Quest Soft Token for Windows Desktop User Guide
|
|
- Malcolm Young
- 7 years ago
- Views:
Transcription
1 Quest Soft Token for Windows Desktop User Guide This guide provides information on installing, activating and using the Quest Soft Token for Windows Desktop. What is the Quest Soft Token for Windows Desktop The Quest Soft Token for Windows Desktop is a two-factor authentication token that can be used with Quest Defender, to gain secure access to network, web, and applications-based resources. The Token can be programmed as a synchronous OATH compliant token or using Defender SNK, AES or 3DES encryption in both synchronous and asynchronous (challenge / response) modes. The picture above shows an example of the Quest Soft Token for Windows Desktop. The token response is used as the One Time Password (OTP) when prompted to authenticate. The Quest Soft Token for Windows Desktop is also referred to as the Defender Desktop Token.
2 Installing the Quest Soft Token for Windows Desktop software Your system administrator will provide you with the Quest Soft Token for Windows Desktop software. This file may be made available to you through a network share, a CD or optionally through the Defender Token Deployment System. To install the Quest Soft Token for Windows Desktop software using the installation file, perform the following steps: 1. Locate and run the Defender Desktop Token Installer.exe file. The Defender Desktop Token Installation Wizard starts: 2. Select Next. The Defender Desktop Token Installation Wizard (License Agreement) page is displayed. Check the box to accept the License agreement, then select Next. The Defender Desktop Token Installation Wizard (Install Location) page is displayed: 3. Select Finish to accept the default location. Alternatively, selcct Browse to choose a different location, then select Finish. The Installation Progress dialog box is displayed: 2
3 4. The Installation Complete dialog box is then displayed: 5. Select Finish. On completion of the installation a Defender Desktop Token program group is created. 3
4 Activating the Quest Soft Token for Windows Desktop In order to use Quest Soft Token for Windows Desktop for token authentication an activation code is required. This may be provided by your Defender administrator or, if available, through the Defender Token Deployment System. This section details the steps required for both types of activation. Using an Activation code provided by your administrator 1. From the Start menu, select Programs, Defender Desktop Token. The Token Activation Wizard (Welcome) dialog box is displayed: 2. Select Next. The Enter Activation Code dialog box is displayed: When the Defender Administrator generates a Defender Desktop Token for a user, a username.txt file is automatically created. This file can optionally contain the token details for a single user or token details for multiple users. For further information, refer to the Quest Soft Token for Windows Desktop Administration Guide. 3. Select Browse to select the required username.txt file. The activation key is automatically copied from the username.txt file and pasted into the Code field. Alternatively, you can copy the activation code and paste it into the Code field. 4
5 4. Select Next. The Token Activation Wizard - Select Storage Location dialog box is displayed: 5. To store the activated Quest Soft Token for Windows Desktop: in your application data folder, select the Your application data folder button in a different folder, select the Another Folder radio button, then select Browse to navigate to the required location on an attached device, such as an Aladdin USB token, select the Attached Device button, then select the required device from the list. 6. If you have more than one active Quest Soft Token for Windows Desktop and want this token to be selected for authentication by default, check the Make this token the default token checkbox. If you have more than one active Quest Soft Token for Windows Desktop and do not want to authenticate using the default token, you can specify an alternative token during logon. 7. Select Next. The Token Activation Wizard - Select Passphrase dialog box is displayed: Figure 8: Token Activation Wizard (Select Passphrase) dialog box 5
6 8. In the New Passphrase field, type the passphrase that you will enter to unlock the Desktop Token before authentication. 9. In the Confirm Passphrase field, type the passphrase again to confirm your choice. As you type your passphrase, the strength box indicates the strength of the passphrase by showing a red (weak) or green (strong) indicator. Quest recommends the use of a strong passphrase. A strong passphrase should contain a combination of uppercase and lowercase letters, numbers and punctuation marks, and be at least eight characters long. If you choose a weak passphrase, the following message is displayed: To use the passphrase you entered in the Token Activation Wizard - Select Passphrase dialog box, click Yes. To return to the Token Activation Wizard - Select Passphrase dialog box and enter a different passphrase, click No. Your Administrator can enforce the use of a strong password. 10. The Token Activation Wizard (Enter Token Name) dialog box is displayed: 11. In the Token Name field, type a name that will help you identify this token. If you choose not to give the token a name, the token serial number will be used as the token name. 12. Select Next. The Token Activation Wizard (Defender Desktop Token 6
7 Activation Complete) dialog box is displayed: On completion of the activation procedure, the token can be managed from the Start menu, Defender Desktop Token program group, shown below: If you specified a default token during the activation procedure, the Enter Passphrase dialog for the default token will be displayed when you select the Defender Desktop Token program group from the Start menu. To display the token management options, or select an alternative token for authentication, click Tokens. For authentication information, refer to Authenticating with a Defender Desktop Token. 7
8 Using the Defender Token Deployment System The Defender Token Deployment System is a web based application that allows for the Quest Soft Token for Windows Desktop to be requested directly through a local web site. The activation code can be received by or a self-activating version of the token software can be downloaded. The Token Deployment System is an optional Defender component. For full instructions on using the Defender Token Deployment System please refer to the Defender Token Deployment System User Guide. These instructions refer to the token activation process only. 1. After choosing the Windows Desktop token from the Token Deployment System website and completing the verification process the Install and Activate Token web page is displayed. 2. This page provides the following a link to download the token software from the activation code, which can be copied and pasted to the Quest Soft Token for Windows Desktop activation dialog. A link to download a self-activating installer. An option to send these details to your address. 8
9 Download Token Software The Quest Soft Token for Windows Desktop software can be downloaded from Using this link will download the Defender Desktop Token Installer.exe installer. ACTIVATION CODE The activation code for your token can be copied and pasted in to the Quest Soft Token for Windows Desktop activation dialog as below. Please see the Using an Activation code provided by your administrator for complete details on this process. SELF-ACTIVATING INSTALLER This option will download a self-activating installer to your local workstation. The exact procedure and messages displayed to download the file will depend on your browser version. Using the self-activating installer link will automatically launch the token activation wizard for you so it will be ready to use once the installation process is complete. OPTION A link is provided to send the web page information to an address. By default this will be the address configured on your AD user account. Optionally your system administrator may allow the address to be changed so that the information can be sent to a different address. Select Send to send the details, a confirmation will be displayed on the webpage that the e- mail has been sent. 9
10 Token Management Options The following token management options are available from the Defender Desktop Tokens console. MENU OPTION DESCRIPTION click to display a list of folders that will be searched to locate Defender Desktop Tokens. Edit Folders To remove a folder from the list, click the required folder, then click Remove. To add a new folder to the list, click Add then type the location of the folder to be included in the token search. Select and Close select the token and enter the passphrase when prompted. Close Select to close the dialog 10
11 Token Activate New Token Default Rename select Activate New Token to start the Desktop Token Activation Wizard. For further information, refer to Activating your Defender Desktop Token. select the required Defender Desktop Token then select Default to set the token as your default token. select the required Defender Desktop Token then select Rename to change the name of the token. select the required Defender Desktop Token, then select Delete to remove the token. Delete Note: If you use this option to delete a Defender Desktop Token, you must also ensure that the corresponding Defender Desktop Token definition is deleted in Active Directory. Contact your Defender administrator for assistance. select the required Defender Desktop Token, then select Move to move the token to a different location. Move Change passphrase Reset passphrase Properties Note: If you use this option to move a token to a different folder, the folder is automatically included in the list of folders for searching. select the required Defender Desktop Token, then select Change passphrase to change the current passphrase. select the required Defender Desktop Token, then select Reset passphrase to reset a locked passphrase. select the required Defender Desktop Token then select Properties to display the token information page. View Icons Details select to display tokens as icons. select to display tokens as details. Options Prompt for username to unlock token Centre Window at Startup select the required Defender Desktop Token, then select Options, Prompt for username to unlock token to display the username at the passphrase prompt. The passphrase is also required. select this option to ensure that the login dialog is always positioned centrally on the user s display. Help About Defender Desktop Token click Help, About to display version information for the Defender Desktop Token program. 11
12 Changing the Passphrase To change the passphrase for a Defender Desktop Token: 1. From the Start menu, select Programs, Defender Desktop Token, Defender Desktop Token. The Enter Passphrase page is displayed. 2. Select Tokens to display the console and ensure that the required token is selected. 3. On the menu bar, select Token, Change Passphrase. The Change Passphrase Wizard starts. 4. Select Next. You are prompted to enter your current passphrase for this token. Enter the passphrase. 5. Select Next. Enter your new passphrase for this token. 6. Confirm the new passphrase. 7. Select Next. The Change Passphrase Wizard confirms that the passphrase was changed successfully. If you forget your Passphrase If you forget your passphrase or your token is locked because you have exceeded the permitted number of incorrect passphrase attempts, the following message is displayed: Your passphrase is locked. You must reset your passphrase. To begin the unlock procedure, which requires a dialog with the Defender Administrator: 1. Select Start, Programs, Defender Desktop Token, Defender Desktop Token. 12
13 2. Select Tokens. The Defender Desktop Tokens dialog is displayed: Right-click the token that you want to reset, then select Reset Passphrase from the list or use the Reset Passphrase option from the Token menu. The Defender Desktop Token Wizard starts: 4. Select Next. 13
14 5. Tell your Administrator the number displayed in the Challenge field. Your Administrator will then reply with an unlock code. 6. Enter the unlock code into the Unlock Code field. 7. In the New Passphrase field, type your new passphrase. In the Confirm Passphrase field, type your new passphrase again to confirm. 9. Click Next. The Defender Desktop Token Passphrase Reset Complete dialog is displayed: 14
15 Authenticating with a Quest Soft Token for Windows Desktop This section describes how to authenticate to a Defender protected network using the Quest Soft Token for Windows Desktop (Defender Desktop Token). Synchronous Mode If you are authenticating to a network that uses a response only method: 1. Connect to your network using your usual communications software. When the connection is made, a Defender Security Server intercepts the call. 2. When prompted by the Defender Security Server, enter your user ID in your communications software. From the Start menu, select Programs, Defender Desktop Token, Defender Desktop Token. If you have more than one Defender Desktop Token installed and have specified one token as your default token, the Enter Passphrase dialog box is displayed: 3. In the Passphrase field, type your passphrase. 4. Select OK. The Defender Desktop Token Response dialog box is displayed: 5. Select Get Response. The token response is displayed in the Response field. To automatically copy the token response to the clipboard and leave the Defender Desktop Token Response window open, check the Automatically copy response to the clipboard checkbox. To automatically close the Defender Desktop Token Response window after the response has been copied to the clipboard, check the Automatically close this window checkbox. If you chose not to automatically copy the token response to the clipboard, select Copy to copy the response to the clipboard. Select Cancel to close the Defender Desktop Token Response window. 15
16 6. Paste the Defender Desktop Token response into your communications software. Place the cursor in the communication software window and press Control-V to paste the response into the communication software window. 7. Press Enter on your computer keyboard. 8. Defender verifies the response. If the response the Defender Security Server receives matches the one it expects, you are connected and granted access to the protected network. Asynchronous Mode If you are authenticating to a network that uses a challenge/response method: 1. Connect to your network using your usual communications software. When the connection is made, a Defender Security Server intercepts the call. 2. When prompted by the Defender Security Server, enter your user ID in your communications software.the Defender Security Server displays a challenge value in your communications software. 3. From the Start menu, select Programs, Defender Desktop Token, Defender Desktop Token. If you: have more than one Defender Desktop Token assigned to you, the Defender Desktop Tokens dialog box is displayed. Select the required token. Go to Step 4. specified a default token during the activation procedure, the Enter Passphrase dialog for the default token will be displayed when you select the Defender Desktop Token program group from the Start menu. To display the token management options, or select an alternative token for authentication, click Tokens. Select the required token. Go to Step The Enter Passphrase dialog box is displayed: 5. In the Passphrase field, type your passphrase. Click OK. The Defender Desktop Token Response page is displayed: 16
17 7. In the Challenge field, type the challenge displayed by the Defender Security Server. 8. To automatically copy the token response to the clipboard and close the Defender Desktop Token Response window, check the box, then select Get Response. If you chose not to automatically copy the token response to the clipboard, select Get Response, then use the copy function to copy the response to the clipboard. Select Cancel to close the Defender Desktop Token Response window. 9. Place the cursor in the communication software window and press Control-V to paste the response into the window. 10. Press Enter on your computer keyboard. 11. Defender verifies the response. If the response the Defender Security Server receives matches the one it expects, you are connected and granted access to the protected network Quest Software, Inc. ALL RIGHTS RESERVED. Quest, Quest Software, the Quest Software logo are trademarks and registered trademarks of Quest Software, Inc. in the United States of America and other countries. Other trademarks and registered trademarks are property of their respective owners. 17
Quest Soft Token for Windows Phone User Guide
Quest Soft Token for Windows Phone User Guide What is the Quest Soft Token for Windows Phone? The Quest Soft Token for Windows Phone is a two-factor authentication token that can be used with any OATH-compliant
More informationQuest Soft Token for Windows Mobile User Guide
Quest Soft Token for Windows Mobile User Guide This guide provides information on installing, activating and using the Quest Windows Mobile Token. What is the Quest Soft Token for Windows Mobile The Quest
More informationDefender Configuring for Use with GrIDsure Tokens
Defender Configuring for Use with GrIDsure Tokens Introduction The GrIDsure token can be used to protect any website hosted on Internet Information Server (IIS). This guide provides information for the
More informationDefender 5.7 - Token Deployment System Quick Start Guide
Defender 5.7 - Token Deployment System Quick Start Guide This guide describes how to install, configure and use the Defender Token Deployment System, based on default settings and how to self register
More informationPaymentNet Federal Card Solutions Cardholder FAQs
PaymentNet Federal Card Solutions It s easy to find the answers to your questions about PaymentNet! June 2014 Frequently Asked Questions First Time Login How do I obtain my login information?... 2 How
More informationSafeWord Domain Login Agent Step-by-Step Guide
SafeWord Domain Login Agent Step-by-Step Guide Author Johan Loos Date January 2009 Version 1.0 Contact johan@accessdenied.be Table of Contents Table of Contents... 2 Why SafeWord Agent for Windows Domains?...
More informationSafeGuard Enterprise Web Helpdesk. Product version: 6.1
SafeGuard Enterprise Web Helpdesk Product version: 6.1 Document date: February 2014 Contents 1 SafeGuard web-based Challenge/Response...3 2 Scope of Web Helpdesk...4 3 Installation...5 4 Allow Web Helpdesk
More informationGetting Started With Citrix ShareFile
Guide Getting Started With Citrix ShareFile Learn the basics of your ShareFile account. Plus, get the answers to some of our most frequently asked how-to questions. ShareFile.com Welcome to ShareFile!
More information2. To encrypt the drive for future use, click Yes (Fig 1, 2). This will start the encryption process.
Dell Data Protection USB Drive Encryption Introduction To further protect PC s that have access to sensitive data, the Dell Data Protection (DDP) client detects and encrypts USB/Flash drives when they
More informationFlexible Identity. OTP software tokens guide. Multi-Factor Authentication. version 1.0
Flexible Identity Multi-Factor Authentication OTP software tokens guide version 1.0 Publication History Date Description Revision 2014.02.07 initial release 1.0 Copyright Orange Business Services 2 of
More informationHow to install and use the File Sharing Outlook Plugin
How to install and use the File Sharing Outlook Plugin Thank you for purchasing Green House Data File Sharing. This guide will show you how to install and configure the Outlook Plugin on your desktop.
More informationUser guide. Business Email
User guide Business Email June 2013 Contents Introduction 3 Logging on to the UC Management Centre User Interface 3 Exchange User Summary 4 Downloading Outlook 5 Outlook Configuration 6 Configuring Outlook
More informationSTATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS
Notes: STATISTICA VERSION 10 STATISTICA ENTERPRISE SERVER INSTALLATION INSTRUCTIONS 1. The installation of the STATISTICA Enterprise Server entails two parts: a) a server installation, and b) workstation
More informationSafeGuard Enterprise Web Helpdesk. Product version: 6 Document date: February 2012
SafeGuard Enterprise Web Helpdesk Product version: 6 Document date: February 2012 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Helpdesk
More informationInstructions For Opening UHA Encrypted Email
Receiving Encrypted Email You have received a secure, encrypted message from UHA. The message will contain the following notice and an attachment named SecureMessageAtt.hml. The attachment is shown circled
More informationMCBDirect Corporate Logging on using a Soft Token
MCBDirect Corporate Logging on using a Soft Token Document issue: 2.1 Date of issue: September 2014 Contents About Soft Token authentication... 3 Logging onto MCBDirect Corporate online banking... 4 Soft
More informationOUTLOOK WEB APP (OWA): MAIL
Office 365 Navigation Pane: Navigating in Office 365 Click the App Launcher and then choose the application (i.e. Outlook, Calendar, People, etc.). To modify your personal account settings, click the Logon
More informationGetting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class
Getting Started with Microsoft Outlook with Exchange Online Software from Time Warner Cable Business Class A Guide for Administrators Table of Contents Requirements... 3 1. Activate & Setup Online Software
More informationSetting up VMware ESXi for 2X VirtualDesktopServer Manual
Setting up VMware ESXi for 2X VirtualDesktopServer Manual URL: www.2x.com E-mail: info@2x.com Information in this document is subject to change without notice. Companies, names, and data used in examples
More informationYale Software Library
Yale Software Library http://www.yale.edu/its/software/ For assistance contact the ITS Help Desk 203-432-9000, helpdesk@yale.edu Two-factor authentication: Installation and configuration instructions for
More informationConfiguring Thunderbird for Flinders Mail at home.
Configuring Thunderbird for Flinders Mail at home. Downloading Thunderbird can be downloaded from the Mozilla web site located at http://www.mozilla.org/download.html This web site also contains links
More informationSTATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER
Notes: STATISTICA VERSION 9 STATISTICA ENTERPRISE INSTALLATION INSTRUCTIONS FOR USE WITH TERMINAL SERVER 1. These instructions focus on installation on Windows Terminal Server (WTS), but are applicable
More informationSafeGuard Enterprise Web Helpdesk
SafeGuard Enterprise Web Helpdesk Product version: 5.60 Document date: April 2011 Contents 1 SafeGuard web-based Challenge/Response...3 2 Installation...5 3 Authentication...8 4 Select the Web Help Desk
More informationQUANTIFY INSTALLATION GUIDE
QUANTIFY INSTALLATION GUIDE Thank you for putting your trust in Avontus! This guide reviews the process of installing Quantify software. For Quantify system requirement information, please refer to the
More informationExchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide Document Revision Date: Nov. 13, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Introduction... 1 Exchange 2010 Outlook
More informationNetIQ Advanced Authentication Framework - Smartphone Applications
NetIQ Advanced Authentication Framework - Smartphone Applications User Guide Version 3.0 1 Table of Contents 1 Table of Contents 2 Introduction 3 About This Document 3 System Requirements 4 Install Smartphone
More informationBaylor Secure Messaging. For Non-Baylor Users
Baylor Secure Messaging For Non-Baylor Users TABLE OF CONTENTS SECTION ONE: GETTING STARTED...4 Receiving a Secure Message for the First Time...4 Password Configuration...5 Logging into Baylor Secure Messaging...7
More informationXCM Internet Explorer Settings
XCM Internet Explorer Settings For best results, you must prepare your Internet Explorer (IE) browser so that interactions with the XCM site are fully trusted (XCM only supports Microsoft s Internet Explorer).
More informationThinManager and Active Directory
ThinManager and Active Directory Use the F1 button on any page of a ThinManager wizard to launch Help for that page. Visit http://www.thinmanager.com/kb/index.php/special:allpages for a list of Knowledge
More informationHow To Set Up Dataprotect
How To Set Up Dataprotect This document will show you how to install and configure your computer for a Typical installation. If you have questions about configuring a Custom installation please contact
More informationSECURE EMAIL USER GUIDE OUTLOOK 2000
WELLS FARGO AUTHENTICATION SERVICES DATED: MAY 2003 TABLE OF CONTENTS GENERAL INFORMATION... 1 INSTALLING THE WELLS FARGO ROOT CERTIFICATE CHAIN.. 2 INSTALLING THE CERTIFICATES INTO IE... 3 SETTING UP
More informationEntrust Certificate Services for Adobe CDS
Entrust Certificate Services Entrust Certificate Services for Adobe CDS Getting Started Guide Entrust SafeNet Authentication Client: 8.3 Date of issue: July 2015 Document issue: 3.0 Revisions Issue and
More informationSymantec PGP Whole Disk Encryption Hands-On Lab V 3.7
Symantec PGP Whole Disk Encryption Hands-On Lab V 3.7 Description This hands-on lab session covers the hard drive encryption technologies from PGP. Students will administer a typical Whole Disk Encryption
More informationTechNote. Contents. Introduction. System Requirements. SRA Two-factor Authentication with Quest Defender. Secure Remote Access.
Secure Remote Access SRA Two-factor Authentication with Quest Defender SonicOS Contents Introduction... 1 System Requirements... 1 Defender Configuration... 2 Dell SonicWALL SRA Configuration... 18 Two-factor
More informationUsing Entrust certificates with Microsoft Office and Windows
Entrust Managed Services PKI Using Entrust certificates with Microsoft Office and Windows Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust is a trademark
More informationTable of Contents. Welcome... 2. Login... 3. Password Assistance... 4. Self Registration... 5. Secure Mail... 7. Compose... 8. Drafts...
Table of Contents Welcome... 2 Login... 3 Password Assistance... 4 Self Registration... 5 Secure Mail... 7 Compose... 8 Drafts... 10 Outbox... 11 Sent Items... 12 View Package Details... 12 File Manager...
More informationowncloud Configuration and Usage Guide
owncloud Configuration and Usage Guide This guide will assist you with configuring and using YSUʼs Cloud Data storage solution (owncloud). The setup instructions will include how to navigate the web interface,
More informationKaspersky Password Manager USER GUIDE
Kaspersky Password Manager USER GUIDE Dear User! Thank you for choosing our product. We hope that this documentation helps you in your work and provides answers you may need. Any type of reproduction or
More informationThe following items are trademarks or registered trademarks of Kaba Mas in the United States and/or other countries. GITCON
The Gitcon Access Management Software Installation Guide is a publication of Kaba Mas LLC (hereinafter Kaba Mas). No part of this book may be reproduced or transmitted in any form or by any means, electronic
More informationAventail Connect Client with Smart Tunneling
Aventail Connect Client with Smart Tunneling User s Guide Windows v8.7.0 1996-2006 Aventail Corporation. All rights reserved. Aventail, Aventail Cache Control, Aventail Connect, Aventail Connect Mobile,
More informationPassword Depot for Android
Password Depot for Android Table Of Contents Table Of Contents... 2 User interface... 3 Action Bar... 3 Overflow Menu... 4 Entry menu... 5 Context Bar... 6 Settings... 7 Creating a password file... 8 Opening
More informationSOS SO S O n O lin n e lin e Bac Ba kup cku ck p u USER MANUAL
SOS Online Backup USER MANUAL HOW TO INSTALL THE SOFTWARE 1. Download the software from the website: http://www.sosonlinebackup.com/download_the_software.htm 2. Click Run to install when promoted, or alternatively,
More informationSECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013
SECURE MOBILE ACCESS MODULE USER GUIDE EFT 2013 GlobalSCAPE, Inc. (GSB) Address: 4500 Lockhill-Selma Road, Suite 150 San Antonio, TX (USA) 78249 Sales: (210) 308-8267 Sales (Toll Free): (800) 290-5054
More informationActive Directory Management. Agent Deployment Guide
Active Directory Management Agent Deployment Guide Document Revision Date: June 12, 2014 Active Directory Management Deployment Guide i Contents System Requirements...1 Hardware Requirements...1 Installation...3
More informationIIS, FTP Server and Windows
IIS, FTP Server and Windows The Objective: To setup, configure and test FTP server. Requirement: Any version of the Windows 2000 Server. FTP Windows s component. Internet Information Services, IIS. Steps:
More informationIBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1. User Guide IBM SC23-9950-05
IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05 IBM Security Access Manager for Enterprise Single Sign-On Version 8.2.1 User Guide IBM SC23-9950-05
More informationTo successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to be verified.
TO: UAN CLIENTS FROM: UAN STAFF DATE: OCTOBER 8, 2008 SUBJECT: Steps for Initial Setup of Microsoft Outlook To successfully initialize Microsoft Outlook (Outlook) the first time, email settings need to
More informationHOW TO USE OIT EMAIL VIA THE WEB
HOW TO USE OIT EMAIL VIA THE WEB A) Logging into your MyOIT account which includes your email account 1) Open a browser such as Firefox, Chrome or Safari. Please do not use Internet Explorer. 2) In the
More informationInitial Setup of Microsoft Outlook 2011 with IMAP for OS X Lion
Initial Setup of Microsoft Outlook Concept This document describes the procedures for setting up the Microsoft Outlook email client to download messages from Google Mail using Internet Message Access Protocol
More informationInstallation Instruction STATISTICA. Concurrent Network License with Borrowing Domain Based Registration
Installation Instruction STATISTICA Concurrent Network License with Borrowing Domain Based Registration Notes: ❶ The installation of the Concurrent network version entails two parts: a) a server installation,
More information1. Set Daylight Savings Time... 3. 2. Create Migrator Account... 3. 3. Assign Migrator Account to Administrator group... 4
1. Set Daylight Savings Time... 3 a. Have client log into Novell/Local Machine with Administrator Account...3 b. Access Adjust Date/Time...3 c. Make sure the time zone is set to Central Time...3 2. Create
More informationOS X 10.6 SNOW LEOPARD: KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN
OS X 10.6 SNOW LEOPARD: KEYCHAIN ACCESS MANAGING & UNDERSTANDING KEYCHAIN MANAGING KEYCHAINS Mac OS X features a sophisticated system that automatically protects all your authentication assets in encrypted
More informationCox Business Premium Online Backup USER'S GUIDE. Cox Business VERSION 1.0
Cox Business Premium Online Backup USER'S GUIDE Cox Business VERSION 1.0 Table of Contents ABOUT THIS GUIDE... 4 DOWNLOADING COX BUSINESS PREMIUM ONLINE BACKUP... 5 INSTALLING COX BUSINESS PREMIUM ONLINE
More informationTrend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.
Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files,
More informationInitial Setup of Mozilla Thunderbird with IMAP for Windows 7
Initial Setup of Mozilla Thunderbird Concept This document describes the procedures for setting up the Mozilla Thunderbird email client to download messages from Google Mail using Internet Message Access
More informationTM Online Storage: StorageSync
TM Online Storage: StorageSync 1 Part A: Backup Your Profile 1: How to download and install StorageSync? Where to download StorageSync? You may download StorageSync from your e-storage account. Please
More informationGetting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class
Getting Started with MozyPro Online Backup Online Software from Time Warner Cable Business Class A Guide for Users MozyPro is an online backup service with an easy to use interface so you can start backing
More informationInternet Explorer 7 for Windows XP: Obtaining MIT Certificates
Internet Explorer 7 for Windows XP: Obtaining MIT Certificates Overview In order to use secure web services at MIT, you will need to obtain two types of MIT web certificates: MIT Certificate Authority
More informationNeoMail Guide. Neotel (Pty) Ltd
NeoMail Guide Neotel (Pty) Ltd NeoMail Connect Guide... 1 1. POP and IMAP Client access... 3 2. Outlook Web Access... 4 3. Outlook (IMAP and POP)... 6 4. Outlook 2007... 16 5. Outlook Express... 24 1.
More information8x8 Virtual Office Telephony Interface for Salesforce
8x8 Virtual Office Telephony Interface for Salesforce Administrator Guide May 2014 The Champion For Business Communications Table of Contents 8x8 Virtual Office Telephony Interface for Salesforce.... 3
More informationConnecting To SOM Network Drives With Windows XP
Connecting To SOM Network Drives With Windows XP The first step to take is to make sure that you are using the UCSF VPN client when you connect. If you do not have a VPN username and password, you will
More informationSoftware Token. Installation and User Guide. 2013 MasterCard Proprietary. All rights reserved.
Software Token Installation and User Guide 2013 MasterCard Proprietary. All rights reserved. Contents Overview... 1 Install the RSA Client Desktop Application... 1 Download and Save the RSA Desktop Application...
More informationSFTP Server User Login Instructions. Open Internet explorer and enter the following url: https://sftp.sae.org
SFTP Server User Login Instructions Open Internet explorer and enter the following url: https://sftp.sae.org You will be prompted for a user id and password as such. Please enter your account id and password.
More informationWhatsUp Gold v16.1 Installation and Configuration Guide
WhatsUp Gold v16.1 Installation and Configuration Guide Contents Installing and Configuring Ipswitch WhatsUp Gold v16.1 using WhatsUp Setup Installing WhatsUp Gold using WhatsUp Setup... 1 Security guidelines
More informationPendragon Forms Industrial
Pendragon Forms Industrial Version 7 Installation & Reference Guide for Android Devices Contents What Is Pendragon Forms Industrial?... 2 Installing Pendragon Forms Industrial... 2 Installing Pendragon
More informationWelcome to Business Internet Banking
Welcome to Business Internet Banking Member FDIC Table of Contents Logging On to Business Internet Banking. 3 Viewing Balances. 6 Viewing Transaction Information. 7 Issuing Stop Payments. 9 Viewing estatements.
More informationExchange 2010. Outlook Profile/POP/IMAP/SMTP Setup Guide
Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide September, 2013 Exchange 2010 Outlook Profile/POP/IMAP/SMTP Setup Guide i Contents Exchange 2010 Outlook Profile Configuration... 1 Outlook Profile
More informationUsing Websense Data Endpoint Client Software
1 Using Websense Data Endpoint Client Software Related topics: Disabling the endpoint client, page 3 Viewing contained files, page 5 Viewing logs, page 6 Updating the endpoint client, page 7 Your organization
More informationRemote Access: Citrix Client Setup
Introduction: The following documentation is intended to assist first time or active users with installation of the Citrix ICA connection software required to access the MSVU Remote Access system desktop
More informationForcepoint Sidewinder, Virtual Appliance Evaluation for Desktop. Installation Guide 8.x. Revision A
Forcepoint Sidewinder, Virtual Appliance Evaluation for Desktop Installation Guide 8.x Revision A Table of contents 1 Overview...3 2 Verify system requirements...4 Virtualization requirements...4 Admin
More informationSetting Up Email. on Your Sprint Power Vision SM Mogul by HTC
Setting Up Email on Your Sprint Power Vision SM Mogul by HTC Intellectual Property Notices 2007 Sprint Nextel. All rights reserved. No reproduction in whole or in part without prior written approval. SPRINT
More information3 Setting up Databases on a Microsoft SQL 7.0 Server
3 Setting up Databases on a Microsoft SQL 7.0 Server Overview of the Installation Process To set up GoldMine properly, you must follow a sequence of steps to install GoldMine s program files, and the other
More informationConnecting to HomeRun over the Web
(o HomeRun Integrated Clinical and Financial Homecare Software Connecting to HomeRun over the Web White Oak Systems, LLC 8 Research Parkway Wallingford, CT 06492 Phone: 866-679-7702 info@whiteoaksys.com
More informationLogMeIn Network Console Version 8 Getting Started Guide
LogMeIn Network Console Version 8 Getting Started Guide April 2007 1. About the Network Console... 2 2. User Interface...2 3. Quick Start... 2 4. Network & Subnet Scans...3 5. Quick Connect...3 6. Operations...
More informationWHAT IS VIRTUAL DESKTOP? WHAT YOU NEED LOG IN TO VIRTUAL DESKTOP SET UP CITRIX RECEIVER REMOTE ACCESS GUIDE
WHAT IS VIRTUAL DESKTOP? Virtual Desktop is an online environment that allows you to access NSF applications and a virtual desktop that mimics a Windows 7 environment. You can use Virtual Desktop to use
More informationTransitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1
Transitioning from TurningPoint 5 to TurningPoint Cloud - LMS 1 A Turning Account is a unique identifier that is used to tie together all software accounts and response devices. A Turning Account is required
More informationUP L18 Enhanced MDM and Updated Email Protection Hands-On Lab
UP L18 Enhanced MDM and Updated Email Protection Hands-On Lab Description The Symantec App Center platform continues to expand it s offering with new enhanced support for native agent based device management
More informationWelcome Guide for MP-1 Token for Microsoft Windows
Welcome Guide for MP-1 Token for Microsoft Windows Protecting Your On-line Identity Authentication Service Delivery Made EASY Copyright 2012 SafeNet, Inc. All rights reserved. All attempts have been made
More informationSTATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS
data analysis data mining quality improvement web-based analytics Notes STATISTICA VERSION 11 CONCURRENT NETWORK LICENSE WITH BORROWING INSTALLATION INSTRUCTIONS 1. The installation of the Concurrent network
More informationMarcum LLP MFT Guide
MFT Guide Contents 1. Logging In...3 2. Installing the Upload Wizard...4 3. Uploading Files Using the Upload Wizard...5 4. Downloading Files Using the Upload Wizard...8 5. Frequently Asked Questions...9
More informationSophos Mobile Control User guide for Android
Sophos Mobile Control User guide for Android Product version: 2.5 Document date: July 2012 Contents 1 About Sophos Mobile Control... 3 2 Login to the Self Service Portal... 4 3 Set up Sophos Mobile Control
More informationUsing SSH Secure File Transfer to Upload Files to Banner
Using SSH Secure File Transfer to Upload Files to Banner Several Banner processes, including GLP2LMP (Create PopSelect Using File), require you to upload files from your own computer to the computer system
More informationSophos Mobile Control as a Service Startup guide. Product version: 3.5
Sophos Mobile Control as a Service Startup guide Product version: 3.5 Document date: August 2013 Contents 1 About this guide...3 2 What are the key steps?...4 3 First login...5 4 Change your administrator
More informationSoftware Installation Requirements
Software Installation Guide PrintIQ TM Software Installation Requirements Please use the following guide to ensure that you're meeting all requirements prior to installing the PrintIQ TM Xerox Device Agent
More information1. Application Overview... 3. 2. System Requirements... 3. 3. Installation... 3. 4. Splash Screen... 4. 5. Registration Screen...
1 P a g e Table of Contents 1. Application Overview... 3 2. System Requirements... 3 3. Installation... 3 4. Splash Screen... 4 5. Registration Screen... 5 5.1 Registration... 5 6. Login Screen... 7 6.1
More informationNetwork Scanner Tool V3.5. User s Guide Version 3.5.01
Network Scanner Tool V3.5 User s Guide Version 3.5.01 Copyright 2000-2016 by SHARP CORPORATION. All rights reserved. Reproduction, adaptation or translation without prior written permission is prohibited,
More informationLoad Bulletin ADP, Inc. Dealer Services 1950 Hassell Road Hoffman Estates, IL 60169-6308
Load Bulletin ADP, Inc. Dealer Services 1950 Hassell Road Hoffman Estates, IL 60169-6308 Make sure the media label contains this number: NP-ASP-AE1.0 ADP Network Phone ASP Assistant Enterprise Loading
More informationCBH Provider EDI Browser Manual
CBH Provider EDI Browser Manual Table of Contents PGP Software Installation Windows XP 2 PGP Software Installation Windows 7 9 Main Screen 16 Log In Screen 19 Report: Authorizations 21 Decryption Instructions
More informationInstallation Guide Revision 1.0.
Sage Intelligence Financial Reporting for Sage ERP X3 Installation Guide Revision 1.0. The software described in this document is protected by copyright, And may not be copied on any medium except as specifically
More informationAvalanche Site Edition
Avalanche Site Edition Version 4.8 avse ug 48 20090325 Revised 03/20/2009 ii Copyright 2008 by Wavelink Corporation All rights reserved. Wavelink Corporation 6985 South Union Park Avenue, Suite 335 Midvale,
More informationVMware Horizon FLEX User Guide
Horizon FLEX 1.5 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more recent editions of this
More informationTransitioning from TurningPoint 5 to TurningPoint Cloud - NO LMS 1
Transitioning from TurningPoint 5 to TurningPoint Cloud - NO LMS 1 A Turning Account is a unique identifier that is used to tie together all software accounts and response devices. A Turning Account is
More informationCrystal Reports Installation Guide
Crystal Reports Installation Guide Version XI Infor Global Solutions, Inc. Copyright 2006 Infor IP Holdings C.V. and/or its affiliates or licensors. All rights reserved. The Infor word and design marks
More informationInstallation Guide. (You can get these files from http://www.clariostechnology.com/intelligentreports/install)
Clarios Technology Pty. Ltd. Intelligent Reporter Installation Guide Installing Intelligent Reports JIRA plugin The Intelligent Reports plugin for JIRA is available through the Atlassian Marketplace. Follow
More informationAD Self Password Reset Installation and configuration
AD Self Password Reset Installation and configuration AD Self Password Reset Installation 1 Manual v1.4 Table of Contents TABLE OF CONTENTS 2 SUMMARY 3 INSTALLATION 4 REMOVAL 6 AD SELF PASSWORD RESET CONFIGURATION
More informationState of Michigan Data Exchange Gateway. Web-Interface Users Guide 12-07-2009
State of Michigan Data Exchange Gateway Web-Interface Users Guide 12-07-2009 Page 1 of 21 Revision History: Revision # Date Author Change: 1 8-14-2009 Mattingly Original Release 1.1 8-31-2009 MM Pgs 4,
More informationUsing Device Discovery
2 CHAPTER You can use Active Discovery to scan your network for new monitors (Active Monitors and Performance Monitors) and devices on a regular basis. Newly discovered items are added to the Active Discovery
More informationTech Tips Helpful Tips for Pelco Products
DX4104 UPDATING FROM THE NETWORK SERVER October 29, 2009 DX4104 UPDATING FROM THE NETWORK SERVER The Operation/Configuration manual provides users an option for updating the server through the network
More informationTable of Contents. Changing Your Password in Windows NT p. 1. Changing Your Password in Alpha Connection.. pp. 1-3
Table of Contents Changing Your Password in Windows NT p. 1 Changing Your Password in Alpha Connection.. pp. 1-3 Not Able to Get Outlook Express Mail Because Alpha Connection Password Expires... pp. 3-4
More information