Power LogOn s Features - Check List

Similar documents
Sphinx Feature List. Summary. Windows Logon Features. Card-secured logon to Windows. End-user managed Windows logon data

DFARS Requirements for Defense Contractors Must Be Satisfied by DECEMBER 31, 2017

hidglobal.com Still Going Strong SECURITY TOKENS FROM HID GLOBAL

CRESCENDO SERIES Smart Cards. Smart Card Solutions

Product Documentation

DigitalPersona Pro Enterprise

Single Secure Credential to Access Facilities and IT Resources

AXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure

About the XenClient Enterprise Solution

CP600 Card Programmer Quick Start Guide

Zodiac iclass OPERATOR GUIDE

iclass SE Platform Solutions The New Standard in Access Control

Secure Lightweight Activation and Lifecycle Management

TFS WorkstationControl White Paper

Logical Access How to Order Guide D00538, Release E.5 September 2018

Citrix Synchronizer Quick Start Guide

Embedded for Xerox EPA-EIP Setup Guide

Overview. Premium Data Sheet. DigitalPersona. DigitalPersona s Composite Authentication transforms the way IT

Integration Guide. SafeNet Authentication Client. Using SAC CBA with BitLocker

Oracle Enterprise Single Sign-on Authentication Manager. Release Notes Release E

ENTRUST DATACARD DERIVED PIV CREDENTIAL SOLUTION

Zodiac iclass II OPERATOR GUIDE

TruCredential Software with ISONAS Pure Access Integration Frequently Asked Questions

SecuRemote for Windows 32-bit/64-bit

expressaccess 1.1 (Build 120) Release Notes

<Partner Name> <Partner Product> RSA SECURID ACCESS Authenticator Implementation Guide. Check Point SmartEndpoint Security

Architecture 1 3. SecureToken. 32-bit microprocessor smart chip. Support onboard RSA key pair generation. Built-in advanced cryptographic functions

Getting started with ActiveSecurity MyLogin

Citrix Synchronizer 5.9.1

Citrix Synchronizer Quick Start Guide

EntraPass WebStation. Reference Manual DN

Condeco Group Ltd 2 Harbour Exchange Square London E14 9GE, UK

Sagem MEMS 7.3 Quick Installation Guide

FAMILY BROCHURE. Gemalto SafeNet Authenticators. Diverse Form Factors for Convenient Strong Authentication

Sage 300 People & Web Self Service Technical Information & System Requirements

IDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller

Java Card Technology-based Corporate Card Solutions

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

Credential Programmer How to Order Guide

VMware Workspace ONE UEM Integration with Apple School Manager

Overview. DigitalPersona Logon for Windows Data Sheet. DigitalPersona s Composite Authentication transforms

BROWSER-BASED SUPPORT CONSOLE USER S GUIDE. 31 January 2017

Readers and credentials

EntraPass WebStation. Installation Manual DN

Integration Guide. SafeNet Authentication Client. Using SAC CBA for VMware Horizon 6 Client

VMware AirWatch Integration with Apple School Manager Integrate with Apple's School Manager to automatically enroll devices and manage classes

This version of the IDGo 800 middleware contains the following components: IDGo 800 Credential Provider build 01

SiPass Software. Fire & Security Products. SiPass integrated

Deployment User Guide

VMware PIV-D Manager Deployment Guide

Changes to SP (SP ) Ketan Mehta NIST PIV Team NIST ITL Computer Security Division

StoreFront :47:53 UTC Citrix Systems, Inc. All rights reserved. Terms of Use Trademarks Privacy Statement

YubiKey Smart Card Deployment Guide

Desktop Application Reference Guide For Windows and Mac

Identiv FICAM Readers

ACR1255U-J1 Secure Bluetooth NFC Reader

DesktopPlayer for Windows

FACIAL RECOGNITION TERMINAL SYSTEM

BioPassport TM Enterprise Server

Advanced integrated access control system

OmniAccess 3500 Nonstop Laptop Guardian Release 1.2 Administrator Release Notes

Samsung Pay Frequently Asked Questions

iclass SE CP1000 Desktop Encoder PLT Rev B.2

version: User Manual

midentity midentity Basic KOBIL midentity Basic Mobile, Secure and Flexible

Logical Access How to Order Guide

Registration and Renewal procedure for Belfius Certificate

SSH Communications Tectia SSH

Veritas Desktop and Laptop Option Software Compatibility List

Strong Authentication for Physical Access using Mobile Devices

Using Workspace ONE PIV-D Manager. VMware Workspace ONE UEM 1811 VMware Workspace ONE PIV-D Manager

Client Installation and User's Guide

PCI DSS Compliance. White Paper Parallels Remote Application Server

VMware Horizon Client for Windows 10 UWP User Guide. Modified on 21 SEP 2017 VMware Horizon Client for Windows 10 UWP 4.6

Perceptive Experience Web Scan

McAfee Drive Encryption Interface Reference Guide. (McAfee epolicy Orchestrator)

Windows 2000 / XP / Vista User Guide

Identity and Authentication PKI Portfolio

Empower your phone to open new doors

DHS ID & CREDENTIALING INITIATIVE IPT MEETING

BlackBerry Enterprise Server for Microsoft Office 365. Version: 1.0. Administration Guide

Endpoint Security webrh Framework 3.0 Release Notes

DesktopPlayer for Windows

Yubico with Centrify for Mac - Deployment Guide

Citrix Workspace app 1808 for ios

Fusion UDM Pro. Technical specifications. Device management for everyone. Fusion UDM Pro

Getting Started with. Management Portal. Version

StoreFront 2.6. About StoreFront. System requirements. Plan. Install and set up. Upgrade. Secure. Troubleshoot. Manage

DesktopPlayer for Mac

The Password Authentication Paradigm In today s business world, security in general - and user authentication in particular - are critical components

Version 1.0. October KYOCERA Document Solutions America, Inc. Software Solutions Group KYOCERA Document Solutions America, Inc.

SOFT-ASSISTANT COD / 2.3 CONTENTS

Account Management System User Manual

SafeNet Authentication Manager

Technical Specification Data 1

ACR101I SIMicro (CCID)

Empower your phone to open new doors

SC-T35/SC-T45/SC-T46/SC-T47 ViewSonic Device Manager User Guide

EntraPass WebStation Installation Manual

Corporate Commitment to Excellence

Transcription:

s s - Check List Versions The software is available in two versions, to meet the needs of all types and sizes of organizations. The list below indicates the features that are included in each version. See also for additional information. Version Order # Description Included software components (aka ) PLAL Full card-enabled Windows logon features, no website or application logon. Install software and desktop card readers on end-user computers. Pre-configured Card Manager. Runs "out-of-the-box" on administrator server computer. End-users present their ID card to card readers to self-enroll, and start protecting their logon data. s who want more control can change the default settings of this full-featured software to specify PIN and password policies, link to HR databases, and much more. Manager, for end-user computers, for administrator computer PLA All features listed above of, plus: Card-enabled logon to websites and applications. Storage of payment and address information for additional convenience. Enhanced security features such as biometric authentication and One Time Password. users can easily upgrade to at any time. Manager, for end-user computers, for administrator computer Windows Logon s Card-secured log onto Windows End-user managed Windows logon data managed Windows logon data Synchronized Active Directory enrollment for Windows logon Logon Entries Wizard Storage of multiple Windows logons Pull card to lock, logoff, or shutdown computer Pull card to lock, logoff, disconnect, from Terminal Services session Tap in / tap out behavior (Contactless) Control Windows secure screen saver and lock workstation functions from All logos and trademarks are the property of the originating company. Page 1 of 7

s s - Check List Windows password change synchronization Windows password policy control Generate random Windows password Password change reminder Password repetition control System logging of cardholder logon and logoff SMS Mobile Option Website and Application Logon s Card-secured logon to websites and applications End-user managed logon entries managed logon entries Logon Entries Wizard Auto-record and auto-fill of logon data Initiate recording of logon data Manual entry and button-click fill of logon data pop-up Browse to logon location from Submit control "Drag and drop" transferal of logon data Password policy control Generate random password Password change reminder Password change verification Password repetition control SMS Mobile Option All logos and trademarks are the property of the originating company. Page 2 of 7

s s - Check List Other End-user s Storage of address and payment information "Drag and drop" transferal of address and payment information Backup and restore data Auto-backup reminder Save data to laptop Access data on server remotely One Time Password No training required Auto-start and minimize Setup s Easy installation of end-user software Easy installation of administrator software Easy import of license keys No change to network or Windows setup No change to RFID card setup Auto-enrollment s (installations that store data on the server) No configuration required End-user self-enrollment End-user self re-enrollment All logos and trademarks are the property of the originating company. Page 3 of 7

s s - Check List Managed Enrollment s Customizable settings Database importing User groups One step issuance ID card printing Lost or stolen card "hotlist" One step card re-issuance Recycle card Reports Managed Entries s Easy creation of managed entries Easy assignment of managed entries to user groups or individuals Simple managed entry screen End-user edit control Storage control No additional programming required API for identity management systems Other s program protection assignment Activity log All logos and trademarks are the property of the originating company. Page 4 of 7

s s - Check List Security s User designated PIN User designated PUK Randomly generated PIN/PUK option managed PUK Require PIN/PUK change upon first use option PIN policy control PIN verification timeout Biometric authentication Encryption Secured data exchange with card Works alongside PKI Card security features Secure web server Secure cloud server Connection to secure server protected by SSL SMS Mobile Option Card and Token Compatibility Contact smartcards, contactless cards, NFC, magnetic stripe cards and fobs Proximity, Mifare, Mifare +EV1, DESFire EV1, iclass, cards Kantech, Allegion, HID, Indala physical access manufactures PIV, PIV-I, CIV and CAC Add onto existing issued cards All logos and trademarks are the property of the originating company. Page 5 of 7

s s - Check List Card Reader Compatibility PC/SC Readers (contact, contactless, keyboard, sticks) Wedge Readers Biometric Readers Magstripe readers Interface (USB, PCMCIA, ExpressCard, Bluetooth) Works with existing card readers (if you already have readers deployed) System Requirements Servers: SQL, Citrix, 2016, 2012/R2, 2008/R2 Multiple Server Backup Server RAM Storage 8 GB 8GB Virtual Machine Thin Clients Windows 10 (32/64), Windows 8 (32/64), Vista (32/64), Widows 7 (32/64) Client computer RAM 128 MB 128 MB IE 7+, Firefox 50+, Chrome 32+ Stand-alone computer Cloud (Azure, AWS, Google, Private, Hybrid) Certifications, Verifications, and Encryptions FIPS 140-2 FIPS 201 NIST 800-171 HIPAA / HITECH All logos and trademarks are the property of the originating company. Page 6 of 7

s s - Check List GDPR Symmetric (AES-256) HASH 256 Salting of Hash Other Software s Wide compatibility Built for interoperability Multi-language API for OEMs API for third-party applications on server computer All logos and trademarks are the property of the originating company. Page 7 of 7