorize it; do not write it down. If your SecurID card is missing, if you forget your PIN, or if you think that someone knows it, report the situation to Rana Bonnice. SecurID Access The SCHARP network has different layers of security, depending on approval. SecurID can allow access to the SCHARP internal network via Terminal Window the HVTN secure website the SCHARP SCP server (secure file transfer) the SCHARP modem pool (including internet access) Remote Desktop (via Metaframe/Reflection X) Each SecurID card can be customized to grant permission to only the approved remote resources. Using Your SecurID Card: Preliminary Procedures A few steps must be taken when using the SecurID card to get into SCHARP. This document details the initial steps required in order to use SecurID, as follows: SecurID Initial Authentication Logging-in using SecurID Troubleshooting SecurID login problems. Further documentation is available that covers: Remote Access Overview How to Connect - ISP and Dial-Up Remote Access Features Page 2 of 6
3 Card Authentication The New-PIN Procedure In order to use your SecurID card for the first time, you must setup a PIN to authenticate the card for use. Once you are authenticated into the system with this password, you will be asked to select a Personal Identification Number (PIN). To begin the authentication procedure, you must have internet access and web browsing software that supports logging-in to secured (encrypted) web sites. Common browsers such as either Netscape or Internet Explorer allow encryption by default. RSA supports Netscape Navigator versions 1.1 or later and Microsoft Internet Explorer versions 3.0 or later browsers for authentication through the WebID authentication forms. Other browsers may work, but you should consult their manufacturers to make sure the browsers support HTML forms and Persistent Client State HTTP Cookies. 1. To connect to the SecurID authentication web site, point your web browser to the following URL: Enter your login name (username) as displayed below. Please be sure that it is in lower case only: Username: your SCHARP username PASSCODE: enter the numbers that are currently displayed on your SecurID card Then click the Send button. Your token is in New PIN mode. Enter a new PIN in the fields provided, then click the "Send" button. Use the "Reset" button to clear the PIN if you make a mistake. PINs must contain 4 to 8 characters and digits. 2. Select a PIN (password) You may choose any 4-8 character combination of numbers and letters. PINs are not case-sensitive: A is the same as a. PINs cannot start with a 0 (zero) or contain any non-alphanumeric characters (@#$%&, etc.). Do not create an obvious PIN like your address, birthday or phone number. Do not use your ATM bank card PIN. Type in the PIN that you have created. Be sure not to write this down. No one, not even the system administrator, can ever obtain your PIN except from you. If you have picked a PIN that is unacceptable or mistyped so the PINs do not match, you will get: Page 3 of 6
4 PIN Format Error: PINs must contain 4 to 8 characters and digits Either retype the PIN (for a mistype) or try a different PIN, making sure to meet the PIN requirements detailed above. If the system rejects your PIN twice, you will see the message: New PIN rejected. Please try again. and this new-pin session will be terminated. Wait for the cardcode to change and start over. Once your PIN has been accepted, you will see the message: New PIN accepted. You are required to authenticate with your new PIN. Please wait for the number to change on your token and then use it in the space provided. 3. Final Step: Login With New PIN You will be prompted to again enter a SecurID PASSCODE. Wait for your cardcode to change, and when that happens, you can login using the new PIN you just created. Follow the directions in the next section. Once you have successfully logged in using the web browser, you can close the application. Logging In Once you have setup a PIN, whenever the system prompts: Enter PASSCODE: it is asking for the combination of PIN followed by the number that appears on your SecurID card. For example, if your PIN is testing and your card is currently displaying , the procedure might go like this: Enter PASSCODE: testing [the PIN/numbers don t actually appear on the screen, or may appear as * s] If your PIN contains letters, they can be entered in either upper or lowercase: testing is the same as TesTINg. If you enter a valid PASSCODE you can access the system. If you enter it incorrectly, this appears: Access Denied. The ACE/Server rejected the passcode you supplied. Please try again. Page 4 of 6
5 Try again. Troubleshooting Unsuccessful Logins Once accepted, a SecurID PASSCODE can not be used again. If you try to login twice before the cardcode changes, you will not succeed the second time and will have to wait until it does change. For security purposes, SecurID cards are automatically disabled after three unsuccessful consecutive login attempts. If your card is disabled, contact the SecurID Administrator to have your card re-enabled for use. The Next Tokencode Prompt Sometimes after you ve typed your PASSCODE incorrectly more than three times, but succeeded at the last prompt, the system may ask you to enter the next cardcode that comes up to verify that the card has not been stolen: Enter the next cardcode: Wait until the card code changes, then go ahead and type it in, followed by <Return>. (Do not enter your PIN, just the number that appears on the card). Now you should be able to gain access. This request is not necessarily due to an error on either your part or the part of the SeucrID server; it is a step in the system s evasive-action strategies. This prompt may also appear if your card has not been used to login for a few weeks. Connecting to SCHARP Once your card has been authenticated for use (you have setup a PIN), you will be able to use it to connect to SCHARP remotely. For instructions on how to connect, refer to the Remote Access Documentation. Page 5 of 6
6 Quick Setup Guide You will need to authenticate your card (create a PIN) before you can use their SecurID cards for anything else. To do this, follow the steps listed below. 1. Connect your web browser to the following page: 2. Enter your username at the "Username" field. 3. Enter just the numbers shown in the LED on your SecurID card at the "PASSCODE" field and click the Send button. Note about Personal Identification Numbers (PINs): You may use the PIN you have been using. If you wish to use a new PIN, we strongly recommend that you give this some thought before hand. You may choose any 4-8 character combination of numbers and letters. PINs aren't case-sensitive: "A" is the same as "a". PINs cannot start with a "0" (zero) or contain any non-alphanumeric characters (@#$%&, etc). Don't create an obvious PIN like your address, birthday or phone number. Don't use your ATM bank card PIN. 4. Type in the PIN that you have chosen. If you have picked a PIN that is unacceptable, you will get: PIN Format Error: PINs must contain 4 to 8 characters and digits. Enter in a compatible password and click the Send button. 5. After you make up and enter an acceptable PIN, you will be promptedwith the following message: New PIN accepted. You are required to authenticate with your new PIN. Please wait for the number to change on your token and then use it in the space provided. As the message states, wait for your cardcode to change, and when that happens, you can log in using the new PIN, along with the SecurID number. Once you have completed these steps, you should gain access to the secured site and can close the web browser. Your card is ready for use. If you have any questions, please contact the SecurID administrator, Rana Bonnice, at (206) Page 6 of 6
RSA SecurID Software Token 2.0 For Palm Handhelds User s Guide
RSA SecurID Software Token 2.0 For Palm Handhelds User s Guide This guide explains how to install and use your RSA SecurID Software Token 2.0 for Palm Handhelds application. This guide assumes that you
More informationHow to Integrate RSA SecurID with the Barracuda Web Application Firewall
How to Integrate RSA SecurID with the Barracuda Web Application Firewall The Barracuda Web Application Firewall can be configured as a RADIUS client to the RSA SecurID Server System, comprised of the RSA
More informationQUESTION: 1 An RSA SecurID tokencode is unique for each successful authentication because
1 RSA - 050-v71-CASECURID02 RSA SecurID Certified Administrator 7.1 Exam QUESTION: 1 An RSA SecurID tokencode is unique for each successful authentication because A. a token periodically calculates a new
More informationHow to Configure the RSA Authentication Manager
How to Configure the RSA Authentication Manager The Barracuda Load Balancer ADC can be configured as a RADIUS client to the RSA SecurID Server System, comprised of the RSA Authentication Manager and the
More informationMCB Lite FAQs What is MCB Lite? How do I apply for MCB Lite? Can I apply for MCB Lite without a valid CNIC?
MCB Lite FAQs What is MCB Lite? MCB Lite is a socially connected payments solution that saves you time and money by enabling you to make unlimited free payments through a Visa Card and a Mobile Wallet.
More informationLogin Procedures. Access Treasury Gateway by entering the site address in your web browser navigation box: https://securentrycorp.calbanktrust.
Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-on and security portal which allows you access to multiple services simultaneously through the same session, provides convenient
More informationBarracuda Networks SSL VPN
RSA SecurID Ready Implementation Guide Partner Information Last Modified: October 24, 2013 Product Information Partner Name Barracuda Networks Web Site https://www.barracuda.com/ Product Name Barracuda
More informationSecurity Cooperation Information Portal
June 2017 https://www.scportal.us/ Contents Website... 3 Home... 3 Registration Info... 3 User Agreement... 4 SCIP Logon... 4 Digital Certificate with Name CAC or PKI users... 4 Token Users... 5 Warning
More informationHow to Configure Authentication and Access Control (AAA)
How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual
More informationMessage Networking 5.2 Administration print guide
Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do
More informationKT-4 Keychain Token Welcome Guide
SafeNet Authentication Service KT-4 Keychain Token Welcome Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document
More informationInstalling and Connecting to DGL PM Server
Installing and Connecting to DGL PM Server Go to www.dglpm.co.uk and click SUPPORT along the top. To access the download use the Click Here option as seen in the screenshot below. Left click Download DGL
More informationCorporate Online. Introducing Corporate Online
Corporate Online. Introducing Corporate Online Effective as at April 2015 About this Guide About Corporate Online Westpac Corporate Online is an internet-based electronic platform, providing a single point
More informationTechnical Note: RSA SecurID /SA Integration
Technical Note: RSA SecurID /SA Integration RSA SecurID is a two-factor authentication system from RSA Security, Inc. (a division of EMC). Two-factor authentication is based on the concept of something
More informationCitibank Online. Registration Guide. Or call for further assistance. For details and Terms & Conditions, Log on to
For details and Terms & Conditions, Log on to www.citibank.com.pk Or call 111 222 222 for further assistance CBOL-RegGuide-V1-11-06 Citibank Online Registration Guide Introduction How does Citibank Online
More informationSecuRemote for Windows 32-bit/64-bit
SecuRemote for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright
More informationPass4sure CASECURID01.70 Questions
Pass4sure.050-80-CASECURID01.70 Questions Number: 050-80-CASECURID01 Passing Score: 800 Time Limit: 120 min File Version: 4.8 http://www.gratisexam.com/ 050-80-CASECURID01 RSA SecurID Certified Administrator
More informationRSA Exam 050-v71-CASECURID02 RSA SecurID Certified Administrator 7.1 Exam Version: 6.0 [ Total Questions: 140 ]
s@lm@n RSA Exam 050-v71-CASECURID02 RSA SecurID Certified Administrator 7.1 Exam Version: 6.0 [ Total Questions: 140 ] Question No : 1 An RSA SecurID tokencode is unique for each successful authentication
More informationSession objectives. Identification and Authentication. A familiar scenario. Identification and Authentication
Session objectives Background Identification and Authentication CSM27 Computer Security Dr Hans Georg Schaathun University of Surrey Autumn 2008 Week 3 Recognise the purposes of (password) identification.
More informationEOH-SASOL - Setup Sasol Mobile Express (Client)
EOH-SASOL - Setup Sasol Mobile Express (Client) Document Control Document Information Information Document Id SSL/BO/121/WI Document Owner Back Office Operations Manager Issue Date 18 May 2016 Last Saved
More informationmaxecurity Product Suite
maxecurity Product Suite Domain Administrator s Manual Firmware v2.2 ii Table of Contents BASICS... 1 Understanding how maxecurity products work in your company... 1 Getting started as a Domain Administrator...
More informationTABLE OF CONTENTS. Lakehead University Password Maintenance Standard Operating Procedure
TABLE OF CONTENTS 1.0 General Statement... 3 2.0 Purpose... 3 3.0 Scope... 3 4.0 Procedure... 3 4.1 General... 3 4.2 Requirements... 4 4.3 Guidelines... 4 5.0 Failure to comply... 6 2 1.0 GENERAL STATEMENT
More informationRSA Authentication Manager 7.1 Help Desk Administrator s Guide
RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,
More informationRemote Access. Application Viewer User Guide
Remote Access Application Viewer User Guide Page Logging into Application Viewer... 3 Logging off Application Viewer... 9 Lost or stolen tokens... 9 Application Viewer User Guide October 11, 2011 2 of
More informationDell SonicWALL NSA 3600 vpn v
RSA SECURID ACCESS Standard Agent Implementation Guide Dell SonicWALL NSA 3600 vpn v6.2.2.1 FAL RSA Partner Engineering Last Modified: 10/12/16 Solution Summary Dell SonicWALL
More informationManaging User Accounts
Contents User Accounts 2 Passwords 3 Common User Account Settings 4 The Anonymous User 5 User Accounts And The Web File Manager 5 Maxum Development Corp. The basic operation of a file transfer server boils
More informationRSA SecurID Implementation
Partner Information Partner Name Website Product Name Barracuda Networks Version & Platform x60 Series Product Description Product Category Solution Summary www.barracudanetworks.com Product Information
More informationBANKVIC APP FREQUENTLY ASKED QUESTIONS
BANKVIC APP FREQUENTLY ASKED QUESTIONS TABLE OF CONTENTS TABLE OF CONTENTS... 1 ABOUT THE BANKVIC APP... 2 GETTING STARTED... 3 SECURITY... 4 FEATURES & FUNCTIONALITY... 5 PAYMENTS & TRANSFERS... 6 CARD
More informationAbout MassMutual Electronic Bill Presentment & Payment
Group Billing and Collections Frequently Asked Questions (FAQs) for ebill and epay About MassMutual Electronic Bill Presentment & Payment E-Bill Questions and Problems Payment Process Questions Payment
More informationRSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013
Ping Identity RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 13, 2013 Product Information Partner Name Ping Identity Web Site www.pingidentity.com Product Name PingFederate
More informationUsing the Microsoft Remote Desktop on non-windows devices
Using the Microsoft Remote Desktop on non-windows devices You can use the free Microsoft Remote Desktop Client to connect to the DGLPM Server from virtually any Apple Mac, iphone, ipad, or Android device
More informationAuthentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1
Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1 CIA Triad Confidentiality Prevent disclosure of information to unauthorized parties Integrity Detect data tampering Availability
More informationTwo-Factor Authentication User FAQ s
Two-Factor Authentication User FAQ s What is Two-Factor Authentication (2FA)? What does Symantec Validation and ID Protection (VIP) do? I don t have a smartphone, what is my alternative? How many devices
More informationAccounts and Passwords
Accounts and Passwords Hello, I m Kate and we re here to learn how to set up an account on a website. Many websites allow you to create a personal account. Your account will have its own username and password.
More informationHitachi High Technologies America, Inc. Password Policy
Hitachi High Technologies America, Inc. Password Policy Revision Date: 4/17/2015 Table of Contents Table of Contents...2 Overview...3 Scope. 3 Guidelines...3 A. General Password Construction Guidelines...3
More informationThe first step you should take in order to be able to use the system is accessing our web page. Follow these steps to gain access to the system:
User s Manual A. Requirements ASI on-line has been develop to be use with Microsoft Internet Explorer 5 or latter. You can download the latest version of the browser by logging into http://www.microsoft.com/downloads/search.asp
More informationLogging in. Below this is a series of links to the course structure documentation for each unit in the Level 3 Diploma in Castings Technology.
Logging in Before 'Logging in' Make sure you have navigated to www.foundrytrainingonline.com using your browser address window (not Google search window). Occasionally, the location of the site will move
More informationWelcome Guide for KT Series Token
Welcome Guide for KT Series Token Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information
More informationPulse Secure Policy Secure
Policy Secure RSA SecurID Ready Implementation Guide Last Modified: November 19, 2014 Partner Information Product Information Partner Name Pulse Secure Web Site http://www.pulsesecure.net/ Product Name
More informationManaging User Accounts
Contents User Accounts 2 Passwords 3 Home Folders 4 The Anonymous User 5 User Accounts And The Web File Manager 5 Maxum Development Corp. ! Managing User Accounts The basic operation of a file transfer
More informationMicrosoft Unified Access Gateway 2010
RSA SecurID Ready Implementation Guide Partner Information Last Modified: March 26, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description Microsoft www.microsoft.com
More informationmystanwell.com Accessing using Apple devices Information and Business Systems
mystanwell.com Accessing using Apple devices Information and Business Systems Doc No: 009/12 Revision No: 002 Revision Date: 28 November 2013 Page: 1 of 14 Contents Overview... 3 1. Installing Citrix Receiver
More informationGo to SQA Academy the website address is
Joining a course on the SQA Academy You may find it useful to print out this document for reference. There are two steps to joining an SQA Academy course. First you need an account with the SQA Academy,
More informationORAC Match. User Manual for Support Workers. V1.0 Updated 13/11/2017
ORAC Match User Manual for Support Workers V1.0 Updated 13/11/2017 1 Contents: The Login Screen: ORAC can be accessed through any web browser, smartphone or tablet via the following link; https://app.orac.support
More informationEnterprise Payment Solutions User Administrator. User Administrator Handbook
Enterprise Payment Solutions 1999-2014 Jack Henry & Associates, Inc. All rights reserved. Information in this document is subject to change without notice. Printed in the United States of America. No part
More informationPSEG SSL VPN USER GUIDE
PSEG SSL VPN USER GUIDE FOR NON-CORPORATE PCs (Windows 7, Vista, XP, and MAC OS X) TABLE OF CONTENTS QUICK CONNECT TO SSL VPN... 1 Connect to SSL VPN... 1 Disconnect from SSL VPN... 1 FIRST TIME USER SETUP...
More informationMulti-Factor Authentication FAQs
General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your
More informationSecurity Access Manager 7.0
IBM Security Access Manager 7.0 RSA SecurID Ready Implementation Guide Partner Information Last Modified: July 8, 2013 Product Information Partner Name IBM Web Site www.ibm.net Product Name IBM Security
More informationWelcome Guide for MP-1 Token for Microsoft Windows
Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made
More informationThe University Registrar s office will supply you with a USER ID and an initial PIN.
Banner Web For Students Registration Guide v 1.00 (March 17, 2004) Office of the University Registrar Introduction Banner Web for Student allows students to view, update, and print selected information
More informationCitrix Remote Access. Accessing applications and files away from the office MOBILE WORKING Kennedys
Citrix Remote Access MOBILE WORKING Accessing applications and files away from the office 2014 Kennedys Contents EMAILS VIA OUTLOOK WEBMAIL... 1 CONNECTING TO CITRIX SERVER (FIRST TIME USE ONLY)... 2 CONNECTING
More informationBanner SSL VPN User Guide
P a g e 1 Banner SSL VPN User Guide Version By Date Changes 1.3 Jerome Casper 6-1-2016 Combined VPN/2FA documentation Guide Maintainence IT Service Desk Ongoing Table of Contents Document Control and Version
More informationRemote Access Instructions. remote.gpmlaw.com
Remote Access Instructions Citrix XenApp 7.8 is the mostly widely-used solution to provide remote access to users while working out of the office. This latest version is more secure and optimized for a
More informationREACH Remote Deposit Capture
REACH Remote Deposit Capture Company Administration CONTENTS Introduction to REACH... 1 Overview of Roles... 1 Session Timeouts and Maintenance... 1 User Login... 2 Login via Online Cash Management...
More informationManaging User Accounts
Contents User Accounts 2 Passwords 3 Common User Account Settings 4 The Anonymous User 5 User Accounts And The Web File Manager 5 Maxum Development Corp. The basic operation of a file transfer server boils
More informationCongratulations You have just added an extra layer of security to your Bank Windhoek Internet Banking account. Manual
Congratulations You have just added an extra layer of security to your Bank Windhoek Internet Banking account. Manual The below device is referred to as an E-Secure token. Please read through the brochure
More informationCheck Point GO R75. User Guide. 14 November Classification: [Public]
Check Point GO R75 User Guide 14 November 2011 Classification: [Public] 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright
More informationComputer Security 3/20/18
Authentication Identification: who are you? Authentication: prove it Computer Security 08. Authentication Authorization: you can do it Protocols such as Kerberos combine all three Paul Krzyzanowski Rutgers
More informationChapter 8. User Authentication
Chapter 8. User Authentication This chapter describes how NetDefendOS implements user authentication. Overview, page 220 Authentication Setup, page 221 8.1. Overview In situations where individual users
More information<Partner Name> RSA SECURID ACCESS. VMware Horizon View Client 6.2. Standard Agent Implementation Guide. <Partner Product>
RSA SECURID ACCESS Standard Agent Implementation Guide VMware Daniel R. Pintal, RSA Partner Engineering Last Modified: August 9 th, 2016 Solution Summary VMware Horizon
More informationOnline Banking User Guide
Online Banking User Guide Contents Login... 1 Passcode... 1 Online Agreement... 2 Online Banking ID Change... 2 Watermark Selection... 3 Multi-Factor Authentication Security Question Collection... 3 Update
More informationComputer Security. 08. Authentication. Paul Krzyzanowski. Rutgers University. Spring 2018
Computer Security 08. Authentication Paul Krzyzanowski Rutgers University Spring 2018 1 Authentication Identification: who are you? Authentication: prove it Authorization: you can do it Protocols such
More informationMyFloridaNet-2 (MFN-2) Customer Portal/Password Management Reference Guide
MyFloridaNet-2 (MFN-2) Customer Portal/Password Management Reference Guide REVISION RECORDS REVISION DATE DESCRIPTION 0 27 September 2017 Initial Submittal. 1 06 October 2017 Second Submittal. - 17 October
More informationCyber Ark Software Ltd Sensitive Information Management Suite
RSA SecurID Ready Implementation Guide Partner Information Last Modified: May 15 th, 2014 Product Information Partner Name Cyber Ark Software Ltd Web Site www.cyberark.com Product Name Version & Platform
More informationRSA Ready Implementation Guide for. GlobalSCAPE EFT Server 7.3
RSA Ready Implementation Guide for GlobalSCAPE EFT Server 7.3 FAL, RSA Partner Engineering Last Modified: 5/19/2016 Solution Summary GlobalSCAPE Enhanced File Transfer (EFT) server can be configured to
More informationAccess Online. Navigation Basics. User Guide. Version 2.2 Cardholder and Program Administrator
Access Online Navigation Basics User Guide Version 2.2 Cardholder and Program Administrator Contents Introduction... 1 Access Online Overview... 2 How We Gather and Manage Transaction Data in Access Online...
More informationCitrix Remote Access
Citrix Remote Access User Guide 30 Churchill Place Canary Wharf London E14 5EU United Kingdom Telephone +44 (0)20 3660 6000 Facsimile +44 (0)20 3660 5555 Send a question via our website www.ema.europa.eu/contact
More informationWelcome to First Security Mobile
Welcome to First Security Mobile Frequently Asked Questions Questions General How much does this service cost? Is it secure? Which wireless carriers are supported? Do I need a data plan? I'm not enrolled
More informationPass, No Record: An Android Password Manager
Pass, No Record: An Android Password Manager Alex Konradi, Samuel Yeom December 4, 2015 Abstract Pass, No Record is an Android password manager that allows users to securely retrieve passwords from a server
More informationEnroll in Two factor Authentication - iphone
OVERVIEW Passwords are increasingly easy to compromise. They can often be stolen, guessed, or hacked you might not even know someone is accessing your account. Two factor authentication adds a second layer
More informationSalesforce1 Mobile Security White Paper. Revised: April 2014
Salesforce1 Mobile Security White Paper Revised: April 2014 Table of Contents Introduction Salesforce1 Architecture Overview Authorization and Permissions Communication Security Authentication OAuth Pairing
More informationpenelope case management software AUTHENTICATION GUIDE v4.4 and higher
penelope case management software AUTHENTICATION GUIDE v4.4 and higher Last modified: August 9, 2016 TABLE OF CONTENTS Authentication: The basics... 4 About authentication... 4 SSO authentication... 4
More informationOUTLOOK VIA THE INTERNET
OUTLOOK VIA THE INTERNET Table of Contents Page LESSON 1: GETTING STARTED...1 Logging On...1 Parts of the Outlook Window...3 Terms...4 LESSON 2: E-MAIL...6 Mail Folders...6 Composing a New Message...7
More informationCorporate Internet Banking Service FAQ
Corporate Internet Banking Service FAQ 1. How do I apply for BOCNET (Bank of China Internet banking Service)? In order to apply for the Service, you must have at least one account with Bank of China (Malaysia)
More informationESS Security Enhancements
ESS Security Enhancements payentry.com Employee Self Service Enhancements 1 Table of Contents INTRODUCTION 3 EXISTING EMPLOYEES 3 Existing Employee -Email Address 4 Existing Employee - Username 4 Existing
More informationVendor: RSA. Exam Code: CASECURID01. Exam Name: RSA SecurID Certified Administrator 8.0 Exam. Version: Demo
Vendor: RSA Exam Code: 050-80-CASECURID01 Exam Name: RSA SecurID Certified Administrator 8.0 Exam Version: Demo QUESTION NO: 1 RSA 050-80-CASECURID01 Exam Which of the following can cause the error message
More informationGLOBAL PAYMENTS AND CASH MANAGEMENT. Security
GLOBAL PAYMENTS AND CASH MANAGEMENT Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of
More informationGuide to Getting Started. Personal Online Banking & Bill Pay
Guide to Getting Started Personal Online Banking & Bill Pay What s Inside Welcome to National Bank of Arizona s Online Banking. Whether you re at home, at work, or on the road, our online services are
More informationRegions OnePassSM USER GUIDE. It s time to expect more. Regions Bank Member FDIC Revised
Regions OnePassSM USER GUIDE Regions Bank Member FDIC Revised 110614 It s time to expect more. Regions OnePass User Guide Table of Contents Section I. OnePass Basics 3 What Is OnePass? 3 Minimum Browser
More informationORAC Match. User Manual for Support Workers. V1.0 Updated 13/11/2017
ORAC Match User Manual for Support Workers V1.0 Updated 13/11/2017 1 Contents: The Login Screen: ORAC can be accessed through any web browser, smartphone or tablet via the following link; https://app.orac.support
More information1. General Description... 2
Created by Lindhoudt Harald Date of Creation May 12 th, 2010 Released by Glatz Klaus Date of Release May 21 st, 2010 TABLE OF CONTENT 1. General Description... 2 2. End-user Portal Services instructions...
More information<Partner Name> <Partner Product> RSA SECURID ACCESS. NetMove SaAT Secure Starter. Standard Agent Client Implementation Guide
RSA SECURID ACCESS Standard Agent Client Implementation Guide NetMove Daniel R. Pintal, RSA Partner Engineering Last Modified: April 4, 2018 Solution Summary Secure Starter
More informationUsers Guide. Kerio Technologies
Users Guide Kerio Technologies C 1997-2006 Kerio Technologies. All rights reserved. Release Date: June 8, 2006 This guide provides detailed description on Kerio WebSTAR 5, version 5.4. Any additional modifications
More information1.1. HOW TO START? 1.2. ACCESS THE APP
Table of Contents 1. Get Started 1.1. How to start? 1.2. Access the app 1.3. Username and password 2. Mobile Banking features 3. Security 4. Accounts and inquiries 5. Transfers and beneficiaries 6. Charges
More informationRSA ACE/Server 5.2 Administrator s Guide
RSA ACE/Server 5.2 Administrator s Guide Contact Information See our Web sites for regional Customer Support telephone and fax numbers. RSA Security Inc. RSA Security Ireland Limited www.rsasecurity.com
More informationAccessing Insurance Portal/PAS Job Aid Single Sign-On
Accessing Insurance Portal/PAS Job Aid Single Sign-On Getting Started with Insurance Portal and PAS - Create Desktop Shortcut and Single Sign-On Password Getting Started To Get Started with Insurance Portal
More informationPS Suite EMR ASP Remote Access Setup Guide for Macintosh computers
PS Suite EMR ASP Remote Access Setup Guide for Macintosh computers MDQS-6-3639 Rev 4.0 Revised June 13, 2017. PS Suite EMR software and related products and services are owned by TELUS. PS Suite EMR and
More informationOnline Banking Service FAQ(Corporate)
Online Banking Service FAQ(Corporate) Getting Started 1. How do I apply for BOCNET (Bank of China online banking Service)? 2. What are services available on Bank of China Online Banking (BOCNET)? 3. What
More informationWelcome to CSB on Command Frequently Asked Questions
Welcome to CSB on Command Frequently Asked Questions General How much does this service cost? There is currently no charge associated with the service. However, there may be charges associated with text
More informationWhy was an extra step of choosing a Security Image added to the sign-in process?
General Information Why was an extra step of choosing a Security Image added to the sign-in process? Criminals can create websites that look very similar to legitimate business websites. We want to take
More informationPASSWORD POLICY. Policy Statement. Reason for Policy/Purpose. Who Needs to Know This Policy. Website Address for this Policy.
Responsible University Administrator: Vice Provost for Academic Affairs Responsible Officer: Chief Information Officer Origination Date: N/A Current Revision Date: 02/19/13 Next Review Date: 02/19/17 End
More informationAdvantage Cloud Two-Factor Security Process
Advantage Cloud Two-Factor Security Process Advantage Cloud Two-Factor Security Process Table of Contents: 1. Why use Two-Factor Authentication? 2. Two-Factor Authentication Guide for Faculty Members 3.
More informationSWITS User Manual. Accessing SWITS. This document focuses on the elements required to Access SWITS. Total Pages: 5
SWITS User Manual This document focuses on the elements required to Access SWITS Total Pages: 5 Accessing SWITS Using Your Browser to Access SWITS Identity Management Context Creating a shortcut California
More informationSigning up for My Lahey Chart
Signing up for My Lahey Chart What is My Lahey Chart? My Lahey Chart is a helpful service that allows you to connect with your doctor and your health information online, anytime. Using your personal computer
More information<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. PingIdentity PingFederate 8
RSA SECURID ACCESS Implementation Guide PingIdentity John Sammon & Gina Salvalzo, RSA Partner Engineering Last Modified: February 27 th, 2018 Solution Summary Ping Identity
More informationMyAccount. leasehold. Happy living for the years ahead
MyAccount leasehold Happy living for the years ahead Contents What is MyAccount Viewing your statement online Setting up a Direct Debit Updating MyAccount details Housing application form MyAccount security
More informationWHITE PAPER. Authentication and Encryption Design
WHITE PAPER Authentication and Encryption Design Table of Contents Introduction Applications and Services Account Creation Two-step Verification Authentication Passphrase Management Email Message Encryption
More informationSECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION
SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION Introduction Why static passwords are insufficient Introducing two-factor Authentication Form Factors for OTP delivery Contact information OTP generating
More informationFrequently Asked Questions (FAQ)
Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart
More informationMobile Banking FAQ. 1 P a g e 1 0 / 1 9 /
Mobile Banking FAQ Q) Can anyone sign up for Mobile Banking? A) Mobile Banking enables any consumer with online banking to access their account information from a mobile device. Mobile Banking offers three
More information