Defender Desktop Login GrIDsure Token User Guide
|
|
- Elizabeth Wilcox
- 6 years ago
- Views:
Transcription
1 Desktop Login GrIDsure Token User Guide Introduction This guide describes what the user will see when using Desktop Login with GrIDsure tokens. The logon procedure will vary slightly depending on the platform you are using, either Windows XP, Windows Vista, Windows 7, Windows 2003, Windows 2008 or Windows 2008 R2. Examples are provided below. For information on how to configure the Policy and program the GrIDsure token, please refer to the guide entitled - Configuring for Use with GrIDsure Tokens. Using a GrIDsure Token with Windows 7, Windows Vista, Windows 2008 and 2008 R2 First Authentication 1. At the logon screen enter your Windows user name, ensure that the Passcode field is empty and then press return or click. 1
2 2. As this is the first authentication, you need to register the GrIDsure token. You will be prompted for your Active Directory (Windows) password. Click OK. 2
3 3. Enter your Windows password and click 4. When you are prompted to Configure your GrIDsure PIP, click OK. to continue. 3
4 5. The GrIDsure grid associated with your token is displayed allowing you to create your Personal Identification Pattern (PIP). Select squares within the grid and then enter the letters contained in the squares, without spaces, in the Configure your GrIDsure PIP: box. For example, a pattern or PIP such as BOABBFAO would create a pattern using the top left square and then the first 3 squares from row 2. Click to continue. 6. You are prompted to Use your GrIDsure PIP. Click OK. 3. To authenticate, enter the digits on the grid that correspond to your Personal Identification Pattern (PIP), then click to continue. Based on the example above of using the top left square and then the first 3 squares from row 2 the PIP would be If the authentication is successful, you are logged on to the required domain. 4
5 Subsequent Authentications with a GrIDsure Token Now that you have registered your GrIDsure token and completed the first successful authentication, you can authenticate subsequently as described below: 1. Leave the Passcode field empty and click 2. When prompted to Use your GrIDsure PIP:, click OK. to continue. 5
6 3. Using the grid, enter the digits that correspond to your Personal Identification Pattern (PIP), then click to continue. 4. If authentication is successful, you are logged on to the required domain. 6
7 Using a GrIDsure Token for Authentication on Windows XP First Authentication 1. From the Logon to Windows dialog, enter your Windows user name and the domain that you want to logon to. The Passcode field must be empty. Click OK. 2. As this is the first authentication, you need to register the GrIDsure token. You will be prompted for your Active Directory (Windows) password. Click OK. 3. Enter your password in the Response field and click OK. 7
8 4. The GrIDsure grid associated with your token will displayed allowing you to create your Personal Identification Pattern (PIP), select squares within the grid and then enter the letters contained in the squares, without spaces, in the Response field. 8
9 For example, a pattern or PIP such as BACBAGAK would create a pattern using the top left square and then the first 3 squares from row To authenticate, enter the digits on the grid that correspond to your Personal Identification Pattern (PIP) in the Response field then click OK to continue. Based on the example above of using the top left square and then the first 3 squares from row 2 the PIP would be If the authentication is successful, you are logged on to the required domain. 9
10 Subsequent Authentications with a GrIDsure Token Now that you have completed your first successful authentication with your GrIDsure token, you can authenticate subsequently as described below. 1. From the Log On to Windows dialog, enter your Windows user name and domain. Leave the Passcode field empty and click OK. 2. To authenticate, enter the digits on the grid that correspond to your Personal Identification Pattern (PIP) in the Response field, then click OK to continue. 3. If authentication is successful, you are logged on to the required domain. 10
11 What if I have another Token? Windows 7 Platform This section describes what to do if you have another token, in addition to your GrIDsure token. When you have registered your GrIDsure token, you can then have a second token assigned to you. if you have more than one token, the logon procedure is as follows: In this example, the user has a GrIDsure token and a synchronous token (e.g. Go-3) assigned to his account. To use the synchronous token, simply enter the token response, from the Go-3 in this example, into the Passcode field. To use the GrIDsure token, enter the digits on the grid that correspond to your PIP. 11
12 Windows XP Platform This section describes what to do if you have another token, in addition to your GrIDsure token. When you have registered your GrIDsure token, you can then have a second token assigned to you. If you have more than one token, the logon procedure is as follows. In this example, the user has a GrIDsure token and a synchronous token (e.g. Go-3) assigned to his account. To use the synchronous token, simply enter the token response, from the Go-3 in this example, into the Passcode field. If you leave the Passcode field empty and click OK, the following prompt is displayed: 12
13 4. Either enter your synchronous token response, from the Go-3 token in this example, in the Response field or select Use GrIDsure to display the GrIDsure grid and authenticate with your PIP. TRADEMARKS Quest, Quest Software, the Quest Software logo and itoken are trademarks and registered trademarks of Quest Software, Inc. in the United States of America and other countries. Gridsure and the Gridsure logos are trademarks and registered trademarks of Gridlock TS Limited. All other trademarks and registered trademarks are property of their respective owners. 13
Defender Configuring for Use with GrIDsure Tokens
Configuring for Use with GrIDsure Tokens Introduction The GrIDsure token can be used to protect any website hosted on Internet Information Server (IIS). 5.6 supports the use of GrIDsure tokens with the
More informationEOH-SASOL - Setup Sasol Mobile Express (Client)
EOH-SASOL - Setup Sasol Mobile Express (Client) Document Control Document Information Information Document Id SSL/BO/121/WI Document Owner Back Office Operations Manager Issue Date 18 May 2016 Last Saved
More information3. Optionally, if you want to use the new Web SSO feature, complete the steps in Adding Web Single Sign-On Functionality.
Webthority HOW TO Upgrade The steps required to upgrade depend on the version you are upgrading from: upgrading from 6.5 upgrading from 6.0. Upgrading from 6.5 To upgrade from 6.5 perform the following
More informationHOTPin Software Instructions. Mac Client
HOTPin Software Instructions Mac Client The information contained in this document represents the current view of Celestix Networks on the issues discussed as of the date of publication. Because Celestix
More informationHow to Import a Certificate When Using Microsoft Windows OS
How to Import a Certificate When Using Microsoft Windows OS This document explains the process of importing your digital certificate for use in Microsoft Internet Explorer (IE) and/or Mozilla Firefox.
More informationHow to Use Google Cloud Print
1 The machine is compatible with Google Cloud Print (Google Cloud Print is a service provided by Google Inc.). By using Google Cloud Print, you can print from anywhere with applications or services supporting
More informationOutlook 2010 Setup Guide (POP3 Transmailaccess)
Versions Addressed: Microsoft Office Outlook 2010 Document Updated: 7 /22/2013 Copyright 2012 Smarsh, Inc. All rights reserved. Purpose: This document will assist the end user in configuring Outlook 2010
More informationImplementation Guide for protecting Juniper SSL VPN with BlackShield ID
Implementation Guide for protecting Juniper SSL VPN with BlackShield ID Copyright Copyright 2011, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,
More informationEntrust Cloud Enterprise. Enrollment Guide
Entrust Cloud Enterprise Enrollment Guide Entrust Cloud Enterprise Enrollment Guide Document issue: 1.0 Copyright 2016 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of
More informationIntegration Guide. SafeNet Authentication Service. Strong Authentication for Juniper Networks SSL VPN
SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information
More informationAventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.9.0 1996-2007 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
More informationRSA SecurID Software Token 2.0 For Palm Handhelds User s Guide
RSA SecurID Software Token 2.0 For Palm Handhelds User s Guide This guide explains how to install and use your RSA SecurID Software Token 2.0 for Palm Handhelds application. This guide assumes that you
More informationCreating a Crosstab Query in Design View
Procedures LESSON 31: CREATING CROSSTAB QUERIES Using the Crosstab Query Wizard box, click Crosstab Query Wizard. 5. In the next Crosstab Query the table or query on which you want to base the query. 7.
More informationST-1 Software Token. QUICK Reference
ST-1 Software Token QUICK Reference Overview The ST-1 is a software implementation of an authentication token and is designed for installation on Microsoft Windows, Linux, and Mac OS X computing platforms.
More informationSetting File Creation Software for North America. Installation Instructions
Contents 1 Overview............................................................. 2 2 System Requirements.................................................. 2 3 Installing and Uninstalling..............................................
More informationWeb Intelligence Rich Client Getting Started Business Objects 4.1
User Guide Web Intelligence Rich Client Getting Started Business Objects 4.1 Web Intelligence Rich Client Getting Started User Guide Contents Purpose of this Guide... 3 About Web Intelligence 4.1... 3
More informationActiveSecurity MyClient
ActiveSecurity MyClient Setup Guide Contents 1 Introduction... 2 2 Installation of ActiveSecurity MyClient... 2 2.1 Desktop installation... 2 3 Configuration... 6 3.1 Language... 6 3.2 Smart card management...
More informationUsing CSE Cisco Anyconnect with 2FA
Using CSE Cisco Anyconnect with 2FA If you are using the Duo Mobile App in push mode: you open Anyconnect. 3. Enter your CSE UserName for the Username. 4. A new window will open. 5. Enter your CSE UserName
More information3. IMPORTANT: When prompted, accept the default Installation directory.
Installing ProView 4.0.1 on your PC 1. Insert the ProView 4.0.1 CD-ROM into your CD-ROM Drive. The Install Shield Wizard should run automatically. If it does not, click Start then Run. Enter D:\setup.exe
More informationWindows Smart Card Logon Use Case
Windows Smart Card Logon Use Case Issue Smart Card Logon versasec.com 1(13) Table of Contents Windows Smart Card Logon Use Case... 3 Step 1 Configuring a Windows Smart Card Logon Template... 3 Step 2 Configuring
More informationClient Configuration Guide
Email Client Configuration Guide Contents Prerequisites... 1 Microsoft Outlook 2007... 2 Microsoft Outlook 2002/XP and 2003... 7 Microsoft Windows Mail (available with Vista only)... 11 Microsoft Outlook
More informationBlackShield ID. Windows Logon Agent CRYPTOCard Corp. All rights reserved.
Windows Logon Agent 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced, transmitted,
More informationGuide Installation and User Guide - Mac
Guide Installation and User Guide - Mac With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign
More informationLab - Remote Desktop in Windows 7 and Vista
Lab - Remote Desktop in Windows 7 and Vista Introduction In this lab, you will remotely connect to another Windows 7 or Vista computer. Recommended Equipment The following equipment is required for this
More informationSecuring VSPEX VMware View 5.1 End- User Computing Solutions with RSA
Design Guide Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA VMware vsphere 5.1 for up to 2000 Virtual Desktops EMC VSPEX Abstract This guide describes required components and a configuration
More information2012 Peer Small Business Data
Welcome The installation program installs the following data sets: 2012 Peer Small Business Data 2012 Peer Small Business Data In order to use this data set you should be running CRA Wiz and Fair Lending
More informationAT&T Global Network Client Domain Logon Guide. Version 9.7
Version 9.7 AT&T Global Network Client Domain Logon Guide 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual
More informationEntrust PartnerLink Login Instructions
Entrust PartnerLink Login Instructions Contents Introduction... 4 Purpose 4 Overview 4 Prerequisites 4 Instructions... 5 Entrust is a registered trademark of Entrust, Inc. in the United States and certain
More informationMedia Writer. Installation Guide LX-DOC-MW5.1.9-IN-EN-REVB. Version 5.1.9
Media Writer Installation Guide Version 5.1.9 Regulations and Compliance Tel: 1-844-535-1404 Email: TS_PACSGEAR@hyland.com 2018 Hyland. Hyland and the Hyland logo are trademarks of Hyland LLC, registered
More informationGuide for Windows users with Internet Explorer and Firefox
Velocity@ocbc Guide for Windows users with Internet Explorer and Firefox Version 2.0 070513 1 of 18 Check the Java version 1. Launch a browser and go to http://www.java.com/en/download/installed.jsp?detect=jre
More informationSage Residential Management. Moving Data Files Version 13.1
Sage Residential Management Moving Data Files Version 13.1 NOTICE This is a publication of Sage Software, Inc. Document Number 33412.1 04/2013 2013 Sage Software, Inc. All rights reserved. Sage, the Sage
More informationInstalling Act! for New Users
Installing Act! for New Users Installing Act! for New Users 2017 Swiftpage ACT! LLC. All Rights Reserved. Swiftpage, Act!, and the Swiftpage product and service names mentioned herein are registered trademarks
More informationClient Proxy interface reference
Reference Guide McAfee Client Proxy 2.3.2 Client Proxy interface reference These tables provide information about the settings found in the Client Proxy UI. Policy Catalog On the McAfee Client Proxy page
More informationInstalling Encompass360 SmartClient
Installing Encompass360 SmartClient This document describes Encompass360 system requirements, configuration options, and installation steps for the SmartClient. Before installing Encompass360 SmartClient,
More information<Partner Name> <Partner Product> RSA SECURID ACCESS. VMware Horizon View 7.2 Clients. Standard Agent Client Implementation Guide
RSA SECURID ACCESS Standard Agent Client Implementation Guide VMware Horizon View 7.2 Clients Daniel R. Pintal, RSA Partner Engineering Last Modified: September 14, 2017
More informationConnect to Wireless, certificate install and setup Citrix Receiver
Connect to Wireless, certificate install and setup Citrix Receiver This document explains how to connect to the Wireless Network and access applications using Citrix Receiver on a Bring Your Own Device
More informationUSB DRIVER INSTALLATION GUIDE
USB DRIVER INSTALLATION GUIDE Use these instructions to install the USB drivers and Microsoft synchronization software for your Pathfinder 6057 printer. You need these utilities for your printer to communicate
More informationConfiguring an IPSec Tunnel Between a Cisco SA500 and the Cisco VPN Client
Application Note Configuring an IPSec Tunnel Between a Cisco SA500 and the Cisco VPN Client This application note document provides information on how to configure an SA500 IPSec VPN Tunnel for remote
More informationTimeCurve QuickBooks Utility User Manual. Version 1.0
TimeCurve QuickBooks Utility User Manual Version 1.0 1 Index Of Contents 1. Overview...3 1.1 Purpose of QuickBooks Utility application...3 1.2 Minimum Requirements...3 1.3 Overview of Data Synchronization...3
More informationCHANGING IP ADDRESS OF PERSYSTENT SERVER
CHANGING IP ADDRESS OF PERSYSTENT SERVER Overview It is important to have a static IP Address for Persystent Server. Change may require manual intervention to update the IP address for Persystent Server
More informationAdministrator Quick Reference
Contents Adding a New User... 2 Adding a New Crew Member.... 4 Adding a New Location.... 6 Resetting a Forgotten Password... 8 Adding a New User Any member of your organization - field providers, reviewers,
More informationWeb Client Installation under Windows 7 and Windows Vista
Web Client Installation under Windows 7 and Windows Vista Due to extended and enhanced security features of Windows 7, Windows Vista, and Internet Explorer, the installation of the Web client is different
More informationCompany and User Set Up. Company Policy. NOTE: The Company Policy controls the companylevel feature entitlements and dollar limits.
Company and User Set Up Company Policy NOTE: The Company Policy controls the companylevel feature entitlements and dollar limits. 1. Select Commercial and then Company Policy. 2. Select a transaction type
More informationINTEGRATION GUIDE. DIGIPASS Authentication for VMware View
INTEGRATION GUIDE DIGIPASS Authentication for VMware View Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security
More informationSecureLogin 8.7 Application Definition Wizard Administration Guide. December, 2018
SecureLogin 8.7 Application Definition Wizard Administration Guide December, 2018 Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use restrictions, U.S.
More informationConnection Name: Type ASYNC to PPP, Click Next, Do you want to set up an Internet mail account now? No Click Next, Click Finish
Defense Logistics Agency (DLA) Transaction Services Automated Message Exchange System (DAMES) Instructions. DAMES Dial up using the ASYNC to PPP connection available from Microsoft Windows Software. Microsoft
More informationConfiguring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them
Configuring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them The Content Collection should be the repository for all of the files used in Blackboard. The Content Collection
More informationMicrosoft Windows GINA login
Microsoft Windows GINA login Contents 1 Introduction 2 Prerequisites 3 Baseline 4 Architecture 5 Swivel Configuration 5.1 Configure a Swivel Agent 5.2 Create a Third Party Authentication 6 Terminal Services
More informationEnrollment Operator Guide. Avigilon Access Control Manager System Version
Enrollment Operator Guide Avigilon Access Control Manager System Version 5.12.0 2018, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, ACCESS CONTROL MANAGER, ACM, and ACM VERIFY
More informationAppScaler SSO Active Directory Guide
Version: 1.0.3 Update: April 2018 XPoint Network Notice To Users Information in this guide is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless
More informationGuide Installation and User Guide - Linux
Guide Installation and User Guide - Linux With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign
More informationFile Management Utility User Guide
File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held
More informationRSA NetWitness Logs. EMC Data Domain. Event Source Log Configuration Guide
RSA NetWitness Logs Event Source Log Configuration Guide EMC Data Domain Last Modified: Monday, January 16, 2017 Event Source Product Information: Vendor: EMC Event Source: Data Domain Versions: 5.1.0.4
More informationCrystal Enterprise. Overview. Contents. Upgrading CE8.5 to CE10 Microsoft Windows
Crystal Enterprise Upgrading CE8.5 to CE10 Microsoft Windows Overview This document is intended to assist you upgrade from a Crystal Enterprise (CE) 8.5 system to a CE 10 system. NOTE: The scenario outlined
More information1. A broadband connection. 2. Windows Vista (for these instructions; other operating systems have other instructions).
A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources
More informationPrint Manager Plus 2010 Workgroup Print Tracking and Control
INTRODUCTION: This is intended to assist in the initial installation or evaluation of Print Manager Plus 2010 Workgroup Edition. This will guide you through tracking your printing whether your workgroup
More informationInventoryControl Quick Start Guide
InventoryControl Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY PRODUCTS OR SERVICES ARE
More informationLicense Manager Client
License Manager Client Operations Guide NEC NEC Corporation of America November 2010 NDA-30899, Revision 6 Liability Disclaimer NEC Corporation of America reserves the right to change the specifications,
More informationUpgrading from Access to SQL
Upgrading from Access to SQL Article Number: 80 Rating: Unrated Last Updated: Fri, Dec 30, 2016 at 2:24 PM The default database format for SureSync is an Access database. SureSync also supports SQL 2000
More informationUsing SANDeploy iscsi SAN for VMware ESX / ESXi Server
Using SANDeploy iscsi SAN for VMware ESX / ESXi Server Friday, October 8, 2010 www.sandeploy.com Copyright SANDeploy Limited 2008 2011. All right reserved. Table of Contents Preparing SANDeploy Storage...
More informationConferencing Integration With IBM Lotus Sametime User Guide
USER GUIDE Conferencing Conferencing Integration With IBM Lotus Sametime User Guide Overview... 2 Supported Platforms... 2 Supported Languages... 2 Installation Process.... 2 Main Window Action Bar Button
More informationPassword Changer User Guide
Active@ Password Changer User Guide Copyright 1999-2017, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative
More informationImplementation Guide VMWare View 5.1. DualShield. for. VMWare View 5.1. Implementation Guide
DualShield for VMWare View 5.1 Implementation Guide Copyright 2012 Deepnet Security Limited Copyright 2012, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID,
More informationSmart Energy & Power Quality Solutions. GridVis introduction. Dok. Nr.:
GridVis introduction Dok. Nr.: 2.047.006.2 Contents Minimum requirements 4 Software versions - GridVis license model 5 Installation and Activation of the GridVis Desktop Software 6 Installation of the
More informationPAS. Installation Guide. BG0608 Rev. A1. Copyright SATEC Ltd.
PAS Installation Guide BG0608 Rev. A1 Copyright 2011-2017 SATEC Ltd. Table of Contents Chapter 1 Installation... 3 1. Scope... 3 2. Minimal installation requirements... 3 3. Pre-installation steps... 3
More informationIntegration Guide. SafeNet Authentication Service (SAS)
Integration Guide SafeNet Authentication Service (SAS) Revised: 10 June 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating
More informationImageNow Interact for Microsoft Office Installation and Setup Guide
ImageNow Interact for Microsoft Office Installation and Setup Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive
More informationChapter 9: Administering Your System With the Administrator Control Panel (ACP)
Logging Onto the ACP Logging Onto the ACP Follow to log onto the ACP. Logging On to the Administrator Control Panel 1 Log on to your system using standard Windows XP logon methods. 2 Double-click the MOTOBRIDGE
More informationGuide Installation and User Guide - Windows
Guide Installation and User Guide - Windows With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally
More informationCRA Wiz and Fair Lending Wiz. Installation Guide V6.9
CRA Wiz and Fair Lending Wiz Installation Guide V6.9 CRA Wiz and Fair Lending Wiz 6.9 Installation Instructions The following installation instructions provide procedures for a new installation of CRA
More informationSage ERP Accpac 6.0A. SageCRM 7.0 I Integration Guide
Sage ERP Accpac 6.0A SageCRM 7.0 I Integration Guide 2010 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and all Sage ERP Accpac product and service names mentioned herein are registered
More informationHealthcare Desktop Office GPO Templates for GPMC v1
Healthcare Desktop Office GPO Templates for GPMC v1 Release Notes Prepared by Microsoft First published 27 September 2007 Copyright This document and/or software ( this Content ) has been created in partnership
More informationCitrix MyAppsRemote User Guide
Citrix MyAppsRemote User Guide How to Use Citrix MyAppsRemote and Your RSA SecurID Token to Access the Intranet Version of HRdirect and other Secure Optum360/UnitedHealth Group Systems Table of Contents
More informationRSA NetWitness Logs. VMware ESX/ESXi. Event Source Log Configuration Guide. Last Modified: Tuesday, November 7, 2017
RSA NetWitness Logs Event Source Log Configuration Guide VMware ESX/ESXi Last Modified: Tuesday, November 7, 2017 Event Source Product Information: Vendor: VMware Event Source: ESX, ESXi, Embedded ESXi
More informationInstalling Authoring Manager
Installing Authoring Manager Installing Authoring Manager v5.2 (PC only) System Requirements: Before you install Authoring Manager, you should ensure that your system meets the minimum software and hardware
More informationRemote Access. Application Viewer User Guide
Remote Access Application Viewer User Guide Page Logging into Application Viewer... 3 Logging off Application Viewer... 9 Lost or stolen tokens... 9 Application Viewer User Guide October 11, 2011 2 of
More informationToken Guide for KT-4 for
Token Guide for KT-4 for Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Token Guide for KT-4 Copyright Copyright 2011. CRYPTOCard Inc.
More informationActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager. Integration Handbook
ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager Integration Handbook Document Version 1.1 Released July 11, 2012 ActivIdentity 4TRESS AAA Web Tokens and F5 APM Integration Handbook
More informationestos UCServer Multiline TAPI Driver
estos UCServer Multiline TAPI Driver 5.1.110.44786 1 estos UCServer Multiline TAPI Driver...4 1.1 Requirements...4 1.2 Connection to the server...4 1.3 Log-on...5 1.4 Line configuration...5 1.5 Completion...5
More informationHow Do I Manage Active Directory
How Do I Manage Active Directory Your Red Box Recorder supports Windows Active Directory integration and Single Sign-On. This Quick Question topic is provided for system administrators and covers the setup
More informationFAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version
FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version 2009.1 2009 Sage Software, Inc. All rights reserved. Published by Sage 2325 Dulles Corner
More informationTop Producer for Palm Handhelds
Top Producer for Palm Handhelds Quick Setup Top Producer Systems Phone number: 1-800-830-8300 Email: support@topproducer.com www.topproducer.com Fax: 604.270.6365 Top Producer for Palm handhelds Quick
More informationWindows Authentication. Delphi Service Pack 3. Document Version /10/09
Delphi 9.5.2 Service Pack 3 Document Version 1.0 11/10/09 Copyright 2009 Newmarket International, Inc. All rights reserved. The information in this document is confidential and proprietary to Newmarket
More informationTechnical Brief Veritas Technical Education Services
Veritas Desktop and Laptop Option 9.3 The Veritas Desktop and Laptop Option provides automated file protection for Desktops and laptops. Protection is provided regardless of whether the computer is connected
More informationRSA NetWitness Logs. IBM ISS SiteProtector. Event Source Log Configuration Guide. Last Modified: Monday, May 22, 2017
RSA NetWitness Logs Event Source Log Configuration Guide IBM ISS SiteProtector Last Modified: Monday, May 22, 2017 Event Source Product Information: Vendor: IBM Event Source: Proventia Appliance, SiteProtector,
More informationScotiaConnect Registration Quick Reference Guide
ScotiaConnect Registration Quick Reference Guide Table of Contents Physical Token Registration... 2 Digital Token Registration... 4 For Further Assistance... 8 Version 2.0 ScotiaConnect supports two different
More informationReadme RSA Authentication Manager 6.1
Readme RSA Authentication Manager 6.1 October 26, 2005 Introduction This document lists known issues, and includes other important information about RSA Authentication Manager 6.1. Read this document before
More informationTraverse Intelligent Tracking by PCS. Installation Guide for Traverse.
Traverse Intelligent Tracking by PCS Installation Guide for Traverse. Tom Romeo 6/10/2011 The information in this documentation is not contractual in nature. It is subject to modification without notice.
More informationHow to reset your password when given a PASSCODE from the IT Service Desk. Page 2-8. How to change a Forgotten Password by Yourself.
1 How to reset your password when given a PASSCODE from the IT Service Desk Page 2-8 How to change a Forgotten Password by Yourself Page 9-12 2 How to reset your password when given a PASSCODE from the
More informationParallels Desktop 4.0 Switch to Mac Edition. Migrate your PC Tutorial.
Parallels Desktop 4.0 Switch to Mac Edition Migrate your PC Tutorial www.parallels.com Migrate Your PC with Parallels Transporter Tutorial The enhanced Parallels Transporter included in Parallels Desktop
More informationRSA NetWitness Logs. ManageEngine NetFlow Analyzer. Event Source Log Configuration Guide. Last Modified: Monday, March 06, 2017
RSA NetWitness Logs Event Source Log Configuration Guide ManageEngine NetFlow Analyzer Last Modified: Monday, March 06, 2017 Event Source Product Information: Vendor: ManageEngine Event Source: NetFlow
More informationJohns Hopkins
Wireless Configuration Guide: Windows Vista Additional hopkins wireless network instructions and requirements for Windows 8, 7, XP, Mac OS X, Linux, and Mobile versions can be found at: http://www.it.johnshopkins.edu/services/network/wireless/
More informationSharePoint AD Administration Tutorial for SharePoint 2007
SharePoint AD Administration Tutorial for SharePoint 2007 1. General Note Please note that AD Administration has to be activated before it can be used. For further reference, please see our Product Installation
More informationConfiguring WPA2 for Windows XP
Configuring WPA2 for Windows XP Requirements for wireless using WPA2 on Windows XP Your wireless card must support 802.1x, AES, and WPA2. Your computer must have Windows XP service pack 2 installed and
More informationExternal Authentication with Citrix GoToMyPc Corporate Edition Authenticating Users Using SecurAccess Server by SecurEnvoy
External Authentication with Citrix GoToMyPc Corporate Edition Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington
More informationOne Identity Defender 5.9. Product Overview
One Identity 5.9 Product Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished
More informationREST API Operations. 8.0 Release. 12/1/2015 Version 8.0.0
REST API Operations 8.0 Release 12/1/2015 Version 8.0.0 Table of Contents Business Object Operations... 3 Search Operations... 6 Security Operations... 8 Service Operations... 11 Business Object Operations
More informationThis is a GENERAL Servant Keeper Network Installation help sheet. If you need further assistance, please contact your network administrator.
SK Help Network Help Sheets - Workstation Installation This is a GENERAL Servant Keeper Network Installation help sheet. If you need further assistance, please contact your network administrator. Due to
More informationReinstalling the Operating System on the Dell PowerVault 745N
Reinstalling the Operating System on the Dell PowerVault 745N This document details the following steps to reinstall the operating system on a PowerVault 745N system: 1. Install the Reinstallation Console
More informationRemote Access User Guide for Mac OS (Citrix Instructions)
(Citrix Instructions) VERSION: 003 PUBLISHED: 2/2018 Page 1 of 8 Remote Access User Guide for Mac OS Please follow the steps outlined in this guide which will show you how to access the Clarion Partners
More information