SecurID Information. General Card Information. Card Precautions. Security Features FRED HUTCHINSON CANCER RESEARCH CENTER

Size: px
Start display at page:

Download "SecurID Information. General Card Information. Card Precautions. Security Features FRED HUTCHINSON CANCER RESEARCH CENTER"

Transcription

1 FRED HUTCHINSON CANCER RESEARCH CENTER SecurID Information General Card Information The SecurID card is a credit-card-sized microprocessor token that lets authorized users access the SCHARP secure web site. It calculates and displays codes that change unpredictably every 60 seconds. Card Precautions The SecurID card is rugged enough to withstand reasonably adverse conditions, but: Don t immerse the card or get it wet. Don t let it be exposed to temperatures colder than -5 or hotter than 120 F, nor to sustained temperatures above 90 F, to prevent excessive drift by the internal clock. Don t subject it to excessive (i.e., dangerous to people) electric or electromagnetic activity, including such radiation as microwaves, X-rays, or electrostatic shock. Don t drop it onto a hard surface, bend or otherwise stress it excessively. In particular, don t carry it in a pants pocket or put it in a wallet carried in a back pocket. The LCD is glass and can be damaged by too much pressure. If your card ever stops displaying new numbers, is lost, or stolen, please contact Rana Bonnice at (206) or rana@scharp.org as soon as possible. A new one will be issued and the old one disabled for security. Note that each individual is responsible for the SecurID cards issued to it. If one is lost or broken from negligence, the SC must be reimbursed for the cost of the card. Security Features The user authentication process used by SecurID is based on two-factor authentication - the concept of both physically having something (the SecurID card) and having to know something (your Personal Identification Number or PIN). With a conventional security system it is easy for someone to learn your password and log in under your identity. Requiring two factors ensures reliable identification and authentication. Page 1 of Fairview Avenue North, MW-500 P.O. Box Seattle, WA FAX (206)

2 User Responsibilities You are responsible for protecting the authentication factors entrusted to you. Users must make every effort to not compromise the security of the system. This includes not writing your PIN on your SecurID card, not leaving connected terminals unattended, etc. Keep your PIN secret and protect your SecurID token against loss and theft. Because this system creates an audit trail that cannot be repudiated, you may be held accountable for activities recorded identifying you as the perpetrator. Avoid the unauthorized use of your identity and privileges by protecting the secrecy of your PIN and the possession of your token. As such, we do not recommend sharing cards. Do not reveal your PIN to anyone. Memorize it; do not write it down. If your SecurID card is missing, if you forget your PIN, or if you think that someone knows it, report the situation to Rana Bonnice. SecurID Access The SCHARP network has different layers of security, depending on approval. SecurID can allow access to the SCHARP internal network via Terminal Window the HVTN secure website the SCHARP SCP server (secure file transfer) the SCHARP modem pool (including internet access) Remote Desktop (via Metaframe/Reflection X) Each SecurID card can be customized to grant permission to only the approved remote resources. Using Your SecurID Card: Preliminary Procedures A few steps must be taken when using the SecurID card to get into SCHARP. This document details the initial steps required in order to use SecurID, as follows: SecurID Initial Authentication Logging-in using SecurID Troubleshooting SecurID login problems. Further documentation is available that covers: Remote Access Overview How to Connect - ISP and Dial-Up Remote Access Features Page 2 of 6

3 Card Authentication The New-PIN Procedure In order to use your SecurID card for the first time, you must setup a PIN to authenticate the card for use. Once you are authenticated into the system with this password, you will be asked to select a Personal Identification Number (PIN). To begin the authentication procedure, you must have internet access and web browsing software that supports logging-in to secured (encrypted) web sites. Common browsers such as either Netscape or Internet Explorer allow encryption by default. RSA supports Netscape Navigator versions 1.1 or later and Microsoft Internet Explorer versions 3.0 or later browsers for authentication through the WebID authentication forms. Other browsers may work, but you should consult their manufacturers to make sure the browsers support HTML forms and Persistent Client State HTTP Cookies. 1. To connect to the SecurID authentication web site, point your web browser to the following URL: Enter your login name (username) as displayed below. Please be sure that it is in lower case only: Username: your SCHARP username PASSCODE: enter the numbers that are currently displayed on your SecurID card Then click the Send button. Your token is in New PIN mode. Enter a new PIN in the fields provided, then click the "Send" button. Use the "Reset" button to clear the PIN if you make a mistake. PINs must contain 4 to 8 characters and digits. 2. Select a PIN (password) You may choose any 4-8 character combination of numbers and letters. PINs are not case-sensitive: A is the same as a. PINs cannot start with a 0 (zero) or contain any non-alphanumeric characters (@#$%&, etc.). Do not create an obvious PIN like your address, birthday or phone number. Do not use your ATM bank card PIN. Type in the PIN that you have created. Be sure not to write this down. No one, not even the system administrator, can ever obtain your PIN except from you. If you have picked a PIN that is unacceptable or mistyped so the PINs do not match, you will get: Page 3 of 6

4 PIN Format Error: PINs must contain 4 to 8 characters and digits Either retype the PIN (for a mistype) or try a different PIN, making sure to meet the PIN requirements detailed above. If the system rejects your PIN twice, you will see the message: New PIN rejected. Please try again. and this new-pin session will be terminated. Wait for the cardcode to change and start over. Once your PIN has been accepted, you will see the message: New PIN accepted. You are required to authenticate with your new PIN. Please wait for the number to change on your token and then use it in the space provided. 3. Final Step: Login With New PIN You will be prompted to again enter a SecurID PASSCODE. Wait for your cardcode to change, and when that happens, you can login using the new PIN you just created. Follow the directions in the next section. Once you have successfully logged in using the web browser, you can close the application. Logging In Once you have setup a PIN, whenever the system prompts: Enter PASSCODE: it is asking for the combination of PIN followed by the number that appears on your SecurID card. For example, if your PIN is testing and your card is currently displaying , the procedure might go like this: Enter PASSCODE: testing [the PIN/numbers don t actually appear on the screen, or may appear as * s] If your PIN contains letters, they can be entered in either upper or lowercase: testing is the same as TesTINg. If you enter a valid PASSCODE you can access the system. If you enter it incorrectly, this appears: Access Denied. The ACE/Server rejected the passcode you supplied. Please try again. Page 4 of 6

5 Try again. Troubleshooting Unsuccessful Logins Once accepted, a SecurID PASSCODE can not be used again. If you try to login twice before the cardcode changes, you will not succeed the second time and will have to wait until it does change. For security purposes, SecurID cards are automatically disabled after three unsuccessful consecutive login attempts. If your card is disabled, contact the SecurID Administrator to have your card re-enabled for use. The Next Tokencode Prompt Sometimes after you ve typed your PASSCODE incorrectly more than three times, but succeeded at the last prompt, the system may ask you to enter the next cardcode that comes up to verify that the card has not been stolen: Enter the next cardcode: Wait until the card code changes, then go ahead and type it in, followed by <Return>. (Do not enter your PIN, just the number that appears on the card). Now you should be able to gain access. This request is not necessarily due to an error on either your part or the part of the SeucrID server; it is a step in the system s evasive-action strategies. This prompt may also appear if your card has not been used to login for a few weeks. Connecting to SCHARP Once your card has been authenticated for use (you have setup a PIN), you will be able to use it to connect to SCHARP remotely. For instructions on how to connect, refer to the Remote Access Documentation. Page 5 of 6

6 Quick Setup Guide You will need to authenticate your card (create a PIN) before you can use their SecurID cards for anything else. To do this, follow the steps listed below. 1. Connect your web browser to the following page: 2. Enter your username at the "Username" field. 3. Enter just the numbers shown in the LED on your SecurID card at the "PASSCODE" field and click the Send button. Note about Personal Identification Numbers (PINs): You may use the PIN you have been using. If you wish to use a new PIN, we strongly recommend that you give this some thought before hand. You may choose any 4-8 character combination of numbers and letters. PINs aren't case-sensitive: "A" is the same as "a". PINs cannot start with a "0" (zero) or contain any non-alphanumeric characters (@#$%&, etc). Don't create an obvious PIN like your address, birthday or phone number. Don't use your ATM bank card PIN. 4. Type in the PIN that you have chosen. If you have picked a PIN that is unacceptable, you will get: PIN Format Error: PINs must contain 4 to 8 characters and digits. Enter in a compatible password and click the Send button. 5. After you make up and enter an acceptable PIN, you will be promptedwith the following message: New PIN accepted. You are required to authenticate with your new PIN. Please wait for the number to change on your token and then use it in the space provided. As the message states, wait for your cardcode to change, and when that happens, you can log in using the new PIN, along with the SecurID number. Once you have completed these steps, you should gain access to the secured site and can close the web browser. Your card is ready for use. If you have any questions, please contact the SecurID administrator, Rana Bonnice, at (206) Page 6 of 6

RSA SecurID Software Token 2.0 For Palm Handhelds User s Guide

RSA SecurID Software Token 2.0 For Palm Handhelds User s Guide RSA SecurID Software Token 2.0 For Palm Handhelds User s Guide This guide explains how to install and use your RSA SecurID Software Token 2.0 for Palm Handhelds application. This guide assumes that you

More information

How to Integrate RSA SecurID with the Barracuda Web Application Firewall

How to Integrate RSA SecurID with the Barracuda Web Application Firewall How to Integrate RSA SecurID with the Barracuda Web Application Firewall The Barracuda Web Application Firewall can be configured as a RADIUS client to the RSA SecurID Server System, comprised of the RSA

More information

QUESTION: 1 An RSA SecurID tokencode is unique for each successful authentication because

QUESTION: 1 An RSA SecurID tokencode is unique for each successful authentication because 1 RSA - 050-v71-CASECURID02 RSA SecurID Certified Administrator 7.1 Exam QUESTION: 1 An RSA SecurID tokencode is unique for each successful authentication because A. a token periodically calculates a new

More information

How to Configure the RSA Authentication Manager

How to Configure the RSA Authentication Manager How to Configure the RSA Authentication Manager The Barracuda Load Balancer ADC can be configured as a RADIUS client to the RSA SecurID Server System, comprised of the RSA Authentication Manager and the

More information

MCB Lite FAQs What is MCB Lite? How do I apply for MCB Lite? Can I apply for MCB Lite without a valid CNIC?

MCB Lite FAQs What is MCB Lite? How do I apply for MCB Lite? Can I apply for MCB Lite without a valid CNIC? MCB Lite FAQs What is MCB Lite? MCB Lite is a socially connected payments solution that saves you time and money by enabling you to make unlimited free payments through a Visa Card and a Mobile Wallet.

More information

Login Procedures. Access Treasury Gateway by entering the site address in your web browser navigation box: https://securentrycorp.calbanktrust.

Login Procedures. Access Treasury Gateway by entering the site address in your web browser navigation box: https://securentrycorp.calbanktrust. Treasury Gateway Getting Started Guide Treasury Gateway is a premier single sign-on and security portal which allows you access to multiple services simultaneously through the same session, provides convenient

More information

Barracuda Networks SSL VPN

Barracuda Networks SSL VPN RSA SecurID Ready Implementation Guide Partner Information Last Modified: October 24, 2013 Product Information Partner Name Barracuda Networks Web Site https://www.barracuda.com/ Product Name Barracuda

More information

Security Cooperation Information Portal

Security Cooperation Information Portal June 2017 https://www.scportal.us/ Contents Website... 3 Home... 3 Registration Info... 3 User Agreement... 4 SCIP Logon... 4 Digital Certificate with Name CAC or PKI users... 4 Token Users... 5 Warning

More information

How to Configure Authentication and Access Control (AAA)

How to Configure Authentication and Access Control (AAA) How to Configure Authentication and Access Control (AAA) Overview The Barracuda Web Application Firewall provides features to implement user authentication and access control. You can create a virtual

More information

Message Networking 5.2 Administration print guide

Message Networking 5.2 Administration print guide Page 1 of 421 Administration print guide This print guide is a collection of system topics provided in an easy-to-print format for your convenience. Please note that the links shown in this document do

More information

KT-4 Keychain Token Welcome Guide

KT-4 Keychain Token Welcome Guide SafeNet Authentication Service KT-4 Keychain Token Welcome Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document

More information

Installing and Connecting to DGL PM Server

Installing and Connecting to DGL PM Server Installing and Connecting to DGL PM Server Go to www.dglpm.co.uk and click SUPPORT along the top. To access the download use the Click Here option as seen in the screenshot below. Left click Download DGL

More information

Corporate Online. Introducing Corporate Online

Corporate Online. Introducing Corporate Online Corporate Online. Introducing Corporate Online Effective as at April 2015 About this Guide About Corporate Online Westpac Corporate Online is an internet-based electronic platform, providing a single point

More information

Technical Note: RSA SecurID /SA Integration

Technical Note: RSA SecurID /SA Integration Technical Note: RSA SecurID /SA Integration RSA SecurID is a two-factor authentication system from RSA Security, Inc. (a division of EMC). Two-factor authentication is based on the concept of something

More information

Citibank Online. Registration Guide. Or call for further assistance. For details and Terms & Conditions, Log on to

Citibank Online. Registration Guide.  Or call for further assistance. For details and Terms & Conditions, Log on to For details and Terms & Conditions, Log on to www.citibank.com.pk Or call 111 222 222 for further assistance CBOL-RegGuide-V1-11-06 Citibank Online Registration Guide Introduction How does Citibank Online

More information

SecuRemote for Windows 32-bit/64-bit

SecuRemote for Windows 32-bit/64-bit SecuRemote for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

Pass4sure CASECURID01.70 Questions

Pass4sure CASECURID01.70 Questions Pass4sure.050-80-CASECURID01.70 Questions Number: 050-80-CASECURID01 Passing Score: 800 Time Limit: 120 min File Version: 4.8 http://www.gratisexam.com/ 050-80-CASECURID01 RSA SecurID Certified Administrator

More information

RSA Exam 050-v71-CASECURID02 RSA SecurID Certified Administrator 7.1 Exam Version: 6.0 [ Total Questions: 140 ]

RSA Exam 050-v71-CASECURID02 RSA SecurID Certified Administrator 7.1 Exam Version: 6.0 [ Total Questions: 140 ] s@lm@n RSA Exam 050-v71-CASECURID02 RSA SecurID Certified Administrator 7.1 Exam Version: 6.0 [ Total Questions: 140 ] Question No : 1 An RSA SecurID tokencode is unique for each successful authentication

More information

Session objectives. Identification and Authentication. A familiar scenario. Identification and Authentication

Session objectives. Identification and Authentication. A familiar scenario. Identification and Authentication Session objectives Background Identification and Authentication CSM27 Computer Security Dr Hans Georg Schaathun University of Surrey Autumn 2008 Week 3 Recognise the purposes of (password) identification.

More information

EOH-SASOL - Setup Sasol Mobile Express (Client)

EOH-SASOL - Setup Sasol Mobile Express (Client) EOH-SASOL - Setup Sasol Mobile Express (Client) Document Control Document Information Information Document Id SSL/BO/121/WI Document Owner Back Office Operations Manager Issue Date 18 May 2016 Last Saved

More information

maxecurity Product Suite

maxecurity Product Suite maxecurity Product Suite Domain Administrator s Manual Firmware v2.2 ii Table of Contents BASICS... 1 Understanding how maxecurity products work in your company... 1 Getting started as a Domain Administrator...

More information

TABLE OF CONTENTS. Lakehead University Password Maintenance Standard Operating Procedure

TABLE OF CONTENTS. Lakehead University Password Maintenance Standard Operating Procedure TABLE OF CONTENTS 1.0 General Statement... 3 2.0 Purpose... 3 3.0 Scope... 3 4.0 Procedure... 3 4.1 General... 3 4.2 Requirements... 4 4.3 Guidelines... 4 5.0 Failure to comply... 6 2 1.0 GENERAL STATEMENT

More information

RSA Authentication Manager 7.1 Help Desk Administrator s Guide

RSA Authentication Manager 7.1 Help Desk Administrator s Guide RSA Authentication Manager 7.1 Help Desk Administrator s Guide Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA,

More information

Remote Access. Application Viewer User Guide

Remote Access. Application Viewer User Guide Remote Access Application Viewer User Guide Page Logging into Application Viewer... 3 Logging off Application Viewer... 9 Lost or stolen tokens... 9 Application Viewer User Guide October 11, 2011 2 of

More information

Dell SonicWALL NSA 3600 vpn v

Dell SonicWALL NSA 3600 vpn v RSA SECURID ACCESS Standard Agent Implementation Guide Dell SonicWALL NSA 3600 vpn v6.2.2.1 FAL RSA Partner Engineering Last Modified: 10/12/16 Solution Summary Dell SonicWALL

More information

Managing User Accounts

Managing User Accounts Contents User Accounts 2 Passwords 3 Common User Account Settings 4 The Anonymous User 5 User Accounts And The Web File Manager 5 Maxum Development Corp. The basic operation of a file transfer server boils

More information

RSA SecurID Implementation

RSA SecurID Implementation Partner Information Partner Name Website Product Name Barracuda Networks Version & Platform x60 Series Product Description Product Category Solution Summary www.barracudanetworks.com Product Information

More information

BANKVIC APP FREQUENTLY ASKED QUESTIONS

BANKVIC APP FREQUENTLY ASKED QUESTIONS BANKVIC APP FREQUENTLY ASKED QUESTIONS TABLE OF CONTENTS TABLE OF CONTENTS... 1 ABOUT THE BANKVIC APP... 2 GETTING STARTED... 3 SECURITY... 4 FEATURES & FUNCTIONALITY... 5 PAYMENTS & TRANSFERS... 6 CARD

More information

About MassMutual Electronic Bill Presentment & Payment

About MassMutual Electronic Bill Presentment & Payment Group Billing and Collections Frequently Asked Questions (FAQs) for ebill and epay About MassMutual Electronic Bill Presentment & Payment E-Bill Questions and Problems Payment Process Questions Payment

More information

RSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013

RSA SecurID Ready Implementation Guide. Last Modified: December 13, 2013 Ping Identity RSA SecurID Ready Implementation Guide Partner Information Last Modified: December 13, 2013 Product Information Partner Name Ping Identity Web Site www.pingidentity.com Product Name PingFederate

More information

Using the Microsoft Remote Desktop on non-windows devices

Using the Microsoft Remote Desktop on non-windows devices Using the Microsoft Remote Desktop on non-windows devices You can use the free Microsoft Remote Desktop Client to connect to the DGLPM Server from virtually any Apple Mac, iphone, ipad, or Android device

More information

Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1

Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1 Authentication and Password CS166 Introduction to Computer Security 2/11/18 CS166 1 CIA Triad Confidentiality Prevent disclosure of information to unauthorized parties Integrity Detect data tampering Availability

More information

Two-Factor Authentication User FAQ s

Two-Factor Authentication User FAQ s Two-Factor Authentication User FAQ s What is Two-Factor Authentication (2FA)? What does Symantec Validation and ID Protection (VIP) do? I don t have a smartphone, what is my alternative? How many devices

More information

Accounts and Passwords

Accounts and Passwords Accounts and Passwords Hello, I m Kate and we re here to learn how to set up an account on a website. Many websites allow you to create a personal account. Your account will have its own username and password.

More information

Hitachi High Technologies America, Inc. Password Policy

Hitachi High Technologies America, Inc. Password Policy Hitachi High Technologies America, Inc. Password Policy Revision Date: 4/17/2015 Table of Contents Table of Contents...2 Overview...3 Scope. 3 Guidelines...3 A. General Password Construction Guidelines...3

More information

The first step you should take in order to be able to use the system is accessing our web page. Follow these steps to gain access to the system:

The first step you should take in order to be able to use the system is accessing our web page. Follow these steps to gain access to the system: User s Manual A. Requirements ASI on-line has been develop to be use with Microsoft Internet Explorer 5 or latter. You can download the latest version of the browser by logging into http://www.microsoft.com/downloads/search.asp

More information

Logging in. Below this is a series of links to the course structure documentation for each unit in the Level 3 Diploma in Castings Technology.

Logging in. Below this is a series of links to the course structure documentation for each unit in the Level 3 Diploma in Castings Technology. Logging in Before 'Logging in' Make sure you have navigated to www.foundrytrainingonline.com using your browser address window (not Google search window). Occasionally, the location of the site will move

More information

Welcome Guide for KT Series Token

Welcome Guide for KT Series Token Welcome Guide for KT Series Token Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made to make the information

More information

Pulse Secure Policy Secure

Pulse Secure Policy Secure Policy Secure RSA SecurID Ready Implementation Guide Last Modified: November 19, 2014 Partner Information Product Information Partner Name Pulse Secure Web Site http://www.pulsesecure.net/ Product Name

More information

Managing User Accounts

Managing User Accounts Contents User Accounts 2 Passwords 3 Home Folders 4 The Anonymous User 5 User Accounts And The Web File Manager 5 Maxum Development Corp. ! Managing User Accounts The basic operation of a file transfer

More information

Microsoft Unified Access Gateway 2010

Microsoft Unified Access Gateway 2010 RSA SecurID Ready Implementation Guide Partner Information Last Modified: March 26, 2013 Product Information Partner Name Web Site Product Name Version & Platform Product Description Microsoft www.microsoft.com

More information

mystanwell.com Accessing using Apple devices Information and Business Systems

mystanwell.com Accessing using Apple devices Information and Business Systems mystanwell.com Accessing using Apple devices Information and Business Systems Doc No: 009/12 Revision No: 002 Revision Date: 28 November 2013 Page: 1 of 14 Contents Overview... 3 1. Installing Citrix Receiver

More information

Go to SQA Academy the website address is

Go to SQA Academy the website address is Joining a course on the SQA Academy You may find it useful to print out this document for reference. There are two steps to joining an SQA Academy course. First you need an account with the SQA Academy,

More information

ORAC Match. User Manual for Support Workers. V1.0 Updated 13/11/2017

ORAC Match. User Manual for Support Workers. V1.0 Updated 13/11/2017 ORAC Match User Manual for Support Workers V1.0 Updated 13/11/2017 1 Contents: The Login Screen: ORAC can be accessed through any web browser, smartphone or tablet via the following link; https://app.orac.support

More information

Enterprise Payment Solutions User Administrator. User Administrator Handbook

Enterprise Payment Solutions User Administrator. User Administrator Handbook Enterprise Payment Solutions 1999-2014 Jack Henry & Associates, Inc. All rights reserved. Information in this document is subject to change without notice. Printed in the United States of America. No part

More information

PSEG SSL VPN USER GUIDE

PSEG SSL VPN USER GUIDE PSEG SSL VPN USER GUIDE FOR NON-CORPORATE PCs (Windows 7, Vista, XP, and MAC OS X) TABLE OF CONTENTS QUICK CONNECT TO SSL VPN... 1 Connect to SSL VPN... 1 Disconnect from SSL VPN... 1 FIRST TIME USER SETUP...

More information

Multi-Factor Authentication FAQs

Multi-Factor Authentication FAQs General FAQs What is Multi-factor Authentication (MFA)? Multi-factor authentication (MFA) seeks to decrease the likelihood that others can access your data. Specifically, it enhances the security of your

More information

Security Access Manager 7.0

Security Access Manager 7.0 IBM Security Access Manager 7.0 RSA SecurID Ready Implementation Guide Partner Information Last Modified: July 8, 2013 Product Information Partner Name IBM Web Site www.ibm.net Product Name IBM Security

More information

Welcome Guide for MP-1 Token for Microsoft Windows

Welcome Guide for MP-1 Token for Microsoft Windows Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2013 SafeNet, Inc. All rights reserved. All attempts have been made

More information

The University Registrar s office will supply you with a USER ID and an initial PIN.

The University Registrar s office will supply you with a USER ID and an initial PIN. Banner Web For Students Registration Guide v 1.00 (March 17, 2004) Office of the University Registrar Introduction Banner Web for Student allows students to view, update, and print selected information

More information

Citrix Remote Access. Accessing applications and files away from the office MOBILE WORKING Kennedys

Citrix Remote Access. Accessing applications and files away from the office MOBILE WORKING Kennedys Citrix Remote Access MOBILE WORKING Accessing applications and files away from the office 2014 Kennedys Contents EMAILS VIA OUTLOOK WEBMAIL... 1 CONNECTING TO CITRIX SERVER (FIRST TIME USE ONLY)... 2 CONNECTING

More information

Banner SSL VPN User Guide

Banner SSL VPN User Guide P a g e 1 Banner SSL VPN User Guide Version By Date Changes 1.3 Jerome Casper 6-1-2016 Combined VPN/2FA documentation Guide Maintainence IT Service Desk Ongoing Table of Contents Document Control and Version

More information

Remote Access Instructions. remote.gpmlaw.com

Remote Access Instructions. remote.gpmlaw.com Remote Access Instructions Citrix XenApp 7.8 is the mostly widely-used solution to provide remote access to users while working out of the office. This latest version is more secure and optimized for a

More information

REACH Remote Deposit Capture

REACH Remote Deposit Capture REACH Remote Deposit Capture Company Administration CONTENTS Introduction to REACH... 1 Overview of Roles... 1 Session Timeouts and Maintenance... 1 User Login... 2 Login via Online Cash Management...

More information

Managing User Accounts

Managing User Accounts Contents User Accounts 2 Passwords 3 Common User Account Settings 4 The Anonymous User 5 User Accounts And The Web File Manager 5 Maxum Development Corp. The basic operation of a file transfer server boils

More information

Congratulations You have just added an extra layer of security to your Bank Windhoek Internet Banking account. Manual

Congratulations You have just added an extra layer of security to your Bank Windhoek Internet Banking account. Manual Congratulations You have just added an extra layer of security to your Bank Windhoek Internet Banking account. Manual The below device is referred to as an E-Secure token. Please read through the brochure

More information

Check Point GO R75. User Guide. 14 November Classification: [Public]

Check Point GO R75. User Guide. 14 November Classification: [Public] Check Point GO R75 User Guide 14 November 2011 Classification: [Public] 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected by copyright

More information

Computer Security 3/20/18

Computer Security 3/20/18 Authentication Identification: who are you? Authentication: prove it Computer Security 08. Authentication Authorization: you can do it Protocols such as Kerberos combine all three Paul Krzyzanowski Rutgers

More information

Chapter 8. User Authentication

Chapter 8. User Authentication Chapter 8. User Authentication This chapter describes how NetDefendOS implements user authentication. Overview, page 220 Authentication Setup, page 221 8.1. Overview In situations where individual users

More information

<Partner Name> RSA SECURID ACCESS. VMware Horizon View Client 6.2. Standard Agent Implementation Guide. <Partner Product>

<Partner Name> RSA SECURID ACCESS. VMware Horizon View Client 6.2. Standard Agent Implementation Guide. <Partner Product> RSA SECURID ACCESS Standard Agent Implementation Guide VMware Daniel R. Pintal, RSA Partner Engineering Last Modified: August 9 th, 2016 Solution Summary VMware Horizon

More information

Online Banking User Guide

Online Banking User Guide Online Banking User Guide Contents Login... 1 Passcode... 1 Online Agreement... 2 Online Banking ID Change... 2 Watermark Selection... 3 Multi-Factor Authentication Security Question Collection... 3 Update

More information

Computer Security. 08. Authentication. Paul Krzyzanowski. Rutgers University. Spring 2018

Computer Security. 08. Authentication. Paul Krzyzanowski. Rutgers University. Spring 2018 Computer Security 08. Authentication Paul Krzyzanowski Rutgers University Spring 2018 1 Authentication Identification: who are you? Authentication: prove it Authorization: you can do it Protocols such

More information

MyFloridaNet-2 (MFN-2) Customer Portal/Password Management Reference Guide

MyFloridaNet-2 (MFN-2) Customer Portal/Password Management Reference Guide MyFloridaNet-2 (MFN-2) Customer Portal/Password Management Reference Guide REVISION RECORDS REVISION DATE DESCRIPTION 0 27 September 2017 Initial Submittal. 1 06 October 2017 Second Submittal. - 17 October

More information

Cyber Ark Software Ltd Sensitive Information Management Suite

Cyber Ark Software Ltd Sensitive Information Management Suite RSA SecurID Ready Implementation Guide Partner Information Last Modified: May 15 th, 2014 Product Information Partner Name Cyber Ark Software Ltd Web Site www.cyberark.com Product Name Version & Platform

More information

RSA Ready Implementation Guide for. GlobalSCAPE EFT Server 7.3

RSA Ready Implementation Guide for. GlobalSCAPE EFT Server 7.3 RSA Ready Implementation Guide for GlobalSCAPE EFT Server 7.3 FAL, RSA Partner Engineering Last Modified: 5/19/2016 Solution Summary GlobalSCAPE Enhanced File Transfer (EFT) server can be configured to

More information

Access Online. Navigation Basics. User Guide. Version 2.2 Cardholder and Program Administrator

Access Online. Navigation Basics. User Guide. Version 2.2 Cardholder and Program Administrator Access Online Navigation Basics User Guide Version 2.2 Cardholder and Program Administrator Contents Introduction... 1 Access Online Overview... 2 How We Gather and Manage Transaction Data in Access Online...

More information

Citrix Remote Access

Citrix Remote Access Citrix Remote Access User Guide 30 Churchill Place Canary Wharf London E14 5EU United Kingdom Telephone +44 (0)20 3660 6000 Facsimile +44 (0)20 3660 5555 Send a question via our website www.ema.europa.eu/contact

More information

Welcome to First Security Mobile

Welcome to First Security Mobile Welcome to First Security Mobile Frequently Asked Questions Questions General How much does this service cost? Is it secure? Which wireless carriers are supported? Do I need a data plan? I'm not enrolled

More information

Pass, No Record: An Android Password Manager

Pass, No Record: An Android Password Manager Pass, No Record: An Android Password Manager Alex Konradi, Samuel Yeom December 4, 2015 Abstract Pass, No Record is an Android password manager that allows users to securely retrieve passwords from a server

More information

Enroll in Two factor Authentication - iphone

Enroll in Two factor Authentication - iphone OVERVIEW Passwords are increasingly easy to compromise. They can often be stolen, guessed, or hacked you might not even know someone is accessing your account. Two factor authentication adds a second layer

More information

Salesforce1 Mobile Security White Paper. Revised: April 2014

Salesforce1 Mobile Security White Paper. Revised: April 2014 Salesforce1 Mobile Security White Paper Revised: April 2014 Table of Contents Introduction Salesforce1 Architecture Overview Authorization and Permissions Communication Security Authentication OAuth Pairing

More information

penelope case management software AUTHENTICATION GUIDE v4.4 and higher

penelope case management software AUTHENTICATION GUIDE v4.4 and higher penelope case management software AUTHENTICATION GUIDE v4.4 and higher Last modified: August 9, 2016 TABLE OF CONTENTS Authentication: The basics... 4 About authentication... 4 SSO authentication... 4

More information

OUTLOOK VIA THE INTERNET

OUTLOOK VIA THE INTERNET OUTLOOK VIA THE INTERNET Table of Contents Page LESSON 1: GETTING STARTED...1 Logging On...1 Parts of the Outlook Window...3 Terms...4 LESSON 2: E-MAIL...6 Mail Folders...6 Composing a New Message...7

More information

Corporate Internet Banking Service FAQ

Corporate Internet Banking Service FAQ Corporate Internet Banking Service FAQ 1. How do I apply for BOCNET (Bank of China Internet banking Service)? In order to apply for the Service, you must have at least one account with Bank of China (Malaysia)

More information

ESS Security Enhancements

ESS Security Enhancements ESS Security Enhancements payentry.com Employee Self Service Enhancements 1 Table of Contents INTRODUCTION 3 EXISTING EMPLOYEES 3 Existing Employee -Email Address 4 Existing Employee - Username 4 Existing

More information

Vendor: RSA. Exam Code: CASECURID01. Exam Name: RSA SecurID Certified Administrator 8.0 Exam. Version: Demo

Vendor: RSA. Exam Code: CASECURID01. Exam Name: RSA SecurID Certified Administrator 8.0 Exam. Version: Demo Vendor: RSA Exam Code: 050-80-CASECURID01 Exam Name: RSA SecurID Certified Administrator 8.0 Exam Version: Demo QUESTION NO: 1 RSA 050-80-CASECURID01 Exam Which of the following can cause the error message

More information

GLOBAL PAYMENTS AND CASH MANAGEMENT. Security

GLOBAL PAYMENTS AND CASH MANAGEMENT. Security GLOBAL PAYMENTS AND CASH MANAGEMENT Security The Bank aims to provide you with a robust, reliable and secure online environment in which to do business. We seek to achieve this through the adoption of

More information

Guide to Getting Started. Personal Online Banking & Bill Pay

Guide to Getting Started. Personal Online Banking & Bill Pay Guide to Getting Started Personal Online Banking & Bill Pay What s Inside Welcome to National Bank of Arizona s Online Banking. Whether you re at home, at work, or on the road, our online services are

More information

Regions OnePassSM USER GUIDE. It s time to expect more. Regions Bank Member FDIC Revised

Regions OnePassSM USER GUIDE. It s time to expect more. Regions Bank Member FDIC Revised Regions OnePassSM USER GUIDE Regions Bank Member FDIC Revised 110614 It s time to expect more. Regions OnePass User Guide Table of Contents Section I. OnePass Basics 3 What Is OnePass? 3 Minimum Browser

More information

ORAC Match. User Manual for Support Workers. V1.0 Updated 13/11/2017

ORAC Match. User Manual for Support Workers. V1.0 Updated 13/11/2017 ORAC Match User Manual for Support Workers V1.0 Updated 13/11/2017 1 Contents: The Login Screen: ORAC can be accessed through any web browser, smartphone or tablet via the following link; https://app.orac.support

More information

1. General Description... 2

1. General Description... 2 Created by Lindhoudt Harald Date of Creation May 12 th, 2010 Released by Glatz Klaus Date of Release May 21 st, 2010 TABLE OF CONTENT 1. General Description... 2 2. End-user Portal Services instructions...

More information

<Partner Name> <Partner Product> RSA SECURID ACCESS. NetMove SaAT Secure Starter. Standard Agent Client Implementation Guide

<Partner Name> <Partner Product> RSA SECURID ACCESS. NetMove SaAT Secure Starter. Standard Agent Client Implementation Guide RSA SECURID ACCESS Standard Agent Client Implementation Guide NetMove Daniel R. Pintal, RSA Partner Engineering Last Modified: April 4, 2018 Solution Summary Secure Starter

More information

Users Guide. Kerio Technologies

Users Guide. Kerio Technologies Users Guide Kerio Technologies C 1997-2006 Kerio Technologies. All rights reserved. Release Date: June 8, 2006 This guide provides detailed description on Kerio WebSTAR 5, version 5.4. Any additional modifications

More information

1.1. HOW TO START? 1.2. ACCESS THE APP

1.1. HOW TO START? 1.2. ACCESS THE APP Table of Contents 1. Get Started 1.1. How to start? 1.2. Access the app 1.3. Username and password 2. Mobile Banking features 3. Security 4. Accounts and inquiries 5. Transfers and beneficiaries 6. Charges

More information

RSA ACE/Server 5.2 Administrator s Guide

RSA ACE/Server 5.2 Administrator s Guide RSA ACE/Server 5.2 Administrator s Guide Contact Information See our Web sites for regional Customer Support telephone and fax numbers. RSA Security Inc. RSA Security Ireland Limited www.rsasecurity.com

More information

Accessing Insurance Portal/PAS Job Aid Single Sign-On

Accessing Insurance Portal/PAS Job Aid Single Sign-On Accessing Insurance Portal/PAS Job Aid Single Sign-On Getting Started with Insurance Portal and PAS - Create Desktop Shortcut and Single Sign-On Password Getting Started To Get Started with Insurance Portal

More information

PS Suite EMR ASP Remote Access Setup Guide for Macintosh computers

PS Suite EMR ASP Remote Access Setup Guide for Macintosh computers PS Suite EMR ASP Remote Access Setup Guide for Macintosh computers MDQS-6-3639 Rev 4.0 Revised June 13, 2017. PS Suite EMR software and related products and services are owned by TELUS. PS Suite EMR and

More information

Online Banking Service FAQ(Corporate)

Online Banking Service FAQ(Corporate) Online Banking Service FAQ(Corporate) Getting Started 1. How do I apply for BOCNET (Bank of China online banking Service)? 2. What are services available on Bank of China Online Banking (BOCNET)? 3. What

More information

Welcome to CSB on Command Frequently Asked Questions

Welcome to CSB on Command Frequently Asked Questions Welcome to CSB on Command Frequently Asked Questions General How much does this service cost? There is currently no charge associated with the service. However, there may be charges associated with text

More information

Why was an extra step of choosing a Security Image added to the sign-in process?

Why was an extra step of choosing a Security Image added to the sign-in process? General Information Why was an extra step of choosing a Security Image added to the sign-in process? Criminals can create websites that look very similar to legitimate business websites. We want to take

More information

PASSWORD POLICY. Policy Statement. Reason for Policy/Purpose. Who Needs to Know This Policy. Website Address for this Policy.

PASSWORD POLICY. Policy Statement. Reason for Policy/Purpose. Who Needs to Know This Policy. Website Address for this Policy. Responsible University Administrator: Vice Provost for Academic Affairs Responsible Officer: Chief Information Officer Origination Date: N/A Current Revision Date: 02/19/13 Next Review Date: 02/19/17 End

More information

Advantage Cloud Two-Factor Security Process

Advantage Cloud Two-Factor Security Process Advantage Cloud Two-Factor Security Process Advantage Cloud Two-Factor Security Process Table of Contents: 1. Why use Two-Factor Authentication? 2. Two-Factor Authentication Guide for Faculty Members 3.

More information

SWITS User Manual. Accessing SWITS. This document focuses on the elements required to Access SWITS. Total Pages: 5

SWITS User Manual. Accessing SWITS. This document focuses on the elements required to Access SWITS. Total Pages: 5 SWITS User Manual This document focuses on the elements required to Access SWITS Total Pages: 5 Accessing SWITS Using Your Browser to Access SWITS Identity Management Context Creating a shortcut California

More information

Signing up for My Lahey Chart

Signing up for My Lahey Chart Signing up for My Lahey Chart What is My Lahey Chart? My Lahey Chart is a helpful service that allows you to connect with your doctor and your health information online, anytime. Using your personal computer

More information

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. PingIdentity PingFederate 8

<Partner Name> <Partner Product> RSA SECURID ACCESS Implementation Guide. PingIdentity PingFederate 8 RSA SECURID ACCESS Implementation Guide PingIdentity John Sammon & Gina Salvalzo, RSA Partner Engineering Last Modified: February 27 th, 2018 Solution Summary Ping Identity

More information

MyAccount. leasehold. Happy living for the years ahead

MyAccount. leasehold. Happy living for the years ahead MyAccount leasehold Happy living for the years ahead Contents What is MyAccount Viewing your statement online Setting up a Direct Debit Updating MyAccount details Housing application form MyAccount security

More information

WHITE PAPER. Authentication and Encryption Design

WHITE PAPER. Authentication and Encryption Design WHITE PAPER Authentication and Encryption Design Table of Contents Introduction Applications and Services Account Creation Two-step Verification Authentication Passphrase Management Email Message Encryption

More information

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION

SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION SECURING CORPORATE ASSETS WITH TWO FACTOR AUTHENTICATION Introduction Why static passwords are insufficient Introducing two-factor Authentication Form Factors for OTP delivery Contact information OTP generating

More information

Frequently Asked Questions (FAQ)

Frequently Asked Questions (FAQ) Your personal information and account security is important to us. This product employs a Secure Sign On process that includes layers of protection at time of product log in to mitigate risk, and thwart

More information

Mobile Banking FAQ. 1 P a g e 1 0 / 1 9 /

Mobile Banking FAQ. 1 P a g e 1 0 / 1 9 / Mobile Banking FAQ Q) Can anyone sign up for Mobile Banking? A) Mobile Banking enables any consumer with online banking to access their account information from a mobile device. Mobile Banking offers three

More information