Tech Note 901 Configuring Smart Card Authentication for ArchestrA System Platform 2012
|
|
- Ophelia Bryant
- 7 years ago
- Views:
Transcription
1 Tech Note 901 Configuring Smart Card Authentication for ArchestrA System Platform 2012 All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information. Topic#: Created: November 2012 Introduction A Smart Card is a pocket-sized card with embedded integrated circuits. The card has secure storage for data, including private keys and public key certificates. The card holder is authenticated through a Personal Identification Number (PIN) and can be authorized to access only particular data on the card. You can configure an InTouch application to support Smart Cards for user authentication. Instead of the application requiring a username, password, and domain to be provided, the Smart Card certificate and associated PIN number can be used for authentication. You can also choose to log on with your name, password, and domain instead of the Smart Card. Operations that require user authentication, such as logging on or secured/verified writes, can also take advantage of Smart Card authentication. Application Versions Wonderware InTouch 10.5 and later Wonderware Application Server 3.5 and later Note: InTouch now supports the standard Microsoft interface for secure user access to Active Directory accounts via Smart Cards. About Smart Card Reader and Drivers Wonderware supports the following Cards and Readers: Card C2-40 Raak Technologies C2-40 Mini Driver Smart Card Reader Omnikey 3021 Smart Card USB Readers FIGURE 1: SMART CARD AND READER Note: As long as the SmartCard is compliant with the Microsoft Cryptographic services API, Wonderware will support the SmartCard. 1/11
2 Setting Up Smart Card Authentication You must do the following to set up Smart Card authentication: Configure the InTouch application to use either InTouch OS Security or ArchestrA OS security. The ArchestrA OS security can be either OS user-based or OS group-based. Join the WindowViewer computer to the correct domain for your network. Within WindowMaker, enable Smart Card authentication for the InTouch application. Configure the Smart Cards for the domain where you will use them. Install card drivers & readers on the WindowViewer computer. Smart Card and their drivers are hardware-specific. For information on installing and setting up your Smart Card reader, refer to the documentation for your specific reader. Connect the Smart Card reader to the appropriate port of the WindowViewer computer. Note: To use Smart Card with Terminal Server and RDP clients, a Smart Card reader must be attached to the client systems to enable Smart Card authentication. To connect a Smart Card reader to a Terminal Server using RDP, you need to make sure that the RDP client connection settings have the Smart Card option enabled under Local Devices and Resources. Configure Galaxy Security for a Managed InTouchViewApp 1. On the main menu, click Galaxy-> Configure-> Security. 2. Select OS User based. 3. Click the Role tab and add 2 roles (Figure 2 below). For this example, the Operator and Supervisor are shown. 4. Give the permissions necessary for each role. In this example, all permissions are given to the Operator & Supervisor. FIGURE 2: ADD ROLE 5. Click the Users tab and add two users (Figure 3 below). In this example, the users are called JUNO\TechsupAdmin1 & JUNO\TechsupAdmin2. 2/11
3 FIGURE 3: ADD DEFAULTUSER 6. Click the JUNO\TechsupAdmin1 user and click the Operator role. 3/11
4 FIGURE 4: TECHSUPADMIN1 WITH OPERATOR ROLE 7. Click the JUNO\TechsupAdmin2 user and click the Supervisor role. 4/11
5 FIGURE 5: ADD SUPERVISOR ROLE Configure the Galaxy Object with Security Writes 1. Create a $UserDefined instance called UDData. 2. Click the UDA tab and add three integer type UDA's. In this example, they are I1, I2 & I3. 3. For I1 the security mode is Operate. 4. For I2 the security mode is Secured Write. 5. For I3 the security mode is Verified Write. 6. Deploy all the objects. (WinPlatform_001, AppEngine_001, Area_001, UDData). 5/11
6 FIGURE 6: DEPLOY THE OBJECTS Enabling Smart Card Authentication in WindowMaker This example shows how to configure Smart Card Authentication in WindowMaker using the OS User based security from the Galaxy. 1. Create a derived InTouchViewApp. For this example it is called ITVATest_SC. 2. Open WindowMaker. 3. On the Special menu, click Security/Select Security Type and then click ArchestrA. 4. On the Special menu, click Smart Card Authentication. By default, this option is not checked. 5. Create an InTouch Window called SmartCard Window or similar. 6. Create six text objects ( ## ) and assign the following animation to each text object: Domain ##: Assign Value Display for Type String and add $OperatorDomain system tag. Operator ##: Assign Value Display for Type String and add $Operator system tag. AccessLevel ##: Assign Value Display for Type Analog and add an $AccessLevel system tag. I1 ##: Assign User Input for Type Analog and add Tagname as Galaxy:UDData.I1. I2 ##: Assign User Input for Type Analog and add Tagname as Galaxy:UDData.I2. I3 ##: Assign User Input for Type Analog and add Tagname as Galaxy:UDData.I3. 6/11
7 FIGURE 7: CONFIGURE THE UDA'S 7. Create a button and call it PostLogin. 8. On an Action script on the above button add the script shown in Figure 8 (below). The Condition Type is On Left Click/Key Down. FIGURE 8: ON KEY DOWN CONDITION SCRIPT 9. Switch to Runtime. 7/11
8 FIGURE 9: RUNTIME SMARTCARD WINDOW 10. Click PostLogin without the Smart Card inserted. The OS User based login dialog box appears. FIGURE 10: LOGIN WITHOUT SMART CARD 11. Insert the Smart Card (TechsupAdmin1) and click PostLogin Button. Figure 11 (below) shows the dialog box display. FIGURE 11: SMART CARD LOGIN 12. Type the PIN number for that Smart Card User. The Runtime Window returns the following: FIGURE 12: DOMAIN, OPERATOR AND ACCESSLEVEL DISPLAY 8/11
9 13. Type a value for I1 such as 25. Since the security mode configured to Galaxy:UDData.I1 was Operate, no Security Dialog box will be displayed. FIGURE 13: VALUE DISPLAY FOR I1 14. Enter a value for I2 such as 50. Since the security mode configured to Galaxy:UDData.I2 was Secured Write the secuirty dialog box will appear. Type the PIN. FIGURE 14: SECURED WRITE LOGIN 15. Figure 15 (below) shows the display in Window Viewer. 9/11
10 FIGURE 16: VALUE DISPLAY IN RUNTIME 16. Enter a value for I3 such as 75. Since the security mode configured to Galaxy:UDData.I3 is Verified Write the secuirty dialog box appears. Type the PIN. FIGURE 17: VERIFIED WRITE LOGIN Since it is verified write we need an Operator and a Supervisor signatures. You can either use both modes (Smart Card mode or User Mode). 10/11
11 FIGURE 17: VALUE DISPLAY IN RUNTIME Note Logging on with Your Smart Card You can use a Smart Card to log on to InTouch WindowViewer. You must have an application with Smart Card authentication enabled to use it to log on to the InTouch application. Your Smart Card must contain at least one certificate that is configured in your domain. A Smart Card reader must be attached to the computer running WindowViewer. You will be required to enter the PIN of the Smart Card you are using. If a Smart Card is not detected in the reader when you try to log on, you are prompted to authenticate using your user name and password instead. You can use Smart Cards for authentication for secured and verified data writes. Click the following icon to view this file in.pdf format: B. Shah Tech Notes are published occasionally by Wonderware Technical Support. Publisher: Invensys Systems, Inc., Rancho Parkway South, Lake Forest, CA There is also technical information on our software products at Wonderware Technical Support. For technical support questions, send an to wwsupport@invensys.com. Back to top 2013 Invensys Systems, Inc. All rights reserved. No part of the material protected by this copyright may be reproduced or utilized in any form or by any means, electronic or mechanical, including photocopying, recording, broadcasting, or by anyinformation storage and retrieval system, without permission in writing from Invensys Systems, Inc. Terms of Use. 11/11
This tech note will explain how to use the following parameters in Configurator General Parameters.
Tech Note 707 Configuring Allowable Deviation in Operations and Performance All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms
More informationTech Note 1010 SQL Server Authentication and ArchestrA Network Account Restrictions When Installing Wonderware Historian
Tech Note 1010 SQL Server Authentication and ArchestrA Network Account Restrictions When Installing Wonderware Historian All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is"
More information1. Under Application Objects, open the $Tank object and then open the $TankDisplay as shown in Figure 1 (below).
Tech Note 596 Using the OwningObject Property with ArchestrA Graphics All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use
More informationIntroduction. Issues. Symptoms. Application Versions. Case 1: Deploy an ArchestrA Object - UDO4DevUsers_001_001 - Has Error Messages
Tech Note 998 Wonderware Application Server Security Troubleshooting Essentials Part 1: Galaxy Security - Runtime Errors and Security Groups Settings All Tech Notes, Tech Alerts and KBCD documents and
More informationIntroduction. Symbol Script Timeout Setting. Sample MES Custom Code in Symbol Script. Application Versions. Sample Code
Tech Note 1006 Managing Symbol Script Timeouts When Using WW MES API Pop-up Dialogs All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the
More informationTech Note 743 Configuring Reporting Services 2008 Configuration for a New Host Name in Windows 2008 R2
Tech Note 743 Configuring Reporting Services 2008 Configuration for a New Host Name in Windows 2008 R2 All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty
More informationTech Note 652 Changing an ArchestrA Symbol's Custom Property Expression or Reference in Runtime
Tech Note 652 Changing an ArchestrA Symbol's Custom Property Expression or Reference in Runtime All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any
More informationTech Note 782 Installing Remote Desktop Services on Windows 2008 Server R2 for Wonderware Products
Tech Note 782 Installing Remote Desktop Services on Windows 2008 Server R2 for Wonderware Products All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any
More informationTech Note 338 How to Change the ActiveFactory Reporting Website Default Install Location
Tech Note 338 How to Change the ActiveFactory Reporting Website Default Install Location All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms
More informationIntroduction. Notes. Important Considerations. Application Versions. Assumptions. 8/22/13 Setting Up Historian Servers for Tier-2 Summary Replication
Tech Note 884 Setting Up Historian Servers for Tier-2 Summary Replication All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of
More informationTech Note 782 Installing Remote Desktop Services on Windows 2008 Server R2 for Wonderware Products
Tech Note 782 Installing Remote Desktop Services on Windows 2008 Server R2 for Wonderware Products All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any
More informationTech Note 920 Resolving Disabled ActiveFactory Reporting Website for Wonderware System Platform R2
Tech Note 920 Resolving Disabled ActiveFactory Reporting Website for Wonderware System Platform R2 All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any
More informationUsing Network Application Development (NAD) with InTouch
Tech Note 256 Using Network Application Development (NAD) with InTouch All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.
More informationTech Note 663 HMI Reports: Creating Alarm Database (WWALMDB) Reports
Tech Note 663 HMI Reports: Creating Alarm Database (WWALMDB) Reports All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use
More informationAll Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.
Tech Note 461 Troubleshooting Industrial Application Server Bootstrap Communications All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use
More informationTech Note 751 Installing InBatch Report Contents for Wonderware Information Server (WIS)
Tech Note 751 Installing InBatch Report Contents for Wonderware Information Server (WIS) All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See
More informationIntroduction. Application Versions. Installing Virtual SMTP Server. Tech Note 692 Using Virtual SMTP Server for SCADAlarm Email Notifications
Tech Note 692 Using Virtual SMTP Server for SCADAlarm Email Notifications All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of
More informationIntroduction. Tech Note 884 Setting Up Historian Servers for Tier-2 Summary Replication
Tech Note 884 Setting Up Historian Servers for Tier-2 Summary Replication All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of
More informationIntroduction. Configuration: Entity and OCO Modeling. Application Version: OCO General Configuration
Tech Note 711 Wonderware MES Operation Capability Object: Configuring Multiple Job Counters All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind.
More informationTech Note 882 Configuring Time Synchronization for Historian Server Using Net Time and Windows Task Scheduler
Tech Note 882 Configuring Time Synchronization for Historian Server Using Net Time and Windows Task Scheduler All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty
More informationAll Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.
Tech Note 211 Configuring Microsoft FrontPage Server Extensions All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.
More informationNote: This Tech Note was formerly titled Installing Microsoft SQL Server 2008 for Wonderware Historian v10.0.
Tech Note 682 Installing Microsoft SQL Server 2008 for Wonderware Products All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of
More information8/22/13 Configuring Windows SharePoint Services for PEM v1.0 to Work with SuiteVoyager v2.6
Tech Note 453 Configuring Windows SharePoint Services for PEM v1.0 to Work with SuiteVoyager v2.6 All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the
More informationTech Note 847 Installing Wonderware Information Server (WIS) on the Windows Server Window 7 64 and 32-bit Operating System
Tech Note 847 Installing Wonderware Information Server (WIS) on the Windows Server Window 7 64 and 32-bit Operating System All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is"
More informationCommunication to End Device Going In and Out of Slow Poll Mode
Tech Note 693 Using DASMBTCP to Solve Third-Party Modbus Device Communication Problems All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See
More informationHow To Write A Summary On A Historyorian Server
Tech Note 869 Configuring Historian Server for Local Data Summarization All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use
More informationEnabling Cross-Machine Distributed Transactions (via MSDTC)
Tech Note 557 Enabling Cross-Machine Distributed Transactions Between Factelligence Nodes All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind.
More informationTech Note 957 Creating Custom Password Entry on Intermec-Supported Handhelds
Tech Note 957 Creating Custom Password Entry on Intermec-Supported Handhelds All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms
More informationIntroduction. Back Up the Runtime Database. Application Versions
Tech Note 1035 Moving the Historian Runtime Database to Another Machine Using SQL Server 2012 All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind.
More informationIntroduction. Application Versions. Assumptions. Delete $$ExportTempFolders. Tech Note 930 Wonderware System Platform Clean-up Guide
Tech Note 930 Wonderware System Platform Clean-up Guide All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.
More informationIntroduction. Application Versions. Compatibility and System Requirements. Firewall and DCOM Settings
Tech Note 861 Wonderware System Platform FAQs for IT Professionals All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for
More informationThis Tech Note provides step-by-step procedures to install Microsoft SQL Server 2012 on a 32- or 64-bit Operating System.
Tech Note 958 Installing Microsoft SQL Server 2012 for Wonderware Products All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of
More informationAll Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.
Tech Note 365 Working with InTouch I/O Tags in InControl All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information. Topic#:
More informationNote: Not all messages in the log are indicative of a problem. Contact Technical Support if questions arise.
Tech Note 643 Error Logging in IntelaTrac All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information. Topic#:
More informationTech Note 400 Configuring Remote Connections for Windows 2000/2003/XP
Tech Note 400 Configuring Remote Connections for Windows 2000/2003/XP All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.
More informationTech Note 868 Troubleshooting Wonderware Software Resource Issues with Performance Monitor
Tech Note 868 Troubleshooting Wonderware Software Resource Issues with Performance Monitor All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind.
More informationTech Note 882 Configuring Time Synchronization for Historian Server Using Net Time and Windows Task Scheduler
Tech Note 882 Configuring Time Synchronization for Historian Server Using Net Time and Windows Task Scheduler All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty
More informationPart I: Setting up Bristol Babcock's OPC Server
Tech Note 274 Setting up Bristol Babcock's OPC Server to Communicate with OPCLink All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use
More informationTech Note 1035 Moving the Historian Runtime Database to Another Machine Using SQL Server 2012
Tech Note 1035 Moving the Historian Runtime Database to Another Machine Using SQL Server 2012 All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind.
More informationTech Note 612 Upgrading DLL Version Mismatches Between CBM Solution and System Platform
Tech Note 612 Upgrading DLL Version Mismatches Between CBM Solution and System Platform All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See
More informationTech Note 912 Using Alternate TCP Port Numbers with Modbus Ethernet DAServer
Tech Note 912 Using Alternate TCP Port Numbers with Modbus Ethernet DAServer All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms
More informationTech Note 551 Configuring SQLMail or Database Mail for the Historian Event
Tech Note 551 Configuring SQLMail or Database Mail for the Historian Event System All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the
More informationThis Tech Note describes working with Microsoft Reporting Services in order to publish InBatch Reports to Wonderware Information Server.
Tech Note 767 Working with InBatch Reports All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information. Topic#:
More informationIndustrial Application Server Redundancy: Troubleshooting Guidelines
1 of 7 Tech Note 825 Industrial Application Server Redundancy: Troubleshooting Guidelines All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind.
More informationTech Note 813 Troubleshooting Wonderware Information Server (WIS) Part Four: Client License Release
1 of 14 Tech Note 813 Troubleshooting Wonderware Information Server (WIS) Part Four: Client License Release All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty
More informationAll Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.
Tech Note 115 Overview of the InTouch 7.0 Windows NT Services All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.
More information8/23/13 Configuring the Wonderware SECS-II/GEM Host Creator (SERIAL-RS232)
Tech Note 202 Configuring the Wonderware SECS-II/GEM Host Creator (SERIAL- RS232) All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use
More informationTech Note 905 Troubleshooting Wonderware Information Server (WIS) Part Six: ArchestrA Graphics No Live-Data
Tech Note 905 Troubleshooting Wonderware Information Server (WIS) Part Six: ArchestrA Graphics No Live-Data All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty
More informationTech Note 1042 Solving Historian Memory Issue with SQL Server MemToLeave Configuration
Tech Note 1042 Solving Historian Memory Issue with SQL Server MemToLeave Configuration All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See
More informationMigrating QI 8.0 Admin and Process Databases from Microsoft Access to Microsoft SQL Server
Tech Note 915 Migrating QI Analyst Databases from Access to SQL All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more
More informationTo allow SQL Server Agent to trigger when a report is executed, we need to provide a set of report group types.
Tech Note 573 Using SQL Server Agent to Run Scheduled Reports All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more
More informationInstead, use the following steps to update system metadata that is stored in sys.servers and reported by the system function @@SERVERNAME.
Tech Note 742 Renaming a Computer that Hosts a Stand-Alone SQL Server Instance All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms
More information8/23/13 Configuring SIDirect DAServer to Communicate with S7 PLC Over TCP Connection
Tech Note 332 Configuring SIDirect DAServer to Communicate with S7 PLC Over TCP Connection This document and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.
More informationThis Tech Note provides detailed guidelines and options for defragmenting and maintaining your production databases.
Tech Note 975 Defragmenting MES Databases All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information. Topic#:
More information8/22/13 Configuring the SST5136SD PCI Card Using the New SSTDHP IO Server V8.1 or the DASDHPlus Server
Tech Note 448 Configuring the SST5136SD PCI Card Using the New SSTDHP I/O Server or the DASDHPlus Server All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind.
More informationHow To Migrate Qi Analyst To A New Database On A Microsoft Access 7.2.2 (Windows) From A New Version Of Qi.Io To A Newer Version Of A New Qi 8.0 (Windows 7.3
Tech Note 915 Migrating QI Analyst Databases from Access to SQL All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more
More informationSecurity Settings for Wonderware Products
Security Settings for Wonderware Products All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information. Created: August 2005
More informationGuide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards
The World Internet Security Company Solutions for Security Guide to Obtaining Your Free WISeKey CertifyID Personal Digital Certificate (Personal eid) WISeKey 2010 / Alinghi 2010 Smartcards Wherever Security
More informationWonderware Historian Client Installation Guide. Invensys Systems, Inc.
Wonderware Historian Client Installation Guide Invensys Systems, Inc. Revision A Last Revision: June 15, 2010 Copyright 2010 Invensys Systems, Inc. All Rights Reserved. All rights reserved. No part of
More informationThis Tech Note describes modem connections using DAServers and provides some guidelines on how to make the modem connection work.
Tech Note 949 Managing Wonderware DAServers and Modem Connections All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for
More informationDIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication
DIGIPASS KEY series and smart card series for Juniper SSL VPN Authentication Certificate Based 2010 Integration VASCO Data Security. Guideline All rights reserved. Page 1 of 31 Disclaimer Disclaimer of
More informationGuide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid)
The World Internet Security Company Solutions for Security Guide for Securing E-mail With WISeKey CertifyID Personal Digital Certificate (Personal eid) Wherever Security relies on Identity, WISeKey has
More informationSetting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More information1. Open the preferences screen by opening the Mail menu and selecting Preferences...
Using TLS encryption with OS X Mail This guide assumes that you have already created an account in Mail. If you have not, you can use the new account wizard. The new account wizard is in the Accounts window
More informationArchestrA Log Viewer User s Guide Invensys Systems, Inc.
ArchestrA Log Viewer User s Guide Invensys Systems, Inc. Revision A Last Revision: 7/3/07 Copyright 2007 Invensys Systems, Inc. All Rights Reserved. All rights reserved. No part of this documentation shall
More informationPrivateServer HSM Integration with Microsoft IIS
PrivateServer HSM Integration with Microsoft IIS January 2014 Document Version 1.1 Notice The information provided in this document is the sole property of Algorithmic Research Ltd. No part of this document
More informationYale Software Library
Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for
More informationUSER GUIDE WWPass Security for Windows Logon
USER GUIDE WWPass Security for Windows Logon December 2015 TABLE OF CONTENTS Chapter 1 Welcome... 3 Introducing WWPass Security for Windows Logon... 4 Related Documentation... 4 Presenting Your PassKey
More informationKepware Technologies KEPServerEX Client Connectivity Guide for Wonderware InTouch
Kepware Technologies KEPServerEX Client Connectivity Guide for October, 2011 Version 1.002 Kepware Technologies Table of Contents 1. Overview... 1 1.1 Installing Common Components... 1 1.2 Installing KEPServerEX...
More informationImplementing the system using these guidelines should improve your system performance for a large database while your database grows in size.
Tech Note 657 Wonderware Performance 3.5 Software: Performance Tips All Tech Notes, Tech Alerts and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for
More informationPRODUCT WHITE PAPER LABEL ARCHIVE. Adding and Configuring Active Directory Users in LABEL ARCHIVE
PRODUCT WHITE PAPER LABEL ARCHIVE Adding and Configuring Active Directory Users in LABEL ARCHIVE TEKLYNX International March 19, 2010 Introduction Now more than ever, businesses large and small alike are
More informationSetting up Hyper-V for 2X VirtualDesktopServer Manual
Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples herein
More informationPROCEDURE FOR DSC CONFIGURATION. A. Installation of the driver has to be done for the first time and only once.
PROCEDURE FOR DSC CONFIGURATION 1. INSTALL GEMALTO TOKEN DRIVER A. Installation of the driver has to be done for the first time and only once. B. Open the Browser and go to http://nicca.nic.in C. Click
More informationConfiguring IBM Cognos Controller 8 to use Single Sign- On
Guideline Configuring IBM Cognos Controller 8 to use Single Sign- On Product(s): IBM Cognos Controller 8.2 Area of Interest: Security Configuring IBM Cognos Controller 8 to use Single Sign-On 2 Copyright
More informationMAC OS X 10.5 Mail Setup
MAC OS X 10.5 Mail Setup Automatically Configuring Mail Manually Configuring Mail Changing Mail Settings Automatically Configuring Mail Mail in Mac OS X 10.5 includes the automatically set up account option.
More informationTech Note 53 Configuring the Siemens SINEC H1 CP1413 for Windows NT
Tech Note 53 Configuring the Siemens SINEC H1 CP1413 for Windows NT All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms of Use for more information.
More informationTech Note 128 Configuring InBatch For Standalone PCs With SQL Server and IndustrialSQL Server
Tech Note 128 Configuring InBatch For Standalone PCs With SQL Server and IndustrialSQL Server All Tech Notes and KBCD documents and software are provided "as is" without warranty of any kind. See the Terms
More informationPrivateServer HSM EKM Provider for Microsoft SQL Server
PrivateServer HSM EKM Provider for Microsoft SQL Server January 2014 Document Version 1.1 Notice The information provided in this document is the sole property of Algorithmic Research Ltd. No part of this
More informationInTouch HMI Scripting and Logic Guide
InTouch HMI Scripting and Logic Guide Invensys Systems, Inc. Revision A Last Revision: 7/25/07 Copyright 2007 Invensys Systems, Inc. All Rights Reserved. All rights reserved. No part of this documentation
More informationInformation Systems Services. Configuring Entourage 2008 to connect to the University s Exchange service Version 2.2 February 2009
Information Systems Services Configuring Entourage 2008 to connect to the University s Exchange service Configuring Entourage 2008 to connect to the University s Exchange service Contents Contents... 2
More informationUsing etoken for Securing E-mails Using Outlook and Outlook Express
Using etoken for Securing E-mails Using Outlook and Outlook Express Lesson 15 April 2004 etoken Certification Course Securing Email Using Certificates Unprotected emails can be easily read and/or altered
More informationActive Directory Integration for Greentree
App Number: 010044 Active Directory Integration for Greentree Last Updated 14 th February 2013 Powered by: AppsForGreentree.com 2013 1 Table of Contents Features... 3 Options... 3 Important Notes... 3
More informationUsing Internet or Windows Explorer to Upload Your Site
Using Internet or Windows Explorer to Upload Your Site This article briefly describes what an FTP client is and how to use Internet Explorer or Windows Explorer to upload your Web site to your hosting
More informationAlarm Display. Tips & Tricks DIANA SMIT. Tel: 0861-WONDER Fax: (011) 607-8478
Ground floor Block D Gillooly s View Office Park 1 Osborne Road Bedfordview Tel: 0861-WONDER Fax: (011) 607-8478 Alarm Display Tips & Tricks DIANA SMIT Table of Contents 1. Introduction... 3 2. Creating
More informationInTouch Example Description
InTouch Example Description This document describes how to work with the InTouch example. It contains the following sections: Using the LNS DDE Server Examples 2 Using the Example LNS Database 2 Sequence
More informationUsing Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive
Using Microsoft Windows Authentication for Microsoft SQL Server Connections in Data Archive 2014 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
More informationUser Guide for eduroam
User Guide for eduroam 獲 以 下 認 證 : Certificado pela: Certified by: 澳 門 望 廈 山 Colina de Mong-Há, Macau 電 話 : (853) 8598 3120 Tel: (853) 8598 3120 傳 真 : (853) 8598 3151 Fax: (853) 8598 3151 www.ift.edu.mo
More informationUse the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7.
Use the below instructions to configure your wireless settings to connect to the secure wireless network using Microsoft Windows Vista/7. 1. Click the Windows Start button, then Control Panel How-To-WCC-Secure-Windows-7-11/4/2010-4:09
More informationCreating IBM Cognos Controller Databases using Microsoft SQL Server
Guideline Creating IBM Cognos Controller Databases using Microsoft SQL Product(s): IBM Cognos Controller 8.1 or higher Area of Interest: Financial Management 2 Copyright Copyright 2008 Cognos ULC (formerly
More informationCase Closed Installation and Setup
1 Case Closed Installation and Setup Contents Installation Overview...2 Microsoft SQL Server Installation...3 Case Closed Software Installation...5 Register OCX for Printing...6 External Programs...7 Automatic
More informationHow to Configure Outlook 2010 E-mail Client for Exchange
LAUSD IT Help Desk How to Configure Outlook 2010 E-mail Client for Exchange (03/04/2012) LAUSD IT Help Desk 333 S. Beaudry Ave. 9 th Floor Phone 213.241.5200 Table of Contents Configure Outlook 2010 for
More informationThe following describes how to connect to the Internet using a Novatel Ovation MC950D modem and an Apple MacBook Pro : with Mac OS X 10.4 Tiger.
Introduction The following describes how to connect to the Internet using a Novatel Ovation MC950D modem and an Apple MacBook Pro : with Mac OS X 10.4 Tiger. The Novatel Ovation MC950D enables you to connect
More informationDefender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationeadvantage Certificate Enrollment Procedures
eadvantage Certificate Enrollment Procedures Purpose: Instructions for members to obtain a digital certificate which is a requirement to conduct financial transactions with the Federal Home Loan Bank of
More informationSetting up Hyper-V for 2X VirtualDesktopServer Manual
Setting up Hyper-V for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationAccops HyWorks v2.5. Quick Start Guide. Last Update: 4/18/2016
Accops HyWorks v2.5 Quick Start Guide Last Update: 4/18/2016 2016 Propalms Technologies Pvt. Ltd. All rights reserved. The information contained in this document represents the current view of Propalms
More informationStarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec
StarWind iscsi SAN Software: Tape Drives Using StarWind and Symantec Backup Exec www.starwindsoftware.com Copyright 2008-2011. All rights reserved. COPYRIGHT Copyright 2008-2011. All rights reserved. No
More informationConfigure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows
Configure SecureZIP for Windows for Entrust Entelligence Security Provider 7.x for Windows SecureZIP for Windows interoperates with leading PKI vendors including Entrust, VeriSign, and RSA to enable the
More informationVeriSign PKI Client Government Edition v 1.5. VeriSign PKI Client Government. VeriSign PKI Client VeriSign, Inc. Government.
END USER S GUIDE VeriSign PKI Client Government Edition v 1.5 End User s Guide VeriSign PKI Client Government Version 1.5 Administrator s Guide VeriSign PKI Client VeriSign, Inc. Government Copyright 2010
More information