2-FACTOR AUTHENTICATION WITH

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "2-FACTOR AUTHENTICATION WITH"

Transcription

1 2-FACTOR AUTHENTICATION WITH 2X JUNE 2014

2 Two-Factor Authentication and Authy What is Two-Factor Authentication? Two-Factor Authentication is a process involving two stages to verify the identity of someone trying to access services in a computer or in a network. It provides an extra layer of protection. Two-factor authentication is a simple feature that asks for more than just your password. It requires both something you know (like a password) and something you have (like your phone). After you enter your password, you ll get a second code sent to your phone, and only after you enter it will you get into your account. Think of it as entering a PIN number, then getting a retina scan, like you see in every spy movie ever made. It s simply added security for your online accounts. What is Authy? Authy is a third-party provider of a token-based authentication process. Authy can be used for a number of online applications like Gmail, Wordpress, Evernote and Facebook. Most of these applications involve a normal sign-in process (username and password) which is the first authentication. Authy provides the second authentication via mobile app, browser or SMS. Visit to learn more. Authy and has chosen Authy to provide it s Two-Factor Authentication process. Two-Factor Authentication is available for customers using Enterprise and is enabled by contacting your Transparency Concierge or Once enabled, the Administrator has complete control of which users are required to use two-factor authentication and when it will be enabled for each user. 2

3 Administrator (Admin) Assigning Two-Factor Authentication to new and existing users Two-Factor Authentication is enabled by the Firm or Client Admin on a per user basis. To enable or disable this feature, follow these steps: 1. After signing into, select the Enterprise/Administration toggle. 2. Select Users icon in the main menu. Assign to Existing User: Select a user. In that user s Overview section you will see a checkbox that says Require Two-Factor Auth. Checking the box will require this user to perform a few easy steps to configure their Two-Factor Authentication and then require their use of Two-Factor Authentication for all subsequent logins. To disable this feature, simply deselect the checkbox. Assign to New User: To enable Two-Factor Authentication for a new user, create a new user by selecting the icon. Fill out the new user s information and check the box that says Require Two-Factor Auth. Finally, click the Create User button. The new user now requires Two-Factor Authentication to sign into. To disable this feature for the user, follow the instructions for Existing Users and deselect the Require Two Factor Auth checkbox. 3

4 Users Signing into with Two-Factor Authentication If an Admin has enabled Two-Factor Authentication for your user account, you will see the following screens when you log into. Only the Admin can determine if you have this security feature. Go to page 7 to see the 2-Factor Authentication Sequence Diagram Log into by entering your username and password on the sign in page. 2. You will be prompted to enter your Authy credentials, which is your mobile number. 3. Clicking Enable initiates your Authy account. (You will not have to repeat this process again.) 3 4. If you have an Authy account, will be added to your list of applications and you can immediately access authentication tokens If you do NOT have an account with Authy, you will receive a text message containing a link to install the Authy App. The Authy App is available for the following mobile devices: ios, Android and Blackberry. A Google Chrome App is also available for desktop users at chrome.google. com/webstore. 7a 6. Once the Authy App is downloaded, follow the instructions to complete the set up of your account. (See pages 5 and 6 for more information about the Mobile and Chrome Apps.) 8 7. Once this process is completed, you must Verify your Authy Account by supplying an authentication token on the Website. Access this token via: a. SMS (by clicking the link located below the token input field). Doing this will send your authentication token via text message to your mobile device. 9 b. Authy s Mobile App c. Authy s Chrome App 8. Click Enable. 9. Now that your account is enabled, every time you log into, you will be required to provide an authentication token. 4

5 Users Using Authy Mobile App to create authentication tokens Download the application to your mobile device through the respective app store and perform the steps below: 1. Once downloaded, open the Authy App. You will be prompted to enter your phone number s country code, which is 1 for the United States, and your mobile phone number. 2. Then enter your address. 3. Choose to Get Account Verification via: Phone Call or SMS. 4. You will be prompted to Enter Your Registration PIN. 5. Select Don t Allow or OK to receive push notifications on your mobile device for Authy. 6. Once this process is complete you will notice that is visible in the App, and by selecting you will see the 7-digit verification code that expires and refreshes every 20 seconds. 7. Finally, use the Authentication Token provided when you sign into

6 Users Using Authy Chrome App to create authentication tokens In the Chrome browser, go to chrome.google.com/webstore. 2. Search the store for Authy and download it. 3. Once downloaded, open Chrome App Launcher. 4. Click on the Authy logo in your Chrome App Launcher. 5. You will be prompted to enter your country code and mobile number with a message underneath that states: Cellphone number should be the same you use for Authy on your mobile phone and all your other devices. Select OK. 6. You will be prompted to enter your to create a new account. 7. Select to have verification sent via SMS or Call. 8. You will be prompted to Enter Your Registration PIN that you receive via SMS. 9. You will now see the full Authy application, however you must register a mobile device. Before doing so select the Devices tab in the Chrome App and enable Multi-Device by checking the box. 10. Finally, use the Authentication Token provided when you sign into

7 2-Factor Authentication Sequence Diagram CAN BE DONE AT ANY TIME Download Authy App Create Account Login to Authy App added to Authy App Get Token (123) Must be same information Login to requires 2-Factor Authentication Enter Authy Credentials Verify Token LOG INTO VIEWABILL WITH Access 7

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to

More information

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0 ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a

More information

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication This document serves as a How To reference guide for employees to execute the following MFA tasks: 1.

More information

MDM User Guide June 2012

MDM User Guide June 2012 June 2012 Sy mantec Corporation, 2012 Page 1 Purpose of Document This document provides a guide for users of App Center to set up and use Mobile Device Management (MDM) capabilities. MDM allows the App

More information

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal

More information

Remote Access End User Reference Guide for SHC Portal Access

Remote Access End User Reference Guide for SHC Portal Access Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required

More information

Booth Gmail Configuration

Booth Gmail Configuration Student email is accessed via a Booth branded Gmail service. Student mailboxes will be accessed via Gmail. Configure Gmail Settings Before you connect Gmail to send and receive Booth Gmail on your mobile

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication The two-factor authentication system provides an additional level of security when signing in to Ryerson web applications via Ryerson s Central Authentication Service. When you

More information

Using the Educator Dashboard

Using the Educator Dashboard Reference Guide Using the Educator Dashboard What s Inside How to Create Accounts Get to Know the Educator Dashboard How to Manage Licenses and Create Educators How to Give Accommodations to Students First

More information

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required

More information

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u

BlackBerry Universal Device Service. Demo Access. AUTHOR: System4u Demo Access AUTHOR: System4u BlackBerry Universal Device Service Revisions Date Version Description Author June 26 th 2012 1.0 Roman Přikryl September 25 th 2012 1.5 Revision Roman Přikryl October 5 th

More information

Defender 5.7 - Token Deployment System Quick Start Guide

Defender 5.7 - Token Deployment System Quick Start Guide Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register

More information

Two Factor Authentication - USER GUIDE

Two Factor Authentication - USER GUIDE Two Factor Authentication - USER GUIDE Two Factor Authentication (or 2FA) is a two step verification process that provides an extra layer of security for you when accessing your account within Online Services.

More information

GCSG APP INSTALLATION GUIDE. To get the app, visit your device: Apple App Store or Google Market Place

GCSG APP INSTALLATION GUIDE. To get the app, visit your device: Apple App Store or Google Market Place GCSG APP INSTALLATION GUIDE To get the app, visit your device: Apple App Store or Google Market Place Be sure that you have the latest version of the App to view the most current conference! Removing the

More information

MCBDirect Corporate Logging on using a Soft Token

MCBDirect Corporate Logging on using a Soft Token MCBDirect Corporate Logging on using a Soft Token Document issue: 2.1 Date of issue: September 2014 Contents About Soft Token authentication... 3 Logging onto MCBDirect Corporate online banking... 4 Soft

More information

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android

Brainloop Secure Dataroom Version 8.30. QR Code Scanner Apps for ios Version 1.1 and for Android Brainloop Secure Dataroom Version 8.30 QR Code Scanner Apps for ios Version 1.1 and for Android Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2015. All rights reserved.

More information

Google 2 factor authentication User Guide

Google 2 factor authentication User Guide Information Technology Services Centre Google 2 factor authentication User Guide Description: This guide describes how to setup Two factor authentication for your Google account. Version: 1.0 Link: Effective

More information

Installing Logos SSL Certificates on Mobile Devices

Installing Logos SSL Certificates on Mobile Devices Installing Logos SSL Certificates on Mobile Devices Phase 1: Obtain the SSL Certificate You can obtain the SSL certificate in one of 2 ways. Method 1 Download the SSL certificate from it.logostech.net

More information

Preparing your Domain to transfer from Go Daddy

Preparing your Domain to transfer from Go Daddy Preparing your Domain to transfer from Go Daddy Before you can transfer a domain: Getting Started Disable domain privacy. If the privacy service forwards incoming email, check the ʻforward toʼ contact

More information

Install and End User Reference Guide for Direct Access to Citrix Applications

Install and End User Reference Guide for Direct Access to Citrix Applications Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

Two-Factor Authentication

Two-Factor Authentication Two-Factor Authentication Two-Factor Authentication is an enhanced security feature for Payentry. It adds an extra layer of protection to ensure only authorized users can gain access to your data. In addition

More information

Step 1. Step 2. Open your browser and go to https://accounts.bestcare.org and you will be presented a logon screen show below.

Step 1. Step 2. Open your browser and go to https://accounts.bestcare.org and you will be presented a logon screen show below. Manage your two-factor options through the accounts.bestcare.org website. This website is available internally and externally of the organization. Like other services, if you connect while external of

More information

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab

UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management

More information

1 Download NAB Connect Authenticator App 2 Activation 3 Login to NAB Connect. 1 Download NAB Connect Authenticator App

1 Download NAB Connect Authenticator App 2 Activation 3 Login to NAB Connect. 1 Download NAB Connect Authenticator App Background: Security Officers and Customers who authorise payments use a Security Device to generate one-time passwords to access NAB Connect and authorise their payments. Customers have the choice of

More information

This document is not an offer, commitment, representation or warranty by AT&T and is subject to change.

This document is not an offer, commitment, representation or warranty by AT&T and is subject to change. To log in to Premier Online Care as a Corporate Responsibility User (CRU), you first need to register for a Premier account. This guide walks you through the steps of registering yourself using a PIN that

More information

ACCESSING YOUR E-MAIL ON A MOBILE DEVICE

ACCESSING YOUR E-MAIL ON A MOBILE DEVICE ACCESSING YOUR E-MAIL ON A MOBILE DEVICE ACCESSING YOUR E-MAIL ON A MOBILE DEVICE You can access your USC e-mail on the following mobile devices: Android BlackBerry BlackBerry 10 iphone /ipod Touch /ipad

More information

Remote Desktop Web Access. Using Remote Desktop Web Access

Remote Desktop Web Access. Using Remote Desktop Web Access Remote Desktop Web Access What is RD Web Access? RD Web Access is a Computer Science service that allows you to access department software and machines from your Windows or OS X computer, both on and off

More information

AWS Account Management Guidance

AWS Account Management Guidance AWS Account Management Guidance Introduction Security is a top priority at AWS. Every service that is offered is tightly controlled and adheres to a strict security standard. This is evident in the security

More information

Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks

Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks Establishing two-factor authentication with Cyberoam UTM appliances and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks

More information

Instructions on accessing your journal s content on your new app

Instructions on accessing your journal s content on your new app Instructions on accessing your journal s content on your new app There are three main methods to access content on your journal app depending on how you normally view your journal online. 1. Do you normally

More information

Enrollment Process for Android Devices

Enrollment Process for Android Devices 1 Enrollment Process for Android Devices Introduction:... 2 Pre-requisites:... 2 Via SMS:... 2 Via Email:... 11 Self Service:... 19 2 Introduction: This is a brief guide to enrolling an android device

More information

Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks

Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks Establishing two-factor authentication with Barracuda NG Firewall and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA

More information

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users

Getting Started. Getting Started with Time Warner Cable Business Class. Voice Manager. A Guide for Administrators and Users Getting Started Getting Started with Time Warner Cable Business Class Voice Manager A Guide for Administrators and Users Table of Contents Table of Contents... 2 How to Use This Guide... 3 Administrators...

More information

DUO SECURITY CISCO VPN USER GUIDE 1/27/2016

DUO SECURITY CISCO VPN USER GUIDE 1/27/2016 DUO SECURITY CISCO VPN USER GUIDE 1/27/2016 CONTENTS Enrolling Your Devices... 2 Install Cisco AnyConnect VPN Client... 6 Connecting to a PC with Microsoft Remote Desktop... 8 Disconnecting the AnyConnect

More information

RSA SecurID Token 4.0 for Windows Desktops Quick Start

RSA SecurID Token 4.0 for Windows Desktops Quick Start Welcome to RSA SecurID Token for Windows Desktops. This application allows you to import software tokens that you can use to verify your identity to Virtual Private Networks (VPNs) and other resources

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

DigiCert User Guide. Version 3.7

DigiCert User Guide. Version 3.7 DigiCert User Guide Version 3.7 Contents 1 User Management... 7 1.1 Roles and Account Access... 7 1.1.1 Administrator Role... 7 1.1.2 User Role... 7 1.1.3 CS Verified User... 7 1.1.4 EV Verified User...

More information

Install MS Office 365 on your Android mobile device

Install MS Office 365 on your Android mobile device Install MS Office 365 on your Android mobile device IT Documentation Team, March 2015 This factsheet contains instructions for installing the Office Mobile for Android phone and Office for Android tablet

More information

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple

More information

OFFICE 365 SELF- CONFIGURATION GUIDE

OFFICE 365 SELF- CONFIGURATION GUIDE IT HELPDESK, REPUBLIC POLYTECHNIC OFFICE 365 SELF- CONFIGURATION GUIDE Version 7.0 IT Helpdesk 6-30-2015 0 TABLE OF CONTENTS Things to note before proceeding with this guide:... 1 Office 365 ProPlus Installation

More information

IIS, FTP Server and Windows

IIS, FTP Server and Windows IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:

More information

VMware Identity Manager Administration

VMware Identity Manager Administration VMware Identity Manager Administration VMware Identity Manager 2.4 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new

More information

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0 Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of

More information

Eastern Bank TreasuryConnect Security Center User Manual

Eastern Bank TreasuryConnect Security Center User Manual Eastern Bank TreasuryConnect Security Center User Manual This user manual provides instructions for using the Password Reset feature and accessing services found within the Security Center Group. The services

More information

Installing Microsoft WebMatrix

Installing Microsoft WebMatrix From http://www.microsoft.com/web/ click on the Install WebMatrix button This opens a new page, be sure to read the System Requirements: Supported Operating Systems are Windows 7, Windows Vista, Windows

More information

Remote Access Services Microsoft Windows - Installation Guide

Remote Access Services Microsoft Windows - Installation Guide Remote Access Services Microsoft Windows - Installation Guide Version 3.1 February 23, 2015 1 P age Contents GETTING STARTED... 3 JAVA VERIFICATION, INSTALLATION, AND CONFIGURATION... 3 Windows XP... 3

More information

Single Sign-On Portal User Reference (Okta Cloud SSO)

Single Sign-On Portal User Reference (Okta Cloud SSO) Single Sign-On Portal User Reference (Okta Cloud SSO) Contents Okta Single Sign-on Portal... 3 Initial account creation and configuration... 3 First time manual login to the Okta Single Sign-on Portal...

More information

Medstar Health Dell Services

Medstar Health Dell Services Medstar Health Dell Services Non Medstar Device Citrix Connectivity Guide October 2012 Sean Kaminski Dell Services System Admin Consultant 1 Table of Contents Overview...3 What is Citrix and why do I need

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

Brainloop Secure Dataroom Service Version QR Code Authentication Made Easy

Brainloop Secure Dataroom Service Version QR Code Authentication Made Easy Brainloop Secure Dataroom Service Version 8.30 QR Code Authentication Made Easy Quick Guide Brainloop Secure Dataroom Version 8.30 Copyright Brainloop AG, 2004-2014. All rights reserved. All trademarks

More information

Mobile Banking Enrollment Help

Mobile Banking Enrollment Help Mobile Banking Enrollment Help 1 of 5 MidWest America FCU has mobile banking options for our members! These services make it easier and faster to do all of your banking conveniently on-the-go and from

More information

Downloading the GAIG Annuity App. Log In Screen. Home Page

Downloading the GAIG Annuity App. Log In Screen. Home Page Downloading the GAIG Annuity App ios users: https://itunes.apple.com/us/app/gaig-annuity/id925743711?ls=1&mt=8 Android users: https://play.google.com/store/apps/details?id=com.gaig.annuity.app.mobile.android.agent

More information

How can I protect against the loss of my ID if my device is lost or stolen?

How can I protect against the loss of my ID if my device is lost or stolen? How can I protect against the loss of my if my device is lost or stolen? If your mobile device is stolen or lost, you can reactivate your user on a new device and deactivate it on your stolen or lost device.

More information

Self-Service Portal Registering, downloading & activating a soft token

Self-Service Portal Registering, downloading & activating a soft token Self-Service Portal Registering, downloading & activating a soft token Document issue: 3.2 Date of issue: September 2014 Contents Introduction... 3 About two-factor authentication... 3 About egrid authentication...

More information

Zinio FAQ. » I created a Library Collection account but I did not receive my confirmation email. Why not?

Zinio FAQ. » I created a Library Collection account but I did not receive my confirmation email. Why not? Zinio FAQ» I created a Library Collection account but I did not receive my confirmation email. Why not? The notification emails are sent automatically after you subscribe and should show up in your email

More information

Cox Business Online Backup. Download Instructions for Mac and Windows

Cox Business Online Backup. Download Instructions for Mac and Windows Cox Business Online Backup Download Instructions for Mac and Windows February 2014 Table of Contents Table of Contents Downloading Cox Business Online Backup on a Mac... 1 Downloading Cox Business Online

More information

Setting Up and Accessing VPN

Setting Up and Accessing VPN Setting Up and Accessing VPN Instructions for establishing remote access to the URMC network for PC or Mac Duo Two-Factor Authentication If you have already enrolled and setup Duo Two-Factor Authentication

More information

Business Banking Customer Login Experience for Enhanced Login Security

Business Banking Customer Login Experience for Enhanced Login Security Business Banking Customer Login Experience for Enhanced Login Security User credentials uniquely identify each person who uses the banking platform. The intent of authentication is unequivocal verification

More information

Two Factor Authentication and PKI Token (for Mac)

Two Factor Authentication and PKI Token (for Mac) Two Factor Authentication and PKI Token (for Mac) What s happening? Dow Jones is implementing two factor authentication to increase security and provide ease of use to end users. What is Two Factor Authentication?

More information

LIBRARY MEMBER USER GUIDE

LIBRARY MEMBER USER GUIDE LIBRARY MEMBER USER GUIDE CONTENTS PAGE Part 1) How to create a new account... 2 Part 2) How to checkout a magazine issue... 4 Part 3) How to download and use Zinio Reader 4... 8 a) For your PC... 8 b)

More information

Wharf T&T. iwatch 2012 Mobile Apps User Guide (ios / Android)

Wharf T&T. iwatch 2012 Mobile Apps User Guide (ios / Android) Wharf T&T iwatch 2012 Mobile Apps User Guide (ios / Android) 1 Table of Contents 1. iwatch... 3 1.1 Application download and login... 3 2. imonitor... 4 2.1 imonitor Setup Procedures (First-time user)...

More information

PRACTICE LINK. Getting Started. version 1.0.x. Digita Support: 08450 180 909 Digita Sales: 08450 180 907 digita.com

PRACTICE LINK. Getting Started. version 1.0.x. Digita Support: 08450 180 909 Digita Sales: 08450 180 907 digita.com PRACTICE LINK Getting Started version 1.0.x Digita Support: 08450 180 909 Digita Sales: 08450 180 907 digita.com TL 28615 (11/17/14) Copyright Information Text copyright 2010 2014 by Thomson Reuters. All

More information

Downloading the App. Get the app. Or scan the QR code. 1 Go the right store. Access the App Store on ios devices and the Play Store on Android.

Downloading the App. Get the app. Or scan the QR code. 1 Go the right store. Access the App Store on ios devices and the Play Store on Android. Downloading the App Get the app 1 Go the right store. Access the App Store on ios devices and the Play Store on Android. 2 Install the app. Search for EMBL Events or the name of the event. Once you ve

More information

QUICK INSTALLATION GUIDE ACTIVATE

QUICK INSTALLATION GUIDE ACTIVATE ACTIVATE ACTIVATE ACTIVATE 1. Activate the business cloud A. Service Activation: You will receive a confirmation e-mail within 2 hours maximum BASE business Cloud: Notification/Notificatie B. Go to https://cdashboard.

More information

owncloud Android App Manual

owncloud Android App Manual owncloud Android App Manual Release 2.0.0 The owncloud developers July 22, 2016 CONTENTS 1 Using the owncloud Android App 1 1.1 New In Version 2.0.0........................................... 1 1.2 Upgrading................................................

More information

Administering Jive Mobile Apps

Administering Jive Mobile Apps Administering Jive Mobile Apps Contents 2 Contents Administering Jive Mobile Apps...3 Configuring Jive for Android and ios... 3 Native Apps and Push Notifications...4 Custom App Wrapping for ios... 5 Native

More information

User Guide for eduroam

User Guide for eduroam User Guide for eduroam 獲 以 下 認 證 : Certificado pela: Certified by: 澳 門 望 廈 山 Colina de Mong-Há, Macau 電 話 : (853) 8598 3120 Tel: (853) 8598 3120 傳 真 : (853) 8598 3151 Fax: (853) 8598 3151 www.ift.edu.mo

More information

Seagate Access for Personal Cloud User Manual

Seagate Access for Personal Cloud User Manual Seagate Access for Personal Cloud User Manual 2015 Seagate Technology LLC. All rights reserved. Seagate, Seagate Technology, the Wave logo, and FreeAgent are trademarks or registered trademarks of Seagate

More information

Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks

Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks Establishing two-factor authentication with Check Point and HOTPin authentication server from Celestix Networks Contact Information www.celestix.com Celestix Networks USA Celestix Networks EMEA Celestix

More information

Recommended Browser Setting for MySBU Portal

Recommended Browser Setting for MySBU Portal The MySBU portal is built using Microsoft s SharePoint technology framework, therefore, for the best viewing experience, Southwest Baptist University recommends the use of Microsoft s Internet Explorer,

More information

Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault

Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Contents First Time Setup... 2 Setting up the Legal Vault Client (KiteDrive)... 3 Setting up the KiteDrive Outlook Plugin... 10 Using the Legal Vault Outlook Plugin... 13 Using KiteDrive to Send Large

More information

SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013

SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054

More information

Accessing the Curriculum Management System Off-campus Process for obtaining a CMS certificate

Accessing the Curriculum Management System Off-campus Process for obtaining a CMS certificate INFORMATION SERVICES ICT Service Delivery Accessing the Curriculum Management System Off-campus Process for obtaining a CMS certificate Introduction This service enables staff to access the Curriculum

More information

Online Statements. About this guide. Important information

Online Statements. About this guide. Important information Online Statements About this guide This guide shows you how to: View online statements, including CommBiz Activity Statements (Billing summaries) and online statements for Transaction Accounts, Credit

More information

Configuration Guide. BES12 Cloud

Configuration Guide. BES12 Cloud Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need

More information

How to Setup the Remote Access Portal on a PC

How to Setup the Remote Access Portal on a PC How to Setup the Remote Access Portal on a PC v1.0 1 P a g e Revision History: Name Date Reason Version Evan Miller April 13, 2016 Initial Version 1.0 CONTENTS System Requirements... 2 Installing Java...

More information

Employee Active Directory Self-Service Quick Setup Guide

Employee Active Directory Self-Service Quick Setup Guide Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:

More information

BOTTOM UP THINKING EMAIL SETUP INSTRUCTIONS. Unique businesses require unique solutions CLIENT GUIDE

BOTTOM UP THINKING EMAIL SETUP INSTRUCTIONS. Unique businesses require unique solutions CLIENT GUIDE BOTTOM UP THINKING Unique businesses require unique solutions EMAIL SETUP INSTRUCTIONS CLIENT GUIDE INDEX How to connect a. Deciding on best method (POP or IMAP) Setting up email on devices Webmail a.

More information

Comodo Mobile Device Manager Software Version 3.0

Comodo Mobile Device Manager Software Version 3.0 Comodo Mobile Device Manager Software Version 3.0 CMDM Cloud Portal Setup Guide Guide Version 3.0.010515 Comodo Security Solutions 1255 Broad Street Clifton, NJ 07013 Comodo Mobile Device Manager - Cloud

More information

Broward Single Sign-On User Guide

Broward Single Sign-On User Guide Version 2.0 11/10/16 Table of Contents 1 About This Guide... 1 1.1... How the Document is Organized... 1 1.2... Who Should Use This Guide... 1 1.3... Typographical Conventions... 1 2 Introduction... 2

More information

The University of Texas Rio Grande Valley. Network Security. Create a Virtual Private. Network (VPN) Connection. Network Security How-to:

The University of Texas Rio Grande Valley. Network Security. Create a Virtual Private. Network (VPN) Connection. Network Security How-to: Create a Virtual Private Network (VPN) Connection 1 Virtual Private Network (VPN) The VPN service provides secure (encrypted) off-campus connection to access University resources. Use VPN to access Oracle

More information

Sophos Mobile Control user help. Product version: 6.1

Sophos Mobile Control user help. Product version: 6.1 Sophos Mobile Control user help Product version: 6.1 Document date: May 2016 Contents 1 About this help...4 2 About Sophos Mobile Control...5 3 Login to the Self Service Portal...6 3.1 First login...6

More information

Advanced Configuration Steps

Advanced Configuration Steps Advanced Configuration Steps After you have downloaded a trial, you can perform the following from the Setup menu in the MaaS360 portal: Configure additional services Configure device enrollment settings

More information

Accessing Citrix on a MAC using OS X (Mountain Lion and Newer)

Accessing Citrix on a MAC using OS X (Mountain Lion and Newer) These instructions are specifically designed for OS X Mountain Lion and Mavericks. Earlier versions of the OS will require a different installation. These instructions assume that there are no Java, Citrix

More information

TARGETPROCESS HELP DESK PORTAL

TARGETPROCESS HELP DESK PORTAL TARGETPROCESS HELP DESK PORTAL v.2.17 User Guide This document describes TargetProcess Help Desk Portal functionality and provides information about TargetProcess Help Desk Portal usage. 1 HELP DESK PORTAL...2

More information

Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students.

Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students. Airnet-Student Airnet-Student is a new and improved wireless network that is being made available to all Staffordshire University students. Airnet-Student has two key advantages over the current Airnet

More information

How to Remotely Access the C&CDHB Network from a Personal Device

How to Remotely Access the C&CDHB Network from a Personal Device How to Remotely Access the C&CDHB Network from a Personal Device 13/09/2012 Contents Installing the Citrix Receiver for Windows PCs... 2 Installing the Citrix Receiver for Mac OS X... 6 Installing the

More information

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE WHAT IS VIRTUAL DESKTOP? Virtual Desktop is an online environment that allows you to access NSF applications and a virtual desktop that mimics a Windows 7 environment. You can use Virtual Desktop to use

More information

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014

Building a BYOD Program Using the Casper Suite. Technical Paper Casper Suite v9.4 or Later 17 September 2014 Building a BYOD Program Using the Casper Suite Technical Paper Casper Suite v9.4 or Later 17 September 2014 JAMF Software, LLC 2014 JAMF Software, LLC. All rights reserved. JAMF Software has made all efforts

More information

Rumpus FileWatch. Contents. Connecting To The Rumpus Server 2. Monitoring User Activity 3. Viewing Recent File Transfers 4

Rumpus FileWatch. Contents. Connecting To The Rumpus Server 2. Monitoring User Activity 3. Viewing Recent File Transfers 4 Contents Connecting To The Rumpus Server 2 Monitoring User Activity 3 Viewing Recent File Transfers 4 File Upload/Download Alarms 5 Retrieving Files From The Server 5 Drop Shipping Files To End Users 5

More information

Mobile Portal for Parents and Students

Mobile Portal for Parents and Students Mobile Portal for Parents and Students September 2013 This document is intended for restricted use only. Infinite Campus asserts that this document contains proprietary information that would give our

More information

Electronic Questionnaires for Investigations Processing (e-qip)

Electronic Questionnaires for Investigations Processing (e-qip) January 2016 Electronic Questionnaires for Investigations Processing (e-qip) Login Instructions for first-time users OR users that have had their accounts reset Step 1 Access the e-qip Login screen at

More information

Active Directory Integration for Greentree

Active Directory Integration for Greentree App Number: 010044 Active Directory Integration for Greentree Last Updated 14 th February 2013 Powered by: AppsForGreentree.com 2013 1 Table of Contents Features... 3 Options... 3 Important Notes... 3

More information

Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM)

Reading an email sent with Voltage SecureMail. Using the Voltage SecureMail Zero Download Messenger (ZDM) Reading an email sent with Voltage SecureMail Using the Voltage SecureMail Zero Download Messenger (ZDM) SecureMail is an email protection service developed by Voltage Security, Inc. that provides email

More information

NetIQ Advanced Authentication Framework

NetIQ Advanced Authentication Framework NetIQ Advanced Authentication Framework Security Officer Guide Version 5.2.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 Authenticators Management 4 Card 8 Email OTP

More information

McAfee Directory Services Connector extension

McAfee Directory Services Connector extension Getting Started Guide Revision A McAfee Directory Services Connector extension For use with epolicy Orchestrator 4.6.1 through 5.0 COPYRIGHT Copyright 2013 McAfee, Inc. Do not copy without permission.

More information

Using the owncloud Android App

Using the owncloud Android App Using the owncloud Android App Accessing your files on your owncloud server via the Web interface is easy and convenient, as you can use any Web browser on any operating system without installing special

More information

Exchange ActiveSync (EAS)

Exchange ActiveSync (EAS) Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,

More information