Two-Factor Authentication Service (TFAS) First-Time User Guide. Version 4.2

Size: px
Start display at page:

Download "Two-Factor Authentication Service (TFAS) First-Time User Guide. Version 4.2"

Transcription

1 Two-Factor Authentication Service (TFAS) Version 4.2 Revised: July 13, 2015

2 Table of Contents PREFACE...1 Purpose...1 Need Help?...1 QUICK REFERENCE INSTRUCTIONS...2 APPENDIX A - STEP 1: TOKEN ACQUISITION DETAILED INSTRUCTIONS...3 APPENDIX B WINDOWS TOKEN DETAILED INSTRUCTIONS...4 APPENDIX C MAC OS TOKEN DETAILED INSTRUCTIONS...6 APPENDIX D - APPLE IOS TOKEN DETAILED INSTRUCTIONS...9 APPENDIX E BLACKBERRY TOKEN DETAILED INSTRUCTIONS APPENDIX F ANDROID TOKEN DETAILED INSTRUCTIONS APPENDIX G SMARTPHONE TOKEN DETAILED INSTRUCTIONS APPENDIX H- STEP 2: TOKEN REGISTRATION DETAILED INSTRUCTIONS Prerequisite...15 APPENDIX I REGISTER A SECOND TOKEN Prerequisites...18 APPENDIX J SECURITY CODES What You Need to Know About Security Codes...20 Soft Token for Mobile and Des ktop...20 Hard Token*...20 APPENDIX K MODIFYING YOUR PHONE NUMBER IN OUTLOOK APPENDIX L- STEP 3: TOKEN VERIFICATION... 23

3 Preface Tw o-factor Authentication Service Purpose This document provides instruction to acquire and register a token for use with Allstate s Two-Factor Authentication Service. Allstate s Two-Factor Authentication Service security process requires a user to provide two (2) forms of identification when accessing the Allstate network remotely your Allstate ID/password and a six-digit security code. Only one token is required per person; once the token is registered, you can use that same token when logging in from any device. We recommend installing the token on a device that is easily accessible when you are connecting from any device. This is a three-step process: Step 1: Download the VIP Access token application. Step 2: Register the token and associate it with your Allstate ID. Step 3: Validate your registered token. ipad/android tablet users only: Additional step is required to reconfigure Citrix Receiver. Need Help? Please refer to the Frequently Asked Questions (FAQs) to learn more about the Two-Factor process and troubleshooting information. You can also visit the MyATSC self-service site or contact the ATSC at PROPRIETARY Page 1

4 Quick Reference Instructions Tw o-factor Authentication Service TYPICAL USE CASE CHECKLIST (Detailed instructions can be found in the user guide) Step 1: TOKEN ACQUISITION Download the VIP Access token application to your device Recommended: Install the VIP Access token application on a handheld mobile device (e.g., mobile phone, tablet) o THIS IS THE MOST SECURE, PREFERRED METHOD OF USING A TOKEN To install the VIP Access token application on an Allstate-issued laptop, you must request a softw are drop v ia the Allstate Serv ice Catalog ios (iphone or ipad): Go to App Store In Search tab ty pe vip access Select VIP Access application Click GET and INSTALL Open VIP Access for iphone If y ou receiv e a message about Push Notifications, click Don t Allow Proceed to Step 2 Android Device Go to Android Marketplace In Search ty pe vip access Select VIP Access Click Install Click OK to confirm install Go to main menu and open VIP Access On Welcome screen click OK Proceed to Step 2 Windows (non-allstate-issued laptop or desktop): Visit Click Get VIP Access Desktop In VIP Access Desktop box, click Get VIP Access Desktop Click Download for Windows Follow instructions to install Proceed to Step 2 Mac (laptop or desktop): Visit Click Get VIP Access Desktop In VIP Access Desktop box, click Get VIP Access Desktop Click Download for Mac Follow instructions to install Proceed to Step 2 If the above devices or Blackberry and other Smartphone devices are not viable options for you, order a hard token through your B2B administrator; there is an associated cost and delivery time. Step 2: TOKEN REGISTRATION Associate the token with your Allstate ID o Check y our listing in the Allstate Address Book Update page to ensure y our mobile or office phone is listed and includes the prefix 1 If OK, click red X in top right to ex it. Or, make required changes and click Submit. Changes w ill take effect in one hour; check the Allstate Address Book Update page to v erify updates prior to proceeding. If y ou can t add a number, contact the ATSC for registration help. o Visit Enter Allstate ID and password (For Window s admin users this could be the account that ends w ith a) o Obtain temporary security code by SMS (tex t) or voice call (office phone) o Enter temporary security code from tex t or v oice call in Confirm Your Identity box o Click Sign In On Select Your Credential page, click Register Enter Credential Name o Enter Credential ID from dow nloaded VIP Access token application in step 1 o Enter Security Code from token application Click Submit Click Sign out Step 3: TOKEN VALIDATION Validate your registered token Use the security code from the dow nloaded token; if the security code is accepted, y ou hav e v alidated that the token is associated successfully to y our profile and ready to use. o Visit Enter Allstate ID and password o Open VIP Access token application on y our dev ice o Enter the six -digit Security Code from the dow nloaded VIP Access token app o Click Continue Progress to Manage Your Credentials page At top left of screen y ou should see You have successfully signed in o Click Sign Out ******* *** ******** *** ipad/android Tablet Users You must dow nload and configure the Citrix Receiv er; this w ill ensure y ou are prompted to enter ID, passw ord and security code w hen logging in. Instructions are prov ided in TFAS Citrix User Guide.pdf Congratulations! You successfully completed token installation, registration and v alidation; y ou can use y our token w hen prompted. PROPRIETARY Page 2

5 Appendix A - Step 1: Token Acquisition Detailed Instructions VIP Access Soft Token Application (Download and Installation) Software tokens can be installed on a wide variety of personal computers or mobile devices for use with Allstate s Two-Factor Authentication Service (TFAS). For instructions on how to acquire and install the software token, select your corresponding device from the list below. - Windows PC* (Appendix B) - Mac (Appendix C) - Apple ios, iphone/ipad (Appendix D) - Blackberry (Appendix E) - Android (Appendix F) - Smartphones (Appendix G) *Note: It is not required but recommended that you install the token on a mobile device for easy access and added security. If you need to install the token on an Allstate-issued device, you must request a software drop. Alternatively, you can connect to to download and install the VIP Access software to your device. The estimated time to complete this step is 15 minutes. Time may vary based on the speed of your Internet connection. Soft tokens have no cost associated to the user or business unit Helpful Hint: Visit to view a list of all supported devices. Hard Token If the soft token options are not viable for your environment, you must order a hard token. Your B2B coordinator must submit an order via the B2B system. There is a one-time charge of $9.50 each for hard tokens. To find hard tokens in the B2B system, the requester selects: Allstate Catalog, and Sayers, (the supplier) then searches for the word Token. There are two options for hardware tokens: models HV08 and HAI08. Both are the same price. HAI08 is waterproof; HV08 is not. Otherwise they are the same. Note: Only one token is required per person. Once the token is registered, you can use that same token when logging in from any device. We recommend installing the token on a device that is easily accessible when you are connecting from any personal or Allstate-owned device. PROPRIETARY Page 3

6 Appendix B Windows Token Detailed Instructions Follow these instructions if you w ant to install your token on a personally ow ned PC running a Window s Operating System System Requirements: Internet Explorer 7, 8, or 9, or Firefox 3, 5, 6, 7, or 8 Window s 7 SP1 or XP Professional SP3 (32-bit only) You must have administrative permission on your personal computer to install the VIP Access Desktop. 1. On your personal computer, open Internet Explorer or a different browser. 2. In the address field, highlight the existing address. 3. With the address highlighted, type 4. Press Enter. The VeriSign ID Protection Center Web page opens. 5. Click Get VIP Access Desktop. The VIP Access Desktop Download screen appears. 6. Click Dow nload VIP Access Desktop. The Download and Install VIP Access Desktop screen appears. 7. You w ill receive a message to Save or Run the Setup File, click Run. A Welcome to the VIP Access Setup Wizard screen appears w hen the dow nload is complete. 8. Click Next. The License Agreement screen appears. PROPRIETARY Page 4

7 9. Click the radio button for I accept the terms in the license agreement. 10. Click Next. A Select Install Location screen appears. Note: Do NOT change the default folder location. 11. Click Next. The Ready to Install the Program screen appears. 12. To start the installation process, click Install. A Please wait installation bar appears on your screen. The installation process may take a few minutes to complete. An InstallShield Wizard Completed screen appears after the installation process is completed. 13. Click Finish. A VIP Access menu is created in your Start Menu. 14. To close this screen, in the upper right side of the screen click X. 15. To open the VIP Access application, click Start. Token Example 16. Click on the VIP Access icon. The application opens w ith your token s Credential ID and Security Code information. 17. Close the VIP Access program and proceed to: Appendix H - Step 2: Token Registration Detailed Instructions. Credential ID (Unique token identifier) Security Code (Changes every 30 seconds) PROPRIETARY Page 5

8 Appendix C Mac OS Token Detailed Instructions Tw o-factor Authentication Service Follow these instructions if you w ant to install your token on a Mac Operating System System Requirements: Mac OS X 10.5 or higher 1. On your Mac computer, open Safari or a different browser. 2. In the Address field, highlight the existing address. 3. With the address highlighted, type: 4. Press Enter. The VeriSign ID Protection Center Web page opens. 5. Click Get VIP Access Desktop. The VIP Access Desktop Download screen appears. 6. Click Dow nload for Mac. The Dow nload and Install VIP Access Desktop screen appears. You w ill receive a message to Save. 7. Click the VIP_Access.dmg file. The VIP Access file opens w ith the VIP Access icon displayed. PROPRIETARY Page 6

9 8. Open the VIP Access icon and click Copy VIP Access. 9. Paste the VIP Access application to the Applications folder. 10. To start the installation process, double-click on the VIP Access icon. The VIP Access application download confirmation screen appears. 11. Click Open. The License Agreement screen appears. 12. Click I Accept. The dow nload and installation process begins. 13. After the installation is complete, open the VIP Access application. The application opens w ith your token s Credential ID and Security Code information. VIP Access Token Application Example Credential ID (Unique token identifier) Security Code (Changes every 30 seconds) PROPRIETARY Page 7

10 14. From your desktop, click the VIP Access file. 15. Click Eject the VIP Access drive on your desktop. 16. Close the VIP Access screen and proceed to: Appendix H - Step 2: Token Registration Detailed Instructions PROPRIETARY Page 8

11 Appendix D - Apple ios Token Detailed Instructions Follow these instructions if you w ant to install your token on an ios device iphone, ipod, ipad You can choose one of these options: Dow nload from the Apple App Store by searching the Business category for VIP Access Dow nload from itunes and sync your iphone or ipod touch Visit from your iphone/ipod 1. On your ios device (iphone, ipod, or ipad), go to the App Store. Note: In this demonstration w e are using the iphone and App Store. 2. From the App Store select Categories. 3. In the Search field, type vip access. 4. From your search results select one of the follow ing: For iphone - VIP Access for iphone For ipod users - VIP Access For ipad users select VIP Access for ipad 5. To install the VIP Access application, click Install. 6. Type your Apple ID Passw ord and click OK. Note: The VIP Access application is free. A Loading icon w ill appear on the screen to indicate the dow nload process. PROPRIETARY Page 9

12 7. After the installation is complete, open the VIP Access application. 8. Click Launch VIP Access. The application opens w ith your token s Credential ID and Security Code information. VIP Access Token Application Example 9. Close the VIP Access screen and proceed to Appendix H - Step 2: Token Registration Detailed Instructions. Credential ID (Unique token identifier) Security Code (Changes every 30 seconds) After the token is downloaded and registered, users who want to connect remotely to SVD/DVD/ERD from an ipad tablet will need to setup the Citrix Receiver Application. Refer to the following document: Citrix User Guide.pdf PROPRIETARY Page 10

13 Appendix E Blackberry Token Detailed Instructions Follow these instructions if you w ant to install your token on a Blackberry *Please visit to view a list of all supported phones. 1. On your Blackberry, go to m.vip.symantec.com. The VeriSign ID Protection Mobile Center Web page opens. 2. Below the message Get VIP access to help protect your online accounts, click Dow nload Now and follow the process for your Blackberry. Sample screen 3. Confirm your dow nload, click Dow nload. 4. After the dow nload is complete, click Install. After the installation process is complete, The application was successfully installed message appears. 5. Click Run. 6. To open the VIP Access application, open Menu (looks similar to ) and click OK. VIP Access Token Application Example The application opens w ith your token s Credential ID and Security Code information. Credential ID (Unique token identifier) 7. Close the VIP Access screen and proceed to: Appendix H - Step 2: Token Registration Detailed Instructions. Security Code (Changes every 30 seconds) PROPRIETARY Page 11

14 Appendix F Android Token Detailed Instructions Tw o-factor Authentication Service Follow these instructions if you w ant to install your token on an Android device You can choose one of these options: Dow nload from the Android Market by searching for VIP Access Visit from your Android phone. 1. On your Android phone, go to m.vip.symantec.com. The VeriSign ID Protection Mobile Center Web page opens. 2. Below the message Get VIP access from the App Store, click Dow nload Now and follow the installation process for your Android. Sample screen You w ill be transferred to the Android Marketplace. 3. In the Search field, type vip access, if necessary. 4. Click VIP Access. 5. On the VIP Access Description screen, click Install. PROPRIETARY Page 12

15 6. Confirm the installation, click OK. 7. After the installation is complete, go to the Main Menu and open VIP Access. 8. On the Welcome to VIP Access screen, click OK. 9. Open the VIP Access application. The token s Credential ID and Security Code information appear on the screen. VIP Access Token Application Example 10. Close the VIP Access menu screen and proceed to Appendix H - Step 2: Token Registration Detailed Instructions. Credential ID (Unique token identifier) Security Code (Changes every 30 seconds) After the Token is dow nloaded and registered, users w ho w ant to connect remotely to SVD/DVD/ERD from an Android device w ill need to setup the Citrix Receiver Application. Refer to the follow ing document: Citrix User Guide.pdf PROPRIETARY Page 13

16 Appendix G Smartphone Token Detailed Instructions Follow these instructions if you w ant to install your token on a Smartphone* device other than those above *Please visit to view a list of all supported phones. 1. On your Smartphone, go to m.vip.symantec.com. The VeriSign ID Protection Mobile Center Web page opens. 2. Below the message Get VIP Access from the App Store, select Dow nload Now and follow the installation process for your Smartphone. Sample screen 3. After the installation is complete, open the VIP Access application. The application opens w ith your token s Credential ID and Security Code information. VIP Access Token Application Example 4. Close the VIP Access screen and proceed to: Appendix H - Step 2: Token Registration Detailed Instructions. Credential ID (Unique token identifier) Security Code (Changes every 30 seconds) PROPRIETARY Page 14

17 Appendix H- Step 2: Token Registration Detailed Instructions After completing Step 1: Token Acquisition, you will need to register your token. The registration process will take approximately five minutes. Prerequisite During this step you will be sent a temporary, one-time code to validate your identity prior to registration. You will be asked to choose a method to receive the code; either by text message or at your Allstate office phone. To receive your temporary code by office phone (Voice Call) or SMS (Text Message) your office phone and mobile phone must be listed in Allstate s Outlook Address Book with a 1 preceding it. Example: 1(847) Check your listing in the Allstate Address Book Update page to ensure your mobile or office phone is listed and includes the prefix 1 If OK, click red X in top right to exit. Or, make required changes and click Submit. Changes typically take effect in 15 minutes; check the Allstate Address Book Update page to verify updates have occurred prior to proceeding. Detailed instructions can also be found in Appendix K Modifying your Phone number in the Address Book. If you wish to receive your temporary security code by voice call, you must be available to answer the office phone number listed in Allstate s Outlook Global Address Book, as the call is interactive. Users with no desk phone or mobile phone registered in Allstate s Outlook Address Book will need to contact the ATSC for registration help. 1. From your Allstate desktop, home PC, or personal device, open Internet Explorer or a different browser. Note: Internet Explorer is used in this example. 2. In the address field, highlight the existing address 3. With the address highlighted, type Press Enter. The VeriSign ID Protection Self Service Portal Web page opens. 5. Enter your Window s NT ID and Passw ord 6. Click Sign In. A Complete Your Sign-in screen appears. PROPRIETARY Page 15

18 7. Click the radio button next to the method you prefer to receive a temporary security code. Reminder: If you w ish to receive the temporary code via SMS, you must have your mobile phone number listed in Allstate s Outlook Address Book. If you prefer to receive a Voice Call, you must be at the phone number listed in the address book as the call is interactive. U.S. phone number should begin with prefix 1 8. Click Continue. The Enter Your Temporary Security Code screen appears. Note: You can expect to receive your temporary security code via text message or phone w ithin a few minutes. 9. In the Security Code field, enter your six-digit temporary security code. 10. Click Sign In. A Welcome to Validation & ID Protection (VIP) Self Service screen appears. 11. Click Register. PROPRIETARY Page 16

19 12. In the Credential Name field, enter a name for your credential (e.g., Tom s iphone) 13. In the Credential ID field, enter the Credential ID number found on the VIP Access token application you dow nloaded to your device in step 1 token acquisition. You must open this application on your device to view the Credential ID. Ex ample: You must insert your own information Security Code example 14. In the Security Code field, type the security code displayed on your token. Reminder: The security code changes every 30 seconds. Type the new code number should you miss entering the code show n in the allotted time. 15. Click Submit. A Manage Your Credentials screen appears. 16. Click Sign Out, located in the upper right side of the screen. The Welcome to VeriSign Identity Protection (VIP) Self Service Portal screen reappears. 17. To close this program, click the Red X in the upper right side of your screen. Note: Only one token is required per person. Once the token is registered, you can use that same token when logging in from any device. We recommend installing the token on a device which is easily accessible when you are connecting from any personal or Allstate-owned device. PROPRIETARY Page 17

20 Appendix I Register a Second Token Tw o-factor Authentication Service For personal convenience, you may want to register a second token on a separate device. This situation is not typical for most users. These instructions will guide you through registering a second token. Remember, only one token is required per person. Once the token is registered, you can use that same token when logging in from any personal device. We recommend installing the token on a device which is easily accessible when you are connecting from any personal device. Prerequisites You will need to acquire a second token prior to completing this step (see Step 1: Token Acquisition). The following registration process will take approximately five minutes. In addition, be ready to receive your temporary security code by SMS (text message) or voice call. 1. From your Allstate desktop, home PC, or personal device, open Internet Explorer or a different browser. Note: Internet Explorer is used in this example. 2. In the Address field, highlight the existing address. 3. With the address highlighted, type 4. Press Enter. The VeriSign ID Protection Self Service Portal Web page opens. 5. Enter your Window s NT ID and Passw ord. 6. Click Sign In. A Complete Your Sign-in screen appears. The screen displays credential information on the token already registered. 7. In the Security Code field, type the security code displayed on the first token you previously dow nloaded to your device and registered. Note: For soft tokens - the security code changes every 30 seconds. If you have less than 10 seconds on the clock remaining, it is recommended to w ait and enter the next security code to display on the token. For hard tokens - the security code is generated every time you push the button. 8. Click Continue. The Manage Your Credentials screen appears. PROPRIETARY Page 18

21 9. On the right of your screen, under Register another credential, click Register. 10. In the Credential Name field, enter a name for your credential (e.g., Tom s iphone ). 11. In the Credential ID field, enter the Credential ID number found on your second token. Example: You must insert your own information 12. In the Security Code field, type the security code displayed on your second token. Example: You must insert a code generated from your token Reminder: The security code changes every 30 seconds. Type the new code number should you miss entering the code show n in the allocated time. 13. Click Submit. The Manage Your Credentials screen reappears. 14. Click Sign Out, located in the upper right side of the screen. The Welcome to VeriSign Identity Protection (VIP) Self Service Portal screen reappears. 15. To close this program, click the Red X in the upper right side of your screen. PROPRIETARY Page 19

22 Appendix J Security Codes Tw o-factor Authentication Service What You Need to Know About Security Codes When accessing the network remotely, you will need to enter a six-digit security code number, randomly generated by your token, each time you login to the network. You have 30 seconds to enter the security code displayed on your token before the number changes. Should you miss entering the code within the allotted time, enter the new security code number that displays on the screen. A new security code is generated every 30 seconds for soft tokens and a new security code is generated each time you press the button on the token for hard tokens. Soft Token for Mobile and Desktop Launch the VIP Access software (soft token) from your Smartphone or personal computer to see both your Credential ID and a six-digit security code. VIP Access Token Application Examples Hard Token* Press the button once on the token to generate your six-digit security code. Model HV08* PROPRIETARY Page 20

23 Model HAI08* Both hard token models work the same way. Model HAI08 is waterproof; model HV08 is not. Otherwise, there is no difference; both cost the same amount ($9.50) and can be used with TFAS. PROPRIETARY Page 21

24 Appendix K Modifying Your Phone Number in Outlook Important Note: U.S. phone numbers need to start w ith the prefix 1 to receive a temporary code through a voice call or SMS. International users could update their mobile phone numbers in Allstate s Outlook Global Address Book to get temporary codes via SMS messages. Phone number formats should be Country code + Phone number. India Country code: 91 UK Country code: 44 If you are an international user and need help, call ATSC for enrollment. 1. Connect to the Allstate Intranet and open Internet Explorer. 2. In the Address bar type 3. Press Enter. 4. In the Phone and Mobile fields, verify that the number 1 is listed in front of the phone numbers. If not, add a 1 and click Submit Changes. 5. You w ill receive an update message. Note that your changes generally take effect after 15 minutes. Return to the Address Book Update site after 15 minutes to verify that your changes have taken effect. Your changes have been submitted successfully. Please check your account in the Global Address Book tomorrow to verify the information appears correctly. PROPRIETARY Page 22

25 Appendix L- Step 3: Token Verification Tw o-factor Authentication Service After completing Step 2: Token Registration, Step 3 helps you verify that the token works. 1. From your Allstate desktop, home PC, or personal device, open Internet Explorer or a different browser. Note: Internet Explorer is used in this example. 2. In the address field, highlight the existing address. 3. With the address highlighted, type 4. Press Enter. The VeriSign ID Protection Self Service Portal Web page opens. 5. Enter your Allstate ID and Passw ord. 6. Click Sign In. A Complete Your Sign-in screen appears. 7. The screen displays credential information on the token already registered. If users have multiple Credential IDs they should select the specific Credential ID that they w ould like to validate. 8. Open the VIP Access application that w as installed in Step 1. PROPRIETARY Page 23

26 9. In the Security Code field, type the security code displayed on the token. Note: For soft tokens - the security code changes every 30 seconds. If you have less than 10 seconds on the clock remaining, it is recommended to w ait and enter the next security code that w ill display on the token. For hard tokens - the security code is generated each time you push the button. 10. Click Continue. The Manage Your Credentials screen appears 11. A message should be displayed: You have Successfully signed in 12. Click Sign Out, located in the upper right side of the screen. The Welcome to VeriSign Identity Protection (VIP) Self Service Portal screen reappears. 13. To close this program, click the Red X in the upper right side of your screen. 14. The token registration process is complete. You re ready to start using the Tw o-factor Authentication Service Note: Only one token is required per person. Once the token is registered, you can use that same token when logging in on any device. We recommend installing the token on a device that is easily accessible when you are connecting from any personal or Allstate-owned device. PROPRIETARY Page 24

Setting Up and Accessing VPN

Setting Up and Accessing VPN Setting Up and Accessing VPN Instructions for establishing remote access to the URMC network for PC or Mac Duo Two-Factor Authentication If you have already enrolled and setup Duo Two-Factor Authentication

More information

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access

Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access Two-Factor Authentication (2FA) Registration Instructions Symantec VIP Access To strengthen KBR information security and safeguard company data, Information Technology will implement two-factor authentication

More information

Remote Desktop Services

Remote Desktop Services Remote Desktop Services AMERICAN INSTITUTES FOR RESEARCH AIR REMOTE DESKTOP SERVICES (RDS) GUIDE Overview Welcome to AIR Remote Desktop Services! AIR Remote Desktop Services can be accessed from a Windows

More information

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client

SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client SHC Client Remote Access User Guide for Citrix & F5 VPN Edge Client Version 1.1 1/15/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a required

More information

Remote Access End User Reference Guide for SHC Portal Access

Remote Access End User Reference Guide for SHC Portal Access Remote Access End User Reference Guide for SHC Portal Access Version 2.0 6/7/2012 This remote access end user reference guide provides an overview of how to install Citrix receiver, which is a required

More information

Mobile Iron User Guide

Mobile Iron User Guide 2015 Mobile Iron User Guide Information technology Sparrow Health System 9/1/2015 Contents...0 Introduction...2 Changes to your Mobile Device...2 Self Service Portal...3 Registering your new device...4

More information

Citrix Remote Access Portal U s e r M a n u a l

Citrix Remote Access Portal U s e r M a n u a l Citrix Remote Access Portal U s e r M a n u a l 1 P a g e Table of Contents Table of Contents... 2 Introduction... 3 1. What is Citrix and how does it work?... 4 2. PC Setup/Internet Explorer - Connecting

More information

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix

ATTENTION: End users should take note that Main Line Health has not verified within a Citrix Subject: Citrix Remote Access using PhoneFactor Authentication ATTENTION: End users should take note that Main Line Health has not verified within a Citrix environment the image quality of clinical cal

More information

How To Use A Citrix Netscaler Thin Client V1.09.10.1 (Windows) With A Citirix Vpn Desktop (Windows 10) With An Ipad Or Ipad (Windows 8) With Vpn

How To Use A Citrix Netscaler Thin Client V1.09.10.1 (Windows) With A Citirix Vpn Desktop (Windows 10) With An Ipad Or Ipad (Windows 8) With Vpn Our Mission Statement To ensure that we are providing quality and efficient services and solutions that are consistent with the strategic goals of the Area, and that are closely aligned with the State's

More information

Spectrum Health Virtual Desktop (VDI) (available only to select users at this time)

Spectrum Health Virtual Desktop (VDI) (available only to select users at this time) This page allows access to several Spectrum Health password protected areas. If you have any issues using these services, please contact the Spectrum Health Help Desk at 616.391.1361. Additional Security

More information

Remote Access Enhancements

Remote Access Enhancements Remote Access Enhancements Citrix/Epic Set-up Instructions Provided By: Akron Children s IT Department Date: 7/11/2012 Version: v6 2012 Children s Hospital Medical Center of Akron Table of Contents 1.

More information

Install and End User Reference Guide for Direct Access to Citrix Applications

Install and End User Reference Guide for Direct Access to Citrix Applications Install and End User Reference Guide for Direct Access to Citrix Applications Version 1.0 7/26/2013 This remote access end user reference guide provides an overview of how to install Citrix receiver (a

More information

Getting Started. with VitalSource Bookshelf. How to Access your ebooks Using VitalSource Bookshelf

Getting Started. with VitalSource Bookshelf. How to Access your ebooks Using VitalSource Bookshelf Getting Started with VitalSource Bookshelf How to Access your ebooks Using VitalSource Bookshelf Table of Contents Step 1: Accessing VitalSource Bookshelf Online... 1 Step 2: Configuring Your Account for

More information

Two-Factor Authentication User FAQ s

Two-Factor Authentication User FAQ s Two-Factor Authentication User FAQ s What is Two-Factor Authentication (2FA)? What does Symantec Validation and ID Protection (VIP) do? I don t have a smartphone, what is my alternative? How many devices

More information

VIRTUAL SOFTWARE LIBRARY REFERENCE GUIDE

VIRTUAL SOFTWARE LIBRARY REFERENCE GUIDE VIRTUAL SOFTWARE LIBRARY REFERENCE GUIDE INTRODUCTION The Virtual Software Library (VSL) provides remote and on-campus access to lab/course software. This approach is intended to simplify access for all

More information

Akin Gump Strauss Hauer & Feld LLP Remote Access Resources

Akin Gump Strauss Hauer & Feld LLP Remote Access Resources Akin Gump Strauss Hauer & Feld LLP Remote Access Resources Firm Laptop Windows Home PC Mac Computer Apple ipad Android Devices Exit akingump.com 2013 Akin Gump Strauss Hauer & Feld LLP Checkpoint VPN (Firm

More information

Portal Instructions for Mac

Portal Instructions for Mac Portal Instructions for Mac Table of Contents Introduction... 1 Preparing Safari... 2 Advanced Access Instructions... 3 Installing Java... 3 Setting the Default Browser... 3 Installing the Browser Plug-in...

More information

Quick User Guide. The KLZ Home Page www.klz.org.uk

Quick User Guide. The KLZ Home Page www.klz.org.uk Revised June 2014 Secure Online Communication Zone Quick User Guide This quick user guide provides the basic information that is needed for users to get the best experience from using KLZ. It explains

More information

Akin Gump Strauss Hauer & Feld LLP Remote Access Resources (DUO)

Akin Gump Strauss Hauer & Feld LLP Remote Access Resources (DUO) Akin Gump Strauss Hauer & Feld LLP Remote Access Resources (DUO) Firm Laptop Windows Home PC Mac Computer Apple ipad Android Devices Exit akingump.com 2015 Akin Gump Strauss Hauer & Feld LLP Check Point

More information

Instructions for installing Citrix Receiver

Instructions for installing Citrix Receiver Instructions for installing Citrix Receiver Remote Access End User Reference Guide for Access to SJLinked Version 1.0 4/21/2014 Contents Introduction... 2 Installing Citrix Receiver for Windows... 3 Before

More information

BT Lancashire Services

BT Lancashire Services In confidence BT Lancashire Services Remote Access to Corporate Desktop (RACD) Getting Started Guide Working in partnership Confidentiality Statement BT Lancashire Services Certain information given to

More information

How to install and use the File Sharing Outlook Plugin

How to install and use the File Sharing Outlook Plugin How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.

More information

Self Service Portal and 2FA User Guide

Self Service Portal and 2FA User Guide Self Service Portal and 2FA User Guide Accessing Symantec Self Service Portal Self Service Portal (SSP) is a web-based application which you can use to register, test, reset, or remove Symantec VIP credentials.

More information

Department of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015

Department of Veterans Affairs Two-Factor Authentication MobilePASS Quick Start Guide November 18, 2015 Department of Veterans Affairs Two-Factor Authentication Quick Start Guide November 18, 2015 Introduction: This guide provides instructions for installation of the soft token on your non-piv enabled or

More information

PARK UNIVERSITY. Information Technology Services. VDI In-A-Box Virtual Desktop. Version 1.1

PARK UNIVERSITY. Information Technology Services. VDI In-A-Box Virtual Desktop. Version 1.1 PARK UNIVERSITY Information Technology Services VDI In-A-Box Virtual Desktop Version 1.1 I N F O R M A T I O N T E C H N O L O G Y S E R V I C E S VIRTUAL DESKTOP USER MANUAL Park University 8700 NW River

More information

Remote Access End User Reference Guide for Access to SJLinked Version 1.0 3/11/2014

Remote Access End User Reference Guide for Access to SJLinked Version 1.0 3/11/2014 Remote Access End User Reference Guide for Access to SJLinked Version 1.0 3/11/2014 Contents Introduction... 2 Installing Citrix Receiver for Windows... 3 Before You Begin... 3 System Requirements... 3

More information

Neehr Perfect Educational EHR STUDENT GUIDE

Neehr Perfect Educational EHR STUDENT GUIDE Neehr Perfect Educational EHR STUDENT GUIDE I. Introduction... 1 II. Quick Facts... 1 III. Creating Your Account... 1 IV. My Account Already Exists... 3 V. Applying Your Subscription... 4 VI. Logging in

More information

Net 2. NetApp Electronic Library. User Guide for Net 2 Client Version 6.0a

Net 2. NetApp Electronic Library. User Guide for Net 2 Client Version 6.0a Net 2 NetApp Electronic Library User Guide for Net 2 Client Version 6.0a Table of Contents 1 INTRODUCTION AND KEY FEATURES... 3 SOME OF THE KEY FEATURES INCLUDE:... 3 INSTALLATION PREREQUISITES:... 3 2

More information

Access the TCNJ Palo Alto Networks VPN using the GlobalProtect VPN client

Access the TCNJ Palo Alto Networks VPN using the GlobalProtect VPN client Access the TCNJ Palo Alto Networks VPN using the GlobalProtect VPN client June 2014 Table of Contents Introduction 1 Determine the Windows Operating System Version 2 Install the GlobalProtect VPN client

More information

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE

WHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE WHAT IS VIRTUAL DESKTOP? Virtual Desktop is an online environment that allows you to access NSF applications and a virtual desktop that mimics a Windows 7 environment. You can use Virtual Desktop to use

More information

Defender 5.7 - Token Deployment System Quick Start Guide

Defender 5.7 - Token Deployment System Quick Start Guide Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register

More information

Instructions for Accessing the Hodges University Virtual Lab

Instructions for Accessing the Hodges University Virtual Lab Instructions for Accessing the Hodges University Virtual Lab Table of Contents Adding the VLAB as a Trusted Site... 3 Accessing the VLAB using Windows 8... 5 Using Internet Explorer and Windows 8 to Access

More information

Instructions to Sign On and Off of Self Service Applications. Internet Explorer 9 (IE9) Users: Turn Off Compatibility View:

Instructions to Sign On and Off of Self Service Applications. Internet Explorer 9 (IE9) Users: Turn Off Compatibility View: Instructions to Sign On and Off of Self Service Applications NOTE: Internet Explorer 7 and 8 are the only supported Browsers for the PeopleSoft Student Self Service applications. If you experience technical

More information

How to Remotely Access the C&CDHB Network from a Personal Device

How to Remotely Access the C&CDHB Network from a Personal Device How to Remotely Access the C&CDHB Network from a Personal Device 13/09/2012 Contents Installing the Citrix Receiver for Windows PCs... 2 Installing the Citrix Receiver for Mac OS X... 6 Installing the

More information

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0

Flexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0 Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of

More information

DUO SECURITY CISCO VPN USER GUIDE 1/27/2016

DUO SECURITY CISCO VPN USER GUIDE 1/27/2016 DUO SECURITY CISCO VPN USER GUIDE 1/27/2016 CONTENTS Enrolling Your Devices... 2 Install Cisco AnyConnect VPN Client... 6 Connecting to a PC with Microsoft Remote Desktop... 8 Disconnecting the AnyConnect

More information

Exchange ActiveSync (EAS)

Exchange ActiveSync (EAS) Exchange ActiveSync (EAS) EAS allows for the synchronization of email, contacts, calendar, tasks and notes from an Exchange email server to a mobile device. Configuring and Connecting ios devices (iphone,

More information

PRACTICE LINK. Getting Started. version 1.0.x. Digita Support: 08450 180 909 Digita Sales: 08450 180 907 digita.com

PRACTICE LINK. Getting Started. version 1.0.x. Digita Support: 08450 180 909 Digita Sales: 08450 180 907 digita.com PRACTICE LINK Getting Started version 1.0.x Digita Support: 08450 180 909 Digita Sales: 08450 180 907 digita.com TL 28615 (11/17/14) Copyright Information Text copyright 2010 2014 by Thomson Reuters. All

More information

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e

Technology Services Group Procedures. IH Anywhere guide. 0 P a g e VDI Pilot Technology Services Group Procedures IH Anywhere guide 0 P a g e Installation Disable Apple Security Table of Contents IH Anywhere for Apple OSX (MAC)... 2 1. Installation... 2 Disable Apple

More information

EMR Link Server Interface Installation

EMR Link Server Interface Installation EMR Link Server Interface Installation Version 1.0 ** INTRODUCTION ** If you would like assistance with installation, please contact our preferred support provider at support@bonecomputer.com, or call

More information

ACCESSING YOUR E-MAIL ON A MOBILE DEVICE

ACCESSING YOUR E-MAIL ON A MOBILE DEVICE ACCESSING YOUR E-MAIL ON A MOBILE DEVICE ACCESSING YOUR E-MAIL ON A MOBILE DEVICE You can access your USC e-mail on the following mobile devices: Android BlackBerry BlackBerry 10 iphone /ipod Touch /ipad

More information

Accessing Citrix on a MAC using OS X (Mountain Lion and Newer)

Accessing Citrix on a MAC using OS X (Mountain Lion and Newer) These instructions are specifically designed for OS X Mountain Lion and Mavericks. Earlier versions of the OS will require a different installation. These instructions assume that there are no Java, Citrix

More information

Apple Mail... 36 Outlook Web Access (OWA)... 38 Logging In... 38 Changing Passwords... 39 Mobile Devices... 40 Blackberry...

Apple Mail... 36 Outlook Web Access (OWA)... 38 Logging In... 38 Changing Passwords... 39 Mobile Devices... 40 Blackberry... Contents Email Accounts... 3 Adding accounts... 3 Account Modifications... 6 Adding Aliases... 7 Primary E-mail Addresses... 10 Mailbox Quotas... 12 Removing accounts... 13 Mail Forwarding and Distribution

More information

Information Technology Services. Your mailbox is moving to the cloud. Here is what to expect.

Information Technology Services. Your mailbox is moving to the cloud. Here is what to expect. Your mailbox is moving to the cloud. Here is what to expect. Table of Contents Information for Outlook Web App users:... 2 Information for Office 2007 and 2010 Professional users:... 2 Information for

More information

Getting Started with VMware Horizon View (Remote Desktop Access)

Getting Started with VMware Horizon View (Remote Desktop Access) Getting Started with VMware Horizon View (Remote Desktop Access) Use The Links Below To Navigate This Document Using VMware Horizon View with Tablet and Smartphone APP or Mobile Web Browser Walk Through

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios with TouchDown GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios with TouchDown 1 Table of

More information

Single Sign-On Portal User Reference (Okta Cloud SSO)

Single Sign-On Portal User Reference (Okta Cloud SSO) Single Sign-On Portal User Reference (Okta Cloud SSO) Contents Okta Single Sign-on Portal... 3 Initial account creation and configuration... 3 First time manual login to the Okta Single Sign-on Portal...

More information

Using Access.Centegra.Com (Physician Access) Secure Remote Access from the Internet

Using Access.Centegra.Com (Physician Access) Secure Remote Access from the Internet System Requirements These are the minimum requirements necessary to ensure the proper operation of Centegra Health System s Access.Centegra.Com. Administrative level access to the PC or other device used

More information

Guide: Using Citrix for Home/ Office

Guide: Using Citrix for Home/ Office Guide: Using Citrix for Home/ Office Contents Important information about disconnecting from Citrix 1 How to access Citrix Site 2 How to install Citrix Receiver for Home/ Personal Device (ipad, android

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices

GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM Device Application User Guide Installation and Configuration for ios Devices GO!Enterprise MDM for ios Devices, Version 3.x GO!Enterprise MDM for ios Devices 1 Table of Contents GO!Enterprise

More information

Self-Service Portal Registering, downloading & activating a soft token

Self-Service Portal Registering, downloading & activating a soft token Self-Service Portal Registering, downloading & activating a soft token Document issue: 3.2 Date of issue: September 2014 Contents Introduction... 3 About two-factor authentication... 3 About egrid authentication...

More information

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Palm Treo Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started with Mechanics

More information

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook

Windows and MAC User Handbook Remote and Secure Connection Version 1.01 09/19/2013. User Handbook Windows and MAC User Handbook How to Connect Your PC or MAC Remotely and Securely to Your U.S. Department of Commerce Account Developed for You by the Office of IT Services (OITS)/IT Service Desk *** For

More information

Windows Installation 1. On a Windows PC (For MAC, skip to next section), at the file download prompt click Run.

Windows Installation 1. On a Windows PC (For MAC, skip to next section), at the file download prompt click Run. Introduction These instructions are for Windows and MAC users ONLY. For Mobile devices (IOS/Android), use the Mobile Device document found on the portal Login Page. For Windows 8.x users: At this time,

More information

Remote Access End User Reference Guide for F5 Edge VPN Client Access

Remote Access End User Reference Guide for F5 Edge VPN Client Access Remote Access End User Reference Guide for F5 Edge VPN Client Access Version 2.1 3/2/2015 This remote access end user reference guide provides an overview of how to download and install the F5 Edge VPN

More information

How to Use Remote Access Using Internet Explorer

How to Use Remote Access Using Internet Explorer Introduction Welcome to the Mount s Remote Access service. The following documentation is intended to assist first time or active users with connecting, authenticating and properly logging out of Remote

More information

Medstar Health Dell Services

Medstar Health Dell Services Medstar Health Dell Services Non Medstar Device Citrix Connectivity Guide October 2012 Sean Kaminski Dell Services System Admin Consultant 1 Table of Contents Overview...3 What is Citrix and why do I need

More information

SSL VPN Support Guide

SSL VPN Support Guide P a g e 1 SSL VPN Support Guide Revision date: 5/4/10 P a g e 2 Table of Contents Before calling the Support Desk..pg 3 What the Support Desk can assist users with. pg 4 Instructions for PC users (Internet

More information

Carroll Hospital Center

Carroll Hospital Center Carroll Hospital Center Citrix Remote Access What is Citrix? Citrix is a technology that allows you to securely access a published application remotely from any device. Carroll Hospital Center uses this

More information

CONNECT-TO-CHOP USER GUIDE

CONNECT-TO-CHOP USER GUIDE CONNECT-TO-CHOP USER GUIDE VERSION V8 Table of Contents 1 Overview... 3 2 Requirements... 3 2.1 Security... 3 2.2 Computer... 3 2.3 Application... 3 2.3.1 Web Browser... 3 2.3.2 Prerequisites... 3 3 Logon...

More information

AT&T Voicemail Viewer User Guide

AT&T Voicemail Viewer User Guide AT&T Voicemail Viewer User Guide Table of Contents iphone... 4 Requirements... 4 Installation... 4 Message Notification and Message Count... 6 Application... 8 Login... 8 Functionality Summary...10 Settings...

More information

mystanwell.com Installing Citrix Client Software Information and Business Systems

mystanwell.com Installing Citrix Client Software Information and Business Systems mystanwell.com Installing Citrix Client Software Information and Business Systems Doc No: 020/12 Revision No: Revision Date: Page: 1 of 16 Contents Overview... 3 1. Microsoft Internet Explorer... 3 2.

More information

SECURE E-MAIL USER GUIDE FOR EXTERNAL PARTNERS

SECURE E-MAIL USER GUIDE FOR EXTERNAL PARTNERS SECURE E-MAIL USER GUIDE FOR EXTERNAL PARTNERS A guide for using encrypted electronic mail to protect the privacy and data integrity of sensitive information. August 2014 Data Classification: Public Information

More information

How to use SURA in three simple steps:

How to use SURA in three simple steps: How to use SURA in three simple steps: Most of SURA s functionality can be accessed through these three steps. 1) Download SURA to your computer Go to the SU Downloads page to obtain the SURA utility.

More information

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation

Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Mechanics Bank Mobile Banking Mobile Finance Manager (MFM) Application Windows Mobile Phone Installation Thank you for your interest in Mechanics Bank Mobile Banking. This guide will help you get started

More information

Parallels Transporter Agent

Parallels Transporter Agent Parallels Transporter Agent User's Guide Copyright 1999-2015 Parallels IP Holdings GmbH and its affiliates. All rights reserved. Parallels IP Holdings GmbH Vordergasse 59 8200 Schaffhausen Switzerland

More information

Abila Nonprofit Online. Connection Guide

Abila Nonprofit Online. Connection Guide Abila Nonprofit Online This is a publication of Abila, Inc. 2014 Abila, Inc. and its affiliated entities. All rights reserved. Abila, the Abila logos, and the Abila product and service names mentioned

More information

Available on VitalSource

Available on VitalSource User Guide Available on VitalSource Welcome to Pageburst on VitalSource all of your Elsevier ebooks at your fingertips! This user guide contains the information you will need to redeem your access code

More information

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide

How to remotely access your Virtual Desktop from outside the college using VMware View Client. How to guide How to remotely access your Virtual Desktop from outside the college using VMware View Client How to guide Author: ICT Services Version: 1.0 Date: November 2015 Contents What is the VMware View Client?...

More information

Email setup information for most domains hosted with InfoRailway.

Email setup information for most domains hosted with InfoRailway. Email setup information for most domains hosted with InfoRailway. Incoming server (POP3): pop.secureserver.net port 995 (SSL) Incoming server (IMAP): imap.secureserver.net port 993 (SSL) Outgoing server

More information

Setting up Channel-21 Secure RSS CEP on

Setting up Channel-21 Secure RSS CEP on Setting up Channel-21 Secure RSS CEP on Important Information About C21 CEP Podcasts itunes iphone / ipad Android Phone/Tablet Demo Videos Important Information about Channel-21 CEP Channel-21 Digital

More information

owncloud Configuration and Usage Guide

owncloud Configuration and Usage Guide owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,

More information

MC3WAVES Wireless Connection Wizard

MC3WAVES Wireless Connection Wizard MC3WAVES Wireless Connection Wizard When viewing available wireless networks on either MCCC campus you will see a network named public. Connection to public is open to all. Upon connecting to the network

More information

Allianz Global Investors Remote Access Guide

Allianz Global Investors Remote Access Guide Allianz Global Investors Remote Access Guide Web Address: http://remote.allianzgi-us.com/ Page 1 of 34 pages Please contact the Service Desk at Table of Contents 1. Introduction to the Remote Access Page

More information

2-FACTOR AUTHENTICATION WITH

2-FACTOR AUTHENTICATION WITH 2-FACTOR AUTHENTICATION WITH 2X JUNE 2014 Two-Factor Authentication and Authy What is Two-Factor Authentication? Two-Factor Authentication is a process involving two stages to verify the identity of someone

More information

Microsoft Office 365 Microsoft Office 2013 Pro Plus for PC Installation and Activation Walkthrough

Microsoft Office 365 Microsoft Office 2013 Pro Plus for PC Installation and Activation Walkthrough Microsoft Office 365 Microsoft Office 2013 Pro Plus for PC Installation and Activation Walkthrough Contents Introduction... 2 System Requirements... 2 Installing Microsoft Office 2013... 2 Manage/Deactivate

More information

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are.

Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. Two Factor Authentication Two Factor Authentication (TFA; 2FA) is a security process in which two methods of authentication are used to verify who you are. For example, one method currently utilized within

More information

Sophos Mobile Control Startup guide. Product version: 3.5

Sophos Mobile Control Startup guide. Product version: 3.5 Sophos Mobile Control Startup guide Product version: 3.5 Document date: July 2013 Contents 1 About this guide...3 2 What are the key steps?...5 3 Log in as a super administrator...6 4 Activate Sophos Mobile

More information

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication This document serves as a How To reference guide for employees to execute the following MFA tasks: 1.

More information

Remote Access. Remote Access Start-up Guide. Non Cheshire East Council PC s/laptops. Page 0

Remote Access. Remote Access Start-up Guide. Non Cheshire East Council PC s/laptops. Page 0 Remote Access Remote Access Start-up Guide Non Cheshire East Council PC s/laptops Page 0 Page 1 1. Getting Started NGD provides easy access to all your Cheshire East documents and applications whilst not

More information

Wireless Presentation Gateway. User Guide

Wireless Presentation Gateway. User Guide User Guide Table of Contents 1 Initial Setup Present Anything Without Wires p. 3 2 From A Laptop (Windows or Mac) First, download he client p. 4 Now connect p. 5 Additional Features p. 6 3 From An ios

More information

CloudController. Getting Started In the Cloud. The Cloud-Based, Full-Service Accounting Solution. From ORBA, the business advisor you trust

CloudController. Getting Started In the Cloud. The Cloud-Based, Full-Service Accounting Solution. From ORBA, the business advisor you trust CloudController The Cloud-Based, Full-Service Accounting Solution From ORBA, the business advisor you trust for all your accounting needs Quick Setup Guide TABLE OF CONTENTS Chapter 1- QuickBooks in the

More information

The Coast to Coast AM Podcast for itunes 11

The Coast to Coast AM Podcast for itunes 11 The Coast to Coast AM Podcast for itunes 11 System Requirements In order to run itunes 11, please see the system requirements at http://www.apple.com/itunes/download/. A Note on Downloading Directly to

More information

Employee Active Directory Self-Service Quick Setup Guide

Employee Active Directory Self-Service Quick Setup Guide Employee Active Directory Self-Service Quick Setup Guide (V2.0) Last update: 11/5/2014 Copyright 2014 InfraDog Inc. All rights reserved Corporate Phone: +1 (416) 473-4096, Fax: +1 (888) 863-3936, Email:

More information

Booth Gmail Configuration

Booth Gmail Configuration Student email is accessed via a Booth branded Gmail service. Student mailboxes will be accessed via Gmail. Configure Gmail Settings Before you connect Gmail to send and receive Booth Gmail on your mobile

More information

Lync for Mobile. Help Desk 773.702.7414 HelpDesk@ChicagoBooth.edu

Lync for Mobile. Help Desk 773.702.7414 HelpDesk@ChicagoBooth.edu Lync may be installed on an ios(iphone or ipad), Android or Blackberry Device. Use the instructions below per the specific device desired to install Lync. Install on iphone or ipad Install Lync on your

More information

Dial-up Installation for CWOPA Users (Windows Operating System)

Dial-up Installation for CWOPA Users (Windows Operating System) Dial-up Installation for CWOPA Users (Windows Operating System) 1 Table of Contents Download and Install Digital Certificates... 3 Internet Explorer 8/9 Certificate Installation.3 Windows XP Instructions

More information

Virtual Workplace Personal Device Client Installation Instructions

Virtual Workplace Personal Device Client Installation Instructions Virtual Workplace Personal Device Client Installation Instructions 1 Table of Contents About this Installation Guide... 2 Client Overview... 2 VMware Horizon View Clients... 2 UniPrint Clients... 3 Client

More information

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0

ONLINE ACCOUNTABILITY FOR EVERY DEVICE. Quick Reference Guide V1.0 ONLINE ACCOUNTABILITY FOR EVERY DEVICE Quick Reference Guide V1.0 TABLE OF CONTENTS ACCOUNT SET UP Creating an X3watch account DOWNLOADING AND INSTALLING X3WATCH System Requirements How to install on a

More information

Hosted Microsoft Exchange Client Setup & Guide Book

Hosted Microsoft Exchange Client Setup & Guide Book Hosted Microsoft Exchange Client Setup & Guide Book Section 1 Microsoft Outlook Web Access (OWA) access directions Section 2 Windows 10 Mail App setup & configuration Section 3 Windows Mobile Phone ActiveSync

More information

This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network.

This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network. This manual will help you connect your Microsoft Windows XP, Vista, or 7, or Apple OS X computer to the University of Maryland campus data network. Prerequisites for Network Registration: 1. In order to

More information

Student Email Microsoft Office 365

Student Email Microsoft Office 365 Student Email Microsoft Office 365 Rancho Santiago Community College District, Information Technology Services RSCCD does not provide technical support for students personal computers or devices. Contact

More information

The Rush 24/7 Podcast for itunes 11

The Rush 24/7 Podcast for itunes 11 The Rush 24/7 Podcast for itunes 11 System Requirements In order to run itunes 11, please see the system requirements at http://www.apple.com/itunes/download/. A Note on Downloading Directly to Mobile

More information

Neehr Perfect Educational EHR STUDENT GUIDE

Neehr Perfect Educational EHR STUDENT GUIDE Neehr Perfect Educational EHR STUDENT GUIDE I. Introduction... 1 II. Quick Facts... 1 III. Creating Your Account... 2 IV. My Account Already Exists... 4 V. Applying Your Subscription... 5 VI. Logging in

More information

MAC OS X 10.5 Mail Setup

MAC OS X 10.5 Mail Setup MAC OS X 10.5 Mail Setup Automatically Configuring Mail Manually Configuring Mail Changing Mail Settings Automatically Configuring Mail Mail in Mac OS X 10.5 includes the automatically set up account option.

More information

Mac - Juniper Remote Desktop Instructions

Mac - Juniper Remote Desktop Instructions Mac - Juniper Remote Desktop Instructions How to Set up & Remotely Connect to your Hospital Windows Workstation from your Remote Macintosh Computer Using the JSAM Feature of Juniper. Note: These instructions

More information

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation

Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication. Mobile App Activation Guide for Setting Up Your Multi-Factor Authentication Account and Using Multi-Factor Authentication Mobile App Activation Before you can activate the mobile app you must download it. You can have up to

More information

Provider OnLine. Log-In Guide

Provider OnLine. Log-In Guide Provider OnLine Log-In Guide Table of Contents 1 LOG-IN ACCESS... 3 1.1 ENTERING THE USER ID AND PASSWORD... 4 1.2 OVERVIEW AND PURPOSE OF TRICIPHER... 5 1.2.1 Log-in for Users Who Are Active, But Not

More information

Business Online Banking Quick Users Guide

Business Online Banking Quick Users Guide Business Online Banking Quick Users Guide Business Online Banking Quick Users Guide Table of Contents Overview 2 First Time Login 2 Security 4 Contact Points 4 Registering your Browser / Computer 5 Adding,

More information