RSA SecurID Token User Guide February 12, 2015

Size: px
Start display at page:

Download "RSA SecurID Token User Guide February 12, 2015"

Transcription

1 RSA SecurID Token User Guide

2 Page i Table of Contents Section I How to request an RSA SecurID token... 1 Section II Setting your RSA SecurID PIN... 6 Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server Section IV Setting up a Mac to tunnel Remote Desktop through epoxy to a protected Windows server Section V Using Remote Desktop from a Windows or Mac workstation to connect to a Windows server through the epoxy tunnel Section VI Handling an RSA SecurID token in Next tokencode required mode Appendix RSA SecurID token request form... 34

3 Page 1 of 34 Section I How to request an RSA SecurID token 1) To obtain an RSA SecurID token, you must fill out the form that is in the Appendix of this document, obtain the required signatures and send it to the OIT Help Desk. 2) There are a three ways that are used to access target servers with RSA SecurID authentication: a. If you will be accessing a Unix or Linux-based server, you will likely first open as SSH session with a tunneling server known as epoxy.princeton.edu. The epoxy.princeton.edu server will provide the RSA SecurID authentication. b. If you will be accessing a Windows terminal server that has the RSA SecurID authentication service installed, you will be able to authenticate to the terminal server directly through a Remote Desktop connection from your workstation. Currently, users accessing the University s and McCarter s ticketing systems use terminal servers with RSA SecurID authentication installed. In this case, you normally would not need access to epoxy.princeton.edu. c. If you must administer a protected Windows system that does not have the RSA SecurID service, you must first open an SSH session with epoxy.princeton.edu that will provide the RSA SecurID authentication and securely tunnel the Remote Desktop session. 3) In case b above, where you will not be using the epoxy SSH tunnel, you can submit your RSA SecurID token form, and the OIT Help Desk will set up your RSA SecurID account, and will provide you with your RSA SecurID token. You skip the remainder of this section and proceed to Section II Setting your RSA SecurID PIN. 4) If you will be using epoxy, before you can begin to access the epoxy tunnel, the NetID that you will be using with your RSA SecurID token must be authorized as follows: Section I How to request an RSA SecurID token

4 Page 2 of 34 a. You must enable Unix for the NetID that will be associated with the RSA SecurID token, and select a shell by following the procedure described in the following OIT KnowledgeBase article: From the KnowledgeBase article, click the Enable Unix Account link. b. You will be asked to log in. You should use the NetID that will be associated with the requested RSA SecurID token. Section I How to request an RSA SecurID token

5 Page 3 of 34 c. If the page that is returned has a heading that says Update your Unix account, Unix is already enabled for your account. In this case proceed to step g. Otherwise, continue to the next step. d. If the page has a heading that says Enable your Unix account, you should click the radio button next to the Enable my Unix account label, and then click the Enable my Account button. Section I How to request an RSA SecurID token

6 Page 4 of 34 e. The following message will be returned. You should wait ten minutes for Unix to be enabled. f. You should then go back to the web site to set your Unix shell. After logging in, the following page will be displayed: Section I How to request an RSA SecurID token

7 Page 5 of 34 g. You should choose the Unix shell that you wish to use in a Unix environment, click the appropriate radio button, and then click the Submit Change button. The example shows the selection of the Bourne shell, but any shell would be OK. h. Once you ve selected a shell, the following page will be displayed: i. Once you have selected a default shell, you should ask the OIT Help Desk (258-HELP) to submit an OPM ticket asking OIT s Enterprise Servers and Storage group to add the NetID to the group authorized to use RSA SecurID authentication access on the SSH tunneling server, epoxy.princeton.edu. Authorization usually takes between 1 and 2 hours to complete. j. Once ESS completes the request, the OIT Help Desk will set up your RSA SecurID account, and will provide you with your RSA SecurID token. Then, proceed to Section II Setting your RSA SecurID PIN. Section I How to request an RSA SecurID token

8 Page 6 of 34 Section II Setting your RSA SecurID PIN You can use one of the following two methods to set your PIN: Method 1 You can use the RSA SecurID Self-Service website to set the PIN by performing the following steps: Note - You must either be on-campus or, if off-campus, using VPN technology to perform this procedure. 1) Visit the following website https://sdprsa200l.princeton.edu/ss. The following page will be displayed. Enter your RSA SecurID user ID and click on the Log on link. 2) The following page will be displayed. Section II Setting your RSA SecurID PIN

9 Page 7 of 34 3) Click the down arrow next to Authentication Method: to open the drop down menu, and click the Passcode menu item. 4) After selecting the Passcode option, click the Log On button. 5) In the following page, enter ONLY the number that is displayed on the RSA SecurID token s LCD in the Passcode: text box Section II Setting your RSA SecurID PIN

10 Page 8 of 34 6) In the following page, enter the following information into the form: a. Enter your new PIN in the text box labeled New PIN: with the following restrictions: it must be a minimum of four characters (alpha or numeric), and cannot match any of your three previous PINs. b. Verify it by entering again in the text box labeled Confirm New PIN: c. Wait for the number on the RSA SecurID token s LCD to change and enter that number into the text box labeled Next Tokencode:, and click the OK button to submit. Section II Setting your RSA SecurID PIN

11 Page 9 of 34 7) The following page will be displayed confirming that the PIN has been successfully set. Notes You will see a note on the above screen indicating that your password has expired, and that you have not answered the security questions. We currently are neither using a password to override token authentication nor security questions for self-service resets, so you can ignore both messages. 8) At this point, you can log out of self-service by clicking the Log Out link in the upper right hand corner of the page. Section II Setting your RSA SecurID PIN

12 Page 10 of 34 Method 2 If you are authorized to use the epoxy.princeton.edu tunneling server and have already set up PuTTY on your system by following the instructions in Section III (Windows users) or Section IV (Mac or Linux users) of this document, you can set your RSA SecurID token PIN through a connection to the epoxy.princeton.edu server. 1) If you are a Mac or Linux workstation user, you should open a terminal window, enter the following command ssh epoxy.princeton.edu, and skip to step 4. 2) If you are a Windows user using PuTTY, you should open PuTTY and load the PuTTY configuration that you had set up on your Windows system by selecting the configuration name that you had set up (in this case My Configuration ) and then clicking the Load button. Section II Setting your RSA SecurID PIN

13 Page 11 of 34 3) After verifying that the Host Name is set to epoxy.princeton.edu, the Port is equal to 22 and the Connection Type is set to SSH, the user should click Open to open the session. 4) On both the PuTTY window on Windows and the terminal server window on Mac workstations, epoxy will display a Login as: prompt. You should enter your RSA SecurID assigned user ID. 5) When prompted for your passcode, ONLY enter the value displayed on the RSA SecurID token s LCD, since the token currently has no PIN. Section II Setting your RSA SecurID PIN

14 Page 12 of 34 6) Upon successful entry of the passcode, you will be asked if he or she wants to enter a PIN. Enter a Y, otherwise, the session will be disconnected. 7) Select a new PIN of 4 to 8 alphanumeric values when prompted. 8) After you enter the new PIN for the first time, the system will ask you to verify the PIN value by re-entering it at the prompt. 9) If the values match and meet the minimum 4 to 8 alphanumeric character standard, you will receive a Passcode: prompt. You must wait until the value displayed on the LCD has changed Section II Setting your RSA SecurID PIN

15 Page 13 of 34 from the one entered in the original logon. Once it has changed, you should test your passcode by entering the new PIN followed by the LCD value. 10) If the Passcode is successfully entered, the epoxy.princeton.edu session will be established and a command prompt presented. Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server 1) If you are using a Windows device to access your target system, download and install the Putty SSH client from to open SSH connections to epoxy.princeton.edu, our tunneling server. Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server

16 Page 14 of 34 2) Open PuTTY. The following screen will be displayed: 3) In the initial window, enter epoxy.princeton.edu in the Host Name field, and make sure the "Port" field is set to 22. Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server

17 Page 15 of 34 4) Scroll down the menu items, to the "SSH" menu item under "Connection", Click on the "+" to the left of SSH, and then, on the expanded menu under SSH, click on Tunnels 5) The following screen will be displayed: Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server

18 Page 16 of 34 6) In the "Add new forwarded port" section, enter in the "Source Port" field. Then, enter (the name of the server to which you want to RDP).princeton.edu:3389 in the "Destination" field. Make sure that, under the Destination label, the Local and Auto radio buttons are selected. Then click the Add button. 7) The following screen will be displayed with the server name that you entered: Note - When you are using tunneling and you activate the tunnel, if you want to open up a Remote Desktop session with server1name.princeton.edu, you must connect to localhost: The way tunneling works in this scenario is that PuTTY will see your request to connect to localhost port Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server

19 Page 17 of , compare it to its tunneling table and, upon seeing the match, will direct your RDP request to the destination associated with that localhost port in this case server1name.princeton.edu. You must create one forwarded port for each server to which you want to RDP. For example, you might set up (source port) to remote desktop to (a second server to which I want to RDP).princeton.edu:3389 8) To add another destination server, do the same thing: In the "Add new forwarded port" section, enter in the "Source Port" field. Then, enter (the name of the server to which you want to RDP).princeton.edu:3389 in the "Destination" field. Make sure that, under the Destination label, the Local and Auto radio buttons are selected. Then click the Add button. Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server

20 Page 18 of 34 9) The following screen will be displayed after you enter the second server: 10) Continue adding as many destination servers as you need following steps 8 and 9. When you ve finished adding servers, go to the top of the menu on the left of the configuration screen and click the "Session" menu item at the very top of the menu. 11) The following screen will be displayed: Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server

21 Page 19 of 34 12) Enter a name of your choosing for the configuration. Then, click the "Save" button. 13) PuTTY is now ready for tunneled Remote Desktop sessions. Section III Setting up PuTTY on your Windows workstation to tunnel Remote Desktop through epoxy to a protected Windows server

22 Page 20 of 34 Section IV Setting up a Mac to tunnel Remote Desktop through epoxy to a protected Windows server If you need to Remote Desktop to a Windows server through the epoxy.princeton.edu tunnel using a Mac workstation, you will need to configure your Mac as follows: 1) Open a terminal window on the Mac. 2) At the prompt, enter in the following command followed by the enter key: defaults write com.apple.finder AppleShowAllFiles YES 3) At the prompt, enter the following command followed by the enter key: killall Finder Section IV Setting up a Mac to tunnel Remote Desktop through epoxy to a protected Windows server

23 Page 21 of 34 4) Open up a finder window. Under the Go menu, click the Go to Folder menu item. 5) The following window will open: 6) Enter the value ~/.ssh into the text box. 7) A list of files in the directory will be displayed. Section IV Setting up a Mac to tunnel Remote Desktop through epoxy to a protected Windows server

24 Page 22 of 34 8) If there is no file named config in the directory list, open up the TextEdit.app program and create a new text document. 9) If the config file does exist, right click the config file and open it with the TextEdit.app program. 10) Add the following lines to your config file: LocalForward server1name.princeton.edu:3389 LocalForward server2name.princeton.edu:3389 LocalForward server3name.princeton.edu:3389 Note Replace server1name with the host name of the first server to which you will Remote Desktop Replace server2name with the host name of the second server (if needed) Replace server3name with the host name of the second server (if needed), etc. Section IV Setting up a Mac to tunnel Remote Desktop through epoxy to a protected Windows server

25 Page 23 of 34 11) After entering the necessary LocalForward commands into the file, click Save under the file menu. 12) If the config file previously existed, the save will be saved and no further action needs to be taken. 13) If you created a new config file, the following will be displayed when you click the Save menu item: Section IV Setting up a Mac to tunnel Remote Desktop through epoxy to a protected Windows server

26 Page 24 of 34 14) In the Save As: text box, enter the tilde ~ character. This will cause the following popup to be displayed: 15) Set the Go to the folder: text box to the following value: ~/.ssh Then click the Go button. 16) Enter config into the Save As: text box. Then, click the Save button to save the config file. Section IV Setting up a Mac to tunnel Remote Desktop through epoxy to a protected Windows server

27 Page 25 of 34 Section V Using Remote Desktop from a Windows or Mac workstation to connect to a Windows server through the epoxy tunnel When a user wants to connect to a server that he or she supports or uses via the epoxy tunneling server, he or she must perform the following steps: 1) If you are a Mac or Linux workstation user, you should open a terminal window, enter the following command ssh epoxy.princeton.edu, and skip to step 4. 2) If you are a Windows user using PuTTY, you should open PuTTY and load the PuTTY configuration that you had set up on your Windows system by selecting the configuration name that you had set up (in this case My Configuration ) and then clicking the Load button. Section V Using Remote Desktop from a Windows or Mac workstation to connect to a Windows server through the epoxy tunnel

28 Page 26 of 34 3) After verifying that the Host Name is set to epoxy.princeton.edu, the Port is equal to 22 and the Connection Type is set to SSH, the user should click Open to open the session. 4) On both the PuTTY window on Windows and the terminal server window on Mac workstations, epoxy will display a Login as: prompt. You should enter your RSA SecurID assigned user ID. Section V Using Remote Desktop from a Windows or Mac workstation to connect to a Windows server through the epoxy tunnel

29 Page 27 of 34 5) Next, you will be prompted for your Passcode". Enter your PIN immediately followed by the number on your assigned RSA SecurID token in one string. 6) Once the login is successful, you will have an open SSH session with the epoxy tunneling server. You must keep the Windows PuTTY session or Mac Terminal window open - that is your connection to the SSH tunnel. The session can be minimized. 7) Then, you can then start up the Remote Desktop client application. Section V Using Remote Desktop from a Windows or Mac workstation to connect to a Windows server through the epoxy tunnel

30 Page 28 of 34 Notes - You should NOT open the Remote Desktop session with the actual name of the target server since all access to the device must come through the epoxy tunnel. Instead, the Remote Desktop session must be made with "localhost:xxxxx" (where xxxxx is the local port that you defined in your PuTTY configuration or Mac config file for the server that you wish to access. In the PuTTY and Mac client setup sections, we suggested that, since the Remote Desktop port is usually 3389, you could set local port for the first server, for the second, etc., but the local port numbers can be set to any value (OVER 1023) that you prefer. 8) Log into the server with your assigned server ID and password. You should now be connected to the target system. NOTE your ID may be different than your SecurID user ID. Section V Using Remote Desktop from a Windows or Mac workstation to connect to a Windows server through the epoxy tunnel

31 Page 29 of 34 Section VI Handling an RSA SecurID token in Next tokencode required mode You may encounter a very confusing situation where you receive a second Passcode: prompt when attempting to access the epoxy server It appears as if the first passcode you entered failed, since the two prompts are identical Passcode: displays and no other message is provided. If this occurs, your passcode may very well have been entered correctly, but your token might be in Next tokencode mode. This usually occurs after you ve previously entered a couple of incorrect passcode values. When your token is in Next tokencode mode, the system is requiring you to log in once successfully with your PIN and value on the token s LCD at the first Passcode: prompt, and then to provide the next value on the token s LCD WITHOUT THE PIN - to a subsequent Passcode: prompt. If this occurs, proceed as follows: Method 1: 1) When prompted for the User name:, enter the user ID associated with the token 2) When prompted the first time for the Passcode: enter your PIN and the number on the LCD of your RSA SecurID token. 3) When prompted the second time for the Passcode:, wait for the number on your token s LCD to change, and then ONLY enter the number on the LCD of your RSA SecurID token. Method 2: 1) Enter the following URL into your web browser: https://sdprsa200l.princeton.edu/ss Section VI Handling an RSA SecurID token in Next tokencode required mode

32 Page 30 of 34 2) Enter your NetID in the User ID: text box. Then, click the OK button. 3) The following page will be displayed. 4) Change the value of the drop down to Passcode. Section VI Handling an RSA SecurID token in Next tokencode required mode

33 Page 31 of 34 5) Click the Log On button. 6) The following page will be displayed. 7) In the Passcode: text box, enter the PIN associated with your token immediately followed by the number that is displayed on the token s LCD. Then, click the Log On button. Section VI Handling an RSA SecurID token in Next tokencode required mode

34 Page 32 of 34 8) The following page will be displayed. 9) Wait for the number on the token s LCD to change. Then, enter ONLY the number on the LCD into the Next Tokencode: text box and click the OK button. Section VI Handling an RSA SecurID token in Next tokencode required mode

35 Page 33 of 34 10) When you have successfully logged in, the following page will be displayed and the token will be out of Next Tokencode mode, so your next logon will be a normal one. 11) At this point you can click on the Log Off link at the upper right hand portion of the page. Section VI Handling an RSA SecurID token in Next tokencode required mode

36 Page 34 of 34 Appendix RSA SecurID token request form The next page is the form that should be used by anyone who needs to request an RSA SecurID token. It can also be found on the Information Security website at: Appendix RSA SecurID token request form

37 An RSA SecurID Token ( Token ) is being requested by: RSA SecurID Token Request Form Name ( Assignee ): Campus Address: Sponsoring Department: OIT-issued NetID: Phone: Chart String: for the following Purposes: By signing below, the Assignee, Manager and Department Head acknowledge that they have read and agree to the following: The Token is the property of Princeton University s OIT. Its use and disposition is under the administration and jurisdiction of the University s Information Security Office. The Token may only be used for the purposes listed above. In the event these purposes change, the Assignee, Manager or Department Head must notify the University s Information Security Office. The Token must not be shared with any individual, unless such arrangement is made in advance with the University s Information Security Office; The Assignee, Manager or Department Head must promptly notify the University s Information Security Office if the Token is lost or stolen. The Assignee, Manager or Department Head is also required to promptly notify and return the Token to the University s Information Security Office, if: o It is used by anyone other than the Assignee, o It is used for purposes other than those listed above, o The Assignee transfers from the department listed herein to another University department, o The Assignee s association with the University ends, either voluntarily or involuntarily, or o The Token is damaged or is not functioning properly. Assignee: Manager: Department Head: Information Security Office: Issued by: Print Name Signature Date Rev 1-12/9/2014

Logging into Citrix (Epic) using an RSA Soft Token - New RSA User

Logging into Citrix (Epic) using an RSA Soft Token - New RSA User Logging into Citrix (Epic) using an RSA Soft Token - New RSA User Soft Token Installation and Logging into Citrix (Epic) using an RSA Soft Token A. For new RSA users: downloading & importing your RSA Soft

More information

RSA SecurID Token 4.0 for Windows Desktops Quick Start

RSA SecurID Token 4.0 for Windows Desktops Quick Start Welcome to RSA SecurID Token for Windows Desktops. This application allows you to import software tokens that you can use to verify your identity to Virtual Private Networks (VPNs) and other resources

More information

VHA Innovations Program Future Technology Laboratory. Linux Workstation Remote Desktop Connection Manual 2014-10- 01

VHA Innovations Program Future Technology Laboratory. Linux Workstation Remote Desktop Connection Manual 2014-10- 01 VHA Innovations Program Future Technology Laboratory Linux Workstation Remote Desktop Connection Manual 2014-10- 01 Table of Contents VHA Innovations Program... 1 Purpose... 3 Prerequisites... 3 Windows

More information

IMS Health Secure Outlook Web Access Portal. Quick Setup

IMS Health Secure Outlook Web Access Portal. Quick Setup IMS Health Secure Outlook Web Access Portal Purpose: This service has been developed to allow access to the IMS Health email system for staff that can not access the email system through VPN which is preferred

More information

Remote Access to Unix Machines

Remote Access to Unix Machines Remote Access to Unix Machines Alvin R. Lebeck Department of Computer Science Department of Electrical and Computer Engineering Duke University Overview We are using OIT Linux machines for some homework

More information

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required

More information

New Brunswick Internal Services Agency. RSA Self-Service Console User Guide

New Brunswick Internal Services Agency. RSA Self-Service Console User Guide New Brunswick Internal Services Agency RSA Self-Service Console User Guide Version: 1.0 Created: November 27, 2013 Modified: November 27, 2013 Table of Contents Introduction...1 Logging on to the RSA Self-Service

More information

How to Use Your RSA SecurID Software Token for Windows XP, Vista, or Windows 7 (For ICIS remote access)

How to Use Your RSA SecurID Software Token for Windows XP, Vista, or Windows 7 (For ICIS remote access) 1 How to Use Your RSA SecurID Software Token for Windows XP, Vista, or Windows 7 (For ICIS remote access) San Antonio Community Hospital uses a strong authenticate method for remote access to ICIS. This

More information

EURECOM VPN SSL for students User s guide

EURECOM VPN SSL for students User s guide EURECOM VPN SSL for students User s guide Table of Contents Introduction... 2 Login process... 2 Portail main page... 2 Prerequisite... 2 RSA SecurId software token... 3 First usage of RSA SecurID token...

More information

Yale Software Library

Yale Software Library Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for

More information

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For

More information

Allianz Global Investors Remote Access Guide

Allianz Global Investors Remote Access Guide Allianz Global Investors Remote Access Guide Web Address: http://remote.allianzgi-us.com/ Page 1 of 34 pages Please contact the Service Desk at Table of Contents 1. Introduction to the Remote Access Page

More information

Using Remote Web Workplace Version 1.01

Using Remote Web Workplace Version 1.01 Using Remote Web Workplace Version 1.01 Remote web workplace allows you to access your Windows XP desktop through Small Business Server 2003 from a web browser. 1. Connect to the Internet in your remote

More information

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities

CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities CONNECTING TO DEPARTMENT OF COMPUTER SCIENCE SERVERS BOTH FROM ON AND OFF CAMPUS USING TUNNELING, PuTTY, AND VNC Client Utilities DNS name: turing.cs.montclair.edu -This server is the Departmental Server

More information

DIS VPN Service Client Documentation

DIS VPN Service Client Documentation DIS VPN Service Client Documentation Background ------------------------------------------------------------------------------------------------ 1 Downloading the Client ---------------------------------------------------------------------------------

More information

Using SSH Secure Shell Client for FTP

Using SSH Secure Shell Client for FTP Using SSH Secure Shell Client for FTP The SSH Secure Shell for Workstations Windows client application features this secure file transfer protocol that s easy to use. Access the SSH Secure FTP by double-clicking

More information

VPN Web Portal Usage Guide

VPN Web Portal Usage Guide VPN Web Portal Usage Guide Table of Contents WHAT IS VPN WEB CLIENT 4 SUPPORTED WEB BROWSERS 4 LOGGING INTO VPN WEB CLIENT 5 ESTABLISHING A VPN CONNECTION 6 KNOWN ISSUES WITH MAC COMPUTERS 6 ACCESS INTRANET

More information

Remote Access End User Reference Guide for SHC Portal Access

Remote Access End User Reference Guide for SHC Portal Access Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required

More information

Secure File Transfer Protocol User Guide

Secure File Transfer Protocol User Guide Ministry of Health Secure File Transfer Protocol User Guide Date Created: November 10, 2009 Date Updated: November 12, 2013 Next Update: Version: 1.6 Approvals Signature Date Director, DA&IM Signature

More information

Department of Supply & Services (CIMS) RSA Web Express User Guide v1.2

Department of Supply & Services (CIMS) RSA Web Express User Guide v1.2 Department of Supply & Services (CIMS) RSA Web Express User Guide v1.2 Created: May 22, 2008 Updated: April 23, 2009 The RSA Web Express web express web site automates functions required to deploy hardware

More information

MiraCosta College now offers two ways to access your student virtual desktop.

MiraCosta College now offers two ways to access your student virtual desktop. MiraCosta College now offers two ways to access your student virtual desktop. We now feature the new VMware Horizon View HTML access option available from https://view.miracosta.edu. MiraCosta recommends

More information

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? Enterprise Computing & Service Management How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend

More information

This document shows new Citrix users how to set up and log in to their Citrix account.

This document shows new Citrix users how to set up and log in to their Citrix account. Citrix Set up Set up and Log in to Citrix Objective: This document shows new Citrix users how to set up and log in to their Citrix account. Procedure This document shows you how to set up and log in to

More information

Remote Access End User Guide (Cisco VPN Client)

Remote Access End User Guide (Cisco VPN Client) Remote Access End User Guide (Cisco VPN Client) Contents 1 INTRODUCTION... 3 2 AUDIENCE... 3 3 CONNECTING TO N3 VPN (N3-12-1) OR EXTENDED VPN CLIENT... 3 4 DISCONNECTING FROM N3 VPN (N3-12-1) AND EXTENDED

More information

Syndicate Bank. Desktop based User Manual for using SyndProtect RSA SecurID Software Token for Internet Banking

Syndicate Bank. Desktop based User Manual for using SyndProtect RSA SecurID Software Token for Internet Banking Syndicate Bank Supply and Commissioning of Two Factor Authentication for Internet with Two Factor Authentication for Bank s Internal Users for Various Applications Desktop based User Manual for using SyndProtect

More information

Allianz Global Investors Remote Access Guide

Allianz Global Investors Remote Access Guide Allianz Global Investors Remote Access Guide Web Address: http://remote.allianzgi-us.com/ Page 1 of 29 pages Table of Contents 1. Introduction to the Remote Access Page 3 2. Overview of Outlook Web Access

More information

Weston Public Schools Virtual Desktop Access Instructions

Weston Public Schools Virtual Desktop Access Instructions Instructions for connecting to the Weston Schools Virtual Desktop Environment Notes: You will have to have administrator permission on your computer in order to install a VMWare Client application which

More information

Accessing the Media General SSL VPN

Accessing the Media General SSL VPN Launching Applications and Mapping Drives Remote Desktop Outlook Launching Web Applications Full Access VPN Note: To access the Media General VPN, anti-virus software must be installed and running on your

More information

End User Configuration

End User Configuration CHAPTER114 The window in Cisco Unified Communications Manager Administration allows the administrator to add, search, display, and maintain information about Cisco Unified Communications Manager end users.

More information

USER MANUAL. CTBTO Remote Access VPN using Cisco AnyConnect

USER MANUAL. CTBTO Remote Access VPN using Cisco AnyConnect USER MANUAL CTBTO Remote Access VPN using Cisco AnyConnect 1 Table of Contents I. Purpose... 4 II. Scope... 4 III. Definitions and Acronyms... 4 IV. Background... 5 V. Requirements... 5 VI. General Installation

More information

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE WHAT IS VIRTUAL DESKTOP? Virtual Desktop is an online environment that allows you to access NSF applications and a virtual desktop that mimics a Windows 7 environment. You can use Virtual Desktop to use

More information

RSA Authentication Manager 7.1 Basic Exercises

RSA Authentication Manager 7.1 Basic Exercises RSA Authentication Manager 7.1 Basic Exercises Contact Information Go to the RSA corporate web site for regional Customer Support telephone and fax numbers: www.rsa.com Trademarks RSA and the RSA logo

More information

MRU Secure Remote Access Service (SRAS) External User Guide

MRU Secure Remote Access Service (SRAS) External User Guide MRU Secure Remote Access Service (SRAS) External User Guide The MRU Secure Remote Access Service (SRAS) allows MRU approved vendors and external clients, restricted remote access to internal computing

More information

Remote Access Instructions

Remote Access Instructions document rev. 8 updated 6/28/2012 Remote Access Instructions Table of Contents... Page 1 Finding the AFS Remote Access links and the AFS home page... 2 First time login with RSA fob (AFS option 1 SSL VPN

More information

Endpoint Security VPN for Windows 32-bit/64-bit

Endpoint Security VPN for Windows 32-bit/64-bit Endpoint Security VPN for Windows 32-bit/64-bit E75.20 User Guide 13 September 2011 2011 Check Point Software Technologies Ltd. All rights reserved. This product and related documentation are protected

More information

External Partner and Customer Login Instructions via myngc Portal

External Partner and Customer Login Instructions via myngc Portal External Partner and Customer Login Instructions via myngc Portal https://www.myngc.com Purpose The purpose of this document is to provide the Northrop Grumman Corporation (NGC) external partners and customers

More information

How to use SURA in three simple steps:

How to use SURA in three simple steps: How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.

More information

Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008.

Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008. Using SSH Secure FTP Client INFORMATION TECHNOLOGY SERVICES California State University, Los Angeles Version 2.0 Fall 2008 Contents Starting SSH Secure FTP Client... 2 Exploring SSH Secure FTP Client...

More information

Instructions for Using Secure Email. (SMail) via Outlook Web Access. with an RSA Token

Instructions for Using Secure Email. (SMail) via Outlook Web Access. with an RSA Token Instructions for Using Secure Email (SMail) via Outlook Web Access with an RSA Token Version 4 April 2010 Office of the Associate CIO for IT Support Services United States Department of Energy Requirements

More information

CWOPA Broadband Users. Windows Operating System

CWOPA Broadband Users. Windows Operating System CWOPA Broadband Users Windows Operating System October 2012 Background These instructions are to be used for VPN users who have been assigned a CWOPA username and password. If your machine has Internet

More information

How to connect to the DGL Practice Manager Cloud Server from an Apple Mac

How to connect to the DGL Practice Manager Cloud Server from an Apple Mac How to connect to the DGL Practice Manager Cloud Server from an Apple Mac Connecting to the DGL Practice Manager Hosted Servers requires the use of the "Microsoft Remote Desktop Client" application, which

More information

Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista

Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista Using Remote Desktop with the Cisco AnyConnect VPN Client in Windows Vista 1. In order to use Remote Desktop and the VPN client, users must first complete the Blackboard Remote Users training course and

More information

Web File Management with SSH Secure Shell 3.2.3

Web File Management with SSH Secure Shell 3.2.3 Web File Management with SSH Secure Shell 3.2.3 June 2003 Information Technologies Copyright 2003 University of Delaware. Permission to copy without fee all or part of this material is granted provided

More information

Hallpass Instructions for Connecting to Mac with a Mac

Hallpass Instructions for Connecting to Mac with a Mac Hallpass Instructions for Connecting to Mac with a Mac The following instructions explain how to enable screen sharing with your Macintosh computer using another Macintosh computer. Note: You must leave

More information

CONNECTING TO ECS RESOURCES

CONNECTING TO ECS RESOURCES 1) Getting a Windows username and password... 2 2) Download VPN Client... 4 3) Installing VPN... 11 4) Configure VPN... 18 5) Firewall... 20 6) Connecting using VPN... 20 7) Setting up a default connection...

More information

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account?

CHARTER BUSINESS custom hosting faqs 2010 INTERNET. Q. How do I access my email? Q. How do I change or reset a password for an email account? Contents Page Q. How do I access my email? Q. How do I change or reset a password for an email account? Q. How do I forward or redirect my messages to a different email address? Q. How do I set up an auto-reply

More information

Shellshock Security Patch for X86

Shellshock Security Patch for X86 Shellshock Security Patch for X86 Guide for Using the FFPS Update Manager October 2014 Version 1.0. Page 1 Page 2 This page is intentionally blank Table of Contents 1.0 OVERVIEW - SHELLSHOCK/BASH SHELL

More information

Access to applications and the network depends on whether or not you are using personal equipment or a Firm-issued laptop or desktop.

Access to applications and the network depends on whether or not you are using personal equipment or a Firm-issued laptop or desktop. Overview of Help & Tips The new System allows authorized users to log in and access the Firm s network through either Citrix or VPN (also known as Stonegate IPSec VPN). This system incorporates additional

More information

MCBDirect Corporate Logging on using a Soft Token

MCBDirect Corporate Logging on using a Soft Token MCBDirect Corporate Logging on using a Soft Token Document issue: 2.1 Date of issue: September 2014 Contents About Soft Token authentication... 3 Logging onto MCBDirect Corporate online banking... 4 Soft

More information

OpenVPN over SSH tunneling

OpenVPN over SSH tunneling Step 1: What you'll need before starting OpenVPN over SSH tunneling You're going to need a couple of things in order to create an SSH tunnel that you can use as a SOCKS 5 proxy for tunneling OpenVPN or

More information

Accessing the Mercy Remote Access Portal (SSL VPN)

Accessing the Mercy Remote Access Portal (SSL VPN) MERCY INFORMATION SECURITY TEAM Accessing the Mercy Remote Access Portal (SSL VPN) In order to access the Sisters of Mercy Remote Access Portal, you will need to complete the following steps. ** Important:

More information

Remote Desktop Services

Remote Desktop Services Remote Desktop Services AMERICAN INSTITUTES FOR RESEARCH AIR REMOTE DESKTOP SERVICES (RDS) GUIDE Overview Welcome to AIR Remote Desktop Services! AIR Remote Desktop Services can be accessed from a Windows

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

How to Setup the Remote Access Portal on a PC

How to Setup the Remote Access Portal on a PC How to Setup the Remote Access Portal on a PC v1.0 1 P a g e Revision History: Name Date Reason Version Evan Miller April 13, 2016 Initial Version 1.0 CONTENTS System Requirements... 2 Installing Java...

More information

Getting the most out of your new Aalto workstation An Aalto IT guide for personnel migrating to the new Aalto workstation environment

Getting the most out of your new Aalto workstation An Aalto IT guide for personnel migrating to the new Aalto workstation environment Getting the most out of your new Aalto workstation An Aalto IT guide for personnel migrating to the new Aalto workstation environment What services do I use with the old TKK password, and what do I use

More information

Windows Installation 1. On a Windows PC (For MAC, skip to next section), at the file download prompt click Run.

Windows Installation 1. On a Windows PC (For MAC, skip to next section), at the file download prompt click Run. Introduction These instructions are for Windows and MAC users ONLY. For Mobile devices (IOS/Android), use the Mobile Device document found on the portal Login Page. For Windows 8.x users: At this time,

More information

External Supplier/Partner/Customer Login Instructions via myngc Portal

External Supplier/Partner/Customer Login Instructions via myngc Portal External Supplier/Partner/Customer Login Instructions via myngc Portal https://www.myngc.com Purpose The purpose of this document is to provide the Northrop Grumman Corporation (NGC) external suppliers,

More information

Virtual Private Network (VPN)

Virtual Private Network (VPN) Virtual Private Network (VPN) Windows 7 March 2014 VPN provides users with access to the HQ private network, and the Internet using TCP/IP. Additionally, users will have access to: File servers Internal

More information

SSL VPN Setup for Windows

SSL VPN Setup for Windows SSL VPN Setup for Windows SSL VPN allows you to connect from off campus to access campus resources such as Outlook email client, file sharing and remote desktop. These instructions will guide you through

More information

VMware Virtual Desktop Manager User Authentication Guide

VMware Virtual Desktop Manager User Authentication Guide Technical Note VMware Virtual Desktop Manager User Authentication Guide VMware Virtual Desktop Manager The purpose of this guide is to provide details of user authentication in VMware Virtual Desktop Manager

More information

Security Cooperation Information Portal

Security Cooperation Information Portal September 2015 https://www.scportal.us/ Contents Website... 3 Home... 3 Registration Info... 3 User Agreement... 4 SCIP Logon... 4 Digital Certificate with Name CAC or PKI users... 4 Token Users... 4 Warning

More information

CONNECT-TO-CHOP USER GUIDE

CONNECT-TO-CHOP USER GUIDE CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...

More information

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac?

How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? How do I Install and Configure MS Remote Desktop for the Haas Terminal Server on my Mac? In order to connect remotely to a PC computer from your Mac, we recommend the MS Remote Desktop for Mac client.

More information

Dial-up Installation for CWOPA Users (Windows Operating System)

Dial-up Installation for CWOPA Users (Windows Operating System) Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions

More information

XenApp/Citrix Program Neighborhood Installation

XenApp/Citrix Program Neighborhood Installation 1. Download the XenApp Plugin (Citrix Presentation Server) Client Package Version 11.0 for Hosted Apps. Click on this LINK to obtain it. Once prompted, click RUN 2. 3. Save the file to your desktop. Once

More information

OpenClinica SSL VPN Access New User Setup Guide

OpenClinica SSL VPN Access New User Setup Guide OpenClinica SSL VPN Access New User Setup Guide Version 1.2 9/10/2014 New User Remote Access Request for OpenClinica Business Partners need authentication credentials, which include the username, password,

More information

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal

More information

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems

SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems SSH Secure Client (Telnet & SFTP) Installing & Using SSH Secure Shell for Windows Operation Systems What is SSH?: SSH is an application that protects the TCP/IP connections between two computers. The software

More information

RSA SecurID TOKEN User Guide for Initial Setup and Use Secure Access to Andes Petroleum E-mail from Internet

RSA SecurID TOKEN User Guide for Initial Setup and Use Secure Access to Andes Petroleum E-mail from Internet GLOSSARY RSA SecurID TOKEN User Guide for Initial Setup and Use Secure Access to Andes Petroleum E-mail from Internet This guide applies, if you ve assigned a RSA SecureID TOKEN. For more information or

More information

Rsync-enabled NAS Hardware Compatibility List

Rsync-enabled NAS Hardware Compatibility List WHITEPAPER BackupAssist Version 5.1 www.backupassist.com Cortex I.T. Labs 2001-2008 2 Contents Introduction... 3 Hardware Setup Instructions... 3 QNAP TS-409... 3 Netgear ReadyNas NV+... 5 Drobo rev1...

More information

The initial set up takes a few steps, but then each time you want to connect it is just a two set process.

The initial set up takes a few steps, but then each time you want to connect it is just a two set process. Remote Access to your Desktop using VPN Overview VPN is a tool that enables you to access one computer from another. Typical uses for Pop Center members would be 1) access their pop center computer from

More information

MRU Secure Remote Access Service (SRAS) External User Guide

MRU Secure Remote Access Service (SRAS) External User Guide MRU Secure Remote Access Service (SRAS) External User Guide The MRU Secure Remote Access Service (SRAS) allows MRU approved vendor and external clients restricted remote access to MRU internal computing

More information

PISA 2015 MS Online School Questionnaire: User s Manual

PISA 2015 MS Online School Questionnaire: User s Manual OECD Programme for International Student Assessment 2015 PISA 2015 MS Online School Questionnaire: User s Manual Doc: CY6_CBA_SCQ_MSPrincipalManual.docx September 2014 Produced by ETS, Core 2 Contractor

More information

This guide provides all of the information necessary to connect to MoFo resources from outside of the office

This guide provides all of the information necessary to connect to MoFo resources from outside of the office REMOTE ACCESS GUIDE INTRODUCTION This guide provides all of the information necessary to connect to MoFo resources from outside of the office Links to topics in this document Connect remotely from your

More information

EURECOM SSL VPN User s guide

EURECOM SSL VPN User s guide EURECOM SSL VPN User s guide Valerie Loisel Pascal Gros V 1.0 October 2009 Table of Contents Introduction... 2 Prerequisite... 2 Login on the VPN... 2 Logout from the VPN... 4 Using the VPN (General overview)...

More information

Installing LearningBay Enterprise Part 2

Installing LearningBay Enterprise Part 2 Installing LearningBay Enterprise Part 2 Support Document Copyright 2012 Axiom. All Rights Reserved. Page 1 Please note that this document is one of three that details the process for installing LearningBay

More information

Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning

Livezilla How to Install on Shared Hosting http://www.jonathanmanning.com By: Jon Manning Livezilla How to Install on Shared Hosting By: Jon Manning This is an easy to follow tutorial on how to install Livezilla 3.2.0.2 live chat program on a linux shared hosting server using cpanel, linux

More information

Lieberman Software. RSA SecurID Ready Implementation Guide. Account Reset Console. Partner Information. Last Modified: March 20 th, 2012

Lieberman Software. RSA SecurID Ready Implementation Guide. Account Reset Console. Partner Information. Last Modified: March 20 th, 2012 RSA SecurID Ready Implementation Guide Last Modified: March 20 th, 2012 Partner Information Product Information Partner Name Web Site Product Name Lieberman Software Corporation www.liebsoft.com Version

More information

OneLogin Integration User Guide

OneLogin Integration User Guide OneLogin Integration User Guide Table of Contents OneLogin Account Setup... 2 Create Account with OneLogin... 2 Setup Application with OneLogin... 2 Setup Required in OneLogin: SSO and AD Connector...

More information

Download and Install the Citrix Receiver for Mac/Linux

Download and Install the Citrix Receiver for Mac/Linux Download and Install the Citrix Receiver for Mac/Linux NOTE: WOW can only be used with Internet Explorer for Windows. To accommodate WOW customers using Mac or Linux computers, a Citrix solution was developed

More information

How to Set Up SSL VPN for Off Campus Access to UC eresources

How to Set Up SSL VPN for Off Campus Access to UC eresources How to Set Up SSL VPN for Off Campus Access to UC eresources Contents How to Set Up SSL VPN for Off Campus Access to UC eresources... 1 Off Campus Access via SSL VPN... 2 SSL VPN (Secure Sockets Layer

More information

TAMUS Terminal Server Setup BPP SQL/Alva

TAMUS Terminal Server Setup BPP SQL/Alva We have a new method of connecting to the databases that does not involve using the Texas A&M campus VPN. The new way of gaining access is via Remote Desktop software to a terminal server running here

More information

How to Reset Your Password for the ONRR Data Warehouse Portal

How to Reset Your Password for the ONRR Data Warehouse Portal How to Reset Your Password for the ONRR Data Warehouse Portal Audience This document is for all those who access the ONRR Data Warehouse Portal by starting at the following website: https://dwportal.mms.gov/.

More information

Stealth OpenVPN and SSH Tunneling Over HTTPS

Stealth OpenVPN and SSH Tunneling Over HTTPS Stealth OpenVPN and SSH Tunneling Over HTTPS Contents Tunneling OpenVPN and SSH via HTTPS for Windows,MAC and Linux... 1 Benefits of HTTPS Tunneling:... 2 Pre-Requisites:... 3 Part A: Step by Step Instructions

More information

Setting up CU@Round On line Account

Setting up CU@Round On line Account Setting up CU@Round On line Account Created Date: October 6, 2009 Purpose: This document is a step by step process on how to set up a member s CU@Round online account. Note: The member will need the following

More information

Self-Service Portal Registering, downloading & activating a soft token

Self-Service Portal Registering, downloading & activating a soft token Self-Service Portal Registering, downloading & activating a soft token Document issue: 3.2 Date of issue: September 2014 Contents Introduction... 3 About two-factor authentication... 3 About egrid authentication...

More information

Remote Access: Citrix Client Setup

Remote Access: Citrix Client Setup Introduction: The following documentation is intended to assist first time or active users with installation of the Citrix ICA connection software required to access the MSVU Remote Access system desktop

More information

Email Instructions. Outlook (Windows) Mail (Mac) Webmail Windows Live Mail iphone 4, 4S, 5, 5c, 5s Samsung Galaxy S4 BlackBerry

Email Instructions. Outlook (Windows) Mail (Mac) Webmail Windows Live Mail iphone 4, 4S, 5, 5c, 5s Samsung Galaxy S4 BlackBerry Email Instructions Outlook (Windows) Mail (Mac) Webmail Windows Live Mail iphone 4, 4S, 5, 5c, 5s Samsung Galaxy S4 BlackBerry ii Table of Contents Table of Contents 1 Mail Account Settings 1 Account Set

More information

Connecting to LRDC Fileserver Remotely Using Windows Vista/7 & SRemote VPN

Connecting to LRDC Fileserver Remotely Using Windows Vista/7 & SRemote VPN Connecting to LRDC Fileserver Remotely Using Windows Vista/7 & SRemote VPN October 2013 In order to access the LRDC file server remotely/off campus, or from Wireless Pittnet, you must first authenticate

More information

Portal Instructions for Mac

Portal Instructions for Mac Portal Instructions for Mac Table of Contents Introduction... 1 Preparing Safari... 2 Advanced Access Instructions... 3 Installing Java... 3 Setting the Default Browser... 3 Installing the Browser Plug-in...

More information

1. Download VPN client software for Macintosh (Note: You must be connected to the campus network to perform this step.)

1. Download VPN client software for Macintosh (Note: You must be connected to the campus network to perform this step.) North Carolina Agricultural and Technical State University Division of Information Technology (DoIT) VPN Client Installation & Configuration Guide for Macintosh Note: A VPN is a secure method for employees

More information

Tera Term Telnet. Introduction

Tera Term Telnet. Introduction Tera Term Telnet Introduction Starting Telnet Tera Term is a terminal emulation program that enables you to log in to a remote computer, provided you have a registered account on that machine. To start

More information

Instructions for accessing the new TU wireless Network

Instructions for accessing the new TU wireless Network Instructions for accessing the new TU wireless Network These instructions are meant for University owned systems directly supported by ENS Computer Services. Users of other systems may find this document

More information

Connecting to Delta College Exchange services off-campus

Connecting to Delta College Exchange services off-campus Connecting to Delta College Exchange services off-campus The following instructions are provided to document the client configuration used to connect to Microsoft Exchange services at Delta College from

More information

E-Mail: SupportCenter@uhcl.edu Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct

E-Mail: SupportCenter@uhcl.edu Phone: 281-283-2828 Fax: 281-283-2969 Box: 230 http://www.uhcl.edu/uct A VPN (Virtual Private Network) provides a secure, encrypted tunnel from your computer to UHCL's network when off campus. UHCL offers VPN software to allow authenticated, secure access to many UHCL resources

More information

Setting Up and Accessing VPN

Setting Up and Accessing VPN Setting Up and Accessing VPN Instructions for establishing remote access to the URMC network for PC or Mac Duo Two-Factor Authentication If you have already enrolled and setup Duo Two-Factor Authentication

More information

How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P)

How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P) How to integrate RSA ACE Server SecurID Authentication with Juniper Networks Secure Access SSL VPN (SA) with Single Node or Cluster (A/A or A/P) Scenario # 1: Single Node or Standalone SA... 2 Scenario

More information

Configuring a Windows 2003 Server for IAS

Configuring a Windows 2003 Server for IAS Configuring a Windows 2003 Server for IAS When setting up a Windows 2003 server to function as an IAS server for our demo environment we will need the server to serve several functions. First of all we

More information

Setting Up VNC, SSH Tunnels, and RDP

Setting Up VNC, SSH Tunnels, and RDP Setting Up VNC, SSH Tunnels, and RDP Thomas Pepler April 25, 2016 If you have suggestions for improving this document, please email them to: tpepler@doe.carleton.ca Contents 1 Connecting to DOE Linux Machines

More information

Yale Software Library http://www.yale.edu/software/

Yale Software Library http://www.yale.edu/software/ e/ Yale Software Library http://www.yale.edu/software/ For assistance contact the ITS Help Desk 785-3200, 432-9000, helpdesk@yale.edu Remote Desktop General overview With Remote Desktop, you get full access

More information