Defender Desktop Login GrIDsure Token User Guide

Size: px
Start display at page:

Download "Defender Desktop Login GrIDsure Token User Guide"

Transcription

1 Desktop Login GrIDsure Token User Guide Introduction This guide describes what the user will see when using Desktop Login with GrIDsure tokens. The logon procedure will vary slightly depending on the platform you are using, either Windows XP, Windows Vista, Windows 7, Windows 2003, Windows 2008 or Windows 2008 R2. Examples are provided below. For information on how to configure the Policy and program the GrIDsure token, please refer to the guide entitled - Configuring for Use with GrIDsure Tokens. Using a GrIDsure Token with Windows 7, Windows Vista, Windows 2008 and 2008 R2 First Authentication 1. At the logon screen enter your Windows user name, ensure that the Passcode field is empty and then press return or click. 1

2 2. As this is the first authentication, you need to register the GrIDsure token. You will be prompted for your Active Directory (Windows) password. Click OK. 2

3 3. Enter your Windows password and click 4. When you are prompted to Configure your GrIDsure PIP, click OK. to continue. 3

4 5. The GrIDsure grid associated with your token is displayed allowing you to create your Personal Identification Pattern (PIP). Select squares within the grid and then enter the letters contained in the squares, without spaces, in the Configure your GrIDsure PIP: box. For example, a pattern or PIP such as BOABBFAO would create a pattern using the top left square and then the first 3 squares from row 2. Click to continue. 6. You are prompted to Use your GrIDsure PIP. Click OK. 3. To authenticate, enter the digits on the grid that correspond to your Personal Identification Pattern (PIP), then click to continue. Based on the example above of using the top left square and then the first 3 squares from row 2 the PIP would be If the authentication is successful, you are logged on to the required domain. 4

5 Subsequent Authentications with a GrIDsure Token Now that you have registered your GrIDsure token and completed the first successful authentication, you can authenticate subsequently as described below: 1. Leave the Passcode field empty and click 2. When prompted to Use your GrIDsure PIP:, click OK. to continue. 5

6 3. Using the grid, enter the digits that correspond to your Personal Identification Pattern (PIP), then click to continue. 4. If authentication is successful, you are logged on to the required domain. 6

7 Using a GrIDsure Token for Authentication on Windows XP First Authentication 1. From the Logon to Windows dialog, enter your Windows user name and the domain that you want to logon to. The Passcode field must be empty. Click OK. 2. As this is the first authentication, you need to register the GrIDsure token. You will be prompted for your Active Directory (Windows) password. Click OK. 3. Enter your password in the Response field and click OK. 7

8 4. The GrIDsure grid associated with your token will displayed allowing you to create your Personal Identification Pattern (PIP), select squares within the grid and then enter the letters contained in the squares, without spaces, in the Response field. 8

9 For example, a pattern or PIP such as BACBAGAK would create a pattern using the top left square and then the first 3 squares from row To authenticate, enter the digits on the grid that correspond to your Personal Identification Pattern (PIP) in the Response field then click OK to continue. Based on the example above of using the top left square and then the first 3 squares from row 2 the PIP would be If the authentication is successful, you are logged on to the required domain. 9

10 Subsequent Authentications with a GrIDsure Token Now that you have completed your first successful authentication with your GrIDsure token, you can authenticate subsequently as described below. 1. From the Log On to Windows dialog, enter your Windows user name and domain. Leave the Passcode field empty and click OK. 2. To authenticate, enter the digits on the grid that correspond to your Personal Identification Pattern (PIP) in the Response field, then click OK to continue. 3. If authentication is successful, you are logged on to the required domain. 10

11 What if I have another Token? Windows 7 Platform This section describes what to do if you have another token, in addition to your GrIDsure token. When you have registered your GrIDsure token, you can then have a second token assigned to you. if you have more than one token, the logon procedure is as follows: In this example, the user has a GrIDsure token and a synchronous token (e.g. Go-3) assigned to his account. To use the synchronous token, simply enter the token response, from the Go-3 in this example, into the Passcode field. To use the GrIDsure token, enter the digits on the grid that correspond to your PIP. 11

12 Windows XP Platform This section describes what to do if you have another token, in addition to your GrIDsure token. When you have registered your GrIDsure token, you can then have a second token assigned to you. If you have more than one token, the logon procedure is as follows. In this example, the user has a GrIDsure token and a synchronous token (e.g. Go-3) assigned to his account. To use the synchronous token, simply enter the token response, from the Go-3 in this example, into the Passcode field. If you leave the Passcode field empty and click OK, the following prompt is displayed: 12

13 4. Either enter your synchronous token response, from the Go-3 token in this example, in the Response field or select Use GrIDsure to display the GrIDsure grid and authenticate with your PIP. TRADEMARKS Quest, Quest Software, the Quest Software logo and itoken are trademarks and registered trademarks of Quest Software, Inc. in the United States of America and other countries. Gridsure and the Gridsure logos are trademarks and registered trademarks of Gridlock TS Limited. All other trademarks and registered trademarks are property of their respective owners. 13

Defender Configuring for Use with GrIDsure Tokens

Defender Configuring for Use with GrIDsure Tokens Configuring for Use with GrIDsure Tokens Introduction The GrIDsure token can be used to protect any website hosted on Internet Information Server (IIS). 5.6 supports the use of GrIDsure tokens with the

More information

EOH-SASOL - Setup Sasol Mobile Express (Client)

EOH-SASOL - Setup Sasol Mobile Express (Client) EOH-SASOL - Setup Sasol Mobile Express (Client) Document Control Document Information Information Document Id SSL/BO/121/WI Document Owner Back Office Operations Manager Issue Date 18 May 2016 Last Saved

More information

3. Optionally, if you want to use the new Web SSO feature, complete the steps in Adding Web Single Sign-On Functionality.

3. Optionally, if you want to use the new Web SSO feature, complete the steps in Adding Web Single Sign-On Functionality. Webthority HOW TO Upgrade The steps required to upgrade depend on the version you are upgrading from: upgrading from 6.5 upgrading from 6.0. Upgrading from 6.5 To upgrade from 6.5 perform the following

More information

HOTPin Software Instructions. Mac Client

HOTPin Software Instructions. Mac Client HOTPin Software Instructions Mac Client The information contained in this document represents the current view of Celestix Networks on the issues discussed as of the date of publication. Because Celestix

More information

How to Import a Certificate When Using Microsoft Windows OS

How to Import a Certificate When Using Microsoft Windows OS How to Import a Certificate When Using Microsoft Windows OS This document explains the process of importing your digital certificate for use in Microsoft Internet Explorer (IE) and/or Mozilla Firefox.

More information

How to Use Google Cloud Print

How to Use Google Cloud Print 1 The machine is compatible with Google Cloud Print (Google Cloud Print is a service provided by Google Inc.). By using Google Cloud Print, you can print from anywhere with applications or services supporting

More information

Outlook 2010 Setup Guide (POP3 Transmailaccess)

Outlook 2010 Setup Guide (POP3 Transmailaccess) Versions Addressed: Microsoft Office Outlook 2010 Document Updated: 7 /22/2013 Copyright 2012 Smarsh, Inc. All rights reserved. Purpose: This document will assist the end user in configuring Outlook 2010

More information

Implementation Guide for protecting Juniper SSL VPN with BlackShield ID

Implementation Guide for protecting Juniper SSL VPN with BlackShield ID Implementation Guide for protecting Juniper SSL VPN with BlackShield ID Copyright Copyright 2011, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed,

More information

Entrust Cloud Enterprise. Enrollment Guide

Entrust Cloud Enterprise. Enrollment Guide Entrust Cloud Enterprise Enrollment Guide Entrust Cloud Enterprise Enrollment Guide Document issue: 1.0 Copyright 2016 Entrust. All rights reserved. Entrust is a trademark or a registered trademark of

More information

Integration Guide. SafeNet Authentication Service. Strong Authentication for Juniper Networks SSL VPN

Integration Guide. SafeNet Authentication Service. Strong Authentication for Juniper Networks SSL VPN SafeNet Authentication Service Integration Guide Technical Manual Template Release 1.0, PN: 000-000000-000, Rev. A, March 2013, Copyright 2013 SafeNet, Inc. All rights reserved. 1 Document Information

More information

Aventail Connect Client with Smart Tunneling

Aventail Connect Client with Smart Tunneling Aventail Connect Client with Smart Tunneling User s Guide Windows v8.9.0 1996-2007 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,

More information

RSA SecurID Software Token 2.0 For Palm Handhelds User s Guide

RSA SecurID Software Token 2.0 For Palm Handhelds User s Guide RSA SecurID Software Token 2.0 For Palm Handhelds User s Guide This guide explains how to install and use your RSA SecurID Software Token 2.0 for Palm Handhelds application. This guide assumes that you

More information

Creating a Crosstab Query in Design View

Creating a Crosstab Query in Design View Procedures LESSON 31: CREATING CROSSTAB QUERIES Using the Crosstab Query Wizard box, click Crosstab Query Wizard. 5. In the next Crosstab Query the table or query on which you want to base the query. 7.

More information

ST-1 Software Token. QUICK Reference

ST-1 Software Token. QUICK Reference ST-1 Software Token QUICK Reference Overview The ST-1 is a software implementation of an authentication token and is designed for installation on Microsoft Windows, Linux, and Mac OS X computing platforms.

More information

Setting File Creation Software for North America. Installation Instructions

Setting File Creation Software for North America. Installation Instructions Contents 1 Overview............................................................. 2 2 System Requirements.................................................. 2 3 Installing and Uninstalling..............................................

More information

Web Intelligence Rich Client Getting Started Business Objects 4.1

Web Intelligence Rich Client Getting Started Business Objects 4.1 User Guide Web Intelligence Rich Client Getting Started Business Objects 4.1 Web Intelligence Rich Client Getting Started User Guide Contents Purpose of this Guide... 3 About Web Intelligence 4.1... 3

More information

ActiveSecurity MyClient

ActiveSecurity MyClient ActiveSecurity MyClient Setup Guide Contents 1 Introduction... 2 2 Installation of ActiveSecurity MyClient... 2 2.1 Desktop installation... 2 3 Configuration... 6 3.1 Language... 6 3.2 Smart card management...

More information

Using CSE Cisco Anyconnect with 2FA

Using CSE Cisco Anyconnect with 2FA Using CSE Cisco Anyconnect with 2FA If you are using the Duo Mobile App in push mode: you open Anyconnect. 3. Enter your CSE UserName for the Username. 4. A new window will open. 5. Enter your CSE UserName

More information

3. IMPORTANT: When prompted, accept the default Installation directory.

3. IMPORTANT: When prompted, accept the default Installation directory. Installing ProView 4.0.1 on your PC 1. Insert the ProView 4.0.1 CD-ROM into your CD-ROM Drive. The Install Shield Wizard should run automatically. If it does not, click Start then Run. Enter D:\setup.exe

More information

Windows Smart Card Logon Use Case

Windows Smart Card Logon Use Case Windows Smart Card Logon Use Case Issue Smart Card Logon versasec.com 1(13) Table of Contents Windows Smart Card Logon Use Case... 3 Step 1 Configuring a Windows Smart Card Logon Template... 3 Step 2 Configuring

More information

Client Configuration Guide

Client Configuration Guide Email Client Configuration Guide Contents Prerequisites... 1 Microsoft Outlook 2007... 2 Microsoft Outlook 2002/XP and 2003... 7 Microsoft Windows Mail (available with Vista only)... 11 Microsoft Outlook

More information

BlackShield ID. Windows Logon Agent CRYPTOCard Corp. All rights reserved.

BlackShield ID. Windows Logon Agent CRYPTOCard Corp. All rights reserved. Windows Logon Agent 2010 CRYPTOCard Corp. All rights reserved. http:// www.cryptocard.com Copyright Copyright 2010, CRYPTOCard All Rights Reserved. No part of this publication may be reproduced, transmitted,

More information

Guide Installation and User Guide - Mac

Guide Installation and User Guide - Mac Guide Installation and User Guide - Mac With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign

More information

Lab - Remote Desktop in Windows 7 and Vista

Lab - Remote Desktop in Windows 7 and Vista Lab - Remote Desktop in Windows 7 and Vista Introduction In this lab, you will remotely connect to another Windows 7 or Vista computer. Recommended Equipment The following equipment is required for this

More information

Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA

Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA Design Guide Securing VSPEX VMware View 5.1 End- User Computing Solutions with RSA VMware vsphere 5.1 for up to 2000 Virtual Desktops EMC VSPEX Abstract This guide describes required components and a configuration

More information

2012 Peer Small Business Data

2012 Peer Small Business Data Welcome The installation program installs the following data sets: 2012 Peer Small Business Data 2012 Peer Small Business Data In order to use this data set you should be running CRA Wiz and Fair Lending

More information

AT&T Global Network Client Domain Logon Guide. Version 9.7

AT&T Global Network Client Domain Logon Guide. Version 9.7 Version 9.7 AT&T Global Network Client Domain Logon Guide 2016 AT&T Intellectual Property. All rights reserved. AT&T, the AT&T logo and all other AT&T marks contained herein are trademarks of AT&T Intellectual

More information

Entrust PartnerLink Login Instructions

Entrust PartnerLink Login Instructions Entrust PartnerLink Login Instructions Contents Introduction... 4 Purpose 4 Overview 4 Prerequisites 4 Instructions... 5 Entrust is a registered trademark of Entrust, Inc. in the United States and certain

More information

Media Writer. Installation Guide LX-DOC-MW5.1.9-IN-EN-REVB. Version 5.1.9

Media Writer. Installation Guide LX-DOC-MW5.1.9-IN-EN-REVB. Version 5.1.9 Media Writer Installation Guide Version 5.1.9 Regulations and Compliance Tel: 1-844-535-1404 Email: TS_PACSGEAR@hyland.com 2018 Hyland. Hyland and the Hyland logo are trademarks of Hyland LLC, registered

More information

Guide for Windows users with Internet Explorer and Firefox

Guide for Windows users with Internet Explorer and Firefox Velocity@ocbc Guide for Windows users with Internet Explorer and Firefox Version 2.0 070513 1 of 18 Check the Java version 1. Launch a browser and go to http://www.java.com/en/download/installed.jsp?detect=jre

More information

Sage Residential Management. Moving Data Files Version 13.1

Sage Residential Management. Moving Data Files Version 13.1 Sage Residential Management Moving Data Files Version 13.1 NOTICE This is a publication of Sage Software, Inc. Document Number 33412.1 04/2013 2013 Sage Software, Inc. All rights reserved. Sage, the Sage

More information

Installing Act! for New Users

Installing Act! for New Users Installing Act! for New Users Installing Act! for New Users 2017 Swiftpage ACT! LLC. All Rights Reserved. Swiftpage, Act!, and the Swiftpage product and service names mentioned herein are registered trademarks

More information

Client Proxy interface reference

Client Proxy interface reference Reference Guide McAfee Client Proxy 2.3.2 Client Proxy interface reference These tables provide information about the settings found in the Client Proxy UI. Policy Catalog On the McAfee Client Proxy page

More information

Installing Encompass360 SmartClient

Installing Encompass360 SmartClient Installing Encompass360 SmartClient This document describes Encompass360 system requirements, configuration options, and installation steps for the SmartClient. Before installing Encompass360 SmartClient,

More information

<Partner Name> <Partner Product> RSA SECURID ACCESS. VMware Horizon View 7.2 Clients. Standard Agent Client Implementation Guide

<Partner Name> <Partner Product> RSA SECURID ACCESS. VMware Horizon View 7.2 Clients. Standard Agent Client Implementation Guide RSA SECURID ACCESS Standard Agent Client Implementation Guide VMware Horizon View 7.2 Clients Daniel R. Pintal, RSA Partner Engineering Last Modified: September 14, 2017

More information

Connect to Wireless, certificate install and setup Citrix Receiver

Connect to Wireless, certificate install and setup Citrix Receiver Connect to Wireless, certificate install and setup Citrix Receiver This document explains how to connect to the Wireless Network and access applications using Citrix Receiver on a Bring Your Own Device

More information

USB DRIVER INSTALLATION GUIDE

USB DRIVER INSTALLATION GUIDE USB DRIVER INSTALLATION GUIDE Use these instructions to install the USB drivers and Microsoft synchronization software for your Pathfinder 6057 printer. You need these utilities for your printer to communicate

More information

Configuring an IPSec Tunnel Between a Cisco SA500 and the Cisco VPN Client

Configuring an IPSec Tunnel Between a Cisco SA500 and the Cisco VPN Client Application Note Configuring an IPSec Tunnel Between a Cisco SA500 and the Cisco VPN Client This application note document provides information on how to configure an SA500 IPSec VPN Tunnel for remote

More information

TimeCurve QuickBooks Utility User Manual. Version 1.0

TimeCurve QuickBooks Utility User Manual. Version 1.0 TimeCurve QuickBooks Utility User Manual Version 1.0 1 Index Of Contents 1. Overview...3 1.1 Purpose of QuickBooks Utility application...3 1.2 Minimum Requirements...3 1.3 Overview of Data Synchronization...3

More information

CHANGING IP ADDRESS OF PERSYSTENT SERVER

CHANGING IP ADDRESS OF PERSYSTENT SERVER CHANGING IP ADDRESS OF PERSYSTENT SERVER Overview It is important to have a static IP Address for Persystent Server. Change may require manual intervention to update the IP address for Persystent Server

More information

Administrator Quick Reference

Administrator Quick Reference Contents Adding a New User... 2 Adding a New Crew Member.... 4 Adding a New Location.... 6 Resetting a Forgotten Password... 8 Adding a New User Any member of your organization - field providers, reviewers,

More information

Web Client Installation under Windows 7 and Windows Vista

Web Client Installation under Windows 7 and Windows Vista Web Client Installation under Windows 7 and Windows Vista Due to extended and enhanced security features of Windows 7, Windows Vista, and Internet Explorer, the installation of the Web client is different

More information

Company and User Set Up. Company Policy. NOTE: The Company Policy controls the companylevel feature entitlements and dollar limits.

Company and User Set Up. Company Policy. NOTE: The Company Policy controls the companylevel feature entitlements and dollar limits. Company and User Set Up Company Policy NOTE: The Company Policy controls the companylevel feature entitlements and dollar limits. 1. Select Commercial and then Company Policy. 2. Select a transaction type

More information

INTEGRATION GUIDE. DIGIPASS Authentication for VMware View

INTEGRATION GUIDE. DIGIPASS Authentication for VMware View INTEGRATION GUIDE DIGIPASS Authentication for VMware View Disclaimer Disclaimer of Warranties and Limitation of Liabilities All information contained in this document is provided 'as is'; VASCO Data Security

More information

SecureLogin 8.7 Application Definition Wizard Administration Guide. December, 2018

SecureLogin 8.7 Application Definition Wizard Administration Guide. December, 2018 SecureLogin 8.7 Application Definition Wizard Administration Guide December, 2018 Legal Notice For information about NetIQ legal notices, disclaimers, warranties, export and other use restrictions, U.S.

More information

Connection Name: Type ASYNC to PPP, Click Next, Do you want to set up an Internet mail account now? No Click Next, Click Finish

Connection Name: Type ASYNC to PPP, Click Next, Do you want to set up an Internet mail account now? No Click Next, Click Finish Defense Logistics Agency (DLA) Transaction Services Automated Message Exchange System (DAMES) Instructions. DAMES Dial up using the ASYNC to PPP connection available from Microsoft Windows Software. Microsoft

More information

Configuring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them

Configuring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them Configuring the WebDAV Folder for Adding Multiple Files to the Content Collection and Editing Them The Content Collection should be the repository for all of the files used in Blackboard. The Content Collection

More information

Microsoft Windows GINA login

Microsoft Windows GINA login Microsoft Windows GINA login Contents 1 Introduction 2 Prerequisites 3 Baseline 4 Architecture 5 Swivel Configuration 5.1 Configure a Swivel Agent 5.2 Create a Third Party Authentication 6 Terminal Services

More information

Enrollment Operator Guide. Avigilon Access Control Manager System Version

Enrollment Operator Guide. Avigilon Access Control Manager System Version Enrollment Operator Guide Avigilon Access Control Manager System Version 5.12.0 2018, Avigilon Corporation. All rights reserved. AVIGILON, the AVIGILON logo, ACCESS CONTROL MANAGER, ACM, and ACM VERIFY

More information

AppScaler SSO Active Directory Guide

AppScaler SSO Active Directory Guide Version: 1.0.3 Update: April 2018 XPoint Network Notice To Users Information in this guide is subject to change without notice. Companies, names, and data used in examples herein are fictitious unless

More information

Guide Installation and User Guide - Linux

Guide Installation and User Guide - Linux Guide Installation and User Guide - Linux With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally sign

More information

File Management Utility User Guide

File Management Utility User Guide File Management Utility User Guide Legal Notes Unauthorized reproduction of all or part of this guide is prohibited. The information in this guide is subject to change without notice. We cannot be held

More information

RSA NetWitness Logs. EMC Data Domain. Event Source Log Configuration Guide

RSA NetWitness Logs. EMC Data Domain. Event Source Log Configuration Guide RSA NetWitness Logs Event Source Log Configuration Guide EMC Data Domain Last Modified: Monday, January 16, 2017 Event Source Product Information: Vendor: EMC Event Source: Data Domain Versions: 5.1.0.4

More information

Crystal Enterprise. Overview. Contents. Upgrading CE8.5 to CE10 Microsoft Windows

Crystal Enterprise. Overview. Contents. Upgrading CE8.5 to CE10 Microsoft Windows Crystal Enterprise Upgrading CE8.5 to CE10 Microsoft Windows Overview This document is intended to assist you upgrade from a Crystal Enterprise (CE) 8.5 system to a CE 10 system. NOTE: The scenario outlined

More information

1. A broadband connection. 2. Windows Vista (for these instructions; other operating systems have other instructions).

1. A broadband connection. 2. Windows Vista (for these instructions; other operating systems have other instructions). A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources

More information

Print Manager Plus 2010 Workgroup Print Tracking and Control

Print Manager Plus 2010 Workgroup Print Tracking and Control INTRODUCTION: This is intended to assist in the initial installation or evaluation of Print Manager Plus 2010 Workgroup Edition. This will guide you through tracking your printing whether your workgroup

More information

InventoryControl Quick Start Guide

InventoryControl Quick Start Guide InventoryControl Quick Start Guide Copyright 2013 Wasp Barcode Technologies 1400 10 th St. Plano, TX 75074 All Rights Reserved STATEMENTS IN THIS DOCUMENT REGARDING THIRD PARTY PRODUCTS OR SERVICES ARE

More information

License Manager Client

License Manager Client License Manager Client Operations Guide NEC NEC Corporation of America November 2010 NDA-30899, Revision 6 Liability Disclaimer NEC Corporation of America reserves the right to change the specifications,

More information

Upgrading from Access to SQL

Upgrading from Access to SQL Upgrading from Access to SQL Article Number: 80 Rating: Unrated Last Updated: Fri, Dec 30, 2016 at 2:24 PM The default database format for SureSync is an Access database. SureSync also supports SQL 2000

More information

Using SANDeploy iscsi SAN for VMware ESX / ESXi Server

Using SANDeploy iscsi SAN for VMware ESX / ESXi Server Using SANDeploy iscsi SAN for VMware ESX / ESXi Server Friday, October 8, 2010 www.sandeploy.com Copyright SANDeploy Limited 2008 2011. All right reserved. Table of Contents Preparing SANDeploy Storage...

More information

Conferencing Integration With IBM Lotus Sametime User Guide

Conferencing Integration With IBM Lotus Sametime User Guide USER GUIDE Conferencing Conferencing Integration With IBM Lotus Sametime User Guide Overview... 2 Supported Platforms... 2 Supported Languages... 2 Installation Process.... 2 Main Window Action Bar Button

More information

Password Changer User Guide

Password Changer User Guide Active@ Password Changer User Guide Copyright 1999-2017, LSOFT TECHNOLOGIES INC. All rights reserved. No part of this documentation may be reproduced in any form or by any means or used to make any derivative

More information

Implementation Guide VMWare View 5.1. DualShield. for. VMWare View 5.1. Implementation Guide

Implementation Guide VMWare View 5.1. DualShield. for. VMWare View 5.1. Implementation Guide DualShield for VMWare View 5.1 Implementation Guide Copyright 2012 Deepnet Security Limited Copyright 2012, Deepnet Security. All Rights Reserved. Page 1 Trademarks Deepnet Unified Authentication, MobileID,

More information

Smart Energy & Power Quality Solutions. GridVis introduction. Dok. Nr.:

Smart Energy & Power Quality Solutions. GridVis introduction. Dok. Nr.: GridVis introduction Dok. Nr.: 2.047.006.2 Contents Minimum requirements 4 Software versions - GridVis license model 5 Installation and Activation of the GridVis Desktop Software 6 Installation of the

More information

PAS. Installation Guide. BG0608 Rev. A1. Copyright SATEC Ltd.

PAS. Installation Guide. BG0608 Rev. A1. Copyright SATEC Ltd. PAS Installation Guide BG0608 Rev. A1 Copyright 2011-2017 SATEC Ltd. Table of Contents Chapter 1 Installation... 3 1. Scope... 3 2. Minimal installation requirements... 3 3. Pre-installation steps... 3

More information

Integration Guide. SafeNet Authentication Service (SAS)

Integration Guide. SafeNet Authentication Service (SAS) Integration Guide SafeNet Authentication Service (SAS) Revised: 10 June 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating

More information

ImageNow Interact for Microsoft Office Installation and Setup Guide

ImageNow Interact for Microsoft Office Installation and Setup Guide ImageNow Interact for Microsoft Office Installation and Setup Guide Version: 6.6.x Written by: Product Documentation, R&D Date: February 2011 ImageNow and CaptureNow are registered trademarks of Perceptive

More information

Chapter 9: Administering Your System With the Administrator Control Panel (ACP)

Chapter 9: Administering Your System With the Administrator Control Panel (ACP) Logging Onto the ACP Logging Onto the ACP Follow to log onto the ACP. Logging On to the Administrator Control Panel 1 Log on to your system using standard Windows XP logon methods. 2 Double-click the MOTOBRIDGE

More information

Guide Installation and User Guide - Windows

Guide Installation and User Guide - Windows Guide Installation and User Guide - Windows With Fujitsu mpollux DigiSign Client, you can use your smart card for secure access to electronic services or organization networks, as well as to digitally

More information

CRA Wiz and Fair Lending Wiz. Installation Guide V6.9

CRA Wiz and Fair Lending Wiz. Installation Guide V6.9 CRA Wiz and Fair Lending Wiz Installation Guide V6.9 CRA Wiz and Fair Lending Wiz 6.9 Installation Instructions The following installation instructions provide procedures for a new installation of CRA

More information

Sage ERP Accpac 6.0A. SageCRM 7.0 I Integration Guide

Sage ERP Accpac 6.0A. SageCRM 7.0 I Integration Guide Sage ERP Accpac 6.0A SageCRM 7.0 I Integration Guide 2010 Sage Software, Inc. All rights reserved. Sage, the Sage logos, and all Sage ERP Accpac product and service names mentioned herein are registered

More information

Healthcare Desktop Office GPO Templates for GPMC v1

Healthcare Desktop Office GPO Templates for GPMC v1 Healthcare Desktop Office GPO Templates for GPMC v1 Release Notes Prepared by Microsoft First published 27 September 2007 Copyright This document and/or software ( this Content ) has been created in partnership

More information

Citrix MyAppsRemote User Guide

Citrix MyAppsRemote User Guide Citrix MyAppsRemote User Guide How to Use Citrix MyAppsRemote and Your RSA SecurID Token to Access the Intranet Version of HRdirect and other Secure Optum360/UnitedHealth Group Systems Table of Contents

More information

RSA NetWitness Logs. VMware ESX/ESXi. Event Source Log Configuration Guide. Last Modified: Tuesday, November 7, 2017

RSA NetWitness Logs. VMware ESX/ESXi. Event Source Log Configuration Guide. Last Modified: Tuesday, November 7, 2017 RSA NetWitness Logs Event Source Log Configuration Guide VMware ESX/ESXi Last Modified: Tuesday, November 7, 2017 Event Source Product Information: Vendor: VMware Event Source: ESX, ESXi, Embedded ESXi

More information

Installing Authoring Manager

Installing Authoring Manager Installing Authoring Manager Installing Authoring Manager v5.2 (PC only) System Requirements: Before you install Authoring Manager, you should ensure that your system meets the minimum software and hardware

More information

Remote Access. Application Viewer User Guide

Remote Access. Application Viewer User Guide Remote Access Application Viewer User Guide Page Logging into Application Viewer... 3 Logging off Application Viewer... 9 Lost or stolen tokens... 9 Application Viewer User Guide October 11, 2011 2 of

More information

Token Guide for KT-4 for

Token Guide for KT-4 for Token Guide for KT-4 for Powerful Authentication Management for Service Providers and Enterprises Authentication Service Delivery Made EASY Token Guide for KT-4 Copyright Copyright 2011. CRYPTOCard Inc.

More information

ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager. Integration Handbook

ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager. Integration Handbook ActivIdentity 4TRESS AAA Web Tokens and F5 BIG-IP Access Policy Manager Integration Handbook Document Version 1.1 Released July 11, 2012 ActivIdentity 4TRESS AAA Web Tokens and F5 APM Integration Handbook

More information

estos UCServer Multiline TAPI Driver

estos UCServer Multiline TAPI Driver estos UCServer Multiline TAPI Driver 5.1.110.44786 1 estos UCServer Multiline TAPI Driver...4 1.1 Requirements...4 1.2 Connection to the server...4 1.3 Log-on...5 1.4 Line configuration...5 1.5 Completion...5

More information

How Do I Manage Active Directory

How Do I Manage Active Directory How Do I Manage Active Directory Your Red Box Recorder supports Windows Active Directory integration and Single Sign-On. This Quick Question topic is provided for system administrators and covers the setup

More information

FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version

FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version FAS Asset Accounting FAS CIP Accounting FAS Asset Inventory SQL Server Installation & Administration Guide Version 2009.1 2009 Sage Software, Inc. All rights reserved. Published by Sage 2325 Dulles Corner

More information

Top Producer for Palm Handhelds

Top Producer for Palm Handhelds Top Producer for Palm Handhelds Quick Setup Top Producer Systems Phone number: 1-800-830-8300 Email: support@topproducer.com www.topproducer.com Fax: 604.270.6365 Top Producer for Palm handhelds Quick

More information

Windows Authentication. Delphi Service Pack 3. Document Version /10/09

Windows Authentication. Delphi Service Pack 3. Document Version /10/09 Delphi 9.5.2 Service Pack 3 Document Version 1.0 11/10/09 Copyright 2009 Newmarket International, Inc. All rights reserved. The information in this document is confidential and proprietary to Newmarket

More information

Technical Brief Veritas Technical Education Services

Technical Brief Veritas Technical Education Services Veritas Desktop and Laptop Option 9.3 The Veritas Desktop and Laptop Option provides automated file protection for Desktops and laptops. Protection is provided regardless of whether the computer is connected

More information

RSA NetWitness Logs. IBM ISS SiteProtector. Event Source Log Configuration Guide. Last Modified: Monday, May 22, 2017

RSA NetWitness Logs. IBM ISS SiteProtector. Event Source Log Configuration Guide. Last Modified: Monday, May 22, 2017 RSA NetWitness Logs Event Source Log Configuration Guide IBM ISS SiteProtector Last Modified: Monday, May 22, 2017 Event Source Product Information: Vendor: IBM Event Source: Proventia Appliance, SiteProtector,

More information

ScotiaConnect Registration Quick Reference Guide

ScotiaConnect Registration Quick Reference Guide ScotiaConnect Registration Quick Reference Guide Table of Contents Physical Token Registration... 2 Digital Token Registration... 4 For Further Assistance... 8 Version 2.0 ScotiaConnect supports two different

More information

Readme RSA Authentication Manager 6.1

Readme RSA Authentication Manager 6.1 Readme RSA Authentication Manager 6.1 October 26, 2005 Introduction This document lists known issues, and includes other important information about RSA Authentication Manager 6.1. Read this document before

More information

Traverse Intelligent Tracking by PCS. Installation Guide for Traverse.

Traverse Intelligent Tracking by PCS. Installation Guide for Traverse. Traverse Intelligent Tracking by PCS Installation Guide for Traverse. Tom Romeo 6/10/2011 The information in this documentation is not contractual in nature. It is subject to modification without notice.

More information

How to reset your password when given a PASSCODE from the IT Service Desk. Page 2-8. How to change a Forgotten Password by Yourself.

How to reset your password when given a PASSCODE from the IT Service Desk. Page 2-8. How to change a Forgotten Password by Yourself. 1 How to reset your password when given a PASSCODE from the IT Service Desk Page 2-8 How to change a Forgotten Password by Yourself Page 9-12 2 How to reset your password when given a PASSCODE from the

More information

Parallels Desktop 4.0 Switch to Mac Edition. Migrate your PC Tutorial.

Parallels Desktop 4.0 Switch to Mac Edition. Migrate your PC Tutorial. Parallels Desktop 4.0 Switch to Mac Edition Migrate your PC Tutorial www.parallels.com Migrate Your PC with Parallels Transporter Tutorial The enhanced Parallels Transporter included in Parallels Desktop

More information

RSA NetWitness Logs. ManageEngine NetFlow Analyzer. Event Source Log Configuration Guide. Last Modified: Monday, March 06, 2017

RSA NetWitness Logs. ManageEngine NetFlow Analyzer. Event Source Log Configuration Guide. Last Modified: Monday, March 06, 2017 RSA NetWitness Logs Event Source Log Configuration Guide ManageEngine NetFlow Analyzer Last Modified: Monday, March 06, 2017 Event Source Product Information: Vendor: ManageEngine Event Source: NetFlow

More information

Johns Hopkins

Johns Hopkins Wireless Configuration Guide: Windows Vista Additional hopkins wireless network instructions and requirements for Windows 8, 7, XP, Mac OS X, Linux, and Mobile versions can be found at: http://www.it.johnshopkins.edu/services/network/wireless/

More information

SharePoint AD Administration Tutorial for SharePoint 2007

SharePoint AD Administration Tutorial for SharePoint 2007 SharePoint AD Administration Tutorial for SharePoint 2007 1. General Note Please note that AD Administration has to be activated before it can be used. For further reference, please see our Product Installation

More information

Configuring WPA2 for Windows XP

Configuring WPA2 for Windows XP Configuring WPA2 for Windows XP Requirements for wireless using WPA2 on Windows XP Your wireless card must support 802.1x, AES, and WPA2. Your computer must have Windows XP service pack 2 installed and

More information

External Authentication with Citrix GoToMyPc Corporate Edition Authenticating Users Using SecurAccess Server by SecurEnvoy

External Authentication with Citrix GoToMyPc Corporate Edition Authenticating Users Using SecurAccess Server by SecurEnvoy External Authentication with Citrix GoToMyPc Corporate Edition Authenticating Users Using SecurAccess Server by SecurEnvoy Contact information SecurEnvoy www.securenvoy.com 0845 2600010 1210 Parkview Arlington

More information

One Identity Defender 5.9. Product Overview

One Identity Defender 5.9. Product Overview One Identity 5.9 Product Overview Copyright 2017 One Identity LLC. ALL RIGHTS RESERVED. This guide contains proprietary information protected by copyright. The software described in this guide is furnished

More information

REST API Operations. 8.0 Release. 12/1/2015 Version 8.0.0

REST API Operations. 8.0 Release. 12/1/2015 Version 8.0.0 REST API Operations 8.0 Release 12/1/2015 Version 8.0.0 Table of Contents Business Object Operations... 3 Search Operations... 6 Security Operations... 8 Service Operations... 11 Business Object Operations

More information

This is a GENERAL Servant Keeper Network Installation help sheet. If you need further assistance, please contact your network administrator.

This is a GENERAL Servant Keeper Network Installation help sheet. If you need further assistance, please contact your network administrator. SK Help Network Help Sheets - Workstation Installation This is a GENERAL Servant Keeper Network Installation help sheet. If you need further assistance, please contact your network administrator. Due to

More information

Reinstalling the Operating System on the Dell PowerVault 745N

Reinstalling the Operating System on the Dell PowerVault 745N Reinstalling the Operating System on the Dell PowerVault 745N This document details the following steps to reinstall the operating system on a PowerVault 745N system: 1. Install the Reinstallation Console

More information

Remote Access User Guide for Mac OS (Citrix Instructions)

Remote Access User Guide for Mac OS (Citrix Instructions) (Citrix Instructions) VERSION: 003 PUBLISHED: 2/2018 Page 1 of 8 Remote Access User Guide for Mac OS Please follow the steps outlined in this guide which will show you how to access the Clarion Partners

More information